aboutsummaryrefslogtreecommitdiffstats
Commit message (Collapse)AuthorAgeFilesLines
...
* OS IMV proposes IF-M segmentation contractAndreas Steffen2014-10-056-108/+153
| | | | | | | The OS IMV sends a TCG IF-M Segmentation contract request. All IETF standard attributes support segmentation. Additionally the IETF Installed Packages standard attributes supports incremental processing while segments are received.
* SWID IMC proposes IF-M segmentation contractsAndreas Steffen2014-10-053-24/+42
|
* unit-tests: Updated libimcv test suiteAndreas Steffen2014-10-051-22/+125
|
* Added add_segment() method to IETF attributesAndreas Steffen2014-10-0512-0/+95
|
* Added add_segment() method to ITA attributesAndreas Steffen2014-10-056-0/+47
|
* Implemented incremental processing of SWID tag [ID] inventory attributeAndreas Steffen2014-10-058-199/+253
|
* Implemented add_segment method for PA-TNC attributesAndreas Steffen2014-10-0511-90/+208
|
* Added total length parameter in PA-TNC attribute constructorAndreas Steffen2014-10-0591-319/+957
|
* Assignment of flags starts with bit 0Andreas Steffen2014-10-052-5/+5
|
* Register the reception of the AIK attributeAndreas Steffen2014-10-053-2/+9
|
* Unit tests for libimcvAndreas Steffen2014-10-055-0/+649
|
* Compacted chunk creation in ita_attr_command constructorAndreas Steffen2014-10-051-2/+1
|
* Merged libpts into libimcvAndreas Steffen2014-10-05159-440/+233
|
* Added out message queue for imv_msg receive methodAndreas Steffen2014-10-058-86/+81
|
* Implemented IF-M segmentationAndreas Steffen2014-10-0524-320/+1660
|
* Added request variable to get_info_string methodAndreas Steffen2014-10-035-11/+12
|
* Implemented IF-M segmentation contractsAndreas Steffen2014-10-0332-63/+1354
|
* Allow to treat specified Attribute-Type-Not-Supported errors as non-fatalAndreas Steffen2014-10-0310-16/+110
|
* testing: Updated swanctl certificates and keysTobias Brunner2014-10-0314-292/+292
|
* testing: Wait a bit in swanctl scenarios before interacting with the daemonTobias Brunner2014-10-037-9/+16
|
* testing: Actually build swanctlTobias Brunner2014-10-031-1/+2
|
* testing: Make sure the whitelist plugin is ready before configuring itTobias Brunner2014-10-031-1/+3
|
* testing: Update PKCS#12 containersTobias Brunner2014-10-034-0/+0
|
* testing: Update PKCS#8 keysTobias Brunner2014-10-033-81/+81
|
* testing: Update public keys in DNSSEC scenariosTobias Brunner2014-10-033-0/+0
| | | | | The tests are successful even if the public keys are not stored locally, but an additional DNS query is required to fetch them.
* testing: Update public keys and certificates in DNS zoneTobias Brunner2014-10-031-64/+60
|
* testing: Update carols certificate in several test casesTobias Brunner2014-10-036-129/+129
|
* testing: Add some notes about how to reissue attribute certificatesMartin Willi2014-10-033-0/+61
|
* testing: Reissue attribute certificates for the new holder certificatesMartin Willi2014-10-038-72/+72
| | | | | | Due to the expired and reissued holder certificates of carol and dave, new attribute certificates are required to match the holder certificates serial in the ikev2/acert-{cached,fallback,inline} tests.
* starter: Allow specifying the ipsec.conf location in strongswan.confShea Levy2014-10-022-1/+5
|
* stroke: Allow specifying the ipsec.secrets location in strongswan.confShea Levy2014-10-023-5/+20
|
* library: Allow specifying the path to strongswan.conf in the STRONGSWAN_CONF ↵Shea Levy2014-10-021-1/+1
| | | | env var
* Don't fail to install if sysconfdir isn't writableShea Levy2014-09-262-4/+4
|
* ikev1: Be more verbose if a peer config would match, but is unusable for ModeMartin Willi2014-09-251-0/+12
|
* ikev2: Reorder task activation for established IKE SAsTobias Brunner2014-09-251-11/+11
| | | | We now prefer MOBIKE tasks over delete tasks then the rest.
* Revert "ikev2: Insert MOBIKE tasks at the front of the queue"Tobias Brunner2014-09-251-6/+1
| | | | | | | | This reverts commit 3293d146289d7c05e6c6089ae1f7cdbcea378e63. The position of tasks in the queue does not actually determine the order in which they are activated. Instead this is determined by the statements in task_manager_v2_t.initiate().
* Merge branch 'curl-features'Martin Willi2014-09-24675-696/+802
|\ | | | | | | | | | | | | | | | | | | Enable missing https:// support in the curl plugin by initializing libcurl appropriately. To initialize the SSL backend properly as required, we rely on our specific crypto backends (openssl, gcrypt) that already provide this functionality. Fixes #692.
| * travis: Disable soup in "all" testMartin Willi2014-09-241-1/+1
| | | | | | | | | | | | | | | | | | | | | | | | On Ubuntu 12.04, there seems to be a resource leak related to pthread keys when initializing glib or related libraries more than once. With our repeated initialization for libstrongswan tests, we hit the following error: Lib (gthread-posix.c): Unexpected error from C library during 'pthread_key_create': Resource temporarily unavailable. The problem is not reproducible on a newer Gnome stack, hence we disable the glib based soup plugin until we have a more recent Ubuntu on Travis.
| * curl: For SSL features, depend on thread-safety provided by our crypto pluginsMartin Willi2014-09-243-7/+57
| | | | | | | | | | | | | | | | | | To use SSL in curl, we need to initialize the SSL library in a thread-safe manner and provide the appropriate callbacks. As we already do that in our crypto plugins using these libraries, we depend on these features. This implies that we need the same plugin enabled (openssl, gcrypt) as the curl backend is configured to use to fetch from HTTPS URIs.
| * configure: Load fetcher plugins after crypto base pluginsMartin Willi2014-09-24670-684/+679
| | | | | | | | | | | | | | | | | | | | Some fetcher plugins (such as curl) might build upon OpenSSL to implement HTTPS fetching. As we set (and can't unset) threading callbacks in our openssl plugin, we must ensure that OpenSSL functions don't get called after openssl plugin unloading. We achieve that by loading curl and all other fetcher plugins after the base crypto plugins, including openssl.
| * curl: Dynamically query supported protocols and register appropriate featuresMartin Willi2014-09-241-10/+64
| |
| * leak-detective: Whitelist libssl SSL_COMP_get_compression_methods()Martin Willi2014-09-241-0/+2
| | | | | | | | | | This function is called by libcurl initialization with SSL, and uses a static allocation of compression algorithms not freed.
| * curl: Try to initialize with SSL support to handle https:// URIsMartin Willi2014-09-241-1/+6
|/ | | | If initialization fails, we fall back to the old behavior.
* NEWS: Introduce charon-systemdMartin Willi2014-09-241-0/+9
|
* Merge branch 'netlink-cleanups'Martin Willi2014-09-247-106/+150
|\ | | | | | | | | In preparation for larger parallelization changes in kernel-netlink, this merge does some general code cleanup in that plugin.
| * watcher: Add a method to query the watcher stateMartin Willi2014-09-242-7/+45
| | | | | | | | | | This allows a user to check if the watcher is actually running, and potentially perform read operations directly instead of relying on watcher.
| * kernel-netlink: Define and use rtnetlink message typesMartin Willi2014-09-241-1/+22
| |
| * kernel-netlink: Pass protocol specific enum names to socket constructorMartin Willi2014-09-244-12/+13
| | | | | | | | | | This avoid the hard dependency on enum names, and makes kernel_netlink_shared independent of kernel_netlink_ipsec.
| * kernel-netlink: Clean up socket initialization, handle 0 as valid socket fdMartin Willi2014-09-241-9/+6
| |
| * kernel-netlink: Clean up response buffer managementMartin Willi2014-09-241-24/+16
| |