They're not exposed via PF_KEY so I assume they were used directly via /dev/crypto. There's no code that uses them and by now no new code should.
OK? Index: sys/crypto/cryptodev.h =================================================================== RCS file: /cvs/src/sys/crypto/cryptodev.h,v retrieving revision 1.64 diff -u -p -r1.64 cryptodev.h --- sys/crypto/cryptodev.h 12 Nov 2015 16:57:00 -0000 1.64 +++ sys/crypto/cryptodev.h 12 Nov 2015 17:06:42 -0000 @@ -93,25 +93,23 @@ #define CRYPTO_RIJNDAEL128_CBC 11 /* 128 bit blocksize */ #define CRYPTO_AES_CBC 11 /* 128 bit blocksize -- the same as above */ #define CRYPTO_ARC4 12 -#define CRYPTO_MD5 13 -#define CRYPTO_SHA1 14 -#define CRYPTO_DEFLATE_COMP 15 /* Deflate compression algorithm */ -#define CRYPTO_NULL 16 -#define CRYPTO_LZS_COMP 17 /* LZS compression algorithm */ -#define CRYPTO_SHA2_256_HMAC 18 -#define CRYPTO_SHA2_384_HMAC 19 -#define CRYPTO_SHA2_512_HMAC 20 -#define CRYPTO_AES_CTR 21 -#define CRYPTO_AES_XTS 22 -#define CRYPTO_AES_GCM_16 23 -#define CRYPTO_AES_128_GMAC 24 -#define CRYPTO_AES_192_GMAC 25 -#define CRYPTO_AES_256_GMAC 26 -#define CRYPTO_AES_GMAC 27 -#define CRYPTO_CHACHA20_POLY1305 28 -#define CRYPTO_CHACHA20_POLY1305_MAC 29 -#define CRYPTO_ESN 30 /* Support for Extended Sequence Numbers */ -#define CRYPTO_ALGORITHM_MAX 30 /* Keep updated */ +#define CRYPTO_DEFLATE_COMP 13 /* Deflate compression algorithm */ +#define CRYPTO_NULL 14 +#define CRYPTO_LZS_COMP 15 /* LZS compression algorithm */ +#define CRYPTO_SHA2_256_HMAC 16 +#define CRYPTO_SHA2_384_HMAC 17 +#define CRYPTO_SHA2_512_HMAC 18 +#define CRYPTO_AES_CTR 19 +#define CRYPTO_AES_XTS 20 +#define CRYPTO_AES_GCM_16 21 +#define CRYPTO_AES_128_GMAC 22 +#define CRYPTO_AES_192_GMAC 23 +#define CRYPTO_AES_256_GMAC 24 +#define CRYPTO_AES_GMAC 25 +#define CRYPTO_CHACHA20_POLY1305 26 +#define CRYPTO_CHACHA20_POLY1305_MAC 27 +#define CRYPTO_ESN 28 /* Support for Extended Sequence Numbers */ +#define CRYPTO_ALGORITHM_MAX 28 /* Keep updated */ /* Algorithm flags */ #define CRYPTO_ALG_FLAG_SUPPORTED 0x01 /* Algorithm is supported */ Index: sys/crypto/cryptosoft.c =================================================================== RCS file: /cvs/src/sys/crypto/cryptosoft.c,v retrieving revision 1.77 diff -u -p -r1.77 cryptosoft.c --- sys/crypto/cryptosoft.c 12 Nov 2015 16:57:00 -0000 1.77 +++ sys/crypto/cryptosoft.c 12 Nov 2015 17:06:43 -0000 @@ -463,11 +463,6 @@ swcr_authcompute(struct cryptop *crp, st axf->Update(&ctx, aalg, axf->hashsize); axf->Final(aalg, &ctx); break; - - case CRYPTO_MD5: - case CRYPTO_SHA1: - axf->Final(aalg, &ctx); - break; } /* Inject the authentication data */ @@ -900,24 +895,6 @@ swcr_newsession(u_int32_t *sid, struct c (*swd)->sw_axf = axf; break; - case CRYPTO_MD5: - axf = &auth_hash_md5; - goto auth3common; - - case CRYPTO_SHA1: - axf = &auth_hash_sha1; - auth3common: - (*swd)->sw_ictx = malloc(axf->ctxsize, M_CRYPTO_DATA, - M_NOWAIT); - if ((*swd)->sw_ictx == NULL) { - swcr_freesession(i); - return ENOBUFS; - } - - axf->Init((*swd)->sw_ictx); - (*swd)->sw_axf = axf; - break; - case CRYPTO_AES_128_GMAC: axf = &auth_hash_gmac_aes_128; goto auth4common; @@ -1028,8 +1005,6 @@ swcr_freesession(u_int64_t tid) case CRYPTO_AES_192_GMAC: case CRYPTO_AES_256_GMAC: case CRYPTO_CHACHA20_POLY1305_MAC: - case CRYPTO_MD5: - case CRYPTO_SHA1: axf = swd->sw_axf; if (swd->sw_ictx) { @@ -1118,8 +1093,6 @@ swcr_process(struct cryptop *crp) case CRYPTO_SHA2_256_HMAC: case CRYPTO_SHA2_384_HMAC: case CRYPTO_SHA2_512_HMAC: - case CRYPTO_MD5: - case CRYPTO_SHA1: if ((crp->crp_etype = swcr_authcompute(crp, crd, sw, crp->crp_buf, type)) != 0) goto done; @@ -1179,8 +1152,6 @@ swcr_init(void) algs[CRYPTO_MD5_HMAC] = CRYPTO_ALG_FLAG_SUPPORTED; algs[CRYPTO_SHA1_HMAC] = CRYPTO_ALG_FLAG_SUPPORTED; algs[CRYPTO_RIPEMD160_HMAC] = CRYPTO_ALG_FLAG_SUPPORTED; - algs[CRYPTO_MD5] = CRYPTO_ALG_FLAG_SUPPORTED; - algs[CRYPTO_SHA1] = CRYPTO_ALG_FLAG_SUPPORTED; algs[CRYPTO_RIJNDAEL128_CBC] = CRYPTO_ALG_FLAG_SUPPORTED; algs[CRYPTO_AES_CTR] = CRYPTO_ALG_FLAG_SUPPORTED; algs[CRYPTO_AES_XTS] = CRYPTO_ALG_FLAG_SUPPORTED; Index: sys/crypto/xform.c =================================================================== RCS file: /cvs/src/sys/crypto/xform.c,v retrieving revision 1.51 diff -u -p -r1.51 xform.c --- sys/crypto/xform.c 7 Nov 2015 17:46:49 -0000 1.51 +++ sys/crypto/xform.c 12 Nov 2015 17:06:43 -0000 @@ -329,22 +329,6 @@ struct auth_hash auth_hash_chacha20_poly Chacha20_Poly1305_Final }; -struct auth_hash auth_hash_md5 = { - CRYPTO_MD5, "MD5", - 0, 16, 16, sizeof(MD5_CTX), 0, - (void (*) (void *)) MD5Init, NULL, NULL, - MD5Update_int, - (void (*) (u_int8_t *, void *)) MD5Final -}; - -struct auth_hash auth_hash_sha1 = { - CRYPTO_SHA1, "SHA1", - 0, 20, 20, sizeof(SHA1_CTX), 0, - (void (*)(void *)) SHA1Init, NULL, NULL, - SHA1Update_int, - (void (*)(u_int8_t *, void *)) SHA1Final -}; - /* Compression instance */ struct comp_algo comp_algo_deflate = { CRYPTO_DEFLATE_COMP, "Deflate", Index: sys/crypto/xform.h =================================================================== RCS file: /cvs/src/sys/crypto/xform.h,v retrieving revision 1.25 diff -u -p -r1.25 xform.h --- sys/crypto/xform.h 3 Nov 2015 01:31:36 -0000 1.25 +++ sys/crypto/xform.h 12 Nov 2015 17:06:43 -0000 @@ -89,8 +89,6 @@ extern struct enc_xform enc_xform_chacha extern struct enc_xform enc_xform_arc4; extern struct enc_xform enc_xform_null; -extern struct auth_hash auth_hash_md5; -extern struct auth_hash auth_hash_sha1; extern struct auth_hash auth_hash_hmac_md5_96; extern struct auth_hash auth_hash_hmac_sha1_96; extern struct auth_hash auth_hash_hmac_ripemd_160_96; Index: sys/dev/pci/hifn7751.c =================================================================== RCS file: /cvs/src/sys/dev/pci/hifn7751.c,v retrieving revision 1.171 diff -u -p -r1.171 hifn7751.c --- sys/dev/pci/hifn7751.c 10 Sep 2015 18:10:34 -0000 1.171 +++ sys/dev/pci/hifn7751.c 12 Nov 2015 17:06:44 -0000 @@ -294,8 +294,6 @@ hifn_attach(struct device *parent, struc algs[CRYPTO_ARC4] = CRYPTO_ALG_FLAG_SUPPORTED; /*FALLTHROUGH*/ case HIFN_PUSTAT_ENA_1: - algs[CRYPTO_MD5] = CRYPTO_ALG_FLAG_SUPPORTED; - algs[CRYPTO_SHA1] = CRYPTO_ALG_FLAG_SUPPORTED; algs[CRYPTO_MD5_HMAC] = CRYPTO_ALG_FLAG_SUPPORTED; algs[CRYPTO_SHA1_HMAC] = CRYPTO_ALG_FLAG_SUPPORTED; algs[CRYPTO_DES_CBC] = CRYPTO_ALG_FLAG_SUPPORTED; @@ -1863,8 +1861,6 @@ hifn_newsession(u_int32_t *sidp, struct for (c = cri; c != NULL; c = c->cri_next) { switch (c->cri_alg) { - case CRYPTO_MD5: - case CRYPTO_SHA1: case CRYPTO_MD5_HMAC: case CRYPTO_SHA1_HMAC: if (mac) @@ -1986,9 +1982,7 @@ hifn_process(struct cryptop *crp) if (crd2 == NULL) { if (crd1->crd_alg == CRYPTO_MD5_HMAC || - crd1->crd_alg == CRYPTO_SHA1_HMAC || - crd1->crd_alg == CRYPTO_SHA1 || - crd1->crd_alg == CRYPTO_MD5) { + crd1->crd_alg == CRYPTO_SHA1_HMAC) { maccrd = crd1; enccrd = NULL; } else if (crd1->crd_alg == CRYPTO_DES_CBC || @@ -2007,9 +2001,7 @@ hifn_process(struct cryptop *crp) } } else { if ((crd1->crd_alg == CRYPTO_MD5_HMAC || - crd1->crd_alg == CRYPTO_SHA1_HMAC || - crd1->crd_alg == CRYPTO_MD5 || - crd1->crd_alg == CRYPTO_SHA1) && + crd1->crd_alg == CRYPTO_SHA1_HMAC) && (crd2->crd_alg == CRYPTO_DES_CBC || crd2->crd_alg == CRYPTO_3DES_CBC || crd2->crd_alg == CRYPTO_AES_CBC || @@ -2023,9 +2015,7 @@ hifn_process(struct cryptop *crp) crd1->crd_alg == CRYPTO_AES_CBC || crd1->crd_alg == CRYPTO_3DES_CBC) && (crd2->crd_alg == CRYPTO_MD5_HMAC || - crd2->crd_alg == CRYPTO_SHA1_HMAC || - crd2->crd_alg == CRYPTO_MD5 || - crd2->crd_alg == CRYPTO_SHA1) && + crd2->crd_alg == CRYPTO_SHA1_HMAC) && (crd1->crd_flags & CRD_F_ENCRYPT)) { enccrd = crd1; maccrd = crd2; @@ -2132,21 +2122,11 @@ hifn_process(struct cryptop *crp) cmd->base_masks |= HIFN_BASE_CMD_MAC; switch (maccrd->crd_alg) { - case CRYPTO_MD5: - cmd->mac_masks |= HIFN_MAC_CMD_ALG_MD5 | - HIFN_MAC_CMD_RESULT | HIFN_MAC_CMD_MODE_HASH | - HIFN_MAC_CMD_POS_IPSEC; - break; case CRYPTO_MD5_HMAC: cmd->mac_masks |= HIFN_MAC_CMD_ALG_MD5 | HIFN_MAC_CMD_RESULT | HIFN_MAC_CMD_MODE_HMAC | HIFN_MAC_CMD_POS_IPSEC | HIFN_MAC_CMD_TRUNC; break; - case CRYPTO_SHA1: - cmd->mac_masks |= HIFN_MAC_CMD_ALG_SHA1 | - HIFN_MAC_CMD_RESULT | HIFN_MAC_CMD_MODE_HASH | - HIFN_MAC_CMD_POS_IPSEC; - break; case CRYPTO_SHA1_HMAC: cmd->mac_masks |= HIFN_MAC_CMD_ALG_SHA1 | HIFN_MAC_CMD_RESULT | HIFN_MAC_CMD_MODE_HMAC | @@ -2338,11 +2318,7 @@ hifn_callback(struct hifn_softc *sc, str for (crd = crp->crp_desc; crd; crd = crd->crd_next) { int len; - if (crd->crd_alg == CRYPTO_MD5) - len = 16; - else if (crd->crd_alg == CRYPTO_SHA1) - len = 20; - else if (crd->crd_alg == CRYPTO_MD5_HMAC || + if (crd->crd_alg == CRYPTO_MD5_HMAC || crd->crd_alg == CRYPTO_SHA1_HMAC) len = 12; else