Commit message (Collapse) | Author | Age | Files | Lines | |
---|---|---|---|---|---|
* | VIA xcrypt for amd64, simpler version of a diff from deraadt | jsg | 2010-06-29 | 1 | -6/+19 |
| | | | | | | | | | with suggestions from miod. The codepath doesn't seem to be called yet, this will be investigated later. looks good miod@, ok deraadt@ | ||||
* | When running in pic mode we don't have enough general registers for all | jsg | 2010-05-03 | 1 | -1/+1 |
| | | | | | | | | | | | | the xcrypt inputs, hence the dance which is done to make this work. The constraint for the key however was "mr" which is both from memory and from a general register, it seems gcc3 went with the former and gcc4 went with the later in the pic case, so change the constraint for the key to just "m" which gives us more efficient code that both gcc3 and gcc4 are happy with. ok kettenis@ | ||||
* | remerge local tweaks, update per-arch configuration headers, update | djm | 2008-09-06 | 1 | -12/+8 |
| | | | | Makefiles, crank shlib_version | ||||
* | fix memory leak (in one case of unaligned buffers); from Markus Kvetter | deraadt | 2008-02-26 | 1 | -2/+3 |
| | | | | ok markus | ||||
* | potential fd leak (we will fix this before we move to cloning) | deraadt | 2006-06-08 | 1 | -1/+3 |
| | |||||
* | no need to byteswap for AES_ASM, from tom@ | markus | 2005-05-23 | 1 | -1/+9 |
| | |||||
* | resolve conflicts | djm | 2005-04-29 | 1 | -2/+6 |
| | |||||
* | adjust comment, open_dev_crypto() returns -1 on error. | hshoexer | 2005-01-29 | 1 | -1/+1 |
| | | | | ok markus@ | ||||
* | on error set correct pointer to NULL. | hshoexer | 2005-01-26 | 1 | -2/+2 |
| | | | | | | From phk@freebsd.org ok markus@ | ||||
* | machdep.xcrypt now has a different meaning: Instead of > 0 indicating | deraadt | 2004-06-15 | 1 | -14/+16 |
| | | | | | | that AES is there, we now have 3 flag bits: C3_HAS_AES, C3_HAS_SHA (SHA1 & SHA256), and C3_HAS_MM (RSA). Change this code to only look at C3_HAS_AES for now. | ||||
* | merge 0.9.7d | markus | 2004-04-08 | 1 | -1/+4 |
| | |||||
* | remove some debug code and cleanup.. | deraadt | 2004-02-04 | 1 | -18/+6 |
| | |||||
* | OK, this time the AES soft keys work with ssh and such. I spent over 3 | deraadt | 2004-02-03 | 1 | -16/+63 |
| | | | | | hours learning that OpenSSL's internal functions for AES extended keys generate screwy byte order swapped data.. | ||||
* | oops, software key gen bug | deraadt | 2004-02-03 | 1 | -35/+10 |
| | |||||
* | Switch to using software generated extended keys (because the cpu cannot | deraadt | 2004-02-03 | 1 | -10/+35 |
| | | | | | | | | | | yet generate 192 & 256 bit keys). Ensure that 192 and 256 are in the nids table. This also accelerates performance for 128 a tiny bit: type 16 bytes 64 bytes 256 bytes 1024 bytes 8192 bytes aes-128-cbc 34921.48k 129617.82k 362059.93k 623649.81k 790397.77k aes-192-cbc 26227.43k 99215.33k 283242.84k 509881.15k 665323.22k aes-256-cbc 26133.22k 97458.06k 265990.84k 457824.69k 579835.09k | ||||
* | If on an i386, detect existance of the VIA C3 xcrypt-* using sysctl of | deraadt | 2004-02-03 | 1 | -4/+174 |
| | | | | | | | | the machdep.xcrypt node. If they exist, use the xcrypt-cbc instruction to accelerate aes-{128,192,256}-cbc, for more than 100x performance increase. This code has no effect on any cpu... Tested thus far using openssl speed command, and of course, ssh. 778MB/sec AES-128-CBC performance at 8192 byte block size. | ||||
* | support AES with 192 and 256 bit keys, too. | markus | 2003-08-07 | 1 | -58/+60 |
| | | | | tested with kern.cryptodevallowsoft=1; ok deraadt@ | ||||
* | nuke term 3, since we're all in ~deraadt/terms and I clued in now. | beck | 2003-06-03 | 1 | -3/+0 |
| | |||||
* | merge 0.9.7b with local changes; crank majors for libssl/libcrypto | markus | 2003-05-12 | 1 | -9/+34 |
| | |||||
* | remove printf("bar\n"); | markus | 2003-04-08 | 1 | -1/+0 |
| | |||||
* | remove support for RC4 via /dev/crypto, suggested by Niels; ok provos@ | markus | 2002-06-20 | 1 | -18/+0 |
| | |||||
* | do not syslog from libraries! | deraadt | 2002-06-19 | 1 | -10/+1 |
| | |||||
* | KNF, -Wall, and other cleanups. still does not failover 100% correctly | deraadt | 2002-06-19 | 1 | -22/+52 |
| | | | | for operations when /dev/crypto is missing, for instance in chroot | ||||
* | stupid stupid bug ja ja ja ja | deraadt | 2002-06-19 | 1 | -1/+1 |
| | |||||
* | unbreak sshd with privsep: open /dev/crypto, keep fd, and call | markus | 2002-06-18 | 1 | -5/+20 |
| | | | | CRIOGET per EVP_Init(); ok niklas@, miod@ | ||||
* | per-evp state is now sizeof(struct dev_crypto_state) instead sizeof(struct ↵ | markus | 2002-06-18 | 1 | -6/+6 |
| | | | | session_op) | ||||
* | keep a FD per EVP_init, use a global FD for all asym operations; | markus | 2002-06-13 | 1 | -83/+85 |
| | | | | ok beck@ | ||||
* | KNF | deraadt | 2002-06-11 | 1 | -19/+16 |
| | |||||
* | add "dsa_dsa_mod_exp" - This mimics the software dsa_mod_exp funtion | beck | 2002-06-11 | 1 | -3/+37 |
| | | | | | | | using two mod_exp operations - otherwise we use BN_mod_exp2 entirely in software, which makes dsa verifications glacially slow while signatures, (which use mod_exp) are fast. This lets cards that can only do bn_mod_exp decently offload most of dsa. | ||||
* | Make DSA work now... at least for things that can do bn_mod_exp. | beck | 2002-06-11 | 1 | -7/+4 |
| | |||||
* | Make asymmetric crypto work in userland | beck | 2002-06-11 | 1 | -36/+114 |
| | | | | | this will only be used if you both have a card that supports it with a working driver and you set sysctl kern.userasymcrypto=1 | ||||
* | Pass the right arguments for RSA, DSA, and modexp operations. Fix the | angelos | 2002-06-09 | 1 | -30/+37 |
| | | | | translation between the crypto framework's format and the BN structure. | ||||
* | add aes/bf/cast; ok deraadt@ | markus | 2002-05-16 | 1 | -2/+50 |
| | |||||
* | OpenSSL 0.9.7 stable 2002 05 08 merge | beck | 2002-05-15 | 1 | -0/+926 |