openCryptoki.conf 1.1 KB

1234567891011121314151617181920212223242526272829303132333435363738394041
  1. # EAP-TLS using private key and certificates via OpenSSL PKCS#11 engine and
  2. # openCryptoki (e.g., with TPM token)
  3. # This example uses following PKCS#11 objects:
  4. # $ pkcs11-tool --module /usr/lib/opencryptoki/libopencryptoki.so -O -l
  5. # Please enter User PIN:
  6. # Private Key Object; RSA
  7. # label: rsakey
  8. # ID: 04
  9. # Usage: decrypt, sign, unwrap
  10. # Certificate Object, type = X.509 cert
  11. # label: ca
  12. # ID: 01
  13. # Certificate Object, type = X.509 cert
  14. # label: cert
  15. # ID: 04
  16. # Configure OpenSSL to load the PKCS#11 engine and openCryptoki module
  17. pkcs11_engine_path=/usr/lib/engines/engine_pkcs11.so
  18. pkcs11_module_path=/usr/lib/opencryptoki/libopencryptoki.so
  19. network={
  20. ssid="test network"
  21. key_mgmt=WPA-EAP
  22. eap=TLS
  23. identity="User"
  24. # use OpenSSL PKCS#11 engine for this network
  25. engine=1
  26. engine_id="pkcs11"
  27. # select the private key and certificates based on ID (see pkcs11-tool
  28. # output above)
  29. key_id="4"
  30. cert_id="4"
  31. ca_cert_id="1"
  32. # set the PIN code; leave this out to configure the PIN to be requested
  33. # interactively when needed (e.g., via wpa_gui or wpa_cli)
  34. pin="123456"
  35. }