summaryrefslogtreecommitdiffstats
path: root/sys/crypto/cryptodev.c (follow)
Commit message (Expand)AuthorAgeFilesLines
* Add struct proc * argument to FRELE() and FILE_SET_MATURE() inguenther2012-04-221-2/+2
* Hold struct filedesc's fd_lock when writing to the fd_ofiles, fd_ofileflags,guenther2012-02-151-1/+4
* key lengths are counted in bitsderaadt2011-01-111-3/+3
* add explicit_bzero() calls before free()ing key materialderaadt2011-01-111-4/+11
* disable access to the crypto(4) device from userland; ok deraadtmikeb2010-12-141-3/+3
* Retire Skipjackmikeb2010-10-061-5/+1
* No need for read/write functions, just use enodev like all the otherderaadt2010-07-211-19/+1
* Mark a DMA accessible malloc for later correction. This ismatthew2010-07-201-2/+2
* remove proc.h include from uvm_map.h. This has far reaching effects, astedu2010-04-201-2/+1
* variable no longer usedderaadt2009-02-171-2/+2
* The loop here preparing the uio always added the length of the firstoga2009-02-171-4/+2
* Implement the AES XTS mode of operation for the crypto(9) framework.djm2008-06-091-1/+4
* Here too: Convert MALLOC/FREE to malloc/free and use M_ZERO where applicable.hshoexer2007-09-131-18/+15
* pr5274 fix localhost dos with oversized valuestedu2006-10-251-2/+7
* remove some silly casts. put spl calls after all declarations.tedu2006-05-311-21/+18
* do not allow 0-length transforms; from freebsdderaadt2005-08-181-3/+4
* AESCTR support for ESP (RFC 3686); ok hshoexermarkus2005-05-251-1/+4
* Replace RSA-derived md5 code with code derived from Colin Plumb's PD version.millert2004-05-071-2/+2
* disable mac for now, they are not usable with current hardware; ok deraadt@markus2004-03-141-1/+3
* Replace select backends with poll backends. selscan() and pollscan()millert2003-09-231-6/+6
* don't allow /dev/crypto to be opened ifndef CRYPTO (the thread hasn't beenjason2003-06-101-1/+5
* license cleanup regarding term 4deraadt2003-06-031-3/+1
* Fastpath for userland crypto requests. This change makes userlandbeck2003-06-031-10/+38
* move max limit back down to 65536-4jason2003-05-301-2/+2
* From Angelos:jason2002-11-211-2/+3
* Add a CRYPTO_NULL xform (it's a do nothing, but nice for measuring thejason2002-11-121-1/+4
* proper cdev_decl(crypto) and no private protosmickey2002-07-101-8/+1
* ansideraadt2002-06-191-58/+14
* re-enable both crypto operationsderaadt2002-06-191-3/+3
* looks slightly betterderaadt2002-06-121-3/+1
* undo 1.46; fixes double free (the keys are freed on session close).markus2002-06-121-5/+7
* so let us analyse the development process here:deraadt2002-06-121-2/+2
* kernel changes to make asymmetric crypto work in userlandbeck2002-06-111-3/+15
* You should always free the keys, not just on error --- the cryptoangelos2002-06-101-7/+5
* Handle csecreate errors. deraadt@ and beck@nordin2002-06-071-6/+18
* not ready to export fcrypt to userland yet; spotted by lebelderaadt2002-05-181-1/+29
* export struct fcrypt to userlandderaadt2002-05-181-29/+1
* Don't deref null pointer in failure case.jason2002-05-081-8/+8
* 32 bit constraint is wrong, we thinkderaadt2002-04-271-7/+2
* disable cryptodevallowsoft again; constrain key bit sizes to % 32cryptodev.cderaadt2002-04-261-3/+8
* kernel API does not need the userland addresses, make them go awayderaadt2002-04-241-35/+25
* initial hack at a CIOCSYMFEAT ioctlderaadt2002-04-231-1/+4
* driver queueing & callback code for keying operationsderaadt2002-04-231-23/+53
* Credit DARPA/USAF appropriately.jason2002-04-081-1/+6
* disable userland crypto for 3.1deraadt2002-04-031-2/+2
* First round of __P removal in sysmillert2002-03-141-8/+8
* export MD5/SHA1 via /dev/crypto; ok provos@, beck@markus2002-03-051-8/+11
* parts that copy in PK parametersderaadt2002-03-041-8/+94
* sysctl for cryptodevallowsoft - /dev/crypto will allow the software engineprovos2002-03-011-2/+4
* sysctl kern.usercryptoderaadt2002-02-231-1/+5