rsa: rename getkey() to getrsakey(), document rsa2csr in rsa(8)
This commit is contained in:
parent
17a67eeb65
commit
1cf3c46669
8 changed files with 28 additions and 10 deletions
|
@ -1,6 +1,6 @@
|
||||||
.TH RSA 8
|
.TH RSA 8
|
||||||
.SH NAME
|
.SH NAME
|
||||||
rsagen, rsafill, asn12rsa, rsa2pub, rsa2ssh, rsa2x509 \- generate and format rsa keys
|
rsagen, rsafill, asn12rsa, rsa2pub, rsa2ssh, rsa2x509, rsa2csr \- generate and format rsa keys
|
||||||
.SH SYNOPSIS
|
.SH SYNOPSIS
|
||||||
.B rsagen
|
.B rsagen
|
||||||
[
|
[
|
||||||
|
@ -52,6 +52,12 @@ rsagen, rsafill, asn12rsa, rsa2pub, rsa2ssh, rsa2x509 \- generate and format rsa
|
||||||
[
|
[
|
||||||
.I file
|
.I file
|
||||||
]
|
]
|
||||||
|
.PP
|
||||||
|
.B rsa2csr
|
||||||
|
.I subject
|
||||||
|
[
|
||||||
|
.I file
|
||||||
|
]
|
||||||
.SH DESCRIPTION
|
.SH DESCRIPTION
|
||||||
Plan 9 represents an RSA key as an attribute-value pair list
|
Plan 9 represents an RSA key as an attribute-value pair list
|
||||||
prefixed with the string
|
prefixed with the string
|
||||||
|
@ -229,6 +235,11 @@ The Plan 9 RSA private key needs to be loaded into factotum
|
||||||
for TLS server applications. It is recommended to put the key into
|
for TLS server applications. It is recommended to put the key into
|
||||||
.IR secstore (1),
|
.IR secstore (1),
|
||||||
avoiding it being stored unencrypted on the filesystem.
|
avoiding it being stored unencrypted on the filesystem.
|
||||||
|
.PP
|
||||||
|
.I Rsa2csr
|
||||||
|
takes the
|
||||||
|
.I subject
|
||||||
|
and a RSA private key and outputs a signing request in ASN.1 format.
|
||||||
.SH EXAMPLES
|
.SH EXAMPLES
|
||||||
Generate a fresh key and use it to start a TLS-enabled web server:
|
Generate a fresh key and use it to start a TLS-enabled web server:
|
||||||
.IP
|
.IP
|
||||||
|
@ -257,6 +268,13 @@ and load it into factotum:
|
||||||
auth/pemdecode 'PRIVATE KEY' key.pem |
|
auth/pemdecode 'PRIVATE KEY' key.pem |
|
||||||
auth/asn12rsa -t 'service=tls' >/mnt/factotum/ctl
|
auth/asn12rsa -t 'service=tls' >/mnt/factotum/ctl
|
||||||
.EE
|
.EE
|
||||||
|
.PP
|
||||||
|
Generate a certificate signing request (CSR) in PEM format:
|
||||||
|
.IP
|
||||||
|
.EX
|
||||||
|
auth/rsa2csr 'CN=example.com' key |
|
||||||
|
auth/pemencode 'CERTIFICATE REQUEST'
|
||||||
|
.EE
|
||||||
.SH SOURCE
|
.SH SOURCE
|
||||||
.B /sys/src/cmd/auth
|
.B /sys/src/cmd/auth
|
||||||
.SH "SEE ALSO
|
.SH "SEE ALSO
|
||||||
|
|
|
@ -7,7 +7,7 @@
|
||||||
#include "rsa2any.h"
|
#include "rsa2any.h"
|
||||||
|
|
||||||
RSApriv*
|
RSApriv*
|
||||||
getkey(int argc, char **argv, int needprivate, Attr **pa)
|
getrsakey(int argc, char **argv, int needprivate, Attr **pa)
|
||||||
{
|
{
|
||||||
char *file, *s, *p;
|
char *file, *s, *p;
|
||||||
int sz;
|
int sz;
|
||||||
|
|
|
@ -1,5 +1,5 @@
|
||||||
DSApriv*getdsakey(int argc, char **argv, int needprivate, Attr **pa);
|
DSApriv*getdsakey(int argc, char **argv, int needprivate, Attr **pa);
|
||||||
RSApriv*getkey(int argc, char **argv, int needprivate, Attr **pa);
|
RSApriv*getrsakey(int argc, char **argv, int needprivate, Attr **pa);
|
||||||
uchar* put4(uchar *p, uint n);
|
uchar* put4(uchar *p, uint n);
|
||||||
uchar* putmp2(uchar *p, mpint *b);
|
uchar* putmp2(uchar *p, mpint *b);
|
||||||
uchar* putn(uchar *p, void *v, uint n);
|
uchar* putn(uchar *p, void *v, uint n);
|
||||||
|
|
|
@ -31,12 +31,12 @@ main(int argc, char **argv)
|
||||||
if(argc != 1 && argc != 2)
|
if(argc != 1 && argc != 2)
|
||||||
usage();
|
usage();
|
||||||
|
|
||||||
if((key = getkey(argc-1, argv+1, 1, nil)) == nil)
|
if((key = getrsakey(argc-1, argv+1, 1, nil)) == nil)
|
||||||
sysfatal("%r");
|
sysfatal("%r");
|
||||||
|
|
||||||
cert = X509rsareq(key, argv[0], &len);
|
cert = X509rsareq(key, argv[0], &len);
|
||||||
if(cert == nil)
|
if(cert == nil)
|
||||||
sysfatal("X509req: %r");
|
sysfatal("X509rsareq: %r");
|
||||||
|
|
||||||
write(1, cert, len);
|
write(1, cert, len);
|
||||||
exits(0);
|
exits(0);
|
||||||
|
|
|
@ -31,7 +31,7 @@ main(int argc, char **argv)
|
||||||
if(argc > 1)
|
if(argc > 1)
|
||||||
usage();
|
usage();
|
||||||
|
|
||||||
if((key = getkey(argc, argv, 0, &a)) == nil)
|
if((key = getrsakey(argc, argv, 0, &a)) == nil)
|
||||||
sysfatal("%r");
|
sysfatal("%r");
|
||||||
|
|
||||||
s = smprint("key %A size=%d ek=%B n=%B\n",
|
s = smprint("key %A size=%d ek=%B n=%B\n",
|
||||||
|
|
|
@ -39,7 +39,7 @@ main(int argc, char **argv)
|
||||||
if(argc > 1)
|
if(argc > 1)
|
||||||
usage();
|
usage();
|
||||||
|
|
||||||
if((k = getkey(argc, argv, 0, nil)) == nil)
|
if((k = getrsakey(argc, argv, 0, nil)) == nil)
|
||||||
sysfatal("%r");
|
sysfatal("%r");
|
||||||
|
|
||||||
if(ssh2) {
|
if(ssh2) {
|
||||||
|
|
|
@ -38,12 +38,12 @@ main(int argc, char **argv)
|
||||||
if(argc != 1 && argc != 2)
|
if(argc != 1 && argc != 2)
|
||||||
usage();
|
usage();
|
||||||
|
|
||||||
if((key = getkey(argc-1, argv+1, 1, nil)) == nil)
|
if((key = getrsakey(argc-1, argv+1, 1, nil)) == nil)
|
||||||
sysfatal("%r");
|
sysfatal("%r");
|
||||||
|
|
||||||
cert = X509rsagen(key, argv[0], valid, &len);
|
cert = X509rsagen(key, argv[0], valid, &len);
|
||||||
if(cert == nil)
|
if(cert == nil)
|
||||||
sysfatal("X509gen: %r");
|
sysfatal("X509rsagen: %r");
|
||||||
|
|
||||||
write(1, cert, len);
|
write(1, cert, len);
|
||||||
exits(0);
|
exits(0);
|
||||||
|
|
|
@ -31,7 +31,7 @@ main(int argc, char **argv)
|
||||||
if(argc > 1)
|
if(argc > 1)
|
||||||
usage();
|
usage();
|
||||||
|
|
||||||
if((key = getkey(argc, argv, 1, &a)) == nil)
|
if((key = getrsakey(argc, argv, 1, &a)) == nil)
|
||||||
sysfatal("%r");
|
sysfatal("%r");
|
||||||
|
|
||||||
s = smprint("key %A size=%d ek=%B !dk=%B n=%B !p=%B !q=%B !kp=%B !kq=%B !c2=%B\n",
|
s = smprint("key %A size=%d ek=%B !dk=%B n=%B !p=%B !q=%B !kp=%B !kq=%B !c2=%B\n",
|
||||||
|
|
Loading…
Reference in a new issue