Commit message (Collapse) | Author | Age | Files | Lines | |
---|---|---|---|---|---|
* | auth-cfg: Fix crash after several reauthentications with multiple ↵ | Tobias Brunner | 2014-09-11 | 1 | -1/+1 |
| | | | | | | | | | | authentication rounds Due to the issue described in c641974, purge() inadvertently destroyed CA certificates that should have been kept (while the pointer to these objects remained in the array). This lead to incorrect reference counts and after a few reauthentications with multiple authentication rounds, which cause calls to purge(TRUE), to crashes. | ||||
* | credmgr: Fix copy and paste error in add_validator | Thomas Egerer | 2014-08-29 | 1 | -1/+1 |
| | | | | | | | | | This won't hurt as long as sets and validators are of the same class. But as soon as one of the object's class is changed this will cause either a compile error (best option), or result (most likely) in a crash. Signed-off-by: Thomas Egerer <thomas.egerer@secunet.com> | ||||
* | windows: Provide a sched_yield() implementation | Martin Willi | 2014-06-04 | 1 | -1/+0 |
| | |||||
* | crl: Undefine <wincrypt.h>'s CRL_REASON_* and use our enum values instead | Martin Willi | 2014-06-03 | 1 | -8/+20 |
| | |||||
* | auth-cfg: Cast literal default value to pointer type | Martin Willi | 2014-05-16 | 1 | -1/+1 |
| | | | | Fixes a clang warning. | ||||
* | mem-cred: Replace existing equal shared keys during add_shared() | Martin Willi | 2014-05-07 | 1 | -3/+56 |
| | |||||
* | mem-cred: Replace existing equal private keys during add_key() | Martin Willi | 2014-05-07 | 1 | -0/+17 |
| | |||||
* | Added PUBKEY_RSA_MODULUS encoding type | Andreas Steffen | 2014-05-02 | 1 | -0/+2 |
| | |||||
* | Added support for msSmartcardLogon EKU | Andreas Steffen | 2014-04-08 | 1 | -10/+12 |
| | |||||
* | Properly hash pointers for hash tables where appropriate | Tobias Brunner | 2014-03-31 | 1 | -17/+2 |
| | | | | | Simply using the pointer is not optimal for our hash table implementation, which simply masks the key to determine the bucket. | ||||
* | auth-cfg: Declare an attribute certificate helper type to exchange acerts | Martin Willi | 2014-03-31 | 3 | -2/+15 |
| | |||||
* | x509: Replace the comma separated string AC group builder with a list based one | Martin Willi | 2014-03-31 | 2 | -4/+3 |
| | |||||
* | x509: Integrate IETF attribute handling, and obsolete ietf_attributes_t | Martin Willi | 2014-03-31 | 3 | -627/+0 |
| | | | | | The ietf_attributes_t class is used for attribute certificates only these days, and integrating them to x509_ac_t simplifies things significantly. | ||||
* | x509: Replace fixed acert group string getter by a more dynamic group enumerator | Martin Willi | 2014-03-31 | 3 | -50/+60 |
| | |||||
* | ac: Remove unimplemented equals_holder() method from ac_t | Martin Willi | 2014-03-31 | 1 | -8/+0 |
| | |||||
* | lib: All settings use configured namespace | Tobias Brunner | 2014-02-12 | 1 | -1/+1 |
| | |||||
* | pki: Replace BUILD_FROM_FD with passing a chunk via BUILD_BLOB | Tobias Brunner | 2013-10-23 | 2 | -3/+0 |
| | | | | This allows more than one builder to try parsing the data read from STDIN. | ||||
* | sshkey: Add encoder for RSA keys | Tobias Brunner | 2013-09-13 | 1 | -0/+2 |
| | |||||
* | Fix various API doc issues and typos | Tobias Brunner | 2013-07-18 | 1 | -1/+1 |
| | | | | Partially based on an old patch by Adrian-Ken Rueegsegger. | ||||
* | credmgr: introduce a hook function to catch trust chain validation errors | Martin Willi | 2013-07-18 | 3 | -6/+96 |
| | |||||
* | credmgr: stop querying for secrets once we get a perfect match | Martin Willi | 2013-07-18 | 1 | -0/+4 |
| | |||||
* | credmgr: don't use pointers for id_match_t enum values | Martin Willi | 2013-07-18 | 1 | -2/+2 |
| | |||||
* | auth-cfg: use array instead of linked list | Martin Willi | 2013-07-17 | 1 | -35/+26 |
| | | | | Saves another 4 linked lists (1KB) per IKE_SA | ||||
* | Remove pluto specific certificate types | Tobias Brunner | 2013-05-08 | 2 | -8/+1 |
| | |||||
* | Add pkcs12 plugin which adds support for decoding PKCS#12 containers | Tobias Brunner | 2013-05-08 | 3 | -1/+31 |
| | |||||
* | Add support for PKCS#7/CMS encrypted-data | Tobias Brunner | 2013-05-08 | 2 | -5/+11 |
| | |||||
* | Move PKCS#12 key derivation to a separate file | Tobias Brunner | 2013-05-08 | 2 | -0/+224 |
| | |||||
* | sshkey: Added builder for SSHKEY RSA keys | Tobias Brunner | 2013-05-07 | 2 | -0/+3 |
| | |||||
* | Add a method to replace all secrets in a mem_cred_t object | Tobias Brunner | 2013-03-20 | 2 | -5/+68 |
| | |||||
* | Merge branch 'multi-cert' | Martin Willi | 2013-03-01 | 2 | -12/+77 |
|\ | | | | | | | | | Allows the configuration of multiple certificates in leftcert, and select the correct certificate to use based on the received certificate requests. | ||||
| * | After merging the used trustchain with config, move used certificate to front | Martin Willi | 2013-01-18 | 1 | -0/+24 |
| | | |||||
| * | Try to build a trustchain for all configured certificates before enforcing one | Martin Willi | 2013-01-18 | 1 | -1/+29 |
| | | | | | | | | | | This enables the daemon to select from multiple configured certificates by building trustchains against the received certificate requests. | ||||
| * | Make AUTH_RULE_SUBJECT cert multi-valued | Martin Willi | 2013-01-18 | 1 | -11/+24 |
| | | | | | | | | | | Constraints having multiple subject certs defined are fulfilled if authentication used one of the listed certificates. | ||||
* | | Merge branch 'systime' | Martin Willi | 2013-03-01 | 2 | -10/+69 |
|\ \ | | | | | | | | | | | | | | | | Add a systime-fix plugin allowing an embedded system to validate certificates if the system time has not been synchronized after boot. Certificates of established tunnels can be re-validated after the system time gets valid. | ||||
| * | | Add a cert_validator hook allowing plugins to provide custom lifetime checking | Martin Willi | 2013-02-19 | 2 | -10/+64 |
| | | | |||||
| * | | Make cert_validator_t.validate optional to implement | Martin Willi | 2013-02-19 | 2 | -0/+5 |
| |/ | |||||
* | | Fix auth_cfg_t.clone() for single-valued auth rules | Tobias Brunner | 2013-02-28 | 1 | -10/+11 |
| | | | | | | | | | | | | | | | | | | | | By using the default list enumerator and adding the rules with the public add() method, clones of auth_cfg_t objects would return the values for single-valued auth rules in the wrong order (i.e. the oldest instead of the newest value was returned). Using the internal enumerator (which the comment already suggested) fixes this, but the clone will not be a full clone as it does not contain any old values for single-valued auth rules. Since these will never be used anyway, this should be fine. | ||||
* | | Encode RSA public keys in RFC 3110 DNSKEY format | Andreas Steffen | 2013-02-19 | 1 | -0/+2 |
|/ | |||||
* | Fix doxygen grouping regarding containers and PKCS#7 | Martin Willi | 2012-12-19 | 1 | -4/+4 |
| | |||||
* | Allocate data returned by pkcs7_t.get_attribute() | Martin Willi | 2012-12-19 | 1 | -1/+4 |
| | |||||
* | Fix enum names for container_type_t | Martin Willi | 2012-12-19 | 1 | -1/+1 |
| | |||||
* | Add an enumerator for PKCS#7 contained certificates | Martin Willi | 2012-12-19 | 1 | -0/+7 |
| | |||||
* | Add a getter for signed PKCS#7 attributes | Martin Willi | 2012-12-19 | 1 | -0/+14 |
| | |||||
* | Add builder parts to generate PKCS#7 containers | Martin Willi | 2012-12-19 | 2 | -1/+10 |
| | |||||
* | Add a generic interface for crypto containers and a more specific PKCS#7 ↵ | Martin Willi | 2012-12-19 | 5 | -5/+176 |
| | | | | interface | ||||
* | allow the optional sharing if RSA private keys | Andreas Steffen | 2012-11-22 | 2 | -0/+6 |
| | |||||
* | implemented generation of safe primes | Andreas Steffen | 2012-11-18 | 2 | -0/+3 |
| | |||||
* | Moved debug.[ch] to utils folder | Tobias Brunner | 2012-10-24 | 6 | -6/+6 |
| | |||||
* | Moved data structures to new collections subfolder | Tobias Brunner | 2012-10-24 | 13 | -14/+14 |
| | |||||
* | Fix equality comparison of auth_cfg_t | Tobias Brunner | 2012-09-18 | 1 | -2/+16 |
| | | | | | | | We previously only confirmed that rules contained in the first config are also contained in the second, but since the number of rules does not have to be equal, it might be that the second config contains rules that the first one doesn't. |