On Sun, 27 Jan 2002, Andy Schneider wrote:

> 
> openssl loads *embed* keys using the PEM keys. An embed key is encrypted private key 
>material. The encryption key (simplification) is either on the smartcard (when the 
>key is card protected) or on the hardware module (for module protected keys). Instead 
>of loading them directly into OpenSSL you load the .pem key that is generated by 
>KeySafe when you create an nCipher key. This .pem key is in fact an alias to the key, 
>it is not key material itself. With OpenSSL apps you use the nCipher app with-nfast 
>to load the embed keys and then execute your openssl application. e.g.
> 
> with-nfast ./yourapp
> (prompts for passphrases follow)
> 

This is what documentation says, but I still need to pass 
something for key ID to HWCryptoHook_RSALoadKey(). Say, I 
create key as follows:

$ generatekey --module 1 --slot 0 embed plainname=foo protect=token recovery=1 
size=1024 type=rsa

now I have files foo.pem, foo_selfcert.pem and foo_req.pem and 
nfkminfo -k shows something like that:

$ nfkminfo -k
[vix@eebik vix]$ nfkminfo -k
Key summary - 1 keys:
 AppName embed                Ident b6621954138bf0e41553115f2c402ed802c1bdb1

How do I load this key with openssl? Operator card does not 
have a passphrase.


-v

-- 
Has anyone ever tasted an "end"?  Are they really bitter?

______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    [EMAIL PROTECTED]
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to