On Mon, Oct 13, 2014 at 08:20:46PM -0700, Norm Green wrote:
> I'm using OpenSSL 1.0.1i built from sources on Linux. I'm trying to get an
> ephemeral DH connection to work without certificates and having no luck. I
> can only seem to get anonymous DH (ADH) to work.
ADH is e
I'm using OpenSSL 1.0.1i built from sources on Linux. I'm trying to get
an ephemeral DH connection to work without certificates and having no
luck. I can only seem to get anonymous DH (ADH) to work.
I am using SSL_CTX_set_tmp_dh_callback() on the server to set the CB
function to c
On Tue, Aug 14, 2012, no_spam...@yahoo.com wrote:
> Is there a correlation between the strength (size) of the asymmetric keys
> used to do the authentication and the strength (size) of the ephemeral DH
> keys generated/used to protect the session key (during the key exchange)?
>
.h-online.com/open/news/item/OAuth-2-0-editor-resigns-and-takes-name-off-spec-1654984.html.
> I guess what I'm asking is: what is the proper method for using larger
> ephemeral DH key sizes in OpenSSL?
Ah, my bad. I'm not sure how to configure it on the client or the server.
> Wha
n appropriate?
I guess what I'm asking is: what is the proper method for using larger
ephemeral DH key sizes in OpenSSL?
What I'm envisioning is something like the following: if the cipher suite and
authentication key size info contained in the SSL structure require something
stronger
On Tue, Aug 14, 2012 at 12:23 PM, wrote:
> Is there a correlation between the strength (size) of the asymmetric keys
> used to do the authentication and the strength (size) of the ephemeral DH
> keys generated/used to protect the session key (during the key exchange)?
Yes, there
Is there a correlation between the strength (size) of the asymmetric keys used
to do the authentication and the strength (size) of the ephemeral DH keys
generated/used to protect the session key (during the key exchange)?
On first glance, in s3_srvr.c, it seems like the tmp_dh_callback
x65, 0x60, 0x62, 0x61,
0x64) is 1024 bits for Ephemeral DH, Ephemeral RSA, then why doesn't
ssleay32 report an error if some different key size is used.
3. if key size of 512 export cipher suites (0x14, 0x11, 0x03, 0x06, 0x08) is
512 bits for Ephemeral DH, Ephemeral RSA, then why doesn't ss
Odpowiedz automatyczna:
Do 5 maja przebywam na zasluzonym urlopie.
W pilnych sprawach prosze o kontakt z Kamilem Kilinskim.
Z powazaniem,
Michal Trojnara
>>> "[EMAIL PROTECTED]" 04/27/00 07:18 >>>
Amit Chopra <[EMAIL PROTECTED]>:
> I had posted a query about using the SSL_CTX_set_tmp_rs
Amit Chopra <[EMAIL PROTECTED]>:
> I had posted a query about using the SSL_CTX_set_tmp_rsa/dsa_cb(...).
> I was using the callback so that i'd generate a new ephemeral key for
> every session.
> The impression i got from the reply was that instead of setting the
> callback and generating\selec
Hi,
I had posted a query about using the SSL_CTX_set_tmp_rsa/dsa_cb(...).
I was using the callback so that i'd generate a new ephemeral key for
every session.
The impression i got from the reply was that instead of setting the
callback and generating\selecting a key during SSL_accept, I can at
s
11 matches
Mail list logo