> From: owner-openssl-us...@openssl.org On Behalf Of Michael D
> Sent: Wednesday, 30 September, 2009 13:12
(superseding previous, I assume)

> Ok, I reran my tests again...This time I added the 
> -named_curve parameter...and do indeed get 50 byte key for 
> the prime192v1 curve.
> 
> However, if I run the server with my certificate and key, the 
> client crashes processing the certificate.
> 
s_client or something else? can you narrow it down? 

> One more question.  If the public key is in the certificate, 
> why does the server send a server key exchange?
> 
ECDHE = Elliptic Curve Diffie-Hellman EPHEMERAL 

Like DHE = Diffie-Hellman Ephemeral, both parties choose 
per-session(handshake) DH keypairs X,Y. Server sends Ys 
in ServerKeyExchange, client sends Yc in ClientKeyExchange.
The only difference is DHE uses Z_p, ECDHE uses elliptic.
The key in the cert is used only for authentication (signing).

Static aka fixed ECDH (or DH) does use the certified key as the
server part of keyagreement. Client similarly if client auth 
i.e. cert is used, which it usually isn't; but even though that 
gives a fixed (EC)DH result, SSL still makes the sessionkeys 
unique by adding per-session/handshake nonces.



______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           majord...@openssl.org

Reply via email to