aboutsummaryrefslogtreecommitdiffstats
Commit message (Collapse)AuthorAgeFilesLines
...
| * printf-hook-builtin: Print NaN/Infinity floating point values as suchMartin Willi2013-10-112-2/+36
| |
| * printf-hook-builtin: Correctly round up floating point valuesMartin Willi2013-10-112-9/+43
| |
| * printf-hook-builtin: Add some preliminary floating point supportMartin Willi2013-10-112-2/+223
| | | | | | | | | | This minimalistic implementation has no aspiration for completeness or accuracy, and just provides what we need.
| * printf-hook-builtin: Support GNU %m specifierMartin Willi2013-10-112-0/+21
| |
| * printf-hook-builtin: Add a new "builtin" backend using its own printf() routinesMartin Willi2013-10-115-2/+1032
| | | | | | | | | | | | Overloads printf C library functions by a self-contained implementation, based on klibc. Does not yet feature all the required default formatters, including those for floating point values.
| * printf-hook: Add some basic printf() string/integer test functionsMartin Willi2013-10-114-1/+112
| |
| * printf-hook: Move glibc/vstr printf hook backends to separate filesMartin Willi2013-10-119-383/+586
|/
* Merge branch 'libipsec-usestats'Martin Willi2013-10-1117-41/+216
|\ | | | | | | | | | | Brings SA usage statistics and volume based expiration to libipsec and the associated kernel-libipsec plugin. Additionally removes any ESPv3 style TFC padding found in incoming packets.
| * libipsec: Enforce byte/packet lifetimes on SAsMartin Willi2013-10-113-7/+77
| |
| * kernel-libipsec: Support ESPv3 TFC paddingMartin Willi2013-10-111-1/+1
| |
| * libipsec: remove extra RFC4303 TFC padding appended to inner payloadMartin Willi2013-10-111-0/+6
| |
| * kernel-libipsec: Support query_sa() to report usage statisticsMartin Willi2013-10-111-1/+2
| |
| * libipsec: Support usage statistics and query_sa() on IPsec SAsMartin Willi2013-10-115-4/+102
| |
| * kernel: Use a time_t to report use time in query_policy()Martin Willi2013-10-1111-13/+13
| |
| * kernel: Use a time_t to report use time in query_sa()Martin Willi2013-10-1111-15/+15
|/
* Merge branch 'ah'Martin Willi2013-10-1161-137/+691
|\ | | | | | | | | | | Brings support for Security Associations integrity protected by the Authentication Header protocol, both to IKEv1 and IKEv2. Currently only plain AH is supported, but no (now deprecated) RFC2401 style AH+ESP bundles.
| * ipsec.conf: Add a description for the new 'ah' keyword.Martin Willi2013-10-111-0/+41
| |
| * testing: Add an IKEv1 host2host AH transport mode test caseMartin Willi2013-10-119-0/+89
| |
| * testing: Add an IKEv1 net2net AH test caseMartin Willi2013-10-119-0/+102
| |
| * testing: Add an IKEv2 host2host AH transport mode test caseMartin Willi2013-10-119-0/+89
| |
| * testing: Add an IKEv2 net2net AH test caseMartin Willi2013-10-119-0/+101
| |
| * testing: Allow AH packets in default INPUT/OUTPUT chainsMartin Willi2013-10-111-0/+4
| |
| * updown: Install forwarding rules with the actually used protocolMartin Willi2013-10-111-1/+1
| |
| * updown: Add a PLUTO_PROTO variable set to 'ah' or 'esp'Martin Willi2013-10-112-1/+6
| |
| * starter: Reject connections having both 'ah' and 'esp' keywords setMartin Willi2013-10-111-0/+9
| | | | | | | | | | We currently don't support mixed proposals or bundles, so don't create the illusion we would.
| * ike: Define keylength for aescmac algorithmMartin Willi2013-10-111-0/+1
| |
| * ikev1: Support parsing of AH+IPComp proposalsMartin Willi2013-10-111-9/+11
| |
| * starter: Remove obsolete 'auth' optionMartin Willi2013-10-115-7/+0
| |
| * ikev1: Accept more than two certificate payloadsMartin Willi2013-10-111-2/+2
| |
| * ikev1: Support en-/decoding of SA payloads with AH algorithmsMartin Willi2013-10-111-31/+99
| |
| * kernel-handler: Whitespace cleanupsMartin Willi2013-10-111-42/+38
| |
| * stroke: List proposals in statusall without leading '/' in AH SAsMartin Willi2013-10-111-1/+7
| |
| * ikev1: Delete quick modes with the negotiated SA protocolMartin Willi2013-10-111-1/+1
| |
| * trap-manager: Install trap with SA protocol of the first configured proposalMartin Willi2013-10-111-4/+12
| |
| * child-sa: Save protocol during SPI allocationMartin Willi2013-10-111-6/+3
| | | | | | | | | | This allows us to properly delete the incomplete SA with the correct protocol should negotiation fail.
| * ikev1: Negotiate SPI with the first/negotiated proposal protocolMartin Willi2013-10-111-3/+18
| |
| * ikev2: Allocate SPI with the protocol of the first/negotiated proposalMartin Willi2013-10-111-2/+16
| |
| * proposal: Strip redundant integrity algos for ESP proposals onlyMartin Willi2013-10-111-16/+19
| |
| * stroke: Configure proposal with AH protocol if 'ah' option setMartin Willi2013-10-112-11/+16
| |
| * starter: Add an 'ah' keyword for Authentication Header Security AssociationsMartin Willi2013-10-116-0/+6
|/
* Version bump to 5.1.1rc1Andreas Steffen2013-10-111-1/+1
|
* Keep a copy of the tnccs instance for PT-TLS handoverAndreas Steffen2013-10-095-27/+144
|
* xauth-pam: Make trimming of email addresses optional5.1.1dr4Tobias Brunner2013-10-042-4/+13
| | | | Fixes #430.
* ikev1: Accept reauthentication attempts with a keep unique policy from same hostMartin Willi2013-09-301-6/+17
| | | | | | | When we have a "keep" unique policy in place, we have to be less strict in rejecting Main/Aggressive Modes to enforce it. If the host/port equals to that of an existing ISAKMP SA, we assume it is a reauthentication attempt and accept the new SA (to replace the old).
* ikev1: Don't log a reauthentication detection message if no children adoptedMartin Willi2013-09-301-2/+6
| | | | | When a replace unique policy is in place, the children get adopted during the uniqueness check. In this case the message is just misleading.
* ikev1: Delay a potential delete for a duplicate IKE_SA having a replace policyMartin Willi2013-09-301-8/+29
| | | | | | | | | Sending a DELETE for the replaced SA immediately is problematic during reauthentication, as the peer might have associated the Quick Modes to the old SA, and also delete them. With this change the delete for the old ISAKMP SA is usually omitted, as it is gets implicitly deleted by the reauth.
* eap-radius: Increase buffer for attributes sent in RADIUS accounting messagesTobias Brunner2013-09-271-1/+1
| | | | 64 bytes might be too short for user names/identities.
* openssl: Properly log FIPS mode when enabled via openssl.confTobias Brunner2013-09-271-5/+13
| | | | | | | | | Enabling FIPS mode twice will fail, so if it is enabled in openssl.conf it should be disabled in strongswan.conf (or the other way around). Either way, we should log whether FIPS mode is enabled or not. References #412.
* android: New release after fixing remediation instructions regressionTobias Brunner2013-09-261-2/+2
|
* android: Change progress dialog handlingTobias Brunner2013-09-261-24/+41
| | | | | With the previous code the dialog sometimes was hidden for a short while before it got reopened.