[Mono-bugs] [Bug 69805][Nor] Changed - SslClientStream - Server Certificate Validation

bugzilla-daemon@bugzilla.ximian.com bugzilla-daemon@bugzilla.ximian.com
Sat, 27 Nov 2004 09:43:24 -0500 (EST)


Please do not reply to this email- if you want to comment on the bug, go to the
URL shown below and enter your comments there.

Changed by sebastien@ximian.com.

http://bugzilla.ximian.com/show_bug.cgi?id=69805

--- shadow/69805	2004-11-27 08:08:54.000000000 -0500
+++ shadow/69805.tmp.6870	2004-11-27 09:43:24.000000000 -0500
@@ -300,6 +300,22 @@
 cs:line 429
    at Mono.Security.Protocol.Tls.SslClientStream.Read(Byte[] buffer, 
 Int32 offset, Int32 count) in 
 e:\mcs\class\Mono.Security\Mono.Security.Protocol.Tls\SslClientStream.
 cs:line 615
    at Indy.Sockets.Tls.IOHandlerTls.SetPassThrough(Boolean AValue)
+
+------- Additional Comments From sebastien@ximian.com  2004-11-27 09:43 -------
+Sorry if there's a misunderstanding but this isn't what I asked (this
+information was already in the bug report). 
+
+As the first (interesting) exception is catched when validating the
+certificates then the supplied exception doesn't give me any clue to
+work with.
+
+For the record what your seeing is probably...
+
+On Windows creating a RSACryptoServiceProvider instance ALWAYS
+generates a new keypair. As the previous data is "bad" then it's very
+possible that the code is trying to create such an instance using 0 as
+the size (thus the invalid key size message).
+