Send the ServerHello data down to the client
*** ServerHello, TLSv1.2
RandomCookie:
GMT: 1611077693
bytes = { }
Session ID: {}
The following cipher spec
Cipher Suite: SSL_ECDHE_RSA_WITH_AES_256_GCM_SHA384
Compression Method: 0
Extension renegotiation_info, ri_length: 0, ri_connection_data: { null }
Extension ec_point_formats, formats: [uncompressed]
Extension extended_master_secret
***
Cipher spec found above
Cipher suite: SSL_ECDHE_RSA_WITH_AES_256_GCM_SHA384
And the certificate and CA of the server's certificate
*** Certificate chain
Subject: CN=SERVER, OU=SSS, O=ZZZZ; Issuers:CN=TEMP4Certification Authority, OU=TEST, O=TEMP
chain [0] = [
Certificate for CN=SERVER, OU=SSS, O=ZZZZ
Subject: CN=SERVER, OU=SSS, O=ZZZZ
Signature Algorithm: SHA256withRSA, OID = 1.2.840.113549.1.1.11
Key: IBMJCE RSA Public Key:
Issuer: CN=TEMP4Certification Authority, OU=TEST, O=TEMP
Algorithm: [SHA256withRSA]
]
chain [1] = [
Certificate for CN=TEMP4Certification Authority, OU=TEST, O=TEMP
Subject: CN=TEMP4Certification Authority, OU=TEST, O=TEMP
Signature Algorithm: SHA256withRSA, OID = 1.2.840.113549.1.1.11
Key: IBMJCE RSA Public Key:
Issuer: CN=TEMP4Certification Authority, OU=TEST, O=TEMP
Algorithm: [SHA256withRSA]
]
*** End of cipher chain
JsseJCE: Using signature SHA256withRSA from provider TBD via init
Signatures: Using signature RSA from provider from initSignIBMJCE version 1.8
The server and client needs to agree the details of the key to be used
*** ECDH ServerKeyExchange
Signature Algorithm SHA256withRSA
Server key: algorithm = EC
curve:
a: 1157920892103...
b: 410583637251521...
size: 256
generator:
[48439561293906451759...]
order:
11579208921035
cofactor: 1
, unparsed keybits =
End of ECDH ServerKeyExchange
Like this:
Like Loading...