(I hope this goes properly out as I had major issues with hg email so
combined hg export + git send-email)
It is convenient to keep X.509 certificates related to key pairs stored in
openssl engine within the engine.
Implementation uses 'LOAD_CERT_CTRL' extension to fetch certificate from
the engine. This extension is not supported by all engines and in those
cases it should report with an error.
Configuration is similar to what it is for 'ssl_certificate_key'.
First certificate must match with ssl_certificate_key's key pair rest of
the certificiates are added to the certificate chain.
Example configuration with libp11's pkcs11 engine:
ssl_certificate "engine:pkcs11:pkcs11:token=mytoken;object=mykey
engine:pkcs11:pkcs11:token=mytoken;object=int-ca";
ssl_certificate_key "engine:pkcs11:pkcs11:token=mytoken;object=mykey?pin-value=mypin";
Tested the loading with two pkcs11 implementations SoftHSMv2 and with
OP-TEE's PKCS11 Trusted Application running on Embedded Linux device.
First three commits is the main beef and in order to make it more flexible
added also last commit allowing intermediate certificates loaded from file
system.
Separator of space is used as there was already existing use of array for
ssl_certificate configuration.
Thanks,
Vesa Jääskeläinen
_______________________________________________
nginx-devel mailing list
nginx-devel@nginx.org
https://mailman.nginx.org/mailman/listinfo/nginx-devel