Commit message (Collapse) | Author | Age | Files | Lines | ||
---|---|---|---|---|---|---|
... | ||||||
* | auth-cfg: Don't enforce EAP_RADIUS | Tobias Brunner | 2015-08-21 | 1 | -1/+2 | |
| | | | | | Basically the same as e79b0e07e4ab. EAP_RADIUS is also a virtual method that will identify itself as a different EAP method later. | |||||
* | mem-cred: We don't need a write lock when looking for a certificate | Tobias Brunner | 2015-08-20 | 1 | -1/+1 | |
| | ||||||
* | mem-cred: Add a method to atomically replace all certificates | Tobias Brunner | 2015-08-20 | 2 | -10/+58 | |
| | ||||||
* | auth-cfg: Don't enforce EAP_DYNAMIC | Tobias Brunner | 2015-08-20 | 1 | -1/+2 | |
| | | | | | We now store the actual method on the auth config, which won't match anymore if rightauth=eap-dynamic is configured. | |||||
* | auth-cfg: Matching one CA should be enough, similar to peer certificates | Tobias Brunner | 2015-08-17 | 1 | -15/+20 | |
| | | | | | | | | | | Not sure if defining multiple CA constraints and enforcing _all_ of them, i.e. the previous behavior, makes even sense. To ensure a very specific chain it should be enough to define the last intermediate CA. On the other hand, the ability to define multiple CAs could simplify configuration. This can currently only be used with swanctl/VICI based configs as `rightca` only takes a single DN. | |||||
* | Fixed some typos | Tobias Brunner | 2015-08-13 | 2 | -2/+2 | |
| | ||||||
* | credential-manager: Store BLISS key strength in auth config | Tobias Brunner | 2015-03-04 | 1 | -0/+3 | |
| | ||||||
* | auth-cfg: Add BLISS key strength constraint | Tobias Brunner | 2015-03-04 | 2 | -21/+43 | |
| | ||||||
* | public-key: Add helper to determine acceptable signature schemes for keys | Tobias Brunner | 2015-03-04 | 2 | -0/+78 | |
| | ||||||
* | public-key: Add helper to map signature schemes to ASN.1 OIDs | Tobias Brunner | 2015-03-04 | 2 | -3/+54 | |
| | | | | | | There is a similar function to map key_type_t and hasher_t to an OID, but this maps schemes directly (and to use the other function we'd have to have a function to map schemes to hash algorithms first). | |||||
* | public-key: Add helper to determine key type from signature scheme | Tobias Brunner | 2015-03-04 | 2 | -0/+43 | |
| | ||||||
* | mem-cred: Add a method to unify certificate references, without adding it | Martin Willi | 2015-03-03 | 2 | -0/+31 | |
| | | | | | In contrast to add_cert_ref(), get_cert_ref() does not add the certificate to the set, but only finds a reference to the same certificate, if found. | |||||
* | Allow SHA256 and SHA384 data hash for BLISS signatures. | Andreas Steffen | 2015-02-26 | 2 | -0/+10 | |
| | | | | | The default is SHA512 since this hash function is also used for the c_indices random oracle. | |||||
* | Started implementing BLISS signature generation | Andreas Steffen | 2014-11-29 | 2 | -7/+7 | |
| | ||||||
* | Store and parse BLISS private and public keys in DER and PEM format | Andreas Steffen | 2014-11-29 | 1 | -0/+4 | |
| | | | | | | | | Additionally generate SHA-1 fingerprints of raw BLISS subjectPublicKey and subjectPublicKeyInfo objects. Some basic functions used by the bliss_public_key class are shared with the bliss_private_key class. | |||||
* | Created framework for BLISS post-quantum signature algorithm | Andreas Steffen | 2014-11-29 | 2 | -5/+16 | |
| | ||||||
* | cert-cache: Prevent that a cached issuer is freed too early | Tobias Brunner | 2014-10-24 | 1 | -7/+10 | |
| | | | | | | | | Previously we got no reference to the cached issuer certificate before releasing the lock of the cache line, this allowed other threads, or even the same thread if it replaces a cache line, to destroy that issuer certificate in cache() (or flush()) before get_ref() for the issuer certificate is finally called. | |||||
* | auth-cfg: Fix crash after several reauthentications with multiple ↵ | Tobias Brunner | 2014-09-11 | 1 | -1/+1 | |
| | | | | | | | | | | authentication rounds Due to the issue described in c641974, purge() inadvertently destroyed CA certificates that should have been kept (while the pointer to these objects remained in the array). This lead to incorrect reference counts and after a few reauthentications with multiple authentication rounds, which cause calls to purge(TRUE), to crashes. | |||||
* | credmgr: Fix copy and paste error in add_validator | Thomas Egerer | 2014-08-29 | 1 | -1/+1 | |
| | | | | | | | | | This won't hurt as long as sets and validators are of the same class. But as soon as one of the object's class is changed this will cause either a compile error (best option), or result (most likely) in a crash. Signed-off-by: Thomas Egerer <thomas.egerer@secunet.com> | |||||
* | windows: Provide a sched_yield() implementation | Martin Willi | 2014-06-04 | 1 | -1/+0 | |
| | ||||||
* | crl: Undefine <wincrypt.h>'s CRL_REASON_* and use our enum values instead | Martin Willi | 2014-06-03 | 1 | -8/+20 | |
| | ||||||
* | auth-cfg: Cast literal default value to pointer type | Martin Willi | 2014-05-16 | 1 | -1/+1 | |
| | | | | Fixes a clang warning. | |||||
* | mem-cred: Replace existing equal shared keys during add_shared() | Martin Willi | 2014-05-07 | 1 | -3/+56 | |
| | ||||||
* | mem-cred: Replace existing equal private keys during add_key() | Martin Willi | 2014-05-07 | 1 | -0/+17 | |
| | ||||||
* | Added PUBKEY_RSA_MODULUS encoding type | Andreas Steffen | 2014-05-02 | 1 | -0/+2 | |
| | ||||||
* | Added support for msSmartcardLogon EKU | Andreas Steffen | 2014-04-08 | 1 | -10/+12 | |
| | ||||||
* | Properly hash pointers for hash tables where appropriate | Tobias Brunner | 2014-03-31 | 1 | -17/+2 | |
| | | | | | Simply using the pointer is not optimal for our hash table implementation, which simply masks the key to determine the bucket. | |||||
* | auth-cfg: Declare an attribute certificate helper type to exchange acerts | Martin Willi | 2014-03-31 | 3 | -2/+15 | |
| | ||||||
* | x509: Replace the comma separated string AC group builder with a list based one | Martin Willi | 2014-03-31 | 2 | -4/+3 | |
| | ||||||
* | x509: Integrate IETF attribute handling, and obsolete ietf_attributes_t | Martin Willi | 2014-03-31 | 3 | -627/+0 | |
| | | | | | The ietf_attributes_t class is used for attribute certificates only these days, and integrating them to x509_ac_t simplifies things significantly. | |||||
* | x509: Replace fixed acert group string getter by a more dynamic group enumerator | Martin Willi | 2014-03-31 | 3 | -50/+60 | |
| | ||||||
* | ac: Remove unimplemented equals_holder() method from ac_t | Martin Willi | 2014-03-31 | 1 | -8/+0 | |
| | ||||||
* | lib: All settings use configured namespace | Tobias Brunner | 2014-02-12 | 1 | -1/+1 | |
| | ||||||
* | pki: Replace BUILD_FROM_FD with passing a chunk via BUILD_BLOB | Tobias Brunner | 2013-10-23 | 2 | -3/+0 | |
| | | | | This allows more than one builder to try parsing the data read from STDIN. | |||||
* | sshkey: Add encoder for RSA keys | Tobias Brunner | 2013-09-13 | 1 | -0/+2 | |
| | ||||||
* | Fix various API doc issues and typos | Tobias Brunner | 2013-07-18 | 1 | -1/+1 | |
| | | | | Partially based on an old patch by Adrian-Ken Rueegsegger. | |||||
* | credmgr: introduce a hook function to catch trust chain validation errors | Martin Willi | 2013-07-18 | 3 | -6/+96 | |
| | ||||||
* | credmgr: stop querying for secrets once we get a perfect match | Martin Willi | 2013-07-18 | 1 | -0/+4 | |
| | ||||||
* | credmgr: don't use pointers for id_match_t enum values | Martin Willi | 2013-07-18 | 1 | -2/+2 | |
| | ||||||
* | auth-cfg: use array instead of linked list | Martin Willi | 2013-07-17 | 1 | -35/+26 | |
| | | | | Saves another 4 linked lists (1KB) per IKE_SA | |||||
* | Remove pluto specific certificate types | Tobias Brunner | 2013-05-08 | 2 | -8/+1 | |
| | ||||||
* | Add pkcs12 plugin which adds support for decoding PKCS#12 containers | Tobias Brunner | 2013-05-08 | 3 | -1/+31 | |
| | ||||||
* | Add support for PKCS#7/CMS encrypted-data | Tobias Brunner | 2013-05-08 | 2 | -5/+11 | |
| | ||||||
* | Move PKCS#12 key derivation to a separate file | Tobias Brunner | 2013-05-08 | 2 | -0/+224 | |
| | ||||||
* | sshkey: Added builder for SSHKEY RSA keys | Tobias Brunner | 2013-05-07 | 2 | -0/+3 | |
| | ||||||
* | Add a method to replace all secrets in a mem_cred_t object | Tobias Brunner | 2013-03-20 | 2 | -5/+68 | |
| | ||||||
* | Merge branch 'multi-cert' | Martin Willi | 2013-03-01 | 2 | -12/+77 | |
|\ | | | | | | | | | Allows the configuration of multiple certificates in leftcert, and select the correct certificate to use based on the received certificate requests. | |||||
| * | After merging the used trustchain with config, move used certificate to front | Martin Willi | 2013-01-18 | 1 | -0/+24 | |
| | | ||||||
| * | Try to build a trustchain for all configured certificates before enforcing one | Martin Willi | 2013-01-18 | 1 | -1/+29 | |
| | | | | | | | | | | This enables the daemon to select from multiple configured certificates by building trustchains against the received certificate requests. | |||||
| * | Make AUTH_RULE_SUBJECT cert multi-valued | Martin Willi | 2013-01-18 | 1 | -11/+24 | |
| | | | | | | | | | | Constraints having multiple subject certs defined are fulfilled if authentication used one of the listed certificates. |