<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Error to access SE through libsssProvider + openssl. in Secure Authentication</title>
    <link>https://community.nxp.com/t5/Secure-Authentication/Error-to-access-SE-through-libsssProvider-openssl/m-p/1905259#M1635</link>
    <description>&lt;P&gt;&lt;a href="https://community.nxp.com/t5/user/viewprofilepage/user-id/59276"&gt;@Kan_Li&lt;/a&gt;&amp;nbsp;: I am writing on behalf of&amp;nbsp;&lt;a href="https://community.nxp.com/t5/user/viewprofilepage/user-id/221468"&gt;@CristianeBP&lt;/a&gt;&amp;nbsp;and Lorenzo Verniani (they got problems to access this thread):&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;SPAN class="uiOutputText"&gt;Good morning Kan Li,&lt;/SPAN&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;SPAN class="uiOutputText"&gt;&amp;nbsp;thank you very much for your reply.&lt;/SPAN&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;SPAN class="uiOutputText"&gt;&amp;nbsp;Your answer is about my 2nd test, and ok, it is a limitation and we need to wait some updates.&lt;/SPAN&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN class="uiOutputText"&gt;RGs:&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class="cuf-entityLinkId forceChatterEntityLink entityLinkHover" data-id="0052p00000D4vDIAAZ" data-hashtag="" data-mention="0052p00000D4vDIAAZ"&gt;&lt;A id="247:7404;a" class="cuf-entityLink cuf-mention" href="https://nxp.lightning.force.com/lightning/r/0052p00000D4vDIAAZ/view" data-sfdc-wired-mouseover="" data-sfdc-wired-mouseout="" data-sfdc-wired-focus="" data-sfdc-wired-blur="" data-proxy-id="aura-pos-lib-1" target="_blank"&gt;&lt;SPAN class="uiOutputText"&gt;@Lorenzo Verniani&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN class="cuf-entityAdditionalLabel uiOutputText"&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;(Customer)&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class="uiOutputText"&gt;​&amp;nbsp;let us know how severe this limitation is for ABB.&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN class="uiOutputText"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;SPAN class="uiOutputText"&gt;But in the 3rd test, I generated both key pair using SETool, not using OPENSSL, and the verification fails equally. How can you explain that?&lt;/SPAN&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;SPAN class="uiOutputText"&gt;&amp;nbsp;Thanks again,&lt;/SPAN&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;SPAN class="uiOutputText"&gt;Cristiane Bellenzier Piaia&lt;/SPAN&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN class="uiOutputText"&gt;RGs: I repeat 3rd test here:&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;3 -both key pairs generated inside the SE using seTool:&lt;/P&gt;
&lt;P&gt;#seTool genRSA 2048 0x00000003 127.0.0.1:8040&lt;/P&gt;
&lt;P&gt;# seTool getRSARef 0x00000003 a.pem 127.0.0.1:804&lt;BR /&gt;# openssl req -new --provider /usr/lib/libsssProvider.so --provider default -x509 -new -nodes -key a.pem -subj "/OU=NXP Plug Trust CA/CN=NXP RootCAvExxx" -days 4380 -out a.cer&lt;BR /&gt;sssprov-flw: Get random data from SE05x&lt;BR /&gt;sssprov-flw: Performing RSA sign using SE05x&lt;/P&gt;
&lt;P&gt;#seTool genRSA 2048 0x00000020 127.0.0.1:8040&lt;/P&gt;
&lt;P&gt;# seTool getRSARef 0x00000020 b.pem 127.0.0.1:8040&lt;/P&gt;
&lt;P&gt;# openssl req -new --provider /usr/lib/libsssProvider.so --provider default -key b.pem -subj "/CN=NXP_SE050_TLS_CLIENT_RSA" -out b.csr&lt;BR /&gt;sssprov-flw: Performing RSA sign using SE05x&lt;BR /&gt;# openssl x509 -req --provider default -in b.csr -CAcreateserial -out b.cer -days 5000 -CA a.cer -CAkey a.pem&lt;BR /&gt;Certificate request self-signature ok&lt;BR /&gt;subject=CN = NXP_SE050_TLS_CLIENT_RSA&lt;BR /&gt;# openssl verify -partial_chain -trusted a.cer b.cer&lt;BR /&gt;CN = NXP_SE050_TLS_CLIENT_RSA&lt;BR /&gt;error 7 at 0 depth lookup: certificate signature failure&lt;BR /&gt;&lt;STRONG&gt;error b.cer: verification failed&lt;/STRONG&gt;&lt;BR /&gt;2090F276:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:../openssl-3.0.13/crypto/rsa/rsa_pk1.c:75:&lt;BR /&gt;2090F276:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:../openssl-3.0.13/crypto/rsa/rsa_ossl.c:598:&lt;BR /&gt;2090F276:error:1C880004:Provider routines:rsa_verify:RSA lib:../openssl-3.0.13/providers/implementations/signature/rsa_sig.c:774:&lt;BR /&gt;2090F276:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:../openssl-3.0.13/crypto/asn1/a_verify.c:217:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 10 Jul 2024 10:48:58 GMT</pubDate>
    <dc:creator>rodolfoveltrigo</dc:creator>
    <dc:date>2024-07-10T10:48:58Z</dc:date>
    <item>
      <title>Error to access SE through libsssProvider + openssl.</title>
      <link>https://community.nxp.com/t5/Secure-Authentication/Error-to-access-SE-through-libsssProvider-openssl/m-p/1898491#M1626</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;I have some problem to use SE (version B) +&amp;nbsp;libsssProvider + openssl 3.0.13.&lt;/P&gt;&lt;P&gt;I generate a key pair using SETool, but when I tried to access my key to generate a certificate signing request I facing some problem, because my csr is not generate and the command exiting is 1.&lt;/P&gt;&lt;P&gt;I also tried to access my key using the SE index (-key nxp:0x00000020 and&amp;nbsp;-inkey nxp:0x00000020), but also without success.&lt;/P&gt;&lt;P&gt;[root@ABB-ea-a6-d2-59-47-62 cert]# openssl req -new --provider /usr/lib/libsssProvider.so --provider default -key nxp:0x00000020 -out server.csr -config csr.conf&lt;BR /&gt;[root@ABB-ea-a6-d2-59-47-62 cert]# echo $?&lt;BR /&gt;1&lt;/P&gt;&lt;P&gt;[root@ABB-ea-a6-d2-59-47-62 cert]# openssl req -new --provider /usr/lib/libsssProvider.so --provider default -key $SERVER.key -out $SERVER.csr -config csr.conf&lt;BR /&gt;[root@ABB-ea-a6-d2-59-47-62 cert]# echo $?&lt;BR /&gt;1&lt;BR /&gt;[root@ABB-ea-a6-d2-59-47-62 cert]# cat server.key&lt;BR /&gt;-----BEGIN PRIVATE KEY-----&lt;BR /&gt;MIIBPQIBADANBgkqhkiG9w0BAQEFAASCAScwggEjAgEAAoIBAQCoWVZ3r3KbD9Ms&lt;BR /&gt;2DmJQL2Zt7B+4J9YhlAlavk3k2FcDyRr268W9OTk3xa1Z97IcnSmFyiYatNOCBGa&lt;BR /&gt;DmmzRpRvFuoHfgS4aHIGiLesp/APgwioclLsHadmNOen3fBWlZ0y02G2bW7YtBJa&lt;BR /&gt;6d5kKyI83CQUl2zapFnylpZWZEB81Cz3Cbyy/N6v6o1cEDYD8f8Pq2UltD0LGnjp&lt;BR /&gt;jZqN1Tyy4QIXT9niKXJYCklordJe55+VVth8qedi40Xq7RSnGu0ujIIrcwnnX7GF&lt;BR /&gt;qExtw80UMHwKnJnOpJthmQ4VIPBXH8bokPDwr6g9DE9UP2gUezcUFor6U5j4uHaf&lt;BR /&gt;iece/VIBAgMBAAECAQECAQECASACAQECAQECBQClprW2&lt;BR /&gt;-----END PRIVATE KEY-----&lt;/P&gt;&lt;P&gt;I use the accessManager (executed with plain option) to access my SE.&lt;/P&gt;&lt;P&gt;Yocto version: kirkstone.&lt;/P&gt;&lt;P&gt;Thanks in advance,&lt;/P&gt;&lt;P&gt;Cristiane Bellenzier Piaia&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 03 Jul 2024 15:57:56 GMT</pubDate>
      <guid>https://community.nxp.com/t5/Secure-Authentication/Error-to-access-SE-through-libsssProvider-openssl/m-p/1898491#M1626</guid>
      <dc:creator>CristianeBP</dc:creator>
      <dc:date>2024-07-03T15:57:56Z</dc:date>
    </item>
    <item>
      <title>Re: Error to access SE through libsssProvider + openssl.</title>
      <link>https://community.nxp.com/t5/Secure-Authentication/Error-to-access-SE-through-libsssProvider-openssl/m-p/1899289#M1627</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.nxp.com/t5/user/viewprofilepage/user-id/221468"&gt;@CristianeBP&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Would you please share more details regarding the SE and the platform? also how did you create the key with SeTool? I may try to reproduce this issue here.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks for your patience!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Best Regards,&lt;/P&gt;
&lt;P&gt;Kan&lt;/P&gt;</description>
      <pubDate>Thu, 04 Jul 2024 07:46:13 GMT</pubDate>
      <guid>https://community.nxp.com/t5/Secure-Authentication/Error-to-access-SE-through-libsssProvider-openssl/m-p/1899289#M1627</guid>
      <dc:creator>Kan_Li</dc:creator>
      <dc:date>2024-07-04T07:46:13Z</dc:date>
    </item>
    <item>
      <title>Re: Error to access SE through libsssProvider + openssl.</title>
      <link>https://community.nxp.com/t5/Secure-Authentication/Error-to-access-SE-through-libsssProvider-openssl/m-p/1899319#M1628</link>
      <description>&lt;P&gt;Good morning Kan,&lt;/P&gt;&lt;P&gt;thanks for your reply.&lt;/P&gt;&lt;P&gt;SE version: B&lt;/P&gt;&lt;P&gt;Middleware version: 04.05.03&lt;/P&gt;&lt;P&gt;Linux:&amp;nbsp; Kernel: Linux 5.15.71-5.15.71-2.2.0+g3313732e9984+p5&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;Architecture: arm&lt;/P&gt;&lt;P&gt;seTool command:# seTool getRSARef 0x00000020 server.key $EX_SSS_BOOT_SSS_PORT&lt;BR /&gt;App :INFO :PlugAndTrust_v04.05.03_20240502&lt;BR /&gt;App :INFO :Running seTool&lt;BR /&gt;App :INFO :Using PortName='127.0.0.1:8040' (CLI)&lt;BR /&gt;sss :WARN :Communication channel is Plain.&lt;BR /&gt;sss :WARN :!!!Not recommended for production use.!!!&lt;BR /&gt;App :INFO :ex_sss Finished&lt;BR /&gt;# cat server.key&lt;BR /&gt;-----BEGIN PRIVATE KEY-----&lt;BR /&gt;MIIBPQIBADANBgkqhkiG9w0BAQEFAASCAScwggEjAgEAAoIBAQDLnqjJfGZVgcGq&lt;BR /&gt;zcztezdSbIFYRVQFI4nOJuDgprlvzX/T7K73UAeZvwAiIy5Juyer9/vufpgG7Q56&lt;BR /&gt;lmgiEYAyHlIcgetskarxV3JpSG/P+vzYQtFqpbSrHOS+eSF7JS/7pQQVY0sqMiaj&lt;BR /&gt;3FrrPfubPfRalS7ztGPq9Ch0YacX70yntDzm+MnIncmOitcPo/+Exr6g8maO8bOI&lt;BR /&gt;XzfKMY05klnkDiup5jTY0AGJknuDNLc77u0WVTf+pP3A0xkjZ6yDACWpPuk/6xVd&lt;BR /&gt;CUp+ABAfY8BQqncfNGRxihOQ1roqGLvHn9LypON84b+VUQKSxkJabSojCrL/oFTs&lt;BR /&gt;mIMiBWwlAgMBAAECAQECAQECASACAQECAQECBQClprW2&lt;BR /&gt;-----END PRIVATE KEY-----&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;# echo $EX_SSS_BOOT_SSS_PORT&lt;BR /&gt;127.0.0.1:8040&lt;/P&gt;&lt;P&gt;# openssl req -new --provider /usr/lib/libsssProvider.so --provider default -key server.key -out server.csr -config csr.conf&lt;BR /&gt;App :INFO :Using PortName='127.0.0.1:8040' (ENV: EX_SSS_BOOT_SSS_PORT=127.0.0.1:8040)&lt;BR /&gt;sss :WARN :Communication channel is Plain.&lt;BR /&gt;sss :WARN :!!!Not recommended for production use.!!!&lt;BR /&gt;# echo $?&lt;BR /&gt;1&lt;/P&gt;&lt;P&gt;# openssl req -new --provider /usr/lib/libsssProvider.so --provider default -key nxp:0x00000020 -out server.csr -config csr.conf&lt;BR /&gt;App :INFO :Using PortName='127.0.0.1:8040' (ENV: EX_SSS_BOOT_SSS_PORT=127.0.0.1:8040)&lt;BR /&gt;sss :WARN :Communication channel is Plain.&lt;BR /&gt;sss :WARN :!!!Not recommended for production use.!!!&lt;BR /&gt;# echo $?&lt;BR /&gt;1&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Cristiane Bellenzier Piaia&lt;/P&gt;</description>
      <pubDate>Thu, 04 Jul 2024 08:18:33 GMT</pubDate>
      <guid>https://community.nxp.com/t5/Secure-Authentication/Error-to-access-SE-through-libsssProvider-openssl/m-p/1899319#M1628</guid>
      <dc:creator>CristianeBP</dc:creator>
      <dc:date>2024-07-04T08:18:33Z</dc:date>
    </item>
    <item>
      <title>Re: Error to access SE through libsssProvider + openssl.</title>
      <link>https://community.nxp.com/t5/Secure-Authentication/Error-to-access-SE-through-libsssProvider-openssl/m-p/1899342#M1629</link>
      <description>&lt;P&gt;Kan,&lt;/P&gt;&lt;P&gt;just for your knowledge.&lt;/P&gt;&lt;P&gt;The same happens when I generate the keypair using openssl:&lt;BR /&gt;# openssl genrsa --provider /usr/lib/libsssProvider.so --provider default -out tls_client_key_ref_0xEF000011.pem 1024&lt;BR /&gt;App :INFO :Using PortName='127.0.0.1:8040' (ENV: EX_SSS_BOOT_SSS_PORT=127.0.0.1:8040)&lt;BR /&gt;sss :WARN :Communication channel is Plain.&lt;BR /&gt;sss :WARN :!!!Not recommended for production use.!!!&lt;BR /&gt;Warning: generating random key material may take a long time&lt;BR /&gt;if the system has a poor entropy source&lt;BR /&gt;sssprov-flw: Generate RSA key inside SE05x&lt;/P&gt;&lt;P&gt;# cat tls_client_key_ref_0xEF000011.pem&lt;BR /&gt;-----BEGIN PRIVATE KEY-----&lt;BR /&gt;MIHSAgEAMA0GCSqGSIb3DQEBAQUABIG9MIG6AgEBAoGAbchhCXBMjOV4xS+6dBjt&lt;BR /&gt;4wyjZf3AespjZ37m/DOUxOh41rH6wBDXlGYlpjsHZWBEHAxMV9e9qvqzxcD5+kKY&lt;BR /&gt;bShdSA3vl6ZQpzpDvtk0qMXRkLr54QwXUvlbB38eS/TUYhbmeEFJ66CnR2K5/8AY&lt;BR /&gt;EJ9DqmVQ0twc7TATgsRS45UCAwEAAQIBAAIBAQIFAO8AABECAQACAQACBQClprW2&lt;BR /&gt;MBMwEQIFAO8AABECAQACBQClprW2&lt;BR /&gt;-----END PRIVATE KEY-----&lt;BR /&gt;&lt;BR /&gt;# openssl req -new --provider /usr/lib/libsssProvider.so --provider default -key tls_client_key_ref_0xEF000011.pem -subj "/CN=NXP_SE050_TLS_CLIENT_RSA" -out tls_client.csr&lt;BR /&gt;App :INFO :Using PortName='127.0.0.1:8040' (ENV: EX_SSS_BOOT_SSS_PORT=127.0.0.1:8040)&lt;BR /&gt;sss :WARN :Communication channel is Plain.&lt;BR /&gt;sss :WARN :!!!Not recommended for production use.!!!&lt;BR /&gt;# echo $?&lt;BR /&gt;1&lt;BR /&gt;Thanks,&lt;/P&gt;&lt;P&gt;Cristiane Bellenzier Piaia&lt;/P&gt;</description>
      <pubDate>Thu, 04 Jul 2024 08:32:40 GMT</pubDate>
      <guid>https://community.nxp.com/t5/Secure-Authentication/Error-to-access-SE-through-libsssProvider-openssl/m-p/1899342#M1629</guid>
      <dc:creator>CristianeBP</dc:creator>
      <dc:date>2024-07-04T08:32:40Z</dc:date>
    </item>
    <item>
      <title>Re: Error to access SE through libsssProvider + openssl.</title>
      <link>https://community.nxp.com/t5/Secure-Authentication/Error-to-access-SE-through-libsssProvider-openssl/m-p/1899957#M1630</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.nxp.com/t5/user/viewprofilepage/user-id/221468"&gt;@CristianeBP&lt;/a&gt;&amp;nbsp;，&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN class="ui-provider a b c d e f g h i j k l m n o p q r s t u v w x y z ab ac ae af ag ah ai aj ak"&gt;Please give it a try with the github version:&amp;nbsp;&lt;A href="https://github.com/NXPPlugNTrust/se05x-openssl-provider" target="_blank"&gt;https://github.com/NXPPlugNTrust/se05x-openssl-provider&lt;/A&gt;&amp;nbsp;,&amp;nbsp;&lt;SPAN&gt;Most of the features are updated over there.&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN class="ui-provider a b c d e f g h i j k l m n o p q r s t u v w x y z ab ac ae af ag ah ai aj ak"&gt;&lt;SPAN&gt;Please kindly have my test result with the&amp;nbsp;libsssProvider.so generated from above.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN class="ui-provider a b c d e f g h i j k l m n o p q r s t u v w x y z ab ac ae af ag ah ai aj ak"&gt;&lt;SPAN&gt;ubuntu@ubuntu:~/provider_test/rsa_test$ openssl genrsa --provider /usr/local/lib/libsssProvider.so --provider default -out tls_client_key_ref_0xEF000011.pem 1024&lt;BR /&gt;App :INFO :If you want to over-ride the selection, use ENV=EX_SSS_BOOT_SSS_PORT or pass in command line arguments.&lt;BR /&gt;sss :INFO :atr (Len=35)&lt;BR /&gt;01 A0 00 00 03 96 04 03 E8 00 FE 02 0B 03 E8 00&lt;BR /&gt;01 00 00 00 00 64 13 88 0A 00 65 53 45 30 35 31&lt;BR /&gt;00 00 00&lt;BR /&gt;sss :INFO :Newer version of Applet Found&lt;BR /&gt;sss :INFO :Compiled for 0x30100. Got newer 0x60000&lt;BR /&gt;sss :WARN :Communication channel is Plain.&lt;BR /&gt;sss :WARN :!!!Not recommended for production use.!!!&lt;BR /&gt;Warning: generating random key material may take a long time&lt;BR /&gt;if the system has a poor entropy source&lt;BR /&gt;sssprov-flw: Generate RSA key inside SE05x&lt;BR /&gt;ubuntu@ubuntu:~/provider_test/rsa_test$ cat tls_client_key_ref_0xEF000011.pem&lt;BR /&gt;-----BEGIN PRIVATE KEY-----&lt;BR /&gt;MIG+AgEAMA0GCSqGSIb3DQEBAQUABIGpMIGmAgEAAoGBAMOMHJoKSm4V6tDRehUx&lt;BR /&gt;Hk81c0u18eL85piCFFzfygUP1qz0aGb4dYn7R/gk6pITJnBF1uoF9L5fLp6cbqTX&lt;BR /&gt;YyS3q90W69IRzDRZMWye1/QYer6MNImbqe+Xfj8av64JVsSE634rsUN4iMZCQGbr&lt;BR /&gt;JAFQxjUsVFH6gvy2OybL+KQBAgMBAAECAQACAQECBQDvAAARAgEAAgEAAgUApaa1&lt;BR /&gt;tg==&lt;BR /&gt;-----END PRIVATE KEY-----&lt;BR /&gt;ubuntu@ubuntu:~/provider_test/rsa_test$ openssl req -new --provider /usr/local/lib/libsssProvider.so --provider default -key tls_client_key_ref_0xEF000011.pem -subj "/CN=NXP_SE050_TLS_CLIENT_RSA" -out tls_client.csr&lt;BR /&gt;App :INFO :If you want to over-ride the selection, use ENV=EX_SSS_BOOT_SSS_PORT or pass in command line arguments.&lt;BR /&gt;sss :INFO :atr (Len=35)&lt;BR /&gt;01 A0 00 00 03 96 04 03 E8 00 FE 02 0B 03 E8 00&lt;BR /&gt;01 00 00 00 00 64 13 88 0A 00 65 53 45 30 35 31&lt;BR /&gt;00 00 00&lt;BR /&gt;sss :INFO :Newer version of Applet Found&lt;BR /&gt;sss :INFO :Compiled for 0x30100. Got newer 0x60000&lt;BR /&gt;sss :WARN :Communication channel is Plain.&lt;BR /&gt;sss :WARN :!!!Not recommended for production use.!!!&lt;BR /&gt;sssprov-flw: Performing RSA sign using SE05x&lt;BR /&gt;ubuntu@ubuntu:~/provider_test/rsa_test$ ls&lt;BR /&gt;tls_client.csr tls_client_key_ref_0xEF000011.pem&lt;BR /&gt;ubuntu@ubuntu:~/provider_test/rsa_test$ cat tls_client.csr&lt;BR /&gt;-----BEGIN CERTIFICATE REQUEST-----&lt;BR /&gt;MIIBYjCBzAIBADAjMSEwHwYDVQQDDBhOWFBfU0UwNTBfVExTX0NMSUVOVF9SU0Ew&lt;BR /&gt;gZ8wDQYJKoZIhvcNAQEBBQADgY0AMIGJAoGBAMOMHJoKSm4V6tDRehUxHk81c0u1&lt;BR /&gt;8eL85piCFFzfygUP1qz0aGb4dYn7R/gk6pITJnBF1uoF9L5fLp6cbqTXYyS3q90W&lt;BR /&gt;69IRzDRZMWye1/QYer6MNImbqe+Xfj8av64JVsSE634rsUN4iMZCQGbrJAFQxjUs&lt;BR /&gt;VFH6gvy2OybL+KQBAgMBAAGgADANBgkqhkiG9w0BAQsFAAOBgQBxEFr13fnb07Ve&lt;BR /&gt;6wTqzUHmb9xAOd2yc0gcm2+JXPweUxw++UV6Sxqp26A7R5yvU2OFtR21G/lJ0Vye&lt;BR /&gt;kbtp5YffeDnP/A3z4qCAjD+6y2BjXSbLloDWtS4jRG/mniIBn4KW15GY8rOKS0vP&lt;BR /&gt;X1SSXAjHwbgkKiuzSWM84qiv1Cus2w==&lt;BR /&gt;-----END CERTIFICATE REQUEST-----&lt;BR /&gt;&lt;A href="mailto:ubuntu@ubuntu:~/provider_test/rsa_test$" target="_blank"&gt;ubuntu@ubuntu:~/provider_test/rsa_test$&lt;/A&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Have a great day,&lt;BR /&gt;Kan&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;-------------------------------------------------------------------------------&lt;BR /&gt;Note:&lt;BR /&gt;- If this post answers your question, please click the "Mark Correct" button. Thank you!&lt;BR /&gt;- We are following threads for 7 weeks after the last post, later replies are ignored&lt;BR /&gt;Please open a new thread and refer to the closed one, if you have a related question at a later point in time.&lt;BR /&gt;-------------------------------------------------------------------------------&lt;/P&gt;</description>
      <pubDate>Fri, 05 Jul 2024 06:11:07 GMT</pubDate>
      <guid>https://community.nxp.com/t5/Secure-Authentication/Error-to-access-SE-through-libsssProvider-openssl/m-p/1899957#M1630</guid>
      <dc:creator>Kan_Li</dc:creator>
      <dc:date>2024-07-05T06:11:07Z</dc:date>
    </item>
    <item>
      <title>Re: Error to access SE through libsssProvider + openssl.</title>
      <link>https://community.nxp.com/t5/Secure-Authentication/Error-to-access-SE-through-libsssProvider-openssl/m-p/1904032#M1633</link>
      <description>&lt;P&gt;Good morning,&lt;/P&gt;&lt;P&gt;I just finished my tests but I think I found another problem.&lt;/P&gt;&lt;P&gt;The certificate signing fails when both key pairs are generated inside the SE.&lt;/P&gt;&lt;P&gt;My tests are:&lt;/P&gt;&lt;P&gt;1 -&amp;nbsp; generates 1 key pair inside and 1 outside:&lt;/P&gt;&lt;P&gt;# openssl genrsa -out a.pem 1024&lt;BR /&gt;# openssl req -new --provider /usr/lib/libsssProvider.so --provider default -x509 -new -nodes -key a.pem -subj "/OU=NXP Plug Trust CA/CN=NXP RootCAvExxx" -days 4380 -out a.cer&lt;BR /&gt;sssprov-flw: Not a ref key&lt;BR /&gt;sssprov-flw: Get random data from SE05x&lt;BR /&gt;sssprov-flw: Not a key in secure element. Performing RSA sign operation using host software&lt;BR /&gt;sssprov-flw: Get random data from SE05x&lt;BR /&gt;# openssl genrsa --provider /usr/lib/libsssProvider.so --provider default -out b.pem 1024&lt;BR /&gt;Warning: generating random key material may take a long time&lt;BR /&gt;if the system has a poor entropy source&lt;BR /&gt;sssprov-flw: Generate RSA key inside SE05x&lt;BR /&gt;# openssl req -new --provider /usr/lib/libsssProvider.so --provider default -key b.pem -subj "/CN=NXP_SE050_TLS_CLIENT_RSA" -out b.csr&lt;BR /&gt;sssprov-flw: Performing RSA sign using SE05x&lt;BR /&gt;[root@ABB-f6-4e-b6-68-0b-a1 ~]# openssl x509 -req --provider default -in b.csr -CAcreateserial -out b.cer -days 5000 -CA a.cer -CAkey a.pem&lt;BR /&gt;Certificate request self-signature ok&lt;BR /&gt;subject=CN = NXP_SE050_TLS_CLIENT_RSA&lt;BR /&gt;# openssl verify -partial_chain -trusted a.cer b.cer&lt;BR /&gt;&lt;STRONG&gt;b.cer: OK&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;2 -both key pairs generated inside the SE using openssl:&lt;/P&gt;&lt;P&gt;# openssl genrsa --provider /usr/lib/libsssProvider.so --provider default -out a.pem 1024&lt;BR /&gt;Warning: generating random key material may take a long time&lt;BR /&gt;if the system has a poor entropy source&lt;BR /&gt;sssprov-flw: Generate RSA key inside SE05x&lt;BR /&gt;# openssl req -new --provider /usr/lib/libsssProvider.so --provider default -x509 -new -nodes -key a.pem -subj "/OU=NXP Plug Trust CA/CN=NXP RootCAvExxx" -days 4380 -out a.cer&lt;BR /&gt;sssprov-flw: Get random data from SE05x&lt;BR /&gt;sssprov-flw: Performing RSA sign using SE05x&lt;BR /&gt;# openssl genrsa --provider /usr/lib/libsssProvider.so --provider default -out b.pem 1024&lt;BR /&gt;Warning: generating random key material may take a long time&lt;BR /&gt;if the system has a poor entropy source&lt;BR /&gt;sssprov-flw: Generate RSA key inside SE05x&lt;BR /&gt;# openssl req -new --provider /usr/lib/libsssProvider.so --provider default -key b.pem -subj "/CN=NXP_SE050_TLS_CLIENT_RSA" -out b.csr&lt;BR /&gt;sssprov-flw: Performing RSA sign using SE05x&lt;BR /&gt;# openssl x509 -req --provider default -in b.csr -CAcreateserial -out b.cer -days 5000 -CA a.cer -CAkey a.pem&lt;BR /&gt;Certificate request self-signature ok&lt;BR /&gt;subject=CN = NXP_SE050_TLS_CLIENT_RSA&lt;BR /&gt;# openssl verify -partial_chain -trusted a.cer b.cer&lt;BR /&gt;CN = NXP_SE050_TLS_CLIENT_RSA&lt;BR /&gt;error 7 at 0 depth lookup: certificate signature failure&lt;BR /&gt;&lt;STRONG&gt;error b.cer: verification failed&lt;/STRONG&gt;&lt;BR /&gt;2020F576:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:../openssl-3.0.13/crypto/rsa/rsa_pk1.c:75:&lt;BR /&gt;2020F576:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:../openssl-3.0.13/crypto/rsa/rsa_ossl.c:598:&lt;BR /&gt;2020F576:error:1C880004:Provider routines:rsa_verify:RSA lib:../openssl-3.0.13/providers/implementations/signature/rsa_sig.c:774:&lt;BR /&gt;2020F576:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:../openssl-3.0.13/crypto/asn1/a_verify.c:217:&lt;/P&gt;&lt;P&gt;3 -both key pairs generated inside the SE using seTool:&lt;/P&gt;&lt;P&gt;#seTool genRSA 2048 0x00000003 127.0.0.1:8040&lt;/P&gt;&lt;P&gt;# seTool getRSARef 0x00000003 a.pem 127.0.0.1:804&lt;BR /&gt;# openssl req -new --provider /usr/lib/libsssProvider.so --provider default -x509 -new -nodes -key a.pem -subj "/OU=NXP Plug Trust CA/CN=NXP RootCAvExxx" -days 4380 -out a.cer&lt;BR /&gt;sssprov-flw: Get random data from SE05x&lt;BR /&gt;sssprov-flw: Performing RSA sign using SE05x&lt;/P&gt;&lt;P&gt;#seTool genRSA 2048 0x00000020 127.0.0.1:8040&lt;/P&gt;&lt;P&gt;# seTool getRSARef 0x00000020 b.pem 127.0.0.1:8040&lt;/P&gt;&lt;P&gt;# openssl req -new --provider /usr/lib/libsssProvider.so --provider default -key b.pem -subj "/CN=NXP_SE050_TLS_CLIENT_RSA" -out b.csr&lt;BR /&gt;sssprov-flw: Performing RSA sign using SE05x&lt;BR /&gt;# openssl x509 -req --provider default -in b.csr -CAcreateserial -out b.cer -days 5000 -CA a.cer -CAkey a.pem&lt;BR /&gt;Certificate request self-signature ok&lt;BR /&gt;subject=CN = NXP_SE050_TLS_CLIENT_RSA&lt;BR /&gt;# openssl verify -partial_chain -trusted a.cer b.cer&lt;BR /&gt;CN = NXP_SE050_TLS_CLIENT_RSA&lt;BR /&gt;error 7 at 0 depth lookup: certificate signature failure&lt;BR /&gt;&lt;STRONG&gt;error b.cer: verification failed&lt;/STRONG&gt;&lt;BR /&gt;2090F276:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:../openssl-3.0.13/crypto/rsa/rsa_pk1.c:75:&lt;BR /&gt;2090F276:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:../openssl-3.0.13/crypto/rsa/rsa_ossl.c:598:&lt;BR /&gt;2090F276:error:1C880004:Provider routines:rsa_verify:RSA lib:../openssl-3.0.13/providers/implementations/signature/rsa_sig.c:774:&lt;BR /&gt;2090F276:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:../openssl-3.0.13/crypto/asn1/a_verify.c:217:&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Cristiane Bellenzier Piaia&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 09 Jul 2024 09:29:36 GMT</pubDate>
      <guid>https://community.nxp.com/t5/Secure-Authentication/Error-to-access-SE-through-libsssProvider-openssl/m-p/1904032#M1633</guid>
      <dc:creator>CristianeBP</dc:creator>
      <dc:date>2024-07-09T09:29:36Z</dc:date>
    </item>
    <item>
      <title>Re: Error to access SE through libsssProvider + openssl.</title>
      <link>https://community.nxp.com/t5/Secure-Authentication/Error-to-access-SE-through-libsssProvider-openssl/m-p/1905031#M1634</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.nxp.com/t5/user/viewprofilepage/user-id/221468"&gt;@CristianeBP&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The openssl command has some limitation for rsa generation, which doesn't have a "-name" option as ecc generation, so that the current provider implementation uses a default key ID hard coded in the source file , so in your case, only one RSA ref key was generated inside the SE indeed. We have to wait for openssl updated to some version which allows to specify the rsa key name.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Sorry for the inconvenience that might cause.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Have a great day,&lt;BR /&gt;Kan&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;-------------------------------------------------------------------------------&lt;BR /&gt;Note:&lt;BR /&gt;- If this post answers your question, please click the "Mark Correct" button. Thank you!&lt;BR /&gt;- We are following threads for 7 weeks after the last post, later replies are ignored&lt;BR /&gt;Please open a new thread and refer to the closed one, if you have a related question at a later point in time.&lt;BR /&gt;-------------------------------------------------------------------------------&lt;/P&gt;</description>
      <pubDate>Wed, 10 Jul 2024 03:25:56 GMT</pubDate>
      <guid>https://community.nxp.com/t5/Secure-Authentication/Error-to-access-SE-through-libsssProvider-openssl/m-p/1905031#M1634</guid>
      <dc:creator>Kan_Li</dc:creator>
      <dc:date>2024-07-10T03:25:56Z</dc:date>
    </item>
    <item>
      <title>Re: Error to access SE through libsssProvider + openssl.</title>
      <link>https://community.nxp.com/t5/Secure-Authentication/Error-to-access-SE-through-libsssProvider-openssl/m-p/1905259#M1635</link>
      <description>&lt;P&gt;&lt;a href="https://community.nxp.com/t5/user/viewprofilepage/user-id/59276"&gt;@Kan_Li&lt;/a&gt;&amp;nbsp;: I am writing on behalf of&amp;nbsp;&lt;a href="https://community.nxp.com/t5/user/viewprofilepage/user-id/221468"&gt;@CristianeBP&lt;/a&gt;&amp;nbsp;and Lorenzo Verniani (they got problems to access this thread):&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;SPAN class="uiOutputText"&gt;Good morning Kan Li,&lt;/SPAN&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;SPAN class="uiOutputText"&gt;&amp;nbsp;thank you very much for your reply.&lt;/SPAN&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;SPAN class="uiOutputText"&gt;&amp;nbsp;Your answer is about my 2nd test, and ok, it is a limitation and we need to wait some updates.&lt;/SPAN&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN class="uiOutputText"&gt;RGs:&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class="cuf-entityLinkId forceChatterEntityLink entityLinkHover" data-id="0052p00000D4vDIAAZ" data-hashtag="" data-mention="0052p00000D4vDIAAZ"&gt;&lt;A id="247:7404;a" class="cuf-entityLink cuf-mention" href="https://nxp.lightning.force.com/lightning/r/0052p00000D4vDIAAZ/view" data-sfdc-wired-mouseover="" data-sfdc-wired-mouseout="" data-sfdc-wired-focus="" data-sfdc-wired-blur="" data-proxy-id="aura-pos-lib-1" target="_blank"&gt;&lt;SPAN class="uiOutputText"&gt;@Lorenzo Verniani&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN class="cuf-entityAdditionalLabel uiOutputText"&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;(Customer)&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class="uiOutputText"&gt;​&amp;nbsp;let us know how severe this limitation is for ABB.&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN class="uiOutputText"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;SPAN class="uiOutputText"&gt;But in the 3rd test, I generated both key pair using SETool, not using OPENSSL, and the verification fails equally. How can you explain that?&lt;/SPAN&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;SPAN class="uiOutputText"&gt;&amp;nbsp;Thanks again,&lt;/SPAN&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;SPAN class="uiOutputText"&gt;Cristiane Bellenzier Piaia&lt;/SPAN&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;SPAN class="uiOutputText"&gt;RGs: I repeat 3rd test here:&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;3 -both key pairs generated inside the SE using seTool:&lt;/P&gt;
&lt;P&gt;#seTool genRSA 2048 0x00000003 127.0.0.1:8040&lt;/P&gt;
&lt;P&gt;# seTool getRSARef 0x00000003 a.pem 127.0.0.1:804&lt;BR /&gt;# openssl req -new --provider /usr/lib/libsssProvider.so --provider default -x509 -new -nodes -key a.pem -subj "/OU=NXP Plug Trust CA/CN=NXP RootCAvExxx" -days 4380 -out a.cer&lt;BR /&gt;sssprov-flw: Get random data from SE05x&lt;BR /&gt;sssprov-flw: Performing RSA sign using SE05x&lt;/P&gt;
&lt;P&gt;#seTool genRSA 2048 0x00000020 127.0.0.1:8040&lt;/P&gt;
&lt;P&gt;# seTool getRSARef 0x00000020 b.pem 127.0.0.1:8040&lt;/P&gt;
&lt;P&gt;# openssl req -new --provider /usr/lib/libsssProvider.so --provider default -key b.pem -subj "/CN=NXP_SE050_TLS_CLIENT_RSA" -out b.csr&lt;BR /&gt;sssprov-flw: Performing RSA sign using SE05x&lt;BR /&gt;# openssl x509 -req --provider default -in b.csr -CAcreateserial -out b.cer -days 5000 -CA a.cer -CAkey a.pem&lt;BR /&gt;Certificate request self-signature ok&lt;BR /&gt;subject=CN = NXP_SE050_TLS_CLIENT_RSA&lt;BR /&gt;# openssl verify -partial_chain -trusted a.cer b.cer&lt;BR /&gt;CN = NXP_SE050_TLS_CLIENT_RSA&lt;BR /&gt;error 7 at 0 depth lookup: certificate signature failure&lt;BR /&gt;&lt;STRONG&gt;error b.cer: verification failed&lt;/STRONG&gt;&lt;BR /&gt;2090F276:error:0200008A:rsa routines:RSA_padding_check_PKCS1_type_1:invalid padding:../openssl-3.0.13/crypto/rsa/rsa_pk1.c:75:&lt;BR /&gt;2090F276:error:02000072:rsa routines:rsa_ossl_public_decrypt:padding check failed:../openssl-3.0.13/crypto/rsa/rsa_ossl.c:598:&lt;BR /&gt;2090F276:error:1C880004:Provider routines:rsa_verify:RSA lib:../openssl-3.0.13/providers/implementations/signature/rsa_sig.c:774:&lt;BR /&gt;2090F276:error:06880006:asn1 encoding routines:ASN1_item_verify_ctx:EVP lib:../openssl-3.0.13/crypto/asn1/a_verify.c:217:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 10 Jul 2024 10:48:58 GMT</pubDate>
      <guid>https://community.nxp.com/t5/Secure-Authentication/Error-to-access-SE-through-libsssProvider-openssl/m-p/1905259#M1635</guid>
      <dc:creator>rodolfoveltrigo</dc:creator>
      <dc:date>2024-07-10T10:48:58Z</dc:date>
    </item>
    <item>
      <title>Re: Error to access SE through libsssProvider + openssl.</title>
      <link>https://community.nxp.com/t5/Secure-Authentication/Error-to-access-SE-through-libsssProvider-openssl/m-p/1906252#M1636</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.nxp.com/t5/user/viewprofilepage/user-id/221468"&gt;@CristianeBP&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;For the 3rd case,&amp;nbsp;&lt;SPAN&gt;As you are using RSA ref key as the rootCA key it is mandatory to load sssProvider at first because the&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;default provider cannot recognize the reference key format.&lt;BR /&gt;&lt;BR /&gt;So the command to generate the certificate is:&lt;BR /&gt;#openssl x509 -req –provider /usr/local/lib/libsssProvider.so –provider default -in b.csr -CAcreateserial -out b.cer -days 5000 -CA a.cer -CAkey a.pem&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Please kindly refer to the following for more details.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Kan_Li_0-1720695122931.png" style="width: 706px;"&gt;&lt;img src="https://community.nxp.com/t5/image/serverpage/image-id/288134iA1B52CE579DA22C8/image-dimensions/706x96?v=v2" width="706" height="96" role="button" title="Kan_Li_0-1720695122931.png" alt="Kan_Li_0-1720695122931.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Have a great day,&lt;BR /&gt;Kan&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;-------------------------------------------------------------------------------&lt;BR /&gt;Note:&lt;BR /&gt;- If this post answers your question, please click the "Mark Correct" button. Thank you!&lt;BR /&gt;- We are following threads for 7 weeks after the last post, later replies are ignored&lt;BR /&gt;Please open a new thread and refer to the closed one, if you have a related question at a later point in time.&lt;BR /&gt;-------------------------------------------------------------------------------&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 11 Jul 2024 10:53:58 GMT</pubDate>
      <guid>https://community.nxp.com/t5/Secure-Authentication/Error-to-access-SE-through-libsssProvider-openssl/m-p/1906252#M1636</guid>
      <dc:creator>Kan_Li</dc:creator>
      <dc:date>2024-07-11T10:53:58Z</dc:date>
    </item>
  </channel>
</rss>

