aboutsummaryrefslogtreecommitdiffstats
Commit message (Collapse)AuthorAgeFilesLines
...
* include: Update xfrm.h to Linux v4.3Martin Willi2016-09-301-0/+22
| | | | | We strip the newly introduced <linux/in6.h> include, as this clashes with the <netinet/in6.h> include.
* Merge branch 'fwd-out-policies-optional'Tobias Brunner2016-09-286-44/+93
|\ | | | | | | | | | | This makes the FWD policies in the out direction optional (disabled by default). They may be enabled (e.g. if conflicting drop policies are used) via the policies_fwd_out swanctl.conf option.
| * child-sa: Only install outbound FWD policies if explicitly configuredTobias Brunner2016-09-281-14/+27
| | | | | | | | | | | | They are only required if drop policies would otherwise prevent forwarding traffic. This reduces the number of policies and avoids conflicts e.g. with SPD hash thresholds.
| * testing: Enable outbound FWD policies in swanctl/manual-prio scenarioTobias Brunner2016-09-281-5/+6
| |
| * vici: Make installation of outbound FWD policies configurableTobias Brunner2016-09-282-25/+36
| |
| * child-cfg: Add setting that controls whether outbound FWD policies are installedTobias Brunner2016-09-282-0/+24
|/
* kernel-netlink: Update cached reqid when updating policiesTobias Brunner2016-09-281-0/+2
|
* testing: Added swanctl/net2net-multicast scenarioAndreas Steffen2016-09-279-0/+166
|
* testing: Added ikev2/net2net-multicast scenarioAndreas Steffen2016-09-279-0/+125
|
* travis: Use a more recent OS X imageTobias Brunner2016-09-272-2/+3
| | | | Using the xcode8 image does not work currently (libcurl is not found).
* Version bump to 5.5.1dr55.5.1dr5Andreas Steffen2016-09-223-2/+5
|
* testing: Added swanctl/net2net-sha3-rsa-cert and swanctl/rw-eap-tls-sha3-rsa ↵Andreas Steffen2016-09-2246-0/+1139
| | | | scenarios
* gmp: Support of SHA-3 RSA signaturesAndreas Steffen2016-09-2224-167/+274
|
* bliss sampler unit-test: Fixed enumeration typeAndreas Steffen2016-09-221-2/+2
|
* bliss: bliss_sampler expects XOF typeAndreas Steffen2016-09-221-4/+3
|
* unit-tests: MGF1 tests depend on an XOF implementation not just a hash functionTobias Brunner2016-09-211-2/+2
| | | | | If the mgf1 plugin was not enabled (e.g. with the default configure options) the tests failed.
* Version bump to 5.5.1dr45.5.1dr4Andreas Steffen2016-09-213-4/+10
|
* mgf1: Refactored MGF1 as an XOFAndreas Steffen2016-09-2160-644/+966
|
* leak-detective: Fix compile warning due to unused variable if LD is disabledTobias Brunner2016-09-201-1/+1
|
* Merge branch 'testing-leak-detective'Tobias Brunner2016-09-2016-75/+179
|\ | | | | | | | | Test scenarios now fail if any leaks are detected by the leak detective. Several leaks found this way have been fixed.
| * leak-detective: Whitelist thread ID getterTobias Brunner2016-09-201-1/+3
| | | | | | | | | | | | | | | | In case an external thread calls into our code and logs messages, a thread object is allocated that will never be released. Even if we try to clean up the object via thread value destructor there is no guarantee that the thread actually terminates before we check for leaks, which seems to be the case for the Ada Tasking threads.
| * charon-tkm: Build C code with debug informationTobias Brunner2016-09-201-1/+2
| |
| * leak-detective: Whitelist functions of the Ada runtime related to TaskingTobias Brunner2016-09-201-0/+4
| |
| * charon-tkm: Free name of the PID fileTobias Brunner2016-09-201-0/+1
| |
| * charon-tkm: Deinitialize tkm before libstrongswanTobias Brunner2016-09-201-1/+1
| | | | | | | | In particular because of leak-detective.
| * leak-detective: Whitelist some glib/libsoup functionsTobias Brunner2016-09-201-1/+13
| | | | | | | | | | | | Some of these are pretty broad, so maybe an alternative option is to not use the soup plugin in the openssl-ikev2/rw-suite-b* scenarios. But the plugin is not tested anywhere else so lets go with this for now.
| * testing: Use curl instead of soup plugin in libipsec/rw-suite-b scenarioTobias Brunner2016-09-203-3/+3
| | | | | | | | | | The soup plugin is already used in the openssl-ikev2/rw-suite-b* scenarios.
| * eap-peap: Fix memory leaks when handling tunneled methodsTobias Brunner2016-09-201-1/+3
| |
| * ipseckey: Properly free enumerated certificatesTobias Brunner2016-09-201-12/+14
| |
| * ipseckey: Properly free public key after creating certificateTobias Brunner2016-09-201-1/+1
| |
| * dnscert: Properly free enumerated certificatesTobias Brunner2016-09-201-8/+11
| |
| * unbound: Avoid unnecessary cloning of RR list that caused a memory leakTobias Brunner2016-09-201-2/+1
| |
| * unbound: Fix memory leakTobias Brunner2016-09-201-0/+2
| |
| * pool: Fix (known) memory leak when querying leasesTobias Brunner2016-09-201-21/+38
| |
| * leak-detective: Whitelist leak in libldapTobias Brunner2016-09-201-0/+2
| |
| * testing: Fix totals if post test checks failTobias Brunner2016-09-201-12/+12
| |
| * testing: Log leaks and fail tests if any are detectedTobias Brunner2016-09-203-1/+32
| |
| * leak-detective: Optionally write report to a log fileTobias Brunner2016-09-201-10/+36
|/
* vici: Fix indention of flush_certs() method in Python bindingsTobias Brunner2016-09-201-1/+1
|
* travis: Run 32-bit Windows build on precise (12.04) imageTobias Brunner2016-09-202-1/+5
| | | | That's required due to a bug in MinGW 3.1.0 that's shipped with trusty.
* travis: Properly pass back result of makeTobias Brunner2016-09-201-1/+1
| | | | Fixes: 4e8f5a189cce ("travis: Add apidoc check")
* travis: Don't disable connmark and forecast plugins anymoreTobias Brunner2016-09-201-5/+1
| | | | They build fine on Ubuntu 14.04.
* Merge branch 'maemo-bye-bye'Tobias Brunner2016-09-1555-3375/+1
|\ | | | | | | | | Removes the code and helper files related to the unused and unmaintained Maemo port.
| * packages: Remove obsolete Maemo packaging filesTobias Brunner2016-09-1523-764/+0
| |
| * maemo: Remove unused pluginTobias Brunner2016-09-159-761/+1
| |
| * maemo: Remove obsolete status/settings appletTobias Brunner2016-09-1523-1850/+0
|/
* swanctl: Add man page entry for flush-certs command5.5.1dr3Tobias Brunner2016-09-151-3/+4
|
* Version bump to 5.5.1dr3Andreas Steffen2016-09-152-1/+16
|
* Merge branch 'flush-certs'Andreas Steffen2016-09-159-1/+160
|\
| * vici: flush-certs command flushes certificate cacheAndreas Steffen2016-09-139-1/+160
|/ | | | | | | | | | When fresh CRLs are released with a high update frequency (e.g. every 24 hours) or OCSP is used then the certificate cache gets quickly filled with stale CRLs or OCSP responses. The new VICI flush-certs command allows to flush e.g. cached CRLs or OCSP responses only. Without the type argument all kind of certificates (e.g. also received end entity and intermediate CA certificates) are purged.