Searched full:pem (Results 1 – 25 of 204) sorted by relevance
123456789
11 openssl pkcs12 -in server.p12 -out server.pem -passin pass:'whatever' -passout pass:'whatever'12 chmod g+r server.pem17 error server.pem: verification failed20 It seems the ca.pem mismatchs server.pem which results in failing to21 execute "openssl verify -CAfile ca.pem server.pem", so add to check45 ca.key ca.pem: ca.cnf48 - $(OPENSSL) req -new -x509 -keyout ca.key -out ca.pem \49 + @[ -f ca.pem ] || $(OPENSSL) req -new -x509 -keyout ca.key -out ca.pem \54 ca.der: ca.pem55 - $(OPENSSL) x509 -inform PEM -outform DER -in ca.pem -out ca.der[all …]
9 openssl ca -batch -keyfile ca.key -cert ca.pem -in client.csr -key 'whatever' -out client.crt -ext…38 server.crt: server.csr ca.key ca.pem39 - $(OPENSSL) ca -batch -keyfile ca.key -cert ca.pem -in server.csr -key $(PASSWORD_CA) -out server…40 + @[ -f server.crt ] || $(OPENSSL) ca -batch -keyfile ca.key -cert ca.pem -in server.csr -key $(PA…47 client.crt: client.csr ca.pem ca.key48 - $(OPENSSL) ca -batch -keyfile ca.key -cert ca.pem -in client.csr -key $(PASSWORD_CA) -out client…49 + @[ -f client.crt ] || $(OPENSSL) ca -batch -keyfile ca.key -cert ca.pem -in client.csr -key $(PA…
... .1l/apps/ca-key.pem openssl-1.1.1l/apps/ca ...
3 * \file pem.h5 * \brief Privacy Enhanced Mail (PEM) decoding36 * \name PEM Error codes38 * PEM data.41 #define MBEDTLS_ERR_PEM_NO_HEADER_FOOTER_PRESENT -0x1080 /**< No PEM header or footer fou…42 #define MBEDTLS_ERR_PEM_INVALID_DATA -0x1100 /**< PEM string is not as expect…58 * \brief PEM context structure69 * \brief PEM context setup76 * \brief Read a buffer for PEM information and store the resulting95 * \return 0 on success, or a specific PEM error code[all …]
105 * (including the terminating null byte for PEM data)107 * \return 0 if successful, or a specific X509 or PEM error code114 * \note Multiple CRLs are accepted only if using PEM format117 * \param buf buffer holding the CRL data in PEM or DER format119 * (including the terminating null byte for PEM data)121 * \return 0 if successful, or a specific X509 or PEM error code129 * \note Multiple CRLs are accepted only if using PEM format132 * \param path filename to read the CRLs from (in PEM or DER encoding)134 * \return 0 if successful, or a specific X509 or PEM error code
39 /* List of all PEM-encoded CA certificates, terminated by NULL;40 * PEM encoded if MBEDTLS_PEM_PARSE_C is enabled, DER encoded50 /* Concatenation of all CA certificates in PEM format if available */89 /* Config-dependent dispatch between PEM and DER encoding90 * (PEM if enabled, otherwise DER) */158 /* Config-dependent dispatch between PEM and DER encoding159 * (PEM if enabled, otherwise DER) */221 /* Config-dependent dispatch between PEM and DER encoding222 * (PEM if enabled, otherwise DER) */
34 …penssl genpkey -algorithm RSA -pkeyopt rsa_keygen_bits:4096 -outform PEM -out $KEYS/testkey_prk.pem35 …penssl genpkey -algorithm RSA -pkeyopt rsa_keygen_bits:4096 -outform PEM -out $KEYS/testkey_psk.pem36 …penssl genpkey -algorithm RSA -pkeyopt rsa_keygen_bits:4096 -outform PEM -out $KEYS/testkey_pik.pem37 …penssl genpkey -algorithm RSA -pkeyopt rsa_keygen_bits:4096 -outform PEM -out $KEYS/testkey_puk.pem40 …ey=avb_keys/testkey_pik.pem --subject_is_intermediate_authority --subject_key_version 42 --authori…41 …id.bin --subject_key=avb_keys/testkey_psk.pem --subject_key_version 42 --authority_key=avb_keys/te…42 …_keys/testkey_puk.pem --usage=com.google.android.things.vboot.unlock --subject_key_version 42 --au…46 …t_attributes.bin --product_id=avb_keys/product_id.bin --root_authority_key=avb_keys/testkey_prk.pem63 …artition_size ${SIZE} --partition_name ${IMAGE} --key avb_keys/testkey_psk.pem --algorithm SHA512_…92 …CMD} --algorithm SHA256_RSA4096 --rollback_index 0 --key $KEYS/testkey_psk.pem --output $OUT/vbme…[all …]
13 ./sign1 sign1-tmpl.xml rsakey.pem > sign1-res.xml14 ./verify1 sign1-res.xml rsapub.pem19 ./sign2 sign2-doc.xml rsakey.pem > sign2-res.xml20 ./verify1 sign2-res.xml rsapub.pem25 ./sign3 sign3-doc.xml rsakey.pem rsacert.pem > sign3-res.xml26 ./verify3 sign3-res.xml ca2cert.pem cacert.pem31 ./verify1 sign1-res.xml rsapub.pem32 ./verify1 sign2-res.xml rsapub.pem37 ./verify2 sign1-res.xml rsapub.pem38 ./verify2 sign2-res.xml rsapub.pem[all …]
14 passed the pem file in /etc/ssl/certs/ that was added or15 removed in this run and those pem files are absolute60 PEM="$ETCCERTSDIR/$(basename "$CERT" .crt | sed -e 's/ /_/g' \62 -e 's/,/_/g').pem"63 - if ! test -e "$PEM" || [ "$(readlink "$PEM")" != "${CERT##$SYSROOT}" ]65 + if ! test -e "$PEM" || [ "$(readlink "$PEM")" != "${DST}" ]67 - ln -sf "${CERT##$SYSROOT}" "$PEM"68 + ln -sf "${DST}" "$PEM"69 echo "+$PEM" >> "$ADDED"
36 PEM="$ETCCERTSDIR/$(basename "$CERT" .crt | sed -e 's/ /_/g' \38 -e 's/,/_/g').pem"39 - if ! test -e "$PEM" || [ "$(readlink "$PEM")" != "$CERT" ]40 + if ! test -e "$PEM" || [ "$(readlink "$PEM")" != "${CERT##$SYSROOT}" ]42 - ln -sf "$CERT" "$PEM"43 + ln -sf "${CERT##$SYSROOT}" "$PEM"44 echo "+$PEM" >> "$ADDED"
19 @@ -113,8 +113,9 @@ lib/dhparams.c: lib/dh1024.pem lib/dh2048.pem lib/dh4096.pem21 openssl dhparam -C -in $(srcdir)/lib/dh1024.pem -noout && \22 openssl dhparam -C -in $(srcdir)/lib/dh2048.pem -noout && \23 - openssl dhparam -C -in $(srcdir)/lib/dh4096.pem -noout) \25 + openssl dhparam -C -in $(srcdir)/lib/dh4096.pem -noout) | \
4 Subject: [PATCH] Cargo.toml: specify pem version6 pem = "1.0" is not resolving, specify the current7 pem = { version: "1.0.2"}24 -pem = "1.0"25 +pem = { version = "1.0.2" }
286 # ca_cert: File path to CA certificate file (PEM/DER). This file can have one298 # ca_path: Directory path for CA certificate files (PEM). This path may304 # client_cert: File path to client certificate file (PEM/DER)309 # private_key: File path to client private key file (PEM/DER/PFX)326 # dh_file: File path to DH/DSA parameters file (in PEM format)375 # ca_path2: Directory path for CA certificate files (PEM)379 # dh_file2: File path to DH/DSA parameters file (in PEM format)463 ca_cert="/etc/cert/ca.pem"464 client_cert="/etc/cert/user.pem"478 ca_cert="/etc/cert/ca.pem"[all …]
1 Kernel driver lineage-pem8 Prefix: 'lineage-pem'38 Example: the following will load the driver for a Lineage PEM at address 0x4041 $ modprobe lineage-pem42 $ echo lineage-pem 0x40 > /sys/bus/i2c/devices/i2c-1/new_device
55 ifeq ($(CONFIG_MODULE_SIG_KEY),"certs/signing_key.pem")58 X509TEXT=$(shell openssl x509 -in "certs/signing_key.pem" -text 2>/dev/null)60 $(if $(findstring rsaEncryption,$(X509TEXT)),,$(shell rm -f "certs/signing_key.pem"))63 $(obj)/signing_key.pem: $(obj)/x509.genkey74 -outform PEM -out $(obj)/signing_key.pem \75 -keyout $(obj)/signing_key.pem \
6 default "certs/signing_key.pem"9 Provide the file name of a private key/certificate in PEM format,14 If this option is unchanged from its default "certs/signing_key.pem",35 If set, this option should be the filename of a PEM-formatted file99 If set, this option should be the filename of a PEM-formatted file