aboutsummaryrefslogtreecommitdiff
path: root/sys/geom/bde/g_bde_crypt.c
Commit message (Expand)AuthorAgeFilesLines
* sys/geom: adoption of SPDX licensing ID tags.Pedro F. Giffuni2017-11-271-0/+2
* sys: use our roundup2/rounddown2() macros when param.h is available.Pedro F. Giffuni2016-04-211-1/+1
* Replace sys/crypto/sha2/sha2.c with lib/libmd/sha512c.cAllan Jude2015-12-271-1/+1
* Comment typoPoul-Henning Kamp2005-07-201-1/+1
* stop including rijndael-api-fst.h from rijndael.h.Hajimu UMEMOTO2005-03-111-1/+1
* /* -> /*- for copyright notices, minor format tweaks as necessaryWarner Losh2005-01-061-2/+2
* Fix a problem that shows up if less than the full complement ofPoul-Henning Kamp2004-09-111-1/+1
* Remove the MD5_KEY debugging toolPoul-Henning Kamp2004-01-231-33/+0
* Correct bzero length so we clear the entire key structure.Poul-Henning Kamp2003-09-081-1/+1
* Bzero the right number of bytes.Poul-Henning Kamp2003-09-061-1/+1
* Don't use & in front of arrays.Poul-Henning Kamp2003-05-311-2/+2
* Considering that I did cast the arguments to (intmax_t) I must havePoul-Henning Kamp2003-05-021-4/+4
* Fix an obscure fencepost error in GBDE's sector mapping code:Poul-Henning Kamp2003-04-291-0/+26
* I accidentally leaked this debugging tool in with my last commit.Poul-Henning Kamp2003-04-281-2/+4
* Rename g_bde_get_sector() to g_bde_get_keysector() and pick up thePoul-Henning Kamp2003-04-281-0/+35
* Use sys/endian.h instead of geom_enc.c for endian-agnostfication.Poul-Henning Kamp2003-04-031-1/+2
* Including <sys/stdint.h> is (almost?) universally only to be able to usePoul-Henning Kamp2003-03-181-1/+0
* Limit our requests to DFLTPHYS, this is generally a good idea forPoul-Henning Kamp2003-03-071-0/+5
* Optimize the size of the work-items by letting the mapping functionPoul-Henning Kamp2003-01-021-38/+55
* Solve another bug in the mapping code: correctly skip lock sectors.Poul-Henning Kamp2002-12-181-2/+2
* Fix two blunders in the mapping functions which can lead to corrupt data,Poul-Henning Kamp2002-12-181-2/+2
* Conceiveably, there may exist an algorithm which can tell if a sequence of bytesPoul-Henning Kamp2002-12-011-0/+7
* Run a revision on the GBDE encryption facility.Poul-Henning Kamp2002-11-041-47/+10
* Change the kkey generation cherry-picker to use MD5.Poul-Henning Kamp2002-10-301-36/+17
* Fix a bug in the cherry-picker kkey generator routine.Poul-Henning Kamp2002-10-281-0/+1
* Add Geom Based Disk Encryption to the tree.Poul-Henning Kamp2002-10-191-0/+356