I ungraded my openssl on sun solaris 8 from openssl 0.9.6c to openssl 0.9.6g the ungrade went
fine but when I tried to ssh in to server, I received the following error message
"ld.so.1: ./sshd: fatal: relocation error: file /usr/local/ssl/lib/libcrypto.so.0.9.6: symbol main: referenced symbol... (2 Replies)
ERROR OpenSSL version mismatch. Built against 908070, you have 9080bf^M
2009.11.20 15:23:25 ERROR Connection closed^M
i am new in solaris,i not have great know in this operative system
Help me how i can fixed this, in the machine has installed Solaris
Machine hardware: ... (1 Reply)
Hi,
I want to encrypt a unix file using the des3 algorithm. Seems that there are no standard unix utilities readily available. Can you please suggest how I can encrypt a unix file using des3 ? (2 Replies)
All,
I am new to openssl and I have not been able to figure out exactly how to use it. What I need to do is to create a shell script which FTPS's (SFTP is not allowed on my project) a file to a mainframe. The mainframe will not initiate a session with my server.
Question. Are the packages... (7 Replies)
Hi Peeps,
Having trouble compiling openssl 0.9.8r on Solaris 10 x86. The make test fails when running the shatests (segmentation faults). There is a PROBLEM file that references a file called values.c. Anyone know whereabouts in the source tree you put this file as the file doesn't tell you... (2 Replies)
Hi ,
1-I need to know please if it's possible to compress using openssl?
Here is the version used:
openssl version -a
OpenSSL 0.9.7d 17 Mar 2004 (+ security fixes for: CVE-2005-2969 CVE-2006-2937 CVE-2006-2940 CVE2006-3738 CVE-2006-4339 CVE-2006-4343 CVE-2007-5135 CVE-2008-5077... (3 Replies)
I just started playing around with Unix's OpenSSL utility. I can't seem to get the hang of it, and the man page isn't helping much. I wanted to experiment with file encryption, so I created a dummy text file with one line of text and tried to encrypt it using DES. I used the following command:
... (2 Replies)
im trying to make sure the openssl password does not show up in the output of ps.
so i'm trying to do something like this:
MAST=yup
echo "U2FsdGVkX19wH9LrQhuRZes45BM9rfiRpdhTCi+gLls=" | openssl <<HERE 2>&1 >/dev/null
aes-128-cbc -a -d -salt -k "${MAST}"
HERE
But this isn't working.. I... (10 Replies)
Hello Admins.
I need to upgrade the openssl version in Solaris 10 due to vulnerabilities. When I checked the current version, it shows:
bash-3.2# openssl version
OpenSSL 1.0.2n 7 Dec 2017
bash-3.2# which openssl
/usr/bin/openssl
When I installed the new one, its getting... (0 Replies)
Discussion started by: snchaudhari2
0 Replies
LEARN ABOUT CENTOS
bio_f_cipher
BIO_f_cipher(3) OpenSSL BIO_f_cipher(3)NAME
BIO_f_cipher, BIO_set_cipher, BIO_get_cipher_status, BIO_get_cipher_ctx - cipher BIO filter
SYNOPSIS
#include <openssl/bio.h>
#include <openssl/evp.h>
BIO_METHOD * BIO_f_cipher(void);
void BIO_set_cipher(BIO *b,const EVP_CIPHER *cipher,
unsigned char *key, unsigned char *iv, int enc);
int BIO_get_cipher_status(BIO *b)
int BIO_get_cipher_ctx(BIO *b, EVP_CIPHER_CTX **pctx)
DESCRIPTION
BIO_f_cipher() returns the cipher BIO method. This is a filter BIO that encrypts any data written through it, and decrypts any data read
from it. It is a BIO wrapper for the cipher routines EVP_CipherInit(), EVP_CipherUpdate() and EVP_CipherFinal().
Cipher BIOs do not support BIO_gets() or BIO_puts().
BIO_flush() on an encryption BIO that is being written through is used to signal that no more data is to be encrypted: this is used to
flush and possibly pad the final block through the BIO.
BIO_set_cipher() sets the cipher of BIO b to cipher using key key and IV iv. enc should be set to 1 for encryption and zero for decryption.
When reading from an encryption BIO the final block is automatically decrypted and checked when EOF is detected. BIO_get_cipher_status() is
a BIO_ctrl() macro which can be called to determine whether the decryption operation was successful.
BIO_get_cipher_ctx() is a BIO_ctrl() macro which retrieves the internal BIO cipher context. The retrieved context can be used in
conjunction with the standard cipher routines to set it up. This is useful when BIO_set_cipher() is not flexible enough for the
applications needs.
NOTES
When encrypting BIO_flush() must be called to flush the final block through the BIO. If it is not then the final block will fail a
subsequent decrypt.
When decrypting an error on the final block is signalled by a zero return value from the read operation. A successful decrypt followed by
EOF will also return zero for the final read. BIO_get_cipher_status() should be called to determine if the decrypt was successful.
As always, if BIO_gets() or BIO_puts() support is needed then it can be achieved by preceding the cipher BIO with a buffering BIO.
RETURN VALUES
BIO_f_cipher() returns the cipher BIO method.
BIO_set_cipher() does not return a value.
BIO_get_cipher_status() returns 1 for a successful decrypt and 0 for failure.
BIO_get_cipher_ctx() currently always returns 1.
EXAMPLES
TBA
SEE ALSO
TBA
1.0.1e 2013-02-11 BIO_f_cipher(3)