# EAP-TLS using private key and certificates via OpenSSL PKCS#11 engine and # openCryptoki (e.g., with TPM token) # This example uses following PKCS#11 objects: # $ pkcs11-tool --module /usr/lib/opencryptoki/libopencryptoki.so -O -l # Please enter User PIN: # Private Key Object; RSA # label: rsakey # ID: 04 # Usage: decrypt, sign, unwrap # Certificate Object, type = X.509 cert # label: ca # ID: 01 # Certificate Object, type = X.509 cert # label: cert # ID: 04 # Configure OpenSSL to load the PKCS#11 engine and openCryptoki module pkcs11_engine_path=/usr/lib/engines/engine_pkcs11.so pkcs11_module_path=/usr/lib/opencryptoki/libopencryptoki.so network={ ssid="test network" key_mgmt=WPA-EAP eap=TLS identity="User" # use OpenSSL PKCS#11 engine for this network engine=1 engine_id="pkcs11" # select the private key and certificates based on ID (see pkcs11-tool # output above) key_id="4" cert_id="4" ca_cert_id="1" # set the PIN code; leave this out to configure the PIN to be requested # interactively when needed (e.g., via wpa_gui or wpa_cli) pin="123456" }
Name | Type | Size | Permission | Actions |
---|---|---|---|---|
p2p | Folder | 0755 |
|
|
60_wpa_supplicant | File | 267 B | 0755 |
|
dbus-listen-preq.py | File | 1.53 KB | 0644 |
|
ieee8021x.conf | File | 269 B | 0644 |
|
openCryptoki.conf | File | 1.12 KB | 0644 |
|
p2p-action-udhcp.sh | File | 1.68 KB | 0755 |
|
p2p-action.sh | File | 2.63 KB | 0755 |
|
p2p-nfc.py | File | 19.73 KB | 0644 |
|
plaintext.conf | File | 133 B | 0644 |
|
udhcpd-p2p.conf | File | 2.86 KB | 0644 |
|
wep.conf | File | 170 B | 0644 |
|
wpa-psk-tkip.conf | File | 181 B | 0644 |
|
wpa2-eap-ccmp.conf | File | 284 B | 0644 |
|
wpas-dbus-new-getall.py | File | 1.7 KB | 0644 |
|
wpas-dbus-new-signals.py | File | 5.93 KB | 0644 |
|
wpas-dbus-new-wps.py | File | 2.17 KB | 0644 |
|
wpas-dbus-new.py | File | 4.17 KB | 0644 |
|
wpas-test.py | File | 2.51 KB | 0644 |
|
wps-ap-cli | File | 1.15 KB | 0755 |
|
wps-nfc.py | File | 15.31 KB | 0644 |
|