aboutsummaryrefslogtreecommitdiffstats
path: root/src/libstrongswan/plugins/x509/x509_cert.c
Commit message (Collapse)AuthorAgeFilesLines
* ipsec pki --issue suports --flag authServer optionAndreas Steffen2009-10-051-14/+31
|
* ipsec pki --issue supports --flag ocspSigning optionAndreas Steffen2009-10-051-7/+24
|
* mark embedded parsing in debug modeAndreas Steffen2009-10-021-0/+2
|
* verify correctness of X.509 versionsAndreas Steffen2009-10-021-2/+18
|
* added get_subjectKeyIdentifier() to x509_tAndreas Steffen2009-09-261-14/+32
|
* adding additional flags to loaded X.509 certificatesAndreas Steffen2009-09-221-0/+5
|
* implemented ASN.1 encoding of PKCS#10 attributesAndreas Steffen2009-09-151-40/+56
|
* extended hasher_signature_algorithm_to_oid() functionAndreas Steffen2009-09-131-47/+4
|
* parsing error caused segfault in destroy()Andreas Steffen2009-09-131-1/+1
|
* corrected captionsAndreas Steffen2009-09-121-3/+3
|
* x509 plugin supports encoding of OCSP AuthorityInfo AccessLocationsMartin Willi2009-09-111-3/+42
|
* Removed chunk_from_buf() in favor of a simpler chunk_from_chars() macroMartin Willi2009-09-111-8/+7
|
* x509 plugin supports encoding of CRL distribution pointsMartin Willi2009-09-111-4/+46
|
* Updated x509 plugin to the new builder APIMartin Willi2009-09-101-233/+167
|
* x509 certificates support encoding of email, DNS and IP subjectAltNamesMartin Willi2009-09-081-5/+50
|
* non self-signed x509 certificates are encoded with authorityKeyIdentifierMartin Willi2009-09-081-5/+18
|
* x509 CA certificates are encoded with a subjectKeyIdentifierMartin Willi2009-09-081-3/+14
|
* x509 plugin supports encoding of CA basicConstraint extensionMartin Willi2009-09-081-0/+22
|
* remove spaces within tabs (\t( )+\t)Martin Willi2009-09-041-5/+5
|
* removed trailing spaces ([[:space:]]+$)Martin Willi2009-09-041-89/+89
|
* .., but a comment might be helpfulAndreas Steffen2009-08-281-0/+1
|
* removed TODO reminderAndreas Steffen2009-08-281-1/+0
|
* allow choice of digest algorithm in certificate generationAndreas Steffen2009-08-281-5/+49
|
* distinguish between RFC 4754 (concatenated) and RFC 3279 (DER encoded) ECDSA ↵Martin Willi2009-08-271-1/+1
| | | | signatures
* support generation of EC certificatesMartin Willi2009-08-271-16/+9
|
* create algorithmIdentifier dynamically from OID databaseMartin Willi2009-08-271-3/+3
|
* updated x509 plugin to public key/x509 API changesMartin Willi2009-08-261-17/+22
|
* make use of the pem helper plugin to load credentialsMartin Willi2009-08-261-29/+0
|
* created signature_scheme_from_oid() helper functionAndreas Steffen2009-06-091-25/+7
|
* pluto and scepclient use private and public key plugins of libstrongswanAndreas Steffen2009-06-091-15/+14
|
* hide credentials headers in credential_factory.hAndreas Steffen2009-05-281-0/+1
|
* set parsed = TRUE before calling parse_certificate()Andreas Steffen2009-05-271-8/+7
|
* moved very stroke specific x509 flag handling out of core libraryMartin Willi2009-05-181-21/+10
|
* removing svn keyword $Id$ from all filesTobias Brunner2009-04-301-2/+0
|
* merging changes from portability branch back to trunkTobias Brunner2009-04-301-6/+6
| | | | | important change for developers: %Y replaces %D to print identities!
* printf hooks refactored to increase portability (i.e. support for platforms ↵Tobias Brunner2009-03-121-1/+1
| | | | without glibc-compatible customizable printf - the Vstr string library is currently required on such platforms).
* removed debugging leftoversMartin Willi2008-12-081-4/+0
|
* basic x509 certificate generationMartin Willi2008-12-081-49/+246
|
* got rid of deprecated create_iterator_locked()Martin Willi2008-11-051-0/+1
|
* refactored credential builderMartin Willi2008-09-021-3/+10
| | | | | | | | | allow enumeration of matching builders try a second builder if the first one fails builder clones resources internally on demand caller frees added resources on failure and success stricter handling of non-supported build parts
* ECDSA with OpenSSLTobias Brunner2008-06-101-0/+3
|
* parsing of subjectPublicKeyInfo of x509 certificates extractedTobias Brunner2008-06-101-48/+26
|
* check if parsing of the RSA public key in an X.509 certificate was successfulAndreas Steffen2008-05-231-0/+5
|
* fixed parsing of openssl format public keysMartin Willi2008-05-061-16/+13
|
* cosmeticsAndreas Steffen2008-04-281-19/+19
|
* introduced ASN1_EXIT command in ASN.1 object syntax definitionAndreas Steffen2008-04-281-93/+50
|
* optimized parser->success()Andreas Steffen2008-04-261-8/+7
|
* refactoring of the ASN.1 parserAndreas Steffen2008-04-261-364/+361
|
* support for hash and URL encoded certificate payloads in charonTobias Brunner2008-04-181-0/+26
|
* compare certificates against full encoding to allow equality check of ↵Martin Willi2008-04-071-9/+9
| | | | untrusted certs