VirtualBox

source: vbox/trunk/src/libs/openssl-1.1.1h/doc/man1/pkcs12.pod@ 86747

Last change on this file since 86747 was 86560, checked in by vboxsync, 4 years ago

openssl-1.1.1h: Applied our OpenSSL changes to 1.1.1h. Didn't check te build. bugref:9847

File size: 11.8 KB
Line 
1=pod
2
3=head1 NAME
4
5openssl-pkcs12,
6pkcs12 - PKCS#12 file utility
7
8=head1 SYNOPSIS
9
10B<openssl> B<pkcs12>
11[B<-help>]
12[B<-export>]
13[B<-chain>]
14[B<-inkey file_or_id>]
15[B<-certfile filename>]
16[B<-name name>]
17[B<-caname name>]
18[B<-in filename>]
19[B<-out filename>]
20[B<-noout>]
21[B<-nomacver>]
22[B<-nocerts>]
23[B<-clcerts>]
24[B<-cacerts>]
25[B<-nokeys>]
26[B<-info>]
27[B<-des | -des3 | -idea | -aes128 | -aes192 | -aes256 | -aria128 | -aria192 | -aria256 | -camellia128 | -camellia192 | -camellia256 | -nodes>]
28[B<-noiter>]
29[B<-maciter | -nomaciter | -nomac>]
30[B<-twopass>]
31[B<-descert>]
32[B<-certpbe cipher>]
33[B<-keypbe cipher>]
34[B<-macalg digest>]
35[B<-keyex>]
36[B<-keysig>]
37[B<-password arg>]
38[B<-passin arg>]
39[B<-passout arg>]
40[B<-rand file...>]
41[B<-writerand file>]
42[B<-CAfile file>]
43[B<-CApath dir>]
44[B<-no-CAfile>]
45[B<-no-CApath>]
46[B<-CSP name>]
47
48=head1 DESCRIPTION
49
50The B<pkcs12> command allows PKCS#12 files (sometimes referred to as
51PFX files) to be created and parsed. PKCS#12 files are used by several
52programs including Netscape, MSIE and MS Outlook.
53
54=head1 OPTIONS
55
56There are a lot of options the meaning of some depends of whether a PKCS#12 file
57is being created or parsed. By default a PKCS#12 file is parsed. A PKCS#12
58file can be created by using the B<-export> option (see below).
59
60=head1 PARSING OPTIONS
61
62=over 4
63
64=item B<-help>
65
66Print out a usage message.
67
68=item B<-in filename>
69
70This specifies filename of the PKCS#12 file to be parsed. Standard input is used
71by default.
72
73=item B<-out filename>
74
75The filename to write certificates and private keys to, standard output by
76default. They are all written in PEM format.
77
78=item B<-passin arg>
79
80The PKCS#12 file (i.e. input file) password source. For more information about
81the format of B<arg> see the B<PASS PHRASE ARGUMENTS> section in
82L<openssl(1)>.
83
84=item B<-passout arg>
85
86Pass phrase source to encrypt any outputted private keys with. For more
87information about the format of B<arg> see the B<PASS PHRASE ARGUMENTS> section
88in L<openssl(1)>.
89
90=item B<-password arg>
91
92With -export, -password is equivalent to -passout.
93Otherwise, -password is equivalent to -passin.
94
95=item B<-noout>
96
97This option inhibits output of the keys and certificates to the output file
98version of the PKCS#12 file.
99
100=item B<-clcerts>
101
102Only output client certificates (not CA certificates).
103
104=item B<-cacerts>
105
106Only output CA certificates (not client certificates).
107
108=item B<-nocerts>
109
110No certificates at all will be output.
111
112=item B<-nokeys>
113
114No private keys will be output.
115
116=item B<-info>
117
118Output additional information about the PKCS#12 file structure, algorithms
119used and iteration counts.
120
121=item B<-des>
122
123Use DES to encrypt private keys before outputting.
124
125=item B<-des3>
126
127Use triple DES to encrypt private keys before outputting, this is the default.
128
129=item B<-idea>
130
131Use IDEA to encrypt private keys before outputting.
132
133=item B<-aes128>, B<-aes192>, B<-aes256>
134
135Use AES to encrypt private keys before outputting.
136
137=item B<-aria128>, B<-aria192>, B<-aria256>
138
139Use ARIA to encrypt private keys before outputting.
140
141=item B<-camellia128>, B<-camellia192>, B<-camellia256>
142
143Use Camellia to encrypt private keys before outputting.
144
145=item B<-nodes>
146
147Don't encrypt the private keys at all.
148
149=item B<-nomacver>
150
151Don't attempt to verify the integrity MAC before reading the file.
152
153=item B<-twopass>
154
155Prompt for separate integrity and encryption passwords: most software
156always assumes these are the same so this option will render such
157PKCS#12 files unreadable. Cannot be used in combination with the options
158-password, -passin (if importing) or -passout (if exporting).
159
160=back
161
162=head1 FILE CREATION OPTIONS
163
164=over 4
165
166=item B<-export>
167
168This option specifies that a PKCS#12 file will be created rather than
169parsed.
170
171=item B<-out filename>
172
173This specifies filename to write the PKCS#12 file to. Standard output is used
174by default.
175
176=item B<-in filename>
177
178The filename to read certificates and private keys from, standard input by
179default. They must all be in PEM format. The order doesn't matter but one
180private key and its corresponding certificate should be present. If additional
181certificates are present they will also be included in the PKCS#12 file.
182
183=item B<-inkey file_or_id>
184
185File to read private key from. If not present then a private key must be present
186in the input file.
187If no engine is used, the argument is taken as a file; if an engine is
188specified, the argument is given to the engine as a key identifier.
189
190=item B<-name friendlyname>
191
192This specifies the "friendly name" for the certificate and private key. This
193name is typically displayed in list boxes by software importing the file.
194
195=item B<-certfile filename>
196
197A filename to read additional certificates from.
198
199=item B<-caname friendlyname>
200
201This specifies the "friendly name" for other certificates. This option may be
202used multiple times to specify names for all certificates in the order they
203appear. Netscape ignores friendly names on other certificates whereas MSIE
204displays them.
205
206=item B<-pass arg>, B<-passout arg>
207
208The PKCS#12 file (i.e. output file) password source. For more information about
209the format of B<arg> see the B<PASS PHRASE ARGUMENTS> section in
210L<openssl(1)>.
211
212=item B<-passin password>
213
214Pass phrase source to decrypt any input private keys with. For more information
215about the format of B<arg> see the B<PASS PHRASE ARGUMENTS> section in
216L<openssl(1)>.
217
218=item B<-chain>
219
220If this option is present then an attempt is made to include the entire
221certificate chain of the user certificate. The standard CA store is used
222for this search. If the search fails it is considered a fatal error.
223
224=item B<-descert>
225
226Encrypt the certificate using triple DES, this may render the PKCS#12
227file unreadable by some "export grade" software. By default the private
228key is encrypted using triple DES and the certificate using 40 bit RC2
229unless RC2 is disabled in which case triple DES is used.
230
231=item B<-keypbe alg>, B<-certpbe alg>
232
233These options allow the algorithm used to encrypt the private key and
234certificates to be selected. Any PKCS#5 v1.5 or PKCS#12 PBE algorithm name
235can be used (see B<NOTES> section for more information). If a cipher name
236(as output by the B<list-cipher-algorithms> command is specified then it
237is used with PKCS#5 v2.0. For interoperability reasons it is advisable to only
238use PKCS#12 algorithms.
239
240=item B<-keyex|-keysig>
241
242Specifies that the private key is to be used for key exchange or just signing.
243This option is only interpreted by MSIE and similar MS software. Normally
244"export grade" software will only allow 512 bit RSA keys to be used for
245encryption purposes but arbitrary length keys for signing. The B<-keysig>
246option marks the key for signing only. Signing only keys can be used for
247S/MIME signing, authenticode (ActiveX control signing) and SSL client
248authentication, however, due to a bug only MSIE 5.0 and later support
249the use of signing only keys for SSL client authentication.
250
251=item B<-macalg digest>
252
253Specify the MAC digest algorithm. If not included them SHA1 will be used.
254
255=item B<-nomaciter>, B<-noiter>
256
257These options affect the iteration counts on the MAC and key algorithms.
258Unless you wish to produce files compatible with MSIE 4.0 you should leave
259these options alone.
260
261To discourage attacks by using large dictionaries of common passwords the
262algorithm that derives keys from passwords can have an iteration count applied
263to it: this causes a certain part of the algorithm to be repeated and slows it
264down. The MAC is used to check the file integrity but since it will normally
265have the same password as the keys and certificates it could also be attacked.
266By default both MAC and encryption iteration counts are set to 2048, using
267these options the MAC and encryption iteration counts can be set to 1, since
268this reduces the file security you should not use these options unless you
269really have to. Most software supports both MAC and key iteration counts.
270MSIE 4.0 doesn't support MAC iteration counts so it needs the B<-nomaciter>
271option.
272
273=item B<-maciter>
274
275This option is included for compatibility with previous versions, it used
276to be needed to use MAC iterations counts but they are now used by default.
277
278=item B<-nomac>
279
280Don't attempt to provide the MAC integrity.
281
282=item B<-rand file...>
283
284A file or files containing random data used to seed the random number
285generator.
286Multiple files can be specified separated by an OS-dependent character.
287The separator is B<;> for MS-Windows, B<,> for OpenVMS, and B<:> for
288all others.
289
290=item [B<-writerand file>]
291
292Writes random data to the specified I<file> upon exit.
293This can be used with a subsequent B<-rand> flag.
294
295=item B<-CAfile file>
296
297CA storage as a file.
298
299=item B<-CApath dir>
300
301CA storage as a directory. This directory must be a standard certificate
302directory: that is a hash of each subject name (using B<x509 -hash>) should be
303linked to each certificate.
304
305=item B<-no-CAfile>
306
307Do not load the trusted CA certificates from the default file location.
308
309=item B<-no-CApath>
310
311Do not load the trusted CA certificates from the default directory location.
312
313=item B<-CSP name>
314
315Write B<name> as a Microsoft CSP name.
316
317=back
318
319=head1 NOTES
320
321Although there are a large number of options most of them are very rarely
322used. For PKCS#12 file parsing only B<-in> and B<-out> need to be used
323for PKCS#12 file creation B<-export> and B<-name> are also used.
324
325If none of the B<-clcerts>, B<-cacerts> or B<-nocerts> options are present
326then all certificates will be output in the order they appear in the input
327PKCS#12 files. There is no guarantee that the first certificate present is
328the one corresponding to the private key. Certain software which requires
329a private key and certificate and assumes the first certificate in the
330file is the one corresponding to the private key: this may not always
331be the case. Using the B<-clcerts> option will solve this problem by only
332outputting the certificate corresponding to the private key. If the CA
333certificates are required then they can be output to a separate file using
334the B<-nokeys -cacerts> options to just output CA certificates.
335
336The B<-keypbe> and B<-certpbe> algorithms allow the precise encryption
337algorithms for private keys and certificates to be specified. Normally
338the defaults are fine but occasionally software can't handle triple DES
339encrypted private keys, then the option B<-keypbe PBE-SHA1-RC2-40> can
340be used to reduce the private key encryption to 40 bit RC2. A complete
341description of all algorithms is contained in the B<pkcs8> manual page.
342
343Prior 1.1 release passwords containing non-ASCII characters were encoded
344in non-compliant manner, which limited interoperability, in first hand
345with Windows. But switching to standard-compliant password encoding
346poses problem accessing old data protected with broken encoding. For
347this reason even legacy encodings is attempted when reading the
348data. If you use PKCS#12 files in production application you are advised
349to convert the data, because implemented heuristic approach is not
350MT-safe, its sole goal is to facilitate the data upgrade with this
351utility.
352
353=head1 EXAMPLES
354
355Parse a PKCS#12 file and output it to a file:
356
357 openssl pkcs12 -in file.p12 -out file.pem
358
359Output only client certificates to a file:
360
361 openssl pkcs12 -in file.p12 -clcerts -out file.pem
362
363Don't encrypt the private key:
364
365 openssl pkcs12 -in file.p12 -out file.pem -nodes
366
367Print some info about a PKCS#12 file:
368
369 openssl pkcs12 -in file.p12 -info -noout
370
371Create a PKCS#12 file:
372
373 openssl pkcs12 -export -in file.pem -out file.p12 -name "My Certificate"
374
375Include some extra certificates:
376
377 openssl pkcs12 -export -in file.pem -out file.p12 -name "My Certificate" \
378 -certfile othercerts.pem
379
380=head1 SEE ALSO
381
382L<pkcs8(1)>
383
384=head1 COPYRIGHT
385
386Copyright 2000-2020 The OpenSSL Project Authors. All Rights Reserved.
387
388Licensed under the OpenSSL license (the "License"). You may not use
389this file except in compliance with the License. You can obtain a copy
390in the file LICENSE in the source distribution or at
391L<https://www.openssl.org/source/license.html>.
392
393=cut
Note: See TracBrowser for help on using the repository browser.

© 2025 Oracle Support Privacy / Do Not Sell My Info Terms of Use Trademark Policy Automated Access Etiquette