All of lore.kernel.org
 help / color / mirror / Atom feed
From: David Woodhouse <dwmw2 at infradead.org>
To: tpm2@lists.01.org
Subject: Re: [tpm2] Support for EAP-TLS with openssl TPM2 engine
Date: Thu, 14 Mar 2019 09:41:01 -0700	[thread overview]
Message-ID: <e57877d09a0aff0aeea32ae3c179311aa9c0cc73.camel@infradead.org> (raw)
In-Reply-To: 20190314161958.GB28769@johnsa1-desk.jf.intel.com

[-- Attachment #1: Type: text/plain, Size: 1311 bytes --]

On Thu, 2019-03-14 at 09:19 -0700, Andersen, John wrote:
> Sweet! I'd been working on this too, I just got the hostapd / wpa_supplicant
> test stuff working and was going to try setting
> pkcs11_engine_path=/usr/lib/opensc/engine_pkcs11.so
> 
> To the tpm2-software/tpm2-pcks11 library.
> 
> From the amount of changes it took you, it seems like your approach is cleaner,
> so, out of curiousity, what was your ratoinal for going with this approach? I
> was going to try the pcks11 way because I came across
> 
> https://w1.fi/cgit/hostap/plain/wpa_supplicant/examples/openCryptoki.conf
> 
> But, I haven't gotten to it yet as I got sidetracked right after I got the tests
> up and running.

If you are using the TPMv2 PKCS#11 token (or indeed any PKCS#11 token)
and it's installed correctly, it ought to Just Work.

You should be able to just give a PKCS#11 URI in place of a filename
for any key or certificate, and any well-behaved application will do
the right thing. I believe wpa_supplicant meets that definition of
"well-behaved application", by automatically using the PKCS#11 ENGINE
when the "filename" it's given is actually a PKCS#11 URI.

(Except for the fact that all ENGINE loading is broken in
wpa_supplicant right now because the init call was removed, as noted).



[-- Attachment #2: smime.p7s --]
[-- Type: application/x-pkcs7-signature, Size: 5174 bytes --]

             reply	other threads:[~2019-03-14 16:41 UTC|newest]

Thread overview: 3+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2019-03-14 16:41 David Woodhouse [this message]
  -- strict thread matches above, loose matches on Subject: below --
2019-03-14 16:19 [tpm2] Support for EAP-TLS with openssl TPM2 engine Andersen, John
2019-03-13 23:56 David Woodhouse

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=e57877d09a0aff0aeea32ae3c179311aa9c0cc73.camel@infradead.org \
    --to=tpm2@lists.01.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.