Jump To Close Expand all Collapse all Table of contents Command-Line Tools Guide 1. The pkispawn and pkidestroy Utilities Expand section "1. The pkispawn and pkidestroy Utilities" Collapse section "1. The pkispawn and pkidestroy Utilities" 1.1. The pkispawn Utility Expand section "1.1. The pkispawn Utility" Collapse section "1.1. The pkispawn Utility" 1.1.1. Non-interactive pkispawn Mode 1.1.2. Interactive pkispawn Mode 1.1.3. Creating Multiple Subsystems Within a Single Instance 1.1.4. Shared and Non-shared Instances 1.2. The pkidestroy Utility Expand section "1.2. The pkidestroy Utility" Collapse section "1.2. The pkidestroy Utility" 1.2.1. Non-interactive pkidestroy Mode 1.2.2. Interactive pkidestroy Mode 2. The pki utility Expand section "2. The pki utility" Collapse section "2. The pki utility" 2.1. Connection Parameters 2.2. Authentication 2.3. Paging pki Commands Output 2.4. Overview of the Supported pki Commands Expand section "2.4. Overview of the Supported pki Commands" Collapse section "2.4. Overview of the Supported pki Commands" 2.4.1. Client Management with pki client 2.4.2. Certificate Management with pki cert 2.4.3. User and Group Management with pki user and pki group 2.4.4. Group Member and User Membership Management with pki group-member and pki user-membership 2.4.5. Security Domain Management with pki securitydomain 2.4.6. Key Management with pki key-* 2.4.7. KRA Connector Management with pki ca-kraconnector 2.4.8. CA Management with pki ca 2.4.9. TPS Management with pki tps 3. TokenInfo (Managing External Hardware Tokens) Expand section "3. TokenInfo (Managing External Hardware Tokens)" Collapse section "3. TokenInfo (Managing External Hardware Tokens)" 3.1. Syntax 4. sslget (Downloading Files over HTTPS) Expand section "4. sslget (Downloading Files over HTTPS)" Collapse section "4. sslget (Downloading Files over HTTPS)" 4.1. Syntax 4.2. Usage 5. AuditVerify (Audit Log Verification) Expand section "5. AuditVerify (Audit Log Verification)" Collapse section "5. AuditVerify (Audit Log Verification)" 5.1. Setting up the Auditor's Database 5.2. Syntax 5.3. Return Values 5.4. Usage 5.5. Results 6. setpin (Generating Unique PINs for Entities) Expand section "6. setpin (Generating Unique PINs for Entities)" Collapse section "6. setpin (Generating Unique PINs for Entities)" 6.1. The setpin Command Expand section "6.1. The setpin Command" Collapse section "6.1. The setpin Command" 6.1.1. Editing the setpin.conf Configuration File 6.1.2. Syntax 6.1.3. Usage 6.2. How setpin Works Expand section "6.2. How setpin Works" Collapse section "6.2. How setpin Works" 6.2.1. Input File 6.2.2. Output File 6.2.3. How PINs Are Stored in the Directory 6.2.4. Exit Codes 7. AtoB (Converting ASCII to Binary) Expand section "7. AtoB (Converting ASCII to Binary)" Collapse section "7. AtoB (Converting ASCII to Binary)" 7.1. Syntax 7.2. Usage 8. BtoA (COnverting Binary to ASCII) Expand section "8. BtoA (COnverting Binary to ASCII)" Collapse section "8. BtoA (COnverting Binary to ASCII)" 8.1. Syntax 8.2. Usage 9. PrettyPrintCert (Printing Certificates) Expand section "9. PrettyPrintCert (Printing Certificates)" Collapse section "9. PrettyPrintCert (Printing Certificates)" 9.1. Syntax 9.2. Usage 10. PrettyPrintCrl (Printing Readable CRLs)) Expand section "10. PrettyPrintCrl (Printing Readable CRLs))" Collapse section "10. PrettyPrintCrl (Printing Readable CRLs))" 10.1. Syntax 10.2. Usage 11. tkstool (Managing Token Keys) Expand section "11. tkstool (Managing Token Keys)" Collapse section "11. tkstool (Managing Token Keys)" 11.1. Syntax 11.2. Usage 12. CMCRequest (Creating CMC Requests) Expand section "12. CMCRequest (Creating CMC Requests)" Collapse section "12. CMCRequest (Creating CMC Requests)" 12.1. Syntax 12.2. Usage 12.3. Output 13. CMCEnroll (Performing CMC Enrollments) Expand section "13. CMCEnroll (Performing CMC Enrollments)" Collapse section "13. CMCEnroll (Performing CMC Enrollments)" 13.1. Syntax 13.2. Usage 13.3. Output 14. CMCResponse (Parsing a CMC Response) Expand section "14. CMCResponse (Parsing a CMC Response)" Collapse section "14. CMCResponse (Parsing a CMC Response)" 14.1. Syntax 14.2. Usage and Output 15. CMCRevoke (Signing a Revocation Request) Expand section "15. CMCRevoke (Signing a Revocation Request)" Collapse section "15. CMCRevoke (Signing a Revocation Request)" 15.1. Syntax 15.2. Testing CMC Revocation 15.3. Output 16. CRMFPopClient (Sending an Encoded CRMF Request) Expand section "16. CRMFPopClient (Sending an Encoded CRMF Request)" Collapse section "16. CRMFPopClient (Sending an Encoded CRMF Request)" 16.1. Syntax 16.2. Usage 16.3. Output 17. ExtJoiner (Adding Cerificate Extensions to Requests) Expand section "17. ExtJoiner (Adding Cerificate Extensions to Requests)" Collapse section "17. ExtJoiner (Adding Cerificate Extensions to Requests)" 17.1. Syntax 17.2. Usage 18. GenExtKeyUsage (Adding the Key Usage Extension to a Request) Expand section "18. GenExtKeyUsage (Adding the Key Usage Extension to a Request)" Collapse section "18. GenExtKeyUsage (Adding the Key Usage Extension to a Request)" 18.1. Syntax 19. GenIssuerAltNameExt (Adding the Issuer Name Extention to a Request) Expand section "19. GenIssuerAltNameExt (Adding the Issuer Name Extention to a Request)" Collapse section "19. GenIssuerAltNameExt (Adding the Issuer Name Extention to a Request)" 19.1. Syntax 19.2. Usage 20. SubjectAltNameExt (Adding the Subject Alternative Name Extension to a Request) Expand section "20. SubjectAltNameExt (Adding the Subject Alternative Name Extension to a Request)" Collapse section "20. SubjectAltNameExt (Adding the Subject Alternative Name Extension to a Request)" 20.1. Syntax 20.2. Usage 21. HttpClient (Sends a Request over HTTP) Expand section "21. HttpClient (Sends a Request over HTTP)" Collapse section "21. HttpClient (Sends a Request over HTTP)" 21.1. Syntax 22. OCSPClient (Sending an OCSP Request) Expand section "22. OCSPClient (Sending an OCSP Request)" Collapse section "22. OCSPClient (Sending an OCSP Request)" 22.1. Syntax 23. PKCS10Client (Generating a PKCS #10 Certificate Request) Expand section "23. PKCS10Client (Generating a PKCS #10 Certificate Request)" Collapse section "23. PKCS10Client (Generating a PKCS #10 Certificate Request)" 23.1. Syntax 24. PKCS12Export (Exports Certificates and Keys from a Database) Expand section "24. PKCS12Export (Exports Certificates and Keys from a Database)" Collapse section "24. PKCS12Export (Exports Certificates and Keys from a Database)" 24.1. Syntax 24.2. Usage and Output 25. revoker (Sending Revocation Requests) Expand section "25. revoker (Sending Revocation Requests)" Collapse section "25. revoker (Sending Revocation Requests)" 25.1. Syntax 25.2. Output 26. tpsclient (Debugging the TPS) Expand section "26. tpsclient (Debugging the TPS)" Collapse section "26. tpsclient (Debugging the TPS)" 26.1. Syntax 27. KRATool (Rewrapping Private Keys) Expand section "27. KRATool (Rewrapping Private Keys)" Collapse section "27. KRATool (Rewrapping Private Keys)" 27.1. Syntax 27.2. .cfg File 27.3. Examples 27.4. Usage Index A. Revision History Legal Notice Settings Close Language: 日本語 简体中文 English Language: 日本語 简体中文 English Format: Multi-page Single-page PDF Format: Multi-page Single-page PDF Language and Page Formatting Options Language: 日本語 简体中文 English Language: 日本語 简体中文 English Format: Multi-page Single-page PDF Format: Multi-page Single-page PDF Chapter 8. BtoA (COnverting Binary to ASCII) The Certificate System binary to ASCII tool, BtoA converts binary base-64 encoded data to ASCII base-64 encoded data. 8.1. Syntax The BtoA tool uses the following syntax: BtoA input_file output_file Option Description input_file Specifies the path and file of the base-64 encoded binary data. output_file Specifies the path and file to which the tool should write the ASCII output. Previous Next