aboutsummaryrefslogtreecommitdiffstats
path: root/src/libstrongswan
Commit message (Collapse)AuthorAgeFilesLines
...
* added 2 IDEA test vectorsAndreas Steffen2009-06-173-0/+47
|
* added 6 serpent test vectorsAndreas Steffen2009-06-173-0/+98
|
* added 3 Twofish test vectorsAndreas Steffen2009-06-173-0/+60
|
* added one CAST-128 test vectorAndreas Steffen2009-06-173-0/+30
|
* corrected ASN.1 encoding of OID nodeAndreas Steffen2009-06-171-1/+1
|
* added 6 Camellia test vectorsAndreas Steffen2009-06-171-0/+91
|
* added 6 Camellia test vectorsAndreas Steffen2009-06-172-5/+12
|
* conversion from CAMELLIA OIDs to encryption_algorithmAndreas Steffen2009-06-171-0/+28
|
* fixed tabsAndreas Steffen2009-06-171-1/+1
|
* added camellia-cbc OIDsAndreas Steffen2009-06-171-1/+13
|
* fixed 64 bit warningAndreas Steffen2009-06-171-1/+2
|
* added 2 3DES-CBC and 3 AES-CBC test vectorsAndreas Steffen2009-06-174-0/+104
|
* reformatted crypto_test outputAndreas Steffen2009-06-161-48/+41
|
* support older gcrypt libraries not defining the CAMELLIA cipherMartin Willi2009-06-161-0/+2
|
* fixed compiler warningMartin Willi2009-06-162-0/+4
|
* increased verbosity of successful crypto testsMartin Willi2009-06-161-5/+5
|
* removed one hierarchy level for crypto test optionsMartin Willi2009-06-162-4/+4
|
* remove whitespaceAndreas Steffen2009-06-151-1/+1
|
* gcrypt actually does not implement IDEAMartin Willi2009-06-152-4/+2
|
* implemented gcrypt RSA encrypt/decrypt operationsMartin Willi2009-06-152-8/+65
|
* added a gcrypt.quick_random option to generate weak testing keys fasterMartin Willi2009-06-151-0/+5
|
* implemented IKEv1 specific SIGN_RSA_EMSA_PKCS1_NULL scheme in gcryptMartin Willi2009-06-152-2/+107
|
* check if RSA key is large enough to sign a chunk of dataMartin Willi2009-06-151-0/+7
|
* use save chunk advancing, check signature lengthMartin Willi2009-06-151-9/+5
|
* test_vectors.h is part of the distributionAndreas Steffen2009-06-131-1/+1
|
* pluto supports ECDSA authenticationAndreas Steffen2009-06-1211-67/+67
|
* added SHA2 HMAC signer test vectorsMartin Willi2009-06-122-1/+101
|
* added a FIPS_PRF test vectorMartin Willi2009-06-123-0/+32
|
* added support for stateful PRFs (such as the FIPS_PRF)Martin Willi2009-06-122-0/+10
|
* added SHA2 HMAC PRF test vectorsMartin Willi2009-06-113-0/+281
|
* added SHA2 test vectorsMartin Willi2009-06-113-0/+146
|
* added SHA1 test vectorsMartin Willi2009-06-113-0/+55
|
* added HMAC SHA1 test vectorsMartin Willi2009-06-113-0/+159
|
* added HMAC MD5 test vectorsMartin Willi2009-06-113-0/+123
|
* added RNG test vectorsMartin Willi2009-06-113-1/+249
|
* added MD5 test vectorsMartin Willi2009-06-113-1/+73
|
* added AES-XCBC test vectors for signer/prfMartin Willi2009-06-113-1/+144
|
* added test vectors for AES128 CBCMartin Willi2009-06-113-1/+63
|
* added blowfish test vectors from plutoMartin Willi2009-06-113-1/+51
|
* added a plugin providing crypto test vectorsMartin Willi2009-06-115-0/+219
|
* make use of the crypto_tester in the crypto_factoryMartin Willi2009-06-113-44/+149
| | | | | libstrongswan.crypto.test.on_add to test algorithms during initialization libstrongswan.crypto.test.on_create to test algorithms on each instantiation
* implemented a crypto_tester class to test crypto algorithmsMartin Willi2009-06-113-0/+832
| | | | | libstrongswan.crypto.test.required to require at least one test vector to use an algorithm libstrongswan.crypto.test.rng_true to run RNG tests on RNG_TRUE quality
* handling hashers and rngs as transform types (in private range)Martin Willi2009-06-112-5/+9
|
* gcrypt blowfish supports 128 bit key size onlyMartin Willi2009-06-111-0/+4
|
* additional check in case of non-positive monthsAndreas Steffen2009-06-101-2/+2
|
* implemented IKEv1 RSA signing in openssl_rsa_private_key.cAndreas Steffen2009-06-101-43/+54
|
* implemented IKEv1 signature verification in openssl_rsa_public_key.cAndreas Steffen2009-06-101-36/+54
|
* fixed typo in asn1.cAndreas Steffen2009-06-101-1/+1
|
* fixed DoS vulnerability in the parsing of ASN.1 time stringsAndreas Steffen2009-06-101-4/+17
|
* fixed DoS vulnerability in the parsing of distinguished namesAndreas Steffen2009-06-092-1/+6
|