Commit message (Collapse) | Author | Age | Files | Lines | |
---|---|---|---|---|---|
* | auth-cfg: Add RSA/PSS schemes for pubkey and rsa if enabled in strongswan.conf | Tobias Brunner | 2017-11-08 | 1 | -14/+52 |
| | | | | Also document the rsa/pss prefix. | ||||
* | builder: Add builder option to pass signature scheme and params | Tobias Brunner | 2017-11-08 | 2 | -1/+4 |
| | |||||
* | signature-params: Add helpers to parse/build ASN.1 algorithmIdentifier for ↵ | Tobias Brunner | 2017-11-08 | 2 | -0/+85 |
| | | | | signature schemes | ||||
* | ikev2: Enumerate RSA/PSS schemes and use them if enabled | Tobias Brunner | 2017-11-08 | 2 | -17/+34 |
| | |||||
* | signature-params: Use helper to build MGF1 algorithmIdentifier | Tobias Brunner | 2017-11-08 | 1 | -2/+2 |
| | |||||
* | auth-cfg: Parse rsa/pss auth tokens | Tobias Brunner | 2017-11-08 | 1 | -25/+62 |
| | |||||
* | auth-cfg: Store signature schemes as signature_params_t objects | Tobias Brunner | 2017-11-08 | 3 | -38/+53 |
| | | | | | Due to circular references the hasher_from_signature_scheme() helper does not take a signature_params_t object. | ||||
* | certificate: Return signature scheme and parameters from issued_by() method | Tobias Brunner | 2017-11-08 | 8 | -23/+38 |
| | | | | | This also required some include restructuring (avoid including library.h in headers) to avoid unresolvable circular dependencies. | ||||
* | signature-params: Add helper struct for signature scheme and parameters | Tobias Brunner | 2017-11-08 | 2 | -14/+195 |
| | |||||
* | signature-params: Optionally pass a specific salt value when signing | Tobias Brunner | 2017-11-08 | 1 | -0/+2 |
| | |||||
* | signature-params: Add functions to parse/build ASN.1 RSASSA-PSS params | Tobias Brunner | 2017-11-08 | 2 | -0/+186 |
| | |||||
* | signature-params: Add struct for RSASSA-PSS parameters | Tobias Brunner | 2017-11-08 | 1 | -0/+41 |
| | |||||
* | private-key: Add optional parameters argument to sign() method | Tobias Brunner | 2017-11-08 | 1 | -2/+4 |
| | |||||
* | public-key: Add optional parameters argument to verify() method | Tobias Brunner | 2017-11-08 | 2 | -6/+7 |
| | |||||
* | public-key: Add RSASSA-PSS signature scheme identifier | Tobias Brunner | 2017-11-08 | 2 | -0/+8 |
| | |||||
* | certificates: Use shared destructor for x509_cdp_t | Tobias Brunner | 2017-09-18 | 2 | -2/+14 |
| | |||||
* | credential-manager: Log issuer identity if not found | Tobias Brunner | 2017-07-27 | 1 | -0/+2 |
| | |||||
* | auth-cfg: Don't limit subjectAltName check to received certificates | Tobias Brunner | 2017-07-27 | 1 | -1/+1 |
| | | | | Otherwise this won't work if the certificate is only locally available. | ||||
* | Fixed some typos, courtesy of codespell | Tobias Brunner | 2017-05-26 | 1 | -1/+1 |
| | |||||
* | linked-list: Change return value of find_first() and signature of its callback | Tobias Brunner | 2017-05-26 | 2 | -13/+15 |
| | | | | This avoids the unportable five pointer hack. | ||||
* | Change interface for enumerator_create_filter() callback | Tobias Brunner | 2017-05-26 | 2 | -111/+129 |
| | | | | | This avoids the unportable 5 pointer hack, but requires enumerating in the callback. | ||||
* | Migrate all enumerators to venumerate() interface change | Tobias Brunner | 2017-05-26 | 7 | -73/+104 |
| | |||||
* | credential-manager: Prefer local over global sets | Adrian-Ken Rueegsegger | 2017-05-23 | 1 | -7/+7 |
| | | | | | Invert set enumeration order to first enumerate local and then global credential sets. | ||||
* | Reference Edwards-curve signature RFCs | Andreas Steffen | 2017-03-20 | 1 | -5/+5 |
| | |||||
* | builder: Define a builder part for X.509 RFC 3779 address blocks | Martin Willi | 2017-02-27 | 2 | -0/+3 |
| | |||||
* | mem-cred: Add methods to add/remove shared keys with unique identifiers | Tobias Brunner | 2017-02-16 | 2 | -6/+107 |
| | | | | Also added is a method to enumerate the unique identifiers. | ||||
* | mem-cred: Add method to remove a private key with a specific fingerprint | Tobias Brunner | 2017-02-16 | 2 | -2/+38 |
| | |||||
* | Implemented EdDSA for IKEv2 using a pro forma Identity hash function | Andreas Steffen | 2016-12-14 | 1 | -17/+31 |
| | |||||
* | Added support of EdDSA signatures | Andreas Steffen | 2016-12-14 | 5 | -17/+51 |
| | |||||
* | Fixed in-place update of cached base and delta CRLs | Andreas Steffen | 2016-10-30 | 1 | -4/+4 |
| | |||||
* | Newer CRLs replace older versions of the CRL in the cache | Andreas Steffen | 2016-10-26 | 1 | -0/+39 |
| | |||||
* | mem-cred: Support storing a delta CRL together with its base | Tobias Brunner | 2016-10-11 | 1 | -8/+30 |
| | | | | | | | | | | | | So far every "newer" CRL (higher serial or by date) replaced an existing "older" CRL. This meant that delta CRLs replaced an existing base CRL and that base CRLs weren't added if a delta CRL was already stored. So the base had to be re-fetched every time after a delta CRL was added. With this change one delta CRL to the latest base may be stored. A newer delta CRL will replace an existing delta CRL (but not its base, older base CRLs are removed, though). And a newer base will replace the existing base and optional delta CRL. | ||||
* | gmp: Support of SHA-3 RSA signatures | Andreas Steffen | 2016-09-22 | 3 | -34/+67 |
| | |||||
* | auth-cfg-wrapper: Fix memory leak with hash-and-URL certificates | Tobias Brunner | 2016-09-12 | 1 | -1/+1 |
| | | | | | | | We wrap the auth-cfg object and its contents, so there is no need to get an additional reference for the enumerated certificate. Fixes a44bb9345f04 ("merged multi-auth branch back into trunk") | ||||
* | mem-cred: Fix memory leak when replacing existing CRLs | Tobias Brunner | 2016-05-11 | 1 | -0/+1 |
| | | | | Fixes #1442. | ||||
* | Use standard unsigned integer types | Andreas Steffen | 2016-03-24 | 3 | -7/+7 |
| | |||||
* | Fix some Doxygen issues | Tobias Brunner | 2016-03-11 | 1 | -5/+5 |
| | |||||
* | auth-cfg: Add a rule to suspend certificate validation constraints | Tobias Brunner | 2016-03-10 | 2 | -0/+18 |
| | |||||
* | credential-manager: Check cache queue when destroying trusted certificate ↵ | Tobias Brunner | 2016-03-10 | 1 | -1/+2 |
| | | | | | | | | | | enumerator We already do this in the trusted public key enumerator (which internally uses the trusted certificate enumerator) but should do so also when this enumerator is used directly (since the public key enumerator has the read lock the additional call will just be skipped there). | ||||
* | credential-manager: Make online revocation checks optional for public key ↵ | Tobias Brunner | 2016-03-10 | 2 | -3/+9 |
| | | | | enumerator | ||||
* | auth-cfg: Make IKE signature schemes configurable | Tobias Brunner | 2016-03-04 | 2 | -37/+63 |
| | | | | | | This also restores the charon.signature_authentication_constraints functionality, that is, if no explicit IKE signature schemes are configured we apply all regular signature constraints as IKE constraints. | ||||
* | ikev2: Diversify signature scheme rule | Thomas Egerer | 2016-03-04 | 2 | -30/+68 |
| | | | | | | | This allows for different signature schemes for IKE authentication and trustchain verification. Signed-off-by: Thomas Egerer <thomas.egerer@secunet.com> | ||||
* | Apply pubkey and signature constraints in vici plugin | Andreas Steffen | 2015-12-17 | 2 | -0/+117 |
| | |||||
* | Refactored certificate management for the vici and stroke interfaces5.4.0dr1 | Andreas Steffen | 2015-12-12 | 2 | -30/+130 |
| | |||||
* | Changed some certificate_type_names and added x509_flag_names | Andreas Steffen | 2015-12-11 | 3 | -4/+36 |
| | |||||
* | Print OCSP single responses | Andreas Steffen | 2015-12-11 | 2 | -3/+82 |
| | |||||
* | Standardized printing of certificate information | Andreas Steffen | 2015-12-11 | 2 | -0/+651 |
| | | | | | | | The certificate_printer class allows the printing of certificate information to a text file (usually stdout). This class is used by the pki --print and swanctl --list-certs commands as well as by the stroke plugin. | ||||
* | auth-cfg: Prefer merged rules over existing ones when moving them | Tobias Brunner | 2015-11-12 | 1 | -3/+3 |
| | | | | | | This is particularly important for single valued rules (e.g. identities). When copying values this is already handled correctly by the enumerator and add(). | ||||
* | Explicitly mention SHA2 algorithm in BLISS OIDs and signature schemes | Andreas Steffen | 2015-11-06 | 2 | -28/+28 |
| | |||||
* | Support BLISS signatures with SHA-3 hash | Andreas Steffen | 2015-11-03 | 2 | -4/+28 |
| |