Does MetaDefender Core support Elliptic Curve (EC) Private Key and Certificate for enabling HTTPS?
Yes, MetaDefender Core supports Elliptic Curve private key and certificate for enabling HTTPS.
Example: PEM-encoded EC private key format
-----BEGIN EC PRIVATE KEY-----MHcCAQEEIFXkB9C7UeznRzZKj...-----END EC PRIVATE KEY-----🔍Supported Curves
Elliptic Curve Cryptography (ECC) offers many different curve sets. You can list all supported curves using the following command:
openssl ecparam -list_curvesHowever, most modern browsers only support P-256 and P-384.
Therefore, we recommend using P-256 (also known as prime256v1) or P-384 for HTTPS with MetaDefender Core.
🔧 How to Verify Your EC Private Key
To inspect your EC private key, use the following command:
openssl ec -in yourkey.key -text -nooutExplanation:
- -in ec_private.key: Path to your EC private key file (PEM format).
- -text: Prints a human-readable summary of the key (including public and private components).
- -noout: Suppresses output of the encoded key.
Example Output:
read EC keyPrivate-Key: (256 bit)priv:    73:a1:34:...pub:    04:51:88:...ASN1 OID: prime256v1NIST CURVE: P-256If Further Assistance is required, please proceed to log a support case or chatting with our support engineer.
