On 2/7/2011 2:48 AM, Jean-Michel Pouré - GOOZE wrote:
> Le dimanche 06 février 2011 à 22:38 +0100, Peter Stuge a écrit :
>> You would have to explain what the problem is. :)
>
> I am having a problem with CAcerts certificates containing
> an SSO ID in the email field:
> http://www.opensc-project.org/opensc/ticket/324
>
> Firefox and OpenSSH + opensc-pkcs11.so fail to use such certificates.
>
> I tried to debug Firefox using pkcs11-spy, with no result as Firefox
> seems to reject this module (security reason?).
>
> So I had to run ssh commands with pkcs11-spy.
>
> But my bug report is far from being readable and IMHO is bullshit.
>
> So I would like to know a little bit more about OpenSSL pkcs11 engine. I
> know how to load certificates:
> OpenSSL>engine dynamic -pre SO_PATH:/usr/lib/engines/engine_pkcs11.so
> -pre ID:pkcs11 -pre LIST_ADD:1 -pre LOAD -pre
> MODULE_PATH:opensc-pkcs11.so
>
> For example, I don't know how to run verify commands or sign commands
> using the PKCS11 engine, directly from openssl command line, not the
> interpreter.
I use something like this in a script to generate a request suitable to
paste into a CA web page (Lines wrapped for the e-mail):
openssl << EOT
engine dynamic -vvvv
-pre SO_PATH:$OPENSC_ENGINE/engines/engine_pkcs11.so
-pre ID:pkcs11 -pre NO_VCHECK:1
-pre LIST_ADD:1 -pre LOAD -pre MODULE_PATH:$MODULE
req $SSLEAY_CONFIG -engine pkcs11 -md5 -new
-key slot_$SLOT-id_$ID
-keyform engine -out myreq.$ID.pem -text
EOT
Most openssl command support the -engine and -keyform engine
parameters. The -key parameters are then passed to the engine, and
the engine_plcs11 sues the slot and id to find the card and key.
>
> Kind regards,
--
Douglas E. Engert <[email protected]>
Argonne National Laboratory
9700 South Cass Avenue
Argonne, Illinois 60439
(630) 252-5444
_______________________________________________
opensc-devel mailing list
[email protected]
http://www.opensc-project.org/mailman/listinfo/opensc-devel