-
Enhancement
-
Resolution: Fixed
-
P3
-
6u85
-
b01
Issue | Fix Version | Assignee | Priority | Status | Resolution | Resolved In Build |
---|---|---|---|---|---|---|
JDK-8138928 | 7u95 | Sean Coffey | P3 | Resolved | Fixed | b03 |
JDK-8078196 | 7u91 | Sean Coffey | P3 | Resolved | Fixed | b01 |
JDK-8137303 | 7u85 | Sean Coffey | P3 | Resolved | Fixed | b34 |
JDK-8075940 | 6u95 | Sean Coffey | P3 | Resolved | Fixed | interim-patch |
java.lang.RuntimeException: Could not generate DH keypair and
java.security.InvalidAlgorithmParameterException: Prime size must be multiple of 64, and can only range from 512 to 1024 (inclusive).
- backported by
-
JDK-8075940 Allow DHKeyPair generation for bit lengths > 1024 in 6u, 7u
- Resolved
-
JDK-8078196 Allow DHKeyPair generation for bit lengths > 1024 in 6u, 7u
- Resolved
-
JDK-8137303 Allow DHKeyPair generation for bit lengths > 1024 in 6u, 7u
- Resolved
-
JDK-8138928 Allow DHKeyPair generation for bit lengths > 1024 in 6u, 7u
- Resolved
-
JDK-8133229 Allow DHKeyPair generation for bit lengths > 1024 in 6u, 7u
- Closed
- duplicates
-
JDK-8137048 Handshake exception - Could not generate DH keypair
- Closed
- relates to
-
JDK-7044060 Need to support NSA Suite B Cryptography algorithms
- Closed
-
JDK-7196382 PKCS11 provider should support 2048-bit DH
- Closed
-
JDK-8301700 Increase the default TLS Diffie-Hellman group size from 1024-bit to 2048-bit
- Resolved