<feed xmlns='http://www.w3.org/2005/Atom'>
<title>src/sys/opencrypto, branch releng/12.2</title>
<subtitle>FreeBSD source tree</subtitle>
<id>https://cgit-dev.freebsd.org/src/atom?h=releng%2F12.2</id>
<link rel='self' href='https://cgit-dev.freebsd.org/src/atom?h=releng%2F12.2'/>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/'/>
<updated>2020-08-26T21:35:28Z</updated>
<entry>
<title>MFC 361393: Correct the minimum key length for Camellia to 16 bytes (128 bits).</title>
<updated>2020-08-26T21:35:28Z</updated>
<author>
<name>John Baldwin</name>
<email>jhb@FreeBSD.org</email>
</author>
<published>2020-08-26T21:35:28Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=57c3b9669790fe42621335bda14b008866644262'/>
<id>urn:sha1:57c3b9669790fe42621335bda14b008866644262</id>
<content type='text'>
</content>
</entry>
<entry>
<title>MFC r363374:</title>
<updated>2020-07-27T14:16:27Z</updated>
<author>
<name>Mark Johnston</name>
<email>markj@FreeBSD.org</email>
</author>
<published>2020-07-27T14:16:27Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=90f72e67af415dacc0e58042277ebbe4cde03c16'/>
<id>urn:sha1:90f72e67af415dacc0e58042277ebbe4cde03c16</id>
<content type='text'>
crypto(9): Stop checking for failures from malloc(M_WAITOK).

PR:	240545
</content>
</entry>
<entry>
<title>MFC 356508: Use falloc_noinstall + finstall for crypto file descriptors.</title>
<updated>2020-05-05T04:37:05Z</updated>
<author>
<name>John Baldwin</name>
<email>jhb@FreeBSD.org</email>
</author>
<published>2020-05-05T04:37:05Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=e3a82e730771f308b7da4c46fcc7e422f9f692d2'/>
<id>urn:sha1:e3a82e730771f308b7da4c46fcc7e422f9f692d2</id>
<content type='text'>
</content>
</entry>
<entry>
<title>MFC 356561: Add stricter checking on mac key lengths.</title>
<updated>2020-01-20T11:54:00Z</updated>
<author>
<name>John Baldwin</name>
<email>jhb@FreeBSD.org</email>
</author>
<published>2020-01-20T11:54:00Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=6f1a0cedbef0da2632b17bdeafce5ad0c49773a2'/>
<id>urn:sha1:6f1a0cedbef0da2632b17bdeafce5ad0c49773a2</id>
<content type='text'>
Negative lengths are always invalid.  The key length should also
be zero for hash algorithms that do not accept a key.

admbugs:	949
</content>
</entry>
<entry>
<title>MFC 356507,356520: Add a reference count to cryptodev sessions.</title>
<updated>2020-01-20T11:19:55Z</updated>
<author>
<name>John Baldwin</name>
<email>jhb@FreeBSD.org</email>
</author>
<published>2020-01-20T11:19:55Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=60fbfbe4cd40ba23439c2faa76300f289e9b00b6'/>
<id>urn:sha1:60fbfbe4cd40ba23439c2faa76300f289e9b00b6</id>
<content type='text'>
356507:
Add a reference count to cryptodev sessions.

This prevents use-after-free races with crypto requests (which may
sleep) and CIOCFSESSION as well as races from current CIOCFSESSION
requests.

356520:
Remove no-longer-used function prototype.

admbugs:	949
Sponsored by:	Chelsio Communications
</content>
</entry>
<entry>
<title>MFC 351557: Adjust the deprecated warnings for /dev/crypto to be less noisy.</title>
<updated>2019-10-07T20:41:55Z</updated>
<author>
<name>John Baldwin</name>
<email>jhb@FreeBSD.org</email>
</author>
<published>2019-10-07T20:41:55Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=fc85a25dc689c5cfb4e5c47028eee55a1588d6eb'/>
<id>urn:sha1:fc85a25dc689c5cfb4e5c47028eee55a1588d6eb</id>
<content type='text'>
Warn when actual operations are performed instead of when sessions are
created.  The /dev/crypto engine in OpenSSL 1.0.x tries to create
sessions for all possible algorithms each time it is initialized
resulting in spurious warnings.
</content>
</entry>
<entry>
<title>MFC r342024 (by mmacy): Generalize AES iov optimization</title>
<updated>2019-09-11T23:41:09Z</updated>
<author>
<name>Alexander Motin</name>
<email>mav@FreeBSD.org</email>
</author>
<published>2019-09-11T23:41:09Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=bc37c2432e21fbd738a32e3ac893f5637afb5521'/>
<id>urn:sha1:bc37c2432e21fbd738a32e3ac893f5637afb5521</id>
<content type='text'>
Right now, aesni_cipher_alloc does a bit of special-casing
for CRYPTO_F_IOV, to not do any allocation if the first uio
is large enough for the requested size. While working on ZFS
crypto port, I ran into horrible performance because the code
uses scatter-gather, and many of the times the data to encrypt
was in the second entry. This code looks through the list, and
tries to see if there is a single uio that can contain the
requested data, and, if so, uses that.

This has a slight impact on the current consumers, in that the
check is a little more complicated for the ones that use
CRYPTO_F_IOV -- but none of them meet the criteria for testing
more than one.
</content>
</entry>
<entry>
<title>MFC 348970,348974:</title>
<updated>2019-08-21T22:42:08Z</updated>
<author>
<name>John Baldwin</name>
<email>jhb@FreeBSD.org</email>
</author>
<published>2019-08-21T22:42:08Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=01b476c8b8650e010c36be030797c74323998b78'/>
<id>urn:sha1:01b476c8b8650e010c36be030797c74323998b78</id>
<content type='text'>
Make the warning intervals for deprecated crypto algorithms tunable.

348970:
Make the warning intervals for deprecated crypto algorithms tunable.

New sysctl/tunables can now set the interval (in seconds) between
rate-limited crypto warnings.  The new sysctls are:
- kern.cryptodev_warn_interval for /dev/crypto
- net.inet.ipsec.crypto_warn_interval for IPsec
- kern.kgssapi_warn_interval for KGSSAPI

348974:
Move declaration of warninterval out from under COMPAT_FREEBSD32.

This fixes builds of kernels without COMPAT_FREEBSD32.
</content>
</entry>
<entry>
<title>MFC 348876: Add warnings to /dev/crypto for deprecated algorithms.</title>
<updated>2019-08-20T01:30:35Z</updated>
<author>
<name>John Baldwin</name>
<email>jhb@FreeBSD.org</email>
</author>
<published>2019-08-20T01:30:35Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=1c08844fdf8bee7b5b3805d20730b7a30b922d68'/>
<id>urn:sha1:1c08844fdf8bee7b5b3805d20730b7a30b922d68</id>
<content type='text'>
These algorithms are deprecated algorithms that will have no in-kernel
consumers in FreeBSD 13.  Specifically, deprecate the following
algorithms:
- ARC4
- Blowfish
- CAST128
- DES
- 3DES
- MD5-HMAC
- Skipjack

Relnotes:	yes
</content>
</entry>
<entry>
<title>MFC: r343979</title>
<updated>2019-06-16T10:46:02Z</updated>
<author>
<name>Marius Strobl</name>
<email>marius@FreeBSD.org</email>
</author>
<published>2019-06-16T10:46:02Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=aca179ccf351cf07ab7e14c5f6cd93806497855d'/>
<id>urn:sha1:aca179ccf351cf07ab7e14c5f6cd93806497855d</id>
<content type='text'>
As struct cryptop is wrapped in #ifdef _KERNEL, userland doesn't
need to drag in &lt;sys/_task.h&gt; either.
</content>
</entry>
</feed>
