2014-01-15ISCInternet Systems Consortium, Inc.pkcs11-keygen8BIND9pkcs11-keygengenerate keys on a PKCS#11 device2009201420152016Internet Systems Consortium, Inc. ("ISC")pkcs11-keygen-a algorithmlabelDESCRIPTIONpkcs11-keygen causes a PKCS#11 device to generate
a new key pair with the given (which must be
unique) and with bits of prime.
ARGUMENTS-a algorithm
Specify the key algorithm class: Supported classes are RSA,
DSA, DH, and ECC. In addition to these strings, the
can be specified as a DNSSEC
signing algorithm that will be used with this key; for
example, NSEC3RSASHA1 maps to RSA, and ECDSAP256SHA256 maps
to ECC. The default class is "RSA".
-b keysize
Create the key pair with bits of
prime. For ECC keys, the only valid values are 256 and 384,
and the default is 256.
-e
For RSA keys only, use a large exponent.
-i id
Create key objects with id. The id is either
an unsigned short 2 byte or an unsigned long 4 byte number.
-m module
Specify the PKCS#11 provider module. This must be the full
path to a shared library object implementing the PKCS#11 API
for the device.
-P
Set the new private key to be non-sensitive and extractable.
The allows the private key data to be read from the PKCS#11
device. The default is for private keys to be sensitive and
non-extractable.
-p PIN
Specify the PIN for the device. If no PIN is provided on
the command line, pkcs11-keygen will
prompt for it.
-q
Quiet mode: suppress unnecessary output.
-S
For Diffie-Hellman (DH) keys only, use a special prime of
768, 1024 or 1536 bit size and base (aka generator) 2.
If not specified, bit size will default to 1024.
-s slot
Open the session with the given PKCS#11 slot. The default is
slot 0.
SEE ALSOpkcs11-destroy8,
pkcs11-list8,
pkcs11-tokens8,
dnssec-keyfromlabel8