Re: Openssl Fips Shared Library

2008-09-18 Thread joshi chandran
  Is this openssl fips 1.1.2 module generate position independent code ?

If so then i can  inappropriate it in shared library generated by openssl
0.9.7m

Thanks
Joshi


IOn Thu, Sep 18, 2008 at 11:18 PM, joshi chandra <[EMAIL PROTECTED]
> wrote:

>
> when i have used shared option in the ./Configure , i was able to compile
> the
> openssl 0.9.7m successfully
> but when i tested the fips function in the test folder ,that time it was
> producing the error message and when i removed shared option by no-shared
> option in the ./Configure command in the openssl 0.9.7m,
> all the fips function in the test folder was successfully executed , is
> this
> beacuse of the linking problem
>
> The error message was
>
> ./fips_test_suite
> >> FIPS-mode test application
> >>
> >> 1. Non-Approved cryptographic operation test...
> >> a. Included algorithm (D-H)...successful
> >> 1638508:error:2A07806E:lib(42):func(120):reason(110):fips.c:212:
> >> 2. Automatic power-up self test...FAILED!
>
> Can you please tell me is the shared library is possible for openssl 0.9.7m
> which is using the openssl fips 1.1.2 module
>
> can u please explain this statement 'If it does consist of position
> independent
> code then you can incorporate it into a shared library just like any
> other object module, subject of course to the "fipsld" linking to set
> the in-core hash.'
>
> How to link fipsld to in-core hash
>
> Thanks in Advance
> Joshi Chandran
>
>
>
>  Steve Marquess wrote:
> >
> > Carlo Milono wrote:
> >> How curious that this topic would come up today as I had a discussion on
> >> it just two days earlier.
> >> The OpenSSL FIPS 140-2 Security Policy Version 1.1.2 states:
> >>
> >> "The FIPS Object Module is not a static library. It may be incorporated
> >> into shared library files or runtime executable application files, but
> >> in any event can only be incorporated intact and in its entirety."
> >>
> >> This was leading me to believe that we could use this in a shared
> >> library mode; perhaps we need to understand the boundaries of what may
> >> be included in a shared library?
> >>
> >> How can we interpret the above quote?
> >
> > The FIPS Object Module is just that, an object module (fipscanister.o).
> >   For v1.1.x it may or may not consist of position independent code,
> > depending on the platform.  If it does consist of position independent
> > code then you can incorporate it into a shared library just like any
> > other object module, subject of course to the "fipsld" linking to set
> > the in-core hash.
> >
> > If it isn't position independent, then you're out of luck as the
> > Security Policy rules don't allow you to modify the build-time
> parameters.
> >
> > For v1.2 the FIPS Object Module is always generated as position
> > independent code.  The corresponding "FIPS capable" OpenSSL
> > distributions ("fips" option) will automatically include it in the
> > libcrypto shared library.
> >
> > -Steve M.
> >
> > --
> > Steve Marquess
> > Open Source Software Institute
> > [EMAIL PROTECTED]
> >
> > __
> > OpenSSL Project http://www.openssl.org
> > User Support Mailing Listopenssl-users@openssl.org
> > Automated List Manager       [EMAIL PROTECTED]
> >
> >
>
> --
> View this message in context:
> http://www.nabble.com/Openssl-Fips-Shared-Library-tp19552549p19558250.html
> Sent from the OpenSSL - User mailing list archive at Nabble.com.
>
> __
>  OpenSSL Project http://www.openssl.org
> User Support Mailing Listopenssl-users@openssl.org
> Automated List Manager   [EMAIL PROTECTED]
>



-- 
Regards
Joshi Chandran


Re: Openssl Fips Shared Library

2008-09-18 Thread joshi chandran
How to find out whether  openssl fips1.1.2 generate position independent
code or not

Please help me out

Thanks
Joshi

>IOn Thu, Sep 18, 2008 at 11:18 PM, joshi chandra <
> [EMAIL PROTECTED]> wrote:
>
>>
>> when i have used shared option in the ./Configure , i was able to compile
>> the
>> openssl 0.9.7m successfully
>> but when i tested the fips function in the test folder ,that time it was
>> producing the error message and when i removed shared option by no-shared
>> option in the ./Configure command in the openssl 0.9.7m,
>> all the fips function in the test folder was successfully executed , is
>> this
>> beacuse of the linking problem
>>
>> The error message was
>>
>> ./fips_test_suite
>> >> FIPS-mode test application
>> >>
>> >> 1. Non-Approved cryptographic operation test...
>> >> a. Included algorithm (D-H)...successful
>> >> 1638508:error:2A07806E:lib(42):func(120):reason(110):fips.c:212:
>> >> 2. Automatic power-up self test...FAILED!
>>
>> Can you please tell me is the shared library is possible for openssl
>> 0.9.7m
>> which is using the openssl fips 1.1.2 module
>>
>> can u please explain this statement 'If it does consist of position
>> independent
>> code then you can incorporate it into a shared library just like any
>> other object module, subject of course to the "fipsld" linking to set
>> the in-core hash.'
>>
>> How to link fipsld to in-core hash
>>
>> Thanks in Advance
>> Joshi Chandran
>>
>>
>>
>>  Steve Marquess wrote:
>> >
>> > Carlo Milono wrote:
>> >> How curious that this topic would come up today as I had a discussion
>> on
>> >> it just two days earlier.
>> >> The OpenSSL FIPS 140-2 Security Policy Version 1.1.2 states:
>> >>
>> >> "The FIPS Object Module is not a static library. It may be incorporated
>> >> into shared library files or runtime executable application files, but
>> >> in any event can only be incorporated intact and in its entirety."
>> >>
>> >> This was leading me to believe that we could use this in a shared
>> >> library mode; perhaps we need to understand the boundaries of what may
>> >> be included in a shared library?
>> >>
>> >> How can we interpret the above quote?
>> >
>> > The FIPS Object Module is just that, an object module (fipscanister.o).
>> >   For v1.1.x it may or may not consist of position independent code,
>> > depending on the platform.  If it does consist of position independent
>> > code then you can incorporate it into a shared library just like any
>> > other object module, subject of course to the "fipsld" linking to set
>> > the in-core hash.
>> >
>> > If it isn't position independent, then you're out of luck as the
>> > Security Policy rules don't allow you to modify the build-time
>> parameters.
>> >
>> > For v1.2 the FIPS Object Module is always generated as position
>> > independent code.  The corresponding "FIPS capable" OpenSSL
>> > distributions ("fips" option) will automatically include it in the
>> > libcrypto shared library.
>> >
>> > -Steve M.
>> >
>> > --
>> > Steve Marquess
>> > Open Source Software Institute
>> > [EMAIL PROTECTED]
>> >
>> > ______
>> > OpenSSL Project http://www.openssl.org
>> > User Support Mailing Listopenssl-users@openssl.org
>> > Automated List Manager   [EMAIL PROTECTED]
>> >
>> >
>>
>> --
>> View this message in context:
>> http://www.nabble.com/Openssl-Fips-Shared-Library-tp19552549p19558250.html
>> Sent from the OpenSSL - User mailing list archive at Nabble.com.
>>
>> __
>>  OpenSSL Project http://www.openssl.org
>> User Support Mailing Listopenssl-users@openssl.org
>> Automated List Manager   [EMAIL PROTECTED]
>>
>
>
>
> --
> Regards
> Joshi Chandran
>



-- 
Regards
Joshi Chandran


Re: Openssl Fips Shared Library

2008-09-19 Thread joshi chandran
How to link "fipsld" linking to set the in-core hash.

can u please tell me how to link fipsld to the fips module.

when i am using fipsld it is showing no -o specified

$ sh fipsld
no -o specified

can u please tell me wat does -o indicate here and please give the list of
other options and there purpose

Thank in Advance

Joshi Chandran

On Thu, Sep 18, 2008 at 10:44 PM, Steve Marquess <[EMAIL PROTECTED]
> wrote:

> Carlo Milono wrote:
>
>> How curious that this topic would come up today as I had a discussion on
>> it just two days earlier.  The OpenSSL FIPS 140-2 Security Policy Version
>> 1.1.2 states:
>> "The FIPS Object Module is not a static library. It may be incorporated
>> into shared library files or runtime executable application files, but
>> in any event can only be incorporated intact and in its entirety."
>>
>> This was leading me to believe that we could use this in a shared
>> library mode; perhaps we need to understand the boundaries of what may
>> be included in a shared library?
>>
>> How can we interpret the above quote?
>>
>
> The FIPS Object Module is just that, an object module (fipscanister.o).
>  For v1.1.x it may or may not consist of position independent code,
> depending on the platform.  If it does consist of position independent code
> then you can incorporate it into a shared library just like any other object
> module, subject of course to the "fipsld" linking to set the in-core hash.
>
> If it isn't position independent, then you're out of luck as the Security
> Policy rules don't allow you to modify the build-time parameters.
>
> For v1.2 the FIPS Object Module is always generated as position independent
> code.  The corresponding "FIPS capable" OpenSSL distributions ("fips"
> option) will automatically include it in the libcrypto shared library.
>
> -Steve M.
>
> --
> Steve Marquess
> Open Source Software Institute
> [EMAIL PROTECTED]
>
>
> __
> OpenSSL Project     http://www.openssl.org
> User Support Mailing Listopenssl-users@openssl.org
> Automated List Manager   [EMAIL PROTECTED]
>



-- 
Regards
Joshi Chandran


Re: Openssl Fips Shared Library

2008-09-22 Thread joshi chandran
Can u please tell me what FIPS_set_mode() returns
when i am using it will the FIPS_set_mode(1), returns 1 and
also when using FIPS_set_mode(1), returns 1

So how can i come out of fips mode once it is entered, how can i come out of
fips mode .

can u please explain it will sample program.

Thank in Advance
Joshi


On Sat, Sep 20, 2008 at 12:12 AM, Kyle Hamilton <[EMAIL PROTECTED]> wrote:

> use 'fipsld' the same way you would use your system-provided ld.  It
> requires a list of input files and a -o to set the name of the output
> file.
>
> -Kyle H
>
> On Fri, Sep 19, 2008 at 7:53 AM, joshi chandran
> <[EMAIL PROTECTED]> wrote:
> >
> > How to link "fipsld" linking to set the in-core hash.
> >
> > can u please tell me how to link fipsld to the fips module.
> >
> > when i am using fipsld it is showing no -o specified
> >
> > $ sh fipsld
> > no -o specified
> >
> > can u please tell me wat does -o indicate here and please give the list
> of
> > other options and there purpose
> >
> > Thank in Advance
> >
> > Joshi Chandran
> >
> > On Thu, Sep 18, 2008 at 10:44 PM, Steve Marquess
> > <[EMAIL PROTECTED]> wrote:
> >>
> >> Carlo Milono wrote:
> >>>
> >>> How curious that this topic would come up today as I had a discussion
> on
> >>> it just two days earlier.  The OpenSSL FIPS 140-2 Security Policy
> Version
> >>> 1.1.2 states:
> >>> "The FIPS Object Module is not a static library. It may be incorporated
> >>> into shared library files or runtime executable application files, but
> >>> in any event can only be incorporated intact and in its entirety."
> >>>
> >>> This was leading me to believe that we could use this in a shared
> >>> library mode; perhaps we need to understand the boundaries of what may
> >>> be included in a shared library?
> >>>
> >>> How can we interpret the above quote?
> >>
> >> The FIPS Object Module is just that, an object module (fipscanister.o).
> >>  For v1.1.x it may or may not consist of position independent code,
> >> depending on the platform.  If it does consist of position independent
> code
> >> then you can incorporate it into a shared library just like any other
> object
> >> module, subject of course to the "fipsld" linking to set the in-core
> hash.
> >>
> >> If it isn't position independent, then you're out of luck as the
> Security
> >> Policy rules don't allow you to modify the build-time parameters.
> >>
> >> For v1.2 the FIPS Object Module is always generated as position
> >> independent code.  The corresponding "FIPS capable" OpenSSL
> distributions
> >> ("fips" option) will automatically include it in the libcrypto shared
> >> library.
> >>
> >> -Steve M.
> >>
> >> --
> >> Steve Marquess
> >> Open Source Software Institute
> >> [EMAIL PROTECTED]
> >>
> >> ______
> >> OpenSSL Project http://www.openssl.org
> >> User Support Mailing Listopenssl-users@openssl.org
> >> Automated List Manager   [EMAIL PROTECTED]
> >
> >
> >
> > --
> > Regards
> > Joshi Chandran
> >
> __
> OpenSSL Project http://www.openssl.org
> User Support Mailing Listopenssl-users@openssl.org
> Automated List Manager   [EMAIL PROTECTED]
>



-- 
Regards
Joshi Chandran


Re: FIPS-capable curl: Solaris 9 - fingerprint does not match

2008-09-22 Thread joshi chandran
how to link fipsld with the application .Can u please explain


On Mon, Sep 22, 2008 at 4:14 PM, Dr. Stephen Henson <[EMAIL PROTECTED]>wrote:

> On Sun, Sep 21, 2008, Welling, Conrad Gerhart wrote:
>
> > Back to square 2 out of 3:
> >
> > Platform:
> > SunOS bear 5.9 Generic_118558-34 sun4u sparc SUNW,Ultra-5_10
> > gcc (GCC) 3.4.6
> > GNU ld version 2.17
> > GNU ar 2.17
> >
> > 1. Built fips-1.1.2 successfully
> >
> > 2. Built openssl-0.9.7m successfully with ...
> > ./Configure solaris-sparcv9-gcc27 fips
> --with-fipslibdir=/export/home/wellingc/dudc/openssl-fips-1.1.2/fips-1.0/
> >
> > (also tried with -shared, but no successful build)
> >
> > 3. Built modded curl executable, adding a --fips-mode option, using ...
> > ./configure --with-ssl=/usr/local/ssl --enable-http --disable-tftp
> --disable-file --disable-ldap --disable-ldaps --disable-dict
> --disable-telnet --with-ca-path=../x.dcerts --disable-ldap
> >
> > When curl executable is run from command-line with --fips-mode, get ...
> > SSL: 0:705134702:fips.c:212:0:error:2A07806E:FIPS
> routines:FIPS_check_dso:fingerprint does not match
> >
> > I've read all "fips solaris" forum messages + others ... I thought I had
> this down, but ...
> > a little guidance would be appreciated.
> >
>
> You need to link the application using the "fipsld" script. That will
> correctly obtain and embed the correct signature in the target.
>
> Steve.
> --
> Dr Stephen N. Henson. Email, S/MIME and PGP keys: see homepage
> OpenSSL project core developer and freelance consultant.
> Homepage: http://www.drh-consultancy.demon.co.uk
> __
> OpenSSL Project http://www.openssl.org
> User Support Mailing Listopenssl-users@openssl.org
> Automated List Manager   [EMAIL PROTECTED]
>



-- 
Regards
Joshi Chandran


Re: FIPS-capable curl: Solaris 9 - fingerprint does not match

2008-09-22 Thread joshi chandran
when i am using make CC=fipsld FIPSLD_CC=gcc , i am getting error message

   if test ! -z ""; then  /.../
austin.ibm.com/fs/projects/aix/aix53L/53L_SERVICE/ode_tools/power/usr/bin/perl./fixprogs
ssh_prng_cmds ;  fi
(cd openbsd-compat && make)
/gsa/ausgsa/projects/o/openssh/fipsssl/lib/fipsld -g -qnostdinc
-qnolm -I. -I.. -I. -I./.. -I/gsa/ausgsa/projects/o/openssh/fipsssl/include
-I/gsa/ausgsa/projects/o/openssh/zlib-1.2.3 -I
/gsa/ausgsa/projects/k/kerberos/build/krb514/current/export/rios_aix_4/usr/include
-I/.../
austin.ibm.com/fs/projects/aix/aix53L/53L_SERVICE/export/power/usr/include/-I/.../
austin.ibm.com/fs/projects/aix/aix53L/53L_SERVICE/export/power/usr/include/sys-I/gsa/ausgsa/projects/o/openssh/include
-DHAVE_CONFIG_H -c bsd-arc4random.c
gcc: unrecognized option `-qnostdinc'
gcc: unrecognized option `-qnolm'
 (E) Message system initialization, unable to open catalogs:
xlCfe.cat, /usr/ccs/lib/exe/default_msg/xlCfe.cat.
1506-005: (E) Error in message set 12, unable to retrieve message 173.
1506-005: (E) Error in message set 12, unable to retrieve message 155.
1506-005: (E) Error in message set 12, unable to retrieve message 173.
1506-005: (E) Error in message set 12, unable to retrieve message 297.
1506-005: (E) Error in message set 12, unable to retrieve message 312.
make: The error code from the last command is 1.

Can u please  help me

Thanks
Joshi

On Tue, Sep 23, 2008 at 5:31 AM, Welling, Conrad Gerhart <
[EMAIL PROTECTED]> wrote:

> Dr. Henson:
>
> Thanks for your quick response and your patience.  Sometimes I have a way
> of trying to make things so much harder than they need to be.  I reread page
> 33 of the OFOM User Guide ...
>
> "The fipsld command requires that the CC and/or FIPSLD_CC environment
> variables be set, with the latter taking precedence. These variables allow a
> typical Makefile to be used without modification by specifying a command of
> the form
>
>make CC=fipsld FIPSLD_CC=gcc
>
> where fipsld is invoked by make in lieu of the original compiler and linker
> (gcc in this
> example), and in turn invokes that compiler where appropriate."
>
> So, I stopped trying to edit the curl Makefiles and, instead, actually
> tried doing exactly what Steve Marquess says to do in the OFOM User Guide
> (along with copying fipsld into the necessary curl source directories and
> telling make where to find openssl).  Of course, my FIPS-capable curl built
> successfully.
>
> Thanks again.
>
> -Original Message-
> From: [EMAIL PROTECTED] [mailto:
> [EMAIL PROTECTED] Behalf Of Dr. Stephen Henson
> Sent: Monday, September 22, 2008 3:44 AM
> To: openssl-users@openssl.org
> Subject: Re: FIPS-capable curl: Solaris 9 - fingerprint does not match
>
>
> On Sun, Sep 21, 2008, Welling, Conrad Gerhart wrote:
>
> > Back to square 2 out of 3:
> >
> > Platform:
> > SunOS bear 5.9 Generic_118558-34 sun4u sparc SUNW,Ultra-5_10
> > gcc (GCC) 3.4.6
> > GNU ld version 2.17
> > GNU ar 2.17
> >
> > 1. Built fips-1.1.2 successfully
> >
> > 2. Built openssl-0.9.7m successfully with ...
> > ./Configure solaris-sparcv9-gcc27 fips
> --with-fipslibdir=/export/home/wellingc/dudc/openssl-fips-1.1.2/fips-1.0/
> >
> > (also tried with -shared, but no successful build)
> >
> > 3. Built modded curl executable, adding a --fips-mode option, using ...
> > ./configure --with-ssl=/usr/local/ssl --enable-http --disable-tftp
> --disable-file --disable-ldap --disable-ldaps --disable-dict
> --disable-telnet --with-ca-path=../x.dcerts --disable-ldap
> >
> > When curl executable is run from command-line with --fips-mode, get ...
> > SSL: 0:705134702:fips.c:212:0:error:2A07806E:FIPS
> routines:FIPS_check_dso:fingerprint does not match
> >
> > I've read all "fips solaris" forum messages + others ... I thought I had
> this down, but ...
> > a little guidance would be appreciated.
> >
>
> You need to link the application using the "fipsld" script. That will
> correctly obtain and embed the correct signature in the target.
>
> Steve.
> --
> Dr Stephen N. Henson. Email, S/MIME and PGP keys: see homepage
> OpenSSL project core developer and freelance consultant.
> Homepage: http://www.drh-consultancy.demon.co.uk
> __
> OpenSSL Project http://www.openssl.org
> User Support Mailing Listopenssl-users@openssl.org
> Automated List Manager   [EMAIL PROTECTED]
> __
> OpenSSL Project http://www.openssl.org
> User Support Mailing Listopenssl-users@openssl.org
> Automated List Manager   [EMAIL PROTECTED]
>



-- 
Regards
Joshi Chandran


Re: FIPS-capable curl: Solaris 9 - fingerprint does not match

2008-09-24 Thread joshi chandran
when i have done FIPS_mod_set(1),it goes into the fips mode and when i am
doing FIPS_mod_set(0), it come out of fips mode but when i again apply
FIPS_mod_set(1) ,it does not goes to fips mode

can u please help me out

Thanks
Joshi


On Wed, Sep 24, 2008 at 3:55 AM, Tim Hudson <[EMAIL PROTECTED]> wrote:

> joshi chandran wrote:
>
>> when i am using make CC=fipsld FIPSLD_CC=gcc , i am getting error message
>>
> > gcc: unrecognized option `-qnostdinc'
> > gcc: unrecognized option `-qnolm'
>
> Those are xlc options - i.e. the IBM compiler.
> Perhaps
>make CC=fipsld FIPSLD_CC=xlc
> might be a better option. Look at the settings for CC in the top-level
> Makefile and that is the value to use for FIPSLD_CC
>
> Tim.
>



-- 
Regards
Joshi Chandran


Re: FIPS-capable curl: Solaris 9 - fingerprint does not match

2008-09-24 Thread joshi chandran
Is it possible to create FIPS enabled openssl shared library(openssl 0.9.7m)
? I am not able to build shared library .I am using AIX unix system

Thanks
Joshi

On Wed, Sep 24, 2008 at 6:47 PM, joshi chandran
<[EMAIL PROTECTED]>wrote:

> when i have done FIPS_mod_set(1),it goes into the fips mode and when i am
> doing FIPS_mod_set(0), it come out of fips mode but when i again apply
> FIPS_mod_set(1) ,it does not goes to fips mode
>
> can u please help me out
>
> Thanks
> Joshi
>
>
>
> On Wed, Sep 24, 2008 at 3:55 AM, Tim Hudson <[EMAIL PROTECTED]> wrote:
>
>> joshi chandran wrote:
>>
>>> when i am using make CC=fipsld FIPSLD_CC=gcc , i am getting error message
>>>
>> > gcc: unrecognized option `-qnostdinc'
>> > gcc: unrecognized option `-qnolm'
>>
>> Those are xlc options - i.e. the IBM compiler.
>> Perhaps
>>make CC=fipsld FIPSLD_CC=xlc
>> might be a better option. Look at the settings for CC in the top-level
>> Makefile and that is the value to use for FIPSLD_CC
>>
>> Tim.
>>
>
>
>
> --
> Regards
> Joshi Chandran
>



-- 
Regards
Joshi Chandran


Re: FIPS-capable curl: Solaris 9 - fingerprint does not match

2008-09-25 Thread joshi chandran
I am trying to test the Fips capable openssl and when i am testing it i am
getting some error

openssl req -x509 -newkey rsa:2048 -out $HOME/exampleca/cacert.pem -outform
PEM

Generating a 2048 bit RSA private key
+++
..+++
writing new private key to '//exampleca/private/cakey.pem'
Enter PEM pass phrase:
Verifying - Enter PEM pass phrase:
-
digest.c(150): OpenSSL internal error, assertion failed: Digest update
previous FIPS forbidden algorithm error ignored
IOT/Abort trap(coredump)

There is another error also when i am issuing the smime command

Data Base Updated
openssl smime -encrypt -in /server_req/mail.txt -des3 -out
/server_req/mail.enc /exampleca/certs/01.pem

in smime command
Enter pass phrase for /server_req/server_priv_key.pem:
unable to load signing key file
704646:error:0608008D:digital envelope routines:EVP_DigestInit:disabled for
fips:digest.c:237:
704646:error:06065064:digital envelope routines:EVP_DecryptFinal:bad
decrypt:evp_enc.c:509:
704646:error:0906A065:PEM routines:PEM_do_header:bad decrypt:pem_lib.c:423:


Does this means that this function (EVP_DigestInit)  is not supported by
fips mode

Please help me

Thanks

Joshi

On Thu, Sep 25, 2008 at 5:55 AM, Steve Marquess
<[EMAIL PROTECTED]>wrote:

> David Schwartz wrote:
> > In many cases, FIPS actually results in (you might reasonably think, at
> least) reduced security. ...
> >
> > C) Quasi-FIPS. All FIPS rules are followed, except where it is genuinely
> believed that these rules reduce security or are unreasonably impractical.
> For example, obvious bugfixes might be allowed, even if the code hadn't been
> re-FIPS checked. In the case of OpenSSL, you might allow changes to
> optimization or code generation flags. An "obviously correct" optimized SHA1
> algorithm might be used, even if it hasn't been approved yet. (Or if it
> wasn't selected for the platform due to a detection bug.)
> >
> IMHO it's hard to argue that FIPS *validated* software isn't clearly
> less secure in a real world sense, simply due to the fact that the
> validation process by its very nature provides heavy disincentives to
> the aggressive and proactive pursuit of suspected security vulnerabilities.
>
> Frankly you shouldn't use FIPS validated software unless specifically
> required to for formal policy compliance reasons.
>
> Use of FIPS *compliant* cryptography (strong crypto and FIPS approved
> algorithms) is another matter, but then you're not artificially
> constraining your options for identifying and correcting implementation
> vulnerabilities.
>
> -Steve M.
>
> --
> Steve Marquess
> Open Source Software institute
> [EMAIL PROTECTED]
>
> __
> OpenSSL Project http://www.openssl.org
> User Support Mailing Listopenssl-users@openssl.org
> Automated List Manager   [EMAIL PROTECTED]
>



-- 
Regards
Joshi Chandran


Re: FIPS-capable curl: Solaris 9 - fingerprint does not match

2008-09-25 Thread joshi chandran
I am using openssl 0.9.7m . Yes,I  have the used the  OPENSSL_FIPS=1 when
calling the command . i am attaching the testscript which i am using.
please help me

Thanks
Joshi




On Thu, Sep 25, 2008 at 10:02 PM, Dr. Stephen Henson <[EMAIL PROTECTED]>wrote:

> On Thu, Sep 25, 2008, joshi chandran wrote:
>
> > I am trying to test the Fips capable openssl and when i am testing it i
> am
> > getting some error
> >
> > openssl req -x509 -newkey rsa:2048 -out $HOME/exampleca/cacert.pem
> -outform
> > PEM
> >
> > Generating a 2048 bit RSA private key
> >
> +++
> > ..+++
> > writing new private key to '//exampleca/private/cakey.pem'
> > Enter PEM pass phrase:
> > Verifying - Enter PEM pass phrase:
> > -
> > digest.c(150): OpenSSL internal error, assertion failed: Digest update
> > previous FIPS forbidden algorithm error ignored
> > IOT/Abort trap(coredump)
> >
>
> What version of OpenSSL are you using to produce that error?
>
> Do you have the environment variable OPENSSL_FIPS=1 when you call that
> command?
>
> Does your config file openssl.cnf use MD5 as a signing algorithm? If so you
> need to change it to SHA1.
>
> Steve.
> --
> Dr Stephen N. Henson. Email, S/MIME and PGP keys: see homepage
> OpenSSL project core developer and freelance consultant.
> Homepage: http://www.drh-consultancy.demon.co.uk
> __
>  OpenSSL Project http://www.openssl.org
> User Support Mailing Listopenssl-users@openssl.org
> Automated List Manager   [EMAIL PROTECTED]
>



-- 
Regards
Joshi Chandran
#! /bin/ksh

integer final_count=30
integer err_count=0
integer pass_count=0

report()
{
if [ $? -ne 0 ]; then
(( err_count = err_count + 1 ));
echo 
"*Failed*"
fi

}

# Creating the CA's environment
echo "***Creating the CA's environment***"
rm -r $HOME/exampleca >/dev/null 2>&1
rm -r $HOME/server_req >/dev/null 2>&1
rm mail* >/dev/null 2>&1
mkdir -p $HOME/exampleca
cd $HOME/exampleca
mkdir certs private
chmod g-rwx,o-rwx private
echo '01' > serial
touch index.txt
dir=$HOME"/exampleca"
cd ~

# Creating the configuration file for CA
echo "***Creating the configuration file for CA"
cat >> $HOME/exampleca/openssl.cnf << EOF
[ ca ]
default_ca = exampleca

[ exampleca ]
dir = $HOME/exampleca
certificate = $dir/cacert.pem
database = $dir/index.txt
new_certs_dir = $dir/certs
private_key = $dir/private/cakey.pem
serial = $dir/serial
default_crl_days = 7
default_days = 365
default_md = md5
policy = exampleca_policy
x509_extensions = certificate_extensions

[ exampleca_policy ]
commonName = supplied
stateOrProvinceName = supplied
countryName = supplied
emailAddress = supplied
organizationName = supplied
organizationalUnitName = optional

[ certificate_extensions ]
basicConstraints = CA:false

[ req ]
default_bits = 2048
default_keyfile = $HOME/exampleca/private/cakey.pem
default_md = md5
prompt = no
distinguished_name = root_ca_distinguished_name
x509_extensions = root_ca_extensions

[ root_ca_distinguished_name ]
commonName = Example CA
stateOrProvinceName = Virginia
countryName = US
emailAddress = [EMAIL PROTECTED]
organizationName = Root Certification Authority

[ root_ca_extensions ]
basicConstraints = CA:true
EOF

report

# Telling OpenSSL where to find our configuration file
OPENSSL_CONF=$HOME/exampleca/openssl.cnf
export OPENSSL_CONF

# Generating our self-signed root certificate
echo "*Generating our self-signed root 
certificate"
openssl req -x509 -newkey rsa:2048 -out $HOME/exampleca/cacert.pem -outform PEM
report
echo "*Displaying self-signed root 
certificate"
openssl x509 -in $HOME/exampleca/cacert.pem -text -noout
report
echo "*End of 
Display*"

# Generating a certificate request
echo "*Generating a certificate 
request"
mkdir -p $HOME/server_req
cat >> $HOME/server_req/openssl.cnf << EOF

[ ca ]
default_ca = exampleca

[ exampleca ]
dir = $HOME/exampleca
certificate = $dir/cacert.pem
database = $dir/index.txt
new_certs_dir = $dir/certs
private_key = $dir/private/cakey.pem
serial = $dir/serial
default_crl_days = 7
default_days = 365
de

Re: How to convert .der file to .pem

2008-10-08 Thread joshi chandran
Is there any way to convert .PEM to pkcs12

Please help me

Thanks Joshi

On Mon, Sep 22, 2008 at 6:10 PM, vinni rathore <[EMAIL PROTECTED]> wrote:

> Hi,
>
> Try to use this
>
> openssl x509 –in input.crt –inform DER –out output.crt –outform PEM
>
> If u still get the error then tell the exact error u r getting during
> conversion.
>
>
> On Mon, Sep 22, 2008 at 5:54 PM, Ajeet kumar.S
> <[EMAIL PROTECTED]> wrote:
> > Hi all;
> >Thank you Luciano Quartarone for your help. I tried to convert .der
> file
> > to .pem using your given idea but I did not get success.I am using open
> ssl
> > command line tool. Any thing more I need to do?
> >
> > Regards,
> >
> > --Ajeet  Kumar  Singh
> >
> >
> >
> > Sarve Bhavantu Sukhina ,Sarve Santu NiramayaSarve Bhadrani Pashyantu ,
> Maa
> > Kaschit Dukha Bhagh Bhavet
> >
> >
> >
> > -Original Message-
> > From: [EMAIL PROTECTED]
> > [mailto:[EMAIL PROTECTED] On Behalf Of Luciano Quartarone
> > Sent: Monday, September 22, 2008 5:14 PM
> > To: openssl-users@openssl.org
> > Subject: Re: How to convert .der file to .pem
> >
> > try with:
> > openssl x509 -inform DER -in  -outform PEM -out 
> >
> > or look at www.openssl.org
> >
> > LQ
> >
> >
> > Ajeet kumar.S ha scritto:
> >> Hi all;
> >>
> >> Thanks all of you for your support. I have cert.der file and I want to
> >> convert it cert.pem file using open ssl. How I can convert it. Please
> >> Tell me.
> >>
> >>
> >>
> >> Thank you.
> >>
> >> Regards,
> >>
> >> --Ajeet  Kumar  Singh
> >>
> >>
> >>
> >>
> >>
> >>
> >>
> >
> > __
> > OpenSSL Project http://www.openssl.org
> > User Support Mailing Listopenssl-users@openssl.org
> > Automated List Manager   [EMAIL PROTECTED]
> >
> >
> > __
> > OpenSSL Project http://www.openssl.org
> > User Support Mailing Listopenssl-users@openssl.org
> > Automated List Manager   [EMAIL PROTECTED]
> >
>
>
>
> --
> regards,
> Vineeta Kumari
> Software engg
> Mobera Systems
> Chandigarh
> __
> OpenSSL Project http://www.openssl.org
> User Support Mailing Listopenssl-users@openssl.org
> Automated List Manager   [EMAIL PROTECTED]
>



-- 
Regards
Joshi Chandran


Re: FIPS fail

2008-10-09 Thread joshi chandran
Is this means windows can generate shared library of openssl 9.7m with
openssl fips 1.1.2 but i was not able to make the shared library of openssl
9.7m when i am compiled with openssl fips 1.1.2 object module in Unix(AIX)
system .Does it means the coming fips version 1.2 will allow shared library
generation of openssl 9.8 version

Thanks
Joshi

On Fri, Oct 3, 2008 at 6:45 PM, Thomas J. Hruska <
[EMAIL PROTECTED]> wrote:

> Dr. Stephen Henson wrote:
>
>> On Thu, Oct 02, 2008, Thomas J. Hruska wrote:
>>
>> Thomas J. Hruska wrote:
>>>
>>> Needless to say, given the lack of response and further web searching
>>> reveals issues with older VC++ linkers core dumping(?) against the latest
>>> MinGW and I've already put forth 30+ hours (not counting the preparation
>>> time of several months!), two CD-Rs, and who knows how much money into an
>>> attempted production of a default OpenSSL FIPS 140-2 compliant binary build
>>> for Windows (complete with fancy installer), I'm going to simply hold off
>>> until 1.2.0 becomes available and then try again at that time.  Mixing
>>> together binaries from two totally different compilers is not only a bad
>>> idea, it is a horrifically terrible idea. The fact that this supposedly
>>> works at all for some people is a miracle.
>>>
>>>
>> The 1.1.2 module (which I only became involved with towards the end) was
>> designed round a Unix build system.
>>
>> For the 1.1.2 module it was a choice of mixing compilers or not having any
>> Windows build at all. It was decided that was better than nothing.
>>
>> What version of gcc do you have with MSYS? There are issues with some
>> versions
>> of gcc.
>>
>
> $ gcc --version
> gcc.exe (GCC) 3.4.5 (mingw-vista special r3)
> Copyright (C) 2004 Free Software Foundation, Inc.
> This is free software; see the source for copying conditions.  There is NO
> warranty; not even for MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.
>
>
> Not that it really matters...
>
>
>  Supposedly, from what I've read, 1.2.0 doesn't require mixing compilers.
>>>  That should significantly clean things up.  Assuming, of course, "not
>>> mixing compilers" allows the use of VC++.  If I have to use MinGW, I will be
>>> very annoyed.  I'm also hoping I can compile against 0.9.8x instead of
>>> 0.9.7m.
>>>
>>>
>> The 1.2 module (which I was involved with from the start) has Windows as a
>> standard platform. It can be built using VC++ only.
>>
>> Steve.
>>
>
> Excellent.  I'll just wait for the 1.2 module then.  I know that it could
> be a long wait of many months since FIPS validation takes a while.
>
> BTW, during the FIPS creation process that I used (a set of steps that I
> plan on using for all releases), I noticed that the 'MD5', 'SHA1', and 'PGP
> sign' links next to the source code download links at:
>
> https://www.openssl.org/source/
>
> Are broken (not really 'broken' per se, but blank).  I had to go out to the
> FTP site to get the signatures.
>
> --
> Thomas Hruska
> Shining Light Productions
>
> Home of BMP2AVI, Nuclear Vision, ProtoNova, and Win32 OpenSSL.
> http://www.slproweb.com/
>
>
> __
>  OpenSSL Project http://www.openssl.org
> User Support Mailing Listopenssl-users@openssl.org
> Automated List Manager   [EMAIL PROTECTED]
>



-- 
Regards
Joshi Chandran


Re: how to enable debug mode of openssl

2008-10-09 Thread joshi chandran
Hi All,

I am trying to make openssh compatible with the fips enabled openssl . can
anybody tell me what all changes i have make in openssh

Please help

Thanks

Joshi





problem was solved by updating openssl to the latest release 0.9.8i
(the one I used was 0.9.8a.) But I still don't know the root cause of
that aborting. Anyway, it works now.

Thanks,
Elven

> Date: Wed, 8 Oct 2008 01:21:08 -0700
> Subject: Re: how to enable debug mode of openssl
> From: [EMAIL PROTECTED]
> To: [EMAIL PROTECTED]
>
> Hi Elven,
>
> I suggest try using ERR_print_errors (http://openssl.org/docs/crypto/
> ERR_print_errors.html#) to get an idea of what error you are getting.
> You can call it right after your call to PEM_read_bio_X509. It is most
> likely to be a problem with the certificate data that you are feeding
> to OpenSSL. Have you tried verifying that the data is valid?
>
> --- Kah
>
> On Oct 8, 2:46 pm, [EMAIL PROTECTED] (曹飞) wrote:
> > I am using openssl in arm embedded platform. I want to support https, so
it will use openssl. But I have encouterd some problem. The application
aborted for some unknown reason. I tried to trace the problem and found the
it aborted on call "PEM_read_bio_X509" (ssl_rsa.c). And I can't t race deep
more.

>
> > >
> > > So is there any way to enable debug mode of openssl so that I can trace
> more deeply to find out the problem?
> > >
> > > Thanks.
> > > Elven
> > > _
> > > 一点即聊,MSN推出新功能"点我!"http://im.live.cn/click/
> >
>
>
> --
> MSN上小游戏,工作休闲两不误! 马上就开始玩! <http://im.live.cn/minigame>
>



-- 
Regards
Joshi Chandran


Re: FIPS fail

2008-10-10 Thread joshi chandran
Hi All,

Can any body give me small program which set in fips mode and uses non fips
algorithm ,hence  fails while running .

Thanks
Joshi

On Thu, Oct 9, 2008 at 5:13 PM, Steve Marquess
<[EMAIL PROTECTED]>wrote:

> Kyle Hamilton wrote:
>
>> Okay.  Let's see if I can piece together everything I've learned about
>> the FIPS experience so far...
>>
>> FIPS-1.1.2 only generates a static fipscanister, which can only be
>> used to generate a static library.  (except on Windows, where it can
>> be built into a shared library.)
>>
>
> The fipscanister.o for v1.1.2 is generated with position independent code
> or not depending on the default build options borrowed from the 0.9.7
> baseline at the time.  On Windows it happens that position independent code
> is generated automatically, hence that object module can be incorporated in
> shared code.  On Linux and some other platforms that isn't the case.
>
> Note we were originally going to test both shared and non-shared builds,
> but ran out of money for the test lab fees (each such "platform" variation
> drives up the price).
>
> For v1.2 we decided to just force position independent code generation
> universally.
>
>  ...
>>
>> FIPS-1.1.2 is the most recent validated fipscanister.  1.2.0 is
>> currently submitted for review, but there is no timeframe (other than
>> 'it could take until the end of the next ice age') for its validation.
>>
>
> The latest info I've heard is that there is a new reviewer (new hire) who
> has decided to revisit the entire history of the original validation from
> the beginning, i.e. effectively second guessing the CMVP reviewers of those
> prior validations.  That first validation took five years, an Internet ice
> age indeed.
>
>  If you want to test the functionality of FIPS-1.2.0, you need to
>> download the latest openssl-0.9.8-fips-test-SNAP-[date].tar.gz from
>> the snapshots/ directory, as well as openssl-fips-test-1.2.0.tar.gz
>> from the same location.
>>
>> If you want a currently-validated solution, you need
>> openssl-0.9.7m.tar.gz and openssl-fips-1.1.2.tar.gz.
>>
>> Anyone got any comments on whether I've gotten this right?
>>
>
> You did.
>
> -Steve M.
>
> --
> Steve Marquess
> Open Source Software Institute
> [EMAIL PROTECTED]
>
>
> ______
> OpenSSL Project http://www.openssl.org
> User Support Mailing Listopenssl-users@openssl.org
> Automated List Manager   [EMAIL PROTECTED]
>



-- 
Regards
Joshi Chandran


Re: FIPS fail

2008-10-12 Thread joshi chandran
Is there any patch which can i apply for openssh to make it compatible with
fips enabled openssl

Thanks
Joshi

On Thu, Oct 9, 2008 at 5:13 PM, Steve Marquess
<[EMAIL PROTECTED]>wrote:

> Kyle Hamilton wrote:
>
>> Okay.  Let's see if I can piece together everything I've learned about
>> the FIPS experience so far...
>>
>> FIPS-1.1.2 only generates a static fipscanister, which can only be
>> used to generate a static library.  (except on Windows, where it can
>> be built into a shared library.)
>>
>
> The fipscanister.o for v1.1.2 is generated with position independent code
> or not depending on the default build options borrowed from the 0.9.7
> baseline at the time.  On Windows it happens that position independent code
> is generated automatically, hence that object module can be incorporated in
> shared code.  On Linux and some other platforms that isn't the case.
>
> Note we were originally going to test both shared and non-shared builds,
> but ran out of money for the test lab fees (each such "platform" variation
> drives up the price).
>
> For v1.2 we decided to just force position independent code generation
> universally.
>
> ...
>>
>> FIPS-1.1.2 is the most recent validated fipscanister.  1.2.0 is
>> currently submitted for review, but there is no timeframe (other than
>> 'it could take until the end of the next ice age') for its validation.
>>
>
> The latest info I've heard is that there is a new reviewer (new hire) who
> has decided to revisit the entire history of the original validation from
> the beginning, i.e. effectively second guessing the CMVP reviewers of those
> prior validations.  That first validation took five years, an Internet ice
> age indeed.
>
> If you want to test the functionality of FIPS-1.2.0, you need to
>> download the latest openssl-0.9.8-fips-test-SNAP-[date].tar.gz from
>> the snapshots/ directory, as well as openssl-fips-test-1.2.0.tar.gz
>> from the same location.
>>
>> If you want a currently-validated solution, you need
>> openssl-0.9.7m.tar.gz and openssl-fips-1.1.2.tar.gz.
>>
>> Anyone got any comments on whether I've gotten this right?
>>
>
> You did.
>
> -Steve M.
>
> --
> Steve Marquess
> Open Source Software Institute
> [EMAIL PROTECTED]
>
>
> ______
> OpenSSL Project http://www.openssl.org
> User Support Mailing Listopenssl-users@openssl.org
> Automated List Manager   [EMAIL PROTECTED]
>



-- 
Regards
Joshi Chandran


Re: trouble with Aix

2008-10-12 Thread joshi chandran
same problem i have also faced did u got any solution for it

Thanks
Joshi

On Sun, Sep 28, 2008 at 2:22 AM, eric larrouy <[EMAIL PROTECTED]>wrote:

>  Hello
>
> I have a trouble with opennsl to encrypt (in aes128)  files ( > 80Mb). My
> encrypt file have just 192 octets. Have you this problem ?
>
> Have you an idea?
>
> It is very urgent
>
> Best regards
>
> Eric Larrouy
>
>
>



-- 
Regards
Joshi Chandran


Re: how to enable debug mode of openssl

2008-10-13 Thread joshi chandran
Is this bug "memory leak with mod_ssl and zlib compression (CVE-2008-1678) "
is resolved in openssl 0.9.8h

Please help

Thanks

Joshi

On Thu, Oct 9, 2008 at 4:09 PM, Kyle Hamilton <[EMAIL PROTECTED]> wrote:

> You would probably need a FIPS_mode_set(1) somewhere after the openssl
> library initialization, and it would be a good thing to never keep any
> keys in the clear.  As well, it would need to statically link to
> openssl 0.9.7m built with the fipscanister module.  (If it uses
> features specific to openssl 0.9.8, you cannot create a FIPS-validated
> version at this time.)
>
> This is not an openssh support list, and I have not looked at the
> openssh sources to see what else would need to be changed.
>
> You must ALWAYS follow the FIPS security policy when dealing with
> anything FIPS.  If the security policy says that some constraint must
> be met, that constraint must be met -- no matter how it impacts the
> function or even possibility of doing what you want.
>
> -Kyle H
>
> 2008/10/9 joshi chandran <[EMAIL PROTECTED]>:
> > Hi All,
> >
> > I am trying to make openssh compatible with the fips enabled openssl .
> can
> > anybody tell me what all changes i have make in openssh
> >
> > Please help
> >
> > Thanks
> >
> > Joshi
> >
> >
> >
> >
> >
> > problem was solved by updating openssl to the latest release 0.9.8i
> > (the one I used was 0.9.8a.) But I still don't know the root cause of
> > that aborting. Anyway, it works now.
> >
> > Thanks,
> > Elven
> >
> >> Date: Wed, 8 Oct 2008 01:21:08 -0700
> >> Subject: Re: how to enable debug mode of openssl
> >> From: [EMAIL PROTECTED]
> >> To: [EMAIL PROTECTED]
> >>
> >> Hi Elven,
> >>
> >> I suggest try using ERR_print_errors (http://openssl.org/docs/crypto/
> >> ERR_print_errors.html#) to get an idea of what error you are getting.
> >> You can call it right after your call to PEM_read_bio_X509. It is most
> >> likely to be a problem with the certificate data that you are feeding
> >> to OpenSSL. Have you tried verifying that the data is valid?
> >>
> >> --- Kah
> >>
> >> On Oct 8, 2:46 pm, [EMAIL PROTECTED] (曹飞) wrote:
> >> > I am using openssl in arm embedded platform. I want to support https,
> so
> >> > it will use openssl. But I have encouterd some problem. The
> application
> >> > aborted for some unknown reason. I tried to trace the problem and
> found the
> >> > it aborted on call "PEM_read_bio_X509" (ssl_rsa.c). And I can't t race
> deep
> >> > more.
> >>
> >> > >
> >> > > So is there any way to enable debug mode of openssl so that I can
> >> > > trace more deeply to find out the problem?
> >> > >
> >> > > Thanks.
> >> > > Elven
> >> > > _
> >> > > 一点即聊,MSN推出新功能"点我!"http://im.live.cn/click/
> >> >
> >>
> >>
> >> 
> >> MSN上小游戏,工作休闲两不误! 马上就开始玩!
> >
> >
> > --
> > Regards
> > Joshi Chandran
> >
>



-- 
Regards
Joshi Chandran


Re: how to enable debug mode of openssl

2008-10-13 Thread joshi chandran
Is there any patches to resolve the bug "memory leak with mod_ssl and zlib
compression (CVE-2008-1678) ".

Please help

Thanks

Joshi

2008/10/13 joshi chandran <[EMAIL PROTECTED]>

> Is this bug "memory leak with mod_ssl and zlib compression (CVE-2008-1678)
> " is resolved in openssl 0.9.8h
>
> Please help
>
> Thanks
>
> Joshi
>
>
> On Thu, Oct 9, 2008 at 4:09 PM, Kyle Hamilton <[EMAIL PROTECTED]> wrote:
>
>> You would probably need a FIPS_mode_set(1) somewhere after the openssl
>> library initialization, and it would be a good thing to never keep any
>> keys in the clear.  As well, it would need to statically link to
>> openssl 0.9.7m built with the fipscanister module.  (If it uses
>> features specific to openssl 0.9.8, you cannot create a FIPS-validated
>> version at this time.)
>>
>> This is not an openssh support list, and I have not looked at the
>> openssh sources to see what else would need to be changed.
>>
>> You must ALWAYS follow the FIPS security policy when dealing with
>> anything FIPS.  If the security policy says that some constraint must
>> be met, that constraint must be met -- no matter how it impacts the
>> function or even possibility of doing what you want.
>>
>> -Kyle H
>>
>> 2008/10/9 joshi chandran <[EMAIL PROTECTED]>:
>> > Hi All,
>> >
>> > I am trying to make openssh compatible with the fips enabled openssl .
>> can
>> > anybody tell me what all changes i have make in openssh
>> >
>> > Please help
>> >
>> > Thanks
>> >
>> > Joshi
>> >
>> >
>> >
>> >
>> >
>> > problem was solved by updating openssl to the latest release 0.9.8i
>> > (the one I used was 0.9.8a.) But I still don't know the root cause of
>> > that aborting. Anyway, it works now.
>> >
>> > Thanks,
>> > Elven
>> >
>> >> Date: Wed, 8 Oct 2008 01:21:08 -0700
>> >> Subject: Re: how to enable debug mode of openssl
>> >> From: [EMAIL PROTECTED]
>> >> To: [EMAIL PROTECTED]
>> >>
>> >> Hi Elven,
>> >>
>> >> I suggest try using ERR_print_errors (http://openssl.org/docs/crypto/
>> >> ERR_print_errors.html#) to get an idea of what error you are getting.
>> >> You can call it right after your call to PEM_read_bio_X509. It is most
>> >> likely to be a problem with the certificate data that you are feeding
>> >> to OpenSSL. Have you tried verifying that the data is valid?
>> >>
>> >> --- Kah
>> >>
>> >> On Oct 8, 2:46 pm, [EMAIL PROTECTED] (曹飞) wrote:
>> >> > I am using openssl in arm embedded platform. I want to support https,
>> so
>> >> > it will use openssl. But I have encouterd some problem. The
>> application
>> >> > aborted for some unknown reason. I tried to trace the problem and
>> found the
>> >> > it aborted on call "PEM_read_bio_X509" (ssl_rsa.c). And I can't t
>> race deep
>> >> > more.
>> >>
>> >> > >
>> >> > > So is there any way to enable debug mode of openssl so that I can
>> >> > > trace more deeply to find out the problem?
>> >> > >
>> >> > > Thanks.
>> >> > > Elven
>> >> > > _
>> >> > > 一点即聊,MSN推出新功能"点我!"http://im.live.cn/click/
>> >> >
>> >>
>> >>
>> >> 
>> >> MSN上小游戏,工作休闲两不误! 马上就开始玩!
>> >
>> >
>> > --
>> > Regards
>> > Joshi Chandran
>> >
>>
>
>
>
> --
> Regards
> Joshi Chandran
>



-- 
Regards
Joshi Chandran


Re: Hello

2008-10-14 Thread joshi chandran
Yes this is the right place to ask questions regarding openssl

On Tue, Oct 14, 2008 at 8:51 PM, So Gerald <[EMAIL PROTECTED]> wrote:

> Yes
>
> 2008/8/23 Nguyen, Harris <[EMAIL PROTECTED]>
>
>> Hello,
>> Is this the right place to ask Openssl programming issues?
>> Thanks
>>
>> Harris Nguyen
>> __
>> OpenSSL Project http://www.openssl.org
>> User Support Mailing Listopenssl-users@openssl.org
>> Automated List Manager   [EMAIL PROTECTED]
>>
>
>


-- 
Regards
Joshi Chandran


Re: What would cause a seg fault?

2008-10-22 Thread joshi chandran
I have used openssl 9.8h version
There is mistake in previous mail

"I have recompiled the shared object file SSLeay.so to link to the version
of
libssl.a provided by openssl.base(openssl 9.8h).  Previously, this
shared object linked to the libssl.a  provided by the RPM on
the Linux Toolbox for AIX.Now that the shared object is linked against the
newer library",

Rest are same .

Please help

Thanks
Joshi

On Wed, Oct 22, 2008 at 4:29 PM, joshi chandra
<[EMAIL PROTECTED]>wrote:

>
> Hi All,
>
> I have recompiled the shared object file SSLeay.so to link to the version
> of
> libssl.a provided by openssl.base.  Previously, this
> shared object linked to the libssl.a (openssl 9.8h) provided by the RPM on
> the Linux Toolbox for AIX.Now that the shared object is linked against the
> newer library,
> it seg faults in a call to the function SSL_CTX_ctrl().
>
>
> Code Dump
>
> Segmentation fault in SSL_CTX_ctrl at 0xd1f6bb80 ($t1)
> 0xd1f6bb80 (SSL_CTX_ctrl+0xfc) 900300a4 stw   r0,0xa4(r3)
> (dbx) where
> SSL_CTX_ctrl() at 0xd1f6bb80
> XS_Crypt__SSLeay__CTX_new() at 0xd1f64318
> Perl_pp_entersub() at 0xd31100d8
> Perl_runops_standard() at 0xd3163ad4
> S_call_body() at 0xd3075950
> Perl_call_sv() at 0xd3079dac
> S_call_list_body() at 0xd30758bc
> Perl_call_list() at 0xd307c4f0
> Perl_newATTRSUB() at 0xd30d3318
> Perl_utilize() at 0xd30d3af8
> Perl_yyparse() at 0xd310a494
> S_parse_body() at 0xd30765e0
> perl_parse() at 0xd307ccc0
> main() at 0x1460
>
> Here is the full ld command,
> ld  -bhalt:4 -bM:SRE
> -bI:/usr/opt/perl5/lib/5.8.2/aix-thread-multi/CORE/perl.exp -bE:SSLeay.exp
> -bnoentry -lpthreads -lc_r SSLeay.o  -o
> blib/arch/auto/Crypt/SSLeay/SSLeay.so   -L/usr/lib -lssl -lcrypto
>
> Also, here is the output of 'dump -Tv SSLeay.so' for the symbol in the
> stack
> trace:
>***Loader Symbol Table Information***
> [Index]  Value  Scn IMEX Sclass   Type   IMPid Name
> [71]0xundef  IMP DS EXTref
> libssl.a(libssl.so.0.9.8)
> SSL_CTX_ctrl
>
> Is this beacuse i have to specify the header file also when i am doing
> linking.
>
> Can u please help me
>
> Thanks
>
> Joshi Chandran
>
>
> --
> View this message in context:
> http://www.nabble.com/What-would-cause-a-seg-fault--tp20108404p20108404.html
> Sent from the OpenSSL - User mailing list archive at Nabble.com.
>
> __
> OpenSSL Project     http://www.openssl.org
> User Support Mailing Listopenssl-users@openssl.org
> Automated List Manager   [EMAIL PROTECTED]
>



-- 
Regards
Joshi Chandran


Re: What would cause a seg fault?

2008-10-22 Thread joshi chandran
This is how i am compiling

# cc_r -c -I/usr/include/openssl -D_ALL_SOURCE -D_ANSI_C_SOURCE
-D_POSIX_SOURCE -qmaxmem=16384 -qnoansialias -DUSE_NATIVE_DLOPEN
-DNEED_PTHREAD_INIT -q32 -D_LARGE_FILES -qlonglong -O-DVERSION=\"0.51\"
-DXS_VERSION=\"0.51\"  "-I/usr/opt/perl5/lib/5.8.2/aix-thread-multi/CORE"
SSLeay.c
# chmod 644 SSLeay.bs
# rm -f blib/arch/auto/Crypt/SSLeay/SSLeay.so
# LD_RUN_PATH="" ld  -bhalt:4 -bM:SRE
-bI:/usr/opt/perl5/lib/5.8.2/aix-thread-multi/CORE/perl.exp -bE:SSLeay.exp
-bnoentry -lpthreads -lc_r SSLeay.o  -o
blib/arch/auto/Crypt/SSLeay/SSLeay.so   -L/usr/lib -lssl -lcrypto
# chmod 755 blib/arch/auto/Crypt/SSLeay/SSLeay.so
# cp SSLeay.bs blib/arch/auto/Crypt/SSLeay/SSLeay.bs
# chmod 644 blib/arch/auto/Crypt/SSLeay/SSLeay.bs
Please Help ,it is urgent

Thanks

Joshi

On Wed, Oct 22, 2008 at 4:35 PM, joshi chandran
<[EMAIL PROTECTED]>wrote:

> I have used openssl 9.8h version
> There is mistake in previous mail
>
> "I have recompiled the shared object file SSLeay.so to link to the version
> of
> libssl.a provided by openssl.base(openssl 9.8h).  Previously, this
> shared object linked to the libssl.a  provided by the RPM on
> the Linux Toolbox for AIX.Now that the shared object is linked against the
> newer library",
>
> Rest are same .
>
> Please help
>
> Thanks
> Joshi
>
>
> On Wed, Oct 22, 2008 at 4:29 PM, joshi chandra <[EMAIL PROTECTED]
> > wrote:
>
>>
>> Hi All,
>>
>> I have recompiled the shared object file SSLeay.so to link to the version
>> of
>> libssl.a provided by openssl.base.  Previously, this
>> shared object linked to the libssl.a (openssl 9.8h) provided by the RPM on
>> the Linux Toolbox for AIX.Now that the shared object is linked against the
>> newer library,
>> it seg faults in a call to the function SSL_CTX_ctrl().
>>
>>
>> Code Dump
>>
>> Segmentation fault in SSL_CTX_ctrl at 0xd1f6bb80 ($t1)
>> 0xd1f6bb80 (SSL_CTX_ctrl+0xfc) 900300a4 stw   r0,0xa4(r3)
>> (dbx) where
>> SSL_CTX_ctrl() at 0xd1f6bb80
>> XS_Crypt__SSLeay__CTX_new() at 0xd1f64318
>> Perl_pp_entersub() at 0xd31100d8
>> Perl_runops_standard() at 0xd3163ad4
>> S_call_body() at 0xd3075950
>> Perl_call_sv() at 0xd3079dac
>> S_call_list_body() at 0xd30758bc
>> Perl_call_list() at 0xd307c4f0
>> Perl_newATTRSUB() at 0xd30d3318
>> Perl_utilize() at 0xd30d3af8
>> Perl_yyparse() at 0xd310a494
>> S_parse_body() at 0xd30765e0
>> perl_parse() at 0xd307ccc0
>> main() at 0x1460
>>
>> Here is the full ld command,
>> ld  -bhalt:4 -bM:SRE
>> -bI:/usr/opt/perl5/lib/5.8.2/aix-thread-multi/CORE/perl.exp -bE:SSLeay.exp
>> -bnoentry -lpthreads -lc_r SSLeay.o  -o
>> blib/arch/auto/Crypt/SSLeay/SSLeay.so   -L/usr/lib -lssl -lcrypto
>>
>> Also, here is the output of 'dump -Tv SSLeay.so' for the symbol in the
>> stack
>> trace:
>>***Loader Symbol Table Information***
>> [Index]  Value  Scn IMEX Sclass   Type   IMPid Name
>> [71]0xundef  IMP DS EXTref
>> libssl.a(libssl.so.0.9.8)
>> SSL_CTX_ctrl
>>
>> Is this beacuse i have to specify the header file also when i am doing
>> linking.
>>
>> Can u please help me
>>
>> Thanks
>>
>> Joshi Chandran
>>
>>
>> --
>> View this message in context:
>> http://www.nabble.com/What-would-cause-a-seg-fault--tp20108404p20108404.html
>> Sent from the OpenSSL - User mailing list archive at Nabble.com.
>>
>> __
>> OpenSSL Project http://www.openssl.org
>> User Support Mailing Listopenssl-users@openssl.org
>> Automated List Manager   [EMAIL PROTECTED]
>>
>
>
>
> --
> Regards
> Joshi Chandran
>



-- 
Regards
Joshi Chandran


Re: What would cause a seg fault?

2008-10-22 Thread joshi chandran
This is how i am compiling

# cc_r -c -I/usr/include/l -D_ALL_SOURCE -D_ANSI_C_SOURCE -D_POSIX_SOURCE
-qmaxmem=16384 -qnoansialias -DUSE_NATIVE_DLOPEN -DNEED_PTHREAD_INIT -q32
-D_LARGE_FILES -qlonglong -O-DVERSION=\"0.51\"  -DXS_VERSION=\"0.51\"
"-I/usr/opt/perl5/lib/5.8.2/aix-thread-multi/CORE"   SSLeay.c
# chmod 644 SSLeay.bs
# rm -f blib/arch/auto/Crypt/SSLeay/SSLeay.so
# LD_RUN_PATH="" ld  -bhalt:4 -bM:SRE
-bI:/usr/opt/perl5/lib/5.8.2/aix-thread-multi/CORE/perl.exp -bE:SSLeay.exp
-bnoentry -lpthreads -lc_r SSLeay.o  -o
blib/arch/auto/Crypt/SSLeay/SSLeay.so   -L/usr/lib -lssl -lcrypto
# chmod 755 blib/arch/auto/Crypt/SSLeay/SSLeay.so
# cp SSLeay.bs blib/arch/auto/Crypt/SSLeay/SSLeay.bs
# chmod 644 blib/arch/auto/Crypt/SSLeay/SSLeay.bs

Please Help ,it is urgent

Thanks

Joshi


On Wed, Oct 22, 2008 at 10:17 PM, joshi chandran <[EMAIL PROTECTED]
> wrote:

> This is how i am compiling
>
> # cc_r -c -I/usr/include/l -D_ALL_SOURCE -D_ANSI_C_SOURCE -D_POSIX_SOURCE
> -qmaxmem=16384 -qnoansialias -DUSE_NATIVE_DLOPEN -DNEED_PTHREAD_INIT -q32
> -D_LARGE_FILES -qlonglong -O-DVERSION=\"0.51\"  -DXS_VERSION=\"0.51\"
> "-I/usr/opt/perl5/lib/5.8.2/aix-thread-multi/CORE"   SSLeay.c
> # chmod 644 SSLeay.bs
> # rm -f blib/arch/auto/Crypt/SSLeay/SSLeay.so
> # LD_RUN_PATH="" ld  -bhalt:4 -bM:SRE
> -bI:/usr/opt/perl5/lib/5.8.2/aix-thread-multi/CORE/perl.exp -bE:SSLeay.exp
> -bnoentry -lpthreads -lc_r SSLeay.o  -o
> blib/arch/auto/Crypt/SSLeay/SSLeay.so   -L/usr/lib -lssl -lcrypto
> # chmod 755 blib/arch/auto/Crypt/SSLeay/SSLeay.so
> # cp SSLeay.bs blib/arch/auto/Crypt/SSLeay/SSLeay.bs
> # chmod 644 blib/arch/auto/Crypt/SSLeay/SSLeay.bs
> Please Help ,it is urgent
>
> Thanks
>
> Joshi
>
>   On Wed, Oct 22, 2008 at 4:35 PM, joshi chandran <
> [EMAIL PROTECTED]> wrote:
>
>> I have used openssl 9.8h version
>> There is mistake in previous mail
>>
>> "I have recompiled the shared object file SSLeay.so to link to the version
>> of
>> libssl.a provided by openssl.base(openssl 9.8h).  Previously, this
>> shared object linked to the libssl.a  provided by the RPM on
>> the Linux Toolbox for AIX.Now that the shared object is linked against the
>> newer library",
>>
>> Rest are same .
>>
>> Please help
>>
>> Thanks
>> Joshi
>>
>>
>> On Wed, Oct 22, 2008 at 4:29 PM, joshi chandra <
>> [EMAIL PROTECTED]> wrote:
>>
>>>
>>> Hi All,
>>>
>>> I have recompiled the shared object file SSLeay.so to link to the version
>>> of
>>> libssl.a provided by openssl.base.  Previously, this
>>> shared object linked to the libssl.a (openssl 9.8h) provided by the RPM
>>> on
>>> the Linux Toolbox for AIX.Now that the shared object is linked against
>>> the
>>> newer library,
>>> it seg faults in a call to the function SSL_CTX_ctrl().
>>>
>>>
>>> Code Dump
>>>
>>> Segmentation fault in SSL_CTX_ctrl at 0xd1f6bb80 ($t1)
>>> 0xd1f6bb80 (SSL_CTX_ctrl+0xfc) 900300a4 stw   r0,0xa4(r3)
>>> (dbx) where
>>> SSL_CTX_ctrl() at 0xd1f6bb80
>>> XS_Crypt__SSLeay__CTX_new() at 0xd1f64318
>>> Perl_pp_entersub() at 0xd31100d8
>>> Perl_runops_standard() at 0xd3163ad4
>>> S_call_body() at 0xd3075950
>>> Perl_call_sv() at 0xd3079dac
>>> S_call_list_body() at 0xd30758bc
>>> Perl_call_list() at 0xd307c4f0
>>> Perl_newATTRSUB() at 0xd30d3318
>>> Perl_utilize() at 0xd30d3af8
>>> Perl_yyparse() at 0xd310a494
>>> S_parse_body() at 0xd30765e0
>>> perl_parse() at 0xd307ccc0
>>> main() at 0x1460
>>>
>>> Here is the full ld command,
>>> ld  -bhalt:4 -bM:SRE
>>> -bI:/usr/opt/perl5/lib/5.8.2/aix-thread-multi/CORE/perl.exp
>>> -bE:SSLeay.exp
>>> -bnoentry -lpthreads -lc_r SSLeay.o  -o
>>> blib/arch/auto/Crypt/SSLeay/SSLeay.so   -L/usr/lib -lssl -lcrypto
>>>
>>> Also, here is the output of 'dump -Tv SSLeay.so' for the symbol in the
>>> stack
>>> trace:
>>>***Loader Symbol Table Information***
>>> [Index]  Value  Scn IMEX Sclass   Type   IMPid Name
>>> [71]0xundef  IMP DS EXTref
>>> libssl.a(libssl.so.0.9.8)
>>> SSL_CTX_ctrl
>>>
>>> Is this beacuse i have to specify the header file also when i am doing
>>> linking.
>>>
>>> Can u please help me
>>>
>>> Thanks
>>>
>>> Joshi Chandran
>>>
>>>
>>> --
>>> View this message in context:
>>> http://www.nabble.com/What-would-cause-a-seg-fault--tp20108404p20108404.html
>>> Sent from the OpenSSL - User mailing list archive at Nabble.com.
>>>
>>> __
>>> OpenSSL Project http://www.openssl.org
>>> User Support Mailing Listopenssl-users@openssl.org
>>> Automated List Manager   [EMAIL PROTECTED]
>>>
>>
>>
>>
>> --
>> Regards
>> Joshi Chandran
>>
>
>
>
> --
> Regards
> Joshi Chandran
>



-- 
Regards
Joshi Chandran


Re: Client verify failing - continued

2008-11-25 Thread joshi chandran
Hi
I am new to openssl and now i face the problem
"SSL3_GET_CLIENT_CERTIFICATE:peer did not return a certificat  errror"
.While searching in google
,  i have found you too had the same problem and also you  was able to
rectify the problem. Can you please help me to solve this problem .

Thanks

Joshi Chandran

On Mon, Nov 24, 2008 at 3:57 AM, Michael Simms <[EMAIL PROTECTED]>wrote:

> Well, thanks to Dave Thompson, this silly bug was fixed, his hint to
> examine the certificate lead me to the path that ended up with me
> finding that actually the CA in the clients side was being set AFTER
> its test to see if it had a CA and setting the values if it did, so it
> never ran the SSL_CTX_load_verify_locations, believing it had no CTX
>
> The logic was all fine, just one line setting the CA done at the wrong
> place.
>
> So, hooray, all of the SSL functionality now works!
>
> Thanks
> --
> Michael Simms
> __
> OpenSSL Project http://www.openssl.org
> User Support Mailing Listopenssl-users@openssl.org
> Automated List Manager   [EMAIL PROTECTED]
>



-- 
Regards
Joshi Chandran


Re: which algorithms are enabled by default with fips?

2009-01-19 Thread joshi chandran
Hi All,

Will the Openssl community will release all the openssl with fips support ie
next release of openssl will support fips capability?

Thanks

Joshi Chandran




On Mon, Jan 12, 2009 at 7:23 PM, Steve Marquess
wrote:

> PGNet wrote:
>
>> On Sun, Jan 11, 2009 at 3:42 PM, Steve Marquess <
>> marqu...@oss-institute.org> wrote:
>>
>>> Long story short, OpenSSH really needs some source mods to
>>> gracefully invoke and run in FIPS mode.
>>>
>>
>> Hrm ... I'd have thought that openssh would be amoong the 1st/best @
>> compliance.
>>
>
> Me too.  I embarked on this FIPS validation adventure some six years ago
> because my DoD client at the time wanted a FIPS validated OpenSSH.  I
> wrote a patch several years ago but didn't push it at the time because
> the first OpenSSL FIPS Object Module validation was still pending, and
> encountering some significant opposition that took all my attention.
> Now the OpenSSH patch is not a priority for any of my clients and I
> don't have the spare time to pursue it.  I'd love to see someone else
> follow it through.
>
> To my knowledge Stunnel is the first application to formally support the
> FIPS object Module.  I've been told ProFTP has baselined support as
> well.  I've heard privately from many people who have done local mods of
> various applications, but have been disappointed in how slowly this
> support is appearing publicly.
>
>  Several people, myself included, have created patches to that end.
>>>
>>
>> Are those specific patches sourced in the openssl trees, the openssh
>> trees, or somewhere else?  I'll google, but if you have URLs ...
>>
>
> I could point you to my original very dated patch but I know there are
> some more recent updates.  Check the OpenSSH mail archives.
>
>  Of course, if you don't plan to actually run in FIPS mode and just
>>> need buzzword compliance (often the case) then what you plan should
>>> work.
>>>
>>
>> We've gotten a heads-up that a gov't client will require in the next
>> (soon, tho hasn't occurred just yet ...) contract that SSH/VPN/IPSec/etc
>> comms will be required.  Of course, detailed spec, verification, etc is not
>> yet available.
>>
>> $10 says it's for _their_ buzzword compliance 
>>
>
> Very typical for DoD.  The mandates for *procurement* of validated
> software are (increasingly) enforced, but there doesn't seem to be any
> effective push to actually *use* a runtime FIPS mode.  That lack of
> pressure plus the interoperability issues that FIPS mode can cause means
> program managers have zero incentive to actually run anything in FIPS
> mode.  It's a paper chase.
>
> My goal is to get an all-ssh-in-fips-mode setup demo'd locally, then hand
>> it off to our tech folks so that we can then respond & document when the
>> demand occurs.
>>
>
> Please consider posting your patches to the OpenSSH lists...
>
> -Steve M.
>
> --
> Steve Marquess
> Open Source Software Institute
> marqu...@oss-institute.org
>
>
> __
> OpenSSL Project http://www.openssl.org
> User Support Mailing Listopenssl-users@openssl.org
> Automated List Manager   majord...@openssl.org
>



-- 
Regards
Joshi Chandran


Re: Make test fails for openssl fips 1.2 for 64 bit

2009-01-20 Thread joshi chandran
This problem will exist for fips package. so this error i can ignore it  and
can use the fips module with  openssl 9.8 j and can test (make test  in
openssl 9.8J) in openssl 9.8J
please correct it if i am wrong

Thanks
Joshi




On Tue, Jan 20, 2009 at 5:07 PM, Dr. Stephen Henson wrote:

> On Tue, Jan 20, 2009, joshi chandra wrote:
>
> >
> > Hi All,
> >
> > I have came across the error when i build openssl fips 1.2 for 64 bit .
> >
> > ./Configure fipscanisterbuild aix64-cc
> >
> > make was successful
> >
>
> Well other than that command line violating the security policy...
>
> You may well have problems attempting to use the version of OpenSSL in the
> FIPS 1.2 distribution due to its use of function pointers in a way gcc
> doesn't
> like. The validated module doesn't use such pointers so that is OK. At the
> time the tarball was submitted this wasn't an issue.
>
> If you use the validated module with OpenSSL 0.9.8j this shouldn't happen.
>
> Steve.
> --
> Dr Stephen N. Henson. Email, S/MIME and PGP keys: see homepage
> OpenSSL project core developer and freelance consultant.
> Homepage: http://www.drh-consultancy.demon.co.uk
>  __
> OpenSSL Project http://www.openssl.org
> User Support Mailing List    openssl-users@openssl.org
> Automated List Manager   majord...@openssl.org
>



-- 
Regards
Joshi Chandran


Re: Make test failed for Fips Capable openssl 9.8J

2009-01-21 Thread joshi chandran
I have used the same security policy step .

openssl fips 1.2
1. ./Configure fipscansiterbuild aix-cc
2.  make
3. make install

openssl 9.8j
1. ./Configure -DSSL_ALLOW_ADH --prefix=/usr --openssldir=/var/ssl
--with-fipslibdir=$fipslibdir fips no-idea no-rc5 no-ec no-symlinks shared
threads aix-xlc_r
2.  make
3. make test

Can u please tell me where i have gone wrong

Thanks

Rajan
On Wed, Jan 21, 2009 at 10:50 PM, Dr. Stephen Henson wrote:

> On Wed, Jan 21, 2009, rajanchittil wrote:
>
> >
> > Hi All,
> >
> > I am new to openssl and i am first time building openssl source code .
> >
> > I have build openssl fips 1.2
> >
> > ./Configure fipscansiterbuild aix-cc
> > make
> >
> > It generated the fips module
> >
>
> That build procedure violates the security policy so the result is not
> validated.
>
> Steve.
> --
> Dr Stephen N. Henson. Email, S/MIME and PGP keys: see homepage
> OpenSSL project core developer and freelance consultant.
> Homepage: http://www.drh-consultancy.demon.co.uk
>  __
> OpenSSL Project http://www.openssl.org
> User Support Mailing Listopenssl-users@openssl.org
> Automated List Manager   majord...@openssl.org
>



-- 
Regards
Joshi Chandran


Re: openssl-fips 1.2 questions

2009-01-23 Thread joshi chandran
I have doubt regarding fips .

If i have an application which enter into the fips mode , will that make
crypto lib into the fips mode and rest of the application will also be in
fips mode . in other word whether fips mode is at system level or
application level.


Thanks
Joshi
On Fri, Jan 23, 2009 at 7:24 PM, Michal Trojnara <
michal.trojn...@mobi-com.net> wrote:

>
> Steve Marquess  wrote:
> > Stunnel has official FIPS mode support.
>
> I'm working on some fixes to cleanly compile stunnel with openssl-fips 1.2.
>  Unfortunately it looks like fipsld is no longer installed during the
> openssl-fips installation process.  Can you confirm it?  Is there a
> recommended way to find fipsld in ./configure script?
>
> TIA,
>Michal Trojnara
>  __
> OpenSSL Project http://www.openssl.org
> User Support Mailing Listopenssl-users@openssl.org
> Automated List Manager       majord...@openssl.org
>



-- 
Regards
Joshi Chandran


Re: Make test failed for Fips Capable openssl 9.8J

2009-01-24 Thread joshi chandran
fter overwriting:
>> > >
>> 5171b0a563d968222705431c1abf13bef9780e38a28817d7a36c953d18179e2330ee87d363b8154e2d268eb5aed447bd6419da455d390ce70891bf0512360721e0be0e44c32489e1c975436fa752460397a8e921a0ad64eee7200abe57c2807925edc105a5233da59dd7b4a26a675a2683d5cbee2d87f02fefbfaab5c355e264
>> > > char buffer key before overwriting:
>> > > 4850f0a33aedd3af6e477f8302b10968
>> > > char buffer key after overwriting:
>> > > 96a916306b46b3d4189fa6d1b04a4ed9
>> > > successful as expected
>> > >
>> > > All tests completed with 0 errors
>> > >
>> > > $ ./fips_test_suite aes
>> > > FIPS-mode test application
>> > >
>> > > AES encryption/decryption with corrupted KAT...
>> > >
>> ERROR:2d06e065:lib=45,func=110,reason=101:file=fips_aes_selftest.c:line=98:
>> > > Power-up self test failed
>> > > $ ./fips_test_suite sha1
>> > > FIPS-mode test application
>> > >
>> > > SHA-1 hash with corrupted KAT...
>> > >
>> ERROR:2d073065:lib=45,func=115,reason=101:file=fips_sha1_selftest.c:line=90:
>> > > Power-up self test failed
>> > >
>> > > This things work fine.
>> > >
>> > > Can You please tell me where i am going wrong.
>> > >
>> >
>> > Try building without the "shared" option and see if that works. Also
>> make sure
>> > the system type is consistent between the two builds... in the FIPS
>> directory
>> > do:
>> >
>> > ./config -t
>> >
>> > and ensure you use that type for the 0.9.8j build.
>> >
>> > Steve.
>> > --
>> > Dr Stephen N. Henson. Email, S/MIME and PGP keys: see homepage
>> > OpenSSL project core developer and freelance consultant.
>> > Homepage: http://www.drh-consultancy.demon.co.uk
>> > __
>> > OpenSSL Project http://www.openssl.org
>> > User Support Mailing List openssl-users@openssl.org
>> > Automated List Manager majord...@openssl.org
>>
>> [image: ;-)] HOWDY COWBOYS &COWGIRLS
>>
>> i get all your e-mail all the time every day, i develo web ages, excuse my
>> daughters com uter it doesnt have the letter thats missing, anyway
>>
>> i must get at least12 mails a day about your develo ing secure info and
>> netsca e develo ment. sssi etc. dont send them
>>
>> anymore, i know you use lists, take my adress off. thanx from bob in the
>> usa! and GOD bless all!
>>
>
>


-- 
Regards
Joshi Chandran


Re: Not able to find Definition of MD5_Init, MD5_Update and MD5_Final?

2009-07-29 Thread joshi chandran
, I want to find the definition of this function. The prototype of
this function is there in md5.h file but when i tried to find the code
for this function , i was not able to find any code related to this
function.

Thanks in advance

Rajan



On Wed, Jul 29, 2009 at 1:06 PM, Neil
Dugan wrote:
> rajanchittil wrote:
>>
>> Hi All,
>>
>> I was trying to figure out the Definition for this function
>>
>> 1. MD5_Init
>> 2. MD5_Update
>> 3. MD5_Final
>>
>> But i went through the openssl source code but was not bale to find the
>> definition of it.
>>
>> Can any one please help me regarding the same.
>>
>> Thanks in advance
>>
>> Rajan
>
> did you include the openssl/md5.h file
> __
> OpenSSL Project                                 http://www.openssl.org
> User Support Mailing List                    openssl-us...@openssl.org
> Automated List Manager                           majord...@openssl.org
>



-- 
Regards
Joshi Chandran
__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   majord...@openssl.org


Re: Not able to find Definition of MD5_Init, MD5_Update and MD5_Final?

2009-07-29 Thread joshi chandran
Thanks Martin.

I can find the definition of MD5_Update() and MD5_Final() . But was
not able to find the definition for  MD5_Init() in
crypto/md5/md5_dgst.c




On Wed, Jul 29, 2009 at 1:38 PM, Martin Kaiser wrote:
> Hello Joshi,
>
> On Wed, Jul 29, 2009 at 01:13:27PM +0530, joshi chandran wrote:
>
>> , I want to find the definition of this function. The prototype of
>> this function is there in md5.h file but when i tried to find the code
>> for this function , i was not able to find any code related to this
>> function.
>
> MD5_Init() is in crypto/md5/md5_dgst.c
>
> MD5_Update() and MD5_Final() are mapped to HASH_UPDATE() and
> HASH_FINAL(), respectively. This is defined in crypto/md5/md5_locl.h
>
> HASH_UPDATE() and HASH_FINAL() are implemented in crypto/md32_common.h
>
> Best regards,
>
>   Martin
> __
> OpenSSL Project                                 http://www.openssl.org
> User Support Mailing List                    openssl-us...@openssl.org
> Automated List Manager                           majord...@openssl.org
>



-- 
Regards
Joshi Chandran
__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   majord...@openssl.org


Re: Not able to find Definition of MD5_Init, MD5_Update and MD5_Final?

2009-07-29 Thread joshi chandran
I am using openssl 9.8k ...

This is the content of md5_dgst.c


#include 
#include "md5_locl.h"
#include 
#include 
#ifdef OPENSSL_FIPS
#include 
#endif


const char MD5_version[]="MD5" OPENSSL_VERSION_PTEXT;

/* Implemented from RFC1321 The MD5 Message-Digest Algorithm
 */

#define INIT_DATA_A (unsigned long)0x67452301L
#define INIT_DATA_B (unsigned long)0xefcdab89L
#define INIT_DATA_C (unsigned long)0x98badcfeL
#define INIT_DATA_D (unsigned long)0x10325476L

FIPS_NON_FIPS_MD_Init(MD5)
{
c->A=INIT_DATA_A;
c->B=INIT_DATA_B;
c->C=INIT_DATA_C;
c->D=INIT_DATA_D;
c->Nl=0;
c->Nh=0;
c->num=0;
return 1;
}

#ifndef md5_block_data_order
#ifdef X
#undef X
#endif
void md5_block_data_order (MD5_CTX *c, const void *data_, size_t num)
{
const unsigned char *data=data_;
register unsigned MD32_REG_T A,B,C,D,l;
#ifndef MD32_XARRAY
/* See comment in crypto/sha/sha_locl.h for details. */
unsigned MD32_REG_T XX0, XX1, XX2, XX3, XX4, XX5, XX6, XX7,
XX8, XX9,XX10,XX11,XX12,XX13,XX14,XX15;
# define X(i)   XX##i
#else
MD5_LONG XX[MD5_LBLOCK];
# define X(i)   XX[i]
#endif

A=c->A;
B=c->B;
C=c->C;
D=c->D;

for (;num--;)
{
HOST_c2l(data,l); X( 0)=l;  HOST_c2l(data,l); X( 1)=l;
/* Round 0 */
R0(A,B,C,D,X( 0), 7,0xd76aa478L);   HOST_c2l(data,l); X( 2)=l;
R0(D,A,B,C,X( 1),12,0xe8c7b756L);   HOST_c2l(data,l); X( 3)=l;
R0(C,D,A,B,X( 2),17,0x242070dbL);   HOST_c2l(data,l); X( 4)=l;
R0(B,C,D,A,X( 3),22,0xc1bdceeeL);   HOST_c2l(data,l); X( 5)=l;
R0(A,B,C,D,X( 4), 7,0xf57c0fafL);   HOST_c2l(data,l); X( 6)=l;
R0(D,A,B,C,X( 5),12,0x4787c62aL);   HOST_c2l(data,l); X( 7)=l;
R0(C,D,A,B,X( 6),17,0xa8304613L);   HOST_c2l(data,l); X( 8)=l;
R0(B,C,D,A,X( 7),22,0xfd469501L);   HOST_c2l(data,l); X( 9)=l;
R0(A,B,C,D,X( 8), 7,0x698098d8L);   HOST_c2l(data,l); X(10)=l;
R0(D,A,B,C,X( 9),12,0x8b44f7afL);   HOST_c2l(data,l); X(11)=l;
R0(C,D,A,B,X(10),17,0x5bb1L);   HOST_c2l(data,l); X(12)=l;
R0(B,C,D,A,X(11),22,0x895cd7beL);   HOST_c2l(data,l); X(13)=l;
R0(A,B,C,D,X(12), 7,0x6b901122L);   HOST_c2l(data,l); X(14)=l;
R0(D,A,B,C,X(13),12,0xfd987193L);   HOST_c2l(data,l); X(15)=l;
R0(C,D,A,B,X(14),17,0xa679438eL);
R0(B,C,D,A,X(15),22,0x49b40821L);
/* Round 1 */
R1(A,B,C,D,X( 1), 5,0xf61e2562L);
R1(D,A,B,C,X( 6), 9,0xc040b340L);
R1(C,D,A,B,X(11),14,0x265e5a51L);
R1(B,C,D,A,X( 0),20,0xe9b6c7aaL);
R1(A,B,C,D,X( 5), 5,0xd62f105dL);
R1(D,A,B,C,X(10), 9,0x02441453L);
R1(C,D,A,B,X(15),14,0xd8a1e681L);
R1(B,C,D,A,X( 4),20,0xe7d3fbc8L);
R1(A,B,C,D,X( 9), 5,0x21e1cde6L);
R1(D,A,B,C,X(14), 9,0xc33707d6L);
R1(C,D,A,B,X( 3),14,0xf4d50d87L);
R1(B,C,D,A,X( 8),20,0x455a14edL);
R1(A,B,C,D,X(13), 5,0xa9e3e905L);
R1(D,A,B,C,X( 2), 9,0xfcefa3f8L);
R1(C,D,A,B,X( 7),14,0x676f02d9L);
R1(B,C,D,A,X(12),20,0x8d2a4c8aL);
/* Round 2 */
R2(A,B,C,D,X( 5), 4,0xfffa3942L);
R2(D,A,B,C,X( 8),11,0x8771f681L);
R2(C,D,A,B,X(11),16,0x6d9d6122L);
R2(B,C,D,A,X(14),23,0xfde5380cL);
R2(A,B,C,D,X( 1), 4,0xa4beea44L);
R2(D,A,B,C,X( 4),11,0x4bdecfa9L);
R2(C,D,A,B,X( 7),16,0xf6bb4b60L);
R2(B,C,D,A,X(10),23,0xbebfbc70L);
R2(A,B,C,D,X(13), 4,0x289b7ec6L);
R2(D,A,B,C,X( 0),11,0xeaa127faL);
R2(C,D,A,B,X( 3),16,0xd4ef3085L);
R2(B,C,D,A,X( 6),23,0x04881d05L);
R2(A,B,C,D,X( 9), 4,0xd9d4d039L);
R2(D,A,B,C,X(12),11,0xe6db99e5L);
R2(C,D,A,B,X(15),16,0x1fa27cf8L);
R2(B,C,D,A,X( 2),23,0xc4ac5665L);
/* Round 3 */
R3(A,B,C,D,X( 0), 6,0xf4292244L);
R3(D,A,B,C,X( 7),10,0x432aff97L);
R3(C,D,A,B,X(14),15,0xab9423a7L);
R3(B,C,D,A,X( 5),21,0xfc93a039L);
R3(A,B,C,D,X(12), 6,0x655b59c3L);
R3(D,A,B,C,X( 3),10,0x8f0ccc92L);
R3(C,D,A,B,X(10),15,0xffeff47dL);
R3(B,C,D,A,X( 1),21,0x85845dd1L);
R3(A,B,C,D,X( 8), 6,0x6fa87e4fL);
R3(D,A,B,C,X(15),10,0xfe2ce6e0L);
R3(C,D,A,B,X( 6),15,0xa3014314L);
R3(B,C,D,A,X(13),21,0x4e0811a1L);
R3(A,B,C,D,X( 4), 6,0xf7537e82L);
R3(D,A,B,C,X(11),10,0xbd3af235L);
R3(C,D,A,B,X( 2),15,0x2ad7d2bbL);
R3(B,C,D,A,X( 9),21,0xeb86d391L);

A = c->A += A;
B = c->B += B;
C = c->C += C;
D = c->D += D;
}
}
#endif



On Wed, Jul 29, 2009 at 4:52 PM, Martin Kaiser wrote:
>
> On Wed, Jul 29, 2009 at 03:03:27PM +0530, joshi chandran wrote:
>>
>> I can fi

Re: Not able to find Definition of MD5_Init, MD5_Update and MD5_Final?

2009-07-29 Thread joshi chandran
I got the definition for MD5_Update and MD5_Final . but was not able
to figure out the code for MD5_Init.

Thank in advance

On Wed, Jul 29, 2009 at 6:15 PM, PMHager wrote:
>
> In crypto\md5\md5_locl.h:
>
> #define HASH_UPDATE MD5_Update
> #define HASH_FINAL  MD5_Final
> #include "md32_common.h"
>
> now in crypto\md32_common.h:
>
> int HASH_UPDATE (HASH_CTX *c, const void *data_, size_t len)
> {...}
> int HASH_FINAL (unsigned char *md, HASH_CTX *c)
> {...}
>
> Please note that #define is not an assignment. It is a replacement definition.
>
> Peter
>
> -Original Message-
> From: owner-openssl-us...@openssl.org 
> [mailto:owner-openssl-us...@openssl.org] On Behalf
> Of joshi chandran
> Sent: Wednesday, July 29, 2009 1:26 PM
> To: openssl-users@openssl.org
> Subject: Re: Not able to find Definition of MD5_Init, MD5_Update and 
> MD5_Final?
>
> I am using openssl 9.8k ...
>
> This is the content of md5_dgst.c
>
>
> #include 
> #include "md5_locl.h"
> #include 
> #include 
> #ifdef OPENSSL_FIPS
> #include 
> #endif
>
>
> const char MD5_version[]="MD5" OPENSSL_VERSION_PTEXT;
>
> /* Implemented from RFC1321 The MD5 Message-Digest Algorithm
>  */
>
> #define INIT_DATA_A (unsigned long)0x67452301L
> #define INIT_DATA_B (unsigned long)0xefcdab89L
> #define INIT_DATA_C (unsigned long)0x98badcfeL
> #define INIT_DATA_D (unsigned long)0x10325476L
>
> FIPS_NON_FIPS_MD_Init(MD5)
>        {
>        c->A=INIT_DATA_A;
>        c->B=INIT_DATA_B;
>        c->C=INIT_DATA_C;
>        c->D=INIT_DATA_D;
>        c->Nl=0;
>        c->Nh=0;
>        c->num=0;
>        return 1;
>        }
>
> #ifndef md5_block_data_order
> #ifdef X
> #undef X
> #endif
> void md5_block_data_order (MD5_CTX *c, const void *data_, size_t num)
>        {
>        const unsigned char *data=data_;
>        register unsigned MD32_REG_T A,B,C,D,l;
> #ifndef MD32_XARRAY
>        /* See comment in crypto/sha/sha_locl.h for details. */
>        unsigned MD32_REG_T     XX0, XX1, XX2, XX3, XX4, XX5, XX6, XX7,
>                                XX8, XX9,XX10,XX11,XX12,XX13,XX14,XX15;
> # define X(i)   XX##i
> #else
>        MD5_LONG XX[MD5_LBLOCK];
> # define X(i)   XX[i]
> #endif
>
>        A=c->A;
>        B=c->B;
>        C=c->C;
>        D=c->D;
>
>        for (;num--;)
>                {
>        HOST_c2l(data,l); X( 0)=l;              HOST_c2l(data,l); X( 1)=l;
>        /* Round 0 */
>        R0(A,B,C,D,X( 0), 7,0xd76aa478L);       HOST_c2l(data,l); X( 2)=l;
>        R0(D,A,B,C,X( 1),12,0xe8c7b756L);       HOST_c2l(data,l); X( 3)=l;
>        R0(C,D,A,B,X( 2),17,0x242070dbL);       HOST_c2l(data,l); X( 4)=l;
>        R0(B,C,D,A,X( 3),22,0xc1bdceeeL);       HOST_c2l(data,l); X( 5)=l;
>        R0(A,B,C,D,X( 4), 7,0xf57c0fafL);       HOST_c2l(data,l); X( 6)=l;
>        R0(D,A,B,C,X( 5),12,0x4787c62aL);       HOST_c2l(data,l); X( 7)=l;
>        R0(C,D,A,B,X( 6),17,0xa8304613L);       HOST_c2l(data,l); X( 8)=l;
>        R0(B,C,D,A,X( 7),22,0xfd469501L);       HOST_c2l(data,l); X( 9)=l;
>        R0(A,B,C,D,X( 8), 7,0x698098d8L);       HOST_c2l(data,l); X(10)=l;
>        R0(D,A,B,C,X( 9),12,0x8b44f7afL);       HOST_c2l(data,l); X(11)=l;
>        R0(C,D,A,B,X(10),17,0x5bb1L);       HOST_c2l(data,l); X(12)=l;
>        R0(B,C,D,A,X(11),22,0x895cd7beL);       HOST_c2l(data,l); X(13)=l;
>        R0(A,B,C,D,X(12), 7,0x6b901122L);       HOST_c2l(data,l); X(14)=l;
>        R0(D,A,B,C,X(13),12,0xfd987193L);       HOST_c2l(data,l); X(15)=l;
>        R0(C,D,A,B,X(14),17,0xa679438eL);
>        R0(B,C,D,A,X(15),22,0x49b40821L);
>        /* Round 1 */
>        R1(A,B,C,D,X( 1), 5,0xf61e2562L);
>        R1(D,A,B,C,X( 6), 9,0xc040b340L);
>        R1(C,D,A,B,X(11),14,0x265e5a51L);
>        R1(B,C,D,A,X( 0),20,0xe9b6c7aaL);
>        R1(A,B,C,D,X( 5), 5,0xd62f105dL);
>        R1(D,A,B,C,X(10), 9,0x02441453L);
>        R1(C,D,A,B,X(15),14,0xd8a1e681L);
>        R1(B,C,D,A,X( 4),20,0xe7d3fbc8L);
>        R1(A,B,C,D,X( 9), 5,0x21e1cde6L);
>        R1(D,A,B,C,X(14), 9,0xc33707d6L);
>        R1(C,D,A,B,X( 3),14,0xf4d50d87L);
>        R1(B,C,D,A,X( 8),20,0x455a14edL);
>        R1(A,B,C,D,X(13), 5,0xa9e3e905L);
>        R1(D,A,B,C,X( 2), 9,0xfcefa3f8L);
>        R1(C,D,A,B,X( 7),14,0x676f02d9L);
>        R1(B,C,D,A,X(12),20,0x8d2a4c8aL);
>        /* Round 2 */
>        R2(A,B,C,D,X( 5), 4,0xfffa3942L);
>        R2(D,A,B,C,X( 8),11,0x8771f681L);
>        R2(C,D,A,B,X(11),16,0x6d9d6122L);
>        R2(B,C,D,A,X(14),23,0xfde5380cL);
>        R2(A,B,C,D,X( 1), 4,0xa4beea44L);
>        R2(D,A,B,C,X( 4),11,0x4bdecfa9L);
>        R2(C,D,A,

Re: Not able to find Definition of MD5_Init, MD5_Update and MD5_Final?

2009-07-29 Thread joshi chandran
But in the Openssl 9.8k , this function is changed to

#define INIT_DATA_A (unsigned long)0x67452301L
#define INIT_DATA_B (unsigned long)0xefcdab89L
#define INIT_DATA_C (unsigned long)0x98badcfeL
#define INIT_DATA_D (unsigned long)0x10325476L

FIPS_NON_FIPS_MD_Init(MD5)
{
c->A=INIT_DATA_A;
c->B=INIT_DATA_B;
c->C=INIT_DATA_C;
c->D=INIT_DATA_D;
c->Nl=0;
c->Nh=0;
c->num=0;
return 1;
}

I cannot see any MD_Init function there .So how is MD_Init function is
generated ?

Thanks

On Wed, Jul 29, 2009 at 6:41 PM, PMHager wrote:
> It is in crypto\md5\md5_dgst.c:
>
> int MD5_Init(MD5_CTX *c)
> {
> memset (c,0,sizeof(*c));
> c->A=INIT_DATA_A; // see #define INIT_DATA_A (unsigned long)0x67452301L
> c->B=INIT_DATA_B; // see #define INIT_DATA_B (unsigned long)0xefcdab89L
> c->C=INIT_DATA_C; // see #define INIT_DATA_C (unsigned long)0x98badcfeL
> c->D=INIT_DATA_D; // see #define INIT_DATA_D (unsigned long)0x10325476L
> return 1;
> }
>
> -Original Message-
> From: owner-openssl-us...@openssl.org 
> [mailto:owner-openssl-us...@openssl.org] On Behalf
> Of joshi chandran
> Sent: Wednesday, July 29, 2009 3:01 PM
> To: openssl-users@openssl.org
> Subject: Re: Not able to find Definition of MD5_Init, MD5_Update and 
> MD5_Final?
>
> I got the definition for MD5_Update and MD5_Final . but was not able
> to figure out the code for MD5_Init.
>
> Thank in advance
>
> On Wed, Jul 29, 2009 at 6:15 PM, PMHager wrote:
>>
>> In crypto\md5\md5_locl.h:
>>
>> #define HASH_UPDATE MD5_Update
>> #define HASH_FINAL  MD5_Final
>> #include "md32_common.h"
>>
>> now in crypto\md32_common.h:
>>
>> int HASH_UPDATE (HASH_CTX *c, const void *data_, size_t len)
>> {...}
>> int HASH_FINAL (unsigned char *md, HASH_CTX *c)
>> {...}
>>
>> Please note that #define is not an assignment. It is a replacement 
>> definition.
>>
>> Peter
>>
>> -Original Message-
>> From: owner-openssl-us...@openssl.org 
>> [mailto:owner-openssl-us...@openssl.org] On Behalf
>> Of joshi chandran
>> Sent: Wednesday, July 29, 2009 1:26 PM
>> To: openssl-users@openssl.org
>> Subject: Re: Not able to find Definition of MD5_Init, MD5_Update and 
>> MD5_Final?
>>
>> I am using openssl 9.8k ...
>>
>> This is the content of md5_dgst.c
>>
>>
>> #include 
>> #include "md5_locl.h"
>> #include 
>> #include 
>> #ifdef OPENSSL_FIPS
>> #include 
>> #endif
>>
>>
>> const char MD5_version[]="MD5" OPENSSL_VERSION_PTEXT;
>>
>> /* Implemented from RFC1321 The MD5 Message-Digest Algorithm
>>  */
>>
>> #define INIT_DATA_A (unsigned long)0x67452301L
>> #define INIT_DATA_B (unsigned long)0xefcdab89L
>> #define INIT_DATA_C (unsigned long)0x98badcfeL
>> #define INIT_DATA_D (unsigned long)0x10325476L
>>
>> FIPS_NON_FIPS_MD_Init(MD5)
>>        {
>>        c->A=INIT_DATA_A;
>>        c->B=INIT_DATA_B;
>>        c->C=INIT_DATA_C;
>>        c->D=INIT_DATA_D;
>>        c->Nl=0;
>>        c->Nh=0;
>>        c->num=0;
>>        return 1;
>>        }
>>
>> #ifndef md5_block_data_order
>> #ifdef X
>> #undef X
>> #endif
>> void md5_block_data_order (MD5_CTX *c, const void *data_, size_t num)
>>        {
>>        const unsigned char *data=data_;
>>        register unsigned MD32_REG_T A,B,C,D,l;
>> #ifndef MD32_XARRAY
>>        /* See comment in crypto/sha/sha_locl.h for details. */
>>        unsigned MD32_REG_T     XX0, XX1, XX2, XX3, XX4, XX5, XX6, XX7,
>>                                XX8, XX9,XX10,XX11,XX12,XX13,XX14,XX15;
>> # define X(i)   XX##i
>> #else
>>        MD5_LONG XX[MD5_LBLOCK];
>> # define X(i)   XX[i]
>> #endif
>>
>>        A=c->A;
>>        B=c->B;
>>        C=c->C;
>>        D=c->D;
>>
>>        for (;num--;)
>>                {
>>        HOST_c2l(data,l); X( 0)=l;              HOST_c2l(data,l); X( 1)=l;
>>        /* Round 0 */
>>        R0(A,B,C,D,X( 0), 7,0xd76aa478L);       HOST_c2l(data,l); X( 2)=l;
>>        R0(D,A,B,C,X( 1),12,0xe8c7b756L);       HOST_c2l(data,l); X( 3)=l;
>>        R0(C,D,A,B,X( 2),17,0x242070dbL);       HOST_c2l(data,l); X( 4)=l;
>>        R0(B,C,D,A,X( 3),22,0xc1bdceeeL);       HOST_c2l(data,l); X( 5)=l;
>>        R0(A,B,C,D,X( 4), 7,0xf57c0fafL);       HOST_c2l(data,l); X( 6)=l;
>>        R0(D,A,B,C,X( 5),12,0x4787c62aL)