Package: tpm2-openssl Version: 1.1.1-1 Severity: important In order to use tpm to store TLS keys, the key type must be usable for TLS. If, the ecc algo family cannot be used, this has to be RSA-PSS. RSA-PSS keys can be created with tpm2-tools and appear to function correctly outside openssl. Trying to generate an openssl cert request with invalid padding.
How to reproduce: tpm2_createek -G rsa -c ek_pss.ctx tpm2_createak -C ek_pss.ctx -G rsa -g sha256 -s pss -c ak_ecc.ctx tpm2_evictcontrol -c ak_ecc.ctx 0x81000001 OPENSSL_CONF=./openssl.cnf openssl req -provider tpm2 -provider default \ -propquery '?provider=tpm2' -key handle:0x81000001 -out testcsr.pem -new The resulting csr has invalid padding (200+ bytes instead of 32) and is rejected if passed to a CA -- System Information: Debian Release: 12.5 APT prefers stable-updates APT policy: (500, 'stable-updates'), (500, 'stable') Architecture: amd64 (x86_64) Foreign Architectures: i386 Kernel: Linux 6.1.0-13-amd64 (SMP w/12 CPU threads; PREEMPT) Locale: LANG=en_GB.UTF-8, LC_CTYPE=en_GB.UTF-8 (charmap=UTF-8), LANGUAGE=en_GB:en Shell: /bin/sh linked to /usr/bin/dash Init: systemd (via /run/systemd/system) LSM: AppArmor: enabled Versions of packages tpm2-openssl depends on: ii libc6 2.36-9+deb12u4 ii libtss2-esys-3.0.2-0 3.2.1-3 ii libtss2-rc0 3.2.1-3 ii libtss2-tctildr0 3.2.1-3 tpm2-openssl recommends no packages. tpm2-openssl suggests no packages. -- no debconf information