1OPENSSL-SPKAC(1ossl)                OpenSSL               OPENSSL-SPKAC(1ossl)
2
3
4

NAME

6       openssl-spkac - SPKAC printing and generating command
7

SYNOPSIS

9       openssl spkac [-help] [-in filename] [-out filename] [-digest digest]
10       [-key filename|uri] [-keyform DER|PEM|P12|ENGINE] [-passin arg]
11       [-challenge string] [-pubkey] [-spkac spkacname] [-spksect section]
12       [-noout] [-verify] [-engine id] [-provider name] [-provider-path path]
13       [-propquery propq]
14

DESCRIPTION

16       This command processes Netscape signed public key and challenge (SPKAC)
17       files. It can print out their contents, verify the signature and
18       produce its own SPKACs from a supplied private key.
19

OPTIONS

21       -help
22           Print out a usage message.
23
24       -in filename
25           This specifies the input filename to read from or standard input if
26           this option is not specified. Ignored if the -key option is used.
27
28       -out filename
29           Specifies the output filename to write to or standard output by
30           default.
31
32       -digest digest
33           Use the specified digest to sign a created SPKAC file.  The default
34           digest algorithm is MD5.
35
36       -key filename|uri
37           Create an SPKAC file using the private key specified by filename or
38           uri.  The -in, -noout, -spksect and -verify options are ignored if
39           present.
40
41       -keyform DER|PEM|P12|ENGINE
42           The key format; unspecified by default.  See
43           openssl-format-options(1) for details.
44
45       -passin arg
46           The input file password source. For more information about the
47           format of arg see openssl-passphrase-options(1).
48
49       -challenge string
50           Specifies the challenge string if an SPKAC is being created.
51
52       -spkac spkacname
53           Allows an alternative name form the variable containing the SPKAC.
54           The default is "SPKAC". This option affects both generated and
55           input SPKAC files.
56
57       -spksect section
58           Allows an alternative name form the section containing the SPKAC.
59           The default is the default section.
60
61       -noout
62           Don't output the text version of the SPKAC (not used if an SPKAC is
63           being created).
64
65       -pubkey
66           Output the public key of an SPKAC (not used if an SPKAC is being
67           created).
68
69       -verify
70           Verifies the digital signature on the supplied SPKAC.
71
72       -engine id
73           See "Engine Options" in openssl(1).  This option is deprecated.
74
75       -provider name
76       -provider-path path
77       -propquery propq
78           See "Provider Options" in openssl(1), provider(7), and property(7).
79

EXAMPLES

81       Print out the contents of an SPKAC:
82
83        openssl spkac -in spkac.cnf
84
85       Verify the signature of an SPKAC:
86
87        openssl spkac -in spkac.cnf -noout -verify
88
89       Create an SPKAC using the challenge string "hello":
90
91        openssl spkac -key key.pem -challenge hello -out spkac.cnf
92
93       Example of an SPKAC, (long lines split up for clarity):
94
95        SPKAC=MIG5MGUwXDANBgkqhkiG9w0BAQEFAANLADBIAkEA\
96        1cCoq2Wa3Ixs47uI7FPVwHVIPDx5yso105Y6zpozam135a\
97        8R0CpoRvkkigIyXfcCjiVi5oWk+6FfPaD03uPFoQIDAQAB\
98        FgVoZWxsbzANBgkqhkiG9w0BAQQFAANBAFpQtY/FojdwkJ\
99        h1bEIYuc2EeM2KHTWPEepWYeawvHD0gQ3DngSC75YCWnnD\
100        dq+NQ3F+X4deMx9AaEglZtULwV4=
101

NOTES

103       A created SPKAC with suitable DN components appended can be fed to
104       openssl-ca(1).
105
106       SPKACs are typically generated by Netscape when a form is submitted
107       containing the KEYGEN tag as part of the certificate enrollment
108       process.
109
110       The challenge string permits a primitive form of proof of possession of
111       private key. By checking the SPKAC signature and a random challenge
112       string some guarantee is given that the user knows the private key
113       corresponding to the public key being certified. This is important in
114       some applications. Without this it is possible for a previous SPKAC to
115       be used in a "replay attack".
116

SEE ALSO

118       openssl(1), openssl-ca(1)
119

HISTORY

121       The -engine option was deprecated in OpenSSL 3.0.
122
123       The -digest option was added in OpenSSL 3.0.
124
126       Copyright 2000-2021 The OpenSSL Project Authors. All Rights Reserved.
127
128       Licensed under the Apache License 2.0 (the "License").  You may not use
129       this file except in compliance with the License.  You can obtain a copy
130       in the file LICENSE in the source distribution or at
131       <https://www.openssl.org/source/license.html>.
132
133
134
1353.0.5                             2022-07-05              OPENSSL-SPKAC(1ossl)
Impressum