Hello list, I've questions about how (temporary) RSA keys will be used in a SSL/TLS handshake. I understand that DH key exchange is the preferred and standard way to exchange the shared secret. Nevertheless
1) When will RSA key exchange be used? Is this a configuration of the server? 2) Are the functions in /fips/rsa/fips_rsa_x931g.c related to this? Under which conditions will these functions be called? Server, Client? 3) From the client tool "openssl s_client" is seems to be no visible difference if a temp. RSA key or the RSA key embedded in the certificate was used. Is this correct or how can I get more output? In both cases "Cipher: AES256-SHA" will be shown. Thanks, Bye ______________________________________________________________________ OpenSSL Project http://www.openssl.org User Support Mailing List openssl-users@openssl.org Automated List Manager majord...@openssl.org