| /src/tests/sys/net/ |
| H A D | if_wg.sh | 45 pri1=$(wg genkey) 46 pri2=$(wg genkey) 109 pri1=$(wg genkey) 110 pri2=$(wg genkey) 186 pri1=$(wg genkey) 187 pri2=$(wg genkey) 276 pri1=$(wg genkey) 315 pri1=$(wg genkey) 316 pri2=$(wg genkey) 366 pri1=$(wg genkey) [all …]
|
| /src/crypto/openssl/apps/ |
| H A D | dsaparam.c | 80 int numbits = -1, numqbits = -1, num = 0, genkey = 0; in dsaparam_main() local 119 genkey = 1; in dsaparam_main() 160 private = genkey ? 1 : 0; in dsaparam_main() 216 if (outformat == FORMAT_ASN1 && genkey) in dsaparam_main() 229 if (genkey) { in dsaparam_main()
|
| H A D | ecparam.c | 120 int no_seed = 0, check = 0, check_named = 0, text = 0, genkey = 0; in ecparam_main() local 181 genkey = 1; in ecparam_main() 214 private = genkey ? 1 : 0; in ecparam_main() 317 if (outformat == FORMAT_ASN1 && genkey) in ecparam_main() 330 if (genkey) { in ecparam_main()
|
| H A D | skeyutl.c | 45 int genkey = 0; in skeyutl_main() local 65 genkey = 1; in skeyutl_main() 95 if (genkey) { in skeyutl_main()
|
| /src/crypto/openssl/fuzz/ |
| H A D | ml-kem.c | 274 unsigned char genkey[32]; in mlkem_encap_decap() local 292 if (!RAND_bytes(genkey, genkey_len)) in mlkem_encap_decap() 295 if (EVP_PKEY_encapsulate(ctx, wrapkey, &wrapkey_len, genkey, &genkey_len) <= 0) { in mlkem_encap_decap() 319 if (memcmp(unwrappedkey, genkey, genkey_len)) in mlkem_encap_decap()
|
| /src/crypto/openssl/doc/man1/ |
| H A D | openssl-skeyutl.pod.in | 15 [B<-genkey>] 51 =item B<-genkey>
|
| H A D | openssl-ecparam.pod.in | 25 [B<-genkey>] 120 =item B<-genkey> 155 openssl ecparam -out ec_key.pem -name prime192v1 -genkey
|
| H A D | openssl-dsaparam.pod.in | 18 [B<-genkey>] 76 =item B<-genkey>
|
| H A D | openssl-req.pod.in | 681 openssl ecparam -genkey -name SM2 -out sm2.key
|
| /src/crypto/openssl/doc/man3/ |
| H A D | EVP_PKEY_encapsulate.pod | 17 unsigned char *genkey, size_t *genkeylen); 33 The shared secret written to I<genkey> can be used as an input for key 50 shared secret is written to I<genkey> and its size is written to
|
| /src/usr.bin/wg/ |
| H A D | Makefile | 23 SRCS+= genkey.c
|
| /src/sbin/dumpon/ |
| H A D | dumpon.c | 321 genkey(const char *pubkeyfile, struct diocskerneldump_arg *kdap) in genkey() function 666 genkey(pubkeyfile, kdap); in main()
|
| /src/contrib/ntp/util/ |
| H A D | ntp-keygen.c | 152 EVP_PKEY *genkey (const char *, const char *); 589 pkey_host = genkey("RSA", "host"); in main() 598 pkey_host = genkey("RSA", "host"); in main() 612 pkey_sign = genkey(sign, "sign"); in main() 2189 genkey( in genkey() function
|
| /src/crypto/openssl/doc/HOWTO/ |
| H A D | keys.txt | 87 openssl ecparam -genkey -name prime256v1 -out private.key
|
| /src/crypto/openssl/crypto/ml_kem/ |
| H A D | ml_kem.c | 1681 static __owur int genkey(const uint8_t seed[ML_KEM_SEED_BYTES], in genkey() function 2191 ret = genkey(seed, mdctx, pubenc, key); in ossl_ml_kem_genkey()
|
| /src/crypto/openssl/include/openssl/ |
| H A D | evp.h | 2036 unsigned char *genkey, size_t *genkeylen);
|
| /src/crypto/openssl/ |
| H A D | CHANGES.md | 19372 dsaparam -genkey (which also ignored its '-rand' option), 21511 * Added "-genkey" option to "dsaparam" program.
|