summaryrefslogtreecommitdiffstats
path: root/sys/opencrypto
Commit message (Expand)AuthorAgeFilesLines
...
* Fix usage of HMAC algorithms via /dev/crypto.pjd2006-05-221-10/+10
* Improve the code responsible for waking up the crypto_proc thread.pjd2006-05-221-14/+11
* Don't wakeup the crypto_ret_proc thread if it is running already.pjd2006-05-221-2/+3
* Don't set cc_kqblocked twice and don't increment cryptostats.cs_kblockspjd2006-05-221-2/+0
* Document how we synchronize access to the fields in the cryptocappjd2006-05-221-6/+13
* We must synchronize access to cc_qblocked, because there could be a racepjd2006-05-221-17/+4
* Silent Coverity Prevent report by asserting that cap != NULL.pjd2006-05-181-2/+4
* - Fix a very old bug in HMAC/SHA{384,512}. When HMAC is using SHA384pjd2006-05-176-132/+194
* - Make opencrypto more SMP friendly by dropping the queue lock aroundpjd2006-05-172-145/+140
* Remove cri_rnd. It is not used.pjd2006-05-171-2/+0
* If kern.cryptodevallowsoft is TRUE allow also for symmetric software cryptopjd2006-05-171-2/+8
* Forgot about adding cuio_apply() here.pjd2006-05-171-0/+2
* - Implement cuio_apply(), an equivalent to m_apply(9).pjd2006-05-171-30/+49
* Be sure to wakeup the crypto thread when new request was queued.pjd2006-04-111-6/+8
* - Simplify the code by using arc4rand(9) instead of arc4random(9) in a loop.pjd2006-04-101-22/+3
* Fix memory leak which occurs when crypto.ko module is unloaded.pjd2006-03-281-0/+9
* crypto.ko depends on zlib.wkoszek2006-03-041-0/+1
* This patch fixes a problem, which exists if you have IPSEC in your kernelwkoszek2006-02-271-0/+1
* Fix bogus check. It was possible to panic the kernel by giving 0 length.pjd2005-08-181-2/+4
* Check key size for rijndael, as invalid key size can lead to kernel panic.pjd2005-08-161-0/+2
* malloc.h relies on param.h for a definition of MAXCPU. I guess that there isscottl2005-05-301-0/+1
* just use crypto/rijndael, and nuke opencrypto/rindael.[ch].ume2005-03-113-1286/+1
* - use 1/2 space for rijndael context in ipsecume2005-03-113-25/+14
* refer opencrypto/cast.h directly.ume2005-03-111-1/+1
* Use dynamic major number allocation.phk2005-02-271-2/+0
* /* -> /*- for license, minor formatting changesimp2005-01-0720-20/+20
* Push Giant down through ioctl.phk2004-11-171-3/+16
* Don't acquire Giant in cryptof_close(), as the code is intended to berwatson2004-08-101-7/+0
* Push acquisition of Giant from fdrop_closed() into fo_close() so thatrwatson2004-07-221-0/+7
* Do the dreaded s/dev_t/struct cdev */phk2004-06-161-5/+5
* add missing #include <sys/module.h>phk2004-05-302-0/+2
* kthread_exit() no longer requires Giant, so don't force callers to acquirejhb2004-03-051-1/+0
* Device megapatch 4/6:phk2004-02-211-0/+2
* Do not aggressively unroll the AES implementation, in non-benchmarking usephk2004-02-041-2/+0
* Add CRD_F_KEY_EXPLICIT which allows the key to be changed perphk2004-02-022-0/+11
* style(9) pass and type fixups.bms2003-12-161-1/+1
* Purge crmbuf.c as the routines are now in uipc_mbuf.c.bms2003-12-151-119/+0
* Push m_apply() and m_getptr() up into the colleciton of standard mbufbms2003-12-152-11/+1
* eliminate an unnecessary 8Kbyte bzero that was being done for eachsam2003-11-191-8/+5
* falloc allocates a file structure and adds it to the file descriptordwmalone2003-10-191-1/+1
* The present defaults for the open and close for device drivers whichphk2003-09-271-1/+0
* consolidate callback optimization check in one location by adding a flagsam2003-06-302-7/+17
* Add support to eliminate a context switch per crypto op when using thesam2003-06-273-23/+33
* Initialize struct fileops with C99 sparse initialization.phk2003-06-181-7/+7
* Use __FBSDID().obrien2003-06-1111-16/+37
* Flush my local cache of cryto subsystem fixes:sam2003-06-023-18/+43
* Gigacommit to improve device-driver source compatibility betweenphk2003-03-031-14/+7
* o add a CRYPTO_F_CBIMM flag to symmetric ops to indicate the callbacksam2003-02-233-29/+78
* Back out M_* changes, per decision of the TRB.imp2003-02-191-6/+6
* Remove M_TRYWAIT/M_WAITOK/M_WAIT. Callers should use 0.alfred2003-01-211-6/+6
OpenPOWER on IntegriCloud