aboutsummaryrefslogtreecommitdiff
path: root/sys/opencrypto/cryptodev.h
Commit message (Expand)AuthorAgeFilesLines
* opencrypto: Introduce crypto_dispatch_async()Mark Johnston2021-02-081-15/+8
* Remove the cloned file descriptors for /dev/crypto.John Baldwin2020-11-251-9/+0
* Use void * in place of caddr_t.John Baldwin2020-11-061-14/+14
* Consistently use C99 fixed-width types in the in-kernel crypto code.John Baldwin2020-11-031-20/+20
* opencrypto: Annotate hmac_init_(i|o)pad() to make auth_hash constMark Johnston2020-10-301-2/+2
* Prepare crypto framework for IPsec ESN supportMarcin Wojtas2020-10-161-0/+3
* crypto(9): add CRYPTO_BUF_VMPAGEAlan Somers2020-08-261-5/+47
* Add crypto_initreq() and crypto_destroyreq().John Baldwin2020-07-161-0/+2
* Convert cryptostats to a counter_u64 array.Mark Johnston2020-06-301-8/+8
* Remove CRYPTO_TIMING.Mark Johnston2020-06-301-17/+0
* Add support to the crypto framework for separate AAD buffers.John Baldwin2020-06-221-0/+2
* Adjust crypto_apply function callbacks for OCF.John Baldwin2020-06-101-2/+2
* Add a crypto capability flag for accelerated software drivers.John Baldwin2020-06-091-0/+1
* Export the _kern_crypto sysctl node from crypto.c.John Baldwin2020-05-251-0/+4
* Add support for optional separate output buffers to in-kernel crypto.John Baldwin2020-05-251-28/+125
* Correct the minimum key length for Camellia to 16 bytes (128 bits).John Baldwin2020-05-221-1/+1
* Remove MD5 HMAC from OCF.John Baldwin2020-05-111-4/+2
* Remove support for DES and Triple DES from OCF.John Baldwin2020-05-111-8/+2
* Remove support for the Blowfish algorithm from OCF.John Baldwin2020-05-111-3/+0
* Remove support for the ARC4 algorithm from OCF.John Baldwin2020-05-111-4/+0
* Remove support for keyed MD5 and SHA1 authentication hashes.John Baldwin2020-05-111-2/+0
* Remove support for the skipjack encryption algorithm.John Baldwin2020-05-111-3/+0
* Remove support for the cast128 encryption algorithm.John Baldwin2020-05-111-3/+0
* Retire the CRYPTO_F_IV_GENERATE flag.John Baldwin2020-04-201-1/+12
* Refactor driver and consumer interfaces for OCF (in-kernel crypto).John Baldwin2020-03-271-56/+94
* Add AES-CCM encryption, and plumb into OCF.Sean Eric Fagan2019-02-151-1/+3
* Add CBC-MAC authentication.Sean Eric Fagan2019-02-151-1/+6
* As struct cryptop is wrapped in #ifdef _KERNEL, userland doesn'tMarius Strobl2019-02-101-1/+1
* Generalize AES iov optimizationMatt Macy2018-12-131-0/+2
* Add xform-conforming auth_hash wrapper for Poly-1305Conrad Meyer2018-08-171-1/+5
* OpenCrypto: Convert sessions to opaque handles instead of integersConrad Meyer2018-07-181-16/+15
* OCF: Add a typedef for session identifiersConrad Meyer2018-07-131-3/+7
* OCF: Add plain hash modesConrad Meyer2018-07-091-1/+6
* OCF: Add CRYPTO_SHA2_224_HMAC modeConrad Meyer2018-07-091-1/+4
* Remove "HMAC" from <HASH>_HMAC_BLOCK_LEN macro namesConrad Meyer2018-07-091-7/+8
* opencrypto: Integrate Chacha20 algorithm into OCFConrad Meyer2018-03-291-2/+4
* OCF: CRYPTDEB(): Enhance to allow formatted loggingConrad Meyer2018-03-261-3/+4
* Import Blake2 algorithms (blake2b, blake2s) from libb2Conrad Meyer2018-03-211-1/+3
* Split crp_buf into a union.John Baldwin2018-01-161-1/+6
* Change the type of 'crp_opaque' from caddr_t to void *.John Baldwin2018-01-111-1/+1
* crypto(9) is called from ipsec in CRYPTO_F_CBIFSYNC mode. This is workingFabien Thomas2017-11-031-0/+23
* opencrypto: Loosen restriction on HMAC key sizesConrad Meyer2017-09-261-7/+0
* Add a new COP_F_CIPHER_FIRST flag for struct crypt_op.John Baldwin2017-09-221-1/+2
* Use const with some read-only buffers in opencrypto APIs.John Baldwin2017-05-091-11/+13
* Make IPsec work with AES-GCM and AES-ICM (aka CTR) in OCF... IPsecJohn-Mark Gurney2015-08-041-5/+5
* Fix XTS, and name things a bit better...John-Mark Gurney2015-07-141-8/+6
* Add support for AES modes to IPSec. These modes work both in software onlyGeorge V. Neville-Neil2015-07-091-16/+63
* we may get here w/ non-sleepable locks held, so switch to _NOWAIT whenJohn-Mark Gurney2015-07-071-1/+1
* Add some new modes to OpenCrypto. These modes are AES-ICM (can be usedJohn-Mark Gurney2014-12-121-32/+78
* Add support for AES-XTS.Pawel Jakub Dawidek2010-09-231-1/+2