Key generation options and parameters
This appendix describes the various options and parameters that you can set when running the generatekey
utility to control the application type and other properties of a key being generated.
For information about generating keys with the generatekey utility, see Generating keys with the command line.
|
Key application type (APPNAME)
The APPNAME
parameter specifies the name of the application for which generatekey
can generate keys.
Specifying an application can restrict your choice of key type.
A value for APPNAME
must follow any OPTIONS
and must precede any parameters specified for the key:
Parameter | Description |
---|---|
|
Specifying the |
|
Specifying the Specifying |
|
Specifying the
Some key types are only available if the features that support them have been enabled for the module, if the Security World is not compliant with FIPS 140 Level 3, or if you do not set the |
|
Specifying the In applications that use Security World software older than v12.60 and would use the legacy OpenSSL CHIL engine with
In applications that use v12.60 or later Security World software :
|
|
Specifying the |
|
Specifying the |
Key properties (NAME=VALUE)
The NAME=VALUE
syntax is used to specify the properties of the key being generated.
If a parameter’s argument contains spaces, you must enclose the argument within quotation marks (" " ).
|
You can supply an appropriate VALUE for the following NAME options:
Option | Description | ||
---|---|---|---|
|
The VALUE for |
||
(*nShield Solo XC) |
The VALUE for |
||
|
The VALUE for |
||
|
When using the |
||
|
The VALUE for |
||
|
Setting To generate a certificate request you must set the VALUE for An extra file with a name of the form FILENAME |
||
|
For RSA key generation only, this specifies the number of checks to be performed. Normally, you should leave VALUE empty to let the module pick an appropriate default. |
||
|
For ECDH and ECDSA key generation only, the VALUE for |
||
|
The VALUE for |
||
|
When using the A certificate request and a self-signed certificate are also written.
If the filename is ROOT |
||
|
When retargeting a key, the VALUE for |
||
|
When retargeting a key, the VALUE for |
||
|
The VALUE for |
||
|
The VALUE for The following characters are allowed in key IDs:
|
||
|
The VALUE for |
||
|
The VALUE for |
||
|
The VALUE for |
||
|
The VALUE for
|
||
|
The VALUE for |
||
|
The VALUE for |
||
|
The VALUE for |
||
|
The VALUE for |
||
|
For RSA key generation only, the VALUE for |
||
|
For MLDSA, MLKEM and SLHDSA key generation only, the VALUE for |
||
|
The VALUE for |
||
|
If present, the VALUE for
If you use |
||
|
The VALUE for |
||
|
For key types with variable-sized keys, the VALUE for |
||
|
For DSA key generation only, setting the VALUE for |
||
|
The VALUE for |
||
|
The VALUE for |
||
|
The VALUE for |
||
|
The VALUE for |
||
|
The VALUE for |
||
|
The VALUE for |
||
|
The VALUE for |
||
|
The VALUE for |
||
|
The VALUE for |
Parameter sets for Post-Quantum key types
The possible values and default for the scheme
parameter depends on the key type:
Key Type | Options | Reference |
---|---|---|
|
|
|
|
|
|
|
|
Key Import Formats
This section describes the formats used when importing a key. For asymmetric keys, it is always the private key that is imported. The public key is recomputed from the private key.
Key type | Parameter | Format |
---|---|---|
RSA |
|
Name of file containing PEM-encoded PKCS#1 format (see RFC7468 and RFC3447 A.1.2) |
EC |
|
Name of file containing PEM-encoded PKCS#8 format (see RFC7468, RFC5208 s5 and RFC5915) |
ECDH |
|
Name of file containing PEM-encoded PKCS#8 format (see RFC7468, RFC5208 s5 and RFC5915) |
ECDSA |
|
Name of file containing PEM-encoded PKCS#8 format (see RFC7468, RFC5208 s5 and RFC5915) |
Ed25519 |
|
Name of file containing PEM-encoded PKCS#8 format (see RFC7468, RFC5208 s5 and RFC8410) |
X25519 |
|
Name of file containing PEM-encoded PKCS#8 format (see RFC7468, RFC5208 s5 and RFC8410) |
MLKEM |
|
Name of file containing containing either full decapsulation key ( |
MLDSA |
|
Name of file containing containing either full private key ( |
SLHDSA |
|
Name of file containing containing either full private key ( |
AES |
|
Name of file containing containing 16-, 24 or 32-byte secret key |
HMAC key types |
|
Name of file containing containing secret key |
SEED |
|
Name of file containing containing 16-byte secret key |
ARIA |
|
Name of file containing containing 16-, 24 or 32-byte secret key |
Camellia |
|
Name of file containing containing 16-, 24 or 32-byte secret key |
DES |
|
Hexadecimal representation of 8-byte secret key |
DES2 |
|
Hexadecimal representation of 16-byte secret key |
DES3 |
|
Hexadecimal representation of 24-byte secret key |
Note that with pemreadfile
, password-protected PEM files are not supported.
Available key properties by action/application
The following table shows which actions (generate, import, and retarget) are applicable to the different NAME options:
Property | generate | import | retarget |
---|---|---|---|
|
X |
X |
X |
|
X |
||
|
X |
X |
X |
|
X |
X |
|
|
|||
|
X |
||
|
X |
||
|
X |
||
|
X |
X |
X |
|
X |
||
|
X |
||
|
X |
||
|
X |
X |
|
|
X |
X |
X |
|
X |
X |
X |
|
X |
X |
|
|
X |
X |
|
|
X |
||
|
X |
||
|
X |
X |
X |
|
X |
X |
|
|
X |
||
|
X |
||
|
X |
X |
|
|
X |
X |
|
|
|||
|
|||
|
X |
||
|
X |
||
|
X |
||
|
X |
X |
X |
|
X |
X |
X |
|
X |
X |
X |
|
X |
X |
X |
|
X |
X |
X |
|
X |
X |
X |
|
X |
X |
X |
|
X |
The following table shows which applications are applicable to the different NAME options:
Property | custom | embed | pkcs 11 | seeconf | seeinteg | simple |
---|---|---|---|---|---|---|
|
||||||
|
X |
X |
X |
|||
|
X |
|||||
|
X |
X |
X |
X |
||
|
X |
|||||
|
X |
X |
X |
X |
||
|
X |
X |
X |
X |
X |
X |
|
X |
|||||
|
X |
X |
||||
|
X |
X |
X |
X |
||
|
X |
X |
X |
X |
||
|
X |
X |
X |
X |
||
|
X |
|||||
|
||||||
|
||||||
|
X |
X |
X |
X |
||
|
X |
X |
X |
X |
||
|
X |
X |
X |
X |
X |
X |
|
X |
X |
||||
|
X |
X |
X |
X |
X |
X |
|
X |
X |
X |
X |
X |
X |
|
X |
X |
X |
X |
||
|
X |
X |
X |
X |
||
|
X |
X |
X |
X |
X |
X |
|
X |
X |
||||
|
X |
X |
||||
|
X |
|||||
|
X |
X |
X |
X |
X |
X |
|
X |
X |
X |
X |
||
|
X |
X |
X |
X |
X |
X |
|
X |
|||||
|
X |
|||||
|
X |
|||||
|
X |
|||||
|
X |
|||||
|
X |
|||||
|
X |
|||||
|
X |
X |
X |
X |