blob: 8fafbb2a6b180413839d3648523d5bd9b87cedeb [file] [log] [blame]
Ulf Möllerf9a7c342000-02-23 17:03:06 +00001OpenSSL - Frequently Asked Questions
2--------------------------------------
3
Richard Levitte0ae485d2000-11-30 13:04:14 +00004[MISC] Miscellaneous questions
5
Ulf Möller49976df2000-02-23 23:46:17 +00006* Which is the current version of OpenSSL?
Ulf Möllerf9a7c342000-02-23 17:03:06 +00007* Where is the documentation?
8* How can I contact the OpenSSL developers?
Ulf Möller2b670ea2000-02-23 19:26:59 +00009* Where can I get a compiled version of OpenSSL?
Richard Levitte0ae485d2000-11-30 13:04:14 +000010* Why aren't tools like 'autoconf' and 'libtool' used?
11
12[LEGAL] Legal questions
13
14* Do I need patent licenses to use OpenSSL?
Ulf Möller17e75742000-12-01 02:47:50 +000015* Can I use OpenSSL with GPL software?
Richard Levitte0ae485d2000-11-30 13:04:14 +000016
17[USER] Questions on using the OpenSSL applications
18
19* Why do I get a "PRNG not seeded" error message?
Dr. Stephen Henson46e80a32000-03-24 00:47:25 +000020* How do I create certificates or certificate requests?
21* Why can't I create certificate requests?
Dr. Stephen Hensonafee7642000-03-25 02:38:28 +000022* Why does <SSL program> fail with a certificate verify error?
Dr. Stephen Hensona331a302000-05-04 00:08:35 +000023* Why can I only use weak ciphers when I connect to a server using OpenSSL?
Dr. Stephen Hensonafee7642000-03-25 02:38:28 +000024* How can I create DSA certificates?
25* Why can't I make an SSL connection using a DSA certificate?
Dr. Stephen Hensona331a302000-05-04 00:08:35 +000026* How can I remove the passphrase on a private key?
Dr. Stephen Henson1a7b2d32000-12-16 01:07:16 +000027* Why can't I use OpenSSL certificates with SSL client authentication?
Richard Levitte75222542000-12-16 11:14:41 +000028* Why does my browser give a warning about a mismatched hostname?
Richard Levitte0ae485d2000-11-30 13:04:14 +000029
30[BUILD] Questions about building and testing OpenSSL
31
32* Why does the linker complain about undefined symbols?
Ulf Möllerc32364f2000-06-03 23:21:43 +000033* Why does the OpenSSL test fail with "bc: command not found"?
Richard Levitte1417f2d2001-02-14 07:45:59 +000034* Why does the OpenSSL test fail with "bc: 1 no implemented" or similar?
Richard Levitted54f8c82000-07-04 14:02:36 +000035* Why does the OpenSSL compilation fail on Alpha True64 Unix?
Richard Levitteb364e5d2000-07-11 21:44:53 +000036* Why does the OpenSSL compilation fail with "ar: command not found"?
Richard Levittebf55ece2000-10-17 16:16:12 +000037* Why does the OpenSSL compilation fail on Win32 with VC++?
Ulf Möllerf9a7c342000-02-23 17:03:06 +000038
Richard Levitte0ae485d2000-11-30 13:04:14 +000039[PROG] Questions about programming with OpenSSL
40
41* Is OpenSSL thread-safe?
42* I've compiled a program under Windows and it crashes: why?
43* How do I read or write a DER encoded buffer using the ASN1 functions?
44* I've tried using <M_some_evil_pkcs12_macro> and I get errors why?
45* I've called <some function> and it fails, why?
46* I just get a load of numbers for the error output, what do they mean?
47* Why do I get errors about unknown algorithms?
48* Why can't the OpenSSH configure script detect OpenSSL?
49* Can I use OpenSSL's SSL library with non-blocking I/O?
50
51===============================================================================
52
53[MISC] ========================================================================
Ulf Möllerf9a7c342000-02-23 17:03:06 +000054
Ulf Möller49976df2000-02-23 23:46:17 +000055* Which is the current version of OpenSSL?
56
57The current version is available from <URL: http://www.openssl.org>.
Richard Levitte0e8f2fd2000-09-24 15:21:30 +000058OpenSSL 0.9.6 was released on September 24th, 2000.
Ulf Möller49976df2000-02-23 23:46:17 +000059
60In addition to the current stable release, you can also access daily
61snapshots of the OpenSSL development version at <URL:
62ftp://ftp.openssl.org/snapshot/>, or get it by anonymous CVS access.
63
64
Ulf Möllerf9a7c342000-02-23 17:03:06 +000065* Where is the documentation?
66
67OpenSSL is a library that provides cryptographic functionality to
68applications such as secure web servers. Be sure to read the
69documentation of the application you want to use. The INSTALL file
70explains how to install this library.
71
72OpenSSL includes a command line utility that can be used to perform a
73variety of cryptographic functions. It is described in the openssl(1)
74manpage. Documentation for developers is currently being written. A
75few manual pages already are available; overviews over libcrypto and
76libssl are given in the crypto(3) and ssl(3) manpages.
77
78The OpenSSL manpages are installed in /usr/local/ssl/man/ (or a
79different directory if you specified one as described in INSTALL).
80In addition, you can read the most current versions at
81<URL: http://www.openssl.org/docs/>.
82
83For information on parts of libcrypto that are not yet documented, you
84might want to read Ariel Glenn's documentation on SSLeay 0.9, OpenSSL's
85predecessor, at <URL: http://www.columbia.edu/~ariel/ssleay/>. Much
86of this still applies to OpenSSL.
87
Dr. Stephen Hensonfbb41ae2000-02-25 00:23:48 +000088There is some documentation about certificate extensions and PKCS#12
89in doc/openssl.txt
90
Ulf Möllerf9a7c342000-02-23 17:03:06 +000091The original SSLeay documentation is included in OpenSSL as
Ulf Möllercacbb512000-02-25 14:07:51 +000092doc/ssleay.txt. It may be useful when none of the other resources
Ulf Möllerf9a7c342000-02-23 17:03:06 +000093help, but please note that it reflects the obsolete version SSLeay
940.6.6.
95
96
97* How can I contact the OpenSSL developers?
98
99The README file describes how to submit bug reports and patches to
100OpenSSL. Information on the OpenSSL mailing lists is available from
101<URL: http://www.openssl.org>.
102
103
Richard Levitte0ae485d2000-11-30 13:04:14 +0000104* Where can I get a compiled version of OpenSSL?
105
106Some applications that use OpenSSL are distributed in binary form.
107When using such an application, you don't need to install OpenSSL
108yourself; the application will include the required parts (e.g. DLLs).
109
110If you want to install OpenSSL on a Windows system and you don't have
111a C compiler, read the "Mingw32" section of INSTALL.W32 for information
112on how to obtain and install the free GNU C compiler.
113
114A number of Linux and *BSD distributions include OpenSSL.
115
116
117* Why aren't tools like 'autoconf' and 'libtool' used?
118
119autoconf is a nice tool, but is unfortunately very Unix-centric.
120Although one can come up with solution to have ports keep in track,
121there's also some work needed for that, and can be quite painful at
122times. If there was a 'autoconf'-like tool that generated perl
123scripts or something similarly general, it would probably be used
124in OpenSSL much earlier.
125
126libtool has repeatadly been reported by some members of the OpenSSL
127development and others to be a pain to use. So far, those in the
128development team who have said anything about this have expressed
129a wish to avoid libtool for that reason.
130
131
132[LEGAL] =======================================================================
133
Ulf Möllerc1ce32f2000-02-23 17:09:50 +0000134* Do I need patent licenses to use OpenSSL?
Ulf Möllerf9a7c342000-02-23 17:03:06 +0000135
136The patents section of the README file lists patents that may apply to
137you if you want to use OpenSSL. For information on intellectual
138property rights, please consult a lawyer. The OpenSSL team does not
139offer legal advice.
140
141You can configure OpenSSL so as not to use RC5 and IDEA by using
142 ./config no-rc5 no-idea
143
Ulf Möllerf9a7c342000-02-23 17:03:06 +0000144
Ulf Möller17e75742000-12-01 02:47:50 +0000145* Can I use OpenSSL with GPL software?
146
147On many systems including the major Linux and BSD distributions, yes (the
148GPL does not place restrictions on using libraries that are part of the
149normal operating system distribution).
150
151On other systems, the situation is less clear. Some GPL software copyright
152holders claim that you infringe on their rights if you use OpenSSL with
153their software on operating systems that don't normally include OpenSSL.
154
155If you develop open source software that uses OpenSSL, you may find it
156useful to choose an other license than the GPL, or state explicitely that
157"This program is released under the GPL with the additional exemption that
158compiling, linking, and/or using OpenSSL is allowed." If you are using
159GPL software developed by others, you may want to ask the copyright holder
160for permission to use their software with OpenSSL.
161
162
Richard Levitte0ae485d2000-11-30 13:04:14 +0000163[USER] ========================================================================
Bodo Möllerb1d6e3f2000-11-17 10:25:46 +0000164
Ulf Möllerf9a7c342000-02-23 17:03:06 +0000165* Why do I get a "PRNG not seeded" error message?
166
167Cryptographic software needs a source of unpredictable data to work
168correctly. Many open source operating systems provide a "randomness
169device" that serves this purpose. On other systems, applications have
170to call the RAND_add() or RAND_seed() function with appropriate data
171before generating keys or performing public key encryption.
172
173Some broken applications do not do this. As of version 0.9.5, the
174OpenSSL functions that need randomness report an error if the random
175number generator has not been seeded with at least 128 bits of
176randomness. If this error occurs, please contact the author of the
177application you are using. It is likely that it never worked
Ulf Möller8311d322000-03-28 19:45:06 +0000178correctly. OpenSSL 0.9.5 and later make the error visible by refusing
179to perform potentially insecure encryption.
180
181On systems without /dev/urandom, it is a good idea to use the Entropy
182Gathering Demon; see the RAND_egd() manpage for details.
Ulf Möller2b670ea2000-02-23 19:26:59 +0000183
Bodo Möllerd7960412000-03-03 23:28:35 +0000184Most components of the openssl command line tool try to use the
185file $HOME/.rnd (or $RANDFILE, if this environment variable is set)
186for seeding the PRNG. If this file does not exist or is too short,
187the "PRNG not seeded" error message may occur.
Ulf Möller8311d322000-03-28 19:45:06 +0000188
189[Note to OpenSSL 0.9.5 users: The command "openssl rsa" in version
1900.9.5 does not do this and will fail on systems without /dev/urandom
191when trying to password-encrypt an RSA key! This is a bug in the
192library; try a later version instead.]
Bodo Möllerd7960412000-03-03 23:28:35 +0000193
Richard Levitte9b296152000-07-05 16:39:04 +0000194For Solaris 2.6, Tim Nibbe <tnibbe@sprint.net> and others have suggested
195installing the SUNski package from Sun patch 105710-01 (Sparc) which
196adds a /dev/random device and make sure it gets used, usually through
197$RANDFILE. There are probably similar patches for the other Solaris
198versions. However, be warned that /dev/random is usually a blocking
Ulf Möller7cae5f92000-09-20 03:42:15 +0000199device, which may have some effects on OpenSSL.
Richard Levitte9b296152000-07-05 16:39:04 +0000200
Ulf Möller2b670ea2000-02-23 19:26:59 +0000201
Richard Levitte0ae485d2000-11-30 13:04:14 +0000202* How do I create certificates or certificate requests?
203
204Check out the CA.pl(1) manual page. This provides a simple wrapper round
205the 'req', 'verify', 'ca' and 'pkcs12' utilities. For finer control check
206out the manual pages for the individual utilities and the certificate
207extensions documentation (currently in doc/openssl.txt).
208
209
210* Why can't I create certificate requests?
211
212You typically get the error:
213
214 unable to find 'distinguished_name' in config
215 problems making Certificate Request
216
217This is because it can't find the configuration file. Check out the
218DIAGNOSTICS section of req(1) for more information.
219
220
221* Why does <SSL program> fail with a certificate verify error?
222
223This problem is usually indicated by log messages saying something like
224"unable to get local issuer certificate" or "self signed certificate".
225When a certificate is verified its root CA must be "trusted" by OpenSSL
226this typically means that the CA certificate must be placed in a directory
227or file and the relevant program configured to read it. The OpenSSL program
228'verify' behaves in a similar way and issues similar error messages: check
229the verify(1) program manual page for more information.
230
231
232* Why can I only use weak ciphers when I connect to a server using OpenSSL?
233
234This is almost certainly because you are using an old "export grade" browser
235which only supports weak encryption. Upgrade your browser to support 128 bit
236ciphers.
237
238
239* How can I create DSA certificates?
240
241Check the CA.pl(1) manual page for a DSA certificate example.
242
243
244* Why can't I make an SSL connection to a server using a DSA certificate?
245
246Typically you'll see a message saying there are no shared ciphers when
247the same setup works fine with an RSA certificate. There are two possible
248causes. The client may not support connections to DSA servers most web
249browsers (including Netscape and MSIE) only support connections to servers
250supporting RSA cipher suites. The other cause is that a set of DH parameters
251has not been supplied to the server. DH parameters can be created with the
252dhparam(1) command and loaded using the SSL_CTX_set_tmp_dh() for example:
253check the source to s_server in apps/s_server.c for an example.
254
255
256* How can I remove the passphrase on a private key?
257
258Firstly you should be really *really* sure you want to do this. Leaving
259a private key unencrypted is a major security risk. If you decide that
260you do have to do this check the EXAMPLES sections of the rsa(1) and
261dsa(1) manual pages.
262
263
Dr. Stephen Henson1a7b2d32000-12-16 01:07:16 +0000264* Why can't I use OpenSSL certificates with SSL client authentication?
265
266What will typically happen is that when a server requests authentication
267it will either not include your certificate or tell you that you have
268no client certificates (Netscape) or present you with an empty list box
269(MSIE). The reason for this is that when a server requests a client
270certificate it includes a list of CAs names which it will accept. Browsers
271will only let you select certificates from the list on the grounds that
272there is little point presenting a certificate which the server will
273reject.
274
275The solution is to add the relevant CA certificate to your servers "trusted
276CA list". How you do this depends on the server sofware in uses. You can
277print out the servers list of acceptable CAs using the OpenSSL s_client tool:
278
279openssl s_client -connect www.some.host:443 -prexit
280
Bodo Möller959f67d2000-12-17 00:32:49 +0000281If your server only requests certificates on certain URLs then you may need
Dr. Stephen Henson1a7b2d32000-12-16 01:07:16 +0000282to manually issue an HTTP GET command to get the list when s_client connects:
283
284GET /some/page/needing/a/certificate.html
285
286If your CA does not appear in the list then this confirms the problem.
287
288
289* Why does my browser give a warning about a mismatched hostname?
290
291Browsers expect the server's hostname to match the value in the commonName
292(CN) field of the certificate. If it does not then you get a warning.
293
294
Richard Levitte0ae485d2000-11-30 13:04:14 +0000295[BUILD] =======================================================================
296
Ulf Möller49976df2000-02-23 23:46:17 +0000297* Why does the linker complain about undefined symbols?
298
Ulf Möllercacbb512000-02-25 14:07:51 +0000299Maybe the compilation was interrupted, and make doesn't notice that
Ulf Möller49976df2000-02-23 23:46:17 +0000300something is missing. Run "make clean; make".
301
302If you used ./Configure instead of ./config, make sure that you
303selected the right target. File formats may differ slightly between
304OS versions (for example sparcv8/sparcv9, or a.out/elf).
305
Ulf Möller0816bc22000-02-29 15:33:35 +0000306In case you get errors about the following symbols, use the config
307option "no-asm", as described in INSTALL:
308
309 BF_cbc_encrypt, BF_decrypt, BF_encrypt, CAST_cbc_encrypt,
310 CAST_decrypt, CAST_encrypt, RC4, RC5_32_cbc_encrypt, RC5_32_decrypt,
311 RC5_32_encrypt, bn_add_words, bn_div_words, bn_mul_add_words,
312 bn_mul_comba4, bn_mul_comba8, bn_mul_words, bn_sqr_comba4,
313 bn_sqr_comba8, bn_sqr_words, bn_sub_words, des_decrypt3,
314 des_ede3_cbc_encrypt, des_encrypt, des_encrypt2, des_encrypt3,
315 des_ncbc_encrypt, md5_block_asm_host_order, sha1_block_asm_data_order
316
Ulf Möller569be072000-02-29 17:18:24 +0000317If none of these helps, you may want to try using the current snapshot.
Ulf Möller49976df2000-02-23 23:46:17 +0000318If the problem persists, please submit a bug report.
319
320
Richard Levitte0ae485d2000-11-30 13:04:14 +0000321* Why does the OpenSSL test fail with "bc: command not found"?
Ulf Möller2b670ea2000-02-23 19:26:59 +0000322
Richard Levitte0ae485d2000-11-30 13:04:14 +0000323You didn't install "bc", the Unix calculator. If you want to run the
324tests, get GNU bc from ftp://ftp.gnu.org or from your OS distributor.
Ulf Möller2b670ea2000-02-23 19:26:59 +0000325
Ulf Möller2b670ea2000-02-23 19:26:59 +0000326
Richard Levitte1417f2d2001-02-14 07:45:59 +0000327* Why does the OpenSSL test fail with "bc: 1 no implemented" or similar?
Richard Levitte0ae485d2000-11-30 13:04:14 +0000328
Richard Levitte1417f2d2001-02-14 07:45:59 +0000329On some SCO installations or versions, bc has a bug that gets triggered
330when you run the test suite (using "make test"). The message returned is
331"bc: 1 not implemented". You may run into something similar on FreeBSD
332(version 4.2 has been reported), where the message is "Failed! bc: tmp.bntest
3333: print statement" or something similar.
334
335The best way to deal with this is to find another implementation of bc
336and compile/install it. GNU bc (see http://www.gnu.org/software/software.html
337for download instructions) can be safely used, for example.
Richard Levitte0ae485d2000-11-30 13:04:14 +0000338
339
340* Why does the OpenSSL compilation fail on Alpha True64 Unix?
341
342On some Alpha installations running True64 Unix and Compaq C, the compilation
343of crypto/sha/sha_dgst.c fails with the message 'Fatal: Insufficient virtual
344memory to continue compilation.' As far as the tests have shown, this may be
345a compiler bug. What happens is that it eats up a lot of resident memory
346to build something, probably a table. The problem is clearly in the
347optimization code, because if one eliminates optimization completely (-O0),
348the compilation goes through (and the compiler consumes about 2MB of resident
349memory instead of 240MB or whatever one's limit is currently).
350
351There are three options to solve this problem:
352
3531. set your current data segment size soft limit higher. Experience shows
354that about 241000 kbytes seems to be enough on an AlphaServer DS10. You do
355this with the command 'ulimit -Sd nnnnnn', where 'nnnnnn' is the number of
356kbytes to set the limit to.
357
3582. If you have a hard limit that is lower than what you need and you can't
359get it changed, you can compile all of OpenSSL with -O0 as optimization
360level. This is however not a very nice thing to do for those who expect to
361get the best result from OpenSSL. A bit more complicated solution is the
362following:
363
364----- snip:start -----
365 make DIRS=crypto SDIRS=sha "`grep '^CFLAG=' Makefile.ssl | \
366 sed -e 's/ -O[0-9] / -O0 /'`"
367 rm `ls crypto/*.o crypto/sha/*.o | grep -v 'sha_dgst\.o'`
368 make
369----- snip:end -----
370
371This will only compile sha_dgst.c with -O0, the rest with the optimization
372level chosen by the configuration process. When the above is done, do the
373test and installation and you're set.
374
375
376* Why does the OpenSSL compilation fail with "ar: command not found"?
377
378Getting this message is quite usual on Solaris 2, because Sun has hidden
379away 'ar' and other development commands in directories that aren't in
380$PATH by default. One of those directories is '/usr/ccs/bin'. The
381quickest way to fix this is to do the following (it assumes you use sh
382or any sh-compatible shell):
383
384----- snip:start -----
385 PATH=${PATH}:/usr/ccs/bin; export PATH
386----- snip:end -----
387
388and then redo the compilation. What you should really do is make sure
389'/usr/ccs/bin' is permanently in your $PATH, for example through your
390'.profile' (again, assuming you use a sh-compatible shell).
391
392
393* Why does the OpenSSL compilation fail on Win32 with VC++?
394
395Sometimes, you may get reports from VC++ command line (cl) that it
396can't find standard include files like stdio.h and other weirdnesses.
397One possible cause is that the environment isn't correctly set up.
398To solve that problem, one should run VCVARS32.BAT which is found in
399the 'bin' subdirectory of the VC++ installation directory (somewhere
400under 'Program Files'). This needs to be done prior to running NMAKE,
401and the changes are only valid for the current DOS session.
402
403
404[PROG] ========================================================================
405
406* Is OpenSSL thread-safe?
407
408Yes (with limitations: an SSL connection may not concurrently be used
409by multiple threads). On Windows and many Unix systems, OpenSSL
410automatically uses the multi-threaded versions of the standard
411libraries. If your platform is not one of these, consult the INSTALL
412file.
413
414Multi-threaded applications must provide two callback functions to
415OpenSSL. This is described in the threads(3) manpage.
Richard Levittee8dbc152000-03-23 19:31:37 +0000416
Dr. Stephen Hensonafee7642000-03-25 02:38:28 +0000417
Dr. Stephen Henson46e80a32000-03-24 00:47:25 +0000418* I've compiled a program under Windows and it crashes: why?
419
420This is usually because you've missed the comment in INSTALL.W32. You
421must link with the multithreaded DLL version of the VC++ runtime library
422otherwise the conflict will cause a program to crash: typically on the
423first BIO related read or write operation.
424
425
Dr. Stephen Hensonc5a3b7e2000-09-09 00:59:37 +0000426* How do I read or write a DER encoded buffer using the ASN1 functions?
427
428You have two options. You can either use a memory BIO in conjunction
429with the i2d_XXX_bio() or d2i_XXX_bio() functions or you can use the
430i2d_XXX(), d2i_XXX() functions directly. Since these are often the
431cause of grief here are some code fragments using PKCS7 as an example:
432
433unsigned char *buf, *p;
434int len;
435
436len = i2d_PKCS7(p7, NULL);
Ulf Möller7cae5f92000-09-20 03:42:15 +0000437buf = OPENSSL_malloc(len); /* or Malloc, error checking omitted */
Dr. Stephen Hensonc5a3b7e2000-09-09 00:59:37 +0000438p = buf;
439i2d_PKCS7(p7, &p);
440
441At this point buf contains the len bytes of the DER encoding of
442p7.
443
444The opposite assumes we already have len bytes in buf:
445
446unsigned char *p;
447p = buf;
448p7 = d2i_PKCS7(NULL, &p, len);
449
450At this point p7 contains a valid PKCS7 structure of NULL if an error
451occurred. If an error occurred ERR_print_errors(bio) should give more
452information.
453
454The reason for the temporary variable 'p' is that the ASN1 functions
455increment the passed pointer so it is ready to read or write the next
456structure. This is often a cause of problems: without the temporary
457variable the buffer pointer is changed to point just after the data
458that has been read or written. This may well be uninitialized data
459and attempts to free the buffer will have unpredictable results
460because it no longer points to the same address.
461
462
Dr. Stephen Henson84b65342000-09-07 23:14:26 +0000463* I've tried using <M_some_evil_pkcs12_macro> and I get errors why?
464
465This usually happens when you try compiling something using the PKCS#12
466macros with a C++ compiler. There is hardly ever any need to use the
467PKCS#12 macros in a program, it is much easier to parse and create
468PKCS#12 files using the PKCS12_parse() and PKCS12_create() functions
469documented in doc/openssl.txt and with examples in demos/pkcs12. The
470'pkcs12' application has to use the macros because it prints out
471debugging information.
472
473
Dr. Stephen Henson35af4602000-03-30 02:00:25 +0000474* I've called <some function> and it fails, why?
475
Bodo Möller02859fb2000-04-04 21:31:14 +0000476Before submitting a report or asking in one of the mailing lists, you
477should try to determine the cause. In particular, you should call
Dr. Stephen Henson35af4602000-03-30 02:00:25 +0000478ERR_print_errors() or ERR_print_errors_fp() after the failed call
Bodo Möller02859fb2000-04-04 21:31:14 +0000479and see if the message helps. Note that the problem may occur earlier
480than you think -- you should check for errors after every call where
481it is possible, otherwise the actual problem may be hidden because
482some OpenSSL functions clear the error state.
Dr. Stephen Henson35af4602000-03-30 02:00:25 +0000483
484
485* I just get a load of numbers for the error output, what do they mean?
486
487The actual format is described in the ERR_print_errors() manual page.
488You should call the function ERR_load_crypto_strings() before hand and
489the message will be output in text form. If you can't do this (for example
490it is a pre-compiled binary) you can use the errstr utility on the error
491code itself (the hex digits after the second colon).
492
493
Dr. Stephen Henson46e80a32000-03-24 00:47:25 +0000494* Why do I get errors about unknown algorithms?
495
496This can happen under several circumstances such as reading in an
497encrypted private key or attempting to decrypt a PKCS#12 file. The cause
498is forgetting to load OpenSSL's table of algorithms with
499OpenSSL_add_all_algorithms(). See the manual page for more information.
500
501
Richard Levittee8dbc152000-03-23 19:31:37 +0000502* Why can't the OpenSSH configure script detect OpenSSL?
503
504There is a problem with OpenSSH 1.2.2p1, in that the configure script
505can't find the installed OpenSSL libraries. The problem is actually
506a small glitch that is easily solved with the following patch to be
507applied to the OpenSSH distribution:
508
Richard Levitte1d6750b2000-03-23 22:43:20 +0000509----- snip:start -----
Richard Levittee8dbc152000-03-23 19:31:37 +0000510--- openssh-1.2.2p1/configure.in.orig Thu Mar 23 18:56:58 2000
511+++ openssh-1.2.2p1/configure.in Thu Mar 23 18:55:05 2000
512@@ -152,10 +152,10 @@
513 AC_MSG_CHECKING([for OpenSSL/SSLeay directory])
514 for ssldir in "" $tryssldir /usr /usr/local/openssl /usr/lib/openssl /usr/local/ssl /usr/lib/ssl /usr/local /usr/pkg /opt /opt/openssl ; do
515 if test ! -z "$ssldir" ; then
516- LIBS="$saved_LIBS -L$ssldir"
517+ LIBS="$saved_LIBS -L$ssldir/lib"
518 CFLAGS="$CFLAGS -I$ssldir/include"
519 if test "x$need_dash_r" = "x1" ; then
520- LIBS="$LIBS -R$ssldir"
521+ LIBS="$LIBS -R$ssldir/lib"
522 fi
523 fi
524 LIBS="$LIBS -lcrypto"
525--- openssh-1.2.2p1/configure.orig Thu Mar 23 18:55:02 2000
526+++ openssh-1.2.2p1/configure Thu Mar 23 18:57:08 2000
527@@ -1890,10 +1890,10 @@
528 echo "configure:1891: checking for OpenSSL/SSLeay directory" >&5
529 for ssldir in "" $tryssldir /usr /usr/local/openssl /usr/lib/openssl /usr/local/ssl /usr/lib/ssl /usr/local /usr/pkg /opt /opt/openssl ; do
530 if test ! -z "$ssldir" ; then
531- LIBS="$saved_LIBS -L$ssldir"
532+ LIBS="$saved_LIBS -L$ssldir/lib"
533 CFLAGS="$CFLAGS -I$ssldir/include"
534 if test "x$need_dash_r" = "x1" ; then
535- LIBS="$LIBS -R$ssldir"
536+ LIBS="$LIBS -R$ssldir/lib"
537 fi
538 fi
539 LIBS="$LIBS -lcrypto"
Richard Levitte1d6750b2000-03-23 22:43:20 +0000540----- snip:end -----
Richard Levitte31efc3a2000-05-31 20:11:11 +0000541
542
Richard Levitte0ae485d2000-11-30 13:04:14 +0000543* Can I use OpenSSL's SSL library with non-blocking I/O?
Ulf Möllerc32364f2000-06-03 23:21:43 +0000544
Richard Levitte0ae485d2000-11-30 13:04:14 +0000545Yes; make sure to read the SSL_get_error(3) manual page!
546
547A pitfall to avoid: Don't assume that SSL_read() will just read from
548the underlying transport or that SSL_write() will just write to it --
549it is also possible that SSL_write() cannot do any useful work until
550there is data to read, or that SSL_read() cannot do anything until it
551is possible to send data. One reason for this is that the peer may
552request a new TLS/SSL handshake at any time during the protocol,
553requiring a bi-directional message exchange; both SSL_read() and
554SSL_write() will try to continue any pending handshake.
Ulf Möllerc32364f2000-06-03 23:21:43 +0000555
556
Richard Levitte0ae485d2000-11-30 13:04:14 +0000557===============================================================================
Richard Levittebf55ece2000-10-17 16:16:12 +0000558