| Commit message (Collapse) | Author | Age | Files | Lines |
|
|
|
| |
ok markus@
|
|
|
|
|
|
| |
checks where needed.
ok markus@ patrick@
|
|
|
|
|
|
| |
default for now because of interoperability issues.
ok patrick@
|
|
|
|
| |
ok patrick@
|
|
|
|
| |
ok markus@
|
|
|
|
|
|
|
| |
choosing a unique IV for every encryption operation, using a counter
as IV eliminates the risk of random collisions.
ok markus@ patrick@
|
|
|
|
|
|
|
|
|
| |
They can be configured with the new ikesa enc options aes-128-gcm,
aes-256-gcm, aes-128-gcm-12 and aes-256-gcm-12.
Tested with Strongswan by Stephan Mendling and myself
Tested with Juniper SRX by remi@
ok sthen@, patrick@
|
|
|
|
| |
ok patrick@
|
|
|
|
| |
ok markus@
|
|
|
|
| |
ok markus@
|
|
|
|
| |
ok markus@
|
|
|
|
|
|
|
| |
which allows us to support additional signing options like PSS
padding in the future.
ok patrick@ markus@
|
| |
|
| |
|
|
|
|
|
|
|
|
|
|
| |
These modes provide stronger and more flexible ways for
authentication: while RSA public key auth relies on SHA-1 hashes, the
news modes use SHA2-256 and up to SHA2-512 hashes.
Original diff from markus@ with patches from mikeb@ and me.
OK mikeb@ patrick@
|
| |
|
|
|
|
| |
OK mikeb@
|
| |
|
|
|
|
| |
restricted to SHA1 for RSA signatures. ok mikeb@
|
|
|
|
|
|
|
|
|
| |
possible. Annotate <sys/param.h> lines with their current reasons. Switch
to PATH_MAX, NGROUPS_MAX, HOST_NAME_MAX+1, LOGIN_NAME_MAX, etc. Change
MIN() and MAX() to local definitions of MINIMUM() and MAXIMUM() where
sensible to avoid pulling in the pollution. These are the files confirmed
through binary verification.
ok guenther, millert, doug (helped with the verification protocol)
|
|
|
|
| |
ok reyk@
|
|
|
|
|
|
|
| |
%zu for size_t.
From Andre de Oliveira
With input and OK from blambert@ markus@
|
| |
|
|
|
|
|
| |
Correct the comment while here: RFC5996 says we SHOULD use SHA1 as a
hashing function for RSA Digital Signatures. Tested by and OK markus.
|
| |
|
|
|
|
| |
to 2013 while I'm here... this is my way of saying "happy new year!".
|
| |
|
|
|
|
| |
sure jsg@ mikeb@
|
|
|
|
|
|
|
|
|
|
| |
verification caused by the incorrect check of the EVP_VerifyFinal
return value. Issue was discovered and reported by Justin Ferguson,
justin-dot-ferguson-at-ioactive.com. Thanks!
While here, check for HMAC_* return values.
ok jsg, markus
|
| |
|
| |
|
|
|
|
|
|
|
|
|
|
|
| |
additional space in the buffer and just pad input length up to the
block size. finalization is not needed for properly padded data.
kills a bunch of XXX's and an annoying error from openssl.
also, check a result from CipherUpdate while here.
ok reyk
|
| |
|
|
iked(8) is an automatic keying daemon for IPsec, like isakmpd(8), that
IPsec creates flows and SAs automatically. Unlike isakmpd, iked(8)
implements the newer IKEv2 protocol instead of IKEv1/ISAKMP. The
daemon is still work-in-progress and not enabled in the builds, but is
already able to establish IKEv2 sessions with some other IKEv2
implementations as a responder.
with lots of help and debugging by jsg@
ok deraadt@
|