3.1.4 Certification Creation for TLS Client Authentication
For EAP-TLS and PEAPv0/1 with TLS, one more set of certificates is required for client
            authentication. Perform the following steps to generate this extra set of certificates.
            The ATWINC uses the newly created public certificate and
            server key certificate (for example, winc_client_private.crt and
                winc_client_private.key), and the Authentication server uses the
            newly created CA certificate (for example, radius_root.crt).
Perform the following steps to generate the certificates for TLS client authentication:
- Generate the CA key using the openssl genrsa -out radius_root.key 2048 command.
 - Generate the CA certificate using the CA key and using the openssl req -new -x509 -days 365 -key radius_root.key -out radius_root.crt command.
 
Perform the following steps to generate the Certificate Signing Request (CSR) and public certificate:
- Generate a Client key using the openssl genrsa -out winc_client_private.key 2048 command.
 - Generate the CSR using
                        
winc_client_private key(client.key) and the openssl req -new -key winc_client_private.key -out winc_client_private.csr command. - Self-sign the certificate using the CA certificate and generate the public key using the openssl x509 -req -days 365 -in winc_client_private.csr -CA radius_root.crt -CAkey radius_root.key -set_serial 01 -out winc_client_private.crt command.
 
server.crtmust be signed bywinc_root.cer.winc_client_private.crtmust be signed byradius_root.crt.
- Server authentication requires
                    the 
server.key,server.crtandwinc_root.cercertificates. - Client authentication requires
                    the 
radius_root.crt,winc_client_private.keyandwinc_client_private.crtcertificates. 
