On Mon, May 22, 2000 at 09:29:29PM +0530, Amit Chopra wrote:

> Now my question. Here is some code from s3_srvr.c that is
> used in the key exchange.
> 
> File s3_srvr.c, Function ssl3_send_server_key_exchange, Line 955:
>   rsa=s->cert->rsa_tmp_cb(s,
>       SSL_C_IS_EXPORT(s->s3->tmp.new_cipher),
>       SSL_C_EXPORT_PKEYLENGTH(s->s3->tmp.new_cipher));
>   ....
> 
> File s3_srvr.c, Function ssl3_send_server_key_exchange, Line 984:
>   dhp=s->cert->dh_tmp_cb(s,
>       !SSL_C_IS_EXPORT(s->s3->tmp.new_cipher),
>       SSL_C_EXPORT_PKEYLENGTH(s->s3->tmp.new_cipher));
>   ....
> 
> 
> The interesting thing is the negation of SSL_C_IS_EXPORT when using
> temp DH callback. So in my temp DH callback, when I am expecting the
> key to be exportable, it is not and vice versa. [...]
> Is there some logic behind negating the SSL_C_IS_EXPORT return value
> for the DH callback?

No.  I'm changing it in the source code.  Presumably the reason
that no-one has noticed this before is that few people use DH at all,
and if they do, they don't necessarily use the callback.
I'm not aware of any export-restricted SSL clients that were
able to use DH ciphersuites when the US export rules had the
512 bit limit; so 1024 bit DH was always OK.
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
Development Mailing List                       [EMAIL PROTECTED]
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to