gkeytool.1 35 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697
  1. .\" Automatically generated by Pod::Man 2.16 (Pod::Simple 3.05)
  2. .\"
  3. .\" Standard preamble:
  4. .\" ========================================================================
  5. .de Sh \" Subsection heading
  6. .br
  7. .if t .Sp
  8. .ne 5
  9. .PP
  10. \fB\\$1\fR
  11. .PP
  12. ..
  13. .de Sp \" Vertical space (when we can't use .PP)
  14. .if t .sp .5v
  15. .if n .sp
  16. ..
  17. .de Vb \" Begin verbatim text
  18. .ft CW
  19. .nf
  20. .ne \\$1
  21. ..
  22. .de Ve \" End verbatim text
  23. .ft R
  24. .fi
  25. ..
  26. .\" Set up some character translations and predefined strings. \*(-- will
  27. .\" give an unbreakable dash, \*(PI will give pi, \*(L" will give a left
  28. .\" double quote, and \*(R" will give a right double quote. \*(C+ will
  29. .\" give a nicer C++. Capital omega is used to do unbreakable dashes and
  30. .\" therefore won't be available. \*(C` and \*(C' expand to `' in nroff,
  31. .\" nothing in troff, for use with C<>.
  32. .tr \(*W-
  33. .ds C+ C\v'-.1v'\h'-1p'\s-2+\h'-1p'+\s0\v'.1v'\h'-1p'
  34. .ie n \{\
  35. . ds -- \(*W-
  36. . ds PI pi
  37. . if (\n(.H=4u)&(1m=24u) .ds -- \(*W\h'-12u'\(*W\h'-12u'-\" diablo 10 pitch
  38. . if (\n(.H=4u)&(1m=20u) .ds -- \(*W\h'-12u'\(*W\h'-8u'-\" diablo 12 pitch
  39. . ds L" ""
  40. . ds R" ""
  41. . ds C` ""
  42. . ds C' ""
  43. 'br\}
  44. .el\{\
  45. . ds -- \|\(em\|
  46. . ds PI \(*p
  47. . ds L" ``
  48. . ds R" ''
  49. 'br\}
  50. .\"
  51. .\" Escape single quotes in literal strings from groff's Unicode transform.
  52. .ie \n(.g .ds Aq \(aq
  53. .el .ds Aq '
  54. .\"
  55. .\" If the F register is turned on, we'll generate index entries on stderr for
  56. .\" titles (.TH), headers (.SH), subsections (.Sh), items (.Ip), and index
  57. .\" entries marked with X<> in POD. Of course, you'll have to process the
  58. .\" output yourself in some meaningful fashion.
  59. .ie \nF \{\
  60. . de IX
  61. . tm Index:\\$1\t\\n%\t"\\$2"
  62. ..
  63. . nr % 0
  64. . rr F
  65. .\}
  66. .el \{\
  67. . de IX
  68. ..
  69. .\}
  70. .\"
  71. .\" Accent mark definitions (@(#)ms.acc 1.5 88/02/08 SMI; from UCB 4.2).
  72. .\" Fear. Run. Save yourself. No user-serviceable parts.
  73. . \" fudge factors for nroff and troff
  74. .if n \{\
  75. . ds #H 0
  76. . ds #V .8m
  77. . ds #F .3m
  78. . ds #[ \f1
  79. . ds #] \fP
  80. .\}
  81. .if t \{\
  82. . ds #H ((1u-(\\\\n(.fu%2u))*.13m)
  83. . ds #V .6m
  84. . ds #F 0
  85. . ds #[ \&
  86. . ds #] \&
  87. .\}
  88. . \" simple accents for nroff and troff
  89. .if n \{\
  90. . ds ' \&
  91. . ds ` \&
  92. . ds ^ \&
  93. . ds , \&
  94. . ds ~ ~
  95. . ds /
  96. .\}
  97. .if t \{\
  98. . ds ' \\k:\h'-(\\n(.wu*8/10-\*(#H)'\'\h"|\\n:u"
  99. . ds ` \\k:\h'-(\\n(.wu*8/10-\*(#H)'\`\h'|\\n:u'
  100. . ds ^ \\k:\h'-(\\n(.wu*10/11-\*(#H)'^\h'|\\n:u'
  101. . ds , \\k:\h'-(\\n(.wu*8/10)',\h'|\\n:u'
  102. . ds ~ \\k:\h'-(\\n(.wu-\*(#H-.1m)'~\h'|\\n:u'
  103. . ds / \\k:\h'-(\\n(.wu*8/10-\*(#H)'\z\(sl\h'|\\n:u'
  104. .\}
  105. . \" troff and (daisy-wheel) nroff accents
  106. .ds : \\k:\h'-(\\n(.wu*8/10-\*(#H+.1m+\*(#F)'\v'-\*(#V'\z.\h'.2m+\*(#F'.\h'|\\n:u'\v'\*(#V'
  107. .ds 8 \h'\*(#H'\(*b\h'-\*(#H'
  108. .ds o \\k:\h'-(\\n(.wu+\w'\(de'u-\*(#H)/2u'\v'-.3n'\*(#[\z\(de\v'.3n'\h'|\\n:u'\*(#]
  109. .ds d- \h'\*(#H'\(pd\h'-\w'~'u'\v'-.25m'\f2\(hy\fP\v'.25m'\h'-\*(#H'
  110. .ds D- D\\k:\h'-\w'D'u'\v'-.11m'\z\(hy\v'.11m'\h'|\\n:u'
  111. .ds th \*(#[\v'.3m'\s+1I\s-1\v'-.3m'\h'-(\w'I'u*2/3)'\s-1o\s+1\*(#]
  112. .ds Th \*(#[\s+2I\s-2\h'-\w'I'u*3/5'\v'-.3m'o\v'.3m'\*(#]
  113. .ds ae a\h'-(\w'a'u*4/10)'e
  114. .ds Ae A\h'-(\w'A'u*4/10)'E
  115. . \" corrections for vroff
  116. .if v .ds ~ \\k:\h'-(\\n(.wu*9/10-\*(#H)'\s-2\u~\d\s+2\h'|\\n:u'
  117. .if v .ds ^ \\k:\h'-(\\n(.wu*10/11-\*(#H)'\v'-.4m'^\v'.4m'\h'|\\n:u'
  118. . \" for low resolution devices (crt and lpr)
  119. .if \n(.H>23 .if \n(.V>19 \
  120. \{\
  121. . ds : e
  122. . ds 8 ss
  123. . ds o a
  124. . ds d- d\h'-1'\(ga
  125. . ds D- D\h'-1'\(hy
  126. . ds th \o'bp'
  127. . ds Th \o'LP'
  128. . ds ae ae
  129. . ds Ae AE
  130. .\}
  131. .rm #[ #] #H #V #F C
  132. .\" ========================================================================
  133. .\"
  134. .IX Title "GKEYTOOL 1"
  135. .TH GKEYTOOL 1 "2015-07-16" "0.99.1-pre" "GNU"
  136. .\" For nroff, turn off justification. Always turn off hyphenation; it makes
  137. .\" way too many mistakes in technical documents.
  138. .if n .ad l
  139. .nh
  140. .SH "NAME"
  141. gkeytool \- Manage private keys and public certificates
  142. .SH "SYNOPSIS"
  143. .IX Header "SYNOPSIS"
  144. keytool [\fI\s-1COMMAND\s0\fR] ...
  145. .SH "DESCRIPTION"
  146. .IX Header "DESCRIPTION"
  147. Cryptographic credentials, in a Java environment, are usually stored in a \fIKey Store\fR. The Java \s-1SDK\s0 specifies a \fIKey Store\fR as a persistent container of two types of objects: \fIKey Entries\fR and \fITrusted Certificates\fR. The security tool \fBkeytool\fR is a Java-based application for managing those types of objects.
  148. .PP
  149. A \fIKey Entry\fR represents the private key part of a key-pair used in Public-Key Cryptography, and a signed X.509 certificate which authenticates the public key part for a known entity; i.e. the owner of the key-pair. The X.509 certificate itself contains the public key part of the key-pair.
  150. .PP
  151. A \fITrusted Certificate\fR is a signed X.509 certificate issued by a trusted entity. The \fITrust\fR in this context is relative to the User of the \fBkeytool\fR. In other words, the existence of a \fITrusted Certificate\fR in the \fIKey Store\fR processed by a \fBkeytool\fR command implies that the User trusts the \fIIssuer\fR of that \fITrusted Certificate\fR to also sign, and hence authenticates, other \fISubjects\fR the tool may process.
  152. .PP
  153. \&\fITrusted Certificates\fR are important because they allow the tool to mechanically construct \fIChains of Trust\fR starting from one of the \fITrusted Certificates\fR in a \fIKey Store\fR and ending with a certificate whose \fIIssuer\fR is potentially unknown. A valid chain is an ordered list, starting with a \fITrusted Certificate\fR (also called the \fIanchor\fR), ending with the target certificate, and satisfying the condition that the \fISubject\fR of certificate \f(CW\*(C`#i\*(C'\fR is the \fIIssuer\fR of certificate \f(CW\*(C`#i + 1\*(C'\fR.
  154. .PP
  155. The \fBkeytool\fR is invoked from the command line as follows:
  156. .PP
  157. .Vb 1
  158. \& keytool [COMMAND] ...
  159. .Ve
  160. .PP
  161. Multiple \fI\s-1COMMAND\s0\fRs may be specified at once, each complete with its own options. \fBkeytool\fR will parse all the arguments, before processing, and executing, each \f(CW\*(C`COMMAND\*(C'\fR. If an exception occurs while executing one \fI\s-1COMMAND\s0\fR \fBkeytool\fR will abort. Note however that because the implementation of the tool uses code to parse command line options that also supports GNU-style options, you have to separate each command group with a double-hyphen; e.g
  162. .PP
  163. .Vb 1
  164. \& keytool \-list \-\- \-printcert \-alias mykey
  165. .Ve
  166. .SH "OPTIONS"
  167. .IX Header "OPTIONS"
  168. .IP "\- Add/Update commands" 4
  169. .IX Item "- Add/Update commands"
  170. .RS 4
  171. .PD 0
  172. .IP "\fB\-genkey [\fR\fI\s-1OPTION\s0\fR\fB]...\fR" 4
  173. .IX Item "-genkey [OPTION]..."
  174. .PD
  175. Generate a new \fIKey Entry\fR, eventually creating a new key store.
  176. .IP "\fB\-import [\fR\fI\s-1OPTION\s0\fR\fB]...\fR" 4
  177. .IX Item "-import [OPTION]..."
  178. Add, to a key store, \fIKey Entries\fR (private keys and certificate chains authenticating the public keys) and \fITrusted Certificates\fR (3rd party certificates which can be used as \fITrust Anchors\fR when building chains-of-trust).
  179. .IP "\fB\-selfcert [\fR\fI\s-1OPTION\s0\fR\fB]...\fR" 4
  180. .IX Item "-selfcert [OPTION]..."
  181. Generate a new self-signed \fITrusted Certificate\fR.
  182. .IP "\fB\-cacert [\fR\fI\s-1OPTION\s0\fR\fB]...\fR" 4
  183. .IX Item "-cacert [OPTION]..."
  184. Import a \s-1CA\s0 \fITrusted Certificate\fR.
  185. .IP "\fB\-identitydb [\fR\fI\s-1OPTION\s0\fR\fB]...\fR" 4
  186. .IX Item "-identitydb [OPTION]..."
  187. \&\fB\s-1NOT\s0 \s-1IMPLEMENTED\s0 \s-1YET\s0\fR.Import a \s-1JDK\s0 1.1 style Identity Database.
  188. .RE
  189. .RS 4
  190. .RE
  191. .IP "\- Export commands" 4
  192. .IX Item "- Export commands"
  193. .RS 4
  194. .PD 0
  195. .IP "\fB\-certreq [\fR\fI\s-1OPTION\s0\fR\fB]...\fR" 4
  196. .IX Item "-certreq [OPTION]..."
  197. .PD
  198. Issue a \fICertificate Signing Request\fR (\s-1CSR\s0) which can be then sent to a \fICertification Authority\fR (\s-1CA\s0) to issue a certificate signed (by the \s-1CA\s0) and authenticating the \fISubject\fR of the request.
  199. .IP "\fB\-export [\fR\fI\s-1OPTION\s0\fR\fB]...\fR" 4
  200. .IX Item "-export [OPTION]..."
  201. Export a certificate from a key store.
  202. .RE
  203. .RS 4
  204. .RE
  205. .IP "\- Display commands" 4
  206. .IX Item "- Display commands"
  207. .RS 4
  208. .PD 0
  209. .IP "\fB\-list [\fR\fI\s-1OPTION\s0\fR\fB]...\fR" 4
  210. .IX Item "-list [OPTION]..."
  211. .PD
  212. Print one or all certificates in a key store to \f(CW\*(C`STDOUT\*(C'\fR.
  213. .IP "\fB\-printcert [\fR\fI\s-1OPTION\s0\fR\fB]...\fR" 4
  214. .IX Item "-printcert [OPTION]..."
  215. Print a human-readable form of a certificate, in a designated file, to \f(CW\*(C`STDOUT\*(C'\fR.
  216. .RE
  217. .RS 4
  218. .RE
  219. .IP "\- Management commands" 4
  220. .IX Item "- Management commands"
  221. .RS 4
  222. .PD 0
  223. .IP "\fB\-keyclone [\fR\fI\s-1OPTION\s0\fR\fB]...\fR" 4
  224. .IX Item "-keyclone [OPTION]..."
  225. .PD
  226. Clone a \fIKey Entry\fR in a key store.
  227. .IP "\fB\-storepasswd [\fR\fI\s-1OPTION\s0\fR\fB]...\fR" 4
  228. .IX Item "-storepasswd [OPTION]..."
  229. Change the password protecting a key store.
  230. .IP "\fB\-keypasswd [\fR\fI\s-1OPTION\s0\fR\fB]...\fR" 4
  231. .IX Item "-keypasswd [OPTION]..."
  232. Change the password protecting a \fIKey Entry\fR in a key store.
  233. .IP "\fB\-delete [\fR\fI\s-1OPTION\s0\fR\fB]...\fR" 4
  234. .IX Item "-delete [OPTION]..."
  235. Delete a \fIKey Entry\fR or a \fITrusted Certificate\fR from a key store.
  236. .RE
  237. .RS 4
  238. .RE
  239. .PP
  240. \fICommon options\fR
  241. .IX Subsection "Common options"
  242. .PP
  243. The following \fB\s-1OPTION\s0\fRs are used in more than one \fB\s-1COMMAND\s0\fR. They are described here to reduce redundancy.
  244. .IP "\fB\-alias\fR \fIAlias\fR" 4
  245. .IX Item "-alias Alias"
  246. Every entry, be it a \fIKey Entry\fR or a \fITrusted Certificate\fR, in a key store is uniquely identified by a user-defined \fIAlias\fR string. Use this option to specify the \fIAlias\fR to use when referring to an entry in the key store. Unless specified otherwise, a default value of \f(CW\*(C`mykey\*(C'\fR shall be used when this option is omitted from the command line.
  247. .IP "\fB\-keyalg\fR \fI\s-1ALGORITHM\s0\fR" 4
  248. .IX Item "-keyalg ALGORITHM"
  249. Use this option to specify the canonical name of the key-pair generation algorithm. The default value for this option is \f(CW\*(C`DSS\*(C'\fR (a synonym for the Digital Signature Algorithm also known as \s-1DSA\s0).
  250. .IP "\fB\-keysize\fR \fI\s-1SIZE\s0\fR" 4
  251. .IX Item "-keysize SIZE"
  252. Use this option to specify the number of bits of the shared modulus (for both the public and private keys) to use when generating new keys. A default value of \f(CW1024\fR will be used if this option is omitted from the command line.
  253. .IP "\fB\-validity\fR \fI\s-1DAY_COUNT\s0\fR" 4
  254. .IX Item "-validity DAY_COUNT"
  255. Use this option to specify the number of days a newly generated certificate will be valid for. The default value is \f(CW90\fR (days) if this option is omitted from the command line.
  256. .IP "\fB\-storetype\fR \fI\s-1STORE_TYPE\s0\fR" 4
  257. .IX Item "-storetype STORE_TYPE"
  258. Use this option to specify the type of the key store to use. The default value, if this option is omitted, is that of the property \f(CW\*(C`keystore.type\*(C'\fR in the security properties file, which is obtained by invoking the static method call \f(CW\*(C`getDefaultType()\*(C'\fR in \f(CW\*(C`java.security.KeyStore\*(C'\fR.
  259. .IP "\fB\-storepass\fR \fI\s-1PASSWORD\s0\fR" 4
  260. .IX Item "-storepass PASSWORD"
  261. Use this option to specify the password protecting the key store. If this option is omitted from the command line, you will be prompted to provide a password.
  262. .IP "\fB\-keystore\fR \fI\s-1URL\s0\fR" 4
  263. .IX Item "-keystore URL"
  264. Use this option to specify the location of the key store to use. The default value is a file \s-1URL\s0 referencing the file named \fI.keystore\fR located in the path returned by the call to \f(CW\*(C`java.lang.System#getProperty(String)\*(C'\fR using \f(CW\*(C`user.home\*(C'\fR as argument.
  265. .Sp
  266. If a \s-1URL\s0 was specified, but was found to be malformed \-\-e.g. missing protocol element\*(-- the tool will attempt to use the \s-1URL\s0 value as a file-name (with absolute or relative path-name) of a key store \-\-as if the protocol was \f(CW\*(C`file:\*(C'\fR.
  267. .IP "\fB\-provider\fR \fI\s-1PROVIDER_CLASS_NAME\s0\fR" 4
  268. .IX Item "-provider PROVIDER_CLASS_NAME"
  269. A fully qualified class name of a \fISecurity Provider\fR to add to the current list of \fISecurity Providers\fR already installed in the \s-1JVM\s0 in-use. If a provider class is specified with this option, and was successfully added to the runtime \-\-i.e. it was not already installed\*(-- then the tool will attempt to removed this \fISecurity Provider\fR before exiting.
  270. .IP "\fB\-file\fR \fI\s-1FILE\s0\fR" 4
  271. .IX Item "-file FILE"
  272. Use this option to designate a file to use with a command. When specified with this option, the value is expected to be the fully qualified path of a file accessible by the File System. Depending on the command, the file may be used as input or as output. When this option is omitted from the command line, \f(CW\*(C`STDIN\*(C'\fR will be used instead, as the source of input, and \f(CW\*(C`STDOUT\*(C'\fR will be used instead as the output destination.
  273. .IP "\fB\-v\fR" 4
  274. .IX Item "-v"
  275. Unless specified otherwise, use this option to enable more verbose output.
  276. .PP
  277. \fIAdd/Update commands\fR
  278. .IX Subsection "Add/Update commands"
  279. .PP
  280. The \fB\-genkey\fR command
  281. .IX Subsection "The -genkey command"
  282. .PP
  283. Use this command to generate a new key-pair (both private and public keys), and save these credentials in the key store as a \fIKey Entry\fR, associated with the designated (if was specified with the \fB\-alias\fR option) or default (if the \fB\-alias\fR option is omitted) \fIAlias\fR.
  284. .PP
  285. The private key material will be protected with a user-defined password (see \fB\-keypass\fR option). The public key on the other hand will be part of a self-signed X.509 certificate, which will form a 1\-element chain and will be saved in the key store.
  286. .IP "\fB\-alias\fR \fI\s-1ALIAS\s0\fR" 4
  287. .IX Item "-alias ALIAS"
  288. See \fICommon Options\fR for more details.
  289. .IP "\fB\-keyalg\fR \fI\s-1ALGORITHM\s0\fR" 4
  290. .IX Item "-keyalg ALGORITHM"
  291. See \fICommon Options\fR for more details.
  292. .IP "\fB\-keysize\fR \fI\s-1KEY_SIZE\s0\fR" 4
  293. .IX Item "-keysize KEY_SIZE"
  294. See \fICommon Options\fR for more details.
  295. .IP "\fB\-sigalg\fR \fI\s-1ALGORITHM\s0\fR" 4
  296. .IX Item "-sigalg ALGORITHM"
  297. The canonical name of the digital signature algorithm to use for signing certificates. If this option is omitted, a default value will be chosen based on the type of the key-pair; i.e., the algorithm that ends up being used by the \-keyalg option. If the key-pair generation algorithm is \f(CW\*(C`DSA\*(C'\fR, the value for the signature algorithm will be \f(CW\*(C`SHA1withDSA\*(C'\fR. If on the other hand the key-pair generation algorithm is \f(CW\*(C`RSA\*(C'\fR, then the tool will use \f(CW\*(C`MD5withRSA\*(C'\fR as the signature algorithm.
  298. .IP "\fB\-dname\fR \fI\s-1NAME\s0\fR" 4
  299. .IX Item "-dname NAME"
  300. This a mandatory value for the command. If no value is specified \-\-i.e. the \fB\-dname\fR option is omitted\*(-- the tool will prompt you to enter a \fIDistinguished Name\fR to use as both the \fIOwner\fR and \fIIssuer\fR of the generated self-signed certificate.
  301. .Sp
  302. See \fICommon Options\fR for more details.
  303. .IP "\fB\-keypass\fR \fI\s-1PASSWORD\s0\fR" 4
  304. .IX Item "-keypass PASSWORD"
  305. Use this option to specify the password which the tool will use to protect the newly created \fIKey Entry\fR.
  306. .Sp
  307. If this option is omitted, you will be prompted to provide a password.
  308. .IP "\fB\-validity\fR \fI\s-1DAY_COUNT\s0\fR" 4
  309. .IX Item "-validity DAY_COUNT"
  310. See \fICommon Options\fR for more details.
  311. .IP "\fB\-storetype\fR \fI\s-1STORE_TYPE\s0\fR" 4
  312. .IX Item "-storetype STORE_TYPE"
  313. See \fICommon Options\fR for more details.
  314. .IP "\fB\-keystore\fR \fI\s-1URL\s0\fR" 4
  315. .IX Item "-keystore URL"
  316. See \fICommon Options\fR for more details.
  317. .IP "\fB\-storepass\fR \fI\s-1PASSWORD\s0\fR" 4
  318. .IX Item "-storepass PASSWORD"
  319. See \fICommon Options\fR for more details.
  320. .IP "\fB\-provider\fR \fI\s-1PROVIDER_CLASS_NAME\s0\fR" 4
  321. .IX Item "-provider PROVIDER_CLASS_NAME"
  322. See \fICommon Options\fR for more details.
  323. .IP "\fB\-v\fR" 4
  324. .IX Item "-v"
  325. See \fICommon Options\fR for more details.
  326. .PP
  327. The \fB\-import\fR command
  328. .IX Subsection "The -import command"
  329. .PP
  330. Use this command to read an X.509 certificate, or a PKCS#7 \fICertificate Reply\fR from a designated input source and incorporate the certificates into the key store.
  331. .PP
  332. If the \fIAlias\fR does not already exist in the key store, the tool treats the certificate read from the input source as a new \fITrusted Certificate\fR. It then attempts to discover a chain-of-trust, starting from that certificate and ending at another \fITrusted Certificate\fR, already stored in the key store. If the \fB\-trustcacerts\fR option is present, an additional key store, of type \f(CW\*(C`JKS\*(C'\fR named \fIcacerts\fR, and assumed to be present in \fI${\s-1JAVA_HOME\s0}/lib/security\fR will also be consulted if found \-\-\f(CW\*(C`${JAVA_HOME}\*(C'\fR refers to the location of an installed \fIJava Runtime Environment\fR (\s-1JRE\s0). If no chain-of-trust can be established, and unless the \f(CW\*(C`\-noprompt\*(C'\fR option has been specified, the certificate is printed to \f(CW\*(C`STDOUT\*(C'\fR and the user is prompted for a confirmation.
  333. .PP
  334. If \fIAlias\fR exists in the key store, the tool will treat the certificate(s) read from the input source as a \fICertificate Reply\fR, which can be a chain of certificates, that eventually would replace the chain of certificates associated with the \fIKey Entry\fR of that \fIAlias\fR. The substitution of the certificates only occurs if a chain-of-trust can be established between the bottom certificate of the chain read from the input file and the \fITrusted Certificates\fR already present in the key store. Again, if the \fB\-trustcacerts\fR option is specified, additional \fITrusted Certificates\fR in the same \fIcacerts\fR key store will be considered. If no chain-of-trust can be established, the operation will abort.
  335. .IP "\fB\-alias\fR \fI\s-1ALIAS\s0\fR" 4
  336. .IX Item "-alias ALIAS"
  337. See \fICommon Options\fR for more details.
  338. .IP "\fB\-file\fR \fI\s-1FILE\s0\fR" 4
  339. .IX Item "-file FILE"
  340. See \fICommon Options\fR for more details.
  341. .IP "\fB\-keypass\fR \fI\s-1PASSWORD\s0\fR" 4
  342. .IX Item "-keypass PASSWORD"
  343. Use this option to specify the password which the tool will use to protect the \fIKey Entry\fR associated with the designated \fIAlias\fR, when replacing this \fIAlias\fR' chain of certificates with that found in the certificate reply.
  344. .Sp
  345. If this option is omitted, and the chain-of-trust for the certificate reply has been established, the tool will first attempt to unlock the \fIKey Entry\fR using the same password protecting the key store. If this fails, you will then be prompted to provide a password.
  346. .IP "\fB\-noprompt\fR" 4
  347. .IX Item "-noprompt"
  348. Use this option to prevent the tool from prompting the user.
  349. .IP "\fB\-trustcacerts\fR" 4
  350. .IX Item "-trustcacerts"
  351. Use this option to indicate to the tool that a key store, of type \f(CW\*(C`JKS\*(C'\fR, named \fIcacerts\fR, and usually located in \fIlib/security\fR in an installed \fIJava Runtime Environment\fR should be considered when trying to establish chain-of-trusts.
  352. .IP "\fB\-storetype\fR \fI\s-1STORE_TYPE\s0\fR" 4
  353. .IX Item "-storetype STORE_TYPE"
  354. See \fICommon Options\fR for more details.
  355. .IP "\fB\-keystore\fR \fI\s-1URL\s0\fR" 4
  356. .IX Item "-keystore URL"
  357. See \fICommon Options\fR for more details.
  358. .IP "\fB\-storepass\fR \fI\s-1PASSWORD\s0\fR" 4
  359. .IX Item "-storepass PASSWORD"
  360. See \fICommon Options\fR for more details.
  361. .IP "\fB\-provider\fR \fI\s-1PROVIDER_CLASS_NAME\s0\fR" 4
  362. .IX Item "-provider PROVIDER_CLASS_NAME"
  363. See \fICommon Options\fR for more details.
  364. .IP "\fB\-v\fR" 4
  365. .IX Item "-v"
  366. See \fICommon Options\fR for more details.
  367. .PP
  368. The \fB\-selfcert\fR command
  369. .IX Subsection "The -selfcert command"
  370. .PP
  371. Use this command to generate a self-signed X.509 version 1 certificate. The newly generated certificate will form a chain of one element which will replace the previous chain associated with the designated \fIAlias\fR (if \fB\-alias\fR option was specified), or the default \fIAlias\fR (if \fB\-alias\fR option was omitted).
  372. .IP "\fB\-alias\fR \fI\s-1ALIAS\s0\fR" 4
  373. .IX Item "-alias ALIAS"
  374. See \fICommon Options\fR for more details.
  375. .IP "\fB\-sigalg\fR \fI\s-1ALGORITHM\s0\fR" 4
  376. .IX Item "-sigalg ALGORITHM"
  377. The canonical name of the digital signature algorithm to use for signing the certificate. If this option is omitted, a default value will be chosen based on the type of the private key associated with the designated \fIAlias\fR. If the private key is a \f(CW\*(C`DSA\*(C'\fR one, the value for the signature algorithm will be \f(CW\*(C`SHA1withDSA\*(C'\fR. If on the other hand the private key is an \f(CW\*(C`RSA\*(C'\fR one, then the tool will use \f(CW\*(C`MD5withRSA\*(C'\fR as the signature algorithm.
  378. .IP "\fB\-dname\fR \fI\s-1NAME\s0\fR" 4
  379. .IX Item "-dname NAME"
  380. Use this option to specify the \fIDistinguished Name\fR of the newly generated self-signed certificate. If this option is omitted, the existing \fIDistinguished Name\fR of the base certificate in the chain associated with the designated \fIAlias\fR will be used instead.
  381. .Sp
  382. See \fICommon Options\fR for more details.
  383. .IP "\fB\-validity\fR \fI\s-1DAY_COUNT\s0\fR" 4
  384. .IX Item "-validity DAY_COUNT"
  385. See \fICommon Options\fR for more details.
  386. .IP "\fB\-keypass\fR \fI\s-1PASSWORD\s0\fR" 4
  387. .IX Item "-keypass PASSWORD"
  388. Use this option to specify the password which the tool will use to unlock the \fIKey Entry\fR associated with the designated \fIAlias\fR.
  389. .Sp
  390. If this option is omitted, the tool will first attempt to unlock the \fIKey Entry\fR using the same password protecting the key store. If this fails, you will then be prompted to provide a password.
  391. .IP "\fB\-storetype\fR \fI\s-1STORE_TYPE\s0\fR" 4
  392. .IX Item "-storetype STORE_TYPE"
  393. See \fICommon Options\fR for more details.
  394. .IP "\fB\-keystore\fR \fI\s-1URL\s0\fR" 4
  395. .IX Item "-keystore URL"
  396. See \fICommon Options\fR for more details.
  397. .IP "\fB\-storepass\fR \fI\s-1PASSWORD\s0\fR" 4
  398. .IX Item "-storepass PASSWORD"
  399. See \fICommon Options\fR for more details.
  400. .IP "\fB\-provider\fR \fI\s-1PROVIDER_CLASS_NAME\s0\fR" 4
  401. .IX Item "-provider PROVIDER_CLASS_NAME"
  402. See \fICommon Options\fR for more details.
  403. .IP "\fB\-v\fR" 4
  404. .IX Item "-v"
  405. See \fICommon Options\fR for more details.
  406. .PP
  407. The \fB\-cacert\fR command
  408. .IX Subsection "The -cacert command"
  409. .PP
  410. Use this command to import, a \s-1CA\s0 certificate and add it to the key store as a \fITrusted Certificate\fR. The \fIAlias\fR for this new entry will be constructed from the \s-1FILE\s0's base-name after replacing hyphens and dots with underscores.
  411. .PP
  412. This command is useful when used in a script that recursively visits a directory of \s-1CA\s0 certificates to populate a \f(CW\*(C`cacerts.gkr\*(C'\fR \fIKey Store\fR of trusted certificates which can then be used commands that specify the \fB\-trustcacerts\fR option.
  413. .IP "\fB\-file\fR \fI\s-1FILE\s0\fR" 4
  414. .IX Item "-file FILE"
  415. See \fICommon Options\fR for more details.
  416. .IP "\fB\-storetype\fR \fI\s-1STORE_TYPE\s0\fR" 4
  417. .IX Item "-storetype STORE_TYPE"
  418. See \fICommon Options\fR for more details.
  419. .IP "\fB\-keystore\fR \fI\s-1URL\s0\fR" 4
  420. .IX Item "-keystore URL"
  421. See \fICommon Options\fR for more details.
  422. .IP "\fB\-storepass\fR \fI\s-1PASSWORD\s0\fR" 4
  423. .IX Item "-storepass PASSWORD"
  424. See \fICommon Options\fR for more details.
  425. .IP "\fB\-provider\fR \fI\s-1PROVIDER_CLASS_NAME\s0\fR" 4
  426. .IX Item "-provider PROVIDER_CLASS_NAME"
  427. See \fICommon Options\fR for more details.
  428. .IP "\fB\-v\fR" 4
  429. .IX Item "-v"
  430. See \fICommon Options\fR for more details.
  431. .PP
  432. The \fB\-identitydb\fR command
  433. .IX Subsection "The -identitydb command"
  434. .PP
  435. \&\fB\s-1NOT\s0 \s-1IMPLEMENTED\s0 \s-1YET\s0\fR.
  436. .PP
  437. Use this command to import a \s-1JDK\s0 1.1 style Identity Database.
  438. .IP "\fB\-file\fR \fI\s-1FILE\s0\fR" 4
  439. .IX Item "-file FILE"
  440. See \fICommon Options\fR for more details.
  441. .IP "\fB\-storetype\fR \fI\s-1STORE_TYPE\s0\fR" 4
  442. .IX Item "-storetype STORE_TYPE"
  443. See \fICommon Options\fR for more details.
  444. .IP "\fB\-keystore\fR \fI\s-1URL\s0\fR" 4
  445. .IX Item "-keystore URL"
  446. See \fICommon Options\fR for more details.
  447. .IP "\fB\-storepass\fR \fI\s-1PASSWORD\s0\fR" 4
  448. .IX Item "-storepass PASSWORD"
  449. See \fICommon Options\fR for more details.
  450. .IP "\fB\-provider\fR \fI\s-1PROVIDER_CLASS_NAME\s0\fR" 4
  451. .IX Item "-provider PROVIDER_CLASS_NAME"
  452. See \fICommon Options\fR for more details.
  453. .IP "\fB\-v\fR" 4
  454. .IX Item "-v"
  455. See \fICommon Options\fR for more details.
  456. .PP
  457. \fIExport commands\fR
  458. .IX Subsection "Export commands"
  459. .PP
  460. The \fB\-certreq\fR command
  461. .IX Subsection "The -certreq command"
  462. .PP
  463. Use this command to generate a PKCS#10 \fICertificate Signing Request\fR (\s-1CSR\s0) and write it to a designated output destination. The contents of the destination should look something like the following:
  464. .PP
  465. .Vb 6
  466. \& \-\-\-\-\-BEGIN NEW CERTIFICATE REQUEST\-\-\-\-\-
  467. \& MI...QAwXzEUMBIGA1UEAwwLcnNuQGdudS5vcmcxGzAZBgNVBAoMElUg
  468. \& Q2...A0GA1UEBwwGU3lkbmV5MQwwCgYDVQQIDANOU1cxCzAJBgNVBACC
  469. \& ...
  470. \& FC...IVwNVOfQLRX+O5kAhQ/a4RTZme2L8PnpvgRwrf7Eg8D6w==
  471. \& \-\-\-\-\-END NEW CERTIFICATE REQUEST\-\-\-\-\-
  472. .Ve
  473. .PP
  474. \&\fB\s-1IMPORTANT\s0\fR: Some documentation (e.g. \s-1RSA\s0 examples) claims that the \f(CW\*(C`Attributes\*(C'\fR field, in the \s-1CSR\s0 is \f(CW\*(C`OPTIONAL\*(C'\fR while \s-1RFC\-2986\s0 implies the opposite. This implementation considers this field, by default, as \f(CW\*(C`OPTIONAL\*(C'\fR, unless the option \fB\-attributes\fR is specified on the command line.
  475. .IP "\fB\-alias\fR \fI\s-1ALIAS\s0\fR" 4
  476. .IX Item "-alias ALIAS"
  477. See \fICommon Options\fR for more details.
  478. .IP "\fB\-sigalg\fR \fI\s-1ALGORITHM\s0\fR" 4
  479. .IX Item "-sigalg ALGORITHM"
  480. The canonical name of the digital signature algorithm to use for signing the certificate. If this option is omitted, a default value will be chosen based on the type of the private key associated with the designated \fIAlias\fR. If the private key is a \f(CW\*(C`DSA\*(C'\fR one, the value for the signature algorithm will be \f(CW\*(C`SHA1withDSA\*(C'\fR. If on the other hand the private key is an \f(CW\*(C`RSA\*(C'\fR one, then the tool will use \f(CW\*(C`MD5withRSA\*(C'\fR as the signature algorithm.
  481. .IP "\fB\-file\fR \fI\s-1FILE\s0\fR" 4
  482. .IX Item "-file FILE"
  483. See \fICommon Options\fR for more details.
  484. .IP "\fB\-keypass\fR \fI\s-1PASSWORD\s0\fR" 4
  485. .IX Item "-keypass PASSWORD"
  486. Use this option to specify the password which the tool will use to unlock the \fIKey Entry\fR associated with the designated \fIAlias\fR.
  487. .Sp
  488. If this option is omitted, the tool will first attempt to unlock the \fIKey Entry\fR using the same password protecting the key store. If this fails, you will then be prompted to provide a password.
  489. .IP "\fB\-storetype\fR \fI\s-1STORE_TYPE\s0\fR" 4
  490. .IX Item "-storetype STORE_TYPE"
  491. See \fICommon Options\fR for more details.
  492. .IP "\fB\-keystore\fR \fI\s-1URL\s0\fR" 4
  493. .IX Item "-keystore URL"
  494. See \fICommon Options\fR for more details.
  495. .IP "\fB\-storepass\fR \fI\s-1PASSWORD\s0\fR" 4
  496. .IX Item "-storepass PASSWORD"
  497. See \fICommon Options\fR for more details.
  498. .IP "\fB\-provider\fR \fI\s-1PROVIDER_CLASS_NAME\s0\fR" 4
  499. .IX Item "-provider PROVIDER_CLASS_NAME"
  500. See \fICommon Options\fR for more details.
  501. .IP "\fB\-v\fR" 4
  502. .IX Item "-v"
  503. See \fICommon Options\fR for more details.
  504. .IP "\fB\-attributes\fR" 4
  505. .IX Item "-attributes"
  506. Use this option to force the tool to encode a \f(CW\*(C`NULL\*(C'\fR \s-1DER\s0 value in the \s-1CSR\s0 as the value of the \f(CW\*(C`Attributes\*(C'\fR field.
  507. .PP
  508. The \fB\-export\fR command
  509. .IX Subsection "The -export command"
  510. .PP
  511. Use this command to export a certificate stored in a key store to a designated output destination, either in binary format (if the \fB\-v\fR option is specified), or in \s-1RFC\-1421\s0 compliant encoding (if the \fB\-rfc\fR option is specified instead).
  512. .IP "\fB\-alias\fR \fI\s-1ALIAS\s0\fR" 4
  513. .IX Item "-alias ALIAS"
  514. See \fICommon Options\fR for more details.
  515. .IP "\fB\-file\fR \fI\s-1FILE\s0\fR" 4
  516. .IX Item "-file FILE"
  517. See \fICommon Options\fR for more details.
  518. .IP "\fB\-storetype\fR \fI\s-1STORE_TYPE\s0\fR" 4
  519. .IX Item "-storetype STORE_TYPE"
  520. See \fICommon Options\fR for more details.
  521. .IP "\fB\-keystore\fR \fI\s-1URL\s0\fR" 4
  522. .IX Item "-keystore URL"
  523. See \fICommon Options\fR for more details.
  524. .IP "\fB\-storepass\fR \fI\s-1PASSWORD\s0\fR" 4
  525. .IX Item "-storepass PASSWORD"
  526. See \fICommon Options\fR for more details.
  527. .IP "\fB\-provider\fR \fI\s-1PROVIDER_CLASS_NAME\s0\fR" 4
  528. .IX Item "-provider PROVIDER_CLASS_NAME"
  529. See \fICommon Options\fR for more details.
  530. .IP "\fB\-rfc\fR" 4
  531. .IX Item "-rfc"
  532. Use \s-1RFC\-1421\s0 specifications when encoding the output.
  533. .IP "\fB\-v\fR" 4
  534. .IX Item "-v"
  535. Output the certificate in binary \s-1DER\s0 encoding. This is the default output format of the command if neither \fB\-rfc\fR nor \f(CW\*(C`\-v\*(C'\fR options were detected on the command line. If both this option and the \fB\-rfc\fR option are detected on the command line, the tool will opt for the \s-1RFC\-1421\s0 style encoding.
  536. .PP
  537. \fIDisplay commands\fR
  538. .IX Subsection "Display commands"
  539. .PP
  540. The \fB\-list\fR command
  541. .IX Subsection "The -list command"
  542. .PP
  543. Use this command to print one or all of a key store entries to \f(CW\*(C`STDOUT\*(C'\fR. Usually this command will only print a \fIfingerprint\fR of the certificate, unless either the \fB\-rfc\fR or the \fB\-v\fR option is specified.
  544. .IP "\fB\-alias\fR \fI\s-1ALIAS\s0\fR" 4
  545. .IX Item "-alias ALIAS"
  546. If this option is omitted, the tool will print \s-1ALL\s0 the entries found in the key store.
  547. .Sp
  548. See \fICommon Options\fR for more details.
  549. .IP "\fB\-storetype\fR \fI\s-1STORE_TYPE\s0\fR" 4
  550. .IX Item "-storetype STORE_TYPE"
  551. See \fICommon Options\fR for more details.
  552. .IP "\fB\-keystore\fR \fI\s-1URL\s0\fR" 4
  553. .IX Item "-keystore URL"
  554. See \fICommon Options\fR for more details.
  555. .IP "\fB\-storepass\fR \fI\s-1PASSWORD\s0\fR" 4
  556. .IX Item "-storepass PASSWORD"
  557. See \fICommon Options\fR for more details.
  558. .IP "\fB\-provider\fR \fI\s-1PROVIDER_CLASS_NAME\s0\fR" 4
  559. .IX Item "-provider PROVIDER_CLASS_NAME"
  560. See \fICommon Options\fR for more details.
  561. .IP "\fB\-rfc\fR" 4
  562. .IX Item "-rfc"
  563. Use \s-1RFC\-1421\s0 specifications when encoding the output.
  564. .IP "\fB\-v\fR" 4
  565. .IX Item "-v"
  566. Output the certificate in human-readable format. If both this option and the \fB\-rfc\fR option are detected on the command line, the tool will opt for the human-readable form and will not abort the command.
  567. .PP
  568. The \fB\-printcert\fR command
  569. .IX Subsection "The -printcert command"
  570. .PP
  571. Use this command to read a certificate from a designated input source and print it to \f(CW\*(C`STDOUT\*(C'\fR in a human-readable form.
  572. .IP "\fB\-file\fR \fI\s-1FILE\s0\fR" 4
  573. .IX Item "-file FILE"
  574. See \fICommon Options\fR for more details.
  575. .IP "\fB\-v\fR" 4
  576. .IX Item "-v"
  577. See \fICommon Options\fR for more details.
  578. .PP
  579. \fIManagement commands\fR
  580. .IX Subsection "Management commands"
  581. .PP
  582. The \fB\-keyclone\fR command
  583. .IX Subsection "The -keyclone command"
  584. .PP
  585. Use this command to clone an existing \fIKey Entry\fR and store it under a new (different) \fIAlias\fR protecting, its private key material with possibly a new password.
  586. .IP "\fB\-alias\fR \fI\s-1ALIAS\s0\fR" 4
  587. .IX Item "-alias ALIAS"
  588. See \fICommon Options\fR for more details.
  589. .IP "\fB\-dest\fR \fI\s-1ALIAS\s0\fR" 4
  590. .IX Item "-dest ALIAS"
  591. Use this option to specify the new \fIAlias\fR which will be used to identify the cloned copy of the \fIKey Entry\fR.
  592. .IP "\fB\-keypass\fR \fI\s-1PASSWORD\s0\fR" 4
  593. .IX Item "-keypass PASSWORD"
  594. Use this option to specify the password which the tool will use to unlock the \fIKey Entry\fR associated with the designated \fIAlias\fR.
  595. .Sp
  596. If this option is omitted, the tool will first attempt to unlock the \fIKey Entry\fR using the same password protecting the key store. If this fails, you will then be prompted to provide a password.
  597. .IP "\fB\-new\fR \fI\s-1PASSWORD\s0\fR" 4
  598. .IX Item "-new PASSWORD"
  599. Use this option to specify the password protecting the private key material of the newly cloned copy of the \fIKey Entry\fR.
  600. .IP "\fB\-storetype\fR \fI\s-1STORE_TYPE\s0\fR" 4
  601. .IX Item "-storetype STORE_TYPE"
  602. See \fICommon Options\fR for more details.
  603. .IP "\fB\-keystore\fR \fI\s-1URL\s0\fR" 4
  604. .IX Item "-keystore URL"
  605. See \fICommon Options\fR for more details.
  606. .IP "\fB\-storepass\fR \fI\s-1PASSWORD\s0\fR" 4
  607. .IX Item "-storepass PASSWORD"
  608. See \fICommon Options\fR for more details.
  609. .IP "\fB\-provider\fR \fI\s-1PROVIDER_CLASS_NAME\s0\fR" 4
  610. .IX Item "-provider PROVIDER_CLASS_NAME"
  611. See \fICommon Options\fR for more details.
  612. .IP "\fB\-v\fR" 4
  613. .IX Item "-v"
  614. See \fICommon Options\fR for more details.
  615. .PP
  616. The \fB\-storepasswd\fR command
  617. .IX Subsection "The -storepasswd command"
  618. .PP
  619. Use this command to change the password protecting a key store.
  620. .IP "\fB\-new\fR \fI\s-1PASSWORD\s0\fR" 4
  621. .IX Item "-new PASSWORD"
  622. The new, and different, password which will be used to protect the designated key store.
  623. .IP "\fB\-storetype\fR \fI\s-1STORE_TYPE\s0\fR" 4
  624. .IX Item "-storetype STORE_TYPE"
  625. See \fICommon Options\fR for more details.
  626. .IP "\fB\-keystore\fR \fI\s-1URL\s0\fR" 4
  627. .IX Item "-keystore URL"
  628. See \fICommon Options\fR for more details.
  629. .IP "\fB\-storepass\fR \fI\s-1PASSWORD\s0\fR" 4
  630. .IX Item "-storepass PASSWORD"
  631. See \fICommon Options\fR for more details.
  632. .IP "\fB\-provider\fR \fI\s-1PROVIDER_CLASS_NAME\s0\fR" 4
  633. .IX Item "-provider PROVIDER_CLASS_NAME"
  634. See \fICommon Options\fR for more details.
  635. .IP "\fB\-v\fR" 4
  636. .IX Item "-v"
  637. See \fICommon Options\fR for more details.
  638. .PP
  639. The \fB\-keypasswd\fR command
  640. .IX Subsection "The -keypasswd command"
  641. .PP
  642. Use this command to change the password protecting the private key material of a designated \fIKey Entry\fR.
  643. .IP "\fB\-alias\fR \fI\s-1ALIAS\s0\fR" 4
  644. .IX Item "-alias ALIAS"
  645. See \fICommon Options\fR for more details.
  646. .Sp
  647. Use this option to specify the password which the tool will use to unlock the \fIKey Entry\fR associated with the designated \fIAlias\fR.
  648. .Sp
  649. If this option is omitted, the tool will first attempt to unlock the \fIKey Entry\fR using the same password protecting the key store. If this fails, you will then be prompted to provide a password.
  650. .IP "\fB\-new\fR \fI\s-1PASSWORD\s0\fR" 4
  651. .IX Item "-new PASSWORD"
  652. The new, and different, password which will be used to protect the private key material of the designated \fIKey Entry\fR.
  653. .IP "\fB\-storetype\fR \fI\s-1STORE_TYPE\s0\fR" 4
  654. .IX Item "-storetype STORE_TYPE"
  655. See \fICommon Options\fR for more details.
  656. .IP "\fB\-keystore\fR \fI\s-1URL\s0\fR" 4
  657. .IX Item "-keystore URL"
  658. See \fICommon Options\fR for more details.
  659. .IP "\fB\-storepass\fR \fI\s-1PASSWORD\s0\fR" 4
  660. .IX Item "-storepass PASSWORD"
  661. See \fICommon Options\fR for more details.
  662. .IP "\fB\-provider\fR \fI\s-1PROVIDER_CLASS_NAME\s0\fR" 4
  663. .IX Item "-provider PROVIDER_CLASS_NAME"
  664. See \fICommon Options\fR for more details.
  665. .IP "\fB\-v\fR" 4
  666. .IX Item "-v"
  667. See \fICommon Options\fR for more details.
  668. .PP
  669. The \fB\-delete\fR command
  670. .IX Subsection "The -delete command"
  671. .PP
  672. Use this command to delete a designated key store entry.
  673. .IP "\fB\-alias\fR \fI\s-1ALIAS\s0\fR" 4
  674. .IX Item "-alias ALIAS"
  675. See \fICommon Options\fR for more details.
  676. .IP "\fB\-storetype\fR \fI\s-1STORE_TYPE\s0\fR" 4
  677. .IX Item "-storetype STORE_TYPE"
  678. See \fICommon Options\fR for more details.
  679. .IP "\fB\-keystore\fR \fI\s-1URL\s0\fR" 4
  680. .IX Item "-keystore URL"
  681. See \fICommon Options\fR for more details.
  682. .IP "\fB\-storepass\fR \fI\s-1PASSWORD\s0\fR" 4
  683. .IX Item "-storepass PASSWORD"
  684. See \fICommon Options\fR for more details.
  685. .IP "\fB\-provider\fR \fI\s-1PROVIDER_CLASS_NAME\s0\fR" 4
  686. .IX Item "-provider PROVIDER_CLASS_NAME"
  687. See \fICommon Options\fR for more details.
  688. .IP "\fB\-v\fR" 4
  689. .IX Item "-v"
  690. See \fICommon Options\fR for more details.
  691. .SH "BUGS"
  692. .IX Header "BUGS"
  693. .SH "SEE ALSO"
  694. .IX Header "SEE ALSO"
  695. .SH "AUTHOR"
  696. .IX Header "AUTHOR"