aboutsummaryrefslogtreecommitdiffstats
Commit message (Collapse)AuthorAgeFilesLines
...
* Added keywords for the new lifetime limits to starter.Tobias Brunner2009-09-014-1/+17
|
* Added parser for unsigned long long ints to starter.Tobias Brunner2009-09-011-0/+26
|
* If no inbound CHILD_SA is found, try to find an outbound SA.Tobias Brunner2009-09-012-4/+18
| | | | | Due to the new lifetime limits in- and outbound SAs may expire individually.
* Set the packet and byte limits in the netlink and pfkey kernel interfaces.Tobias Brunner2009-09-012-5/+16
|
* Terminology and return value of get_lifetime of child_sa_t corrected.Tobias Brunner2009-09-012-5/+5
|
* child_sa_t adapted to the new lifetime configuration.Tobias Brunner2009-09-011-13/+21
|
* Adapted the kernel interfaces to the new lifetime configuration.Tobias Brunner2009-09-017-46/+42
|
* Adapted the config backends to the new lifetime configuration.Tobias Brunner2009-09-016-19/+39
|
* child_cfg_t now takes a lifetime_cfg_t to configure the lifetime limits. ↵Tobias Brunner2009-09-012-51/+47
| | | | Also adjusted the jitter calculation, so it works for values > RAND_MAX.
* lifetime_cfg_t added to configure lifetime limits of a CHILD_SA.Tobias Brunner2009-09-011-1/+50
|
* Added side effect free min and max macros.Tobias Brunner2009-09-011-2/+9
|
* sql/rw-rsa and sql/rw-rsa-keyid scenarios require the pubkey pluginMartin Willi2009-09-016-6/+6
|
* fixed certificate_t enum namesMartin Willi2009-09-011-1/+0
|
* changed prefix of crl_reason_t values from CRL_ to CRL_REASON_Andreas Steffen2009-08-317-28/+28
|
* use crl_reason_t definition from <credentials/certificates/crl.h>Andreas Steffen2009-08-315-8/+12
|
* use crl_reason_t definition from <credentials/certificates/crl.h>Andreas Steffen2009-08-312-29/+0
|
* use time_monotonic() instead of time() for statistics and time difference ↵Martin Willi2009-08-3113-42/+65
| | | | calculations
* use time_monotonic() instead of gettimeofday() for time difference calculationsMartin Willi2009-08-319-37/+24
|
* use monotonic time source in convar->timed_wait, and in the scheduler using itMartin Willi2009-08-316-21/+50
|
* implemented a monotonic timestamping function, unaffected from system time ↵Martin Willi2009-08-314-3/+55
| | | | changes
* do not depend on gcrypt autoconf macrosMartin Willi2009-08-312-3/+4
|
* added ECGDSA specific OIDsMartin Willi2009-08-311-0/+39
|
* fixed crash in crl listingMartin Willi2009-08-311-1/+1
|
* generation of keyid requires pkcs1 pluginAndreas Steffen2009-08-304-4/+4
|
* clear RSA private key chunks after useAndreas Steffen2009-08-301-1/+1
|
* ASN.1 DER encoding of private key is not needed anymoreAndreas Steffen2009-08-301-24/+16
|
* new UML scenario certs have SHA256 digestAndreas Steffen2009-08-301-1/+2
|
* removed position debug outputAndreas Steffen2009-08-301-1/+0
|
* added workaround to parse PEM encoded PGP key with KEY_RSAMartin Willi2009-08-281-0/+7
|
* implemented PGP Secret-Key Packet parsingMartin Willi2009-08-283-7/+156
|
* fixed memleakMartin Willi2009-08-281-1/+1
|
* .., but a comment might be helpfulAndreas Steffen2009-08-281-0/+1
|
* removed TODO reminderAndreas Steffen2009-08-281-1/+0
|
* allow choice of digest algorithm in certificate generationAndreas Steffen2009-08-285-6/+88
|
* build_curve_signature() processes hash not dataAndreas Steffen2009-08-271-1/+1
|
* NID_hash and NID_ec_curve were interchangedAndreas Steffen2009-08-271-6/+6
|
* verify_signature() now processes hash not dataAndreas Steffen2009-08-271-3/+3
|
* NID_hash and NID_ec_curver were interchangedAndreas Steffen2009-08-271-6/+6
|
* verify that the ECDSA auth signature was done with the correct curveMartin Willi2009-08-271-21/+47
|
* distinguish between RFC 4754 (concatenated) and RFC 3279 (DER encoded) ECDSA ↵Martin Willi2009-08-276-189/+148
| | | | signatures
* OID_EC_PUBLICKEY has a parameters field, defining the elliptic curveAndreas Steffen2009-08-271-1/+0
|
* added OID_EC_PUBLIC_KEY algorithmIdentifierAndreas Steffen2009-08-271-5/+6
|
* cosmeticsAndreas Steffen2009-08-271-3/+3
|
* fixed return valueMartin Willi2009-08-271-0/+1
|
* do not append a NULL paramter to ECDSA algorithmIdentifiersMartin Willi2009-08-271-3/+17
|
* PKI tool supports certificate verificationMartin Willi2009-08-271-0/+110
|
* do not flush cached encodings, keys are responsible for itMartin Willi2009-08-271-10/+4
|
* whitelist openssl ecdsa_check functionMartin Willi2009-08-271-0/+1
|
* PKI tool supports generation of self-signed certificatesMartin Willi2009-08-271-0/+166
|
* support generation of EC certificatesMartin Willi2009-08-271-16/+9
|