tpm Plugin
Purpose
The tpm plugin for libtpmtss allows to access persistent RSA and ECDSA
private keys bound to a TPM 2.0. Optionally, the
TPM 2.0 can be enabled as a true random number source.
| Keys bound to a TPM 2.0 can only be used with IKEv2, because IKEv1’s legacy signature schemes are not supported. | 
The plugin is disabled by default and can be enabled with the
./configure option
--enable-tpm
Configuration
The tpm plugin is configured using the following options in the
charon.plugins.tpm
section of strongswan.conf:
| Key | Default | Description | 
|---|---|---|
ek_handle  | 
Handle of the RSA or ECC Endorsement Key (EK) to be used to set up an
 authenticated session with a TPM 2.0 (e.g.   | 
|
fips_186_4  | 
  | 
Is the TPM 2.0 FIPS-186-4 compliant, which forces e.g. the use of the default salt length instead of maximum salt length with RSA-PSS padding  | 
tcti.name  | 
[→]  | 
Name of TPM 2.0 TCTI library. Valid values:   | 
tcti.opts  | 
[→]  | 
Options for the TPM 2.0 TCTI library. Defaults are   | 
use_rng  | 
  | 
Whether the TPM 2.0 should be used as RNG. For security reasons enable
 only if an authenticated session can be set up (see   |