Thanks Aleksey. For sure I am using OC_CLIENT_SERVER mode. My code is based on ~/iotivity/examples/OCFSecure which already took core of this in the client.cpp code.
On Fri, Dec 28, 2018 at 1:40 PM Oleksiy Volkov <a.vol...@samsung.com> wrote: > Hi Khaled, > > > > maybe you use 'client only' (OC_CLIENT) mode instead of 'client-server' > (OC_CLIENT_SERVER) to initialize the Iotivity stack. > > > > *Best regards,* > > *Aleksey Volkov* > > > > --------- *Original Message* --------- > > *Sender* : Khaled Elsayed <kha...@ieee.org> > > *Date* : 2018-12-10 18:54 (GMT+2) > > *Title* : Re: [dev] Certificate-based credential (DTLS fails to find > cipher suite) > > > Hi Gregg, > > No unfortunately. I will have a second look today but If I could not, I > will proceed using the non-certificate based shared key credential > supporting a limited number of clients for the time being. > > On Sun, Dec 9, 2018 at 11:18 PM Gregg Reynolds <d...@mobileink.com> wrote: > >> Did you ever get this figured out? >> >> I've seen "*No ciphersuites configured**" but sadly don't remember how I >> resolved it.* >> >> *G* >> >> On Wed, Dec 5, 2018, 9:34 AM Khaled Elsayed <khaledi...@gmail.com wrote: >> >>> Hi, >>> >>> I am trying to get certificate-based credential management to work >>> between a provisioned server and a client. So, I worked a bit more with the >>> provisionclient and sampleserver_mfg. I created new certificates via the >>> crtgenerator application. I configured the json files with the new >>> certificates and private keys for both application. The provisioning >>> worked. This is the good news proving that these certificates and json >>> files do work. >>> >>> The bad news is if I want to apply the certificate based >>> authentication/credntial in other examples not including provisioning, it >>> does not work. I use the sample client and server in the examples/OCFSecure >>> folder. The client and server initiate properly and reads the >>> cred/certificates correctly. However, when the client attempts to issues a >>> GET request over coaps, it fails. >>> >>> Obviously there is something that needs to be invoked to associate the >>> client and server so that they use the certificates to calculate the shared >>> symmetric encryption key. This seems to occur when the provisioningclient >>> starts to access the /doxm resource in the sampleserver_mfg. I could see >>> that in the log but I cannot figure out how to make the OCFSecure >>> client/server start the certificate exchange process. >>> >>> Here is the log. It complains *No ciphersuites configured* (see below) >>> although they are to start DTLS handshake (InitiateTlsHandshake is being >>> invoked). So, what procedure should be invoked to create a cipher between >>> the two endpoints using the certificates before reaching to the point they >>> exchange coaps payloads. Thanks for any pointers. >>> >>> 48:53.275 INFO: OIC_CA_MSG_HANDLE: CASendUnicastData type : 1 >>> >>> 48:53.275 DEBUG: OIC_CA_INF_CTR: unicast message to adapter >>> >>> 48:53.275 DEBUG: OIC_UQUEUE: Queue Count : 1 >>> >>> 48:53.275 INFO: OIC_CA_PRTCL_MSG: adapter value of CoAP/TCP is 1 >>> >>> 48:53.275 DEBUG: OIC_CA_RETRANS: sent pdu, msgtype=1, msgid=60490 >>> >>> 48:53.275 DEBUG: OIC_CA_RETRANS: not supported message type >>> >>> 48:53.275 DEBUG: OIC_CA_MSG_HANDLE: CADestroyData IN >>> >>> 48:53.275 DEBUG: OIC_CA_MSG_HANDLE: CADestroyData OUT >>> >>> 48:53.275 DEBUG: OIC_CA_QING: wait.. >>> >>> 48:53.275 DEBUG: OIC_CA_QING: wake up.. >>> >>> 48:53.275 DEBUG: OIC_CA_IP_ADAP: DTLS encrypt called >>> >>> 48:53.275 DEBUG: OIC_CA_NET_SSL: In CAencryptSsl >>> >>> 48:53.275 DEBUG: OIC_CA_NET_SSL: Port 39115 >>> >>> 48:53.275 DEBUG: OIC_CA_NET_SSL: Data to be encrypted dataLen [30] >>> >>> 48:53.275 DEBUG: OIC_CA_NET_SSL: In GetSslPeer >>> >>> 48:53.275 DEBUG: OIC_CA_NET_SSL: Return NULL >>> >>> 48:53.275 DEBUG: OIC_CA_NET_SSL: Out GetSslPeer >>> >>> 48:53.279 DEBUG: OIC_CA_NET_SSL: In InitiateTlsHandshake >>> >>> 48:53.279 DEBUG: OIC_CA_NET_SSL: In NewSslEndPoint >>> >>> 48:53.279 DEBUG: MBED_TLS: set_timer to 0 ms >>> >>> 48:53.279 DEBUG: OIC_CA_NET_SSL: New [client role] endpoint added [ >>> 10.0.0.2:39115] >>> >>> 48:53.279 DEBUG: OIC_CA_NET_SSL: Out NewSslEndPoint >>> >>> 48:53.279 DEBUG: OIC_CA_NET_SSL: In SetupCipher >>> >>> 48:53.279 DEBUG: OIC_SRM_PKIX_INTERFACE: In InitCipherSuiteList >>> >>> 48:53.279 DEBUG: OIC_SRM_CREDL: In InitCipherSuiteListInternal >>> >>> 48:53.279 DEBUG: OIC_SRM_CREDL: Out InitCipherSuiteListInternal >>> >>> 48:53.279 DEBUG: OIC_SRM_PKIX_INTERFACE: Out InitCipherSuiteList >>> >>> 48:53.279 DEBUG: OIC_CA_NET_SSL: Supported ciphersuites: >>> >>> *48:53.279 ERROR: OIC_CA_NET_SSL: No ciphersuites configured, secure >>> connections will fail* >>> >>> 48:53.279 DEBUG: OIC_CA_NET_SSL: Out SetupCipher >>> >>> 48:53.279 ERROR: OIC_CA_NET_SSL: Failed to set up cipher >>> >>> 48:53.279 DEBUG: OIC_CA_NET_SSL: In DeleteSslEndPoint >>> >>> >>> >>> On Tue, Nov 27, 2018 at 9:16 AM Khaled Elsayed <khaledi...@gmail.com> >>> wrote: >>> >>>> Thanks Mats for the pointer. Very handy tool. Nicely done Rami. >>>> >>>> Khaled >>>> >>>> >>>> >>>> On Mon, Nov 26, 2018 at 5:21 PM Mats Wichmann <m...@wichmann.us> wrote: >>>> >>>>> On 11/26/18 7:53 AM, Khaled Elsayed wrote: >>>>> > Hi Nathan >>>>> > >>>>> > Just wanted to confirm that json2cbor from iotivity-2.0.0 and latest >>>>> master >>>>> > both fail when an ACE contains a roletype entry. >>>>> > >>>>> > For the provisioning client example, is there anyway to inspect the >>>>> .dat >>>>> > files that are modified after the provisioning is performed? >>>>> Something like >>>>> > a cbor2json if there is such a tool. >>>>> > >>>>> > Thanks >>>>> > >>>>> > Khaled >>>>> >>>>> https://github.com/alshafi/iotivity-tool >>>>> >>>>> should be able to do this - it converts in both directions. >>>>> >>>>> >>>>> >>>>> >>>>> >>>>> > > > > > > > > > > > > -=-=-=-=-=-=-=-=-=-=-=- Links: You receive all messages sent to this group. View/Reply Online (#10113): https://lists.iotivity.org/g/iotivity-dev/message/10113 Mute This Topic: https://lists.iotivity.org/mt/28611921/21656 Group Owner: iotivity-dev+ow...@lists.iotivity.org Unsubscribe: https://lists.iotivity.org/g/iotivity-dev/unsub [arch...@mail-archive.com] -=-=-=-=-=-=-=-=-=-=-=-