On 04/05/2016 08:15, mani kanta wrote:

Hello,

   While the SSL handshake is happening,I am getting the error as below
SSL_connect error:0408E09E:rsa routines:PKEY_RSA_SIGN:operation not allowed in fips mode. ssl handshake went well up to client sending key exchange to server and failing in the process of send client verify. Why this error happens ? and How to overcome this ?

Background:
1. I built Openssl in FIPS mode. From the supplicant (application) I called FIPS_mode_set(1) API. In my use-case I am trying to connect WPA2 Enterprise Wi-Fi network which has EAP-TLS configured (used radius server to setup EAP-TLS).

2. From the network packets it is confirmed that the client and the server agreed on to use TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 cipher suit. Also found that if in case TLS_RSA_WITH_AES_256_CBC_SHA256 cipher suit is selected then also it throws the same above mentioned error.

3. I am using openssl verson 1.0.2f(client side). radius server(3.0.11) . Server is running in ubuntu 14.04


Is your RSA key too short (FIPS mode imposes a minimum key
length by refusing to use shorter keys).



Enjoy

Jakob
--
Jakob Bohm, CIO, Partner, WiseMo A/S.  https://www.wisemo.com
Transformervej 29, 2860 Søborg, Denmark.  Direct +45 31 13 16 10
This public discussion message is non-binding and may contain errors.
WiseMo - Remote Service Management for PCs, Phones and Embedded

--
openssl-users mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users

Reply via email to