Re: OpenSSL 3.4.0 - Key too small error with key size 1024

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Yes, you have to set the security level to 0 to be able to use 1024 bit
RSA and DH keys. You can use SSL_CTX_set_security_level() function to
do this.

Of course you should do it only for legacy purposes as such short keys
do not provide sufficient security protections.

Tomas Mraz, OpenSSL

On Fri, 2024-12-20 at 19:39 +0530, 'Samiya Khanum' via openssl-users
wrote:
> Hi all,
> With openssl 3.4.0 code we are able to generate certificates with key
> size 1024 and DH param size 1024. Getting the below error when trying
> to use  these certificates for launching a secure http server. 
> 
> SSL connect err code:[167772559](error:0A00018F:SSL routines::ee key
> too small)
> Error is ee key too small 
> 
> We would like to know is  openSSL 3.4.0 supports certificate key size
> 1024.
> Same api(SSL_CTX_use_certificate) is working fine in 3.1.6.
> 
> Is any configuration required to support key size 1024 for legacy
> applications interaction
> 
> /// Code snippet
>  int err = 0;
> SSL_CTX  *ctx = NULLPTR;
> EVP_PKEY *pkey = NULLPTR;
> X509     *cert = NULLPTR;
> SSL_load_error_strings();
>  ERR_load_crypto_strings();
> 
>  ctx = SSL_CTX_new(SSLv23_method());
>  if (ctx == NULL){
>       printf("ssl ctx create error");
>       return -1
>   }
>   fp = opensslFileOpen("mycert.pem");
>   if (fp == NULL) {
>       printf("file open error");
>       return -1
>   }
>   cert = PEM_read_X509(fp, NULL, NULL, NULL);
>   if (cert == NULL) {
>       printf("file open error");
>      return -1
>   }
>   if (!SSL_CTX_use_certificate(ctx, cert)) {
>       int err = 0;
>       if((err = ERR_get_error())) {
>          printf("SSL connect err code:[%d](%s)\n", err,
> ERR_error_string(err, NULL));
>          printf("Error is %s \n",ERR_reason_error_string(err));
>          return  -1;
>     }
> }
>  
> 
> Thanks & Regards,
> Samiya khanum
> 
> This electronic communication and the information and any files
> transmitted with it, or attached to it, are confidential and are
> intended solely for the use of the individual or entity to whom it is
> addressed and may contain information that is confidential, legally
> privileged, protected by privacy laws, or otherwise restricted from
> disclosure to anyone else. If you are not the intended recipient or
> the person responsible for delivering the e-mail to the intended
> recipient, you are hereby notified that any use, copying,
> distributing, dissemination, forwarding, printing, or copying of this
> e-mail is strictly prohibited. If you received this e-mail in error,
> please return the e-mail to the sender, delete it from your computer,
> and destroy any printed copy of it.
> -- 
> You received this message because you are subscribed to the Google
> Groups "openssl-users" group.
> To unsubscribe from this group and stop receiving emails from it,
> send an email to openssl-users+unsubscribe@xxxxxxxxxxx.
> To view this discussion visit
> https://groups.google.com/a/openssl.org/d/msgid/openssl-users/CADmX34qez3Cjs-bzx5QVtUOuqkuo728ZqumQN%3DHeEx-c29%2BW0w%40mail.gmail.com
> .

-- 
Tomáš Mráz, OpenSSL

-- 
You received this message because you are subscribed to the Google Groups "openssl-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email to openssl-users+unsubscribe@xxxxxxxxxxx.
To view this discussion visit https://groups.google.com/a/openssl.org/d/msgid/openssl-users/1560d7c89e2f3f8591ef261cbe09c1521b6c3e8e.camel%40openssl.org.




[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Index of Archives]     [Linux ARM Kernel]     [Linux ARM]     [Linux Omap]     [Fedora ARM]     [IETF Annouce]     [Security]     [Bugtraq]     [Linux]     [Linux OMAP]     [Linux MIPS]     [ECOS]     [Asterisk Internet PBX]     [Linux API]

  Powered by Linux