summaryrefslogtreecommitdiff
path: root/sys/crypto
AgeCommit message (Expand)Author
2003-10-07arc4 support; ok millert@, fgsch@Markus Friedl
2003-09-23Replace select backends with poll backends. selscan() and pollscan()Todd C. Miller
2003-09-03zap context correctly, from Juergen Buchmueller <pullmoll at stop1984 dot com>Federico G. Schwindt
2003-08-14mirror change in mbufs: cuio_copyback's 4th arg is now const void *Jason Wright
2003-07-31pasto; lha@stacken.kth.seMarkus Friedl
2003-07-24increase ALG_MAX_RESULT_LEN to 64 bytes for sha2-512Markus Friedl
2003-07-24hmac-sha2-{256,384,512} support in AH/ESP auth. markus okJun-ichiro itojun Hagino
2003-06-10don't allow /dev/crypto to be opened ifndef CRYPTO (the thread hasn't beenJason Wright
2003-06-03license cleanup regarding term 4Theo de Raadt
2003-06-03Fastpath for userland crypto requests. This change makes userlandBob Beck
2003-05-30move max limit back down to 65536-4Jason Wright
2003-04-09makeing a local array static saves some bytes; idea from mickey@Markus Friedl
2003-02-21There's no cleaning necessary for deflate compression, so remove it fromJason Wright
2003-02-19Copy the ENTIRE table into the supported algorithms (how the hell did thisJason Wright
2003-02-19lzs is lzs, lzs is not deflateJason Wright
2003-02-15skeleton support for LZS compressionJason Wright
2003-02-15CRD_F_COMP isn't so special that it needs 4 bits for a binary flagJason Wright
2003-01-08Move the rounds into separate functions on sparc64 so gcc's optimizerTodd C. Miller
2002-11-21From Angelos:Jason Wright
2002-11-12Add a CRYPTO_NULL xform (it's a do nothing, but nice for measuring theJason Wright
2002-10-27Use int32_t rather long on strategic places, to be more sparc64-friendly;Miod Vallat
2002-08-16fix size in MALLOC/bzero call, from sam@errno.com, ok deraadt@Daniel Hartmeier
2002-07-17I don't know why this breaks things for me when sshd starts on sparc64.Artur Grabowski
2002-07-16Double-pass over drivers, first hardware only, then software (if weAngelos D. Keromytis
2002-07-16Fix a typo, cleanup on session migration code in crypto_invoke(), andAngelos D. Keromytis
2002-07-16Add CRYPTO_ALGORITHM_ALLAngelos D. Keromytis
2002-07-10proper cdev_decl(crypto) and no private protosMichael Shalayeff
2002-07-10use right sizeof in memcpy; markus okTheo de Raadt
2002-07-02inital -> initialNathan Binkert
2002-06-19ansiTheo de Raadt
2002-06-19re-enable both crypto operationsTheo de Raadt
2002-06-12looks slightly betterTheo de Raadt
2002-06-12undo 1.46; fixes double free (the keys are freed on session close).Markus Friedl
2002-06-12so let us analyse the development process here:Theo de Raadt
2002-06-11kernel changes to make asymmetric crypto work in userlandBob Beck
2002-06-10fix ivory tower greek fix. ok angelos@Bob Beck
2002-06-10You should always free the keys, not just on error --- the cryptoAngelos D. Keromytis
2002-06-10__FUNCTION__ -> __func__Marc Espie
2002-06-09Don't use an int for the flags, when the structure usesAngelos D. Keromytis
2002-06-07Handle csecreate errors. deraadt@ and beck@Thomas Nordin
2002-05-18not ready to export fcrypt to userland yet; spotted by lebelTheo de Raadt
2002-05-18export struct fcrypt to userlandTheo de Raadt
2002-05-08Don't deref null pointer in failure case.Jason Wright
2002-04-2732 bit constraint is wrong, we thinkTheo de Raadt
2002-04-26minor tweaksTheo de Raadt
2002-04-26disable cryptodevallowsoft again; constrain key bit sizes to % 32cryptodev.cTheo de Raadt
2002-04-24kernel API does not need the userland addresses, make them go awayTheo de Raadt
2002-04-23initial hack at a CIOCSYMFEAT ioctlTheo de Raadt
2002-04-23driver queueing & callback code for keying operationsTheo de Raadt
2002-04-22KNFTheo de Raadt