aboutsummaryrefslogtreecommitdiffstats
path: root/src/libcharon
Commit message (Collapse)AuthorAgeFilesLines
...
* Check rng return value when generating SPIs in ike_sa_manager_tTobias Brunner2012-07-161-35/+67
|
* Nonce: Let get_nonce, allocate_nonce return booleanReto Buerki2012-07-164-5/+31
|
* Add a return value to prf_t.set_key()Martin Willi2012-07-162-23/+41
|
* Add a return value to prf_t.allocate_bytes()Martin Willi2012-07-162-22/+71
|
* Use a bool return value in keymat_v1_t.get_hash_phase2()Martin Willi2012-07-163-31/+29
|
* Add a return value to keymat_v1_t.get_hash()Martin Willi2012-07-164-17/+35
|
* Add a return value to keymat_v2_t.get_auth_octets()Martin Willi2012-07-163-17/+24
|
* Add a return value to keymat_v2_t.get_psk_sig()Martin Willi2012-07-164-24/+39
|
* Add a return value to prf_t.get_bytes()Martin Willi2012-07-161-9/+19
|
* prf_plus_create() can return NULL on failureMartin Willi2012-07-162-0/+20
|
* Add a return value to prf_plus_t.allocate_bytes()Martin Willi2012-07-162-17/+76
|
* Add a return value to signer_t.set_key()Martin Willi2012-07-162-5/+16
|
* Add a return value to simaka_crypto_t.derive_keys_*()Martin Willi2012-07-164-27/+59
|
* Add a return value to radius_message_t.sign()Martin Willi2012-07-162-11/+17
|
* Add a return value to simaka_message_t.generate()Martin Willi2012-07-164-85/+257
|
* Add a return value to aead_t.set_key()Martin Willi2012-07-162-3/+12
|
* Add a return value to aead_t.encrypt()Martin Willi2012-07-162-3/+12
|
* Don't modify the message string passed to logger, as it gets reusedMartin Willi2012-07-137-35/+40
|
* Log to a malloc()ed buffer if the on-stack buffer is not large enoughMartin Willi2012-07-131-3/+23
|
* Pass opaque data to printf hooks and print_in_hook()Martin Willi2012-07-132-15/+15
|
* Simplify NAT-D payload creation if UDP encapsulation is forcedTobias Brunner2012-07-131-2/+2
| | | | | We don't need any address lookups in that case as the content of the payload is generated randomly anyway.
* updated Copyright infoAndreas Steffen2012-07-136-6/+6
|
* restrict PA-TNC messages to maximum sizeAndreas Steffen2012-07-124-12/+43
|
* Avoid that any % characters (e.g. in %any) are evaluated when logging via strokeTobias Brunner2012-07-121-1/+1
|
* removed unused variablesAndreas Steffen2012-07-111-2/+0
|
* fixed logging of unsupported TNCCS versionAndreas Steffen2012-07-111-1/+1
|
* PB-TNC Client sends empty CLOSE batch only in DECIDED stateAndreas Steffen2012-07-111-10/+23
|
* have_recommendation() accepts NULL argumentsAndreas Steffen2012-07-111-4/+12
|
* send empty SDATA batch if no recommendation is available yet, but in order ↵Andreas Steffen2012-07-114-3/+58
| | | | to avoid loops only if no empty CDATA batch was received
* moved batch size calculation into pb_tnc_batch_tAndreas Steffen2012-07-114-31/+50
|
* make maximum PB-TNC batch size configurableAndreas Steffen2012-07-111-2/+11
|
* limit the size of a PB-TNC batch to the maximum EAP-TNC packet sizeAndreas Steffen2012-07-1110-88/+134
|
* eliminate message length field in EAP-TNCAndreas Steffen2012-07-112-2/+2
|
* due to single fragment, total length does not have to be includedAndreas Steffen2012-07-111-3/+1
|
* EAP-TNC does not support fragmentationAndreas Steffen2012-07-111-12/+14
|
* Send cert request based on peers configured authentication classMartin Willi2012-07-101-3/+30
|
* Don't send CERTREQs when initiating aggressive mode PSKMartin Willi2012-07-091-0/+4
|
* Refactored heavily #ifdefd capability code to its own libstrongswan classMartin Willi2012-07-0410-123/+19
|
* Use spin locks to update IKE_SAs in controller_tTobias Brunner2012-07-041-4/+38
| | | | | | This ensures the listeners don't miss any events after the SAs have been checked out in the asynchronously executed jobs. This is a matter of memory visibility and not primary a matter of exclusive access.
* Fixed job handling in controller_tTobias Brunner2012-07-041-110/+128
| | | | Also IKE_SAs are now checked out in the jobs and not before.
* As a responder, don't start a TRANSACTION request if we expect one from the ↵Martin Willi2012-06-292-2/+4
| | | | initiator
* IMCs and IMVs might depend on X.509 certificates or trusted public keysAndreas Steffen2012-06-282-0/+4
|
* Show some uname() info in "ipsec statusall"Martin Willi2012-06-281-3/+10
|
* libcharon also requires kernel interfaces and a socket implementationTobias Brunner2012-06-271-0/+3
|
* Defer quick mode initiation if we expect a mode config requestMartin Willi2012-06-271-1/+20
|
* Queue a mode config task as responder if we need a virtual IPMartin Willi2012-06-272-4/+16
|
* Add basic support for XAuth responder authenticationMartin Willi2012-06-272-8/+10
|
* Map XAuth responder authentication methods between IKEv1 and IKEv2Martin Willi2012-06-271-1/+13
|
* Show remote EAP/XAuth identity in "statusall" on a separate lineMartin Willi2012-06-271-1/+12
|
* Use static plugin features in libcharon to define essential dependenciesTobias Brunner2012-06-271-1/+10
|