Home
last modified time | relevance | path

Searched refs:pkcs11 (Results 1 – 18 of 18) sorted by relevance

/third_party/libcoap/
DHOWTO.pkcs1156 --set-so-pin 4321 --id cc00 --mark-trusted "pkcs11:token=token-0"
67 pkcs11-tool --module $LIBSOFTHSM --pin 1234 \
80 pkcs11-tool --module $LIBSOFTHSM --pin 1234 \
85 pkcs11-tool --module=$LIBSOFTHSM -t
86 pkcs11-tool --module=$LIBSOFTHSM --list-objects \
88 p11tool --list-all pkcs11:model=SoftHSM%20v2
93 coap-server -C 'pkcs11:token=token-0;id=%cc%00?pin-value=1234' \
94 -c 'pkcs11:token=token-0;id=%aa%01?pin-value=1234' \
95 -j 'pkcs11:token=token-0;id=%aa%00?pin-value=1234' -v9
98 coap-server -C 'pkcs11:token=token-0;id=%cc%00' \
[all …]
DHOWTO.dual.softhsm271 # Install a pkcs11 library for OpenSSL to use as an engine.
82 --with-pkcs11-module=/usr/local/lib/softhsm/libsofthsm2.so
87 # Verify that pkcs11 is available
89 /opt/openssl/bin/openssl engine pkcs11 -t
/third_party/libcoap/src/
Dcoap_openssl.c1334 if (setup_data->pki_key.key.pkcs11.user_pin) { in setup_pki_server()
1337 setup_data->pki_key.key.pkcs11.user_pin, 0) == 0) { in setup_pki_server()
1339 setup_data->pki_key.key.pkcs11.user_pin); in setup_pki_server()
1344 if (setup_data->pki_key.key.pkcs11.private_key && in setup_pki_server()
1345 setup_data->pki_key.key.pkcs11.private_key[0]) { in setup_pki_server()
1346 if (strncasecmp(setup_data->pki_key.key.pkcs11.private_key, in setup_pki_server()
1349 setup_data->pki_key.key.pkcs11.private_key, in setup_pki_server()
1355 setup_data->pki_key.key.pkcs11.private_key); in setup_pki_server()
1361 setup_data->pki_key.key.pkcs11.private_key); in setup_pki_server()
1368 setup_data->pki_key.key.pkcs11.private_key, in setup_pki_server()
[all …]
Dcoap_gnutls.c970 if (attempt == 0 && setup_data && setup_data->pki_key.key.pkcs11.user_pin) { in pin_callback()
971 int len = min(pin_max - 1, strlen(setup_data->pki_key.key.pkcs11.user_pin)); in pin_callback()
972 memcpy(pin, setup_data->pki_key.key.pkcs11.user_pin, len); in pin_callback()
1316 if (setup_data->pki_key.key.pkcs11.public_cert && in setup_pki_credentials()
1317 setup_data->pki_key.key.pkcs11.public_cert[0] && in setup_pki_credentials()
1318 setup_data->pki_key.key.pkcs11.private_key && in setup_pki_credentials()
1319 setup_data->pki_key.key.pkcs11.private_key[0]) { in setup_pki_credentials()
1325 setup_data->pki_key.key.pkcs11.public_cert, in setup_pki_credentials()
1326 setup_data->pki_key.key.pkcs11.private_key, in setup_pki_credentials()
1337 setup_data->pki_key.key.pkcs11.public_cert, in setup_pki_credentials()
[all …]
/third_party/curl/docs/cmdline-opts/
Dkey.md24 If curl is built against OpenSSL library, and the engine pkcs11 is available,
26 a PKCS#11 device. A string beginning with `pkcs11:` is interpreted as a
28 `pkcs11` if none was provided and the --key-type option is set as `ENG` if
Dcert.md35 If curl is built against OpenSSL library, and the engine pkcs11 is available,
37 a PKCS#11 device. A string beginning with "pkcs11:" is interpreted as a
39 "pkcs11" if none was provided and the --cert-type option is set as "ENG" if
Dcert-type.md25 Secure Transport and Schannel it is P12. If --cert is a pkcs11: URI then ENG is
/third_party/ltp/testscripts/
Dtpm_tools.sh99 grep -q ^pkcs11: /etc/group
106 groups | grep pkcs11 1>/dev/null 2>&1
/third_party/fsverity-utils/man/
Dfsverity.1.md160 token, provide **\-\-pkcs11-engine**, **\-\-pkcs11-module**, **\-\-cert**, and
161 optionally **\-\-pkcs11-keyid**. PKCS#11 token support is unavailable when
191 **\-\-pkcs11-engine**=*SOFILE*
196 **\-\-pkcs11-keyid**=*KEYID*
201 **\-\-pkcs11-module**=*SOFILE*
/third_party/libcoap/man/
Dcoap_encryption.txt.in603 coap_pki_key_pkcs11_t pkcs11; /* for PKCS11 keys */
808 const char *ca; /* pkcs11: URI for Common CA Certificate */
809 const char *public_cert; /* pkcs11: URI for Public Cert */
810 const char *private_key; /* pkcs11: URI for Private Key */
813 pkcs11: URI as a query. */
817 *key.pkcs11.ca* is a pkcs11: URI for the CA certificate or NULL. This is for
821 An example URI is 'pkcs11:pkcs11:token=My%20Token;id=%aa%bb%cc%dd' which is
824 *key.pkcs11.public_cert* is a pkcs11: URI for the Public Certificate which
825 was signed by *key.pkcs11.ca* or NULL.
827 *key.pkcs11.private_key* is a pkcs11: URI for the Private Key for the
[all …]
Dcoap-server.txt.in186 naming format (pkcs11: prefix), then any remaining non PKCS11 URI file
Dcoap-client.txt.in217 naming format (pkcs11: prefix), then any remaining non PKCS11 URI file
/third_party/libcoap/include/coap3/
Dcoap_dtls.h258 coap_pki_key_pkcs11_t pkcs11; /**< for PKCS11 keys */ member
/third_party/libcoap/examples/
Dcoap-client.c1377 dtls_pki.pki_key.key.pkcs11.public_cert = cert_file; in setup_pki()
1378 dtls_pki.pki_key.key.pkcs11.private_key = key_file ? in setup_pki()
1380 dtls_pki.pki_key.key.pkcs11.ca = ca_file; in setup_pki()
1381 dtls_pki.pki_key.key.pkcs11.user_pin = pkcs11_pin; in setup_pki()
Dcoap-server.c1875 dtls_key->key.pkcs11.public_cert = cert_name; in update_pki_key()
1876 dtls_key->key.pkcs11.private_key = key_name ? key_name : cert_name; in update_pki_key()
1877 dtls_key->key.pkcs11.ca = ca_name; in update_pki_key()
1878 dtls_key->key.pkcs11.user_pin = pkcs11_pin; in update_pki_key()
/third_party/openssl/doc/man1/
Dopenssl.pod618 -key org.openssl.engine:pkcs11:label_some-private-key
625 -key pkcs11:object=some-private-key;pin-value=1234
/third_party/glib/patch/
Dbackport-openharmony-adapt.patch6916 + { G_TLS_PASSWORD_PKCS11_USER, "G_TLS_PASSWORD_PKCS11_USER", "pkcs11-user" },
6917 …WORD_PKCS11_SECURITY_OFFICER, "G_TLS_PASSWORD_PKCS11_SECURITY_OFFICER", "pkcs11-security-officer" …
6918 …WORD_PKCS11_CONTEXT_SPECIFIC, "G_TLS_PASSWORD_PKCS11_CONTEXT_SPECIFIC", "pkcs11-context-specific" …
/third_party/mbedtls/
DChangeLog1912 * Deprecate for MBEDTLS_PKCS11_C, the wrapper around the pkcs11-helper
4273 * Typos in platform.c and pkcs11.c (found by Daniel Phillips and Steffan