RE: *** Spam *** Re: 0.9.8 RSA 2048, was Re: Need understanding on certutil output.

2014-03-18 Thread Dave Thompson
...@openssl.org [mailto:owner-openssl-us...@openssl.org] On Behalf Of Kyle Hamilton Sent: Monday, March 17, 2014 01:34 To: openssl-users Subject: *** Spam *** Re: 0.9.8 RSA 2048, was Re: Need understanding on certutil output. What is your platform? When were each of 0.9.8 (unpatched, it appears) and

Re: 0.9.8 RSA 2048, was Re: Need understanding on certutil output.

2014-03-16 Thread Kyle Hamilton
What is your platform? When were each of 0.9.8 (unpatched, it appears) and 1.0.0d compiled? What toolchains were used to compile them? -Kyle H On Sun, Mar 16, 2014 at 8:42 PM, Mithun Kumar wrote: > > Hello Dave, > > When client gets server certificate(SQLServer) and tries to validate it we >

Re: 0.9.8 RSA 2048, was Re: Need understanding on certutil output.

2014-03-16 Thread Mithun Kumar
Hello Dave, When client gets server certificate(SQLServer) and tries to validate it we get "ASN1_F_ASN1_CHECK_TLEN" "ASN1_R_WRONG_TAG" error. i could parse the cert successfully and also dump the asn.1. I cant connect using s_client as it hangs. When i add logs to the openssl code i see that Fi

0.9.8 RSA 2048, was Re: Need understanding on certutil output.

2014-03-14 Thread Dave Thompson
OpenSSL has long limited RSA key moduli to 16384 bits, far more than 2048. It also has limits on other kinds of keys; if you meant to ask about them, be specific. Do you really mean 0.9.8 with no suffix? Vanilla or patched? The oldest and newest 0.9.8 versions I have installed (g and x) hand