6 Need open kcfdReviewed by: gwr@nexenta.com, richlowe@richlowe.net, matt@greenviolet.netApproved by: richlowe@richlowe.net
6849769 crypto modules _init: crypto_register_provider() failed during shutdown6885135 assertion failed: kcf_dh != NULL6907099 module load/unload errors could be a little less techie and ominous
FWARC 2008/613 KT IOS Performance Counters APIFWARC 2008/615 KT Perf Reg HV APIFWARC 2009/434 KT IOS Performance Counters API UpdateFWARC 2009/567 Parallel Boot HV APIsPSARC 2009/177 Solaris supp
FWARC 2008/613 KT IOS Performance Counters APIFWARC 2008/615 KT Perf Reg HV APIFWARC 2009/434 KT IOS Performance Counters API UpdateFWARC 2009/567 Parallel Boot HV APIsPSARC 2009/177 Solaris support for Rainbow Falls platformsPSARC 2009/389 Sun4v faulted SP events extensionPSARC 2009/533 CRYPTO_HMAC_NO_UPDATE - A new KCF SPI flagPSARC 2009/605 more sun4v platform-independent cpu/mem FMA eventsPSARC 2009/649 Generic PCIe root complex FMA events6704999 extend xaui enum to work in platform independent world6773223 RFE: guest epkt for faulted SP6773225 RFE: Diagnosis of a faulted SP6797776 Solaris support for Rainbow Falls platforms
show more ...
PSARC/2009/447 Kernel Cryptographic Framework support for FIPS 140-26703950 Solaris cryptographic framework needs to implement changes for FIPS-140-2 compliance
6861521 panic in kcf when calling kcf_free_provider_desc
4781345 me_mutex lock in kcf_mech_entry_t can be broken up6771819 Use of atomic increment in KCF causes scaling problems on multi-socket T2 systems6705174 C_EncryptInit scaling issues on T2plus681
4781345 me_mutex lock in kcf_mech_entry_t can be broken up6771819 Use of atomic increment in KCF causes scaling problems on multi-socket T2 systems6705174 C_EncryptInit scaling issues on T2plus6813873 assertion failed: (prov_desc)->pd_refcnt != 0, file: ../../common/crypto/core/kcf_prov_tabs.c, line
6784161 Add a KCF SPI flag to reduce the latency when using providers like n2cp6769788 crypto_register_provider() returns an incorrect error code when mechanism table is full
6594889 Hardware provider flow control broken by CR 6568352
6568352 IPsec performance does not scale using hardware crypto providers
6548905 ncp crypto registration during attach deadlocks in devfs during boot
PSARC 2007/092 key generation and derivation for providers without keystore6462782 Metaslot needs to generate a token object from a session object.6462780 Softtoken keystore needs to store keys ECC
PSARC 2007/092 key generation and derivation for providers without keystore6462782 Metaslot needs to generate a token object from a session object.6462780 Softtoken keystore needs to store keys ECC objects6339802 support keygen operations by acceleration only providers
PSARC/2007/213 Support KCF Providers with Limited Digest Capability6473274 pkcs11_kernel should support multipart ops even for hardware that has only single part6534615 For extra credit, dprov coul
PSARC/2007/213 Support KCF Providers with Limited Digest Capability6473274 pkcs11_kernel should support multipart ops even for hardware that has only single part6534615 For extra credit, dprov could make HMAC mechanisms work for PKCS #11 clients6541772 usr/src/cmd/mdb/common/modules/crypto/sched_impl.c should not include stdlib.h6542759 HMAC mechanisms broken in sha2 kernel module
PSARC/2007/093 Crypto Context sharing between providers6494834 support check for threshold when using hardware providers even for multi-part requests
6468434 crypto provider can't attach if all mechanisms disabled
PSARC/2006/540 Crypto event notification update6385143 Support usage of non-extractable keys6466686 need events to support session based clients6466693 need a routine to get provider information g
PSARC/2006/540 Crypto event notification update6385143 Support usage of non-extractable keys6466686 need events to support session based clients6466693 need a routine to get provider information given a provider handle6465847 ksslcfg reports service to be online even when there is an error6469846 dprov needs to set CKF_LOGIN_REQUIRED
PSARC 2005/576 Support for complex cryptographic mechanismsPSARC 2005/630 session, object, and key management kernel crypto APIPSARC 2005/656 AES CTR mode for KCFPSARC 2005/659 Hiding members of K
PSARC 2005/576 Support for complex cryptographic mechanismsPSARC 2005/630 session, object, and key management kernel crypto APIPSARC 2005/656 AES CTR mode for KCFPSARC 2005/659 Hiding members of KCF logical providers4721729 Support AES Counter mode for encryption6243992 dprov stores attributes based on data model of application6203141 Sessions and objects management kernel crypto API6253484 Support mechanisms with complex mech_param structures across the EF stack6314217 Hide underlying providers of logical providers
OpenSolaris Launch