Hitachi

JP1 Version 12 JP1/Performance Management Reference


jpcwtool https output certtext

Organization of this page

Format

jpcwtool https output certtext    [-input server-certificate-file]

Function

The command jpcwtool https output certtext outputs the server certificate information obtained from a certificate authority. You can use this command to check a certificate's validity period and the information that was set in it.

Hosts that can execute the command

PFM - Web Console

Execution permission

In Windows:

User with Administrators permissions

In UNIX:

User with root user permissions

Installation directory

In Windows:

installation-folder\tools\

In UNIX:

/opt/jp1pcwebcon/tools/

Arguments

-input server-certificate-file

Specify the server certificate whose information you want to verify in server-certificate-file. The maximum length is 255 bytes. Specify the file path in the same manner as for the command jpcwtool https create certreq. For details, see Specifying files and directories.

If this option is omitted, the server certificate file stored in the folder for storing encrypted communication files (jpcwhttpscert.pem) is assumed.

Server certificate information that is output

The command displays the value of each field in an X.509-format certificate.

The certificate's validity period and the information that was set can be verified by checking the following fields:

Notes

Return values

0

The command terminated normally.

1

An argument specification is invalid.

2

The user does not have execution permission for the command.

3

A file or directory cannot be accessed.

4

Creation of the server certificate file failed.

100

The PFM - Web Console environment is invalid.

200

A memory shortage occurred.

255

An unexpected error occurred.

Usage example

This example outputs information from the file httpsd.pem, which is stored in the folder for storing encrypted communication files:

> ./jpcwtool https output certtext -input /opt/jp1pcwebcon/CPSB/httpsd/conf/ssl/server/httpsd.pem
Certificate:
    Data:
        Version: 3 (0x2)
        Serial Number:
            11:de:75:88:00:01:00:00:00:18
    Signature Algorithm: sha256WithRSAEncryption
        Issuer: CN=EXAMPLE-CA
        Validity
            Not Before: Feb  9 08:30:48 2017 GMT
            Not After : Feb  9 08:40:48 2018 GMT
        Subject: C=JP, ST=Kanagawa, L=Yokohama-shi, O=HITACHI, OU=WebSite, CN=pfm.hitachi.co.jp
        Subject Public Key Info:
            Public Key Algorithm: rsaEncryption
                Public-Key: (2048 bit)
                Modulus:
                    00:f8:15:1f:72:1a:56:6d:e2:8a:72:5c:5c:f4:e7:
                    08:99:f2:28:c6:36:82:0b:2e:67:de:75:17:35:6c:
                    67:58:dd:25:96:f5:f6:64:06:f7:47:9c:3a:35:74:
                    b3:2b:05:c6:ad:71:b7:28:85:3c:44:94:78:e7:52:
                    35:72:2f:5e:e9:97:7a:fe:47:9b:52:96:fe:e1:ab:
                    79:8c:8d:47:f1:71:71:81:72:68:6e:37:21:dd:4b:
                    f1:81:5c:32:e1:da:d9:c8:6e:79:87:e0:b7:b5:09:
                    1d:66:4f:4a:c1:6b:32:92:91:e5:13:77:54:bd:2a:
                    42:e7:bb:d3:f5:e5:f7:0d:23:36:6e:cc:de:1f:d4:
                    8f:46:b1:5d:ff:97:f3:2c:12:cf:66:a6:39:1b:f7:
                    a1:8f:3a:cb:8f:11:56:52:02:48:42:d6:2e:04:03:
                    e8:47:b4:14:5b:db:0d:8a:ed:7a:98:f5:27:57:42:
                    3f:74:0a:f1:b6:01:1e:b9:5a:71:31:ea:e1:32:cf:
                    bb:8b:c5:87:25:3a:70:f8:ad:12:f9:d0:f3:7b:90:
                    92:7b:bf:a6:86:63:e2:d8:0e:cb:6b:45:6c:4c:de:
                    65:9e:b5:c7:de:13:2c:56:6a:77:70:1e:45:e6:b7:
                    fe:8b:b1:6a:a2:a1:57:4c:aa:01:d6:06:61:4b:1e:
                    f6:01
                Exponent: 65537 (0x10001)
        X509v3 extensions:
            X509v3 Subject Key Identifier:
                F0:44:10:4D:72:E0:54:2A:68:D4:DB:FC:F5:F7:1C:32:94:BE:EE:9C
            X509v3 Authority Key Identifier:
                keyid:60:25:76:91:6E:88:2D:23:47:2E:4B:DB:4B:45:D9:86:ED:E0:D7:85
 
            X509v3 CRL Distribution Points:
 
                Full Name:
                  URI:https://example.com/xxxx/yyyy.crl
 
            Authority Information Access:
                CA Issuers - URI:https://example.com/xxxx/yyyy.crt
 
            X509v3 Basic Constraints: critical
                CA:FALSE
    Signature Algorithm: sha256WithRSAEncryption
         53:af:fe:55:16:d6:0d:7f:06:ec:f7:b5:a6:a6:a9:39:8a:6d:
         7d:bd:27:62:1f:97:44:1f:13:9a:52:85:71:5c:ba:76:2d:51:
         6e:f3:11:89:a2:dd:f0:2e:b2:9e:35:1e:2b:93:cf:4b:c3:0e:
         37:90:2f:00:7c:a3:9a:1f:4b:d4:3d:a1:30:f6:dc:09:b3:48:
         7e:f2:ca:68:92:40:e8:bb:61:4d:61:34:6b:ce:71:81:94:92:
         6a:58:9d:d9:29:4a:57:ce:af:d2:59:f4:10:67:ef:8e:bf:be:
         59:e3:ea:e5:3d:c0:1e:b4:b2:1f:d4:f6:81:7d:b4:ba:4c:65:
         f5:46:e5:78:e6:e1:1a:21:50:91:b4:45:b2:ef:7e:79:e2:3d:
         c9:ed:0c:55:a9:c5:a6:ed:73:ce:7b:7d:a3:30:4c:60:a9:bb:
         0d:89:28:2c:17:02:cd:08:2f:c0:88:ed:dc:3d:1b:35:88:83:
         ac:61:4d:a6:18:04:f9:66:35:a9:3d:36:20:28:5a:76:b8:3e:
         04:73:f4:9f:c8:43:7f:20:4d:24:13:58:bd:40:84:83:09:2a:
         47:49:8b:0d:43:15:fb:ea:ac:c0:e7:33:fe:71:40:28:4f:12:
         16:d1:49:12:8e:a1:d4:ce:d8:eb:ca:e6:74:55:23:4c:6d:81:
         ca:bf:29:9f
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
KAVJT6554-I Output of the server certificate contents ended normally.