Searched refs:pem (Results 1 – 25 of 35) sorted by relevance
12
8 -out server_privkey.pem14 -key server_privkey.pem \15 -out server_csr.pem \30 -CA ca_cert.pem \31 -CAkey ca_privkey.pem \35 -in server_csr.pem \36 -out server_cert.pem \42 -in server_privkey.pem \47 -in server_cert.pem \
8 -out ca_privkey.pem15 -key ca_privkey.pem \16 -out ca_cert.pem \
1 *.pem2 !ca_cert.pem
33 # convert .pem files to array data at build time38 ${ZEPHYR_BASE}/samples/net/wifi/test_certs/client.pem39 ${gen_dir}/client.pem.inc44 ${ZEPHYR_BASE}/samples/net/wifi/test_certs/client-key.pem45 ${gen_dir}/client-key.pem.inc50 ${ZEPHYR_BASE}/samples/net/wifi/test_certs/ca.pem51 ${gen_dir}/ca.pem.inc56 ${ZEPHYR_BASE}/samples/net/wifi/test_certs/client2.pem57 ${gen_dir}/client2.pem.inc62 ${ZEPHYR_BASE}/samples/net/wifi/test_certs/client-key2.pem[all …]
36 # convert .pem files to array data at build time41 ${ZEPHYR_BASE}/samples/modules/thrift/hello/qemu-cert.pem42 ${gen_dir}/qemu_cert.pem.inc47 ${ZEPHYR_BASE}/samples/modules/thrift/hello/qemu-key.pem48 ${gen_dir}/qemu_key.pem.inc53 ${ZEPHYR_BASE}/samples/modules/thrift/hello/native-cert.pem54 ${gen_dir}/native_cert.pem.inc59 ${ZEPHYR_BASE}/samples/modules/thrift/hello/native-key.pem60 ${gen_dir}/native_key.pem.inc
1 *-certificate.pem.crt2 *-private.pem.key3 *-public.pem.key
18 ECDSAPrivKeyFile = ecprivkey001.pem21 AesGenECPubKeyFile = ecpubkey002_crt.pem35 ECDSAPrivKeyFile = ecprivkey001.pem38 AesGenECPubKeyFile = ecpubkey002_crt.pem
14 set(RIMAGE_SIGN_KEY "otc_private_key_3k.pem" CACHE STRING "default in cavs25/board.cmake")30 set(RIMAGE_SIGN_KEY "otc_private_key_3k.pem" CACHE STRING "default in ace15_mtpm/board.cmake")40 set(RIMAGE_SIGN_KEY "otc_private_key_3k.pem" CACHE STRING "default in ace20_lnl/board.cmake")46 set(RIMAGE_SIGN_KEY "otc_private_key.pem" CACHE STRING "default rimage key")
44 # convert .pem files to array data at build time49 ${ZEPHYR_BASE}/samples/modules/thrift/hello/qemu-cert.pem50 ${gen_dir}/qemu_cert.pem.inc55 ${ZEPHYR_BASE}/samples/modules/thrift/hello/qemu-key.pem56 ${gen_dir}/qemu_key.pem.inc
43 $ cp client.pem samples/net/wifi/test_certs/44 $ cp client-key.pem samples/net/wifi/test_certs/45 $ cp ca.pem samples/net/wifi/test_certs/46 $ cp client2.pem samples/net/wifi/test_certs/47 $ cp client-key2.pem samples/net/wifi/test_certs/48 $ cp ca2.pem samples/net/wifi/test_certs/
78 DtlsCertsKey=/etc/ssl/certs/gateway.pem79 DtlsPrivKey=/etc/ssl/private/privkey.pem
33 ECDSAPrivKeyFile = ec384.pem36 AesGenECPubKeyFile = ec384_crt.pem
37 ECDSAPrivKeyFile = ec384.pem40 AesGenECPubKeyFile = ec384_crt.pem
151 $ ./hello_client_ssl 192.0.2.1 ../native-cert.pem ../native-key.pem ../qemu-cert.pem196 $ ./hello_server_ssl 0.0.0.0 ../native-cert.pem ../native-key.pem ../qemu-cert.pem
64 By default, ``<tfm-dir>/bl2/ext/mcuboot/root-rsa-3072.pem`` is used to sign secure65 images, and ``<tfm-dir>/bl2/ext/mcuboot/root-rsa-3072_1.pem`` is used to sign66 non-secure images. These default .pem keys can (and **should**) be overridden71 the default .pem file with a new key pair!**77 $ imgtool keygen -k root-rsa-3072_s.pem -t rsa-307278 $ imgtool keygen -k root-rsa-3072_ns.pem -t rsa-307280 You can then place the new .pem files in an alternate location, such as your
144 default "$(ZEPHYR_MCUBOOT_MODULE_DIR)/root-ec-p256.pem" if BOOT_SIGNATURE_TYPE_ECDSA_P256145 default "$(ZEPHYR_MCUBOOT_MODULE_DIR)/root-ed25519.pem" if BOOT_SIGNATURE_TYPE_ED25519146 default "$(ZEPHYR_MCUBOOT_MODULE_DIR)/root-rsa-2048.pem" if BOOT_SIGNATURE_TYPE_RSA165 default "$(ZEPHYR_MCUBOOT_MODULE_DIR)/enc-ec256-priv.pem" if BOOT_SIGNATURE_TYPE_ECDSA_P256166 default "$(ZEPHYR_MCUBOOT_MODULE_DIR)/enc-x25519-priv.pem" if BOOT_SIGNATURE_TYPE_ED25519167 default "$(ZEPHYR_MCUBOOT_MODULE_DIR)/enc-rsa2048-priv.pem" if BOOT_SIGNATURE_TYPE_RSA
101 ``root-rsa-2048.pem`` key. The key is located in the MCUboot repository.187 * Generate pem file from generated server.key and server.crt191 cat server.key > server.pem192 cat server.crt >> server.pem198 openssl pkcs12 -export -in server.pem -out keystore.pkcs12260 * Convert the server.pem file to self_sign.der and place the der file in
49 extra-args = -i 4 -k 'keys/key argument with space.pem'56 ``west sign --tool rimage -- -i 4 -k 'keys/key argument with space.pem'``. In case
43 -DCONFIG_MCUBOOT_SIGNATURE_KEY_FILE=\"bootloader/mcuboot/root-rsa-2048.pem\"57 …G_BOOTLOADER_MCUBOOT=y '-DCONFIG_MCUBOOT_SIGNATURE_KEY_FILE="bootloader/mcuboot/root-rsa-2048.pem"'132 …BOOTLOADER_MCUBOOT=y '-DCONFIG_MCUBOOT_SIGNATURE_KEY_FILE="bootloader/mcuboot/root-rsa-2048.pem"' \
114 openssl genrsa -out privkey.pem 512115 openssl req -new -x509 -key privkey.pem -out servercert.pem123 openssl x509 -in servercert.pem -outform DER -out servercert.der124 openssl pkcs8 -topk8 -inform PEM -outform DER -nocrypt -in privkey.pem262 --key bootloader/mcuboot/root-rsa-2048.pem301 --version 2.0.0 --key bootloader/mcuboot/root-rsa-2048.pem
223 …BOOTLOADER_MCUBOOT=y -DCONFIG_MCUBOOT_SIGNATURE_KEY_FILE=\"path/to/mcuboot/boot/root-rsa-2048.pem\"233 …BOOTLOADER_MCUBOOT=y -DCONFIG_MCUBOOT_SIGNATURE_KEY_FILE=\"path/to/mcuboot/boot/root-rsa-2048.pem\"237 In all examples it is assumed to use default :file:`root-rsa-2048.pem` file from ``mcuboot/boot``