History log of /onnv-gate/usr/src/uts/common/crypto/core/kcf_sched.c (Results 1 – 15 of 15)
Revision Date Author Comments
# 12304:bcfa0838b31e 04-May-2010 Valerie Bubb Fenwick <Valerie.Fenwick@Oracle.COM>

PSARC/2010/146 EOF unnecessary elfsign and kCF options
6855881 clean up unnecessary technology from elfsign and kcf


# 11413:21d4b1442799 01-Jan-2010 Dan OpenSolaris Anderson <opensolaris@drydog.com>

6719591 non-exploitable integer wraparound issue in copyin_key() [external report]


# 11066:cebb50cbe4f9 13-Nov-2009 Rafael Vanoni <rafael.vanoni@sun.com>

PSARC/2009/396 Tickless Kernel Architecture / lbolt decoupling
6860030 tickless clock requires a clock() decoupled lbolt / lbolt64
Portions contributed by Chad Mynhier <cmynhier@gmail.com>


# 10444:713f936eb685 02-Sep-2009 Vladimir Kotal <Vladimir.Kotal@Sun.COM>

6786946 kcf should check the key sizes before passing a job to a provider
6831413 multiple SCF providers advertise wrong boundaries for CKM_DES3_{CBC,ECB}{,_PAD} key lengths


# 10166:03b3f3536b2f 23-Jul-2009 Krishna Yenduri <Bhargava.Yenduri@Sun.COM>

6861521 panic in kcf when calling kcf_free_provider_desc


# 9505:cec264b91738 29-Apr-2009 Krishna Yenduri <Bhargava.Yenduri@Sun.COM>

4781345 me_mutex lock in kcf_mech_entry_t can be broken up
6771819 Use of atomic increment in KCF causes scaling problems on multi-socket T2 systems
6705174 C_EncryptInit scaling issues on T2plus
681

4781345 me_mutex lock in kcf_mech_entry_t can be broken up
6771819 Use of atomic increment in KCF causes scaling problems on multi-socket T2 systems
6705174 C_EncryptInit scaling issues on T2plus
6813873 assertion failed: (prov_desc)->pd_refcnt != 0, file: ../../common/crypto/core/kcf_prov_tabs.c, line

show more ...


# 8384:e430d327fc16 16-Dec-2008 Krishna Yenduri <Bhargava.Yenduri@Sun.COM>

6784161 Add a KCF SPI flag to reduce the latency when using providers like n2cp
6769788 crypto_register_provider() returns an incorrect error code when mechanism table is full


# 7882:7c94281d10be 20-Oct-2008 Krishna Yenduri <Bhargava.Yenduri@Sun.COM>

6722032 symmetric crypto scalability issues on batoka


# 7855:9c7c0d0770d2 16-Oct-2008 Darren Moffat <Darren.Moffat@Sun.COM>

6745000 cpupart_get_cpus() fails early in boot when called from kcf due to emxls loading sha1 module


# 6712:79afecec3f3c 27-May-2008 tomee

6554564 slab allocator cannot release slabs with lonely buffers
6676406 kmem client constructors and destructors need some cleanup


# 6424:43cd1a44d91d 12-Apr-2008 krishna

6604363 Bulk encryption and digest algorithms have poor scalability on T5140/T5240


# 4494:cb40876c7b98 19-Jun-2007 krishna

6568352 IPsec performance does not scale using hardware crypto providers


# 3708:75f7822ae9dc 23-Feb-2007 krishna

PSARC/2007/093 Crypto Context sharing between providers
6494834 support check for threshold when using hardware providers even for multi-part requests


# 3096:015752f52084 12-Nov-2006 krishna

6488985 kcf_submit_request() should handle the EMPTYQ case for a hardware provider
6478655 kcf should not log complaints as frequently as it does
6470608 /dev/urandom should provide data blocks large

6488985 kcf_submit_request() should handle the EMPTYQ case for a hardware provider
6478655 kcf should not log complaints as frequently as it does
6470608 /dev/urandom should provide data blocks larger then 1040 bytes
6478016 crypto_mechanism32_t should be available from sys/crypto/spi.h

show more ...


# 0:68f95e015346 14-Jun-2005 stevel@tonic-gate

OpenSolaris Launch