Linux and UNIX Man Pages

Linux & Unix Commands - Search Man Pages

httpcfg(1) [suse man page]

Mono(httpcfg)															     Mono(httpcfg)

NAME
httpcfg - Mono Certificate Management for HttpListener SYNOPSIS
httpcfg [options] certificate DESCRIPTION
This tool is used to manage the certificates used by the HttpListener embeddable server class when the HttpListener is configured as an HTTPS server instead of an HTTP server. You must select one of the possible actions: add, delete or list. When adding a certificate (-add), you must provide the following information: a certificate (with the -cert flag) a Private Key file (with the -pvk argument, the filename is typically "key") and a port number (with the -port flag). When deleting a certificate (-del or -delete) you need to provide the port number. PARAMETERS
-add Adds a new certificate/private key combination for being used at a given port by the HttpListener API. -del, -delete Deletes the certificates associated for the port specified (must be specified separatedly). -list List all known certificates. -port PORT Specifies the port to add certificates to, or remove certificates from. -pvk FILE Specifies the Private Key file. -cert CERT Specifies the certificate file to use. EXAMPLES
httpcfg -add -port 8081 -pvk myfile.pvk -cert MyCert For more details on creating the certificate file and the private key, see the following web page: http://www.mono-project.com/UsingClientCertificatesWithXSP FILES
The certificates are stored in the ~/.mono/httplistener directory AUTHOR
httpcfg was written by Gonzalo Paniagua. COPYRIGHT
Copyright (C) 2006 Novell. MAILING LISTS
Visit http://lists.ximian.com/mailman/listinfo/mono-devel-list for details. WEB SITE
Visit http://www.mono-project.com for details SEE ALSO
makecert(1), signcode(1), cert2spc(1) The private key format: http://www.drh-consultancy.demon.co.uk/pvk.html Mono(httpcfg)

Check Out this Related Man Page

Mono(signcode)															    Mono(signcode)

NAME
signcode - Digitally sign an PE executable using an X.509 certificate. SYNOPSIS
signcode [options] filename DESCRIPTION
Digitally sign an PE executable (CLR assembly, Win32 EXE or DLL) using an X.509 certificate and it's associated private key. The signature is compatible with Authenticode(r) and can be validated with chktrust (either on Windows or on any platform supported by Mono). OPTIONS
-spc spcfile The Software Publisher File (spc) that contains the X.509 certificate chain used to digitally sign the PE executable. -v pvkfile The Private Key File (pvk) that contains the private key used to digitally sign the PE executable. This private key must match the public key inside the publisher X.509 certificate. -a md5 | sha1 The hash algorithm used in the digital signature of the PE executable. The default algorithm is MD5. -$ individual | commercial Add information about the publisher, i.e. if the signature is generated by an individual or a commercial entity. -n description Add a textual description of the signed file. -i url Add a URL associated to the publisher or the signed file. -t url URL to a timestamp service to countersign the PE executable. Countersignature is required if you want the PE executable signature to be valid after the publisher certificate expires. The countersignature proves that the publisher had a valid (non-expired) certifi- cate when the PE executable was signed. -tr # Number of retries to get a timestamp for the countersignature. -tw # Delay (in seconds) between the retries to get a timestamp for the countersignature. -k name CryptoAPI key container name (when not using -v). -p name CryptoAPI provider name (when not using -v). -y # CryptoAPI provider type (when not using -v or -p). -ky signature | exchange | # CryptoAPI key type (when not using -v). -r localMachine | currentUser CryptoAPI key location (when not using -v). -help , -h , -? , /? Display help about this tool. OTHER CODE SIGNING TECHNOLOGIES
Assemblies are PE files that can also be strongnamed using the sn.exe tool. The order of code signature is important if a file requires both an Authenticode and a strongname signature. Strongname must be applied before the Authenticode signature. Applying a strongname after the Authenticode signature, like re-signing an assembly (e.g. delay-sign), will invalidate the Authenticode signature. KNOWN RESTRICTIONS
signcode cannot generate Authenticode signatures for CAB files. AUTHOR
Written by Sebastien Pouliot COPYRIGHT
Copyright (C) 2003 Motus Technologies. Copyright (C) 2004 Novell. Released under BSD license. MAILING LISTS
Visit http://lists.ximian.com/mailman/listinfo/mono-devel-list for details. WEB SITE
Visit http://www.mono-project.com for details SEE ALSO
chktrust(1),makecert(1),cert2spc(1) Mono(signcode)
Man Page