aboutsummaryrefslogtreecommitdiffstats
path: root/src/libstrongswan/plugins/revocation/revocation_validator.c
Commit message (Collapse)AuthorAgeFilesLines
* revocation: More accurately describe the flags to disable OCSP/CRL validationTobias Brunner2017-02-151-8/+7
| | | | | | These options disable validation as such, e.g. even from cached CRLs, not only the fetching. Also made the plugin's validate() implementation a no-op if both options are disabled.
* revocation: OCSP and/or CRL fetching can be disabledAndreas Steffen2016-12-301-38/+71
|
* revocation: Cache valid CRL also if certificate is revokedTobias Brunner2016-10-111-10/+25
|
* revocation: Allow CRLs to be encoded in PEM formatTobias Brunner2015-11-121-1/+1
| | | | | | | | | | Since the textual representation for a CRL is now standardized in RFC 7468 one could argue that we should accept that too, even though RFC 5280 explicitly demands CRLs fetched via HTTP/FTP to be in DER format. But in particular for file URIs enforcing that seems inconvenient. Fixes #1203.
* revocation: Log error if no OCSP signer candidate foundMartin Willi2014-03-311-1/+1
| | | | Fixes evaluation of ikev2/ocsp-untrusted-cert.
* revocation: Restrict OCSP signing to specific certificatesMartin Willi2014-03-311-7/+63
| | | | | | | | | | | | | To avoid considering each cached OCSP response and evaluating its trustchain, we limit the certificates considered for OCSP signing to: - The issuing CA of the checked certificate - A directly delegated signer by the same CA, having the OCSP signer constraint - Any locally installed (trusted) certificate having the OCSP signer constraint The first two options cover the requirements from RFC 6960 2.6. For compatibility with non-conforming CAs, we allow the third option as exception, but require the installation of such certificates locally.
* revocation: Don't merge auth config of CLR/OCSP trustchain validationMartin Willi2014-03-311-39/+24
| | | | | | | | | | This behavior was introduced with 6840a6fb to avoid key/signature strength checking for the revocation trustchain as we do it for end entity certificates. Unfortunately this breaks CA constraint checking under certain conditions, as we merge additional intermediate/CA certificates to the auth config. As key/signature strength checking of the revocation trustchain is a rather exotic requirement we drop support for that to properly enforce CA constraints.
* credmgr: introduce a hook function to catch trust chain validation errorsMartin Willi2013-07-181-0/+6
|
* Moved debug.[ch] to utils folderTobias Brunner2012-10-241-1/+1
|
* Add signature schemes to auth_cfg during trustchain validationMartin Willi2012-06-121-2/+2
|
* Added a flag to register local credential sets exclusively, disabling all othersMartin Willi2012-03-201-1/+1
|
* Handle certificates being on hold in a CRLThomas Egerer2011-11-041-1/+11
| | | | | | | Certificates which are set on hold in a CRL might be removed from any subsequent CRL. Hence you cannot conclude that a certificate is revoked for good in this case, you would try to retrieve an update CRL to see if the certificate on hold is still on it or not.
* [hopefully] fixed pathlen problem on ARM platformsAndreas Steffen2011-02-101-1/+1
|
* Added support for delta CRL checking to revocation pluginMartin Willi2011-01-051-12/+109
|
* Check for issuer only if we actually got a CRLMartin Willi2011-01-051-7/+7
|
* Pass an additional anchor flag to validate() hook if we reach the root CAMartin Willi2011-01-051-1/+2
|
* Always pass auth info to validate(), use pathlen to check for user certificateMartin Willi2011-01-051-2/+4
|
* Simplified format of x509 CRL URI parsing/enumeratorMartin Willi2011-01-051-8/+8
|
* CRL/OCSP validation stores trustchain information in auth_cfgMartin Willi2011-01-051-17/+31
|
* Use certificate CRLIssuer information to look up cacched CRLs or CDPsMartin Willi2011-01-051-50/+88
|
* Added support for CRL Issuers to x509 and OpenSSL pluginsMartin Willi2011-01-051-2/+1
|
* Support different encoding types in certificate.get_encoding()Martin Willi2010-07-131-1/+6
|
* Renamed key_encod{ing,der}_t and constants, prepare for generic credential ↵Martin Willi2010-07-131-2/+2
| | | | encoding
* Moved CRL/OCSP checking to a dedicated plugin called revocationMartin Willi2010-07-131-0/+582