/freebsd/crypto/openssl/test/ |
H A D | evp_pkey_dhkem_test.c | 251 if (!TEST_ptr(auth = EVP_PKEY_Q_keygen(libctx, NULL, "EC", "P-521"))) in test_ec_auth_key_curve_mismatch() 532 if (!TEST_ptr(recip = EVP_PKEY_Q_keygen(libctx, NULL, curve)) in test_ec_noikme() 534 && !TEST_ptr(sender_auth = EVP_PKEY_Q_keygen(libctx, NULL, in test_ec_noikme() 538 if (!TEST_ptr(recip = EVP_PKEY_Q_keygen(libctx, NULL, "EC", curve)) in test_ec_noikme() 540 && !TEST_ptr(sender_auth = EVP_PKEY_Q_keygen(libctx, NULL, in test_ec_noikme() 578 ret = TEST_ptr(key = EVP_PKEY_Q_keygen(libctx, NULL, "EC", curve)) in do_ec_curve_failtest() 760 if (!TEST_ptr(auth = EVP_PKEY_Q_keygen(libctx, NULL, "X448"))) in test_ecx_auth_key_curve_mismatch() 776 ret = TEST_ptr(key = EVP_PKEY_Q_keygen(libctx, NULL, "ED448")) in test_ed_curve_unsupported() 799 if (!TEST_ptr(rkey[TEST_KEYTYPE_P256] = EVP_PKEY_Q_keygen(libctx, NULL, in setup_tests() 803 if (!TEST_ptr(rkey[TEST_KEYTYPE_X25519] = EVP_PKEY_Q_keygen(libctx, NULL, in setup_tests()
|
H A D | pairwise_fail_test.c | 99 if (!TEST_ptr_null(pkey = EVP_PKEY_Q_keygen(libctx, NULL, "RSA", (size_t)2048))) in test_keygen_pairwise_failure() 106 if (!TEST_ptr_null(pkey = EVP_PKEY_Q_keygen(libctx, NULL, "EC", "P-256"))) in test_keygen_pairwise_failure()
|
H A D | evp_extra_test2.c | 472 if (TEST_ptr(key = EVP_PKEY_Q_keygen(mainctx, NULL, "XOR"))) in test_new_keytype() 480 if (!TEST_ptr(key = EVP_PKEY_Q_keygen(mainctx, NULL, "XOR"))) in test_new_keytype() 517 || !TEST_ptr(key = EVP_PKEY_Q_keygen(mainctx, NULL, "EC", "P-256")) in test_ec_d2i_i2d_pubkey() 542 ret = TEST_ptr(key = EVP_PKEY_Q_keygen(mainctx, NULL, "EC", "P-256")) in test_ec_tofrom_data_select() 554 ret = TEST_ptr(key = EVP_PKEY_Q_keygen(mainctx, NULL, "X25519")) in test_ecx_tofrom_data_select() 568 ret = TEST_ptr(key = EVP_PKEY_Q_keygen(mainctx, NULL, "SM2")) in test_sm2_tofrom_data_select()
|
H A D | ml_kem_evp_extra_test.c | 126 akey = EVP_PKEY_Q_keygen(testctx, NULL, "ML-KEM-768"); in test_ml_kem() 265 akey = EVP_PKEY_Q_keygen(testctx, NULL, v->algorithm_name); in test_non_derandomised_ml_kem()
|
H A D | acvp_test.c | 154 if (!TEST_ptr(pkey = EVP_PKEY_Q_keygen(libctx, NULL, "EC", tst->curve_name)) in ecdsa_keygen_test() 284 if (!TEST_ptr(pkey = EVP_PKEY_Q_keygen(libctx, NULL, "EC", tst->curve_name))) in ecdsa_siggen_test() 366 if (!TEST_ptr(peer1 = EVP_PKEY_Q_keygen(libctx, NULL, "EC", curve))) in ecdh_cofactor_derive_test() 369 if (!TEST_ptr(peer2 = EVP_PKEY_Q_keygen(libctx, NULL, "EC", curve))) in ecdh_cofactor_derive_test() 497 if (!TEST_ptr(pkey = EVP_PKEY_Q_keygen(libctx, NULL, tst->curve_name)) in eddsa_keygen_test() 1428 if (!TEST_ptr(pkey = EVP_PKEY_Q_keygen(libctx, NULL, "RSA", tst->mod)) in rsa_siggen_test() 1507 if (!TEST_ptr(pkey = EVP_PKEY_Q_keygen(libctx, NULL, "RSA", (size_t)2048)) in rsa_decryption_primitive_test()
|
H A D | slh_dsa_test.c | 139 if (!TEST_ptr(eckey = EVP_PKEY_Q_keygen(lib_ctx, NULL, "EC", "P-256"))) in slh_dsa_key_eq_test()
|
H A D | evp_libctx_test.c | 554 if (!TEST_ptr(*priv = EVP_PKEY_Q_keygen(libctx, NULL, "RSA", (size_t)bits)) in rsa_keygen()
|
H A D | threadstest.c | 893 pkey = EVP_PKEY_Q_keygen(multi_libctx, NULL, "RSA", (size_t)(isfips ? 2048 : 512)); in thread_general_worker()
|
H A D | endecode_test.c | 1315 ret = TEST_ptr(key = EVP_PKEY_Q_keygen(testctx, "", "EC", "P-256")) in ec_encode_to_data_multi()
|
/freebsd/crypto/openssl/doc/man3/ |
H A D | EVP_PKEY_keygen.pod | 5 EVP_PKEY_Q_keygen, 18 EVP_PKEY *EVP_PKEY_Q_keygen(OSSL_LIB_CTX *libctx, const char *propq, 94 EVP_PKEY_Q_keygen() abstracts from the explicit use of B<EVP_PKEY_CTX> while 116 supplied by the loaded providers. EVP_PKEY_Q_keygen() may be usable with such 126 EVP_PKEY_Q_keygen() returns an B<EVP_PKEY>, or NULL on failure. 238 EVP_PKEY_Q_keygen() and EVP_PKEY_generate() were added in OpenSSL 3.0.
|
H A D | RSA_generate_key.pod | 34 Applications should instead use EVP_RSA_gen(), L<EVP_PKEY_Q_keygen(3)>, or 106 L<EVP_PKEY_Q_keygen(3)>
|
H A D | EC_KEY_new.pod | 74 Applications should instead use EVP_EC_gen(), L<EVP_PKEY_Q_keygen(3)>, or 222 L<EVP_PKEY_Q_keygen(3)>
|
/freebsd/crypto/openssl/demos/pkey/ |
H A D | EVP_PKEY_RSA_keygen.c | 113 pkey = EVP_PKEY_Q_keygen(libctx, propq, "RSA", (size_t)bits); in generate_rsa_key_short()
|
/freebsd/crypto/openssl/demos/signature/ |
H A D | EVP_ED_Signature_demo.c | 140 priv = EVP_PKEY_Q_keygen(libctx, NULL, "ED25519"); in create_key()
|
/freebsd/crypto/openssl/demos/keyexch/ |
H A D | x25519.c | 78 local_peer->privk = EVP_PKEY_Q_keygen(libctx, propq, "X25519"); in keyexch_x25519_before()
|
/freebsd/crypto/openssl/doc/man7/ |
H A D | EVP_PKEY-X25519.pod | 107 pkey = EVP_PKEY_Q_keygen(NULL, NULL, "X25519");
|
H A D | EVP_PKEY-SLH-DSA.pod | 124 pkey = EVP_PKEY_Q_keygen(NULL, NULL, "SLH-DSA-SHA2-128f");
|
H A D | EVP_PKEY-ML-DSA.pod | 221 pkey = EVP_PKEY_Q_keygen(NULL, NULL, "ML-DSA-44");
|
H A D | EVP_PKEY-ML-KEM.pod | 252 pkey = EVP_PKEY_Q_keygen(NULL, NULL, "ML-KEM-768");
|
H A D | ossl-guide-libcrypto-introduction.pod | 364 using the EVP APIs (for example see L<EVP_PKEY_Q_keygen(3)>). However it is often
|
/freebsd/crypto/openssl/providers/implementations/keymgmt/ |
H A D | mlx_kmgmt.c | 707 key->mkey = EVP_PKEY_Q_keygen(key->libctx, key->propq, in mlx_kem_gen() 709 key->xkey = EVP_PKEY_Q_keygen(key->libctx, key->propq, in mlx_kem_gen()
|
/freebsd/crypto/openssl/include/openssl/ |
H A D | rsa.h | 260 EVP_PKEY_Q_keygen(NULL, NULL, "RSA", (size_t)(0 + (bits)))
|
H A D | ec.h | 1571 EVP_PKEY_Q_keygen(NULL, NULL, "EC", (char *)(strstr(curve, "")))
|
/freebsd/crypto/openssl/doc/designs/ |
H A D | ML-KEM.md | 89 **EVP_PKEY_Q_keygen()** functions.
|
/freebsd/crypto/openssl/crypto/evp/ |
H A D | evp_lib.c | 1222 EVP_PKEY *EVP_PKEY_Q_keygen(OSSL_LIB_CTX *libctx, const char *propq, in EVP_PKEY_Q_keygen() function
|