RE: Openssl 3.0.2- Build error - catgets_failed

2022-04-21 Thread Gaurav Mittal11
=C > echo $LANG C export CC=/opt/aCC/bin/aCC export CFLAGS="+DD64 -mt" export CPPFLAGS="+DD64 -mt" export LDFLAGS="-L/usr/lib/hpux64/" export PATH=/usr/local/bin:/usr/contrib/imake/bin:$PATH #./config --prefix=/opt/openssl/3.0.2 --openssldir=/opt/openssl/3.0.2 --shar

Re: nginx start and stop has issue for openssl engine

2022-04-21 Thread Zhangfei Gao
Hi, I am using openssl engine with nginx. openssl: OpenSSL_1_1_1f If the engine does not include rsa, everythings works well If the engine retister rsa, even the empty IMPLEMENT_DYNAMIC_BIND_FN(bind_fn) bind_fn ENGINE_set_destroy_function(e, destroy_fn); ENGINE_set_RSA(e, RSA_meth_new(&quo

RE: Openssl 3.0.2- Build error - catgets_failed

2022-04-20 Thread Michael Wojcik
> From: openssl-users On Behalf Of Gaurav > Mittal11 > Sent: Wednesday, 20 April, 2022 06:52 > ... > as: "crypto/aes/aes-ia64.s", catgets_failed 2: catgets_failed 1052: > catgets_failed - IDENT A web search isn't turning anything up, but you probably

Openssl 3.0.2- Build error - catgets_failed

2022-04-20 Thread Gaurav Mittal11
Hi, I am using HP-UX B.11.31 U server. While compiling openssl 3.0.2, I am getting below error along with warnings, any help would be appreciated. Warning 67: "include/openssl/txt_db.h", line 12 # Invalid pragma name: 'once' (ignored). # pragma once

Forthcoming OpenSSL Releases

2022-04-19 Thread Matt Caswell
The OpenSSL project team would like to announce the forthcoming release of OpenSSL versions 3.0.3 and 1.1.1o. These releases will be made available on Tuesday 26th April 2022 between 1300-1700 UTC. These are security-fix releases. The highest severity issue fixed in these releases is MODERATE

Linking OpenSSL engine with a third party dynamic library

2022-04-12 Thread Shariful Alam
Hello, I have a custom OpenSSL engine and it is working fine with pthread. I was trying to use a third-party thread library <https://github.com/stonebuddha/uthread> by linking this library with my engine. However, upon linking and running the engine, I'm getting a Segmentation fault. I

Re: Is there a simple implementation of hooking external private key with openssl-3.0 API?

2022-04-11 Thread Matt Caswell
On 11/04/2022 16:53, Alon Bar-Lev wrote: On Mon, Apr 11, 2022 at 11:52 AM Matt Caswell wrote: On 10/04/2022 19:18, Alon Bar-Lev wrote: Hello, I am trying to migrate to openssl-3.0 API, it seems to be very complicated to hook primitive private key usage to a custom function. This is

Re: Is there a simple implementation of hooking external private key with openssl-3.0 API?

2022-04-11 Thread Alon Bar-Lev
On Mon, Apr 11, 2022 at 11:52 AM Matt Caswell wrote: > > > > On 10/04/2022 19:18, Alon Bar-Lev wrote: > > Hello, > > > > I am trying to migrate to openssl-3.0 API, it seems to be very > > complicated to hook primitive private key usage to a custom function. &

Re: Is there a simple implementation of hooking external private key with openssl-3.0 API?

2022-04-11 Thread Matt Caswell
On 10/04/2022 19:18, Alon Bar-Lev wrote: Hello, I am trying to migrate to openssl-3.0 API, it seems to be very complicated to hook primitive private key usage to a custom function. This is required, for example, to use private keys that reside on hardware devices or when an application

Is there a simple implementation of hooking external private key with openssl-3.0 API?

2022-04-10 Thread Alon Bar-Lev
Hello, I am trying to migrate to openssl-3.0 API, it seems to be very complicated to hook primitive private key usage to a custom function. This is required, for example, to use private keys that reside on hardware devices or when an application wishes to externalize private key operations to

Re: Fw: Reg: Memory leaks Using OpenSSL API - Unsure

2022-04-10 Thread pauli
Any chance of running your server under valgrind or similar? This should make the leaks more concrete. Pauli On 10/4/22 6:07 pm, Ram Chandra via openssl-users wrote: Hi, I have recently started developing using OpenSSL and i am confused/unclear about below topic. Request you to help me

Fw: Reg: Memory leaks Using OpenSSL API - Unsure

2022-04-10 Thread Ram Chandra via openssl-users
Hi,  I have recently started developing using OpenSSL and i am confused/unclear about below topic. Request you to help me. I am running a DTLS Server which handles more than 1000 connections.The problem i am facing is every time I close connections and also connect again I see there is some

Re: OpenSSL 3.0 different behaviour on smaller DH groups?

2022-04-05 Thread Michael Richardson
* test suite works, with the only difference > being that the failing suite uses the DH group 14, which is 2048bits, > whereas the one that passes uses the group 1, which the Internet tells > me is 768bits. DH groups of 768bits are considered too weak. I wonder if openssl

OpenSSL 3.0 different behaviour on smaller DH groups?

2022-04-05 Thread Simon Chopin
Hi, I'm working on migrating the Ruby net-ssh package to OpenSSL 3.0 as part of our larger transition in Ubuntu, but there's an issue that I can't figure out. This test suite fails several times with a failed call to EVP_PKEY_derive_set_peer, without much more details: https://git

Re: OpenSSL 3.0.2 PKCS12_parse Failure

2022-04-04 Thread Tomas Mraz
and certificate files. Tomas Mraz On Fri, 2022-04-01 at 18:14 +, vchiliquinga--- via openssl-users wrote: > Hello, >   > Connection between a Openssl 3.0.2 server and a 1.1.1g client is > proving to be unsuccessful. >   > According to the logs collected we seem to be having a

RE: OpenSSL 3.0.2 PKCS12_parse Failure

2022-04-04 Thread vchiliquinga--- via openssl-users
Hello, Seems our email system scrubbed the response to my question because it was a link. Could I ask the response be sent to the follow email instead, chiliquing...@outlook.com Thanks! Message: 3 Date: Fri, 1 Apr 2022 18:14:38 + From: To: Cc: Subject: OpenSSL 3.0.2 PKCS12_parse

RE: [openssl/openssl] bio_dgram vs IPv6

2022-04-01 Thread Michael Wojcik
> From: Michael Richardson > Sent: Friday, 1 April, 2022 07:40 > > Michael Wojcik wrote: > > Actually, in the context of #if expressions, unrecognized tokens > expand to 0 anyway: > > > After all replacements due to macro expansion and the defined unary > > operator have been perfor

OpenSSL 3.0.2 PKCS12_parse Failure

2022-04-01 Thread vchiliquinga--- via openssl-users
Hello, Connection between a Openssl 3.0.2 server and a 1.1.1g client is proving to be unsuccessful. According to the logs collected we seem to be having an issue with the loading of the legacy providers. We are loading both the default and legacy providers programmatically as per the steps

Re: [openssl/openssl] bio_dgram vs IPv6

2022-04-01 Thread Michael Richardson
Michael Wojcik wrote: > Actually, in the context of #if expressions, unrecognized tokens expand to 0 anyway: > After all replacements due to macro expansion and the defined unary > operator have been performed, all remaining identifiers are replaced > with the pp-number 0...

RE: [openssl/openssl] bio_dgram vs IPv6

2022-03-31 Thread Michael Wojcik
> From: Michael Richardson > Sent: Thursday, 31 March, 2022 14:18 > > Michael Wojcik wrote: > > #if defined OPENSSL_SYS_WINDOWS > > # include > > #else > > # include > > #endif > > But, don't all the OPENSSL_* macros expand to 0/1, anyway, so we actually > just want #if OP

RE: [openssl/openssl] bio_dgram vs IPv6

2022-03-31 Thread Michael Wojcik
> From: openssl-users On Behalf Of > Michael Richardson > Sent: Thursday, 31 March, 2022 14:19 > > The clang-9 test fails with: > > # ERROR: @ test/bio_dgram_test_helpers.c:150 > # failed to v6 bind s

Re: [openssl/openssl] bio_dgram vs IPv6

2022-03-31 Thread Michael Richardson
The clang-9 test fails with: # ERROR: @ test/bio_dgram_test_helpers.c:150 # failed to v6 bind socket: Permission denied # # # OPENSSL_TEST_RAND_ORDER=1648577511 not ok 2 - iteration 1 https://github.com/mcr/openssl/runs/5741887864

Re: [openssl/openssl] bio_dgram vs IPv6

2022-03-31 Thread Michael Richardson
Michael Wojcik wrote: > #if defined OPENSSL_SYS_WINDOWS > # include > #else > # include > #endif But, don't all the OPENSSL_* macros expand to 0/1, anyway, so we actually just want #if OPENSSL_SYS_WINDOWS? > (Note C does not require the argument of the operator "defined

Re: OpenSSL Memory Allocation Functions Issue

2022-03-31 Thread Chris
Hi Todd, Thanks for the information. I've looked at compiling. I'm assuming this is the file you're referring to? /usr/local/src/openssl-1.1.1m/configdata.pm What am I looking for in that file? There is no mention of malloc? Do I alter this file before running make clean mak

OpenSSL Memory Allocation Functions Issue

2022-03-30 Thread Chris
Hi All, Experienced an issue with Kamailio which presented with the below error tls_pre_init(): Unable to set the memory allocation functions I have two servers CentOS8 and RHEL8. CentOS8 runs as expected, RHEL8 shows the errors This forum suggested this was related to an OpenSSL

RE: [openssl/openssl] bio_dgram vs IPv6

2022-03-29 Thread Michael Wojcik
> From: openssl-users On Behalf Of Matt > Caswell > Sent: Tuesday, 22 March, 2022 10:31 > > There is already code in bss_dgram.c that is conditionally compiled on > OPENSSL_USE_IPV6. Is it reasonable to assume that if AF_INET6 is defined > then ip6.h exists? I meant to l

Re: [openssl/openssl] bio_dgram vs IPv6

2022-03-29 Thread Michael Richardson
Matt Caswell wrote: > There is already code in bss_dgram.c that is conditionally compiled on > OPENSSL_USE_IPV6. Is it reasonable to assume that if AF_INET6 is > defined then ip6.h exists? I think so, so I changed that code, and also made it consistently use OPENSSL_USE_IPV6, rather

Test script is missing from openssl-1.0.2e.tar.gz onward.

2022-03-28 Thread rahul chauhan
Hi team, I using the openssl-1.0.2u.tar.gz and downloading from below link https://www.openssl.org/source/old/1.0.2/openssl-1.0.2u.tar.gz And I am observing that the *test script* is missing in* "openssl-1.0.2u/crypto/des/t/" *location from openssl-1.0.2e.tar.gz onward. Is there an

Re: Openssl v1.1.1d: pubkey_cb() returning SUCCESS for x509_pubkey_decode() Failure

2022-03-28 Thread Brahmaji K
Got it, thank you Matt. On Mon, Mar 28, 2022 at 6:29 PM Matt Caswell wrote: > > > On 28/03/2022 13:11, Brahmaji K wrote: > > Hi Team, > > > > I'm trying to store the invalid EC certificate as a negative test for my > > application. My application calls the X509_STORE_load_locations() to > > load

Re: Openssl v1.1.1d: pubkey_cb() returning SUCCESS for x509_pubkey_decode() Failure

2022-03-28 Thread Matt Caswell
On 28/03/2022 13:11, Brahmaji K wrote: Hi Team, I'm trying to store the invalid EC certificate as a negative test for my application. My application calls the X509_STORE_load_locations() to load the certificate from a specific path. For invalid EC certificate it is expected to FAIL but it

Openssl v1.1.1d: pubkey_cb() returning SUCCESS for x509_pubkey_decode() Failure

2022-03-28 Thread Brahmaji K
Hi Team, I'm trying to store the invalid EC certificate as a negative test for my application. My application calls the X509_STORE_load_locations() to load the certificate from a specific path. For invalid EC certificate it is expected to FAIL but it is returning the SUCCESS. I have done some deb

RE: Openssl 0.9.8 to 1.0.2u - HP-UX- After installation and softlink created -console does not connect

2022-03-28 Thread Gaurav Mittal11
This will be very interesting and risky for server, will try it. Thank you for information. Regards, Gaurav Mittal -Original Message- From: Tomas Mraz Sent: 25 March 2022 03:30 PM To: Gaurav Mittal11 ; openssl-users@openssl.org Subject: [EXTERNAL] Re: Openssl 0.9.8 to 1.0.2u - HP-UX

Re: Static OpenSSL 3 library with FIPS

2022-03-28 Thread Matt Caswell
was a deliberate day 1 design decision. Matt -Original Message- *From*: Matt Caswell <mailto:matt%20caswell%20%3cm...@openssl.org%3e>> *To*: openssl-users@openssl.org <mailto:openssl-users@openssl.org> *Subject*: [EXTERNAL] Re: Static OpenSSL 3 library with FIPS *Date*: F

RE: Static OpenSSL 3 library with FIPS

2022-03-25 Thread Paul Spencer
%3cm...@openssl.org%3e>> To: openssl-users@openssl.org<mailto:openssl-users@openssl.org> Subject: [EXTERNAL] Re: Static OpenSSL 3 library with FIPS Date: Fri, 25 Mar 2022 20:22:02 + On 25/03/2022 18:33, Paul Spencer wrote: Q: Is it possible to have a static (.a) OpenSSL 3 libra

Re: Static OpenSSL 3 library with FIPS

2022-03-25 Thread Matt Caswell
On 25/03/2022 18:33, Paul Spencer wrote: Q: Is it possible to have a static (.a) OpenSSL 3 library with FIPS support? This was possible with OpenSSL 1.0.2 and the FIPS 2.0.x module (and special linking in the Makefile). However, with SSL3, if I go Configure no-module enable-fips then it

Static OpenSSL 3 library with FIPS

2022-03-25 Thread Paul Spencer
Q: Is it possible to have a static (.a) OpenSSL 3 library with FIPS support? This was possible with OpenSSL 1.0.2 and the FIPS 2.0.x module (and special linking in the Makefile). However, with SSL3, if I go Configure no-module enable-fips then it silently disables FIPS. Is there any way to do

Re: Openssl 0.9.8 to 1.0.2u - HP-UX- After installation and softlink created -console does not connect

2022-03-25 Thread Tomas Mraz
we need new certs and > private keys. > Please help on same or share any documentation on it. >   > Note – 3.0.2 openssl version gives lot of compilation error, this > 1.0.2u openssl version I have got from HP-UX website. > http://hpux.connect.org.uk/hppd/hpux/Development/Li

Openssl 0.9.8 to 1.0.2u - HP-UX- After installation and softlink created -console does not connect

2022-03-25 Thread Gaurav Mittal11
- 3.0.2 openssl version gives lot of compilation error, this 1.0.2u openssl version I have got from HP-UX website. http://hpux.connect.org.uk/hppd/hpux/Development/Libraries/openssl-1.0.2u/ Server details - HP-UX hvdnd73a B.11.31 U ia64 1869095592 unlimited-user license dr-xr-xr-x 2 binbin

Re: Porting asterisk to Openssl-3.0

2022-03-25 Thread Tomas Mraz
On Thu, 2022-03-24 at 22:19 -0600, Philip Prindeville wrote: > Hi, > > I'm incrementally trying to port asterisk to Openssl 3.0. > > First thing I'm trying to do is wean the code off of the RSA_* > functions, and use generic EVP_PKEY_* functions instead. > > Mo

Porting asterisk to Openssl-3.0

2022-03-24 Thread Philip Prindeville
Hi, I'm incrementally trying to port asterisk to Openssl 3.0. First thing I'm trying to do is wean the code off of the RSA_* functions, and use generic EVP_PKEY_* functions instead. Most of it is fairly straightforward (it seems), but I've been looking for examples of reading

Re: [openssl/openssl] bio_dgram vs IPv6

2022-03-22 Thread Matt Caswell
> 3542 is only Informational, but I'd expect most or all platforms with > IPv6 support to conform to it. The issue isn't whether we can expect it to be standard. The issue is what we can use as a signal that the header exists. To date, I don't think that openssl has had

Re: [openssl/openssl] bio_dgram vs IPv6

2022-03-22 Thread Michael Richardson
Matt Caswell wrote: >> Matt Caswell wrote: > Nit; We insert an >> extra space when enclosed within a "#if", i.e. >> >> I assume that this applies recursively? > Yes. >> I think that in some cases the indent could be quite deep. > It hasn't been a major issue so far

Re: [openssl/openssl] bio_dgram vs IPv6

2022-03-22 Thread Michael Richardson
or all platforms with > IPv6 support to conform to it. The issue isn't whether we can expect it to be standard. The issue is what we can use as a signal that the header exists. To date, I don't think that openssl has had to know if IPv6 existed or not on a particular platform.

RE: [openssl/openssl] bio_dgram vs IPv6

2022-03-21 Thread Michael Wojcik
> From: openssl-users On Behalf Of Matt > Caswell > Sent: Monday, 21 March, 2022 05:33 > > Given that OpenSSL already supports IPv6 but we've never needed to > include [netinet/ip6.h], I am wondering what is in that header that needs to > be used? netinet/ip6.h is for

Re: [openssl/openssl] bio_dgram vs IPv6

2022-03-21 Thread Matt Caswell
On 19/03/2022 13:28, Michael Richardson wrote: I'm working on dealing with Matt's detailed review. This issue seems bigger than the github issue. https://github.com/openssl/openssl/pull/5257 about: #include matt> This remains an issue. It's unclear to me whether al

Re: [openssl/openssl] bio_dgram vs IPv6

2022-03-20 Thread Michael Richardson
I'm working on dealing with Matt's detailed review. This issue seems bigger than the github issue. https://github.com/openssl/openssl/pull/5257 about: #include matt> This remains an issue. It's unclear to me whether all of these headers will matt> be available on al

Re: Certificate authority changes with OpenSSL

2022-03-17 Thread Viktor Dukhovni
On Thu, Mar 17, 2022 at 07:51:43PM +0100, egoitz--- via openssl-users wrote: > I think that is the problem, the sha1. That's the specific issue being reported. > So... I have built Openssl 3.0.2 There's no reason for OpenSSL 3.0.2, that might just tighten the restrictions f

RE: Certificate authority changes with OpenSSL

2022-03-17 Thread Michael Wojcik
> From: openssl-users On Behalf Of > egoitz--- via openssl-users > Sent: Thursday, 17 March, 2022 12:52 > 1 - Is it possible to update a whole CA with 2048 bit public and private keys > (I used in req section of openssl.conf, the default_bits to 2048) to a > Signature >

Certificate authority changes with OpenSSL

2022-03-17 Thread egoitz--- via openssl-users
blem comes with the signature algorithm : "Signature Algorithm: sha1WithRSAEncryption". I think that is the problem, the sha1. So... I have built Openssl 3.0.2 and now was planning and thinking which could be the following steps. I have seen that the own CA uses sha1WithRSAEncryption si

Re: TLS KDF and SSH KDF in openssl 1.0.2 (FIPS 140-3)

2022-03-17 Thread Dr Paul Dale
Good luck, the 2.0.16 FOM is nowhere near being 140-3 ready. The Oracle version is much closer but still not quite there: https://github.com/oracle/solaris-openssl-fips Pauli On 17/3/22 19:19, Dhananjay kumar wrote: Hi All, We are looking to go through FIPS 140-3 certification for one of

TLS KDF and SSH KDF in openssl 1.0.2 (FIPS 140-3)

2022-03-17 Thread Dhananjay kumar
Hi All, We are looking to go through FIPS 140-3 certification for one of our products which still runs on openssl 1.0.2(fips object module 2.0.16) version due to some software dependencies. in FIPS 140-3, we are asked to explicitly implement KATs(known answer tests) for below algorithms since

Re: OpenSSL version 1.1.1n published

2022-03-16 Thread Yann Droneaud
Hi, Le 15/03/2022 à 23:49, Matt Caswell a écrit : Those 2 links should be ok now. A problem with our scripts to flush the CDN cache. https://www.openssl.org/news/openssl-1.1.1-notes.html is updated, thanks ! but https://www.openssl.org/news/changelog.html#openssl-111 still shows OpenSSL

Re: Source compilation of OpenSSL 3.0

2022-03-16 Thread Kory Hamzeh
On your build machine, create a staging directory, for example: mkdir /tmp/staging Then run make install like this: make DESTDIR=/tmp/staging install Then copy the files in /tmp/staging to your other machine. Note that you will have to copy the files relative to your —prefix and —openssldir d

Source compilation of OpenSSL 3.0

2022-03-16 Thread ~ Kunal Sharma ~
Hi all, I have the need for compiling version 3.0 source code which I have downloaded and compiling on a Centos 7 system and I'm able to compile just fine. For using it, however, I need to install it on another Centos 7 machine which does not have the compiler tools and required toolchain. So, I

Re: OpenSSL version 1.1.1n published

2022-03-15 Thread Matt Caswell
On 15/03/2022 21:03, Michael Wojcik wrote: From: openssl-users On Behalf Of Yann Droneaud Sent: Tuesday, 15 March, 2022 14:19 At the time of writing neither https://www.openssl.org/news/openssl-1.1.1-notes.html nor https://www.openssl.org/news/changelog.html#openssl-111 are updated to match

Re: OpenSSL version 1.1.1n published

2022-03-15 Thread Matt Caswell
Those 2 links should be ok now. A problem with our scripts to flush the CDN cache. Matt On 15/03/2022 20:18, Yann Droneaud wrote: Hi, Le 15/03/2022 à 17:34, Matt Caswell a écrit :    OpenSSL version 1.1.1n released    ===    OpenSSL - The Open Source toolkit

RE: OpenSSL version 1.1.1n published

2022-03-15 Thread Michael Wojcik
> From: openssl-users On Behalf Of Yann > Droneaud > Sent: Tuesday, 15 March, 2022 14:19 > > At the time of writing neither > https://www.openssl.org/news/openssl-1.1.1-notes.html nor > https://www.openssl.org/news/changelog.html#openssl-111 are updated to > match 1.1.1

Re: OpenSSL version 1.1.1n published

2022-03-15 Thread Yann Droneaud
Hi, Le 15/03/2022 à 17:34, Matt Caswell a écrit :    OpenSSL version 1.1.1n released    ===    OpenSSL - The Open Source toolkit for SSL/TLS    https://www.openssl.org/    The OpenSSL project team is pleased to announce the release of    version 1.1.1n of our

OpenSSL Security Advisory

2022-03-15 Thread Matt Caswell
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 OpenSSL Security Advisory [15 March 2022] Infinite loop in BN_mod_sqrt() reachable when parsing certificates (CVE-2022-0778

OpenSSL version 1.1.1n published

2022-03-15 Thread Matt Caswell
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 OpenSSL version 1.1.1n released === OpenSSL - The Open Source toolkit for SSL/TLS https://www.openssl.org/ The OpenSSL project team is pleased to announce the release of version 1.1.1n of our open

OpenSSL version 3.0.2 published

2022-03-15 Thread Matt Caswell
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 OpenSSL version 3.0.2 released == OpenSSL - The Open Source toolkit for SSL/TLS https://www.openssl.org/ The OpenSSL project team is pleased to announce the release of version 3.0.2 of our open source

Re: openssl-users Digest, Vol 88, Issue 18

2022-03-14 Thread Viktor Dukhovni
On Mon, Mar 14, 2022 at 12:47:26PM -0700, Edward Tsang via openssl-users wrote: > I guess I need to explicitly set X509_STORE_CTX_set_error(ctx, > X509_V_OK) before return 1 in the example if I need caller > SSL_get_verify_result to return X509_V_OK? Yes, but I'd like to strongl

Re: openssl-users Digest, Vol 88, Issue 18

2022-03-14 Thread Edward Tsang via openssl-users
ed to explicitly set X509_STORE_CTX_set_error(ctx, X509_V_OK) before return 1 in the example if I need caller SSL_get_verify_result to return X509_V_OK? On Mon, Mar 14, 2022 at 12:38 PM wrote: > [ External sender. Exercise caution. ] > > Send openssl-users mailing list submissions to >

Re: Question about examples in openssl doc X509_STORE_CTX_verify_cb

2022-03-14 Thread Viktor Dukhovni
On Mon, Mar 14, 2022 at 11:25:51AM -0700, Edward Tsang via openssl-users wrote: > https://www.openssl.org/docs/man1.1.1/man3/X509_STORE_CTX_verify_cb.html > > I am trying to figure out how this example works but it does not seem to > bypass the (use the secon

Question about examples in openssl doc X509_STORE_CTX_verify_cb

2022-03-14 Thread Edward Tsang via openssl-users
link: https://www.openssl.org/docs/man1.1.1/man3/X509_STORE_CTX_verify_cb.html I am trying to figure out how this example works but it does not seem to bypass the (use the second example of X509_V_ERR_CERT_HAS_EXPIRED) However the caller code ll long res = SSL_get_verify_result( sslCtx ); still

Re: DSA signatures in OpenSSL 3.0

2022-03-14 Thread Richard Dymond
t; bit unsigned integers, in network byte order, as required by SSH and > > described in section 6.6 of RFC 4253 (dss_signature_blob)[1]. To do > > this encoding I am calling BN_bn2bin() twice to write 'r' followed by > > 's' at the appropriate locations i

Re: DSA signatures in OpenSSL 3.0

2022-03-14 Thread Tomas Mraz
) twice to write 'r' followed by > 's' at the appropriate locations in a 40-byte buffer. By any chance, > does OpenSSL 3.0 provide any support for encoding a DSA signature > like this from a DSA_SIG (i.e. without having to extract 'r' and 's' > fi

Re: DSA signatures in OpenSSL 3.0

2022-03-14 Thread Richard Dymond
te order, as required by SSH and described in section 6.6 of RFC 4253 (dss_signature_blob)[1]. To do this encoding I am calling BN_bn2bin() twice to write 'r' followed by 's' at the appropriate locations in a 40-byte buffer. By any chance, does OpenSSL 3.0 provide any support for en

Re: DSA signatures in OpenSSL 3.0

2022-03-14 Thread Tomas Mraz
On Fri, 2022-03-11 at 15:21 -0400, Richard Dymond wrote: > Hi > > I recently migrated an application from OpenSSL 1.1.1 to OpenSSL 3.0, > and I'm wondering how best to handle DSA signatures - specifically, > the 'r' and 's' values - in OpenSSL 3.0. &

Re: Openssl s_client verify_ip usage on ip wildcard matching

2022-03-11 Thread Viktor Dukhovni
On Fri, Mar 11, 2022 at 04:40:24PM -0800, Edward Tsang via openssl-users wrote: > Does verify_ip supports leftmost wildcard? I am not aware of any RFC specifying wildcard matching in iPAddress X.509 SANs, and no such feature is implemented in OpenSSL. The SAN syntax is raw binary data

Openssl s_client verify_ip usage on ip wildcard matching

2022-03-11 Thread Edward Tsang via openssl-users
Hi Does verify_ip supports leftmost wildcard? I know that hostname does for SAN and CN. But ip address seems to only support exact match including the port? Is that observation correct? What does it take for verify_ip to support leftmost wildcard matching just like DNS hostname? Thanks

DSA signatures in OpenSSL 3.0

2022-03-11 Thread Richard Dymond
Hi I recently migrated an application from OpenSSL 1.1.1 to OpenSSL 3.0, and I'm wondering how best to handle DSA signatures - specifically, the 'r' and 's' values - in OpenSSL 3.0. In OpenSSL 1.1.1, it was pretty easy: DSA_do_sign() - gets you a DSA_SIG DSA_SIG_get0()

RE: RE: How to create indirect CRL using openssl ca command

2022-03-11 Thread Michael Wojcik
> From: edr > Sent: Friday, 11 March, 2022 03:59 > > On 10.03.2022 20:27, Michael Wojcik wrote: > > Personally, I'd be leery of using openssl ca for anything other than > dev/test purposes, in which case frequent CRL generation seems unlikely to > be a requirement.

Aw: RE: How to create indirect CRL using openssl ca command

2022-03-11 Thread edr
On 10.03.2022 20:17, Michael Ströder via openssl-users wrote: > > Are you 100% sure all the software used by your relying participants is > capable of handling the X509v3 extensions involved? > > In practice I saw software miserably fail validating such certs and CRLs. Or >

RE: How to create indirect CRL using openssl ca command

2022-03-10 Thread Michael Wojcik
> From: openssl-users On Behalf Of > Michael Ströder via openssl-users > Sent: Thursday, 10 March, 2022 12:17 > > On 3/10/22 14:06, edr dr wrote: > > At the same time, I do not want to store passwords used for > > certificate creation in cleartext anywhere. Person

Re: How to create indirect CRL using openssl ca command

2022-03-10 Thread Michael Ströder via openssl-users
that there is not something like an OpenSSL key agent (similar to ssh-agent) for interactively loading the CA's private key into memory during service start. My current approach to achieve this is a separate CA only responsible for revocation. My understanding is that such a CA is called an

How to create indirect CRL using openssl ca command

2022-03-10 Thread edr dr
Dear all, I am building a private PKI using the openssl "ca" functionality. My setup includes a root CA that issues intermediate certificates and intermediate CAs issuing endpoint certificates. I would like to be able to automate the process of updating CRLs in order to be able to ke

Forthcoming OpenSSL releases

2022-03-08 Thread Matt Caswell
The OpenSSL project team would like to announce the forthcoming release of OpenSSL versions 3.0.2 and 1.1.1n. These releases will be made available on Tuesday 15th March 2022 between 1300-1700 UTC. These are security-fix releases. The highest severity issue fixed in these releases is HIGH

RE: Upgrade openssl 1.0.2 to 1.1.1 guideline

2022-03-08 Thread Dr. Matthias St. Pierre
The following wiki page might serve as a starting point: https://wiki.openssl.org/index.php/OpenSSL_1.1.0_Changes HTH, Matthias > -Original Message- > From: openssl-users On Behalf Of Yan, Bob > via openssl-users > Sent: Tuesday, March 8, 2022 5:48 PM > To: openssl-us

Upgrade openssl 1.0.2 to 1.1.1 guideline

2022-03-08 Thread Yan, Bob via openssl-users
Hi All, Is there any guideline for upgrading openssl version from 1.0.2 to 1.1.1? Thanks Bob

Re: How OpenSSL connections work

2022-03-06 Thread Corey Minyard
On Sun, Mar 06, 2022 at 02:39:55AM +, loic nicolas wrote: > Hello, > > I can't figure out how OpenSSL connections work. > > I would like to use 2 bios (rbio, wbio) which will be shared for all my > connections. I'm not sure why you would want to do this. Why wo

How OpenSSL connections work

2022-03-05 Thread loic nicolas
Hello, I can't figure out how OpenSSL connections work. I would like to use 2 bios (rbio, wbio) which will be shared for all my connections. The problem is that I really don't understand the error messages. I never get an SSL_ERROR_WANT_WRITE error code, I only get SSL_ERROR_WANT_

Re: OpenSSL 3.0 LTS

2022-03-04 Thread The Doctor via openssl-users
On Fri, Mar 04, 2022 at 02:31:01PM +, Short, Todd wrote: > Apple uses LibreSSL, not OpenSSL, in their recent OSes: > > ~$ openssl version -a > LibreSSL 2.8.3 > built on: date not available > platform: information not available > options: bn(64,64) rc4(16x,int) des(idx,

Re: OpenSSL 3.0 LTS

2022-03-04 Thread Short, Todd via openssl-users
Apple uses LibreSSL, not OpenSSL, in their recent OSes: ~$ openssl version -a LibreSSL 2.8.3 built on: date not available platform: information not available options: bn(64,64) rc4(16x,int) des(idx,cisc,16,int) blowfish(idx) compiler: information not available OPENSSLDIR: "/private/et

Re: OpenSSL 3.0 LTS

2022-03-04 Thread The Doctor via openssl-users
On Fri, Mar 04, 2022 at 11:04:00AM +, Matt Caswell wrote: > OpenSSL 3.0 has recently been designated as a Long Term Support (LTS) > release. This means that it will now be supported until 7th September > 2026 (5 years after its initial release). > > Our previous LTS relea

OpenSSL 3.0 LTS

2022-03-04 Thread Matt Caswell
OpenSSL 3.0 has recently been designated as a Long Term Support (LTS) release. This means that it will now be supported until 7th September 2026 (5 years after its initial release). Our previous LTS release (1.1.1) will continue to be supported until 11th September 2023. We encourage all

Re: Question about OpenSSL 3.0 and static linking

2022-02-23 Thread Shunichi Shinohara
Thank you very much for your quick and great replies, Pauli, Richard and Matt!! > ./config --prefix=$HOME/local/openssl-3.0.1 no-shared no-module With this options, it works perfectly! Thanks again, Shino 2022年2月22日(火) 17:46 Richard Levitte : > > 'no-module' will d

Re: error with cipher EVP_des_ede3_cbc in openssl 3.0

2022-02-23 Thread Matt Caswell
3DES is in the default provider - only normal DES is in the legacy provider. So you should not need to load the legacy provider for this to work. Matt On 23/02/2022 06:20, pa...@openssl.org wrote: Have you loaded the legacy provider before trying this? Pauli On 23/2/22 5:03 pm, Srinivas, S

Re: error with cipher EVP_des_ede3_cbc in openssl 3.0

2022-02-22 Thread pauli
Have you loaded the legacy provider before trying this? Pauli On 23/2/22 5:03 pm, Srinivas, Saketh (c) wrote: Hi I am trying to encrypt and decrypt using EVP_des_ede3_cbc() type.  iam using openssl3.0 _ _ the functions i am using are encryption side: EVP_EncryptIni

error with cipher EVP_des_ede3_cbc in openssl 3.0

2022-02-22 Thread Srinivas, Saketh (c)
Hi I am trying to encrypt and decrypt using EVP_des_ede3_cbc() type. iam using openssl3.0 the functions i am using are encryption side: EVP_EncryptInit_ex -> EVP_EncryptUpdate -> EVP_EncryptFinal_ex decryption side: -- EVP_DecryptInit_ex -> EVP_

Re: Question about OpenSSL 3.0 and static linking

2022-02-22 Thread Matt Caswell
22/2/22 5:37 pm, Shunichi Shinohara wrote: Hi List, I have a question about OpenSSL 3.0 and static linking. Short version: Is it possible to include the legacy provider in libcrypt.a? Somewhat long version below. As a background of the question I'm using OpenSSL with Erlang/OTP [1] on Linu

Re: Question about OpenSSL 3.0 and static linking

2022-02-22 Thread Richard Levitte
'no-module' will do what you want. I noticed, though, that the documentation in INSTALL.md isn't entirely clear on what that does. ./config --prefix=$HOME/local/openssl-3.0.1 no-shared no-module Cheers, Richard On Tue, 22 Feb 2022 07:37:03 +0100, Shunichi Shinohara wrot

Re: Question about OpenSSL 3.0 and static linking

2022-02-21 Thread pauli
There is a define to allow this: STATIC_LEGACY but I don't remember how to specify it on the configuration command line. We should probably turn this on in a no-shared build. Pauli On 22/2/22 5:37 pm, Shunichi Shinohara wrote: Hi List, I have a question about OpenSSL 3.0 and static li

Question about OpenSSL 3.0 and static linking

2022-02-21 Thread Shunichi Shinohara
Hi List, I have a question about OpenSSL 3.0 and static linking. Short version: Is it possible to include the legacy provider in libcrypt.a? Somewhat long version below. As a background of the question I'm using OpenSSL with Erlang/OTP [1] on Linux and want to static link OpenSSL library.

Re: OpenSSL 3.0 FIPS module configuration file

2022-02-16 Thread Richard Dymond
onfiguration checksum - that means the selftest will be > always run when the FIPS module (i.e., the fips provider) is loaded. > Thanks for the info! I was wondering whether there was a FIPS-compliant way to use fips.dll on a machine without first having to run 'openssl fipsinstall' on tha

Re: OpenSSL 3.0 FIPS module configuration file

2022-02-15 Thread Tomas Mraz
li >   >   > On 15/2/22 02:25, Richard Dymond wrote: >   > >   > > Hi > > > > Probably a dumb question, but why must the FIPS module > > configuration file for OpenSSL 3.0 be generated on every machine > > that it is to be used on (i.e. must not be copied from on

Re: OpenSSL 3.0 FIPS module configuration file

2022-02-14 Thread Dr Paul Dale
b question, but why must the FIPS module configuration file for OpenSSL 3.0 be generated on every machine that it is to be used on (i.e. must not be copied from one machine to another)? I just ran 'openssl fipsinstall' on two different machines with the same FIPS module and it produce

Re: OpenSSL 3.0 FIPS module configuration file

2022-02-14 Thread Dr Paul Dale
opying the configuration file across avoids the self tests and therefore isn't compliant. Pauli On 15/2/22 02:25, Richard Dymond wrote: Hi Probably a dumb question, but why must the FIPS module configuration file for OpenSSL 3.0 be generated on every machine that it is to

Re: OpenSSL 3.0 FIPS module configuration file

2022-02-14 Thread Thomas Dwyer III
ote: > > Hi > > Probably a dumb question, but why must the FIPS module configuration file > for OpenSSL 3.0 be generated on every machine that it is to be used on > (i.e. must not be copied from one machine to another)? > > I just ran 'openssl fipsinstall' on tw

Re: OpenSSL 3.0 FIPS module configuration file

2022-02-14 Thread Ma Ar
cross avoids the self tests and therefore isn't compliant. Pauli On 15/2/22 02:25, Richard Dymond wrote: Hi Probably a dumb question, but why must the FIPS module configuration file for OpenSSL 3.0 be generated on every machine that it is to be used on (i.e. must not be copied from one

<    1   2   3   4   5   6   7   8   9   10   >