aboutsummaryrefslogtreecommitdiffstats
path: root/src/libstrongswan/crypto/crypto_tester.c
Commit message (Collapse)AuthorAgeFilesLines
* xof: Defined Extended Output FunctionsAndreas Steffen2016-07-291-0/+155
|
* crypto-tester: Support testing DH groups using DH test vectorsMartin Willi2015-04-151-0/+163
|
* crypto-tester: Use the plugin feature key size to benchmark crypters/aeadsMartin Willi2015-04-151-14/+16
| | | | | | We previously didn't pass the key size during algorithm registration, but this resulted in benchmarking with the "default" key size the crypter uses when passing 0 as key size.
* crypto-tester: Explicitly exclude FIPS-PRF from append mode testsMartin Willi2015-03-281-8/+11
| | | | | This was implicitly done by the seed length check before 58dda5d6, but we now require an explicit check to avoid that unsupported use.
* crypto-tester: Test set_key() after a doing a partial append on prf/signersMartin Willi2015-03-271-2/+20
| | | | | While that use is uncommon in real-world use, nonetheless should HMAC set a correct key and reset any underlying hasher.
* windows: Check for clock_gettime() function itself as wellMartin Willi2014-06-041-1/+1
| | | | | CLOCK_THREAD_CPUTIME_ID seems to be defined sometimes even if clock_gettime() is missing.
* windows: Add a common Windows header for platform specific wrappersMartin Willi2014-06-031-2/+4
| | | | | Include some more basic system headers in utils.h, so we can use that common header on the different platforms.
* aead: Support custom AEAD salt sizesMartin Willi2014-03-311-4/+8
| | | | | | | | | The salt, or often called implicit nonce, varies between AEAD algorithms and their use in protocols. For IKE and ESP, GCM uses 4 bytes, while CCM uses 3 bytes. With TLS, however, AEAD mode uses 4 bytes for both GCM and CCM. Our GCM backends currently support 4 bytes and CCM 3 bytes only. This is fine until we go for CCM mode support in TLS, which requires 4 byte nonces.
* crypto-tester: Don't fail if key size is not supportedTobias Brunner2014-03-201-6/+3
| | | | | | | | The Blowfish and Twofish implementations provided by the gcrypt plugin only support specific key lengths, which we don't know when testing against vectors (either during unit tests or during algorithm registration). The on_create test with a specific key length will be skipped anyway, so there is no point in treating this failure differently.
* lib: All settings use configured namespaceTobias Brunner2014-02-121-4/+4
|
* Fix cleanup in crypto_tester if a crypter failsTobias Brunner2013-05-081-1/+4
|
* Fix cleanup in crypto_tester if AEAD implementation failsTobias Brunner2013-02-281-1/+4
|
* Moved debug.[ch] to utils folderTobias Brunner2012-10-241-1/+1
|
* Moved data structures to new collections subfolderTobias Brunner2012-10-241-1/+1
|
* Fixed RNG crypto testerTobias Brunner2012-09-281-11/+9
|
* Test reset() of hasher in crypto testerMartin Willi2012-07-161-1/+9
|
* Refactored error handling in crypto testerMartin Willi2012-07-161-95/+114
|
* Set a key before benching PRFsMartin Willi2012-07-161-1/+8
|
* Add a return value to hasher_t.allocate_hash()Martin Willi2012-07-161-3/+6
|
* Add a return value to hasher_t.get_hash()Martin Willi2012-07-161-6/+11
|
* Add a return value to crypter_t.set_key()Martin Willi2012-07-161-2/+8
|
* Add a return value to crypter_t.decrypt()Martin Willi2012-07-161-4/+12
|
* Add a return value to crypter_t.encryptMartin Willi2012-07-161-4/+12
|
* Check rng return value in crypto testerTobias Brunner2012-07-161-15/+17
|
* Add a return value to prf_t.set_key()Martin Willi2012-07-161-3/+12
|
* Add a return value to prf_t.allocate_bytes()Martin Willi2012-07-161-3/+6
|
* Add a return value to prf_t.get_bytes()Martin Willi2012-07-161-5/+13
|
* Add a return value to signer_t.set_key()Martin Willi2012-07-161-3/+8
|
* Add a return value to signer_t.get_signature()Martin Willi2012-07-161-6/+17
|
* Add a return value to signer_t.allocate_signature()Martin Willi2012-07-161-2/+9
|
* Add a return value to aead_t.set_key()Martin Willi2012-07-161-2/+8
|
* Add a return value to aead_t.encrypt()Martin Willi2012-07-161-8/+18
|
* Use correct integrity_algorithm_t enum type in bench_signer()Martin Willi2012-05-141-1/+1
|
* Disable crypto benchmarking if CLOCK_THREAD_CPUTIME_ID is not available.Tobias Brunner2012-01-301-0/+10
|
* Fixed debug statement if algorithm benchmarking enabledMartin Willi2011-04-081-3/+3
|
* disable AEAD crypto algorithm if no key size is supportedAndreas Steffen2010-12-251-0/+1
|
* disable crypto algorithm if no key size is supportedAndreas Steffen2010-12-251-8/+27
|
* log if an AEAD algorithm does not support a given key sizeAndreas Steffen2010-12-251-2/+6
|
* log if a crypto algorithm does not support a given key sizeAndreas Steffen2010-12-251-1/+3
|
* trace back crypto algorithms to the plugins that registered themAndreas Steffen2010-12-181-64/+64
|
* Give a benchmark point for each operation to compare different transformsMartin Willi2010-08-191-1/+4
|
* Added AEAD support to crypto testerMartin Willi2010-08-191-0/+171
|
* Test append mode for signers verify_signatureMartin Willi2010-08-191-3/+2
|
* Implemented algorithm benchmarking during registrationMartin Willi2010-08-161-16/+278
|
* Migrated crypto_tester to INIT/METHOD macrosMartin Willi2010-08-161-78/+54
|
* Use IV length of a crypter instead of block size for IV calculationsMartin Willi2010-08-131-1/+1
|
* Report the symbol name of a failed test vectorMartin Willi2010-08-131-10/+29
|
* Adding DBG_LIB to all calls of libstrongswan's version of DBG*.Tobias Brunner2010-04-061-20/+20
|
* removed trailing spaces ([[:space:]]+$)Martin Willi2009-09-041-45/+45
|
* fix test vector error outputAndreas Steffen2009-07-171-11/+11
|