Displaying 6 results from an estimated 6 matches for "aes_cbc_pad".
2008 May 16
0
Some of AES_CBC_PAD team missed the last bus home
Author: Darren Moffat <darrenm at opensolaris.org>
Repository: /hg/zfs-crypto/gate
Latest revision: 6dded109490e79f82f24b9ba0b3465cb1e6a96e6
Total changesets: 1
Log message:
Some of AES_CBC_PAD team missed the last bus home
pam_zfs_key module not in this phase
fs-local failure if ''zfs mount -a'' fails isn''t our call zoneadm/zfs.c
1866 libzfs_jni needs updated or reverted
1403 avl_destroy_nodes panic
Files:
delete: usr/src/lib/pam_modules/zfs_key/Makefile
dele...
2008 Apr 28
0
removal of AES_CBC_PAD from kernel
Author: Anthony Scarpino <Anthony.Scarpino at Sun.COM>
Repository: /hg/zfs-crypto/gate
Latest revision: 3df1f6b01f2e4234af95267b22947e416a38d4ca
Total changesets: 1
Log message:
removal of AES_CBC_PAD from kernel
Files:
update: usr/src/cmd/cmd-crypto/etc/kcf.conf
update: usr/src/common/crypto/aes/aes_cbc_crypt.c
update: usr/src/common/crypto/aes/aes_cbc_crypt.h
update: usr/src/uts/common/crypto/io/aes.c
2008 Feb 06
0
last update to AES_CBC_PAD buffer size support broke CCM mode (oops!)
Author: Darren Moffat <darrenm at opensolaris.org>
Repository: /hg/zfs-crypto/gate
Latest revision: 2b29daa2195d09df740d6a13d5677c09974205e5
Total changesets: 1
Log message:
last update to AES_CBC_PAD buffer size support broke CCM mode (oops!)
Files:
update: usr/src/uts/common/crypto/io/aes.c
2008 Jan 21
0
293 AES_CBC_PAD keywrap
Author: Darren Moffat <darrenm at opensolaris.org>
Repository: /hg/zfs-crypto/gate
Latest revision: b44ed1cdde88c002bba91ae1bac55f456adcc95d
Total changesets: 1
Log message:
293 AES_CBC_PAD keywrap
Fix key load once and for all by using xcopyin & uint64_t everywhere
Files:
update: usr/src/cmd/zfs/zfs_main.c
update: usr/src/lib/libzfs/common/libzfs.h
update: usr/src/lib/libzfs/common/libzfs_crypto.c
update: usr/src/lib/libzfs/common/libzfs_mount.c
update: usr/src/uts/common/c...
2008 Jan 11
37
Proposal for how per dataset keys are initially setup
Anthony Scarpino wrote (elsewhere):
> While writing up the man page.. I thought of a few things that I was
> wondering if you considered..
>
> Can an encrypted dataset (keytype=dataset) reside in a non-encrypted (no
> kek defined) pool?
I can see a case for and against allowing this when considering it
purely at the feature level as users/admins see things.
The admin can
2008 Jan 11
37
Proposal for how per dataset keys are initially setup
Anthony Scarpino wrote (elsewhere):
> While writing up the man page.. I thought of a few things that I was
> wondering if you considered..
>
> Can an encrypted dataset (keytype=dataset) reside in a non-encrypted (no
> kek defined) pool?
I can see a case for and against allowing this when considering it
purely at the feature level as users/admins see things.
The admin can