<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<title><![CDATA[wolfSSL - Embedded SSL Library — Having MATCH_SUITE_ERROR error when after changing the cipher list]]></title>
		<link>https://www.wolfssl.com/forums/topic1559-having-matchsuiteerror-error-when-after-changing-the-cipher-list.html</link>
		<atom:link href="https://www.wolfssl.com/forums/feed-rss-topic1559.xml" rel="self" type="application/rss+xml" />
		<description><![CDATA[The most recent posts in Having MATCH_SUITE_ERROR error when after changing the cipher list.]]></description>
		<lastBuildDate>Mon, 22 Jun 2020 22:43:41 +0000</lastBuildDate>
		<generator>PunBB</generator>
		<item>
			<title><![CDATA[Re: Having MATCH_SUITE_ERROR error when after changing the cipher list]]></title>
			<link>https://www.wolfssl.com/forums/post5293.html#p5293</link>
			<description><![CDATA[<p>Hi Waigor,</p><p>Are you trying to reuse the WOLFSSL_CTX between these connections? If the key/cert is loaded at the WOLFSSL_CTX level it gets shared/reused and only allows certain cipher suites. Have you tried loading the key/cert at the WOLFSSL object level using wolfSSL_use_certificate_file and wolfSSL_use_PrivateKey_file? If you&#039;d like to share some code to review feel free to email us at support@wolfssl.com</p><p>Thanks,<br />David Garske, wolfSSL</p>]]></description>
			<author><![CDATA[null@example.com (dgarske)]]></author>
			<pubDate>Mon, 22 Jun 2020 22:43:41 +0000</pubDate>
			<guid>https://www.wolfssl.com/forums/post5293.html#p5293</guid>
		</item>
		<item>
			<title><![CDATA[Re: Having MATCH_SUITE_ERROR error when after changing the cipher list]]></title>
			<link>https://www.wolfssl.com/forums/post5292.html#p5292</link>
			<description><![CDATA[<p>Hi David,</p><p>Thanks for you reply. I&#039;m currently giving the CTX 1MB (1,048,578 Bytes) memory, and it is still having error. I set the minimum version of TLS to version 1. </p><p>Here is the code for the cipher list:<br />static const char ec_cipher_list[] = <br />&nbsp; &nbsp; &nbsp; &nbsp; &quot;ECDHE-ECDSA-AES128-SHA256:&quot;<br />&nbsp; &nbsp; &nbsp; &nbsp; &quot;ECDHE-ECDSA-AES128-GCM-SHA256:&quot;<br />&nbsp; &nbsp; &nbsp; &nbsp; &quot;ECDHE-ECDSA-AES128-SHA:&quot;<br />&nbsp; &nbsp; &nbsp; &nbsp; &quot;ECDHE-ECDSA-AES256-SHA384:&quot;<br />&nbsp; &nbsp; &nbsp; &nbsp; &quot;ECDHE-ECDSA-AES256-GCM-SHA384:&quot;<br />&nbsp; &nbsp; &nbsp; &nbsp; &quot;ECDHE-ECDSA-AES256-SHA&quot;;</p><p>static const char rsa_cipher_list[] = <br />&nbsp; &nbsp; &nbsp; &nbsp; &quot;ECDHE-RSA-AES128-GCM-SHA256:&quot;<br />&nbsp; &nbsp; &nbsp; &nbsp; &quot;ECDHE-RSA-AES128-SHA:&quot;<br />&nbsp; &nbsp; &nbsp; &nbsp; &quot;ECDHE-RSA-AES128-SHA256:&quot;<br />&nbsp; &nbsp; &nbsp; &nbsp; &quot;ECDHE-RSA-AES256-GCM-SHA384:&quot;<br />&nbsp; &nbsp; &nbsp; &nbsp; &quot;ECDHE-RSA-AES256-SHA:&quot;<br />&nbsp; &nbsp; &nbsp; &nbsp; &quot;ECDHE-RSA-AES256-SHA384:&quot;<br />&nbsp; &nbsp; &nbsp; &nbsp; &quot;ECDHE-RSA-DES-CBC3-SHA:&quot;<br />&nbsp; &nbsp; &nbsp; &nbsp; &quot;DHE-RSA-AES128-SHA256:&quot;<br />&nbsp; &nbsp; &nbsp; &nbsp; &quot;DHE-RSA-AES256-SHA256:&quot;<br />&nbsp; &nbsp; &nbsp; &nbsp; &quot;DHE-RSA-AES128-SHA:&quot;<br />&nbsp; &nbsp; &nbsp; &nbsp; &quot;DHE-RSA-AES256-SHA:&quot;<br />&nbsp; &nbsp; &nbsp; &nbsp; &quot;EDH-RSA-DES-CBC3-SHA&quot;;</p><p>Here is a more clear graph with what is ok what is not, the changes both involve in certificate, key and cipher suites change:</p><p>ECC=======&gt;RSA&nbsp; &nbsp; not ok<br />RSA=======&gt;ECC&nbsp; &nbsp; ok<br />RSA=======&gt;ECC=======&gt;RSA&nbsp; &nbsp;not ok</p><p>Thanks<br />Waigor</p>]]></description>
			<author><![CDATA[null@example.com (waigor)]]></author>
			<pubDate>Mon, 22 Jun 2020 22:27:26 +0000</pubDate>
			<guid>https://www.wolfssl.com/forums/post5292.html#p5292</guid>
		</item>
		<item>
			<title><![CDATA[Re: Having MATCH_SUITE_ERROR error when after changing the cipher list]]></title>
			<link>https://www.wolfssl.com/forums/post5285.html#p5285</link>
			<description><![CDATA[<p>Hi waigor,</p><p>The RSA keys will use more memory. Have you tried increasing the static memory pool size? What cipher suites are you trying to use with RSA and what TLS version?</p><p>Thanks,<br />David Garske, wolfSSL</p>]]></description>
			<author><![CDATA[null@example.com (dgarske)]]></author>
			<pubDate>Mon, 22 Jun 2020 14:45:56 +0000</pubDate>
			<guid>https://www.wolfssl.com/forums/post5285.html#p5285</guid>
		</item>
		<item>
			<title><![CDATA[Having MATCH_SUITE_ERROR error when after changing the cipher list]]></title>
			<link>https://www.wolfssl.com/forums/post5275.html#p5275</link>
			<description><![CDATA[<p>Hi there,</p><p>In my application, my device initially use a ECC key and certificate with wolfSSL_CTX_use_certificate_file() and wolfSSL_CTX_use_PrivateKey_file(), then setting the cipher using API wolfSSL_CTX_set_cipher_list() with ECC cipher list. Later on, my devices generate a new certificate with RSA key, i repeat the step above with RSA cipher list, then Wolfssl report MATCH_SUITE_ERROR error during handshake.</p><p>If I do the another way around, initialise the device with RSA key, and switch to ECC key later on, this error will not happen.</p><p>Anyone know the cause of this and how to fix it? Or is there any limitations on this changing cipher list?</p><p>FYI, I initialize the WolfSSL with wolfSSL_Init() and wolfSSL_CTX_load_static_memory() API.</p><p>Thanks</p>]]></description>
			<author><![CDATA[null@example.com (waigor)]]></author>
			<pubDate>Fri, 19 Jun 2020 02:34:20 +0000</pubDate>
			<guid>https://www.wolfssl.com/forums/post5275.html#p5275</guid>
		</item>
	</channel>
</rss>
