Commands for cryptographic device operations on AIX®, Linux, and Windows
You can use the runmqckm (iKeycmd) and runmqakm commands to manage keys and certificates for cryptographic device operations.
The digital signature algorithm names SHA3WithRSA and
SHA5WithRSA are deprecated because they are an abbreviated form of SHA384WithRSA and SHA512WithRSA
respectively.
- -keydb -changepw
- Change the password for a cryptographic device:
Using the runmqckm command:
-keydb -changepw -crypto module_name -tokenlabel token_label -pw password -new_pw new_passwordIf you are using certificates or keys stored on PKCS#11 cryptographic hardware, note that runmqckm and strmqikm are 64-bit programs. External modules required for PKCS#11 support will be loaded into a 64-bit process, therefore you must have a 64-bit PKCS#11 library installed for the administration of cryptographic hardware. The Windows and Linux® x86 32-bit platforms are the only exceptions, as the strmqikm and runmqckm programs are 32-bit on those platforms.
Using the runmqakm command:
-keydb -changepw -db filename -crypto module_name -tokenlabel token_label -pw password -new_pw new_password -fips -strong - -keydb -list
- List currently-supported types of key database:
Using the runmqckm command:
-keydb -listIf you are using certificates or keys stored on PKCS#11 cryptographic hardware, note that runmqckm and strmqikm are 64-bit programs. External modules required for PKCS#11 support will be loaded into a 64-bit process, therefore you must have a 64-bit PKCS#11 library installed for the administration of cryptographic hardware. The Windows and Linux x86 32-bit platforms are the only exceptions, as the strmqikm and runmqckm programs are 32-bit on those platforms.
Using the runmqakm command:
-keydb -list -fips - -cert -add
- Add a certificate from a file to a cryptographic device:
Using the runmqckm command:
-cert -add -crypto module_name -tokenlabel token_label -pw password -label label -file filename -format ascii | binaryIf you are using certificates or keys stored on PKCS#11 cryptographic hardware, note that runmqckm and strmqikm are 64-bit programs. External modules required for PKCS#11 support will be loaded into a 64-bit process, therefore you must have a 64-bit PKCS#11 library installed for the administration of cryptographic hardware. The Windows and Linux x86 32-bit platforms are the only exceptions, as the strmqikm and runmqckm programs are 32-bit on those platforms.
Using the runmqakm command:
-cert -add -crypto module_name -tokenlabel token_label -pw password -label label -file filename -format ascii | binary -fips - -cert -create
- Create a self-signed certificate on a cryptographic device:
Using the runmqckm command:
-cert -create -crypto module_name -tokenlabel token_label -pw password -label label -dn distinguished_name -size 1024 | 512 -x509version 3 | 1 | 2 -default_cert no | yes -expire days -sig_alg MD2_WITH_RSA | MD2WithRSA | MD5_WITH_RSA | MD5WithRSA | SHA1WithDSA | SHA1WithRSA | SHA256_WITH_RSA | SHA256WithRSA | SHA2WithRSA | SHA384_WITH_RSA | SHA384WithRSA | SHA512_WITH_RSA | SHA512WithRSA | SHA_WITH_DSA | SHA_WITH_RSA | SHAWithDSA | SHAWithRSAIf you are using certificates or keys stored on PKCS#11 cryptographic hardware, note that runmqckm and strmqikm are 64-bit programs. External modules required for PKCS#11 support will be loaded into a 64-bit process, therefore you must have a 64-bit PKCS#11 library installed for the administration of cryptographic hardware. The Windows and Linux x86 32-bit platforms are the only exceptions, as the strmqikm and runmqckm programs are 32-bit on those platforms.
Using the runmqakm command:
-cert -create -crypto module_name -tokenlabel token_label -pw password -label label -dn distinguished_name -size 2048 | 1024 | 512 -x509version 3 | 1 | 2 -default_cert no | yes -expire days -fips -sig_alg md5 | MD5_WITH_RSA | SHA_WITH_DSA | SHA_WITH_RSA | sha1 | SHA1WithDSA | SHA1WithECDSA | SHA1WithRSA | sha224 | SHA224_WITH_RSA | SHA224WithDSA | SHA224WithECDSA | SHA224WithRSA | sha256 | SHA256_WITH_RSA | SHA256WithDSA | SHA256WithECDSA | SHA256WithRSA | SHA2WithRSA | sha384 | SHA384_WITH_RSA | SHA384WithECDSA | SHA384WithRSA | sha512 | SHA512_WITH_RSA | SHA512WithECDSA | SHA512WithRSA | SHAWithDSA | SHAWithRSA | EC_ecdsa_with_SHA1 | EC_ecdsa_with_SHA224 | EC_ecdsa_with_SHA256 | EC_ecdsa_with_SHA384 | EC_ecdsa_with_SHA512 - -cert -delete
- Delete a certificate on a cryptographic device:
Using the runmqckm command:
-cert -delete -crypto module_name -tokenlabel token_label -pw password -label labelIf you are using certificates or keys stored on PKCS#11 cryptographic hardware, note that runmqckm and strmqikm are 64-bit programs. External modules required for PKCS#11 support will be loaded into a 64-bit process, therefore you must have a 64-bit PKCS#11 library installed for the administration of cryptographic hardware. The Windows and Linux x86 32-bit platforms are the only exceptions, as the strmqikm and runmqckm programs are 32-bit on those platforms.
Using the runmqakm command:
-cert -delete -crypto module_name -tokenlabel token_label -pw password -label label -fips - -cert -details
- List the detailed information for a specific certificate on a cryptographic device:
Using the runmqckm command:
-cert -details -crypto module_name -tokenlabel token_label -pw password -label labelIf you are using certificates or keys stored on PKCS#11 cryptographic hardware, note that runmqckm and strmqikm are 64-bit programs. External modules required for PKCS#11 support will be loaded into a 64-bit process, therefore you must have a 64-bit PKCS#11 library installed for the administration of cryptographic hardware. The Windows and Linux x86 32-bit platforms are the only exceptions, as the strmqikm and runmqckm programs are 32-bit on those platforms.
Using the runmqakm command:
-cert -details -crypto module_name -tokenlabel token_label -pw password -label label -fipsList the detailed information and show the full certificate for a specific certificate on a cryptographic device:
Using the runmqckm command:
-cert -details -showOID -crypto module_name -tokenlabel token_label -pw password -label labelIf you are using certificates or keys stored on PKCS#11 cryptographic hardware, note that runmqckm and strmqikm are 64-bit programs. External modules required for PKCS#11 support will be loaded into a 64-bit process, therefore you must have a 64-bit PKCS#11 library installed for the administration of cryptographic hardware. The Windows and Linux x86 32-bit platforms are the only exceptions, as the strmqikm and runmqckm programs are 32-bit on those platforms.
Using the runmqakm command:
-cert -details -showOID -crypto module_name -tokenlabel token_label -pw password -label label -fips - -cert -extract
- Extract a certificate from a key database:
Using the runmqckm command:
-cert -extract -crypto module_name -tokenlabel token_label -pw password -label label -target filename -format ascii | binaryIf you are using certificates or keys stored on PKCS#11 cryptographic hardware, note that runmqckm and strmqikm are 64-bit programs. External modules required for PKCS#11 support will be loaded into a 64-bit process, therefore you must have a 64-bit PKCS#11 library installed for the administration of cryptographic hardware. The Windows and Linux x86 32-bit platforms are the only exceptions, as the strmqikm and runmqckm programs are 32-bit on those platforms.
Using the runmqakm command:
-cert -extract -crypto module_name -tokenlabel token_label -pw password -label label -target filename -format ascii | binary -fips - -cert -import
- Import a certificate to a cryptographic device with secondary key database support:
Using the runmqckm command:
-cert -import -db filename -pw password -label label -type cms -crypto module_name -tokenlabel token_label -pw password -secondaryDB filename -secondaryDBpw passwordIf you are using certificates or keys stored on PKCS#11 cryptographic hardware, note that runmqckm and strmqikm are 64-bit programs. External modules required for PKCS#11 support will be loaded into a 64-bit process, therefore you must have a 64-bit PKCS#11 library installed for the administration of cryptographic hardware. The Windows and Linux x86 32-bit platforms are the only exceptions, as the strmqikm and runmqckm programs are 32-bit on those platforms.
Using the runmqakm command:
-cert -import -db filename -pw password -label label -type cms -crypto module_name -tokenlabel token_label -pw password -secondaryDB filename -secondaryDBpw password -fipsImport a PKCS #12 certificate to a cryptographic device with secondary key database support:
Using the runmqckm command:
-cert -import -file filename -pw password -type pkcs12 -crypto module_name -tokenlabel token_label -pw password -secondaryDB filename -secondaryDBpw passwordIf you are using certificates or keys stored on PKCS#11 cryptographic hardware, note that runmqckm and strmqikm are 64-bit programs. External modules required for PKCS#11 support will be loaded into a 64-bit process, therefore you must have a 64-bit PKCS#11 library installed for the administration of cryptographic hardware. The Windows and Linux x86 32-bit platforms are the only exceptions, as the strmqikm and runmqckm programs are 32-bit on those platforms.
Using the runmqakm command:
-cert -import -file filename -pw password -type pkcs12 -crypto module_name -tokenlabel token_label -pw password -secondaryDB filename -secondaryDBpw password -fips - -cert -list
- List all certificates on a cryptographic device:
Using the runmqckm command:
-cert -list all | personal | CA -crypto module_name -tokenlabel token_label -pw passwordIf you are using certificates or keys stored on PKCS#11 cryptographic hardware, note that runmqckm and strmqikm are 64-bit programs. External modules required for PKCS#11 support will be loaded into a 64-bit process, therefore you must have a 64-bit PKCS#11 library installed for the administration of cryptographic hardware. The Windows and Linux x86 32-bit platforms are the only exceptions, as the strmqikm and runmqckm programs are 32-bit on those platforms.
Using the runmqakm command:
-cert -list all | personal | CA -crypto module_name -tokenlabel token_label -pw password -fips - -cert -receive
- Receive a certificate from a file to a cryptographic device with secondary key database support:
Using the runmqckm command:
-cert -receive -file filename -crypto module_name -tokenlabel token_label -pw password -default_cert yes | no -secondaryDB filename -secondaryDBpw password -format ascii | binaryIf you are using certificates or keys stored on PKCS#11 cryptographic hardware, note that runmqckm and strmqikm are 64-bit programs. External modules required for PKCS#11 support will be loaded into a 64-bit process, therefore you must have a 64-bit PKCS#11 library installed for the administration of cryptographic hardware. The Windows and Linux x86 32-bit platforms are the only exceptions, as the strmqikm and runmqckm programs are 32-bit on those platforms.
Using the runmqakm command:
-cert -receive -file filename -crypto module_name -tokenlabel token_label -pw password -default_cert yes | no -secondaryDB filename -secondaryDBpw password -format ascii | binary -fips - -certreq -create
- Create a certificate request on a cryptographic device:
Using the runmqckm command:
-certreq -create -crypto module_name -tokenlabel token_label -pw password -label label -dn distinguished_name -size 1024 | 512 -file filename -sig_alg MD2_WITH_RSA | MD2WithRSA | MD5_WITH_RSA | MD5WithRSA | SHA1WithDSA | SHA1WithRSA | SHA256_WITH_RSA | SHA256WithRSA | SHA2WithRSA | SHA384_WITH_RSA | SHA384WithRSA | SHA512_WITH_RSA | SHA512WithRSA | SHA_WITH_DSA | SHA_WITH_RSA | SHAWithDSA | SHAWithRSAIf you are using certificates or keys stored on PKCS#11 cryptographic hardware, note that runmqckm and strmqikm are 64-bit programs. External modules required for PKCS#11 support will be loaded into a 64-bit process, therefore you must have a 64-bit PKCS#11 library installed for the administration of cryptographic hardware. The Windows and Linux x86 32-bit platforms are the only exceptions, as the strmqikm and runmqckm programs are 32-bit on those platforms.
Using the runmqakm command:
-certreq -create -crypto module_name -tokenlabel token_label -pw password -label label -dn distinguished_name -size 2048 | 1024 | 512 -file filename -fips -sig_alg md5 | MD5_WITH_RSA | SHA_WITH_DSA | SHA_WITH_RA | sha1 | SHA1WithDSA | SHA1WithECDSA | SHA1WithRSA | sha224 | SHA224_WITH_RSA | SHA224WithDSA | SHA224WithECDSA | SHA224WithRSA | sha256 | SHA256_WITH_RSA | SHA256WithDSA | SHA256WithECDSA | SHA256WithRSA | SHA2WithRSA | sha384 | SHA384_WITH_RSA | SHA384WithECDSA | SHA384WithRSA | sha512 | SHA512_WITH_RSA | SHA512WithECDSA | SHA512WithRSA | SHAWithDSA | SHAWithRSA | EC_ecdsa_with_SHA1 | EC_ecdsa_with_SHA224 | EC_ecdsa_with_SHA256 | EC_ecdsa_with_SHA384 | EC_ecdsa_with_SHA512 - -certreq -delete
- Delete a certificate request from a cryptographic device:
Using the runmqckm command:
-certreq -delete -crypto module_name -tokenlabel token_label -pw password -label labelIf you are using certificates or keys stored on PKCS#11 cryptographic hardware, note that runmqckm and strmqikm are 64-bit programs. External modules required for PKCS#11 support will be loaded into a 64-bit process, therefore you must have a 64-bit PKCS#11 library installed for the administration of cryptographic hardware. The Windows and Linux x86 32-bit platforms are the only exceptions, as the strmqikm and runmqckm programs are 32-bit on those platforms.
Using the runmqakm command:
-certreq -delete -crypto module_name -tokenlabel token_label -pw password -label label -fips - -certreq -details
- List the detailed information of a specific certificate request on a cryptographic device:
Using the runmqckm command:
-certreq -details -crypto module_name -tokenlabel token_label -pw password -label labelIf you are using certificates or keys stored on PKCS#11 cryptographic hardware, note that runmqckm and strmqikm are 64-bit programs. External modules required for PKCS#11 support will be loaded into a 64-bit process, therefore you must have a 64-bit PKCS#11 library installed for the administration of cryptographic hardware. The Windows and Linux x86 32-bit platforms are the only exceptions, as the strmqikm and runmqckm programs are 32-bit on those platforms.
Using the runmqakm command:
-certreq -details -crypto module_name -tokenlabel token_label -pw password -label label -fipsList the detailed information about a certificate request and show the full certificate request on a cryptographic device:
Using the runmqckm command:
-certreq -details -showOID -crypto module_name -tokenlabel token_label -pw password -label labelIf you are using certificates or keys stored on PKCS#11 cryptographic hardware, note that runmqckm and strmqikm are 64-bit programs. External modules required for PKCS#11 support will be loaded into a 64-bit process, therefore you must have a 64-bit PKCS#11 library installed for the administration of cryptographic hardware. The Windows and Linux x86 32-bit platforms are the only exceptions, as the strmqikm and runmqckm programs are 32-bit on those platforms.
Using the runmqakm command:
-certreq -details -showOID -crypto module_name -tokenlabel token_label -pw password -label label -fips - -certreq -extract
- Extract a certificate request from a certificate request database on a cryptographic device into a file:
Using the runmqckm command:
-certreq -extract -crypto module_name -tokenlabel token_label -pw password -label label -target filenameIf you are using certificates or keys stored on PKCS#11 cryptographic hardware, note that runmqckm and strmqikm are 64-bit programs. External modules required for PKCS#11 support will be loaded into a 64-bit process, therefore you must have a 64-bit PKCS#11 library installed for the administration of cryptographic hardware. The Windows and Linux x86 32-bit platforms are the only exceptions, as the strmqikm and runmqckm programs are 32-bit on those platforms.
Using the runmqakm command:
-certreq -extract -crypto module_name -tokenlabel token_label -pw password -label label -target filename -fips - -certreq -list
- List all certificate requests in the certificate request database on a cryptographic device:
Using the runmqckm command:
-certreq -list -crypto module_name -tokenlabel token_label -pw passwordIf you are using certificates or keys stored on PKCS#11 cryptographic hardware, note that runmqckm and strmqikm are 64-bit programs. External modules required for PKCS#11 support will be loaded into a 64-bit process, therefore you must have a 64-bit PKCS#11 library installed for the administration of cryptographic hardware. The Windows and Linux x86 32-bit platforms are the only exceptions, as the strmqikm and runmqckm programs are 32-bit on those platforms.
Using the runmqakm command:
-certreq -list -crypto module_name -tokenlabel token_label -pw password -fips