summaryrefslogtreecommitdiffstats
path: root/sys/crypto
Commit message (Expand)AuthorAgeFilesLines
* padlock(4) doesn't support explicitly provided keys yet.pjd2006-04-201-0/+4
* On padlock initialization, allocate memory with M_WAITOK.pjd2006-04-121-5/+1
* Add VIA/ACE "PadLock" support as a crypto(9) driver.pjd2005-08-181-0/+504
* Assert proper key size also in userland by defining KASSERT in !_KERNEL case.pjd2005-08-171-2/+2
* Unbreak the world build (in sbin/gbde). This file is used by bothcperciva2005-08-171-0/+2
* Check key size for rijndael, as invalid key size can lead to kernel panic.pjd2005-08-161-0/+2
* gbde(8) is also rejndael user.ume2005-03-111-2/+0
* just use crypto/rijndael, and nuke opencrypto/rindael.[ch].ume2005-03-111-5/+0
* integrate rijndael-alg-fst.h into rijndael.h.ume2005-03-115-44/+14
* stop including rijndael-api-fst.h from rijndael.h.ume2005-03-111-1/+0
* sys/crypto/md5.[ch] is used from nowhere. So, just nuke them.ume2005-03-112-382/+0
* refer opencrypto/cast.h directly.ume2005-03-111-17/+0
* use cast128 in opencrypto to nuke duplicate code.ume2005-03-103-811/+9
* Start the dreaded NOFOO -> NO_FOO conversion.ru2004-12-211-1/+1
* Initiate deorbit burn sequence for 80386 support in FreeBSD: Removejhb2004-11-161-1/+1
* For variables that are only checked with defined(), don't provideru2004-10-241-1/+1
* Use __FBSDID().obrien2004-06-143-3/+13
* Fix a reentrancy issue in md5_calc().des2004-01-271-4/+1
* avoid module name conflict with opencrypto/rijndael.c.ume2003-11-121-0/+0
* cleanup rijndael API.ume2003-11-112-1/+107
* rijndael-alg-fst.[ch]:ume2003-11-104-1634/+1332
* Add a testcase which validates that the same buffer can be passed tophk2003-10-192-0/+87
* - revert to old rijndael code. new rijndael code broke gbde.ume2003-10-194-1424/+1702
* Fix alignment problem on 64 bit arch.ume2003-10-141-0/+49
* use BF_ecb_encrypt().ume2003-10-132-2/+88
* simplify and update rijndael code.ume2003-10-126-1737/+1407
* use opencrypto for RMD160.ume2003-10-122-409/+0
* drop useless define.ume2003-10-121-3/+0
* use bswap32() for big endian arch.ume2003-10-121-1/+1
* RIPEMD160 supportume2003-10-122-0/+412
* switch cast128 implementation to implementation by Steve Reid;ume2003-10-104-1008/+790
* one more opossite conditiion.ume2003-09-181-1/+1
* condition of padLen check was opposite.ume2003-09-171-1/+1
* Correctly bzero the entire context, not just the first sizeof(void *) bytes.phk2003-09-081-6/+6
* Use __FBSDID().obrien2003-06-109-14/+30
* Assembly files put thru the C preprocessor need to have C style comments.obrien2003-04-212-78/+78
* Remove some unnecessary casts.silby2003-01-251-3/+3
* make rc4 crypto support a module so other modules can depend on itsam2003-01-151-0/+22
* Make this compilable from userland as well.phk2002-11-011-0/+4
* Don't panic when we can just return an error code.phk2002-10-141-2/+6
* Fix some really pedantic GCC warnings.markm2002-07-151-5/+5
* Fixed AES encryption algorithm bugsuz2002-05-241-0/+1
* Remove macros that are defined elsewhere.markm2002-04-211-2/+0
* just merged cosmetic changes from KAME to ease sync between KAME and FreeBSD.suz2002-04-192-2/+2
* Remove __P.alfred2002-03-208-60/+55
* - Speedup 3DES by using assembly code for i386.ume2002-03-0515-508/+5195
* off by one error in Aaron Gifford's code. KAME PR 393.ume2002-02-261-3/+3
* fixed the cast128 calculation with a short cipher key length.ume2001-11-272-4/+17
* properly check DES weak key. KAME PR 363.ume2001-07-031-5/+2
* less warningume2001-06-162-82/+82
OpenPOWER on IntegriCloud