summaryrefslogtreecommitdiffstats
path: root/sys/crypto
Commit message (Expand)AuthorAgeFilesLines
* Crypto(4) driver for AESNI.kib2010-07-237-0/+1464
* Use the fpu_kern_enter() interface to properly separate usermode FPUkib2010-06-054-3/+34
* Changed to M_NOWAIT when reallocing psc_buf in padlock_sha_update(),vanhu2009-05-271-1/+3
* identify routine takes driver_t *, not device_t *.imp2009-02-051-1/+1
* Connect padlock(4) to amd64 build for VIA Nano processors.jkim2009-01-122-3/+3
* Avoid 256 integer divisions per rc4_init() call. Replace it with usingmav2008-12-161-3/+5
* Fix a potential NULL-pointer dereference in padlock(4).philip2008-11-171-1/+5
* Simplify session selection/allocation.pjd2008-08-091-10/+5
* - Fix freeing session on newsession failure.pjd2008-08-091-9/+24
* Implify sessions freeing loop.pjd2008-08-091-2/+1
* We don't have to drop a lock around malloc(M_NOWAIT).pjd2008-08-091-4/+4
* When freeing session, restore its ID after zeroing memory.pjd2008-08-091-0/+1
* Sessions in-use are at the end of the queue, so use TAILQ_FOREACH_REVERSE()pjd2008-08-091-3/+5
* Convert lock that protects sessions list from a mutex to a rwlock.pjd2008-07-201-16/+16
* Make test00 compilable again.sobomax2008-01-152-1/+3
* Commit the change from FAST_IPSEC to IPSEC. The FAST_IPSECgnn2007-07-031-1/+1
* Integrate the Camellia Block Cipher. For more information see RFC 4132gnn2007-05-093-0/+1459
* Overhaul driver/subsystem api's:sam2007-03-211-74/+68
* Initialize T1 to silent gcc warning.kevlo2006-10-221-1/+1
* Less magic.pjd2006-09-151-2/+3
* GCC 3.4.6 gets confused on this file and produces bogus warning.kan2006-08-261-1/+1
* Remove trailing spaces.pjd2006-07-281-1/+1
* Use existing roundup2() macro.pjd2006-07-281-1/+1
* Remove redundant check committed by accident.pjd2006-07-251-2/+0
* Avoid memory allocations when the given address is already 16 bytes aligned.pjd2006-07-251-6/+51
* Modify PADLOCK_ALIGN() macro, so when the given address is already 16 bytespjd2006-07-251-1/+1
* Style fixes.pjd2006-07-254-10/+10
* Implement support for HMAC/SHA1 and HMAC/SHA256 acceleration found inpjd2006-07-224-335/+766
* Correct few bzero()s.pjd2006-07-221-3/+3
* Set ses_ictx and ses_octx to NULL after freeing them, so we won't freepjd2006-07-221-0/+2
* Use the already stored VIA RNG probe informationmr2006-07-131-16/+5
* Fix gratuitous compiler warning.pjd2006-06-081-1/+2
* - Pretend to accelerate various HMAC algorithms, so padlock(4) can be usedpjd2006-06-051-91/+266
* padlock(4) doesn't support explicitly provided keys yet.pjd2006-04-201-0/+4
* On padlock initialization, allocate memory with M_WAITOK.pjd2006-04-121-5/+1
* Add VIA/ACE "PadLock" support as a crypto(9) driver.pjd2005-08-181-0/+504
* Assert proper key size also in userland by defining KASSERT in !_KERNEL case.pjd2005-08-171-2/+2
* Unbreak the world build (in sbin/gbde). This file is used by bothcperciva2005-08-171-0/+2
* Check key size for rijndael, as invalid key size can lead to kernel panic.pjd2005-08-161-0/+2
* gbde(8) is also rejndael user.ume2005-03-111-2/+0
* just use crypto/rijndael, and nuke opencrypto/rindael.[ch].ume2005-03-111-5/+0
* integrate rijndael-alg-fst.h into rijndael.h.ume2005-03-115-44/+14
* stop including rijndael-api-fst.h from rijndael.h.ume2005-03-111-1/+0
* sys/crypto/md5.[ch] is used from nowhere. So, just nuke them.ume2005-03-112-382/+0
* refer opencrypto/cast.h directly.ume2005-03-111-17/+0
* use cast128 in opencrypto to nuke duplicate code.ume2005-03-103-811/+9
* Start the dreaded NOFOO -> NO_FOO conversion.ru2004-12-211-1/+1
* Initiate deorbit burn sequence for 80386 support in FreeBSD: Removejhb2004-11-161-1/+1
* For variables that are only checked with defined(), don't provideru2004-10-241-1/+1
* Use __FBSDID().obrien2004-06-143-3/+13
OpenPOWER on IntegriCloud