Pkcs#12 File Download
In cryptography, PKCS #11 is one of the Public-Key Cryptography Standards,[1] and also refers to the programming interface to create and manipulate cryptographic tokens.
- 1Detail
PKCS7 certificate (or PKCS #7 certificate) is a degenerate form of the PKCS #7 cryptographic message standard defined in RFC 2315.It stores only X.509 certificates (or possibly a certificate revocation list), with no encrypted data. Android devices support secure certificates in PKCS #12 format. Secure certificate files that conform to this standard often use the.p12 or.pfx file extension. (Android™) Load Certificate from PFX (PKCS#12). Loads a digital certificate (and private key, if available) from a PFX file. Chilkat Android™ Downloads. And How Do I Install a PKCS#12 onto My Webserver? A PKCS#12 or.pfx file is a file which contains both private key and X.509 certificate, ready to be installed by the customer into servers such as IIS, Tomkat or Exchange. Certificate signing request (CSR) generation remains one of the consistent problem areas faced by customers wishing to secure their server. PKCS #11 modules are external modules which add to Firefox support for smartcard readers, biometric security devices, and external certificate stores. This article covers the two methods for installing PKCS #11 modules into Firefox. Users can use the preferences dialog to install or remove PKCS #11 module.
Detail[edit]
The PKCS #11 standard defines a platform-independent API to cryptographic tokens, such as hardware security modules (HSM) and smart cards, and names the API itself 'Cryptoki' (from 'cryptographic token interface' and pronounced as 'crypto-key' - but 'PKCS #11' is often used to refer to the API as well as the standard that defines it).
The API defines most commonly used cryptographic object types (RSA keys, X.509 Certificates, DES/Triple DES keys, etc.) and all the functions needed to use, create/generate, modify and delete those objects.
Usage[edit]
Most commercial certificate authority software uses PKCS #11 to access the CA signing key or to enroll user certificates. Cross-platform software that needs to use smart cards uses PKCS #11, such as Mozilla Firefox and OpenSSL (using an extension). It is also used to access smart cards and HSMs. Software written for Microsoft Windows may use the platform specific MS-CAPI API instead. Both Oracle Solaris and Red Hat Enterprise Linux contain implementations for use by applications, as well.
Fast and furious 5 download torrent free. Jul 23, 2017 - The Fast and the Furious (also known as Fast and Furious) is an. FAST & FURIOUS (2009) [IMDB: 6.6/10]. DOWNLOAD 720px.
Relationship to KMIP[edit]
The Key Management Interoperability Protocol (KMIP) defines a wire protocol that has similar functionality to the PKCS#11 API. The two standards were originally developed independently but are now both governed by an OASIS technical committee. It is the stated objective of both the PKCS#11 and KMIP committees to align the standards where practicable. For example, the PKCS#11 Sensitive and Extractable attributes are being added to KMIP version 1.4. There is considerable overlap between members of the two technical committees.
History[edit]
The PKCS#11 standard originated from RSA Security along with its other PKCS standards in 1994. In 2013, RSA contributed the latest draft revision of the standard (PKCS#11 2.30) to OASIS to continue the work on the standard within the newly created OASIS PKCS11 Technical Committee.[2] The following list contains significant revision information:
- 01/1994: project launched
- 04/1995: v1.0 published
- 12/1997: v2.01 published
- 12/1999: v2.10 published
- 01/2001: v2.11 published
- 06/2004: v2.20 published[1]
- 12/2005: amendments 1 & 2 (one-time password tokens, CT-KIP [3])
- 01/2007: amendment 3 (additional mechanisms)
- 09/2009: v2.30 draft published for review, but final version never published
- 12/2012: RSA announce that PKCS #11 management is being transitioned to OASIS[4]
- 03/2013: OASIS PKCS #11 Technical Committee Inaugural meetings, works starts on v2.40 [5]
- 04/2015: OASIS PKCS #11 v2.40 specifications become approved OASIS standards [6]
- 05/2016: OASIS PKCS #11 v2.40 Errata 01 specifications become approved OASIS errata [7]
See also[edit]
References[edit]
- ^ ab'PKCS #11: Cryptographic Token Interface Standard'.
- ^'OASIS Enhances Popular Public-Key Cryptography Standard, PKCS #11, for Mobile and Cloud OASIS'. www.oasis-open.org. Retrieved 2016-08-24.
- ^'CT-KIP: Cryptographic Token Key Initialization Protocol'.
- ^'Archived copy'. Archived from the original on 2013-05-25. Retrieved 2013-07-18.CS1 maint: Archived copy as title (link)
- ^https://www.oasis-open.org/committees/documents.php?wg_abbrev=pkcs11
- ^'#PKCS #11 Cryptographic Token Interface Base Specification, Interface Profiles, Current Mechanisms Specification, and Historical Mechanisms Specification Versions 2.40 become OASIS Standards OASIS'. www.oasis-open.org. Retrieved 2016-08-24.
- ^'#PKCS 11 V2.40 Approved Erratas published by PKCS 11 TC OASIS'. www.oasis-open.org. Retrieved 2016-08-24.
External links[edit]
PKCS #7 is a cryptographic message syntax standard. A PKCS #7 message does not, by itself, constitute a certificate request, but it can encapsulate a PKCS #10 or CMC request in a ContentInfo ASN.1 structure by using one of the following content types. Encapsulation enables you to add extra functionality, such as multiple signatures, that is not otherwise available.
- Data
- SignedData
- EnvelopedData
- SignedAndEnvelopedData
- DigestedData
- EncryptedData
Pkcs#12 File Download
Attributes can be added to the authenticatedAttributes and unauthenticatedAttributes fields of the SignedData content type.
The process required to archive a client's private key on a certification authority (CA) provides a comprehensive example of how authenticated (signed) attributes and the unauthenticated attributes can be used:
Pkcs#12 File Downloaded From Ara
The client creates an IX509CertificateRequestPkcs10 object and adds appropriate data for the type of certificate being requested.
The client uses the PKCS #10 request to initialize an IX509CertificateRequestCmc object. The PKCS #10 request is placed into the TaggedRequest structure in the CMC request. For more information, see CMC Attributes.
The client encrypts a private key and uses it to initialize an IX509AttributeArchiveKey object. The new ArchiveKey attribute is encapsulated in an EnvelopedData structure.
The client creates a SHA-1 hash of the encrypted key and uses it to initialize an IX509AttributeArchiveKeyHash object.
The client retrieves the CryptAttributes collection from the CMC request and adds the ArchiveKey and the ArchiveKeyHash attributes to it. The attributes are placed into the TaggedAttributes structure of the CMC request.
The client uses the CMC request to initialize an IX509CertificateRequestPkcs7 object. This places the CMC request into the contentInfo field of the PKCS #7 SignedData structure.
The ArchiveKeyHash attribute is signed and placed in the authenticatedAttributes sequence of the SignerInfo structure.
The ArchiveKey attribute is placed in the unauthenticatedAttributes sequence of the SignerInfo structure associated with the primary signer of the PKCS #7 message.