xref: /onnv-gate/usr/src/common/openssl/doc/apps/pkcs8.pod (revision 2175:b0b2f052a486)
1*2175Sjp161948=pod
2*2175Sjp161948
3*2175Sjp161948=head1 NAME
4*2175Sjp161948
5*2175Sjp161948pkcs8 - PKCS#8 format private key conversion tool
6*2175Sjp161948
7*2175Sjp161948=head1 SYNOPSIS
8*2175Sjp161948
9*2175Sjp161948B<openssl> B<pkcs8>
10*2175Sjp161948[B<-topk8>]
11*2175Sjp161948[B<-inform PEM|DER>]
12*2175Sjp161948[B<-outform PEM|DER>]
13*2175Sjp161948[B<-in filename>]
14*2175Sjp161948[B<-passin arg>]
15*2175Sjp161948[B<-out filename>]
16*2175Sjp161948[B<-passout arg>]
17*2175Sjp161948[B<-noiter>]
18*2175Sjp161948[B<-nocrypt>]
19*2175Sjp161948[B<-nooct>]
20*2175Sjp161948[B<-embed>]
21*2175Sjp161948[B<-nsdb>]
22*2175Sjp161948[B<-v2 alg>]
23*2175Sjp161948[B<-v1 alg>]
24*2175Sjp161948[B<-engine id>]
25*2175Sjp161948
26*2175Sjp161948=head1 DESCRIPTION
27*2175Sjp161948
28*2175Sjp161948The B<pkcs8> command processes private keys in PKCS#8 format. It can handle
29*2175Sjp161948both unencrypted PKCS#8 PrivateKeyInfo format and EncryptedPrivateKeyInfo
30*2175Sjp161948format with a variety of PKCS#5 (v1.5 and v2.0) and PKCS#12 algorithms.
31*2175Sjp161948
32*2175Sjp161948=head1 COMMAND OPTIONS
33*2175Sjp161948
34*2175Sjp161948=over 4
35*2175Sjp161948
36*2175Sjp161948=item B<-topk8>
37*2175Sjp161948
38*2175Sjp161948Normally a PKCS#8 private key is expected on input and a traditional format
39*2175Sjp161948private key will be written. With the B<-topk8> option the situation is
40*2175Sjp161948reversed: it reads a traditional format private key and writes a PKCS#8
41*2175Sjp161948format key.
42*2175Sjp161948
43*2175Sjp161948=item B<-inform DER|PEM>
44*2175Sjp161948
45*2175Sjp161948This specifies the input format. If a PKCS#8 format key is expected on input
46*2175Sjp161948then either a B<DER> or B<PEM> encoded version of a PKCS#8 key will be
47*2175Sjp161948expected. Otherwise the B<DER> or B<PEM> format of the traditional format
48*2175Sjp161948private key is used.
49*2175Sjp161948
50*2175Sjp161948=item B<-outform DER|PEM>
51*2175Sjp161948
52*2175Sjp161948This specifies the output format, the options have the same meaning as the
53*2175Sjp161948B<-inform> option.
54*2175Sjp161948
55*2175Sjp161948=item B<-in filename>
56*2175Sjp161948
57*2175Sjp161948This specifies the input filename to read a key from or standard input if this
58*2175Sjp161948option is not specified. If the key is encrypted a pass phrase will be
59*2175Sjp161948prompted for.
60*2175Sjp161948
61*2175Sjp161948=item B<-passin arg>
62*2175Sjp161948
63*2175Sjp161948the input file password source. For more information about the format of B<arg>
64*2175Sjp161948see the B<PASS PHRASE ARGUMENTS> section in L<openssl(1)|openssl(1)>.
65*2175Sjp161948
66*2175Sjp161948=item B<-out filename>
67*2175Sjp161948
68*2175Sjp161948This specifies the output filename to write a key to or standard output by
69*2175Sjp161948default. If any encryption options are set then a pass phrase will be
70*2175Sjp161948prompted for. The output filename should B<not> be the same as the input
71*2175Sjp161948filename.
72*2175Sjp161948
73*2175Sjp161948=item B<-passout arg>
74*2175Sjp161948
75*2175Sjp161948the output file password source. For more information about the format of B<arg>
76*2175Sjp161948see the B<PASS PHRASE ARGUMENTS> section in L<openssl(1)|openssl(1)>.
77*2175Sjp161948
78*2175Sjp161948=item B<-nocrypt>
79*2175Sjp161948
80*2175Sjp161948PKCS#8 keys generated or input are normally PKCS#8 EncryptedPrivateKeyInfo
81*2175Sjp161948structures using an appropriate password based encryption algorithm. With
82*2175Sjp161948this option an unencrypted PrivateKeyInfo structure is expected or output.
83*2175Sjp161948This option does not encrypt private keys at all and should only be used
84*2175Sjp161948when absolutely necessary. Certain software such as some versions of Java
85*2175Sjp161948code signing software used unencrypted private keys.
86*2175Sjp161948
87*2175Sjp161948=item B<-nooct>
88*2175Sjp161948
89*2175Sjp161948This option generates RSA private keys in a broken format that some software
90*2175Sjp161948uses. Specifically the private key should be enclosed in a OCTET STRING
91*2175Sjp161948but some software just includes the structure itself without the
92*2175Sjp161948surrounding OCTET STRING.
93*2175Sjp161948
94*2175Sjp161948=item B<-embed>
95*2175Sjp161948
96*2175Sjp161948This option generates DSA keys in a broken format. The DSA parameters are
97*2175Sjp161948embedded inside the PrivateKey structure. In this form the OCTET STRING
98*2175Sjp161948contains an ASN1 SEQUENCE consisting of two structures: a SEQUENCE containing
99*2175Sjp161948the parameters and an ASN1 INTEGER containing the private key.
100*2175Sjp161948
101*2175Sjp161948=item B<-nsdb>
102*2175Sjp161948
103*2175Sjp161948This option generates DSA keys in a broken format compatible with Netscape
104*2175Sjp161948private key databases. The PrivateKey contains a SEQUENCE consisting of
105*2175Sjp161948the public and private keys respectively.
106*2175Sjp161948
107*2175Sjp161948=item B<-v2 alg>
108*2175Sjp161948
109*2175Sjp161948This option enables the use of PKCS#5 v2.0 algorithms. Normally PKCS#8
110*2175Sjp161948private keys are encrypted with the password based encryption algorithm
111*2175Sjp161948called B<pbeWithMD5AndDES-CBC> this uses 56 bit DES encryption but it
112*2175Sjp161948was the strongest encryption algorithm supported in PKCS#5 v1.5. Using
113*2175Sjp161948the B<-v2> option PKCS#5 v2.0 algorithms are used which can use any
114*2175Sjp161948encryption algorithm such as 168 bit triple DES or 128 bit RC2 however
115*2175Sjp161948not many implementations support PKCS#5 v2.0 yet. If you are just using
116*2175Sjp161948private keys with OpenSSL then this doesn't matter.
117*2175Sjp161948
118*2175Sjp161948The B<alg> argument is the encryption algorithm to use, valid values include
119*2175Sjp161948B<des>, B<des3> and B<rc2>. It is recommended that B<des3> is used.
120*2175Sjp161948
121*2175Sjp161948=item B<-v1 alg>
122*2175Sjp161948
123*2175Sjp161948This option specifies a PKCS#5 v1.5 or PKCS#12 algorithm to use. A complete
124*2175Sjp161948list of possible algorithms is included below.
125*2175Sjp161948
126*2175Sjp161948=item B<-engine id>
127*2175Sjp161948
128*2175Sjp161948specifying an engine (by it's unique B<id> string) will cause B<req>
129*2175Sjp161948to attempt to obtain a functional reference to the specified engine,
130*2175Sjp161948thus initialising it if needed. The engine will then be set as the default
131*2175Sjp161948for all available algorithms.
132*2175Sjp161948
133*2175Sjp161948=back
134*2175Sjp161948
135*2175Sjp161948=head1 NOTES
136*2175Sjp161948
137*2175Sjp161948The encrypted form of a PEM encode PKCS#8 files uses the following
138*2175Sjp161948headers and footers:
139*2175Sjp161948
140*2175Sjp161948 -----BEGIN ENCRYPTED PRIVATE KEY-----
141*2175Sjp161948 -----END ENCRYPTED PRIVATE KEY-----
142*2175Sjp161948
143*2175Sjp161948The unencrypted form uses:
144*2175Sjp161948
145*2175Sjp161948 -----BEGIN PRIVATE KEY-----
146*2175Sjp161948 -----END PRIVATE KEY-----
147*2175Sjp161948
148*2175Sjp161948Private keys encrypted using PKCS#5 v2.0 algorithms and high iteration
149*2175Sjp161948counts are more secure that those encrypted using the traditional
150*2175Sjp161948SSLeay compatible formats. So if additional security is considered
151*2175Sjp161948important the keys should be converted.
152*2175Sjp161948
153*2175Sjp161948The default encryption is only 56 bits because this is the encryption
154*2175Sjp161948that most current implementations of PKCS#8 will support.
155*2175Sjp161948
156*2175Sjp161948Some software may use PKCS#12 password based encryption algorithms
157*2175Sjp161948with PKCS#8 format private keys: these are handled automatically
158*2175Sjp161948but there is no option to produce them.
159*2175Sjp161948
160*2175Sjp161948It is possible to write out DER encoded encrypted private keys in
161*2175Sjp161948PKCS#8 format because the encryption details are included at an ASN1
162*2175Sjp161948level whereas the traditional format includes them at a PEM level.
163*2175Sjp161948
164*2175Sjp161948=head1 PKCS#5 v1.5 and PKCS#12 algorithms.
165*2175Sjp161948
166*2175Sjp161948Various algorithms can be used with the B<-v1> command line option,
167*2175Sjp161948including PKCS#5 v1.5 and PKCS#12. These are described in more detail
168*2175Sjp161948below.
169*2175Sjp161948
170*2175Sjp161948=over 4
171*2175Sjp161948
172*2175Sjp161948=item B<PBE-MD2-DES PBE-MD5-DES>
173*2175Sjp161948
174*2175Sjp161948These algorithms were included in the original PKCS#5 v1.5 specification.
175*2175Sjp161948They only offer 56 bits of protection since they both use DES.
176*2175Sjp161948
177*2175Sjp161948=item B<PBE-SHA1-RC2-64 PBE-MD2-RC2-64 PBE-MD5-RC2-64 PBE-SHA1-DES>
178*2175Sjp161948
179*2175Sjp161948These algorithms are not mentioned in the original PKCS#5 v1.5 specification
180*2175Sjp161948but they use the same key derivation algorithm and are supported by some
181*2175Sjp161948software. They are mentioned in PKCS#5 v2.0. They use either 64 bit RC2 or
182*2175Sjp16194856 bit DES.
183*2175Sjp161948
184*2175Sjp161948=item B<PBE-SHA1-RC4-128 PBE-SHA1-RC4-40 PBE-SHA1-3DES PBE-SHA1-2DES PBE-SHA1-RC2-128 PBE-SHA1-RC2-40>
185*2175Sjp161948
186*2175Sjp161948These algorithms use the PKCS#12 password based encryption algorithm and
187*2175Sjp161948allow strong encryption algorithms like triple DES or 128 bit RC2 to be used.
188*2175Sjp161948
189*2175Sjp161948=back
190*2175Sjp161948
191*2175Sjp161948=head1 EXAMPLES
192*2175Sjp161948
193*2175Sjp161948Convert a private from traditional to PKCS#5 v2.0 format using triple
194*2175Sjp161948DES:
195*2175Sjp161948
196*2175Sjp161948 openssl pkcs8 -in key.pem -topk8 -v2 des3 -out enckey.pem
197*2175Sjp161948
198*2175Sjp161948Convert a private key to PKCS#8 using a PKCS#5 1.5 compatible algorithm
199*2175Sjp161948(DES):
200*2175Sjp161948
201*2175Sjp161948 openssl pkcs8 -in key.pem -topk8 -out enckey.pem
202*2175Sjp161948
203*2175Sjp161948Convert a private key to PKCS#8 using a PKCS#12 compatible algorithm
204*2175Sjp161948(3DES):
205*2175Sjp161948
206*2175Sjp161948 openssl pkcs8 -in key.pem -topk8 -out enckey.pem -v1 PBE-SHA1-3DES
207*2175Sjp161948
208*2175Sjp161948Read a DER unencrypted PKCS#8 format private key:
209*2175Sjp161948
210*2175Sjp161948 openssl pkcs8 -inform DER -nocrypt -in key.der -out key.pem
211*2175Sjp161948
212*2175Sjp161948Convert a private key from any PKCS#8 format to traditional format:
213*2175Sjp161948
214*2175Sjp161948 openssl pkcs8 -in pk8.pem -out key.pem
215*2175Sjp161948
216*2175Sjp161948=head1 STANDARDS
217*2175Sjp161948
218*2175Sjp161948Test vectors from this PKCS#5 v2.0 implementation were posted to the
219*2175Sjp161948pkcs-tng mailing list using triple DES, DES and RC2 with high iteration
220*2175Sjp161948counts, several people confirmed that they could decrypt the private
221*2175Sjp161948keys produced and Therefore it can be assumed that the PKCS#5 v2.0
222*2175Sjp161948implementation is reasonably accurate at least as far as these
223*2175Sjp161948algorithms are concerned.
224*2175Sjp161948
225*2175Sjp161948The format of PKCS#8 DSA (and other) private keys is not well documented:
226*2175Sjp161948it is hidden away in PKCS#11 v2.01, section 11.9. OpenSSL's default DSA
227*2175Sjp161948PKCS#8 private key format complies with this standard.
228*2175Sjp161948
229*2175Sjp161948=head1 BUGS
230*2175Sjp161948
231*2175Sjp161948There should be an option that prints out the encryption algorithm
232*2175Sjp161948in use and other details such as the iteration count.
233*2175Sjp161948
234*2175Sjp161948PKCS#8 using triple DES and PKCS#5 v2.0 should be the default private
235*2175Sjp161948key format for OpenSSL: for compatibility several of the utilities use
236*2175Sjp161948the old format at present.
237*2175Sjp161948
238*2175Sjp161948=head1 SEE ALSO
239*2175Sjp161948
240*2175Sjp161948L<dsa(1)|dsa(1)>, L<rsa(1)|rsa(1)>, L<genrsa(1)|genrsa(1)>,
241*2175Sjp161948L<gendsa(1)|gendsa(1)>
242*2175Sjp161948
243*2175Sjp161948=cut
244