Re: Is X25519/X448 supported for TLSv1.2?

2019-06-13 Thread Viktor Dukhovni
On Fri, Jun 14, 2019 at 09:05:32AM +0800, John Jiang wrote: > > See https://github.com/openssl/openssl/issues/4175#issuecomment-322915924 > > > > When using ECDSA with TLSv1.2, the group list MUST include the group > > used in the certificate. Otherwise, you get no shared cipher as > > you report

Re: Is X25519/X448 supported for TLSv1.2?

2019-06-13 Thread John Jiang
On Thu, Jun 13, 2019 at 12:28 PM Viktor Dukhovni wrote: > On Thu, Jun 13, 2019 at 10:49:14AM +0800, John Jiang wrote: > > > I got the point: the server certificate is ECDSA with curve secp256r1. > > It works with RSA certificate and curves > > sepc256r1/sepc384r1/sepc521r1/x25519/x448. > > See ht

Shutting down openssl - is the correct thing to do nothing?

2019-06-13 Thread Graham Leggett
Hi all, I am currently reviewing the shutdown behaviour in both httpd’s mod_ssl and apr’s apr-crypto-openssl modules. Am I right in understanding that from openssl v1.1.0 and upwards, all the following calls are no longer necessary, will be called automatically atexit by the openssl library, a

Re: New to the list and one question ;-)

2019-06-13 Thread Patrick Regnouf via openssl-users
Thanks Matt, adding a call to SSL_CTX_set_ecdh_auto()  on the server side actually did the trick. Problem solved!!! /Patrick  Contrary to what you said in your original post the chrome session is NOT selecting 0xc02f. Instead it is selecting 0x002f which is TLS_RSA_WITH_AES_128_CBC_SHA (aka AES

EVP_DigestSign()

2019-06-13 Thread Jeremy Harris
[OpenSSL 1.1.1b FIPS on Fedora 29] What can a return code <= 0 from EVP_DigestSign(), with ERR_peek_error() return of 0, be caused by? ERR_error_string() decodes the 0 as ":lib(0):func(0):reason(0)" (assuming the ERR_peek_error(), ERR_get_error() sequence is not lying to me) which is n