aboutsummaryrefslogtreecommitdiffstats
path: root/src/pki/commands/issue.c
Commit message (Collapse)AuthorAgeFilesLines
* pki: Enable PSS padding if enabled in strongswan.confTobias Brunner2017-11-081-1/+3
|
* pki: Optionally generate RSA/PSS signaturesTobias Brunner2017-11-081-6/+19
|
* pki: Reset variable so error handling works properlyTobias Brunner2017-04-191-0/+1
| | | | | If we jump to `end` without this we crash (not necessarily visibly) due to a double free and the actual error message is not printed.
* pki: Edited keyid parameter use in various pki man pages and usage outputsAndreas Steffen2017-03-061-2/+2
|
* pki: Support an --addrblock option for issued certificatesMartin Willi2017-02-271-1/+16
|
* Added support of EdDSA signaturesAndreas Steffen2016-12-141-2/+7
|
* pki: Add generic 'priv' key type that loads any type of private keyTobias Brunner2016-10-051-1/+6
|
* Support BLISS signatures with SHA-3 hashAndreas Steffen2015-11-031-1/+2
|
* pki: Add new type options to --issue command usage outputTobias Brunner2015-08-271-2/+2
|
* pki: Optionally extract public key from given private key in --issueTobias Brunner2015-08-101-4/+27
| | | | Fixes #618.
* pki: Choose default digest based on the signature keyTobias Brunner2015-03-231-2/+6
|
* pki: Use SHA-256 as default for signaturesTobias Brunner2015-03-231-10/+2
| | | | | | Since the BLISS private key supports this we don't do any special handling anymore (if the user choses a digest that is not supported, signing will simply fail later because no signature scheme will be found).
* Allow SHA256 and SHA384 data hash for BLISS signatures.Andreas Steffen2015-02-261-3/+7
| | | | | The default is SHA512 since this hash function is also used for the c_indices random oracle.
* Implemented full BLISS support for IKEv2 public key authentication and the ↵Andreas Steffen2014-11-291-0/+6
| | | | pki tool
* pki: Switch to binary mode on Windows when reading/writing DER to FDsMartin Willi2014-06-041-0/+2
|
* enum: Return boolean result for enum_from_name() lookupMartin Willi2014-05-161-2/+1
| | | | | | | | | | | Handling the result for enum_from_name() is difficult, as checking for negative return values requires a cast if the enum type is unsigned. The new signature clearly differentiates lookup result from lookup value. Further, this actually allows to convert real -1 enum values, which could not be distinguished from "not-found" and the -1 return value. This also fixes several clang warnings where enums are unsigned.
* Added support for msSmartcardLogon EKUAndreas Steffen2014-04-081-1/+5
|
* pki: Support absolute --not-before/after issued certificate lifetimesMartin Willi2014-03-311-6/+21
|
* pki: Don't generate negative random serial numbers in X.509 certificatesMartin Willi2014-03-311-0/+1
| | | | According to RFC 5280 4.1.2.2 we MUST force non-negative serial numbers.
* chunk: Use dynamically allocated buffer in chunk_from_fd()Martin Willi2014-01-231-3/+13
| | | | | | | | When acting on files, we can use fstat() to estimate the buffer size. On non-file FDs, we dynamically increase an allocated buffer. Additionally we slightly change the function signature to properly handle zero-length files and add appropriate unit tests.
* pki: Replace BUILD_FROM_FD with passing a chunk via BUILD_BLOBTobias Brunner2013-10-231-2/+10
| | | | This allows more than one builder to try parsing the data read from STDIN.
* pki: Add pki --issue man pageTobias Brunner2013-09-131-6/+6
|
* Moved debug.[ch] to utils folderTobias Brunner2012-10-241-1/+1
|
* Moved data structures to new collections subfolderTobias Brunner2012-10-241-1/+1
|
* Use centralized hasher names in pki utilityMartin Willi2012-07-171-2/+2
|
* Check rng return value when generating serial numbers in pki utilityTobias Brunner2012-07-161-4/+4
|
* Merge branch 'ikev1-clean' into ikev1-masterMartin Willi2012-03-201-0/+4
|\ | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Conflicts: configure.in man/ipsec.conf.5.in src/libcharon/daemon.c src/libcharon/plugins/eap_ttls/eap_ttls_peer.c src/libcharon/plugins/eap_radius/eap_radius_accounting.c src/libcharon/plugins/eap_radius/eap_radius_forward.c src/libcharon/plugins/farp/farp_listener.c src/libcharon/sa/ike_sa.c src/libcharon/sa/keymat.c src/libcharon/sa/task_manager.c src/libcharon/sa/trap_manager.c src/libstrongswan/plugins/x509/x509_cert.c src/libstrongswan/utils.h Applied lost changes of moved files keymat.c and task_manager.c. Updated listener_t.message hook signature in new plugins.
| * Added support for iKEIntermediate flag to ipsec pki.Tobias Brunner2012-03-201-0/+4
| |
* | pki: Avoid integer overflow when calculating certificate lifetimes.Tobias Brunner2011-12-231-1/+1
|/ | | | This only works properly if sizeof(time_t) > 4.
* use DN from pkcs10 request if it existsAndreas Steffen2011-02-071-5/+6
|
* Added support for empty subjects DNs to pki --issueMartin Willi2011-01-051-8/+7
|
* Slightly renamed different policyConstraints to distinguish them betterMartin Willi2011-01-051-6/+6
|
* Added inhibitAnyPolicy constraint support to pki toolMartin Willi2011-01-051-2/+7
|
* Added support for delta CRLs to pki toolMartin Willi2011-01-051-1/+1
|
* Simplified format of x509 CRL URI parsing/enumeratorMartin Willi2011-01-051-9/+24
|
* Added policyConstraints support to pki toolMartin Willi2011-01-051-24/+36
|
* Slightly renamed X509_NO_PATH_LEN_CONSTRAINT to use it for ↵Martin Willi2011-01-051-1/+1
| | | | PolicyConstraints, too
* Added policyMappings support to pki toolMartin Willi2011-01-051-6/+51
|
* Added certificatePolicy options to pki toolMartin Willi2011-01-051-2/+50
|
* pki --issue/self support permitted/excluded NameConstraintsMartin Willi2011-01-051-2/+21
|
* pki tool shows and builds crlSign keyUsageMartin Willi2011-01-051-1/+5
|
* Added --crlissuer option to pki --issueMartin Willi2011-01-051-18/+25
|
* Added PKCS#11 private key support to the pki toolMartin Willi2010-08-041-9/+25
|
* Added pki PEM encoding support for certificates, CRLs and PKCS10 requestsMartin Willi2010-07-131-4/+12
|
* Support different encoding types in certificate.get_encoding()Martin Willi2010-07-131-2/+1
|
* Changed default lifetime of certificates to 3 yearsMartin Willi2010-05-311-2/+2
|
* Adding DBG_LIB to all calls of libstrongswan's version of DBG*.Tobias Brunner2010-04-061-4/+4
|
* we don't accept a serial number with leading zeroesAndreas Steffen2010-03-141-0/+5
|
* Support TLS client authentication Extended Key Usage in x509 generationMartin Willi2010-01-141-1/+5
|
* ipsec pki --self|issue supports --pathlen option setting a path length ↵Andreas Steffen2009-12-311-2/+8
| | | | constraint