Commit message (Collapse) | Author | Age | Files | Lines | |
---|---|---|---|---|---|
* | Version bump to 5.5.1dr45.5.1dr4 | Andreas Steffen | 2016-09-21 | 3 | -4/+10 |
| | |||||
* | mgf1: Refactored MGF1 as an XOF | Andreas Steffen | 2016-09-21 | 60 | -644/+966 |
| | |||||
* | leak-detective: Fix compile warning due to unused variable if LD is disabled | Tobias Brunner | 2016-09-20 | 1 | -1/+1 |
| | |||||
* | Merge branch 'testing-leak-detective' | Tobias Brunner | 2016-09-20 | 16 | -75/+179 |
|\ | | | | | | | | | Test scenarios now fail if any leaks are detected by the leak detective. Several leaks found this way have been fixed. | ||||
| * | leak-detective: Whitelist thread ID getter | Tobias Brunner | 2016-09-20 | 1 | -1/+3 |
| | | | | | | | | | | | | | | | | In case an external thread calls into our code and logs messages, a thread object is allocated that will never be released. Even if we try to clean up the object via thread value destructor there is no guarantee that the thread actually terminates before we check for leaks, which seems to be the case for the Ada Tasking threads. | ||||
| * | charon-tkm: Build C code with debug information | Tobias Brunner | 2016-09-20 | 1 | -1/+2 |
| | | |||||
| * | leak-detective: Whitelist functions of the Ada runtime related to Tasking | Tobias Brunner | 2016-09-20 | 1 | -0/+4 |
| | | |||||
| * | charon-tkm: Free name of the PID file | Tobias Brunner | 2016-09-20 | 1 | -0/+1 |
| | | |||||
| * | charon-tkm: Deinitialize tkm before libstrongswan | Tobias Brunner | 2016-09-20 | 1 | -1/+1 |
| | | | | | | | | In particular because of leak-detective. | ||||
| * | leak-detective: Whitelist some glib/libsoup functions | Tobias Brunner | 2016-09-20 | 1 | -1/+13 |
| | | | | | | | | | | | | Some of these are pretty broad, so maybe an alternative option is to not use the soup plugin in the openssl-ikev2/rw-suite-b* scenarios. But the plugin is not tested anywhere else so lets go with this for now. | ||||
| * | testing: Use curl instead of soup plugin in libipsec/rw-suite-b scenario | Tobias Brunner | 2016-09-20 | 3 | -3/+3 |
| | | | | | | | | | | The soup plugin is already used in the openssl-ikev2/rw-suite-b* scenarios. | ||||
| * | eap-peap: Fix memory leaks when handling tunneled methods | Tobias Brunner | 2016-09-20 | 1 | -1/+3 |
| | | |||||
| * | ipseckey: Properly free enumerated certificates | Tobias Brunner | 2016-09-20 | 1 | -12/+14 |
| | | |||||
| * | ipseckey: Properly free public key after creating certificate | Tobias Brunner | 2016-09-20 | 1 | -1/+1 |
| | | |||||
| * | dnscert: Properly free enumerated certificates | Tobias Brunner | 2016-09-20 | 1 | -8/+11 |
| | | |||||
| * | unbound: Avoid unnecessary cloning of RR list that caused a memory leak | Tobias Brunner | 2016-09-20 | 1 | -2/+1 |
| | | |||||
| * | unbound: Fix memory leak | Tobias Brunner | 2016-09-20 | 1 | -0/+2 |
| | | |||||
| * | pool: Fix (known) memory leak when querying leases | Tobias Brunner | 2016-09-20 | 1 | -21/+38 |
| | | |||||
| * | leak-detective: Whitelist leak in libldap | Tobias Brunner | 2016-09-20 | 1 | -0/+2 |
| | | |||||
| * | testing: Fix totals if post test checks fail | Tobias Brunner | 2016-09-20 | 1 | -12/+12 |
| | | |||||
| * | testing: Log leaks and fail tests if any are detected | Tobias Brunner | 2016-09-20 | 3 | -1/+32 |
| | | |||||
| * | leak-detective: Optionally write report to a log file | Tobias Brunner | 2016-09-20 | 1 | -10/+36 |
|/ | |||||
* | vici: Fix indention of flush_certs() method in Python bindings | Tobias Brunner | 2016-09-20 | 1 | -1/+1 |
| | |||||
* | travis: Run 32-bit Windows build on precise (12.04) image | Tobias Brunner | 2016-09-20 | 2 | -1/+5 |
| | | | | That's required due to a bug in MinGW 3.1.0 that's shipped with trusty. | ||||
* | travis: Properly pass back result of make | Tobias Brunner | 2016-09-20 | 1 | -1/+1 |
| | | | | Fixes: 4e8f5a189cce ("travis: Add apidoc check") | ||||
* | travis: Don't disable connmark and forecast plugins anymore | Tobias Brunner | 2016-09-20 | 1 | -5/+1 |
| | | | | They build fine on Ubuntu 14.04. | ||||
* | Merge branch 'maemo-bye-bye' | Tobias Brunner | 2016-09-15 | 55 | -3375/+1 |
|\ | | | | | | | | | Removes the code and helper files related to the unused and unmaintained Maemo port. | ||||
| * | packages: Remove obsolete Maemo packaging files | Tobias Brunner | 2016-09-15 | 23 | -764/+0 |
| | | |||||
| * | maemo: Remove unused plugin | Tobias Brunner | 2016-09-15 | 9 | -761/+1 |
| | | |||||
| * | maemo: Remove obsolete status/settings applet | Tobias Brunner | 2016-09-15 | 23 | -1850/+0 |
|/ | |||||
* | swanctl: Add man page entry for flush-certs command5.5.1dr3 | Tobias Brunner | 2016-09-15 | 1 | -3/+4 |
| | |||||
* | Version bump to 5.5.1dr3 | Andreas Steffen | 2016-09-15 | 2 | -1/+16 |
| | |||||
* | Merge branch 'flush-certs' | Andreas Steffen | 2016-09-15 | 9 | -1/+160 |
|\ | |||||
| * | vici: flush-certs command flushes certificate cache | Andreas Steffen | 2016-09-13 | 9 | -1/+160 |
|/ | | | | | | | | | | When fresh CRLs are released with a high update frequency (e.g. every 24 hours) or OCSP is used then the certificate cache gets quickly filled with stale CRLs or OCSP responses. The new VICI flush-certs command allows to flush e.g. cached CRLs or OCSP responses only. Without the type argument all kind of certificates (e.g. also received end entity and intermediate CA certificates) are purged. | ||||
* | auth-cfg-wrapper: Fix memory leak with hash-and-URL certificates | Tobias Brunner | 2016-09-12 | 1 | -1/+1 |
| | | | | | | | We wrap the auth-cfg object and its contents, so there is no need to get an additional reference for the enumerated certificate. Fixes a44bb9345f04 ("merged multi-auth branch back into trunk") | ||||
* | testing: Add output of iptables-save | Tobias Brunner | 2016-09-12 | 1 | -1/+11 |
| | | | | | | | | | This might be helpful to get the complete picture of the installed rules. `-c` is currently not used as the counters that are added in front of every rule make the output quite hard to read and the counters are already provided in the accompanying `iptables -v -L` output. Fixes #2111. | ||||
* | testing: List `nat` and `mangle` tables in addition to the `filter` table | Tobias Brunner | 2016-09-12 | 1 | -3/+6 |
| | | | | | | This is useful in scenarios that e.g. use NAT and/or marks. References #2111. | ||||
* | testing: Ignore comments (lines starting with #) in pre-/eval-/posttest.dat | Tobias Brunner | 2016-09-09 | 1 | -3/+3 |
| | |||||
* | ikev2: (Re-)Queue tasks used to establish an IKE_SA in reset() | Tobias Brunner | 2016-09-06 | 1 | -2/+1 |
| | | | | | | | | | Some tasks might get removed immediately once the IKE_SA_INIT response has been handled even if there were notifies that require a restart of the IKE_SA (e.g. COOKIE or INVALID_KE_PAYLOAD). Such a task is ike_vendor, which caused vendor IDs not to get sent in a retry. This change ensures all required tasks are queued after the reset, which some callers did already anyway. | ||||
* | ikev2: Store proposal on IKE_SA before creating DH object | Tobias Brunner | 2016-09-06 | 1 | -2/+5 |
| | | | | This might be useful for custom implementations of keymat_t. | ||||
* | travis: Add apidoc check | Tobias Brunner | 2016-09-05 | 2 | -2/+31 |
| | | | | | This requires at least Ubuntu 14.04 (the Doxygen version in 12.04 has some issues with our Doxyfile and prints lots of warnings). | ||||
* | travis: Use Trusty beta image | Tobias Brunner | 2016-09-05 | 2 | -4/+7 |
| | |||||
* | nm: Updated NEWS | Tobias Brunner | 2016-09-05 | 1 | -1/+15 |
| | |||||
* | Merge branch 'nm-1.2' | Tobias Brunner | 2016-09-05 | 10 | -260/+619 |
|\ | | | | | | | | | | | | | Provides fixes and changes for compatibility with current NM releases. Closes strongswan/strongswan#15. Fixes #797. | ||||
| * | nm: Pass external gateway to NM | Tobias Brunner | 2016-09-05 | 1 | -1/+8 |
| | | | | | | | | This seems to be required by newer versions. | ||||
| * | nm: Update auth-dialog | Tobias Brunner | 2016-09-05 | 2 | -106/+251 |
| | | | | | | | | | | | | This updates the auth dialog so that passwords are properly retrieved (e.g. for the nm-applet). It also adds support for external UI mode and properly handles secret flags. | ||||
| * | nm: Enforce min. length for PSKs in backend | Tobias Brunner | 2016-09-05 | 1 | -0/+10 |
| | | |||||
| * | nm: Add minimum length constraint for PSK passwords in connection editor | Tobias Brunner | 2016-09-05 | 1 | -0/+16 |
| | | | | | | | | We already have this restriction in the auth-dialog. | ||||
| * | nm: Bump minor version to 1.4.0 | Lubomir Rintel | 2016-09-05 | 1 | -1/+1 |
| | | | | | | | | | | | | This is probably a good idea to do to signal there's significant changes in dependencies to the distro package maintainers with libnm port and associated changes. | ||||
| * | nm: Bump to GTK+ 3.0 | Lubomir Rintel | 2016-09-05 | 1 | -1/+1 |
| | | | | | | | | It's been released years ago; we depend on newer stuff than that now. |