aboutsummaryrefslogtreecommitdiffstats
path: root/src/libstrongswan/plugins/revocation
Commit message (Collapse)AuthorAgeFilesLines
* revocation: Allow CRLs to be encoded in PEM formatTobias Brunner2015-11-121-1/+1
| | | | | | | | | | Since the textual representation for a CRL is now standardized in RFC 7468 one could argue that we should accept that too, even though RFC 5280 explicitly demands CRLs fetched via HTTP/FTP to be in DER format. But in particular for file URIs enforcing that seems inconvenient. Fixes #1203.
* plugins: Don't link with -rdynamic on WindowsMartin Willi2014-06-041-1/+1
|
* revocation: Log error if no OCSP signer candidate foundMartin Willi2014-03-311-1/+1
| | | | Fixes evaluation of ikev2/ocsp-untrusted-cert.
* revocation: Restrict OCSP signing to specific certificatesMartin Willi2014-03-311-7/+63
| | | | | | | | | | | | | To avoid considering each cached OCSP response and evaluating its trustchain, we limit the certificates considered for OCSP signing to: - The issuing CA of the checked certificate - A directly delegated signer by the same CA, having the OCSP signer constraint - Any locally installed (trusted) certificate having the OCSP signer constraint The first two options cover the requirements from RFC 6960 2.6. For compatibility with non-conforming CAs, we allow the third option as exception, but require the installation of such certificates locally.
* revocation: Don't merge auth config of CLR/OCSP trustchain validationMartin Willi2014-03-311-39/+24
| | | | | | | | | | This behavior was introduced with 6840a6fb to avoid key/signature strength checking for the revocation trustchain as we do it for end entity certificates. Unfortunately this breaks CA constraint checking under certain conditions, as we merge additional intermediate/CA certificates to the auth config. As key/signature strength checking of the revocation trustchain is a rather exotic requirement we drop support for that to properly enforce CA constraints.
* credmgr: introduce a hook function to catch trust chain validation errorsMartin Willi2013-07-181-0/+6
|
* automake: replace INCLUDES by AM_CPPFLAGSMartin Willi2013-07-181-3/+4
| | | | | | INCLUDES are now deprecated and throw warnings when using automake 1.13. We now also differentiate AM_CPPFLAGS and AM_CFLAGS, where includes and defines are passed to AM_CPPFLAGS only.
* revocation: Use plugin features with soft dependencies on fetcher and ↵Tobias Brunner2013-06-111-3/+35
| | | | en-/decoding
* Moved debug.[ch] to utils folderTobias Brunner2012-10-241-1/+1
|
* Add signature schemes to auth_cfg during trustchain validationMartin Willi2012-06-121-2/+2
|
* Added a flag to register local credential sets exclusively, disabling all othersMartin Willi2012-03-201-1/+1
|
* Handle certificates being on hold in a CRLThomas Egerer2011-11-041-1/+11
| | | | | | | Certificates which are set on hold in a CRL might be removed from any subsequent CRL. Hence you cannot conclude that a certificate is revoked for good in this case, you would try to retrieve an update CRL to see if the certificate on hold is still on it or not.
* Added a (not yet implemented) plugin_t method to reload plugin configurationMartin Willi2011-04-151-0/+1
|
* Added a get_name() function to plugin_t, create_plugin_enumerator enumerates ↵Martin Willi2011-04-151-0/+7
| | | | over plugin_t
* [hopefully] fixed pathlen problem on ARM platformsAndreas Steffen2011-02-101-1/+1
|
* Added support for delta CRL checking to revocation pluginMartin Willi2011-01-051-12/+109
|
* Check for issuer only if we actually got a CRLMartin Willi2011-01-051-7/+7
|
* Pass an additional anchor flag to validate() hook if we reach the root CAMartin Willi2011-01-051-1/+2
|
* Always pass auth info to validate(), use pathlen to check for user certificateMartin Willi2011-01-051-2/+4
|
* Simplified format of x509 CRL URI parsing/enumeratorMartin Willi2011-01-051-8/+8
|
* CRL/OCSP validation stores trustchain information in auth_cfgMartin Willi2011-01-051-17/+31
|
* Use certificate CRLIssuer information to look up cacched CRLs or CDPsMartin Willi2011-01-051-50/+88
|
* Added support for CRL Issuers to x509 and OpenSSL pluginsMartin Willi2011-01-051-2/+1
|
* Use a seperate section for each nested struct member in INIT macroMartin Willi2010-08-181-1/+5
|
* Support different encoding types in certificate.get_encoding()Martin Willi2010-07-131-1/+6
|
* Renamed key_encod{ing,der}_t and constants, prepare for generic credential ↵Martin Willi2010-07-131-2/+2
| | | | encoding
* Moved CRL/OCSP checking to a dedicated plugin called revocationMartin Willi2010-07-135-0/+750