Home
last modified time | relevance | path

Searched refs:pkcs11 (Results 1 – 18 of 18) sorted by relevance

/third_party/libcoap/
DHOWTO.pkcs1156 --set-so-pin 4321 --id cc00 --mark-trusted "pkcs11:token=token-0"
67 pkcs11-tool --module $LIBSOFTHSM --pin 1234 \
80 pkcs11-tool --module $LIBSOFTHSM --pin 1234 \
85 pkcs11-tool --module=$LIBSOFTHSM -t
86 pkcs11-tool --module=$LIBSOFTHSM --list-objects \
88 p11tool --list-all pkcs11:model=SoftHSM%20v2
93 coap-server -C 'pkcs11:token=token-0;id=%cc%00?pin-value=1234' \
94 -c 'pkcs11:token=token-0;id=%aa%01?pin-value=1234' \
95 -j 'pkcs11:token=token-0;id=%aa%00?pin-value=1234' -v9
98 coap-server -C 'pkcs11:token=token-0;id=%cc%00' \
[all …]
DHOWTO.dual.softhsm271 # Install a pkcs11 library for OpenSSL to use as an engine.
82 --with-pkcs11-module=/usr/local/lib/softhsm/libsofthsm2.so
87 # Verify that pkcs11 is available
89 /opt/openssl/bin/openssl engine pkcs11 -t
/third_party/libcoap/src/
Dcoap_openssl.c1334 if (setup_data->pki_key.key.pkcs11.user_pin) { in setup_pki_server()
1337 setup_data->pki_key.key.pkcs11.user_pin, 0) == 0) { in setup_pki_server()
1339 setup_data->pki_key.key.pkcs11.user_pin); in setup_pki_server()
1344 if (setup_data->pki_key.key.pkcs11.private_key && in setup_pki_server()
1345 setup_data->pki_key.key.pkcs11.private_key[0]) { in setup_pki_server()
1346 if (strncasecmp(setup_data->pki_key.key.pkcs11.private_key, in setup_pki_server()
1349 setup_data->pki_key.key.pkcs11.private_key, in setup_pki_server()
1355 setup_data->pki_key.key.pkcs11.private_key); in setup_pki_server()
1361 setup_data->pki_key.key.pkcs11.private_key); in setup_pki_server()
1368 setup_data->pki_key.key.pkcs11.private_key, in setup_pki_server()
[all …]
Dcoap_gnutls.c970 if (attempt == 0 && setup_data && setup_data->pki_key.key.pkcs11.user_pin) { in pin_callback()
971 int len = min(pin_max - 1, strlen(setup_data->pki_key.key.pkcs11.user_pin)); in pin_callback()
972 memcpy(pin, setup_data->pki_key.key.pkcs11.user_pin, len); in pin_callback()
1316 if (setup_data->pki_key.key.pkcs11.public_cert && in setup_pki_credentials()
1317 setup_data->pki_key.key.pkcs11.public_cert[0] && in setup_pki_credentials()
1318 setup_data->pki_key.key.pkcs11.private_key && in setup_pki_credentials()
1319 setup_data->pki_key.key.pkcs11.private_key[0]) { in setup_pki_credentials()
1325 setup_data->pki_key.key.pkcs11.public_cert, in setup_pki_credentials()
1326 setup_data->pki_key.key.pkcs11.private_key, in setup_pki_credentials()
1337 setup_data->pki_key.key.pkcs11.public_cert, in setup_pki_credentials()
[all …]
/third_party/ltp/testscripts/
Dtpm_tools.sh99 grep -q ^pkcs11: /etc/group
106 groups | grep pkcs11 1>/dev/null 2>&1
/third_party/fsverity-utils/man/
Dfsverity.1.md160 token, provide **\-\-pkcs11-engine**, **\-\-pkcs11-module**, **\-\-cert**, and
161 optionally **\-\-pkcs11-keyid**. PKCS#11 token support is unavailable when
191 **\-\-pkcs11-engine**=*SOFILE*
196 **\-\-pkcs11-keyid**=*KEYID*
201 **\-\-pkcs11-module**=*SOFILE*
/third_party/libcoap/man/
Dcoap_encryption.txt.in603 coap_pki_key_pkcs11_t pkcs11; /* for PKCS11 keys */
808 const char *ca; /* pkcs11: URI for Common CA Certificate */
809 const char *public_cert; /* pkcs11: URI for Public Cert */
810 const char *private_key; /* pkcs11: URI for Private Key */
813 pkcs11: URI as a query. */
817 *key.pkcs11.ca* is a pkcs11: URI for the CA certificate or NULL. This is for
821 An example URI is 'pkcs11:pkcs11:token=My%20Token;id=%aa%bb%cc%dd' which is
824 *key.pkcs11.public_cert* is a pkcs11: URI for the Public Certificate which
825 was signed by *key.pkcs11.ca* or NULL.
827 *key.pkcs11.private_key* is a pkcs11: URI for the Private Key for the
[all …]
Dcoap-server.txt.in186 naming format (pkcs11: prefix), then any remaining non PKCS11 URI file
Dcoap-client.txt.in217 naming format (pkcs11: prefix), then any remaining non PKCS11 URI file
/third_party/curl/docs/cmdline-opts/
Dcert-type.d17 Secure Transport and Schannel it is P12. If --cert is a pkcs11: URI then ENG is
Dkey.d17 If curl is built against OpenSSL library, and the engine pkcs11 is available,
Dcert.d27 If curl is built against OpenSSL library, and the engine pkcs11 is available,
/third_party/libcoap/include/coap3/
Dcoap_dtls.h258 coap_pki_key_pkcs11_t pkcs11; /**< for PKCS11 keys */ member
/third_party/libcoap/examples/
Dcoap-client.c1377 dtls_pki.pki_key.key.pkcs11.public_cert = cert_file; in setup_pki()
1378 dtls_pki.pki_key.key.pkcs11.private_key = key_file ? in setup_pki()
1380 dtls_pki.pki_key.key.pkcs11.ca = ca_file; in setup_pki()
1381 dtls_pki.pki_key.key.pkcs11.user_pin = pkcs11_pin; in setup_pki()
Dcoap-server.c1875 dtls_key->key.pkcs11.public_cert = cert_name; in update_pki_key()
1876 dtls_key->key.pkcs11.private_key = key_name ? key_name : cert_name; in update_pki_key()
1877 dtls_key->key.pkcs11.ca = ca_name; in update_pki_key()
1878 dtls_key->key.pkcs11.user_pin = pkcs11_pin; in update_pki_key()
/third_party/openssl/doc/man1/
Dopenssl.pod618 -key org.openssl.engine:pkcs11:label_some-private-key
625 -key pkcs11:object=some-private-key;pin-value=1234
/third_party/glib/patch/
Dbackport-openharmony-adapt.patch6916 + { G_TLS_PASSWORD_PKCS11_USER, "G_TLS_PASSWORD_PKCS11_USER", "pkcs11-user" },
6917 …WORD_PKCS11_SECURITY_OFFICER, "G_TLS_PASSWORD_PKCS11_SECURITY_OFFICER", "pkcs11-security-officer" …
6918 …WORD_PKCS11_CONTEXT_SPECIFIC, "G_TLS_PASSWORD_PKCS11_CONTEXT_SPECIFIC", "pkcs11-context-specific" …
/third_party/mbedtls/
DChangeLog1912 * Deprecate for MBEDTLS_PKCS11_C, the wrapper around the pkcs11-helper
4273 * Typos in platform.c and pkcs11.c (found by Daniel Phillips and Steffan