Chapter 4: ProtectToolkit 7 Software Installation
To uninstall the Network Access Provider manually
Use the
rpm(8)
command with the appropriate package name as a parameter.
# rpm -e PTKnethsm
Manual Linux Installation for PCIe Mode
Use the following commands to install or uninstall the PCIe Access Provider package. It includes the device
driver components for a ProtectServer 3 PCIe HSM installed in the host system.
NOTE
Ensure that the
dkms
package is installed on your client machine before continuing.
To install the PCie access provider manually
Execute the following as
root
(where x.x.x-yy is the PTK version number). Specify the location you chose for
the installation files:
# cd /output-unix/Linux64/pci_hsm_access_provider_PSI
rpm -PTKpcihsmK7-x.x.x-yy.x86_64.rpm
If the compile fails, or the driver does not come up automatically (
hsmstate
fails), you will need to correct the
problem and then
cd /opt/ETpcihsm/src
and invoke
make(1)
as root. The
Makefile
in that directory has
some notes to help you get the driver compiled correctly.
NOTE
After installing this package, you must run an additional script (
driver-install.sh
) to
install the PCIe driver. If you plan to configure the client for Secure Boot, see
ProtectServer 3 PCIe Driver for UEFI Secure Boot" below
before running the script.
/opt/safenet/protecttoolkit7/pcihsm/driver/driver-install.sh
To uninstall the PCie access provider manually
Use the
rpm(8)
command with the appropriate package name as a parameter.
# rpm -e PTKpcihsmK7
Signing the ProtectServer 3 PCIe Driver for UEFI Secure Boot
Red Hat Enterprise Linux 7 (RHEL 7) can be installed and run on systems where UEFI Secure Boot is enabled.
With Secure Boot enabled, the RHEL kernel requires all kernel modules, including device drivers, to be signed
by a key that is trusted by the EFI boot loader. If a module is not signed, it is prevented from loading at runtime
and the dependent device will not work.
To use ProtectServer 3 PCIe in a Secure Boot-enabled environment, the driver must be signed and trusted by
the OS and boot loader.
The following procedure includes:
>
Generating RSA signing keys and certificates
>
Signing the ProtectServer PCIe driver
>
Enrolling the signing public key into the system keyring
>
Loading the signed driver
Thales ProtectServer 3 HSM and ProtectToolkit 7 Installation and Configuration Guide
2021-06-30 10:29:48-04:00 Copyright 2009-2021 Thales Group
78