2006-07-08 00:24:47 +00:00
|
|
|
=pod
|
|
|
|
|
|
|
|
=head1 NAME
|
|
|
|
|
|
|
|
genpkey - generate a private key
|
|
|
|
|
|
|
|
=head1 SYNOPSIS
|
|
|
|
|
|
|
|
B<openssl> B<genpkey>
|
2016-02-05 16:58:45 +00:00
|
|
|
[B<-help>]
|
2006-07-08 00:24:47 +00:00
|
|
|
[B<-out filename>]
|
|
|
|
[B<-outform PEM|DER>]
|
|
|
|
[B<-pass arg>]
|
|
|
|
[B<-cipher>]
|
|
|
|
[B<-engine id>]
|
|
|
|
[B<-paramfile file>]
|
|
|
|
[B<-algorithm alg>]
|
|
|
|
[B<-pkeyopt opt:value>]
|
|
|
|
[B<-genparam>]
|
|
|
|
[B<-text>]
|
|
|
|
|
|
|
|
=head1 DESCRIPTION
|
|
|
|
|
|
|
|
The B<genpkey> command generates a private key.
|
|
|
|
|
|
|
|
=head1 OPTIONS
|
|
|
|
|
|
|
|
=over 4
|
|
|
|
|
2016-02-05 16:58:45 +00:00
|
|
|
=item B<-help>
|
|
|
|
|
|
|
|
Print out a usage message.
|
|
|
|
|
2006-07-08 00:24:47 +00:00
|
|
|
=item B<-out filename>
|
|
|
|
|
2016-02-05 16:58:45 +00:00
|
|
|
Output the key to the specified file. If this argument is not specified then
|
|
|
|
standard output is used.
|
2006-07-08 00:24:47 +00:00
|
|
|
|
|
|
|
=item B<-outform DER|PEM>
|
|
|
|
|
|
|
|
This specifies the output format DER or PEM.
|
|
|
|
|
|
|
|
=item B<-pass arg>
|
|
|
|
|
|
|
|
the output file password source. For more information about the format of B<arg>
|
2015-08-17 19:21:33 +00:00
|
|
|
see the B<PASS PHRASE ARGUMENTS> section in L<openssl(1)>.
|
2006-07-08 00:24:47 +00:00
|
|
|
|
|
|
|
=item B<-cipher>
|
|
|
|
|
2006-07-08 00:47:04 +00:00
|
|
|
This option encrypts the private key with the supplied cipher. Any algorithm
|
2006-07-08 00:24:47 +00:00
|
|
|
name accepted by EVP_get_cipherbyname() is acceptable such as B<des3>.
|
|
|
|
|
|
|
|
=item B<-engine id>
|
|
|
|
|
2009-04-15 15:27:03 +00:00
|
|
|
specifying an engine (by its unique B<id> string) will cause B<genpkey>
|
2006-07-08 00:24:47 +00:00
|
|
|
to attempt to obtain a functional reference to the specified engine,
|
|
|
|
thus initialising it if needed. The engine will then be set as the default
|
2006-07-10 23:10:26 +00:00
|
|
|
for all available algorithms. If used this option should precede all other
|
|
|
|
options.
|
2006-07-08 00:24:47 +00:00
|
|
|
|
|
|
|
=item B<-algorithm alg>
|
|
|
|
|
2006-07-10 23:10:26 +00:00
|
|
|
public key algorithm to use such as RSA, DSA or DH. If used this option must
|
2006-07-12 13:28:44 +00:00
|
|
|
precede any B<-pkeyopt> options. The options B<-paramfile> and B<-algorithm>
|
2006-07-10 23:10:26 +00:00
|
|
|
are mutually exclusive.
|
2006-07-08 00:24:47 +00:00
|
|
|
|
|
|
|
=item B<-pkeyopt opt:value>
|
|
|
|
|
|
|
|
set the public key algorithm option B<opt> to B<value>. The precise set of
|
|
|
|
options supported depends on the public key algorithm used and its
|
|
|
|
implementation. See B<KEY GENERATION OPTIONS> below for more details.
|
|
|
|
|
|
|
|
=item B<-genparam>
|
|
|
|
|
2006-07-10 23:10:26 +00:00
|
|
|
generate a set of parameters instead of a private key. If used this option must
|
|
|
|
precede and B<-algorithm>, B<-paramfile> or B<-pkeyopt> options.
|
2006-07-08 00:24:47 +00:00
|
|
|
|
|
|
|
=item B<-paramfile filename>
|
|
|
|
|
|
|
|
Some public key algorithms generate a private key based on a set of parameters.
|
2006-07-10 23:10:26 +00:00
|
|
|
They can be supplied using this option. If this option is used the public key
|
|
|
|
algorithm used is determined by the parameters. If used this option must
|
|
|
|
precede and B<-pkeyopt> options. The options B<-paramfile> and B<-algorithm>
|
|
|
|
are mutually exclusive.
|
|
|
|
|
|
|
|
=item B<-text>
|
|
|
|
|
|
|
|
Print an (unencrypted) text representation of private and public keys and
|
|
|
|
parameters along with the PEM or DER structure.
|
2006-07-08 00:24:47 +00:00
|
|
|
|
|
|
|
=back
|
|
|
|
|
|
|
|
=head1 KEY GENERATION OPTIONS
|
|
|
|
|
2015-04-13 16:29:52 +00:00
|
|
|
The options supported by each algorithm and indeed each implementation of an
|
2006-07-08 00:24:47 +00:00
|
|
|
algorithm can vary. The options for the OpenSSL implementations are detailed
|
|
|
|
below.
|
|
|
|
|
|
|
|
=head1 RSA KEY GENERATION OPTIONS
|
|
|
|
|
|
|
|
=over 4
|
|
|
|
|
|
|
|
=item B<rsa_keygen_bits:numbits>
|
|
|
|
|
|
|
|
The number of bits in the generated key. If not specified 1024 is used.
|
|
|
|
|
|
|
|
=item B<rsa_keygen_pubexp:value>
|
|
|
|
|
|
|
|
The RSA public exponent value. This can be a large decimal or
|
|
|
|
hexadecimal value if preceded by B<0x>. Default value is 65537.
|
|
|
|
|
|
|
|
=back
|
|
|
|
|
|
|
|
=head1 DSA PARAMETER GENERATION OPTIONS
|
|
|
|
|
|
|
|
=over 4
|
|
|
|
|
|
|
|
=item B<dsa_paramgen_bits:numbits>
|
|
|
|
|
|
|
|
The number of bits in the generated parameters. If not specified 1024 is used.
|
|
|
|
|
2012-01-11 21:58:19 +00:00
|
|
|
=back
|
|
|
|
|
2006-07-08 00:24:47 +00:00
|
|
|
=head1 DH PARAMETER GENERATION OPTIONS
|
|
|
|
|
|
|
|
=over 4
|
|
|
|
|
|
|
|
=item B<dh_paramgen_prime_len:numbits>
|
|
|
|
|
|
|
|
The number of bits in the prime parameter B<p>.
|
|
|
|
|
|
|
|
=item B<dh_paramgen_generator:value>
|
|
|
|
|
|
|
|
The value to use for the generator B<g>.
|
|
|
|
|
2011-12-07 00:42:22 +00:00
|
|
|
=item B<dh_rfc5114:num>
|
|
|
|
|
|
|
|
If this option is set then the appropriate RFC5114 parameters are used
|
|
|
|
instead of generating new parameters. The value B<num> can take the
|
|
|
|
values 1, 2 or 3 corresponding to RFC5114 DH parameters consisting of
|
|
|
|
1024 bit group with 160 bit subgroup, 2048 bit group with 224 bit subgroup
|
|
|
|
and 2048 bit group with 256 bit subgroup as mentioned in RFC5114 sections
|
|
|
|
2.1, 2.2 and 2.3 respectively.
|
|
|
|
|
2006-07-08 00:24:47 +00:00
|
|
|
=back
|
|
|
|
|
|
|
|
=head1 EC PARAMETER GENERATION OPTIONS
|
|
|
|
|
2015-10-27 17:40:11 +00:00
|
|
|
The EC parameter generation options below can also
|
2015-02-19 14:35:43 +00:00
|
|
|
be supplied as EC key generation options. This can (for example) generate a
|
|
|
|
key from a named curve without the need to use an explicit parameter file.
|
|
|
|
|
2006-07-08 00:24:47 +00:00
|
|
|
=over 4
|
|
|
|
|
|
|
|
=item B<ec_paramgen_curve:curve>
|
|
|
|
|
2015-10-27 17:40:11 +00:00
|
|
|
the EC curve to use. OpenSSL supports NIST curve names such as "P-256".
|
2015-02-19 14:35:43 +00:00
|
|
|
|
|
|
|
=item B<ec_param_enc:encoding>
|
|
|
|
|
2015-04-13 16:29:52 +00:00
|
|
|
the encoding to use for parameters. The "encoding" parameter must be either
|
2015-02-19 14:35:43 +00:00
|
|
|
"named_curve" or "explicit".
|
2006-07-08 00:24:47 +00:00
|
|
|
|
|
|
|
=back
|
|
|
|
|
2009-04-15 15:27:03 +00:00
|
|
|
=head1 GOST2001 KEY GENERATION AND PARAMETER OPTIONS
|
|
|
|
|
|
|
|
Gost 2001 support is not enabled by default. To enable this algorithm,
|
|
|
|
one should load the ccgost engine in the OpenSSL configuration file.
|
2015-04-13 16:29:52 +00:00
|
|
|
See README.gost file in the engines/ccgost directory of the source
|
2009-04-15 15:27:03 +00:00
|
|
|
distribution for more details.
|
|
|
|
|
|
|
|
Use of a parameter file for the GOST R 34.10 algorithm is optional.
|
|
|
|
Parameters can be specified during key generation directly as well as
|
|
|
|
during generation of parameter file.
|
|
|
|
|
|
|
|
=over 4
|
|
|
|
|
|
|
|
=item B<paramset:name>
|
|
|
|
|
|
|
|
Specifies GOST R 34.10-2001 parameter set according to RFC 4357.
|
|
|
|
Parameter set can be specified using abbreviated name, object short name or
|
|
|
|
numeric OID. Following parameter sets are supported:
|
|
|
|
|
|
|
|
paramset OID Usage
|
|
|
|
A 1.2.643.2.2.35.1 Signature
|
|
|
|
B 1.2.643.2.2.35.2 Signature
|
|
|
|
C 1.2.643.2.2.35.3 Signature
|
|
|
|
XA 1.2.643.2.2.36.0 Key exchange
|
|
|
|
XB 1.2.643.2.2.36.1 Key exchange
|
|
|
|
test 1.2.643.2.2.35.0 Test purposes
|
|
|
|
|
|
|
|
=back
|
|
|
|
|
|
|
|
|
|
|
|
|
2006-07-08 00:24:47 +00:00
|
|
|
=head1 NOTES
|
|
|
|
|
|
|
|
The use of the genpkey program is encouraged over the algorithm specific
|
|
|
|
utilities because additional algorithm options and ENGINE provided algorithms
|
|
|
|
can be used.
|
|
|
|
|
|
|
|
=head1 EXAMPLES
|
|
|
|
|
|
|
|
Generate an RSA private key using default parameters:
|
|
|
|
|
2015-02-19 14:35:43 +00:00
|
|
|
openssl genpkey -algorithm RSA -out key.pem
|
2006-07-08 00:24:47 +00:00
|
|
|
|
|
|
|
Encrypt output private key using 128 bit AES and the passphrase "hello":
|
|
|
|
|
2009-04-15 15:27:03 +00:00
|
|
|
openssl genpkey -algorithm RSA -out key.pem -aes-128-cbc -pass pass:hello
|
2006-07-08 00:24:47 +00:00
|
|
|
|
|
|
|
Generate a 2048 bit RSA key using 3 as the public exponent:
|
|
|
|
|
2009-04-15 15:27:03 +00:00
|
|
|
openssl genpkey -algorithm RSA -out key.pem -pkeyopt rsa_keygen_bits:2048 \
|
2006-07-08 00:24:47 +00:00
|
|
|
-pkeyopt rsa_keygen_pubexp:3
|
|
|
|
|
|
|
|
Generate 1024 bit DSA parameters:
|
|
|
|
|
|
|
|
openssl genpkey -genparam -algorithm DSA -out dsap.pem \
|
|
|
|
-pkeyopt dsa_paramgen_bits:1024
|
|
|
|
|
|
|
|
Generate DSA key from parameters:
|
|
|
|
|
2015-02-19 14:35:43 +00:00
|
|
|
openssl genpkey -paramfile dsap.pem -out dsakey.pem
|
2006-07-08 00:24:47 +00:00
|
|
|
|
|
|
|
Generate 1024 bit DH parameters:
|
|
|
|
|
|
|
|
openssl genpkey -genparam -algorithm DH -out dhp.pem \
|
|
|
|
-pkeyopt dh_paramgen_prime_len:1024
|
|
|
|
|
2011-12-07 00:42:22 +00:00
|
|
|
Output RFC5114 2048 bit DH parameters with 224 bit subgroup:
|
|
|
|
|
|
|
|
openssl genpkey -genparam -algorithm DH -out dhp.pem -pkeyopt dh_rfc5114:2
|
|
|
|
|
2006-07-08 00:24:47 +00:00
|
|
|
Generate DH key from parameters:
|
|
|
|
|
2015-02-19 14:35:43 +00:00
|
|
|
openssl genpkey -paramfile dhp.pem -out dhkey.pem
|
|
|
|
|
|
|
|
Generate EC parameters:
|
|
|
|
|
|
|
|
openssl genpkey -genparam -algorithm EC -out ecp.pem \
|
|
|
|
-pkeyopt ec_paramgen_curve:secp384r1 \
|
|
|
|
-pkeyopt ec_param_enc:named_curve
|
|
|
|
|
|
|
|
Generate EC key from parameters:
|
|
|
|
|
|
|
|
openssl genpkey -paramfile ecp.pem -out eckey.pem
|
|
|
|
|
2015-10-27 17:40:11 +00:00
|
|
|
Generate EC key directly:
|
2006-07-08 00:24:47 +00:00
|
|
|
|
2015-02-19 14:35:43 +00:00
|
|
|
openssl genpkey -algorithm EC -out eckey.pem \
|
|
|
|
-pkeyopt ec_paramgen_curve:P-384 \
|
|
|
|
-pkeyopt ec_param_enc:named_curve
|
2006-07-08 00:24:47 +00:00
|
|
|
|
2015-10-27 17:40:11 +00:00
|
|
|
=head1 HISTORY
|
|
|
|
|
|
|
|
The ability to use NIST curve names, and to generate an EC key directly,
|
|
|
|
were added in OpenSSL 1.0.2.
|
|
|
|
|
2006-07-08 00:24:47 +00:00
|
|
|
=cut
|
|
|
|
|