| Commit message (Collapse) | Author | Age | Files | Lines |
... | |
| |
|
| |
|
| |
|
| |
|
|
|
|
| |
crypto interfaces
|
| |
|
| |
|
|
|
|
| |
ported randomizer_t to a rng_t on top of /dev/(u)random (plugin random)
|
|
|
|
| |
untrusted certs
|
| |
|
| |
|
| |
|
| |
|
|
|
|
| |
testcase
|
| |
|
| |
|
| |
|
|
|
|
| |
certificate types
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
|
|
|
| |
BUILD_NOT_AFTER_TIME
|
| |
|
| |
|
| |
|
| |
|
|
|
|
|
|
| |
as it requires to XOR the key into the hashers state.
A new SHA1 based keyed hash function, implemented as PRF, enables EAP-AKA
and the FIPS-PRF function to properly use the existing SHA1 implementation.
|
| |
|
|
|
|
| |
RSA key generation and signature test
|
| |
|
| |
|
| |
|
|
|
|
|
|
|
| |
additional state in cert
removed x509_t.set_flags for the reason above
implemented a simple, generic shared_key_t
|
| |
|
|
|