Hi Leonardo,

Thank you for the patch! Is there any chance you can submit a PR
on github? That way it will be easier to discuss the patch there.

Thanks,

Aleksey

On 9/22/21 1:06 PM, LS wrote:
Dear xmlsec community,


I'd like to share with you a patch I developed to allow usage of an OpenSSL's engine in xmlsec.


The usage with command line is simple, I added the option --privkey-openssl-engine to supply the engine's name and the key specs.


 --privkey-openssl-engine[:<name>] <openssl-engine>;<openssl-key-id>,[,<crtfile>[,<cafile>[...]]]        load private key by OpenSSL ENGINE interface; specify the name of engine

       (like with -engine params), the key specs (like with -inkey or -key params)
        and certificates that verify this key

At moment I tested only pkcs11 engine with SoftHSM2 but I'd like that all of you interested in using HSM or smartcard with xmlsec make a test .


To setup a token with SoftHSM run:

  softhsm2-util --init-token --free --label "XmlsecToken" --pin password --so-pin password

To create a key pair in token run:

  pkcs11-tool --module /usr/lib/softhsm/libsofthsm2.so -l -k --key-type rsa:2048 --id 1000 --label XmlsecKey --pin password

To generate a certificate run:

  openssl req -new -x509 -subj "/CN=Xmlsec" -engine pkcs11 -keyform engine -key "pkcs11:token=XmlsecToken;object=XmlsecKey;type=private;pin-value=password" -out Xmlsec.pem

To sign an xml with a patched xmlsec run:

  xmlsec1 --sign "--privkey-openssl-engine:XmlsecKey" "pkcs11;pkcs11:token=XmlsecToken;object=XmlsecKey;pin-value=password,Xmlsec.pem" sample.xml


Best regards




--

--------------------------------------------------------------------------

Leonardo Secci

mailto:[email protected]


UniRel s.r.l.



_______________________________________________
xmlsec mailing list
[email protected]
http://www.aleksey.com/mailman/listinfo/xmlsec

_______________________________________________
xmlsec mailing list
[email protected]
http://www.aleksey.com/mailman/listinfo/xmlsec

Reply via email to