aboutsummaryrefslogtreecommitdiffstats
Commit message (Expand)AuthorAgeFilesLines
...
* Fixed settings lookup if the section/key contains dots, second tryMartin Willi2010-08-092-23/+110
* log final TLS acknowledgement packetAndreas Steffen2010-08-082-1/+9
* added level 2 debug info on sent TLS packetsAndreas Steffen2010-08-072-0/+8
* log EAP-TTLS versionAndreas Steffen2010-08-071-6/+12
* fixed typoAndreas Steffen2010-08-071-1/+1
* EAP-TLS and EAP-TTLS use different constant MSK PRF labelAndreas Steffen2010-08-076-9/+20
* support server authentication only for EAP-TTLSAndreas Steffen2010-08-071-5/+23
* added eap_ttls plugin configurationAndreas Steffen2010-08-077-2/+628
* Properly initialize libstrongswan in _copyright.Tobias Brunner2010-08-061-0/+5
* Added missing Vstr wrappers for asprintf.Tobias Brunner2010-08-062-1/+34
* Create a PKCS#11 session public key if we don't find oneMartin Willi2010-08-061-5/+100
* Implemented PKCS#11 RSA public key for keys found on a tokenMartin Willi2010-08-064-0/+399
* Export scheme_to_mechanism conversion functionMartin Willi2010-08-062-3/+10
* Load certificate after enumerationMartin Willi2010-08-061-13/+34
* fix error-type range in parsing of NOTIFY payloadsJiri Bohac2010-08-061-1/+1
* added TTLS to EAP short names, tooAndreas Steffen2010-08-061-1/+3
* added EAP_TTLS methodAndreas Steffen2010-08-052-1/+4
* added ikev2/rw-eap-tls-radiusAndreas Steffen2010-08-0517-0/+406
* Whitespace cleanupsMartin Willi2010-08-052-10/+10
* Use certificate subject to get a public key of the TLS serverMartin Willi2010-08-051-7/+11
* no need for strongSwan VID since the EAP_ONLY notification has been officiall...Andreas Steffen2010-08-055-5/+0
* Some Doxygen fixes.Tobias Brunner2010-08-054-5/+6
* added some more TLS debug outputAndreas Steffen2010-08-052-9/+29
* fixed type in cipher suite list buildAndreas Steffen2010-08-051-1/+1
* log selected TLS version and cipher suiteAndreas Steffen2010-08-053-38/+441
* log TLS handshake messages in debug level 2Andreas Steffen2010-08-041-0/+4
* Fixed loading of secrets with IDs.Tobias Brunner2010-08-041-1/+1
* Fixed loading of private keys without password.Tobias Brunner2010-08-041-1/+1
* Accept EAP_ONLY_AUTHENTICATION notifies from any client, now that IANA alloca...Tobias Brunner2010-08-041-3/+2
* generated aaa certificateAndreas Steffen2010-08-0410-2/+108
* IKEv2 notification types updated.Tobias Brunner2010-08-042-27/+34
* Reimplemented mem pool to support multiple leases for a single identityMartin Willi2010-08-041-129/+172
* Save/Load state of PKCS#11 hasherMartin Willi2010-08-041-47/+100
* Register hmac/xcbc algorithms after potentially underlying PKCS#11Martin Willi2010-08-041-7/+7
* Do initial slot enumeration manuallyMartin Willi2010-08-042-7/+23
* Implemented hasher_t using PKCS#11Martin Willi2010-08-044-0/+336
* Defer certificate loading until all PKCS#11 modules are loadedMartin Willi2010-08-041-3/+8
* Destroy IKE_SA Managers crypto primitives during flush, the plugins are gone ...Martin Willi2010-08-042-2/+5
* Provide a public PKCS#11 mechanism enumeratorMartin Willi2010-08-043-44/+117
* Added PKCS#11 private key support to the pki toolMartin Willi2010-08-044-22/+81
* The pki tool uses a callback credential set to read in passphrase/PINMartin Willi2010-08-041-0/+67
* Pass type of requested key in the callback credential setMartin Willi2010-08-044-4/+25
* Support PKCS#11 keys requiring reauthentication for each operationMartin Willi2010-08-041-11/+64
* Do not try to log in if we already have a user sessionMartin Willi2010-08-041-0/+13
* Obseleted BUILD_PASSPHRASE(_CALLBACK) for private key loading, use credential...Martin Willi2010-08-0411-228/+301
* Use a dedicated build part for challenge passwords, BUILD_PASSPHRASE gets obs...Martin Willi2010-08-045-3/+6
* Use credential sets to load smartcard keysMartin Willi2010-08-043-52/+150
* Handle PIN: as a magic keyword for prompt, use getpass() to silently read cre...Martin Willi2010-08-042-9/+22
* Implemented a callback based credential set, currently for shared keys onlyMartin Willi2010-08-046-98/+268
* Implemented a generic in-memory credential set, currently for shared keys onlyMartin Willi2010-08-044-0/+285