aboutsummaryrefslogtreecommitdiffstats
Commit message (Collapse)AuthorAgeFilesLines
* esc() is only used if dladdr(3) is available5.0.3dr3Tobias Brunner2013-03-081-12/+13
|
* Fix maximum size of a mem_pool_tTobias Brunner2013-03-071-2/+2
|
* New Android release after adding translations and Cert/EAP authenticationTobias Brunner2013-03-071-3/+3
| | | | | Also fixed a race condition during reauthentication and a freeze that might happen while disconnecting.
* android: Add support for combined certificate and EAP authenticationTobias Brunner2013-03-077-34/+63
| | | | | | This uses RFC 4739 multiple authentication rounds to first authenticate the client with a certificate followed by an EAP authentication round with username and password.
* Merge branch 'pt-tls'Martin Willi2013-03-0721-69/+1077
|\
| * If TLS peer authentication not required, the client does nonetheless, allow ↵Martin Willi2013-03-061-4/+19
| | | | | | | | it to fail
| * Support different authentication schemes for PT-TLSMartin Willi2013-02-285-6/+71
| |
| * Request a TLS client certificate even if no peer identity is givenMartin Willi2013-02-281-5/+1
| | | | | | | | | | This allows a peer to perform client authentication if it wants, but skip it if not.
| * Wrap tls_t.get_{server,peer}_id methods in tls_socket_tMartin Willi2013-02-282-0/+28
| |
| * Delegate tls_t.get_{peer,server}_id to handshake layerMartin Willi2013-02-287-29/+78
| | | | | | | | | | This allows to get updated peer identities if the peer can't authenticate, or does when it is optional.
| * Implement a SASL PLAIN mechanism using shared secretsMartin Willi2013-02-284-0/+224
| |
| * Implement SASL authentication in PT-TLS clientMartin Willi2013-02-281-11/+191
| |
| * Implement SASL authentication in PT-TLS serverMartin Willi2013-02-281-5/+236
| |
| * Define PT-TLS SASL result codesMartin Willi2013-02-281-0/+11
| |
| * Define an interface for SASL mechanisms and provide a static factoryMartin Willi2013-02-283-1/+193
| |
| * Pass a client identity to pt_tls_client, usable for TLS or SASL authenticationMartin Willi2013-02-282-7/+21
| |
| * Don't close underlying file descriptor before destroying a tls_socketMartin Willi2013-02-281-1/+4
| | | | | | | | | | tls_socket cleanup usually sends a TLS close notify, for which it uses a valid socket.
* | As Quick Mode initiator, select a subset of the proposed and the returned TSMartin Willi2013-03-071-4/+11
| | | | | | | | | | | | | | | | Cisco 5505 firewalls don't return the port if we send a specific one, letting the is_contained_in() checks fail. Using get_subset() selection builds the Quick Mode correctly with the common subset of selectors. Based on an initial patch from Paul Stewart.
* | added some otherNames OIDsAndreas Steffen2013-03-061-0/+6
| |
* | Fix some apidoc in mem_pool.hMartin Willi2013-03-061-3/+3
| |
* | testing: Add screen package to base imageTobias Brunner2013-03-051-1/+1
| | | | | | | | Makes working in a single SSH session easier.
* | testing: Enable ssh connection to second IP by name (e.g. moon1)Tobias Brunner2013-03-051-1/+9
| |
* | testing: ssh script accepts IP addresses instead of host namesTobias Brunner2013-03-051-4/+11
| |
* | testing: ssh script forwards arguments to ssh commandTobias Brunner2013-03-051-1/+2
| | | | | | | | This allows to execute commands on a virtual host.
* | removed unneeded DS filesAndreas Steffen2013-03-053-6/+0
| |
* | instead of cloning use extract_buf() methodAndreas Steffen2013-03-0434-35/+35
| |
* | Don't invoke addr2line if dladdr() did not yield a filenameMartin Willi2013-03-041-1/+1
| |
* | When receiving critical signals, additionally log backtraces to syslog/filesMartin Willi2013-03-041-0/+1
| |
* | backtrace_t.log() takes a NULL file pointer to log to registered dbg() hookMartin Willi2013-03-042-33/+71
| |
* | Don't use color escapes when printing backtraces to a non-TTY fileMartin Willi2013-03-041-11/+20
| |
* | Add a utility function to resolve TTY color escape codes dynamicallyMartin Willi2013-03-042-0/+103
| |
* | make TNC Access Requestor ID available to IMVsAndreas Steffen2013-03-039-42/+130
| |
* | updated NEWSAndreas Steffen2013-03-031-2/+8
| |
* | upgraded KVM test suite to Linux 3.8 kernelAndreas Steffen2013-03-032-4/+1867
| |
* | added openssl-ikev2/alg-aes-gcm scenarioAndreas Steffen2013-03-0311-0/+158
| |
* | use DNs in tnc/tnccs-20-tls scenarioAndreas Steffen2013-03-034-5/+3
| |
* | added getpwuid_r and initgroups to whitelistAndreas Steffen2013-03-031-0/+2
| |
* | third parameter was not copiedAndreas Steffen2013-03-021-1/+1
| |
* | Fixed Doxygen comments after scanning complete src directoryTobias Brunner2013-03-0296-183/+221
| |
* | Include the whole src directory in apidoc and make source files browsableTobias Brunner2013-03-021-17/+7
| | | | | | | | | | But still only scan header files as Doxygen can't figure out how they are related to source files (at least not for class methods).
* | Prevent Doxygen from processing __attribute__(...)Tobias Brunner2013-03-021-1/+1
| | | | | | | | Doxygen produces additional members/classes from these attributes.
* | Updated Doxyfile.in with a recent version of DoxygenTobias Brunner2013-03-021-127/+509
| |
* | Removed backend for old Android frontend patchTobias Brunner2013-03-0214-929/+88
| | | | | | | | Moved the remaining DNS handler to a new plugin.
* | added ERX_SUPPORTED IKEv2 NotifyAndreas Steffen2013-03-022-7/+11
| |
* | added some new TCG IF-M message subtypes and attributesAndreas Steffen2013-03-024-4/+36
| |
* | version bump to 5.0.3dr3Andreas Steffen2013-03-021-1/+1
| |
* | android: Mitigate race condition on reauthenticationTobias Brunner2013-03-011-0/+4
| | | | | | | | | | | | | | | | If the TUN device gets recreated while another thread in handle_plain() has not yet called select(2) but already stored the file descriptor of the old TUN device in its FD set, select() will fail with EBADF. Fixes #301.
* | openssl: The EVP GCM interface requires at least OpenSSL 1.0.1Tobias Brunner2013-03-012-0/+8
| |
* | Merge branch 'multi-eap'Martin Willi2013-03-012-28/+50
|\ \ | | | | | | | | | | | | | | | Fixes the use of EAP methods in the non-first authentication round if the initiator demands mutual EAP. Also mutual EAP can now be enforced when the initiator sets rightauth=eap, not only with rightauth=any.
| * | Apply a mutual EAP auth_cfg not before the EAP method completesMartin Willi2013-02-262-1/+18
| | |