-Original Message-
From: owner-openssl-us...@openssl.org [mailto:owner-openssl-
us...@openssl.org] On Behalf Of Dr. Stephen Henson
Sent: Friday, July 27, 2012 6:47 PM
To: openssl-users@openssl.org
Subject: Re: Tls1.2 Problem with client certificate and RSA_verify
On Fri, Jul 27, 2012
On Mon, Jul 30, 2012, Albers, Thorsten wrote:
Thanks Steve! Unfortunately your hint couldn't help me. I know that in TLS
1.2 the hash and signature algorithms can be chosen during the handshake. I
chose to use Sha256 with RSA for the signature, and therefore adding the
corresponding algorithm
From: owner-openssl-us...@openssl.org On Behalf Of Albers, Thorsten
Sent: Monday, 30 July, 2012 03:43
snip
I also debugged the openssl-server when receiving the message
above. The server recognized the correct hash and signature
algorithms, but while following the functions to the point
Hi,
An idea out of nowhere : did you investigate the bad gethostbyaddr issue ?
There is reverse DNS done. how is your reverse dns set ? can you enter you host
in hosts and see if does help ?
Regards,
From: owner-openssl-us...@openssl.org
On Fri, Jul 27, 2012, Albers, Thorsten wrote:
Hi,
I have a problem with the openssl s_server (v1.0.1c) when requesting a client
certificate. I'm developing my own TLS 1.2 implementation (for embedded
platforms), and I'm stuck with a problem with using the client certificate. I
already