Commit message (Collapse) | Author | Age | Files | Lines | ||
---|---|---|---|---|---|---|
... | ||||||
* | vici: Add a destroy method to builder, allowing cancellation without error | Martin Willi | 2014-12-12 | 2 | -4/+18 | |
| | | | | | When cancelling a builder, finalize throws an error which we might prefer to avoid. | |||||
* | eap-radius: Use the single-server legacy server options as fallback | Martin Willi | 2014-12-12 | 1 | -3/+10 | |
| | ||||||
* | Pack private key arrays | Andreas Steffen | 2014-12-10 | 1 | -17/+75 | |
| | ||||||
* | dumm: Fix -Wformat warning in ruby extension | Martin Willi | 2014-12-10 | 1 | -2/+2 | |
| | | | | | | | In recent ruby versions, extensions get built with -Wformat. As we use custom printf specifiers, that does not work for us. As there does not seem to be a reliable way to override -Wformat, we use a variable for the format string, which prevents gcc from doing the -Wformat check in that particular situation. | |||||
* | Automatic generation of optimized Huffman codes | Andreas Steffen | 2014-12-09 | 7 | -0/+559 | |
| | ||||||
* | unit-tests: added bliss_sampler test | Andreas Steffen | 2014-12-09 | 3 | -0/+99 | |
| | ||||||
* | Expanded bliss_bitpacker to 32 bits | Andreas Steffen | 2014-12-09 | 5 | -41/+39 | |
| | ||||||
* | NEWS: Add note about AH algorithm mapping | Tobias Brunner | 2014-12-09 | 1 | -1/+4 | |
| | ||||||
* | ikev1: Use same map for AH and ESP authentication algorithms | Tobias Brunner | 2014-12-09 | 1 | -152/+120 | |
| | | | | | | The transform identifier used in AH transforms is not the same as the authentication algorithm identifier used in the transform attributes in AH (and ESP) transforms. | |||||
* | ikev1: Accept IPComp proposals with 4 octet long CPI values | Tobias Brunner | 2014-12-05 | 1 | -2/+2 | |
| | | | | | While they SHOULD be sent as 16-bit values according to RFC 3173 a responder MUST be able to accept CPI values encoded in four bytes. | |||||
* | ike: Only parse payloads valid for the current IKE version | Tobias Brunner | 2014-12-05 | 4 | -3/+33 | |
| | ||||||
* | ike: Make check for known payloads depend on IKE version | Tobias Brunner | 2014-12-05 | 4 | -26/+41 | |
| | ||||||
* | pkcs5: Add support for PBES2 encryption schemes other than 3DES | Tobias Brunner | 2014-12-05 | 1 | -8/+24 | |
| | | | | | | | | This allows using e.g. AES for PKCS#8 and PKCS#12 files. Some legacy schemes defined in RFC 2898 are not supported (like RC2). Fixes #740. | |||||
* | asn1: Add OID for Blowfish CBC | Tobias Brunner | 2014-12-05 | 2 | -0/+11 | |
| | | | | | | | | The OID (1.3.6.1.4.1.3029.1.2) is technically not correct, the correct one is (1.3.6.1.4.1.3029.1.1.2). Every other library or tool (like OpenSSL) uses the incorrect one so we do the same. References #740. | |||||
* | diffie-hellman: Handle dh_exponent_ansi_x9_42 as a boolean setting | Martin Willi | 2014-12-05 | 1 | -2/+2 | |
| | | | | | | | | | | | | | While it was always documented as boolean setting, the option is currently handled as integer value, for which yes/no values do not work. Instead the default of TRUE is used for a no value. The option has been moved a lot during the last years, and in some locations was handled as bool, in some as integer. In the latest codebase it congruently used integer, which is actually not what is documented and used in testing. Fixes #781. | |||||
* | unity: Only do narrowing of responder's TS if we received 0.0.0.0/0 | Tobias Brunner | 2014-12-05 | 1 | -2/+84 | |
| | | | | | | | | | | | | | | | | | | | | | | | iOS and Mac OS X clients establish individual IPsec SAs for the traffic selectors received in Split-Include attributes (might have been different in earlier releases). If we return 0.0.0.0/0 as TSr that either results in a bunch of Quick Mode exchanges (for each TS), or with the latest client releases an error notify (ATTRIBUTES_NOT_SUPPORTED). We also can't install the IPsec SA with all configured subnets as that would cause conflicts if the client later negotiates SAs for other subnets, which iOS 8 does based on traffic to such subnets. For Shrew and the Cisco client, which propose 0.0.0.0/0, we still need to override the narrowed TS with 0.0.0.0/0, as they otherwise won't accept the Quick Mode response. Likewise, we also have to narrow the TS before installing the IPsec SAs and policies. So we basically have to follow the client's proposal and only modify TSr if we received 0.0.0.0/0. Since we don't get the original TS in the narrow hook we handle the inbound QM messages and make note of IKE_SAs on which we received a TSr of 0.0.0.0/0. Fixes #737. | |||||
* | id-payload: Enable multiple calls to get_ts() for subnet traffic selectors | Tobias Brunner | 2014-12-05 | 1 | -2/+5 | |
| | | | | The second call resulted in a /32 subnet previously. | |||||
* | ikev2: Fix handling of more than one hash-and-URL certificate payloads | Tobias Brunner | 2014-12-04 | 1 | -2/+2 | |
| | ||||||
* | Merge branch 'wfp-drop-firewall' | Martin Willi | 2014-12-04 | 3 | -41/+244 | |
|\ | | | | | | | | | Introduces ALE layer WFP rules to accept tunnel mode packets in Windows stateful packet filtering if default-drop policies are used. | |||||
| * | kernel-wfp: Install outbound ALE connect rules for IPsec | Martin Willi | 2014-12-04 | 1 | -16/+43 | |
| | | | | | | | | | | | | Similar to the inbound rules, the ALE filter processes IP-in-IP packets for outbound tunnel mode traffic. When using an outbound default-drop policy, Windows does not allow connection initiation without these explicit rules. | |||||
| * | kernel-wfp: Install inbound ALE IP-in-IP filters | Martin Willi | 2014-12-04 | 1 | -41/+159 | |
| | | | | | | | | | | | | | | | | | | | | | | When processing inbound tunnel mode packets, Windows decrypts packets and filters them as IP-in-IP packets. We therefore require an ALE filter that calls the FWPM_CALLOUT_IPSEC_INBOUND_TUNNEL_ALE_ACCEPT callout to allow them when using a default-drop policy. Without these rules, any outbound packet created an ALE state that allows inbound packets as well. Processing inbound packets without any outbound traffic fails without these rules. | |||||
| * | kernel-wfp: Add missing IPsec sublayer GUIDs | Martin Willi | 2014-12-04 | 1 | -0/+6 | |
| | | ||||||
| * | kernel-wfp: Define IPsec related ALE layers and callout GUIDs | Martin Willi | 2014-12-04 | 2 | -0/+40 | |
| | | ||||||
| * | kernel-wfp: Fix logging of MM/QM/EM NetEvent failures | Martin Willi | 2014-12-04 | 1 | -0/+12 | |
|/ | ||||||
* | vici: Make sure to send/recv all requested bytes over socket | Martin Willi | 2014-12-04 | 1 | -3/+22 | |
| | | | | | | As the underlying C functions, send/recv on ruby sockets are not guaranteed to send/recv all requested bytes. Use wrapper functions to make sure we get all bytes needed. | |||||
* | updown: Inverse comment of VPN_LOGGING variable, as it is enabled by default | Martin Willi | 2014-12-02 | 1 | -1/+1 | |
| | | | | Fixes #780. | |||||
* | Version bump to 5.2.2dr15.2.2dr1 | Andreas Steffen | 2014-11-29 | 2 | -1/+5 | |
| | ||||||
* | Increased check size du to INITIAL_CONTACT notify | Andreas Steffen | 2014-11-29 | 1 | -1/+1 | |
| | ||||||
* | Renewed expired certificates | Andreas Steffen | 2014-11-29 | 19 | -171/+223 | |
| | ||||||
* | Implemented full BLISS support for IKEv2 public key authentication and the ↵ | Andreas Steffen | 2014-11-29 | 17 | -18/+97 | |
| | | | | pki tool | |||||
* | Created ikev2/rw-ntru-bliss scenario | Andreas Steffen | 2014-11-29 | 27 | -2/+193 | |
| | ||||||
* | Applied bit packing to BLISS public key | Andreas Steffen | 2014-11-29 | 5 | -55/+68 | |
| | ||||||
* | Wipe BLISS private key memory | Andreas Steffen | 2014-11-29 | 1 | -2/+8 | |
| | ||||||
* | Created bliss_bitpacker class to encode BLISS signatures | Andreas Steffen | 2014-11-29 | 8 | -46/+464 | |
| | ||||||
* | Skip the unused bits field of the ASN.1 BIT STRING encoding | Andreas Steffen | 2014-11-29 | 1 | -1/+1 | |
| | ||||||
* | Store NTT A of BLISS public key a | Andreas Steffen | 2014-11-29 | 2 | -28/+24 | |
| | ||||||
* | unit-tests: created bliss_sign test suite | Andreas Steffen | 2014-11-29 | 5 | -1/+91 | |
| | ||||||
* | Finished BLISS signature generation | Andreas Steffen | 2014-11-29 | 12 | -157/+1170 | |
| | ||||||
* | Implemented Gaussian rejection sampler | Andreas Steffen | 2014-11-29 | 6 | -16/+496 | |
| | | | | | The bliss_sampler class uses the mgf1_bitspender as a pseudo-random source. | |||||
* | Implemented get_byte() method for mgf1_bitspender class | Andreas Steffen | 2014-11-29 | 4 | -26/+78 | |
| | | | | | | The new get_byte() method returns a pseudo-random byte at a time. Changed the get_bits() interface to the same interface as get_byte(). Updated the mgf1 unit-tests accordingly. | |||||
* | Added support for BLISS-III | Andreas Steffen | 2014-11-29 | 1 | -2/+17 | |
| | ||||||
* | Started implementing BLISS signature generation | Andreas Steffen | 2014-11-29 | 8 | -24/+34 | |
| | ||||||
* | Store and parse BLISS private and public keys in DER and PEM format | Andreas Steffen | 2014-11-29 | 9 | -32/+441 | |
| | | | | | | | | Additionally generate SHA-1 fingerprints of raw BLISS subjectPublicKey and subjectPublicKeyInfo objects. Some basic functions used by the bliss_public_key class are shared with the bliss_private_key class. | |||||
* | unit-tests: Created separate mgf1 test suite | Andreas Steffen | 2014-11-29 | 5 | -147/+270 | |
| | ||||||
* | Use mgf1_bitspender in ntru_poly_create_from_seed | Andreas Steffen | 2014-11-29 | 2 | -52/+16 | |
| | ||||||
* | Use mgf1_bitspender to generate random secret key | Andreas Steffen | 2014-11-29 | 1 | -280/+226 | |
| | ||||||
* | Implemented bitspender based on the MGF1 mask generator function | Andreas Steffen | 2014-11-29 | 4 | -3/+223 | |
| | ||||||
* | unit-tests: Added bliss_fft test suite | Andreas Steffen | 2014-11-29 | 5 | -0/+193 | |
| | ||||||
* | Moved mgf1 class to libstrongswan/crypto/mgf1 | Andreas Steffen | 2014-11-29 | 7 | -62/+51 | |
| | ||||||
* | Defined BLISS I and IV parameter sets | Andreas Steffen | 2014-11-29 | 4 | -19/+365 | |
| |