Fwiw, I got this error, and it was because I did not provide the cbor file that gets read. Check the logs to make sure your cbor files actually get read successfully. It could be something as simple as a bad path.
Hth Gregg On Mon, Dec 31, 2018, 4:02 AM Khaled Elsayed <khaledi...@gmail.com wrote: > Hi Reporting on this: > >> So, I will re-visit this and test the following: >> 1) non-provisioned sampleserver_mfg with proper certificate chain >> 2) provisioningclient with proper certificate chain provisions the >> sampleserver >> (I re-confirm 1 and 2 already work great either with sample code and >> certificates and also using my newly created certificates) >> 3) Third client with proper certificates chain accesses the >> sampleserver_mfg resources. >> I have a feeling this will work. Will let you guys know tomorrow. > > > Did not work. My feeling was wrong. Glad it did not. It would not be > logical if it works actually. Still the same issue. The provisioningclient > works all right and now owns the server_mfg. If a second client uses a > certificate to communicate with the server_mfg something needs to be called > to init the ciphersuite associated with the DTLS connection. > > 56:55.797 DEBUG: OIC_SRM_CREDL: In InitCipherSuiteListInternal > 56:55.797 DEBUG: OIC_SRM_CREDL: Out InitCipherSuiteListInternal > 56:55.797 DEBUG: OIC_SRM_PKIX_INTERFACE: Out InitCipherSuiteList > 56:55.797 DEBUG: OIC_CA_NET_SSL: Supported ciphersuites: > 56:55.797 ERROR: OIC_CA_NET_SSL: *No ciphersuites configured, secure > connections will fail* > 56:55.797 DEBUG: OIC_CA_NET_SSL: Out SetupCipher > 56:55.797 ERROR: OIC_CA_NET_SSL: Failed to set up cipher > 56:55.797 DEBUG: OIC_CA_NET_SSL: In DeleteSslEndPoint > 56:55.797 DEBUG: MBED_TLS: => free > 56:55.797 DEBUG: MBED_TLS: <= free > 56:55.797 DEBUG: OIC_CA_NET_SSL: In DeleteCacheList > 56:55.797 DEBUG: OIC_CA_NET_SSL: Out DeleteCacheList > 56:55.797 DEBUG: OIC_CA_NET_SSL: Out DeleteSslEndPoint > 56:55.797 ERROR: OIC_CA_NET_SSL: *TLS handshake failed* > 56:55.797 ERROR: OIC_CA_IP_ADAP: CAencryptSsl failed! > > > > On Sun, Dec 30, 2018 at 3:57 PM Khaled Elsayed via Lists.Iotivity.Org > <khaledieee=gmail....@lists.iotivity.org> wrote: > >> Hi Gregg. I am not using any new code. Just the code in >> ~/iotivity/examples/OCFSecure and also the code in and the code in >> resource/csdk/security/provisioning/sample. I just created new >> certificates/private keys and json files for a client and server. The >> certificates and json files work great for the provisioningclient and >> sampleserver_mfg. So, I don't have a bug in the certificate and their usage >> in the json files. My problem is if I get one client and one server which >> are pre-provisioned ad their json uses certificate chain based >> authentication, the secure DTLS is not established. I suspect that this is >> probably just the model. the server should be provisioned first with a >> certificate holding client after which it can provide access. But I am not >> sure why or if this interpretation is correct. >> >> So, I will re-visit this and test the following: >> 1) non-provisioned sampleserver_mfg with proper certificate chain >> 2) provisioningclient with proper certificate chain provisions the >> sampleserver >> (I re-confirm 1 and 2 already work great either with sample code and >> certificates and also using my newly created certificates) >> 3) Third client with proper certificates chain accesses the >> sampleserver_mfg resources. >> I have a feeling this will work. Will let you guys know tomorrow. >> >> I generate the certificates and keys using the utility certgenerator that >> also comes with the provisioning code. It is a very straight-forward tool. >> Then I process the output further with openssl to put the certificates in >> DER format to fill the JSON files. >> >> Let me know if there is anything else you need to restart on this. >> >> BR, >> >> Khaled >> >> >> >> On Thu, Dec 27, 2018 at 10:40 PM Gregg Reynolds <d...@mobileink.com> >> wrote: >> >>> >>> >>> On Mon, Dec 10, 2018, 1:02 AM Khaled Elsayed <khaledi...@gmail.com >>> wrote: >>> >>>> Hi Gregg, >>>> >>>> No unfortunately. I will have a second look today but If I could not, I >>>> will proceed using the non-certificate based shared key credential >>>> supporting a limited number of clients for the time being >>>> >>> >>> Do you have any code you can share? I'm gearing up to work on this sorta >>> stuff in January. >>> >>> G >>> >>>> _._,_ >>>> >>>>> >> >> -=-=-=-=-=-=-=-=-=-=-=- Links: You receive all messages sent to this group. View/Reply Online (#10110): https://lists.iotivity.org/g/iotivity-dev/message/10110 Mute This Topic: https://lists.iotivity.org/mt/28611921/21656 Group Owner: iotivity-dev+ow...@lists.iotivity.org Unsubscribe: https://lists.iotivity.org/g/iotivity-dev/unsub [arch...@mail-archive.com] -=-=-=-=-=-=-=-=-=-=-=-