PKCS11 communication to SE050 via OpenSSL

cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 

PKCS11 communication to SE050 via OpenSSL

918 Views
Ryopo0802
Contributor II

Introduction

We want to access a private key stored on se050 from the mod_ssl (openssl-based) of the Apache web server and perform TLS communication.

https://httpd.apache.org/docs/2.4/mod/mod_ssl.html#page-header

# To use a private key from a PKCS#11 token:
SSLCertificateKeyFile  "pkcs11:token=My%20Token%20Name;id=45"

Hardware

  • SE050

Software

  • PlugAndTrust: v04.05.01
  • openssl: 3.0.12

Tried it

To verify communication with SE050 using pkcs#11, we first attempted to create a key.

# openssl genpkey \ 
> -provider pkcs11prov \
> -algorithm EC \
> -pkeyopt ec_paramgen_curve:P-256 \
> -pkeyopt pkcs11_id:01 \
> -pkeyopt pkcs11_label:MyNewKey
genpkey: Error setting pkcs11_id:01 parameter:
20001EBB7F000000:error:03000093:digital envelope routines:default_fixup_args:command not supported:crypto/evp/ctrl_params_translate.c:580:[action:2, state:4] name=pkcs11_id, value=01

openssl.cnf :

openssl_conf = openssl_init 

[openssl_init]
providers = provider_sect

[provider_sect]
default = default_sect
pkcs11 = pkcs11_sect

[default_sect]
activate = 1

[pkcs11_sect]
identity = pkcs11prov
module = /usr/lib/ossl-modules/pkcs11prov.so
pkcs11_module = /usr/lib/libsss_pkcs11.so
activate = 1

Using the "-out" option successfully generated the key, but it was generated as a file.

# openssl genpkey -provider pkcs11prov -provider default \ 
> -algorithm EC \
> -pkeyopt ec_paramgen_curve:P-256 \
> -out "pkcs11:id=%01;object=MyNewKey"

Questions

  1. Is it possible to communicate with SE050 using PKCS#11 with openssl3.x (provider-based)? The following is engine-based.
    https://docs.nxp.com/bundle/LLDPUG_L6.1.36_2.1.0/page/topics/pkcs_11_based_openssl_engine_third-part...
  2. Are the openssl.cnf file and the libraries being used incorrect?
  3. Is the command you used to generate the key incorrect?


I look forward to your response.

Labels (1)
Tags (1)
0 Kudos
Reply
5 Replies

607 Views
db16122
Contributor III

pkcs11-tool generates 2 private keys for keypairgen Which platform you are using for SE050

0 Kudos
Reply

752 Views
Kan_Li
NXP TechSupport
NXP TechSupport

Hi @Ryopo0802 ,

 

Which SE05x variant are you testing with? Was it SE050E2? Please kindly clarify.

 

Have a great day,
Kan


-------------------------------------------------------------------------------
Note:
- If this post answers your question, please click the "Mark Correct" button. Thank you!
- We are following threads for 7 weeks after the last post, later replies are ignored
Please open a new thread and refer to the closed one, if you have a related question at a later point in time.
-------------------------------------------------------------------------------

0 Kudos
Reply

747 Views
Ryopo0802
Contributor II

Thank you, @Kan_Li .

I am using the following:

  • Type number: SE050F2HQ1/Z018H
  • SE050 Variant: SE050F2
Tags (1)
0 Kudos
Reply

526 Views
Kan_Li
NXP TechSupport
NXP TechSupport

Hi @Ryopo0802 ,

 

We checked pkcs#11 provider +nxp pkcs11 plugin is not working , we could replicate the error customer is getting. So it not works for now.  Moreover, here: pkcs11-provider/HOWTO.md at main · openssl-projects/pkcs11-provider · GitHub

for key generation they have given recommendation to use tools working with pkcs11 directly such as p11tool for key generation.

However, nxp's openssl provider can be used without pkcs 11: GitHub - NXPPlugNTrust/se05x-openssl-provider: This is the OpenSSL Provider for Se05x. · GitHub

 

If you don't want to use NXP's Openssl provider, I would be also interested to understand why is that.

 

Have a great day,
Kan


-------------------------------------------------------------------------------
Note:
- If this post answers your question, please click the "Mark Correct" button. Thank you!
- We are following threads for 7 weeks after the last post, later replies are ignored
Please open a new thread and refer to the closed one, if you have a related question at a later point in time.
-------------------------------------------------------------------------------

0 Kudos
Reply

220 Views
Ryopo0802
Contributor II

Thank you, @Kan_Li 

If you don't want to use NXP's Openssl provider, I would be also interested to understand why is that.

I want to use HTTPS communication from an Apache server with a private key in an NXP Secure Element. Apache can only access the private key via PKCS#11 using openssl-based mod_ssl. Therefore, openssl + PKCS#11 is required. Is there a solution?
https://httpd.apache.org/docs/2.4/mod/mod_ssl.html

Best regards,

 

0 Kudos
Reply
%3CLINGO-SUB%20id%3D%22lingo-sub-2353683%22%20slang%3D%22en-US%22%20mode%3D%22CREATE%22%3EPKCS11%20communication%20to%20SE050%20via%20OpenSSL%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2353683%22%20slang%3D%22en-US%22%20mode%3D%22CREATE%22%3E%3CH3%20id%3D%22toc-hId-2031024531%22%20id%3D%22toc-hId-2031141655%22%20id%3D%22toc-hId-2031141655%22%20id%3D%22toc-hId-2031141655%22%3EIntroduction%3C%2FH3%3E%3CP%3EWe%20want%20to%20access%20a%20private%20key%20stored%20on%20se050%20from%20the%20mod_ssl%20(openssl-based)%20of%20the%20Apache%20web%20server%20and%20perform%20TLS%20communication.%3C%2FP%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Fhttpd.apache.org%2Fdocs%2F2.4%2Fmod%2Fmod_ssl.html%23page-header%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noreferrer%22%3E%3CFONT%3E%3CFONT%3Ehttps%3A%2F%2Fhttpd.apache.org%2Fdocs%2F2.4%2Fmod%2Fmod_ssl.html%23page-header%3C%2FFONT%3E%3C%2FFONT%3E%3C%2FA%3E%3C%2FP%3E%3CPRE%3E%23%20To%20use%20a%20private%20key%20from%20a%20PKCS%2311%20token%3A%0A%3CSPAN%20class%3D%22%22%3E%3CFONT%3E%3CFONT%3ESSLCertificateKeyFile%20%3C%2FFONT%3E%3C%2FFONT%3E%3C%2FSPAN%3E%20%3CSPAN%20class%3D%22%22%3E%3CFONT%3E%3CFONT%3E%22pkcs11%3Atoken%3DMy%2520Token%2520Name%3Bid%3D45%22%3C%2FFONT%3E%3C%2FFONT%3E%3C%2FSPAN%3E%3C%2FPRE%3E%3CH3%20id%3D%22toc-hId-223570068%22%20id%3D%22toc-hId-223687192%22%20id%3D%22toc-hId-223687192%22%20id%3D%22toc-hId-223687192%22%3EHardware%3C%2FH3%3E%3CUL%3E%3CLI%3E%3CFONT%3E%3CFONT%3ESE050%3C%2FFONT%3E%3C%2FFONT%3E%3C%2FLI%3E%3C%2FUL%3E%3CH3%20id%3D%22toc-hId--1583884395%22%20id%3D%22toc-hId--1583767271%22%20id%3D%22toc-hId--1583767271%22%20id%3D%22toc-hId--1583767271%22%3ESoftware%3C%2FH3%3E%3CUL%3E%3CLI%3E%3CFONT%3E%3CFONT%3EPlugAndTrust%3A%20v04.05.01%3C%2FFONT%3E%3C%2FFONT%3E%3C%2FLI%3E%3CLI%3E%3CFONT%3E%3CFONT%3Eopenssl%3A%203.0.12%3C%2FFONT%3E%3C%2FFONT%3E%3C%2FLI%3E%3C%2FUL%3E%3CH3%20id%3D%22toc-hId-903628438%22%20id%3D%22toc-hId-903745562%22%20id%3D%22toc-hId-903745562%22%20id%3D%22toc-hId-903745562%22%3ETried%20it%3C%2FH3%3E%3CP%3ETo%20verify%20communication%20with%20SE050%20using%20pkcs%2311%2C%20we%20first%20attempted%20to%20create%20a%20key.%3C%2FP%3E%3CPRE%3E%3CFONT%3E%3CFONT%3E%23%20openssl%20genpkey%20%5C%20%3C%2FFONT%3E%3C%2FFONT%3E%3CBR%20%2F%3E%3CFONT%3E%3CFONT%3E%26gt%3B%20-provider%20pkcs11prov%20%5C%20%3C%2FFONT%3E%3C%2FFONT%3E%3CBR%20%2F%3E%3CFONT%3E%3CFONT%3E%26gt%3B%20-algorithm%20EC%20%5C%20%3C%2FFONT%3E%3C%2FFONT%3E%3CBR%20%2F%3E%3CFONT%3E%3CFONT%3E%26gt%3B%20-pkeyopt%20ec_paramgen_curve%3AP-256%20%5C%20%3C%2FFONT%3E%3C%2FFONT%3E%3CBR%20%2F%3E%3CFONT%3E%3CFONT%3E%26gt%3B%20-pkeyopt%20pkcs11_id%3A01%20%5C%20%3C%2FFONT%3E%3C%2FFONT%3E%3CBR%20%2F%3E%3CFONT%3E%3CFONT%3E%26gt%3B%20-pkeyopt%20pkcs11_label%3AMyNewKey%20%3C%2FFONT%3E%3C%2FFONT%3E%3CBR%20%2F%3Egenpkey%3A%20Error%20setting%20pkcs11_id%3A01%20parameter%3A%3CBR%20%2F%3E20001EBB7F000000%3Aerror%3A03000093%3Adigital%20envelope%20routines%3Adefault_fixup_args%3Acommand%20not%20supported%3Acrypto%2Fevp%2Fctrl_params_translate.c%3A580%3A%5Baction%3A2%2C%20state%3A4%5D%20name%3Dpkcs11_id%2C%20value%3D01%3C%2FPRE%3E%3CP%3E%3CSPAN%3E%3CEM%3E%3CFONT%3E%3CFONT%3Eopenssl.cnf%3C%2FFONT%3E%3C%2FFONT%3E%3C%2FEM%3E%3CFONT%3E%3CFONT%3E%20%3A%3C%2FFONT%3E%3C%2FFONT%3E%3CBR%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%3CPRE%3E%3CFONT%3E%3CFONT%3Eopenssl_conf%20%3D%20openssl_init%20%3C%2FFONT%3E%3C%2FFONT%3E%3CBR%20%2F%3E%3CBR%20%2F%3E%3CFONT%3E%3CFONT%3E%5Bopenssl_init%5D%20%3C%2FFONT%3E%3C%2FFONT%3E%3CBR%20%2F%3E%3CFONT%3E%3CFONT%3Eproviders%20%3D%20provider_sect%20%3C%2FFONT%3E%3C%2FFONT%3E%3CBR%20%2F%3E%3CBR%20%2F%3E%3CFONT%3E%3CFONT%3E%5Bprovider_sect%5D%20%3C%2FFONT%3E%3C%2FFONT%3E%3CBR%20%2F%3E%3CFONT%3E%3CFONT%3Edefault%20%3D%20default_sect%20%3C%2FFONT%3E%3C%2FFONT%3E%3CBR%20%2F%3E%3CFONT%3E%3CFONT%3Epkcs11%20%3D%20pkcs11_sect%20%3C%2FFONT%3E%3C%2FFONT%3E%3CBR%20%2F%3E%3CBR%20%2F%3E%3CFONT%3E%3CFONT%3E%5Bdefault_sect%5D%20%3C%2FFONT%3E%3C%2FFONT%3E%3CBR%20%2F%3E%3CFONT%3E%3CFONT%3Eactivate%20%3D%201%20%3C%2FFONT%3E%3C%2FFONT%3E%3CBR%20%2F%3E%3CBR%20%2F%3E%3CFONT%3E%3CFONT%3E%5Bpkcs11_sect%5D%20%3C%2FFONT%3E%3C%2FFONT%3E%3CBR%20%2F%3E%3CFONT%3E%3CFONT%3Eidentity%20%3D%20pkcs11prov%20%3C%2FFONT%3E%3C%2FFONT%3E%3CBR%20%2F%3E%3CFONT%3E%3CFONT%3Emodule%20%3D%20%2Fusr%2Flib%2Fossl-modules%2Fpkcs11prov.so%20%3C%2FFONT%3E%3C%2FFONT%3E%3CBR%20%2F%3E%3CFONT%3E%3CFONT%3Epkcs11_module%20%3D%20%2Fusr%2Flib%2Flibsss_pkcs11.so%20%3C%2FFONT%3E%3C%2FFONT%3E%3CBR%20%2F%3E%3CFONT%3E%3CFONT%3Eactivate%20%3D%201%3C%2FFONT%3E%3C%2FFONT%3E%3C%2FPRE%3E%3CP%3EUsing%20the%20%22-out%22%20option%20successfully%20generated%20the%20key%2C%20but%20it%20was%20generated%20as%20a%20file.%3C%2FP%3E%3CPRE%3E%3CFONT%3E%3CFONT%3E%23%20openssl%20genpkey%20-provider%20pkcs11prov%20-provider%20default%20%5C%20%3C%2FFONT%3E%3C%2FFONT%3E%3CBR%20%2F%3E%3CFONT%3E%3CFONT%3E%26gt%3B%20-algorithm%20EC%20%5C%20%3C%2FFONT%3E%3C%2FFONT%3E%3CBR%20%2F%3E%3CFONT%3E%3CFONT%3E%26gt%3B%20-pkeyopt%20ec_paramgen_curve%3AP-256%20%5C%20%3C%2FFONT%3E%3C%2FFONT%3E%3CBR%20%2F%3E%3CFONT%3E%3CFONT%3E%26gt%3B%20-out%20%22pkcs11%3Aid%3D%2501%3Bobject%3DMyNewKey%22%3C%2FFONT%3E%3C%2FFONT%3E%3C%2FPRE%3E%3CH3%20id%3D%22toc-hId--903826025%22%20id%3D%22toc-hId--903708901%22%20id%3D%22toc-hId--903708901%22%20id%3D%22toc-hId--903708901%22%3EQuestions%3C%2FH3%3E%3COL%3E%3CLI%3E%3CFONT%3E%3CFONT%3EIs%20it%20possible%20to%20communicate%20with%20SE050%20using%20PKCS%2311%20with%20openssl3.x%20(provider-based)%3F%20The%20following%20is%20engine-based.%3CBR%20%2F%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.nxp.com%2Fbundle%2FLLDPUG_L6.1.36_2.1.0%2Fpage%2Ftopics%2Fpkcs_11_based_openssl_engine_third-party_opensc_li.html%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noreferrer%22%3Ehttps%3A%2F%2Fdocs.nxp.com%2Fbundle%2FLLDPUG_L6.1.36_2.1.0%2Fpage%2Ftopics%2Fpkcs_11_based_openssl_engine_third-party_opensc_li.html%3C%2FA%3E%3C%2FFONT%3E%3C%2FFONT%3E%3C%2FLI%3E%3CLI%3EAre%20the%20%3CEM%3Eopenssl.cnf%3C%2FEM%3E%20file%20and%20the%20libraries%20being%20used%20incorrect%3F%3C%2FLI%3E%3CLI%3EIs%20the%20command%20you%20used%20to%20generate%20the%20key%20incorrect%3F%3C%2FLI%3E%3C%2FOL%3E%3CP%3E%3CBR%20%2F%3EI%20look%20forward%20to%20your%20response.%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-LABS%20id%3D%22lingo-labs-2353683%22%20slang%3D%22en-US%22%20mode%3D%22CREATE%22%3E%3CLINGO-LABEL%3ESE050%3C%2FLINGO-LABEL%3E%3C%2FLINGO-LABS%3E%3CLINGO-SUB%20id%3D%22lingo-sub-2356780%22%20slang%3D%22en-US%22%20mode%3D%22CREATE%22%20translate%3D%22no%22%3ERe%3A%20PKCS11%20communication%20to%20SE050%20via%20OpenSSL%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2356780%22%20slang%3D%22en-US%22%20mode%3D%22CREATE%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Fcommunity.nxp.com%2Ft5%2FSecure-Authentication%2Fpkcs11-tool-generates-2-private-keys-for-keypairgen%2Fm-p%2F1855553%22%20target%3D%22_blank%22%3Epkcs11-tool%20generates%202%20private%20keys%20for%20keypairgen%3C%2FA%3E%26nbsp%3BWhich%20platform%20you%20are%20using%20for%20SE050%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-2355548%22%20slang%3D%22en-US%22%20mode%3D%22CREATE%22%20translate%3D%22no%22%3ERe%3A%20PKCS11%20communication%20to%20SE050%20via%20OpenSSL%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2355548%22%20slang%3D%22en-US%22%20mode%3D%22CREATE%22%3E%3CP%3EThank%20you%2C%20%3CA%20href%3D%22https%3A%2F%2Fcommunity.nxp.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F59276%22%20target%3D%22_blank%22%3E%40Kan_Li%3C%2FA%3E%20.%3C%2FP%3E%3CP%3EI%20am%20using%20the%20following%3A%3C%2FP%3E%3CUL%3E%3CLI%3EType%20number%3A%20%3CSTRONG%3ESE050F2HQ1%2FZ018H%3C%2FSTRONG%3E%3C%2FLI%3E%3CLI%3ESE050%20Variant%3A%20%3CSTRONG%3ESE050F2%3C%2FSTRONG%3E%3C%2FLI%3E%3C%2FUL%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-2355532%22%20slang%3D%22en-US%22%20mode%3D%22CREATE%22%20translate%3D%22no%22%3ERe%3A%20PKCS11%20communication%20to%20SE050%20via%20OpenSSL%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2355532%22%20slang%3D%22en-US%22%20mode%3D%22CREATE%22%3E%3CP%3EHi%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Fcommunity.nxp.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F260575%22%20target%3D%22_blank%22%3E%40Ryopo0802%3C%2FA%3E%26nbsp%3B%EF%BC%8C%3C%2FP%3E%0A%3CBR%20%2F%3E%0A%3CP%3EWhich%20SE05x%20variant%20are%20you%20testing%20with%3F%20Was%20it%20SE050E2%3F%20Please%20kindly%20clarify.%3C%2FP%3E%0A%3CBR%20%2F%3E%0A%3CP%3EHave%20a%20great%20day%2C%3CBR%20%2F%3EKan%3C%2FP%3E%0A%3CP%3E%3CBR%20%2F%3E-------------------------------------------------------------------------------%3CBR%20%2F%3ENote%3A%3CBR%20%2F%3E-%20If%20this%20post%20answers%20your%20question%2C%20please%20click%20the%20%22Mark%20Correct%22%20button.%20Thank%20you!%3CBR%20%2F%3E-%20We%20are%20following%20threads%20for%207%20weeks%20after%20the%20last%20post%2C%20later%20replies%20are%20ignored%3CBR%20%2F%3EPlease%20open%20a%20new%20thread%20and%20refer%20to%20the%20closed%20one%2C%20if%20you%20have%20a%20related%20question%20at%20a%20later%20point%20in%20time.%3CBR%20%2F%3E-------------------------------------------------------------------------------%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-2358329%22%20slang%3D%22en-US%22%20mode%3D%22CREATE%22%20translate%3D%22no%22%3ERe%3A%20PKCS11%20communication%20to%20SE050%20via%20OpenSSL%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2358329%22%20slang%3D%22en-US%22%20mode%3D%22CREATE%22%3E%3CP%3EHi%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Fcommunity.nxp.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F260575%22%20target%3D%22_blank%22%3E%40Ryopo0802%3C%2FA%3E%26nbsp%3B%2C%3C%2FP%3E%0A%3CBR%20%2F%3E%0A%3CP%3EWe%20checked%20pkcs%2311%20provider%20%2Bnxp%20pkcs11%20plugin%20is%20not%20working%20%2C%20we%20could%20replicate%20the%20error%20customer%20is%20getting.%20So%20it%20not%20works%20for%20now.%26nbsp%3B%20Moreover%2C%20here%3A%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Fgithub.com%2Fopenssl-projects%2Fpkcs11-provider%2Fblob%2Fmain%2FHOWTO.md%22%20rel%3D%22nofollow%20noopener%20noreferrer%22%20target%3D%22_blank%22%3Epkcs11-provider%2FHOWTO.md%20at%20main%20%C2%B7%20openssl-projects%2Fpkcs11-provider%20%C2%B7%20GitHub%3C%2FA%3E%3C%2FP%3E%0A%3CP%3Efor%20key%20generation%20they%20have%20given%20recommendation%20to%20use%26nbsp%3B%3CSPAN%3Etools%20working%20with%20pkcs11%20directly%20such%20as%20p11tool%20for%20key%20generation.%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3EHowever%2C%20nxp's%20openssl%20provider%20can%20be%20used%20without%20pkcs%2011%3A%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Fgithub.com%2FNXPPlugNTrust%2Fse05x-openssl-provider%22%20rel%3D%22nofollow%20noopener%20noreferrer%22%20target%3D%22_blank%22%3EGitHub%20-%20NXPPlugNTrust%2Fse05x-openssl-provider%3A%20This%20is%20the%20OpenSSL%20Provider%20for%20Se05x.%20%C2%B7%20GitHub%3C%2FA%3E%3C%2FP%3E%0A%3CBR%20%2F%3E%0A%3CP%3EIf%20you%20don't%20want%20to%20use%20NXP's%20Openssl%20provider%2C%20I%20would%20be%20also%20interested%20to%20understand%20why%20is%20that.%3C%2FP%3E%0A%3CBR%20%2F%3E%0A%3CP%3EHave%20a%20great%20day%2C%3CBR%20%2F%3EKan%3C%2FP%3E%0A%3CP%3E%3CBR%20%2F%3E-------------------------------------------------------------------------------%3CBR%20%2F%3ENote%3A%3CBR%20%2F%3E-%20If%20this%20post%20answers%20your%20question%2C%20please%20click%20the%20%22Mark%20Correct%22%20button.%20Thank%20you!%3CBR%20%2F%3E-%20We%20are%20following%20threads%20for%207%20weeks%20after%20the%20last%20post%2C%20later%20replies%20are%20ignored%3CBR%20%2F%3EPlease%20open%20a%20new%20thread%20and%20refer%20to%20the%20closed%20one%2C%20if%20you%20have%20a%20related%20question%20at%20a%20later%20point%20in%20time.%3CBR%20%2F%3E-------------------------------------------------------------------------------%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-2363769%22%20slang%3D%22en-US%22%20mode%3D%22CREATE%22%20translate%3D%22no%22%3ERe%3A%20PKCS11%20communication%20to%20SE050%20via%20OpenSSL%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2363769%22%20slang%3D%22en-US%22%20mode%3D%22CREATE%22%3E%3CP%3EThank%20you%2C%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Fcommunity.nxp.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F59276%22%20target%3D%22_blank%22%3E%40Kan_Li%3C%2FA%3E%26nbsp%3B%3C%2FP%3E%3CP%3E%26gt%3B%26nbsp%3B%3CSPAN%3EIf%20you%20don't%20want%20to%20use%20NXP's%20Openssl%20provider%2C%20I%20would%20be%20also%20interested%20to%20understand%20why%20is%20that.%3C%2FSPAN%3E%3C%2FP%3E%3CP%3EI%20want%20to%20use%20HTTPS%20communication%20from%20an%20Apache%20server%20with%20a%20private%20key%20in%20an%20NXP%20Secure%20Element.%20Apache%20can%20only%20access%20the%20private%20key%20via%20PKCS%2311%20using%20openssl-based%20%3CEM%3Emod_ssl%3C%2FEM%3E.%20Therefore%2C%20openssl%20%2B%20PKCS%2311%20is%20required.%20Is%20there%20a%20solution%3F%3CBR%20%2F%3E%3CA%20href%3D%22https%3A%2F%2Fhttpd.apache.org%2Fdocs%2F2.4%2Fmod%2Fmod_ssl.html%22%20target%3D%22_blank%22%20rel%3D%22nofollow%20noopener%20noreferrer%22%3Ehttps%3A%2F%2Fhttpd.apache.org%2Fdocs%2F2.4%2Fmod%2Fmod_ssl.html%3C%2FA%3E%3C%2FP%3E%3CP%3EBest%20regards%2C%3C%2FP%3E%3CBR%20%2F%3E%3C%2FLINGO-BODY%3E