13.07.2015 Views

HP SSL for OpenVMS Version 1.1 Installation Guide and Release ...

HP SSL for OpenVMS Version 1.1 Installation Guide and Release ...

HP SSL for OpenVMS Version 1.1 Installation Guide and Release ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

<strong>HP</strong> <strong>SSL</strong> <strong>for</strong> <strong>OpenVMS</strong><strong>Version</strong> <strong>1.1</strong> <strong>Installation</strong> <strong>Guide</strong> <strong>and</strong> <strong>Release</strong> NotesJune 2003This guide contains hardware <strong>and</strong> software prerequisites, installationinstructions, postinstallation tasks, instructions <strong>for</strong> building yourapplication, the <strong>SSL</strong> directory structure, <strong>and</strong> release notes <strong>for</strong><strong>HP</strong> <strong>SSL</strong> <strong>Version</strong> <strong>1.1</strong> <strong>for</strong> <strong>OpenVMS</strong>.For more in<strong>for</strong>mation about <strong>HP</strong> <strong>SSL</strong>, see the <strong>HP</strong> Open SourceSecurity <strong>for</strong> <strong>OpenVMS</strong> Volume 2: <strong>HP</strong> <strong>SSL</strong> <strong>for</strong> <strong>OpenVMS</strong>. Thatmanual is available on the <strong>OpenVMS</strong> documentationCD-ROM <strong>and</strong> the <strong>OpenVMS</strong> website at http://h71000.www7.hp.com/For the latest release notes <strong>and</strong> <strong>SSL</strong> kits, see the <strong>HP</strong> <strong>SSL</strong> website athttp://h71000.www7.hp.com/openvms/products/ssl/<strong>Installation</strong> Requirements <strong>and</strong> PrerequisitesThe following sections list hardware <strong>and</strong> disk space requirements, <strong>and</strong> softwareprerequisites.Hardware Prerequisites<strong>HP</strong> <strong>SSL</strong> is available on both the Alpha <strong>and</strong> VAX plat<strong>for</strong>ms.Disk Space RequirementsThe <strong>HP</strong> <strong>SSL</strong> <strong>for</strong> <strong>OpenVMS</strong> kit requires approximately 45,000 blocks ofworking disk space to install. Once installed, the software occupies approximately40,000 blocks of disk space.Software Prerequisites<strong>HP</strong> <strong>SSL</strong> <strong>for</strong> <strong>OpenVMS</strong> requires the following software:xx<strong>OpenVMS</strong> Alpha <strong>Version</strong> 7.2-2 or higher or <strong>OpenVMS</strong> VAX <strong>Version</strong> 7.3 or higher<strong>HP</strong> TCP/IP Services <strong>for</strong> <strong>OpenVMS</strong> <strong>Version</strong> 5.3 or higher<strong>HP</strong> <strong>SSL</strong> <strong>for</strong> <strong>OpenVMS</strong> has been tested <strong>and</strong> verified using <strong>HP</strong>TCP/IP Services <strong>for</strong> <strong>OpenVMS</strong>. There are no known problems running <strong>HP</strong><strong>SSL</strong> <strong>for</strong> <strong>OpenVMS</strong> with other TCP/IP network products. This includesthe following TCP/IP network products from Process Software Corporation, but<strong>HP</strong> has not <strong>for</strong>mally tested <strong>and</strong> verified these other products:x TCPware <strong>Version</strong> 5.5x MultiNet <strong>Version</strong> 4.3Account Quotas <strong>and</strong> System ParametersThere are no specific requirements <strong>for</strong> account quotas <strong>and</strong> system parameters <strong>for</strong>installing or using <strong>HP</strong> <strong>SSL</strong> <strong>for</strong> <strong>OpenVMS</strong>.


New Features in <strong>HP</strong> <strong>SSL</strong> V<strong>1.1</strong> <strong>for</strong> <strong>OpenVMS</strong><strong>SSL</strong> V<strong>1.1</strong> <strong>for</strong> <strong>OpenVMS</strong>, based on Open<strong>SSL</strong> 0.9.6g, is included in <strong>OpenVMS</strong> <strong>Version</strong> 7.3-2 field test. Theprevious version of <strong>OpenVMS</strong> included Compaq <strong>SSL</strong> V1.0, which was based on Open<strong>SSL</strong> 0.9.6b.New features in <strong>SSL</strong> V<strong>1.1</strong> include:• A port of the Open<strong>SSL</strong> 0.9.6g baselevel, which includes fixes to security vulnerabilities reported onFebruary 19, 2003, <strong>and</strong> March 17 <strong>and</strong> 19, 2003 at http://www.openssl.org/news/• Certificate Revocation List (CRL) support in the Certificate Tool• A DES encryption image that allows you to enable uuencoding <strong>and</strong> uudecoding• Three new CRYPTO APIs have been added -- BN_pseudo_r<strong>and</strong>_range, ERR_load_COMP_strings, <strong>and</strong>X509_STORE_CTX_set_verify_cb• Two new <strong>SSL</strong> APIs have been added -- <strong>SSL</strong>_get_rfd <strong>and</strong> <strong>SSL</strong>_get_wfd• One Open<strong>SSL</strong> API has been removed -- Open<strong>SSL</strong>DieOpen<strong>SSL</strong> Documentation from The Open GroupDocumentation about the Open<strong>SSL</strong> project <strong>and</strong> The Open Group is available atthe following URL:http://www.openssl.orgThe Open<strong>SSL</strong> documentation was written <strong>for</strong> UNIX users. When readingUNIX-style Open<strong>SSL</strong> documentation, note the following differences betweenUNIX <strong>and</strong> <strong>OpenVMS</strong>:xFile specification <strong>for</strong>matThe Open<strong>SSL</strong> documentation shows example file specifications in UNIX <strong>for</strong>mat.For example, the UNIX file specification /dka100/foo/bar/file.dat isequivalent to DKA100:[FOO.BAR]FILE.DAT on <strong>OpenVMS</strong>.xDirectory <strong>for</strong>matDirectories (pathnames) that begin with a period (.) on UNIX beginwith an underscore (_) on <strong>OpenVMS</strong>. In addition, on UNIX, the tilde (~)is an abbreviation <strong>for</strong> SYS$LOGIN. For example, the UNIX pathname~/.openssl/profile/prefs.js is equivalent to the <strong>OpenVMS</strong> directory[._OPEN<strong>SSL</strong>.PROFILE]PREFS.JS.Installing <strong>HP</strong> <strong>SSL</strong> <strong>for</strong> <strong>OpenVMS</strong><strong>HP</strong> <strong>SSL</strong> <strong>for</strong> <strong>OpenVMS</strong> is shipped with <strong>OpenVMS</strong> Alpha <strong>Version</strong> 7.3-1on the Layered Products CD-ROM. You must install <strong>HP</strong> <strong>SSL</strong> be<strong>for</strong>e you canuse it. Use the following procedure to install <strong>HP</strong> <strong>SSL</strong> <strong>for</strong> <strong>OpenVMS</strong>.To install the <strong>SSL</strong> <strong>for</strong> <strong>OpenVMS</strong> kit, enter the following comm<strong>and</strong>:$ PRODUCT INSTALL <strong>SSL</strong>/SOURCE=ddcu:[dir]


By default, <strong>SSL</strong> <strong>for</strong> <strong>OpenVMS</strong> is installed into SYS$SYSDEVICE:[VMS$COMMON]. You can specify a different installation location by usingthe PRODUCT INSTALL comm<strong>and</strong> line qualifier /DESTINATION.For a description of the features you can request with the PRODUCT INSTALLcomm<strong>and</strong> when starting an installation, such as running the IVP, purging files,<strong>and</strong> configuring the installation, refer to the POLYCENTER Software <strong>Installation</strong>Utility User <strong>Guide</strong>.As the installation procedure progresses, the system displays in<strong>for</strong>mation similarto the following:ÅÁIQH7T6SÁBGRS4EEÁRRERHTQ6807D4 '`DBSRbÁÁÁÁ6IPÁ4WIUFRÁRREÁUÁEf pƒpiÁIƒ€i†h…ÁÁÁ6IPÁ4WIUFRÁRREÁU5ÁEf pƒpiÁIƒ€i†h…ÁÁÁ4wwÁ ƒ€i†h…„Áwt„…piÁfg€‡pÁ!ÁÁ8‰t…ÁÁ6s€€„pÁ€ypÁ€ƒÁx€ƒpÁt…px„Áqƒ€xÁ…spÁxpy†Á„p fƒf…piÁg Áh€xxf„'ÁÁÁSspÁq€ww€ˆtyrÁ ƒ€i†h…Ásf„ÁgppyÁ„pwph…pi'ÁÁ6IPÁ4WIUFRÁRREÁUÁEf pƒpiÁIƒ€i†h…ÁÁ7€Á €†Áˆfy…Á…€Áh€y…ty†p2Á`X8RbÁÁ6€yqtr†ƒf…t€yÁ sf„pÁ„…fƒ…tyrÁÁÁX€†ÁˆtwwÁgpÁf„vpiÁ…€Áhs€€„pÁ€ …t€y„ÁtqÁfy Áq€ƒÁpfhsÁ„pwph…piÁ ƒ€i†h…ÁfyiÁq€ƒÁfy Á ƒ€i†h…„Á…sf…Áxf ÁgpÁty„…fwwpiÁ…€Á„f…t„q Á„€q…ˆfƒpÁip pyipyh Áƒp‚†tƒpxpy…„ÁÁ6IPÁ4WIUFRÁRREÁU'ÁRREÁq€ƒÁH pyUFRÁUÁÉ5f„piÁ€yÁH pyRREÁ&#@ÁÁÉhÁ6€ ƒtrs…Á ÁApˆwp……IfhvfƒiÁ7p‡pw€ xpy…Á6€x fy ÁEIÁÁ7€Á €†Áˆfy…Á…spÁipqf†w…„Áq€ƒÁfwwÁ€ …t€y„2Á`X8RbÁÁ7€Á €†Áˆfy…Á…€Áƒp‡tpˆÁ…spÁ€ …t€y„2Á`GHbÁÁ8‰ph†…t€yÁ sf„pÁ„…fƒ…tyrÁÁÁSspÁq€ww€ˆtyrÁ ƒ€i†h…ÁˆtwwÁgpÁty„…fwwpiÁ…€Áip„…tyf…t€y'ÁÁ6IPÁ4WIUFRÁRREÁUÁ7BRDÅ7VEEG@d4dU$ '`UFRÅ6HFFHGbÁÁSspÁq€ww€ˆtyrÁ ƒ€i†h…ÁˆtwwÁgpÁƒpx€‡piÁqƒ€xÁip„…tyf…t€y'ÁÁ6IPÁ4WIUFRÁRREÁU5Á7BRDÅ7VEEG@d4dU$ '`UFRÅ6HFFHGbÁÁI€ƒ…t€yÁi€yp'ÁÆÆÆ Æ!Æ"Æ#Æ$Æ%Æ&ÆÆÁÁSspÁq€ww€ˆtyrÁ ƒ€i†h…Ásf„ÁgppyÁty„…fwwpi'ÁÁ6IPÁ4WIUFRÁRREÁUÁEf pƒpiÁIƒ€i†h…ÁÁSspÁq€ww€ˆtyrÁ ƒ€i†h…Ásf„ÁgppyÁƒpx€‡pi'ÁÁ6IPÁ4WIUFRÁRREÁU5ÁEf pƒpiÁIƒ€i†h…ÁÁÆI6RBBBUI8W86TS8Áp‰ph†…tyrÁ…p„…Á ƒ€hpi†ƒpÁq€ƒÁ6IPÁ4WIUFRÁRREÁUÁÁÆI6RBBBUIRT668RRÁ…p„…Á ƒ€hpi†ƒpÁh€x wp…piÁ„†hhp„„q†ww ÁÁ


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


system startup file so that you can use <strong>SSL</strong> immediately:$ @SYS$STARTUP:<strong>SSL</strong>$STARTUP3. Define the <strong>for</strong>eign comm<strong>and</strong>s that use the Open<strong>SSL</strong> utility OPEN<strong>SSL</strong>.EXE,such as openssl, ca, enc, req, <strong>and</strong> X509, by entering the followingcomm<strong>and</strong>:$ @<strong>SSL</strong>$COM:<strong>SSL</strong>$UTILS4. Optionally, start the Certificate Tool by entering the following comm<strong>and</strong>:$ @<strong>SSL</strong>$COM:<strong>SSL</strong>$CERT_TOOLThis menu-driven tool allows you to create <strong>and</strong> view certificates <strong>and</strong> certificaterequests <strong>and</strong> to sign certifcate requests. For in<strong>for</strong>mation about the CertificateTool, see Chapter 3 in <strong>HP</strong> Open Source Security <strong>for</strong> <strong>OpenVMS</strong>Volume 2: <strong>HP</strong> <strong>SSL</strong> <strong>for</strong> <strong>OpenVMS</strong>.<strong>SSL</strong> Directory StructureAfter the installation is complete, the <strong>SSL</strong> directory structure is as follows:[<strong>SSL</strong>] - Top-level directory created by default inSYS$SYSDEVICE:[VMS$COMMON].[<strong>SSL</strong>.ALPHA_EXE] - Contains images <strong>for</strong> the Alpha plat<strong>for</strong>m.[<strong>SSL</strong>.COM] - Contains comm<strong>and</strong> procedures.[<strong>SSL</strong>.DEMOCA] - Contains demos <strong>for</strong> <strong>SSL</strong> CA features[<strong>SSL</strong>.DEMOCA.CERTS] - Contains certificates <strong>and</strong> keys.[<strong>SSL</strong>.DEMOCA.CONF] - Contains configuration files.[<strong>SSL</strong>.DEMOCA.CRL] - Contains revoked certificates <strong>and</strong> CRLs.[<strong>SSL</strong>.DEMOCA.PRIVATE] - Contains private keys <strong>and</strong> r<strong>and</strong>om data.[<strong>SSL</strong>.DOC] - Open<strong>SSL</strong> Group provided documentation & in<strong>for</strong>mation.[<strong>SSL</strong>.INCLUDE] - Contains C header (.H) files.[<strong>SSL</strong>.TEST] - Contains files used during the <strong>Installation</strong> Verification Procedure (IVP).In addition, <strong>SSL</strong> example programs are located inSYS$COMMON:[SYSHLP.EXAMPLES.<strong>SSL</strong>]. These example programsare also shown <strong>and</strong> discussed in Chapter 6 in Open Source Security <strong>for</strong><strong>OpenVMS</strong> Volume 2: <strong>HP</strong> <strong>SSL</strong> <strong>for</strong> <strong>OpenVMS</strong>.Building an <strong>SSL</strong> Application<strong>HP</strong> <strong>SSL</strong> <strong>for</strong> <strong>OpenVMS</strong> provides shareable images that contain 64-bitAPIs <strong>and</strong> shareable images that contain 32-bit APIs. You can choose which APIs touse when you compile your application.The file names <strong>for</strong> these shareable images are as follows:SYS$SHARE:<strong>SSL</strong>$LIB<strong>SSL</strong>_SHR.EXE - 64-bit <strong>SSL</strong> APIsSYS$SHARE:<strong>SSL</strong>$LIBCRYPTO_SHR.EXE - 64-bit Crypto APIsSYS$SHARE:<strong>SSL</strong>$LIB<strong>SSL</strong>_SHR32.EXE - 32-bit <strong>SSL</strong> APIsSYS$SHARE:<strong>SSL</strong>$LIBCRYPTO_SHR32.EXE - 32-bit Crypto APIsWhen you compile your application using <strong>HP</strong> C, use the /POINTER_SIZE=64qualifier to take advantage of the 64-bit APIs. The default value <strong>for</strong> the


POINTER_SIZE qualifier is 32.Linking your application is the same <strong>for</strong> both 64-bit or 32-bit APIs. The options fileused contains either the 64-bit or 32-bit references to the appropriate shareableimage.Building an Application Using 64-Bit APIsTo build (compile <strong>and</strong> link) a sample program using the 64-bit APIs, enter thefollowing comm<strong>and</strong>s:$ CC/POINTER_SIZE=64/PREFIX=ALL SAMPLE.C$ LINK/MAP SAMPLE,LINKER_OPT/OPTIONSIn these comm<strong>and</strong>s, LINKER_OPT.OPT is a simple text file that contains thefollowing lines:SYS$SHARE:<strong>SSL</strong>$LIB<strong>SSL</strong>_SHR/SHARESYS$SHARE:<strong>SSL</strong>$LIBCRYPTO_SHR/SHAREBuilding an Application Using 32-Bit APIsTo build (compile <strong>and</strong> link) a sample program using the 32-bit APIs, enter thefollowing comm<strong>and</strong>s:$ CC/PREFIX=ALL SAMPLE.C$ LINK/MAP SAMPLE,LINKER_OPT/OPTIONSIn these comm<strong>and</strong>s, LINKER_OPT.OPT is a simple text file that contains thefollowing lines:SYS$SHARE:<strong>SSL</strong>$LIB<strong>SSL</strong>_SHR32/SHARESYS$SHARE:<strong>SSL</strong>$LIBCRYPTO_SHR32/SHARE<strong>Release</strong> NotesThis section contains notes about <strong>Version</strong> <strong>1.1</strong> of <strong>HP</strong> <strong>SSL</strong> <strong>for</strong> <strong>OpenVMS</strong>.Legal Caution<strong>SSL</strong> data transport requires encryption. Many governments, including the UnitedStates, have restrictions on the import <strong>and</strong> export of cryptographic algorithms.Please ensure that your use of <strong>SSL</strong> is in compliance with all national <strong>and</strong>international laws that apply to you.Shareable Images Containing 64-Bit <strong>and</strong> 32-Bit APIs Provided<strong>HP</strong> <strong>SSL</strong> <strong>for</strong> <strong>OpenVMS</strong> provides shareable images that contain 64-bitAPIs <strong>and</strong> shareable images that contain 32-bit APIs. You can choose which APIs touse when you compile your application. For more in<strong>for</strong>mation, see Section 1.6.Linking with <strong>HP</strong> <strong>SSL</strong> Shareable ImagesIf you have written an application that links against the Open<strong>SSL</strong> object libraries,you must make a minor change to your code because <strong>HP</strong> <strong>SSL</strong> provides onlyshareable images. To link your application against the shareable images, use


code similar to the following:$ LINK my_app.obj, VMS_<strong>SSL</strong>_OPTIONS/OPTwhere VMS_<strong>SSL</strong>_OPTIONS.OPT is a text file that contains the following lines:SYS$SHARE:<strong>SSL</strong>$LIBCRYPTO_SHR.EXE/SHARESYS$SHARE:<strong>SSL</strong>$LIB<strong>SSL</strong>_SHR.EXE/SHAREPreserve Certificates, Keys, <strong>and</strong> Configuration Files When Upgradingfrom Field Test KitIf you are upgrading from the field test kit (T1.0) to the <strong>HP</strong> <strong>SSL</strong> <strong>Version</strong><strong>1.1</strong> kit, you must save the certificates, keys, <strong>and</strong> configuration files in the <strong>SSL</strong>subdirectory. <strong>HP</strong> recommends that you back up these items to either adifferent disk <strong>and</strong> directory or to tape. When you have completed the <strong>Version</strong> <strong>1.1</strong>installation, move the saved items back into the <strong>SSL</strong> directory structure. Thendelete the backed up certificates, keys, <strong>and</strong> configuration files.Startup <strong>and</strong> Shutdown Comm<strong>and</strong> Procedures RenamedIf you previously installed the Compaq <strong>SSL</strong> T1.0 field test kit <strong>and</strong> are nowinstalling the <strong>Version</strong> <strong>1.1</strong> kit, the SYS$STARTUP:<strong>SSL</strong>$STARTUP.COM<strong>and</strong> SYS$STARTUP:<strong>SSL</strong>$SHUTDOWN.COM comm<strong>and</strong> procedures in the<strong>Version</strong> <strong>1.1</strong> kit are named SYS$STARTUP:<strong>SSL</strong>$STARTUP.TEMPLATE <strong>and</strong>SYS$STARTUP:<strong>SSL</strong>$SHUTDOWN.TEMPLATE. This prevents PCSI fromoverwriting the .COM files, <strong>and</strong> allows you to preserve any modifications you madeto <strong>SSL</strong>$STARTUP.COM <strong>and</strong> <strong>SSL</strong>$SHUTDOWN.COM after you installed the T1.0field test kit.After you install the <strong>Version</strong> <strong>1.1</strong> kit, compare the new .TEMPLATE files with yourexisting <strong>SSL</strong>$STARTUP.COM <strong>and</strong> <strong>SSL</strong>$SHUTDOWN.COM files <strong>and</strong> add anynew in<strong>for</strong>mation as required.If you did not previously install the T1.0 field test kit, both the .TEMPLATE <strong>and</strong>.COM files are provided.Configuration files are provided in the same fashion - both .CNF <strong>and</strong>.CNF_TEMPLATE files are included in <strong>HP</strong> <strong>SSL</strong>.<strong>SSL</strong> APIs Not Backward Compatible<strong>HP</strong> <strong>SSL</strong> <strong>for</strong> <strong>OpenVMS</strong> is based on open-source code provided by TheOpen Group. The <strong>OpenVMS</strong> code is based on the 0.9.6G baselevel of Open<strong>SSL</strong>.Until The Open Group releases its <strong>Version</strong> 1.0 baselevel, The Open Group is notguaranteeing backward compatibility. This means that any Open<strong>SSL</strong> API, datastructure, header file, comm<strong>and</strong>, <strong>and</strong> the like might be changed in a future versionof Open<strong>SSL</strong>.As a result, <strong>HP</strong> cannot guarantee the backward compatibility of <strong>HP</strong> <strong>SSL</strong><strong>for</strong> <strong>OpenVMS</strong> until the release of <strong>HP</strong> <strong>SSL</strong> <strong>for</strong> <strong>OpenVMS</strong> that isbased on Open<strong>SSL</strong> 1.0. The shareable images use EQUAL 1,0 which means thatapplications will have to relink when new shareable images are distributed.Certificate Tool Cannot Have Simultaneous Users


Only one user/process should use the Certificate Tool at a time. The tool does nothave a locking mechanism to prevent unsynchronized accesses of the database<strong>and</strong> serial file.Protect Certificates <strong>and</strong> KeysWhen you create certificates <strong>and</strong> keys with the Certificate Tool, take care to ensurethat the keys are properly protected to allow only the owner of the keys to usethem. A private key should be treated like a password. You can use <strong>OpenVMS</strong> fileprotections to protect the key file, or you can use ACLs to protect individual keyfiles within a common directory.Directory Structure Changed<strong>HP</strong> <strong>SSL</strong> V<strong>1.1</strong> <strong>for</strong> <strong>OpenVMS</strong> has a different directory structure than the<strong>HP</strong> <strong>SSL</strong> field test kit (T1.0). The new directory structure is more consistentwith the structure of the Open<strong>SSL</strong> kit from openssl.org. See Section 1.5 <strong>for</strong> thenew directory structure.If you previously installed the T1.0 kit, be sure to copy any certificates, keys, <strong>and</strong>configuration files from the old directory structure to the new directory structure.<strong>SSL</strong>$EXAMPLES Logical NameIn <strong>SSL</strong> V<strong>1.1</strong>, a new logical, <strong>SSL</strong>$EXAMPLES, has been added to the <strong>SSL</strong>$STARTUP.TEMPLATEcomm<strong>and</strong> procedure. This logical points to the directory SYS$COMMON:[SYSHLP.EXAMPLES.<strong>SSL</strong>].DES_CBC_CKSUM Return Value Changed to Match KerberosThe return value of the DES_CBC_CKSUM API has changed to match its intended compatibility with MITKerberos. The DES_CBC_CKSUM routine returns the upper longword of a quadword. The quadworditself was calculated correctly, <strong>and</strong> has not been changed.Prior to the change (in Compaq <strong>SSL</strong> V1.0-B <strong>and</strong> earlier), the API returned the value in the wrong order.For example:3FUVSOWBMVFGSPNEFT@DCD@DLTVNYBFEDCIn <strong>SSL</strong> V<strong>1.1</strong>, the return value is as follows:3FUVSOWBMVFGSPNEFT@DCD@DLTVNYCEDBFThis change has been accepted by the Open<strong>SSL</strong>.org, <strong>and</strong> will be available in the 0.9.7A release ofOpen<strong>SSL</strong>.DES Image Included in <strong>SSL</strong> V<strong>1.1</strong>In the <strong>SSL</strong> V<strong>1.1</strong>, an additional image is being made available, called DES.EXE, which is located in the<strong>SSL</strong>$EXE directory. Create a <strong>for</strong>eign symbol to access this new image, as follows:%&444-&9&%&4&9&The new DES image provides some functionality that is not present in the DES subcomm<strong>and</strong> in theOPEN<strong>SSL</strong> comm<strong>and</strong> line utility, most notably the ability to enable uuencoding <strong>and</strong> uudecoding.Following is the help text <strong>for</strong> the DES comm<strong>and</strong> <strong>and</strong> the DES subcomm<strong>and</strong> in the OPEN<strong>SSL</strong> comm<strong>and</strong>line utility, which illustrates the differences between the comm<strong>and</strong>s.


$ DES -?‘?’ unknown flagdes [input-file [output-file]]options:-v : des(1) version number-e : encrypt using SunOS compatible user key to DES key conversion.-E : encrypt-d : decrypt using SunOS compatible user key to DES key conversion.-D : decrypt-c[ckname] : generate a cbc_cksum using SunOS compatible user key toDES key conversion <strong>and</strong> output to ckname (stdout default,stderr if data being output on stdout). The checksum isgenerated be<strong>for</strong>e encryption <strong>and</strong> after decryption if usedin conjunction with -[eEdD].-C[ckname] : generate a cbc_cksum as <strong>for</strong> -c but compatible with -[ED].-k key : use key ‘key’-h : the key that is entered will be a hexadecimal numberthat is used directly as the des key-u[uuname] :input file is uudecoded if -[dD] or output uuencoded data if -[eE](uuname is the filename to put in the uuencode header).-b : encrypt using DES in ecb encryption mode, the default is cbc mode.-3 : encrypt using triple DES encryption. This uses 2 keysgenerated from the input key. If the input key is lessthan 8 characters long, this is equivalent to normalencryption. Default is triple cbc, -b makes it triple ecb.$ OPEN<strong>SSL</strong> DES -?unknown option ‘-?’options are-in input file-out output file-pass pass phrase source-e encrypt-d decrypt-a/-base64 base64 encode/decode, depending on encryption flag-k key is the next argument-kfilekey is the first line of the file argument-K/-iv key/iv in hex is the next argument-[pP]print the iv/key (then exit if -P)-bufsize buffer size-engine e use engine e, possibly a hardware device.Cipher Typesdes :56 bit key DES encryptiondes_ede : 112 bit key ede DES encryptiondes_ede3: 168 bit key ede DES encryptionrc2 :128 bit key RC2 encryptionbf :128 bit key Blowfish encryption-rc4 : 128 bit key RC4 encryption-des-ecb -des-cbc -des-cfb -des-ofb -des (des-cbc)-des-ede -des-ede-cbc -des-ede-cfb -des-ede-ofb -desx -none-des-ede3 -des-ede3-cbc -des-ede3-cfb -des-ede3-ofb -des3 (des-ede3-cbc)ÁEnvironment Variables


Open<strong>SSL</strong> environmental variables have two <strong>for</strong>mats, as follows:$var${var}In order <strong>for</strong> these variables to be parsed properly <strong>and</strong> not be confused with logicalnames, <strong>HP</strong> <strong>SSL</strong> only accepts the ${var} <strong>for</strong>mat.BIND Error in TCP/IP ApplicationIf you are running a TCP/IP-based <strong>SSL</strong> client/server application, the serveroccasionally fails to start up, <strong>and</strong> displays the following error message:bind: address already in useTo avoid this error, use setsockopt( ) with SO_REUSEADDR as follows:ÁÁÁÁJOUPOSFUTFUTPDLPQU MJTUFO@TPDL40-@40$,&540@3&64&"%%3 WPJEPOTJ[FPG POIDEA <strong>and</strong> RC5 Symmetric Cipher Algorithms Not SupportedThe IDEA <strong>and</strong> RC5 symmetric cipher algorithms are not available in <strong>HP</strong> <strong>SSL</strong><strong>for</strong> <strong>OpenVMS</strong>. Both of these algorithms are under copyright protection, <strong>and</strong><strong>HP</strong> does not have the right to use these algorithms.If you want to use either of these algorithms, <strong>HP</strong> recommends that youcontact RSA Security at the following URL <strong>for</strong> the licensing conditions of the RC5algorithm:http://www.rsasecurity.comIf you want to use the IDEA algorithm, contact Ascom <strong>for</strong> their licenserequirements at the following URL:http://www.ascom.chOnce you have obtained the proper licenses, download the source code from thefollowing URL:http://www.openssl.orgBuild the product using the comm<strong>and</strong> procedure named MAKEVMS.COM providedin the download.APIs RAND_egd, RAND_egd_bytes, <strong>and</strong> RAND_query_egd_bytesNot SupportedThe RAND_egd( ), RAND_egd_bytes( ), <strong>and</strong> RAND_query_egd_bytes( ) APIsare not currently available on <strong>OpenVMS</strong>.To obtain a secure r<strong>and</strong>om seed on <strong>OpenVMS</strong>, use the RAND_poll( ) API.<strong>HP</strong> C++ V5.5 CANTCOMPLETE Warnings


When you compile programs that contain Open<strong>SSL</strong> APIs, <strong>HP</strong> C++ <strong>Version</strong>5.5 issues warnings about incomplete classes. This error occurs when you use astructure definition be<strong>for</strong>e it has been defined. You can resolve these warnings inone of two ways:x Upgrade to C++ <strong>Version</strong> 6.0.xSupply the necessary prototype be<strong>for</strong>e using the structure.The following is an example of this error:ÅÁh‰‰wt„…IQ89BW0É4EEd8GSQB8RÁ„pƒ‡hÁÁÁÁÁÁ„…ƒ†h…Á6QXISHdi yw€hvd‡fw†pÁif…f(ÁÁÁÁÁÁcÁÁÁÁÁÁÆ6WWV64GS6HFIE8S8ÁByÁ…st„Áiphwfƒf…t€yÁ…spÁtyh€x wp…pÁhwf„„ÁÁÁÁÁÁÆyyfxpiÁ„…ƒ†h…''6QXISHdi yw€hvd‡fw†pÃÁÁÁÁÁÁhfyy€…ÁgpÁh€x wp…piÁgphf†„pÁt…Át„ÁiphwfƒpiÁˆt…styÁfÁÁÁÁÁÁhwf„„Á€ƒÁfÁq†yh…t€yÁ ƒ€…€… pÁÁÁÁÁÁf…ÁwtypÁy†xgpƒÁ#ÁtyÁqtwpÁÁÁÁÁÁ6QXISHÅQ8R'`HRRE5TBE7d!&d4EIA4d BG6ET78HI8GRREb6QXISHA( ÁDocumentation from the Open<strong>SSL</strong> WebsiteThe documentation on the Open<strong>SSL</strong> website is currently under development. It islikely that the API <strong>and</strong> comm<strong>and</strong>- line documentation shipped with this kit willdiffer from the documentation on the Open<strong>SSL</strong> website at some point. If such asituation arises, you should consider the API documentation on the Open<strong>SSL</strong>website to have precedence over the documentation included in this kit.Use Certificate Tool <strong>for</strong> Certificate <strong>and</strong> Key Creation<strong>HP</strong> recommends the use of the Certificate Tool(<strong>SSL</strong>$COM:<strong>SSL</strong>$CERT_TOOL.COM) when creating certificates <strong>and</strong> keys totest your <strong>SSL</strong> application. The Certificate Tool provides both ease of use <strong>and</strong>consistency when creating your certificates <strong>and</strong> keys to test <strong>and</strong> demonstrate your<strong>SSL</strong> client <strong>and</strong> server application.nsCertType No Longer Written in CertificatesIn the <strong>SSL</strong> T1.0 field test kit, the Certificate Tool incorrectly set the nsCertTypefield with both server <strong>and</strong> client values. The field should have been set withone value, either server or client, but not both. In <strong>Version</strong> <strong>1.1</strong>, this field is notset in the Certificate Tool. Your application is still able to pass certificates aseither server or client certificates, but object signing cannot be completed witha null nsCertType field.If object signing is required in your application, see the following paragraphsabout setting values in the nsCertType field.<strong>HP</strong> recommends that you delete the nsCertType field from the existing<strong>SSL</strong>$CONF:<strong>SSL</strong>$CA.CNF file by editing the file <strong>and</strong> deleting the line thatbegins with the following:nsCertType =


If you have an application that requires the nsCertType field, edit the file<strong>SSL</strong>$CONF:<strong>SSL</strong>$CA.CNF <strong>and</strong> enter the value that your applicationrequires. If your application needs a certificate with the client nsCertTypefield value, enter the following:nsCertType = clientValid values <strong>for</strong> the nsCertType field are server, client, email, objsign,sslCA, emailCA, <strong>and</strong> objCA.Extra Certificate Files -- *.PEMWhen you sign a certificate request using either the Certificate Tool orthe Open<strong>SSL</strong> utility, you may notice that an extra certificate is produced witha name similar to <strong>SSL</strong>$CRT01.PEM or 01.PEM. This certificate isthe same as the certificate that you produced with the name you chose.These extra files are the result of the Open<strong>SSL</strong> demonstration CertificateAuthority (CA) capability, <strong>and</strong> are used as a CA accounting function.These extra files are kept by the CA <strong>and</strong> can be used to generateCertificate Revocation Lists (CRLs) if the certificate becomes compromised.INDEX.TXT <strong>and</strong> SERIAL.TXT LocationIn the COMPAQ <strong>SSL</strong> T1.0 field test kit, INDEX.TXT <strong>and</strong> SERIAL.TXTwere located in <strong>SSL</strong>$ROOT:[DEMOCA.PRIVATE]. In the <strong>HP</strong> <strong>SSL</strong>V1.0 kit, these files are located in <strong>SSL</strong>$ROOT:[DEMOCA].The location of INDEX.TXT <strong>and</strong> SERIAL.TXT is controlled by theOPEN<strong>SSL</strong>-VMS.CNF file, <strong>and</strong> consumed by the Open<strong>SSL</strong> utility <strong>and</strong>the Certificate Tool as part of the Open<strong>SSL</strong> demonstration CertificateAuthority database.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!