Re: CA upgrade in several aspects

2022-05-13 Thread egoitz--- via openssl-users
Hi Mark! Thank you so much for answering. I think that the process of issuing a new ca cert (for replacing the old ca cert with a new a certificate with more bits and better signing algorithms) should be : - Generate in the own ca a new ca cert. - Replace in openssl.conf which ca cert and

Re: Compiling OpenSSL using a different SDK

2022-05-13 Thread Philip Prindeville
Openssl already supports cross-compiles, since OpenWRT and Yocto/OpenEmbedded use it as-is. https://github.com/openwrt/openwrt/blob/master/package/libs/openssl/Makefile#L328..L357 > On May 6, 2022, at 6:25 AM, ~ Kunal Sharma ~ wrote: > > Hi friends, > > My objective is to compile OpenSSL

Re: AES and EVP_CIPHER question

2022-05-13 Thread Philip Prindeville
> On May 13, 2022, at 10:34 AM, Matt Caswell wrote: > > > > On 13/05/2022 16:49, Philip Prindeville wrote: >> Hi, >> I'm trying to rewrite some legacy AES_* code to use EVP_CIPHER_* so it's >> forward compatible into 3.x. >> My code, in a nutshell, looks like: >> static int

Re: AES and EVP_CIPHER question

2022-05-13 Thread Philip Prindeville
Here's a simple/stupid test program and its output, running on Ubuntu 20.04 LTS: OpenSSL 1.1.1f 31 Mar 2020 EVP_CIPHER_CTX_new returns 0x5627171042a0 EVP_CipherInit returns 1 EVP_CipherUpdate returns 1, outlen = 0 buf: 'Mary had a littl' EVP_CipherFinal returns 0, finallen = 0 buf: 'Mary had a

Re: AES and EVP_CIPHER question

2022-05-13 Thread Philip Prindeville
> On May 13, 2022, at 10:55 AM, Philip Prindeville > wrote: > > > >> On May 13, 2022, at 10:34 AM, Matt Caswell wrote: >> >> >> >> On 13/05/2022 16:49, Philip Prindeville wrote: >>> Hi, >>> I'm trying to rewrite some legacy AES_* code to use EVP_CIPHER_* so it's >>> forward compatible

Re: AES and EVP_CIPHER question

2022-05-13 Thread Matt Caswell
On 13/05/2022 16:49, Philip Prindeville wrote: Hi, I'm trying to rewrite some legacy AES_* code to use EVP_CIPHER_* so it's forward compatible into 3.x. My code, in a nutshell, looks like: static int evp_cipher_aes_decrypt(const unsigned char *in, unsigned char *out, unsigned inlen,

openssl 1.1.1 minor patches to build on SCO OpenServer 5.0.7

2022-05-13 Thread Kevin R. Bulgrien
It was necessary to apply 5 minor patches to openssl 1.1.1n to build it for SCO OpenServer 5.0.7. One patch fixing a missing #ifdef AF_INET6 is already applied to current development for this base version. The reason for the build is to get TLS1.3 capability on an ancient system. As it is

Re: openssl 1.1.1 minor patches to build on SCO OpenServer 5.0.7

2022-05-13 Thread Kevin R. Bulgrien
> It was necessary to apply 5 minor patches to openssl 1.1.1n to build it for > SCO OpenServer 5.0.7. One patch fixing a missing #ifdef AF_INET6 is > already applied to current development for this base version. Though the prior e-mail references 1.1.1n, the information in it is equally

AES and EVP_CIPHER question

2022-05-13 Thread Philip Prindeville
Hi, I'm trying to rewrite some legacy AES_* code to use EVP_CIPHER_* so it's forward compatible into 3.x. My code, in a nutshell, looks like: static int evp_cipher_aes_decrypt(const unsigned char *in, unsigned char *out, unsigned inlen, const ast_aes_decrypt_key *key) { EVP_CIPHER_CTX

Problem Compiling Fetchmail 7 with Openssl 3

2022-05-13 Thread Dennis Putnam
I am trying to compile fetchmail 7 (which requires Openssl 3) on my CentOS 7 system. I installed Openssl 3 from source and it seems to be working as expected. However, when I try to compile fetchmail 7 it fails with these errors: undefined reference to `OpenSSL_version' undefined reference to