Commit message (Collapse) | Author | Age | Files | Lines | |
---|---|---|---|---|---|
* | Wipe auxiliary key store5.3.0 | Andreas Steffen | 2015-03-28 | 1 | -1/+1 |
| | |||||
* | fips-prf: Fail when trying to use append mode on FIPS-PRF | Martin Willi | 2015-03-28 | 1 | -1/+6 |
| | | | | | Append mode hardly makes sense for the special stateful FIPS-PRF, which is different to other PRFs. | ||||
* | cmac: Reset state before doing set_key() | Martin Willi | 2015-03-27 | 1 | -0/+3 |
| | |||||
* | af-alg: Reset hmac/xcbc state before doing set_key() | Martin Willi | 2015-03-27 | 2 | -0/+2 |
| | |||||
* | xcbc: Reset XCBC state in set_key() | Martin Willi | 2015-03-27 | 1 | -0/+4 |
| | | | | | If some partial data has been appended, a truncated key gets invalid if it is calculated from the pending state. | ||||
* | hmac: Reset the underlying hasher before doing set_key() with longer keys | Martin Willi | 2015-03-27 | 1 | -1/+2 |
| | | | | | | | The user might have done a non-complete append, having some state in the hasher. Fixes #909. | ||||
* | diffie-hellman: Verify public DH values in backends | Martin Willi | 2015-03-23 | 5 | -0/+25 |
| | |||||
* | diffie-hellman: Add a bool return value to set_other_public_value() | Martin Willi | 2015-03-23 | 6 | -28/+31 |
| | |||||
* | diffie-hellman: Add a bool return value to get_my_public_value() | Martin Willi | 2015-03-23 | 6 | -7/+13 |
| | |||||
* | diffie-hellman: Use bool instead of status_t as get_shared_secret() return value | Martin Willi | 2015-03-23 | 6 | -19/+19 |
| | | | | | While such a change is not unproblematic, keeping status_t makes the API inconsistent once we introduce return values for the public value operations. | ||||
* | files: Add simple plugin to load files from file:// URIs | Tobias Brunner | 2015-03-09 | 5 | -0/+293 |
| | |||||
* | plugin-loader: Increase log level for warning about plugin features that ↵ | Tobias Brunner | 2015-03-09 | 1 | -3/+3 |
| | | | | | | | | | failed to load Since we can't get rid of all unmet dependencies (at least not in every possible plugin configuration) the message is more confusing than helpful. In particular because a detailed warning about plugin features that failed to load due to unmet dependencies is only logged on level 2. | ||||
* | pkcs11: Convert RFC 3279 ECDSA signatures when verifying | Tobias Brunner | 2015-03-09 | 1 | -4/+33 |
| | | | | References #873. | ||||
* | pkcs11: Properly encode RFC 3279 ECDSA signatures | Tobias Brunner | 2015-03-09 | 1 | -2/+19 |
| | | | | Fixes #873. | ||||
* | pkcs11: Properly encode EC_POINTs created on a token | Tobias Brunner | 2015-03-09 | 1 | -5/+8 |
| | | | | | | | Some tokens might not fail when creating EC public keys in the incorrect format, but they will later not be able to use them to verify signatures. References #872. | ||||
* | pkcs11: Properly handle EC_POINTs returned as ASN.1 octet string | Tobias Brunner | 2015-03-09 | 1 | -1/+43 |
| | | | | | | | This is the correct encoding but we internally only use unwrapped keys and some tokens return them unwrapped. Fixes #872. | ||||
* | x509: Use subjectKeyIdentifier provided by issuer cert when checking CRL issuer | Tobias Brunner | 2015-03-06 | 1 | -18/+15 |
| | | | | | | | | | Some CAs don't use SHA-1 hashes of the public key as subjectKeyIdentifier and authorityKeyIdentifier. If that's the case we can't force the calculation of the hash to compare that to authorityKeyIdentifier in the CRL, instead we use the subjectKeyIdentifier stored in the issuer certificate, if available. Otherwise, we fall back to the SHA-1 hash (or comparing the DNs) as before. | ||||
* | bliss: Add generated Huffman codes to the repository | Tobias Brunner | 2015-03-02 | 5 | -14/+860 |
| | | | | | | | | | | | | | While these files are generated they don't really change and are not architecture dependant. The previous solution prevented cross-compilation from the repository as `bliss_huffman` was built for the target system but was then executed on the build host to create the source files, which naturally was bound to fail. The `recreate-bliss-huffman` make target can be used inside the bliss directory to update the source files if needed. Fixes #812. | ||||
* | Fixed compiler warnings | Andreas Steffen | 2015-02-27 | 1 | -2/+3 |
| | |||||
* | Allow SHA256 and SHA384 data hash for BLISS signatures. | Andreas Steffen | 2015-02-26 | 4 | -26/+74 |
| | | | | | The default is SHA512 since this hash function is also used for the c_indices random oracle. | ||||
* | unit-tests: Completed BLISS tests | Andreas Steffen | 2015-02-25 | 6 | -16/+668 |
| | |||||
* | Check for null pointer before applying memwipe() | Andreas Steffen | 2015-02-25 | 1 | -4/+10 |
| | |||||
* | Implemented improved BLISS-B signature algorithm | Andreas Steffen | 2015-02-25 | 6 | -47/+352 |
| | |||||
* | plugin-loader: Do not unload libraries during dlclose(), if supported | Martin Willi | 2015-02-24 | 1 | -1/+9 |
| | | | | | | | Unloading libraries calls any library constructor/destructor functions. Some libraries can't handle that in our excessive unit test use. GnuTLS leaks a /dev/urandom file descriptor, letting unit tests fail with arbitrary out-of-resources errors. | ||||
* | openssl: Return the proper IV length for OpenSSL crypters | Tobias Brunner | 2015-02-23 | 1 | -1/+1 |
| | | | | | | | For instance, the NULL cipher has a block size of 1 but an IV length of 0. Fixes #854. | ||||
* | x509: Fix public key reference leak if authority key identifier does not match | Martin Willi | 2015-02-06 | 1 | -10/+12 |
| | |||||
* | unit-tests: Adapted to coverity fixes | Andreas Steffen | 2014-12-23 | 1 | -9/+12 |
| | |||||
* | Fixed bad bit shift and sign extension errors | Andreas Steffen | 2014-12-23 | 3 | -4/+14 |
| | |||||
* | bliss: Remove unnecessary cast to double | Tobias Brunner | 2014-12-23 | 1 | -1/+1 |
| | | | | | | Coverity is still not happy when the result of an integer division is assigned to a double (without e.g. casting the result to an int first to indicate the intent). The shift should avoid this issue. | ||||
* | bliss: Log type if unsupported | Tobias Brunner | 2014-12-23 | 1 | -1/+1 |
| | |||||
* | bliss: Make sure sampler exists after checking for it earlier | Tobias Brunner | 2014-12-23 | 1 | -2/+2 |
| | |||||
* | crypto: Define MODP_CUSTOM outside of IKE DH range | Tobias Brunner | 2014-12-23 | 6 | -6/+6 |
| | | | | | | | | | Before this fix it was possible to crash charon with an IKE_SA_INIT message containing a KE payload with DH group MODP_CUSTOM(1025). Defining MODP_CUSTOM outside of the two byte IKE DH identifier range prevents it from getting negotiated. Fixes CVE-2014-9221. | ||||
* | bliss: Fix Doxygen comments | Tobias Brunner | 2014-12-15 | 2 | -6/+6 |
| | |||||
* | Also initialize s_sign | Andreas Steffen | 2014-12-12 | 1 | -1/+1 |
| | |||||
* | pem: Handle BER indefinite length encoding as binary ASN.1 | Martin Willi | 2014-12-12 | 1 | -1/+24 |
| | | | | | | While our ASN.1 parser can't handle BER indefinite length encoding, the OpenSSL backend can. Some PKCS#12 containers get encoded this way, so we should support loading such files in the pem plugin. | ||||
* | Cache only support fingerprint types | Andreas Steffen | 2014-12-12 | 1 | -2/+4 |
| | |||||
* | Fix ambiguities and gcc compiler warning | Andreas Steffen | 2014-12-12 | 1 | -3/+3 |
| | |||||
* | Use bitspender->get_bytes() method in ntru_trits | Andreas Steffen | 2014-12-12 | 1 | -26/+14 |
| | |||||
* | Use Huffman code in BLISS signature | Andreas Steffen | 2014-12-12 | 7 | -38/+296 |
| | |||||
* | Include design parameters in generated Huffman code files | Andreas Steffen | 2014-12-12 | 1 | -20/+31 |
| | |||||
* | bliss: Fix monolithic build | Tobias Brunner | 2014-12-12 | 11 | -93/+114 |
| | | | | | | | | | | | This requires moving test files so that the Makefile for the tests can be included after building libstrongswan, which requires the plugin when building monolithically. Due to this a static helper library is required as directly referring to object files (or source files) is not possible. It's also necessary to avoid any link-time dependency on libstrongswan in bliss_huffman, to avoid circular dependencies (bliss_huffman -> libstrongswan -> bliss -> bliss_huffman). | ||||
* | bliss: Fix compilation warning with certain GCC versions | Tobias Brunner | 2014-12-12 | 1 | -1/+2 |
| | | | | | | Theoretically, n could be zero and these variables are then used uninitialized. Older GCC versions warn about this and on Travis where we compile with -Werror this causes the tests to fail. | ||||
* | Pack private key arrays | Andreas Steffen | 2014-12-10 | 1 | -17/+75 |
| | |||||
* | Automatic generation of optimized Huffman codes | Andreas Steffen | 2014-12-09 | 7 | -0/+559 |
| | |||||
* | unit-tests: added bliss_sampler test | Andreas Steffen | 2014-12-09 | 3 | -0/+99 |
| | |||||
* | Expanded bliss_bitpacker to 32 bits | Andreas Steffen | 2014-12-09 | 5 | -41/+39 |
| | |||||
* | Implemented full BLISS support for IKEv2 public key authentication and the ↵ | Andreas Steffen | 2014-11-29 | 6 | -7/+15 |
| | | | | pki tool | ||||
* | Applied bit packing to BLISS public key | Andreas Steffen | 2014-11-29 | 5 | -55/+68 |
| | |||||
* | Wipe BLISS private key memory | Andreas Steffen | 2014-11-29 | 1 | -2/+8 |
| | |||||
* | Created bliss_bitpacker class to encode BLISS signatures | Andreas Steffen | 2014-11-29 | 8 | -46/+464 |
| |