aboutsummaryrefslogtreecommitdiffstats
path: root/src/libstrongswan/plugins
Commit message (Expand)AuthorAgeFilesLines
...
* aesni: Implement CMAC mode to provide a signer/prfMartin Willi2015-04-154-0/+441
* aesni: Implement XCBC mode to provide a signer/prfMartin Willi2015-04-154-0/+436
* aesni: Partially use separate code paths for different key sizes in CCMMartin Willi2015-04-151-33/+438
* aesni: Add a CCM AEAD reusing the key scheduleMartin Willi2015-04-154-0/+645
* aesni: Use 4-way parallel AES-NI instructions for CTR en/decryptionMartin Willi2015-04-151-115/+354
* aesni: Use dedicated round count specific encryption functions in CTR modeMartin Willi2015-04-151-23/+243
* aesni: Implement a AES-NI based CTR crypter using the key scheduleMartin Willi2015-04-154-0/+278
* aesni: Use 4-way parallel AES-NI instructions for CBC decryptionMartin Willi2015-04-151-66/+314
* aesni: Use separate en-/decryption CBC code paths for different key sizesMartin Willi2015-04-151-22/+290
* aesni: Implement a AES-NI based CBC crypter using the key scheduleMartin Willi2015-04-154-0/+293
* aesni: Implement 256-bit key scheduleMartin Willi2015-04-151-0/+77
* aesni: Implement 192-bit key scheduleMartin Willi2015-04-151-0/+81
* aesni: Implement 128-bit key scheduleMartin Willi2015-04-151-0/+45
* aesni: Add a common key schedule class for AESMartin Willi2015-04-153-0/+165
* aesni: Provide a plugin stub for AES-NI instruction based crypto primitivesMartin Willi2015-04-153-0/+141
* test-vectors: Add some self-made additional AES-GCM test vectorsMartin Willi2015-04-152-0/+157
* test-vectors: Define some additional CCM test vectorsMartin Willi2015-04-152-1/+84
* crypto-tester: Use the plugin feature key size to benchmark crypters/aeadsMartin Willi2015-04-151-0/+2
* utils: Use chunk_equals_const() for all cryptographic purposesMartin Willi2015-04-144-4/+4
* utils: Use memeq_const() for all cryptographic purposesMartin Willi2015-04-144-6/+5
* rdrand: Reuse CPU feature detection to check for RDRAND instructionsMartin Willi2015-04-131-51/+4
* padlock: Reuse common CPU feature detection to check for Padlock featuresMartin Willi2015-04-131-80/+17
* sqlite: Use our locking mechanism also when sqlite3_threadsafe() returns 0Martin Willi2015-04-131-7/+20
* sqlite: Show SQLite library version and thread safety flag during startupMartin Willi2015-04-131-1/+8
* openssl: Don't pre-initialize OpenSSL HMAC with an empty keyMartin Willi2015-04-131-6/+16
* fips-prf: Remove superfluous <arpa/inet.h> includeMartin Willi2015-04-131-2/+0
* Wipe auxiliary key store5.3.0Andreas Steffen2015-03-281-1/+1
* fips-prf: Fail when trying to use append mode on FIPS-PRFMartin Willi2015-03-281-1/+6
* cmac: Reset state before doing set_key()Martin Willi2015-03-271-0/+3
* af-alg: Reset hmac/xcbc state before doing set_key()Martin Willi2015-03-272-0/+2
* xcbc: Reset XCBC state in set_key()Martin Willi2015-03-271-0/+4
* hmac: Reset the underlying hasher before doing set_key() with longer keysMartin Willi2015-03-271-1/+2
* diffie-hellman: Verify public DH values in backendsMartin Willi2015-03-235-0/+25
* diffie-hellman: Add a bool return value to set_other_public_value()Martin Willi2015-03-236-28/+31
* diffie-hellman: Add a bool return value to get_my_public_value()Martin Willi2015-03-236-7/+13
* diffie-hellman: Use bool instead of status_t as get_shared_secret() return valueMartin Willi2015-03-236-19/+19
* files: Add simple plugin to load files from file:// URIsTobias Brunner2015-03-095-0/+293
* plugin-loader: Increase log level for warning about plugin features that fail...Tobias Brunner2015-03-091-3/+3
* pkcs11: Convert RFC 3279 ECDSA signatures when verifyingTobias Brunner2015-03-091-4/+33
* pkcs11: Properly encode RFC 3279 ECDSA signaturesTobias Brunner2015-03-091-2/+19
* pkcs11: Properly encode EC_POINTs created on a tokenTobias Brunner2015-03-091-5/+8
* pkcs11: Properly handle EC_POINTs returned as ASN.1 octet stringTobias Brunner2015-03-091-1/+43
* x509: Use subjectKeyIdentifier provided by issuer cert when checking CRL issuerTobias Brunner2015-03-061-18/+15
* bliss: Add generated Huffman codes to the repositoryTobias Brunner2015-03-025-14/+860
* Fixed compiler warningsAndreas Steffen2015-02-271-2/+3
* Allow SHA256 and SHA384 data hash for BLISS signatures.Andreas Steffen2015-02-264-26/+74
* unit-tests: Completed BLISS testsAndreas Steffen2015-02-256-16/+668
* Check for null pointer before applying memwipe()Andreas Steffen2015-02-251-4/+10
* Implemented improved BLISS-B signature algorithmAndreas Steffen2015-02-256-47/+352
* plugin-loader: Do not unload libraries during dlclose(), if supportedMartin Willi2015-02-241-1/+9