aboutsummaryrefslogtreecommitdiffstats
path: root/src/libcharon/Makefile.am
Commit message (Collapse)AuthorAgeFilesLines
* ikev2: Immediately initiate queued tasks after establishing rekeyed IKE_SAMartin Willi2015-03-181-0/+1
| | | | | | If additional tasks get queued before/while rekeying an IKE_SA, these get migrated to the new IKE_SA. We previously did not trigger initiation of these tasks, though, leaving the task unexecuted until a new task gets queued.
* forecast: Add the broadcast/multicast forwarding plugin called forecastMartin Willi2015-02-201-0/+7
|
* connmark: Add a plugin stubMartin Willi2015-02-201-0/+7
|
* ikev2: Schedule a make-before-break completion task to delete old IKE_SAMartin Willi2015-02-201-0/+1
|
* unit-tester: Drop the old unit-tester libcharon pluginMartin Willi2015-02-201-7/+0
| | | | | | While it has some tests that we don't directly cover with the new unit tests, most of them require special infrastructure and therefore have not been used for a long time.
* attributes: Move the configuration attributes framework to libcharonMartin Willi2015-02-201-0/+4
|
* libcharon: Add a test runnerMartin Willi2015-02-201-0/+5
|
* attr-sql: Move plugin to libcharonMartin Willi2015-02-201-0/+7
|
* attr: Move plugin to libcharonMartin Willi2015-02-201-0/+7
|
* resolve: Move plugin back to libcharonMartin Willi2015-02-201-0/+7
| | | | Since pluto is gone, all existing users build upon libcharon.
* child-sa-manager: Add a global manager storing CHILD_SA relationsMartin Willi2015-02-201-0/+1
| | | | | | To quickly check out IKE_SAs and find associated CHILD_SAs, the child_sa_manager stores relations between CHILD_SAs and IKE_SAs. It provides CHILD_SA specific IKE_SA checkout functions wrapping the ike_sa_manager.
* ikev2: Add encrypted fragment payloadTobias Brunner2014-10-101-0/+1
|
* ike: Rename encryption_payload to encrypted_payloadTobias Brunner2014-10-101-1/+1
|
* ext-auth: Add an ext-auth plugin invoking an external authorization scriptMartin Willi2014-10-061-0/+7
| | | | Original patch courtesy of Vyronas Tsingaras.
* kernel-iph: Add a stub for a Windows IP Helper based networking backendMartin Willi2014-06-041-0/+7
|
* kernel-wfp: Add a stub for a Windows Filtering Platform based IPsec backendMartin Willi2014-06-041-0/+7
|
* socket-win: Implement a Windows socket plugin using Winsock2Martin Willi2014-06-041-0/+7
|
* bus: Build syslog logger depending on syslog() availabilityMartin Willi2014-06-041-3/+4
|
* libcharon: Link against Winsock2 on WindowsMartin Willi2014-06-041-0/+1
|
* charon: Don't use syslog() if not supportedMartin Willi2014-06-041-1/+6
|
* vici: Add a plugin stub for the "Versatile IKE Control Interface" pluginMartin Willi2014-05-071-0/+7
|
* dnscert: Add DNS CERT support for pubkey authenticationRuslan N. Marchenko2013-10-111-0/+7
| | | | | | | | | | | Add DNSSEC protected CERT RR delivered certificate authentication. The new dnscert plugin is based on the ipseckey plugin and relies on the existing PEM decoder as well as x509 and PGP parsers. As such the plugin expects PEM encoded PKIX(x509) or PGP(GPG) certificate payloads. The plugin is targeted to improve interoperability with Racoon, which supports this type of authentication, ignoring in-stream certificates and using only DNS provided certificates for FQDN IDs.
* Build all shared libraries with -no-undefined and link them properlyTobias Brunner2013-09-121-1/+7
| | | | | | | | | | The flag is required to convince libtool on Cygwin to build DLLs. But on Windows these shared libraries can not have undefined symbols, so we have to link them explicitly to the libraries they reference. For plugins this is currently not done, so only the monolithic build is supported. The plugin loader wouldn't be able to load DLLs anyway, as it tries to load files that don't exist on Cygwin.
* moved tnc_imv plugin to libtnccs thanks to recommendation callback functionAndreas Steffen2013-08-151-7/+0
|
* Moved tnc-tnccs, tnc-imc, tnccs-11, tnccs-20 and tnccs-dynamic libcharon ↵Andreas Steffen2013-08-151-35/+0
| | | | plugins to libtnccs
* automake: replace INCLUDES by AM_CPPFLAGSMartin Willi2013-07-181-4/+2
| | | | | | INCLUDES are now deprecated and throw warnings when using automake 1.13. We now also differentiate AM_CPPFLAGS and AM_CFLAGS, where includes and defines are passed to AM_CPPFLAGS only.
* osx-attr: add plugin installing config attributes using SystemConfigurationMartin Willi2013-06-211-0/+7
| | | | | Currently installs DNS servers only, by prepending IP addresses to the DNS configuration of the primary networking service.
* kernel-libipsec: Add plugin that implements kernel_ipsec_t using libipsecTobias Brunner2013-06-211-0/+7
|
* renamed tnc_ifmap2 plugin to tnc_ifmapAndreas Steffen2013-03-311-3/+3
|
* removed obsoleted tnc_ifmap pluginAndreas Steffen2013-03-311-7/+0
|
* set up a new IF-MAP sessionAndreas Steffen2013-03-291-0/+7
|
* Added xauth-noauth pluginTobias Brunner2013-03-191-0/+7
| | | | | | | | This XAuth backend does not do any authentication of client credentials but simply sends a successful XAuth status to the client, thereby concluding the XAuth exchange. This can be useful to fallback to basic RSA authentication with clients that can not be configured without XAuth authentication.
* Removed backend for old Android frontend patchTobias Brunner2013-03-021-3/+3
| | | | Moved the remaining DNS handler to a new plugin.
* Merge branch 'systime'Martin Willi2013-03-011-0/+7
|\ | | | | | | | | | | Add a systime-fix plugin allowing an embedded system to validate certificates if the system time has not been synchronized after boot. Certificates of established tunnels can be re-validated after the system time gets valid.
| * Add a stub for systime-fix, a plugin handling certificate lifetimes gracefullyMartin Willi2013-02-191-0/+7
| |
* | Added ipseckey plugin, which provides support for public keys in IPSECKEY RRsReto Guadagnini2013-02-191-0/+7
| |
* | make TNC client authentication type available to IMVsAndreas Steffen2013-02-121-1/+1
|/
* Payload added to handle IKE fragmentsTobias Brunner2012-12-241-0/+1
|
* Add an error-notify plugin to send catched alerts to listening applicationsMartin Willi2012-12-191-0/+7
|
* Add a lookip plugin stub to lookup connections by virtual IPMartin Willi2012-10-241-0/+7
|
* Add Cisco Unity client support for Split-Include and Local-LANMartin Willi2012-09-181-0/+7
|
* Removed the unneeded socket-raw pluginTobias Brunner2012-09-141-7/+0
|
* Added eap-dynamic plugin which can proxy any other EAP methodTobias Brunner2012-08-311-0/+7
|
* Merge branch 'android-app'Tobias Brunner2012-08-131-1/+1
|\ | | | | | | | | | | | | | | This branch introduces a userland IPsec implementation (libipsec) and an Android App which targets the VpnService API that is provided by Android 4+. The implementation is based on the bachelor thesis 'Userland IPsec for Android 4' by Giuliano Grassi and Ralf Sager.
| * Moved packet_t to libstrongswanTobias Brunner2012-08-081-1/+1
| |
* | Merge branch 'android-ndk'Tobias Brunner2012-08-131-0/+7
|\| | | | | | | | | | | | | | | | | | | | | | | This branch comes with some preliminary changes for the user-land IPsec implementation and the Android App. One important change is that the UDP ports used by the socket-default plugin were made configurable (either via ./configure or strongswan.conf). Also, the plugin does randomly allocate a port if it is configured to 0, which is useful for client implementations. A consequence of these changes is that the local UDP port used when creating ike_cfg_t objects has to be fetched from the socket.
| * Moved Android specific logger to separate plugin.Tobias Brunner2012-08-081-0/+7
| | | | | | | | | | | | This is mainly because the other parts of the existing android plugin can not be built in the NDK (access to keystore and system properties are not part of the stable NDK libraries).
* | Add xauth-pam, an XAuth backend verifying credentials with PAMMartin Willi2012-08-101-0/+7
|/
* Fix linking of addrblock plugin when building monolithicMartin Willi2012-08-031-1/+1
| | | | Fixes #212.
* Refactored heavily #ifdefd capability code to its own libstrongswan classMartin Willi2012-07-041-4/+0
|