Provided by: rnbyc_1.1.13-2.1build3_amd64 bug

NAME

       rnbyc - JWK and JWT parser and generator

DESCRIPTION

       rnbyc  -  JWK/JWKS  parser  and  generator,  JWT  parser  and serializer, supports signed,
       encrypted and nested JWTs

       Version 1.1.8

COPYRIGHT

       Copyright 2020-2022 Nicolas Mora <mail@babelouest.org>

       This program is free software; you can redistribute it and/or modify it under the terms of
       the GPL 3

       Command-line options:

       -j --jwks

              Action: JWKS, parse or generate keys and output JWKS

       -g --generate <type>

              Generate  a  key  pair  or a symmetric key <type> - values available: RSA[key size]
              (default key size: 4096),  EC256,  EC384,  EC521,  Ed25519,  Ed448,  X25519,  X448,
              oct[key size] (default key size: 128 bits)

       -i --stdin

              Reads key to parse from stdin

       -f --in-file

              Reads key to parse from a file

       -k --key-id

              Specifies the key-id to add to the current key

       -a --alg

              Action:  JWKS - Specifies the alg value to add to the current key Action: Serialize
              - Specifies the alg value to sign the token

       -e --enc

              Specifies the enc value to encrypt the token (default A128CBC)

       -l --enc-alg

              Specifies the encryption algorithm for key management of the token

       -o --out-file

              Specifies the output file for the private keys (or all the keys if no  public  file
              is specified) in the JWKS

       -p --out-file-public

              Specifies the output file for the public keys in the JWKS

       -n --indent

              JWKS output spaces indentation: 0 is compact mode, default is 2 spaces indent

       -F --format

              Output format, values available are JWK (default), PEM or DER

       -x --split

              Split JWKS output in public and private keys

       -t --parse-token

              Action: Parse token

       -s --serialize-token

              Action: serialize given claims in a token

       -H --header

              Display header of a parsed token

       -C --claims

              Display claims of a parsed token, default true

       -P --public-key

              Specifies  the  public  key for key management encryption or signature verification
              Public key must be in JWKS format and can be either a JWKS string or a  path  to  a
              JWKS file

       -K --private-key

              Specifies  the  private  key  for key management decryption or signature generation
              Public key must be in JWKS format and can be either a JWKS string or a  path  to  a
              JWKS file

       -S --self-signed

              Verifies  the  JWT  signature  if the signed JWT has its public key included in its
              header as 'jwk', 'x5c' or 'x5u' parameter

       -W --password

              Specifies the password for key management encryption/decryption using PBES2 alg  or
              signature generation/verification using HS alg

       -u --x5u-flags

              Set x5u flags to retrieve online certificate, values available are:

              cert: ignore server certificate errors (self-signed, expired, etc.)  follow: follow
              jwks_uri  redirection  if  any  values  can  be  contatenated,   e.g.   --x5u-flags
              cert,follow

       -v --version

              Print rnbyc's current version

       -h --help

              Print this message

       -d --debug

              Display debug messages

SEE ALSO

       The full documentation for rnbyc is maintained as a Texinfo manual.  If the info and rnbyc
       programs are properly installed at your site, the command

              info rnbyc

       should give you access to the complete manual.