pki --print
Synopsis
pki --print [--in file|--keyid hex] [--type x509|crl|ac|pub|priv|rsa|ecdsa|ed25519|ed448|ocsp-req|ocsp-rsp] pki --print --help
Description
This pki
subcommand prints credentials in a human readable form.
Options
--in (-i) input file, default: stdin --keyid (-x) smartcard or TPM object handle --type (-t) type of credential, default: x509 --help (-h) show usage information --debug (-v) set debug level, default: 1 --options (-+) read command line options from file
Examples
-
Print a X.509 CA certificate:
$ pki --print --in strongswanCert.pem subject: "C=CH, O=strongSwan Project, CN=strongSwan Root CA" issuer: "C=CH, O=strongSwan Project, CN=strongSwan Root CA" validity: not before Jan 06 10:45:25 2021, ok not after Jan 07 10:45:25 2031, ok (expires in 3629 days) serial: 3e:9e:42:fe:27:8e:5b:bd flags: CA CRLSign self-signed pathlen: 1 subjkeyId: 20:d0:f6:72:42:0b:37:4c:b0:12:23:8e:51:f1:f6:0f:7a:a5:b7:e0 pubkey: RSA 3072 bits keyid: 96:84:66:a2:a0:91:99:96:c2:10:1d:ca:dc:b8:33:c2:c3:72:34:86 subjkey: 20:d0:f6:72:42:0b:37:4c:b0:12:23:8e:51:f1:f6:0f:7a:a5:b7:e0
-
Print an RSA private key:
$ pki --print --type rsa --in strongswanKey.pem privkey: RSA 3072 bits keyid: 96:84:66:a2:a0:91:99:96:c2:10:1d:ca:dc:b8:33:c2:c3:72:34:86 subjkey: 20:d0:f6:72:42:0b:37:4c:b0:12:23:8e:51:f1:f6:0f:7a:a5:b7:e0
-
Print a CRL:
$ pki --print --type crl --in strongswan.crl issuer: "C=CH, O=strongSwan Project, CN=strongSwan Root CA" update: this on Jan 08 10:45:29 2021, ok next on Jan 23 10:45:29 2021, expired (6 days ago) serial: 02 authKeyId: 20:d0:f6:72:42:0b:37:4c:b0:12:23:8e:51:f1:f6:0f:7a:a5:b7:e0 2 revoked certificates: 0a: Jan 08 10:45:29 2021, ca compromise 08: Jan 08 10:45:28 2021, key compromise
-
Print an X.509 certificate stored under a handle in the NV-RAM of a TPM 2.0:
$ pki --print --type x509 --keyid 0x01800003 TPM 2.0 via TSS2 v2 available loaded certificate from TPM NV index 0x01800003 subject: "C=CH, O=strongSec GmbH, CN=mijas.strongsec.com" issuer: "C=CH, O=strongSec GmbH, CN=strongSec 2016 Root CA" validity: not before Dec 23 21:12:33 2020, ok not after Dec 23 21:12:33 2025, ok (expires in 1789 days) serial: 2f:7e:da:aa:98:4e:5a:93 altNames: mijas.strongsec.com flags: CRL URIs: http://www.strongsec.com/ca/strongsec.crl authkeyId: 6d:c2:af:37:49:41:b9:fd:f4:45:8b:aa:e0:03:3b:b9:e5:7b:9c:b5 subjkeyId: b4:05:b9:62:32:f6:87:7e:a7:1c:38:b3:20:57:37:b4:37:83:ca:ff pubkey: ECDSA 256 bits keyid: 73:2c:76:9e:8d:1b:2e:fe:f8:b6:4d:5a:e8:3f:84:d1:29:73:3f:dd subjkey: b4:05:b9:62:32:f6:87:7e:a7:1c:38:b3:20:57:37:b4:37:83:ca:ff
-
Print the ECDSA private key stored under a handle in the NV-RAM of a TPM 2.0:
$ pki --print --type priv --keyid 0x81010003 TPM 2.0 via TSS2 v2 available signature algorithm is ECDSA with SHA256 hash privkey: ECDSA 256 bits keyid: 73:2c:76:9e:8d:1b:2e:fe:f8:b6:4d:5a:e8:3f:84:d1:29:73:3f:dd subjkey: b4:05:b9:62:32:f6:87:7e:a7:1c:38:b3:20:57:37:b4:37:83:ca:ff
-
Print an OCSP request
pki --print --type ocsp-req --in req.der subject: "(null)" nonce: a1:33:aa:bc:96:60:69:76:f3:bc:9c:88:3b:07:50:47 serial: 29:ff:36:d9:9a:21:49:61:91:1d issuer: keyHash: 72:41:ca:f9:35:87:89:a0:fb:8c:d6:bb:7e:bb:d3:83:ab:d5:89:7b nameHash: 5e:b2:b4:42:e1:a5:fb:1c:bc:d8:4e:35:10:72:b2:c3:9a:38:4f:cd serial: 2c:ff:3d:dc:08:96:36:dd:c5:7a issuer: keyHash: 72:41:ca:f9:35:87:89:a0:fb:8c:d6:bb:7e:bb:d3:83:ab:d5:89:7b nameHash: 5e:b2:b4:42:e1:a5:fb:1c:bc:d8:4e:35:10:72:b2:c3:9a:38:4f:cd serial: 0e:ff:eb:41:a2:45:fe:ca:01:d4 issuer: keyHash: 5a:1b:ec:17:f0:6d:18:45:66:5b:62:40:64:67:a2:c8:e7:6a:84:20 nameHash: df:1e:24:71:96:e6:bc:8c:06:46:90:18:a2:7d:b9:82:18:45:e7:09 serial: 10:ff:45:9a:6d:ee:4c:ec:7c:97 issuer: keyHash: 5a:1b:ec:17:f0:6d:18:45:66:5b:62:40:64:67:a2:c8:e7:6a:84:20 nameHash: df:1e:24:71:96:e6:bc:8c:06:46:90:18:a2:7d:b9:82:18:45:e7:09
-
Print an OCSP response
$ pki --print --type ocsp-rsp --in rsp.der issuer: "C=CH, O=strongSwan Project, CN=OCSP signer of strongSwan Issuing CA 2" update: this on Oct 22 14:04:26 2023, ok next on Oct 22 14:14:26 2023, ok (expires in 9 minutes) responses: 29:ff:36:d9:9a:21:49:61:91:1d: revoked on Sep 22 15:13:04 2023, superseded 2c:ff:3d:dc:08:96:36:dd:c5:7a: good 0e:ff:eb:41:a2:45:fe:ca:01:d4: unknown 10:ff:45:9a:6d:ee:4c:ec:7c:97: unknown