aboutsummaryrefslogtreecommitdiffstats
path: root/src/libstrongswan/plugins/x509
Commit message (Collapse)AuthorAgeFilesLines
...
* Use a dedicated build part for challenge passwords, BUILD_PASSPHRASE gets ↵Martin Willi2010-08-041-1/+1
| | | | obsolete
* Support different encoding types in certificate.get_encoding()Martin Willi2010-07-136-28/+87
|
* Renamed key_encod{ing,der}_t and constants, prepare for generic credential ↵Martin Willi2010-07-136-12/+12
| | | | encoding
* Select subjectAltName address family using address length in x509 pluginMartin Willi2010-06-241-1/+11
|
* Use CAs subjectKeyIdentifier as CRLs authorityKeyIdentifierMartin Willi2010-05-211-1/+1
|
* Added support for CRL generation to x509 pluginMartin Willi2010-05-213-3/+199
|
* Removed is_newer() from certificate_t, obsoleting all implementationsMartin Willi2010-05-215-102/+2
|
* Migrated x509_crl_t to INIT/METHOD macrosMartin Willi2010-05-211-95/+70
|
* Adding DBG_LIB to all calls of libstrongswan's version of DBG*.Tobias Brunner2010-04-066-81/+89
|
* critical keyUsage extension must be parsedAndreas Steffen2010-03-071-0/+3
|
* set Certificate Sign and CRL Sign flags in keyUsage extension if CA is trueAndreas Steffen2010-03-071-4/+13
|
* Reverting eba28948a584b9d02474cf5d256b04b8d2adbe6a which was only necessary ↵Tobias Brunner2010-03-021-1/+0
| | | | | | | when cross-compiling the plugins for Android 2.0. With the coming monolithic build using Android.mk files this won't be necessary anymore.
* Streamlined the source file list formatting in plugin makefiles.Tobias Brunner2010-03-021-7/+9
|
* Link all enabled libstrongswan plugins into the library, link all enabled ↵Tobias Brunner2010-03-021-2/+5
| | | | charon plugins into libcharon.
* Changed plugin constructors from plugin_create to plugin_name_plugin_create.Tobias Brunner2010-03-021-1/+1
|
* Removing the plugin constructor declarations from the header files.Tobias Brunner2010-03-021-5/+0
|
* Link all plugins to libstrongswan.Tobias Brunner2010-02-251-0/+1
|
* initialize variables to avoid compiler warningAndreas Steffen2010-02-051-2/+2
|
* Support TLS client authentication Extended Key Usage in x509 generationMartin Willi2010-01-141-8/+16
|
* ipsec pki --self|issue supports --pathlen option setting a path length ↵Andreas Steffen2009-12-311-2/+18
| | | | constraint
* X509_IP_ADDR_BLOCKS flag signals the presence of an ipAddrBlock certificate ↵Andreas Steffen2009-12-221-1/+2
| | | | extension
* added create_ipAddrBlock_enumerator() method to x509_tAndreas Steffen2009-12-221-0/+9
|
* traffic_selector supports RFC 3779 address range formatAndreas Steffen2009-12-211-7/+75
|
* parse RFC 3779 addressFamilyAndreas Steffen2009-12-201-2/+16
|
* plugin name is x509Andreas Steffen2009-12-201-1/+1
|
* discard certificate with unknown critical extensionsAndreas Steffen2009-12-201-0/+8
|
* use traffic_selector_t object to represent ipAddrBlocksAndreas Steffen2009-12-201-1/+2
|
* parse ipAddrBlocksAndreas Steffen2009-12-171-1/+69
|
* implemented path length constraint checkinf for IKEv2Andreas Steffen2009-11-041-1/+1
|
* output optional pathLenConstraint in ipsec listcacertsAndreas Steffen2009-11-041-0/+9
|
* implemented parsing of pathLenConstraintAndreas Steffen2009-11-041-11/+36
|
* streamlined output from get_validity()Andreas Steffen2009-10-063-41/+5
|
* ipsec pki --issue suports --flag authServer optionAndreas Steffen2009-10-051-14/+31
|
* ipsec pki --issue supports --flag ocspSigning optionAndreas Steffen2009-10-051-7/+24
|
* pluto now uses x509 plugin for attribute certificate handlingAndreas Steffen2009-10-054-492/+28
|
* mark embedded parsing in debug modeAndreas Steffen2009-10-021-0/+2
|
* added some notBefore/notAfter debugging infoAndreas Steffen2009-10-021-1/+13
|
* verify correctness of X.509 versionsAndreas Steffen2009-10-021-2/+18
|
* generate known OIDs dynamicallyAndreas Steffen2009-09-301-14/+6
|
* added get_subjectKeyIdentifier() to x509_tAndreas Steffen2009-09-261-14/+32
|
* adding additional flags to loaded X.509 certificatesAndreas Steffen2009-09-221-0/+5
|
* implemented ASN.1 encoding of PKCS#10 attributesAndreas Steffen2009-09-152-50/+97
|
* check if PKCS#10 version is 1Andreas Steffen2009-09-141-3/+6
|
* cosmeticsAndreas Steffen2009-09-141-4/+3
|
* support of PKCS#10 certificate request generation without attributesAndreas Steffen2009-09-142-7/+41
|
* extended hasher_signature_algorithm_to_oid() functionAndreas Steffen2009-09-131-47/+4
|
* support of PKCS#10 certificate request parsingAndreas Steffen2009-09-134-0/+715
|
* parsing error caused segfault in destroy()Andreas Steffen2009-09-131-1/+1
|
* corrected captionsAndreas Steffen2009-09-121-3/+3
|
* x509 plugin supports encoding of OCSP AuthorityInfo AccessLocationsMartin Willi2009-09-111-3/+42
|