aboutsummaryrefslogtreecommitdiffstats
path: root/src/libstrongswan/credentials/keys/public_key.c
Commit message (Collapse)AuthorAgeFilesLines
* ikev2: Enumerate RSA/PSS schemes and use them if enabledTobias Brunner2017-11-081-15/+32
|
* public-key: Add optional parameters argument to verify() methodTobias Brunner2017-11-081-2/+2
|
* public-key: Add RSASSA-PSS signature scheme identifierTobias Brunner2017-11-081-0/+6
|
* Migrate all enumerators to venumerate() interface changeTobias Brunner2017-05-261-2/+7
|
* Added support of EdDSA signaturesAndreas Steffen2016-12-141-9/+27
|
* gmp: Support of SHA-3 RSA signaturesAndreas Steffen2016-09-221-20/+44
|
* Explicitly mention SHA2 algorithm in BLISS OIDs and signature schemesAndreas Steffen2015-11-061-22/+22
|
* Support BLISS signatures with SHA-3 hashAndreas Steffen2015-11-031-3/+21
|
* public-key: Add helper to determine acceptable signature schemes for keysTobias Brunner2015-03-041-0/+67
|
* public-key: Add helper to map signature schemes to ASN.1 OIDsTobias Brunner2015-03-041-2/+45
| | | | | | There is a similar function to map key_type_t and hasher_t to an OID, but this maps schemes directly (and to use the other function we'd have to have a function to map schemes to hash algorithms first).
* public-key: Add helper to determine key type from signature schemeTobias Brunner2015-03-041-0/+34
|
* Allow SHA256 and SHA384 data hash for BLISS signatures.Andreas Steffen2015-02-261-0/+6
| | | | | The default is SHA512 since this hash function is also used for the c_indices random oracle.
* Started implementing BLISS signature generationAndreas Steffen2014-11-291-3/+5
|
* Created framework for BLISS post-quantum signature algorithmAndreas Steffen2014-11-291-4/+8
|
* Reverse the changes made to openssl plugin for signature verificationSansar Choinyambuu2011-11-281-1/+0
|
* use openssl rsa_verify functionSansar Choinyambuu2011-11-281-0/+1
|
* Reverse the changes made to openssl plugin for signature verificationSansar Choinyambuu2011-11-281-1/+0
|
* use openssl rsa_verify functionSansar Choinyambuu2011-11-281-0/+1
|
* Include KEY_ANY in key_type_namesMartin Willi2011-10-141-1/+2
|
* Added support for different encryption schemes to private/public keysMartin Willi2010-08-101-0/+10
|
* Renamed key_encod{ing,der}_t and constants, prepare for generic credential ↵Martin Willi2010-07-131-4/+4
| | | | encoding
* Public/Private keys implement a has_fingerprint() methodMartin Willi2009-09-211-0/+19
|
* removed trailing spaces ([[:space:]]+$)Martin Willi2009-09-041-2/+2
|
* distinguish between RFC 4754 (concatenated) and RFC 3279 (DER encoded) ECDSA ↵Martin Willi2009-08-271-5/+8
| | | | signatures
* added generic implementation helpers for private_key_t.equals/belongs_to, ↵Martin Willi2009-08-261-0/+24
| | | | public_key_t.equals
* support of SHA224-based certificate signaturesAndreas Steffen2009-08-051-0/+4
|
* conversion from ECDSA_WITH_SHAxxx OIDs to signature schemesAndreas Steffen2009-07-151-0/+6
|
* pluto supports ECDSA authenticationAndreas Steffen2009-06-121-1/+1
|
* created signature_scheme_from_oid() helper functionAndreas Steffen2009-06-091-1/+34
|
* pluto and scepclient use private and public key plugins of libstrongswanAndreas Steffen2009-06-091-2/+4
|
* removing svn keyword $Id$ from all filesTobias Brunner2009-04-301-2/+0
|
* ECDSA with OpenSSLTobias Brunner2008-06-101-3/+8
|
* merged the modularization branch (credentials) back to trunkMartin Willi2008-03-131-0/+32