> From: owner-openssl-us...@openssl.org On Behalf Of no_spam...@yahoo.com
> Sent: Monday, 03 June, 2013 11:18
> To: openssl-users@openssl.org
> Subject: Re: openssl 1..0.1e -bad sig size 32 32 for DSA 2048 keys
>
> My understanding is that 2048-bit DSA keys (with |q|=256
u
can actually get OpenSSL to produce such a key. If I'm wrong on this point,
someone please correct me.)
>
> From: Cipher
>To: openssl-users@openssl.org
>Sent: Monday, June 3, 2013 2:12 AM
>Subject: RE: openssl 1..0.1e -bad sig size 32 32
Thanks for the quick reply.
Since FIPS-140-3 may limit DSA key limit to be not less than 2048, Is there
a chance of 2048 DSA key support in the near future upstream versions of
openssl?
Thanks.
--
View this message in context:
http://openssl.6102.n7.nabble.com/openssl-1-0-1e-bad-sig-size-32-3
> From: owner-openssl-us...@openssl.org On Behalf Of Cipher
> Sent: Monday, 20 May, 2013 11:07
> I built and installed openssl 1.0.1e. When i try to connect
> using ssh with
> 2048 DSA keys, i get *bad sig size 32 32* error.
> Is this a bug?
> Here is how i created the keys.
>
openssh (through
Hi,
I built and installed openssl 1.0.1e. When i try to connect using ssh with
2048 DSA keys, i get *bad sig size 32 32* error.
Is this a bug?
Here is how i created the keys.
openssl version
OpenSSL 1.0.1e-fips 11 Feb 2013
openssl dsaparam -out dsaparam.pem 2048
openssl gendsa -out ssh_dsa_key