summaryrefslogtreecommitdiffstats
path: root/sys/crypto
Commit message (Collapse)AuthorAgeFilesLines
* Fix gratuitous compiler warning.pjd2006-06-081-1/+2
| | | | Reported by: Rong-en Fan <grafan@gmail.com>
* - Pretend to accelerate various HMAC algorithms, so padlock(4) can be usedpjd2006-06-051-91/+266
| | | | | | | | with fast_ipsec(4) and geli(8) authentication (comming soon). If consumer requests only for HMAC algorithm (without encryption), return EINVAL. - Add support for the CRD_F_KEY_EXPLICIT flag, for both encryption and authentication.
* padlock(4) doesn't support explicitly provided keys yet.pjd2006-04-201-0/+4
| | | | Return an error instead of encrypting/decrypting data with a wrong key.
* On padlock initialization, allocate memory with M_WAITOK.pjd2006-04-121-5/+1
|
* Add VIA/ACE "PadLock" support as a crypto(9) driver.pjd2005-08-181-0/+504
| | | | | | HW donated by: Mike Tancsa <mike@sentex.net> Most of the code obtained from: OpenBSD MFC after: 3 days
* Assert proper key size also in userland by defining KASSERT in !_KERNEL case.pjd2005-08-171-2/+2
|
* Unbreak the world build (in sbin/gbde). This file is used by bothcperciva2005-08-171-0/+2
| | | | | | | kernel and world, so KASSERT() needs to be wrapped within an #ifdef _KERNEL / #endif pair. Reported by: krion, tinderbox
* Check key size for rijndael, as invalid key size can lead to kernel panic.pjd2005-08-161-0/+2
| | | | | | | | | It checked other algorithms against this bug and it seems they aren't affected. Reported by: Mike Tancsa <mike@sentex.net> PR: i386/84860 Reviewed by: phk, cperciva(x2)
* gbde(8) is also rejndael user.ume2005-03-111-2/+0
| | | | Reported by: phk
* just use crypto/rijndael, and nuke opencrypto/rindael.[ch].ume2005-03-111-5/+0
| | | | | | the two became almost identical since latest KAME merge. Discussed with: sam
* integrate rijndael-alg-fst.h into rijndael.h.ume2005-03-115-44/+14
|
* stop including rijndael-api-fst.h from rijndael.h.ume2005-03-111-1/+0
| | | | this is required to integrate opencrypto into crypto.
* sys/crypto/md5.[ch] is used from nowhere. So, just nuke them.ume2005-03-112-382/+0
|
* refer opencrypto/cast.h directly.ume2005-03-111-17/+0
|
* use cast128 in opencrypto to nuke duplicate code.ume2005-03-103-811/+9
|
* Start the dreaded NOFOO -> NO_FOO conversion.ru2004-12-211-1/+1
| | | | OK'ed by: core
* Initiate deorbit burn sequence for 80386 support in FreeBSD: Removejhb2004-11-161-1/+1
| | | | 80386 (I386_CPU) support from the kernel.
* For variables that are only checked with defined(), don't provideru2004-10-241-1/+1
| | | | any fake value.
* Use __FBSDID().obrien2004-06-143-3/+13
|
* Fix a reentrancy issue in md5_calc().des2004-01-271-4/+1
|
* avoid module name conflict with opencrypto/rijndael.c.ume2003-11-121-0/+0
| | | | Reported by: tinderbox
* cleanup rijndael API.ume2003-11-112-1/+107
| | | | | | | since there are naming conflicts with opencrypto, #define was added to rename functions intend to avoid conflicts. Obtained from: KAME
* rijndael-alg-fst.[ch]:ume2003-11-104-1634/+1332
| | | | | | | | | | | - redo updating. rijndael-api-fst.[ch]: - switch to use new low level rijndael api. - stop using u8, u16 and u32. - space cleanup. Tested by: gbde(8) and phk's test program
* Add a testcase which validates that the same buffer can be passed tophk2003-10-192-0/+87
| | | | | | | | | | rijndael_blockDecrypt() as both input and output. This property is important because inside rijndael we can get away with allocating just a 16 byte "work" buffer on the stack (which is very cheap), whereas the calling code would need to allocate the full sized buffer, and in all likelyhood would have to do so with an expensive malloc(9).
* - revert to old rijndael code. new rijndael code broke gbde.ume2003-10-194-1424/+1702
| | | | | - since aes-xcbc-mac and aes-ctr require functions in new rijndael code, aes-xcbc-mac and aes-ctr are disabled for now.
* Fix alignment problem on 64 bit arch.ume2003-10-141-0/+49
| | | | | | | I only tested if it doesn't break anything on i368. Since I have no 64 bit machine, I cannot test it, actually. Reported by: jmallett
* use BF_ecb_encrypt().ume2003-10-132-2/+88
| | | | Obtained from: KAME
* simplify and update rijndael code.ume2003-10-126-1737/+1407
| | | | Obtained from: KAME
* use opencrypto for RMD160.ume2003-10-122-409/+0
| | | | Requested by: sam
* drop useless define.ume2003-10-121-3/+0
|
* use bswap32() for big endian arch.ume2003-10-121-1/+1
| | | | Reported by: tinderbox via kris
* RIPEMD160 supportume2003-10-122-0/+412
| | | | Obtained from: KAME
* switch cast128 implementation to implementation by Steve Reid;ume2003-10-104-1008/+790
| | | | | | smaller footprint. Obtained from: KAME
* one more opossite conditiion.ume2003-09-181-1/+1
| | | | Reported by: "lg" <zevlg@yandex.ru>
* condition of padLen check was opposite.ume2003-09-171-1/+1
| | | | | Reported by: "lg" <zevlg@yandex.ru> Reviewed by: Lev Walkin <vlm@netli.com>
* Correctly bzero the entire context, not just the first sizeof(void *) bytes.phk2003-09-081-6/+6
| | | | Found by: Juergen Buchmueller <pullmoll@stop1984.com>
* Use __FBSDID().obrien2003-06-109-14/+30
|
* Assembly files put thru the C preprocessor need to have C style comments.obrien2003-04-212-78/+78
|
* Remove some unnecessary casts.silby2003-01-251-3/+3
|
* make rc4 crypto support a module so other modules can depend on itsam2003-01-151-0/+22
| | | | | Submitted by: imp Reviewed by: imp
* Make this compilable from userland as well.phk2002-11-011-0/+4
|
* Don't panic when we can just return an error code.phk2002-10-141-2/+6
|
* Fix some really pedantic GCC warnings.markm2002-07-151-5/+5
|
* Fixed AES encryption algorithm bugsuz2002-05-241-0/+1
| | | | | PR: kern/38465 Obtained from: Ramana Yarlagadda <ramana.yarlagadda@analog.com>
* Remove macros that are defined elsewhere.markm2002-04-211-2/+0
|
* just merged cosmetic changes from KAME to ease sync between KAME and FreeBSD.suz2002-04-192-2/+2
| | | | | | | (based on freebsd4-snap-20020128) Reviewed by: ume MFC after: 1 week
* Remove __P.alfred2002-03-208-60/+55
|
* - Speedup 3DES by using assembly code for i386.ume2002-03-0515-508/+5195
| | | | | | | - Sync des/blowfish to more recent openssl. Obtained from: KAME/NetBSD MFC after: 2 weeks
* off by one error in Aaron Gifford's code. KAME PR 393.ume2002-02-261-3/+3
| | | | | | PR: kern/34242 Submitted by: Aaron D. Gifford <agifford@infowest.com> MFC after: 1 week
* fixed the cast128 calculation with a short cipher key length.ume2001-11-272-4/+17
| | | | | | | the memory was overridden when the key length was less than 16 bytes. Obtained from: KAME MFC after: 1 week
OpenPOWER on IntegriCloud