Oct 2019
At your own risk.
$ openssl pkcs12 -in user.p12 -out ca_org.pem -cacerts -nokeys Enter Import Password: ******** # user.p12に設定されているパスワード
$ openssl pkcs12 -in user.p12 -out clicert_user.pem -clcerts Enter Import Password: ******** # user.p12に設定されているパスワード Enter PEM pass phrase: xxxxxxxx # clicert_user.pemに設定するパスワード Verifying - Enter PEM pass phrase: xxxxxxxx
ctrl_interface=DIR=/var/run/wpa_supplicant GROUP=netdev ## for EAP-TLS with WPA2(RSN)/CCMP network = { ssid="orgSSID" scan_ssid=1 proto=RSN key_mgmt=WPA-EAP pairwise=CCMP eap=TLS identity="clientname" ca_cert="/etc/certs/ca_org.pem" client_cert="/etc/certs/clicert_user.pem" private_key="/etc/certs/clicert_user.pem" private_key_passwd="xxxxxxxx" }
$ openssl x509 -in certfile.pem -text -noout