aboutsummaryrefslogtreecommitdiffstats
path: root/src/libstrongswan/plugins/x509
Commit message (Collapse)AuthorAgeFilesLines
...
* initialize variables to avoid compiler warningAndreas Steffen2010-02-051-2/+2
|
* Support TLS client authentication Extended Key Usage in x509 generationMartin Willi2010-01-141-8/+16
|
* ipsec pki --self|issue supports --pathlen option setting a path length ↵Andreas Steffen2009-12-311-2/+18
| | | | constraint
* X509_IP_ADDR_BLOCKS flag signals the presence of an ipAddrBlock certificate ↵Andreas Steffen2009-12-221-1/+2
| | | | extension
* added create_ipAddrBlock_enumerator() method to x509_tAndreas Steffen2009-12-221-0/+9
|
* traffic_selector supports RFC 3779 address range formatAndreas Steffen2009-12-211-7/+75
|
* parse RFC 3779 addressFamilyAndreas Steffen2009-12-201-2/+16
|
* plugin name is x509Andreas Steffen2009-12-201-1/+1
|
* discard certificate with unknown critical extensionsAndreas Steffen2009-12-201-0/+8
|
* use traffic_selector_t object to represent ipAddrBlocksAndreas Steffen2009-12-201-1/+2
|
* parse ipAddrBlocksAndreas Steffen2009-12-171-1/+69
|
* implemented path length constraint checkinf for IKEv2Andreas Steffen2009-11-041-1/+1
|
* output optional pathLenConstraint in ipsec listcacertsAndreas Steffen2009-11-041-0/+9
|
* implemented parsing of pathLenConstraintAndreas Steffen2009-11-041-11/+36
|
* streamlined output from get_validity()Andreas Steffen2009-10-063-41/+5
|
* ipsec pki --issue suports --flag authServer optionAndreas Steffen2009-10-051-14/+31
|
* ipsec pki --issue supports --flag ocspSigning optionAndreas Steffen2009-10-051-7/+24
|
* pluto now uses x509 plugin for attribute certificate handlingAndreas Steffen2009-10-054-492/+28
|
* mark embedded parsing in debug modeAndreas Steffen2009-10-021-0/+2
|
* added some notBefore/notAfter debugging infoAndreas Steffen2009-10-021-1/+13
|
* verify correctness of X.509 versionsAndreas Steffen2009-10-021-2/+18
|
* generate known OIDs dynamicallyAndreas Steffen2009-09-301-14/+6
|
* added get_subjectKeyIdentifier() to x509_tAndreas Steffen2009-09-261-14/+32
|
* adding additional flags to loaded X.509 certificatesAndreas Steffen2009-09-221-0/+5
|
* implemented ASN.1 encoding of PKCS#10 attributesAndreas Steffen2009-09-152-50/+97
|
* check if PKCS#10 version is 1Andreas Steffen2009-09-141-3/+6
|
* cosmeticsAndreas Steffen2009-09-141-4/+3
|
* support of PKCS#10 certificate request generation without attributesAndreas Steffen2009-09-142-7/+41
|
* extended hasher_signature_algorithm_to_oid() functionAndreas Steffen2009-09-131-47/+4
|
* support of PKCS#10 certificate request parsingAndreas Steffen2009-09-134-0/+715
|
* parsing error caused segfault in destroy()Andreas Steffen2009-09-131-1/+1
|
* corrected captionsAndreas Steffen2009-09-121-3/+3
|
* x509 plugin supports encoding of OCSP AuthorityInfo AccessLocationsMartin Willi2009-09-111-3/+42
|
* Removed chunk_from_buf() in favor of a simpler chunk_from_chars() macroMartin Willi2009-09-114-47/+25
|
* x509 plugin supports encoding of CRL distribution pointsMartin Willi2009-09-111-4/+46
|
* Updated x509 plugin to the new builder APIMartin Willi2009-09-1011-601/+405
|
* x509 certificates support encoding of email, DNS and IP subjectAltNamesMartin Willi2009-09-081-5/+50
|
* non self-signed x509 certificates are encoded with authorityKeyIdentifierMartin Willi2009-09-081-5/+18
|
* x509 CA certificates are encoded with a subjectKeyIdentifierMartin Willi2009-09-081-3/+14
|
* x509 plugin supports encoding of CA basicConstraint extensionMartin Willi2009-09-081-0/+22
|
* remove spaces before tabs at the beginning of lines (^( )+\t)Martin Willi2009-09-041-2/+2
|
* remove spaces within tabs (\t( )+\t)Martin Willi2009-09-043-10/+10
|
* replaces four spaces by tabs, where appropriateMartin Willi2009-09-044-13/+13
|
* removed trailing spaces ([[:space:]]+$)Martin Willi2009-09-048-238/+238
|
* changed prefix of crl_reason_t values from CRL_ to CRL_REASON_Andreas Steffen2009-08-312-2/+2
|
* .., but a comment might be helpfulAndreas Steffen2009-08-281-0/+1
|
* removed TODO reminderAndreas Steffen2009-08-281-1/+0
|
* allow choice of digest algorithm in certificate generationAndreas Steffen2009-08-281-5/+49
|
* distinguish between RFC 4754 (concatenated) and RFC 3279 (DER encoded) ECDSA ↵Martin Willi2009-08-272-2/+2
| | | | signatures
* support generation of EC certificatesMartin Willi2009-08-271-16/+9
|