Jan F. Chadima 3b545be
diff -up openssh-5.9p1/authfile.c.fips openssh-5.9p1/authfile.c
e962030
--- openssh-5.9p1/authfile.c.fips	2012-07-17 20:57:35.078155160 +0200
e962030
+++ openssh-5.9p1/authfile.c	2012-07-17 20:57:35.086155338 +0200
Jan F. Chadima 69dd72f
@@ -148,8 +148,14 @@ key_private_rsa1_to_blob(Key *key, Buffe
Jan F. Chadima 69dd72f
 	/* Allocate space for the private part of the key in the buffer. */
Jan F. Chadima 69dd72f
 	cp = buffer_append_space(&encrypted, buffer_len(&buffer));
Jan F. Chadima 69dd72f
 
Jan F. Chadima 69dd72f
-	cipher_set_key_string(&ciphercontext, cipher, passphrase,
Jan F. Chadima 69dd72f
-	    CIPHER_ENCRYPT);
Jan F. Chadima 69dd72f
+	if (cipher_set_key_string(&ciphercontext, cipher, passphrase,
Jan F. Chadima 69dd72f
+	    CIPHER_ENCRYPT) < 0) {
Jan F. Chadima 69dd72f
+	    error("cipher_set_key_string failed.");
Jan F. Chadima 69dd72f
+	    buffer_free(&encrypted);
Jan F. Chadima 69dd72f
+	    buffer_free(&buffer);
Jan F. Chadima 69dd72f
+	    return 0;
Jan F. Chadima 69dd72f
+	}
Jan F. Chadima 69dd72f
+
Jan F. Chadima 69dd72f
 	cipher_crypt(&ciphercontext, cp,
Jan F. Chadima 69dd72f
 	    buffer_ptr(&buffer), buffer_len(&buffer));
Jan F. Chadima 69dd72f
 	cipher_cleanup(&ciphercontext);
Jan F. Chadima 69dd72f
@@ -472,8 +478,13 @@ key_parse_private_rsa1(Buffer *blob, con
Jan F. Chadima 69dd72f
 	cp = buffer_append_space(&decrypted, buffer_len(©);;
Jan F. Chadima 69dd72f
 
Jan F. Chadima 69dd72f
 	/* Rest of the buffer is encrypted.  Decrypt it using the passphrase. */
Jan F. Chadima 69dd72f
-	cipher_set_key_string(&ciphercontext, cipher, passphrase,
Jan F. Chadima 69dd72f
-	    CIPHER_DECRYPT);
Jan F. Chadima 69dd72f
+	if (cipher_set_key_string(&ciphercontext, cipher, passphrase,
Jan F. Chadima 69dd72f
+	    CIPHER_DECRYPT) < 0) {
Jan F. Chadima 69dd72f
+	    error("cipher_set_key_string failed.");
Jan F. Chadima 69dd72f
+	    buffer_free(&decrypted);
Jan F. Chadima 69dd72f
+	    goto fail;
Jan F. Chadima 69dd72f
+	}
Jan F. Chadima 69dd72f
+
Jan F. Chadima 69dd72f
 	cipher_crypt(&ciphercontext, cp,
Jan F. Chadima 69dd72f
 	    buffer_ptr(&copy), buffer_len(©);;
Jan F. Chadima 69dd72f
 	cipher_cleanup(&ciphercontext);
Jan F. Chadima 3b545be
diff -up openssh-5.9p1/cipher.c.fips openssh-5.9p1/cipher.c
e962030
--- openssh-5.9p1/cipher.c.fips	2012-07-17 20:57:34.988153164 +0200
e962030
+++ openssh-5.9p1/cipher.c	2012-07-17 20:57:35.086155338 +0200
Jan F. Chadima 69dd72f
@@ -40,6 +40,7 @@
Jan F. Chadima 69dd72f
 #include <sys/types.h>
Jan F. Chadima 69dd72f
 
Jan F. Chadima 69dd72f
 #include <openssl/md5.h>
Jan F. Chadima 69dd72f
+#include <openssl/fips.h>
Jan F. Chadima 69dd72f
 
Jan F. Chadima 69dd72f
 #include <string.h>
Jan F. Chadima 69dd72f
 #include <stdarg.h>
Jan F. Chadima 69dd72f
@@ -86,6 +87,22 @@ struct Cipher ciphers[] = {
Jan F. Chadima 69dd72f
 	{ NULL,			SSH_CIPHER_INVALID, 0, 0, 0, 0, NULL }
Jan F. Chadima 69dd72f
 };
Jan F. Chadima 69dd72f
 
Jan F. Chadima 69dd72f
+struct Cipher fips_ciphers[] = {
Jan F. Chadima 69dd72f
+	{ "none",		SSH_CIPHER_NONE, 8, 0, 0, 0, EVP_enc_null },
Jan F. Chadima 69dd72f
+	{ "3des",		SSH_CIPHER_3DES, 8, 16, 0, 1, evp_ssh1_3des },
Jan F. Chadima 69dd72f
+
Jan F. Chadima 69dd72f
+	{ "3des-cbc",		SSH_CIPHER_SSH2, 8, 24, 0, 1, EVP_des_ede3_cbc },
Jan F. Chadima 69dd72f
+	{ "aes128-cbc",		SSH_CIPHER_SSH2, 16, 16, 0, 1, EVP_aes_128_cbc },
Jan F. Chadima 69dd72f
+	{ "aes192-cbc",		SSH_CIPHER_SSH2, 16, 24, 0, 1, EVP_aes_192_cbc },
Jan F. Chadima 69dd72f
+	{ "aes256-cbc",		SSH_CIPHER_SSH2, 16, 32, 0, 1, EVP_aes_256_cbc },
Jan F. Chadima 69dd72f
+	{ "rijndael-cbc@lysator.liu.se",
Jan F. Chadima 69dd72f
+				SSH_CIPHER_SSH2, 16, 32, 0, 1, EVP_aes_256_cbc },
Jan F. Chadima 69dd72f
+	{ "aes128-ctr",		SSH_CIPHER_SSH2, 16, 16, 0, 0, evp_aes_128_ctr },
Jan F. Chadima 69dd72f
+	{ "aes192-ctr",		SSH_CIPHER_SSH2, 16, 24, 0, 0, evp_aes_128_ctr },
Jan F. Chadima 69dd72f
+	{ "aes256-ctr",		SSH_CIPHER_SSH2, 16, 32, 0, 0, evp_aes_128_ctr },
Jan F. Chadima 69dd72f
+	{ NULL,			SSH_CIPHER_INVALID, 0, 0, 0, 0, NULL }
Jan F. Chadima 69dd72f
+};
Jan F. Chadima 69dd72f
+
Jan F. Chadima 69dd72f
 /*--*/
Jan F. Chadima 69dd72f
 
Jan F. Chadima 69dd72f
 u_int
Jan F. Chadima 69dd72f
@@ -128,7 +145,7 @@ Cipher *
Jan F. Chadima 69dd72f
 cipher_by_name(const char *name)
Jan F. Chadima 69dd72f
 {
Jan F. Chadima 69dd72f
 	Cipher *c;
Jan F. Chadima 69dd72f
-	for (c = ciphers; c->name != NULL; c++)
Jan F. Chadima 69dd72f
+	for (c = FIPS_mode() ? fips_ciphers : ciphers; c->name != NULL; c++)
Jan F. Chadima 69dd72f
 		if (strcmp(c->name, name) == 0)
Jan F. Chadima 69dd72f
 			return c;
Jan F. Chadima 69dd72f
 	return NULL;
Jan F. Chadima 69dd72f
@@ -138,7 +155,7 @@ Cipher *
Jan F. Chadima 69dd72f
 cipher_by_number(int id)
Jan F. Chadima 69dd72f
 {
Jan F. Chadima 69dd72f
 	Cipher *c;
Jan F. Chadima 69dd72f
-	for (c = ciphers; c->name != NULL; c++)
Jan F. Chadima 69dd72f
+	for (c = FIPS_mode() ? fips_ciphers : ciphers; c->name != NULL; c++)
Jan F. Chadima 69dd72f
 		if (c->number == id)
Jan F. Chadima 69dd72f
 			return c;
Jan F. Chadima 69dd72f
 	return NULL;
Jan F. Chadima 69dd72f
@@ -182,7 +199,7 @@ cipher_number(const char *name)
Jan F. Chadima 69dd72f
 	Cipher *c;
Jan F. Chadima 69dd72f
 	if (name == NULL)
Jan F. Chadima 69dd72f
 		return -1;
Jan F. Chadima 69dd72f
-	for (c = ciphers; c->name != NULL; c++)
Jan F. Chadima 69dd72f
+	for (c = FIPS_mode() ? fips_ciphers : ciphers; c->name != NULL; c++)
Jan F. Chadima 69dd72f
 		if (strcasecmp(c->name, name) == 0)
Jan F. Chadima 69dd72f
 			return c->number;
Jan F. Chadima 69dd72f
 	return -1;
Jan F. Chadima 69dd72f
@@ -289,14 +306,15 @@ cipher_cleanup(CipherContext *cc)
Jan F. Chadima 69dd72f
  * passphrase and using the resulting 16 bytes as the key.
Jan F. Chadima 69dd72f
  */
Jan F. Chadima 69dd72f
 
Jan F. Chadima 69dd72f
-void
Jan F. Chadima 69dd72f
+int
Jan F. Chadima 69dd72f
 cipher_set_key_string(CipherContext *cc, Cipher *cipher,
Jan F. Chadima 69dd72f
     const char *passphrase, int do_encrypt)
Jan F. Chadima 69dd72f
 {
Jan F. Chadima 69dd72f
 	MD5_CTX md;
Jan F. Chadima 69dd72f
 	u_char digest[16];
Jan F. Chadima 69dd72f
 
Jan F. Chadima 69dd72f
-	MD5_Init(&md);
Jan F. Chadima 69dd72f
+	if (MD5_Init(&md) <= 0)
Jan F. Chadima 69dd72f
+		return -1;
Jan F. Chadima 69dd72f
 	MD5_Update(&md, (const u_char *)passphrase, strlen(passphrase));
Jan F. Chadima 69dd72f
 	MD5_Final(digest, &md);
Jan F. Chadima 69dd72f
 
Jan F. Chadima 69dd72f
@@ -304,6 +322,7 @@ cipher_set_key_string(CipherContext *cc,
Jan F. Chadima 69dd72f
 
Jan F. Chadima 69dd72f
 	memset(digest, 0, sizeof(digest));
Jan F. Chadima 69dd72f
 	memset(&md, 0, sizeof(md));
Jan F. Chadima 69dd72f
+	return 0;
Jan F. Chadima 69dd72f
 }
Jan F. Chadima 69dd72f
 
Jan F. Chadima 69dd72f
 /*
e962030
diff -up openssh-5.9p1/cipher-ctr.c.fips openssh-5.9p1/cipher-ctr.c
e962030
--- openssh-5.9p1/cipher-ctr.c.fips	2010-10-07 13:06:42.000000000 +0200
e962030
+++ openssh-5.9p1/cipher-ctr.c	2012-07-17 20:57:35.086155338 +0200
e962030
@@ -140,7 +140,8 @@ evp_aes_128_ctr(void)
e962030
 	aes_ctr.do_cipher = ssh_aes_ctr;
e962030
 #ifndef SSH_OLD_EVP
e962030
 	aes_ctr.flags = EVP_CIPH_CBC_MODE | EVP_CIPH_VARIABLE_LENGTH |
e962030
-	    EVP_CIPH_ALWAYS_CALL_INIT | EVP_CIPH_CUSTOM_IV;
e962030
+	    EVP_CIPH_ALWAYS_CALL_INIT | EVP_CIPH_CUSTOM_IV |
e962030
+	    EVP_CIPH_FLAG_FIPS;
e962030
 #endif
e962030
 	return (&aes_ctr);
e962030
 }
Jan F. Chadima 3b545be
diff -up openssh-5.9p1/cipher.h.fips openssh-5.9p1/cipher.h
e962030
--- openssh-5.9p1/cipher.h.fips	2012-07-17 20:57:34.989153186 +0200
e962030
+++ openssh-5.9p1/cipher.h	2012-07-17 20:57:35.087155360 +0200
Jan F. Chadima 69dd72f
@@ -87,7 +87,7 @@ void	 cipher_init(CipherContext *, Ciphe
Jan F. Chadima 69dd72f
     const u_char *, u_int, int);
Jan F. Chadima 69dd72f
 void	 cipher_crypt(CipherContext *, u_char *, const u_char *, u_int);
Jan F. Chadima 69dd72f
 void	 cipher_cleanup(CipherContext *);
Jan F. Chadima 69dd72f
-void	 cipher_set_key_string(CipherContext *, Cipher *, const char *, int);
Jan F. Chadima 69dd72f
+int	 cipher_set_key_string(CipherContext *, Cipher *, const char *, int);
Jan F. Chadima 69dd72f
 u_int	 cipher_blocksize(const Cipher *);
Jan F. Chadima 69dd72f
 u_int	 cipher_keylen(const Cipher *);
Jan F. Chadima 69dd72f
 u_int	 cipher_is_cbc(const Cipher *);
Jan F. Chadima 3b545be
diff -up openssh-5.9p1/key.c.fips openssh-5.9p1/key.c
e962030
--- openssh-5.9p1/key.c.fips	2012-07-17 20:57:35.007153585 +0200
e962030
+++ openssh-5.9p1/key.c	2012-07-17 20:57:35.087155360 +0200
Jan F. Chadima 69dd72f
@@ -40,6 +40,7 @@
Jan F. Chadima 69dd72f
 #include <sys/types.h>
Jan F. Chadima 69dd72f
 
Jan F. Chadima 69dd72f
 #include <openssl/evp.h>
Jan F. Chadima 69dd72f
+#include <openssl/fips.h>
Jan F. Chadima 69dd72f
 #include <openbsd-compat/openssl-compat.h>
Jan F. Chadima 69dd72f
 
Jan F. Chadima 69dd72f
 #include <stdarg.h>
Jan F. Chadima 69dd72f
@@ -602,9 +603,13 @@ key_fingerprint_selection(void)
Jan F. Chadima 69dd72f
 	char *env;
Jan F. Chadima 69dd72f
 
Jan F. Chadima 69dd72f
 	if (!rv_defined) {
Jan F. Chadima 69dd72f
-		env = getenv("SSH_FINGERPRINT_TYPE");
Jan F. Chadima 69dd72f
-		rv = (env && !strcmp (env, "sha")) ?
Jan F. Chadima 69dd72f
-			SSH_FP_SHA1 : SSH_FP_MD5;
Jan F. Chadima 69dd72f
+		if (FIPS_mode())
Jan F. Chadima 69dd72f
+			rv = SSH_FP_SHA1;
Jan F. Chadima 69dd72f
+		else {
Jan F. Chadima 69dd72f
+			env = getenv("SSH_FINGERPRINT_TYPE");
Jan F. Chadima 69dd72f
+			rv = (env && !strcmp (env, "sha")) ?
Jan F. Chadima 69dd72f
+				SSH_FP_SHA1 : SSH_FP_MD5;
Jan F. Chadima 69dd72f
+		}
Jan F. Chadima 69dd72f
 		rv_defined = 1;
Jan F. Chadima 69dd72f
 	}
Jan F. Chadima 69dd72f
 	return rv;
Jan F. Chadima 3b545be
diff -up openssh-5.9p1/mac.c.fips openssh-5.9p1/mac.c
e962030
--- openssh-5.9p1/mac.c.fips	2012-07-17 20:57:34.996153341 +0200
e962030
+++ openssh-5.9p1/mac.c	2012-07-17 20:58:35.584497499 +0200
Jan F. Chadima 69dd72f
@@ -28,6 +28,7 @@
Jan F. Chadima 69dd72f
 #include <sys/types.h>
Jan F. Chadima 69dd72f
 
Jan F. Chadima 69dd72f
 #include <openssl/hmac.h>
Jan F. Chadima 69dd72f
+#include <openssl/fips.h>
Jan F. Chadima 69dd72f
 
Jan F. Chadima 69dd72f
 #include <stdarg.h>
Jan F. Chadima 69dd72f
 #include <string.h>
Jan F. Chadima 69dd72f
@@ -47,14 +48,14 @@
Jan F. Chadima 69dd72f
 #define SSH_EVP		1	/* OpenSSL EVP-based MAC */
Jan F. Chadima 69dd72f
 #define SSH_UMAC	2	/* UMAC (not integrated with OpenSSL) */
Jan F. Chadima 69dd72f
 
Jan F. Chadima 69dd72f
-struct {
Jan F. Chadima 69dd72f
+struct Macs {
Jan F. Chadima 69dd72f
 	char		*name;
Jan F. Chadima 69dd72f
 	int		type;
Jan F. Chadima 69dd72f
 	const EVP_MD *	(*mdfunc)(void);
Jan F. Chadima 69dd72f
 	int		truncatebits;	/* truncate digest if != 0 */
Jan F. Chadima 69dd72f
 	int		key_len;	/* just for UMAC */
Jan F. Chadima 69dd72f
 	int		len;		/* just for UMAC */
Jan F. Chadima 69dd72f
-} macs[] = {
Jan F. Chadima 69dd72f
+} all_macs[] = {
Jan F. Chadima 69dd72f
 	{ "hmac-sha1",			SSH_EVP, EVP_sha1, 0, -1, -1 },
Jan F. Chadima 69dd72f
 	{ "hmac-sha1-96",		SSH_EVP, EVP_sha1, 96, -1, -1 },
Jan F. Chadima 69dd72f
 #ifdef HAVE_EVP_SHA256
e962030
@@ -71,9 +72,19 @@ struct {
Jan F. Chadima 69dd72f
 	{ NULL,				0, NULL, 0, -1, -1 }
Jan F. Chadima 69dd72f
 };
Jan F. Chadima 69dd72f
 
Jan F. Chadima 69dd72f
+struct Macs fips_macs[] = {
Jan F. Chadima 69dd72f
+	{ "hmac-sha1",			SSH_EVP, EVP_sha1, 0, -1, -1 },
e962030
+#ifdef HAVE_EVP_SHA256
e962030
+	{ "hmac-sha2-256",		SSH_EVP, EVP_sha256, 0, -1, -1 },
e962030
+	{ "hmac-sha2-512",		SSH_EVP, EVP_sha512, 0, -1, -1 },
e962030
+#endif
Jan F. Chadima 69dd72f
+	{ NULL,				0, NULL, 0, -1, -1 }
Jan F. Chadima 69dd72f
+};
Jan F. Chadima 69dd72f
+
Jan F. Chadima 69dd72f
 static void
Jan F. Chadima 69dd72f
 mac_setup_by_id(Mac *mac, int which)
Jan F. Chadima 69dd72f
 {
Jan F. Chadima 69dd72f
+	struct Macs *macs = FIPS_mode() ? fips_macs : all_macs;
Jan F. Chadima 69dd72f
 	int evp_len;
Jan F. Chadima 69dd72f
 	mac->type = macs[which].type;
Jan F. Chadima 69dd72f
 	if (mac->type == SSH_EVP) {
e962030
@@ -94,6 +105,7 @@ int
Jan F. Chadima 69dd72f
 mac_setup(Mac *mac, char *name)
Jan F. Chadima 69dd72f
 {
Jan F. Chadima 69dd72f
 	int i;
Jan F. Chadima 69dd72f
+	struct Macs *macs = FIPS_mode() ? fips_macs : all_macs;
Jan F. Chadima 69dd72f
 
Jan F. Chadima 69dd72f
 	for (i = 0; macs[i].name; i++) {
Jan F. Chadima 69dd72f
 		if (strcmp(name, macs[i].name) == 0) {
e962030
diff -up openssh-5.9p1/Makefile.in.fips openssh-5.9p1/Makefile.in
e962030
--- openssh-5.9p1/Makefile.in.fips	2012-07-17 20:57:35.069154962 +0200
e962030
+++ openssh-5.9p1/Makefile.in	2012-07-17 20:57:35.086155338 +0200
e962030
@@ -142,25 +142,25 @@ libssh.a: $(LIBSSH_OBJS)
e962030
 	$(RANLIB) $@
e962030
 
e962030
 ssh$(EXEEXT): $(LIBCOMPAT) libssh.a $(SSHOBJS)
e962030
-	$(LD) -o $@ $(SSHOBJS) $(LDFLAGS) -lssh -lopenbsd-compat $(SSHLIBS) $(LIBS)
e962030
+	$(LD) -o $@ $(SSHOBJS) $(LDFLAGS) -lssh -lopenbsd-compat -lfipscheck $(SSHLIBS) $(LIBS)
e962030
 
e962030
 sshd$(EXEEXT): libssh.a	$(LIBCOMPAT) $(SSHDOBJS)
e962030
-	$(LD) -o $@ $(SSHDOBJS) $(LDFLAGS) -lssh -lopenbsd-compat $(SSHDLIBS) $(LIBS)
e962030
+	$(LD) -o $@ $(SSHDOBJS) $(LDFLAGS) -lssh -lopenbsd-compat -lfipscheck $(SSHDLIBS) $(LIBS)
e962030
 
e962030
 scp$(EXEEXT): $(LIBCOMPAT) libssh.a scp.o progressmeter.o
e962030
 	$(LD) -o $@ scp.o progressmeter.o bufaux.o $(LDFLAGS) -lssh -lopenbsd-compat $(LIBS)
e962030
 
e962030
 ssh-add$(EXEEXT): $(LIBCOMPAT) libssh.a ssh-add.o
e962030
-	$(LD) -o $@ ssh-add.o $(LDFLAGS) -lssh -lopenbsd-compat $(LIBS)
e962030
+	$(LD) -o $@ ssh-add.o $(LDFLAGS) -lssh -lopenbsd-compat -lfipscheck $(LIBS)
e962030
 
e962030
 ssh-agent$(EXEEXT): $(LIBCOMPAT) libssh.a ssh-agent.o ssh-pkcs11-client.o
e962030
-	$(LD) -o $@ ssh-agent.o ssh-pkcs11-client.o $(LDFLAGS) -lssh -lopenbsd-compat $(LIBS)
e962030
+	$(LD) -o $@ ssh-agent.o ssh-pkcs11-client.o $(LDFLAGS) -lssh -lopenbsd-compat -lfipscheck $(LIBS)
e962030
 
e962030
 ssh-keygen$(EXEEXT): $(LIBCOMPAT) libssh.a ssh-keygen.o
e962030
-	$(LD) -o $@ ssh-keygen.o $(LDFLAGS) -lssh -lopenbsd-compat $(LIBS)
e962030
+	$(LD) -o $@ ssh-keygen.o $(LDFLAGS) -lssh -lopenbsd-compat -lfipscheck $(LIBS)
e962030
 
e962030
 ssh-keysign$(EXEEXT): $(LIBCOMPAT) libssh.a ssh-keysign.o roaming_dummy.o readconf.o
e962030
-	$(LD) -o $@ ssh-keysign.o readconf.o roaming_dummy.o $(LDFLAGS) -lssh -lopenbsd-compat $(LIBS)
e962030
+	$(LD) -o $@ ssh-keysign.o readconf.o roaming_dummy.o $(LDFLAGS) -lssh -lopenbsd-compat -lfipscheck $(LIBS)
e962030
 
e962030
 ssh-pkcs11-helper$(EXEEXT): $(LIBCOMPAT) libssh.a ssh-pkcs11-helper.o ssh-pkcs11.o
e962030
 	$(LD) -o $@ ssh-pkcs11-helper.o ssh-pkcs11.o $(LDFLAGS) -lssh -lopenbsd-compat -lssh -lopenbsd-compat $(LIBS)
e962030
@@ -172,7 +172,7 @@ ssh-keycat$(EXEEXT): $(LIBCOMPAT) libssh
e962030
 	$(LD) -o $@ ssh-keycat.o $(LDFLAGS) -lssh -lopenbsd-compat -lssh -lfipscheck $(SSHDLIBS)
e962030
 
e962030
 ssh-keyscan$(EXEEXT): $(LIBCOMPAT) libssh.a ssh-keyscan.o roaming_dummy.o
e962030
-	$(LD) -o $@ ssh-keyscan.o roaming_dummy.o $(LDFLAGS) -lssh -lopenbsd-compat -lssh $(LIBS)
e962030
+	$(LD) -o $@ ssh-keyscan.o roaming_dummy.o $(LDFLAGS) -lssh -lopenbsd-compat -lssh -lfipscheck $(LIBS)
e962030
 
e962030
 sftp-server$(EXEEXT): $(LIBCOMPAT) libssh.a sftp.o sftp-common.o sftp-server.o sftp-server-main.o
e962030
 	$(LD) -o $@ sftp-server.o sftp-common.o sftp-server-main.o $(LDFLAGS) -lssh -lopenbsd-compat $(LIBS)
Jan F. Chadima 3b545be
diff -up openssh-5.9p1/myproposal.h.fips openssh-5.9p1/myproposal.h
Jan F. Chadima 3b545be
--- openssh-5.9p1/myproposal.h.fips	2011-08-17 02:29:03.000000000 +0200
e962030
+++ openssh-5.9p1/myproposal.h	2012-07-17 21:01:12.685982807 +0200
e962030
@@ -97,6 +97,19 @@
Jan F. Chadima 69dd72f
 #define	KEX_DEFAULT_COMP	"none,zlib@openssh.com,zlib"
Jan F. Chadima 69dd72f
 #define	KEX_DEFAULT_LANG	""
Jan F. Chadima 69dd72f
 
Jan F. Chadima 69dd72f
+#define	KEX_FIPS_ENCRYPT \
Jan F. Chadima 69dd72f
+	"aes128-ctr,aes192-ctr,aes256-ctr," \
Jan F. Chadima 69dd72f
+	"aes128-cbc,3des-cbc," \
Jan F. Chadima 69dd72f
+	"aes192-cbc,aes256-cbc,rijndael-cbc@lysator.liu.se"
e962030
+#ifdef HAVE_EVP_SHA256
e962030
+#define	KEX_FIPS_MAC \
e962030
+	"hmac-sha1," \
e962030
+	"hmac-sha2-256," \
e962030
+	"hmac-sha2-512"
e962030
+#else
Jan F. Chadima 69dd72f
+#define	KEX_FIPS_MAC \
Jan F. Chadima 69dd72f
+	"hmac-sha1"
e962030
+#endif
Jan F. Chadima 69dd72f
 
Jan F. Chadima 69dd72f
 static char *myproposal[PROPOSAL_MAX] = {
Jan F. Chadima 69dd72f
 	KEX_DEFAULT_KEX,
Jan F. Chadima 3b545be
diff -up openssh-5.9p1/openbsd-compat/bsd-arc4random.c.fips openssh-5.9p1/openbsd-compat/bsd-arc4random.c
Jan F. Chadima 3b545be
--- openssh-5.9p1/openbsd-compat/bsd-arc4random.c.fips	2010-03-25 22:52:02.000000000 +0100
e962030
+++ openssh-5.9p1/openbsd-compat/bsd-arc4random.c	2012-07-17 20:57:35.087155360 +0200
Jan F. Chadima 69dd72f
@@ -37,25 +37,18 @@
Jan F. Chadima 69dd72f
 #define REKEY_BYTES	(1 << 24)
Jan F. Chadima 69dd72f
 
Jan F. Chadima 69dd72f
 static int rc4_ready = 0;
Jan F. Chadima 69dd72f
-static RC4_KEY rc4;
Jan F. Chadima 69dd72f
 
Jan F. Chadima 69dd72f
 unsigned int
Jan F. Chadima 69dd72f
 arc4random(void)
Jan F. Chadima 69dd72f
 {
Jan F. Chadima 69dd72f
 	unsigned int r = 0;
Jan F. Chadima 69dd72f
-	static int first_time = 1;
Jan F. Chadima 69dd72f
+	void *rp = &r;
Jan F. Chadima 69dd72f
 
Jan F. Chadima 69dd72f
-	if (rc4_ready <= 0) {
Jan F. Chadima 69dd72f
-		if (first_time)
Jan F. Chadima 69dd72f
-			seed_rng();
Jan F. Chadima 69dd72f
-		first_time = 0;
Jan F. Chadima 69dd72f
+	if (!rc4_ready) {
Jan F. Chadima 69dd72f
 		arc4random_stir();
Jan F. Chadima 69dd72f
 	}
Jan F. Chadima 69dd72f
+	RAND_bytes(rp, sizeof(r));
Jan F. Chadima 69dd72f
 
Jan F. Chadima 69dd72f
-	RC4(&rc4, sizeof(r), (unsigned char *)&r, (unsigned char *)&r);
Jan F. Chadima 69dd72f
-
Jan F. Chadima 69dd72f
-	rc4_ready -= sizeof(r);
Jan F. Chadima 69dd72f
-	
Jan F. Chadima 69dd72f
 	return(r);
Jan F. Chadima 69dd72f
 }
Jan F. Chadima 69dd72f
 
Jan F. Chadima 69dd72f
@@ -63,24 +56,11 @@ void
Jan F. Chadima 69dd72f
 arc4random_stir(void)
Jan F. Chadima 69dd72f
 {
Jan F. Chadima 69dd72f
 	unsigned char rand_buf[SEED_SIZE];
Jan F. Chadima 69dd72f
-	int i;
Jan F. Chadima 69dd72f
 
Jan F. Chadima 69dd72f
-	memset(&rc4, 0, sizeof(rc4));
Jan F. Chadima 69dd72f
 	if (RAND_bytes(rand_buf, sizeof(rand_buf)) <= 0)
Jan F. Chadima 69dd72f
 		fatal("Couldn't obtain random bytes (error %ld)",
Jan F. Chadima 69dd72f
 		    ERR_get_error());
Jan F. Chadima 69dd72f
-	RC4_set_key(&rc4, sizeof(rand_buf), rand_buf);
Jan F. Chadima 69dd72f
-
Jan F. Chadima 69dd72f
-	/*
Jan F. Chadima 69dd72f
-	 * Discard early keystream, as per recommendations in:
Jan F. Chadima 69dd72f
-	 * http://www.wisdom.weizmann.ac.il/~itsik/RC4/Papers/Rc4_ksa.ps
Jan F. Chadima 69dd72f
-	 */
Jan F. Chadima 69dd72f
-	for(i = 0; i <= 256; i += sizeof(rand_buf))
Jan F. Chadima 69dd72f
-		RC4(&rc4, sizeof(rand_buf), rand_buf, rand_buf);
Jan F. Chadima 69dd72f
-
Jan F. Chadima 69dd72f
-	memset(rand_buf, 0, sizeof(rand_buf));
Jan F. Chadima 69dd72f
-
Jan F. Chadima 69dd72f
-	rc4_ready = REKEY_BYTES;
Jan F. Chadima 69dd72f
+	rc4_ready = 1;
Jan F. Chadima 69dd72f
 }
Jan F. Chadima 69dd72f
 #endif /* !HAVE_ARC4RANDOM */
Jan F. Chadima 69dd72f
 
Jan F. Chadima 3b545be
diff -up openssh-5.9p1/ssh.c.fips openssh-5.9p1/ssh.c
Jan F. Chadima 3b545be
--- openssh-5.9p1/ssh.c.fips	2011-08-05 22:18:16.000000000 +0200
e962030
+++ openssh-5.9p1/ssh.c	2012-07-17 20:57:35.088155382 +0200
Jan F. Chadima 69dd72f
@@ -73,6 +73,8 @@
Jan F. Chadima 69dd72f
 
Jan F. Chadima 69dd72f
 #include <openssl/evp.h>
Jan F. Chadima 69dd72f
 #include <openssl/err.h>
Jan F. Chadima 69dd72f
+#include <openssl/fips.h>
Jan F. Chadima 69dd72f
+#include <fipscheck.h>
Jan F. Chadima 69dd72f
 #include "openbsd-compat/openssl-compat.h"
Jan F. Chadima 69dd72f
 #include "openbsd-compat/sys-queue.h"
Jan F. Chadima 69dd72f
 
Jan F. Chadima 69dd72f
@@ -253,6 +255,10 @@ main(int ac, char **av)
Jan F. Chadima 69dd72f
 	sanitise_stdfd();
Jan F. Chadima 69dd72f
 
Jan F. Chadima 69dd72f
 	__progname = ssh_get_progname(av[0]);
Jan F. Chadima 69dd72f
+        SSLeay_add_all_algorithms();
Jan F. Chadima 69dd72f
+        if (FIPS_mode() && !FIPSCHECK_verify(NULL, NULL)) {
Jan F. Chadima 69dd72f
+                fatal("FIPS integrity verification test failed.");
Jan F. Chadima 69dd72f
+        }
Jan F. Chadima 69dd72f
 
Jan F. Chadima 69dd72f
 #ifndef HAVE_SETPROCTITLE
Jan F. Chadima 69dd72f
 	/* Prepare for later setproctitle emulation */
Jan F. Chadima 69dd72f
@@ -329,6 +335,9 @@ main(int ac, char **av)
Jan F. Chadima 69dd72f
 	    "ACD:F:I:KL:MNO:PR:S:TVw:W:XYy")) != -1) {
Jan F. Chadima 69dd72f
 		switch (opt) {
Jan F. Chadima 69dd72f
 		case '1':
Jan F. Chadima 69dd72f
+			if (FIPS_mode()) {
Jan F. Chadima 69dd72f
+				fatal("Protocol 1 not allowed in the FIPS mode.");
Jan F. Chadima 69dd72f
+			}
Jan F. Chadima 69dd72f
 			options.protocol = SSH_PROTO_1;
Jan F. Chadima 69dd72f
 			break;
Jan F. Chadima 69dd72f
 		case '2':
Jan F. Chadima 69dd72f
@@ -630,7 +639,6 @@ main(int ac, char **av)
Jan F. Chadima 69dd72f
 	if (!host)
Jan F. Chadima 69dd72f
 		usage();
Jan F. Chadima 69dd72f
 
Jan F. Chadima 69dd72f
-	OpenSSL_add_all_algorithms();
Jan F. Chadima 69dd72f
 	ERR_load_crypto_strings();
Jan F. Chadima 69dd72f
 
Jan F. Chadima 69dd72f
 	/* Initialize the command to execute on remote host. */
Jan F. Chadima 69dd72f
@@ -721,6 +729,10 @@ main(int ac, char **av)
Jan F. Chadima 69dd72f
 
Jan F. Chadima 69dd72f
 	seed_rng();
Jan F. Chadima 69dd72f
 
Jan F. Chadima 69dd72f
+	if (FIPS_mode()) {
Jan F. Chadima 69dd72f
+		logit("FIPS mode initialized");
Jan F. Chadima 69dd72f
+	}
Jan F. Chadima 69dd72f
+
Jan F. Chadima 69dd72f
 	if (options.user == NULL)
Jan F. Chadima 69dd72f
 		options.user = xstrdup(pw->pw_name);
Jan F. Chadima 69dd72f
 
Jan F. Chadima 69dd72f
@@ -789,6 +801,12 @@ main(int ac, char **av)
Jan F. Chadima 69dd72f
 
Jan F. Chadima 69dd72f
 	timeout_ms = options.connection_timeout * 1000;
Jan F. Chadima 69dd72f
 
Jan F. Chadima 69dd72f
+	if (FIPS_mode()) {
Jan F. Chadima 69dd72f
+		options.protocol &= SSH_PROTO_2;
Jan F. Chadima 69dd72f
+		if (options.protocol == 0)
Jan F. Chadima 69dd72f
+			fatal("Protocol 2 disabled by configuration but required in the FIPS mode.");
Jan F. Chadima 69dd72f
+	}
Jan F. Chadima 69dd72f
+
Jan F. Chadima 69dd72f
 	/* Open a connection to the remote host. */
Jan F. Chadima 69dd72f
 	if (ssh_connect(host, &hostaddr, options.port,
Jan F. Chadima 69dd72f
 	    options.address_family, options.connection_attempts, &timeout_ms,
Jan F. Chadima 3b545be
diff -up openssh-5.9p1/sshconnect2.c.fips openssh-5.9p1/sshconnect2.c
e962030
--- openssh-5.9p1/sshconnect2.c.fips	2012-07-17 20:57:34.955152432 +0200
e962030
+++ openssh-5.9p1/sshconnect2.c	2012-07-17 20:57:35.088155382 +0200
Jan F. Chadima 69dd72f
@@ -44,6 +44,8 @@
Jan F. Chadima 69dd72f
 #include <vis.h>
Jan F. Chadima 69dd72f
 #endif
Jan F. Chadima 69dd72f
 
Jan F. Chadima 69dd72f
+#include <openssl/fips.h>
Jan F. Chadima 69dd72f
+
Jan F. Chadima 69dd72f
 #include "openbsd-compat/sys-queue.h"
Jan F. Chadima 69dd72f
 
Jan F. Chadima 69dd72f
 #include "xmalloc.h"
Jan F. Chadima 69dd72f
@@ -170,6 +172,10 @@ ssh_kex2(char *host, struct sockaddr *ho
Jan F. Chadima 69dd72f
 	if (options.ciphers != NULL) {
Jan F. Chadima 69dd72f
 		myproposal[PROPOSAL_ENC_ALGS_CTOS] =
Jan F. Chadima 69dd72f
 		myproposal[PROPOSAL_ENC_ALGS_STOC] = options.ciphers;
Jan F. Chadima 69dd72f
+	} else if (FIPS_mode()) {
Jan F. Chadima 69dd72f
+		myproposal[PROPOSAL_ENC_ALGS_CTOS] =
Jan F. Chadima 69dd72f
+		myproposal[PROPOSAL_ENC_ALGS_STOC] = KEX_FIPS_ENCRYPT;
Jan F. Chadima 69dd72f
+
Jan F. Chadima 69dd72f
 	}
Jan F. Chadima 69dd72f
 	myproposal[PROPOSAL_ENC_ALGS_CTOS] =
Jan F. Chadima 69dd72f
 	    compat_cipher_proposal(myproposal[PROPOSAL_ENC_ALGS_CTOS]);
Jan F. Chadima 69dd72f
@@ -185,7 +191,11 @@ ssh_kex2(char *host, struct sockaddr *ho
Jan F. Chadima 69dd72f
 	if (options.macs != NULL) {
Jan F. Chadima 69dd72f
 		myproposal[PROPOSAL_MAC_ALGS_CTOS] =
Jan F. Chadima 69dd72f
 		myproposal[PROPOSAL_MAC_ALGS_STOC] = options.macs;
Jan F. Chadima 69dd72f
+	} else if (FIPS_mode()) {
Jan F. Chadima 69dd72f
+		myproposal[PROPOSAL_MAC_ALGS_CTOS] =
Jan F. Chadima 69dd72f
+		myproposal[PROPOSAL_MAC_ALGS_STOC] = KEX_FIPS_MAC;
Jan F. Chadima 69dd72f
 	}
Jan F. Chadima 69dd72f
+
Jan F. Chadima 69dd72f
 	if (options.hostkeyalgorithms != NULL)
Jan F. Chadima 69dd72f
 		myproposal[PROPOSAL_SERVER_HOST_KEY_ALGS] =
Jan F. Chadima 69dd72f
 		    options.hostkeyalgorithms;
Jan F. Chadima 3b545be
diff -up openssh-5.9p1/sshd.c.fips openssh-5.9p1/sshd.c
e962030
--- openssh-5.9p1/sshd.c.fips	2012-07-17 20:57:35.049154517 +0200
e962030
+++ openssh-5.9p1/sshd.c	2012-07-17 20:57:35.089155405 +0200
Jan F. Chadima 69dd72f
@@ -76,6 +76,8 @@
Jan F. Chadima 69dd72f
 #include <openssl/bn.h>
Jan F. Chadima 69dd72f
 #include <openssl/md5.h>
Jan F. Chadima 69dd72f
 #include <openssl/rand.h>
Jan F. Chadima 69dd72f
+#include <openssl/fips.h>
Jan F. Chadima 69dd72f
+#include <fipscheck.h>
Jan F. Chadima 69dd72f
 #include "openbsd-compat/openssl-compat.h"
Jan F. Chadima 69dd72f
 
Jan F. Chadima 69dd72f
 #ifdef HAVE_SECUREWARE
e962030
@@ -1395,6 +1397,11 @@ main(int ac, char **av)
Jan F. Chadima 69dd72f
 #endif
Jan F. Chadima 69dd72f
 	__progname = ssh_get_progname(av[0]);
Jan F. Chadima 69dd72f
 
Jan F. Chadima 69dd72f
+        SSLeay_add_all_algorithms();
Jan F. Chadima 69dd72f
+        if (FIPS_mode() && !FIPSCHECK_verify(NULL, NULL)) {
Jan F. Chadima 69dd72f
+                fatal("FIPS integrity verification test failed.");
Jan F. Chadima 69dd72f
+        }
Jan F. Chadima 69dd72f
+
Jan F. Chadima 69dd72f
 	/* Save argv. Duplicate so setproctitle emulation doesn't clobber it */
Jan F. Chadima 69dd72f
 	saved_argc = ac;
Jan F. Chadima 69dd72f
 	rexec_argc = ac;
e962030
@@ -1554,8 +1561,6 @@ main(int ac, char **av)
Jan F. Chadima 69dd72f
 	else
Jan F. Chadima 69dd72f
 		closefrom(REEXEC_DEVCRYPTO_RESERVED_FD);
Jan F. Chadima 69dd72f
 
Jan F. Chadima 69dd72f
-	OpenSSL_add_all_algorithms();
Jan F. Chadima 69dd72f
-
Jan F. Chadima 69dd72f
 	/*
Jan F. Chadima 69dd72f
 	 * Force logging to stderr until we have loaded the private host
Jan F. Chadima 69dd72f
 	 * key (unless started from inetd)
e962030
@@ -1673,6 +1678,10 @@ main(int ac, char **av)
Jan F. Chadima 69dd72f
 		debug("private host key: #%d type %d %s", i, key->type,
Jan F. Chadima 69dd72f
 		    key_type(key));
Jan F. Chadima 69dd72f
 	}
Jan F. Chadima 69dd72f
+	if ((options.protocol & SSH_PROTO_1) && FIPS_mode()) {
Jan F. Chadima 69dd72f
+		logit("Disabling protocol version 1. Not allowed in the FIPS mode.");
Jan F. Chadima 69dd72f
+		options.protocol &= ~SSH_PROTO_1;
Jan F. Chadima 69dd72f
+	}
Jan F. Chadima 69dd72f
 	if ((options.protocol & SSH_PROTO_1) && !sensitive_data.have_ssh1_key) {
Jan F. Chadima 69dd72f
 		logit("Disabling protocol version 1. Could not load host key");
Jan F. Chadima 69dd72f
 		options.protocol &= ~SSH_PROTO_1;
e962030
@@ -1837,6 +1846,10 @@ main(int ac, char **av)
Jan F. Chadima 69dd72f
 	/* Initialize the random number generator. */
Jan F. Chadima 69dd72f
 	arc4random_stir();
Jan F. Chadima 69dd72f
 
Jan F. Chadima 69dd72f
+	if (FIPS_mode()) {
Jan F. Chadima 69dd72f
+		logit("FIPS mode initialized");
Jan F. Chadima 69dd72f
+	}
Jan F. Chadima 69dd72f
+
Jan F. Chadima 69dd72f
 	/* Chdir to the root directory so that the current disk can be
Jan F. Chadima 69dd72f
 	   unmounted if desired. */
Jan F. Chadima 3b545be
 	(void) chdir("/");
e962030
@@ -2379,6 +2392,9 @@ do_ssh2_kex(void)
Jan F. Chadima 69dd72f
 	if (options.ciphers != NULL) {
Jan F. Chadima 69dd72f
 		myproposal[PROPOSAL_ENC_ALGS_CTOS] =
Jan F. Chadima 69dd72f
 		myproposal[PROPOSAL_ENC_ALGS_STOC] = options.ciphers;
Jan F. Chadima 69dd72f
+	} else if (FIPS_mode()) {
Jan F. Chadima 69dd72f
+		myproposal[PROPOSAL_ENC_ALGS_CTOS] =
Jan F. Chadima 69dd72f
+		myproposal[PROPOSAL_ENC_ALGS_STOC] = KEX_FIPS_ENCRYPT;
Jan F. Chadima 69dd72f
 	}
Jan F. Chadima 69dd72f
 	myproposal[PROPOSAL_ENC_ALGS_CTOS] =
Jan F. Chadima 69dd72f
 	    compat_cipher_proposal(myproposal[PROPOSAL_ENC_ALGS_CTOS]);
e962030
@@ -2388,6 +2404,9 @@ do_ssh2_kex(void)
Jan F. Chadima 69dd72f
 	if (options.macs != NULL) {
Jan F. Chadima 69dd72f
 		myproposal[PROPOSAL_MAC_ALGS_CTOS] =
Jan F. Chadima 69dd72f
 		myproposal[PROPOSAL_MAC_ALGS_STOC] = options.macs;
Jan F. Chadima 69dd72f
+	} else if (FIPS_mode()) {
Jan F. Chadima 69dd72f
+		myproposal[PROPOSAL_MAC_ALGS_CTOS] =
Jan F. Chadima 69dd72f
+		myproposal[PROPOSAL_MAC_ALGS_STOC] = KEX_FIPS_MAC;
Jan F. Chadima 69dd72f
 	}
Jan F. Chadima 69dd72f
 	if (options.compression == COMP_NONE) {
Jan F. Chadima 69dd72f
 		myproposal[PROPOSAL_COMP_ALGS_CTOS] =