(no subject)

Herman Swensson h.swensson at hccnet.nl
Sun Feb 19 14:39:43 CET 2006



tls: pem_file_type = yes

 tls: private_key_file = "/usr/local/etc/raddb/certs/server_keycert.pem"

 tls: certificate_file = "/usr/local/etc/raddb/certs/server_keycert.pem"

 tls: CA_file = "/usr/local/etc/raddb/certs/cacert.pem"

 tls: private_key_password = "WHAT EVER"

 tls: dh_file = "/usr/local/etc/raddb/certs/dh"

 tls: random_file = "/usr/local/etc/raddb/certs/random"

 tls: fragment_size = 1024

 tls: include_length = yes

 tls: check_crl = no

 tls: check_cert_cn = "(null)"

rlm_eap_tls: Loading the certificate file as a chain

21646:error:0B080074:x509 certificate routines:X509_check_private_key:key
values mismatch:x509_cmp.c:389:

rlm_eap_tls: Error reading private key file

rlm_eap: Failed to initialize type tls

radiusd.conf[10]: eap: Module instantiation failed.

radiusd.conf[1902] Unknown module "eap".

radiusd.conf[1849] Failed to parse authenticate section.


The private key is the same as the onen in the private key file

How the go further






No virus found in this outgoing message.
Checked by AVG Free Edition.
Version: 7.1.375 / Virus Database: 267.15.11/264 - Release Date: 17-2-2006
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.freeradius.org/pipermail/freeradius-users/attachments/20060219/703fd9a2/attachment.html>

More information about the Freeradius-Users mailing list