Commit message (Collapse) | Author | Age | Files | Lines | |
---|---|---|---|---|---|
* | adjust comment, open_dev_crypto() returns -1 on error. | hshoexer | 2005-01-29 | 1 | -1/+1 |
| | | | | ok markus@ | ||||
* | on error set correct pointer to NULL. | hshoexer | 2005-01-26 | 1 | -2/+2 |
| | | | | | | From phk@freebsd.org ok markus@ | ||||
* | machdep.xcrypt now has a different meaning: Instead of > 0 indicating | deraadt | 2004-06-15 | 1 | -14/+16 |
| | | | | | | that AES is there, we now have 3 flag bits: C3_HAS_AES, C3_HAS_SHA (SHA1 & SHA256), and C3_HAS_MM (RSA). Change this code to only look at C3_HAS_AES for now. | ||||
* | merge 0.9.7d | markus | 2004-04-08 | 1 | -1/+4 |
| | |||||
* | remove some debug code and cleanup.. | deraadt | 2004-02-04 | 1 | -18/+6 |
| | |||||
* | OK, this time the AES soft keys work with ssh and such. I spent over 3 | deraadt | 2004-02-03 | 1 | -16/+63 |
| | | | | | hours learning that OpenSSL's internal functions for AES extended keys generate screwy byte order swapped data.. | ||||
* | oops, software key gen bug | deraadt | 2004-02-03 | 1 | -35/+10 |
| | |||||
* | Switch to using software generated extended keys (because the cpu cannot | deraadt | 2004-02-03 | 1 | -10/+35 |
| | | | | | | | | | | yet generate 192 & 256 bit keys). Ensure that 192 and 256 are in the nids table. This also accelerates performance for 128 a tiny bit: type 16 bytes 64 bytes 256 bytes 1024 bytes 8192 bytes aes-128-cbc 34921.48k 129617.82k 362059.93k 623649.81k 790397.77k aes-192-cbc 26227.43k 99215.33k 283242.84k 509881.15k 665323.22k aes-256-cbc 26133.22k 97458.06k 265990.84k 457824.69k 579835.09k | ||||
* | If on an i386, detect existance of the VIA C3 xcrypt-* using sysctl of | deraadt | 2004-02-03 | 1 | -4/+174 |
| | | | | | | | | the machdep.xcrypt node. If they exist, use the xcrypt-cbc instruction to accelerate aes-{128,192,256}-cbc, for more than 100x performance increase. This code has no effect on any cpu... Tested thus far using openssl speed command, and of course, ssh. 778MB/sec AES-128-CBC performance at 8192 byte block size. | ||||
* | support AES with 192 and 256 bit keys, too. | markus | 2003-08-07 | 1 | -58/+60 |
| | | | | tested with kern.cryptodevallowsoft=1; ok deraadt@ | ||||
* | nuke term 3, since we're all in ~deraadt/terms and I clued in now. | beck | 2003-06-03 | 1 | -3/+0 |
| | |||||
* | merge 0.9.7b with local changes; crank majors for libssl/libcrypto | markus | 2003-05-12 | 1 | -9/+34 |
| | |||||
* | remove printf("bar\n"); | markus | 2003-04-08 | 1 | -1/+0 |
| | |||||
* | remove support for RC4 via /dev/crypto, suggested by Niels; ok provos@ | markus | 2002-06-20 | 1 | -18/+0 |
| | |||||
* | do not syslog from libraries! | deraadt | 2002-06-19 | 1 | -10/+1 |
| | |||||
* | KNF, -Wall, and other cleanups. still does not failover 100% correctly | deraadt | 2002-06-19 | 1 | -22/+52 |
| | | | | for operations when /dev/crypto is missing, for instance in chroot | ||||
* | stupid stupid bug ja ja ja ja | deraadt | 2002-06-19 | 1 | -1/+1 |
| | |||||
* | unbreak sshd with privsep: open /dev/crypto, keep fd, and call | markus | 2002-06-18 | 1 | -5/+20 |
| | | | | CRIOGET per EVP_Init(); ok niklas@, miod@ | ||||
* | per-evp state is now sizeof(struct dev_crypto_state) instead sizeof(struct ↵ | markus | 2002-06-18 | 1 | -6/+6 |
| | | | | session_op) | ||||
* | keep a FD per EVP_init, use a global FD for all asym operations; | markus | 2002-06-13 | 1 | -83/+85 |
| | | | | ok beck@ | ||||
* | KNF | deraadt | 2002-06-11 | 1 | -19/+16 |
| | |||||
* | add "dsa_dsa_mod_exp" - This mimics the software dsa_mod_exp funtion | beck | 2002-06-11 | 1 | -3/+37 |
| | | | | | | | using two mod_exp operations - otherwise we use BN_mod_exp2 entirely in software, which makes dsa verifications glacially slow while signatures, (which use mod_exp) are fast. This lets cards that can only do bn_mod_exp decently offload most of dsa. | ||||
* | Make DSA work now... at least for things that can do bn_mod_exp. | beck | 2002-06-11 | 1 | -7/+4 |
| | |||||
* | Make asymmetric crypto work in userland | beck | 2002-06-11 | 1 | -36/+114 |
| | | | | | this will only be used if you both have a card that supports it with a working driver and you set sysctl kern.userasymcrypto=1 | ||||
* | Pass the right arguments for RSA, DSA, and modexp operations. Fix the | angelos | 2002-06-09 | 1 | -30/+37 |
| | | | | translation between the crypto framework's format and the BN structure. | ||||
* | add aes/bf/cast; ok deraadt@ | markus | 2002-05-16 | 1 | -2/+50 |
| | |||||
* | OpenSSL 0.9.7 stable 2002 05 08 merge | beck | 2002-05-15 | 1 | -0/+926 |