<html><head><meta http-equiv="Content-Type" content="text/html charset=us-ascii"></head><body style="word-wrap: break-word; -webkit-nbsp-mode: space; -webkit-line-break: after-white-space;"><div style="margin: 0in 0in 0.0001pt; font-size: 11pt; font-family: Calibri, sans-serif;"><div style="margin: 0in 0in 0.0001pt; font-size: 11pt;"><span style="font-size: 11pt;">I'm running an app that uses ECC public keys and have discovered a problem that only appears to emerge on RedHat ...</span></div><div style="margin: 0in 0in 0.0001pt; font-size: 11pt;"><br></div><div style="margin: 0in 0in 0.0001pt; font-size: 11pt;">...specifically I'm getting not_sup for crypto:generate_key for ecdh.</div><div style="margin: 0in 0in 0.0001pt; font-size: 11pt;"><br></div><div style="margin: 0in 0in 0.0001pt; font-size: 11pt;">I have built openssl 1.0.1h from source on the RH server, and 17.3 on top of that, but still I am missing ec_gf2m, ecdsa and ecdh support (see 'public_keys' section in the below repl, and the comparative from deploys on OS X and Windows).</div><div style="margin: 0in 0in 0.0001pt; font-size: 11pt;"><br></div><div style="margin: 0in 0in 0.0001pt; font-size: 11pt;"><span style="font-size: 11pt;">On RedHat Linux</span></div><div style="margin: 0in 0in 0.0001pt; font-size: 11pt;"><div style="margin: 0in 0in 0.0001pt; font-size: 11pt;">1> crypto:supports().<o:p></o:p></div><div style="margin: 0in 0in 0.0001pt; font-size: 11pt;">[{hashs,[md4,md5,sha,ripemd160,sha224,sha256,sha384,sha512]},<o:p></o:p></div><div style="margin: 0in 0in 0.0001pt; font-size: 11pt;">{ciphers,[des_cbc,des_cfb,des3_cbc,des_ede3,blowfish_cbc,<o:p></o:p></div><div style="margin: 0in 0in 0.0001pt; font-size: 11pt;"> blowfish_cfb64,blowfish_ofb64,blowfish_ecb,aes_cbc128,<o:p></o:p></div><div style="margin: 0in 0in 0.0001pt; font-size: 11pt;"> aes_cfb8,aes_cfb128,aes_cbc256,rc2_cbc,aes_ctr,rc4,des3_cbf,<o:p></o:p></div><div style="margin: 0in 0in 0.0001pt; font-size: 11pt;"> aes_ige256]},<o:p></o:p></div><div style="margin: 0in 0in 0.0001pt; font-size: 11pt;">{public_keys,[rsa,dss,dh,srp]}]<o:p></o:p></div><div style="margin: 0in 0in 0.0001pt; font-size: 11pt;">2> crypto:ec_curves().<o:p></o:p></div><div style="margin: 0in 0in 0.0001pt; font-size: 11pt;">[secp112r1,secp112r2,secp128r1,secp128r2,secp160k1,<o:p></o:p></div><div style="margin: 0in 0in 0.0001pt; font-size: 11pt;">secp160r1,secp160r2,secp192r1,secp192k1,secp224k1,secp224r1,<o:p></o:p></div><div style="margin: 0in 0in 0.0001pt; font-size: 11pt;">secp256k1,secp256r1,secp384r1,secp521r1,prime192v1,<o:p></o:p></div><div style="margin: 0in 0in 0.0001pt; font-size: 11pt;">prime192v2,prime192v3,prime239v1,prime239v2,prime239v3,<o:p></o:p></div><div style="margin: 0in 0in 0.0001pt; font-size: 11pt;">prime256v1,wtls6,wtls7,wtls8,wtls9,wtls12,brainpoolP160r1,<o:p></o:p></div><div style="margin: 0in 0in 0.0001pt; font-size: 11pt;">brainpoolP160t1|...]</div><div><br></div></div><div style="margin: 0in 0in 0.0001pt; font-size: 11pt;">On OSX + Windows</div><div style="margin: 0px; font-size: 11px; font-family: 'Courier New';">1> crypto:supports().</div><div style="margin: 0px; font-size: 11px; font-family: 'Courier New';">[{hashs,[md4,md5,sha,ripemd160,sha224,sha256,sha384,sha512]},</div><div style="margin: 0px; font-size: 11px; font-family: 'Courier New';"> {ciphers,[des_cbc,des_cfb,des3_cbc,des_ede3,blowfish_cbc,</div><div style="margin: 0px; font-size: 11px; font-family: 'Courier New';"> blowfish_cfb64,blowfish_ofb64,blowfish_ecb,aes_cbc128,</div><div style="margin: 0px; font-size: 11px; font-family: 'Courier New';"> aes_cfb8,aes_cfb128,aes_cbc256,rc2_cbc,aes_ctr,rc4,des3_cbf,</div><div style="margin: 0px; font-size: 11px; font-family: 'Courier New';"> aes_ige256]},</div><div style="margin: 0px; font-size: 11px; font-family: 'Courier New';"> {public_keys,[rsa,dss,dh,srp,ec_gf2m,ecdsa,ecdh]}]</div><div style="margin: 0px; font-size: 11px; font-family: 'Courier New';">2> crypto:ec_curves().</div><div style="margin: 0px; font-size: 11px; font-family: 'Courier New';">[secp112r1,secp112r2,secp128r1,secp128r2,secp160k1,</div><div style="margin: 0px; font-size: 11px; font-family: 'Courier New';"> secp160r1,secp160r2,secp192r1,secp192k1,secp224k1,secp224r1,</div><div style="margin: 0px; font-size: 11px; font-family: 'Courier New';"> secp256k1,secp256r1,secp384r1,secp521r1,prime192v1,</div><div style="margin: 0px; font-size: 11px; font-family: 'Courier New';"> prime192v2,prime192v3,prime239v1,prime239v2,prime239v3,</div><div style="margin: 0px; font-size: 11px; font-family: 'Courier New';"> prime256v1,wtls6,wtls7,wtls8,wtls9,wtls12,brainpoolP160r1,</div><div style="margin: 0px; font-size: 11px; font-family: 'Courier New';"> brainpoolP160t1|...]</div><div><br></div></div><div style="margin: 0in 0in 0.0001pt; font-size: 11pt; font-family: Calibri, sans-serif;"><div style="font-size: 11pt; margin: 0in 0in 0.0001pt;">I'm hoping somebody else has faced this frustration before and found a solution...?</div><div style="font-size: 11pt; margin: 0in 0in 0.0001pt;"><br></div><div style="font-size: 11pt; margin: 0in 0in 0.0001pt;">regs,</div><div style="font-size: 11pt; margin: 0in 0in 0.0001pt;">/s</div><div style="font-size: 11pt; margin: 0in 0in 0.0001pt;"><br></div><div style="font-size: 11pt; margin: 0in 0in 0.0001pt;"></div></div></body></html>