aboutsummaryrefslogtreecommitdiffstats
path: root/src/libstrongswan
Commit message (Collapse)AuthorAgeFilesLines
...
* support generation of EC certificatesMartin Willi2009-08-271-16/+9
|
* added support for SIGN_ECDSA_WITH_SHA1 signature scheme in opensslMartin Willi2009-08-271-18/+20
|
* create algorithmIdentifier dynamically from OID databaseMartin Willi2009-08-277-152/+15
|
* pkcs1 encoder supports subjectPublicKeyInfo encodingMartin Willi2009-08-271-60/+66
|
* fixed memleak in openssl fingerprintingMartin Willi2009-08-272-0/+2
|
* do openssl fingerprinting/encoding directly, openssl provides all functionsMartin Willi2009-08-277-237/+148
|
* key encoding gained a cache() method, allows caching of externally created ↵Martin Willi2009-08-272-1/+40
| | | | encodings
* encoding public EC keys is not really possible without subjectPublicKeyInfoMartin Willi2009-08-262-28/+56
|
* complain about build errors in non-recursive cases onlyMartin Willi2009-08-261-2/+16
|
* moved chunk_increment() function to libstrongswanMartin Willi2009-08-262-0/+26
|
* added a BUILD_FROM_FD option, supporting credential parsing from stdinMartin Willi2009-08-264-1/+48
|
* started implementation of a PKI tool, currently supporting RSA|ECDSA key ↵Martin Willi2009-08-261-0/+3
| | | | generation
* implemented openssl EC key generationMartin Willi2009-08-261-0/+42
|
* fixed openssl RSA private key encodingMartin Willi2009-08-261-3/+3
|
* updated agent plugin to new fingerprint/encoding APIMartin Willi2009-08-261-157/+53
|
* updated pubkey plugin to new fingerprinting APIMartin Willi2009-08-261-20/+48
|
* updated x509 plugin to public key/x509 API changesMartin Willi2009-08-265-154/+134
|
* updated x509/CRL/AC API to align with public key, authKeyIdentifier is a chunkMartin Willi2009-08-263-9/+9
|
* updated openssl plugin to new private/public key API, use encoder frameworkMartin Willi2009-08-268-511/+333
|
* updated gcrypt plugin to new private/public key API, use encoder frameworkMartin Willi2009-08-262-218/+96
|
* updated gmp plugin to new private/public key API, use encoder frameworkMartin Willi2009-08-262-280/+130
|
* changed get_id/get_encoding API of private/public key to use new encoding ↵Martin Willi2009-08-262-27/+32
| | | | framework
* removed obsolete fingerprint identification typesMartin Willi2009-08-262-43/+23
|
* added generic implementation helpers for private_key_t.equals/belongs_to, ↵Martin Willi2009-08-264-3/+97
| | | | public_key_t.equals
* added a seperate chache lookup, as encode() requires arguments expensive to ↵Martin Willi2009-08-262-0/+34
| | | | build
* use credential builder API to parse trusted public keysMartin Willi2009-08-261-11/+11
|
* implemented PGP fingerprintingMartin Willi2009-08-264-0/+107
|
* implemented pkcs1 private/public key encoding and fingerprintingMartin Willi2009-08-264-0/+193
|
* chunk_cat/cata/create_cat/length accept the sensitive data clearing mode 's'Martin Willi2009-08-262-10/+19
|
* in addition to 'm'/'c' mode, asn1_wrap accepts a 's' mode clearing sensitive ↵Martin Willi2009-08-262-3/+14
| | | | information
* added a facility to hand out fingerprinting/key encoding to the ↵Martin Willi2009-08-265-0/+429
| | | | pkcs1/pgp/... plugins
* gmp uses component builder to build public- from private-keyMartin Willi2009-08-262-47/+37
|
* gcrypt uses component builder to build public- from private-keyMartin Willi2009-08-262-37/+12
|
* moved PGP code to pluto and gpg pluginMartin Willi2009-08-266-314/+36
|
* gmp plugin makes use of pkcs1/pgp/dnskey pluginsMartin Willi2009-08-262-477/+99
|
* enforce RSA_PRIME1 > RSA_PRIME2 (p > q) in PGPMartin Willi2009-08-262-4/+5
|
* implemented RFC3110 key builder in a plugin, added generic DNSKEY RR parsingMartin Willi2009-08-266-0/+343
|
* renamed BUILD_BLOB_RFC_3110 to BUILD_BLOB_DNSKEY, we potentially support ↵Martin Willi2009-08-264-5/+5
| | | | other key types
* implemented a pgp plugin providing PGP key parsing buildersMartin Willi2009-08-266-0/+593
|
* make use of the pkcs1 plugin in gcrypt rsa key parsingMartin Willi2009-08-262-190/+76
|
* removed subjectPublicKeyInfo parsing, provided by pkcs1 pluginMartin Willi2009-08-264-208/+1
|
* implemented a pkcs1 plugin providing PKCS#1 key parsing buildersMartin Willi2009-08-269-0/+578
|
* show more information if building a credential failsMartin Willi2009-08-261-2/+10
|
* added getnetbyname/gethostbyname2 to leak detective whitelist, used by plutoMartin Willi2009-08-261-0/+2
|
* do not enumerate builders returning NULLMartin Willi2009-08-261-2/+8
|
* handle pluto specific certificates under CRED_CERTIFICATE, not as own ↵Martin Willi2009-08-265-22/+19
| | | | credential kind
* removed obsolete PEM code in pluto/libstrongswanMartin Willi2009-08-263-423/+0
|
* use a pluto specific credential builder to build pluto cert_t'sMartin Willi2009-08-265-4/+33
|
* pass along X509 flags when loading PEM encoded dataMartin Willi2009-08-261-2/+11
|
* make use of the pem helper plugin to load credentialsMartin Willi2009-08-268-184/+26
|