<feed xmlns='http://www.w3.org/2005/Atom'>
<title>wireguard-openbsd/sys/crypto, branch jd/simplify-queueing</title>
<subtitle>WireGuard implementation for the OpenBSD kernel</subtitle>
<id>https://git.zx2c4.com/wireguard-openbsd/atom/sys/crypto?h=jd%2Fsimplify-queueing</id>
<link rel='self' href='https://git.zx2c4.com/wireguard-openbsd/atom/sys/crypto?h=jd%2Fsimplify-queueing'/>
<link rel='alternate' type='text/html' href='https://git.zx2c4.com/wireguard-openbsd/'/>
<updated>2020-06-21T10:50:01Z</updated>
<entry>
<title>add constructions for wireguard.</title>
<updated>2020-06-21T10:50:01Z</updated>
<author>
<name>dlg</name>
<email>dlg@openbsd.org</email>
</author>
<published>2020-06-21T10:50:01Z</published>
<link rel='alternate' type='text/html' href='https://git.zx2c4.com/wireguard-openbsd/commit/?id=76a075be08bd0affc816a095146a46cacfd345e7'/>
<id>urn:sha1:76a075be08bd0affc816a095146a46cacfd345e7</id>
<content type='text'>
from Matt Dunwoodie and Jason A. Donenfeld

ok deraadt@
</content>
</entry>
<entry>
<title>add hchacha20 for wireguard.</title>
<updated>2020-06-21T10:46:49Z</updated>
<author>
<name>dlg</name>
<email>dlg@openbsd.org</email>
</author>
<published>2020-06-21T10:46:49Z</published>
<link rel='alternate' type='text/html' href='https://git.zx2c4.com/wireguard-openbsd/commit/?id=09a3dd53443e850ce90c366150fff3c420b2cc57'/>
<id>urn:sha1:09a3dd53443e850ce90c366150fff3c420b2cc57</id>
<content type='text'>
i think we should turn the chacha code into an actual c file at
some point to reduce duplication of object code, but that can happen
later.

from Matt Dunwoodie and Jason A. Donenfeld

ok deraadt@
</content>
</entry>
<entry>
<title>curve25519 for wireguard.</title>
<updated>2020-06-21T10:43:37Z</updated>
<author>
<name>dlg</name>
<email>dlg@openbsd.org</email>
</author>
<published>2020-06-21T10:43:37Z</published>
<link rel='alternate' type='text/html' href='https://git.zx2c4.com/wireguard-openbsd/commit/?id=2df0987dc7644d0c188262d2fe2e5f1a843c9ee0'/>
<id>urn:sha1:2df0987dc7644d0c188262d2fe2e5f1a843c9ee0</id>
<content type='text'>
via Matt Dunwoodie and Jason A. Donenfeld

ok deraadt@
</content>
</entry>
<entry>
<title>add blake2s for wireguard.</title>
<updated>2020-06-21T10:34:37Z</updated>
<author>
<name>dlg</name>
<email>dlg@openbsd.org</email>
</author>
<published>2020-06-21T10:34:37Z</published>
<link rel='alternate' type='text/html' href='https://git.zx2c4.com/wireguard-openbsd/commit/?id=9960953d15a1d2b1e5b61b541dba13adcff15f1d'/>
<id>urn:sha1:9960953d15a1d2b1e5b61b541dba13adcff15f1d</id>
<content type='text'>
via Matt Dunwoodie and Jason A. Donenfeld

ok deraadt@
</content>
</entry>
<entry>
<title>rndvar.h not needed here</title>
<updated>2020-05-29T01:22:53Z</updated>
<author>
<name>deraadt</name>
<email>deraadt@openbsd.org</email>
</author>
<published>2020-05-29T01:22:53Z</published>
<link rel='alternate' type='text/html' href='https://git.zx2c4.com/wireguard-openbsd/commit/?id=416e7f624d7c7e736f2321f05d8daf48d6111744'/>
<id>urn:sha1:416e7f624d7c7e736f2321f05d8daf48d6111744</id>
<content type='text'>
</content>
</entry>
<entry>
<title>idgen32(9): use time_uptime(9) for rekey timestamps, not time_second(9)</title>
<updated>2020-04-15T03:56:14Z</updated>
<author>
<name>cheloha</name>
<email>cheloha@openbsd.org</email>
</author>
<published>2020-04-15T03:56:14Z</published>
<link rel='alternate' type='text/html' href='https://git.zx2c4.com/wireguard-openbsd/commit/?id=14a8f15fd61273b1fbf3096a20c525920b20a4cd'/>
<id>urn:sha1:14a8f15fd61273b1fbf3096a20c525920b20a4cd</id>
<content type='text'>
Timestamp contexts with a monotonic clock.  time_second(9) can jump,
stretching or truncating our rekey interval.  time_uptime(9) will not
jump around.

ok djm@
</content>
</entry>
<entry>
<title>Break crypto_unregister() sanity check into two expressions, making it</title>
<updated>2020-03-30T17:48:39Z</updated>
<author>
<name>krw</name>
<email>krw@openbsd.org</email>
</author>
<published>2020-03-30T17:48:39Z</published>
<link rel='alternate' type='text/html' href='https://git.zx2c4.com/wireguard-openbsd/commit/?id=cbf8475b9318827d4174f247f210e07ba24f7ac2'/>
<id>urn:sha1:cbf8475b9318827d4174f247f210e07ba24f7ac2</id>
<content type='text'>
clearer what is being checked.

Original suggestion from kettenis@.
</content>
</entry>
<entry>
<title>Don't access past end of cc_alg[] when trying to avoid</title>
<updated>2020-03-29T13:43:13Z</updated>
<author>
<name>krw</name>
<email>krw@openbsd.org</email>
</author>
<published>2020-03-29T13:43:13Z</published>
<link rel='alternate' type='text/html' href='https://git.zx2c4.com/wireguard-openbsd/commit/?id=fbb739eb267b044ccd8998fbc4cb30373da24eb6'/>
<id>urn:sha1:fbb739eb267b044ccd8998fbc4cb30373da24eb6</id>
<content type='text'>
unregistering an invalid algorithm.

CID 1453298

ok kettenis@ (with suggested improvements to come)
</content>
</entry>
<entry>
<title>free(9) sizes.</title>
<updated>2019-01-09T12:11:38Z</updated>
<author>
<name>mpi</name>
<email>mpi@openbsd.org</email>
</author>
<published>2019-01-09T12:11:38Z</published>
<link rel='alternate' type='text/html' href='https://git.zx2c4.com/wireguard-openbsd/commit/?id=319dd5c3f6a33d939bbe52127a8bb6f14d12b2cf'/>
<id>urn:sha1:319dd5c3f6a33d939bbe52127a8bb6f14d12b2cf</id>
<content type='text'>
ok visa@
</content>
</entry>
<entry>
<title>Add sizes for free().</title>
<updated>2018-05-31T19:40:58Z</updated>
<author>
<name>fcambus</name>
<email>fcambus@openbsd.org</email>
</author>
<published>2018-05-31T19:40:58Z</published>
<link rel='alternate' type='text/html' href='https://git.zx2c4.com/wireguard-openbsd/commit/?id=1b7e8b2d580c7dc14175566f83f7bf499d03ddf4'/>
<id>urn:sha1:1b7e8b2d580c7dc14175566f83f7bf499d03ddf4</id>
<content type='text'>
OK visa@
</content>
</entry>
</feed>
