1999-11-10 02:52:17 +00:00
|
|
|
=pod
|
|
|
|
|
|
|
|
=head1 NAME
|
|
|
|
|
2017-10-18 19:33:56 +00:00
|
|
|
openssl-pkcs8,
|
1999-11-11 00:48:39 +00:00
|
|
|
pkcs8 - PKCS#8 format private key conversion tool
|
1999-11-10 02:52:17 +00:00
|
|
|
|
|
|
|
=head1 SYNOPSIS
|
|
|
|
|
|
|
|
B<openssl> B<pkcs8>
|
2016-02-05 16:58:45 +00:00
|
|
|
[B<-help>]
|
1999-11-10 02:52:17 +00:00
|
|
|
[B<-topk8>]
|
|
|
|
[B<-inform PEM|DER>]
|
|
|
|
[B<-outform PEM|DER>]
|
|
|
|
[B<-in filename>]
|
2000-02-16 23:16:01 +00:00
|
|
|
[B<-passin arg>]
|
1999-11-10 02:52:17 +00:00
|
|
|
[B<-out filename>]
|
2000-02-16 23:16:01 +00:00
|
|
|
[B<-passout arg>]
|
2014-06-03 22:24:49 +00:00
|
|
|
[B<-iter count>]
|
1999-11-10 02:52:17 +00:00
|
|
|
[B<-noiter>]
|
2017-07-05 14:58:48 +00:00
|
|
|
[B<-rand file...>]
|
|
|
|
[B<-writerand file>]
|
1999-11-10 02:52:17 +00:00
|
|
|
[B<-nocrypt>]
|
2016-05-17 13:15:20 +00:00
|
|
|
[B<-traditional>]
|
1999-11-10 02:52:17 +00:00
|
|
|
[B<-v2 alg>]
|
2014-02-28 17:23:54 +00:00
|
|
|
[B<-v2prf alg>]
|
1999-12-23 02:02:42 +00:00
|
|
|
[B<-v1 alg>]
|
2003-01-30 22:02:27 +00:00
|
|
|
[B<-engine id>]
|
2015-05-21 13:17:32 +00:00
|
|
|
[B<-scrypt>]
|
|
|
|
[B<-scrypt_N N>]
|
|
|
|
[B<-scrypt_r r>]
|
|
|
|
[B<-scrypt_p p>]
|
1999-11-10 02:52:17 +00:00
|
|
|
|
|
|
|
=head1 DESCRIPTION
|
|
|
|
|
|
|
|
The B<pkcs8> command processes private keys in PKCS#8 format. It can handle
|
|
|
|
both unencrypted PKCS#8 PrivateKeyInfo format and EncryptedPrivateKeyInfo
|
|
|
|
format with a variety of PKCS#5 (v1.5 and v2.0) and PKCS#12 algorithms.
|
|
|
|
|
2016-12-12 16:14:40 +00:00
|
|
|
=head1 OPTIONS
|
1999-11-10 02:52:17 +00:00
|
|
|
|
|
|
|
=over 4
|
|
|
|
|
2016-02-05 16:58:45 +00:00
|
|
|
=item B<-help>
|
|
|
|
|
|
|
|
Print out a usage message.
|
|
|
|
|
1999-11-10 02:52:17 +00:00
|
|
|
=item B<-topk8>
|
|
|
|
|
2016-05-17 13:15:20 +00:00
|
|
|
Normally a PKCS#8 private key is expected on input and a private key will be
|
|
|
|
written to the output file. With the B<-topk8> option the situation is
|
|
|
|
reversed: it reads a private key and writes a PKCS#8 format key.
|
1999-11-10 02:52:17 +00:00
|
|
|
|
|
|
|
=item B<-inform DER|PEM>
|
|
|
|
|
2017-08-09 13:20:43 +00:00
|
|
|
This specifies the input format: see L<KEY FORMATS> for more details. The default
|
|
|
|
format is PEM.
|
1999-11-10 02:52:17 +00:00
|
|
|
|
1999-11-11 00:48:39 +00:00
|
|
|
=item B<-outform DER|PEM>
|
1999-11-10 02:52:17 +00:00
|
|
|
|
2017-08-09 13:20:43 +00:00
|
|
|
This specifies the output format: see L<KEY FORMATS> for more details. The default
|
|
|
|
format is PEM.
|
2016-05-17 13:15:20 +00:00
|
|
|
|
|
|
|
=item B<-traditional>
|
|
|
|
|
|
|
|
When this option is present and B<-topk8> is not a traditional format private
|
|
|
|
key is written.
|
1999-11-10 02:52:17 +00:00
|
|
|
|
|
|
|
=item B<-in filename>
|
|
|
|
|
|
|
|
This specifies the input filename to read a key from or standard input if this
|
|
|
|
option is not specified. If the key is encrypted a pass phrase will be
|
|
|
|
prompted for.
|
|
|
|
|
2000-02-16 23:16:01 +00:00
|
|
|
=item B<-passin arg>
|
2000-01-01 16:42:49 +00:00
|
|
|
|
2017-03-29 21:38:30 +00:00
|
|
|
The input file password source. For more information about the format of B<arg>
|
2015-08-17 19:21:33 +00:00
|
|
|
see the B<PASS PHRASE ARGUMENTS> section in L<openssl(1)>.
|
2000-01-01 16:42:49 +00:00
|
|
|
|
1999-11-10 02:52:17 +00:00
|
|
|
=item B<-out filename>
|
|
|
|
|
|
|
|
This specifies the output filename to write a key to or standard output by
|
1999-11-11 00:48:39 +00:00
|
|
|
default. If any encryption options are set then a pass phrase will be
|
1999-11-10 02:52:17 +00:00
|
|
|
prompted for. The output filename should B<not> be the same as the input
|
|
|
|
filename.
|
|
|
|
|
2000-02-16 23:16:01 +00:00
|
|
|
=item B<-passout arg>
|
2000-01-01 16:42:49 +00:00
|
|
|
|
2017-03-29 21:38:30 +00:00
|
|
|
The output file password source. For more information about the format of B<arg>
|
2015-08-17 19:21:33 +00:00
|
|
|
see the B<PASS PHRASE ARGUMENTS> section in L<openssl(1)>.
|
2000-01-01 16:42:49 +00:00
|
|
|
|
2014-06-03 22:24:49 +00:00
|
|
|
=item B<-iter count>
|
|
|
|
|
2015-05-13 19:27:57 +00:00
|
|
|
When creating new PKCS#8 containers, use a given number of iterations on
|
|
|
|
the password in deriving the encryption key for the PKCS#8 output.
|
|
|
|
High values increase the time required to brute-force a PKCS#8 container.
|
2014-06-03 22:24:49 +00:00
|
|
|
|
1999-11-11 00:48:39 +00:00
|
|
|
=item B<-nocrypt>
|
1999-11-10 02:52:17 +00:00
|
|
|
|
1999-11-11 00:48:39 +00:00
|
|
|
PKCS#8 keys generated or input are normally PKCS#8 EncryptedPrivateKeyInfo
|
|
|
|
structures using an appropriate password based encryption algorithm. With
|
|
|
|
this option an unencrypted PrivateKeyInfo structure is expected or output.
|
|
|
|
This option does not encrypt private keys at all and should only be used
|
|
|
|
when absolutely necessary. Certain software such as some versions of Java
|
|
|
|
code signing software used unencrypted private keys.
|
1999-11-10 02:52:17 +00:00
|
|
|
|
2017-07-05 14:58:48 +00:00
|
|
|
=item B<-rand file...>
|
|
|
|
|
|
|
|
A file or files containing random data used to seed the random number
|
|
|
|
generator.
|
|
|
|
Multiple files can be specified separated by an OS-dependent character.
|
|
|
|
The separator is B<;> for MS-Windows, B<,> for OpenVMS, and B<:> for
|
|
|
|
all others.
|
|
|
|
|
|
|
|
=item [B<-writerand file>]
|
|
|
|
|
|
|
|
Writes random data to the specified I<file> upon exit.
|
|
|
|
This can be used with a subsequent B<-rand> flag.
|
|
|
|
|
1999-11-11 00:48:39 +00:00
|
|
|
=item B<-v2 alg>
|
1999-11-10 02:52:17 +00:00
|
|
|
|
2016-05-11 11:41:58 +00:00
|
|
|
This option sets the PKCS#5 v2.0 algorithm.
|
1999-11-10 02:52:17 +00:00
|
|
|
|
1999-11-11 00:48:39 +00:00
|
|
|
The B<alg> argument is the encryption algorithm to use, valid values include
|
2016-05-11 11:41:58 +00:00
|
|
|
B<aes128>, B<aes256> and B<des3>. If this option isn't specified then B<aes256>
|
|
|
|
is used.
|
1999-11-10 02:52:17 +00:00
|
|
|
|
2014-02-28 17:23:54 +00:00
|
|
|
=item B<-v2prf alg>
|
|
|
|
|
|
|
|
This option sets the PRF algorithm to use with PKCS#5 v2.0. A typical value
|
2016-05-11 11:41:58 +00:00
|
|
|
value would be B<hmacWithSHA256>. If this option isn't set then the default
|
|
|
|
for the cipher is used or B<hmacWithSHA256> if there is no default.
|
|
|
|
|
|
|
|
Some implementations may not support custom PRF algorithms and may require
|
|
|
|
the B<hmacWithSHA1> option to work.
|
2014-02-28 17:23:54 +00:00
|
|
|
|
1999-12-23 02:02:42 +00:00
|
|
|
=item B<-v1 alg>
|
|
|
|
|
2016-05-11 11:41:58 +00:00
|
|
|
This option indicates a PKCS#5 v1.5 or PKCS#12 algorithm should be used. Some
|
|
|
|
older implementations may not support PKCS#5 v2.0 and may require this option.
|
2016-05-17 13:15:20 +00:00
|
|
|
If not specified PKCS#5 v2.0 form is used.
|
1999-12-23 02:02:42 +00:00
|
|
|
|
2003-01-30 22:02:27 +00:00
|
|
|
=item B<-engine id>
|
|
|
|
|
2017-03-29 21:38:30 +00:00
|
|
|
Specifying an engine (by its unique B<id> string) will cause B<pkcs8>
|
2003-01-30 22:02:27 +00:00
|
|
|
to attempt to obtain a functional reference to the specified engine,
|
|
|
|
thus initialising it if needed. The engine will then be set as the default
|
|
|
|
for all available algorithms.
|
|
|
|
|
2015-05-21 13:17:32 +00:00
|
|
|
=item B<-scrypt>
|
|
|
|
|
2017-03-29 21:38:30 +00:00
|
|
|
Uses the B<scrypt> algorithm for private key encryption using default
|
2016-03-04 23:28:45 +00:00
|
|
|
parameters: currently N=16384, r=8 and p=1 and AES in CBC mode with a 256 bit
|
2015-05-21 13:17:32 +00:00
|
|
|
key. These parameters can be modified using the B<-scrypt_N>, B<-scrypt_r>,
|
|
|
|
B<-scrypt_p> and B<-v2> options.
|
|
|
|
|
2017-03-29 21:38:30 +00:00
|
|
|
=item B<-scrypt_N N> B<-scrypt_r r> B<-scrypt_p p>
|
2015-05-21 13:17:32 +00:00
|
|
|
|
2017-03-29 21:38:30 +00:00
|
|
|
Sets the scrypt B<N>, B<r> or B<p> parameters.
|
2015-05-21 13:17:32 +00:00
|
|
|
|
1999-11-11 00:48:39 +00:00
|
|
|
=back
|
1999-11-10 02:52:17 +00:00
|
|
|
|
2016-05-17 13:15:20 +00:00
|
|
|
=head1 KEY FORMATS
|
|
|
|
|
|
|
|
Various different formats are used by the pkcs8 utility. These are detailed
|
|
|
|
below.
|
|
|
|
|
|
|
|
If a key is being converted from PKCS#8 form (i.e. the B<-topk8> option is
|
|
|
|
not used) then the input file must be in PKCS#8 format. An encrypted
|
|
|
|
key is expected unless B<-nocrypt> is included.
|
|
|
|
|
|
|
|
If B<-topk8> is not used and B<PEM> mode is set the output file will be an
|
|
|
|
unencrypted private key in PKCS#8 format. If the B<-traditional> option is
|
|
|
|
used then a traditional format private key is written instead.
|
|
|
|
|
|
|
|
If B<-topk8> is not used and B<DER> mode is set the output file will be an
|
|
|
|
unencrypted private key in traditional DER format.
|
|
|
|
|
|
|
|
If B<-topk8> is used then any supported private key can be used for the input
|
|
|
|
file in a format specified by B<-inform>. The output file will be encrypted
|
|
|
|
PKCS#8 format using the specified encryption parameters unless B<-nocrypt>
|
|
|
|
is included.
|
|
|
|
|
1999-11-11 00:48:39 +00:00
|
|
|
=head1 NOTES
|
1999-11-10 02:52:17 +00:00
|
|
|
|
2016-05-11 11:41:58 +00:00
|
|
|
By default, when converting a key to PKCS#8 format, PKCS#5 v2.0 using 256 bit
|
|
|
|
AES with HMAC and SHA256 is used.
|
|
|
|
|
|
|
|
Some older implementations do not support PKCS#5 v2.0 format and require
|
|
|
|
the older PKCS#5 v1.5 form instead, possibly also requiring insecure weak
|
|
|
|
encryption algorithms such as 56 bit DES.
|
|
|
|
|
1999-11-13 21:58:39 +00:00
|
|
|
The encrypted form of a PEM encode PKCS#8 files uses the following
|
|
|
|
headers and footers:
|
|
|
|
|
|
|
|
-----BEGIN ENCRYPTED PRIVATE KEY-----
|
|
|
|
-----END ENCRYPTED PRIVATE KEY-----
|
|
|
|
|
|
|
|
The unencrypted form uses:
|
|
|
|
|
|
|
|
-----BEGIN PRIVATE KEY-----
|
|
|
|
-----END PRIVATE KEY-----
|
|
|
|
|
1999-11-11 00:48:39 +00:00
|
|
|
Private keys encrypted using PKCS#5 v2.0 algorithms and high iteration
|
|
|
|
counts are more secure that those encrypted using the traditional
|
|
|
|
SSLeay compatible formats. So if additional security is considered
|
|
|
|
important the keys should be converted.
|
1999-11-10 02:52:17 +00:00
|
|
|
|
1999-11-11 00:48:39 +00:00
|
|
|
It is possible to write out DER encoded encrypted private keys in
|
|
|
|
PKCS#8 format because the encryption details are included at an ASN1
|
|
|
|
level whereas the traditional format includes them at a PEM level.
|
1999-11-10 02:52:17 +00:00
|
|
|
|
1999-12-23 02:02:42 +00:00
|
|
|
=head1 PKCS#5 v1.5 and PKCS#12 algorithms.
|
|
|
|
|
|
|
|
Various algorithms can be used with the B<-v1> command line option,
|
|
|
|
including PKCS#5 v1.5 and PKCS#12. These are described in more detail
|
|
|
|
below.
|
|
|
|
|
|
|
|
=over 4
|
|
|
|
|
|
|
|
=item B<PBE-MD2-DES PBE-MD5-DES>
|
|
|
|
|
|
|
|
These algorithms were included in the original PKCS#5 v1.5 specification.
|
|
|
|
They only offer 56 bits of protection since they both use DES.
|
|
|
|
|
2018-07-03 16:45:14 +00:00
|
|
|
=item B<PBE-SHA1-RC2-64>, B<PBE-MD2-RC2-64>, B<PBE-MD5-RC2-64>, B<PBE-SHA1-DES>
|
1999-12-23 02:02:42 +00:00
|
|
|
|
|
|
|
These algorithms are not mentioned in the original PKCS#5 v1.5 specification
|
|
|
|
but they use the same key derivation algorithm and are supported by some
|
2000-01-08 19:05:47 +00:00
|
|
|
software. They are mentioned in PKCS#5 v2.0. They use either 64 bit RC2 or
|
1999-12-23 02:02:42 +00:00
|
|
|
56 bit DES.
|
|
|
|
|
2018-07-03 16:45:14 +00:00
|
|
|
=item B<PBE-SHA1-RC4-128>, B<PBE-SHA1-RC4-40>, B<PBE-SHA1-3DES>, B<PBE-SHA1-2DES>, B<PBE-SHA1-RC2-128>, B<PBE-SHA1-RC2-40>
|
1999-12-23 02:02:42 +00:00
|
|
|
|
|
|
|
These algorithms use the PKCS#12 password based encryption algorithm and
|
|
|
|
allow strong encryption algorithms like triple DES or 128 bit RC2 to be used.
|
|
|
|
|
|
|
|
=back
|
|
|
|
|
1999-11-10 02:52:17 +00:00
|
|
|
=head1 EXAMPLES
|
|
|
|
|
2016-05-17 13:15:20 +00:00
|
|
|
Convert a private key to PKCS#8 format using default parameters (AES with
|
|
|
|
256 bit key and B<hmacWithSHA256>):
|
|
|
|
|
|
|
|
openssl pkcs8 -in key.pem -topk8 -out enckey.pem
|
|
|
|
|
|
|
|
Convert a private key to PKCS#8 unencrypted format:
|
|
|
|
|
|
|
|
openssl pkcs8 -in key.pem -topk8 -nocrypt -out enckey.pem
|
|
|
|
|
|
|
|
Convert a private key to PKCS#5 v2.0 format using triple DES:
|
1999-11-10 02:52:17 +00:00
|
|
|
|
1999-11-11 00:48:39 +00:00
|
|
|
openssl pkcs8 -in key.pem -topk8 -v2 des3 -out enckey.pem
|
1999-11-10 02:52:17 +00:00
|
|
|
|
2016-05-17 13:15:20 +00:00
|
|
|
Convert a private key to PKCS#5 v2.0 format using AES with 256 bits in CBC
|
|
|
|
mode and B<hmacWithSHA512> PRF:
|
2014-02-28 17:23:54 +00:00
|
|
|
|
2016-05-17 13:15:20 +00:00
|
|
|
openssl pkcs8 -in key.pem -topk8 -v2 aes-256-cbc -v2prf hmacWithSHA512 -out enckey.pem
|
2014-02-28 17:23:54 +00:00
|
|
|
|
1999-11-11 00:48:39 +00:00
|
|
|
Convert a private key to PKCS#8 using a PKCS#5 1.5 compatible algorithm
|
|
|
|
(DES):
|
1999-11-10 02:52:17 +00:00
|
|
|
|
2016-05-17 13:15:20 +00:00
|
|
|
openssl pkcs8 -in key.pem -topk8 -v1 PBE-MD5-DES -out enckey.pem
|
1999-11-10 02:52:17 +00:00
|
|
|
|
1999-12-23 02:02:42 +00:00
|
|
|
Convert a private key to PKCS#8 using a PKCS#12 compatible algorithm
|
|
|
|
(3DES):
|
|
|
|
|
|
|
|
openssl pkcs8 -in key.pem -topk8 -out enckey.pem -v1 PBE-SHA1-3DES
|
|
|
|
|
1999-11-11 00:48:39 +00:00
|
|
|
Read a DER unencrypted PKCS#8 format private key:
|
1999-11-10 02:52:17 +00:00
|
|
|
|
1999-11-11 00:48:39 +00:00
|
|
|
openssl pkcs8 -inform DER -nocrypt -in key.der -out key.pem
|
1999-11-10 02:52:17 +00:00
|
|
|
|
2016-05-17 13:15:20 +00:00
|
|
|
Convert a private key from any PKCS#8 encrypted format to traditional format:
|
1999-11-10 02:52:17 +00:00
|
|
|
|
2016-05-17 13:15:20 +00:00
|
|
|
openssl pkcs8 -in pk8.pem -traditional -out key.pem
|
2016-05-11 11:41:58 +00:00
|
|
|
|
|
|
|
Convert a private key to PKCS#8 format, encrypting with AES-256 and with
|
2014-06-03 22:24:49 +00:00
|
|
|
one million iterations of the password:
|
|
|
|
|
2016-05-17 13:15:20 +00:00
|
|
|
openssl pkcs8 -in key.pem -topk8 -v2 aes-256-cbc -iter 1000000 -out pk8.pem
|
1999-11-10 02:52:17 +00:00
|
|
|
|
1999-11-11 00:48:39 +00:00
|
|
|
=head1 STANDARDS
|
1999-11-10 02:52:17 +00:00
|
|
|
|
2000-02-05 21:07:56 +00:00
|
|
|
Test vectors from this PKCS#5 v2.0 implementation were posted to the
|
|
|
|
pkcs-tng mailing list using triple DES, DES and RC2 with high iteration
|
|
|
|
counts, several people confirmed that they could decrypt the private
|
|
|
|
keys produced and Therefore it can be assumed that the PKCS#5 v2.0
|
|
|
|
implementation is reasonably accurate at least as far as these
|
|
|
|
algorithms are concerned.
|
|
|
|
|
|
|
|
The format of PKCS#8 DSA (and other) private keys is not well documented:
|
2000-02-08 13:37:08 +00:00
|
|
|
it is hidden away in PKCS#11 v2.01, section 11.9. OpenSSL's default DSA
|
|
|
|
PKCS#8 private key format complies with this standard.
|
1999-11-10 02:52:17 +00:00
|
|
|
|
|
|
|
=head1 BUGS
|
|
|
|
|
1999-11-11 00:48:39 +00:00
|
|
|
There should be an option that prints out the encryption algorithm
|
|
|
|
in use and other details such as the iteration count.
|
|
|
|
|
1999-11-10 02:52:17 +00:00
|
|
|
=head1 SEE ALSO
|
|
|
|
|
2015-08-17 19:21:33 +00:00
|
|
|
L<dsa(1)>, L<rsa(1)>, L<genrsa(1)>,
|
2016-05-11 11:41:58 +00:00
|
|
|
L<gendsa(1)>
|
1999-11-10 02:52:17 +00:00
|
|
|
|
2015-05-13 19:27:57 +00:00
|
|
|
=head1 HISTORY
|
|
|
|
|
2018-12-09 00:02:36 +00:00
|
|
|
The B<-iter> option was added in OpenSSL 1.1.0.
|
2015-05-13 19:27:57 +00:00
|
|
|
|
2016-05-18 15:44:05 +00:00
|
|
|
=head1 COPYRIGHT
|
|
|
|
|
2018-09-11 12:22:14 +00:00
|
|
|
Copyright 2000-2018 The OpenSSL Project Authors. All Rights Reserved.
|
2016-05-18 15:44:05 +00:00
|
|
|
|
|
|
|
Licensed under the OpenSSL license (the "License"). You may not use
|
|
|
|
this file except in compliance with the License. You can obtain a copy
|
|
|
|
in the file LICENSE in the source distribution or at
|
|
|
|
L<https://www.openssl.org/source/license.html>.
|
|
|
|
|
|
|
|
=cut
|