范文健康探索娱乐情感热点
热点动态
科技财经
情感日志
励志美文
娱乐时尚
游戏搞笑
探索旅游
历史星座
健康养生
美丽育儿
范文作文
教案论文

跟老韩学UbuntuServer2204genpkey帮助手册

  跟老韩学Linux SRE
  风,带走的,是我不变的心。root@hanyw:~# man openssl-genpkey |grep -Ev "^#34; OPENSSL-GENPKEY(1SSL)                                       OpenSSL                                       OPENSSL-GENPKEY(1SSL) NAME        openssl-genpkey - generate a private key SYNOPSIS        openssl genpkey [-help] [-out filename] [-outform DER|PEM] [-quiet] [-pass arg] [-cipher] [-paramfile file] [-algorithm        alg] [-pkeyopt opt:value] [-genparam] [-text] [-engine id] [-provider name] [-provider-path path] [-propquery propq]        [-config configfile] DESCRIPTION        This command generates a private key. OPTIONS        -help            Print out a usage message.        -out filename            Output the key to the specified file. If this argument is not specified then standard output is used.        -outform DER|PEM            The output format, except when -genparam is given; the default is PEM.  See openssl-format-options(1) for details.            When -genparam is given, -outform is ignored.        -quiet            Do not output "status dots" while generating keys.        -pass arg            The output file password source. For more information about the format of arg see openssl-passphrase-options(1).        -cipher            This option encrypts the private key with the supplied cipher. Any algorithm name accepted by EVP_get_cipherbyname()            is acceptable such as des3.        -algorithm alg            Public key algorithm to use such as RSA, DSA, DH or DHX. If used this option must precede any -pkeyopt options. The            options -paramfile and -algorithm are mutually exclusive. Engines may add algorithms in addition to the standard            built-in ones.            Valid built-in algorithm names for private key generation are RSA, RSA-PSS, EC, X25519, X448, ED25519 and ED448.            Valid built-in algorithm names for parameter generation (see the -genparam option) are DH, DSA and EC.            Note that the algorithm name X9.42 DH may be used as a synonym for DHX keys and PKCS#3 refers to DH Keys. Some            options are not shared between DH and DHX keys.        -pkeyopt opt:value            Set the public key algorithm option opt to value. The precise set of options supported depends on the public key            algorithm used and its implementation. See "KEY GENERATION OPTIONS" and "PARAMETER GENERATION OPTIONS" below for            more details.        -genparam            Generate a set of parameters instead of a private key. If used this option must precede any -algorithm, -paramfile            or -pkeyopt options.        -paramfile filename            Some public key algorithms generate a private key based on a set of parameters.  They can be supplied using this            option. If this option is used the public key algorithm used is determined by the parameters. If used this option            must precede any -pkeyopt options. The options -paramfile and -algorithm are mutually exclusive.        -text            Print an (unencrypted) text representation of private and public keys and parameters along with the PEM or DER            structure.        -engine id            See "Engine Options" in openssl(1).  This option is deprecated.        -provider name        -provider-path path        -propquery propq            See "Provider Options" in openssl(1), provider(7), and property(7).        -config configfile            See "Configuration Option" in openssl(1). KEY GENERATION OPTIONS        The options supported by each algorithm and indeed each implementation of an algorithm can vary. The options for the        OpenSSL implementations are detailed below. There are no key generation options defined for the X25519, X448, ED25519 or        ED448 algorithms.    RSA Key Generation Options        rsa_keygen_bits:numbits            The number of bits in the generated key. If not specified 2048 is used.        rsa_keygen_primes:numprimes            The number of primes in the generated key. If not specified 2 is used.        rsa_keygen_pubexp:value            The RSA public exponent value. This can be a large decimal or hexadecimal value if preceded by "0x". Default value            is 65537.    RSA-PSS Key Generation Options        Note: by default an RSA-PSS key has no parameter restrictions.        rsa_keygen_bits:numbits, rsa_keygen_primes:numprimes, rsa_keygen_pubexp:value            These options have the same meaning as the RSA algorithm.        rsa_pss_keygen_md:digest            If set the key is restricted and can only use digest for signing.        rsa_pss_keygen_mgf1_md:digest            If set the key is restricted and can only use digest as it"s MGF1 parameter.        rsa_pss_keygen_saltlen:len            If set the key is restricted and len specifies the minimum salt length.    EC Key Generation Options        The EC key generation options can also be used for parameter generation.        ec_paramgen_curve:curve            The EC curve to use. OpenSSL supports NIST curve names such as "P-256".        ec_param_enc:encoding            The encoding to use for parameters. The encoding parameter must be either named_curve or explicit. The default value            is named_curve.    DH Key Generation Options        group:name            The paramfile option is not required if a named group is used here.  See the "DH Parameter Generation Options"            section below. PARAMETER GENERATION OPTIONS        The options supported by each algorithm and indeed each implementation of an algorithm can vary. The options for the        OpenSSL implementations are detailed below.    DSA Parameter Generation Options        dsa_paramgen_bits:numbits            The number of bits in the generated prime. If not specified 2048 is used.        dsa_paramgen_q_bits:numbits        qbits:numbits            The number of bits in the q parameter. Must be one of 160, 224 or 256. If not specified 224 is used.        dsa_paramgen_md:digest        digest:digest            The digest to use during parameter generation. Must be one of sha1, sha224 or sha256. If set, then the number of            bits in q will match the output size of the specified digest and the dsa_paramgen_q_bits parameter will be ignored.            If not set, then a digest will be used that gives an output matching the number of bits in q, i.e. sha1 if q length            is 160, sha224 if it 224 or sha256 if it is 256.        properties:query            The digest property query string to use when fetching a digest from a provider.        type:type            The type of generation to use. Set this to 1 to use legacy FIPS186-2 parameter generation. The default of 0 uses            FIPS186-4 parameter generation.        gindex:index            The index to use for canonical generation and verification of the generator g.  Set this to a positive value ranging            from 0..255 to use this mode. Larger values will only use the bottom byte.  This index must then be reused during            key validation to verify the value of g.  If this value is not set then g is not verifiable. The default value is            -1.        hexseed:seed            The seed seed data to use instead of generating a random seed internally.  This should be used for testing purposes            only. This will either produced fixed values for the generated parameters OR it will fail if the seed did not            generate valid primes.    DH Parameter Generation Options        For most use cases it is recommended to use the group option rather than the type options. Note that the group option is        not used by default if no parameter generation options are specified.        group:name        dh_param:name            Use a named DH group to select constant values for the DH parameters.  All other options will be ignored if this            value is set.            Valid values that are associated with the algorithm of "DH" are: "ffdhe2048", "ffdhe3072", "ffdhe4096", "ffdhe6144",            "ffdhe8192", "modp_1536", "modp_2048", "modp_3072", "modp_4096", "modp_6144", "modp_8192".            Valid values that are associated with the algorithm of "DHX" are the RFC5114 names "dh_1024_160", "dh_2048_224",            "dh_2048_256".        dh_rfc5114:num            If this option is set, then the appropriate RFC5114 parameters are used instead of generating new parameters. The            value num can be one of 1, 2 or 3 that are equivalant to using the option group with one of "dh_1024_160",            "dh_2048_224" or "dh_2048_256".  All other options will be ignored if this value is set.        pbits:numbits        dh_paramgen_prime_len:numbits            The number of bits in the prime parameter p. The default is 2048.        qbits:numbits        dh_paramgen_subprime_len:numbits            The number of bits in the sub prime parameter q. The default is 224.  Only relevant if used in conjunction with the            dh_paramgen_type option to generate DHX parameters.        safeprime-generator:value        dh_paramgen_generator:value            The value to use for the generator g. The default is 2.  The algorithm option must be "DH" for this parameter to be            used.        type:string            The type name of DH parameters to generate. Valid values are:            "generator"                Use a safe prime generator with the option safeprime_generator The algorithm option must be "DH".            "fips186_4"                FIPS186-4 parameter generation.  The algorithm option must be "DHX".            "fips186_2"                FIPS186-4 parameter generation.  The algorithm option must be "DHX".            "group"                Can be used with the option pbits to select one of "ffdhe2048", "ffdhe3072", "ffdhe4096", "ffdhe6144" or                "ffdhe8192".  The algorithm option must be "DH".            "default"                Selects a default type based on the algorithm. This is used by the OpenSSL default provider to set the type for                backwards compatability.  If algorithm is "DH" then "generator" is used.  If algorithm is "DHX" then "fips186_2"                is used.        dh_paramgen_type:value            The type of DH parameters to generate. Valid values are 0, 1, 2 or 3 which correspond to setting the option type to            "generator", "fips186_2", "fips186_4" or "group".        digest:digest            The digest to use during parameter generation. Must be one of sha1, sha224 or sha256. If set, then the number of            bits in qbits will match the output size of the specified digest and the qbits parameter will be ignored. If not            set, then a digest will be used that gives an output matching the number of bits in q, i.e. sha1 if q length is 160,            sha224 if it is 224 or sha256 if it is 256.  This is only used by "fips186_4" and "fips186_2" key generation.        properties:query            The digest property query string to use when fetching a digest from a provider.  This is only used by "fips186_4"            and "fips186_2" key generation.        gindex:index            The index to use for canonical generation and verification of the generator g.  Set this to a positive value ranging            from 0..255 to use this mode. Larger values will only use the bottom byte.  This index must then be reused during            key validation to verify the value of g.  If this value is not set then g is not verifiable. The default value is            -1.  This is only used by "fips186_4" and "fips186_2" key generation.        hexseed:seed            The seed seed data to use instead of generating a random seed internally.  This should be used for testing purposes            only. This will either produced fixed values for the generated parameters OR it will fail if the seed did not            generate valid primes.  This is only used by "fips186_4" and "fips186_2" key generation.    EC Parameter Generation Options        The EC parameter generation options are the same as for key generation. See "EC Key Generation Options" above. NOTES        The use of the genpkey program is encouraged over the algorithm specific utilities because additional algorithm options        and ENGINE provided algorithms can be used. EXAMPLES        Generate an RSA private key using default parameters:         openssl genpkey -algorithm RSA -out key.pem        Encrypt output private key using 128 bit AES and the passphrase "hello":         openssl genpkey -algorithm RSA -out key.pem -aes-128-cbc -pass pass:hello        Generate a 2048 bit RSA key using 3 as the public exponent:         openssl genpkey -algorithm RSA -out key.pem              -pkeyopt rsa_keygen_bits:2048 -pkeyopt rsa_keygen_pubexp:3        Generate 2048 bit DSA parameters that can be validated: The output values for gindex and seed are required for key        validation purposes and are not saved to the output pem file).         openssl genpkey -genparam -algorithm DSA -out dsap.pem -pkeyopt pbits:2048              -pkeyopt qbits:224 -pkeyopt digest:SHA256 -pkeyopt gindex:1 -text        Generate DSA key from parameters:         openssl genpkey -paramfile dsap.pem -out dsakey.pem        Generate 4096 bit DH Key using safe prime group ffdhe4096:         openssl genpkey -algorithm DH -out dhkey.pem -pkeyopt group:ffdhe4096        Generate 2048 bit X9.42 DH key with 256 bit subgroup using RFC5114 group3:         openssl genpkey -algorithm DHX -out dhkey.pem -pkeyopt dh_rfc5114:3        Generate a DH key using a DH parameters file:         openssl genpkey -paramfile dhp.pem -out dhkey.pem        Output DH parameters for safe prime group ffdhe2048:         openssl genpkey -genparam -algorithm DH -out dhp.pem -pkeyopt group:ffdhe2048        Output 2048 bit X9.42 DH parameters with 224 bit subgroup using RFC5114 group2:         openssl genpkey -genparam -algorithm DHX -out dhp.pem -pkeyopt dh_rfc5114:2        Output 2048 bit X9.42 DH parameters with 224 bit subgroup using FIP186-4 keygen:         openssl genpkey -genparam -algorithm DHX -out dhp.pem -text              -pkeyopt pbits:2048 -pkeyopt qbits:224 -pkeyopt digest:SHA256              -pkeyopt gindex:1 -pkeyopt dh_paramgen_type:2        Output 1024 bit X9.42 DH parameters with 160 bit subgroup using FIP186-2 keygen:         openssl genpkey -genparam -algorithm DHX -out dhp.pem -text              -pkeyopt pbits:1024 -pkeyopt qbits:160 -pkeyopt digest:SHA1              -pkeyopt gindex:1 -pkeyopt dh_paramgen_type:1        Output 2048 bit DH parameters:         openssl genpkey -genparam -algorithm DH -out dhp.pem              -pkeyopt dh_paramgen_prime_len:2048        Output 2048 bit DH parameters using a generator:         openssl genpkey -genparam -algorithm DH -out dhpx.pem              -pkeyopt dh_paramgen_prime_len:2048              -pkeyopt dh_paramgen_type:1        Generate EC parameters:         openssl genpkey -genparam -algorithm EC -out ecp.pem                 -pkeyopt ec_paramgen_curve:secp384r1                 -pkeyopt ec_param_enc:named_curve        Generate EC key from parameters:         openssl genpkey -paramfile ecp.pem -out eckey.pem        Generate EC key directly:         openssl genpkey -algorithm EC -out eckey.pem                 -pkeyopt ec_paramgen_curve:P-384                 -pkeyopt ec_param_enc:named_curve        Generate an X25519 private key:         openssl genpkey -algorithm X25519 -out xkey.pem        Generate an ED448 private key:         openssl genpkey -algorithm ED448 -out xkey.pem HISTORY        The ability to use NIST curve names, and to generate an EC key directly, were added in OpenSSL 1.0.2.  The ability to        generate X25519 keys was added in OpenSSL 1.1.0.  The ability to generate X448, ED25519 and ED448 keys was added in        OpenSSL 1.1.1.        The -engine option was deprecated in OpenSSL 3.0. COPYRIGHT        Copyright 2006-2021 The OpenSSL Project Authors. All Rights Reserved.        Licensed under the Apache License 2.0 (the "License").  You may not use this file except in compliance with the License.        You can obtain a copy in the file LICENSE in the source distribution or at        . 3.0.2                                                      2022-07-04                                     OPENSSL-GENPKEY(1SSL)

佛教寺院现在的功能佛教寺院的功能,是僧人学习修行的地方,也是弘法利生的场所,但是现在许多寺院已经没有了这些功能,已经变成了旅游观光的场所,如一张门票几十元甚至上百元,逢年过节烧高香烧头香,寺院成了专重游那拉提遐想重游那拉提遐想作者朱慧静夏日之尾,来到阔别已久而又记忆深刻的那拉提。我与妻之所以一定要到那拉提一游,并非因为风靡全国的可克托海的牧羊人歌曲中那位那拉提养蜂女,而是因为上世纪90年代法国取消所有入境限制,开放签证申请法国取消边境卫生检疫机制据法国驻华使馆及总领馆官方发表公示称取消边境卫生检疫机制。面对新冠疫情大流行的新阶段,法国也在8月1日正式退出了卫生紧急状态。因此,自2022年8月1日起,醉在水东湾电白城区海堤边上的红树林,蔚为壮观。冯光钦摄崔丹爱上一座城,或因为一个人,或因为城里的风景,也有人不问因由。而水东湾,她如诗如画的滨海风情,一直以来是我近乎一种执迷的热爱。每次到来浪漫黑竹沟七夕牵手游20220804ChineseValentinesDay浪漫七夕就来黑竹沟景区一年一度的七夕情人节就要到了空气中已经处处弥漫着浪漫的气息Ni打算怎么过呢?是携手相爱的TA烛光晚餐,乡村会重新成为中国人的精神家园吗?城乡二元城乡流动城乡融合,百年巨变中,曾经的田园牧歌,在城市化的浪潮中被淹没无踪,曾经的精神家园,在现代化的进程中被抛在身后。乡村,这个凝聚着中国千万年农耕文明的载体,一度成为闭塞(国际)埃及举行金字塔航空表演当日,埃及2022金字塔航空表演在吉萨金字塔景区举行,来自埃及和韩国的多个飞行表演队伍进行了多项精彩的飞行表演。这是8月3日在埃及吉萨金字塔景区拍摄的航空飞行表演。新华社记者王东震中国十大名楼欲穷千里目,更上一层楼。楼,以其奇巧精美的建筑艺术渗透着中华民族建筑的精髓见证了华夏民族的历史沧桑。中国十大名楼各得历史风韵,各有千秋之势,琼楼玉宇,丹柱碧瓦,画栋飞檐,美哉!壮哉广东一上榜真温泉名单台山颐和温泉,如今2日游白菜价,安排爆款返场台山颐和温泉大酒店仅688住豪华温泉套房1晚双人自助早餐下午茶无限次露天温泉侨乡博物馆点击我的头像,再点击底部活动资讯,搜索关键词颐和下单预定这条街具有重要的历史意义,有许鲅鱼圈点燃夜经济烟火气浓厚夜幕降临,华灯初上。忙碌了一天的城市,在夜经济的衬托下,显得格外热闹。清风阵阵,彩灯如昼。红旗大集上游人如织,一排多种造型的餐车在舞台周围依次排开,过往的市民不时停下脚步,挑选着自总有美好如期而至,天平杯随手拍第二季度榜单来了!2022年,已悄然过去一半在春生夏长的日子里我们携手并肩看春雪踏夏浪记录工作生活中的点点滴滴美好总是在不经然间如期而至而我们选择用镜头定格那最美的瞬间一场春雪过后,避暑山庄内银装素
24年前就造出克隆羊,为什么不克隆人?看看克隆羊的下场就懂了科学技术是第一生产力。克隆这个词相信人们都不陌生。在这个科技不断进步的时代,克隆技术已经不再是一场空想,而是已经被提上日程,并且取得了一定成果的一项研究。若是说起克隆成果,那想必人APP也搞两面派?撕开伪装者的伪装文静子APP也会日常变装夜晚变脸?近日,媒体刊发安徽警方查处的一起网络账号非法交易典型案例赚钱呗等APP在白天发布诸如辅导孩子作业等合法合规的兼职,而到了晚上特定时间就会跳转至含有刚收到支付宝的最近公告刚收到支付宝App推送过来的信息,个人二维收款码3月1日后可以继续使用。这两天连续有两个政府主管部门出台的政策,政府进行了暂缓施行的处理,一个是个人存取款超过5万的需要说明资金来源渐进式延迟退休已定,7080后影响最大,有人开心有人愁虽然很多人非常抵触延迟退休,但是国家已经确定了,执行渐进式延迟退休的方案。由国务院印发的十四五国家老龄事业发展和养老服务体系规划当中明确地写到,实施渐进式延迟法定退休年龄。这一句话两个小组用导线连接远程离子双表面电极陷阱由两个陷阱组成,每个陷阱由四个射频电极(青色)和八个独立控制的直流电极(蓝色)组成。这两个位点与一根电浮丝(红色)相连,这条线被设计成最大程度的离子线耦合。离子间距为中国空间站将全面转入工程建设阶段,航天员实行在轨轮换2021年6月17日,聂海胜刘伯明汤洪波乘神舟十二号上了空间站。3个月后,他们圆满完成任务,在东风着陆场安全着陆。随后,空间站便无人留守,3个床位空了一个月。2021年10月16日推荐一款TCL最新电视TCL近年来也在研发MiniLED技术。目前全球高端的显示面板一定是往这个技术上发展,就简单来说,苹果电脑高端配置用MiniLED,低端配置用OLED,就很能说明问题。前两天和TC三星GalaxyS22UltraTabS8国行版手机平板发布三星在国内召开了GalaxyS22系列国行版发布会,正式推出了三星GalaxyS22Ultra系列旗舰手机以及三星GalaxyTabS8平板产品。这次采用了非常新颖的小品式发布会,寻找行星形成与生命起源的秘密!一起来看看这个实验这些论文解开了行星形成和生命起源的秘密?一起来看看!多达20篇最新的科学论文使用了安置在智利沙漠高处的大量射电抛物面天线收集的数据,以此来梳理行星形成的奥秘。阿塔卡马大型毫米亚毫米有这三类人的家庭最好喝天然矿物质水随着人们健康意识的大幅提升,大众对饮水的诉求早已不限于干净安全,而是向健康迈进。那么,健康水的标准是什么呢?第三军医大学环境卫生学教研室主任舒为群教授认为,健康饮水应该以矿物质平衡木化石,亿万年前的遗世孤品来自几亿年前的树木侏罗纪是一个地质时代,是恐龙的鼎盛时期,也是木化石形成的时间。在地球诞生至今的漫长岁月里,至少上亿年的树木被迅速埋葬地下后,木质部分被地下水中的SiO(二氧化硅)