Searched full:certificate (Results 1 – 25 of 92) sorted by relevance
1234
11 * The certificate can either be in DER or PEM format.12 * A DER certificate can be converted to a byte array using17 /* CA certificate for Mosquitto public broker20 static const unsigned char ca_certificate[] = "-----BEGIN CERTIFICATE-----\r\n"43 "-----END CERTIFICATE-----\r\n";
2 "-----BEGIN CERTIFICATE-----\r\n"22 "-----END CERTIFICATE-----\r\n"25 "-----BEGIN CERTIFICATE-----\r\n"46 "-----END CERTIFICATE-----\r\n"48 /* Microsoft RSA Root Certificate Authority 2017 */49 "-----BEGIN CERTIFICATE-----\r\n"81 "-----END CERTIFICATE-----\r\n"
3 to generate device certificate signing request in Zephyr36 - "Create device Certificate Signing Request completed"37 - "BEGIN CERTIFICATE REQUEST"38 - "END CERTIFICATE REQUEST"
147 prompt "hawkBit certificate tag"151 bool "Use static certificate tag"153 Use static certificate tag for TLS connection to the hawkBit server.156 bool "Use dynamic certificate tag"159 Use dynamic certificate tag for TLS connection to the hawkBit server.164 int "Static certificate tag"168 Static certificate tag for TLS connection to the hawkBit server.
34 /** A trusted CA certificate. Use this to authenticate remote servers.35 * Used with certificate-based ciphersuites.39 /** A public server certificate. Use this to register your own server40 * certificate. Should be registered together with a corresponding41 * private key. Used with certificate-based ciphersuites.46 * public certificate. Used with certificate-based ciphersuites.
1 -----BEGIN CERTIFICATE-----10 -----END CERTIFICATE-----
1 -----BEGIN CERTIFICATE-----19 -----END CERTIFICATE-----
1 -----BEGIN CERTIFICATE-----13 -----END CERTIFICATE-----
10 # Generate a certificate signing request using server key26 # Create a server certificate by signing the server CSR using the CA cert/key39 # Create DER encoded versions of server certificate and private key
1 -----BEGIN CERTIFICATE-----20 -----END CERTIFICATE-----
1 *-certificate.pem.crt
1 -----BEGIN CERTIFICATE-----22 -----END CERTIFICATE-----
1 "-----BEGIN CERTIFICATE-----\n"22 "-----END CERTIFICATE-----\n"
1 "-----BEGIN CERTIFICATE-----\n"31 "-----END CERTIFICATE-----\n"
1 -----BEGIN CERTIFICATE-----28 -----END CERTIFICATE-----
1 -----BEGIN CERTIFICATE-----27 -----END CERTIFICATE-----
62 3. **Root certificate list**. In order to authenticate the cloud service64 are allowed to sign the certificate on the server. For cloud-provider87 5. **Current date/time**. TLS certificate verification requires89 current time falls within the certificate's current validity time.92 valid. Certificate validation requires the device's notion of date and103 certificate to be able to intercept this. [th-time]_222 b. **Server certificate verification**. The server presented by the225 i. **Naming**. The certificate shall name the host and service229 require the certificate to be more restrictive than as231 certificate that can comply.[all …]
70 Additionally the server certificate must be signed by a CA certificate trusted73 The best way to do this is to generate your own CA certificate:79 Generate a server certificate signed by this CA certificate:85 And then build the application with the newly generated server certificate and key:91 The CA certificate should be added to your browser's list of trusted authorities to94 certificate issued by an authority unknown to Firefox is considered a security error when188 be fixed (sample, host IP interface, certificate).
38 certificate used to sign the server certificate into your web browser's
271 * @param required Require peer to present valid certificate if true275 * Load server certificate.277 * @param path Path to the certificate file278 * @param format Certificate file format294 * @param path Path to trusted certificate file404 * once after the SSL handshake completes successfully, before peer certificate407 * If a valid decision (ALLOW or DENY) is returned, the peer certificate is420 * certificate.424 * @param name SubjectAltName or common name extracted from peer certificate437 * every time an IP subjectAltName is extracted from peer's certificate.[all …]
36 static const unsigned char certificate[] = { variable41 static const unsigned char certificate[] = { variable118 /* HOSTNAME is only required for key exchanges that use a certificate. */ in create_socket()155 certificate, in setup_credentials()156 sizeof(certificate)); in setup_credentials()158 LOG_ERR("Failed to register certificate: %d", err); in setup_credentials()