freebsd-dev/sys/crypto
Pawel Jakub Dawidek 5362e27b6d Set ses_ictx and ses_octx to NULL after freeing them, so we won't free
them twice.
This is possible for example in situation when session is used in
authentication context, then freed and then used in encryption context
and freed - in encryption context ses_ictx and ses_octx are not touched
at newsession time, but padlock_freesession could still try to free them
when they are not NULL.
2006-07-22 10:04:47 +00:00
..
blowfish Initiate deorbit burn sequence for 80386 support in FreeBSD: Remove 2004-11-16 20:42:32 +00:00
des Use __FBSDID(). 2004-06-14 00:38:54 +00:00
rc4 Use __FBSDID(). 2003-06-10 21:44:29 +00:00
rijndael Assert proper key size also in userland by defining KASSERT in !_KERNEL case. 2005-08-17 07:59:07 +00:00
sha2 Correctly bzero the entire context, not just the first sizeof(void *) bytes. 2003-09-08 18:32:33 +00:00
via Set ses_ictx and ses_octx to NULL after freeing them, so we won't free 2006-07-22 10:04:47 +00:00
sha1.c Use __FBSDID(). 2003-06-10 21:44:29 +00:00
sha1.h