Nahtebe Nahtebe | 5 Oct 12:52 2007
Picon

google

http://google.com

       
____________________________________________________________________________________
Looking for a deal? Find great prices on flights and hotels with Yahoo! FareChase.
http://farechase.yahoo.com/

-
Linux-crypto:  cryptography in and on the Linux system
Archive:       http://mail.nl.linux.org/linux-crypto/

Nahtebe Nahtebe | 5 Oct 14:22 2007
Picon

google

http://google.com

      ____________________________________________________________________________________
Check out the hottest 2008 models today at Yahoo! Autos.
http://autos.yahoo.com/new_cars.html

-
Linux-crypto:  cryptography in and on the Linux system
Archive:       http://mail.nl.linux.org/linux-crypto/

Nahtebe Nahtebe | 5 Oct 14:35 2007
Picon

google

<table border=5 width=500>
<tr>
<td align=center>
google
</td>
</tr>
</table>
<a href=http://google.com>GOOGLE</a>
<h2>google</h2>

      ____________________________________________________________________________________
Fussy? Opinionated? Impossible to please? Perfect.  Join Yahoo!'s user panel and lay it on us.
http://surveylink.yahoo.com/gmrs/yahoo_panel_invite.asp?a=7 

-
Linux-crypto:  cryptography in and on the Linux system
Archive:       http://mail.nl.linux.org/linux-crypto/

Mikko Herranen | 6 Oct 15:20 2007
Picon
Picon

CTR and GCM

Hello,

I read about the pending addition of CTR on cryptodev log. I assume
CTR is generic support for counter mode algorithms. Is this correct?
When will CTR be available? Who is working on it?

The reason I'm asking is that I'm currently working on implementing
galois counter mode (GCM) in the cryptoapi and CTR would naturally have
a big impact on my work.

Thank you.

--

-- 
Mikko Herranen

-
Linux-crypto:  cryptography in and on the Linux system
Archive:       http://mail.nl.linux.org/linux-crypto/

Karel Zak | 10 Oct 01:14 2007
Picon

Re: loop-aes into busybox

On Sat, Sep 29, 2007 at 11:32:53PM +0200, markus reichelt wrote:
> gcc34 -fsigned-char -g -O2  -s -static -o cal_test  cal_test-cal.o
> -lncurses
> /usr/lib/libc.a(init-misc.o):(.data+0x4): multiple definition of
> `__progname'
> cal_test-cal.o:(.data+0x238): first defined here
> collect2: ld returned 1 exit status
> make[2]: *** [cal_test] Error 1

 Yes, I know about this problem. It will be fixed in the next release.

    Karel

--

-- 
 Karel Zak  <kzak <at> redhat.com>

-
Linux-crypto:  cryptography in and on the Linux system
Archive:       http://mail.nl.linux.org/linux-crypto/

Karel Zak | 10 Oct 01:17 2007
Picon

Re: loop-aes into busybox

On Sat, Sep 29, 2007 at 07:23:56PM +0300, Jari Ruusu wrote:
> Alon Bar-Lev wrote:
> > The util-linux-ng cannot be built statically...
> 
> $ cp -dpR util-linux-ng-2.13-AES z
> $ cd z
> $ CC=gcc-3.3 CFLAGS="-O2 -Wall" LDFLAGS="-s -static" ./configure
> [snip]
> $ make SUBDIRS="mount"
> [snip]
> $ file mount/losetup mount/mount
> mount/losetup: ELF 32-bit LSB executable, Intel 80386, version 1 (SYSV), for GNU/Linux 2.2.0,
statically linked, stripped
> mount/mount:   ELF 32-bit LSB executable, Intel 80386, version 1 (SYSV), for GNU/Linux 2.2.0, statically
linked, stripped
> 
> > So I guessed that loop-aes losetup enabled into busybox will be the
> > cleanest solution...
> 
> Last time I compiled busybox, I linked busybox and other programs with
> uClibc. All program binaries were linked dynamically. I haven't tried that
> with util-linux-ng.

  http://thread.gmane.org/gmane.linux.utilities.util-linux-ng/706/focus=776

    Karel

--

-- 
 Karel Zak  <kzak <at> redhat.com>

(Continue reading)

Peter_22 | 15 Oct 15:43 2007
Picon
Picon

Encrypted swap on openSuSE 10.3 64-bit

Hello!

Last week I installed openSuSE 10.3 (64-bit) on a spare hard drive for testing. Now the setup of an encrypted
swap partition is supported as part of the installation process. However, encrypting the entire drive
still remains fancywork. The installer asks for a password, no keys are generated for external storage.
When booting, the password has to be entered in order to access the swap partition. Below is the result of
"less -f /dev/sda1" which serves as encrypted swap.

LUKS272276^ <at> ^Aaes^ <at> ^ <at> ^ <at> ^ <at> ^ <at> ^ <at> ^ <at> ^ <at> ^ <at> ^ <at> ^ <at> ^ <at> ^ <at> ^ <at> ^ <at> ^ <at> ^ <at> ^ <at> ^ <at> ^ <at> ^ <at> ^ <at> ^ <at> ^ <at> ^ <at> ^ <at> ^ <at> ^ <at> ^ <at> cbc-essiv:sha256^ <at> ^ <at> ^ <at> ^ <at> 
^ <at> ^ <at> ^ <at> ^ <at> ^ <at> ^ <at> ^ <at> ^ <at> ^ <at> ^ <at> ^ <at> ^ <at> sha1^ <at> ^ <at> ^ <at> ^ <at> ^ <at> ^ <at> ^ <at> ^ <at> ^ <at> ^ <at> ^ <at> ^ <at> ^ <at> ^ <at> ^ <at> ^ <at> ^ <at> ^ <at> ^ <at> ^ <at> ^ <at> ^ <at> ^ <at> ^ <at> ^ <at> ^ <at> ^ <at> ^ <at> ^ <at> ^ <at> ^D^H^ <at> ^ <at> ^ <at> 
^P^Y^H^]a2323239265217*^V363311356305^W362230375300222^Z220.^BiY367207334371255<U+0527>$`^V314327*6
+306w3615301K200^Y^ <at> ^ <at> ^ <at> 
bb4ef524-30f7-4358-b235-6487e7b82514^ <at> ^ <at> ^ <at> ^ <at> ^ <at> 254q363^ <at> ^E362256|343^G314U367236356
[...]

My eyes have seen enough at this point. openSuSE provides your attackers with crucial information. At
first glance the encryption via LUKS using AES in cbc-essiv mode with some sha256 hash is revealed. From
now on you might be target for further interrogation and torture.
This posting is meant as a notice only.

Kind regards,
Peter
--

-- 
GMX FreeMail: 1 GB Postfach, 5 E-Mail-Adressen, 10 Free SMS.
Alle Infos und kostenlose Anmeldung: http://www.gmx.net/de/go/freemail

-
Linux-crypto:  cryptography in and on the Linux system
Archive:       http://mail.nl.linux.org/linux-crypto/

(Continue reading)

Mikko Herranen | 18 Oct 22:22 2007
Picon
Picon

GCM & CTR

Hello,

We've been wondering about a slight compatibility glitch between
CTR and GCM with Joy Latten. As CTR and GCM are very similar, the
way to go with GCM is obviously to implement it on top of CTR.
The problem is that CTR and GCM use different counter portion
values for the first encrypted plaintext block. (They both start
at 1 but GCM uses the first value for authentication.)

How to communicate the different value to CTR? The best way seems to be
to spawn CTR as ctr(alg,0,16) in GCM and pass the contents
of the entire counter block in the IV. But then the size of the
counter portion will be set to 0 in CTR. We could modify CTR to
set the size of the counter portion to blocksize whenever
ivsize == blocksize. Or we could introduce an additional template
parameter for specifying the counter portion size. The former is
the easiest way to go if embedding a bit of GCM-specific code
inside CTR module is not a problem. Any opinions on this?

--

-- 
Mikko Herranen

-
Linux-crypto:  cryptography in and on the Linux system
Archive:       http://mail.nl.linux.org/linux-crypto/

markus reichelt | 24 Oct 19:01 2007
Picon

build failure for 2.6.24-rc1

hi,

build failure for 2.6.24-rc1

gcc -v
Reading specs from /usr/lib/gcc/i486-slackware-linux/4.1.2/specs
Target: i486-slackware-linux
Configured with: ../gcc-4.1.2/configure --prefix=/usr --enable-shared
--enable-languages=ada,c,c++,fortran,java,objc --enable-threads=posix
--enable-__cxa_atexit --disable-checking --with-gnu-ld --verbose
--with-arch=i486 --target=i486-slackware-linux
--host=i486-slackware-linux
Thread model: posix
gcc version 4.1.2

make[1]: Entering directory `/tmp/linux-2.6.24-rc1'
  CC [M]  /root/src/loop-AES-v3.2a/tmp-d-kbuild/patched-loop.o
/root/src/loop-AES-v3.2a/tmp-d-kbuild/patched-loop.c: In function
'loop_end_io_transfer':
/root/src/loop-AES-v3.2a/tmp-d-kbuild/patched-loop.c:471: error: too
many arguments to function 'bio_endio'
/root/src/loop-AES-v3.2a/tmp-d-kbuild/patched-loop.c: In function
'loop_get_buffer':
/root/src/loop-AES-v3.2a/tmp-d-kbuild/patched-loop.c:593: warning:
assignment from incompatible pointer type
/root/src/loop-AES-v3.2a/tmp-d-kbuild/patched-loop.c: At top level:
/root/src/loop-AES-v3.2a/tmp-d-kbuild/patched-loop.c:763: warning:
/'request_queue_t' is deprecated
/root/src/loop-AES-v3.2a/tmp-d-kbuild/patched-loop.c: In function
/'loop_issue_flush':
(Continue reading)

Jari Ruusu | 24 Oct 20:04 2007
Picon
Picon

Re: build failure for 2.6.24-rc1

markus reichelt wrote:
> build failure for 2.6.24-rc1

I will upload new version of loop-AES after I get it tested. Maybe tomorrow.

--

-- 
Jari Ruusu  1024R/3A220F51 5B 4B F9 BB D3 3F 52 E9  DB 1D EB E3 24 0E A9 DD

-
Linux-crypto:  cryptography in and on the Linux system
Archive:       http://mail.nl.linux.org/linux-crypto/


Gmane