Commit message (Collapse) | Author | Age | Files | Lines | ||
---|---|---|---|---|---|---|
... | ||||||
* | iv-gen: Add a generic constructor to create an IV gen from an algorithm | Martin Willi | 2015-04-13 | 2 | -0/+69 | |
| | ||||||
* | crypto-tester: Explicitly exclude FIPS-PRF from append mode tests | Martin Willi | 2015-03-28 | 1 | -8/+11 | |
| | | | | | This was implicitly done by the seed length check before 58dda5d6, but we now require an explicit check to avoid that unsupported use. | |||||
* | crypto-tester: Test set_key() after a doing a partial append on prf/signers | Martin Willi | 2015-03-27 | 1 | -2/+20 | |
| | | | | | While that use is uncommon in real-world use, nonetheless should HMAC set a correct key and reset any underlying hasher. | |||||
* | diffie-hellman: Verify public DH values in backends | Martin Willi | 2015-03-23 | 2 | -1/+82 | |
| | ||||||
* | diffie-hellman: Add a bool return value to set_other_public_value() | Martin Willi | 2015-03-23 | 1 | -1/+3 | |
| | ||||||
* | diffie-hellman: Add a bool return value to get_my_public_value() | Martin Willi | 2015-03-23 | 1 | -1/+3 | |
| | ||||||
* | diffie-hellman: Use bool instead of status_t as get_shared_secret() return value | Martin Willi | 2015-03-23 | 1 | -2/+3 | |
| | | | | | While such a change is not unproblematic, keeping status_t makes the API inconsistent once we introduce return values for the public value operations. | |||||
* | hash-algorithm-set: Add class to manage a set of hash algorithms | Tobias Brunner | 2015-03-04 | 2 | -0/+189 | |
| | ||||||
* | hasher: Add helper to determine hash algorithm from signature scheme | Tobias Brunner | 2015-03-04 | 2 | -0/+44 | |
| | ||||||
* | hasher: Add filter function for algorithms permitted by RFC 7427 | Tobias Brunner | 2015-03-04 | 2 | -0/+30 | |
| | ||||||
* | hasher: Redefine hash algorithms to match values defined by RFC 7427 | Tobias Brunner | 2015-03-04 | 2 | -27/+29 | |
| | | | | Other algorithms are defined in private use range. | |||||
* | Allow SHA256 and SHA384 data hash for BLISS signatures. | Andreas Steffen | 2015-02-26 | 1 | -0/+4 | |
| | | | | | The default is SHA512 since this hash function is also used for the c_indices random oracle. | |||||
* | Fixed bad bit shift and sign extension errors | Andreas Steffen | 2014-12-23 | 1 | -6/+20 | |
| | ||||||
* | crypto: Define MODP_CUSTOM outside of IKE DH range | Tobias Brunner | 2014-12-23 | 2 | -7/+10 | |
| | | | | | | | | | Before this fix it was possible to crash charon with an IKE_SA_INIT message containing a KE payload with DH group MODP_CUSTOM(1025). Defining MODP_CUSTOM outside of the two byte IKE DH identifier range prevents it from getting negotiated. Fixes CVE-2014-9221. | |||||
* | mgf1: Use correct Doxygen groups | Tobias Brunner | 2014-12-15 | 2 | -4/+4 | |
| | ||||||
* | Fixed some typos, courtesy of codespell | Tobias Brunner | 2014-12-15 | 1 | -2/+2 | |
| | ||||||
* | pkcs5: Add support for PBES2 encryption schemes other than 3DES | Tobias Brunner | 2014-12-05 | 1 | -8/+24 | |
| | | | | | | | | This allows using e.g. AES for PKCS#8 and PKCS#12 files. Some legacy schemes defined in RFC 2898 are not supported (like RC2). Fixes #740. | |||||
* | asn1: Add OID for Blowfish CBC | Tobias Brunner | 2014-12-05 | 1 | -0/+7 | |
| | | | | | | | | The OID (1.3.6.1.4.1.3029.1.2) is technically not correct, the correct one is (1.3.6.1.4.1.3029.1.1.2). Every other library or tool (like OpenSSL) uses the incorrect one so we do the same. References #740. | |||||
* | diffie-hellman: Handle dh_exponent_ansi_x9_42 as a boolean setting | Martin Willi | 2014-12-05 | 1 | -2/+2 | |
| | | | | | | | | | | | | | While it was always documented as boolean setting, the option is currently handled as integer value, for which yes/no values do not work. Instead the default of TRUE is used for a no value. The option has been moved a lot during the last years, and in some locations was handled as bool, in some as integer. In the latest codebase it congruently used integer, which is actually not what is documented and used in testing. Fixes #781. | |||||
* | Implemented get_byte() method for mgf1_bitspender class | Andreas Steffen | 2014-11-29 | 2 | -18/+61 | |
| | | | | | | The new get_byte() method returns a pseudo-random byte at a time. Changed the get_bits() interface to the same interface as get_byte(). Updated the mgf1 unit-tests accordingly. | |||||
* | Started implementing BLISS signature generation | Andreas Steffen | 2014-11-29 | 1 | -0/+8 | |
| | ||||||
* | Implemented bitspender based on the MGF1 mask generator function | Andreas Steffen | 2014-11-29 | 3 | -1/+219 | |
| | ||||||
* | Moved mgf1 class to libstrongswan/crypto/mgf1 | Andreas Steffen | 2014-11-29 | 2 | -0/+257 | |
| | ||||||
* | diffie-hellman: Explicitly initialize DH exponent sizes during initialization | Martin Willi | 2014-08-25 | 2 | -8/+36 | |
| | | | | | | | | To avoid any race conditions when multiple threads call and initialize diffie_hellman_get_params(), explicitly examine the optimum DH exponent size during library initialization. Fixes #655. | |||||
* | crypto-factory: Only sort RNGs by algorithm identifier | Tobias Brunner | 2014-06-20 | 1 | -5/+13 | |
| | | | | | Others remain in the order in which they were added, grouped by algorithm identifier and sorted by benchmarking speed, if provided. | |||||
* | windows: Check for clock_gettime() function itself as well | Martin Willi | 2014-06-04 | 1 | -1/+1 | |
| | | | | | CLOCK_THREAD_CPUTIME_ID seems to be defined sometimes even if clock_gettime() is missing. | |||||
* | windows: Add a common Windows header for platform specific wrappers | Martin Willi | 2014-06-03 | 1 | -2/+4 | |
| | | | | | Include some more basic system headers in utils.h, so we can use that common header on the different platforms. | |||||
* | enum: Don't directly include enum.h | Martin Willi | 2014-05-16 | 1 | -1/+1 | |
| | | | | | To allow enum.h to depend on utils.h definitions, avoid its direct inclusion. Instead include utils.h, which includes enum.h as well. | |||||
* | aead: Support custom AEAD salt sizes | Martin Willi | 2014-03-31 | 5 | -13/+32 | |
| | | | | | | | | | The salt, or often called implicit nonce, varies between AEAD algorithms and their use in protocols. For IKE and ESP, GCM uses 4 bytes, while CCM uses 3 bytes. With TLS, however, AEAD mode uses 4 bytes for both GCM and CCM. Our GCM backends currently support 4 bytes and CCM 3 bytes only. This is fine until we go for CCM mode support in TLS, which requires 4 byte nonces. | |||||
* | crypto-tester: Don't fail if key size is not supported | Tobias Brunner | 2014-03-20 | 1 | -6/+3 | |
| | | | | | | | | The Blowfish and Twofish implementations provided by the gcrypt plugin only support specific key lengths, which we don't know when testing against vectors (either during unit tests or during algorithm registration). The on_create test with a specific key length will be skipped anyway, so there is no point in treating this failure differently. | |||||
* | unit-tests: Actually verify registered algorithms against test vectors | Tobias Brunner | 2014-03-20 | 1 | -1/+38 | |
| | | | | | | | | Previously, the {ns}.crypto_test.on_add option had to be enabled to actually test the algorithms, which we can't enforce for the tests in the test_runner as the option is already read when the crypto factory is initialized. Even so, we wouldn't want to do this for every unit test, which would be the result of enabling that option. | |||||
* | lib: All settings use configured namespace | Tobias Brunner | 2014-02-12 | 3 | -8/+8 | |
| | ||||||
* | proposal: Add possibility to register custom proposal keyword parser | Thomas Egerer | 2014-01-20 | 2 | -2/+66 | |
| | | | | | | | | | If a proposal string cannot be matched to a token using strcmp (e.g. if you want to register a whole class of algorithms containing their ID, like my_alg_2342), you can use the provided function to register a parser that transforms the given string into a proposal token. Signed-off-by: Thomas Egerer <thomas.egerer@secunet.com> | |||||
* | Prototype implementation of IKE key exchange via NTRU encryption | Andreas Steffen | 2013-11-27 | 3 | -3/+17 | |
| | ||||||
* | ecc: Added ECC Brainpool ECDH groups as registered with IANA | Andreas Steffen | 2013-10-17 | 3 | -3/+20 | |
| | ||||||
* | Revert refactoring which broke CentOS build | Andreas Steffen | 2013-10-13 | 1 | -1/+1 | |
| | ||||||
* | iv_gen: Mask sequential IVs with a random salt | Tobias Brunner | 2013-10-11 | 1 | -0/+24 | |
| | | | | | This makes it harder to attack a HA setup, even if the sequence numbers were not fully in sync. | |||||
* | iv_gen: Provide external sequence number (IKE, ESP) | Tobias Brunner | 2013-10-11 | 3 | -17/+10 | |
| | | | | This prevents duplicate sequential IVs in case of a HA failover. | |||||
* | iv_gen: aead_t implementations provide an IV generator | Tobias Brunner | 2013-10-11 | 2 | -1/+30 | |
| | ||||||
* | iv_gen: Add IV generator that allocates IVs sequentially | Tobias Brunner | 2013-10-11 | 2 | -0/+119 | |
| | ||||||
* | iv_gen: Add IV generator that allocates IVs randomly | Tobias Brunner | 2013-10-11 | 2 | -0/+111 | |
| | | | | Uses RNG_WEAK as the code currently does elsewhere to allocate IVs. | |||||
* | crypto: Add generic interface for IV generators | Tobias Brunner | 2013-10-11 | 1 | -0/+59 | |
| | ||||||
* | apidoc: Move mac_prf to prf Doxygen group | Tobias Brunner | 2013-10-11 | 1 | -1/+1 | |
| | ||||||
* | crypto-factory: Try next available RNG implementation if constructor fails | Tobias Brunner | 2013-10-11 | 1 | -13/+6 | |
| | ||||||
* | crypto-factory: Order entries by algorithm identifier and (optionally) speed | Tobias Brunner | 2013-10-11 | 1 | -22/+18 | |
| | ||||||
* | Remove HASH_PREFERRED, usages are replaced with HASH_SHA1, which is required ↵ | Tobias Brunner | 2013-10-11 | 4 | -18/+10 | |
| | | | | for IKEv2 anyway | |||||
* | pkcs5: Add missing break statements when checking crypto primitives | Tobias Brunner | 2013-07-24 | 1 | -0/+2 | |
| | ||||||
* | Fix various API doc issues and typos | Tobias Brunner | 2013-07-18 | 1 | -2/+2 | |
| | | | | Partially based on an old patch by Adrian-Ken Rueegsegger. | |||||
* | crypto-factory: count the number of test vector failures during registration | Martin Willi | 2013-06-21 | 2 | -30/+73 | |
| | ||||||
* | Added missing string for full-length HMAC-SHA512 signer | Tobias Brunner | 2013-06-10 | 1 | -0/+1 | |
| |