[Mono-bugs] [Bug 69805][Nor] Changed - SslClientStream - Server Certificate Validation
bugzilla-daemon@bugzilla.ximian.com
bugzilla-daemon@bugzilla.ximian.com
Sat, 27 Nov 2004 09:43:24 -0500 (EST)
Please do not reply to this email- if you want to comment on the bug, go to the
URL shown below and enter your comments there.
Changed by sebastien@ximian.com.
http://bugzilla.ximian.com/show_bug.cgi?id=69805
--- shadow/69805 2004-11-27 08:08:54.000000000 -0500
+++ shadow/69805.tmp.6870 2004-11-27 09:43:24.000000000 -0500
@@ -300,6 +300,22 @@
cs:line 429
at Mono.Security.Protocol.Tls.SslClientStream.Read(Byte[] buffer,
Int32 offset, Int32 count) in
e:\mcs\class\Mono.Security\Mono.Security.Protocol.Tls\SslClientStream.
cs:line 615
at Indy.Sockets.Tls.IOHandlerTls.SetPassThrough(Boolean AValue)
+
+------- Additional Comments From sebastien@ximian.com 2004-11-27 09:43 -------
+Sorry if there's a misunderstanding but this isn't what I asked (this
+information was already in the bug report).
+
+As the first (interesting) exception is catched when validating the
+certificates then the supplied exception doesn't give me any clue to
+work with.
+
+For the record what your seeing is probably...
+
+On Windows creating a RSACryptoServiceProvider instance ALWAYS
+generates a new keypair. As the previous data is "bad" then it's very
+possible that the code is trying to create such an instance using 0 as
+the size (thus the invalid key size message).
+