Hi, 
I have created a server and a client that connection and communicate
well if I use this ciphers:
"NULL-MD5", "NULL-SHA", "EXP-RC4-MD5", "RC4-MD5", "RC4-SHA",
"EXP-RC2-CBC-MD5", "IDEA-CBC-SHA", "EXP-DES-CBC-SHA", "DES-CBD-SHA",
"DES-CBC3-SHA", "AES128-SHA"," AES256-SHA".

The client and the server use the TLSv1 protocol.

My problem is that I want use the others TLSv1 ciphers this error happen:
2042:error:1408A0C1:SSL routines:SSL3_GET_CLIENT_HELLO:no shared
cipher:s3_srvr.c:882:

But I do not understand this, because I use the same cipher for
client, that for server.

I am proving whit the EDH-RSA-DES-CBC-SHA but I do not happen.

I generate the RSA key with the next command:
openssl genrsa -des3 -out rsaclient.key 1024

and the certificate:
openssl req -new -sha1 -x509 -key rsaclient.key -out rsaclient.crt

Furthemore I add to the server this lines:

RSA *rsa = NULL;
DH *dh = NULL;
FILE *dhParamFile;

SSL_CTX_set_options( ctx, SSL_OP_EPHEMERAL_RSA );
SSL_CTX_set_options( ctx, SSL_OP_SINGLE_DH_USE );
dhParamFile = fopen( "dh_param_512.pem", "r" );
dh = PEM_read_DHparams( dhParamFile, NULL, NULL, NULL );
fclose( dhParamFile );
rsa = RSA_generate_key( 1024, RSA_F4, NULL, NULL );
SSL_CTX_set_tmp_rsa( ctx, rsa );


The connection was successful with the ciphers that write to the start
the e-mail with this code added.

PS: I use the same certificate an key for server and client, the
server call to SSL_CTX_set_veirify( SSL_CTX *ctx, SSL_VERIFY_PEER,
verify_callback );
but verify_callaback return 1, so the cert of client always is
accepted by server.


Thank you very much.

Bye.
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    [EMAIL PROTECTED]
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to