aboutsummaryrefslogtreecommitdiffstats
path: root/src/libstrongswan/plugins
Commit message (Collapse)AuthorAgeFilesLines
...
* Implemented hasher_t using PKCS#11Martin Willi2010-08-044-0/+336
|
* Defer certificate loading until all PKCS#11 modules are loadedMartin Willi2010-08-041-3/+8
|
* Provide a public PKCS#11 mechanism enumeratorMartin Willi2010-08-043-44/+117
|
* Support PKCS#11 keys requiring reauthentication for each operationMartin Willi2010-08-041-11/+64
|
* Do not try to log in if we already have a user sessionMartin Willi2010-08-041-0/+13
|
* Obseleted BUILD_PASSPHRASE(_CALLBACK) for private key loading, use ↵Martin Willi2010-08-041-60/+29
| | | | credential sets
* Use a dedicated build part for challenge passwords, BUILD_PASSPHRASE gets ↵Martin Willi2010-08-041-1/+1
| | | | obsolete
* Use credential sets to load smartcard keysMartin Willi2010-08-042-23/+68
|
* Implemented a callback based credential set, currently for shared keys onlyMartin Willi2010-08-041-37/+21
|
* Implemented callback PIN invocation for PKCS#11 loginMartin Willi2010-08-041-8/+47
|
* Implemented keyid discovery on all modules/slotsMartin Willi2010-08-041-7/+80
|
* Pass the PKCS11 keyid as chunk, not as stringMartin Willi2010-08-042-17/+18
|
* Reuse generic passphrase build part, not a dedicated PIN partMartin Willi2010-08-042-11/+13
|
* Implemented private key on top of a PKCS#11 tokenMartin Willi2010-08-044-0/+427
|
* Extended the PKCS#11 object enumerator by attribute retrievalMartin Willi2010-08-043-69/+111
|
* Use the PKCS#11 object enumeratorMartin Willi2010-08-041-25/+6
|
* Implemented a generic PKCS#11 object enumeratorMartin Willi2010-08-042-1/+78
|
* Unload plugins in reverse orderMartin Willi2010-08-041-3/+3
|
* Support module names in %smartcard specifier, streamlined smartcard buildingMartin Willi2010-08-042-8/+32
|
* Added enumerator for PKCS#11 tokensMartin Willi2010-08-043-15/+140
|
* Handle NOT_SUPPORT return value from WaitForSlotMartin Willi2010-08-041-1/+1
|
* Reenabled dlcloseMartin Willi2010-08-041-1/+1
|
* Implemented a credential set on top of a PKCS#11 tokenMartin Willi2010-08-045-1/+420
|
* Added a token add/remove callback function to the managerMartin Willi2010-08-043-3/+45
|
* Enumerate tokens and their mechanisms, wait for slot eventsMartin Willi2010-08-041-9/+222
|
* Depend on libcharon until we have a thread pool to useMartin Willi2010-08-041-1/+2
|
* Add enum names for CK_MECHANISM_TYPE constantsMartin Willi2010-08-042-0/+279
|
* Make the PKCS#11 padding string trimming public, add null terminatorMartin Willi2010-08-042-10/+18
|
* Added a getter for the library aliasMartin Willi2010-08-042-0/+20
|
* Moved PKCS#11 library loading to dedicated managerMartin Willi2010-08-044-30/+135
|
* Use locking, prefer our mutex abstraction layerMartin Willi2010-08-041-1/+60
|
* Added enum names for PKCS#11 return valuesMartin Willi2010-08-042-3/+162
|
* Load PKCS#11 modules defined in strongswan.confMartin Willi2010-08-041-0/+33
|
* Implemented an abstraction layer for PKCS#11 module loadingMartin Willi2010-08-043-1/+201
|
* Imported the free pkcs11.h header form the Scute projectMartin Willi2010-08-042-1/+1358
|
* Added PKCS#11 token plugin stubMartin Willi2010-08-043-0/+108
|
* Added support for AUTH_HMAC_SHA2_256_256, used in TLSMartin Willi2010-08-031-0/+3
|
* Added support for Certificate, CRL and PKCS10 encoding to PEM pluginMartin Willi2010-07-131-0/+19
|
* Support different encoding types in certificate.get_encoding()Martin Willi2010-07-1311-50/+138
|
* Renamed key_encod{ing,der}_t and constants, prepare for generic credential ↵Martin Willi2010-07-1326-160/+160
| | | | encoding
* Moved keys/key_encoding.[ch] to cred_encoding.[ch]Martin Willi2010-07-133-3/+3
|
* Moved addrblock plugin to libcharonMartin Willi2010-07-135-292/+0
|
* Moved CRL/OCSP checking to a dedicated plugin called revocationMartin Willi2010-07-135-0/+750
|
* Moved X509 addrBlock validation to a separate addrblock pluginMartin Willi2010-07-135-0/+292
|
* Some Doxygen fixes.Tobias Brunner2010-07-051-4/+4
|
* Select subjectAltName address family using address length in openssl pluginMartin Willi2010-06-241-2/+12
|
* Select subjectAltName address family using address length in x509 pluginMartin Willi2010-06-241-1/+11
|
* Fixing compilation of the OpenSSL plugin if ENGINE support is disabled.Tobias Brunner2010-06-222-2/+14
| | | | | That is, enable compilation if OpenSSL was configured with OPENSSL_NO_ENGINE.
* Fixing compilation of the OpenSSL plugin if Elliptic Curve support is disabled.Tobias Brunner2010-06-224-3/+25
| | | | | That is, enable compilation if OpenSSL was configured with OPENSSL_NO_EC.
* Unwrap subjectKeyIdentifier from OCTET_STRINGMartin Willi2010-05-261-4/+12
|