Re: New to the list and one question ;-)

2019-06-13 Thread Patrick Regnouf via openssl-users
Thanks Matt, adding a call to SSL_CTX_set_ecdh_auto()  on the server side actually did the trick. Problem solved!!! /Patrick  Contrary to what you said in your original post the chrome session is NOT selecting 0xc02f. Instead it is selecting 0x002f which is TLS_RSA_WITH_AES_128_CBC_SHA (aka

Re: New to the list and one question ;-)

2019-06-12 Thread Matt Caswell
On 12/06/2019 10:27, Patrick Regnouf via openssl-users wrote: > As requested here are two captures attached: one successfully handshakes with > the server (chrome)  and one fails the handshake (firefox). > I would be very grateful if anyone could shed some light on this. > > the openssl

Re: New to the list and one question ;-)

2019-06-12 Thread Patrick Regnouf via openssl-users
As requested here are two captures attached: one successfully handshakes with the server (chrome)  and one fails the handshake (firefox). I would be very grateful if anyone could shed some light on this. the openssl version which is linked to my server/relay program is 1.0.2s Thanks /Patrick

Re: New to the list and one question ;-)

2019-06-10 Thread Viktor Dukhovni
On Mon, Jun 10, 2019 at 03:21:16PM +, Patrick Regnouf via openssl-users wrote: > All is well and good when the program works on the linux PC and the > handshake is succesful using the 0xc02f cipher. and that is linked to > version 3.0.0 of openssl. on the embedded version, (linked with

New to the list and one question ;-)

2019-06-10 Thread Patrick Regnouf via openssl-users
Hello all,  Hello all,  Presently writing a server/relay dealing with an h264 stream. one of the threads' job is to establish a handshake with the browser requesting the stream in order to feed the libsrtp2 with keys and salts and start encrypting the h264 stream towards the browser. all is well