Because my private key is in elliptic curve private format, your suggestion did not work. Let me explain what I did :
First I created a private key for CA:
Code: Select all
openssl ecparam -out ca.key -name secp521r1 -genkey -rand /dev/urandom
Then CA signed its certificate(self-signed CA certificte)
Code: Select all
openssl req -x509 -new -key ca.key -out ca.pem -outform PEM -days 3650 -sha384
Generate a key for Brekeke SIP server
Code: Select all
openssl ecparam -out sip.key -name secp521r1 -genkey -rand /dev/urandom
Generate sign request for SIP
Code: Select all
openssl req -new -nodes -key sip.key -outform PEM -out sip.req -sha384
Sign the request using CA
Code: Select all
openssl ca -keyfile ca.key -cert ca.pem -in sip.req -out sip.pem -outdir . -days 3650
At this step, I have sip.key and sip.pem for Brekeke SIP server. But Brekeke does not like private key and gives the error message that I mentioned in my first message.(Invalid key format)
Does that mean Brekeke supports only RSA certificates? I want to use ECDSA, not RSA, therefore my key should be EC key.
On the other hand, The output of the "ciphersuitesinfo" command contains my desired ciphersuit which is TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256.
Harold wrote:A key file format must be RSA format.
Let you convert your key file to RSA formatted file.
For example:
openssl rsa -in current.key -out rsa.key
Also, make sure you upload the key file at [Private Key File] field.
and upload the certificate file at [Certificate File] field.
[/b][/quote]