aboutsummaryrefslogtreecommitdiffstats
path: root/src
Commit message (Collapse)AuthorAgeFilesLines
...
* | libfreeswan: Fixed compiler warning.Tobias Brunner2011-11-091-3/+2
| |
* | pkcs11: Fixed a bug when creating public keys.Tobias Brunner2011-11-091-1/+1
|/
* gcrypt does not support MD2Andreas Steffen2011-11-091-1/+0
|
* added dummy libsimaka_init() function needed for integrity testingAndreas Steffen2011-11-082-0/+13
|
* added dummy libtls_init() function needed for integrity testingAndreas Steffen2011-11-082-0/+13
|
* Fixed monolithic build of libcharon with libtnccs enabled.Tobias Brunner2011-11-081-0/+7
|
* Correctly refer to tnc-tnccs plugin when building monolithically.Tobias Brunner2011-11-081-1/+1
|
* Calculate checksums for libsimaka and libtls.Tobias Brunner2011-11-081-1/+6
| | | | | | These are currently not checked though. And because they don't define a <libname>_init function an warning is reported when the checksum is calculated.
* Defer calculation of checksums until installation.Tobias Brunner2011-11-082-31/+53
| | | | | | The checksum is now calculated from the installed libraries and plugins. This allows to calculate checksums for plugins linking to libraries like libtls as these are relinked during installation.
* Fixed formatting for longer plugin names in checksum_builder output.Tobias Brunner2011-11-081-2/+2
|
* Don't link libtnccs to checksum_builder.Tobias Brunner2011-11-082-13/+2
| | | | | Linking is only required for libraries defining global symbols used by plugins to which the plugins do not link themselves.
* Revert "fixed integrity tests of plugins using libtls or libtnccs"Tobias Brunner2011-11-0811-14/+18
| | | | | This reverts commit b597ac4a4cbcd9197b886d743c75d58293264580 (not completely).
* Revert "fixed integrity tests of plugins using libsimaka"Tobias Brunner2011-11-089-4/+8
| | | | | | | | This reverts commit 8c42f16deeeffa1ae305b18306b0796f49c9922c. Conflicts: src/charon/Makefile.am
* assign get_features methodAndreas Steffen2011-11-071-1/+1
|
* Allow support for CA-certificate retrieval in scepclient4.6.0Thomas Egerer2011-11-041-0/+21
| | | | | I think somehow this functionality got lost in the way from strongswan-2.7.0...
* Fix 'ipsec pool --status' for empty pools.Tobias Brunner2011-11-041-1/+7
|
* Syntax error in sqlite.sql fixed.Tobias Brunner2011-11-041-1/+1
|
* if available link libsimaka to checksum_builderAndreas Steffen2011-11-041-0/+4
|
* use the correct USE_SIMAKA conditionalAndreas Steffen2011-11-041-1/+1
|
* fixed integrity tests of plugins using libsimakaAndreas Steffen2011-11-049-8/+4
|
* Change order of ocsp uris when parsing a certThomas Egerer2011-11-041-1/+1
|
* Handle certificates being on hold in a CRLThomas Egerer2011-11-043-1/+14
| | | | | | | Certificates which are set on hold in a CRL might be removed from any subsequent CRL. Hence you cannot conclude that a certificate is revoked for good in this case, you would try to retrieve an update CRL to see if the certificate on hold is still on it or not.
* Memwipe request after sa update, tooThomas Egerer2011-11-041-0/+1
|
* Use chunk_clear to memwipe shared secretThomas Egerer2011-11-041-1/+1
|
* Change order of destroy/get_ref function callsThomas Egerer2011-11-041-1/+1
| | | | | Since DESTROY_IF might destroy the peer_cfg, a get_ref on a freed object is subject to fail.
* Fix resource leak in x509_ocsp_responseThomas Egerer2011-11-041-0/+4
|
* Extend xfrm_attr_type_names by newly added enum valuesThomas Egerer2011-11-041-2/+6
|
* Silently install route again, even if it did not change.Tobias Brunner2011-11-042-2/+12
| | | | | Address/interface changes can cause the route to disappear. Afterwards the route might look the same but that does not mean it is still installed.
* Compile warning fixed in kernel interfaces.Tobias Brunner2011-11-042-2/+2
|
* Common spelling errors fixed.Tobias Brunner2011-11-034-4/+4
|
* pkcs11: Make public key operations on tokens optional.Tobias Brunner2011-11-031-20/+21
|
* pkcs11: Make sure a key can be used for a given signature scheme.Tobias Brunner2011-11-023-16/+31
|
* pkcs11: Register ECDSA feature.Tobias Brunner2011-11-021-1/+10
|
* pkcs11: We have to create our own hashes for some signature schemes.Tobias Brunner2011-11-024-12/+81
|
* pkcs11: Lookup the public key of a private key by CKA_ID.Tobias Brunner2011-11-022-0/+125
| | | | | | Currently this only works if a public key object with the same ID is available, if there isn't one we could search for a certificate with the same ID and extract the key from there.
* pkcs11: Search for private keys in a more generic way.Tobias Brunner2011-11-021-20/+19
| | | | | | Also, don't extract the public key directly from the private key. Some tokens actually do not return the public exponent (it's not required). We have to find a different way to get the public key.
* pkcs11: Added support to encode ECDSA public keys.Tobias Brunner2011-11-021-0/+89
|
* pkcs11: Parse ECDSA public keys and find/create them on tokens.Tobias Brunner2011-11-021-2/+177
|
* pkcs11: Added generic functions to find/create public keys on tokens.Tobias Brunner2011-11-021-40/+75
|
* pkcs11: Store public key length in bits.Tobias Brunner2011-11-021-3/+3
|
* pkcs11: Fix encoding of RSA public keys.Tobias Brunner2011-11-021-0/+4
|
* pkcs11: Use create_object_attr_enumerator to encode RSA public key.Tobias Brunner2011-11-021-17/+7
|
* pkcs11: Instead of a mutex use a new session to do multipart operations.Tobias Brunner2011-11-022-40/+66
|
* pkcs11: Function added to retrieve multiple attributes from a single object.Tobias Brunner2011-11-022-6/+62
|
* pkcs11: Memory leak fixed in DH/ECDH implementation.Tobias Brunner2011-11-021-0/+2
|
* pkcs11: Invalid free fixed in DH/ECDH implementation.Tobias Brunner2011-11-021-1/+4
|
* pkcs11: Changed how pkcs11-manager is initialized.Tobias Brunner2011-11-021-42/+32
| | | | | The manager is now created directly, but events and certificate loading is deferred.
* pkcs11: Add attributes to specify what we use the DH/ECDH keys for.Tobias Brunner2011-11-021-2/+10
|
* charon must load libtls if availableAndreas Steffen2011-11-021-0/+4
|
* fixed integrity tests of plugins using libtls or libtnccsAndreas Steffen2011-11-0214-18/+43
|