Linux and UNIX Man Pages

Linux & Unix Commands - Search Man Pages

cryptoflex-tool(1) [centos man page]

CRYPTOFLEX-TOOL(1)						   OpenSC Tools 						CRYPTOFLEX-TOOL(1)

NAME
cryptoflex-tool - utility for manipulating Schlumberger Cryptoflex data structures SYNOPSIS
cryptoflex-tool [OPTIONS] DESCRIPTION
cryptoflex-tool is used to manipulate PKCS data structures on Schlumberger Cryptoflex smart cards. Users can create, list and read PINs and keys stored on the smart card. User PIN authentication is performed for those operations that require it. OPTIONS
--app-df num, -a num Specifies the DF to operate in --create-key-files arg, -c arg Creates new RSA key files for arg keys --create-pin-files id, -P id Creates new PIN file for CHVid --exponent exp, -e exp Specifies the RSA exponent, exp, to use in key generation. The default value is 3. --generate-key, -g Generate a new RSA key pair --key-num num, -k num Specifies the key number to operate on. The default is key number 1. --list-keys, -l Lists all keys stored in a public key file --modulus-length length, -m length Specifies the modulus length to use in key generation. The default value is 1024. --prkey-file id, -p id Specifies the private key file id, id, to use --pubkey-file id, -u id Specifies the public key file id, id, to use --read-key Reads a public key from the card, allowing the user to extract and store or use the public key --reader num, -r num Forces cryptoflex-tool to use reader number num for operations. The default is to use reader number 0, the first reader in the system. --verbose, -v Causes cryptoflex-tool to be more verbose. Specify this flag several times to enable debug output in the opensc library. --verify-pin, -V Verifies CHV1 before issuing commands SEE ALSO
pkcs15-tool(1) opensc 06/17/2014 CRYPTOFLEX-TOOL(1)

Check Out this Related Man Page

PKCS15-TOOL(1)							   OpenSC tools 						    PKCS15-TOOL(1)

NAME
pkcs15-tool - utility for manipulating PKCS #15 data structures on smart cards and similar security tokens SYNOPSIS
pkcs15-tool [OPTIONS] DESCRIPTION
The pkcs15-tool utility is used to manipulate the PKCS #15 data structures on smart cards and similar security tokens. Users can list and read PINs, keys and certificates stored on the token. User PIN authentication is performed for those operations that require it. OPTIONS
--learn-card, -L Cache PKCS #15 token data to the local filesystem. Subsequent operations are performed on the cached data where possible. If the cache becomes out-of-sync with the token state (eg. new key is generated and stored on the token), the cache should be updated or operations may show stale results. --list-applications List the on-card PKCS#15 applications --read-certificate cert, -r cert Reads the certificate with the given id. --list-certificates, -c Lists all certificates stored on the token. --read-data-object cert, -R data Reads data object with OID, applicationName or label. --verify-pin Verify PIN after card binding and before issuing any command (without 'auth-id' the first non-SO, non-Unblock PIN will be verified) --list-data-objects, -C Lists all data objects stored on the token. For some cards the PKCS#15 attributes of the private data objects are protected for reading and need the authentication with the User PIN. In such a case the --verify-pin option has to be used. --list-pins Lists all PINs stored on the token. General information about each PIN is listed (eg. PIN name). Actual PIN values are not shown. --dump, -D Dump card objects. --change-pin Changes a PIN or PUK stored on the token. User authentication is required for this operation. --unblock-pin, -u Unblocks a PIN stored on the token. Knowledge of the Pin Unblock Key (PUK) is required for this operation. --list-keys, -k Lists all private keys stored on the token. General information about each private key is listed (eg. key name, id and algorithm). Actual private key values are not displayed. For some cards the PKCS#15 attributes of the private keys are protected for reading and need the authentication with the User PIN. In such a case the --verify-pin option has to be used. --list-public-keys Lists all public keys stored on the token, including key name, id, algorithm and length information. --read-public-key id Reads the public key with id id, allowing the user to extract and store or use the public key. --read-ssh-key id Reads the public key with id id, writing the output in format suitable for $HOME/.ssh/authorized_keys. --output filename, -o filename Specifies where key output should be written. If filename already exists, it will be overwritten. If this option is not given, keys will be printed to standard output. --no-cache Disables token data caching. --auth-id pin, -a pin Specifies the auth id of the PIN to use for the operation. This is useful with the --change-pin operation. --aid aid Specify in a hexadecimal form the AID of the on-card PKCS#15 application to be binded to. --reader num Forces pkcs15-tool to use reader number num for operations. The default is to use reader number 0, the first reader in the system. --verbose, -v Causes pkcs15-tool to be more verbose. Specify this flag several times to enable debug output in the OpenSC library. SEE ALSO
pkcs15-init(1), pkcs15-crypt(1) opensc 06/03/2012 PKCS15-TOOL(1)
Man Page

Featured Tech Videos