aboutsummaryrefslogtreecommitdiffstats
path: root/src/libcharon/sa
Commit message (Expand)AuthorAgeFilesLines
...
* Merge auth config items added from XAuth backends to IKE_SAMartin Willi2012-07-261-0/+1
* Release leaking child config after uninstalling shunt policyMartin Willi2012-07-231-0/+1
* Refactored error handling in keymat_v1_tMartin Willi2012-07-161-25/+27
* Clean up error handling in keymat_v2_tMartin Willi2012-07-161-87/+65
* Cleaned up memory management and return values for encryption payloadMartin Willi2012-07-161-1/+4
* Add a return value to hasher_t.allocate_hash()Martin Willi2012-07-166-20/+80
* Add a return value to keymat_v1_t.{get,update,confirm}_ivMartin Willi2012-07-162-13/+31
* Add a return value to crypter_t.set_key()Martin Willi2012-07-162-5/+22
* Add a return value to crypter_t.decrypt()Martin Willi2012-07-161-2/+1
* Add a return value to crypter_t.encryptMartin Willi2012-07-161-2/+1
* Check rng return value when generating ME CONNECT_ID and KEYTobias Brunner2012-07-161-2/+14
* Check rng return value when generating IKEv1 message IDsTobias Brunner2012-07-161-8/+20
* Check rng return value when generating COOKIE2 during MOBIKETobias Brunner2012-07-161-6/+11
* Check rng return value when generating fake NAT detection payloadsTobias Brunner2012-07-162-4/+5
* Check rng return value when generating SPIs in ike_sa_manager_tTobias Brunner2012-07-161-35/+67
* Nonce: Let get_nonce, allocate_nonce return booleanReto Buerki2012-07-164-5/+31
* Add a return value to prf_t.set_key()Martin Willi2012-07-162-23/+41
* Add a return value to prf_t.allocate_bytes()Martin Willi2012-07-162-22/+71
* Use a bool return value in keymat_v1_t.get_hash_phase2()Martin Willi2012-07-162-27/+27
* Add a return value to keymat_v1_t.get_hash()Martin Willi2012-07-164-17/+35
* Add a return value to keymat_v2_t.get_auth_octets()Martin Willi2012-07-163-17/+24
* Add a return value to keymat_v2_t.get_psk_sig()Martin Willi2012-07-164-24/+39
* Add a return value to prf_t.get_bytes()Martin Willi2012-07-161-9/+19
* prf_plus_create() can return NULL on failureMartin Willi2012-07-162-0/+20
* Add a return value to prf_plus_t.allocate_bytes()Martin Willi2012-07-162-17/+76
* Add a return value to signer_t.set_key()Martin Willi2012-07-161-2/+14
* Add a return value to aead_t.set_key()Martin Willi2012-07-162-3/+12
* Add a return value to aead_t.encrypt()Martin Willi2012-07-161-1/+2
* Simplify NAT-D payload creation if UDP encapsulation is forcedTobias Brunner2012-07-131-2/+2
* Send cert request based on peers configured authentication classMartin Willi2012-07-101-3/+30
* Don't send CERTREQs when initiating aggressive mode PSKMartin Willi2012-07-091-0/+4
* As a responder, don't start a TRANSACTION request if we expect one from the i...Martin Willi2012-06-292-2/+4
* Defer quick mode initiation if we expect a mode config requestMartin Willi2012-06-271-1/+20
* Queue a mode config task as responder if we need a virtual IPMartin Willi2012-06-272-4/+16
* Add basic support for XAuth responder authenticationMartin Willi2012-06-272-8/+10
* Ignore a received %any virtual IP for installationMartin Willi2012-06-261-1/+2
* Centralized thread cancellation in processor_tTobias Brunner2012-06-251-8/+19
* support Cisco Unity VIDAndreas Steffen2012-06-252-3/+11
* Enforce uniqueids=keep based on XAuth identityMartin Willi2012-06-251-0/+6
* Don't send XAUTH_OK if a hook prevents SA to establishMartin Willi2012-06-251-4/+14
* Enforce uniqueids=keep only for non-XAuth Main/Agressive ModesMartin Willi2012-06-252-28/+28
* Use XAuth/EAP remote identity for uniqueness checkMartin Willi2012-06-252-2/+4
* Add missing XAuth name variable when complaining about missing XAuth backendMartin Willi2012-06-251-1/+1
* Fix SIGSEGV if kernel install fails during Quick Mode as responder.Tobias Brunner2012-06-221-4/+8
* Adopt children as XAuth initiator (which is IKE responder)Martin Willi2012-06-141-2/+2
* Require a scary option to respond to Aggressive Mode PSK requestsMartin Willi2012-06-141-0/+17
* implemented the right|leftallowany featureAndreas Steffen2012-06-082-10/+15
* Enforce uniqueness policy in IKEv1 main and aggressive modesMartin Willi2012-06-082-0/+29
* Try to rekey without KE exchange if peer returns INVALID_KE_PAYLOAD(NONE)Martin Willi2012-06-081-1/+8
* While checking for redundant quick modes, compare traffic selectorsMartin Willi2012-06-081-0/+22