The genrsa command generates an RSA private key.
Print out a usage message.
Output the key to the specified file. If this argument is not specified then standard output is used.
-aes128| -aes192| -aes256| -aria128| -aria192| -aria256| -camellia128| -camellia192| -camellia256| -des| -des3| -idea
These options encrypt the private key with specified cipher before outputting it. If none of these options is specified no encryption is used. If encryption is used a pass phrase is prompted for if it is not supplied via the
-passoutargument. -F4| -3
the public exponent to use, either 65537 or 3. The default is 65537.
a file or files containing random data used to seed the random number generator. Multiple files can be specified separated by an OS-dependent character. The separator is ; for MS-Windows, , for OpenVMS, and : for all others.
Writes random data to the specified file upon exit. This can be used with a subsequent
specifying an engine (by its unique id string) will cause genrsa to attempt to obtain a functional reference to the specified engine, thus initialising it if needed. The engine will then be set as the default for all available algorithms.
Specify the number of primes to use while generating the RSA key. The num parameter must be a positive integer that is greater than 1 and less than 16. If num is greater than 2, then the generated key is called a 'multi-prime' RSA key, which is defined in RFC 8017.
the size of the private key to generate in bits. This must be the last option specified. The default is 2048, and values less than 512 are not allowed.
RSA private key generation essentially involves the generation of two or more prime numbers. When generating a private key various symbols will be output to indicate the progress of the generation. A . represents each number which has passed an initial sieve test, + means a number has passed a single round of the Miller-Rabin primality test, * means that the current prime starts a regenerating progress due to some failed tests. A newline means that the number has passed all the prime tests (the actual number depends on the key size).
Because key generation is a random process the time taken to generate a key may vary somewhat. But in general, more primes lead to less generation time of a key.
Copyright 2016-2018 The OpenSSL Project Authors. All Rights Reserved.
Licensed under the OpenSSL license (the "License"). You may not use this file except in compliance with the License. You can obtain a copy in the file LICENSE in the source distribution or here: OpenSSL.
PTC MKS Toolkit for System Administrators
PTC MKS Toolkit for Developers
PTC MKS Toolkit for Interoperability
PTC MKS Toolkit for Professional Developers
PTC MKS Toolkit for Professional Developers 64-Bit Edition
PTC MKS Toolkit for Enterprise Developers
PTC MKS Toolkit for Enterprise Developers 64-Bit Edition
- openssl gendsa
PTC MKS Toolkit 10.3 Documentation Build 39.