aboutsummaryrefslogtreecommitdiffstats
path: root/src/charon-tkm/tests
Commit message (Collapse)AuthorAgeFilesLines
* Don't manually register kernel_netlink_netReto Buerki2013-03-191-4/+0
| | | | | | | | | Load complete kernel_netlink plugin instead. Registering the TKM specific plugins first still ensures that the correct ipsec plugin is used. Lazy initialize the RNG_WEAK plugin to avoid the unsatisfiable soft dependency on startup.
* Initialize libstrongswan in test_runner main()Reto Buerki2013-03-192-54/+41
|
* Add TKM_CTX_CC (Certificate chain context id)Adrian-Ken Rueegsegger2013-03-191-1/+1
|
* Add typelen parameter to chunk_to_sequence functionAdrian-Ken Rueegsegger2013-03-191-1/+1
| | | | The parameter is used to initialize the given sequence to zero.
* Let tkm_keymat_t extend keymat_v2_tAdrian-Ken Rueegsegger2013-03-191-7/+10
|
* Add test for keymat derive_child_keys operationAdrian-Ken Rueegsegger2013-03-191-0/+89
|
* Implement TKM kernel SA database (SAD)Adrian-Ken Rueegsegger2013-03-193-0/+124
| | | | | The TKM kernel SAD (security association database) stores information about CHILD SAs.
* Add TKM_CTX_ESA (ESP SA context id)Adrian-Ken Rueegsegger2013-03-191-1/+1
|
* Use rng to generate local ESP SPIsAdrian-Ken Rueegsegger2013-03-191-0/+1
|
* charon-tkm: Register kernel_netlink_netAdrian-Ken Rueegsegger2013-03-191-0/+6
| | | | | | Explicitly register kernel netlink net implementation and avoid loading the whole kernel-netlink plugin since the kernel netlink ipsec part is unwanted.
* Add ISA context id getter to TKM keymatReto Buerki2013-03-191-0/+1
|
* Add TKM_CTX_AE (Authenticated Endpoint context)Reto Buerki2013-03-191-1/+1
|
* Add TKM_CTX_ISA (IKE SA context)Reto Buerki2013-03-191-1/+1
|
* Add keymat IKE key derivation test caseReto Buerki2013-03-193-0/+105
|
* Implement chunk_to_sequence functionReto Buerki2013-03-191-0/+18
| | | | This function converts a given chunk to a variable-length byte sequence.
* Implement sequence_to_chunk functionReto Buerki2013-03-193-0/+47
| | | | | This function converts a given TKM variable-length byte sequence to chunk.
* Add context id getter to TKM DH implementationAdrian-Ken Rueegsegger2013-03-191-0/+1
|
* Add chunk mapAdrian-Ken Rueegsegger2013-03-193-0/+60
| | | | | This data structure allows to store mappings of chunks to ids. This will be used to map nonces to their corresponding nonce context ids.
* Add context id getter to TKM nonce generatorAdrian-Ken Rueegsegger2013-03-191-0/+1
|
* Pass context limits on to id managerReto Buerki2013-03-191-8/+9
|
* id_manager: Use array of bool instead of listReto Buerki2013-03-191-0/+18
| | | | | | Instead of storing the acquired context ids in a linked list, use an array of booleans for the job. A boolean value of true in the array designates an available context id.
* Add initial TKM Diffie-Hellman implementationReto Buerki2013-03-193-0/+60
| | | | | | | | | | The tkm_diffie_hellman_t plugin acquires a DH context from the Trusted Key Manager and uses it to get a DH public value and the calculated shared secret. Proper context handling is still missing though, the plugin currently uses context ID 1. The get_shared_secret function will be removed as soon as the TKM specific keymat is ready.
* Initialize TKM client library in tkm.cReto Buerki2013-03-191-2/+8
|
* Introduce TKM specific charon daemon (charon-tkm)Reto Buerki2013-03-195-0/+285
Analogous to charon-nm the charon-tkm daemon is a specialized charon instance used in combination with the trusted key manager (TKM) written in Ada. The charon-tkm is basically a copy of the charon-nm code which will register it's own TKM specific plugins. The daemon binary is built using the gprbuild utility. This is needed because it uses the tkm-rpc Ada library and consequently the Ada runtime. gprbuild takes care of the complete binding and linker steps required to properly initialize the Ada runtime.