Print

Print


Increase the number of bits used in the generation of the prime value for the Diffie-Hellman handshake to increse its 'safeness' and to prevent warning/error messages issues by new versions of the Java Bouncy Castle security library .

You can view, comment on, or merge this pull request online at:

  https://github.com/xrootd/xrootd/pull/1560

-- Commit Summary --

  * Use 512 bits to generate the prime value for DH handshake

-- File Changes --

    M src/XrdCrypto/XrdCryptosslCipher.hh (2)

-- Patch Links --

https://github.com/xrootd/xrootd/pull/1560.patch
https://github.com/xrootd/xrootd/pull/1560.diff

-- 
You are receiving this because you are subscribed to this thread.
Reply to this email directly or view it on GitHub:
https://github.com/xrootd/xrootd/pull/1560

########################################################################
Use REPLY-ALL to reply to list

To unsubscribe from the XROOTD-DEV list, click the following link:
https://listserv.slac.stanford.edu/cgi-bin/wa?SUBED1=XROOTD-DEV&A=1