# EAP-TLS using private key and certificates via OpenSSL PKCS#11 engine and # openCryptoki (e.g., with TPM token) # This example uses following PKCS#11 objects: # $ pkcs11-tool --module /usr/lib/opencryptoki/libopencryptoki.so -O -l # Please enter User PIN: # Private Key Object; RSA # label: rsakey # ID: 04 # Usage: decrypt, sign, unwrap # Certificate Object, type = X.509 cert # label: ca # ID: 01 # Certificate Object, type = X.509 cert # label: cert # ID: 04 # Configure OpenSSL to load the PKCS#11 engine and openCryptoki module pkcs11_engine_path=/usr/lib/engines/engine_pkcs11.so pkcs11_module_path=/usr/lib/opencryptoki/libopencryptoki.so network={ ssid="test network" key_mgmt=WPA-EAP eap=TLS identity="User" # use OpenSSL PKCS#11 engine for this network engine=1 engine_id="pkcs11" # select the private key and certificates based on ID (see pkcs11-tool # output above) key_id="4" cert_id="4" ca_cert_id="1" # set the PIN code; leave this out to configure the PIN to be requested # interactively when needed (e.g., via wpa_gui or wpa_cli) pin="123456" }
Name | Type | Size | Permission | Actions |
---|---|---|---|---|
ieee8021x.conf | File | 269 B | 0644 |
|
openCryptoki.conf | File | 1.12 KB | 0644 |
|
plaintext.conf | File | 133 B | 0644 |
|
udhcpd-p2p.conf | File | 2.86 KB | 0644 |
|
wep.conf | File | 170 B | 0644 |
|
wpa-psk-tkip.conf | File | 181 B | 0644 |
|
wpa-roam.conf | File | 3.35 KB | 0644 |
|
wpa2-eap-ccmp.conf | File | 284 B | 0644 |
|
wpa_supplicant.conf.gz | File | 20.88 KB | 0644 |
|