| alias
 | 
The VALUE for aliasspecifies an alias to assign to the key. | 
| blobsavefile
 | 
When using the customapplication type, the VALUE forblobsavefilespecifies a file name of the form FILENAME_req.ext to which the key blob is saved.
Additionally, a text file containing information about the key is saved to a file whose name has the form ROOT_inf.txt; for asymmetric key types, the public key blob is also saved to a file whose name has the form ROOT_pub.EXT. | 
| cardset
 | 
The VALUE for cardsetspecifies an OCS that is to protect the key (ifprotectis set totoken). In interactive mode, if you do not specify an OCS, you are prompted to select one at card-loading time.
The default is the OCS to which the card currently inserted in the slot belongs (or the first one returned bynfkminfo). | 
| certreq
 | 
Setting certreqenables you to generate a certificate request when generating a PKCS #11 key (RSA keys only). The default behavior is to not generate a certificate request. 
To generate a certificate request you must set the VALUE for certreqtoyes, which makesgeneratekeyprompt you to fill in the extra fields required to generate a key with a certificate request.
The resultant certificate request is saved to the current working directory with a file name of the form FILENAMEreq.ext(where FILENAME is a name of your choice). 
An extra file with a name of the form FILENAME.extis also generated for use as a pseudo-key-header.
This file can be removed after the certificate request has been generated.
You can usecertreqwith the--retargetoption to generate a self-signed certificate for an existing key. | 
| checks
 | 
For RSA key generation only, this specifies the number of checks to be performed.
Normally, you should leave VALUE empty to let the module pick an appropriate default. | 
| curve
 | 
For ECDH and ECDSA key generation only, the VALUE for curvespecifies which curves from the supported range to use.
Supported curves are: ANSIB163v1, ANSIB191v1,BrainpoolP160r1, BrainpoolP160t1, BrainpoolP192r1, BrainpoolP192t1, BrainpoolP224r1, BrainpoolP224t1, BrainpoolP256r1, BrainpoolP256t1, BrainpoolP320r1, BrainpoolP320t1, BrainpoolP384r1, BrainpoolP384t1, BrainpoolP512r1, BrainpoolP512t1, NISTP192, NISTP224, NISTP256, NISTP384, NISTP521, NISTB163, NISTB233, NISTB283, NISTB409, NISTB571, NISTK163, NISTK233, NISTK283, NISTK409, NISTK571, SECP160r1 and SECP256k1 | 
| embedconvfile
 | 
The VALUE for embedconvfilespecifies the name of the PEM file that contains the RSA key to be converted. | 
| embedsavefile
 | 
When using the embedapplication type, theVALUEforembedsavefilespecifies the name for the file where the fake RSA private key is to be saved.
The file has the same syntax as an RSA private key file, but actually contains the key identifier rather than the key itself, which remains protected. 
A certificate request and a self-signed certificate are also written.
If the filename is ROOT.EXTthen the request is saved to ROOT_req.EXTand the self-signed certificate is saved to ROOT_selfcert.EXT. | 
| from-application
 | 
When retargeting a key, the VALUE for from-applicationspecifies the application name of the key to be retargeted.
Only applications for which at least one key exists are acceptable. | 
| from-ident
 | 
When retargeting a key, the VALUE for from-identspecifies the identifier of the key to be retargeted (as displayed by thenfkminfocommand-line utility). | 
| hexdata
 | 
The VALUE for hexdataspecifies the hex value of DES or Triple DES key to import.
The hex digits are echoed to the screen and can appear in process listings if this parameter is specified in the command line. | 
| ident
 | 
The VALUE for identspecifies a unique identifier for the key in the Security World.
For applications of typessimple, this is the key identifier to use.
For other application types, keys are assigned an automatically generated identifier and accessed by means of some application-specific name. 
The following characters are allowed in key IDs: 
digits 0-9
lower-case letters a-z
hyphen (-) | 
| keystore
 | 
The VALUE for keystorespecifies the file name of the key store to use.
This must be an nShield key store. | 
| keystorepass
 | 
The VALUE for keystorepassspecifies the password to the key store to use. | 
| logkeyusage
 | 
The VALUE for logkeyusagespecifies if usage of the generated key in cryptographic operations is subject to audit logging.
If set to yes the ACL of the generated key will predicate audit-logging entries to be made for cryptographic usages of the key.
The default is no. | 
| module
 | 
The VALUE for modulespecifies a module to use when generating the key.
If there is more than one usable module, you are prompted to supply a value for one of them.
The default is the first usable module (one in the current Security World and in the operational state). 
|  | You can also specify a module by setting the --moduleoption. |  | 
| paramsreadfile
 | 
The VALUE for paramsreadfilespecifies the name of the group parameters file that contains the discrete log group parameters for Diffie-Hellman keys only.
This should be a PEM-formatted PKCS#3 file.
If a VALUE forparamsreadfileis not specified, the module uses a default file. | 
| pemreadfile
 | 
The VALUE for pemreadfilespecifies the name of the PEM file that contains the key to be imported.
When importing an RSA key, this is the name of the PEM-encoded PKCS #1 file to read it from.
Password-protected PEM files are not supported. | 
| plainname
 | 
The VALUE for plainnamespecifies the key name within the Security World.
For some applications, the key identifier is derived from the name, but for others the name is just recorded inkmdata(Linux) or%NFAST_KMDATA%(Windows) and not used otherwise. | 
| protect
 | 
The VALUE for protectspecifies the protection method, which can bemodulefor security-world protection,softcardfor softcard protection ortokenfor Operator Card Set protection.
The default istoken, except forseeconfkeys, where the default ismodule.seeintegkeys are always token-protected.
Thesoftcardoption is only available when your system has at least one softcard present. | 
| pubexp
 | 
For RSA key generation only, the VALUE for pubexpspecifies (in hexadecimal format) the public exponent to use when generating RSA keys.
We recommend leaving this parameter blank unless advised to supply a particular value by Support. | 
| recovery
 | 
The VALUE for recoveryenables recovery for this key and is only available for card-set protected keys in a recovery-enabled world.
If set toyes, the key is recoverable.
If set tono, key is not recoverable.
The default isyes. Non-recoverable module-protected keys are not supported. | 
| seeintegname
 | 
If present, the VALUE for seeintegnameidentifies aseeintegkey.
The ACL of the newly generated private key is modified to require a certificate from theseeintegkey for its main operational permissions, suchDecryptandSign(DuplicateHandle,ReduceACL, andGetACLare still permitted without certification.) 
If you use seeintegnameto specify a key that has been recovered with therocsutility, you must also use the-Noption withgeneratekey. | 
| selfcert
 | 
The VALUE for selfcertenables you to generate a self-signed certificate when generating a PKCS #11 key (RSA keys only). To generate a self-signed certificate request you must setselfcerttoyes, which makesgeneratekeyprompt you to fill in the extra fields required to generate a key with a self-signed certificate.
The resultant certificate is saved to the current working directory with a file name of the form FILENAME.ext. You can use this parameter with the--retargetoption to generated a self-signed certificate for an existing key. | 
| size
 | 
For key types with variable-sized keys, the VALUE for sizespecifies the key size in bits.
The range of allowable sizes depends on the key type and whether the--no-verifyoption is used.
The default depends on the key type; for information on available key types and sizes, see Cryptographic algorithms.
This parameter does not exist for fixed-size keys, nor for ECDH and ECDSA keys which are specified usingcurve. | 
| strict
 | 
For DSA key generation only, setting the VALUE for stricttoyesenables strict verification, which also limits the size to 2048 or 3072 bits.
The default isno. | 
| type
 | 
The VALUE for typespecifies the type of key.
You must usually specify the key type for generation and import (though some applications only support one key type, in which case you are not asked to choose). Sometimes the type must also be specified for retargeting; for information on available key types and sizes, see Cryptographic algorithms.
The--verifyoption limits the available key types. | 
| x509country
 | 
The VALUE for x509countryspecifies a country code, which must be a valid 2-letter code, for the certificate request. | 
| x509dnscommon
 | 
The VALUE for x509dnscommonspecifies a site domain name, which can be any valid domain name, for the certificate request. | 
| x509email
 | 
The VALUE for x509emailspecifies an email address for the certificate request. | 
| x509locality
 | 
The VALUE for x509localityspecifies a city or locality for the certificate request. | 
| x509org
 | 
The VALUE for x509orgspecifies an organization for the certificate request. | 
| x509orgunit
 | 
The VALUE for x509orgunitspecifies an organizational unit for the certificate request. | 
| x509province
 | 
The VALUE for x509provincespecifies a province for the certificate request. | 
| xsize
 | 
The VALUE for xsizespecifies the private key size in bits when generating Diffie-Hellman keys.
The defaults are 256 bits for a key size of 1500 bits or more or 160 bits for other key sizes. |