Current Support for OpenSSL Engine/Provider Integration in MQTT Client #841
-
|
Hello! I'm seeking clarification regarding the current architectural possibilities for client authentication (mutual TLS) within the MQTT client functionality of the aws-sdk-cpp when connecting to AWS IoT Core. The context is environments where the client's private key is stored securely in a TEE and is therefore not accessible as a standard PEM file on the local disk (neither via PKCS#11) In typical C/C++ applications using OpenSSL for TLS, the solution for this involves:
The goal is to understand if the architecture already permits this kind of secure key management without requiring the key to be physically present as a file. |
Beta Was this translation helpful? Give feedback.
Replies: 1 comment 3 replies
-
|
You can link to OpenSSL's libcrypto, but there isn't support for manipulating internal TLS context or using libssl rather s2n. HSM support (on Linux) is via PKCS11 only. It seems surprising to have an HSM but no PKCS11 support. |
Beta Was this translation helpful? Give feedback.
I see; in that case, we can't really offer any support.