aboutsummaryrefslogtreecommitdiffstats
path: root/src/libstrongswan/plugins
Commit message (Expand)AuthorAgeFilesLines
...
* Use standard unsigned integer typesAndreas Steffen2016-03-2460-380/+380
* vici: Support of raw public keysAndreas Steffen2016-01-092-0/+15
* 128 bit default security strength for IKE and ESP algorithmsAndreas Steffen2015-12-171-19/+19
* 128 bit default security strength requires 3072 bit prime DH groupAndreas Steffen2015-12-143-16/+16
* Allow msSmartcardLogon EKU to be builtAndreas Steffen2015-12-111-2/+2
* Print OCSP single responsesAndreas Steffen2015-12-111-2/+40
* byteorder: Add 32-bit unaligned little-endian conversion functionsMartin Willi2015-12-041-21/+0
* revocation: Allow CRLs to be encoded in PEM formatTobias Brunner2015-11-121-1/+1
* curl: Be less strict when considering status codes as errorsTobias Brunner2015-11-121-3/+3
* plugin-loader: Optionally use RTLD_NOW with dlopen()Tobias Brunner2015-11-091-6/+11
* Explicitly mention SHA2 algorithm in BLISS OIDs and signature schemesAndreas Steffen2015-11-065-19/+31
* Use word-aligned XOR in sha3_absorb()Andreas Steffen2015-11-031-4/+47
* Support BLISS signatures with SHA-3 hashAndreas Steffen2015-11-032-0/+12
* Implemented SHA-3 hash algorithm including test vectorsAndreas Steffen2015-11-038-0/+1022
* random: Properly handle errors when reading from /dev/[u]randomTobias Brunner2015-10-291-0/+1
* openssl: Explicitly include openssl/bn.hTobias Brunner2015-09-165-0/+5
* Fixed some typos, courtesy of codespellTobias Brunner2015-08-271-1/+1
* Fix some Doxygen issuesTobias Brunner2015-08-271-1/+1
* plugin-feature: Add vendor specific EAP method registration macrosTobias Brunner2015-08-172-8/+18
* Initialize variables that some compilers seem to warn aboutTobias Brunner2015-08-131-1/+1
* pkcs11: Fix encoding of RSA keys if unnecessarily zero prefixedTobias Brunner2015-08-061-3/+8
* Use MGF1 with SHA-512 as BLISS random oracleAndreas Steffen2015-07-274-72/+58
* Generalize c_indices generation using SHA-512 random oracle.Markku-Juhani Olavi Saarinen2015-07-271-18/+24
* Fixed several bugs in the BLISS signature generation/verification step.Markku-Juhani Olavi Saarinen2015-07-271-4/+8
* chapoly: Process two Poly1305 blocks in parallel in SSSE3 driverMartin Willi2015-07-121-85/+291
* chapoly: Process four ChaCha20 blocks in parallel in SSSE3 driverMartin Willi2015-07-121-16/+207
* chapoly: Add an SSSE3 based driverMartin Willi2015-06-294-1/+514
* chapoly: Add a ChaCha20/Poly1305 driver implemented in portable CMartin Willi2015-06-294-0/+488
* chapoly: Provide a generic ChaCha20/Poly1305 AEAD supporting driver backendsMartin Willi2015-06-297-0/+672
* test-vectors: Add some initial ChaCha20/Poly1305 AEAD test vectorMartin Willi2015-06-293-0/+112
* openssl: Don't refer to EVP_des_ecb() if OpenSSL is built without DES supportTobias Brunner2015-04-171-0/+2
* test-vectors: Define test vector symbols as externMartin Willi2015-04-161-7/+7
* aesni: Fix doxygen groupsMartin Willi2015-04-151-2/+2
* gcrypt: Explicitly initialize RNG backend to allocate static dataMartin Willi2015-04-151-0/+3
* gcrypt: Support setting private value and testing of DH backendMartin Willi2015-04-151-0/+19
* openssl: Support setting ECDH private valuesMartin Willi2015-04-151-0/+44
* openssl: Support setting private Diffie-Hellman valuesMartin Willi2015-04-151-0/+13
* gmp: Support setting Diffie-Hellman private valuesMartin Willi2015-04-151-0/+10
* test-vectors: Add DH vectors for Brainpool groupsMartin Willi2015-04-153-0/+118
* test-vectors: Add DH vectors for ECDH groupsMartin Willi2015-04-153-0/+140
* test-vectors: Add DH vectors for subgroup MODP groupsMartin Willi2015-04-153-0/+168
* test-vectors: Add DH vectors for normal MODP groupsMartin Willi2015-04-153-0/+741
* test-vectors: Support testing DH groupsMartin Willi2015-04-151-1/+16
* aesni: Avoid loading AES/GHASH round keys into local variablesMartin Willi2015-04-156-1568/+1244
* aesni: Align all class instances to 16 byte boundariesMartin Willi2015-04-157-14/+14
* aesni: Calculate GHASH for 4 blocks of associated data in parallelMartin Willi2015-04-151-2/+18
* aesni: Calculate GHASH for 4 blocks of encryption data in parallelMartin Willi2015-04-151-40/+180
* aesni: Use 4-way parallel en/decryption in GCMMartin Willi2015-04-151-132/+635
* aesni: Use dedicated key size specific en-/decryption functions in GCMMartin Willi2015-04-151-24/+353
* aesni: Add a GCM AEAD based on the AES-NI key scheduleMartin Willi2015-04-154-1/+627