Home
last modified time | relevance | path

Searched full:pem (Results 1 – 25 of 204) sorted by relevance

123456789

/OK3568_Linux_fs/yocto/meta-openembedded/meta-networking/recipes-connectivity/freeradius/files/
H A D0001-raddb-certs-Makefile-fix-the-occasional-verification.patch11 openssl pkcs12 -in server.p12 -out server.pem -passin pass:'whatever' -passout pass:'whatever'
12 chmod g+r server.pem
17 error server.pem: verification failed
20 It seems the ca.pem mismatchs server.pem which results in failing to
21 execute "openssl verify -CAfile ca.pem server.pem", so add to check
45 ca.key ca.pem: ca.cnf
48 - $(OPENSSL) req -new -x509 -keyout ca.key -out ca.pem \
49 + @[ -f ca.pem ] || $(OPENSSL) req -new -x509 -keyout ca.key -out ca.pem \
54 ca.der: ca.pem
55 - $(OPENSSL) x509 -inform PEM -outform DER -in ca.pem -out ca.der
[all …]
H A D0001-raddb-certs-Makefile-fix-the-existed-certificate-err.patch9 openssl ca -batch -keyfile ca.key -cert ca.pem -in client.csr -key 'whatever' -out client.crt -ext…
38 server.crt: server.csr ca.key ca.pem
39 - $(OPENSSL) ca -batch -keyfile ca.key -cert ca.pem -in server.csr -key $(PASSWORD_CA) -out server…
40 + @[ -f server.crt ] || $(OPENSSL) ca -batch -keyfile ca.key -cert ca.pem -in server.csr -key $(PA…
47 client.crt: client.csr ca.pem ca.key
48 - $(OPENSSL) ca -batch -keyfile ca.key -cert ca.pem -in client.csr -key $(PASSWORD_CA) -out client…
49 + @[ -f client.crt ] || $(OPENSSL) ca -batch -keyfile ca.key -cert ca.pem -in client.csr -key $(PA…
/OK3568_Linux_fs/buildroot/dl/libopenssl/
HDopenssl-1.1.1l.tar.gz ... .1l/apps/ca-key.pem openssl-1.1.1l/apps/ca ...
/OK3568_Linux_fs/external/security/rk_tee_user/v2/export-ta_arm32/include/mbedtls/
H A Dpem.h3 * \file pem.h
5 * \brief Privacy Enhanced Mail (PEM) decoding
36 * \name PEM Error codes
38 * PEM data.
41 #define MBEDTLS_ERR_PEM_NO_HEADER_FOOTER_PRESENT -0x1080 /**< No PEM header or footer fou…
42 #define MBEDTLS_ERR_PEM_INVALID_DATA -0x1100 /**< PEM string is not as expect…
58 * \brief PEM context structure
69 * \brief PEM context setup
76 * \brief Read a buffer for PEM information and store the resulting
95 * \return 0 on success, or a specific PEM error code
[all …]
H A Dx509_crl.h105 * (including the terminating null byte for PEM data)
107 * \return 0 if successful, or a specific X509 or PEM error code
114 * \note Multiple CRLs are accepted only if using PEM format
117 * \param buf buffer holding the CRL data in PEM or DER format
119 * (including the terminating null byte for PEM data)
121 * \return 0 if successful, or a specific X509 or PEM error code
129 * \note Multiple CRLs are accepted only if using PEM format
132 * \param path filename to read the CRLs from (in PEM or DER encoding)
134 * \return 0 if successful, or a specific X509 or PEM error code
H A Dcerts.h39 /* List of all PEM-encoded CA certificates, terminated by NULL;
40 * PEM encoded if MBEDTLS_PEM_PARSE_C is enabled, DER encoded
50 /* Concatenation of all CA certificates in PEM format if available */
89 /* Config-dependent dispatch between PEM and DER encoding
90 * (PEM if enabled, otherwise DER) */
158 /* Config-dependent dispatch between PEM and DER encoding
159 * (PEM if enabled, otherwise DER) */
221 /* Config-dependent dispatch between PEM and DER encoding
222 * (PEM if enabled, otherwise DER) */
/OK3568_Linux_fs/external/security/rk_tee_user/v2/export-ta_arm32/host_include/mbedtls/
H A Dpem.h3 * \file pem.h
5 * \brief Privacy Enhanced Mail (PEM) decoding
36 * \name PEM Error codes
38 * PEM data.
41 #define MBEDTLS_ERR_PEM_NO_HEADER_FOOTER_PRESENT -0x1080 /**< No PEM header or footer fou…
42 #define MBEDTLS_ERR_PEM_INVALID_DATA -0x1100 /**< PEM string is not as expect…
58 * \brief PEM context structure
69 * \brief PEM context setup
76 * \brief Read a buffer for PEM information and store the resulting
95 * \return 0 on success, or a specific PEM error code
[all …]
H A Dx509_crl.h105 * (including the terminating null byte for PEM data)
107 * \return 0 if successful, or a specific X509 or PEM error code
114 * \note Multiple CRLs are accepted only if using PEM format
117 * \param buf buffer holding the CRL data in PEM or DER format
119 * (including the terminating null byte for PEM data)
121 * \return 0 if successful, or a specific X509 or PEM error code
129 * \note Multiple CRLs are accepted only if using PEM format
132 * \param path filename to read the CRLs from (in PEM or DER encoding)
134 * \return 0 if successful, or a specific X509 or PEM error code
H A Dcerts.h39 /* List of all PEM-encoded CA certificates, terminated by NULL;
40 * PEM encoded if MBEDTLS_PEM_PARSE_C is enabled, DER encoded
50 /* Concatenation of all CA certificates in PEM format if available */
89 /* Config-dependent dispatch between PEM and DER encoding
90 * (PEM if enabled, otherwise DER) */
158 /* Config-dependent dispatch between PEM and DER encoding
159 * (PEM if enabled, otherwise DER) */
221 /* Config-dependent dispatch between PEM and DER encoding
222 * (PEM if enabled, otherwise DER) */
/OK3568_Linux_fs/external/security/rk_tee_user/v2/export-ta_arm64/host_include/mbedtls/
H A Dpem.h3 * \file pem.h
5 * \brief Privacy Enhanced Mail (PEM) decoding
36 * \name PEM Error codes
38 * PEM data.
41 #define MBEDTLS_ERR_PEM_NO_HEADER_FOOTER_PRESENT -0x1080 /**< No PEM header or footer fou…
42 #define MBEDTLS_ERR_PEM_INVALID_DATA -0x1100 /**< PEM string is not as expect…
58 * \brief PEM context structure
69 * \brief PEM context setup
76 * \brief Read a buffer for PEM information and store the resulting
95 * \return 0 on success, or a specific PEM error code
[all …]
H A Dx509_crl.h105 * (including the terminating null byte for PEM data)
107 * \return 0 if successful, or a specific X509 or PEM error code
114 * \note Multiple CRLs are accepted only if using PEM format
117 * \param buf buffer holding the CRL data in PEM or DER format
119 * (including the terminating null byte for PEM data)
121 * \return 0 if successful, or a specific X509 or PEM error code
129 * \note Multiple CRLs are accepted only if using PEM format
132 * \param path filename to read the CRLs from (in PEM or DER encoding)
134 * \return 0 if successful, or a specific X509 or PEM error code
H A Dcerts.h39 /* List of all PEM-encoded CA certificates, terminated by NULL;
40 * PEM encoded if MBEDTLS_PEM_PARSE_C is enabled, DER encoded
50 /* Concatenation of all CA certificates in PEM format if available */
89 /* Config-dependent dispatch between PEM and DER encoding
90 * (PEM if enabled, otherwise DER) */
158 /* Config-dependent dispatch between PEM and DER encoding
159 * (PEM if enabled, otherwise DER) */
221 /* Config-dependent dispatch between PEM and DER encoding
222 * (PEM if enabled, otherwise DER) */
/OK3568_Linux_fs/external/security/rk_tee_user/v2/export-ta_arm64/include/mbedtls/
H A Dpem.h3 * \file pem.h
5 * \brief Privacy Enhanced Mail (PEM) decoding
36 * \name PEM Error codes
38 * PEM data.
41 #define MBEDTLS_ERR_PEM_NO_HEADER_FOOTER_PRESENT -0x1080 /**< No PEM header or footer fou…
42 #define MBEDTLS_ERR_PEM_INVALID_DATA -0x1100 /**< PEM string is not as expect…
58 * \brief PEM context structure
69 * \brief PEM context setup
76 * \brief Read a buffer for PEM information and store the resulting
95 * \return 0 on success, or a specific PEM error code
[all …]
H A Dx509_crl.h105 * (including the terminating null byte for PEM data)
107 * \return 0 if successful, or a specific X509 or PEM error code
114 * \note Multiple CRLs are accepted only if using PEM format
117 * \param buf buffer holding the CRL data in PEM or DER format
119 * (including the terminating null byte for PEM data)
121 * \return 0 if successful, or a specific X509 or PEM error code
129 * \note Multiple CRLs are accepted only if using PEM format
132 * \param path filename to read the CRLs from (in PEM or DER encoding)
134 * \return 0 if successful, or a specific X509 or PEM error code
H A Dcerts.h39 /* List of all PEM-encoded CA certificates, terminated by NULL;
40 * PEM encoded if MBEDTLS_PEM_PARSE_C is enabled, DER encoded
50 /* Concatenation of all CA certificates in PEM format if available */
89 /* Config-dependent dispatch between PEM and DER encoding
90 * (PEM if enabled, otherwise DER) */
158 /* Config-dependent dispatch between PEM and DER encoding
159 * (PEM if enabled, otherwise DER) */
221 /* Config-dependent dispatch between PEM and DER encoding
222 * (PEM if enabled, otherwise DER) */
/OK3568_Linux_fs/tools/linux/Linux_SecurityAVB/
H A Davb_user_tool.sh34 …penssl genpkey -algorithm RSA -pkeyopt rsa_keygen_bits:4096 -outform PEM -out $KEYS/testkey_prk.pem
35 …penssl genpkey -algorithm RSA -pkeyopt rsa_keygen_bits:4096 -outform PEM -out $KEYS/testkey_psk.pem
36 …penssl genpkey -algorithm RSA -pkeyopt rsa_keygen_bits:4096 -outform PEM -out $KEYS/testkey_pik.pem
37 …penssl genpkey -algorithm RSA -pkeyopt rsa_keygen_bits:4096 -outform PEM -out $KEYS/testkey_puk.pem
40 …ey=avb_keys/testkey_pik.pem --subject_is_intermediate_authority --subject_key_version 42 --authori…
41 …id.bin --subject_key=avb_keys/testkey_psk.pem --subject_key_version 42 --authority_key=avb_keys/te…
42 …_keys/testkey_puk.pem --usage=com.google.android.things.vboot.unlock --subject_key_version 42 --au…
46 …t_attributes.bin --product_id=avb_keys/product_id.bin --root_authority_key=avb_keys/testkey_prk.pem
63 …artition_size ${SIZE} --partition_name ${IMAGE} --key avb_keys/testkey_psk.pem --algorithm SHA512_…
92 …CMD} --algorithm SHA256_RSA4096 --rollback_index 0 --key $KEYS/testkey_psk.pem --output $OUT/vbme…
[all …]
/OK3568_Linux_fs/yocto/meta-openembedded/meta-oe/recipes-support/xmlsec1/xmlsec1/
H A Drun-ptest13 ./sign1 sign1-tmpl.xml rsakey.pem > sign1-res.xml
14 ./verify1 sign1-res.xml rsapub.pem
19 ./sign2 sign2-doc.xml rsakey.pem > sign2-res.xml
20 ./verify1 sign2-res.xml rsapub.pem
25 ./sign3 sign3-doc.xml rsakey.pem rsacert.pem > sign3-res.xml
26 ./verify3 sign3-res.xml ca2cert.pem cacert.pem
31 ./verify1 sign1-res.xml rsapub.pem
32 ./verify1 sign2-res.xml rsapub.pem
37 ./verify2 sign1-res.xml rsapub.pem
38 ./verify2 sign2-res.xml rsapub.pem
[all …]
/OK3568_Linux_fs/yocto/poky/meta/recipes-support/ca-certificates/ca-certificates/
H A D0003-update-ca-certificates-use-relative-symlinks-from-ET.patch14 passed the pem file in /etc/ssl/certs/ that was added or
15 removed in this run and those pem files are absolute
60 PEM="$ETCCERTSDIR/$(basename "$CERT" .crt | sed -e 's/ /_/g' \
62 -e 's/,/_/g').pem"
63 - if ! test -e "$PEM" || [ "$(readlink "$PEM")" != "${CERT##$SYSROOT}" ]
65 + if ! test -e "$PEM" || [ "$(readlink "$PEM")" != "${DST}" ]
67 - ln -sf "${CERT##$SYSROOT}" "$PEM"
68 + ln -sf "${DST}" "$PEM"
69 echo "+$PEM" >> "$ADDED"
H A D0002-update-ca-certificates-use-SYSROOT.patch36 PEM="$ETCCERTSDIR/$(basename "$CERT" .crt | sed -e 's/ /_/g' \
38 -e 's/,/_/g').pem"
39 - if ! test -e "$PEM" || [ "$(readlink "$PEM")" != "$CERT" ]
40 + if ! test -e "$PEM" || [ "$(readlink "$PEM")" != "${CERT##$SYSROOT}" ]
42 - ln -sf "$CERT" "$PEM"
43 + ln -sf "${CERT##$SYSROOT}" "$PEM"
44 echo "+$PEM" >> "$ADDED"
/OK3568_Linux_fs/yocto/meta-openembedded/meta-networking/recipes-protocols/openflow/openflow/
H A D0001-generate-not-static-get_dh-functions.patch19 @@ -113,8 +113,9 @@ lib/dhparams.c: lib/dh1024.pem lib/dh2048.pem lib/dh4096.pem
21 openssl dhparam -C -in $(srcdir)/lib/dh1024.pem -noout && \
22 openssl dhparam -C -in $(srcdir)/lib/dh2048.pem -noout && \
23 - openssl dhparam -C -in $(srcdir)/lib/dh4096.pem -noout) \
25 + openssl dhparam -C -in $(srcdir)/lib/dh4096.pem -noout) | \
/OK3568_Linux_fs/yocto/poky/meta/recipes-devtools/python/python3-cryptography/
H A D0001-Cargo.toml-specify-pem-version.patch4 Subject: [PATCH] Cargo.toml: specify pem version
6 pem = "1.0" is not resolving, specify the current
7 pem = { version: "1.0.2"}
24 -pem = "1.0"
25 +pem = { version = "1.0.2" }
/OK3568_Linux_fs/yocto/poky/meta/recipes-connectivity/wpa-supplicant/wpa-supplicant/
H A Dwpa_supplicant.conf286 # ca_cert: File path to CA certificate file (PEM/DER). This file can have one
298 # ca_path: Directory path for CA certificate files (PEM). This path may
304 # client_cert: File path to client certificate file (PEM/DER)
309 # private_key: File path to client private key file (PEM/DER/PFX)
326 # dh_file: File path to DH/DSA parameters file (in PEM format)
375 # ca_path2: Directory path for CA certificate files (PEM)
379 # dh_file2: File path to DH/DSA parameters file (in PEM format)
463 ca_cert="/etc/cert/ca.pem"
464 client_cert="/etc/cert/user.pem"
478 ca_cert="/etc/cert/ca.pem"
[all …]
/OK3568_Linux_fs/kernel/Documentation/hwmon/
H A Dlineage-pem.rst1 Kernel driver lineage-pem
8 Prefix: 'lineage-pem'
38 Example: the following will load the driver for a Lineage PEM at address 0x40
41 $ modprobe lineage-pem
42 $ echo lineage-pem 0x40 > /sys/bus/i2c/devices/i2c-1/new_device
/OK3568_Linux_fs/kernel/certs/
H A DMakefile55 ifeq ($(CONFIG_MODULE_SIG_KEY),"certs/signing_key.pem")
58 X509TEXT=$(shell openssl x509 -in "certs/signing_key.pem" -text 2>/dev/null)
60 $(if $(findstring rsaEncryption,$(X509TEXT)),,$(shell rm -f "certs/signing_key.pem"))
63 $(obj)/signing_key.pem: $(obj)/x509.genkey
74 -outform PEM -out $(obj)/signing_key.pem \
75 -keyout $(obj)/signing_key.pem \
H A DKconfig6 default "certs/signing_key.pem"
9 Provide the file name of a private key/certificate in PEM format,
14 If this option is unchanged from its default "certs/signing_key.pem",
35 If set, this option should be the filename of a PEM-formatted file
99 If set, this option should be the filename of a PEM-formatted file

123456789