Home
last modified time | relevance | path

Searched refs:generate (Results 1 – 25 of 100) sorted by relevance

1234

/openssl/apps/
H A Dprime.c63 int hex = 0, generate = 0, bits = 0, safe = 0, ret = 1; in prime_main() local
83 generate = 1; in prime_main()
103 if (generate && !opt_check_rest_arg(NULL)) in prime_main()
107 if (!generate && argc == 0) { in prime_main()
112 if (generate) { in prime_main()
/openssl/doc/man1/
H A Dopenssl-prime.pod.in13 [B<-generate>]
24 If no numbers are given on the command line, the B<-generate> flag should
25 be used to generate primes according to the requirements specified by the
40 =item B<-generate>
50 When used with B<-generate>, generates a "safe" prime. If the number
H A Dopenssl-dsaparam.pod.in27 This command is used to manipulate or generate DSA parameter files.
30 DSA parameters is often used to generate several distinct keys.
75 This option will generate a DSA either using the specified or generated
H A Dopenssl-genrsa.pod.in6 openssl-genrsa - generate an RSA private key
102 The size of the private key to generate in bits. This must be the last option
117 Because key generation is a random process the time taken to generate a key
H A Dopenssl-genpkey.pod.in10 openssl-genpkey - generate a private key
102 Some public key algorithms generate a private key based on a set of parameters.
256 generate valid primes.
302 generate DHX parameters.
313 The type name of DH parameters to generate. Valid values are:
349 The type of DH parameters to generate. Valid values are 0, 1, 2 or 3
382 generate valid primes.
493 The ability to use NIST curve names, and to generate an EC key directly,
495 The ability to generate X25519 keys was added in OpenSSL 1.1.0.
496 The ability to generate X448, ED25519 and ED448 keys was added in OpenSSL 1.1.1.
H A Dopenssl-ecparam.pod.in31 This command is used to manipulate or generate EC parameter files.
33 OpenSSL is currently not able to generate new groups and therefore
120 This option will generate an EC private key using the specified parameters.
/openssl/doc/HOWTO/
H A Dkeys.txt14 RSA and DSA, and this HOWTO will show how to generate each of them.
17 2. To generate a RSA key
35 3. To generate a DSA key
41 you have to generate parameters from which to generate the key:
49 When that is done, you can generate a key using the parameters in
60 4. To generate an EC key
76 When that is done, you can generate a key using the created parameters (several
85 You can also directly generate the key in one step:
103 the following command to generate an X25519 key:
/openssl/demos/certs/
H A DREADME.txt1 There is often a need to generate test certificates automatically using
6 The mkcerts.sh script is an example of how to generate certificates
/openssl/Configurations/
H A Dcommon0.tmpl7 # need to extrapolate exactly what we need to generate. The way to do
23 sort ( ( grep { defined $unified_info{generate}->{$_} }
/openssl/doc/man3/
H A DSSL_CTX_set_generate_session_id.pod42 Without a callback being set, an OpenSSL server will generate a unique
51 The callback is only allowed to generate a shorter id and reduce B<id_len>;
63 SSL_has_matching_session_id() and generate another id if a conflict occurs.
82 The callback must return 0 if it cannot generate a session id for whatever
95 The callback function listed will generate a session id with the
H A DRSA_sign.pod36 B<type> denotes the message digest algorithm that was used to generate
44 the message digest algorithm that was used to generate the signature.
H A DSSL_CTX_set_stateless_cookie_generate_cb.pod42 L<SSL_stateless(3)> to generate the application-controlled portion of the cookie
58 to generate the cookie provided to clients in the HelloVerifyRequest transmitted
H A DSSL_CTX_set_tmp_dh_callback.pod51 (DH parameters) and generate a DH key. The server will always generate
55 should not generate the parameters on the fly. DH parameters can be reused, as
H A DSRP_VBASE_new.pod37 If B<seed_key> is not NULL a copy is stored and used to generate dummy parameters
53 to use L<openssl-srp(1)> to generate this file.
H A DRAND_bytes.pod6 RAND_pseudo_bytes - generate random data
58 error state and refuse to generate random bytes. For that reason, it is important
/openssl/providers/implementations/rands/
H A Ddrbg_local.h85 int (*generate)(PROV_DRBG *, unsigned char *out, size_t outlen, member
191 int (*generate)(PROV_DRBG *, unsigned char *out, size_t outlen,
H A Ddrbg.c677 if (!drbg->generate(drbg, out, outlen, adin, adinlen)) { in ossl_prov_drbg_generate()
769 int (*generate)(PROV_DRBG *, unsigned char *out, size_t outlen, in ossl_rand_drbg_new()
789 drbg->generate = generate; in ossl_rand_drbg_new()
/openssl/doc/man7/
H A DEVP_RAND-TEST-RAND.pod10 for test purposes only, it does not generate random numbers.
55 The current position is remembered across generate calls.
H A DEVP_KEYEXCH-X25519.pod28 The code to generate a shared secret is identical to
H A DEVP_RAND.pod162 Automatic reseeding occurs after a predefined number of generate requests.
169 Before satisfying a generate request (L<EVP_RAND_generate(3)>), the DRBG
174 - the number of generate requests since the last reseeding exceeds a
208 The <public> and <private> DRBG will detect this on their next generate
221 but also for every generate request.
/openssl/util/perl/OpenSSL/Config/
H A DQuery.pm117 ( ( $self->{info}->{generate}->{$_} // [] ) -> [0] // () );
/openssl/doc/life-cycles/
H A DREADME.md12 To generate the rendered images, you need to install the following packages:
/openssl/crypto/evp/
H A Devp_rand.c37 OSSL_FUNC_rand_generate_fn *generate; member
164 if (rand->generate != NULL) in evp_rand_from_algorithm()
166 rand->generate = OSSL_FUNC_rand_generate(fns); in evp_rand_from_algorithm()
558 if (!ctx->meth->generate(ctx->algctx, out, chunk, strength, in evp_rand_generate_locked()
/openssl/fuzz/
H A DREADME.md130 The client and server fuzzer normally generate random numbers as part of the TLS
142 numbers that were generated. For instance the client fuzzer will always generate
162 - A default config, plus options needed to generate the fuzzer.
/openssl/
H A DConfigure1951 my %generate = ();
2272 if ($s eq $src_configdata || $generate{$_} || ! -f $s) {
2317 if ($s eq $src_configdata || $generate{$_} || ! -f $s) {
2360 foreach (keys %generate) {
2364 ,join(" ", @{$generate{$_}}),"\n"
2365 if scalar @{$generate{$_}} > 1;
2366 my @generator = split /\s+/, $generate{$dest}->[0];
2371 if ($generate{$gen} || ! -f $generator[0]) {

Completed in 54 milliseconds

1234