aboutsummaryrefslogtreecommitdiffstats
path: root/src/libstrongswan/crypto/diffie_hellman.c
Commit message (Collapse)AuthorAgeFilesLines
* diffie-hellman: Add DH group identifiers for Curve25519 and Curve448Martin Willi2016-11-141-3/+11
|
* Created newhope plugin implementing the New Hope key exchange algorithmAndreas Steffen2016-08-101-1/+4
|
* diffie-hellman: Verify public DH values in backendsMartin Willi2015-03-231-0/+72
|
* crypto: Define MODP_CUSTOM outside of IKE DH rangeTobias Brunner2014-12-231-5/+6
| | | | | | | | | Before this fix it was possible to crash charon with an IKE_SA_INIT message containing a KE payload with DH group MODP_CUSTOM(1025). Defining MODP_CUSTOM outside of the two byte IKE DH identifier range prevents it from getting negotiated. Fixes CVE-2014-9221.
* diffie-hellman: Handle dh_exponent_ansi_x9_42 as a boolean settingMartin Willi2014-12-051-2/+2
| | | | | | | | | | | | | While it was always documented as boolean setting, the option is currently handled as integer value, for which yes/no values do not work. Instead the default of TRUE is used for a no value. The option has been moved a lot during the last years, and in some locations was handled as bool, in some as integer. In the latest codebase it congruently used integer, which is actually not what is documented and used in testing. Fixes #781.
* diffie-hellman: Explicitly initialize DH exponent sizes during initializationMartin Willi2014-08-251-8/+28
| | | | | | | | To avoid any race conditions when multiple threads call and initialize diffie_hellman_get_params(), explicitly examine the optimum DH exponent size during library initialization. Fixes #655.
* lib: All settings use configured namespaceTobias Brunner2014-02-121-1/+1
|
* Prototype implementation of IKE key exchange via NTRU encryptionAndreas Steffen2013-11-271-1/+6
|
* ecc: Added ECC Brainpool ECDH groups as registered with IANAAndreas Steffen2013-10-171-3/+11
|
* Fixed compiler warnings for DH groups that define no subgroup.Tobias Brunner2011-11-251-8/+16
|
* Added a generic function to check if a DH group is an EC groupMartin Willi2010-09-031-0/+17
|
* Added a MODP_CUSTOM DH group which takes g and p as constructor argumentsMartin Willi2010-09-021-3/+4
|
* Added support for DH groups 22, 23 and 24, patch contributed by Joy LattenMartin Willi2010-04-191-2/+110
|
* Store DH generator in a chunk, hide non-public data in a private structMartin Willi2010-04-081-275/+273
|
* Provide the Diffie Hellman parameters from a central location, so that we do ↵Tobias Brunner2010-03-091-0/+297
| | | | | | | | not have to replicate them in every plugin that implements the DH interface. The main reason for this change is that Android's libcrypto does not include the get_rfcX_prime_Y functions by default. Therefore we would have had to replicate the primes a third time.
* shortened DH group namesAndreas Steffen2009-05-151-13/+13
|
* removing svn keyword $Id$ from all filesTobias Brunner2009-04-301-2/+0
|
* added a MODP_NULL Diffie Hellman group to avoid calculation overhead in ↵Martin Willi2008-11-221-1/+3
| | | | load-testing
* added missing comma in enumerationAndreas Steffen2008-05-291-1/+1
|
* added the ECP groups from RFC 5114Tobias Brunner2008-05-221-1/+4
|
* added ECDH with OpenSSL (see RFC 4753)Tobias Brunner2008-05-221-3/+6
|
* merged the modularization branch (credentials) back to trunkMartin Willi2008-03-131-558/+3
|
* fixed memory leakMartin Willi2007-10-041-0/+1
|
* implemented an optional DH public value testMartin Willi2007-10-041-89/+92
| | | | some other cleanups, using RFC2631 variable names
* cleanups, fixes and simplification of diffie hellman codeMartin Willi2007-10-041-123/+96
|
* introduced new logging subsystem using bus:Martin Willi2006-10-181-18/+15
| | | | | | | passive listeners can register on the bus active listeners wait for signals actively multiplexing allows multiple listeners to receive debug signals a lot more...
* updated copyright informationMartin Willi2006-07-071-1/+2
|
* workaround for peers rekeying at the same timeMartin Willi2006-06-121-1/+1
| | | | | loading lifetime policies from ipsec.conf
* (no commit message)Martin Willi2006-05-101-1/+0
|
* (no commit message)Martin Willi2006-05-101-0/+615