<feed xmlns='http://www.w3.org/2005/Atom'>
<title>src/sys/crypto, branch release/13.2.0</title>
<subtitle>FreeBSD source tree</subtitle>
<id>https://cgit-dev.freebsd.org/src/atom?h=release%2F13.2.0</id>
<link rel='self' href='https://cgit-dev.freebsd.org/src/atom?h=release%2F13.2.0'/>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/'/>
<updated>2023-02-09T20:32:56Z</updated>
<entry>
<title>sha512_224: Fix SHA512_224_Final() on little-endian machines.</title>
<updated>2023-02-09T20:32:56Z</updated>
<author>
<name>Sebastian Huber</name>
<email>sebastian.huber@embedded-brains.de</email>
</author>
<published>2023-02-06T16:57:28Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=b9e0160e07882ff62df7c31695e18c3197cea8b9'/>
<id>urn:sha1:b9e0160e07882ff62df7c31695e18c3197cea8b9</id>
<content type='text'>
PR:		266863
MFC after:	1 week
Reviewed by:	allanjude, cperciva, des
Differential Revision:	https://reviews.freebsd.org/D38372

(cherry picked from commit 6680cfe8e0eec4427716ab50d73ab8231dd9ab28)
</content>
</entry>
<entry>
<title>OpenSSL: Regen assembly files for OpenSSL 1.1.1t</title>
<updated>2023-02-07T22:39:41Z</updated>
<author>
<name>Jung-uk Kim</name>
<email>jkim@FreeBSD.org</email>
</author>
<published>2023-02-07T18:55:17Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=7c83b34ab36ee2941360a170d4b806df19648947'/>
<id>urn:sha1:7c83b34ab36ee2941360a170d4b806df19648947</id>
<content type='text'>
(cherry picked from commit f1cf49002dbb0b1976ef1ebd8e689a7825e3e06f)
</content>
</entry>
<entry>
<title>OpenSSL: Regen assembly file for OpenSSSL 1.1.1s</title>
<updated>2022-11-18T02:45:26Z</updated>
<author>
<name>Jung-uk Kim</name>
<email>jkim@FreeBSD.org</email>
</author>
<published>2022-11-01T23:12:09Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=724842d6aacdfe5cd5f88923a485b773249c218b'/>
<id>urn:sha1:724842d6aacdfe5cd5f88923a485b773249c218b</id>
<content type='text'>
(cherry picked from commit f443d0802a21279387596ec2c9644d3e91ca0431)
</content>
</entry>
<entry>
<title>&lt;crypto/chacha20_poly1305&gt;: Fix operations with 8 byte nonce.</title>
<updated>2022-11-15T01:39:54Z</updated>
<author>
<name>John Baldwin</name>
<email>jhb@FreeBSD.org</email>
</author>
<published>2022-11-15T01:24:56Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=8fbc0cc23a607bb1a5ef13e18d9e19b5ee54a90d'/>
<id>urn:sha1:8fbc0cc23a607bb1a5ef13e18d9e19b5ee54a90d</id>
<content type='text'>
In head, the inline ChaCha20+Poly1305 API is implemented using the
software implementation backing OCF, but that requires API changes
that can't be MFC'd.  As a result, this API in stable/13 uses
libsodium directly.

However, libsodium's version of ChaCha20+Poly1305 with an 8 byte nonce
uses a different construction for the Poly1305 hash than is used for
the standard IETF AEAD cipher used for TLS and IPsec.  WireGuard's use
of an 8 byte nonce also uses the more standard construction.

Since the verison in stable/13 was using libsodium directly for the 8
byte nonce case, it was generating incorrect MACs for if_wg(4).  As a
workaround, change the direct API to always use the IETF API from
libsodium which uses 12 byte nonces.  This can be done by
zero-extending the provided 8 byte nonce to 12 bytes so long as the
passed in buffers are sufficiently small to not overflow a 4 byte
counter.

This fixes key negotiation for if_wg(4) on stable/13.  This is also
a direct commit to stable/13.

Reported by:	Marek Zarychta &lt;mzar@bpine64.dom.potoki.eu&gt;
</content>
</entry>
<entry>
<title>Fix the IV length in the armv8 AES GCM code</title>
<updated>2022-09-21T09:45:52Z</updated>
<author>
<name>Andrew Turner</name>
<email>andrew@FreeBSD.org</email>
</author>
<published>2022-08-31T14:55:19Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=fbb46ffd8b3389bbbbc444313fc84d40934ebbd3'/>
<id>urn:sha1:fbb46ffd8b3389bbbbc444313fc84d40934ebbd3</id>
<content type='text'>
Reviewed by:	cem, delphij
Sponsored by:	The FreeBSD Foundation
Differential Revision: https://reviews.freebsd.org/D36403

(cherry picked from commit 7c4cfece6b7cc9733610b99682be5e9f11f31fc3)
</content>
</entry>
<entry>
<title>crypto: Add an API supporting curve25519.</title>
<updated>2022-07-13T19:28:41Z</updated>
<author>
<name>John Baldwin</name>
<email>jhb@FreeBSD.org</email>
</author>
<published>2022-01-24T23:27:39Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=b29bd06e67d249708f5429b07f722089e1fce63f'/>
<id>urn:sha1:b29bd06e67d249708f5429b07f722089e1fce63f</id>
<content type='text'>
This adds a wrapper around libsodium's curve25519 support matching
Linux's curve25519 API.  The intended use case for this is WireGuard.

Note that this is not integrated with OCF as it is not related to
symmetric operations on data.

Reviewed by:	markj
Sponsored by:	The FreeBSD Foundation
Differential Revision:	https://reviews.freebsd.org/D33935

(cherry picked from commit 0c6274a819ffdf6d5a3713b2c0f7014840f01703)
</content>
</entry>
<entry>
<title>crypto: Add a simple API for [X]ChaCha20-Poly1035 on flat buffers.</title>
<updated>2022-07-13T19:25:55Z</updated>
<author>
<name>John Baldwin</name>
<email>jhb@FreeBSD.org</email>
</author>
<published>2022-01-18T22:47:13Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=a4eea5804d5ced2af3c94723603ff6445082653f'/>
<id>urn:sha1:a4eea5804d5ced2af3c94723603ff6445082653f</id>
<content type='text'>
This is a synchronous software API which wraps the existing software
implementation in libsodium.  This is different from the code in main
in that this uses libsodium directly.  The version in main uses the
software backend shared with OCF, but main required changes that break
the ABI of struct enc_xform that cannot be merged to stable/13.

Sponsored by:	The FreeBSD Foundation

(cherry picked from commit e71680049bb8ff395aeaa144377dd9e49331f45e)
</content>
</entry>
<entry>
<title>OpenSSL: Regen assembly file for OpenSSSL 1.1.1q</title>
<updated>2022-07-05T16:27:52Z</updated>
<author>
<name>Jung-uk Kim</name>
<email>jkim@FreeBSD.org</email>
</author>
<published>2022-07-05T16:06:50Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=376acb0648390ab3fe5eac3ca8fd774b6832ea68'/>
<id>urn:sha1:376acb0648390ab3fe5eac3ca8fd774b6832ea68</id>
<content type='text'>
(cherry picked from commit 9576bca5834b3ccfbf7ff7d3b49db9c05c51d44c)
</content>
</entry>
<entry>
<title>OpenSSL: Regen assembly file for OpenSSSL 1.1.1p</title>
<updated>2022-06-21T22:49:17Z</updated>
<author>
<name>Jung-uk Kim</name>
<email>jkim@FreeBSD.org</email>
</author>
<published>2022-06-21T18:20:33Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=7a6a2a9465311ff9defc9623a0ca0b83e90915fb'/>
<id>urn:sha1:7a6a2a9465311ff9defc9623a0ca0b83e90915fb</id>
<content type='text'>
(cherry picked from commit ec4d9b059ededda578be479c1d043c921907ed11)
</content>
</entry>
<entry>
<title>crypto: Validate AES-GCM IV length in check_csp().</title>
<updated>2022-04-29T20:50:04Z</updated>
<author>
<name>John Baldwin</name>
<email>jhb@FreeBSD.org</email>
</author>
<published>2021-12-09T19:52:41Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=a41ff1661bc019abbfbc3d6df2ad7e58126cc4ef'/>
<id>urn:sha1:a41ff1661bc019abbfbc3d6df2ad7e58126cc4ef</id>
<content type='text'>
This centralizes the check for valid nonce lengths for AES-GCM.

While here, remove some duplicate checks for valid AES-GCM tag lengths
from ccp(4) and ccr(4).

Reviewed by:	markj
Sponsored by:	The FreeBSD Foundation
Differential Revision:	https://reviews.freebsd.org/D33194

(cherry picked from commit 6e17a2e00d62fd3041e0bb511fe925079ad1c0d7)
</content>
</entry>
</feed>
