aboutsummaryrefslogtreecommitdiffstats
path: root/src/libcharon
Commit message (Collapse)AuthorAgeFilesLines
...
* Use a bool return value in keymat_v1_t.get_hash_phase2()Martin Willi2012-07-163-31/+29
|
* Add a return value to keymat_v1_t.get_hash()Martin Willi2012-07-164-17/+35
|
* Add a return value to keymat_v2_t.get_auth_octets()Martin Willi2012-07-163-17/+24
|
* Add a return value to keymat_v2_t.get_psk_sig()Martin Willi2012-07-164-24/+39
|
* Add a return value to prf_t.get_bytes()Martin Willi2012-07-161-9/+19
|
* prf_plus_create() can return NULL on failureMartin Willi2012-07-162-0/+20
|
* Add a return value to prf_plus_t.allocate_bytes()Martin Willi2012-07-162-17/+76
|
* Add a return value to signer_t.set_key()Martin Willi2012-07-162-5/+16
|
* Add a return value to simaka_crypto_t.derive_keys_*()Martin Willi2012-07-164-27/+59
|
* Add a return value to radius_message_t.sign()Martin Willi2012-07-162-11/+17
|
* Add a return value to simaka_message_t.generate()Martin Willi2012-07-164-85/+257
|
* Add a return value to aead_t.set_key()Martin Willi2012-07-162-3/+12
|
* Add a return value to aead_t.encrypt()Martin Willi2012-07-162-3/+12
|
* Don't modify the message string passed to logger, as it gets reusedMartin Willi2012-07-137-35/+40
|
* Log to a malloc()ed buffer if the on-stack buffer is not large enoughMartin Willi2012-07-131-3/+23
|
* Pass opaque data to printf hooks and print_in_hook()Martin Willi2012-07-132-15/+15
|
* Simplify NAT-D payload creation if UDP encapsulation is forcedTobias Brunner2012-07-131-2/+2
| | | | | We don't need any address lookups in that case as the content of the payload is generated randomly anyway.
* updated Copyright infoAndreas Steffen2012-07-136-6/+6
|
* restrict PA-TNC messages to maximum sizeAndreas Steffen2012-07-124-12/+43
|
* Avoid that any % characters (e.g. in %any) are evaluated when logging via strokeTobias Brunner2012-07-121-1/+1
|
* removed unused variablesAndreas Steffen2012-07-111-2/+0
|
* fixed logging of unsupported TNCCS versionAndreas Steffen2012-07-111-1/+1
|
* PB-TNC Client sends empty CLOSE batch only in DECIDED stateAndreas Steffen2012-07-111-10/+23
|
* have_recommendation() accepts NULL argumentsAndreas Steffen2012-07-111-4/+12
|
* send empty SDATA batch if no recommendation is available yet, but in order ↵Andreas Steffen2012-07-114-3/+58
| | | | to avoid loops only if no empty CDATA batch was received
* moved batch size calculation into pb_tnc_batch_tAndreas Steffen2012-07-114-31/+50
|
* make maximum PB-TNC batch size configurableAndreas Steffen2012-07-111-2/+11
|
* limit the size of a PB-TNC batch to the maximum EAP-TNC packet sizeAndreas Steffen2012-07-1110-88/+134
|
* eliminate message length field in EAP-TNCAndreas Steffen2012-07-112-2/+2
|
* due to single fragment, total length does not have to be includedAndreas Steffen2012-07-111-3/+1
|
* EAP-TNC does not support fragmentationAndreas Steffen2012-07-111-12/+14
|
* Send cert request based on peers configured authentication classMartin Willi2012-07-101-3/+30
|
* Don't send CERTREQs when initiating aggressive mode PSKMartin Willi2012-07-091-0/+4
|
* Refactored heavily #ifdefd capability code to its own libstrongswan classMartin Willi2012-07-0410-123/+19
|
* Use spin locks to update IKE_SAs in controller_tTobias Brunner2012-07-041-4/+38
| | | | | | This ensures the listeners don't miss any events after the SAs have been checked out in the asynchronously executed jobs. This is a matter of memory visibility and not primary a matter of exclusive access.
* Fixed job handling in controller_tTobias Brunner2012-07-041-110/+128
| | | | Also IKE_SAs are now checked out in the jobs and not before.
* As a responder, don't start a TRANSACTION request if we expect one from the ↵Martin Willi2012-06-292-2/+4
| | | | initiator
* IMCs and IMVs might depend on X.509 certificates or trusted public keysAndreas Steffen2012-06-282-0/+4
|
* Show some uname() info in "ipsec statusall"Martin Willi2012-06-281-3/+10
|
* libcharon also requires kernel interfaces and a socket implementationTobias Brunner2012-06-271-0/+3
|
* Defer quick mode initiation if we expect a mode config requestMartin Willi2012-06-271-1/+20
|
* Queue a mode config task as responder if we need a virtual IPMartin Willi2012-06-272-4/+16
|
* Add basic support for XAuth responder authenticationMartin Willi2012-06-272-8/+10
|
* Map XAuth responder authentication methods between IKEv1 and IKEv2Martin Willi2012-06-271-1/+13
|
* Show remote EAP/XAuth identity in "statusall" on a separate lineMartin Willi2012-06-271-1/+12
|
* Use static plugin features in libcharon to define essential dependenciesTobias Brunner2012-06-271-1/+10
|
* Ignore a received %any virtual IP for installationMartin Willi2012-06-261-1/+2
|
* Also build charon's IKEv1 implementation on AndroidTobias Brunner2012-06-261-0/+23
|
* Missing source file added to libcharon's Android.mkTobias Brunner2012-06-261-0/+1
|
* Make rescheduling a job more predictableTobias Brunner2012-06-252-12/+5
| | | | | | | | | | | | | This avoids race conditions between calls to cancel() and jobs that like to be rescheduled. If jobs were able to reschedule themselves it would theoretically be possible that two worker threads have the same job assigned (the one currently executing the job and the one executing the same but rescheduled job if it already is time to execute it), this means that cancel() could be called twice for that job. Creating a new job based on the current one and reschedule that is also OK, but rescheduling itself is more efficient for jobs that need to be executed often.