OpenSSL Client mode: Rejecting weak DH parameters

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Hi,
Currently OpenSSL in Client mode stops handshake only if the keylength of?Server?selected DH parameters is less than 768 bit (hardcoded in source). Is there any way to set the minimum key length usingpublic APIs? In my client i want to stop handshake if the keylength of?Server?selected DH parameters is less than 2048bit. Preferred way would be to set via API e.g. Option setting exposed by OpenSSL.

Kind Regards,
Rashid Mahmood
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://mta.openssl.org/pipermail/openssl-users/attachments/20151005/25bddd54/attachment.html>


[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Index of Archives]     [Linux ARM Kernel]     [Linux ARM]     [Linux Omap]     [Fedora ARM]     [IETF Annouce]     [Security]     [Bugtraq]     [Linux]     [Linux OMAP]     [Linux MIPS]     [ECOS]     [Asterisk Internet PBX]     [Linux API]

  Powered by Linux