Brian Smith wrote:

<snip>

> It didn't work. The engine works fine for SHA1 and MD5, but  if I request
> digest 672 (hard-coded value of NID_sha256, since NID_sha256 isn't in the
> openssl headers), it fails. If I use the PKCS#11 interface, CKM_SHA256 works
> just fine. Maybe this is because bug 6562155
> (http://bugs.opensolaris.org/bugdatabase/view_bug.do?bug_id=6562155). 

Indeed. You can look at OpenSSL PKCS#11 engine (or _generically_ 
speaking any other OpenSSL engine) as a way how to provide alternative 
implementation to EVP class (or RSA/DSA/DH, but nothing else) functions. 
This means that for the engine to support SHA-2 OpenSSL itself must 
implement SHA-2 via EVP API.

To conclude, for this to work in S10 update release (and we are kind of 
getting out of scope here since this is OpenSolaris list) OpenSSL in 
S10uX would have to support SHA-2 which it does not. Since OpenSSL 0.9.7 
is not compatible with 0.9.8 this is not likely to happen [*]. Using SCF 
(Solaris Crypto Framework, libpkcs11.so) directly via PKCS#11 API seems 
to be the only option here.


v.

[*] http://blogs.sun.com/janp/entry/on_openssl_versions_in_solaris

Reply via email to