The certificate request utility is used to generate a key pair, generate a certificate request which can then be signed by a Certificate Authority, and also generate a self-signed certificate.
You must be privileged to use this utility. To run the utility, issue the OpenVMS command:
$ RUN PMDF_EXE:tls_certreqor the UNIX command
# tls_certreqor the NT command
C:\> tls_certreq
The utility prompts for several pieces of information including:
The three files produced as output by the tls_certreq
utility consist primarily of BASE64 encoded data, and are not
especially intelligible without decoding. (However, see the
tls_certdump
utility which can display the data in such
files.) For convenience in managing such files, the files are labelled
with an initial text line describing the contents.
The private key file, the file which must be protected against world
access as it contains your secret private key, (default name
server-priv.pem
), begins with the line:
-----BEGIN RSA PRIVATE KEY-----
The certificate request file containing your public key, the file to be
sent to a Certificate Authority for signing, (default name
server-certreq.pem
), begins with the line:
-----BEGIN CERTIFICATE REQUEST-----
The self-signed certificate file, the file you may use while awaiting
signing of your certificate request by a Certificate Authority,
(default name server-selfsign.pem
, which must be renamed
to server-pub.pem
if you wish to use it while awaiting
your signed certificate), begins with the line:
-----BEGIN CERTIFICATE-----
internet.rules
file in the PMDF table
directory.