opensc/src/pkcs15init
aj d22a2483c0 Header file cleanup.
git-svn-id: https://www.opensc-project.org/svnp/opensc/trunk@4081 c6295689-39f2-0310-b995-f0e70906c6a9
2010-03-04 08:14:36 +00:00
..
Makefile.am Header file cleanup. 2010-03-04 08:14:36 +00:00
Makefile.mak update windows makefiles: only create one dll. 2010-02-01 15:22:28 +00:00
README - added comment on pkcs12 files 2002-12-04 14:28:08 +00:00
asepcos.profile Create new type "privdata" in all profiles with different 2008-12-28 16:07:51 +00:00
cardos.profile pkcs15init cardos: fix update keys 2010-01-31 20:26:45 +00:00
cyberflex.profile cyberflex: no more 'protect-certificates' profile option 2010-02-20 23:20:38 +00:00
entersafe.profile pkcs15init profile: 'private key' as BSO is differenciated from the one as EF 2010-01-21 10:07:40 +00:00
flex.profile pkcs15init: 'protect-certificates' profile option not used 2010-02-20 23:14:45 +00:00
gpk.profile change base id so it does not overlap with the next one. 2009-03-05 15:15:24 +00:00
incrypto34.profile pkcs15init profile: 'private key' as BSO is differenciated from the one as EF 2010-01-21 10:07:40 +00:00
jcop.profile Create new type "privdata" in all profiles with different 2008-12-28 16:07:51 +00:00
miocos.profile - Small update to MioCOS pkcs15init driver 2002-04-19 18:01:49 +00:00
muscle.profile pkcs15init profile: 'private key' as BSO is differenciated from the one as EF 2010-01-21 10:07:40 +00:00
myeid.profile pkcs15init: instead of static keycache use the pincache as a content of the pkcs15 AUTH object 2010-02-21 18:24:41 +00:00
oberthur.profile pkcs15init: remove profile option 'keep-public-key' that was used only by oberthur 2010-02-02 16:45:47 +00:00
pkcs15-asepcos.c Header file cleanup. 2010-03-04 08:14:36 +00:00
pkcs15-cardos.c Header file cleanup. 2010-03-04 08:14:36 +00:00
pkcs15-cflex.c Header file cleanup. 2010-03-04 08:14:36 +00:00
pkcs15-entersafe.c Header file cleanup. 2010-03-04 08:14:36 +00:00
pkcs15-gpk.c Header file cleanup. 2010-03-04 08:14:36 +00:00
pkcs15-incrypto34.c Header file cleanup. 2010-03-04 08:14:36 +00:00
pkcs15-init.h Header file cleanup. 2010-03-04 08:14:36 +00:00
pkcs15-jcop.c Header file cleanup. 2010-03-04 08:14:36 +00:00
pkcs15-lib.c Header file cleanup. 2010-03-04 08:14:36 +00:00
pkcs15-miocos.c Header file cleanup. 2010-03-04 08:14:36 +00:00
pkcs15-muscle.c Header file cleanup. 2010-03-04 08:14:36 +00:00
pkcs15-myeid.c Header file cleanup. 2010-03-04 08:14:36 +00:00
pkcs15-oberthur.c Header file cleanup. 2010-03-04 08:14:36 +00:00
pkcs15-rtecp.c Header file cleanup. 2010-03-04 08:14:36 +00:00
pkcs15-rutoken.c Header file cleanup. 2010-03-04 08:14:36 +00:00
pkcs15-setcos.c Header file cleanup. 2010-03-04 08:14:36 +00:00
pkcs15-starcos.c Header file cleanup. 2010-03-04 08:14:36 +00:00
pkcs15-westcos.c Header file cleanup. 2010-03-04 08:14:36 +00:00
pkcs15.profile pkcs15init profile: 'private key' as BSO is differenciated from the one as EF 2010-01-21 10:07:40 +00:00
profile.c Header file cleanup. 2010-03-04 08:14:36 +00:00
profile.h Header file cleanup. 2010-03-04 08:14:36 +00:00
rutoken.profile rutoken (S and ECP): both PINs are globals (and addition to changeset 3960, 3946) 2010-02-03 12:10:41 +00:00
rutoken_ecp.profile rutoken (ECP): add 4 DF (reserved for internal use) 2010-02-04 12:18:19 +00:00
setcos.profile sertcos: both PINs are globals 2010-01-29 17:41:05 +00:00
starcos.profile pkcs15init profile: 'private key' as BSO is differenciated from the one as EF 2010-01-21 10:07:40 +00:00
westcos.profile Updated westcos driver by François Leblanc 2009-12-03 07:10:24 +00:00

README


Very brief instructions

To init card:

Erase card and create pkcs15 dir
	./pkcs15-init -EC

Store a PIN on the card, using ID 01
	./pkcs15-init -P  --auth-id 01 --pin aaaa --puk bbbb --label "My PIN"

Generate a 512 bit RSA key and store on card, protected by the above PIN
	./pkcs15-init -G rsa/512 --auth-id 01

Or, store a pkcs12 key/certificate pair
	./pkcs15-init --auth-id 01 -f pkcs12 -S mycert.p12

	Note that the pkcs12 file must use just one password - if you
	use different passwords for integrity and confidentiality,
	OpenSC will fail to import the keys.