/openssl/apps/ |
H A D | prime.c | 63 int hex = 0, generate = 0, bits = 0, safe = 0, ret = 1; in prime_main() local 83 generate = 1; in prime_main() 103 if (generate && !opt_check_rest_arg(NULL)) in prime_main() 107 if (!generate && argc == 0) { in prime_main() 112 if (generate) { in prime_main()
|
/openssl/doc/HOWTO/ |
H A D | keys.txt | 14 RSA and DSA, and this HOWTO will show how to generate each of them. 17 2. To generate an RSA key 35 3. To generate a DSA key 41 you have to generate parameters from which to generate the key: 49 When that is done, you can generate a key using the parameters in 60 4. To generate an EC key 76 When that is done, you can generate a key using the created parameters (several 85 You can also directly generate the key in one step: 103 the following command to generate an X25519 key:
|
/openssl/doc/man1/ |
H A D | openssl-prime.pod.in | 13 [B<-generate>] 24 If no numbers are given on the command line, the B<-generate> flag should 25 be used to generate primes according to the requirements specified by the 40 =item B<-generate> 50 When used with B<-generate>, generates a "safe" prime. If the number
|
H A D | openssl-dsaparam.pod.in | 28 This command is used to manipulate or generate DSA parameter files. 31 DSA parameters is often used to generate several distinct keys. 78 This option will generate a DSA either using the specified or generated
|
H A D | openssl-genrsa.pod.in | 6 openssl-genrsa - generate an RSA private key 99 The size of the private key to generate in bits. This must be the last option 114 Because key generation is a random process the time taken to generate a key
|
H A D | openssl-genpkey.pod.in | 10 openssl-genpkey - generate a private key or key pair 113 Some public key algorithms generate a private key based on a set of parameters. 269 generate valid primes. 315 generate DHX parameters. 326 The type name of DH parameters to generate. Valid values are: 362 The type of DH parameters to generate. Valid values are 0, 1, 2 or 3 395 generate valid primes. 506 The ability to use NIST curve names, and to generate an EC key directly, 508 The ability to generate X25519 keys was added in OpenSSL 1.1.0. 509 The ability to generate X448, ED25519 and ED448 keys was added in OpenSSL 1.1.1.
|
H A D | openssl-ecparam.pod.in | 31 This command is used to manipulate or generate EC parameter files. 33 OpenSSL is currently not able to generate new groups and therefore 122 This option will generate an EC private key using the specified parameters.
|
/openssl/providers/implementations/rands/ |
H A D | test_rng.c | 44 unsigned int generate; member 136 if (t->generate) { in test_rng_generate() 169 if (t->generate) { in test_rng_nonce() 200 if (p != NULL && !OSSL_PARAM_set_uint(p, t->generate)) in test_rng_get_ctx_params() 264 if (p != NULL && !OSSL_PARAM_get_uint(p, &t->generate)) in test_rng_set_ctx_params()
|
H A D | drbg_local.h | 81 int (*generate)(PROV_DRBG *, unsigned char *out, size_t outlen, member 188 int (*generate)(PROV_DRBG *, unsigned char *out, size_t outlen,
|
/openssl/demos/certs/ |
H A D | README.txt | 1 There is often a need to generate test certificates automatically using 6 The mkcerts.sh script is an example of how to generate certificates
|
/openssl/Configurations/ |
H A D | common0.tmpl | 7 # need to extrapolate exactly what we need to generate. The way to do 23 sort ( ( grep { defined $unified_info{generate}->{$_} }
|
/openssl/doc/man3/ |
H A D | SSL_CTX_set_generate_session_id.pod | 42 Without a callback being set, an OpenSSL server will generate a unique 51 The callback is only allowed to generate a shorter id and reduce B<id_len>; 63 SSL_has_matching_session_id() and generate another id if a conflict occurs. 82 The callback must return 0 if it cannot generate a session id for whatever 95 The callback function listed will generate a session id with the
|
H A D | RSA_sign.pod | 36 B<type> denotes the message digest algorithm that was used to generate 44 the message digest algorithm that was used to generate the signature.
|
H A D | SSL_CTX_set_stateless_cookie_generate_cb.pod | 42 L<SSL_stateless(3)> to generate the application-controlled portion of the cookie 58 to generate the cookie provided to clients in the HelloVerifyRequest transmitted
|
H A D | SSL_CTX_set_tmp_dh_callback.pod | 51 (DH parameters) and generate a DH key. The server will always generate 55 should not generate the parameters on the fly. DH parameters can be reused, as
|
H A D | SRP_VBASE_new.pod | 37 If B<seed_key> is not NULL a copy is stored and used to generate dummy parameters 53 to use L<openssl-srp(1)> to generate this file.
|
H A D | RAND_bytes.pod | 6 RAND_pseudo_bytes - generate random data 58 error state and refuse to generate random bytes. For that reason, it is important
|
/openssl/doc/man7/ |
H A D | EVP_RAND-TEST-RAND.pod | 10 for test purposes only, it does not generate random numbers. 57 The current position is remembered across generate calls. 65 =item "generate" (B<OSSL_RAND_PARAM_GENERATE>) <integer>
|
H A D | EVP_KEYEXCH-X25519.pod | 33 The code to generate a shared secret is identical to
|
/openssl/doc/designs/ |
H A D | fast-param-find.md | 20 "static" => "yes", # "yes" to generate static functions (default) or 103 - "functions" is the functions to generate. By default both setters and 135 - nocode: do not generate code for this parameter 137 - unpublished: do not generate this parameter in the gettable/settable list 155 Would generate something along the lines of:
|
/openssl/crypto/err/ |
H A D | README.md | 13 Running make errors will then generate a file `xxx_err.c`, and 51 The target will process relevant sources and generate error codes for
|
/openssl/util/perl/OpenSSL/Config/ |
H A D | Query.pm | 117 ( ( $self->{info}->{generate}->{$_} // [] ) -> [0] // () );
|
/openssl/doc/life-cycles/ |
H A D | README.md | 12 To generate the rendered images, you need to install the following packages:
|
/openssl/crypto/evp/ |
H A D | evp_rand.c | 36 OSSL_FUNC_rand_generate_fn *generate; member 166 if (rand->generate != NULL) in evp_rand_from_algorithm() 168 rand->generate = OSSL_FUNC_rand_generate(fns); in evp_rand_from_algorithm() 570 if (!ctx->meth->generate(ctx->algctx, out, chunk, strength, in evp_rand_generate_locked()
|
/openssl/ |
H A D | Configure | 2066 my %generate = (); 2387 if ($s eq $src_configdata || $generate{$_} || ! -f $s) { 2432 if ($s eq $src_configdata || $generate{$_} || ! -f $s) { 2475 foreach (keys %generate) { 2479 ,join(" ", @{$generate{$_}}),"\n" 2480 if scalar @{$generate{$_}} > 1; 2481 my @generator = split /\s+/, $generate{$dest}->[0]; 2486 if ($generate{$gen} || ! -f $generator[0]) { 2739 $d eq "configdata.pm" || defined($unified_info{generate}->{$d})
|