Commit message (Collapse) | Author | Age | Files | Lines | |
---|---|---|---|---|---|
* | testing: Converted ipv6/rw-ikev2 to swanctl | Andreas Steffen | 2017-11-10 | 14 | -104/+163 |
| | |||||
* | testing: Converted ipv6/rw-ikev1 to swanctl | Andreas Steffen | 2017-11-10 | 14 | -107/+160 |
| | |||||
* | testing: Converted ipv6/net2net-rfc3779-ikev2 to swanctl | Andreas Steffen | 2017-11-10 | 17 | -88/+128 |
| | |||||
* | testing: Converted ipv6/net2net-ip4-in-ip6-ikev2 to swanctl | Andreas Steffen | 2017-11-10 | 10 | -78/+117 |
| | |||||
* | testing: Converted ipv6/net2net-ip4-in-ip6-ikev1 to swanctl | Andreas Steffen | 2017-11-10 | 10 | -78/+113 |
| | |||||
* | testing: Converted ipv6/transport-ikev2 to swanctl | Andreas Steffen | 2017-11-10 | 11 | -76/+116 |
| | |||||
* | testing: Converted ipv6/transport-ikev1 to swanctl | Andreas Steffen | 2017-11-10 | 11 | -75/+112 |
| | |||||
* | testing: Converted ipv6/net2net-ikev2 to swanctl | Andreas Steffen | 2017-11-10 | 11 | -84/+119 |
| | |||||
* | testing: Converted ipv6/net2net-ikev1 to swanctl | Andreas Steffen | 2017-11-10 | 11 | -82/+118 |
| | |||||
* | testing: Converted ipv6/host2host-ikev2 to swanctl | Andreas Steffen | 2017-11-10 | 11 | -83/+115 |
| | |||||
* | testing: Converted ipv6/host2host-ikev1 to swanctl | Andreas Steffen | 2017-11-10 | 11 | -86/+111 |
| | |||||
* | testing: Removed libipsec/rw-suite-b | Andreas Steffen | 2017-11-10 | 28 | -2260/+0 |
| | |||||
* | testing: Converted libipsec/net2net-null to swanctl | Andreas Steffen | 2017-11-10 | 10 | -67/+102 |
| | |||||
* | testing: Converted libipsec/net2net-cert-ipv6 to swanctl | Andreas Steffen | 2017-11-10 | 10 | -59/+102 |
| | |||||
* | testing: Converted libipsec/net2net-cert to swanctl | Andreas Steffen | 2017-11-10 | 10 | -59/+102 |
| | |||||
* | testing: Converted libipsec/net2net-3des to swanctl | Andreas Steffen | 2017-11-10 | 10 | -67/+102 |
| | |||||
* | testing: Converted libipsec/host2host-cert to swanctl | Andreas Steffen | 2017-11-10 | 10 | -51/+94 |
| | |||||
* | testing: Converted gcrypt-ikev2 to swanctl | Andreas Steffen | 2017-11-10 | 25 | -158/+243 |
| | |||||
* | testing: Converted gcrypt-ikev1 to systemd | Andreas Steffen | 2017-11-10 | 8 | -31/+63 |
| | |||||
* | testing: Converted af-alg to systemd | Andreas Steffen | 2017-11-10 | 9 | -35/+72 |
| | |||||
* | testing: Enable systemd | Andreas Steffen | 2017-11-10 | 3 | -3/+4 |
| | |||||
* | testing: Updated some descriptions | Andreas Steffen | 2017-11-10 | 3 | -9/+9 |
| | |||||
* | libtpmtss: Added missing argument in hasher_from_signature_scheme() | Andreas Steffen | 2017-11-10 | 1 | -1/+1 |
| | |||||
* | charon-tkm: Unlink PID file after deinit | Tobias Brunner | 2017-11-10 | 1 | -11/+31 |
| | | | | | | Same change as for charon in the previous commit. References #2460. | ||||
* | charon: Unlink PID file after daemon deinit (i.e. after unloading plugins etc.) | Tobias Brunner | 2017-11-10 | 1 | -9/+14 |
| | | | | | | | | Make sure, though, that we only remove the file if we actually created it (e.g. not for --help or --version). And do so before deinitializing libstrongswan due to leak detective. Fixes #2460. | ||||
* | unit-tests: Rename targets for libstrongswan and kernel-netlink | Thomas Egerer | 2017-11-09 | 2 | -10/+10 |
| | | | | | | | | | libstrongswan and kernel-netlink are the only two components which do not adhere to the naming scheme used for all other tests. If the tests are run by an external application this imposes problems due to clashing names. Signed-off-by: Thomas Egerer <thomas.egerer@secunet.com> | ||||
* | Merge branch 'rsassa-pss' | Tobias Brunner | 2017-11-08 | 116 | -593/+8494 |
|\ | | | | | | | | | | | | | | | | | | | | | This adds support for RSASSA-PSS signatures in IKEv2 digital signature authentication (RFC 7427), certificates and CRLs etc., and when signing credentials via pki tool. For interoperability with older versions, the default is to use classic PKCS#1 signatures. To use PSS padding either enable rsa_pss via strongswan.conf or explicitly use it either via ike:rsa/pss... auth token or the --rsa-padding option of the pki tool. References #2427. | ||||
| * | auth-cfg: Add RSA/PSS schemes for pubkey and rsa if enabled in strongswan.conf | Tobias Brunner | 2017-11-08 | 4 | -16/+94 |
| | | | | | | | | Also document the rsa/pss prefix. | ||||
| * | pki: Enable PSS padding if enabled in strongswan.conf | Tobias Brunner | 2017-11-08 | 5 | -5/+11 |
| | | |||||
| * | pki: Optionally generate RSA/PSS signatures | Tobias Brunner | 2017-11-08 | 13 | -45/+179 |
| | | |||||
| * | pki: Indent usage lines properly automatically | Tobias Brunner | 2017-11-08 | 5 | -13/+13 |
| | | |||||
| * | Treat RSASSA-PSS keys like rsaEncryption RSA keys | Tobias Brunner | 2017-11-08 | 3 | -1/+20 |
| | | | | | | | | | | | | | | | | | | | | In theory we should treat any parameters and the identifier itself as restriction to only use the key to create signatures accordingly (e.g. only use RSA with PSS padding or even use specific hash algorithms). But that's currently tricky as we'd have to store and pass this information along with our private keys (i.e. use PKCS#8 to store them and change the builder calls to pass along the identifier and parameters). That would require quite some work. | ||||
| * | openssl: Add support for signature schemes with parameters | Tobias Brunner | 2017-11-08 | 2 | -47/+34 |
| | | |||||
| * | pki: Properly forward digest to attribute certificate builder | Tobias Brunner | 2017-11-08 | 1 | -0/+1 |
| | | |||||
| * | x509: Add support for signature schemes with parameters | Tobias Brunner | 2017-11-08 | 5 | -143/+220 |
| | | | | | | | | | | Also adds support for specifying the hash algorithm for attribute certificate signatures. | ||||
| * | builder: Add builder option to pass signature scheme and params | Tobias Brunner | 2017-11-08 | 2 | -1/+4 |
| | | |||||
| * | ikev2: Use helpers to build signature auth data | Tobias Brunner | 2017-11-08 | 1 | -40/+4 |
| | | |||||
| * | signature-params: Add helpers to parse/build ASN.1 algorithmIdentifier for ↵ | Tobias Brunner | 2017-11-08 | 3 | -0/+196 |
| | | | | | | | | signature schemes | ||||
| * | ikev2: Enumerate RSA/PSS schemes and use them if enabled | Tobias Brunner | 2017-11-08 | 6 | -38/+67 |
| | | |||||
| * | ikev2: Support signing with RSASSA-PSS via RFC 7427 signature auth | Tobias Brunner | 2017-11-08 | 1 | -6/+21 |
| | | |||||
| * | signature-params: Use helper to build MGF1 algorithmIdentifier | Tobias Brunner | 2017-11-08 | 1 | -2/+2 |
| | | |||||
| * | asn1: Add helper function to create algorithmIdentifier with parameters | Tobias Brunner | 2017-11-08 | 2 | -6/+23 |
| | | |||||
| * | ikev2: Verify RSASSA-PSS signatures via RFC 7427 signature auth | Tobias Brunner | 2017-11-08 | 1 | -19/+34 |
| | | |||||
| * | keymat_v2: Pass/receive signature schemes as signature_param_t objects | Tobias Brunner | 2017-11-08 | 2 | -28/+58 |
| | | |||||
| * | auth-cfg: Parse rsa/pss auth tokens | Tobias Brunner | 2017-11-08 | 2 | -25/+136 |
| | | |||||
| * | auth-cfg: Store signature schemes as signature_params_t objects | Tobias Brunner | 2017-11-08 | 10 | -67/+116 |
| | | | | | | | | | | Due to circular references the hasher_from_signature_scheme() helper does not take a signature_params_t object. | ||||
| * | certificate: Return signature scheme and parameters from issued_by() method | Tobias Brunner | 2017-11-08 | 29 | -72/+124 |
| | | | | | | | | | | This also required some include restructuring (avoid including library.h in headers) to avoid unresolvable circular dependencies. | ||||
| * | signature-params: Add helper struct for signature scheme and parameters | Tobias Brunner | 2017-11-08 | 3 | -18/+319 |
| | | |||||
| * | android: Add support for creating RSASSA-PSS signatures via JNI | Tobias Brunner | 2017-11-08 | 1 | -2/+142 |
| | | |||||
| * | unit-tests: Add RSA-PSS signature tests with specific salts | Tobias Brunner | 2017-11-08 | 1 | -92/+818 |
| | |