Re: RSA_set0_key() equivalent for 3.0.0

2021-07-14 Thread William Roberts
On Wed, Jul 14, 2021, 09:27 Ken Goldman wrote: > On 7/13/2021 5:14 PM, William Roberts wrote: > > Outside of the migration guide others have pointed out, I think the > functions you need are: > > > > https://www.openssl.org/docs/manmaster/man3/EVP_PKEY_set1_RSA.html < > https://www.openssl.org/do

Re: RSA_set0_key() equivalent for 3.0.0

2021-07-14 Thread Ken Goldman
On 7/13/2021 5:14 PM, William Roberts wrote: Outside of the migration guide others have pointed out, I think the functions you need are: https://www.openssl.org/docs/manmaster/man3/EVP_PKEY_set1_RSA.html Use use EVP level no

Re: RSA_set0_key() equivalent for 3.0.0

2021-07-14 Thread William Roberts
I'd be nice to have a more detailed porting guide, I'd been poking into this a little bit, but did you see Matt's response? (Pasted below) Those functions are deprecated. Better would be EVP_PKEY_fromdata(): https://www.openssl.org/docs/manmaster/man3/EVP_PKEY_fromdata.html On Wed, Jul 14, 2021

Re: RSA_set0_key() equivalent for 3.0.0

2021-07-14 Thread Ken Goldman
On 7/13/2021 5:08 PM, Nicola Tuveri wrote: There is the migration guide: https://github.com/openssl/openssl/tree/master/doc/man7/migration_guide.pod The migration guide is very general. It says that the low level

Re: SSL_connect with TLS 1.3 and client Certificates

2021-07-14 Thread Christian Schmidt
On 14/07/2021 13:31, Matt Caswell wrote: > > > On 13/07/2021 19:44, Christian Schmidt wrote: >> Hello all, >> >> I am currently trying to build both client and server of an application >> that uses TLS 1.3 and mutual authentication using certificates. The >> application works so far - I can estab

Re: SSL_connect with TLS 1.3 and client Certificates

2021-07-14 Thread Matt Caswell
On 13/07/2021 19:44, Christian Schmidt wrote: Hello all, I am currently trying to build both client and server of an application that uses TLS 1.3 and mutual authentication using certificates. The application works so far - I can establish connections, certificates are verified, data is succe