Commit message (Collapse) | Author | Age | Files | Lines | ||
---|---|---|---|---|---|---|
... | ||||||
* | openssl: Update PKCS#12 API to OpenSSL 1.1.0 | Tobias Brunner | 2016-06-29 | 1 | -1/+5 | |
| | ||||||
* | openssl: Update PKCS#7 API to OpenSSL 1.1.0 | Tobias Brunner | 2016-06-29 | 1 | -3/+7 | |
| | ||||||
* | openssl: Update CRL API to OpenSSL 1.1.0 | Tobias Brunner | 2016-06-29 | 1 | -7/+42 | |
| | | | | | | There is currently no way to compare the outer and inner algorithms encoded in a parsed CRL. X509_CRL_verify() does not seem to check that either, though (unlike X509_verify()). | |||||
* | openssl: Update x509 API to OpenSSL 1.1.0 | Tobias Brunner | 2016-06-29 | 1 | -12/+48 | |
| | ||||||
* | openssl: Update ECDSA API to OpenSSL 1.1.0 | Tobias Brunner | 2016-06-29 | 2 | -5/+24 | |
| | ||||||
* | openssl: Update RSA API to OpenSSL 1.1.0 | Tobias Brunner | 2016-06-29 | 2 | -16/+52 | |
| | ||||||
* | openssl: Make some utilities take const BIGNUM pointers | Tobias Brunner | 2016-06-29 | 2 | -4/+6 | |
| | ||||||
* | openssl: Add macro to define fallback functions for non-opaque OpenSSL versions | Tobias Brunner | 2016-06-29 | 1 | -0/+38 | |
| | ||||||
* | openssl: Update DH API to OpenSSL 1.1.0 | Tobias Brunner | 2016-06-29 | 1 | -11/+41 | |
| | ||||||
* | openssl: Update crypter API to OpenSSL 1.1.0 | Tobias Brunner | 2016-06-29 | 1 | -12/+17 | |
| | | | | | EVP_CIPHER and EVP_CIPHER_CTX are now opaque types, the getters already existed before. | |||||
* | openssl: Fix mapping from ASN1 to chunk_t with OpenSSL 1.1.0 | Tobias Brunner | 2016-06-29 | 1 | -1/+7 | |
| | | | | ASN1_OBJECT is now opaque. | |||||
* | openssl: Update initialization and cleanup for OpenSSL 1.1.0 | Tobias Brunner | 2016-06-29 | 1 | -7/+17 | |
| | | | | | | We can't call OPENSSL_cleanup() as that would prevent us from re-initializing the library again (which we use in the Android app, that loads/unloads plugins). | |||||
* | openssl: OpenSSL 1.1.0 is thread-safe so we don't have to setup callbacks | Tobias Brunner | 2016-06-29 | 1 | -0/+13 | |
| | ||||||
* | android: Actually add Android.mk for libtpmtss | Tobias Brunner | 2016-06-28 | 1 | -0/+32 | |
| | ||||||
* | android: Fix build after adding libtpmtss | Tobias Brunner | 2016-06-28 | 3 | -3/+5 | |
| | ||||||
* | libtpmtss: Added to integrity checks | Andreas Steffen | 2016-06-26 | 4 | -0/+19 | |
| | ||||||
* | aikpub2: Output AIK signature algorithm | Andreas Steffen | 2016-06-26 | 1 | -1/+14 | |
| | ||||||
* | Refactoring to tpm_tss_quote_info object | Andreas Steffen | 2016-06-26 | 24 | -397/+923 | |
| | ||||||
* | libimcv: Changed debug level for functional components from 2 to 3 | Andreas Steffen | 2016-06-26 | 1 | -2/+2 | |
| | ||||||
* | libtpmtss: Implemented TSS2 quote() method | Andreas Steffen | 2016-06-26 | 1 | -23/+139 | |
| | ||||||
* | libtpmtss: Implemented TSS2 read_pcr() method | Andreas Steffen | 2016-06-22 | 1 | -6/+114 | |
| | ||||||
* | libimcv: migrate pts to tpm_tss | Andreas Steffen | 2016-06-22 | 10 | -495/+568 | |
| | ||||||
* | libtpmtss: Get TPM 2.0 capabilities | Andreas Steffen | 2016-06-22 | 4 | -2/+227 | |
| | ||||||
* | libtpmtss: Retrieve TPM 1.2 version info | Andreas Steffen | 2016-06-22 | 3 | -3/+75 | |
| | ||||||
* | Created libtpmtss library handling access to v1.2 and v2.0 TPMs | Andreas Steffen | 2016-06-22 | 12 | -393/+914 | |
| | ||||||
* | aikpub2: --handle option retrieves public key from TPM 2.0 NVRAM | Andreas Steffen | 2016-06-22 | 2 | -30/+147 | |
| | ||||||
* | aikpub2: Convert TSS 2.0 AIK public key blob into PKCS#1 format | Andreas Steffen | 2016-06-22 | 5 | -1/+384 | |
| | ||||||
* | unit-tests: Add tests for expires after CHILD_SA rekeying | Tobias Brunner | 2016-06-17 | 1 | -0/+129 | |
| | ||||||
* | child-rekey: Only rekey installed CHILD_SAs | Tobias Brunner | 2016-06-17 | 1 | -7/+14 | |
| | | | | | | | | | | | | Depending on the lifetimes a CHILD_SA we rekeyed as responder might expire shortly afterwards. We don't want to rekey it again. When retrying due to an INVALID_KE_PAYLOAD notify the expected state is CHILD_REKEYING if it is anything else (e.g. due to a collision) we ignore it. We also abort the exchange properly if we don't find the CHILD_SA, no need for an empty INFORMATIONAL exchange anymore. | |||||
* | Report test coverage of libcharon and starter | Tobias Brunner | 2016-06-17 | 2 | -0/+6 | |
| | ||||||
* | unit-tests: Add test for CHILD_SA rekey if a retry due to an ↵ | Tobias Brunner | 2016-06-17 | 1 | -0/+143 | |
| | | | | INVALID_KE_PAYLOAD is delayed | |||||
* | child-rekey: Ignore failed colliding CHILD_SA rekeyings | Tobias Brunner | 2016-06-17 | 1 | -1/+10 | |
| | | | | | | | If a passive rekeying fails due to an INVALID_KE_PAYLOAD we don't want to consider this task later when resolving collisions. This previously might have caused the wrong SA to get deleted/installed based on the nonces in the unsuccessful exchange. | |||||
* | unit-tests: Add test for collision between IKE_SA rekey and CHILD_SA creation | Tobias Brunner | 2016-06-17 | 3 | -0/+108 | |
| | ||||||
* | child-create: Retry creating the CHILD_SA if TEMPORARY_FAILURE is received | Tobias Brunner | 2016-06-17 | 1 | -4/+33 | |
| | | | | We queue a delayed task that is initiated after a while. | |||||
* | ikev2: Add possibility to delay initiation of a queued task | Tobias Brunner | 2016-06-17 | 5 | -66/+189 | |
| | | | | | | | | | | | Such a task is not initiated unless a certain time has passed. This allows delaying certain tasks but avoids problems if we'd do this via a scheduled job (e.g. if the IKE_SA is rekeyed in the meantime). If the IKE_SA is rekeyed the delay of such tasks is reset when the tasks are adopted i.e. they get executed immediately on the new IKE_SA. This hasn't been implemented for IKEv1 yet. | |||||
* | ike: Reduce RETRY_INTERVAL a bit | Tobias Brunner | 2016-06-17 | 1 | -2/+2 | |
| | | | | Retry exchanges between 5 and 15 seconds after a temporary failure. | |||||
* | ike-rekey: Return TEMPORARY_FAILURE when concurrently creating a CHILD_SA | Tobias Brunner | 2016-06-17 | 1 | -14/+35 | |
| | ||||||
* | unit-tests: Add tests for IKE rekeying if INVALID_KE_PAYLOAD notifies are ↵ | Tobias Brunner | 2016-06-17 | 1 | -0/+470 | |
| | | | | received | |||||
* | ike: Add configuration option to switch to preferring supplied proposals ↵ | Tobias Brunner | 2016-06-17 | 5 | -10/+21 | |
| | | | | over local ones | |||||
* | child-cfg: Add option to prefer supplied proposals over locally configured ones | Tobias Brunner | 2016-06-17 | 4 | -23/+38 | |
| | ||||||
* | ike-cfg: Add option to prefer supplied proposals over locally configured ones | Tobias Brunner | 2016-06-17 | 5 | -32/+48 | |
| | ||||||
* | proposal: Remove MODP_NONE from IKE proposals parsed from strings | Tobias Brunner | 2016-06-17 | 1 | -0/+10 | |
| | ||||||
* | proposal: Handle MODP_NONE in both directions when selecting proposals | Tobias Brunner | 2016-06-17 | 4 | -6/+97 | |
| | ||||||
* | proposal: Parse modpnone as MODP_NONE(0) | Tobias Brunner | 2016-06-17 | 1 | -0/+1 | |
| | ||||||
* | ike-rekey: Make sure to ignore task when detecting collisions if ike-init ↵ | Tobias Brunner | 2016-06-17 | 1 | -1/+2 | |
| | | | | | | | subtask failed For instance, if INVALID_KE_PAYLOAD is returned we don't want this task to affect any active rekeying (no new SA has been established so far). | |||||
* | unit-tests: Add test for rekey collision if one CREATE_CHILD_SA response is ↵ | Tobias Brunner | 2016-06-17 | 1 | -0/+221 | |
| | | | | delayed | |||||
* | unit-tests: Add tests for IKE_SA rekeying if collision is not detected by ↵ | Tobias Brunner | 2016-06-17 | 1 | -0/+340 | |
| | | | | one peer | |||||
* | ike-rekey: Handle undetected collisions also if delete is delayed | Tobias Brunner | 2016-06-17 | 1 | -16/+26 | |
| | | | | | | | | | | | If the peer does not detect the rekey collision and deletes the old IKE_SA and then receives the colliding rekey request it will respond with TEMPORARY_FAILURE. That notify may arrive before the DELETE does, in which case we may just conclude the rekeying initiated by the peer. Also, since the IKE_SA is destroyed in any case when we receive a delete there is no point in storing the delete task in collide() as process_i() in the ike-rekey task will never be called. | |||||
* | ike-rekey: There is no passive reauth task, so it will never collide with one | Tobias Brunner | 2016-06-17 | 2 | -7/+4 | |
| | ||||||
* | ike-rekey: Ignore colliding rekey tasks that did not create an IKE_SA | Tobias Brunner | 2016-06-17 | 1 | -56/+64 | |
| | | | | | This simplifies collision handling and we don't need to know about these tasks when concluding the rekeying we initiated. |