RE: Tls1.2 Problem with client certificate and RSA_verify

2012-07-30 Thread Albers, Thorsten
-Original Message- From: owner-openssl-us...@openssl.org [mailto:owner-openssl- us...@openssl.org] On Behalf Of Dr. Stephen Henson Sent: Friday, July 27, 2012 6:47 PM To: openssl-users@openssl.org Subject: Re: Tls1.2 Problem with client certificate and RSA_verify On Fri, Jul 27, 2012

Re: Tls1.2 Problem with client certificate and RSA_verify

2012-07-30 Thread Dr. Stephen Henson
On Mon, Jul 30, 2012, Albers, Thorsten wrote: Thanks Steve! Unfortunately your hint couldn't help me. I know that in TLS 1.2 the hash and signature algorithms can be chosen during the handshake. I chose to use Sha256 with RSA for the signature, and therefore adding the corresponding algorithm

RE: Tls1.2 Problem with client certificate and RSA_verify

2012-07-30 Thread Dave Thompson
From: owner-openssl-us...@openssl.org On Behalf Of Albers, Thorsten Sent: Monday, 30 July, 2012 03:43 snip I also debugged the openssl-server when receiving the message above. The server recognized the correct hash and signature algorithms, but while following the functions to the point

RE: Tls1.2 Problem with client certificate and RSA_verify

2012-07-27 Thread Philippe Lhardy
Hi, An idea out of nowhere : did you investigate the bad gethostbyaddr issue ? There is reverse DNS done. how is your reverse dns set ? can you enter you host in hosts and see if does help ? Regards, From: owner-openssl-us...@openssl.org

Re: Tls1.2 Problem with client certificate and RSA_verify

2012-07-27 Thread Dr. Stephen Henson
On Fri, Jul 27, 2012, Albers, Thorsten wrote: Hi, I have a problem with the openssl s_server (v1.0.1c) when requesting a client certificate. I'm developing my own TLS 1.2 implementation (for embedded platforms), and I'm stuck with a problem with using the client certificate. I already