Send the ServerHello data down to the client *** ServerHello, TLSv1.2 RandomCookie: GMT: 1611077693 bytes = { } Session ID: {} The following cipher spec Cipher Suite: SSL_ECDHE_RSA_WITH_AES_256_GCM_SHA384 Compression Method: 0 Extension renegotiation_info, ri_length: 0, ri_connection_data: { null } Extension ec_point_formats, formats: [uncompressed] Extension extended_master_secret *** Cipher spec found above Cipher suite: SSL_ECDHE_RSA_WITH_AES_256_GCM_SHA384 And the certificate and CA of the server's certificate *** Certificate chain*** End of cipher chain JsseJCE: Using signature SHA256withRSA from provider TBD via init Signatures: Using signature RSA from provider from initSignIBMJCE version 1.8 The server and client needs to agree the details of the key to be used *** ECDH ServerKeyExchange Signature Algorithm SHA256withRSA Server key: algorithm = EC curve: a: 1157920892103... b: 410583637251521... size: 256 generator: [48439561293906451759...] order: 11579208921035 cofactor: 1 , unparsed keybits = End of ECDH ServerKeyExchangeSubject: CN=SERVER, OU=SSS, O=ZZZZ; Issuers:CN=TEMP4Certification Authority, OU=TEST, O=TEMP
chain [0] = [ Certificate for CN=SERVER, OU=SSS, O=ZZZZ Subject: CN=SERVER, OU=SSS, O=ZZZZ Signature Algorithm: SHA256withRSA, OID = 1.2.840.113549.1.1.11 Key: IBMJCE RSA Public Key: Issuer: CN=TEMP4Certification Authority, OU=TEST, O=TEMP Algorithm: [SHA256withRSA] ] chain [1] = [ Certificate for CN=TEMP4Certification Authority, OU=TEST, O=TEMP Subject: CN=TEMP4Certification Authority, OU=TEST, O=TEMP Signature Algorithm: SHA256withRSA, OID = 1.2.840.113549.1.1.11 Key: IBMJCE RSA Public Key: Issuer: CN=TEMP4Certification Authority, OU=TEST, O=TEMP Algorithm: [SHA256withRSA] ]