Commit message (Collapse) | Author | Age | Files | Lines | ||
---|---|---|---|---|---|---|
... | ||||||
* | diffie-hellman: Verify public DH values in backends | Martin Willi | 2015-03-23 | 2 | -0/+10 | |
| | ||||||
* | diffie-hellman: Add a bool return value to set_other_public_value() | Martin Willi | 2015-03-23 | 2 | -5/+7 | |
| | ||||||
* | diffie-hellman: Add a bool return value to get_my_public_value() | Martin Willi | 2015-03-23 | 2 | -2/+4 | |
| | ||||||
* | diffie-hellman: Use bool instead of status_t as get_shared_secret() return value | Martin Willi | 2015-03-23 | 2 | -6/+6 | |
| | | | | | While such a change is not unproblematic, keeping status_t makes the API inconsistent once we introduce return values for the public value operations. | |||||
* | openssl: Return the proper IV length for OpenSSL crypters | Tobias Brunner | 2015-02-23 | 1 | -1/+1 | |
| | | | | | | | For instance, the NULL cipher has a block size of 1 but an IV length of 0. Fixes #854. | |||||
* | crypto: Define MODP_CUSTOM outside of IKE DH range | Tobias Brunner | 2014-12-23 | 2 | -2/+2 | |
| | | | | | | | | | Before this fix it was possible to crash charon with an IKE_SA_INIT message containing a KE payload with DH group MODP_CUSTOM(1025). Defining MODP_CUSTOM outside of the two byte IKE DH identifier range prevents it from getting negotiated. Fixes CVE-2014-9221. | |||||
* | curl: For SSL features, depend on thread-safety provided by our crypto plugins | Martin Willi | 2014-09-24 | 1 | -0/+2 | |
| | | | | | | | | | To use SSL in curl, we need to initialize the SSL library in a thread-safe manner and provide the appropriate callbacks. As we already do that in our crypto plugins using these libraries, we depend on these features. This implies that we need the same plugin enabled (openssl, gcrypt) as the curl backend is configured to use to fetch from HTTPS URIs. | |||||
* | openssl: Report correct key length for EC keys when not using NIST curves | Tobias Brunner | 2014-09-02 | 2 | -22/+2 | |
| | | | | Fixes #688. | |||||
* | openssl: Don't re-enter FIPS mode if we are already using it | Martin Willi | 2014-06-04 | 1 | -2/+3 | |
| | | | | | | If FIPS mode has been enabled by other means, under some environments it can't be entered again. It fails with "FIPS mode already set". To avoid it, we first check the mode before changing it. | |||||
* | openssl: Be less verbose about FIPS mode when not running as daemon | Martin Willi | 2014-06-04 | 1 | -2/+2 | |
| | | | | | While this is valuable information, printing it for pki and other tools is annoying. | |||||
* | openssl: Fix includes to prevent <winsock2.h> to complain about include order | Martin Willi | 2014-06-04 | 2 | -6/+8 | |
| | ||||||
* | openssl: Undef OpenSSLs X509_NAME defined by <wincrypt.h> | Martin Willi | 2014-06-04 | 1 | -0/+6 | |
| | ||||||
* | openssl: Check and link against libeay32 instead of libcrypto on Windows | Martin Willi | 2014-06-04 | 1 | -1/+1 | |
| | | | | Most Windows OpenSSL builds come with the crypto library named libeay32. | |||||
* | plugins: Don't link with -rdynamic on Windows | Martin Willi | 2014-06-04 | 1 | -1/+1 | |
| | ||||||
* | aead: Support custom AEAD salt sizes | Martin Willi | 2014-03-31 | 2 | -2/+12 | |
| | | | | | | | | | The salt, or often called implicit nonce, varies between AEAD algorithms and their use in protocols. For IKE and ESP, GCM uses 4 bytes, while CCM uses 3 bytes. With TLS, however, AEAD mode uses 4 bytes for both GCM and CCM. Our GCM backends currently support 4 bytes and CCM 3 bytes only. This is fine until we go for CCM mode support in TLS, which requires 4 byte nonces. | |||||
* | openssl: Add default fallback when calculating fingerprints of RSA keys | Tobias Brunner | 2014-03-22 | 1 | -1/+15 | |
| | | | | | | We still try to calculate these directly as it can avoid a dependency on the pkcs1 or other plugins. But for e.g. PGPv3 keys we need to delegate the actual fingerprint calculation to the pgp plugin. | |||||
* | lib: All settings use configured namespace | Tobias Brunner | 2014-02-12 | 5 | -5/+5 | |
| | ||||||
* | openssl: Verify that a peer's ECDH public value is a point on the elliptic curve | Tobias Brunner | 2013-11-19 | 1 | -0/+5 | |
| | | | | | This check is mandated by RFC 6989. Since we don't reuse DH secrets, it is mostly a sanity check. | |||||
* | openssl: Add workaround if ECC Brainpool curves are not defined | Tobias Brunner | 2013-10-17 | 1 | -11/+247 | |
| | ||||||
* | openssl: Add support for ECC Brainpool curves for DH, if defined by OpenSSL | Tobias Brunner | 2013-10-17 | 2 | -6/+51 | |
| | | | | OpenSSL does not include them in releases before 1.0.2. | |||||
* | iv_gen: aead_t implementations provide an IV generator | Tobias Brunner | 2013-10-11 | 1 | -0/+15 | |
| | ||||||
* | Remove HASH_PREFERRED, usages are replaced with HASH_SHA1, which is required ↵ | Tobias Brunner | 2013-10-11 | 1 | -3/+3 | |
| | | | | for IKEv2 anyway | |||||
* | openssl: Properly log FIPS mode when enabled via openssl.conf | Tobias Brunner | 2013-09-27 | 1 | -5/+13 | |
| | | | | | | | | | Enabling FIPS mode twice will fail, so if it is enabled in openssl.conf it should be disabled in strongswan.conf (or the other way around). Either way, we should log whether FIPS mode is enabled or not. References #412. | |||||
* | openssl: Add support for generic encoding of EC public keys | Tobias Brunner | 2013-09-13 | 1 | -23/+13 | |
| | ||||||
* | openssl: Add generic RSA public key encoding | Tobias Brunner | 2013-09-13 | 1 | -3/+17 | |
| | ||||||
* | openssl: Add helper function to convert BIGNUMs to chunks | Tobias Brunner | 2013-09-13 | 2 | -0/+27 | |
| | ||||||
* | automake: replace INCLUDES by AM_CPPFLAGS | Martin Willi | 2013-07-18 | 1 | -4/+5 | |
| | | | | | | INCLUDES are now deprecated and throw warnings when using automake 1.13. We now also differentiate AM_CPPFLAGS and AM_CFLAGS, where includes and defines are passed to AM_CPPFLAGS only. | |||||
* | openssl: parse X.509 extended key usage from extension parsing loop | Martin Willi | 2013-07-18 | 1 | -33/+38 | |
| | | | | | Otherwise parsing gets aborted if unknown critical extensions are handled as error. | |||||
* | openssl: show which critical X.509 extension is not supported | Martin Willi | 2013-07-18 | 1 | -1/+6 | |
| | ||||||
* | Recognize critical IssuingDistributionPoint CRL extension | Andreas Steffen | 2013-07-12 | 1 | -0/+4 | |
| | ||||||
* | openssl: RAND_pseudo_bytes() returns 0 if bytes are not cryptographically strong | Martin Willi | 2013-07-04 | 1 | -9/+6 | |
| | | | | For our purposes with RNG_WEAK this is fine, so accept a zero return value. | |||||
* | openssl: add support for IP addr blocks in X.509 certificates | Michael Rossberg | 2013-05-24 | 1 | -1/+115 | |
| | ||||||
* | openssl: Only warn about unavailable FIPS mode if the user requested it | Tobias Brunner | 2013-05-08 | 1 | -1/+1 | |
| | ||||||
* | openssl: Cleanup thread specific error buffer | Tobias Brunner | 2013-05-08 | 1 | -5/+38 | |
| | ||||||
* | openssl: Don't use deprecated CRYPTO_set_id_callback() with OpenSSL >= 1.0.0 | Tobias Brunner | 2013-05-08 | 1 | -17/+29 | |
| | ||||||
* | openssl: Add PKCS#12 parsing via OpenSSL | Tobias Brunner | 2013-05-08 | 4 | -0/+307 | |
| | ||||||
* | openssl: Properly cleanup OpenSSL library | Tobias Brunner | 2013-05-08 | 1 | -2/+7 | |
| | ||||||
* | Add support for untruncated HMAC-SHA-512 | Tobias Brunner | 2013-05-08 | 1 | -0/+1 | |
| | ||||||
* | openssl: Define a default for FIPS_MODE | Tobias Brunner | 2013-05-03 | 1 | -0/+4 | |
| | ||||||
* | support of OpenSSL FIPS-140-2 library | Andreas Steffen | 2013-04-16 | 2 | -1/+20 | |
| | ||||||
* | Allow SHA1_Init()/SHA1_Update() to fail if OpenSSL version >= 1.0 | Martin Willi | 2013-04-10 | 1 | -0/+14 | |
| | ||||||
* | Check RSA_public_decrypt() length before constructing and comparing a chunk | Martin Willi | 2013-04-10 | 1 | -7/+10 | |
| | | | | | If decryption fails, it returns -1. chunk_equals() should catch that error, but be more explicit in error checking. | |||||
* | RSA_check_key() may return -1 if it fails | Martin Willi | 2013-04-10 | 1 | -2/+2 | |
| | ||||||
* | RAND_bytes/RAND_pseudo_bytes returns -1 if it is not supported by RAND method | Martin Willi | 2013-04-10 | 1 | -1/+1 | |
| | ||||||
* | Check return value of ECDSA_Verify() correctly | Martin Willi | 2013-04-10 | 1 | -1/+1 | |
| | ||||||
* | openssl: The EVP GCM interface requires at least OpenSSL 1.0.1 | Tobias Brunner | 2013-03-01 | 2 | -0/+8 | |
| | ||||||
* | openssl: Provide AES-GCM implementation | Tobias Brunner | 2013-02-28 | 4 | -1/+312 | |
| | ||||||
* | openssl: Disable PKCS#7/CMS when building against OpenSSL < 0.9.8g | Tobias Brunner | 2013-02-20 | 2 | -1/+5 | |
| | | | | Fixes #292. | |||||
* | openssl: Properly honor OPENSSL_NO_* defines | Tobias Brunner | 2013-01-31 | 7 | -5/+31 | |
| | ||||||
* | Properly check MSB in openssl plugin's PKCS#7 implementation | Tobias Brunner | 2013-01-24 | 1 | -1/+1 | |
| |