-
Notifications
You must be signed in to change notification settings - Fork 0
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
RFE: Use RFC7512 PKCS#11 URI #1
Comments
You're right, i'll look into this shortly and reusue that code that understand and URI format. i'll also see if i can adapt a sample so its more generic (eg for psanford/awsv4signer) fyi, go-tpm and go-tpm-tools needs to support hmac import and even use thanks! |
i'll have to update the the go-jwt issuer for pkcs as well |
this repo uses low-level |
The code at https://github.com/stefanberger/go-pkcs11uri wraps around the miekg/pkcs11 code and provides the necessary URI parsing support. Matching a PKCS#11 token given a URI, or generating a FindObjects template from a URI, is then fairly simple; examples in the matchSlots() and getFindTemplate() functions in https://github.com/dwmw2/rolesanywhere-credential-helper/blob/pkcs11/aws_signing_helper/pkcs11_signer.go |
I do agree it would be better if the underlying modules made it easy for applications to get this right. Filed miekg/pkcs11#170 |
i'll reopen this and await the upstream changes (which would address using the uri much easier for everyone and give near automatic support) also noticed the issue for the thales library (which i also use elsewhere): |
Seeing that kind of thing in your documentation makes me sad. I prefer documentation which says "Just give me a PKCS#11 URI in place of a filename, and everything Just Works". Like at https://github.com/dwmw2/rolesanywhere-credential-helper/tree/pkcs11#pkcs11-integration
As discussed, feel free to steal anything you like from that code.
The text was updated successfully, but these errors were encountered: