From: lakshmi prasanna Subject: Re: help on how to use OCF for SSL v3.0 protocol's cryptographic operations Date: Fri, 06 Mar 2009 10:09:30 +0530 Message-ID: <200903060437.n264awEd006368@az33smr01.freescale.net> References: <200903051359.n25DxvlH020441@az33smr01.freescale.net> <20090306004933.GB23972@securecomputing.com> Mime-Version: 1.0 Content-Type: text/plain; charset="us-ascii"; format=flowed Cc: linux-crypto@vger.kernel.org, ocf-linux-users@lists.sourceforge.net To: David McCullough Return-path: Received: from az33egw02.freescale.net ([192.88.158.103]:62616 "EHLO az33egw02.freescale.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1753068AbZCFEhP (ORCPT ); Thu, 5 Mar 2009 23:37:15 -0500 In-Reply-To: <20090306004933.GB23972@securecomputing.com> References: <200903051359.n25DxvlH020441@az33smr01.freescale.net> <20090306004933.GB23972@securecomputing.com> Sender: linux-crypto-owner@vger.kernel.org List-ID: Hi, I am using OCF ixp4 crypto driver. The problem is present with cryptosoft also. I guess I am passing wrong data to OCF to compute the MAC, can anyone tell me what is the correct data that is to be passed to the driver for SSLv3.0 protocol. thanks, Lakshmi Prasanna At 06:19 AM 3/6/2009, David McCullough wrote: >Jivin lakshmi prasanna lays it down ... > > Hi, > > > > I am using OCF's ixp driver for Cryptographic operations. > > TLS protocol is working fine, since it uses only a single > > Authentication operation to be performed. > > >You probably want to move this to the ocf-linux mailing list: > > http://lists.sourceforge.net/mailman/listinfo/ocf-linux-users > > > Since SSL v3.0 protocol needs two rounds of operations to be > > performed to calculate the MAC, I am calling OCF crypto_dispatch() > > twice with the relevant data. > > Since I am using SHA, 40 bytes of 0x36 and 0x5c pads are used > > > > Round 1 : HMAC(Initial seed+data) > > Initial seed = Client_write_mac_secret+40 bytes of 0x36+sequence > > number+application type(0x17)+data length > > > > Round 2: HMAC(Final Seed+result of Round 1) > > Final Seed = Client_write_mac_secret+40 bytes of 0x5C > > > > The calculated MAC is different from the client generated MAC. > > > > Can anyone help me with what data to be passed to the OCF, the seeds > > to be used for SSLv3.0, and other required data. > > > > I have gone through the SSLv3.0 draft, and surely I'm passing the > > right seeds and offsets to the OCF, still the thing does not work... > > May be I'm missing out something.... > > Please help...... > >Which OCF crypto driver are you using ? Talitos or cryptosoft or >something else ? > >Cheers, >Davidm > >-- >David McCullough, david_mccullough@securecomputing.com, Ph:+61 734352815 >McAfee - SnapGear http://www.snapgear.com http://www.uCdot.org thanks, Lakshmi Prasanna