summaryrefslogtreecommitdiffstats
path: root/sys/crypto
Commit message (Expand)AuthorAgeFilesLines
* Initialize T1 to silent gcc warning.kevlo2006-10-221-1/+1
* Less magic.pjd2006-09-151-2/+3
* GCC 3.4.6 gets confused on this file and produces bogus warning.kan2006-08-261-1/+1
* Remove trailing spaces.pjd2006-07-281-1/+1
* Use existing roundup2() macro.pjd2006-07-281-1/+1
* Remove redundant check committed by accident.pjd2006-07-251-2/+0
* Avoid memory allocations when the given address is already 16 bytes aligned.pjd2006-07-251-6/+51
* Modify PADLOCK_ALIGN() macro, so when the given address is already 16 bytespjd2006-07-251-1/+1
* Style fixes.pjd2006-07-254-10/+10
* Implement support for HMAC/SHA1 and HMAC/SHA256 acceleration found inpjd2006-07-224-335/+766
* Correct few bzero()s.pjd2006-07-221-3/+3
* Set ses_ictx and ses_octx to NULL after freeing them, so we won't freepjd2006-07-221-0/+2
* Use the already stored VIA RNG probe informationmr2006-07-131-16/+5
* Fix gratuitous compiler warning.pjd2006-06-081-1/+2
* - Pretend to accelerate various HMAC algorithms, so padlock(4) can be usedpjd2006-06-051-91/+266
* padlock(4) doesn't support explicitly provided keys yet.pjd2006-04-201-0/+4
* On padlock initialization, allocate memory with M_WAITOK.pjd2006-04-121-5/+1
* Add VIA/ACE "PadLock" support as a crypto(9) driver.pjd2005-08-181-0/+504
* Assert proper key size also in userland by defining KASSERT in !_KERNEL case.pjd2005-08-171-2/+2
* Unbreak the world build (in sbin/gbde). This file is used by bothcperciva2005-08-171-0/+2
* Check key size for rijndael, as invalid key size can lead to kernel panic.pjd2005-08-161-0/+2
* gbde(8) is also rejndael user.ume2005-03-111-2/+0
* just use crypto/rijndael, and nuke opencrypto/rindael.[ch].ume2005-03-111-5/+0
* integrate rijndael-alg-fst.h into rijndael.h.ume2005-03-115-44/+14
* stop including rijndael-api-fst.h from rijndael.h.ume2005-03-111-1/+0
* sys/crypto/md5.[ch] is used from nowhere. So, just nuke them.ume2005-03-112-382/+0
* refer opencrypto/cast.h directly.ume2005-03-111-17/+0
* use cast128 in opencrypto to nuke duplicate code.ume2005-03-103-811/+9
* Start the dreaded NOFOO -> NO_FOO conversion.ru2004-12-211-1/+1
* Initiate deorbit burn sequence for 80386 support in FreeBSD: Removejhb2004-11-161-1/+1
* For variables that are only checked with defined(), don't provideru2004-10-241-1/+1
* Use __FBSDID().obrien2004-06-143-3/+13
* Fix a reentrancy issue in md5_calc().des2004-01-271-4/+1
* avoid module name conflict with opencrypto/rijndael.c.ume2003-11-121-0/+0
* cleanup rijndael API.ume2003-11-112-1/+107
* rijndael-alg-fst.[ch]:ume2003-11-104-1634/+1332
* Add a testcase which validates that the same buffer can be passed tophk2003-10-192-0/+87
* - revert to old rijndael code. new rijndael code broke gbde.ume2003-10-194-1424/+1702
* Fix alignment problem on 64 bit arch.ume2003-10-141-0/+49
* use BF_ecb_encrypt().ume2003-10-132-2/+88
* simplify and update rijndael code.ume2003-10-126-1737/+1407
* use opencrypto for RMD160.ume2003-10-122-409/+0
* drop useless define.ume2003-10-121-3/+0
* use bswap32() for big endian arch.ume2003-10-121-1/+1
* RIPEMD160 supportume2003-10-122-0/+412
* switch cast128 implementation to implementation by Steve Reid;ume2003-10-104-1008/+790
* one more opossite conditiion.ume2003-09-181-1/+1
* condition of padLen check was opposite.ume2003-09-171-1/+1
* Correctly bzero the entire context, not just the first sizeof(void *) bytes.phk2003-09-081-6/+6
* Use __FBSDID().obrien2003-06-109-14/+30
OpenPOWER on IntegriCloud