-
Create a directory to generate the certificate request for sender and receiver
|
›_ Console |
|
-
Generate a sender key using p11tool2 For RSA
|
›_ Console |
|
For ECC
|
›_ Console |
|
Figure 43: Generate ECC key for Sender
Once key generation is completed then add CKA_ID for both public and private ECC keys using PKCS11# CryptoServer Administration tool
Verify the ECC key
Figure 44: List Sender ECC Key
-
Generate a certificate request for sender
|
›_ Console |
|
Figure 45: Sender certificate request generation output
Enter the prompted value for "A challenge password" as blank.
Here SSLCert is the token label and SenderKey is the key on the HSM. Provide Cryptouser PIN when prompted.
-
Sign the certificate request for Sender by CA
|
›_ Console |
|
Figure 46: Sender certificate request signing by CA
Press y to sign and y again to commit.
Here SSLCert is the token label and CertKey is the key on the HSM. Provide Cryptouser PIN when prompted.
-
Generate key for receiver using p11tool2 for RSA
|
›_ Console |
|
Figure 47: List Receiver key output
For receiver only RSA keys are generated. OpenSSL 3 does not support encryption and decryption with ECC key.
-
Generate a certificate request for receiver using RSA key
|
›_ Console |
|
Figure 48: Receiver certificate request generation output
Here SSLCert is the token label and ReceiverKey is the key on the HSM. Provide Cryptouser PIN when prompted.
-
Sign the certificate request for receiver by CA
|
›_ Console |
|
Figure 49: Receiver certificate request signing by CA
Press y to sign and y again to commit.
Here SSLCert is the token label and CertKey is the key on the HSM. Provide Cryptouser PIN when prompted.