Hello list,

I've questions about how (temporary) RSA keys will be used in a SSL/TLS
handshake. I understand that DH key exchange is the preferred and standard way
to exchange the shared secret. Nevertheless

1) When will RSA key exchange be used? Is this a configuration of the server?

2) Are the functions in /fips/rsa/fips_rsa_x931g.c related to this? Under which
conditions will these functions be called? Server, Client?

3) From the client tool "openssl s_client" is seems to be no visible difference
if a temp. RSA key or the RSA key embedded in the certificate was used. Is this
correct or how can I get more output? In both cases "Cipher: AES256-SHA" will be
shown.

Thanks, Bye
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           majord...@openssl.org

Reply via email to