aboutsummaryrefslogtreecommitdiffstats
Commit message (Collapse)AuthorAgeFilesLines
...
* pgp plugin required in ikev1/net2net-pgp-v3|v4 scenariosAndreas Steffen2009-08-264-0/+44
|
* dnskey plugin required in ikev1/net2net-rsa scenarioAndreas Steffen2009-08-262-0/+22
|
* ikev1 psk scenarios don't need pkcs1 and pem pluginsAndreas Steffen2009-08-2621-21/+21
|
* fixed typoAndreas Steffen2009-08-261-1/+1
|
* streamlined file loading labelsAndreas Steffen2009-08-266-12/+15
|
* use --outform consistantlyAndreas Steffen2009-08-261-1/+1
|
* the option has been changed to --outformAndreas Steffen2009-08-261-2/+2
|
* added pki/.libs/pki to the libsAndreas Steffen2009-08-261-0/+1
|
* fixed two typosAndreas Steffen2009-08-261-2/+2
|
* encoding public EC keys is not really possible without subjectPublicKeyInfoMartin Willi2009-08-263-37/+81
|
* complain about build errors in non-recursive cases onlyMartin Willi2009-08-261-2/+16
|
* openac (and tools) do not depend on gmp anymoreMartin Willi2009-08-263-60/+20
|
* moved chunk_increment() function to libstrongswanMartin Willi2009-08-263-18/+28
|
* pki tool supports public key extraction from private key, certificatesMartin Willi2009-08-261-21/+141
|
* added a BUILD_FROM_FD option, supporting credential parsing from stdinMartin Willi2009-08-264-1/+48
|
* started implementation of a PKI tool, currently supporting RSA|ECDSA key ↵Martin Willi2009-08-267-2/+209
| | | | generation
* implemented openssl EC key generationMartin Willi2009-08-261-0/+42
|
* fixed openssl RSA private key encodingMartin Willi2009-08-261-3/+3
|
* keyids in SQL use ID_KEY_ID type with subjectPublicKey SHA1 hashMartin Willi2009-08-2628-54/+54
|
* tests load pem/pkcs1 plugins, pubkey plugin not needed anymoreMartin Willi2009-08-26378-389/+389
|
* use ./configured plugins in keyid scriptsMartin Willi2009-08-263-2/+3
|
* accept PEM encoded keys in keyid scriptsMartin Willi2009-08-262-6/+6
|
* migrated scripts to new fingerprinting APIMartin Willi2009-08-262-25/+38
|
* updated medsrv and test to new fingerprint/encoding APIMartin Willi2009-08-262-9/+16
|
* updated load-tester plugin to new fingerprinting APIMartin Willi2009-08-261-11/+19
|
* use only KEY_ID_PUBKEY_SHA1 fingerprint charon internallyMartin Willi2009-08-262-18/+10
|
* updated nm plugin to new fingerprinting APIMartin Willi2009-08-261-3/+4
|
* updated agent plugin to new fingerprint/encoding APIMartin Willi2009-08-261-157/+53
|
* updated stroke plugin to fingerprinting APIMartin Willi2009-08-263-128/+135
|
* updated charon to new fingerprinting APIMartin Willi2009-08-263-91/+85
|
* updated pluto to new fingerprinting APIMartin Willi2009-08-265-36/+44
|
* updated scepclient to new encoding APIMartin Willi2009-08-263-10/+11
|
* updated pubkey plugin to new fingerprinting APIMartin Willi2009-08-261-20/+48
|
* updated x509 plugin to public key/x509 API changesMartin Willi2009-08-265-154/+134
|
* updated x509/CRL/AC API to align with public key, authKeyIdentifier is a chunkMartin Willi2009-08-263-9/+9
|
* updated openssl plugin to new private/public key API, use encoder frameworkMartin Willi2009-08-268-511/+333
|
* updated gcrypt plugin to new private/public key API, use encoder frameworkMartin Willi2009-08-262-218/+96
|
* updated gmp plugin to new private/public key API, use encoder frameworkMartin Willi2009-08-262-280/+130
|
* changed get_id/get_encoding API of private/public key to use new encoding ↵Martin Willi2009-08-262-27/+32
| | | | framework
* removed obsolete fingerprint identification typesMartin Willi2009-08-262-43/+23
|
* added generic implementation helpers for private_key_t.equals/belongs_to, ↵Martin Willi2009-08-264-3/+97
| | | | public_key_t.equals
* added a seperate chache lookup, as encode() requires arguments expensive to ↵Martin Willi2009-08-262-0/+34
| | | | build
* use credential builder API to parse trusted public keysMartin Willi2009-08-261-11/+11
|
* implemented PGP fingerprintingMartin Willi2009-08-264-0/+107
|
* implemented pkcs1 private/public key encoding and fingerprintingMartin Willi2009-08-264-0/+193
|
* chunk_cat/cata/create_cat/length accept the sensitive data clearing mode 's'Martin Willi2009-08-262-10/+19
|
* in addition to 'm'/'c' mode, asn1_wrap accepts a 's' mode clearing sensitive ↵Martin Willi2009-08-262-3/+14
| | | | information
* added a facility to hand out fingerprinting/key encoding to the ↵Martin Willi2009-08-265-0/+429
| | | | pkcs1/pgp/... plugins
* gmp uses component builder to build public- from private-keyMartin Willi2009-08-262-47/+37
|
* gcrypt uses component builder to build public- from private-keyMartin Willi2009-08-262-37/+12
|