aboutsummaryrefslogtreecommitdiffstats
path: root/src/libstrongswan/plugins/x509/x509_cert.c
Commit message (Expand)AuthorAgeFilesLines
...
* Migrated x509_cert_t to INIT/METHOD macrosMartin Willi2011-01-051-144/+88
* Parse and encode crlSign keyUsage flag in x509 pluginMartin Willi2011-01-051-10/+71
* Added support for CRL Issuers to x509 and OpenSSL pluginsMartin Willi2011-01-051-57/+174
* Compare subject against all key identifiers in has_subject()Martin Willi2010-09-091-9/+12
* has_subject() now resolves ID_KEY_IDsAndreas Steffen2010-09-091-4/+14
* Parse UPN subjectAltNames in x509 pluginMartin Willi2010-08-101-9/+24
* Support different encoding types in certificate.get_encoding()Martin Willi2010-07-131-4/+14
* Renamed key_encod{ing,der}_t and constants, prepare for generic credential en...Martin Willi2010-07-131-4/+4
* Select subjectAltName address family using address length in x509 pluginMartin Willi2010-06-241-1/+11
* Removed is_newer() from certificate_t, obsoleting all implementationsMartin Willi2010-05-211-18/+0
* Adding DBG_LIB to all calls of libstrongswan's version of DBG*.Tobias Brunner2010-04-061-28/+30
* critical keyUsage extension must be parsedAndreas Steffen2010-03-071-0/+3
* set Certificate Sign and CRL Sign flags in keyUsage extension if CA is trueAndreas Steffen2010-03-071-4/+13
* initialize variables to avoid compiler warningAndreas Steffen2010-02-051-2/+2
* Support TLS client authentication Extended Key Usage in x509 generationMartin Willi2010-01-141-8/+16
* ipsec pki --self|issue supports --pathlen option setting a path length constr...Andreas Steffen2009-12-311-2/+18
* X509_IP_ADDR_BLOCKS flag signals the presence of an ipAddrBlock certificate e...Andreas Steffen2009-12-221-1/+2
* added create_ipAddrBlock_enumerator() method to x509_tAndreas Steffen2009-12-221-0/+9
* traffic_selector supports RFC 3779 address range formatAndreas Steffen2009-12-211-7/+75
* parse RFC 3779 addressFamilyAndreas Steffen2009-12-201-2/+16
* plugin name is x509Andreas Steffen2009-12-201-1/+1
* discard certificate with unknown critical extensionsAndreas Steffen2009-12-201-0/+8
* use traffic_selector_t object to represent ipAddrBlocksAndreas Steffen2009-12-201-1/+2
* parse ipAddrBlocksAndreas Steffen2009-12-171-1/+69
* implemented path length constraint checkinf for IKEv2Andreas Steffen2009-11-041-1/+1
* output optional pathLenConstraint in ipsec listcacertsAndreas Steffen2009-11-041-0/+9
* implemented parsing of pathLenConstraintAndreas Steffen2009-11-041-11/+36
* ipsec pki --issue suports --flag authServer optionAndreas Steffen2009-10-051-14/+31
* ipsec pki --issue supports --flag ocspSigning optionAndreas Steffen2009-10-051-7/+24
* mark embedded parsing in debug modeAndreas Steffen2009-10-021-0/+2
* verify correctness of X.509 versionsAndreas Steffen2009-10-021-2/+18
* added get_subjectKeyIdentifier() to x509_tAndreas Steffen2009-09-261-14/+32
* adding additional flags to loaded X.509 certificatesAndreas Steffen2009-09-221-0/+5
* implemented ASN.1 encoding of PKCS#10 attributesAndreas Steffen2009-09-151-40/+56
* extended hasher_signature_algorithm_to_oid() functionAndreas Steffen2009-09-131-47/+4
* parsing error caused segfault in destroy()Andreas Steffen2009-09-131-1/+1
* corrected captionsAndreas Steffen2009-09-121-3/+3
* x509 plugin supports encoding of OCSP AuthorityInfo AccessLocationsMartin Willi2009-09-111-3/+42
* Removed chunk_from_buf() in favor of a simpler chunk_from_chars() macroMartin Willi2009-09-111-8/+7
* x509 plugin supports encoding of CRL distribution pointsMartin Willi2009-09-111-4/+46
* Updated x509 plugin to the new builder APIMartin Willi2009-09-101-233/+167
* x509 certificates support encoding of email, DNS and IP subjectAltNamesMartin Willi2009-09-081-5/+50
* non self-signed x509 certificates are encoded with authorityKeyIdentifierMartin Willi2009-09-081-5/+18
* x509 CA certificates are encoded with a subjectKeyIdentifierMartin Willi2009-09-081-3/+14
* x509 plugin supports encoding of CA basicConstraint extensionMartin Willi2009-09-081-0/+22
* remove spaces within tabs (\t( )+\t)Martin Willi2009-09-041-5/+5
* removed trailing spaces ([[:space:]]+$)Martin Willi2009-09-041-89/+89
* .., but a comment might be helpfulAndreas Steffen2009-08-281-0/+1
* removed TODO reminderAndreas Steffen2009-08-281-1/+0
* allow choice of digest algorithm in certificate generationAndreas Steffen2009-08-281-5/+49