aboutsummaryrefslogtreecommitdiffstats
path: root/src/libstrongswan/plugins/pkcs11
Commit message (Collapse)AuthorAgeFilesLines
* plugins: Don't link with -rdynamic on WindowsMartin Willi2014-06-041-1/+1
|
* enum: Don't directly include enum.hMartin Willi2014-05-161-1/+1
| | | | | To allow enum.h to depend on utils.h definitions, avoid its direct inclusion. Instead include utils.h, which includes enum.h as well.
* lib: All settings use configured namespaceTobias Brunner2014-02-123-14/+14
|
* automake: replace INCLUDES by AM_CPPFLAGSMartin Willi2013-07-181-3/+4
| | | | | | INCLUDES are now deprecated and throw warnings when using automake 1.13. We now also differentiate AM_CPPFLAGS and AM_CFLAGS, where includes and defines are passed to AM_CPPFLAGS only.
* pkcs11: Use plugin_features_add() in get_features()Tobias Brunner2013-06-111-21/+8
|
* Moved debug.[ch] to utils folderTobias Brunner2012-10-249-9/+9
|
* Moved enum_name_t to utils folderTobias Brunner2012-10-241-1/+1
|
* Moved chunk_t to utils folderTobias Brunner2012-10-241-1/+1
|
* Moved data structures to new collections subfolderTobias Brunner2012-10-245-5/+5
|
* PKCS#11 library search using keyid uses a fallback to look for certificatesMartin Willi2012-10-241-4/+8
|
* Add a strongswan.conf option to disable loading of all certificates from a ↵Martin Willi2012-10-241-6/+11
| | | | pkcs11 module
* Explicit pkcs11 certificate loading can enforce a module and a slotMartin Willi2012-10-242-4/+21
|
* Be less verbose if loading PKCS#11 certificate failsMartin Willi2012-10-241-6/+1
|
* Add a builder to load specific pkcs11 certificates by keyidMartin Willi2012-10-243-0/+115
|
* If no pkcs11 public key for a private key found, search for a certificateMartin Willi2012-10-241-4/+53
|
* Move pkcs11 public key lookup function declaration to header fileMartin Willi2012-10-243-20/+18
|
* Added an option to reload certificates from PKCS#11 tokens on SIGHUPTobias Brunner2012-10-181-0/+16
|
* Copy the name of pkcs11_library_t objectsTobias Brunner2012-10-182-2/+3
| | | | | Strings returned by settings_t.create_section_enumerator will be freed when the config is reloaded.
* Make sure first argument is an int when using %.*s to print e.g. chunksTobias Brunner2012-09-281-2/+3
|
* Add a return value to hasher_t.reset()Martin Willi2012-07-161-1/+2
|
* Add a return value to hasher_t.allocate_hash()Martin Willi2012-07-163-14/+15
|
* Add a return value to hasher_t.get_hash()Martin Willi2012-07-161-11/+24
|
* RNGs' get_bytes and allocate_bytes return booleanTobias Brunner2012-07-161-4/+10
|
* Centralized thread cancellation in processor_tTobias Brunner2012-06-251-17/+3
| | | | | | | | | | This ensures that no threads are active when plugins and the rest of the daemon are unloaded. callback_job_t was simplified a lot in the process as its main functionality is now contained in processor_t. The parent-child relationships were abandoned as these were only needed to simplify job cancellation.
* Compiler warnings fixed.Tobias Brunner2012-02-141-1/+1
|
* pkcs11: Fixed a bug when creating public keys.Tobias Brunner2011-11-091-1/+1
|
* Common spelling errors fixed.Tobias Brunner2011-11-031-1/+1
|
* pkcs11: Make public key operations on tokens optional.Tobias Brunner2011-11-031-20/+21
|
* pkcs11: Make sure a key can be used for a given signature scheme.Tobias Brunner2011-11-023-16/+31
|
* pkcs11: Register ECDSA feature.Tobias Brunner2011-11-021-1/+10
|
* pkcs11: We have to create our own hashes for some signature schemes.Tobias Brunner2011-11-024-12/+81
|
* pkcs11: Lookup the public key of a private key by CKA_ID.Tobias Brunner2011-11-022-0/+125
| | | | | | Currently this only works if a public key object with the same ID is available, if there isn't one we could search for a certificate with the same ID and extract the key from there.
* pkcs11: Search for private keys in a more generic way.Tobias Brunner2011-11-021-20/+19
| | | | | | Also, don't extract the public key directly from the private key. Some tokens actually do not return the public exponent (it's not required). We have to find a different way to get the public key.
* pkcs11: Added support to encode ECDSA public keys.Tobias Brunner2011-11-021-0/+89
|
* pkcs11: Parse ECDSA public keys and find/create them on tokens.Tobias Brunner2011-11-021-2/+177
|
* pkcs11: Added generic functions to find/create public keys on tokens.Tobias Brunner2011-11-021-40/+75
|
* pkcs11: Store public key length in bits.Tobias Brunner2011-11-021-3/+3
|
* pkcs11: Fix encoding of RSA public keys.Tobias Brunner2011-11-021-0/+4
|
* pkcs11: Use create_object_attr_enumerator to encode RSA public key.Tobias Brunner2011-11-021-17/+7
|
* pkcs11: Instead of a mutex use a new session to do multipart operations.Tobias Brunner2011-11-022-40/+66
|
* pkcs11: Function added to retrieve multiple attributes from a single object.Tobias Brunner2011-11-022-6/+62
|
* pkcs11: Memory leak fixed in DH/ECDH implementation.Tobias Brunner2011-11-021-0/+2
|
* pkcs11: Invalid free fixed in DH/ECDH implementation.Tobias Brunner2011-11-021-1/+4
|
* pkcs11: Changed how pkcs11-manager is initialized.Tobias Brunner2011-11-021-42/+32
| | | | | The manager is now created directly, but events and certificate loading is deferred.
* pkcs11: Add attributes to specify what we use the DH/ECDH keys for.Tobias Brunner2011-11-021-2/+10
|
* pkcs11: Use callback registration for pkcs11-manager.Tobias Brunner2011-10-311-25/+73
| | | | | | Otherwise a plugin providing X509 decoding capabilities might be unloaded before the manager which will result in a segmentation fault when certificates in the manager's credential sets are to be destroyed.
* pkcs11: Merged the ECDH into the DH implementation.Tobias Brunner2011-10-315-404/+209
|
* pkcs11: Use get_ck_attribute for ECDH.Tobias Brunner2011-10-311-63/+13
|
* pkcs11: Use get_ck_attribute for DH.Tobias Brunner2011-10-311-28/+6
|
* pkcs11: Method added to library to extract a single attribute from an object.Tobias Brunner2011-10-312-1/+50
|