Home
last modified time | relevance | path

Searched refs:pkcs11 (Results 1 – 14 of 14) sorted by relevance

/third_party/libcoap/
DHOWTO.pkcs1156 --set-so-pin 4321 --id cc00 --mark-trusted "pkcs11:token=token-0"
67 pkcs11-tool --module $LIBSOFTHSM --pin 1234 \
80 pkcs11-tool --module $LIBSOFTHSM --pin 1234 \
85 pkcs11-tool --module=$LIBSOFTHSM -t
86 pkcs11-tool --module=$LIBSOFTHSM --list-objects \
88 p11tool --list-all pkcs11:model=SoftHSM%20v2
93 coap-server -C 'pkcs11:token=token-0;id=%cc%00?pin-value=1234' \
94 -c 'pkcs11:token=token-0;id=%aa%01?pin-value=1234' \
95 -j 'pkcs11:token=token-0;id=%aa%00?pin-value=1234' -v9
98 coap-server -C 'pkcs11:token=token-0;id=%cc%00' \
[all …]
DHOWTO.dual.softhsm271 # Install a pkcs11 library for OpenSSL to use as an engine.
82 --with-pkcs11-module=/usr/local/lib/softhsm/libsofthsm2.so
87 # Verify that pkcs11 is available
89 /opt/openssl/bin/openssl engine pkcs11 -t
/third_party/libcoap/src/
Dcoap_openssl.c1213 if (setup_data->pki_key.key.pkcs11.user_pin) { in setup_pki_server()
1216 setup_data->pki_key.key.pkcs11.user_pin, 0) == 0) { in setup_pki_server()
1219 setup_data->pki_key.key.pkcs11.user_pin); in setup_pki_server()
1224 if (setup_data->pki_key.key.pkcs11.private_key && in setup_pki_server()
1225 setup_data->pki_key.key.pkcs11.private_key[0]) { in setup_pki_server()
1226 if (strncasecmp (setup_data->pki_key.key.pkcs11.private_key, in setup_pki_server()
1229 setup_data->pki_key.key.pkcs11.private_key, in setup_pki_server()
1236 setup_data->pki_key.key.pkcs11.private_key); in setup_pki_server()
1243 setup_data->pki_key.key.pkcs11.private_key); in setup_pki_server()
1251 setup_data->pki_key.key.pkcs11.private_key, in setup_pki_server()
[all …]
Dcoap_gnutls.c960 if (attempt == 0 && setup_data && setup_data->pki_key.key.pkcs11.user_pin) { in pin_callback()
961 int len = min(pin_max - 1, strlen(setup_data->pki_key.key.pkcs11.user_pin)); in pin_callback()
962 memcpy(pin, setup_data->pki_key.key.pkcs11.user_pin, len); in pin_callback()
1320 if (setup_data->pki_key.key.pkcs11.public_cert && in setup_pki_credentials()
1321 setup_data->pki_key.key.pkcs11.public_cert[0] && in setup_pki_credentials()
1322 setup_data->pki_key.key.pkcs11.private_key && in setup_pki_credentials()
1323 setup_data->pki_key.key.pkcs11.private_key[0]) { in setup_pki_credentials()
1329 setup_data->pki_key.key.pkcs11.public_cert, in setup_pki_credentials()
1330 setup_data->pki_key.key.pkcs11.private_key, in setup_pki_credentials()
1343 setup_data->pki_key.key.pkcs11.public_cert, in setup_pki_credentials()
[all …]
/third_party/ltp/testscripts/
Dtpm_tools.sh99 grep -q ^pkcs11: /etc/group
106 groups | grep pkcs11 1>/dev/null 2>&1
/third_party/libcoap/man/
Dcoap_encryption.txt.in601 coap_pki_key_pkcs11_t pkcs11; /* for PKCS11 keys */
806 const char *ca; /* pkcs11: URI for Common CA Certificate */
807 const char *public_cert; /* pkcs11: URI for Public Cert */
808 const char *private_key; /* pkcs11: URI for Private Key */
811 pkcs11: URI as a query. */
815 *key.pkcs11.ca* is a pkcs11: URI for the CA certificate or NULL. This is for
819 An example URI is 'pkcs11:pkcs11:token=My%20Token;id=%aa%bb%cc%dd' which is
822 *key.pkcs11.public_cert* is a pkcs11: URI for the Public Certificate which
823 was signed by *key.pkcs11.ca* or NULL.
825 *key.pkcs11.private_key* is a pkcs11: URI for the Private Key for the
[all …]
Dcoap-server.txt.in144 naming format (pkcs11: prefix), then any remaining non PKCS11 URI file
Dcoap-client.txt.in188 naming format (pkcs11: prefix), then any remaining non PKCS11 URI file
/third_party/curl/docs/cmdline-opts/
Dkey.d11 If curl is built against OpenSSL library, and the engine pkcs11 is available,
/third_party/libcoap/include/coap3/
Dcoap_dtls.h218 coap_pki_key_pkcs11_t pkcs11; /**< for PKCS11 keys */ member
/third_party/libcoap/examples/
Dcoap-client.c1252 dtls_pki.pki_key.key.pkcs11.public_cert = cert_file; in setup_pki()
1253 dtls_pki.pki_key.key.pkcs11.private_key = key_file ? in setup_pki()
1255 dtls_pki.pki_key.key.pkcs11.ca = ca_file; in setup_pki()
1256 dtls_pki.pki_key.key.pkcs11.user_pin = pkcs11_pin; in setup_pki()
Dcoap-server.c1863 dtls_key->key.pkcs11.public_cert = cert_name; in update_pki_key()
1864 dtls_key->key.pkcs11.private_key = key_name ? key_name : cert_name; in update_pki_key()
1865 dtls_key->key.pkcs11.ca = ca_name; in update_pki_key()
1866 dtls_key->key.pkcs11.user_pin = pkcs11_pin; in update_pki_key()
/third_party/curl/docs/
DSSLCERTS.md145 cert9.db, key4.db, pkcs11.txt; filenames of older versions are cert8.db,
/third_party/mbedtls/
DChangeLog1213 * Deprecate for MBEDTLS_PKCS11_C, the wrapper around the pkcs11-helper
3574 * Typos in platform.c and pkcs11.c (found by Daniel Phillips and Steffan