sorry some mails dose not reach the list, i will add the information inline:
2015-03-10 18:23 GMT+01:00 Christopher Schultz :
> Robert,
>
> On 3/10/15 12:16 PM, Robert Paasche wrote:
> > The problem is, that openssl call the method "SSL_callback_tmp_DH" with
> > keylen value of 512 or 1024. This
Robert,
On 3/10/15 12:16 PM, Robert Paasche wrote:
> Explained code changes:
>
> Get the Privatekey:
> pkey = SSL_get_privatekey(ssl);
> type = pkey ? EVP_PKEY_type(pkey->type) : EVP_PKEY_NONE;
>
> if the encryption algorithem is either RSA or DSA we override the given
> keylen parameter to
A DH Cipher of length 2048 bits uses a prime of 256 so even a private key
of 8192 bits should match the requirements of java 7.
Example:
TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (0x9f) DH 2048 bits (p: 256, g: 1,
Ys: 256)
p = prime
Robert Paasche
Senior Developer
pripares GmbH
Altheimer Eck 2
80
Am 10.03.2015 um 17:36 schrieb Rainer Jung:
Am 10.03.2015 um 17:16 schrieb Robert Paasche:
Hi guys,
as requested by chris some explanation to the problem.
The problem is, that openssl call the method "SSL_callback_tmp_DH"
with keylen
value of 512 or 1024. This cause that the cipher of the ssl
Am 10.03.2015 um 17:16 schrieb Robert Paasche:
Hi guys,
as requested by chris some explanation to the problem.
The problem is, that openssl call the method "SSL_callback_tmp_DH" with keylen
value of 512 or 1024. This cause that the cipher of the ssl handshake (key
exchange) for a ssl-connectio