We saw these same errors in a WiMAX test network with Free Radius.
Moving from an older 32 bit Fedora to a current 64 bit Fedora and the
stock freeradius and freeradius-util packages made it work and made the
errors you exhibit disappear.
openssl0.9.8h manifestly does support the necessary al
Hi David,
I believe 2048 could not be the issue (as you said because I am using
64 bit OS), this is about supporting sha256 algorithm either with
0.9.8h, or my Freeradius 2.0.5 (both are latest). Because sha1 works
well with my installation with even RSA 2048 key. And ofcourse, as per
my previous
Hi David,
Thanks for your reply...I believe I am running Freeradius, and
openssl0.9.8h on 64 bit OS. If you want I can post the certs output as
well. Pls let me know. I need to make this working, and I have been
working on this for last 2 weeks and seeing the same error.
Here is the command used
Sergio wrote:
For the other side, i don't know anything about WiMAX, but i suposse
that credentials are the same. Hope this helps
__
I do. WiMAX certs (the ones uses in EAP-TLS and EAP-TTLS sessions over
the airlink to identi
Hi Sergio,
I tried with SHA1, and it is working just fine (Signature Algorithm:
sha1WithRSAEncryption).
Now, sha256 is not really working...is really openssl 0.9.8h supports
this advanced algorithm ? I have given the output as below...but
freeradius suggests that with the patch it should work wit
in openssl.cnf, i've set:
[ CA_default ]
...
default_md = sha512
...
for RSA request generation, my certs reqs report:
...
message digest is sha512
...
Signature Algorithm: sha1WithRSAEncryption
...
for EC request generatio
Fred Picher wrote:
> Hello all,
>
> I'd like to get all of the ciphers that are tagged 'export' as
> well as the 56-bit ones that are not. Eg.:
>
> (list somewhat shortened in width)
>
> EDH-RSA-DES-CBC-SHA SSLv3 Kx=DH Enc=DES(56)
> EDH-DSS-DES-CBC-SHA SSLv3 Kx=DH Enc=DES(56)
Dr. Stephen Henson wrote:
On Tue, Aug 12, 2008, Justin A wrote:
Hi,
When fips mode enabled I am running into issue with this call in my code
1)
Issue:-
-
PEM_write_bio_RSAPrivateKey(priv_bp, key, EVP_des_ede3_cbc(), NULL, NULL,
some_cb, NULL)
When I checked the code
Hello all,
I'd like to get all of the ciphers that are tagged 'export' as
well as the 56-bit ones that are not. Eg.:
(list somewhat shortened in width)
EDH-RSA-DES-CBC-SHA SSLv3 Kx=DH Enc=DES(56)
EDH-DSS-DES-CBC-SHA SSLv3 Kx=DH Enc=DES(56)
DES-CBC-SHA SSLv3 Kx=
Hi,
Unfortunately this is seemingly the case, as told by actual
gouvernement reps.
Cheers.
--- On Wed, 8/13/08, David Schwartz <[EMAIL PROTECTED]> wrote:
> From: David Schwartz <[EMAIL PROTECTED]>
> Subject: RE: DES-only OpenSSL version
> To: openssl-users@openssl.org
> Received: Wednesday
Hi Ger,
Thanks for your detailed response. My counter-responses are inlined.
Response below:
On Tue, Aug 12, 2008 at 7:27 AM, Ambarish Mitra
<[EMAIL PROTECTED]> wrote:
> The output was:
> 933945:error:0607C084:lib(6):func(124):reason(132):evp_enc.c:523:
> 933945:error:0607B086:lib(6):func(123):
Carolin Latze wrote:
> Hi everybody,
>
> I have a very strange problem and hope that somebody is able to help
> me. I wrote a simple client and server in C that authenticate each
> other mutually using SSL. The SSL connection itself is working and I
> was able to exchange messages using SSL_write a
Hi everybody,
I have a very strange problem and hope that somebody is able to help me.
I wrote a simple client and server in C that authenticate each other
mutually using SSL. The SSL connection itself is working and I was able
to exchange messages using SSL_write and SSL_read. The client send
13 matches
Mail list logo