summaryrefslogtreecommitdiffstats
path: root/src/protocol_ec25519_fhmqvc.c
AgeCommit message (Collapse)Author
2012-09-15Rework some parts of the AES128-GCM methodMatthias Schiffer
These changes improve the performance of the AES128-GCM method by ~10% on my Intel CPU when compiled with -O2. Furthermore, the AES and the GHASH parts are separated now, allowing to switch to other implementations of the algorithms more easily.
2012-07-01Add support for multiple crypto methods without reconfigurationMatthias Schiffer
2012-06-15Avoid using the same handshake key to establish more than one sessionMatthias Schiffer
This fix prevents a potential attack using intentional packet reordering to initialize more than one session with using the same handshake keys, leading to more that one session to be initialized with the same key data altogether, allowing to decrypt some packets in the worst case.
2012-06-07Limit handshake frequency where possibleMatthias Schiffer
2012-06-06Limit resolve frequencyMatthias Schiffer
2012-06-06Improve some log levelsMatthias Schiffer
2012-06-05Fix possible duplicate session establishmentMatthias Schiffer
This is causing duplicate nonces in the worst case.
2012-06-05Add support for receiving reordered packetsMatthias Schiffer
2012-06-04Make sure refresh handshakes aren't cleanedMatthias Schiffer
2012-06-04Fix key invalidation order on key refreshMatthias Schiffer
2012-06-04Add version string to handshakeMatthias Schiffer
2012-06-04Improve handshake loggingMatthias Schiffer
2012-05-03Fix critical error introduced by copy-and-pasting, another possible NULL ↵Matthias Schiffer
dereference
2012-05-03Critical fix: ignore disabled peers when searching peer key to avoid NULL ↵v0.4-rc6Matthias Schiffer
dereference
2012-04-22Ignore handshakes for 15 seconds after session establishment to avoid ↵v0.4-rc2Matthias Schiffer
excessive and concurrent handshakes
2012-04-22Add --show-key and --machine-readable optionsMatthias Schiffer
2012-04-22Ignore peers with own keyMatthias Schiffer
2012-04-19Don't regenerate session handshake keypair for every handshake so a global ↵Matthias Schiffer
state can be used; remove the concept of temporary peers These changes will fix the possibility of a TCP-SYN-Flood-like DoS attack, at the cost of another protocol change: as we can't count request IDs when we don't know have temporary peers, request IDs are removed completely.
2012-04-16Lots of fixes and improvements on the resolver codeMatthias Schiffer
2012-04-14Reduce task queue usageMatthias Schiffer
2012-04-14Separate handshake from encryption methodMatthias Schiffer