RE: openssl 1..0.1e -bad sig size 32 32 for DSA 2048 keys

2013-06-03 Thread Dave Thompson
> From: owner-openssl-us...@openssl.org On Behalf Of no_spam...@yahoo.com > Sent: Monday, 03 June, 2013 11:18 > To: openssl-users@openssl.org > Subject: Re: openssl 1..0.1e -bad sig size 32 32 for DSA 2048 keys > > My understanding is that 2048-bit DSA keys (with |q|=256

Re: openssl 1..0.1e -bad sig size 32 32 for DSA 2048 keys

2013-06-03 Thread no_spam_98
u can actually get OpenSSL to produce such a key.  If I'm wrong on this point, someone please correct me.) > > From: Cipher >To: openssl-users@openssl.org >Sent: Monday, June 3, 2013 2:12 AM >Subject: RE: openssl 1..0.1e -bad sig size 32 32

RE: openssl 1..0.1e -bad sig size 32 32 for DSA 2048 keys

2013-06-03 Thread Cipher
Thanks for the quick reply. Since FIPS-140-3 may limit DSA key limit to be not less than 2048, Is there a chance of 2048 DSA key support in the near future upstream versions of openssl? Thanks. -- View this message in context: http://openssl.6102.n7.nabble.com/openssl-1-0-1e-bad-sig-size-32-3

RE: openssl 1..0.1e -bad sig size 32 32 for DSA 2048 keys

2013-05-22 Thread Dave Thompson
> From: owner-openssl-us...@openssl.org On Behalf Of Cipher > Sent: Monday, 20 May, 2013 11:07 > I built and installed openssl 1.0.1e. When i try to connect > using ssh with > 2048 DSA keys, i get *bad sig size 32 32* error. > Is this a bug? > Here is how i created the keys. > openssh (through

openssl 1..0.1e -bad sig size 32 32 for DSA 2048 keys

2013-05-21 Thread Cipher
Hi, I built and installed openssl 1.0.1e. When i try to connect using ssh with 2048 DSA keys, i get *bad sig size 32 32* error. Is this a bug? Here is how i created the keys. openssl version OpenSSL 1.0.1e-fips 11 Feb 2013 openssl dsaparam -out dsaparam.pem 2048 openssl gendsa -out ssh_dsa_key