Revision tags: release/14.0.0 |
|
#
4d846d26 |
| 10-May-2023 |
Warner Losh <imp@FreeBSD.org> |
spdx: The BSD-2-Clause-FreeBSD identifier is obsolete, drop -FreeBSD
The SPDX folks have obsoleted the BSD-2-Clause-FreeBSD identifier. Catch up to that fact and revert to their recommended match of
spdx: The BSD-2-Clause-FreeBSD identifier is obsolete, drop -FreeBSD
The SPDX folks have obsoleted the BSD-2-Clause-FreeBSD identifier. Catch up to that fact and revert to their recommended match of BSD-2-Clause.
Discussed with: pfg MFC After: 3 days Sponsored by: Netflix
show more ...
|
Revision tags: release/13.2.0, release/12.4.0, release/13.1.0, release/12.3.0 |
|
#
197ff4c3 |
| 02-Nov-2021 |
Kornel Duleba <mindal@semihalf.com> |
ossl: Add support for AES-CBC cipher
AES-CBC OpenSSL assembly is used underneath. The glue layer(ossl_aes.c) is based on CHACHA20 implementation. Contrary to the SHA and CHACHA20, AES OpenSSL assemb
ossl: Add support for AES-CBC cipher
AES-CBC OpenSSL assembly is used underneath. The glue layer(ossl_aes.c) is based on CHACHA20 implementation. Contrary to the SHA and CHACHA20, AES OpenSSL assembly logic does not have a fallback implementation in case CPU doesn't support required instructions. Because of that CPU caps are checked during initialization and AES support is advertised only if available. The feature is available on all architectures that ossl supports: i386, amd64, arm64.
The biggest advantage of this patch over existing solutions (aesni(4) and armv8crypto(4)) is that it supports SHA, allowing for ETA operations.
Sponsored by: Stormshield Obtained from: Semihalf Reviewed by: jhb (previous version) Differential revision: https://reviews.freebsd.org/D32099
show more ...
|
#
200bc589 |
| 06-Nov-2021 |
Wojciech Macek <wma@FreeBSD.org> |
Revert "ossl: Add support for AES-CBC cipher"
This reverts commit 849faf4e0ba9a8b8f24ff34da93a0fd46c14eda9.
|
#
849faf4e |
| 02-Nov-2021 |
Kornel Duleba <mindal@semihalf.com> |
ossl: Add support for AES-CBC cipher
AES-CBC OpenSSL assembly is used underneath. The glue layer(ossl_aes.c) is based on CHACHA20 implementation. Contrary to the SHA and CHACHA20, AES OpenSSL assemb
ossl: Add support for AES-CBC cipher
AES-CBC OpenSSL assembly is used underneath. The glue layer(ossl_aes.c) is based on CHACHA20 implementation. Contrary to the SHA and CHACHA20, AES OpenSSL assembly logic does not have a fallback implementation in case CPU doesn't support required instructions. Because of that CPU caps are checked during initialization and AES support is advertised only if available. The feature is available on all architectures that ossl supports: i386, amd64, arm64.
The biggest advantage of this patch over existing solutions (aesni(4) and armv8crypto(4)) is that it supports SHA, allowing for ETA operations.
Sponsored by: Stormshield Obtained from: Semihalf Reviewed by: jhb Differential revision: https://reviews.freebsd.org/D32099
show more ...
|
#
42dcd395 |
| 06-Oct-2021 |
John Baldwin <jhb@FreeBSD.org> |
crypto: Support Chacha20-Poly1305 with a nonce size of 8 bytes.
This is useful for WireGuard which uses a nonce of 8 bytes rather than the 12 bytes used for IPsec and TLS.
Note that this also fixes
crypto: Support Chacha20-Poly1305 with a nonce size of 8 bytes.
This is useful for WireGuard which uses a nonce of 8 bytes rather than the 12 bytes used for IPsec and TLS.
Note that this also fixes a (should be) harmless bug in ossl(4) where the counter was incorrectly treated as a 64-bit counter instead of a 32-bit counter in terms of wrapping when using a 12 byte nonce. However, this required a single message (TLS record) longer than 64 * (2^32 - 1) bytes (about 256 GB) to trigger.
Sponsored by: The FreeBSD Foundation Differential Revision: https://reviews.freebsd.org/D32122
show more ...
|
#
1c09320d |
| 26-May-2021 |
John Baldwin <jhb@FreeBSD.org> |
ossl: Use crypto_cursor_segment().
Reviewed by: markj Sponsored by: Netflix Differential Revision: https://reviews.freebsd.org/D30447
|
Revision tags: release/13.0.0 |
|
#
d2e076c3 |
| 02-Apr-2021 |
John Baldwin <jhb@FreeBSD.org> |
ossl: Don't encryt/decrypt too much data for chacha20.
The loops for Chacha20 and Chacha20+Poly1305 which encrypted/decrypted full blocks of data used the minimum of the input and output segment len
ossl: Don't encryt/decrypt too much data for chacha20.
The loops for Chacha20 and Chacha20+Poly1305 which encrypted/decrypted full blocks of data used the minimum of the input and output segment lengths to determine the size of the next chunk ('todo') to pass to Chacha20_ctr32(). However, the input and output segments could extend past the end of the ciphertext region into the tag (e.g. if a "plain" single mbuf contained an entire TLS record). If the length of the tag plus the length of the last partial block together were at least as large as a full Chacha20 block (64 bytes), then an extra block was encrypted/decrypted overlapping with the tag. Fix this by also capping the amount of data to encrypt/decrypt by the amount of remaining data in the ciphertext region ('resid').
Reported by: gallatin Reviewed by: cem, gallatin, markj Sponsored by: Netflix Differential Revision: https://reviews.freebsd.org/D29517
show more ...
|
#
78991a93 |
| 04-Mar-2021 |
John Baldwin <jhb@FreeBSD.org> |
ossl: Add support for the ChaCha20 + Poly1305 AEAD cipher from RFC 8439
Sponsored by: Netflix Differential Revision: https://reviews.freebsd.org/D28757
|
#
92aecd1e |
| 04-Mar-2021 |
John Baldwin <jhb@FreeBSD.org> |
ossl: Add ChaCha20 cipher support.
Sponsored by: Netflix Differential Revision: https://reviews.freebsd.org/D28756
|