else if (!*dkim_identity_expanded)
dkim_identity_expanded = NULL;
- /*XXX so we currently nail signing to RSA + this hash.
- Need to extract algo from privkey and check for disallowed combos. */
-
if (!(sig = pdkim_init_sign(&ctx, dkim_signing_domain,
dkim_signing_selector,
dkim_private_key_expanded,
{ file = NULL; dir = expcerts; }
else
{
- /*XXX somewhere down here we leak memory per-STARTTLS, on a multi-message conn, server-side */
file = expcerts; dir = NULL;
#ifndef DISABLE_OCSP
/* In the server if we will be offering an OCSP proof, load chain from