Crypto engine EVP_CIPHER structure - cleanup

2012-10-03 Thread Gnanasekar R
Hi,

I have a crypto engine to perform AES encryption/decryption. I have
initialized the EVP_CIPHER structure with the needed function pointers. I
get called in "init" where I do some bookkeeping(could be assigning a
context id). When this context is over I would like to remove any
bookkeeping I would have done. I thought the 'cleanup' function would get
called and I can do the necessary cleanups there. But this is not getting
called though the context is over. Is there something that I am missing. I
am using version 0.9.8


Re: NIST Selects Winner of Secure Hash Algorithm (SHA-3) Competition

2012-10-03 Thread Jakob Bohm

On 10/3/2012 7:02 PM, Jeffrey Walton wrote:

http://www.nist.gov/itl/csd/sha-100212.cfm

he National Institute of Standards and Technology (NIST) today
announced the winner of its five-year competition to select a new
cryptographic hash algorithm, one of the fundamental tools of modern
information security.

The winning algorithm, Keccak (pronounced “catch-ack”), was created by
Guido Bertoni, Joan Daemen and Gilles Van Assche of STMicroelectronics
and Michaël Peeters of NXP Semiconductors. The team’s entry beat out
63 other submissions that NIST received after its open call for
candidate algorithms in 2007, when it was thought that SHA-2, the
standard secure hash algorithm, might be threatened. Keccak will now
become NIST’s SHA-3 hash algorithm.
...

Gary Clark already posted this more than 13 hours ago...

Enjoy

Jakob
--
Jakob Bohm, CIO, Partner, WiseMo A/S. http://www.wisemo.com
Transformervej 29, 2730 Herlev, Denmark. Direct +45 31 13 16 10
This public discussion message is non-binding and may contain errors.
WiseMo - Remote Service Management for PCs, Phones and Embedded
__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   majord...@openssl.org


NIST Selects Winner of Secure Hash Algorithm (SHA-3) Competition

2012-10-03 Thread Jeffrey Walton
http://www.nist.gov/itl/csd/sha-100212.cfm

he National Institute of Standards and Technology (NIST) today
announced the winner of its five-year competition to select a new
cryptographic hash algorithm, one of the fundamental tools of modern
information security.

The winning algorithm, Keccak (pronounced “catch-ack”), was created by
Guido Bertoni, Joan Daemen and Gilles Van Assche of STMicroelectronics
and Michaël Peeters of NXP Semiconductors. The team’s entry beat out
63 other submissions that NIST received after its open call for
candidate algorithms in 2007, when it was thought that SHA-2, the
standard secure hash algorithm, might be threatened. Keccak will now
become NIST’s SHA-3 hash algorithm.
...
__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   majord...@openssl.org


[FWD] problem about HW_Rand_Engine

2012-10-03 Thread Lutz Jaenicke
Forwarded to openssl-user for discussion.

Best regards,
Lutz
--
Lutz Jaenicke   jaeni...@openssl.org
OpenSSL Project http://www.openssl.org/~jaenicke/
--- Begin Message ---
Hello,

I have a problem about using HW_Rand Engine. Would you please give me some
suggestion?

[description]
I got entlen = 0 when called fips_get_entropy,
and got failed in function ssleay_rand_bytes because the variable entropy
is 0 after RAND_poll()

in the file openssl-1.0/crypto/engine/eng_rdrand.c, it didn't implement
function "add" in RAND_METHOD
Did it make me failed?
Please give me some suggestion. I would report other imformation for you if
you need.

[information]
1. compiled openssl-1.0 with openssl-fips-2.0
2. static const char *engine_e_rdrand_name = "Intel RDRAND engine"

[call trace]
OPENSSL_init
  RAND_init_fips
FIPS_drbg_instantiate
  fips_get_entropy
drbg_get_entropy
  ssleay_rand_nopseudo_bytes
ssleay_rand_bytes
  RAND_poll
RAND_add

Thanks a lot.
--- End Message ---