Server sends ServerHello


Send the ServerHello data down to the client
*** ServerHello, TLSv1.2
RandomCookie:
GMT: 1611077693
bytes = { }
Session ID: {}
The following cipher spec
Cipher Suite: SSL_ECDHE_RSA_WITH_AES_256_GCM_SHA384
Compression Method: 0
Extension renegotiation_info, ri_length: 0, ri_connection_data: { null }
Extension ec_point_formats, formats: [uncompressed]
Extension extended_master_secret
***
Cipher spec found above
Cipher suite:  SSL_ECDHE_RSA_WITH_AES_256_GCM_SHA384
And the certificate and CA of the server's certificate
*** Certificate chain
Subject: CN=SERVER, OU=SSS, O=ZZZZ; Issuers:CN=TEMP4Certification Authority, OU=TEST, O=TEMP chain [0] = [ Certificate for CN=SERVER, OU=SSS, O=ZZZZ Subject: CN=SERVER, OU=SSS, O=ZZZZ Signature Algorithm: SHA256withRSA, OID = 1.2.840.113549.1.1.11 Key: IBMJCE RSA Public Key: Issuer: CN=TEMP4Certification Authority, OU=TEST, O=TEMP Algorithm: [SHA256withRSA] ] chain [1] = [ Certificate for CN=TEMP4Certification Authority, OU=TEST, O=TEMP Subject: CN=TEMP4Certification Authority, OU=TEST, O=TEMP Signature Algorithm: SHA256withRSA, OID = 1.2.840.113549.1.1.11 Key: IBMJCE RSA Public Key: Issuer: CN=TEMP4Certification Authority, OU=TEST, O=TEMP Algorithm: [SHA256withRSA] ]
*** End of cipher chain JsseJCE: Using signature SHA256withRSA from provider TBD via init Signatures: Using signature RSA from provider from initSignIBMJCE version 1.8 The server and client needs to agree the details of the key to be used *** ECDH ServerKeyExchange Signature Algorithm SHA256withRSA Server key: algorithm = EC curve: a: 1157920892103... b: 410583637251521... size: 256 generator: [48439561293906451759...] order: 11579208921035 cofactor: 1 , unparsed keybits = End of ECDH ServerKeyExchange