aboutsummaryrefslogtreecommitdiffstats
path: root/src/libstrongswan/plugins/gmp
Commit message (Collapse)AuthorAgeFilesLines
* gmp: Add support for static salts when signing with RSA-PSSTobias Brunner2017-11-081-2/+6
|
* gmp: Use helper to determine XOF typeTobias Brunner2017-11-082-28/+10
|
* gmp: Add support for RSASSA-PSS signature verificationTobias Brunner2017-11-082-2/+140
|
* gmp: Add support for RSASSA-PSS signature creationTobias Brunner2017-11-082-0/+130
|
* gmp: Determine missing RSA private key parametersTobias Brunner2017-11-081-4/+109
| | | | | We only need n, e, and d. The parameters for the Chinese remainder algorithm and even p and q can be determined from these.
* private-key: Add optional parameters argument to sign() methodTobias Brunner2017-11-081-1/+1
|
* public-key: Add optional parameters argument to verify() methodTobias Brunner2017-11-081-1/+1
|
* Define MODP_CUSTOM constructors as variadic functionsTobias Brunner2017-09-182-6/+10
| | | | | | They now match the dh_constructor_t signature. This is a follow up for the changes merged with b668bf3f9ec1 and should fix use of MODP_CUSTOM on Apple's ARM64 platform.
* gmp: Fix RSA signature verification for m >= nTobias Brunner2017-08-141-3/+9
| | | | | | | | By definition, m must be <= n-1, we didn't enforce that and because mpz_export() returns NULL if the passed value is zero a crash could have been triggered with m == n. Fixes CVE-2017-11185.
* gmp: Make sure the modulus is odd and the exponent not zeroTobias Brunner2017-05-291-1/+6
| | | | | | | | | Unlike mpz_powm() its secure replacement mpz_powm_sec() has the additional requirement that the exponent must be > 0 and the modulus has to be odd. Otherwise, it will crash with a floating-point exception. Fixes: CVE-2017-9022 Fixes: 3e35a6e7a1b0 ("Use side-channel secured mpz_powm_sec of libgmp 5, if available")
* gmp: Support of SHA-3 RSA signaturesAndreas Steffen2016-09-223-26/+58
|
* Use standard unsigned integer typesAndreas Steffen2016-03-241-1/+1
|
* 128 bit default security strength requires 3072 bit prime DH groupAndreas Steffen2015-12-141-8/+8
|
* gmp: Support setting Diffie-Hellman private valuesMartin Willi2015-04-151-0/+10
|
* utils: Use memeq_const() for all cryptographic purposesMartin Willi2015-04-141-3/+2
|
* Wipe auxiliary key store5.3.0Andreas Steffen2015-03-281-1/+1
|
* diffie-hellman: Verify public DH values in backendsMartin Willi2015-03-231-0/+5
|
* diffie-hellman: Add a bool return value to set_other_public_value()Martin Willi2015-03-231-1/+2
|
* diffie-hellman: Add a bool return value to get_my_public_value()Martin Willi2015-03-231-1/+2
|
* diffie-hellman: Use bool instead of status_t as get_shared_secret() return valueMartin Willi2015-03-231-4/+4
| | | | | While such a change is not unproblematic, keeping status_t makes the API inconsistent once we introduce return values for the public value operations.
* crypto: Define MODP_CUSTOM outside of IKE DH rangeTobias Brunner2014-12-231-1/+1
| | | | | | | | | Before this fix it was possible to crash charon with an IKE_SA_INIT message containing a KE payload with DH group MODP_CUSTOM(1025). Defining MODP_CUSTOM outside of the two byte IKE DH identifier range prevents it from getting negotiated. Fixes CVE-2014-9221.
* plugins: Don't link with -rdynamic on WindowsMartin Willi2014-06-041-1/+1
|
* automake: replace INCLUDES by AM_CPPFLAGSMartin Willi2013-07-181-3/+4
| | | | | | INCLUDES are now deprecated and throw warnings when using automake 1.13. We now also differentiate AM_CPPFLAGS and AM_CFLAGS, where includes and defines are passed to AM_CPPFLAGS only.
* Fixed some typos, courtesy of codespellTobias Brunner2012-12-201-1/+1
|
* allow the optional sharing if RSA private keysAndreas Steffen2012-11-221-104/+185
|
* overwrite sensitive prime with zeroesAndreas Steffen2012-11-181-1/+1
|
* implemented generation of safe primesAndreas Steffen2012-11-181-13/+37
|
* Fix RSA encryption padding terminator in gmp plugin, broken with 5025135fMartin Willi2012-10-241-0/+2
|
* Moved debug.[ch] to utils folderTobias Brunner2012-10-243-3/+3
|
* Add a return value to hasher_t.allocate_hash()Martin Willi2012-07-162-3/+7
|
* Check rng return value when generating DH secrets and primes in gmp pluginTobias Brunner2012-07-163-13/+19
|
* Fix boolean return value if an empty RSA signature is detected in gmp pluginMartin Willi2012-05-311-1/+1
| | | | Fixes CVE-2012-2388.
* Add features support to gmp pluginMartin Willi2011-10-141-44/+77
|
* Added a (not yet implemented) plugin_t method to reload plugin configurationMartin Willi2011-04-151-0/+1
|
* Added a get_name() function to plugin_t, create_plugin_enumerator enumerates ↵Martin Willi2011-04-151-14/+19
| | | | over plugin_t
* trace back crypto algorithms to the plugins that registered themAndreas Steffen2010-12-181-12/+14
|
* Added a final flag to builder registration to enumerate the actually ↵Martin Willi2010-09-031-3/+3
| | | | supported algorithms
* Added support for MODP_CUSTOM to gmp pluginMartin Willi2010-09-023-17/+52
|
* Use a seperate section for each nested struct member in INIT macroMartin Willi2010-08-184-31/+41
|
* Use bits instead of bytes for a private/public keyMartin Willi2010-08-102-5/+5
|
* Added support for different encryption schemes to private/public keysMartin Willi2010-08-102-6/+19
|
* Migrated gmp plugin to INIT/METHOD macrosMartin Willi2010-08-106-173/+103
|
* Renamed key_encod{ing,der}_t and constants, prepare for generic credential ↵Martin Willi2010-07-132-16/+16
| | | | encoding
* PEM encoder supports encoding from RSA components directly, allowing gcrypt ↵Martin Willi2010-04-292-32/+2
| | | | plugin to encode in PEM
* Added support for DH groups 22, 23 and 24, patch contributed by Joy LattenMartin Willi2010-04-192-1/+17
|
* Store DH generator in a chunk, hide non-public data in a private structMartin Willi2010-04-081-11/+12
|
* Adding DBG_LIB to all calls of libstrongswan's version of DBG*.Tobias Brunner2010-04-063-29/+38
|
* PEM encoding for GMP RSA public and private keysAndreas Steffen2010-04-042-2/+32
|
* setting the two most significant bits assures an RSA modulus of maximum bit sizeAndreas Steffen2010-03-151-2/+2
|
* Provide the Diffie Hellman parameters from a central location, so that we do ↵Tobias Brunner2010-03-091-343/+10
| | | | | | | | not have to replicate them in every plugin that implements the DH interface. The main reason for this change is that Android's libcrypto does not include the get_rfcX_prime_Y functions by default. Therefore we would have had to replicate the primes a third time.