1PKCS15-CRYPT(1)                  OpenSC tools                  PKCS15-CRYPT(1)
2
3
4

NAME

6       pkcs15-crypt - perform crypto operations using pkcs15 smart card
7

SYNOPSIS

9       pkcs15-crypt [OPTIONS]
10

DESCRIPTION

12       The pkcs15-crypt utility can be used from the command line to perform
13       cryptographic operations such as computing digital signatures or
14       decrypting data, using keys stored on a PKCS #15 compliant smart card.
15

OPTIONS

17       --sign, -s
18           Perform digital signature operation on the data read from a file
19           specified using the input option. By default, the contents of the
20           file are assumed to be the result of an MD5 hash operation. Note
21           that pkcs15-crypt expects the data in binary representation, not
22           ASCII.
23
24           The digital signature is stored, in binary representation, in the
25           file specified by the output option. If this option is not given,
26           the signature is printed on standard output, displaying
27           non-printable characters using their hex notation xNN (see also
28           --raw).
29
30       --pkcs1
31           By default, pkcs15-crypt assumes that input data has been padded to
32           the correct length (i.e. when computing an RSA signature using a
33           1024 bit key, the input must be padded to 128 bytes to match the
34           modulus length). When giving the --pkcs1 option, however,
35           pkcs15-crypt will perform the required padding using the algorithm
36           outlined in the PKCS #1 standard version 1.5.
37
38       --sha-1
39           This option tells pkcs15-crypt that the input file is the result of
40           an SHA1 hash operation, rather than an MD5 hash. Again, the data
41           must be in binary representation.
42
43       --decipher, -c
44           Decrypt the contents of the file specified by the --input option.
45           The result of the decryption operation is written to the file
46           specified by the --output option. If this option is not given, the
47           decrypted data is printed to standard output, displaying
48           non-printable characters using their hex notation xNN (see also
49           --raw).
50
51       --key id, -k id
52           Selects the ID of the key to use.
53
54       --reader N, -r N
55           Selects the N-th smart card reader configured by the system. If
56           unspecified, pkcs15-crypt will use the first reader found.
57
58       --input file, -i file
59           Specifies the input file to use.
60
61       --output file, -o file
62           Any output will be sent to the specified file.
63
64       --raw, -R
65           Outputs raw 8 bit data.
66
67       --pin pin, -p pin
68           When the cryptographic operation requires a PIN to access the key,
69           pkcs15-crypt will prompt the user for the PIN on the terminal.
70           Using this option allows you to specify the PIN on the command
71           line.
72
73           Note that on most operating systems, the command line of a process
74           can be displayed by any user using the ps(1) command. It is
75           therefore a security risk to specify secret information such as
76           PINs on the command line. If you specify ´-´ as PIN, it will be
77           read from STDIN.
78
79       --verbose, -v
80           Causes pkcs15-crypt to be more verbose. Specify this flag several
81           times to enable debug output in the OpenSC library.
82

SEE ALSO

84       pkcs15-init(1), pkcs15-tool(1)
85
86
87
88opensc                            02/16/2010                   PKCS15-CRYPT(1)
Impressum