On 30/03/2010 12:46, Khyron wrote:
> I remember reading somewhere that the *only* way to get an OpenSSL with
> support for the Niagara on-chip crypto processors was to use the /usr/sfw
> installed version (SUNWopenssl-* are the pkg names on my S10 Update 7 box).
>
> My question is why can I not compile OpenSSL from source to use those
> accelerators?  Have the changes that Sun has made not been fed back
> upstream
> to the OpenSSL project?

The only way to access the UltraSPARC T1/T2 hardware crypto from 
userland is via the private /dev/crypto interface.  The only documented 
API to /dev/crypto is PKCS#11.

 >  If so, have they been included?  If they
> haven't been
> fed upstream, why not and is there any plan to do so?

We have offered in the past but the upstream community didn't seem 
interested in having a PKCS#11 engine at the time.

> I have no philosophical reason for this.  It would be nice if it were
> possible to
> build my own custom OpenSSL that could exploit those processors but also
> with immediate support for the latest security fixes. (For example, OpenSSL
> 0.9.8n includes fixes for CVE-2010-0740 and CVE-2010-0433.)  From what I
> see, compiling OpenSSL with the pkcs11 engine would need to be done, so
> how difficult is this?  Why can a regular end user not include this
> engine when compiling OpenSSL from source?

It is possible to do this you can get the source of the engine from
here http://blogs.sun.com/janp/

> Finally, my last question is...what other options exist for OpenSSL to
> use the
> Niagara crypto processors?  I want to exploit hardware already present
> on the
> CPUs as opposed to purchasing a new hardware accelerator.

Use PKCS#11 directly in userland or use the crypto_*() API (usually 
called KCF) in kernel.

-- 
Darren J Moffat

Reply via email to