Hello,

         I am trying with SSL handshake mechanism with ECDSA-ECDHE-AES-SHA and 
have generated certificates following the below link.

http://this.is.thoughtcrime.org.nz/elliptic-curve-ca-guide

But have certain issues regarding the same.

1.  The generated certificates show "The certificate has an invalid  signature 
" and the public key length shown  is ECC (0 bits ) . Upon exploring some 
websites, I understood, it is related to key length restrictions of windows. I 
am working on windows. But creating ECC keys and signing it by RSA works fine, 
the problem prevails with ECDSA, how do I resolve the same?

2. The s_server and s_client of openssl are implemented for 
ECDSA_ECDHE_AES_GCM_SHA384 but the same  s_server and s_client work with my 
ECDHE-RSA certificates as well , How is that possible?The ECDHE-RSA 
certificates should work invalid. But that's not the case, it works fine. 
Please explain the underlying reason.

3. The s_server and s_client behave quite uncertain at times i.e  the same 
cipher suite that I input is recognized at one instance and at other instance 
the same suite is not recognized and I am provided with an error  of "no shared 
cipher error" from the server side. Please explain.

         Kindly answer. Any help is highly appreciated.

        Thanks and regards,

           Suman

[http://www.lntebg.com/images/Digital_Signature_Elecrama_2016.jpg]

Larsen & Toubro Limited

www.larsentoubro.com

This Email may contain confidential or privileged information for the intended 
recipient (s). If you are not the intended recipient, please do not use or 
disseminate the information, notify the sender and delete it from your system.
_______________________________________________
openssl-users mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users

Reply via email to