Re: help on how to use OCF for SSL v3.0 protocol's cryptographic operations

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Jivin lakshmi prasanna lays it down ...
> Hi,
> 
> I am using OCF's ixp driver for Cryptographic operations.
> TLS protocol is working fine, since it uses only a single 
> Authentication operation to be performed.


You probably want to move this to the ocf-linux mailing list:

    http://lists.sourceforge.net/mailman/listinfo/ocf-linux-users

> Since SSL v3.0 protocol needs two rounds of operations to be 
> performed to calculate the MAC, I am calling OCF crypto_dispatch() 
> twice with the relevant data.
> Since I am using SHA, 40 bytes of 0x36 and 0x5c pads are used
> 
> Round 1 : HMAC(Initial seed+data)
> Initial seed = Client_write_mac_secret+40 bytes of 0x36+sequence 
> number+application type(0x17)+data length
> 
> Round 2: HMAC(Final Seed+result of Round 1)
> Final Seed = Client_write_mac_secret+40 bytes of 0x5C
> 
> The calculated MAC is different from the client generated MAC.
> 
> Can anyone help me with what data to be passed to the OCF, the seeds 
> to be used for SSLv3.0, and other required data.
> 
> I have gone through the SSLv3.0 draft, and surely I'm passing the 
> right seeds and offsets to the OCF, still the thing does not work...
> May be I'm missing out something....
> Please help......

Which OCF crypto driver are you using ?  Talitos or cryptosoft or
something else ?

Cheers,
Davidm

-- 
David McCullough,  david_mccullough@xxxxxxxxxxxxxxxxxxx,  Ph:+61 734352815
McAfee - SnapGear  http://www.snapgear.com                http://www.uCdot.org
--
To unsubscribe from this list: send the line "unsubscribe linux-crypto" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at  http://vger.kernel.org/majordomo-info.html

[Index of Archives]     [Kernel]     [Gnu Classpath]     [Gnu Crypto]     [DM Crypt]     [Netfilter]     [Bugtraq]

  Powered by Linux