Am facing issue in generating PGP keys. Can you please help me to figure this out??
I fired the below command to generate keys. The log say keys successfully created. But when i tried to list it doesnt shows me the keys created.
Does the PGP key needs to be created with root user??Am not using root user.
Any help is much appreciated!!!
Thanks in Advance!!!
---------- Post updated at 05:46 AM ---------- Previous update was at 03:18 AM ----------
Any help is deeply appreciated!!!
/Thanks
Last edited by zaxxon; 05-02-2014 at 07:49 AM..
Reason: code tags adjusted, moved descriptive text outside of the output
how to use the arrow keys in shell scripting. is there any special synatax / command for this.
i just want to use the arrow keys for navigation.
replies appreciated
raguram R (3 Replies)
i have successfully executed a PGP encrytp command with the following:
"echo `pgp --encrypt filename --recipient user-key` > $fromDir/.encrypt"
However, when i attempt to issue a decrypt command with following:
"echo `pgp --decrypt filename --passphrase passphrase`" > $fromDir/.decrypt
... (1 Reply)
I'm hoping someone can help get me moving in the right direction here, so bear with me.
I've got 2 RedHat Linux servers, let's call them A & B.
- A receives "sensitive" files, which are PGP encrypted, and immediately sends them off to B for decryption/processing/deletion
- B needs to make... (1 Reply)
Hi,
i am trying to encrypt a file using pgp with a recepient's public key. The file is encrypted but the output file has owner & group nobody. i am not able to change it either. Please let me know how to do pgp encryption so that i get the output with owner and group as the same user which runs... (4 Replies)
Hi all,
I am facing an issue while creating the ssh keys. i am using fedora 9
Please let me know how to solve this issue
# ssh-keygen -t rsa
Generating public/private rsa key pair.
Enter file in which to save the key (/root/.ssh/id_rsa):
Enter passphrase (empty for no... (5 Replies)
Hi,
I need to export an existing PGP key and import it into GnuPG on a different machine.
This is how I did the export:
pgp -kx myuser _myuser_public
pgp -kx myuser _myuser_private secring.skr
(this is from the pgp installation directory that contains secring.skr).
This produced two... (0 Replies)
Hi,
I need to export an existing PGP key and import it into GnuPG on a different machine.
This is how I did the export:
pgp -kx myuser _myuser_public
pgp -kx myuser _myuser_private secring.skr
(this is from the pgp installation directory that contains secring.skr).
This produced two... (0 Replies)
Hello,
I'm trying to perform these operations without entering any password, as user "fzd":fzd@machine1> scp /tmp/srcFile1 fzd@machine2:/tmp/$destFile
fzd@machine1> scp fzd@machine2:/tmp/$srcFile /tmp/$destFilebut alsofzd@machine1> scp /tmp/srcFile1 machine2:/tmp/$destFile
fzd@machine1> scp... (6 Replies)
Hi Guys,
I am trying to import the public of vendor to my system. I am getting below error while importing public key. can anyone please help me with this??
laranakejt4:/u/raja/.pgp $ pgp --import secure.asc
0x1545A56A52:import key (4007:key failed signature check)
secure.asc:import key... (0 Replies)
Hi Guys,
I am trying to import the public of vendor to my system. I am getting below error while importing public key. can anyone please help me with this??
laranakejt4:/u/raja/.pgp $ pgp --import secure.asc
0x1545A56A52:import key (4007:key failed signature check)
secure.asc:import key... (2 Replies)
Discussion started by: Vinoth Kumar G
2 Replies
LEARN ABOUT SUSE
certtool
certtool(1) General Commands Manual certtool(1)NAME
certtool - Manipulate certificates and keys.
SYNOPSIS
certtool [options]
DESCRIPTION
Generate X.509 certificates, certificate requests, and private keys.
OPTIONS
Program control options
-d, --debug LEVEL
Specify the debug level. Default is 1.
-h, --help
Shows this help text
-v, --version
Shows the program's version
Getting information on X.509 certificates
-i, --certificate-info
Print information on a certificate.
-k, --key-info
Print information on a private key.
-l, --crl-info
Print information on a CRL.
--p12-info
Print information on a PKCS #12 structure.
Getting information on Openpgp certificates
--pgp--certificate-info
Print information on an OpenPGP certificate.
--pgp--key-info
Print information on an OpenPGP private key.
--pgp--ring-info
Print information on a keyring.
Generating/verifying X.509 certificates/keys
-c, --generate-certificate
Generate a signed certificate.
-e, --verify-chain
Verify a PEM encoded certificate chain. The last certificate in the chain must be a self signed one.
--generate-dh-params
Generate PKCS #3 encoded Diffie-Hellman parameters.
--load-ca-certificate FILE
Certificate authority's certificate file to use.
--load-ca-privkey FILE
Certificate authority's private key file to use.
--load-certificate FILE
Certificate file to use.
--load-privkey FILE
Private key file to use.
--load-request FILE
Certificate request file to use.
-p, --generate-privkey
Generate a private key.
-q, --generate-request
Generate a PKCS #10 certificate request.
-s, --generate-self-signed
Generate a self-signed certificate.
-u, --update-certificate
Update a signed certificate.
Controlling output
-8, --pkcs8
Use PKCS #8 format for private keys.
--dsa Generate a DSA key.
--bits BITS
Specify the number of bits for key generation.
--export-ciphers
Use weak encryption algorithms.
--inraw
Use RAW/DER format for input certificates and private keys.
--infile FILE
Input file.
--outraw
Use RAW/DER format for output certificates and private keys.
--outfile FILE
Output file.
--password PASSWORD
Password to use.
--to-p12
Generate a PKCS #12 structure.
--template
Use a template file to read input. See the doc/certtool.cfg in the distribution, for an example.
--fix-key
Some previous versions of certtool generated wrongly the optional parameters in a private key. This may affect programs that used
them. To fix an old private key use --key-info in combination with this parameter.
--v1 When generating a certificate use the X.509 version 1 format. This does not add any extensions (such as indication for a CA) but
some programs do need these.
EXAMPLES
To create a private key, run:
$ certtool --generate-privkey --outfile key.pem
To create a certificate request (needed when the certificate is issued by another party), run:
$ certtool --generate-request --load-privkey key.pem
--outfile request.pem
To generate a certificate using the previous request, use the command:
$ certtool --generate-certificate --load-request request.pem
--outfile cert.pem --load-ca-certificate ca-cert.pem
--load-ca-privkey ca-key.pem
To generate a certificate using the private key only, use the command:
$ certtool --generate-certificate --load-privkey key.pem
--outfile cert.pem --load-ca-certificate ca-cert.pem
--load-ca-privkey ca-key.pem
To view the certificate information, use:
$ certtool --certificate-info --infile cert.pem
To generate a PKCS #12 structure using the previous key and certificate, use the command:
$ certtool --load-certificate cert.pem --load-privkey key.pem
--to-p12 --outder --outfile key.p12
AUTHOR
Nikos Mavroyanopoulos <nmav@gnutls.org> and others; see /usr/share/doc/gnutls-bin/AUTHORS for a complete list.
This manual page was written by Ivo Timmermans <ivo@debian.org>, for the Debian GNU/Linux system (but may be used by others).
May 23rd 2005 certtool(1)