Searched refs:pkcs11 (Results 1 – 18 of 18) sorted by relevance
/third_party/libcoap/ |
D | HOWTO.pkcs11 | 56 --set-so-pin 4321 --id cc00 --mark-trusted "pkcs11:token=token-0" 67 pkcs11-tool --module $LIBSOFTHSM --pin 1234 \ 80 pkcs11-tool --module $LIBSOFTHSM --pin 1234 \ 85 pkcs11-tool --module=$LIBSOFTHSM -t 86 pkcs11-tool --module=$LIBSOFTHSM --list-objects \ 88 p11tool --list-all pkcs11:model=SoftHSM%20v2 93 coap-server -C 'pkcs11:token=token-0;id=%cc%00?pin-value=1234' \ 94 -c 'pkcs11:token=token-0;id=%aa%01?pin-value=1234' \ 95 -j 'pkcs11:token=token-0;id=%aa%00?pin-value=1234' -v9 98 coap-server -C 'pkcs11:token=token-0;id=%cc%00' \ [all …]
|
D | HOWTO.dual.softhsm2 | 71 # Install a pkcs11 library for OpenSSL to use as an engine. 82 --with-pkcs11-module=/usr/local/lib/softhsm/libsofthsm2.so 87 # Verify that pkcs11 is available 89 /opt/openssl/bin/openssl engine pkcs11 -t
|
/third_party/libcoap/src/ |
D | coap_openssl.c | 1334 if (setup_data->pki_key.key.pkcs11.user_pin) { in setup_pki_server() 1337 setup_data->pki_key.key.pkcs11.user_pin, 0) == 0) { in setup_pki_server() 1339 setup_data->pki_key.key.pkcs11.user_pin); in setup_pki_server() 1344 if (setup_data->pki_key.key.pkcs11.private_key && in setup_pki_server() 1345 setup_data->pki_key.key.pkcs11.private_key[0]) { in setup_pki_server() 1346 if (strncasecmp(setup_data->pki_key.key.pkcs11.private_key, in setup_pki_server() 1349 setup_data->pki_key.key.pkcs11.private_key, in setup_pki_server() 1355 setup_data->pki_key.key.pkcs11.private_key); in setup_pki_server() 1361 setup_data->pki_key.key.pkcs11.private_key); in setup_pki_server() 1368 setup_data->pki_key.key.pkcs11.private_key, in setup_pki_server() [all …]
|
D | coap_gnutls.c | 970 if (attempt == 0 && setup_data && setup_data->pki_key.key.pkcs11.user_pin) { in pin_callback() 971 int len = min(pin_max - 1, strlen(setup_data->pki_key.key.pkcs11.user_pin)); in pin_callback() 972 memcpy(pin, setup_data->pki_key.key.pkcs11.user_pin, len); in pin_callback() 1316 if (setup_data->pki_key.key.pkcs11.public_cert && in setup_pki_credentials() 1317 setup_data->pki_key.key.pkcs11.public_cert[0] && in setup_pki_credentials() 1318 setup_data->pki_key.key.pkcs11.private_key && in setup_pki_credentials() 1319 setup_data->pki_key.key.pkcs11.private_key[0]) { in setup_pki_credentials() 1325 setup_data->pki_key.key.pkcs11.public_cert, in setup_pki_credentials() 1326 setup_data->pki_key.key.pkcs11.private_key, in setup_pki_credentials() 1337 setup_data->pki_key.key.pkcs11.public_cert, in setup_pki_credentials() [all …]
|
/third_party/curl/docs/cmdline-opts/ |
D | key.md | 24 If curl is built against OpenSSL library, and the engine pkcs11 is available, 26 a PKCS#11 device. A string beginning with `pkcs11:` is interpreted as a 28 `pkcs11` if none was provided and the --key-type option is set as `ENG` if
|
D | cert.md | 35 If curl is built against OpenSSL library, and the engine pkcs11 is available, 37 a PKCS#11 device. A string beginning with "pkcs11:" is interpreted as a 39 "pkcs11" if none was provided and the --cert-type option is set as "ENG" if
|
D | cert-type.md | 25 Secure Transport and Schannel it is P12. If --cert is a pkcs11: URI then ENG is
|
/third_party/ltp/testscripts/ |
D | tpm_tools.sh | 99 grep -q ^pkcs11: /etc/group 106 groups | grep pkcs11 1>/dev/null 2>&1
|
/third_party/fsverity-utils/man/ |
D | fsverity.1.md | 160 token, provide **\-\-pkcs11-engine**, **\-\-pkcs11-module**, **\-\-cert**, and 161 optionally **\-\-pkcs11-keyid**. PKCS#11 token support is unavailable when 191 **\-\-pkcs11-engine**=*SOFILE* 196 **\-\-pkcs11-keyid**=*KEYID* 201 **\-\-pkcs11-module**=*SOFILE*
|
/third_party/libcoap/man/ |
D | coap_encryption.txt.in | 603 coap_pki_key_pkcs11_t pkcs11; /* for PKCS11 keys */ 808 const char *ca; /* pkcs11: URI for Common CA Certificate */ 809 const char *public_cert; /* pkcs11: URI for Public Cert */ 810 const char *private_key; /* pkcs11: URI for Private Key */ 813 pkcs11: URI as a query. */ 817 *key.pkcs11.ca* is a pkcs11: URI for the CA certificate or NULL. This is for 821 An example URI is 'pkcs11:pkcs11:token=My%20Token;id=%aa%bb%cc%dd' which is 824 *key.pkcs11.public_cert* is a pkcs11: URI for the Public Certificate which 825 was signed by *key.pkcs11.ca* or NULL. 827 *key.pkcs11.private_key* is a pkcs11: URI for the Private Key for the [all …]
|
D | coap-server.txt.in | 186 naming format (pkcs11: prefix), then any remaining non PKCS11 URI file
|
D | coap-client.txt.in | 217 naming format (pkcs11: prefix), then any remaining non PKCS11 URI file
|
/third_party/libcoap/include/coap3/ |
D | coap_dtls.h | 258 coap_pki_key_pkcs11_t pkcs11; /**< for PKCS11 keys */ member
|
/third_party/libcoap/examples/ |
D | coap-client.c | 1377 dtls_pki.pki_key.key.pkcs11.public_cert = cert_file; in setup_pki() 1378 dtls_pki.pki_key.key.pkcs11.private_key = key_file ? in setup_pki() 1380 dtls_pki.pki_key.key.pkcs11.ca = ca_file; in setup_pki() 1381 dtls_pki.pki_key.key.pkcs11.user_pin = pkcs11_pin; in setup_pki()
|
D | coap-server.c | 1875 dtls_key->key.pkcs11.public_cert = cert_name; in update_pki_key() 1876 dtls_key->key.pkcs11.private_key = key_name ? key_name : cert_name; in update_pki_key() 1877 dtls_key->key.pkcs11.ca = ca_name; in update_pki_key() 1878 dtls_key->key.pkcs11.user_pin = pkcs11_pin; in update_pki_key()
|
/third_party/openssl/doc/man1/ |
D | openssl.pod | 618 -key org.openssl.engine:pkcs11:label_some-private-key 625 -key pkcs11:object=some-private-key;pin-value=1234
|
/third_party/glib/patch/ |
D | backport-openharmony-adapt.patch | 6916 + { G_TLS_PASSWORD_PKCS11_USER, "G_TLS_PASSWORD_PKCS11_USER", "pkcs11-user" }, 6917 …WORD_PKCS11_SECURITY_OFFICER, "G_TLS_PASSWORD_PKCS11_SECURITY_OFFICER", "pkcs11-security-officer" … 6918 …WORD_PKCS11_CONTEXT_SPECIFIC, "G_TLS_PASSWORD_PKCS11_CONTEXT_SPECIFIC", "pkcs11-context-specific" …
|
/third_party/mbedtls/ |
D | ChangeLog | 1912 * Deprecate for MBEDTLS_PKCS11_C, the wrapper around the pkcs11-helper 4273 * Typos in platform.c and pkcs11.c (found by Daniel Phillips and Steffan
|