Provided by: strongswan-starter_5.1.2-0ubuntu2.11_amd64 bug

NAME

       pki --issue - Issue a certificate using a CA certificate and key

SYNOPSIS

       pki --issue [--in file] [--type type] --cakey file|--cakeyid hex --cacert file [--dn subject-dn]
                   [--san subjectAltName] [--lifetime days] [--serial hex] [--flag flag] [--digest digest]
                   [--ca] [--crl uri [--crlissuer issuer]] [--ocsp uri] [--pathlen len] [--nc-permitted name]
                   [--nc-excluded name] [--policy-mapping mapping] [--policy-explicit len]
                   [--policy-inhibit len] [--policy-any len]
                   [--cert-policy oid [--cps-uri uri] [--user-notice text]] [--outform encoding] [--debug level]

       pki --issue --options file

       pki --issue -h | --help

DESCRIPTION

       This sub-command of pki(1) is used to issue a certificate using a CA certificate and private key.

OPTIONS

       -h, --help
              Print usage information with a summary of the available options.

       -v, --debug level
              Set debug level, default: 1.

       -+, --options file
              Read command line options from file.

       -i, --in file
              Public key or PKCS#10 certificate request file to issue. If not given the key/request is read from
              STDIN.

       -t, --type type
              Type  of  the  input.  Either  pub  for a public key, or pkcs10 for a PKCS#10 certificate request,
              defaults to pub.

       -k, --cakey file
              CA private key file. Either this or --cakeyid is required.

       -x, --cakeyid hex
              Key ID of a CA private key on a smartcard. Either this or --cakey is required.

       -c, --cacert file
              CA certificate file. Required.

       -d, --dn subject-dn
              Subject distinguished name (DN) of the issued certificate.

       -a, --san subjectAltName
              subjectAltName extension to include in certificate. Can be used multiple times.

       -l, --lifetime days
              Days the certificate is valid, default: 1095.

       -s, --serial hex
              Serial number in hex. It is randomly allocated by default.

       -e, --flag flag
              Add extendedKeyUsage flag. One of serverAuth, clientAuth, crlSign, or  ocspSigning.  Can  be  used
              multiple times.

       -g, --digest digest
              Digest  to  use  for  signature  creation.  One  of  md5, sha1, sha224, sha256, sha384, or sha512.
              Defaults to sha1.

       -f, --outform encoding
              Encoding of the created certificate file. Either der (ASN.1 DER) or pem (Base64 PEM), defaults  to
              der.

       -b, --ca
              Include CA basicConstraint extension in certificate.

       -u, --crl uri
              CRL distribution point URI to include in certificate. Can be used multiple times.

       -I, --crlissuer issuer
              Optional CRL issuer for the CRL at the preceding distribution point.

       -o, --ocsp uri
              OCSP AuthorityInfoAccess URI to include in certificate. Can be used multiple times.

       -p, --pathlen len
              Set path length constraint.

       -n, --nc-permitted name
              Add permitted NameConstraint extension to certificate.

       -N, --nc-excluded name
              Add excluded NameConstraint extension to certificate.

       -M, --policy-mapping issuer-oid:subject-oid
              Add policyMapping from issuer to subject OID.

       -E, --policy-explicit len
              Add requireExplicitPolicy constraint.

       -H, --policy-inhibit len
              Add inhibitPolicyMapping constraint.

       -A, --policy-any len
              Add inhibitAnyPolicy constraint.

   Certificate Policy
       Multiple certificatePolicy extensions can be added. Each with the following information:

       -P, --cert-policy oid
              OID to include in certificatePolicy extension. Required.

       -C, --cps-uri uri
              Certification Practice statement URI for certificatePolicy.

       -U, --user-notice text
              User notice for certificatePolicy.

EXAMPLES

       To save repetitive typing, command line options can be stored in files.  Lets assume pki.opt contains the
       following contents:

         --cacert ca_cert.der --cakey ca_key.der --digest sha256
         --flag serverAuth --lifetime 1460 --type pkcs10

       Then the following command can be used to issue a  certificate  based  on  a  given  PKCS#10  certificate
       request and the options above:

         pki --issue --options pki.opt --in req.der > cert.der

SEE ALSO

       pki(1)