Re: Need help on self test post failure - programmatically load FIPS provider

2024-05-30 Thread murugesh pitchaiah
hanks, Murugesh On Fri, May 24, 2024 at 9:27 PM murugesh pitchaiah < murugesh.pitcha...@gmail.com> wrote: > Thanks Matt for looking into this. > > Here is the output: > > # openssl list --providers -provider fips -provider base > > Providers: > > base > >

Re: Need help on self test post failure - programmatically load FIPS provider

2024-05-24 Thread murugesh pitchaiah
the provider via the "openssl list" command, > i.e. what is the output from: > > $ openssl list --providers -provider fips -provider base > > > Matt > > On 24/05/2024 15:48, murugesh pitchaiah wrote: > > Thanks Neil for your response. Please find more detail

Re: Need help on self test post failure - programmatically load FIPS provider

2024-05-24 Thread murugesh pitchaiah
or > install-mac is incorrect in your config > 'Neil > > On Fri, May 24, 2024 at 2:05 AM murugesh pitchaiah < > murugesh.pitcha...@gmail.com> wrote: > >> Hi, >> >> Need your help on using openssl fips provider programmatically with >> open

Need help on self test post failure - programmatically load FIPS provider

2024-05-23 Thread murugesh pitchaiah
Hi, Need your help on using openssl fips provider programmatically with openssl 3.0.9. Error seen: *80D1CD65667F:error:1C8000D4:Provider routines:SELF_TEST_post:invalid state:../openssl-3.0.9/providers/fips/self_test.c:262:* *80D1CD65667F:error:1C8000D8:Provider routines:OSSL_provider_in

OCSP - Trusted responder model

2022-08-03 Thread murugesh pitchaiah
Hi, I am looking for testing the Trusted OCSP responder model. Here is the certificate hierarchy: 1) rootca-->subca-->leaf 2) responderca (another root ca) subChain : Contains both subca and rootca index.txt - contains the entries for subca and leaf OCSP Request is raised in the sequence: 1) lea

Re: x509v3-sign-rsa, x509v3-ssh-rsa and x509v3-rsa2048-sha256

2021-09-01 Thread murugesh pitchaiah
anyone please share the steps to generate user certificates of type: x509v3-ssh-rsa and x509v3-rsa2048-sha256 ? Thanks & Regards, Murugesh P. On 8/24/21, Dirk-Willem van Gulik wrote: > On 24 Aug 2021, at 09:47, murugesh pitchaiah > wrote: >> >> Hi, >> >> I a

x509v3-sign-rsa, x509v3-ssh-rsa and x509v3-rsa2048-sha256

2021-08-24 Thread murugesh pitchaiah
Hi, I am working on generating the x509v3 certificates for ssh user. I see with the default_md as 'sha256', in openssl.cnf file, the key/certificate is generated with algorithm type as 'x509v3-sign-rsa'. I see its signature algorithm is : Signature Algorithm: sha256WithRSAEncryption

Re: OpenSSL shared library in FIPS mode

2020-07-07 Thread murugesh pitchaiah
Hi, Yes. You have to use openssl provided build files. Thanks, Murugesh P. On 7/7/20, Shirisha Dasari via openssl-users wrote: > Hi All, > > We have been trying to integrate FOM 2.0.13 with OpenSSL 1.0.2u for FIPS > compliance. Post integration, we have been able to run in FIPS mode, with > all

Re: [openssl-users] To disable CBC ciphers

2018-10-17 Thread murugesh pitchaiah
Hi, You may list down what ciphers configured : "openssl ciphers" Choose CBC ciphers and add them to the list of 'ssl_ciphers' with "!" prefix appended to current ssl_ciphers. > ssl_ciphers HIGH:!aNULL:!MD5:!DH+3DES:!kEDH:!AAA_CBC_BBB: Ref: https://serverfault.com/questions/692119/meaning-of-ss

[openssl-users] Regarding Full PKI Authentication

2018-10-10 Thread murugesh pitchaiah
Hi All, I came across a term "Full PKI Authentication". Please someone clarify, what the name "Full" suggests here ? Is there any specific "Full PKI" version available ? Anay specific RFC available for "Full" PKI other than the following ? https://tools.ietf.org/html/rfc5280.html I could see s

Re: [openssl-users] Need help with creating a server certificate

2018-08-02 Thread murugesh pitchaiah
Hi, The command you used is the correct one to generate a cert from CSR. Still certificate not generated means there may be some config issue. You did not see any errors after the following line ? using configuration from > path/to/config/folder/openssl.cnf". Also check if the file/path permissi

Re: [openssl-users] Regarding to disable some signature algorithm in client hello message

2018-06-19 Thread murugesh pitchaiah
Hi, SSL_CTX_set1_client_sigalgs_list - is the correct method for this purpose. Just try for checking return value of this function. On failure it returns 0. Also try SSL_CTX_set1_client_sigalgs_list (ctx, "RSA+SHA256"); Thanks, Murugesh P. On 6/19/18, Devang Kubavat wrote: > Hi, > > I want to

Re: [openssl-users] FIPS_mode_set(1) failing

2018-03-05 Thread murugesh pitchaiah
Hi, On invoking FIPS_mode_set(1), the self test would be run internally first. The test would be run for all modules like dsa, rsa, rng, etc. This error indicates a failure in any of these self test run. Try to view the "FIPSerr" which could show you which module's test actually failed; so you ca

Re: [openssl-users] Correct way to free SSL_CTX* ?

2018-01-28 Thread murugesh pitchaiah
Hi Pratyush, Whenever you set a certificate to CTX, the reference count will get incremented: CRYPTO_add(&x->references, 1, CRYPTO_LOCK_X509); In addition, inside your application any usage of a certificate may cause this reference count to be incremented. As you can seen in man page - one call

[openssl-users] FIPS_mode_set - failed - SSLEAY_RAND_BYTES:PRNG not seeded

2018-01-05 Thread murugesh pitchaiah
Hi All, Need your inputs on below issue: When I try to set the FIPS mode, seeing below error and failure intermittently: Error: FIPS_mode_set(1) failed. Reason: error:24064064:random number generator:SSLEAY_RAND_BYTES:PRNG not seeded I am using following versions: openssl-1.0.2k openssl-fips-ec

[openssl-users] FIPS 186-4 RSA CAVS

2017-11-08 Thread murugesh pitchaiah
Dear All, I am working on doing CAVS algorithm testing for RSA, FIPS 186-4. Able to make up the 186-4 patches for RSA key generation from Fedora, SuSe patches. The new API to generate RSA key based on 186-4 is "fips_rsa_builtin_keygen". But I suspect if this has CAVS support as well. In the fips_

Re: [openssl-users] Openssl FIPS 186-4 Patch

2017-10-10 Thread murugesh pitchaiah
this kind of fips canister usage ? Thanks, Murugesh P. On 10/10/17, Marcus Meissner wrote: > Hi, > > On Mon, Oct 09, 2017 at 05:24:17PM +0530, murugesh pitchaiah wrote: >> Hi, >> >> Thanks for the comment. >> >> I know that openSSL is not 186-4 compliant.

Re: [openssl-users] Openssl FIPS 186-4 Patch

2017-10-09 Thread murugesh pitchaiah
Hi, Thanks for the comment. I know that openSSL is not 186-4 compliant. That is why I am looking for anybody have the patch for the same. I see there are some works in Fedora: http://pkgs.fedoraproject.org/cgit/rpms/openssl.git/tree/openssl-1.1.0-fips.patch Thanks, Murugesh P. On 10/6/17, Salz

Re: [openssl-users] Openssl FIPS 186-4 Patch

2017-10-05 Thread murugesh pitchaiah
Hi Jacob, Thanks for looking into this. This FIPS186-4 is not just about SHA. It basically about the key generation parameters. Especially I am looking for RSA key generation parameters wrt FIPS 186-4. Thanks, Murugesh P. On 10/5/17, Jakob Bohm wrote: > On 05/10/2017 13:51, murugesh pitcha

[openssl-users] Openssl FIPS 186-4 Patch

2017-10-05 Thread murugesh pitchaiah
Hi All, I am looking for the FIPS 186-4 patch. I see it is not yet implemented in openssl FIPS 2.0 I see many vendors have implemented their own fix for FIPS 186-4 compliance. I am looking for the patch which i can reuse. Looks like redhat too has its own patch. Kindly share any pointers for the

Re: [openssl-users] Certificate path validation.

2017-03-29 Thread murugesh pitchaiah
Hi, To find CA or not, "X509_check_ca" may be used. Thanks, Murugesh P. On 3/29/17, Richard Stanek wrote: > static bool IsCACertificate(X509* cert) > { > // (U) Initialize to false. > bool bRetVal = false; > > BASIC_CONSTRAINTS* bsCA = > (BASIC_CONSTRAINTS

Re: [openssl-users] Fwd: Makefile.org in openSSL 1.1.0d

2017-02-13 Thread murugesh pitchaiah
Thank you Rich. I was using 1.0.2.h earlier. It was using Makefile.org and then Configure script was run to generate the Makefile. The template available in Makefile.org was used to prepare the Makefile. Can you please share if any thread, details on new build system, how to use that? Thanks, Mu

[openssl-users] Fwd: Makefile.org in openSSL 1.1.0d

2017-02-13 Thread murugesh pitchaiah
Team, I downloaded the openSSL 1.1.0d now and was trying to use that. Previously I was using openSSL 1.0.2.h. I do not see the 'Makefile.org' in the new 1.1.0d. In my application I was using this file. Now as it is not present in 1.1.0d, could not complete the upgrade. Can someone explain why 'M

[openssl-users] OCSP_basic_verify certs

2016-05-06 Thread murugesh pitchaiah
Hi, I am implementing the OCSP for my application. Have a doubt on the 'certs' argument for the API "OCSP_basic_verify": int OCSP_basic_verify(OCSP_BASICRESP *bs, STACK_OF(X509) *certs, X509_STORE *st, unsigned long flags); Here the second argument 'certs'. I unde