Bug report: dtls handshake loops after 'certificate verify' packet loss
OpenSSL version 1.0.1c
OS: Linux (Open SUSE 10.3)
Using DTLS back to back with client certificate verification enabled,
the handshake sequence enters a loop if the first packet containing the
'certificate verify' message
We've been having regular build problems on Windows: sometimes nasm
claims there are unresolved symbols. For example:
set ASM=nasm -f win64 -DNEAR -Ox -g
perl crypto\x86_64cpuid.pl tmp32dll.dbg\x86_64cpuid.asm
nasm -f win64 -DNEAR -Ox -g -o tmp32dll.dbg\x86_64cpuid.obj
On 14.01.2013 22:55, Dave Thompson wrote:
Yes, but. By default (i.e. not using an engine, which
may impose limits) you can generate an RSA keypair of
practically any size you like.
Hi Dave, you can try, but ...
OpenSSL will give you not always the keysize back that you requested ;-)
try