<feed xmlns='http://www.w3.org/2005/Atom'>
<title>src/lib/libcrypt/Makefile, branch releng/12.0</title>
<subtitle>FreeBSD source tree</subtitle>
<id>https://cgit-dev.freebsd.org/src/atom?h=releng%2F12.0</id>
<link rel='self' href='https://cgit-dev.freebsd.org/src/atom?h=releng%2F12.0'/>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/'/>
<updated>2018-07-09T08:19:04Z</updated>
<entry>
<title>Integrate SHA2-224 with userspace components</title>
<updated>2018-07-09T08:19:04Z</updated>
<author>
<name>Conrad Meyer</name>
<email>cem@FreeBSD.org</email>
</author>
<published>2018-07-09T08:19:04Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=8ff3cdd1b52f1a7baa92226eb73ab448afc974e8'/>
<id>urn:sha1:8ff3cdd1b52f1a7baa92226eb73ab448afc974e8</id>
<content type='text'>
The double compilation of the kernel sources in libmd and libcrypt is
baffling, but add yet another define hack to prevent duplicate symbols.

Add documentation and SHA2-224 test cases to libmd.

Integrate with the md5(1) command, document, and add more test cases;
self-tests pass.
</content>
</entry>
<entry>
<title>MFhead@r321916</title>
<updated>2017-08-02T09:00:59Z</updated>
<author>
<name>Enji Cooper</name>
<email>ngie@FreeBSD.org</email>
</author>
<published>2017-08-02T09:00:59Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=3a8b7649ceec008f94bb98d3a0a0d363e91bba68'/>
<id>urn:sha1:3a8b7649ceec008f94bb98d3a0a0d363e91bba68</id>
<content type='text'>
</content>
</entry>
<entry>
<title>Remove bogus bsd.subdir.mk .include</title>
<updated>2017-08-02T08:54:18Z</updated>
<author>
<name>Enji Cooper</name>
<email>ngie@FreeBSD.org</email>
</author>
<published>2017-08-02T08:54:18Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=c119e4a444f9704ae519195758de1a4311fed337'/>
<id>urn:sha1:c119e4a444f9704ae519195758de1a4311fed337</id>
<content type='text'>
bsd.subdir.mk is included from bsd.obj.mk, which is included via bsd.lib.mk.

MFC after:	3 days
</content>
</entry>
<entry>
<title>Add HAS_TESTS to all Makefiles that are currently using the</title>
<updated>2017-08-02T08:50:42Z</updated>
<author>
<name>Enji Cooper</name>
<email>ngie@FreeBSD.org</email>
</author>
<published>2017-08-02T08:50:42Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=d511b20a693d77c1dc2491a62124471361eddd8e'/>
<id>urn:sha1:d511b20a693d77c1dc2491a62124471361eddd8e</id>
<content type='text'>
`SUBDIR.${MK_TESTS}+= tests` idiom.

This is a follow up to r321912.
</content>
</entry>
<entry>
<title>Convert traditional ${MK_TESTS} conditional idiom for including test</title>
<updated>2017-08-02T08:35:51Z</updated>
<author>
<name>Enji Cooper</name>
<email>ngie@FreeBSD.org</email>
</author>
<published>2017-08-02T08:35:51Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=4b330699f819a81d8e34d471225143ffeb321855'/>
<id>urn:sha1:4b330699f819a81d8e34d471225143ffeb321855</id>
<content type='text'>
directories to SUBDIR.${MK_TESTS} idiom

This is being done to pave the way for future work (and homogenity) in
^/projects/make-check-sandbox .

No functional change intended.

MFC after:	1 weeks
</content>
</entry>
<entry>
<title>Use SRCTOP-relative paths to other directories instead of .CURDIR-relative ones</title>
<updated>2017-01-20T04:52:29Z</updated>
<author>
<name>Enji Cooper</name>
<email>ngie@FreeBSD.org</email>
</author>
<published>2017-01-20T04:52:29Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=562cbd7bcd990c7d4f9de5a6ecc2fab56e83f642'/>
<id>urn:sha1:562cbd7bcd990c7d4f9de5a6ecc2fab56e83f642</id>
<content type='text'>
This simplifies pathing in make/displayed output

MFC after:    3 weeks
Sponsored by: Dell EMC Isilon
</content>
</entry>
<entry>
<title>Make libcrypt thread-safe. Add crypt_r(3).</title>
<updated>2016-08-10T15:16:28Z</updated>
<author>
<name>Ed Schouten</name>
<email>ed@FreeBSD.org</email>
</author>
<published>2016-08-10T15:16:28Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=5f521d7ba72145092ea23ff6081d8791ad6c1f9d'/>
<id>urn:sha1:5f521d7ba72145092ea23ff6081d8791ad6c1f9d</id>
<content type='text'>
glibc has a pretty nice function called crypt_r(3), which is nothing
more than crypt(3), but thread-safe. It accomplishes this by introducing
a 'struct crypt_data' structure that contains a buffer that is large
enough to hold the resulting string.

Let's go ahead and also add this function. It would be a shame if a
useful function like this wouldn't be usable in multithreaded apps.
Refactor crypt.c and all of the backends to no longer declare static
arrays, but write their output in a provided buffer.

There is no need to do any buffer length computation here, as we'll just
need to ensure that 'struct crypt_data' is large enough, which it is.
_PASSWORD_LEN is defined to 128 bytes, but in this case I'm picking 256,
as this is going to be part of the actual ABI.

Differential Revision:	https://reviews.freebsd.org/D7306
</content>
</entry>
<entry>
<title>Skein was not meant to be connected to libcrypto</title>
<updated>2016-06-01T20:55:25Z</updated>
<author>
<name>Allan Jude</name>
<email>allanjude@FreeBSD.org</email>
</author>
<published>2016-06-01T20:55:25Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=cd9f4c599d8548997d609939fac2346c2393e3d5'/>
<id>urn:sha1:cd9f4c599d8548997d609939fac2346c2393e3d5</id>
<content type='text'>
It is not a password hashing algorithm

Reported by:	cem
</content>
</entry>
<entry>
<title>Import the skein hashing algorithm, based on the threefish block cipher</title>
<updated>2016-05-29T01:15:36Z</updated>
<author>
<name>Allan Jude</name>
<email>allanjude@FreeBSD.org</email>
</author>
<published>2016-05-29T01:15:36Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=b468a9ff1d3a70c6d14cf2b49574cbbcc60ff997'/>
<id>urn:sha1:b468a9ff1d3a70c6d14cf2b49574cbbcc60ff997</id>
<content type='text'>
Connect it to userland (libmd, libcrypt, sbin/md5) and kernel (crypto.ko)

Support for skein as a ZFS checksum algorithm was introduced in r289422
but is disconnected because FreeBSD lacked a Skein implementation.

A further commit will enable it in ZFS.

Reviewed by:	cem
Sponsored by:	ScaleEngine Inc.
Differential Revision:	https://reviews.freebsd.org/D6166
</content>
</entry>
<entry>
<title>Implement SHA-512 truncated (224 and 256 bits)</title>
<updated>2016-05-28T16:06:07Z</updated>
<author>
<name>Allan Jude</name>
<email>allanjude@FreeBSD.org</email>
</author>
<published>2016-05-28T16:06:07Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=1780e407158ada85e454b24960b83a4f8e35cc25'/>
<id>urn:sha1:1780e407158ada85e454b24960b83a4f8e35cc25</id>
<content type='text'>
This implements SHA-512/256, which generates a 256 bit hash by
calculating the SHA-512 then truncating the result. A different initial
value is used, making the result different from the first 256 bits of
the SHA-512 of the same input. SHA-512 is ~50% faster than SHA-256 on
64bit platforms, so the result is a faster 256 bit hash.

The main goal of this implementation is to enable support for this
faster hashing algorithm in ZFS. The feature was introduced into ZFS
in r289422, but is disconnected because SHA-512/256 support was missing.
A further commit will enable it in ZFS.

This is the follow on to r292782

Reviewed by:	cem
Sponsored by:	ScaleEngine Inc.
Differential Revision:	https://reviews.freebsd.org/D6061
</content>
</entry>
</feed>
