Annotation of embedaddon/strongswan/src/pki/man/pki---gen.1.in, revision 1.1

1.1     ! misho       1: .TH "PKI \-\-GEN" 1 "2016-12-13" "@PACKAGE_VERSION@" "strongSwan"
        !             2: .
        !             3: .SH "NAME"
        !             4: .
        !             5: pki \-\-gen \- Generate a new RSA or ECDSA private key
        !             6: .
        !             7: .SH "SYNOPSIS"
        !             8: .
        !             9: .SY pki\ \-\-gen
        !            10: .OP \-\-type type
        !            11: .OP \-\-size bits
        !            12: .OP \-\-safe\-primes
        !            13: .OP \-\-shares n
        !            14: .OP \-\-threshold l
        !            15: .OP \-\-outform encoding
        !            16: .OP \-\-debug level
        !            17: .YS
        !            18: .
        !            19: .SY pki\ \-\-gen
        !            20: .BI \-\-options\~ file
        !            21: .YS
        !            22: .
        !            23: .SY "pki \-\-gen"
        !            24: .B \-h
        !            25: |
        !            26: .B \-\-help
        !            27: .YS
        !            28: .
        !            29: .SH "DESCRIPTION"
        !            30: .
        !            31: This sub-command of
        !            32: .BR pki (1)
        !            33: is used to generate a new RSA or ECDSA private key.
        !            34: .
        !            35: .SH "OPTIONS"
        !            36: .
        !            37: .TP
        !            38: .B "\-h, \-\-help"
        !            39: Print usage information with a summary of the available options.
        !            40: .TP
        !            41: .BI "\-v, \-\-debug " level
        !            42: Set debug level, default: 1.
        !            43: .TP
        !            44: .BI "\-+, \-\-options " file
        !            45: Read command line options from \fIfile\fR.
        !            46: .TP
        !            47: .BI "\-t, \-\-type " type
        !            48: Type of key to generate. Either \fIrsa\fR, \fIecdsa\fR, \fIed25519\fR,
        !            49: \fIed448\fR or \fIbliss\fR, defaults to \fIrsa\fR.
        !            50: .TP
        !            51: .BI "\-s, \-\-size " bits
        !            52: Key length in bits. Defaults to 2048 for \fIrsa\fR and 384 for \fIecdsa\fR.
        !            53: For \fIecdsa\fR only three values are currently supported: 256, 384 and 521.
        !            54: .TP
        !            55: .BI "\-p, \-\-safe\-primes"
        !            56: Generate RSA safe primes.
        !            57: .TP
        !            58: .BI "\-f, \-\-outform " encoding
        !            59: Encoding of the generated private key. Either \fIder\fR (ASN.1 DER) or \fIpem\fR
        !            60: (Base64 PEM), defaults
        !            61: to \fIder\fR.
        !            62: .PP
        !            63: .SS "RSA Threshold Cryptography"
        !            64: .TP
        !            65: .BI "\-n, \-\-shares " <n>
        !            66: Number of private RSA key shares.
        !            67: .TP
        !            68: .BI "\-l, \-\-threshold " <l>
        !            69: Minimum number of participating RSA key shares.
        !            70: .
        !            71: .SH "PROBLEMS ON HOSTS WITH LOW ENTROPY"
        !            72: .
        !            73: If the
        !            74: .I gmp
        !            75: plugin is used to generate RSA private keys the key material is read from
        !            76: .I /dev/random
        !            77: (via the
        !            78: .I random
        !            79: plugin). Therefore, the command may block if the system's entropy pool is empty.
        !            80: To avoid this, either use a hardware random number generator to feed
        !            81: .I /dev/random
        !            82: or use OpenSSL (via the
        !            83: .I openssl
        !            84: plugin or the command line) which is not as strict in regards to the quality of
        !            85: the key material (it reads from
        !            86: .I /dev/urandom
        !            87: if necessary). It is also possible to configure the devices used by the
        !            88: .I random
        !            89: plugin in
        !            90: .BR strongswan.conf (5).
        !            91: Setting
        !            92: .B libstrongswan.plugins.random.random
        !            93: to
        !            94: .I /dev/urandom
        !            95: forces the plugin to treat bytes read from
        !            96: .I /dev/urandom
        !            97: as high grade random data, thus avoiding the blocking. Of
        !            98: course, this doesn't change the fact that the key material generated this way is
        !            99: of lower quality.
        !           100: .
        !           101: .SH "EXAMPLES"
        !           102: .
        !           103: .TP
        !           104: .B pki \-\-gen \-\-size 3072 > rsa_key.der
        !           105: Generates a 3072-bit RSA private key.
        !           106: .
        !           107: .TP
        !           108: .B pki \-\-gen \-\-type ecdsa \-\-size 256 > ecdsa_key.der
        !           109: Generates a 256-bit ECDSA private key.
        !           110: .
        !           111: .SH "SEE ALSO"
        !           112: .
        !           113: .BR pki (1)

FreeBSD-CVSweb <freebsd-cvsweb@FreeBSD.org>