> From: owner-openssl-us...@openssl.org On Behalf Of Albers, Thorsten
> Sent: Monday, 30 July, 2012 03:43
> I also debugged the openssl-server when receiving the message
> above. The server recognized the correct hash and signature
> algorithms, but while following the functions to the point
>
On Mon, Jul 30, 2012, Albers, Thorsten wrote:
> Thanks Steve! Unfortunately your hint couldn't help me. I know that in TLS
> 1.2 the hash and signature algorithms can be chosen during the handshake. I
> chose to use Sha256 with RSA for the signature, and therefore adding the
> corresponding algori
rsten
>-Original Message-
>From: owner-openssl-us...@openssl.org [mailto:owner-openssl-
>us...@openssl.org] On Behalf Of Dr. Stephen Henson
>Sent: Friday, July 27, 2012 6:47 PM
>To: openssl-users@openssl.org
>Subject: Re: Tls1.2 Problem with client certificate and RSA_v
On Fri, Jul 27, 2012, Albers, Thorsten wrote:
> Hi,
> I have a problem with the openssl s_server (v1.0.1c) when requesting a client
> certificate. I'm developing my own TLS 1.2 implementation (for embedded
> platforms), and I'm stuck with a problem with using the client certificate. I
> already
openssl-us...@openssl.org] on
behalf of Albers, Thorsten [thorsten.alb...@vector.com]
Sent: Friday, July 27, 2012 1:11 PM
To: openssl-users@openssl.org
Subject: Tls1.2 Problem with client certificate and RSA_verify
Hi,
I have a problem with the openssl s_server (v1.0.1c) when requesting a client
c
Hi,
I have a problem with the openssl s_server (v1.0.1c) when requesting a client
certificate. I'm developing my own TLS 1.2 implementation (for embedded
platforms), and I'm stuck with a problem with using the client certificate. I
already implemented TLS 1.0 earlier, so it's not completely new