-
Notifications
You must be signed in to change notification settings - Fork 36
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
how to make a certificate of basic256sha256 ? #16
Comments
server code:....... UA_StatusCode retval = UA_ByteString_clear(&certificate); for(size_t i = 0; i < trustListSize; i++) retval = UA_Server_run(server, &running); client code:... client = UA_Client_new(); UA_StatusCode retval = UA_Client_getEndpoints(client, endpointUrl, // "opc.tcp://localhost:4840", UA_Array_delete(endpointArray, endpointArraySize, UA_Client_delete(client); /* Secure client initialization */ /* Secure client connect */ /* SecurityPolicy for the SecureChannel. An for(size_t deleteCount = 0; deleteCount < trustListSize; deleteCount++) { /* Secure client connect / retval = UA_Client_connect(client, endpointUrl); client log:[2019-10-24 14:42:06.593 (UTC+0800)] info/client SecurityPolicy not specified -> use default #None mbedtls_pk_parse_key 1 mbedtls_pk_parse_key 2 mbedtls_pk_parse_key 3 mbedtls_pk_parse_key 5 mbedtls_pk_parse_key 6 mbedtls_pk_parse_key 9 ret=-4224 mbedtls_pk_parse_key 10 ret=0 pk_parse_key_pkcs8_unencrypted_der 11 ret=0 mbedtls_pk_parse_key 11 ret=0 mbedtls_pk_parse_key 1 mbedtls_pk_parse_key 2 mbedtls_pk_parse_key 3 mbedtls_pk_parse_key 5 mbedtls_pk_parse_key 6 mbedtls_pk_parse_key 9 ret=-4224 mbedtls_pk_parse_key 10 ret=0 pk_parse_key_pkcs8_unencrypted_der 11 ret=0 mbedtls_pk_parse_key 11 ret=0 mbedtls_pk_parse_key 1 mbedtls_pk_parse_key 2 mbedtls_pk_parse_key 3 mbedtls_pk_parse_key 5 mbedtls_pk_parse_key 6 mbedtls_pk_parse_key 9 ret=-4224 mbedtls_pk_parse_key 10 ret=0 pk_parse_key_pkcs8_unencrypted_der 11 ret=0 mbedtls_pk_parse_key 11 ret=0 [2019-10-24 14:42:06.641 (UTC+0800)] info/client Connecting to endpoint opc.tcp://localhost:4840 server log:.......... mbedtls_pk_parse_key 1 mbedtls_pk_parse_key 2 mbedtls_pk_parse_key 3 mbedtls_pk_parse_key 5 mbedtls_pk_parse_key 6 mbedtls_pk_parse_key 9 ret=-4224 mbedtls_pk_parse_key 10 ret=0 pk_parse_key_pkcs8_unencrypted_der 11 ret=0 mbedtls_pk_parse_key 11 ret=0 mbedtls_pk_parse_key 1 mbedtls_pk_parse_key 2 mbedtls_pk_parse_key 3 mbedtls_pk_parse_key 5 mbedtls_pk_parse_key 6 mbedtls_pk_parse_key 9 ret=-4224 mbedtls_pk_parse_key 10 ret=0 pk_parse_key_pkcs8_unencrypted_der 11 ret=0 mbedtls_pk_parse_key 11 ret=0 mbedtls_pk_parse_key 1 mbedtls_pk_parse_key 2 mbedtls_pk_parse_key 3 mbedtls_pk_parse_key 5 mbedtls_pk_parse_key 6 mbedtls_pk_parse_key 9 ret=-4224 mbedtls_pk_parse_key 10 ret=0 pk_parse_key_pkcs8_unencrypted_der 11 ret=0 mbedtls_pk_parse_key 11 ret=0 |
@hansgschossmann
I set client securityMode to UA_MESSAGESECURITYMODE_NONE,
securityPolicyUri to http://opcfoundation.org/UA/SecurityPolicy#None, can connect the client to a TCP secure channel;
I set client securityMode to UA_MESSAGESECURITYMODE_SIGNANDENCRYPT,
securityPolicyUri to http://opcfoundation.org/UA/SecurityPolicy#Basic256Sha256,couldn't connect the client to a TCP secure channel.
need to create a basic256sha256 certificate ?
I create the certificate with default para.
my certificate:
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
83:1a:43:e0:9a:60:89:47:81:02:3d:28:0e:28:62:82
Signature Algorithm: sha256WithRSAEncryption
Issuer: DC=srf, O=JM, CN=jmApp
Validity
Not Before: Oct 17 07:40:09 2019 GMT
Not After : Oct 11 07:40:09 2020 GMT
Subject: DC=srf, O=JM, CN=jmApp
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
Public-Key: (2048 bit)
Modulus:
00:b5:dd:d6:9f:bd:38:ef:9f:16:d0:44:46:1d:a3:
dc:85:a1:d7:d0:66:20:59:d4:b0:fe:ea:de:71:4a:
d2:7e:e1:c2:d9:32:28:8d:10:8c:1a:99:81:6a:fc:
38:d2:21:91:55:34:f6:5d:38:63:11:8e:4f:64:9e:
89:70:4a:54:4f:80:b2:17:da:86:c7:e0:91:0f:1d:
7c:ea:e7:72:bf:2d:6d:f0:77:36:cb:88:72:a2:58:
70:96:c4:db:a6:3e:17:c7:d0:84:5c:00:99:71:56:
e1:0d:81:8b:cd:1c:02:52:8c:a2:14:65:98:4e:9c:
bf:40:7f:1f:b6:2f:f5:a9:ad:72:94:f6:ba:99:97:
ba:38:81:28:15:fb:b4:be:03:4f:b4:31:ec:26:8c:
b1:ab:b4:35:d2:10:6a:7f:c0:4b:92:34:73:3c:5b:
33:89:11:96:15:33:5d:94:0e:cb:df:8f:28:ef:b7:
15:cc:f9:23:95:82:3c:6d:bb:07:ac:11:cb:41:01:
40:e5:1a:62:6f:bb:dd:a4:5f:f6:9a:5b:cf:30:74:
18:63:45:95:31:8c:ca:c1:d1:2e:41:ef:4b:78:91:
e4:c5:5a:cb:b7:28:ca:9c:4b:0b:e5:af:f5:da:d8:
53:ee:a5:41:c5:02:1d:15:0c:6b:b4:be:ae:4a:22:
e2:d5
Exponent: 65537 (0x10001)
X509v3 extensions:
X509v3 Authority Key Identifier:
keyid:2F:BA:DA:E1:4B:DC:1D:CB:8C:C0:F6:99:4E:DF:F7:21:F5:77:E4:75
The text was updated successfully, but these errors were encountered: