pkcs11-destroy.html revision e74245134d71795065fe4940eea5307b1bb9c488
297be3708069ef31814d6d75c0d71a50a78feb03Mark Andrews - Copyright (C) 2009 Internet Systems Consortium, Inc. ("ISC")
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein - Permission to use, copy, modify, and/or distribute this software for any
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein - purpose with or without fee is hereby granted, provided that the above
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein - copyright notice and this permission notice appear in all copies.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein - THE SOFTWARE IS PROVIDED "AS IS" AND ISC DISCLAIMS ALL WARRANTIES WITH
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein - REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein - AND FITNESS. IN NO EVENT SHALL ISC BE LIABLE FOR ANY SPECIAL, DIRECT,
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein - INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein - LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein - OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein - PERFORMANCE OF THIS SOFTWARE.
f8c849e22415de8f739c17552b0f0ee9a6c7c9fcAutomatic Updater<!-- $Id: pkcs11-destroy.html,v 1.3 2009/10/06 04:40:14 tbox Exp $ -->
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<meta http-equiv="Content-Type" content="text/html; charset=ISO-8859-1">
e21a2904f02a03fa06b6db04d348f65fe9c67b2bMark Andrews<meta name="generator" content="DocBook XSL Stylesheets V1.71.1">
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<body bgcolor="white" text="black" link="#0000FF" vlink="#840084" alink="#0000FF"><div class="refentry" lang="en">
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<a name="man.pkcs11-destroy"></a><div class="titlepage"></div>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<p><span class="application">pkcs11-destroy</span> — destroy PKCS#11 objects</p>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<div class="cmdsynopsis"><p><code class="command">pkcs11-destroy</code> [<code class="option">-m <em class="replaceable"><code>module</code></em></code>] [<code class="option">-s <em class="replaceable"><code>slot</code></em></code>] { -i <em class="replaceable"><code>ID</code></em> | -l <em class="replaceable"><code>label</code></em> } [<code class="option">-p <em class="replaceable"><code>PIN</code></em></code>]</p></div>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span><strong class="command">pkcs11-destroy</strong></span> destroys keys stored in a
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein PKCS#11 device, identified by their <code class="option">ID</code> or
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Matching keys are displayed before being destroyed. There is a
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein five second delay to allow the user to interrupt the process
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein before the destruction takes place.
ab8729140b1ad688ab03e1e9ce438fb1cbb49222Automatic Updater<dt><span class="term">-m <em class="replaceable"><code>module</code></em></span></dt>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Specify the PKCS#11 provider module. This must be the full
ab8729140b1ad688ab03e1e9ce438fb1cbb49222Automatic Updater path to a shared library object implementing the PKCS#11 API
ab8729140b1ad688ab03e1e9ce438fb1cbb49222Automatic Updater for the device.
ab8729140b1ad688ab03e1e9ce438fb1cbb49222Automatic Updater<dt><span class="term">-s <em class="replaceable"><code>slot</code></em></span></dt>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Open the session with the given PKCS#11 slot. The default is
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<dt><span class="term">-i <em class="replaceable"><code>ID</code></em></span></dt>
5a4557e8de2951a2796676b5ec4b6a90caa5be14Mark Andrews Destroy keys with the given object ID.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<dt><span class="term">-l <em class="replaceable"><code>label</code></em></span></dt>
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein Destroy keys with the given label.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein<dt><span class="term">-p <em class="replaceable"><code>PIN</code></em></span></dt>
ab8729140b1ad688ab03e1e9ce438fb1cbb49222Automatic Updater Specify the PIN for the device. If no PIN is provided on the
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein command line, <span><strong class="command">pkcs11-destroy</strong></span> will prompt for it.
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span class="citerefentry"><span class="refentrytitle">pkcs11-list</span>(3)</span>,
60e5e10f8d2e2b0c41e8abad38cacd867caa6ab2Rob Austein <span class="citerefentry"><span class="refentrytitle">pkcs11-keygen</span>(3)</span>
8e245ec21beee31a780de9b89ba1e8bb2b9f4c9aAndreas Gustafsson<p><span class="corpauthor">Internet Systems Consortium</span>