|
1490 | 1490 | </span></dt><dd><p>Generate a new key.</p></dd><dt><span class="term">
|
1491 | 1491 | <code class="option">--key-type</code> <em class="replaceable"><code>specification</code></em>
|
1492 | 1492 | </span></dt><dd><p>Specify the type and (not always compulsory) flavour (byte-wise symmetric key length, bit-wise asymmetric key length,
|
1493 |
| - elliptic curve identifier, etc.) of the key to create, for example RSA:2048, EC:prime256v1, GOSTR3410-2012-256:B, |
| 1493 | + elliptic curve identifier, etc.) of the key to create, for example RSA:2048, EC:prime256v1, EC:ED25519, EC:X448, GOSTR3410-2012-256:B, |
1494 | 1494 | DES:8, DES3:24, AES:16, AES: or GENERIC:64. If the key type was incompletely specified, possible values are listed.</p></dd><dt><span class="term">
|
1495 | 1495 | <code class="option">--usage-sign</code>
|
1496 | 1496 | </span></dt><dd><p>Specify 'sign' key usage flag (sets SIGN in privkey, sets VERIFY in pubkey).</p></dd><dt><span class="term">
|
|
1571 | 1571 | environment variable <em class="replaceable"><code>VARIABLE</code></em> is
|
1572 | 1572 | used.</p><p>This option will also set
|
1573 | 1573 | the <code class="option">--login</code> option.</p></dd><dt><span class="term">
|
| 1574 | + <code class="option">--public-key-info</code> |
| 1575 | + </span></dt><dd><p>Read public key from the module using "CKA_PUBLIC_KEY_INFO" |
| 1576 | + (use with <code class="option">--read-object --type public</code>). |
| 1577 | + The output is a "SubjectPublicKeyInfo" i.e. as used in certificates |
| 1578 | + and openssl.</p></dd><dt><span class="term"> |
1574 | 1579 | <code class="option">--puk</code> <em class="replaceable"><code>puk</code></em>
|
1575 | 1580 | </span></dt><dd><p>Supply User PUK on the command line.</p></dd><dt><span class="term">
|
1576 | 1581 | <code class="option">--new-pin</code> <em class="replaceable"><code>pin</code></em>
|
|
2004 | 2009 | </p><p>
|
2005 | 2010 | where <em class="replaceable"><code>keyspec</code></em> describes the algorithm and the parameters
|
2006 | 2011 | of the key to be created. For example, <code class="literal">rsa:2048</code> generates a RSA key
|
2007 |
| - with 2048-bit modulus. If you are generating an EC key, the curve designation must |
2008 |
| - be specified, for example <code class="literal">ec:prime256v1</code>. For symmetric key, |
| 2012 | + with 2048-bit modulus, default is 3072. If you are generating an EC key, the curve designation must |
| 2013 | + be specified, for example <code class="literal">ec:prime256v1</code>. |
| 2014 | + The following curves do not need parameters: |
| 2015 | + Edwards 25519 curves use one of these equivalent names: Ed25519(preferred), ed25519 or edwards25519 |
| 2016 | + and for the 448 curve use: Ed448. |
| 2017 | + For Montgomery 25519 curves use one of these equivalent names: X25519(preferred), cv25519 or curve25519 |
| 2018 | + and for the 448 curve use: X448. |
| 2019 | + For symmetric key, |
2009 | 2020 | the length of key is specified in bytes, for example <code class="literal">AES:32</code>
|
2010 | 2021 | or <code class="literal">DES3:24</code>.
|
2011 | 2022 | </p><p>
|
|
0 commit comments