That's good to know. Thank you.

On 4/20/22, Tassilo Philipp <tphil...@potion-studios.com> wrote:
> Looks to me as it has to have exactly 32 chars.
>  From crypto.c:
>
>    #define KEY_SIZE        32
>
>    ...
>
>    static struct crypto_ctx {
>        unsigned char       key[KEY_SIZE];
>    } cp;
>
>    ...
>
>    int
>    crypto_setup(const char *key, size_t len)
>    {
>        if (len != KEY_SIZE)
>            return 0;
>        ...
>    }
>
>
> I only had a cursory look, so no maybe there are other checks somewhere.
>
> hth
>
>
> On Wed, Apr 20, 2022 at 03:52:38PM +0100, Josey Smith wrote:
>> Hi all.
>>
>> I'm on OpenSMTPD 7.0.0 and am trying out queue encryption.
>>
>> Almost any key that I try errors with "smtpd: crypto_setup:invalid key
>> for queue encryption".
>>
>> If I use "openssl rand -hex 16" (which I found in an example on
>> Gilles's site -
>> https://poolp.org/posts/2013-04-26/opensmtpd-table_proc-queue_proc-crypto-queue-and-other-stuff/)
>>
>> it always seems to work, but if I increase the number it often fails.
>>
>> So, mostly out of curiosity, I was wondering what are the limitations
>> for a valid queue encryption key?
>>
>> As a side note, if I check my config (smtpd -n) while queue encryption
>> is set to "-" or "stdin" I get the same error message (although the
>> server still seems to work). Is that a bug?
>>
>> Josey
>>
>

Reply via email to