Re: Modifying your Keychain Certificates with an AppleScript
Re: Modifying your Keychain Certificates with an AppleScript
- Subject: Re: Modifying your Keychain Certificates with an AppleScript
- From: David Crowe <email@hidden>
- Date: Wed, 14 Nov 2012 13:31:51 -0700
I have used the "security" command with great success, and it appears to do some stuff with certificates.
Here's a simple example:
on DumpKeychain()
return (do shell script "security dump-keychain | grep -v \"=<NULL>\"")
end DumpKeychain
- David Crowe
> ----------------------------------------------------------------------
>
> Message: 1
> Date: Wed, 14 Nov 2012 12:27:12 -0600
> From: Luther Fuller <email@hidden>
> To: Applescript Users <email@hidden>
> Subject: Re: Modifying your Keychain Certificates with an AppleScript
> Message-ID: <email@hidden>
> Content-Type: text/plain; charset="windows-1252"
>
> The ~/Library/Keychains/ folder seems to contain files that, I'm guessing, you can't modify since you don't know their format, and they are, I think, encrypted. The only other way to get access to certificates is the Keychain Access application in the utilities folder … but it's not scriptable.
>
> You might want to look into using 'do shell script' with the command ...
>
> keytool(1) keytool(1)
>
>
> NAME
> keytool - key and certificate management tool
>
> SYNOPSIS
> keytool [ commands ]
>
> DESCRIPTION
> keytool is a key and certificate management utility. It enables users to administer
> their own public/private key pairs and associated certificates for use in self-authenti-
> cation (where the user authenticates himself/herself to other users/services) or data
> integrity and authentication services, using digital signatures. It also allows users to
> cache the public keys (in the form of certificates) of their communicating peers.
>
> A certificate is a digitally signed statement from one entity (person, company, and so
> forth), saying that the public key (and some other information) of some other entity has
> a particular value. (See Certificates.) When data is digitally signed, the signature
> can be verified to check the data integrity and authenticity. Integrity means that the
> data has not been modified or tampered with, and authenticity means the data indeed
> comes from whoever claims to have created and signed it.
>
> keytool stores the keys and certificates in a so-called keystore. The keytool default
> keystore implementation implements the keystore as a file. It protects private keys with
> a password.
>
> I've never used it, so I have to stop here.
_______________________________________________
Do not post admin requests to the list. They will be ignored.
AppleScript-Users mailing list (email@hidden)
Help/Unsubscribe/Update your Subscription:
Archives: http://lists.apple.com/archives/applescript-users
This email sent to email@hidden