Tool/software:
Hello,
A question about openssl version:
Based on OTP Keywriter User Guide:
Note
OpenSSL (1.1.1 11 Sep 2018) is required for building the OTP Keywriter.
You can check if OpenSSL is installed by typing “openssl version” in your command prompt.
If it's not installed, download and install OpenSSL for your OS.
We use Ubuntu 22 Linux which has openssl version of :
Package: openssl
Architecture: amd64
Version: 3.0.2-0ubuntu1
Multi-Arch: foreign
Then I tried to do openssl packages:
# download binary openssl packages
wget http://security.ubuntu.com/ubuntu/pool/main/o/openssl/openssl_1.1.1f-1ubuntu2.22_amd64.deb
wget http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libssl-dev_1.1.1f-1ubuntu2.22_amd64.deb
wget http://security.ubuntu.com/ubuntu/pool/main/o/openssl/libssl1.1_1.1.1f-1ubuntu2.22_amd64.deb
# install downloaded binary packages
sudo dpkg -i libssl1.1_1.1.1f-1ubuntu2.22_amd64.deb
sudo dpkg -i libssl-dev_1.1.1f-1ubuntu2.22_amd64.deb
sudo dpkg -i openssl_1.1.1f-1ubuntu2.22_amd64.deb
sudo ldconfig -v
Validate the version
openssl version -a
OpenSSL 1.1.1f 31 Mar 2020
built on: Fri Feb 16 15:41:31 2024 UTC
platform: debian-amd64
options: bn(64,64) rc4(16x,int) des(int) blowfish(ptr)
compiler: gcc -fPIC -pthread -m64 -Wa,--noexecstack -Wall -Wa,--noexecstack -g -O2 -fdebug-prefix-map=/build/openssl-ANcB0E/openssl-1.1.1f=. -fstack-protector-strong -Wformat -Werror=format-security -DOPENSSL_TLS_SECURITY_LEVEL=2 -DOPENSSL_USE_NODELETE -DL_ENDIAN -DOPENSSL_PIC -DOPENSSL_CPUID_OBJ -DOPENSSL_IA32_SSE2 -DOPENSSL_BN_ASM_MONT -DOPENSSL_BN_ASM_MONT5 -DOPENSSL_BN_ASM_GF2m -DSHA1_ASM -DSHA256_ASM -DSHA512_ASM -DKECCAK1600_ASM -DRC4_ASM -DMD5_ASM -DAESNI_ASM -DVPAES_ASM -DGHASH_ASM -DECP_NISTZ256_ASM -DX25519_ASM -DPOLY1305_ASM -DNDEBUG -Wdate-time -D_FORTIFY_SOURCE=2
OPENSSLDIR: "/usr/lib/ssl"
ENGINESDIR: "/usr/lib/x86_64-linux-gnu/engines-1.1"
Seeding source: os-specific
I am wondering if it is good or not to meet document requirements?
I am going to use default keys under folder of keys_devel/ to generate Keywriter Certificate by command:
./gen_keywr_cert.sh -t tifek/ti_fek_public.pem --msv 0xC0FFE -b keys_devel/bmpk.pem
--bmek keys_devel/bmek.key -s keys_devel/smpk.pem --smek keys_devel/smek.key --keycnt 2 --keyrev 1
I want to make sure that this won't brick the AM64x EVM!
Thank you very much!