1999-11-10 02:52:17 +00:00
|
|
|
=pod
|
|
|
|
|
|
|
|
=head1 NAME
|
|
|
|
|
2017-10-18 19:33:56 +00:00
|
|
|
openssl-dsa,
|
1999-11-10 02:52:17 +00:00
|
|
|
dsa - DSA key processing
|
|
|
|
|
|
|
|
=head1 SYNOPSIS
|
|
|
|
|
|
|
|
B<openssl> B<dsa>
|
2016-02-05 16:58:45 +00:00
|
|
|
[B<-help>]
|
1999-11-10 02:52:17 +00:00
|
|
|
[B<-inform PEM|DER>]
|
|
|
|
[B<-outform PEM|DER>]
|
|
|
|
[B<-in filename>]
|
2000-02-16 23:16:01 +00:00
|
|
|
[B<-passin arg>]
|
1999-11-10 02:52:17 +00:00
|
|
|
[B<-out filename>]
|
2000-02-16 23:16:01 +00:00
|
|
|
[B<-passout arg>]
|
2014-07-03 02:42:40 +00:00
|
|
|
[B<-aes128>]
|
|
|
|
[B<-aes192>]
|
|
|
|
[B<-aes256>]
|
2017-02-01 00:10:13 +00:00
|
|
|
[B<-aria128>]
|
|
|
|
[B<-aria192>]
|
|
|
|
[B<-aria256>]
|
2014-07-03 02:42:40 +00:00
|
|
|
[B<-camellia128>]
|
|
|
|
[B<-camellia192>]
|
|
|
|
[B<-camellia256>]
|
1999-11-10 02:52:17 +00:00
|
|
|
[B<-des>]
|
|
|
|
[B<-des3>]
|
|
|
|
[B<-idea>]
|
|
|
|
[B<-text>]
|
|
|
|
[B<-noout>]
|
|
|
|
[B<-modulus>]
|
|
|
|
[B<-pubin>]
|
|
|
|
[B<-pubout>]
|
2003-01-30 22:02:27 +00:00
|
|
|
[B<-engine id>]
|
1999-11-10 02:52:17 +00:00
|
|
|
|
|
|
|
=head1 DESCRIPTION
|
|
|
|
|
|
|
|
The B<dsa> command processes DSA keys. They can be converted between various
|
|
|
|
forms and their components printed out. B<Note> This command uses the
|
|
|
|
traditional SSLeay compatible format for private key encryption: newer
|
|
|
|
applications should use the more secure PKCS#8 format using the B<pkcs8>
|
|
|
|
|
2016-12-12 16:14:40 +00:00
|
|
|
=head1 OPTIONS
|
1999-11-10 02:52:17 +00:00
|
|
|
|
|
|
|
=over 4
|
|
|
|
|
2016-02-05 16:58:45 +00:00
|
|
|
=item B<-help>
|
|
|
|
|
|
|
|
Print out a usage message.
|
|
|
|
|
1999-11-10 02:52:17 +00:00
|
|
|
=item B<-inform DER|PEM>
|
|
|
|
|
|
|
|
This specifies the input format. The B<DER> option with a private key uses
|
|
|
|
an ASN1 DER encoded form of an ASN.1 SEQUENCE consisting of the values of
|
|
|
|
version (currently zero), p, q, g, the public and private key components
|
1999-11-29 01:09:25 +00:00
|
|
|
respectively as ASN.1 INTEGERs. When used with a public key it uses a
|
|
|
|
SubjectPublicKeyInfo structure: it is an error if the key is not DSA.
|
1999-11-10 02:52:17 +00:00
|
|
|
|
|
|
|
The B<PEM> form is the default format: it consists of the B<DER> format base64
|
1999-11-29 01:09:25 +00:00
|
|
|
encoded with additional header and footer lines. In the case of a private key
|
|
|
|
PKCS#8 format is also accepted.
|
1999-11-10 02:52:17 +00:00
|
|
|
|
|
|
|
=item B<-outform DER|PEM>
|
|
|
|
|
2017-08-09 13:20:43 +00:00
|
|
|
This specifies the output format, the options have the same meaning and default
|
|
|
|
as the B<-inform> option.
|
1999-11-10 02:52:17 +00:00
|
|
|
|
|
|
|
=item B<-in filename>
|
|
|
|
|
|
|
|
This specifies the input filename to read a key from or standard input if this
|
|
|
|
option is not specified. If the key is encrypted a pass phrase will be
|
|
|
|
prompted for.
|
|
|
|
|
2000-02-16 23:16:01 +00:00
|
|
|
=item B<-passin arg>
|
1999-11-11 18:41:31 +00:00
|
|
|
|
2017-03-29 21:38:30 +00:00
|
|
|
The input file password source. For more information about the format of B<arg>
|
2015-08-17 19:21:33 +00:00
|
|
|
see the B<PASS PHRASE ARGUMENTS> section in L<openssl(1)>.
|
1999-11-11 18:41:31 +00:00
|
|
|
|
1999-11-10 02:52:17 +00:00
|
|
|
=item B<-out filename>
|
|
|
|
|
|
|
|
This specifies the output filename to write a key to or standard output by
|
|
|
|
is not specified. If any encryption options are set then a pass phrase will be
|
|
|
|
prompted for. The output filename should B<not> be the same as the input
|
|
|
|
filename.
|
|
|
|
|
2000-02-16 23:16:01 +00:00
|
|
|
=item B<-passout arg>
|
1999-11-11 18:41:31 +00:00
|
|
|
|
2017-03-29 21:38:30 +00:00
|
|
|
The output file password source. For more information about the format of B<arg>
|
2015-08-17 19:21:33 +00:00
|
|
|
see the B<PASS PHRASE ARGUMENTS> section in L<openssl(1)>.
|
1999-11-11 18:41:31 +00:00
|
|
|
|
2018-07-03 16:45:14 +00:00
|
|
|
=item B<-aes128>, B<-aes192>, B<-aes256>, B<-aria128>, B<-aria192>, B<-aria256>, B<-camellia128>, B<-camellia192>, B<-camellia256>, B<-des>, B<-des3>, B<-idea>
|
1999-11-10 02:52:17 +00:00
|
|
|
|
2014-07-03 02:42:40 +00:00
|
|
|
These options encrypt the private key with the specified
|
|
|
|
cipher before outputting it. A pass phrase is prompted for.
|
1999-11-10 02:52:17 +00:00
|
|
|
If none of these options is specified the key is written in plain text. This
|
2000-02-08 13:37:08 +00:00
|
|
|
means that using the B<dsa> utility to read in an encrypted key with no
|
1999-11-10 02:52:17 +00:00
|
|
|
encryption option can be used to remove the pass phrase from a key, or by
|
|
|
|
setting the encryption options it can be use to add or change the pass phrase.
|
|
|
|
These options can only be used with PEM format output files.
|
|
|
|
|
|
|
|
=item B<-text>
|
|
|
|
|
2017-03-29 21:38:30 +00:00
|
|
|
Prints out the public, private key components and parameters.
|
1999-11-10 02:52:17 +00:00
|
|
|
|
|
|
|
=item B<-noout>
|
|
|
|
|
2017-03-29 21:38:30 +00:00
|
|
|
This option prevents output of the encoded version of the key.
|
1999-11-10 02:52:17 +00:00
|
|
|
|
|
|
|
=item B<-modulus>
|
|
|
|
|
2017-03-29 21:38:30 +00:00
|
|
|
This option prints out the value of the public key component of the key.
|
1999-11-10 02:52:17 +00:00
|
|
|
|
|
|
|
=item B<-pubin>
|
|
|
|
|
2017-03-29 21:38:30 +00:00
|
|
|
By default, a private key is read from the input file. With this option a
|
2000-02-08 13:37:08 +00:00
|
|
|
public key is read instead.
|
1999-11-10 02:52:17 +00:00
|
|
|
|
|
|
|
=item B<-pubout>
|
|
|
|
|
2017-03-29 21:38:30 +00:00
|
|
|
By default, a private key is output. With this option a public
|
1999-11-10 02:52:17 +00:00
|
|
|
key will be output instead. This option is automatically set if the input is
|
|
|
|
a public key.
|
|
|
|
|
2003-01-30 22:02:27 +00:00
|
|
|
=item B<-engine id>
|
|
|
|
|
2017-03-29 21:38:30 +00:00
|
|
|
Specifying an engine (by its unique B<id> string) will cause B<dsa>
|
2003-01-30 22:02:27 +00:00
|
|
|
to attempt to obtain a functional reference to the specified engine,
|
|
|
|
thus initialising it if needed. The engine will then be set as the default
|
|
|
|
for all available algorithms.
|
|
|
|
|
1999-11-10 02:52:17 +00:00
|
|
|
=back
|
|
|
|
|
1999-11-13 21:58:39 +00:00
|
|
|
=head1 NOTES
|
|
|
|
|
|
|
|
The PEM private key format uses the header and footer lines:
|
|
|
|
|
|
|
|
-----BEGIN DSA PRIVATE KEY-----
|
|
|
|
-----END DSA PRIVATE KEY-----
|
|
|
|
|
2000-02-08 13:37:08 +00:00
|
|
|
The PEM public key format uses the header and footer lines:
|
|
|
|
|
|
|
|
-----BEGIN PUBLIC KEY-----
|
|
|
|
-----END PUBLIC KEY-----
|
|
|
|
|
1999-11-10 02:52:17 +00:00
|
|
|
=head1 EXAMPLES
|
|
|
|
|
|
|
|
To remove the pass phrase on a DSA private key:
|
|
|
|
|
2000-01-24 02:24:37 +00:00
|
|
|
openssl dsa -in key.pem -out keyout.pem
|
1999-11-10 02:52:17 +00:00
|
|
|
|
|
|
|
To encrypt a private key using triple DES:
|
|
|
|
|
2000-01-24 02:24:37 +00:00
|
|
|
openssl dsa -in key.pem -des3 -out keyout.pem
|
1999-11-10 02:52:17 +00:00
|
|
|
|
2016-05-20 12:11:46 +00:00
|
|
|
To convert a private key from PEM to DER format:
|
1999-11-10 02:52:17 +00:00
|
|
|
|
2000-01-24 02:24:37 +00:00
|
|
|
openssl dsa -in key.pem -outform DER -out keyout.der
|
1999-11-10 02:52:17 +00:00
|
|
|
|
|
|
|
To print out the components of a private key to standard output:
|
|
|
|
|
2000-01-24 02:24:37 +00:00
|
|
|
openssl dsa -in key.pem -text -noout
|
1999-11-10 02:52:17 +00:00
|
|
|
|
|
|
|
To just output the public part of a private key:
|
|
|
|
|
2000-01-24 02:24:37 +00:00
|
|
|
openssl dsa -in key.pem -pubout -out pubkey.pem
|
1999-11-10 02:52:17 +00:00
|
|
|
|
|
|
|
=head1 SEE ALSO
|
|
|
|
|
2015-08-17 19:21:33 +00:00
|
|
|
L<dsaparam(1)>, L<gendsa(1)>, L<rsa(1)>,
|
|
|
|
L<genrsa(1)>
|
1999-11-10 02:52:17 +00:00
|
|
|
|
2016-05-18 15:44:05 +00:00
|
|
|
=head1 COPYRIGHT
|
|
|
|
|
2018-09-11 12:22:14 +00:00
|
|
|
Copyright 2000-2018 The OpenSSL Project Authors. All Rights Reserved.
|
2016-05-18 15:44:05 +00:00
|
|
|
|
|
|
|
Licensed under the OpenSSL license (the "License"). You may not use
|
|
|
|
this file except in compliance with the License. You can obtain a copy
|
|
|
|
in the file LICENSE in the source distribution or at
|
|
|
|
L<https://www.openssl.org/source/license.html>.
|
|
|
|
|
|
|
|
=cut
|