summaryrefslogtreecommitdiff
path: root/sys/crypto
AgeCommit message (Expand)Author
2012-12-11Bring back a small copy optimization in the aes-gcm handling:Mike Belopuhov
2012-12-07RFC 4106, Section 5 states that the SPI and a 64-bit SequenceMike Belopuhov
2012-12-07Fix one of the two issues with ESN support in the GCM case:Mike Belopuhov
2012-12-05Remove excessive sys/cdefs.h inclusionTheo de Raadt
2012-10-28We need to allocate memory for crp_buf in the DMA accessibleMike Belopuhov
2012-10-04Clean up uninitialized warnings from cryptosoft and aesni.Christiano F. Haesbaert
2012-06-29Add support for the Extended (64-bit) Sequence Number as definedMike Belopuhov
2012-04-25Use explicit_bzero() for clearing key material.Matthew Dempsky
2012-04-22Add struct proc * argument to FRELE() and FILE_SET_MATURE() inPhilip Guenthe
2012-02-15Hold struct filedesc's fd_lock when writing to the fd_ofiles, fd_ofileflags,Philip Guenthe
2011-07-07empty files should be deletedTed Unangst
2011-07-07Replace the cruddy old sys/net/zlib.[ch]. We now use the sys/lib/libzTheo de Raadt
2011-01-12cleanup aes-ctr keystream after use; ok deraadtMike Belopuhov
2011-01-11fix encryption for uio_iovcnt > 1 by passing the absolute offset 'count'Markus Friedl
2011-01-11key lengths are counted in bitsTheo de Raadt
2011-01-11add explicit_bzero() calls before free()ing key materialTheo de Raadt
2011-01-11in SHA1Final(), explicitly clear the local bufferTheo de Raadt
2011-01-11accidental commit of a pending diff relating to something elseTheo de Raadt
2011-01-11in AES_GMAC_Final(), explicitly clear the local bufferTheo de Raadt
2011-01-11for key material that is being being discarded, convert bzero() toTheo de Raadt
2010-12-22use the do {} while construct in the copying macrosTheo de Raadt
2010-12-21remove dead code (ivp did always point to iv in the decrypt path).Markus Friedl
2010-12-16move CRYPTO_VIAC3_MAX out of cryptodev.h and into the onlyJonathan Gray
2010-12-16The VIA ciphers are added to an array of CRYPTO_ALGORITHM_MAX lengthJonathan Gray
2010-12-14disable access to the crypto(4) device from userland; ok deraadtMike Belopuhov
2010-11-08use a well established define instead of rolling our own; no binary changeMike Belopuhov
2010-10-06Retire SkipjackMike Belopuhov
2010-10-06zero out auth hash context before freeing it; ok matthew millertMike Belopuhov
2010-09-22OCF support for the Galois/Counter Mode (GCM) for AES asMike Belopuhov
2010-09-08Reintroduce most crypto/crypto.c r1.55:Joel Sing
2010-08-08Backout r1.55 since this breaks anything which does crypto ops prior toJoel Sing
2010-07-21No need for read/write functions, just use enodev like all the otherTheo de Raadt
2010-07-20Switch some obvious network stack MAC comparisons from bcmp() toMatthew Dempsky
2010-07-20Mark a DMA accessible malloc for later correction. This isMatthew Dempsky
2010-07-08Revert part of previous.Thordur I. Bjornsson
2010-07-08Move pool initialization to init_crypto and zap the crypto_pool_initializedThordur I. Bjornsson
2010-07-02m_copyback can fail to allocate memory, but is a void fucntion so gymnasticsBret Lambert
2010-06-23Zap a dead prototype, crypto_thread(); Leftover since crypto wasThordur I. Bjornsson
2010-06-09Remove the CRYPTO_ALGORITHM_ALL define, fixup accordinglyThordur I. Bjornsson
2010-04-20remove proc.h include from uvm_map.h. This has far reaching effects, asTed Unangst
2010-01-10Fix two bugs in IPsec/HMAC-SHA2:Markus Friedl
2009-09-03crypto hardware (eg, hifn) establishes its interrupt handler atDavid Gwynne
2009-08-17sizeof(ptr) -> sizeof(*ptr) as intended; ok djm@ millert@Miod Vallat
2009-07-05Buffer in RMD160_CTX is length RMD160_BLOCK_LENGTH not RMD160_DIGEST_LENGTH.Todd C. Miller
2009-02-17variable no longer usedTheo de Raadt
2009-02-17The loop here preparing the uio always added the length of the firstOwain Ainsworth
2008-11-04Use defines for constants. Use __attribute__ bounded.Hans-Joerg Hoexer
2008-10-30reintroduce mutexes to workqs for locking.David Gwynne
2008-09-06match libc sha2(3) API changes for kernel; ok millert@Damien Miller
2008-08-12Implementation of the HMAC-MD5, HMAC-SHA1, HMAC-SHA256, AES-128-CMACDamien Bergamini