man belpic-pkcs15-crypt (Commandes) - perform crypto operations using pkcs15 smart card

NAME

pkcs15-crypt - perform crypto operations using pkcs15 smart card

SYNOPSIS

[ OPTIONS ]

DESCRIPTION

The utility can be used from the command line to perform cryptographic operations such as computing digital signatures or decrypting data, using keys stored on a PKCS#15 compliant smart card.

OPTIONS

--sign, -s
Perform digital signature operation on the data read from a file specified using the --input option. By default, the contents of the file are assumed to be the result of an MD5 hash operation. Note that expects the data in binary representation, not ASCII.
The digitial signature is stored, in binary representation, in the file specified by the --output option. If this option is not given, the signature is printed on standard output, displaying non-printable characters using their hex notation \\xNN.
--pkcs1
By default, assumes that input data has been padded to the correct length (i.e. when computing an RSA signature using a 1024 bit key, the input must be padded to 128 bytes to match the modulus length). When giving the --pkcs1 option, however, will perform the required padding using the algorithm outlined in the PCKS#1 v1.5 standard.
--sha1
This option tells m that the input file is the result of an SHA1 hash operation, rather than an MD5 hash. Again, the data must be in binary representation.
--decipher, -c
Decrypt the contents of the file specified by the --input option. The result of the decryption operation is written to the file specified by the --output option. If this option is not given, the decrypted data is printed to standard output, displaying non-printable
--key id, -k id
Selects the ID of the key to use.
--reader N, -r N
Selects the N-th smart card reader configured by the system. If unspecified, will use the first reader found.
--input file, -i file
Specifies the input file to use.
--output file, -o file
Any output will be sent to the specified file.
--pin pincode, -p pincode
When the cryptographic operation requires a PIN to access the key, will prompt the user for the PIN on the terminal. Using this option allows you to specify the PIN on the command line.
Note that on most operating systems, the command line of a process can be displayed by any user using the ps(1) command. It is therefore a security risk to specify secret information such as PINs on the command line.
--quiet, -q
Operate quietly.
--debug, -d
Print debugging information. By specifying this option several times, you can increase the verbosity level.

AUTHORS

was written by Juha Yrjölä <juha.yrjola@iki.fi>. This manpage was contributed by Olaf Kirch <okir@lst.de>.