On Wed, Aug 22, 2012, Varma Dantuluri wrote:

> Hi
> 
> We are in the process of adding support for ECDSA-ECDHE cipher suites and
> hence ECDSA certificates to our server.
> 
> Right now, the server does the following:
> 
> 1) Assign the ECDSA certificate to the SSL_CTX.
> 2) Set the callback for ECDH parameter generation using
> SSL_CTX_set_tmp_ecdh_callback.
> 
> In ssl3_send_server_key_exchange, when this callback is called, the value
> of 'keylength' parameter is always either 512 or 1024. Shouldnt 'keylength'
> have the curve name or id in the case of ECDH? Are we doing something wrong
> here?
> 

No, it's a limitation in some versions of OpenSSL. You basically have to pick
a curve you think the peer will support, P-256 is usually a safe choice. If
the peer doesn't support it then ECDHE will be disabled. You might as as well
set the curve using SSL_CTX_set_tmp_ecdh instead of the callback.

This is fixed in the development version of OpenSSL: for that you can just set
it to automatically use the right curve based on client and server
preferences.

Steve.
--
Dr Stephen N. Henson. OpenSSL project core developer.
Commercial tech support now available see: http://www.openssl.org
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           majord...@openssl.org

Reply via email to