Commit message (Collapse) | Author | Age | Files | Lines | ||
---|---|---|---|---|---|---|
... | ||||||
* | Add ISA context id getter to TKM keymat | Reto Buerki | 2013-03-19 | 3 | -0/+16 | |
| | ||||||
* | keymat: Acquire AE context ID on initialization | Reto Buerki | 2013-03-19 | 1 | -3/+9 | |
| | ||||||
* | Add TKM_CTX_AE (Authenticated Endpoint context) | Reto Buerki | 2013-03-19 | 4 | -5/+8 | |
| | ||||||
* | keymat: Acquire ISA context ID on initialization | Reto Buerki | 2013-03-19 | 1 | -2/+22 | |
| | ||||||
* | Add TKM_CTX_ISA (IKE SA context) | Reto Buerki | 2013-03-19 | 4 | -6/+8 | |
| | ||||||
* | Use remote PSK signature computed by TKM | Reto Buerki | 2013-03-19 | 1 | -25/+19 | |
| | ||||||
* | keymat: Check for aes256-sha512 in derive_ike_keys | Reto Buerki | 2013-03-19 | 1 | -0/+8 | |
| | | | | Return FALSE if peers try to use other algorithm combinations. | |||||
* | keymat: Call ike_isa_sign_psk in get_psk_sig | Adrian-Ken Rueegsegger | 2013-03-19 | 1 | -1/+26 | |
| | | | | Get PSK signed AUTH octets from TKM in initiator case. | |||||
* | Factor out AEAD transform creation | Reto Buerki | 2013-03-19 | 1 | -61/+92 | |
| | | | | | Introduce static aead_create_from_keys function to initialize AEAD transforms from key chunks. | |||||
* | Add keymat IKE key derivation test case | Reto Buerki | 2013-03-19 | 3 | -0/+105 | |
| | ||||||
* | keymat: Create inbound and outbound AEAD transforms | Reto Buerki | 2013-03-19 | 1 | -3/+85 | |
| | | | | | | | Create and initialize AEAD transforms with keys derived by the TKM. Return these transforms in the get_aead function. IKE keys used by charon are derived by TKM now. | |||||
* | keymat: Extract enc,inc algorithms from proposal | Reto Buerki | 2013-03-19 | 1 | -0/+26 | |
| | | | | | Extract encryption and integrity algorithms from proposal and check them before deriving IKE keys. | |||||
* | keymat: Call TKM Isa_Create procedure | Reto Buerki | 2013-03-19 | 1 | -4/+39 | |
| | ||||||
* | Implement chunk_to_sequence function | Reto Buerki | 2013-03-19 | 3 | -0/+40 | |
| | | | | This function converts a given chunk to a variable-length byte sequence. | |||||
* | Implement sequence_to_chunk function | Reto Buerki | 2013-03-19 | 6 | -4/+107 | |
| | | | | | This function converts a given TKM variable-length byte sequence to chunk. | |||||
* | keymat: Log nonce and DH context ids | Adrian-Ken Rueegsegger | 2013-03-19 | 1 | -1/+5 | |
| | ||||||
* | Add context id getter to TKM DH implementation | Adrian-Ken Rueegsegger | 2013-03-19 | 3 | -0/+17 | |
| | ||||||
* | keymat: Get context id of local nonce | Adrian-Ken Rueegsegger | 2013-03-19 | 1 | -2/+22 | |
| | | | | | To derive IKE keys using TKM the nonce context id of the local nonce is needed. Get the id for a given chunk using the chunk map. | |||||
* | nonceg: Insert id mapping when allocating nonce | Adrian-Ken Rueegsegger | 2013-03-19 | 1 | -1/+6 | |
| | ||||||
* | Add chunk map | Adrian-Ken Rueegsegger | 2013-03-19 | 7 | -0/+278 | |
| | | | | | This data structure allows to store mappings of chunks to ids. This will be used to map nonces to their corresponding nonce context ids. | |||||
* | Add context id getter to TKM nonce generator | Adrian-Ken Rueegsegger | 2013-03-19 | 3 | -0/+17 | |
| | ||||||
* | id_manager: Use calloc instead of malloc | Reto Buerki | 2013-03-19 | 1 | -10/+4 | |
| | | | | | This way we don't need to manually initialize the slot status; free slots are now indicated by 0 though. | |||||
* | Use ikev2 keymat proxy | Reto Buerki | 2013-03-19 | 1 | -7/+18 | |
| | | | | | | Forward incoming calls to default ikev2 keymat instance. This is needed to make a stepwise migration to TKM keymat possible. It will be removed once the corresponding parts are implemented in the TKM. | |||||
* | Add skeleton for TKM keymat variant | Reto Buerki | 2013-03-19 | 3 | -0/+256 | |
| | ||||||
* | id_manager: Use limits given by TKM | Reto Buerki | 2013-03-19 | 1 | -5/+15 | |
| | ||||||
* | Pass context limits on to id manager | Reto Buerki | 2013-03-19 | 4 | -12/+21 | |
| | ||||||
* | Request limits from TKM on init | Reto Buerki | 2013-03-19 | 1 | -0/+15 | |
| | ||||||
* | id_manager: Use array of bool instead of list | Reto Buerki | 2013-03-19 | 2 | -41/+42 | |
| | | | | | | Instead of storing the acquired context ids in a linked list, use an array of booleans for the job. A boolean value of true in the array designates an available context id. | |||||
* | Use id manager to acquire DH context id | Reto Buerki | 2013-03-19 | 1 | -9/+23 | |
| | ||||||
* | Add TKM_CTX_DH (Diffie-Hellman context) to id manager | Reto Buerki | 2013-03-19 | 2 | -3/+6 | |
| | ||||||
* | Use id manager to acquire nonce context id | Reto Buerki | 2013-03-19 | 1 | -6/+16 | |
| | ||||||
* | Add initial TKM Diffie-Hellman implementation | Reto Buerki | 2013-03-19 | 7 | -2/+234 | |
| | | | | | | | | | | The tkm_diffie_hellman_t plugin acquires a DH context from the Trusted Key Manager and uses it to get a DH public value and the calculated shared secret. Proper context handling is still missing though, the plugin currently uses context ID 1. The get_shared_secret function will be removed as soon as the TKM specific keymat is ready. | |||||
* | charon-tkm: Register tkm nonce generator | Reto Buerki | 2013-03-19 | 2 | -1/+9 | |
| | ||||||
* | tkm_nonceg: Return nonce generated by TKM | Reto Buerki | 2013-03-19 | 1 | -1/+13 | |
| | ||||||
* | Initialize TKM client library in tkm.c | Reto Buerki | 2013-03-19 | 3 | -6/+37 | |
| | ||||||
* | Introduce TKM specific charon daemon (charon-tkm) | Reto Buerki | 2013-03-19 | 18 | -0/+1208 | |
Analogous to charon-nm the charon-tkm daemon is a specialized charon instance used in combination with the trusted key manager (TKM) written in Ada. The charon-tkm is basically a copy of the charon-nm code which will register it's own TKM specific plugins. The daemon binary is built using the gprbuild utility. This is needed because it uses the tkm-rpc Ada library and consequently the Ada runtime. gprbuild takes care of the complete binding and linker steps required to properly initialize the Ada runtime. |