--On Friday, January 25, 2002 8:12 AM +0100 Lutz Jaenicke 
<[EMAIL PROTECTED]> wrote:


> On Thu, Jan 24, 2002 at 05:14:04PM -0500, Rob Beckers wrote:
>> > From what I understand of the SSL/TLS protocol only the server's
>> > public  key
>> (from the server cert) is used during the handshake. Therefore, do I
>> *have*  to set a cert with SSL_CTX_use_certificate_file() (and a
>> password callback  function) if all I want to do is have an SSL client
>> connect using an SSL  connection and don't care about verifying the
>> server cert in any way?
>
> Search the mailing list archive for discussions about "ADH" ciphers.
>
> Best regards,
>       Lutz

Hi Lutz,

Thanks for your reply (I really appreciate the effort you're putting forth 
on this list!). But you seem to misunderstand my question. I'm talking 
about RSA key-exchange, not Diffie-Hellman. The SSL/TLS protocol seems to 
only use the server public key (from the cert) for the client to encrypt 
the pre-master-secret. There doesn't seem to be any use of the client's 
public key.

So the question is: If no public key is used for the client why do I need 
to set up a cert and key pair for an SSL client? Or can I do without? All 
the sample code I've been looking at calls SSL_CTX_use_certificate_file() 
and SSL_CTX_set_default_passwd_cb(), even for SSL clients. Can I do without 
this?

        Rob
        -/-

        Serv-U Author & Manager
        Cat Soft, LLC

-- This message was entirely written using recycled electrons --
       All about FTP Serv-U v3.1: http://www.Serv-U.com
      FTP Serv-U list: http://www.Serv-U.com/mailinglist
----------------------------------------------------------------
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    [EMAIL PROTECTED]
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to