aboutsummaryrefslogtreecommitdiffstats
Commit message (Collapse)AuthorAgeFilesLines
* ikev1: Move fragment generation to message_tTobias Brunner2014-10-105-139/+251
|
* ike: Rename encryption_payload to encrypted_payloadTobias Brunner2014-10-1010-102/+98
|
* ipsec: Remove unsupported listcards and rereadgroups commandsTobias Brunner2014-10-081-10/+0
|
* ipsec: Document missing commandsTobias Brunner2014-10-081-1/+11
|
* ipsec: Update usage outputTobias Brunner2014-10-081-18/+17
|
* ipsec: Remove duplicate check for internal commandsTobias Brunner2014-10-081-4/+0
|
* ipsec: Only set PATH if it is not already setTobias Brunner2014-10-081-1/+1
| | | | | | | | | | The comment indicated this but it was always set anyway. All internal commands are called via their absolute paths, so the script only uses PATH for the uname command, but if that is not located in one of the configured directories the script will fail. Also, since the internal commands are called via their absolute paths there is no need to add the directories to PATH.
* ikev1: Fix handling of UNITY_LOAD_BALANCETobias Brunner2014-10-071-3/+3
| | | | | The re-authentication is now handled within the original IKE_SA if it has not yet been established, so we don't want to destroy it.
* ikev1: Don't queue more than one mode config or XAuth taskTobias Brunner2014-10-071-7/+22
| | | | | | | | At the time we reset an IKE_SA (e.g. when re-authenticating a not yet established SA due to a roaming event) such tasks might already be queued by one of the phase 1 tasks. If the SA is initiated again another task will get queued by the phase 1 task. This results in e.g. multiple mode config requests, which most gateways will have problems with.
* testing: Don't check for the actual number of SWID tags in PDP scenariosTobias Brunner2014-10-072-8/+8
| | | | | The number of SWID tags varies depending on the base image, but lets assume the number is in the hundreds.
* testing: Make TNC scenarios agnostic to the actual Debian versionTobias Brunner2014-10-0718-45/+52
| | | | | The scenarios will work with new or old base images as long as the version in use is included as product in the master data (src/libimcv/imv/data.sql).
* testing: Make TKM related build recipes future-proofTobias Brunner2014-10-076-24/+36
| | | | | | | | The tkm scenarios recently failed due to a segmentation fault on my host because I had an old build of the tkm library already built in the build directory. Because the stamp file was not versioned the new release was never checked out or built and charon-tkm was linked against the old version causing a segmentation fault during key derivation.
* version bump to 5.2.1rc1Andreas Steffen2014-10-061-1/+1
|
* Merge branch 'ext-auth'5.2.1dr1Martin Willi2014-10-0618-249/+1644
|\ | | | | | | | | | | Integrates the ext-auth plugin by Vyronas Tsingaras. The new child process abstraction simplifies implementation in both the new ext-auth and the existing updown plugin, and makes them available on the Windows platform.
| * NEWS: Mention new ext-auth pluginMartin Willi2014-10-061-0/+3
| |
| * ext-auth: Add an ext-auth plugin invoking an external authorization scriptMartin Willi2014-10-069-0/+512
| | | | | | | | Original patch courtesy of Vyronas Tsingaras.
| * updown: Use process abstraction to invoke updown scriptMartin Willi2014-10-061-246/+215
| |
| * process: Add a wrapper to invoke a command under the system default shellMartin Willi2014-10-063-0/+110
| |
| * process: Port child process spawning to the Windows platformMartin Willi2014-10-062-1/+315
| |
| * process: Provide an abstraction to spawn child processes with redirected I/OMartin Willi2014-10-067-3/+490
|/
* testing: Updated certificates and keys in sql scenariosAndreas Steffen2014-10-0635-121/+121
|
* Added IF-M Segmentation support to NEWSAndreas Steffen2014-10-051-0/+5
|
* Incremental parsing fixesAndreas Steffen2014-10-052-14/+9
|
* Updated revoked certificate in ikev2/ocsp-revoked scenarioAndreas Steffen2014-10-052-42/+42
|
* The critical-extension scenarios need the old private keysAndreas Steffen2014-10-054-0/+108
|
* Added add_segment() method to TCG/PTS attributesAndreas Steffen2014-10-0518-26/+157
|
* Added add_segment() method to TCG/SEG attributesAndreas Steffen2014-10-053-25/+49
|
* OS IMV proposes IF-M segmentation contractAndreas Steffen2014-10-056-108/+153
| | | | | | | The OS IMV sends a TCG IF-M Segmentation contract request. All IETF standard attributes support segmentation. Additionally the IETF Installed Packages standard attributes supports incremental processing while segments are received.
* SWID IMC proposes IF-M segmentation contractsAndreas Steffen2014-10-053-24/+42
|
* unit-tests: Updated libimcv test suiteAndreas Steffen2014-10-051-22/+125
|
* Added add_segment() method to IETF attributesAndreas Steffen2014-10-0512-0/+95
|
* Added add_segment() method to ITA attributesAndreas Steffen2014-10-056-0/+47
|
* Implemented incremental processing of SWID tag [ID] inventory attributeAndreas Steffen2014-10-058-199/+253
|
* Implemented add_segment method for PA-TNC attributesAndreas Steffen2014-10-0511-90/+208
|
* Added total length parameter in PA-TNC attribute constructorAndreas Steffen2014-10-0591-319/+957
|
* Assignment of flags starts with bit 0Andreas Steffen2014-10-052-5/+5
|
* Register the reception of the AIK attributeAndreas Steffen2014-10-053-2/+9
|
* Unit tests for libimcvAndreas Steffen2014-10-055-0/+649
|
* Compacted chunk creation in ita_attr_command constructorAndreas Steffen2014-10-051-2/+1
|
* Merged libpts into libimcvAndreas Steffen2014-10-05159-440/+233
|
* Added out message queue for imv_msg receive methodAndreas Steffen2014-10-058-86/+81
|
* Implemented IF-M segmentationAndreas Steffen2014-10-0524-320/+1660
|
* Added request variable to get_info_string methodAndreas Steffen2014-10-035-11/+12
|
* Implemented IF-M segmentation contractsAndreas Steffen2014-10-0332-63/+1354
|
* Allow to treat specified Attribute-Type-Not-Supported errors as non-fatalAndreas Steffen2014-10-0310-16/+110
|
* testing: Updated swanctl certificates and keysTobias Brunner2014-10-0314-292/+292
|
* testing: Wait a bit in swanctl scenarios before interacting with the daemonTobias Brunner2014-10-037-9/+16
|
* testing: Actually build swanctlTobias Brunner2014-10-031-1/+2
|
* testing: Make sure the whitelist plugin is ready before configuring itTobias Brunner2014-10-031-1/+3
|
* testing: Update PKCS#12 containersTobias Brunner2014-10-034-0/+0
|