aboutsummaryrefslogtreecommitdiffstats
path: root/src/libstrongswan/plugins/openssl/openssl_ec_diffie_hellman.c
Commit message (Collapse)AuthorAgeFilesLines
* openssl: BoringSSL doesn't provide curve data for ECC Brainpool curvesTobias Brunner2016-12-101-1/+4
|
* openssl: Explicitly include openssl/bn.hTobias Brunner2015-09-161-0/+1
| | | | | | | | If OpenSSL is compiled with OPENSSL_NO_DEPRECATED some of the headers we include don't include openssl/bn.h anymore. Therefore, we have to explicitly include it ourselves where we use BN_* functions. Fixes #1113.
* openssl: Support setting ECDH private valuesMartin Willi2015-04-151-0/+44
|
* diffie-hellman: Verify public DH values in backendsMartin Willi2015-03-231-0/+5
|
* diffie-hellman: Add a bool return value to set_other_public_value()Martin Willi2015-03-231-3/+4
|
* diffie-hellman: Add a bool return value to get_my_public_value()Martin Willi2015-03-231-1/+2
|
* diffie-hellman: Use bool instead of status_t as get_shared_secret() return valueMartin Willi2015-03-231-3/+3
| | | | | While such a change is not unproblematic, keeping status_t makes the API inconsistent once we introduce return values for the public value operations.
* crypto: Define MODP_CUSTOM outside of IKE DH rangeTobias Brunner2014-12-231-1/+1
| | | | | | | | | Before this fix it was possible to crash charon with an IKE_SA_INIT message containing a KE payload with DH group MODP_CUSTOM(1025). Defining MODP_CUSTOM outside of the two byte IKE DH identifier range prevents it from getting negotiated. Fixes CVE-2014-9221.
* lib: All settings use configured namespaceTobias Brunner2014-02-121-1/+1
|
* openssl: Verify that a peer's ECDH public value is a point on the elliptic curveTobias Brunner2013-11-191-0/+5
| | | | | This check is mandated by RFC 6989. Since we don't reuse DH secrets, it is mostly a sanity check.
* openssl: Add workaround if ECC Brainpool curves are not definedTobias Brunner2013-10-171-11/+247
|
* openssl: Add support for ECC Brainpool curves for DH, if defined by OpenSSLTobias Brunner2013-10-171-6/+47
| | | | OpenSSL does not include them in releases before 1.0.2.
* Moved debug.[ch] to utils folderTobias Brunner2012-10-241-1/+1
|
* Use chunk_clear to memwipe shared secretThomas Egerer2011-11-041-1/+1
|
* Wipe memory after using key material (incomplete, to be continued)Martin Willi2011-05-091-1/+1
|
* Use a seperate section for each nested struct member in INIT macroMartin Willi2010-08-181-6/+8
|
* Migrated remaining classes in openssl plugin to INIT/METHOD macrosMartin Willi2010-08-101-33/+24
|
* Fixing compilation of the OpenSSL plugin if Elliptic Curve support is disabled.Tobias Brunner2010-06-221-0/+6
| | | | | That is, enable compilation if OpenSSL was configured with OPENSSL_NO_EC.
* Adding DBG_LIB to all calls of libstrongswan's version of DBG*.Tobias Brunner2010-04-061-2/+2
|
* removed trailing spaces ([[:space:]]+$)Martin Willi2009-09-041-32/+32
|
* make ecp_x_coordinate_only = yes the defaultAndreas Steffen2009-07-061-2/+4
|
* ecp_x_coordinate only option allows ECP interoperability with MS WindowsAndreas Steffen2009-07-061-4/+14
|
* removing svn keyword $Id$ from all filesTobias Brunner2009-04-301-2/+0
|
* removed superfluous get_other_public_value in diffie_hellman_t interfaceMartin Willi2008-11-041-19/+0
|
* refactoringTobias Brunner2008-06-101-27/+3
|
* fixed some compiler warningsMartin Willi2008-05-231-1/+1
|
* added the ECP groups from RFC 5114Tobias Brunner2008-05-221-0/+6
|
* added ECDH with OpenSSL (see RFC 4753)Tobias Brunner2008-05-221-0/+360