aboutsummaryrefslogtreecommitdiffstats
path: root/src
Commit message (Collapse)AuthorAgeFilesLines
...
* | Fixed proposal numbering check in sa_payloadMartin Willi2011-11-211-10/+0
| |
* | Fix copy'n'paste error in libhydra's netlink interfaceThomas Jarosch2011-11-211-1/+1
| | | | | | | | Detected by cppcheck.
* | Fix unaligned aliasing warning in raw socketMartin Willi2011-11-171-5/+4
| |
* | Fix network interface deletion handling in kernel-netlink plugin.Mirko Parthey2011-11-141-3/+7
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | When the kernel reports the deletion of an interface (RTM_DELLINK), the cached interface attributes, including ifindex, become invalid and must be forgotten. Interface link state changes ("up" and "down") show up as RTM_NEWLINK, so they will not cause a cached entry to be removed or prevent listening to address change notifications. Once an interface has been deleted, the kernel ought to stop sending notifications for it. If the interface gets recreated with the same name later, the kernel again reports RTM_NEWLINK, which causes a new cache entry to be created. There should be no reason to keep a stale cache entry around, as was claimed in the comment.
* | libfreeswan: Fixed compiler warning.Tobias Brunner2011-11-091-3/+2
| |
* | pkcs11: Fixed a bug when creating public keys.Tobias Brunner2011-11-091-1/+1
|/
* gcrypt does not support MD2Andreas Steffen2011-11-091-1/+0
|
* added dummy libsimaka_init() function needed for integrity testingAndreas Steffen2011-11-082-0/+13
|
* added dummy libtls_init() function needed for integrity testingAndreas Steffen2011-11-082-0/+13
|
* Fixed monolithic build of libcharon with libtnccs enabled.Tobias Brunner2011-11-081-0/+7
|
* Correctly refer to tnc-tnccs plugin when building monolithically.Tobias Brunner2011-11-081-1/+1
|
* Calculate checksums for libsimaka and libtls.Tobias Brunner2011-11-081-1/+6
| | | | | | These are currently not checked though. And because they don't define a <libname>_init function an warning is reported when the checksum is calculated.
* Defer calculation of checksums until installation.Tobias Brunner2011-11-082-31/+53
| | | | | | The checksum is now calculated from the installed libraries and plugins. This allows to calculate checksums for plugins linking to libraries like libtls as these are relinked during installation.
* Fixed formatting for longer plugin names in checksum_builder output.Tobias Brunner2011-11-081-2/+2
|
* Don't link libtnccs to checksum_builder.Tobias Brunner2011-11-082-13/+2
| | | | | Linking is only required for libraries defining global symbols used by plugins to which the plugins do not link themselves.
* Revert "fixed integrity tests of plugins using libtls or libtnccs"Tobias Brunner2011-11-0811-14/+18
| | | | | This reverts commit b597ac4a4cbcd9197b886d743c75d58293264580 (not completely).
* Revert "fixed integrity tests of plugins using libsimaka"Tobias Brunner2011-11-089-4/+8
| | | | | | | | This reverts commit 8c42f16deeeffa1ae305b18306b0796f49c9922c. Conflicts: src/charon/Makefile.am
* assign get_features methodAndreas Steffen2011-11-071-1/+1
|
* Allow support for CA-certificate retrieval in scepclient4.6.0Thomas Egerer2011-11-041-0/+21
| | | | | I think somehow this functionality got lost in the way from strongswan-2.7.0...
* Fix 'ipsec pool --status' for empty pools.Tobias Brunner2011-11-041-1/+7
|
* Syntax error in sqlite.sql fixed.Tobias Brunner2011-11-041-1/+1
|
* if available link libsimaka to checksum_builderAndreas Steffen2011-11-041-0/+4
|
* use the correct USE_SIMAKA conditionalAndreas Steffen2011-11-041-1/+1
|
* fixed integrity tests of plugins using libsimakaAndreas Steffen2011-11-049-8/+4
|
* Change order of ocsp uris when parsing a certThomas Egerer2011-11-041-1/+1
|
* Handle certificates being on hold in a CRLThomas Egerer2011-11-043-1/+14
| | | | | | | Certificates which are set on hold in a CRL might be removed from any subsequent CRL. Hence you cannot conclude that a certificate is revoked for good in this case, you would try to retrieve an update CRL to see if the certificate on hold is still on it or not.
* Memwipe request after sa update, tooThomas Egerer2011-11-041-0/+1
|
* Use chunk_clear to memwipe shared secretThomas Egerer2011-11-041-1/+1
|
* Change order of destroy/get_ref function callsThomas Egerer2011-11-041-1/+1
| | | | | Since DESTROY_IF might destroy the peer_cfg, a get_ref on a freed object is subject to fail.
* Fix resource leak in x509_ocsp_responseThomas Egerer2011-11-041-0/+4
|
* Extend xfrm_attr_type_names by newly added enum valuesThomas Egerer2011-11-041-2/+6
|
* Silently install route again, even if it did not change.Tobias Brunner2011-11-042-2/+12
| | | | | Address/interface changes can cause the route to disappear. Afterwards the route might look the same but that does not mean it is still installed.
* Compile warning fixed in kernel interfaces.Tobias Brunner2011-11-042-2/+2
|
* Common spelling errors fixed.Tobias Brunner2011-11-034-4/+4
|
* pkcs11: Make public key operations on tokens optional.Tobias Brunner2011-11-031-20/+21
|
* pkcs11: Make sure a key can be used for a given signature scheme.Tobias Brunner2011-11-023-16/+31
|
* pkcs11: Register ECDSA feature.Tobias Brunner2011-11-021-1/+10
|
* pkcs11: We have to create our own hashes for some signature schemes.Tobias Brunner2011-11-024-12/+81
|
* pkcs11: Lookup the public key of a private key by CKA_ID.Tobias Brunner2011-11-022-0/+125
| | | | | | Currently this only works if a public key object with the same ID is available, if there isn't one we could search for a certificate with the same ID and extract the key from there.
* pkcs11: Search for private keys in a more generic way.Tobias Brunner2011-11-021-20/+19
| | | | | | Also, don't extract the public key directly from the private key. Some tokens actually do not return the public exponent (it's not required). We have to find a different way to get the public key.
* pkcs11: Added support to encode ECDSA public keys.Tobias Brunner2011-11-021-0/+89
|
* pkcs11: Parse ECDSA public keys and find/create them on tokens.Tobias Brunner2011-11-021-2/+177
|
* pkcs11: Added generic functions to find/create public keys on tokens.Tobias Brunner2011-11-021-40/+75
|
* pkcs11: Store public key length in bits.Tobias Brunner2011-11-021-3/+3
|
* pkcs11: Fix encoding of RSA public keys.Tobias Brunner2011-11-021-0/+4
|
* pkcs11: Use create_object_attr_enumerator to encode RSA public key.Tobias Brunner2011-11-021-17/+7
|
* pkcs11: Instead of a mutex use a new session to do multipart operations.Tobias Brunner2011-11-022-40/+66
|
* pkcs11: Function added to retrieve multiple attributes from a single object.Tobias Brunner2011-11-022-6/+62
|
* pkcs11: Memory leak fixed in DH/ECDH implementation.Tobias Brunner2011-11-021-0/+2
|
* pkcs11: Invalid free fixed in DH/ECDH implementation.Tobias Brunner2011-11-021-1/+4
|