freebsd-nq/sys/crypto
Conrad Meyer e50f10b5a4 aesni(4): Fix {de,en}crypt operations that allocated a buffer
aesni(4) allocates a contiguous buffer for the data it processes if the
provided input was not already virtually contiguous, and copies the input
there.  It performs encryption or decryption in-place.

r324037 removed the logic that then copied the processed data back to the
user-provided input buffer, breaking {de,enc}crypt for mbuf chains or
iovecs with more than a single descriptor.

PR:		228094 (probably, not confirmed)
Submitted by:	Sean Fagan <kithrup AT me.com>
Reported by:	Emeric POUPON <emeric.poupon AT stormshield.eu>
X-MFC-With:	324037
Security:	could result in plaintext being output by "encrypt"
		operation
2018-06-23 18:20:17 +00:00
..
aesni aesni(4): Fix {de,en}crypt operations that allocated a buffer 2018-06-23 18:20:17 +00:00
armv8 Remove unused error return from API that cannot fail 2018-02-23 20:15:19 +00:00
blake2 MFV: libb2: use native calls for secure memory clearance 2018-03-27 14:55:01 +00:00
blowfish
camellia
ccp The PNP info has to follow the module definition. Move it from just 2018-03-25 16:56:49 +00:00
chacha20 opencrypto: Integrate Chacha20 algorithm into OCF 2018-03-29 04:02:50 +00:00
des
rc4
rijndael
sha2
siphash
skein disable printing value of SKEIN_LOOP during standard out, 2018-05-19 18:27:14 +00:00
via Remove unused error return from API that cannot fail 2018-02-23 20:15:19 +00:00
intake.h
sha1.c
sha1.h