<div dir="ltr">This was tested on a Hunchentoot web server running Linux 3.2.0.54-generic kernel using SBCL 1.1.0. Before the patch, a Windows NT client with only standard export ciphers would not communicate to the Hunchentoot server, where as afterward, the Hunchentoot url worked fine.<div>
<br></div><div>Best Regards,</div><div><br></div><div>Kari Lentz</div></div><div class="gmail_extra"><br><br><div class="gmail_quote">On Fri, Jan 31, 2014 at 10:43 AM, Anton Vodonosov <span dir="ltr"><<a href="mailto:avodonosov@yandex.ru" target="_blank">avodonosov@yandex.ru</a>></span> wrote:<br>
<blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">Hi, thanks for the patch.<br>
<br>
Have you tested it? On what lisp/OS ?<br>
<br>
31.01.2014, 19:19, "Kari Lentz" <<a href="mailto:kari.k.lentz@gmail.com">kari.k.lentz@gmail.com</a>>:<br>
<div class="HOEnZb"><div class="h5">> Please find attached a patch supports enables CL+SSL to support ciphers that require a temporary/ephemeral RSA key. To quote the OpenSSL documentation:<br>
> "When using a cipher with RSA authentication, an ephemeral RSA key exchange can take place. In this case the session data are negotiated using the ephemeral/temporary RSA key and the RSA key supplied and certified by the certificate chain is only used for signing.<br>
><br>
> Under previous export restrictions, ciphers with RSA keys shorter (512 bits) than the usual key length of 1024 bits were created. To use these ciphers with RSA keys of usual length, an ephemeral key exchange must be performed, as the normal (certified) key cannot be directly used."<br>
> Basically, it accomplishes this by calling the Open SSL library function, "SSL_CTX_set_tmp_rsa_callback", upon initialization with a callback function whose purpose is to generate the ephemeral RSA key key.<br>
><br>
> Best Regards,<br>
><br>
> Kari Lentz<br>
</div></div></blockquote></div><br></div>