summaryrefslogtreecommitdiff
path: root/usr/src/common/crypto
AgeCommit message (Expand)AuthorFilesLines
2022-11-18 [illumos-gate merge]Dan McDonald1-22/+19
2022-11-1815179 libmd: unused function 'ROTATE_LEFT'Toomas Soome1-22/+19
2022-10-18 [illumos-gate merge]Dan McDonald1-2/+2
2022-10-1815053 libc: unused parameterToomas Soome1-3/+3
2022-10-10 [illumos-gate merge]Dan McDonald3-174/+2
2022-10-1015040 remove support for unused sun studio inline asmRichard Lowe3-174/+2
2022-01-26 [illumos-gate merge]Dan McDonald1-4/+10
2022-01-2514388 des: with mismatched boundToomas Soome1-4/+10
2022-01-20 [illumos-gate merge]Dan McDonald1-2/+2
2022-01-1914352 sha1: mismatched boundToomas Soome1-2/+2
2020-01-22 [illumos-gate merge]Jerry Jelinek2-45/+66
2020-01-2111966 CTR mode tries to be both a stream and block cipher and fails at bothJason King3-133/+180
2019-11-1211825 PKCS#11 CKM_AES_CBC_PAD decryption can failJason King1-1/+4
2019-10-10OS-7964 CTR mode tries to be both a stream and block cipher and fails at bothJason King3-134/+160
2019-07-18OS-7839 pkcs11_softtoken C_DecryptFinal can fail with CKM_AES_CBC_PADJason King1-1/+4
2019-06-29OS-7828 add support for kernel crash dump encryptionBryan Cantrill2-9/+21
2019-06-258727 Native data and metadata encryption for zfsTom Caputi2-2/+2
2019-06-0210210 libmd should leverage SHA extensionsRobert Mustacchi6-0/+762
2018-12-201228 Add CCM and GCM mode support to AES in pkcs11_softtokenJason King4-10/+28
2018-12-0710026 common/sha1: update for loader buildToomas Soome1-0/+15
2018-06-198904 common/crypto: make skein and edonr loader friendlyToomas Soome2-1/+18
2018-02-229155 pkcs11: this statement may fall throughToomas Soome7-14/+126
2017-11-305869 Need AES CMAC support in KCF+PKCS11Matt Barden6-40/+412
2016-12-226239 Add PKCS#11 v2.40 supportJason King1-5/+3
2016-03-146436 156 lint errors in common/crypto/edonr/edonr.cGary Mills2-4/+9
2015-09-164185 add new cryptographic checksums to ZFS: SHA-512, Skein, Edon-RMatthew Ahrens10-2/+3275
2015-04-125830 want arc4random(3C) suiteRobert Mustacchi2-0/+271
2013-07-293882 Remove xmod & friendsJosef 'Jeff' Sipek18-406/+4
2012-12-183364 dboot should check boot archive integrityKeith Wesolowski1-2/+7
2012-04-162115 md5 assembly doesn't compile with gas 2.22Theo Schlossnagle2-6/+14
2010-10-09289 invalid padding when using java pkcs11 providerJason King2-13/+26
2010-09-126 Need open kcfdGarrett D'Amore20-7227/+5
2010-08-046972233 Panic is seen when fips-140 mode is enabled and rebootedMisaki Miyashita1-21/+20
2010-07-286959099 T2 Crypto Drivers (ncp, n2cp, n2rng) need to implement self tests for...Misaki Miyashita7-461/+2517
2010-07-146812663 Running out of bits in x86_featureKuriakose Kuruvilla2-24/+9
2010-06-106959852 putback of 6875651 introduced unref MakefilesDina K Nimeh3-105/+0
2010-06-076875651 move asymmetric crypto to libsoftcryptoDina K Nimeh16-527/+2520
2010-05-256934074 What is an ODE? Shall I compare thee, to a Makefile typo?Darren J Moffat1-3/+2
2010-03-126930971 gcm_decrypt_final() will loop forever if data size less than a single...Mark Fenwick1-14/+13
2010-01-016719591 non-exploitable integer wraparound issue in copyin_key() [external re...Dan OpenSolaris Anderson4-18/+23
2009-12-106907733 Optimized amd64 GCM code added by CR 6826942 does not save/restore %x...Dan OpenSolaris Anderson1-2/+2
2009-11-206899006 Remove .byte asm directives and use new Intel Westmere opcodesDan OpenSolaris Anderson10-441/+250
2009-11-056897371 cryptoadm needs changes in order to support fips-140 mode in local zonesHai-May Chao5-9/+101
2009-09-236826942 Need an optimized GCM leveraging Intel's PCMULQDQ instructionDan OpenSolaris Anderson3-26/+462
2009-09-11PSARC 2009/347 cryptoadm(1M) enhancement for FIPS-140 modeHai-May Chao17-8/+5351
2009-09-026786946 kcf should check the key sizes before passing a job to a providerVladimir Kotal2-10/+19
2009-05-046820466 CKA_PUBLIC_EXPONENT is inconsistently optional for C_GenerateKeyPair ...Dina K Nimeh2-6/+6
2009-05-046834124 Export build broke in putback of 6767618 to NV114Dan OpenSolaris Anderson1-2/+2
2009-04-176767618 Need an optimized AES leveraging Intel's AES instructionsDan OpenSolaris Anderson14-256/+1532
2009-04-106803836 Solaris Cryptographic Framework needs to support AES GMACMark Powers4-5/+66