aboutsummaryrefslogtreecommitdiffstats
path: root/src/libcharon
Commit message (Collapse)AuthorAgeFilesLines
...
* Check rng return value when generating RAND in eap-aka-3gpp2 pluginTobias Brunner2012-07-161-2/+2
|
* Check rng return value when generating challenges in eap-md5 and mschapv2 ↵Tobias Brunner2012-07-162-12/+12
| | | | plugins
* Check rng return value when generating Transaction IDs in DHCP pluginTobias Brunner2012-07-161-1/+5
|
* Check rng return value when generating ME CONNECT_ID and KEYTobias Brunner2012-07-161-2/+14
|
* Check rng return value when generating IKEv1 message IDsTobias Brunner2012-07-161-8/+20
|
* Check rng return value when generating COOKIE2 during MOBIKETobias Brunner2012-07-161-6/+11
|
* Check rng return value when generating COOKIE secret in receiverTobias Brunner2012-07-161-8/+22
|
* Check rng return value when generating fake NAT detection payloadsTobias Brunner2012-07-162-4/+5
|
* Check rng return value when encrypting encryption payloadTobias Brunner2012-07-161-2/+8
|
* Check rng return value when generating SPIs in ike_sa_manager_tTobias Brunner2012-07-161-35/+67
|
* Nonce: Let get_nonce, allocate_nonce return booleanReto Buerki2012-07-164-5/+31
|
* Add a return value to prf_t.set_key()Martin Willi2012-07-162-23/+41
|
* Add a return value to prf_t.allocate_bytes()Martin Willi2012-07-162-22/+71
|
* Use a bool return value in keymat_v1_t.get_hash_phase2()Martin Willi2012-07-163-31/+29
|
* Add a return value to keymat_v1_t.get_hash()Martin Willi2012-07-164-17/+35
|
* Add a return value to keymat_v2_t.get_auth_octets()Martin Willi2012-07-163-17/+24
|
* Add a return value to keymat_v2_t.get_psk_sig()Martin Willi2012-07-164-24/+39
|
* Add a return value to prf_t.get_bytes()Martin Willi2012-07-161-9/+19
|
* prf_plus_create() can return NULL on failureMartin Willi2012-07-162-0/+20
|
* Add a return value to prf_plus_t.allocate_bytes()Martin Willi2012-07-162-17/+76
|
* Add a return value to signer_t.set_key()Martin Willi2012-07-162-5/+16
|
* Add a return value to simaka_crypto_t.derive_keys_*()Martin Willi2012-07-164-27/+59
|
* Add a return value to radius_message_t.sign()Martin Willi2012-07-162-11/+17
|
* Add a return value to simaka_message_t.generate()Martin Willi2012-07-164-85/+257
|
* Add a return value to aead_t.set_key()Martin Willi2012-07-162-3/+12
|
* Add a return value to aead_t.encrypt()Martin Willi2012-07-162-3/+12
|
* Don't modify the message string passed to logger, as it gets reusedMartin Willi2012-07-137-35/+40
|
* Log to a malloc()ed buffer if the on-stack buffer is not large enoughMartin Willi2012-07-131-3/+23
|
* Pass opaque data to printf hooks and print_in_hook()Martin Willi2012-07-132-15/+15
|
* Simplify NAT-D payload creation if UDP encapsulation is forcedTobias Brunner2012-07-131-2/+2
| | | | | We don't need any address lookups in that case as the content of the payload is generated randomly anyway.
* updated Copyright infoAndreas Steffen2012-07-136-6/+6
|
* restrict PA-TNC messages to maximum sizeAndreas Steffen2012-07-124-12/+43
|
* Avoid that any % characters (e.g. in %any) are evaluated when logging via strokeTobias Brunner2012-07-121-1/+1
|
* removed unused variablesAndreas Steffen2012-07-111-2/+0
|
* fixed logging of unsupported TNCCS versionAndreas Steffen2012-07-111-1/+1
|
* PB-TNC Client sends empty CLOSE batch only in DECIDED stateAndreas Steffen2012-07-111-10/+23
|
* have_recommendation() accepts NULL argumentsAndreas Steffen2012-07-111-4/+12
|
* send empty SDATA batch if no recommendation is available yet, but in order ↵Andreas Steffen2012-07-114-3/+58
| | | | to avoid loops only if no empty CDATA batch was received
* moved batch size calculation into pb_tnc_batch_tAndreas Steffen2012-07-114-31/+50
|
* make maximum PB-TNC batch size configurableAndreas Steffen2012-07-111-2/+11
|
* limit the size of a PB-TNC batch to the maximum EAP-TNC packet sizeAndreas Steffen2012-07-1110-88/+134
|
* eliminate message length field in EAP-TNCAndreas Steffen2012-07-112-2/+2
|
* due to single fragment, total length does not have to be includedAndreas Steffen2012-07-111-3/+1
|
* EAP-TNC does not support fragmentationAndreas Steffen2012-07-111-12/+14
|
* Send cert request based on peers configured authentication classMartin Willi2012-07-101-3/+30
|
* Don't send CERTREQs when initiating aggressive mode PSKMartin Willi2012-07-091-0/+4
|
* Refactored heavily #ifdefd capability code to its own libstrongswan classMartin Willi2012-07-0410-123/+19
|
* Use spin locks to update IKE_SAs in controller_tTobias Brunner2012-07-041-4/+38
| | | | | | This ensures the listeners don't miss any events after the SAs have been checked out in the asynchronously executed jobs. This is a matter of memory visibility and not primary a matter of exclusive access.
* Fixed job handling in controller_tTobias Brunner2012-07-041-110/+128
| | | | Also IKE_SAs are now checked out in the jobs and not before.
* As a responder, don't start a TRANSACTION request if we expect one from the ↵Martin Willi2012-06-292-2/+4
| | | | initiator