ssh-keygen-g3 — authentication key pair generator
ssh-keygen-g3 (ssh-keygen-g3.exe on
Windows) is a tool that generates and manages authentication keys for
Secure Shell. Each user wishing to use a Secure Shell client with
public-key authentication can run this tool to create authentication
keys. Additionally, the system administrator can use this to generate
host keys for the Secure Shell server.
By default, if no path for the key files is specified, the key
pair is generated under the user's home directory
($HOME/.ssh2 on Unix, %USERPROFILE%\Application
Data\SSH\UserKeys on Windows). If no filename is specified, the
key pair is likewise stored under the user's home directory with such
filenames as id_dsa_1024_a and
id_dsa_1024_a.pub.
The following options are available:
-b bitsSpecifies the length of the key in bits (default 2048).
-t dsa|rsa Selects the type of the key. Valid options are dsa (default) and rsa.
--fips-mode [={yes|no}]Generates the key using the FIPS mode for the cryptographic library. The default is no.
--fips-crypto-dll-path pathSpecifies the location of the FIPS cryptographic DLL.
-c comment_stringSpecifies the key's comment string.
-e fileEdits the specified key. Makes ssh-keygen-g3 interactive. You can change
the key's passphrase or comment.
-p passphraseSpecifies the passphrase used.
-PSpecifies that the key will be saved with an empty passphrase.
-h | -?Displays help and exits.
-qHides the progress indicator.
-1 fileConverts a key from the SSH1 format to the SSH2 format.
-i fileLoads and displays information on file.
-D fileDerives the public key from the private key file.
-B numberSpecifies the number base for displaying key information (default 10).
-VDisplays version string and exits.
-r fileAdds entropy from file to the random pool. If file
contains 'relatively random' data (i.e. data unpredictable by a
potential attacker), the randomness of the pool is increased. Good
randomness is essential for the security of the generated keys.
--overwrite [={yes|no}]Overwrite files with the same filenames. The default is to overwrite.
-x fileConverts a private key from the X.509 format to the SSH2 format.
-k fileConverts a PKCS #12 file to an SSH2-format certificate and private key.
-7 fileExtracts certificates from a PKCS #7 file.
-F fileDumps the fingerprint of the given public key. The fingerprint is given in the Bubble Babble format, which makes the fingerprint look like a string of "real" words (making it easier to pronounce).
-H, --hostkeyGenerates a Secure Shell host key pair and stores the key pair in
the default host key directory (/etc/ssh2 on Unix,
C:\Program Files\SSH Communications Security\SSH Tectia\SSH Tectia Server on Windows).
--import-public-key infile outfileAttempts to import a public key from
infile and store it to
outfile in SSH2 native format.
--import-private-key infile outfileAttempts to import an unencrypted private key from
infile and store it to
outfile in SSH2 native private key
format.
--import-ssh1-authorized-keys infile outfileImports an SSH1-style authorized_keys file
infile and generates an SSH2-style
authorization file outfile and stores the
keys from infile to generated files into the
same directory with outfile.