/openssl/apps/ |
H A D | prime.c | 63 int hex = 0, generate = 0, bits = 0, safe = 0, ret = 1; in prime_main() local 83 generate = 1; in prime_main() 103 if (generate && !opt_check_rest_arg(NULL)) in prime_main() 107 if (!generate && argc == 0) { in prime_main() 112 if (generate) { in prime_main()
|
/openssl/doc/man1/ |
H A D | openssl-prime.pod.in | 13 [B<-generate>] 24 If no numbers are given on the command line, the B<-generate> flag should 25 be used to generate primes according to the requirements specified by the 40 =item B<-generate> 50 When used with B<-generate>, generates a "safe" prime. If the number
|
H A D | openssl-dsaparam.pod.in | 27 This command is used to manipulate or generate DSA parameter files. 30 DSA parameters is often used to generate several distinct keys. 75 This option will generate a DSA either using the specified or generated
|
H A D | openssl-genrsa.pod.in | 6 openssl-genrsa - generate an RSA private key 102 The size of the private key to generate in bits. This must be the last option 117 Because key generation is a random process the time taken to generate a key
|
H A D | openssl-genpkey.pod.in | 10 openssl-genpkey - generate a private key 102 Some public key algorithms generate a private key based on a set of parameters. 256 generate valid primes. 302 generate DHX parameters. 313 The type name of DH parameters to generate. Valid values are: 349 The type of DH parameters to generate. Valid values are 0, 1, 2 or 3 382 generate valid primes. 493 The ability to use NIST curve names, and to generate an EC key directly, 495 The ability to generate X25519 keys was added in OpenSSL 1.1.0. 496 The ability to generate X448, ED25519 and ED448 keys was added in OpenSSL 1.1.1.
|
H A D | openssl-ecparam.pod.in | 31 This command is used to manipulate or generate EC parameter files. 33 OpenSSL is currently not able to generate new groups and therefore 120 This option will generate an EC private key using the specified parameters.
|
/openssl/doc/HOWTO/ |
H A D | keys.txt | 14 RSA and DSA, and this HOWTO will show how to generate each of them. 17 2. To generate a RSA key 35 3. To generate a DSA key 41 you have to generate parameters from which to generate the key: 49 When that is done, you can generate a key using the parameters in 60 4. To generate an EC key 76 When that is done, you can generate a key using the created parameters (several 85 You can also directly generate the key in one step: 103 the following command to generate an X25519 key:
|
/openssl/demos/certs/ |
H A D | README.txt | 1 There is often a need to generate test certificates automatically using 6 The mkcerts.sh script is an example of how to generate certificates
|
/openssl/Configurations/ |
H A D | common0.tmpl | 7 # need to extrapolate exactly what we need to generate. The way to do 23 sort ( ( grep { defined $unified_info{generate}->{$_} }
|
/openssl/doc/man3/ |
H A D | SSL_CTX_set_generate_session_id.pod | 42 Without a callback being set, an OpenSSL server will generate a unique 51 The callback is only allowed to generate a shorter id and reduce B<id_len>; 63 SSL_has_matching_session_id() and generate another id if a conflict occurs. 82 The callback must return 0 if it cannot generate a session id for whatever 95 The callback function listed will generate a session id with the
|
H A D | RSA_sign.pod | 36 B<type> denotes the message digest algorithm that was used to generate 44 the message digest algorithm that was used to generate the signature.
|
H A D | SSL_CTX_set_stateless_cookie_generate_cb.pod | 42 L<SSL_stateless(3)> to generate the application-controlled portion of the cookie 58 to generate the cookie provided to clients in the HelloVerifyRequest transmitted
|
H A D | SSL_CTX_set_tmp_dh_callback.pod | 51 (DH parameters) and generate a DH key. The server will always generate 55 should not generate the parameters on the fly. DH parameters can be reused, as
|
H A D | SRP_VBASE_new.pod | 37 If B<seed_key> is not NULL a copy is stored and used to generate dummy parameters 53 to use L<openssl-srp(1)> to generate this file.
|
H A D | RAND_bytes.pod | 6 RAND_pseudo_bytes - generate random data 58 error state and refuse to generate random bytes. For that reason, it is important
|
/openssl/providers/implementations/rands/ |
H A D | drbg_local.h | 85 int (*generate)(PROV_DRBG *, unsigned char *out, size_t outlen, member 191 int (*generate)(PROV_DRBG *, unsigned char *out, size_t outlen,
|
H A D | drbg.c | 677 if (!drbg->generate(drbg, out, outlen, adin, adinlen)) { in ossl_prov_drbg_generate() 769 int (*generate)(PROV_DRBG *, unsigned char *out, size_t outlen, in ossl_rand_drbg_new() 789 drbg->generate = generate; in ossl_rand_drbg_new()
|
/openssl/doc/man7/ |
H A D | EVP_RAND-TEST-RAND.pod | 10 for test purposes only, it does not generate random numbers. 55 The current position is remembered across generate calls.
|
H A D | EVP_KEYEXCH-X25519.pod | 28 The code to generate a shared secret is identical to
|
H A D | EVP_RAND.pod | 162 Automatic reseeding occurs after a predefined number of generate requests. 169 Before satisfying a generate request (L<EVP_RAND_generate(3)>), the DRBG 174 - the number of generate requests since the last reseeding exceeds a 208 The <public> and <private> DRBG will detect this on their next generate 221 but also for every generate request.
|
/openssl/util/perl/OpenSSL/Config/ |
H A D | Query.pm | 117 ( ( $self->{info}->{generate}->{$_} // [] ) -> [0] // () );
|
/openssl/doc/life-cycles/ |
H A D | README.md | 12 To generate the rendered images, you need to install the following packages:
|
/openssl/crypto/evp/ |
H A D | evp_rand.c | 37 OSSL_FUNC_rand_generate_fn *generate; member 164 if (rand->generate != NULL) in evp_rand_from_algorithm() 166 rand->generate = OSSL_FUNC_rand_generate(fns); in evp_rand_from_algorithm() 558 if (!ctx->meth->generate(ctx->algctx, out, chunk, strength, in evp_rand_generate_locked()
|
/openssl/fuzz/ |
H A D | README.md | 130 The client and server fuzzer normally generate random numbers as part of the TLS 142 numbers that were generated. For instance the client fuzzer will always generate 162 - A default config, plus options needed to generate the fuzzer.
|
/openssl/ |
H A D | Configure | 1951 my %generate = (); 2272 if ($s eq $src_configdata || $generate{$_} || ! -f $s) { 2317 if ($s eq $src_configdata || $generate{$_} || ! -f $s) { 2360 foreach (keys %generate) { 2364 ,join(" ", @{$generate{$_}}),"\n" 2365 if scalar @{$generate{$_}} > 1; 2366 my @generator = split /\s+/, $generate{$dest}->[0]; 2371 if ($generate{$gen} || ! -f $generator[0]) {
|