jpcwtool https output certtext
- Organization of this page
Format
jpcwtool https output certtext [-input server-certificate-file]
Function
The command jpcwtool https output certtext outputs the server certificate information obtained from a certificate authority. You can use this command to check a certificate's validity period and the information that was set in it.
Hosts that can execute the command
PFM - Web Console
Execution permission
- In Windows:
-
User with Administrators permissions
- In UNIX:
-
User with root user permissions
Installation directory
- In Windows:
-
installation-folder\tools\
- In UNIX:
-
/opt/jp1pcwebcon/tools/
Arguments
-input server-certificate-file
Specify the server certificate whose information you want to verify in server-certificate-file. The maximum length is 255 bytes. Specify the file path in the same manner as for the command jpcwtool https create certreq. For details, see Specifying files and directories.
If this option is omitted, the server certificate file stored in the folder for storing encrypted communication files (jpcwhttpscert.pem) is assumed.
Server certificate information that is output
The command displays the value of each field in an X.509-format certificate.
The certificate's validity period and the information that was set can be verified by checking the following fields:
-
Validity: The validity period of the server certificate (GMT)
-
Subject: The user information that was set in the server certificate
Notes
-
This command cannot be executed concurrently with the command jpcwtool https on the same host.
Return values
0 |
The command terminated normally. |
1 |
An argument specification is invalid. |
2 |
The user does not have execution permission for the command. |
3 |
A file or directory cannot be accessed. |
4 |
Creation of the server certificate file failed. |
100 |
The PFM - Web Console environment is invalid. |
200 |
A memory shortage occurred. |
255 |
An unexpected error occurred. |
Usage example
This example outputs information from the file httpsd.pem, which is stored in the folder for storing encrypted communication files:
> ./jpcwtool https output certtext -input /opt/jp1pcwebcon/CPSB/httpsd/conf/ssl/server/httpsd.pem Certificate: Data: Version: 3 (0x2) Serial Number: 11:de:75:88:00:01:00:00:00:18 Signature Algorithm: sha256WithRSAEncryption Issuer: CN=EXAMPLE-CA Validity Not Before: Feb 9 08:30:48 2017 GMT Not After : Feb 9 08:40:48 2018 GMT Subject: C=JP, ST=Kanagawa, L=Yokohama-shi, O=HITACHI, OU=WebSite, CN=pfm.hitachi.co.jp Subject Public Key Info: Public Key Algorithm: rsaEncryption Public-Key: (2048 bit) Modulus: 00:f8:15:1f:72:1a:56:6d:e2:8a:72:5c:5c:f4:e7: 08:99:f2:28:c6:36:82:0b:2e:67:de:75:17:35:6c: 67:58:dd:25:96:f5:f6:64:06:f7:47:9c:3a:35:74: b3:2b:05:c6:ad:71:b7:28:85:3c:44:94:78:e7:52: 35:72:2f:5e:e9:97:7a:fe:47:9b:52:96:fe:e1:ab: 79:8c:8d:47:f1:71:71:81:72:68:6e:37:21:dd:4b: f1:81:5c:32:e1:da:d9:c8:6e:79:87:e0:b7:b5:09: 1d:66:4f:4a:c1:6b:32:92:91:e5:13:77:54:bd:2a: 42:e7:bb:d3:f5:e5:f7:0d:23:36:6e:cc:de:1f:d4: 8f:46:b1:5d:ff:97:f3:2c:12:cf:66:a6:39:1b:f7: a1:8f:3a:cb:8f:11:56:52:02:48:42:d6:2e:04:03: e8:47:b4:14:5b:db:0d:8a:ed:7a:98:f5:27:57:42: 3f:74:0a:f1:b6:01:1e:b9:5a:71:31:ea:e1:32:cf: bb:8b:c5:87:25:3a:70:f8:ad:12:f9:d0:f3:7b:90: 92:7b:bf:a6:86:63:e2:d8:0e:cb:6b:45:6c:4c:de: 65:9e:b5:c7:de:13:2c:56:6a:77:70:1e:45:e6:b7: fe:8b:b1:6a:a2:a1:57:4c:aa:01:d6:06:61:4b:1e: f6:01 Exponent: 65537 (0x10001) X509v3 extensions: X509v3 Subject Key Identifier: F0:44:10:4D:72:E0:54:2A:68:D4:DB:FC:F5:F7:1C:32:94:BE:EE:9C X509v3 Authority Key Identifier: keyid:60:25:76:91:6E:88:2D:23:47:2E:4B:DB:4B:45:D9:86:ED:E0:D7:85 X509v3 CRL Distribution Points: Full Name: URI:https://example.com/xxxx/yyyy.crl Authority Information Access: CA Issuers - URI:https://example.com/xxxx/yyyy.crt X509v3 Basic Constraints: critical CA:FALSE Signature Algorithm: sha256WithRSAEncryption 53:af:fe:55:16:d6:0d:7f:06:ec:f7:b5:a6:a6:a9:39:8a:6d: 7d:bd:27:62:1f:97:44:1f:13:9a:52:85:71:5c:ba:76:2d:51: 6e:f3:11:89:a2:dd:f0:2e:b2:9e:35:1e:2b:93:cf:4b:c3:0e: 37:90:2f:00:7c:a3:9a:1f:4b:d4:3d:a1:30:f6:dc:09:b3:48: 7e:f2:ca:68:92:40:e8:bb:61:4d:61:34:6b:ce:71:81:94:92: 6a:58:9d:d9:29:4a:57:ce:af:d2:59:f4:10:67:ef:8e:bf:be: 59:e3:ea:e5:3d:c0:1e:b4:b2:1f:d4:f6:81:7d:b4:ba:4c:65: f5:46:e5:78:e6:e1:1a:21:50:91:b4:45:b2:ef:7e:79:e2:3d: c9:ed:0c:55:a9:c5:a6:ed:73:ce:7b:7d:a3:30:4c:60:a9:bb: 0d:89:28:2c:17:02:cd:08:2f:c0:88:ed:dc:3d:1b:35:88:83: ac:61:4d:a6:18:04:f9:66:35:a9:3d:36:20:28:5a:76:b8:3e: 04:73:f4:9f:c8:43:7f:20:4d:24:13:58:bd:40:84:83:09:2a: 47:49:8b:0d:43:15:fb:ea:ac:c0:e7:33:fe:71:40:28:4f:12: 16:d1:49:12:8e:a1:d4:ce:d8:eb:ca:e6:74:55:23:4c:6d:81: ca:bf:29:9f -----BEGIN CERTIFICATE----- MIID8TCCAtmgAwIBAgIKEd51iAABAAAAGDANBgkqhkiG9w0BAQsFADAVMRMwEQYD VQQDEwpIWVZNMTIyLUNBMB4XDTE3MDIwOTA4MzA0OFoXDTE4MDIwOTA4NDA0OFow dzELMAkGA1UEBhMCSlAxETAPBgNVBAgTCEthbmFnYXdhMRUwEwYDVQQHEwxZb2tv aGFtYS1zaGkxEDAOBgNVBAoTB0hJVEFDSEkxEDAOBgNVBAsTB1dlYlNpdGUxGjAY BgNVBAMTEXBmbS5oaXRhY2hpLmNvLmpwMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8A MIIBCgKCAQEA+BUfchpWbeKKclxc9OcImfIoxjaCCy5n3nUXNWxnWN0llvX2ZAb3 R5w6NXSzKwXGrXG3KIU8RJR451I1ci9e6Zd6/kebUpb+4at5jI1H8XFxgXJobjch 3UvxgVwy4drZyG55h+C3tQkdZk9KwWsykpHlE3dUvSpC57vT9eX3DSM2bszeH9SP RrFd/5fzLBLPZqY5G/ehjzrLjxFWUgJIQtYuBAPoR7QUW9sNiu16mPUnV0I/dArx tgEeuVpxMerhMs+7i8WHJTpw+K0S+dDze5CSe7+mhmPi2A7La0VsTN5lnrXH3hMs Vmp3cB5F5rf+i7FqoqFXTKoB1gZhSx72AQIDAQABo4HgMIHdMB0GA1UdDgQWBBTw RBBNcuBUKmjU2/z19xwylL7unDAfBgNVHSMEGDAWgBRgJXaRbogtI0cuS9tLRdmG 7eDXhTA8BgNVHR8ENTAzMDGgL6AthitmaWxlOi8vaHl2bTEyMi9DZXJ0RW5yb2xs L0hZVk0xMjItQ0EoMSkuY3JsME8GCCsGAQUFBwEBBEMwQTA/BggrBgEFBQcwAoYz ZmlsZTovL2h5dm0xMjIvQ2VydEVucm9sbC9oeXZtMTIyX0hZVk0xMjItQ0EoMSku Y3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggEBAFOv/lUW1g1/Buz3 taamqTmKbX29J2Ifl0QfE5pShXFcunYtUW7zEYmi3fAusp41HiuTz0vDDjeQLwB8 o5ofS9Q9oTD23AmzSH7yymiSQOi7YU1hNGvOcYGUkmpYndkpSlfOr9JZ9BBn746/ vlnj6uU9wB60sh/U9oF9tLpMZfVG5Xjm4RohUJG0RbLvfnniPcntDFWpxabtc857 faMwTGCpuw2JKCwXAs0IL8CI7dw9GzWIg6xhTaYYBPlmNak9NiAoWna4PgRz9J/I Q38gTSQTWL1AhIMJKkdJiw1DFfvqrMDnM/5xQChPEhbRSRKOodTO2OvK5nRVI0xt gcq/KZ8= -----END CERTIFICATE----- KAVJT6554-I Output of the server certificate contents ended normally.