Index | index by Group | index by Distribution | index by Vendor | index by creation date | index by Name | Mirrors | Help | Search |
Name: libkcapi-devel | Distribution: openSUSE:Factory:zSystems |
Version: 1.4.0 | Vendor: openSUSE |
Release: 2.7 | Build date: Mon Mar 6 16:17:46 2023 |
Group: Development/Languages/C and C++ | Build host: reproducible |
Size: 226917 | Source RPM: libkcapi-1.4.0-2.7.src.rpm |
Packager: https://bugs.opensuse.org | |
Url: https://www.chronox.de/libkcapi.html | |
Summary: Linux Kernel Crypto API User Space Interface Library |
libkcapi exports APIs so that developers need not consider the low-level Netlink interface handling that is used for accesing the Linux kernel crypto API. The library does not implement any cipher algorithms. All consumer requests are sent to the kernel for processing. Results from the kernel crypto API are returned to the consumer via the library API. The kernel interface and therefore this library can be used by unprivileged processes. This library does not perform any memcpy for processing the cryptographic data! The library uses scatter / gather lists to eliminate the need for moving data around in memory.
GPL-2.0-only
* Mon Mar 06 2023 Marcus Meissner <[email protected]> - libkcapi was actually signed by the wrong key (bsc#1207892) * Tue Apr 26 2022 Marcus Meissner <[email protected]> - Update to version 1.4.0 * fix: ensure that LTO is supported (by Simo Sorce) * fix: add LTO regression testing (by Ondrej Mosnacek) * enhancement: add sm3sum, sm3hmac tools, add APIs kcapi_md_sm3, kcapi_md_hmac_sm3 * enhancement: add SM4 convenience functions * fix: support AEAD encryption of arbitrary size with kcapi-enc - removed libkcapi-fix-lto.patch (upstream) * Tue Apr 26 2022 Marcus Meissner <[email protected]> - use https url * Tue Jul 27 2021 Andreas Schneider <[email protected]> - Update to version 1.3.1 * fix: fix -Wconversion warnings (by Ondrej Mosnacek) * fix: fix bad data types in _kcapi_common_send_meta (by Ondrej Mosnacek) * fix: Version symbols to maintain ABI compatibility (by Simo Sorce) * fix: disable io_getevents on systems that do not support it (by Khem Raj) * fix: remove prctl PR_SET_DUMPABLE to allow library to be debugged - as the library does not store any sensitive data in data structures it owns, such security precautions may not be necessary considering the benefit of allowing regular debugging * fix: ensure that sendmsg is always used as fallback when vmsplice cannot be used * enhancement: add kcapi_set_maxsplicesize and kcapi_get_maxsplicesize * enhancement: the variable types are changed from int32_t to ssize_t and from uint32_t to size_t to match common POSIX and Linux APIs - Added libkcapi-fix-lto.patch * Mon Aug 31 2020 Dirk Mueller <[email protected]> - update to 1.2.0: * enhancement: kcapi-hasher: add madvise and 64 bit support by Brandur Simonsen * fix: fix clang warnding in KDF implementation by Khem Raj * fix: fix inverted logic in kcapi-main test logic reported by Ondrej Mosnáček * fix: return error when iteration count is zero for PBKDF as reported by Guido Vranken * enhancement: add function kcapi_cipher_stream_update_last to indicate the last block of a symmetric cipher stream operation * disable XTS multithreaded tests as it triggers a race discussed in https://github.com/smuellerDD/libkcapi/issues/92. The conclusion is the following: xts(aes) doesn't support chaining requests like for other ciphers such as CBC (at least as implemented in the kernel Crypto API). That can be seen in `crypto/testmgr.h` - the ciphers that are expected to return IVs usable for chaining have the `.iv_out` entries filled in in their test vectors (and those that don't support it do not). One can see that only CTR and CBC test vectors have them, not XTS. Looking again at how XTS is defined, it seems one could implement transparent chaining by simply decrypting the final tweak using the tweak key and return it as the output IV... but I believe this has never been mandated nor implemented in the Crypto API (likely because of the overhead of the final tweak decryption, which would be pointless if you're not going to use the output IV - and there is currently no way to signal to the driver that you are going to need it). * disable AIO parallel tests due to undefined behavior * Wed Jan 08 2020 Marcus Meissner <[email protected]> - updated to 1.1.5: - Fix invocation of ansi_cprng in FIPS mode during testing - Fix testing on kernels >= 5.0 - Add virtualization test for kernel 5.1 - Fix the limit between vmsplice() and sendmsg() by Christophe Leroy - Fix remove code duplication by Ondrej MosnáÄek - Fix potential memleak in speed-test - updated to 1.1.4: - Fix: use sendmsg when processing more than 1<<16 bytes input data which improves performance on some architectures - updated to 1.1.3: - Fix: default location of FIPS 140-2 HMAC control file is .<orig file>.hmac (was accidentally moved to <orig file>.hmac with 1.1.0) - updated to 1.1.2: - Fix: Bug fixes for GCC 8.1.0 regarding string length checks by Krzysztof Kozlowski - Enhancement: ensure that tests execute on architectures other than X86 by Ondrej MosnáÄek - Fix: Bug fix to initialize FDs at the correct time in kcapi-kernel-if.c by Ondrej MosnáÄek - Test fix: Support test execution outside build environment by Ondrej MosnáÄek - updated to 1.1.1: - Fix: Bug fixes for kcapi_hasher by Ondrej MosnáÄek - updated to 1.1.0: - API Enhancement: Addition of kcapi_handle_reinit - Fix: simplify code by removing the internal *_fd functions from kcapi-kernel-if.c - Test enhancement: add IIV speed testing - Fix: add a loop around the read system call to always obtain all generated data - Fix: use host compiler for compiling docproc (reported by Christophe LEROY, fixed by Björn Esser) - Fix: make error handling of hashing applications consistent with coreutils applications (reported by Christophe LEROY) - Fix: support for zero length files (patched by Ondrej MosnáÄek) - Fix: support for zero message hashes on kernels <= 4.9 (patched by Ondrej MosnáÄek) - Fix: Add Travis CI test system provided by Ondrej MosnáÄek - Fix: Add several fixes to kcapi-hasher by Ondrej MosnáÄek - Fix: Add additional tests for kcapi-hasher by Ondrej MosnáÄek - Fix: Apply unpadding only to last block of data by Ondrej MosnáÄek - Fix: Fix resource leaks in error code paths suggested by Ondrej MosnáÄek - Enhancement: achieve hmaccalc CLI equivalence by Ondrej MosnáÄek - updated to 1.0.3: - Fix: support STDIN and --tag of sha*sum applications - Enhancement: Add small enhancements to support integration with distros -- reported by Björn Esser - updated to 1.0.2: - Fix: hasher-test.sh on 32-bit systems - Fix: AIO return code handling on large number of requests -- reported by Jonathan Cameron - Enhancement: disable coredumps of library - Fix: remove unchecked -fstack-protector-strong from Makefile -- reported by Mathieu Malaterre - Fix: document that kcapi_cipher_stream_op must be called in a loop to collect all data in a multhreaded environment. - Test Fix: Update symmetric multithreaded stream test to invoke kcapi_cipher_stream_op in a loop to collect all data. - Fix: Initialize the cipher handle on stack with zeros as the library expects a zero-initialized cipher handle. This fixes a possible segfault where free() is called on a non-initialized memory location. - Fix: port algif_kpp and algif_akcipher to 4.15-rc3 - updated to 1.0.1: - Fix: constify AEAD cipher input data - Fix: use GCC byte swapping acceleration if present - Fix: KDF counter handling on little endian systems when generating more than 255 blocks - Use LD_PRELOAD for execution of test cases to force using of the freshly compiled binaries - Fix: return code handling of _kcapi_common_vmsplice_chunk_fd as reported by Christophe Leroy - Fix: return code handling in _kcapi_md_update - Fix: kcapi-hasher now supports files larger than 2GB - Fix: kcapi-dgst now supports files larger than 2GB - Fix: use stack protector - Fix: rename header guards to remove leading underscore as pointed out by Markus Elfring - Test Fix: Allow compiing the test code without asymmetric and KPP support - updated to 1.0.0: - Fix: Small compile fixes for new checks of GCC 7 - API Change: Rename all LOG_* enums to KCAPI_LOG_* to prevent namespace poisoning - Fix: soname and file name of library now compiles with conventions (thanks to Marcus Meissner) - Fix: kcapi-rng.c: unify FD/syscall read code and fix __NR_getrandom resolution - Enhancement: add kcapi-enc application to access symmetric encryption on command line - Fix: consolidate duplicate code in kcapi-hasher - Enhancement: add kcapi-dgst application to access hashes on command line - Enhancement: add kcapi-rng man page - Enhancement: add kcapi-rng --hex command line option - Fix: enable full symmetric AIO support - Fix: consolidate all test code into test/ and invoke all tests with test-invocation.sh - Fix: fix memleaks in error code paths as reported by clang - Fix: reduce memory footprint by rearranging data structures - Fix: kcapi-hasher is now fully FIPS 140-2 compliant as it now includes the integrity test for libkcapi.so - Enhancement: Add speed tests for MV-CESA accelerated ciphers and hash algorithms (thanks to Bastian Stender) - Test Enhancement: add kcapi-enc-test-large.c test testing edge conditions of AF_ALG - Test Enhancement: add virttest.sh - use of test system based on eudyptula-boot to test on linux-4.3.6, linux-4.4.86, linux-4.5, linux-4.7, linux-4.10, linux-4.12 - Test Enhancement: add kcapi-fuzz-test.sh to support fuzzing the AF_ALG interfaces - Enhancement: add RPM SPEC file (tested with Fedora 26) - API Change: replace --disable-lib-asym with --enable-lib-asym as the algif_akcipher.c kernel interface is not likely to be added to the kernel anytime soon - API Enhancement: add KPP API which is not compiled by default, use --enable-lib-kpp (the algif_kpp.c kernel interface is not likely to be added to the Linux kernel any time soon) - Test Enhancement: Add KPP tests - Enhancement: Re-enable AIO support for symmetric and AEAD ciphers down to Linux kernels 4.1 and 4.7, respectively. This is due to integrating a fix against a kernel crash when using AIO. - Fix: simply KDF code base - API Enhancement: add message digest convenience functions kcapi_md_*sha* - API Enhancement: add cipher convenience functions kcapi_cipher_*_aes_* - API Enhancement: add rng convenience function kcapi_rng_get_bytes - API Change: remove kcapi_aead_getdata, use kcapi_aead_getdata_input and kcapi_aead_getdata_output instead - API Change: remove kcapi_aead_outbuflen, use kcapi_aead_outbuflen_enc and kcapi_aead_outbuflen_dec instead - updated to 0.14.0: - AIO: fix tracking of completed IOCBs - speed-test: fix AEAD handling - speed-test: fix time calculation - compiler now warns a user of deprecated API calls - AIO: handle kernel errors for algif_skcipher gracefully - AIO: using multiple IOCB if algif_aead interface supports it - ASYM: add PKCS1 tests - AIO: add ASYM AIO support - AIO: fix AEAD AIO fallback - AIO: add AIO fallback testing - replace enforcement of symmetric cipher limits with a log message only (the underlying kernel implementations should catch any errors) - add fuzzing tests - use autotools build system as provided by Georges Savoundararadj with additional considerations from Marcin Nowakowski (thanks a lot) - ALG_MAX_PAGES restriction is gone with current AF_ALG interface - add HKDF (RFC5869) - add apps/kcapi-rng - add support for multiple accepts where the caller maintains the opfd - fix memleak in error case in PBKDF - add multithreaded symmetric cipher tests - enable full AIO support for kernels 4.13 and higher (fallback AIO implementation using synchronous support for earlier kernels) -- this is due to the broken AIO support for earlier kernels - Add tests for the AAD copy operation to be supported for kernel 4.13 - dropped libkcapi-use-external-fipshmac.patch (done differently in upstream) - dropped reproduciblesort.patch (done differently upstream) - dropped reproducibledate.patch: merged upstream - libkcapi.keyring imported * Thu Dec 05 2019 Martin Liška <[email protected]> - Use %make_build and respect %optflags. * Fri Sep 27 2019 Stefan Brüns <[email protected]> - Remove docbook-utils BuildRequires, xmlto is sufficient - Spec file cleanup, use license macro, drop defattr, drop BuildRoot * Wed Jul 12 2017 [email protected] - Change the signing to use openssl sha256/sha512 directly, to avoid fipscheck / hmaccalc. * Sat Jul 08 2017 [email protected] - Add reproduciblesort.patch to always link .o files in the same order and - Add reproducibledate.patch to not add current time to man-pages to fix build-compare
/usr/include/kcapi.h /usr/lib64/.libkcapi.so.hmac /usr/lib64/libkcapi.so /usr/lib64/pkgconfig/libkcapi.pc /usr/share/man/man3/kcapi_aead_authsize.3.gz /usr/share/man/man3/kcapi_aead_blocksize.3.gz /usr/share/man/man3/kcapi_aead_ccm_nonce_to_iv.3.gz /usr/share/man/man3/kcapi_aead_decrypt.3.gz /usr/share/man/man3/kcapi_aead_decrypt_aio.3.gz /usr/share/man/man3/kcapi_aead_destroy.3.gz /usr/share/man/man3/kcapi_aead_encrypt.3.gz /usr/share/man/man3/kcapi_aead_encrypt_aio.3.gz /usr/share/man/man3/kcapi_aead_getdata_input.3.gz /usr/share/man/man3/kcapi_aead_getdata_output.3.gz /usr/share/man/man3/kcapi_aead_inbuflen_dec.3.gz /usr/share/man/man3/kcapi_aead_inbuflen_enc.3.gz /usr/share/man/man3/kcapi_aead_init.3.gz /usr/share/man/man3/kcapi_aead_ivsize.3.gz /usr/share/man/man3/kcapi_aead_outbuflen_dec.3.gz /usr/share/man/man3/kcapi_aead_outbuflen_enc.3.gz /usr/share/man/man3/kcapi_aead_setassoclen.3.gz /usr/share/man/man3/kcapi_aead_setkey.3.gz /usr/share/man/man3/kcapi_aead_settaglen.3.gz /usr/share/man/man3/kcapi_aead_stream_init_dec.3.gz /usr/share/man/man3/kcapi_aead_stream_init_enc.3.gz /usr/share/man/man3/kcapi_aead_stream_op.3.gz /usr/share/man/man3/kcapi_aead_stream_update.3.gz /usr/share/man/man3/kcapi_aead_stream_update_last.3.gz /usr/share/man/man3/kcapi_akcipher_decrypt.3.gz /usr/share/man/man3/kcapi_akcipher_decrypt_aio.3.gz /usr/share/man/man3/kcapi_akcipher_destroy.3.gz /usr/share/man/man3/kcapi_akcipher_encrypt.3.gz /usr/share/man/man3/kcapi_akcipher_encrypt_aio.3.gz /usr/share/man/man3/kcapi_akcipher_init.3.gz /usr/share/man/man3/kcapi_akcipher_setkey.3.gz /usr/share/man/man3/kcapi_akcipher_setpubkey.3.gz /usr/share/man/man3/kcapi_akcipher_sign.3.gz /usr/share/man/man3/kcapi_akcipher_sign_aio.3.gz /usr/share/man/man3/kcapi_akcipher_stream_init_dec.3.gz /usr/share/man/man3/kcapi_akcipher_stream_init_enc.3.gz /usr/share/man/man3/kcapi_akcipher_stream_init_sgn.3.gz /usr/share/man/man3/kcapi_akcipher_stream_init_vfy.3.gz /usr/share/man/man3/kcapi_akcipher_stream_op.3.gz /usr/share/man/man3/kcapi_akcipher_stream_update.3.gz /usr/share/man/man3/kcapi_akcipher_verify.3.gz /usr/share/man/man3/kcapi_akcipher_verify_aio.3.gz /usr/share/man/man3/kcapi_cipher_blocksize.3.gz /usr/share/man/man3/kcapi_cipher_dec_aes_cbc.3.gz /usr/share/man/man3/kcapi_cipher_dec_aes_ctr.3.gz /usr/share/man/man3/kcapi_cipher_dec_sm4_cbc.3.gz /usr/share/man/man3/kcapi_cipher_dec_sm4_ctr.3.gz /usr/share/man/man3/kcapi_cipher_decrypt.3.gz /usr/share/man/man3/kcapi_cipher_decrypt_aio.3.gz /usr/share/man/man3/kcapi_cipher_destroy.3.gz /usr/share/man/man3/kcapi_cipher_enc_aes_cbc.3.gz /usr/share/man/man3/kcapi_cipher_enc_aes_ctr.3.gz /usr/share/man/man3/kcapi_cipher_enc_sm4_cbc.3.gz /usr/share/man/man3/kcapi_cipher_enc_sm4_ctr.3.gz /usr/share/man/man3/kcapi_cipher_encrypt.3.gz /usr/share/man/man3/kcapi_cipher_encrypt_aio.3.gz /usr/share/man/man3/kcapi_cipher_init.3.gz /usr/share/man/man3/kcapi_cipher_ivsize.3.gz /usr/share/man/man3/kcapi_cipher_setkey.3.gz /usr/share/man/man3/kcapi_cipher_stream_init_dec.3.gz /usr/share/man/man3/kcapi_cipher_stream_init_enc.3.gz /usr/share/man/man3/kcapi_cipher_stream_op.3.gz /usr/share/man/man3/kcapi_cipher_stream_update.3.gz /usr/share/man/man3/kcapi_cipher_stream_update_last.3.gz /usr/share/man/man3/kcapi_get_maxsplicesize.3.gz /usr/share/man/man3/kcapi_handle_reinit.3.gz /usr/share/man/man3/kcapi_hkdf.3.gz /usr/share/man/man3/kcapi_kdf_ctr.3.gz /usr/share/man/man3/kcapi_kdf_dpi.3.gz /usr/share/man/man3/kcapi_kdf_fb.3.gz /usr/share/man/man3/kcapi_kpp_destroy.3.gz /usr/share/man/man3/kcapi_kpp_dh_setparam_pkcs3.3.gz /usr/share/man/man3/kcapi_kpp_ecdh_setcurve.3.gz /usr/share/man/man3/kcapi_kpp_init.3.gz /usr/share/man/man3/kcapi_kpp_keygen.3.gz /usr/share/man/man3/kcapi_kpp_keygen_aio.3.gz /usr/share/man/man3/kcapi_kpp_setkey.3.gz /usr/share/man/man3/kcapi_kpp_ssgen.3.gz /usr/share/man/man3/kcapi_kpp_ssgen_aio.3.gz /usr/share/man/man3/kcapi_md_destroy.3.gz /usr/share/man/man3/kcapi_md_digest.3.gz /usr/share/man/man3/kcapi_md_digestsize.3.gz /usr/share/man/man3/kcapi_md_final.3.gz /usr/share/man/man3/kcapi_md_hmac_sha1.3.gz /usr/share/man/man3/kcapi_md_hmac_sha224.3.gz /usr/share/man/man3/kcapi_md_hmac_sha256.3.gz /usr/share/man/man3/kcapi_md_hmac_sha384.3.gz /usr/share/man/man3/kcapi_md_hmac_sha512.3.gz /usr/share/man/man3/kcapi_md_hmac_sm3.3.gz /usr/share/man/man3/kcapi_md_init.3.gz /usr/share/man/man3/kcapi_md_setkey.3.gz /usr/share/man/man3/kcapi_md_sha1.3.gz /usr/share/man/man3/kcapi_md_sha224.3.gz /usr/share/man/man3/kcapi_md_sha256.3.gz /usr/share/man/man3/kcapi_md_sha384.3.gz /usr/share/man/man3/kcapi_md_sha512.3.gz /usr/share/man/man3/kcapi_md_sm3.3.gz /usr/share/man/man3/kcapi_md_update.3.gz /usr/share/man/man3/kcapi_memset_secure.3.gz /usr/share/man/man3/kcapi_pad_iv.3.gz /usr/share/man/man3/kcapi_pbkdf.3.gz /usr/share/man/man3/kcapi_pbkdf_iteration_count.3.gz /usr/share/man/man3/kcapi_rng_destroy.3.gz /usr/share/man/man3/kcapi_rng_generate.3.gz /usr/share/man/man3/kcapi_rng_get_bytes.3.gz /usr/share/man/man3/kcapi_rng_init.3.gz /usr/share/man/man3/kcapi_rng_seed.3.gz /usr/share/man/man3/kcapi_rng_seedsize.3.gz /usr/share/man/man3/kcapi_set_maxsplicesize.3.gz /usr/share/man/man3/kcapi_set_verbosity.3.gz /usr/share/man/man3/kcapi_version.3.gz /usr/share/man/man3/kcapi_versionstring.3.gz
Generated by rpm2html 1.8.1
Fabrice Bellet, Wed Dec 4 00:10:59 2024