Unix and Linux Discussions Tagged with san |
|
Thread / Thread Starter |
Last Post |
Replies |
Views |
Forum |
|
|
|
1 |
4,289 |
UNIX for Beginners Questions & Answers |
|
|
|
7 |
6,610 |
AIX |
|
|
|
2 |
5,019 |
UNIX for Beginners Questions & Answers |
|
|
|
9 |
11,644 |
Red Hat |
|
|
|
6 |
12,599 |
Filesystems, Disks and Memory |
|
|
|
10 |
6,917 |
AIX |
|
|
|
13 |
12,574 |
Solaris |
|
|
|
7 |
19,767 |
Filesystems, Disks and Memory |
|
|
|
3 |
6,887 |
AIX |
|
|
|
13 |
4,208 |
AIX |
|
|
|
16 |
14,602 |
AIX |
|
|
|
10 |
7,944 |
AIX |
|
|
|
2 |
2,420 |
Solaris |
|
|
|
4 |
20,471 |
AIX |
|
|
|
5 |
4,147 |
Red Hat |
|
|
|
0 |
3,326 |
Solaris |
|
|
|
2 |
8,537 |
AIX |
|
|
|
18 |
19,189 |
AIX |
|
|
|
3 |
3,676 |
Solaris |
|
|
|
5 |
12,706 |
HP-UX |
|
|
|
0 |
11,679 |
Solaris |
|
|
|
3 |
3,373 |
Solaris |
|
|
|
3 |
14,832 |
HP-UX |
|
|
|
20 |
18,977 |
AIX |
|
|
|
2 |
7,366 |
Solaris |
|
|
|
1 |
11,211 |
AIX |
|
|
|
2 |
3,882 |
UNIX for Dummies Questions & Answers |
|
|
|
1 |
2,751 |
Shell Programming and Scripting |
|
|
|
3 |
5,300 |
Filesystems, Disks and Memory |
|
|
|
2 |
9,952 |
AIX |
|
|
|
3 |
10,022 |
AIX |
|
|
|
0 |
5,716 |
Red Hat |
|
|
|
3 |
7,825 |
UNIX for Advanced & Expert Users |
|
|
|
1 |
5,208 |
AIX |
|
|
|
3 |
5,078 |
Solaris |
|
|
|
4 |
5,433 |
Solaris |
|
|
|
3 |
50,683 |
Filesystems, Disks and Memory |
|
|
|
2 |
25,492 |
AIX |
|
|
|
5 |
7,133 |
AIX |
|
|
|
1 |
12,366 |
AIX |
PKI --REQ(1) strongSwan PKI --REQ(1)
NAME
pki --req - Create a PKCS#10 certificate request
SYNOPSIS
pki --req [--in file] [--type type] --dn distinguished-name [--san subjectAltName] [--password password] [--digest digest]
[--outform encoding] [--debug level]
pki --req --options file
pki --req -h | --help
DESCRIPTION
This sub-command of pki(1) is used to create a PKCS#10 certificate request.
OPTIONS
-h, --help
Print usage information with a summary of the available options.
-v, --debug level
Set debug level, default: 1.
-+, --options file
Read command line options from file.
-i, --in file
Private key input file. If not given the key is read from STDIN.
-t, --type type
Type of the input key. Either rsa or ecdsa, defaults to rsa.
-d, --dn distinguished-name
Subject distinguished name (DN). Required.
-a, --san subjectAltName
subjectAltName extension to include in request. Can be used multiple times.
-p, --password password
The challengePassword to include in the certificate request.
-g, --digest digest
Digest to use for signature creation. One of md5, sha1, sha224, sha256, sha384, or sha512. Defaults to sha1.
-f, --outform encoding
Encoding of the created certificate file. Either der (ASN.1 DER) or pem (Base64 PEM), defaults to der.
EXAMPLES
Generate a certificate request for an RSA key, with a subjectAltName extension:
pki --req --in key.der --dn "C=CH, O=strongSwan, CN=moon"
--san moon@strongswan.org > req.der
Generate a certificate request for an ECDSA key and a different digest:
pki --req --in key.der --type ecdsa --digest sha256
--dn "C=CH, O=strongSwan, CN=carol" > req.der
SEE ALSO
pki(1)
5.1.1 2013-07-31 PKI --REQ(1)