aboutsummaryrefslogtreecommitdiffstats
path: root/src/libcharon/sa
Commit message (Expand)AuthorAgeFilesLines
...
* Install ESN SAs if such a proposal has been negotiatedMartin Willi2011-04-201-1/+4
* Added an esn parameter to the kernel interface add_sa functionsMartin Willi2011-04-201-1/+1
* Clearly mark switch cases that fall through.Tobias Brunner2011-04-191-0/+1
* Neither rekey nor del can be NULL.Tobias Brunner2011-04-141-2/+2
* display EAP identifiers in HEX formatAndreas Steffen2011-04-061-4/+4
* log the EAP identifier also for vendor specific EAP methodsAndreas Steffen2011-04-051-2/+2
* log the initial value of the EAP identifierAndreas Steffen2011-04-051-5/+6
* added get_identifier() and set_identifier() methodsAndreas Steffen2011-04-051-3/+18
* Move establish/inherit of rekeyed IKE_SAs to delete messagesMartin Willi2011-03-155-58/+54
* Wrap IKE delete after rekey into rekey task for responder, tooMartin Willi2011-03-151-1/+18
* Migrated ike_rekey task to INIT/METHOD macrosMartin Willi2011-03-151-59/+40
* Migrated sim_manager to INIT/METHOD macrosMartin Willi2011-03-081-150/+92
* Protect sim card/provider/hook (un-)registration with a rwlockMartin Willi2011-03-081-0/+58
* Splitted sim_manager.h header to sim_{card,provider,hooks}.hMartin Willi2011-03-084-226/+305
* Slightly change IKE_SA destruction order to inherit properly during ike_rekey...Martin Willi2011-02-282-3/+3
* Report correct key size if a cipher is not supportedMartin Willi2011-02-071-1/+1
* Some typos fixed.Tobias Brunner2011-02-071-1/+1
* Invoke the per-round authorize() hook before purging current auth info on IKE_SAMartin Willi2011-02-031-10/+10
* Migrated ike_auth to INIT/METHOD macros, fixes missing initial_contact initia...Martin Willi2011-02-021-56/+34
* Do not use destroyed rng/hasher if IKE_SA has been flush()edMartin Willi2011-02-011-3/+9
* Do not log potentially hundreds of cert requests for unknown CAs at level 1Martin Willi2011-01-281-1/+8
* Revert "Send INITIAL_CONTACT even if we have a unique policy"Martin Willi2011-01-131-1/+2
* Force port update as responder when initiator switches to 4500 in IKE_AUTHMartin Willi2011-01-123-5/+6
* Avoid variable name overloadingMartin Willi2011-01-121-7/+11
* Send INITIAL_CONTACT even if we have a unique policyMartin Willi2011-01-101-2/+1
* Fix nonce comparison in rekey collisions, lowest nonce losesMartin Willi2011-01-072-7/+7
* Destroy existing IKE_SAs with same identities when receiving INITIAL_CONTACTMartin Willi2011-01-053-4/+33
* Send INITIAL_CONTACT for the first IKE_SA if it has a unique policyMartin Willi2011-01-053-16/+66
* Migrated ike_sa_manager_t to INIT/METHOD macros, some cleanupsMartin Willi2011-01-051-189/+180
* Provide CRLs received in CERT payloads to trustchain verificationMartin Willi2011-01-051-1/+9
* Include the used reserved bytes from ID payloads in AUTH calculationMartin Willi2011-01-0511-39/+126
* Migrated psk/pubkey_authenticators to INIT/METHOD macrosMartin Willi2011-01-052-84/+70
* Moved check if packet already encoded to ike_sa, avoids message() hook invoca...Martin Willi2011-01-051-0/+5
* Move critical bit checking to ike_sa, notify payload includes unsupported pay...Martin Willi2011-01-053-11/+61
* Handle all error notifies in CREATE_CHILD_SA exchangesMartin Willi2011-01-051-0/+14
* Ingore messages with exchange type altered to UNDEFINED in message() hookMartin Willi2011-01-051-0/+8
* Moved message()-hook invocation to generate_message(), catch pre-generated IK...Martin Willi2011-01-052-2/+1
* Support manually triggerd DPD check, even if DPD disabled in configMartin Willi2011-01-051-11/+10
* eliminated whitespaceAndreas Steffen2010-12-211-1/+1
* Migrated child_create_t to INIT/METHOD macrosAndreas Steffen2010-12-211-83/+55
* Do not use TFC padding if peer does not support ESPv3Martin Willi2010-12-203-11/+31
* Added a TFC padding option to child_cfgMartin Willi2010-12-201-0/+2
* Implemented Traffic Flow Confidentiality padding in kernel_interfaceMartin Willi2010-12-201-1/+2
* Install selectors on transport mode IPsec SAs.Jiri Bohac2010-12-131-1/+1
* Never register IKE_SA during checkout_new, as rekeying keeps it checked outMartin Willi2010-12-072-18/+2
* Guarantee entry->other is set when calling put_connected_peersThomas Egerer2010-12-061-1/+7
* Do not checkin a previously destroyed SAThomas Egerer2010-11-161-1/+4
* Extend connected peers by peer familyThomas Egerer2010-11-121-5/+16
* Do not add additional addresses to MOBIKE path probing messages.Tobias Brunner2010-10-121-10/+12
* Change behavior of responder during roaming.Tobias Brunner2010-10-121-16/+17