summaryrefslogtreecommitdiff
path: root/sys/crypto/xform.h
AgeCommit message (Collapse)Author
2004-12-20Allow the setkey function of a transform to fail, eg. when an insufficientHans-Joerg Hoexer
number of key bits is supplied. Only AES and DES/3DES might fail. ok and help markus@
2004-05-07Replace RSA-derived md5 code with code derived from Colin Plumb's PD version.Todd C. Miller
This moves md5.c out of libkern and into sys/crypto where it belongs (as requested by markus@). Note that md5.c is still mandatory (dev/rnd.c uses it). Verified with IPsec + hmac-md5 and tcp md5sig. OK henning@ and hshoexer@
2003-07-24hmac-sha2-{256,384,512} support in AH/ESP auth. markus okJun-ichiro itojun Hagino
2003-02-15skeleton support for LZS compressionJason Wright
2002-11-12Add a CRYPTO_NULL xform (it's a do nothing, but nice for measuring theJason Wright
bandwidth of the kernel API). It's only available from userland and then only if kern.cryptodevallowsoft=1.
2002-04-22KNFTheo de Raadt
2002-02-24license repair, angelos okTheo de Raadt
2001-08-28Getting closer to working userland MAC.ben
2001-08-17Add RC4 support.ben
2001-07-05Compression support for IPComp. Include files only. angelos@ ok.Jean-Jacques Bernard-Gundol
2001-06-16KNFTheo de Raadt
2001-06-13ivmask has been deprecated.Angelos D. Keromytis
2001-05-13copyrights and $OpenBSD$ tagsJason Wright
2000-06-18Add Rijndael (128-bit blocksize) in the software crypto driver.Angelos D. Keromytis
Hacking at OpenBSD Crypto 2000 :-)
2000-03-17Cryptographic services framework, and software "device driver". TheAngelos D. Keromytis
idea is to support various cryptographic hardware accelerators (which may be (detachable) cards, secondary/tertiary/etc processors, software crypto, etc). Supports session migration between crypto devices. What it doesn't (yet) support: - multiple instances of the same algorithm used in the same session - use of multiple crypto drivers in the same session - asymmetric crypto No support for a userland device yet. IPsec code path modified to allow for asynchronous cryptography (callbacks used in both input and output processing). Some unrelated code simplification done in the process (especially for AH). Development of this code kindly supported by Network Security Technologies (NSTI). The code was writen mostly in Greece, and is being committed from Montreal.