> It seems to me that NO_RSA is not fine-grain enough, and that I'm going
> to have to go into ssl and crypto/rsa and add some of my own #ifdef's.

Sounds like an excellent idea - go for it (and persuade Eric to integrate it!)

> While I'm here, an unrelated question:  I am going to be creating my DSA
> keypair for every SSL context.  (Yes, the server cert will be a session key:)
> Anyone foresee any problems with this?

Why don't you use EDH by creating a DH keypair? The main pitfall here is that
you need a good RNG on the server, which is not otherwise needed for SSL.
You'll also have to add a SSL_CTX_set_tmp_dh() call to your working SSLeay/RSA
code.  This means loading a set of DH params, probably generated using "gendh"
and loaded using PEM_read_bio_DHparams().

-- 
Clifford Heath                    http://www.osa.com.au/~cjh
Open Software Associates Limited       mailto:[EMAIL PROTECTED]
29 Ringwood Street / PO Box 4414       Phone  +613 9871 1694
Ringwood VIC 3134      AUSTRALIA       Fax    +613 9871 1711
------------------------------------------------------------
Deploy Applications across the net, see http://www.osa.com


+-------------------------------------------------------------------------+
| Administrative requests should be sent to [EMAIL PROTECTED] |
| List service provided by Open Software Associates, http://www.osa.com/  |
+-------------------------------------------------------------------------+

Reply via email to