6579499 update operations should be able to use in-place transformations
6895660 Successful message for FIPS 140 would be nice6895651 FIPS 140 POST thread can get hung up
6889491 DEBUG kernels panic during startup in fips140_actions
PSARC/2009/447 Kernel Cryptographic Framework support for FIPS 140-26703950 Solaris cryptographic framework needs to implement changes for FIPS-140-2 compliance
6885193 assignment of ssize_t to uint_t in kcf_check_prov_mech_keylen() produces lint noise
6882364 networking wedged up behind blocked taskq_thread() worker
6826942 Need an optimized GCM leveraging Intel's PCMULQDQ instruction
PSARC 2009/347 cryptoadm(1M) enhancement for FIPS-140 mode6787364 Administration and policy configuration changes to support FIPS 140-26867384 Solaris Crypto Framework needs to implement self tests
PSARC 2009/347 cryptoadm(1M) enhancement for FIPS-140 mode6787364 Administration and policy configuration changes to support FIPS 140-26867384 Solaris Crypto Framework needs to implement self tests for FIPS 140-2 compliance
show more ...
6786946 kcf should check the key sizes before passing a job to a provider6831413 multiple SCF providers advertise wrong boundaries for CKM_DES3_{CBC,ECB}{,_PAD} key lengths
6861521 panic in kcf when calling kcf_free_provider_desc
6821090 Contents of /etc/crypto/kcf.conf should not influence mechanisms available to kernel consumers.
6855407 kernel crypto module reports firmware version incorrectly6854979 kmf_pkcs11.so.1 has bad SONAME and versioning
6842120 crypto_attach leaks in snv_115
6836582 kcf_limit_hwrng tunable can be removed
4781345 me_mutex lock in kcf_mech_entry_t can be broken up6771819 Use of atomic increment in KCF causes scaling problems on multi-socket T2 systems6705174 C_EncryptInit scaling issues on T2plus681
4781345 me_mutex lock in kcf_mech_entry_t can be broken up6771819 Use of atomic increment in KCF causes scaling problems on multi-socket T2 systems6705174 C_EncryptInit scaling issues on T2plus6813873 assertion failed: (prov_desc)->pd_refcnt != 0, file: ../../common/crypto/core/kcf_prov_tabs.c, line
6832651 panic in sha2_mac_verify_atomic()
6767618 Need an optimized AES leveraging Intel's AES instructions6747587 Remove redundant code in ccm.c--HG--rename : usr/src/common/crypto/aes/amd64/THIRDPARTYLICENSE => usr/src/common/crypto/ae
6767618 Need an optimized AES leveraging Intel's AES instructions6747587 Remove redundant code in ccm.c--HG--rename : usr/src/common/crypto/aes/amd64/THIRDPARTYLICENSE => usr/src/common/crypto/aes/amd64/THIRDPARTYLICENSE.gladmanrename : usr/src/common/crypto/aes/amd64/THIRDPARTYLICENSE.descrip => usr/src/common/crypto/aes/amd64/THIRDPARTYLICENSE.gladman.descrip
6594036 {MD5,SHA[12]} HMAC mechanisms have incorrect key size unit
6803836 Solaris Cryptographic Framework needs to support AES GMAC
6824347 stack pointers pouring into /dev/random
6812615 64-bit RC4 has poor performance on Intel Nehalem
6803803 rnd_chpoll() should not reject (EINVAL) events==0
6799258 Continuous RNG test sometimes fails to compare 160-bit blocks
6773928 n2cp should support CKM_AES_GCM
6790685 stubs for random_add_pseudo_entropy() are missing
12345