On Wed, Feb 27, 2013, Nayna Jain wrote:

> Thanks Dr. Stephen and Victor for explanation
> 
> Some questions further in this :
> 
>    Is there an API to configure programmatically , what hash algorithm it
>    can use.  My understanding is that final ciphers which are selected are
>    for encryption and HMAC generation of application data packets. This
>    might be required to maintain the compatibility issues.
>    My understanding is that this error happens on client side, when it
>    tries to sign the CertificateVerify message, where digest output comes
>    too big for RSA to encrypt. Let me know if this is correct.
> 

Yes that's correct. If the RSA key size is too small the default SHA512
digest and the associated ASN1 and padding overhead exceeds the maximum for
the RSA algorithm. This is only a problem with insecure keys: most standards
now suggest 1024 bits is the bare minimum and 2048 bits recommended.

There is an API to modify the supported digest list but only in the unreleased
OpenSSL 1.0.2 and later. This can be accessed on the command line through the
-client_sigalgs command line switch, via the SSL_CONF API or through some ctrl
operations. There isn't anything in 1.0.1.

These are the digests used to sign handshake messages for TLS version 1.2.
The digests used for HMAC in application data records are determined by the
cipher suite.

Steve.
--
Dr Stephen N. Henson. OpenSSL project core developer.
Commercial tech support now available see: http://www.openssl.org
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           majord...@openssl.org

Reply via email to