summaryrefslogtreecommitdiff
path: root/lib/cipher_int.c
Commit message (Collapse)AuthorAgeFilesLines
* build: re-indent codeDaiki Ueno2023-04-241-123/+112
| | | | Signed-off-by: Daiki Ueno <ueno@gnu.org>
* Indent codeZoltan Fridrich2023-01-271-38/+41
| | | | | Co-authored-by: Simon Josefsson <simon@josefsson.org> Signed-off-by: Zoltan Fridrich <zfridric@redhat.com>
* fips: plumb service indicator to symmetric key crypto operationsDaiki Ueno2022-01-081-1/+1
| | | | | Signed-off-by: Daiki Ueno <ueno@gnu.org> Co-authored-by: Pedro Monreal <pmonrealgonzalez@suse.de>
* _gnutls_cipher_init: fallback if setiv is not implemented for AEADDaiki Ueno2021-04-201-1/+8
| | | | | | | | The _gnutls_cipher_init function currently assumes that all the cipher implementations have .setiv method. This is not the case for AEAD-only implementations such as afalg. Signed-off-by: Daiki Ueno <ueno@gnu.org>
* cipher/mac: enhance handlers with setkey callbackDmitry Eremin-Solenikov2020-06-071-0/+2
| | | | Signed-off-by: Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
* Support GOST cipher suite MAC calculationDmitry Eremin-Solenikov2019-10-211-3/+14
| | | | | | | | GOST ciphersuites require that MAC is calculated over _all_ packets, rather than just current packet. Add flag to auth_cipher_hd_st controlling this behaviour. Signed-off-by: Dmitry Eremin-Solenikov <dbaryshkov@gmail.com>
* crypto: add private API to retrieve internal IVDaiki Ueno2019-05-031-0/+2
| | | | | | | | | | For FIPS validation purposes, this adds a new function _gnutls_cipher_get_iv() that exposes internal IV after encryption and decryption. The function is not generally useful because the IV value can be easily calculated from the initial IV and the subsequent ciphertext but for FIPS validation purposes. Signed-off-by: Daiki Ueno <dueno@redhat.com>
* Use https:// for www.gnu.org and www.example.comTim Rühsen2019-03-131-1/+1
| | | | Signed-off-by: Tim Rühsen <tim.ruehsen@gmx.de>
* several updates to address issues found by clang static analyzerNikos Mavrogiannopoulos2018-05-091-0/+2
| | | | Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
* fips140: enforcement of allowed ciphers moved to crypto-api.c and cipher_int.cNikos Mavrogiannopoulos2018-02-191-6/+5
| | | | Signed-off-by: Nikos Mavrogiannopoulos <nmav@gnutls.org>
* eliminated various clang warnings with non-null argumentsNikos Mavrogiannopoulos2017-02-201-0/+1
| | | | | | | That is, use assert() to ensure that known to be non-null variables will be used as input to functions requiring non-null. Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
* several spacing fixes to keep syntax-check happyNikos Mavrogiannopoulos2016-09-111-8/+8
|
* Amend: Allow for conditional compilation of SSL 3.0 protocolNikos Mavrogiannopoulos2016-05-201-0/+2
| | | | This patch makes conditional several more SSL 3.0-only parts of codebase.
* Allow for conditional compilation of SSL 3.0 protocolNikos Mavrogiannopoulos2016-05-141-6/+19
| | | | | | | This allows to completely remove SSL 3.0 support by calling configure with the '--disable-ssl3' option. Resolves #93
* doc updateNikos Mavrogiannopoulos2015-10-231-2/+2
|
* Disable the NULL cipher on runtime when FIPS140 mode is enabled instead of ↵Nikos Mavrogiannopoulos2015-10-151-0/+11
| | | | | | statically That way the NULL cipher can be used when not in FIPS140 mode.
* Removed the 'gnutls_' prefix from files to simplify file namingNikos Mavrogiannopoulos2015-08-231-0/+425