Does MetaDefender Core support Elliptic Curve (EC) Private Key and Certificate for enabling HTTPS?
Yes, MetaDefender Core supports Elliptic Curve private key and certificate for enabling HTTPS.
Example: PEM-encoded EC private key format
3
3
-----BEGIN EC PRIVATE KEY-----
MHcCAQEEIFXkB9C7UeznRzZKj...
-----END EC PRIVATE KEY-----
🔍Supported Curves
Elliptic Curve Cryptography (ECC) offers many different curve sets. You can list all supported curves using the following command:
1
1
openssl ecparam -list_curves
However, most modern browsers only support P-256 and P-384.
Therefore, we recommend using P-256 (also known as prime256v1
) or P-384 for HTTPS with MetaDefender Core.
🔧 How to Verify Your EC Private Key
To inspect your EC private key, use the following command:
1
1
openssl ec -in yourkey.key -text -noout
Explanation:
-in ec_private.key
: Path to your EC private key file (PEM format).-text
: Prints a human-readable summary of the key (including public and private components).-noout
: Suppresses output of the encoded key.
Example Output:
8
8
read EC key
Private-Key: (256 bit)
priv:
73:a1:34:...
pub:
04:51:88:...
ASN1 OID: prime256v1
NIST CURVE: P-256
If Further Assistance is required, please proceed to log a support case or chatting with our support engineer.
Was this page helpful?