Commit message (Collapse) | Author | Age | Files | Lines | ||
---|---|---|---|---|---|---|
... | ||||||
* | Automatic generation of optimized Huffman codes | Andreas Steffen | 2014-12-09 | 7 | -0/+559 | |
| | ||||||
* | unit-tests: added bliss_sampler test | Andreas Steffen | 2014-12-09 | 3 | -0/+99 | |
| | ||||||
* | Expanded bliss_bitpacker to 32 bits | Andreas Steffen | 2014-12-09 | 5 | -41/+39 | |
| | ||||||
* | Implemented full BLISS support for IKEv2 public key authentication and the ↵ | Andreas Steffen | 2014-11-29 | 6 | -7/+15 | |
| | | | | pki tool | |||||
* | Applied bit packing to BLISS public key | Andreas Steffen | 2014-11-29 | 5 | -55/+68 | |
| | ||||||
* | Wipe BLISS private key memory | Andreas Steffen | 2014-11-29 | 1 | -2/+8 | |
| | ||||||
* | Created bliss_bitpacker class to encode BLISS signatures | Andreas Steffen | 2014-11-29 | 8 | -46/+464 | |
| | ||||||
* | Skip the unused bits field of the ASN.1 BIT STRING encoding | Andreas Steffen | 2014-11-29 | 1 | -1/+1 | |
| | ||||||
* | Store NTT A of BLISS public key a | Andreas Steffen | 2014-11-29 | 2 | -28/+24 | |
| | ||||||
* | unit-tests: created bliss_sign test suite | Andreas Steffen | 2014-11-29 | 5 | -1/+91 | |
| | ||||||
* | Finished BLISS signature generation | Andreas Steffen | 2014-11-29 | 12 | -157/+1170 | |
| | ||||||
* | Implemented Gaussian rejection sampler | Andreas Steffen | 2014-11-29 | 6 | -16/+496 | |
| | | | | | The bliss_sampler class uses the mgf1_bitspender as a pseudo-random source. | |||||
* | Implemented get_byte() method for mgf1_bitspender class | Andreas Steffen | 2014-11-29 | 1 | -2/+1 | |
| | | | | | | The new get_byte() method returns a pseudo-random byte at a time. Changed the get_bits() interface to the same interface as get_byte(). Updated the mgf1 unit-tests accordingly. | |||||
* | Added support for BLISS-III | Andreas Steffen | 2014-11-29 | 1 | -2/+17 | |
| | ||||||
* | Started implementing BLISS signature generation | Andreas Steffen | 2014-11-29 | 3 | -15/+9 | |
| | ||||||
* | Store and parse BLISS private and public keys in DER and PEM format | Andreas Steffen | 2014-11-29 | 5 | -27/+419 | |
| | | | | | | | | Additionally generate SHA-1 fingerprints of raw BLISS subjectPublicKey and subjectPublicKeyInfo objects. Some basic functions used by the bliss_public_key class are shared with the bliss_private_key class. | |||||
* | Use mgf1_bitspender in ntru_poly_create_from_seed | Andreas Steffen | 2014-11-29 | 2 | -52/+16 | |
| | ||||||
* | Use mgf1_bitspender to generate random secret key | Andreas Steffen | 2014-11-29 | 1 | -280/+226 | |
| | ||||||
* | unit-tests: Added bliss_fft test suite | Andreas Steffen | 2014-11-29 | 5 | -0/+193 | |
| | ||||||
* | Moved mgf1 class to libstrongswan/crypto/mgf1 | Andreas Steffen | 2014-11-29 | 5 | -267/+7 | |
| | ||||||
* | Defined BLISS I and IV parameter sets | Andreas Steffen | 2014-11-29 | 4 | -19/+365 | |
| | ||||||
* | Implemented Number Theoretic Transform using the FFT algorithm | Andreas Steffen | 2014-11-29 | 8 | -3/+869 | |
| | | | | | | By pre-multiplying the input arrays with a linear phase the fast multiplication via FFT and inverse FFT computes a negative wrapped convolution corresponding to a modulus of x^n+1. | |||||
* | Created framework for BLISS post-quantum signature algorithm | Andreas Steffen | 2014-11-29 | 7 | -0/+625 | |
| | ||||||
* | constraints: Use a more specific FQDN/email name constraint matching | Martin Willi | 2014-10-30 | 1 | -22/+73 | |
| | | | | | | | While RFC 5280 is not very specific about the matching rules of subjectAltNames, it has some examples how to match email and FQDN constraints. We try to follow these examples, and restrict DNS names to subdomain matching and email to full email, host or domain matching. | |||||
* | constraints: Don't reject certificates with invalid certificate policies | Martin Willi | 2014-10-30 | 1 | -25/+97 | |
| | | | | | | | | | | | | Instead of rejecting the certificate completely if a certificate has a policy OID that is actually not allowed by the issuer CA, we accept it. However, the certificate policy itself is still considered invalid, and is not returned in the auth config resulting from trust chain operations. A user must make sure to rely on the returned auth config certificate policies instead of the policies contained in the certificate; even if the certificate is valid, the policy OID itself in the certificate are not to be trusted anymore. | |||||
* | curl: For SSL features, depend on thread-safety provided by our crypto plugins | Martin Willi | 2014-09-24 | 3 | -7/+57 | |
| | | | | | | | | | To use SSL in curl, we need to initialize the SSL library in a thread-safe manner and provide the appropriate callbacks. As we already do that in our crypto plugins using these libraries, we depend on these features. This implies that we need the same plugin enabled (openssl, gcrypt) as the curl backend is configured to use to fetch from HTTPS URIs. | |||||
* | curl: Dynamically query supported protocols and register appropriate features | Martin Willi | 2014-09-24 | 1 | -10/+64 | |
| | ||||||
* | curl: Try to initialize with SSL support to handle https:// URIs | Martin Willi | 2014-09-24 | 1 | -1/+6 | |
| | | | | If initialization fails, we fall back to the old behavior. | |||||
* | plugin-loader: Support a reload() callback for static features | Martin Willi | 2014-09-22 | 2 | -4/+35 | |
| | ||||||
* | curl: Log error code too | Tobias Brunner | 2014-09-09 | 1 | -2/+5 | |
| | | | | It seems libcurl does not always return an error message. | |||||
* | openssl: Report correct key length for EC keys when not using NIST curves | Tobias Brunner | 2014-09-02 | 2 | -22/+2 | |
| | | | | Fixes #688. | |||||
* | winhttp: Do not use countof() on pointer argument | Tobias Brunner | 2014-07-02 | 1 | -1/+1 | |
| | ||||||
* | gcrypt: Use predefined pthread locking functions instead of custom hooks | Martin Willi | 2014-07-01 | 1 | -50/+4 | |
| | | | | | | | | | | | | | Starting with libgcrypt 1.6, it seems that custom locking functions are not supported anymore. Instead, the user has to select from one of the pre-defined set of locking functions. Given that we have a proper threading abstraction API with optional profiling on all platforms, this is somewhat annoying. However, there does not seem to be a way to use custom functions, and we have no other choice than using the provided macro magic to support all libgcrypt versions. Fixes #630. | |||||
* | charon: Set CLOEXEC flag on daemon PID file and /dev/(u)random source FDs | Martin Willi | 2014-06-24 | 1 | -0/+5 | |
| | | | | | | | | | | | | | On Fedora, SELinux complains about these open file descriptors when the updown script invokes iptables. While it seems difficult to set the flag on all file descriptors, this at least fixes those covered by the SELinux policy. As these two cases are in code executed while the daemon is still single threaded, we avoid the use of atomic but not fully portable fdopen("e") or open(O_CLOEXEC) calls. Fixes #519. | |||||
* | winhttp: Fix a typo to properly release connection handle | Martin Willi | 2014-06-19 | 1 | -1/+1 | |
| | | | | Fixes a rather large memory leak in HTTP fetches. | |||||
* | sshkey: Fix loading of ECDSA keys from files | Tobias Brunner | 2014-06-18 | 2 | -3/+3 | |
| | ||||||
* | sshkey: Add support to parse SSH public keys from files with left|rightsigkey | Tobias Brunner | 2014-06-18 | 3 | -3/+59 | |
| | ||||||
* | winhttp: Support basic authentication for URLs having credentials | Martin Willi | 2014-06-04 | 1 | -3/+23 | |
| | ||||||
* | winhttp: Support new response code fetcher option | Martin Willi | 2014-06-04 | 1 | -0/+34 | |
| | ||||||
* | winhttp: Implement a http(s) fetcher based on Microsofts WinHTTP API | Martin Willi | 2014-06-04 | 5 | -0/+522 | |
| | ||||||
* | x509: Check return value when signing attribute certificates | Martin Willi | 2014-06-04 | 1 | -9/+16 | |
| | | | | | | In addition that this lets AC generation fail properly if private key signing fails, it also fixes an issue when compiling on Windows with MinGW 4.8.1, where for some reason the attributeCertificateInfo got encoded incorrectly. | |||||
* | openssl: Don't re-enter FIPS mode if we are already using it | Martin Willi | 2014-06-04 | 1 | -2/+3 | |
| | | | | | | If FIPS mode has been enabled by other means, under some environments it can't be entered again. It fails with "FIPS mode already set". To avoid it, we first check the mode before changing it. | |||||
* | openssl: Be less verbose about FIPS mode when not running as daemon | Martin Willi | 2014-06-04 | 1 | -2/+2 | |
| | | | | | While this is valuable information, printing it for pki and other tools is annoying. | |||||
* | sqlite: Avoid name clash when building on Windows | Martin Willi | 2014-06-04 | 1 | -2/+2 | |
| | ||||||
* | mysql: Add Windows support | Martin Willi | 2014-06-04 | 2 | -5/+8 | |
| | | | | | | As the mysql_config script is not available for Windows, we use a hardcoded library name and no additional CFLAGS. This builds fine against the binary MySQL Connector/C distribution. | |||||
* | openssl: Fix includes to prevent <winsock2.h> to complain about include order | Martin Willi | 2014-06-04 | 2 | -6/+8 | |
| | ||||||
* | openssl: Undef OpenSSLs X509_NAME defined by <wincrypt.h> | Martin Willi | 2014-06-04 | 1 | -0/+6 | |
| | ||||||
* | openssl: Check and link against libeay32 instead of libcrypto on Windows | Martin Willi | 2014-06-04 | 1 | -1/+1 | |
| | | | | Most Windows OpenSSL builds come with the crypto library named libeay32. | |||||
* | sha1: Include <library.h> instead of directly including <arpa/inet.h> | Martin Willi | 2014-06-04 | 2 | -4/+3 | |
| | | | | On Windows we don't have <arpa/inet.h> | |||||
* | x509: Undef OCSP_RESPONSE from <wincrypt.h> before using it | Martin Willi | 2014-06-04 | 1 | -0/+5 | |
| |