Product
Introducing License Enforcement in Socket
Ensure open-source compliance with Socket’s License Enforcement Beta. Set up your License Policy and secure your software!
Easy-to-use command-line tool for certificate management.
cryptography
_ module (version >= 3.1).gpg
_ command-line tool to decrypt files... _cryptography: https://cryptography.io/ .. _gpg: https://www.gnupg.org/
Generate new key::
sysca new-key [--password-file TXT_FILE] [--out DST]
sysca new-key ec[:<curve>] [--password-file TXT_FILE] [--out DST]
sysca new-key rsa[:<bits>] [--password-file TXT_FILE] [--out DST]
sysca new-key dsa[:<bits>] [--password-file TXT_FILE] [--out DST]
Create certificate signing request::
sysca request [-h] --key KEY_FILE [--password-file PSW_FILE]
[--out OUT_FILE] [--outform FMT] [--text] [--rsa-pss]
[--subject DN] [--san GNAMES] [--usage USAGE] [--CA] [--path-length DEPTH]
[--crl-urls URLS] [--issuer-urls URLS] [--ocsp-urls URLS]
[--ocsp-must-staple] [--ocsp-must-staple-v2] [--ocsp-nocheck]
[--permit-subtrees GNAMES] [--exclude-subtrees GNAMES]
[--require-explicit-policy N] [--inhibit-policy-mapping N]
[--inhibit-any N] [--add-policy POLICY]
Create selfsigned certificate::
sysca selfsign [-h] [--out OUT_FILE] [--outform FMT] [--text]
--key KEY_FILE [--password-file PSW_FILE]
[--not-valid-before DATE] [--not-valid-after DATE] [--days DAYS]
[--serial-number SN] [--rsa-pss]
[--subject DN] [--san GNAMES] [--usage USAGE] [--CA] [--path-length DEPTH]
[--crl-urls URLS] [--issuer-urls URLS] [--ocsp-urls URLS]
[--ocsp-must-staple] [--ocsp-must-staple-v2] [--ocsp-nocheck]
[--permit-subtrees GNAMES] [--exclude-subtrees GNAMES]
[--require-explicit-policy N] [--inhibit-policy-mapping N]
[--inhibit-any N] [--add-policy POLICY]
Sign certificate signing request::
sysca sign [-h] [--out OUT_FILE] [--outform FMT] [--text] --request CSR_FILE
--ca-info CRT_FILE --ca-key KEY_FILE [--password-file PSW_FILE]
[--not-valid-before DATE] [--not-valid-after DATE] [--days DAYS]
[--serial-number SN] [--reset] [--rsa-pss]
[--subject DN] [--san GNAMES] [--usage USAGE] [--CA] [--path-length DEPTH]
[--crl-urls URLS] [--issuer-urls URLS] [--ocsp-urls URLS]
[--ocsp-must-staple] [--ocsp-must-staple-v2] [--ocsp-nocheck]
[--permit-subtrees GNAMES] [--exclude-subtrees GNAMES]
[--require-explicit-policy N] [--inhibit-policy-mapping N]
[--inhibit-any N] [--add-policy POLICY]
Create or update CRL file::
sysca update-crl [-h] [--out OUT_FILE] [--outform FMT] [--text]
--ca-info CRT_FILE --ca-key KEY_FILE [--password-file PSW_FILE]
[--crl CRL_FILE] [--crl-number VER] [--delta-crl-number VER]
[--crl-scope SCOPE] [--crl-reasons REASONS] [--indirect-crl]
[--issuer-urls URLS] [--delta-crl-urls URLS]
[--last-update DATE] [--next-update DATE] [--days DAYS]
[--revoke-certs FN [FN ...]]
[--revoke-serials NUM [NUM ...]]
[--reason REASON] [--invalidity-date DATE] [--revocation-date DATE]
Display contents of CRT, CSR or CRL file::
sysca show FILE
FAQs
Certificate tool for Sysadmins
We found that sysca demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Product
Ensure open-source compliance with Socket’s License Enforcement Beta. Set up your License Policy and secure your software!
Product
We're launching a new set of license analysis and compliance features for analyzing, managing, and complying with licenses across a range of supported languages and ecosystems.
Product
We're excited to introduce Socket Optimize, a powerful CLI command to secure open source dependencies with tested, optimized package overrides.