Commit message (Collapse) | Author | Age | Files | Lines | |
---|---|---|---|---|---|
* | Wipe auxiliary key store5.3.0 | Andreas Steffen | 2015-03-28 | 1 | -1/+1 |
| | |||||
* | crypto-tester: Explicitly exclude FIPS-PRF from append mode tests | Martin Willi | 2015-03-28 | 1 | -8/+11 |
| | | | | | This was implicitly done by the seed length check before 58dda5d6, but we now require an explicit check to avoid that unsupported use. | ||||
* | fips-prf: Fail when trying to use append mode on FIPS-PRF | Martin Willi | 2015-03-28 | 1 | -1/+6 |
| | | | | | Append mode hardly makes sense for the special stateful FIPS-PRF, which is different to other PRFs. | ||||
* | Added tnc/tnccs-20-fail-init and tnc/tnccs-20-fail-resp scenarios | Andreas Steffen | 2015-03-27 | 8 | -8/+178 |
| | |||||
* | Fixed PB-TNC error handling | Andreas Steffen | 2015-03-27 | 4 | -35/+32 |
| | |||||
* | cmac: Reset state before doing set_key() | Martin Willi | 2015-03-27 | 1 | -0/+3 |
| | |||||
* | af-alg: Reset hmac/xcbc state before doing set_key() | Martin Willi | 2015-03-27 | 2 | -0/+2 |
| | |||||
* | xcbc: Reset XCBC state in set_key() | Martin Willi | 2015-03-27 | 1 | -0/+4 |
| | | | | | If some partial data has been appended, a truncated key gets invalid if it is calculated from the pending state. | ||||
* | hmac: Reset the underlying hasher before doing set_key() with longer keys | Martin Willi | 2015-03-27 | 1 | -1/+2 |
| | | | | | | | The user might have done a non-complete append, having some state in the hasher. Fixes #909. | ||||
* | crypto-tester: Test set_key() after a doing a partial append on prf/signers | Martin Willi | 2015-03-27 | 1 | -2/+20 |
| | | | | | While that use is uncommon in real-world use, nonetheless should HMAC set a correct key and reset any underlying hasher. | ||||
* | stroke: Properly parse bliss key strength in public key constraint | Tobias Brunner | 2015-03-25 | 1 | -1/+1 |
| | |||||
* | eap-tnc: Free eap-tnc object if IKE_SA not found to get IPs | Tobias Brunner | 2015-03-25 | 1 | -0/+1 |
| | |||||
* | tnccs-20: Fix error handling in build() | Tobias Brunner | 2015-03-25 | 1 | -9/+5 |
| | |||||
* | android: Add messages/ita directory to tnccs-20 plugin | Tobias Brunner | 2015-03-25 | 1 | -1/+1 |
| | |||||
* | android: Sync libstrongswan Makefile.am and Android.mk | Tobias Brunner | 2015-03-25 | 1 | -0/+1 |
| | |||||
* | libtnccs: Set apidoc category to libtnccs and move plugins | Tobias Brunner | 2015-03-25 | 10 | -11/+14 |
| | |||||
* | libtnccs: Fix apidoc category for split IF-TNCCS 2.0 header files | Tobias Brunner | 2015-03-25 | 3 | -5/+5 |
| | | | | | Fixes 80322d2cee75 ("Split IF-TNCCS 2.0 protocol processing into separate TNC client and server handlers"). | ||||
* | Fixed some typos, courtesy of codespell | Tobias Brunner | 2015-03-25 | 3 | -3/+3 |
| | |||||
* | kernel-netlink: Copy current usage stats to new SA in update_sa() | Tobias Brunner | 2015-03-25 | 1 | -6/+34 |
| | | | | | | | | | | | | This is needed to fix usage stats sent via RADIUS Accounting if clients use MOBIKE or e.g. the kernel notifies us about a changed NAT mapping. The upper layers won't expect the stats to get reset if only the IPs have changed (and some kernel interface might actually allow such updates without reset). It also fixes traffic based lifetimes in such situations. Fixes #799. | ||||
* | child-sa: Add a new state to track rekeyed IKEv1 CHILD_SAs | Tobias Brunner | 2015-03-25 | 7 | -5/+15 |
| | | | | | | This is needed to handle DELETEs properly, which was previously done via CHILD_REKEYING, which we don't use anymore since 5c6a62ceb6 as it prevents reauthentication. | ||||
* | ikev1: Inverse check when applying received KE value during Quick Mode5.3.0rc1 | Martin Willi | 2015-03-24 | 1 | -1/+1 |
| | | | | Fixes Quick Mode negotiation when PFS is in use. | ||||
* | Implemented PB-TNC mutual half-duplex protocol | Andreas Steffen | 2015-03-23 | 5 | -35/+139 |
| | |||||
* | Optionally announce PB-TNC mutual protocol capability | Andreas Steffen | 2015-03-23 | 10 | -13/+425 |
| | |||||
* | Split IF-TNCCS 2.0 protocol processing into separate TNC client and server ↵ | Andreas Steffen | 2015-03-23 | 9 | -799/+1746 |
| | | | | handlers | ||||
* | encoding: Remove DH public value verification from KE payload | Martin Willi | 2015-03-23 | 1 | -73/+0 |
| | | | | | | | | This commit reverts 84738b1a and 2ed5f569. As we have no DH group available in the KE payload for IKEv1, the verification can't work in that stage. Instead, we now verify DH groups in the DH backends, which works for any IKE version or any other purpose. | ||||
* | diffie-hellman: Verify public DH values in backends | Martin Willi | 2015-03-23 | 7 | -1/+107 |
| | |||||
* | diffie-hellman: Add a bool return value to set_other_public_value() | Martin Willi | 2015-03-23 | 18 | -52/+121 |
| | |||||
* | diffie-hellman: Add a bool return value to get_my_public_value() | Martin Willi | 2015-03-23 | 22 | -37/+84 |
| | |||||
* | libimcv: Allow pts_t.set_peer_public_value() to fail | Martin Willi | 2015-03-23 | 4 | -7/+11 |
| | |||||
* | libimcv: Allow pts_t.get_my_public_value() to fail | Martin Willi | 2015-03-23 | 4 | -4/+14 |
| | |||||
* | encoding: Allow ke_payload_create_from_diffie_hellman() to fail | Martin Willi | 2015-03-23 | 5 | -13/+59 |
| | |||||
* | diffie-hellman: Use bool instead of status_t as get_shared_secret() return value | Martin Willi | 2015-03-23 | 18 | -43/+41 |
| | | | | | While such a change is not unproblematic, keeping status_t makes the API inconsistent once we introduce return values for the public value operations. | ||||
* | load-tester: Migrate NULL DH implementation to INIT/METHOD macros | Martin Willi | 2015-03-23 | 1 | -21/+26 |
| | |||||
* | ikev1: Make sure SPIs in an IKEv1 DELETE payload match the current SA | Tobias Brunner | 2015-03-23 | 1 | -0/+39 |
| | | | | | | | | | | | | | | | | | | | | OpenBSD's isakmpd uses the latest ISAKMP SA to delete other expired SAs. This caused strongSwan to delete e.g. a rekeyed SA even though isakmpd meant to delete the old one. What isakmpd does might not be standard compliant. As RFC 2408 puts it: Deletion which is concerned with an ISAKMP SA will contain a Protocol-Id of ISAKMP and the SPIs are the initiator and responder cookies from the ISAKMP Header. This could either be interpreted as "copy the SPIs from the ISAKMP header of the current message to the DELETE payload" (which is what strongSwan assumed, and the direction IKEv2 took it, by not sending SPIs for IKE), or as clarification that ISAKMP "cookies" are actually the SPIs meant to be put in the payload (but that any ISAKMP SA may be deleted). | ||||
* | encoding: Add getter for IKE SPIs in IKEv1 DELETE payloads | Tobias Brunner | 2015-03-23 | 2 | -0/+25 |
| | |||||
* | pki: Choose default digest based on the signature key | Tobias Brunner | 2015-03-23 | 12 | -20/+69 |
| | |||||
* | pki: Use SHA-256 as default for signatures | Tobias Brunner | 2015-03-23 | 10 | -55/+15 |
| | | | | | | Since the BLISS private key supports this we don't do any special handling anymore (if the user choses a digest that is not supported, signing will simply fail later because no signature scheme will be found). | ||||
* | trap-manager: Add option to ignore traffic selectors from acquire events | Tobias Brunner | 2015-03-23 | 1 | -1/+8 |
| | | | | | | | | The specific traffic selectors from the acquire events, which are derived from the triggering packet, are usually prepended to those from the config. Some implementations might not be able to handle these properly. References #860. | ||||
* | unit-tests: Fix settings test after merging multi-line strings | Tobias Brunner | 2015-03-23 | 1 | -2/+2 |
| | |||||
* | swanctl: Append /ESN to proposal for a CHILD_SA using Extended Sequence Numbers | Martin Willi | 2015-03-23 | 1 | -1/+1 |
| | | | | | | | We previously printed just the value for the "esn" keyword, which is "1", and not helpful as such. Fixes #904. | ||||
* | unit-tests: Depend on SHA1/SHA256 features for mgf1 test cases | Martin Willi | 2015-03-23 | 2 | -5/+16 |
| | |||||
* | settings: Merge quoted strings that span multiple lines | Tobias Brunner | 2015-03-20 | 1 | -3/+2 |
| | |||||
* | starter: Merge quoted strings that span multiple lines | Tobias Brunner | 2015-03-20 | 1 | -3/+2 |
| | |||||
* | encoding: Don't verify length of IKEv1 KE payloads | Tobias Brunner | 2015-03-20 | 1 | -0/+6 |
| | | | | | | The verification introduced with 84738b1aed95 ("encoding: Verify the length of KE payload data for known groups") can't be done for IKEv1 as the KE payload does not contain the DH group. | ||||
* | charon-systemd: Optionally load plugin list from charon-systemd.load | Tobias Brunner | 2015-03-19 | 1 | -1/+2 |
| | |||||
* | utils: Fix enum_flags_to_string parameter name to match Doxygen description | Martin Willi | 2015-03-19 | 1 | -1/+1 |
| | |||||
* | attr-sql: Rename sql_attribute_t to attr_sql_provider_t | Martin Willi | 2015-03-19 | 5 | -32/+32 |
| | | | | | | As the plugin has its origins in the sql plugin, it still uses the naming scheme for the attribute provider implementation. Rename the class to better match the naming scheme we use in any other plugin | ||||
* | ikev1: Adopt virtual IPs on new IKE_SA during re-authentication | Tobias Brunner | 2015-03-19 | 3 | -45/+156 |
| | | | | | | | | | | | Some clients like iOS/Mac OS X don't do a mode config exchange on the new SA during re-authentication. If we don't adopt the previous virtual IP Quick Mode rekeying will later fail. If a client does do Mode Config we directly reassign the VIPs we migrated from the old SA, without querying the attributes framework. Fixes #807, #810. | ||||
* | ikev1: Mark rekeyed CHILD_SAs as INSTALLED | Tobias Brunner | 2015-03-19 | 1 | -0/+2 |
| | | | | | Since we keep them around until they finally expire they otherwise would block IKE_SA rekeying/reauthentication. | ||||
* | mem-pool: Remove entries without online or offline leases | Tobias Brunner | 2015-03-19 | 1 | -6/+22 |
| | | | | | | This avoids filling up the hash table with unused/old identities. References #841. |