Commit message (Collapse) | Author | Age | Files | Lines | |
---|---|---|---|---|---|
* | pki: Enable PSS padding if enabled in strongswan.conf | Tobias Brunner | 2017-11-08 | 5 | -5/+11 |
| | |||||
* | pki: Optionally generate RSA/PSS signatures | Tobias Brunner | 2017-11-08 | 5 | -35/+102 |
| | |||||
* | pki: Indent usage lines properly automatically | Tobias Brunner | 2017-11-08 | 4 | -9/+9 |
| | |||||
* | pki: Properly forward digest to attribute certificate builder | Tobias Brunner | 2017-11-08 | 1 | -0/+1 |
| | |||||
* | certificates: Use shared destructor for x509_cdp_t | Tobias Brunner | 2017-09-18 | 1 | -11/+2 |
| | |||||
* | Change interface for enumerator_create_filter() callback | Tobias Brunner | 2017-05-26 | 1 | -10/+18 |
| | | | | | This avoids the unportable 5 pointer hack, but requires enumerating in the callback. | ||||
* | pki: Reset variable so error handling works properly | Tobias Brunner | 2017-04-19 | 1 | -0/+1 |
| | | | | | If we jump to `end` without this we crash (not necessarily visibly) due to a double free and the actual error message is not printed. | ||||
* | pki: Actually make the default key type KEY_ANY for --self | Tobias Brunner | 2017-03-24 | 1 | -1/+1 |
| | | | | | Fixes: 05ccde0a8bd9 ("pki: Add generic 'priv' key type that loads any type of private key") | ||||
* | pki: Add key object handle of smartcard or TPM private key as an argument to ↵ | Andreas Steffen | 2017-03-06 | 1 | -3/+17 |
| | | | | pki --keyid | ||||
* | pki: Edited keyid parameter use in various pki man pages and usage outputs | Andreas Steffen | 2017-03-06 | 6 | -13/+14 |
| | |||||
* | Add keyid of smartcard or TPM private key as an argument to pki --req | Andreas Steffen | 2017-03-02 | 1 | -2/+15 |
| | |||||
* | pki: Support an --addrblock option for issued certificates | Martin Willi | 2017-02-27 | 1 | -1/+16 |
| | |||||
* | pki: Support an --addrblock option for self-signed certificates | Martin Willi | 2017-02-27 | 1 | -0/+17 |
| | |||||
* | Added support of EdDSA signatures | Andreas Steffen | 2016-12-14 | 4 | -8/+30 |
| | |||||
* | pki: Don't remove zero bytes in CRL serials anymore | Tobias Brunner | 2016-10-11 | 1 | -6/+7 |
| | | | | | | This was added a few years ago because pki --signcrl once encoded serials incorrectly as eight byte blobs. But still ensure we have can handle overflows in case the serial is encoded incorrectly without zero-prefix. | ||||
* | pki: Use serial of base CRL for delta CRLs | Tobias Brunner | 2016-10-11 | 1 | -1/+4 |
| | | | | | According to RFC 5280 delta CRLs and complete CRLs MUST share one numbering sequence. | ||||
* | pki: Add generic 'priv' key type that loads any type of private key | Tobias Brunner | 2016-10-05 | 6 | -13/+41 |
| | |||||
* | pki: Drop -priv suffix to specify private key types | Tobias Brunner | 2016-10-05 | 2 | -9/+15 |
| | |||||
* | pki: Allow to load CRLs from files in --verify | Tobias Brunner | 2016-08-25 | 1 | -2/+16 |
| | |||||
* | Standardized printing of certificate information | Andreas Steffen | 2015-12-11 | 1 | -523/+20 |
| | | | | | | | The certificate_printer class allows the printing of certificate information to a text file (usually stdout). This class is used by the pki --print and swanctl --list-certs commands as well as by the stroke plugin. | ||||
* | Support BLISS signatures with SHA-3 hash | Andreas Steffen | 2015-11-03 | 5 | -5/+9 |
| | |||||
* | pki: Add new type options to --issue command usage output | Tobias Brunner | 2015-08-27 | 1 | -2/+2 |
| | |||||
* | pki: Add --dn command to extract the subject DN of a certificate | Tobias Brunner | 2015-08-17 | 1 | -0/+146 |
| | |||||
* | pki: Optionally extract public key from given private key in --issue | Tobias Brunner | 2015-08-10 | 1 | -4/+27 |
| | | | | Fixes #618. | ||||
* | pki: Choose default digest based on the signature key | Tobias Brunner | 2015-03-23 | 5 | -10/+30 |
| | |||||
* | pki: Use SHA-256 as default for signatures | Tobias Brunner | 2015-03-23 | 5 | -50/+10 |
| | | | | | | Since the BLISS private key supports this we don't do any special handling anymore (if the user choses a digest that is not supported, signing will simply fail later because no signature scheme will be found). | ||||
* | Allow SHA256 and SHA384 data hash for BLISS signatures. | Andreas Steffen | 2015-02-26 | 7 | -16/+36 |
| | | | | | The default is SHA512 since this hash function is also used for the c_indices random oracle. | ||||
* | pki: Document correct output formats for --pkcs12 --export | Tobias Brunner | 2014-12-19 | 1 | -2/+2 |
| | |||||
* | pki: Properly clean up if output format for --pkcs12 is wrong | Tobias Brunner | 2014-12-19 | 1 | -0/+2 |
| | |||||
* | pki: Add command to export certificates and keys from PKCS#12 containers | Tobias Brunner | 2014-12-12 | 1 | -9/+101 |
| | |||||
* | pki: Reformat PKCS#12 output and add an index for each certificate/key | Tobias Brunner | 2014-12-12 | 1 | -11/+14 |
| | |||||
* | pki: Add simple PKCS#12 display command | Tobias Brunner | 2014-12-12 | 1 | -0/+150 |
| | |||||
* | Implemented full BLISS support for IKEv2 public key authentication and the ↵ | Andreas Steffen | 2014-11-29 | 6 | -3/+37 |
| | | | | pki tool | ||||
* | Started implementing BLISS signature generation | Andreas Steffen | 2014-11-29 | 1 | -2/+8 |
| | |||||
* | Store and parse BLISS private and public keys in DER and PEM format | Andreas Steffen | 2014-11-29 | 2 | -4/+17 |
| | | | | | | | | Additionally generate SHA-1 fingerprints of raw BLISS subjectPublicKey and subjectPublicKeyInfo objects. Some basic functions used by the bliss_public_key class are shared with the bliss_private_key class. | ||||
* | Created framework for BLISS post-quantum signature algorithm | Andreas Steffen | 2014-11-29 | 1 | -3/+11 |
| | |||||
* | pki: Print and document the name constraint type for DNS or email constraints | Martin Willi | 2014-10-30 | 1 | -2/+18 |
| | | | | | As email constraints may be for a specific host, it is not clear from the name itself if it is a DNS or email constraint. | ||||
* | pki: Support complex trustchain and revocation checking in --verify | Martin Willi | 2014-06-04 | 1 | -48/+86 |
| | |||||
* | pki: Switch to binary mode on Windows when reading/writing DER to FDs | Martin Willi | 2014-06-04 | 11 | -1/+16 |
| | |||||
* | enum: Return boolean result for enum_from_name() lookup | Martin Willi | 2014-05-16 | 5 | -10/+5 |
| | | | | | | | | | | | Handling the result for enum_from_name() is difficult, as checking for negative return values requires a cast if the enum type is unsigned. The new signature clearly differentiates lookup result from lookup value. Further, this actually allows to convert real -1 enum values, which could not be distinguished from "not-found" and the -1 return value. This also fixes several clang warnings where enums are unsigned. | ||||
* | pki: Fix memory leak when printing unknown AC group OIDs | Tobias Brunner | 2014-04-09 | 1 | -0/+1 |
| | |||||
* | pki: Removed extra continue statement | Tobias Brunner | 2014-04-09 | 1 | -1/+0 |
| | |||||
* | Added support for msSmartcardLogon EKU | Andreas Steffen | 2014-04-08 | 3 | -2/+14 |
| | |||||
* | pki: Support absolute --this/next-update CRL lifetimes | Martin Willi | 2014-03-31 | 1 | -6/+22 |
| | |||||
* | pki: Support absolute --not-before/after issued certificate lifetimes | Martin Willi | 2014-03-31 | 1 | -6/+21 |
| | |||||
* | pki: Support absolute --not-before/after self-signed certificate lifetimes | Martin Willi | 2014-03-31 | 1 | -5/+22 |
| | |||||
* | pki: Support absolute --not-before/after acert lifetimes | Martin Willi | 2014-03-31 | 1 | -7/+26 |
| | |||||
* | pki: Implement an acert command to issue attribute certificates | Martin Willi | 2014-03-31 | 1 | -0/+273 |
| | |||||
* | pki: Support printing attribute certificates | Martin Willi | 2014-03-31 | 1 | -1/+89 |
| | |||||
* | pki: Don't generate negative random serial numbers in X.509 certificates | Martin Willi | 2014-03-31 | 2 | -0/+2 |
| | | | | According to RFC 5280 4.1.2.2 we MUST force non-negative serial numbers. |