Increase the number of bits used in the generation of the prime value for the Diffie-Hellman handshake to increse its 'safeness' and to prevent warning/error messages issues by new versions of the Java Bouncy Castle security library . You can view, comment on, or merge this pull request online at: https://github.com/xrootd/xrootd/pull/1560 -- Commit Summary -- * Use 512 bits to generate the prime value for DH handshake -- File Changes -- M src/XrdCrypto/XrdCryptosslCipher.hh (2) -- Patch Links -- https://github.com/xrootd/xrootd/pull/1560.patch https://github.com/xrootd/xrootd/pull/1560.diff -- You are receiving this because you are subscribed to this thread. Reply to this email directly or view it on GitHub: https://github.com/xrootd/xrootd/pull/1560 ######################################################################## Use REPLY-ALL to reply to list To unsubscribe from the XROOTD-DEV list, click the following link: https://listserv.slac.stanford.edu/cgi-bin/wa?SUBED1=XROOTD-DEV&A=1