ume
5f96af1a75
gbde(8) is also rejndael user.
...
Reported by: phk
2005-03-11 22:07:04 +00:00
ume
5ce7e2e80a
just use crypto/rijndael, and nuke opencrypto/rindael.[ch].
...
the two became almost identical since latest KAME merge.
Discussed with: sam
2005-03-11 17:24:46 +00:00
ume
8a8b13dab5
integrate rijndael-alg-fst.h into rijndael.h.
2005-03-11 16:26:10 +00:00
ume
73402ef817
stop including rijndael-api-fst.h from rijndael.h.
...
this is required to integrate opencrypto into crypto.
2005-03-11 15:42:51 +00:00
ume
f61af04d95
sys/crypto/md5.[ch] is used from nowhere. So, just nuke them.
2005-03-11 12:56:15 +00:00
ume
4319b5fb5e
refer opencrypto/cast.h directly.
2005-03-11 12:37:07 +00:00
ume
4bc4328cd1
use cast128 in opencrypto to nuke duplicate code.
2005-03-10 11:40:53 +00:00
ru
cec60429bb
Start the dreaded NOFOO -> NO_FOO conversion.
...
OK'ed by: core
2004-12-21 08:47:35 +00:00
jhb
cc03c9de7d
Initiate deorbit burn sequence for 80386 support in FreeBSD: Remove
...
80386 (I386_CPU) support from the kernel.
2004-11-16 20:42:32 +00:00
ru
5db2b9d5b3
For variables that are only checked with defined(), don't provide
...
any fake value.
2004-10-24 15:33:08 +00:00
obrien
18012715d9
Use __FBSDID().
2004-06-14 00:38:54 +00:00
des
b3e7bd9f6b
Fix a reentrancy issue in md5_calc().
2004-01-27 18:57:21 +00:00
ume
88488cca11
avoid module name conflict with opencrypto/rijndael.c.
...
Reported by: tinderbox
2003-11-12 04:22:37 +00:00
ume
7755ea7d71
cleanup rijndael API.
...
since there are naming conflicts with opencrypto, #define was
added to rename functions intend to avoid conflicts.
Obtained from: KAME
2003-11-11 18:58:54 +00:00
ume
2545ff462c
rijndael-alg-fst.[ch]:
...
- redo updating.
rijndael-api-fst.[ch]:
- switch to use new low level rijndael api.
- stop using u8, u16 and u32.
- space cleanup.
Tested by: gbde(8) and phk's test program
2003-11-10 10:33:39 +00:00
phk
9f420bf43d
Add a testcase which validates that the same buffer can be passed to
...
rijndael_blockDecrypt() as both input and output.
This property is important because inside rijndael we can get away
with allocating just a 16 byte "work" buffer on the stack (which
is very cheap), whereas the calling code would need to allocate the
full sized buffer, and in all likelyhood would have to do so with
an expensive malloc(9).
2003-10-19 22:12:23 +00:00
ume
8ff2c775d4
- revert to old rijndael code. new rijndael code broke gbde.
...
- since aes-xcbc-mac and aes-ctr require functions in new
rijndael code, aes-xcbc-mac and aes-ctr are disabled for now.
2003-10-19 21:28:34 +00:00
ume
3d011c684c
Fix alignment problem on 64 bit arch.
...
I only tested if it doesn't break anything on i368. Since I
have no 64 bit machine, I cannot test it, actually.
Reported by: jmallett
2003-10-14 13:37:37 +00:00
ume
a89e9b5e91
use BF_ecb_encrypt().
...
Obtained from: KAME
2003-10-13 19:26:08 +00:00
ume
dc45666132
simplify and update rijndael code.
...
Obtained from: KAME
2003-10-12 21:05:05 +00:00
ume
b436e75e9a
use opencrypto for RMD160.
...
Requested by: sam
2003-10-12 18:25:38 +00:00
ume
329da09a2a
drop useless define.
2003-10-12 14:47:24 +00:00
ume
d56603d9be
use bswap32() for big endian arch.
...
Reported by: tinderbox via kris
2003-10-12 14:32:13 +00:00
ume
f1d14cc455
RIPEMD160 support
...
Obtained from: KAME
2003-10-12 09:43:48 +00:00
ume
8df937af7e
switch cast128 implementation to implementation by Steve Reid;
...
smaller footprint.
Obtained from: KAME
2003-10-10 15:06:16 +00:00
ume
d850f73361
one more opossite conditiion.
...
Reported by: "lg" <zevlg@yandex.ru>
2003-09-18 17:26:56 +00:00
ume
c724a09a95
condition of padLen check was opposite.
...
Reported by: "lg" <zevlg@yandex.ru>
Reviewed by: Lev Walkin <vlm@netli.com>
2003-09-17 08:51:43 +00:00
phk
1456ca5b58
Correctly bzero the entire context, not just the first sizeof(void *) bytes.
...
Found by: Juergen Buchmueller <pullmoll@stop1984.com>
2003-09-08 18:32:33 +00:00
obrien
349c6025d0
Use __FBSDID().
2003-06-10 21:44:29 +00:00
obrien
4054bc5e58
Assembly files put thru the C preprocessor need to have C style comments.
2003-04-21 16:30:12 +00:00
silby
5eab66f151
Remove some unnecessary casts.
2003-01-25 22:41:22 +00:00
sam
1f74260ee2
make rc4 crypto support a module so other modules can depend on it
...
Submitted by: imp
Reviewed by: imp
2003-01-15 19:55:17 +00:00
phk
e7f8941120
Make this compilable from userland as well.
2002-11-01 08:56:39 +00:00
phk
ab7f456357
Don't panic when we can just return an error code.
2002-10-14 11:21:05 +00:00
markm
a22b6ae7fb
Fix some really pedantic GCC warnings.
2002-07-15 13:45:15 +00:00
suz
869c418b27
Fixed AES encryption algorithm bug
...
PR: kern/38465
Obtained from: Ramana Yarlagadda <ramana.yarlagadda@analog.com>
2002-05-24 07:26:17 +00:00
markm
b8f437cc0b
Remove macros that are defined elsewhere.
2002-04-21 10:32:48 +00:00
suz
553226e8e1
just merged cosmetic changes from KAME to ease sync between KAME and FreeBSD.
...
(based on freebsd4-snap-20020128)
Reviewed by: ume
MFC after: 1 week
2002-04-19 04:46:24 +00:00
alfred
eddc6122c9
Remove __P.
2002-03-20 05:14:42 +00:00
ume
92361f6aad
- Speedup 3DES by using assembly code for i386.
...
- Sync des/blowfish to more recent openssl.
Obtained from: KAME/NetBSD
MFC after: 2 weeks
2002-03-05 09:19:02 +00:00
ume
f7cd13562c
off by one error in Aaron Gifford's code. KAME PR 393.
...
PR: kern/34242
Submitted by: Aaron D. Gifford <agifford@infowest.com>
MFC after: 1 week
2002-02-26 16:58:58 +00:00
ume
8ee8d7c8d6
fixed the cast128 calculation with a short cipher key length.
...
the memory was overridden when the key length was less than 16 bytes.
Obtained from: KAME
MFC after: 1 week
2001-11-27 14:11:47 +00:00
ume
652be9cfdd
properly check DES weak key. KAME PR 363.
...
Obtained from: KAME
MFC after: 1 week
2001-07-03 17:46:48 +00:00
ume
33474f7afa
less warning
...
warning: cast discards qualifiers from pointer target type
2001-06-16 19:32:37 +00:00
ume
832f8d2249
Sync with recent KAME.
...
This work was based on kame-20010528-freebsd43-snap.tgz and some
critical problem after the snap was out were fixed.
There are many many changes since last KAME merge.
TODO:
- The definitions of SADB_* in sys/net/pfkeyv2.h are still different
from RFC2407/IANA assignment because of binary compatibility
issue. It should be fixed under 5-CURRENT.
- ip6po_m member of struct ip6_pktopts is no longer used. But, it
is still there because of binary compatibility issue. It should
be removed under 5-CURRENT.
Reviewed by: itojun
Obtained from: KAME
MFC after: 3 weeks
2001-06-11 12:39:29 +00:00
markm
e4e06e65a1
Kernel crypto need binary key material, not symbolic ascii.
2001-03-10 13:02:58 +00:00
kris
b6750dacb9
This commit was generated by cvs2svn to compensate for changes in r67957,
...
which included commits to RCS files with non-trunk default branches.
2000-10-30 11:03:32 +00:00
kris
39f0a768bf
Initial import of AES algorithm code (aka Rijndael) from KAME.
2000-10-30 11:03:32 +00:00
archie
f46adaf572
Fix broken const'ness in declaration of sha1_loop().
2000-10-09 18:49:14 +00:00
itojun
5f4e854de1
sync with kame tree as of july00. tons of bug fixes/improvements.
...
API changes:
- additional IPv6 ioctls
- IPsec PF_KEY API was changed, it is mandatory to upgrade setkey(8).
(also syntax change)
2000-07-04 16:35:15 +00:00