995 boot message: No randomness provider enabled for /dev/randomReviewed by: Garrett D'Amore <garrett@damore.org>Reviewed by: Dan McDonald <danmcd@nexenta.com>Reviewed by: Hans Rosenfeld <hans.ros
995 boot message: No randomness provider enabled for /dev/randomReviewed by: Garrett D'Amore <garrett@damore.org>Reviewed by: Dan McDonald <danmcd@nexenta.com>Reviewed by: Hans Rosenfeld <hans.rosenfeld@nexenta.com>Reviewed by: Boris Protopopov <boris.protopopov@nexenta.com>Approved by: Garrett D'Amore <garrett@damore.org>
show more ...
875 missing lwp_exit() in kcfpool_svc() induces panic in prchoose()Reviewed by: Bryan Cantrill <bryancantrill@gmail.com>Reviewed by: Dan McDonald <danmcd@nexenta.com>Approved by: Gordon Ross <gwr@
875 missing lwp_exit() in kcfpool_svc() induces panic in prchoose()Reviewed by: Bryan Cantrill <bryancantrill@gmail.com>Reviewed by: Dan McDonald <danmcd@nexenta.com>Approved by: Gordon Ross <gwr@nexenta.com>
6 Need open kcfdReviewed by: gwr@nexenta.com, richlowe@richlowe.net, matt@greenviolet.netApproved by: richlowe@richlowe.net
6972233 Panic is seen when fips-140 mode is enabled and rebooted
PSARC/2010/146 EOF unnecessary elfsign and kCF options6855881 clean up unnecessary technology from elfsign and kcf
6849769 crypto modules _init: crypto_register_provider() failed during shutdown6885135 assertion failed: kcf_dh != NULL6907099 module load/unload errors could be a little less techie and ominous
6719591 non-exploitable integer wraparound issue in copyin_key() [external report]
PSARC/2009/396 Tickless Kernel Architecture / lbolt decoupling6860030 tickless clock requires a clock() decoupled lbolt / lbolt64Portions contributed by Chad Mynhier <cmynhier@gmail.com>
6895660 Successful message for FIPS 140 would be nice6895651 FIPS 140 POST thread can get hung up
6889491 DEBUG kernels panic during startup in fips140_actions
PSARC/2009/447 Kernel Cryptographic Framework support for FIPS 140-26703950 Solaris cryptographic framework needs to implement changes for FIPS-140-2 compliance
6885193 assignment of ssize_t to uint_t in kcf_check_prov_mech_keylen() produces lint noise
PSARC 2009/347 cryptoadm(1M) enhancement for FIPS-140 mode6787364 Administration and policy configuration changes to support FIPS 140-26867384 Solaris Crypto Framework needs to implement self tests
PSARC 2009/347 cryptoadm(1M) enhancement for FIPS-140 mode6787364 Administration and policy configuration changes to support FIPS 140-26867384 Solaris Crypto Framework needs to implement self tests for FIPS 140-2 compliance
6786946 kcf should check the key sizes before passing a job to a provider6831413 multiple SCF providers advertise wrong boundaries for CKM_DES3_{CBC,ECB}{,_PAD} key lengths
6861521 panic in kcf when calling kcf_free_provider_desc
6821090 Contents of /etc/crypto/kcf.conf should not influence mechanisms available to kernel consumers.
4781345 me_mutex lock in kcf_mech_entry_t can be broken up6771819 Use of atomic increment in KCF causes scaling problems on multi-socket T2 systems6705174 C_EncryptInit scaling issues on T2plus681
4781345 me_mutex lock in kcf_mech_entry_t can be broken up6771819 Use of atomic increment in KCF causes scaling problems on multi-socket T2 systems6705174 C_EncryptInit scaling issues on T2plus6813873 assertion failed: (prov_desc)->pd_refcnt != 0, file: ../../common/crypto/core/kcf_prov_tabs.c, line
6803836 Solaris Cryptographic Framework needs to support AES GMAC
6773928 n2cp should support CKM_AES_GCM
6784161 Add a KCF SPI flag to reduce the latency when using providers like n2cp6769788 crypto_register_provider() returns an incorrect error code when mechanism table is full
6771064 kcf_soft_config_init leaks across the board
6260053 Solaris Cryptographic Framework needs to support AES in GCM mode
6414175 kcf.conf's supportedlist not providing much usefulness
6722032 symmetric crypto scalability issues on batoka
6745000 cpupart_get_cpus() fails early in boot when called from kcf due to emxls loading sha1 module
12