2006-07-08 08:24:47 +08:00
|
|
|
=pod
|
|
|
|
|
2019-10-13 05:45:56 +08:00
|
|
|
=begin comment
|
|
|
|
{- join("\n", @autowarntext) -}
|
|
|
|
|
|
|
|
=end comment
|
|
|
|
|
2006-07-08 08:24:47 +08:00
|
|
|
=head1 NAME
|
|
|
|
|
2020-02-19 00:52:12 +08:00
|
|
|
openssl-pkey - public or private key processing command
|
2006-07-08 08:24:47 +08:00
|
|
|
|
|
|
|
=head1 SYNOPSIS
|
|
|
|
|
|
|
|
B<openssl> B<pkey>
|
2016-02-06 00:58:45 +08:00
|
|
|
[B<-help>]
|
2020-05-06 19:51:50 +08:00
|
|
|
[B<-inform> B<DER>|B<PEM>|B<P12>|B<ENGINE>]
|
2019-09-26 03:20:11 +08:00
|
|
|
[B<-outform> B<DER>|B<PEM>]
|
|
|
|
[B<-in> I<filename>]
|
|
|
|
[B<-passin> I<arg>]
|
|
|
|
[B<-out> I<filename>]
|
|
|
|
[B<-passout> I<arg>]
|
2016-05-17 21:15:20 +08:00
|
|
|
[B<-traditional>]
|
2019-10-02 23:13:03 +08:00
|
|
|
[B<-I<cipher>>]
|
2006-07-08 08:24:47 +08:00
|
|
|
[B<-text>]
|
|
|
|
[B<-text_pub>]
|
|
|
|
[B<-noout>]
|
|
|
|
[B<-pubin>]
|
|
|
|
[B<-pubout>]
|
2017-09-04 22:02:59 +08:00
|
|
|
[B<-check>]
|
2017-11-01 00:45:24 +08:00
|
|
|
[B<-pubcheck>]
|
2020-02-18 09:36:08 +08:00
|
|
|
[B<-ec_conv_form> I<arg>]
|
|
|
|
[B<-ec_param_enc> I<arg>]
|
2019-10-13 05:45:56 +08:00
|
|
|
{- $OpenSSL::safe::opt_engine_synopsis -}
|
2020-02-25 12:29:30 +08:00
|
|
|
{- $OpenSSL::safe::opt_provider_synopsis -}
|
2006-07-08 08:24:47 +08:00
|
|
|
|
2019-10-11 23:52:12 +08:00
|
|
|
=for openssl ifdef engine
|
2019-09-23 07:49:25 +08:00
|
|
|
|
2006-07-08 08:24:47 +08:00
|
|
|
=head1 DESCRIPTION
|
|
|
|
|
Command docs: fix up command references
Almost all OpenSSL commands are in reality 'openssl cmd', so make sure
they are refered to like that and not just as the sub-command.
Self-references are avoided as much as is possible, and replaced with
"this command". In some cases, we even avoid that with a slight
rewrite of the sentence or paragrah they were in. However, in the few
cases where a self-reference is still admissible, they are done in
bold, i.e. openssl-speed.pod references itself like this:
B<openssl speed>
References to other commands are done as manual links, i.e. CA.pl.pod
references 'openssl req' like this: L<openssl-req(1)>
Some commands are examples rather than references; we enclose those in
C<>.
While we are it, we abolish "utility", replacing it with "command", or
remove it entirely in some cases.
Reviewed-by: Tomas Mraz <tmraz@fedoraproject.org>
(Merged from https://github.com/openssl/openssl/pull/10065)
2019-10-02 01:43:36 +08:00
|
|
|
This command processes public or private keys. They can be
|
|
|
|
converted between various forms and their components printed out.
|
2006-07-08 08:24:47 +08:00
|
|
|
|
2016-12-13 00:14:40 +08:00
|
|
|
=head1 OPTIONS
|
2006-07-08 08:24:47 +08:00
|
|
|
|
|
|
|
=over 4
|
|
|
|
|
2016-02-06 00:58:45 +08:00
|
|
|
=item B<-help>
|
|
|
|
|
|
|
|
Print out a usage message.
|
|
|
|
|
2020-05-06 19:51:50 +08:00
|
|
|
=item B<-inform> B<DER>|B<PEM>|B<P12>|B<ENGINE>
|
2006-07-08 08:24:47 +08:00
|
|
|
|
2020-05-06 19:51:50 +08:00
|
|
|
The key input format; the default is B<PEM>.
|
|
|
|
The only value with effect is B<ENGINE>; all others have become obsolete.
|
|
|
|
See L<openssl(1)/Format Options> for details.
|
|
|
|
|
|
|
|
=item B<-outform> B<DER>|B<PEM>
|
|
|
|
|
|
|
|
The key output formats; the default is B<PEM>.
|
2019-10-10 09:48:33 +08:00
|
|
|
See L<openssl(1)/Format Options> for details.
|
2006-07-08 08:24:47 +08:00
|
|
|
|
2019-09-26 03:20:11 +08:00
|
|
|
=item B<-in> I<filename>
|
2006-07-08 08:24:47 +08:00
|
|
|
|
|
|
|
This specifies the input filename to read a key from or standard input if this
|
|
|
|
option is not specified. If the key is encrypted a pass phrase will be
|
|
|
|
prompted for.
|
|
|
|
|
2019-10-09 01:10:04 +08:00
|
|
|
=item B<-passin> I<arg>, B<-passout> I<arg>
|
2006-07-08 08:24:47 +08:00
|
|
|
|
2019-10-09 01:10:04 +08:00
|
|
|
The password source for the input and output file.
|
|
|
|
For more information about the format of B<arg>
|
|
|
|
see L<openssl(1)/Pass Phrase Options>.
|
2006-07-08 08:24:47 +08:00
|
|
|
|
2019-09-26 03:20:11 +08:00
|
|
|
=item B<-out> I<filename>
|
2006-07-08 08:24:47 +08:00
|
|
|
|
|
|
|
This specifies the output filename to write a key to or standard output if this
|
|
|
|
option is not specified. If any encryption options are set then a pass phrase
|
|
|
|
will be prompted for. The output filename should B<not> be the same as the input
|
|
|
|
filename.
|
|
|
|
|
2016-05-17 21:15:20 +08:00
|
|
|
=item B<-traditional>
|
|
|
|
|
2017-03-30 05:38:30 +08:00
|
|
|
Normally a private key is written using standard format: this is PKCS#8 form
|
2016-05-17 21:15:20 +08:00
|
|
|
with the appropriate encryption algorithm (if any). If the B<-traditional>
|
|
|
|
option is specified then the older "traditional" format is used instead.
|
|
|
|
|
2019-10-02 23:13:03 +08:00
|
|
|
=item B<-I<cipher>>
|
2006-07-08 08:24:47 +08:00
|
|
|
|
|
|
|
These options encrypt the private key with the supplied cipher. Any algorithm
|
|
|
|
name accepted by EVP_get_cipherbyname() is acceptable such as B<des3>.
|
|
|
|
|
|
|
|
=item B<-text>
|
|
|
|
|
2017-03-30 05:38:30 +08:00
|
|
|
Prints out the various public or private key components in
|
2016-05-20 20:11:46 +08:00
|
|
|
plain text in addition to the encoded version.
|
2006-07-08 08:24:47 +08:00
|
|
|
|
|
|
|
=item B<-text_pub>
|
|
|
|
|
2017-03-30 05:38:30 +08:00
|
|
|
Print out only public key components even if a private key is being processed.
|
2006-07-08 08:24:47 +08:00
|
|
|
|
|
|
|
=item B<-noout>
|
|
|
|
|
2017-03-30 05:38:30 +08:00
|
|
|
Do not output the encoded version of the key.
|
2006-07-08 08:24:47 +08:00
|
|
|
|
|
|
|
=item B<-pubin>
|
|
|
|
|
2017-03-30 05:38:30 +08:00
|
|
|
By default a private key is read from the input file: with this
|
2006-07-08 08:24:47 +08:00
|
|
|
option a public key is read instead.
|
|
|
|
|
|
|
|
=item B<-pubout>
|
|
|
|
|
2017-03-30 05:38:30 +08:00
|
|
|
By default a private key is output: with this option a public
|
2006-07-08 08:24:47 +08:00
|
|
|
key will be output instead. This option is automatically set if
|
|
|
|
the input is a public key.
|
|
|
|
|
2017-09-04 22:02:59 +08:00
|
|
|
=item B<-check>
|
|
|
|
|
|
|
|
This option checks the consistency of a key pair for both public and private
|
|
|
|
components.
|
|
|
|
|
2017-11-01 00:45:24 +08:00
|
|
|
=item B<-pubcheck>
|
|
|
|
|
|
|
|
This option checks the correctness of either a public key or the public component
|
|
|
|
of a key pair.
|
|
|
|
|
2020-02-18 09:36:08 +08:00
|
|
|
=item B<-ec_conv_form> I<arg>
|
|
|
|
|
|
|
|
This option only applies to elliptic curve based public and private keys.
|
|
|
|
|
|
|
|
This specifies how the points on the elliptic curve are converted
|
|
|
|
into octet strings. Possible values are: B<compressed> (the default
|
|
|
|
value), B<uncompressed> and B<hybrid>. For more information regarding
|
|
|
|
the point conversion forms please read the X9.62 standard.
|
|
|
|
B<Note> Due to patent issues the B<compressed> option is disabled
|
|
|
|
by default for binary curves and can be enabled by defining
|
|
|
|
the preprocessor macro B<OPENSSL_EC_BIN_PT_COMP> at compile time.
|
|
|
|
|
|
|
|
=item B<-ec_param_enc> I<arg>
|
|
|
|
|
|
|
|
This option only applies to elliptic curve based public and private keys.
|
|
|
|
|
|
|
|
This specifies how the elliptic curve parameters are encoded.
|
|
|
|
Possible value are: B<named_curve>, i.e. the ec parameters are
|
|
|
|
specified by an OID, or B<explicit> where the ec parameters are
|
|
|
|
explicitly given (see RFC 3279 for the definition of the
|
|
|
|
EC parameters structures). The default value is B<named_curve>.
|
|
|
|
B<Note> the B<implicitlyCA> alternative, as specified in RFC 3279,
|
|
|
|
is currently not implemented in OpenSSL.
|
|
|
|
|
2019-10-13 05:45:56 +08:00
|
|
|
{- $OpenSSL::safe::opt_engine_item -}
|
|
|
|
|
2020-02-25 12:29:30 +08:00
|
|
|
{- $OpenSSL::safe::opt_provider_item -}
|
|
|
|
|
2006-07-08 08:24:47 +08:00
|
|
|
=back
|
|
|
|
|
|
|
|
=head1 EXAMPLES
|
|
|
|
|
2020-02-18 07:46:52 +08:00
|
|
|
To remove the pass phrase on a private key:
|
2006-07-08 08:24:47 +08:00
|
|
|
|
|
|
|
openssl pkey -in key.pem -out keyout.pem
|
|
|
|
|
|
|
|
To encrypt a private key using triple DES:
|
|
|
|
|
|
|
|
openssl pkey -in key.pem -des3 -out keyout.pem
|
|
|
|
|
2016-05-20 20:11:46 +08:00
|
|
|
To convert a private key from PEM to DER format:
|
2006-07-08 08:24:47 +08:00
|
|
|
|
|
|
|
openssl pkey -in key.pem -outform DER -out keyout.der
|
|
|
|
|
|
|
|
To print out the components of a private key to standard output:
|
|
|
|
|
|
|
|
openssl pkey -in key.pem -text -noout
|
|
|
|
|
|
|
|
To print out the public components of a private key to standard output:
|
|
|
|
|
|
|
|
openssl pkey -in key.pem -text_pub -noout
|
|
|
|
|
|
|
|
To just output the public part of a private key:
|
|
|
|
|
|
|
|
openssl pkey -in key.pem -pubout -out pubkey.pem
|
|
|
|
|
2020-02-18 09:36:08 +08:00
|
|
|
To change the EC parameters encoding to B<explicit>:
|
|
|
|
|
|
|
|
openssl pkey -in key.pem -ec_param_enc explicit -out keyout.pem
|
|
|
|
|
|
|
|
To change the EC point conversion form to B<compressed>:
|
|
|
|
|
|
|
|
openssl pkey -in key.pem -ec_conv_form compressed -out keyout.pem
|
|
|
|
|
2006-07-08 08:24:47 +08:00
|
|
|
=head1 SEE ALSO
|
|
|
|
|
2019-08-22 07:04:41 +08:00
|
|
|
L<openssl(1)>,
|
|
|
|
L<openssl-genpkey(1)>,
|
|
|
|
L<openssl-rsa(1)>,
|
|
|
|
L<openssl-pkcs8(1)>,
|
|
|
|
L<openssl-dsa(1)>,
|
|
|
|
L<openssl-genrsa(1)>,
|
|
|
|
L<openssl-gendsa(1)>
|
2006-07-08 08:24:47 +08:00
|
|
|
|
2016-05-18 23:44:05 +08:00
|
|
|
=head1 COPYRIGHT
|
|
|
|
|
2020-04-23 20:55:52 +08:00
|
|
|
Copyright 2006-2020 The OpenSSL Project Authors. All Rights Reserved.
|
2016-05-18 23:44:05 +08:00
|
|
|
|
2018-12-06 21:04:11 +08:00
|
|
|
Licensed under the Apache License 2.0 (the "License"). You may not use
|
2016-05-18 23:44:05 +08:00
|
|
|
this file except in compliance with the License. You can obtain a copy
|
|
|
|
in the file LICENSE in the source distribution or at
|
|
|
|
L<https://www.openssl.org/source/license.html>.
|
|
|
|
|
|
|
|
=cut
|