Home
last modified time | relevance | path

Searched full:certificate (Results 1 – 25 of 92) sorted by relevance

1234

/Zephyr-latest/samples/net/secure_mqtt_sensor_actuator/src/tls_config/
Dcert.h11 * The certificate can either be in DER or PEM format.
12 * A DER certificate can be converted to a byte array using
17 /* CA certificate for Mosquitto public broker
20 static const unsigned char ca_certificate[] = "-----BEGIN CERTIFICATE-----\r\n"
43 "-----END CERTIFICATE-----\r\n";
/Zephyr-latest/samples/net/cloud/mqtt_azure/src/
Ddigicert.cer2 "-----BEGIN CERTIFICATE-----\r\n"
22 "-----END CERTIFICATE-----\r\n"
25 "-----BEGIN CERTIFICATE-----\r\n"
46 "-----END CERTIFICATE-----\r\n"
48 /* Microsoft RSA Root Certificate Authority 2017 */
49 "-----BEGIN CERTIFICATE-----\r\n"
81 "-----END CERTIFICATE-----\r\n"
/Zephyr-latest/samples/tfm_integration/psa_crypto/
Dsample.yaml3 to generate device certificate signing request in Zephyr
36 - "Create device Certificate Signing Request completed"
37 - "BEGIN CERTIFICATE REQUEST"
38 - "END CERTIFICATE REQUEST"
/Zephyr-latest/subsys/mgmt/hawkbit/
DKconfig147 prompt "hawkBit certificate tag"
151 bool "Use static certificate tag"
153 Use static certificate tag for TLS connection to the hawkBit server.
156 bool "Use dynamic certificate tag"
159 Use dynamic certificate tag for TLS connection to the hawkBit server.
164 int "Static certificate tag"
168 Static certificate tag for TLS connection to the hawkBit server.
/Zephyr-latest/include/zephyr/net/
Dtls_credentials.h34 /** A trusted CA certificate. Use this to authenticate remote servers.
35 * Used with certificate-based ciphersuites.
39 /** A public server certificate. Use this to register your own server
40 * certificate. Should be registered together with a corresponding
41 * private key. Used with certificate-based ciphersuites.
46 * public certificate. Used with certificate-based ciphersuites.
/Zephyr-latest/tests/net/socket/tls_configurations/credentials/
Dec.crt1 -----BEGIN CERTIFICATE-----
10 -----END CERTIFICATE-----
Drsa.crt1 -----BEGIN CERTIFICATE-----
19 -----END CERTIFICATE-----
/Zephyr-latest/samples/net/sockets/http_server/src/certs/
Dca_cert.pem1 -----BEGIN CERTIFICATE-----
13 -----END CERTIFICATE-----
Dgen_server_cert.sh10 # Generate a certificate signing request using server key
26 # Create a server certificate by signing the server CSR using the CA cert/key
39 # Create DER encoded versions of server certificate and private key
/Zephyr-latest/samples/net/cloud/aws_iot_mqtt/src/creds/
DAmazonRootCA1.pem1 -----BEGIN CERTIFICATE-----
20 -----END CERTIFICATE-----
D.gitignore1 *-certificate.pem.crt
/Zephyr-latest/samples/modules/thrift/hello/
Dnative-cert.pem1 -----BEGIN CERTIFICATE-----
22 -----END CERTIFICATE-----
Dqemu-cert.pem1 -----BEGIN CERTIFICATE-----
22 -----END CERTIFICATE-----
/Zephyr-latest/samples/net/sockets/big_http_download/src/
DDigiCertGlobalRootG2.crt.pem1 "-----BEGIN CERTIFICATE-----\n"
22 "-----END CERTIFICATE-----\n"
Disrgrootx1.pem1 "-----BEGIN CERTIFICATE-----\n"
31 "-----END CERTIFICATE-----\n"
/Zephyr-latest/samples/net/wifi/test_certs/
Dserver.pem1 -----BEGIN CERTIFICATE-----
28 -----END CERTIFICATE-----
Dca2.pem1 -----BEGIN CERTIFICATE-----
27 -----END CERTIFICATE-----
Dca.pem1 -----BEGIN CERTIFICATE-----
27 -----END CERTIFICATE-----
Dclient.pem1 -----BEGIN CERTIFICATE-----
28 -----END CERTIFICATE-----
Dclient2.pem1 -----BEGIN CERTIFICATE-----
28 -----END CERTIFICATE-----
/Zephyr-latest/doc/security/
Dsensor-threat.rst62 3. **Root certificate list**. In order to authenticate the cloud service
64 are allowed to sign the certificate on the server. For cloud-provider
87 5. **Current date/time**. TLS certificate verification requires
89 current time falls within the certificate's current validity time.
92 valid. Certificate validation requires the device's notion of date and
103 certificate to be able to intercept this. [th-time]_
222 b. **Server certificate verification**. The server presented by the
225 i. **Naming**. The certificate shall name the host and service
229 require the certificate to be more restrictive than as
231 certificate that can comply.
[all …]
/Zephyr-latest/samples/net/sockets/http_server/
DREADME.rst70 Additionally the server certificate must be signed by a CA certificate trusted
73 The best way to do this is to generate your own CA certificate:
79 Generate a server certificate signed by this CA certificate:
85 And then build the application with the newly generated server certificate and key:
91 The CA certificate should be added to your browser's list of trusted authorities to
94 certificate issued by an authority unknown to Firefox is considered a security error when
188 be fixed (sample, host IP interface, certificate).
DKconfig38 certificate used to sign the server certificate into your web browser's
/Zephyr-latest/modules/thrift/src/thrift/transport/
DTSSLSocket.h271 * @param required Require peer to present valid certificate if true
275 * Load server certificate.
277 * @param path Path to the certificate file
278 * @param format Certificate file format
294 * @param path Path to trusted certificate file
404 * once after the SSL handshake completes successfully, before peer certificate
407 * If a valid decision (ALLOW or DENY) is returned, the peer certificate is
420 * certificate.
424 * @param name SubjectAltName or common name extracted from peer certificate
437 * every time an IP subjectAltName is extracted from peer's certificate.
[all …]
/Zephyr-latest/tests/net/socket/tls_configurations/src/
Dmain.c36 static const unsigned char certificate[] = { variable
41 static const unsigned char certificate[] = { variable
118 /* HOSTNAME is only required for key exchanges that use a certificate. */ in create_socket()
155 certificate, in setup_credentials()
156 sizeof(certificate)); in setup_credentials()
158 LOG_ERR("Failed to register certificate: %d", err); in setup_credentials()

1234