diff --git a/misc/softhsm-example-token/.gitignore b/misc/softhsm-example-token/.gitignore new file mode 100644 index 0000000..99c273b --- /dev/null +++ b/misc/softhsm-example-token/.gitignore @@ -0,0 +1,5 @@ +softhsm.conf +test.* +openssl.conf +config.py +softhsm.* diff --git a/misc/softhsm-example-token/README b/misc/softhsm-example-token/README new file mode 100644 index 0000000..9a54377 --- /dev/null +++ b/misc/softhsm-example-token/README @@ -0,0 +1,17 @@ + +This directory contains a basic setup for testing pkcs11-support. If you get +this to work you have a decent chance of using your real HSM or hardware token. + +You need the following packages (ubuntu/debian names): + + - libengine-pkcs11-openssl + - softhsm + +Type 'make' to generate a softhsm token with a test-key on id a1b2 with PIN-code +"secret1". To use this token with osslsigncode try something like this (from this +directory): + +env SOFTHSM_CONF=`pwd`/softhsm.conf ../../osslsigncode sign \ + -pkcs11 /usr/lib/softhsm/libsofthsm.so -key a1b2 -certs test.crt ... + +Use 'secret1' as the password at the prompt. diff --git a/README b/misc/softhsm-example-token/README-PKCS11 similarity index 100% rename from README rename to misc/softhsm-example-token/README-PKCS11 diff --git a/misc/softhsm-example-token/gen-token.sh b/misc/softhsm-example-token/gen-token.sh new file mode 100755 index 0000000..fdd4d6e --- /dev/null +++ b/misc/softhsm-example-token/gen-token.sh @@ -0,0 +1,46 @@ +#!/bin/bash + +P11_ENGINE=/usr/lib/engines/engine_pkcs11.so +P11_MODULE=/usr/lib/softhsm/libsofthsm.so + +## + +export SOFTHSM_CONF=softhsm.conf +cat>config.py<softhsm.conf<openssl.conf<