#
1a5e258f |
| 08-Aug-2014 |
Josef 'Jeff' Sipek <josef.sipek@nexenta.com> |
5045 use atomic_{inc,dec}_* instead of atomic_add_* Reviewed by: Matthew Ahrens <mahrens@delphix.com> Reviewed by: Garrett D'Amore <garrett@damore.org> Approved by: Robert Mustacchi <rm@joyent.com>
|
#
6ea3c060 |
| 12-Sep-2010 |
Garrett D'Amore <garrett@nexenta.com> |
6 Need open kcfd Reviewed by: gwr@nexenta.com, richlowe@richlowe.net, matt@greenviolet.net Approved by: richlowe@richlowe.net
|
#
9b009fc1 |
| 04-May-2010 |
Valerie Bubb Fenwick <Valerie.Fenwick@Oracle.COM> |
PSARC/2010/146 EOF unnecessary elfsign and kCF options 6855881 clean up unnecessary technology from elfsign and kcf
|
#
73556491 |
| 07-Oct-2009 |
Anthony Scarpino <Anthony.Scarpino@Sun.COM> |
PSARC/2009/447 Kernel Cryptographic Framework support for FIPS 140-2 6703950 Solaris cryptographic framework needs to implement changes for FIPS-140-2 compliance
|
#
436935a1 |
| 02-Sep-2009 |
Vladimir Kotal <Vladimir.Kotal@Sun.COM> |
6786946 kcf should check the key sizes before passing a job to a provider 6831413 multiple SCF providers advertise wrong boundaries for CKM_DES3_{CBC,ECB}{,_PAD} key lengths
|
#
ef56a3c5 |
| 30-Apr-2009 |
Krishna Yenduri <Bhargava.Yenduri@Sun.COM> |
4781345 me_mutex lock in kcf_mech_entry_t can be broken up 6771819 Use of atomic increment in KCF causes scaling problems on multi-socket T2 systems 6705174 C_EncryptInit scaling issues on T2plus 681
4781345 me_mutex lock in kcf_mech_entry_t can be broken up 6771819 Use of atomic increment in KCF causes scaling problems on multi-socket T2 systems 6705174 C_EncryptInit scaling issues on T2plus 6813873 assertion failed: (prov_desc)->pd_refcnt != 0, file: ../../common/crypto/core/kcf_prov_tabs.c, line
show more ...
|
#
c41e7cca |
| 19-Jun-2007 |
krishna <none@none> |
6568352 IPsec performance does not scale using hardware crypto providers
|
#
fe2f7468 |
| 01-Jun-2007 |
krishna <none@none> |
6548905 ncp crypto registration during attach deadlocks in devfs during boot
|
#
6a1073f8 |
| 23-Feb-2007 |
krishna <none@none> |
PSARC/2007/093 Crypto Context sharing between providers 6494834 support check for threshold when using hardware providers even for multi-part requests
|
#
72eff6e2 |
| 14-Apr-2006 |
mcpowers <none@none> |
6399680 logical provider selects busy member
|
#
894b2776 |
| 14-Nov-2005 |
mcpowers <none@none> |
PSARC 2005/576 Support for complex cryptographic mechanisms PSARC 2005/630 session, object, and key management kernel crypto API PSARC 2005/656 AES CTR mode for KCF PSARC 2005/659 Hiding members of K
PSARC 2005/576 Support for complex cryptographic mechanisms PSARC 2005/630 session, object, and key management kernel crypto API PSARC 2005/656 AES CTR mode for KCF PSARC 2005/659 Hiding members of KCF logical providers 4721729 Support AES Counter mode for encryption 6243992 dprov stores attributes based on data model of application 6203141 Sessions and objects management kernel crypto API 6253484 Support mechanisms with complex mech_param structures across the EF stack 6314217 Hide underlying providers of logical providers
show more ...
|
#
7c478bd9 |
| 14-Jun-2005 |
stevel@tonic-gate <none@none> |
OpenSolaris Launch
|