[openssl.org #2958] Bug report: dtls handshake loops after 'certificate verify' packet loss

2013-01-16 Thread Kevin Dempsey via RT
Bug report: dtls handshake loops after 'certificate verify' packet loss OpenSSL version 1.0.1c OS: Linux (Open SUSE 10.3) Using DTLS back to back with client certificate verification enabled, the handshake sequence enters a loop if the first packet containing the 'certificate verify' message

Windows: race condition (perl/nasm) building OpenSSL

2013-01-16 Thread Bruce Cran
We've been having regular build problems on Windows: sometimes nasm claims there are unresolved symbols. For example: set ASM=nasm -f win64 -DNEAR -Ox -g perl crypto\x86_64cpuid.pl tmp32dll.dbg\x86_64cpuid.asm nasm -f win64 -DNEAR -Ox -g -o tmp32dll.dbg\x86_64cpuid.obj

Re: RSA_generate_key KEY_LENGTH

2013-01-16 Thread Annie
On 14.01.2013 22:55, Dave Thompson wrote: Yes, but. By default (i.e. not using an engine, which may impose limits) you can generate an RSA keypair of practically any size you like. Hi Dave, you can try, but ... OpenSSL will give you not always the keysize back that you requested ;-) try