| Summary: | OpenSSH's ssh-keygen can't parse encrypted PKCS#8 private keys being built against openssl 3.0 | ||
|---|---|---|---|
| Product: | Portable OpenSSH | Reporter: | Dmitry Belyavskiy <dbelyavs> |
| Component: | ssh-keygen | Assignee: | Assigned to nobody <unassigned-bugs> |
| Status: | CLOSED WORKSFORME | ||
| Severity: | enhancement | CC: | djm, dtucker |
| Priority: | P5 | ||
| Version: | 8.6p1 | ||
| Hardware: | Other | ||
| OS: | Linux | ||
|
Description
Dmitry Belyavskiy
2021-07-22 00:14:00 AEST
I can't reproduce the test case building against the 3.0.0 dev branch as of right now: $ ./ssh -V OpenSSH_8.6p1, OpenSSL 3.0.0-beta2-dev $ openssl genrsa -aes128 -out my-test-private.key -passout pass:RedHatEnterpriseLinux9.0 2048 Generating RSA private key, 2048 bit long modulus (2 primes) .+++++ ...........................................+++++ e is 65537 (0x010001) $ ssh-keygen -y -f my-test-private.key > public.key.pub Enter passphrase: Have OpenSSL rolled back the API change? I will recheck it against the current master, it may be fixed since the last alpha. Many thanks! Closing for lack of followup closing bugs resolved before openssh-8.9 |