I’m struggling with the following task. I’m writing a software application
linked with OpenSSL-1.0.2. It receives an encrypted symmetric key (say, with
identifying parameters) that needs to be decrypted using hardware token,
accessible via PKCS#11. I know that engine_pkcs11 (or rather it’s current
incarnation libp11) does that fine when invoked via CLI.

My question is: what’s the smallest simplest code example that you could
share to show an absolutely minimalistic way of performing such decryption?
Let’s assume that everything is already known or determined from those other
parameters – like the token type is already known (RSA), the serial number +
CN + SAN of the certificate used to encrypt, etc.

Thank you, and apologies if this question is less than smart.

P.S. An alternative is to access the token directly via OpenSC (as libp11
does it anyway), but I suspect it would be more complicated code-wise?
-- 
Regards,
Uri Blumenthal


Attachment: smime.p7s
Description: S/MIME cryptographic signature

-- 
openssl-users mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users

Reply via email to