aboutsummaryrefslogtreecommitdiffstats
path: root/src
Commit message (Expand)AuthorAgeFilesLines
...
| * Added android.net.VpnService wrapper around charon (loaded via JNI).Tobias Brunner2012-08-086-6/+228
| * Added Android shell app created with Android SDK.Tobias Brunner2012-08-0811-0/+118
| * Android.mk for NDK build added.Tobias Brunner2012-08-084-0/+96
| * Moved Android specific logger to separate plugin.Tobias Brunner2012-08-089-33/+168
| * Link android plugin against liblog in the NDK.Tobias Brunner2012-08-081-0/+1
| * Make the UDP ports charon listens for packets on (and uses as source ports) c...Tobias Brunner2012-08-0817-48/+66
| * Make path to Android OpenSSL headers configurable.Tobias Brunner2012-08-081-1/+1
| * Don't require STRONGSWAN_CONF to be defined.Tobias Brunner2012-08-081-2/+9
| * Don't require PLUGINDIR to be defined.Tobias Brunner2012-08-081-6/+15
* | Doxygen fixTobias Brunner2012-08-111-1/+1
* | Avoid problems with Doxygen by adding warn_unused_result attribute at the end...Tobias Brunner2012-08-119-61/+57
* | Add warn_unused_result attributes to rng_(get|allocate)_bytes_not_zeroTobias Brunner2012-08-111-5/+6
* | If _POSIX_SPIN_LOCKS is defined as -1, it is not availableMartin Willi2012-08-101-0/+4
* | If vstr printf functions are #defined, undef them before redefinitionMartin Willi2012-08-101-0/+31
* | Use actual daemon name to enable XAuth/PSK with aggressive modeMartin Willi2012-08-101-2/+3
* | EAP-GTC can use any XAuth backend, including xauth-pamMartin Willi2012-08-102-88/+45
* | Add xauth-pam, an XAuth backend verifying credentials with PAMMartin Willi2012-08-106-0/+390
* | Add getspnam_r() to leak detective whitelistMartin Willi2012-08-101-0/+1
* | make max_message_size parameter consistent with similar optionsAndreas Steffen2012-08-092-2/+2
* | Check if TLS handshake received Finished before processing application dataMartin Willi2012-08-091-0/+6
|/
* Remove queued IKEv1 message before processing itMartin Willi2012-08-081-3/+5
* Include src address in hash of initial message for Main ModeTobias Brunner2012-08-081-5/+31
* implemented deletion of product_file database entriesAndreas Steffen2012-08-071-15/+13
* Add DH group 15 (MODP-3072) to IKE proposalAdrian-Ken Rueegsegger2012-08-061-0/+1
* PEM loading soft-depends on MD5 only, as unencrypted files don't need MD5Martin Willi2012-08-031-4/+4
* Rebuild charon after running ./configure to reflect plugin changesMartin Willi2012-08-031-0/+2
* Block XAuth transaction on established IKE_SAs, but allow Mode ConfigMartin Willi2012-08-032-2/+1
* Implemented recursive mutex without thread-specific counterTobias Brunner2012-08-031-23/+17
* Use a single thread-specific value for our custom rwlock_t implementationTobias Brunner2012-08-031-50/+67
* Fix linking of addrblock plugin when building monolithicMartin Willi2012-08-031-1/+1
* Reject initial exchange messages early once IKE_SA is establishedMartin Willi2012-08-021-0/+18
* Move MODP_CUSTOM va_arg fetching out of loopMartin Willi2012-08-021-15/+11
* libimcv requires nonce pluginAndreas Steffen2012-07-311-1/+1
* Lookup IKEv1 PSK even if the peer identity is not knownMartin Willi2012-07-311-1/+1
* update state before handling statusAndreas Steffen2012-07-301-16/+20
* implemented support if functional sub-componentsAndreas Steffen2012-07-3019-285/+630
* extended and documented ipsec attestAndreas Steffen2012-07-304-46/+107
* Proper fallback if capability dropping is not availableTobias Brunner2012-07-274-2/+9
* The use of $< in Makefiles is not portableTobias Brunner2012-07-273-5/+5
* Include stdint.h for UINTxx_MAX definesTobias Brunner2012-07-271-2/+3
* measure all kernel modules and optimize firefox and thunderbird measurementsAndreas Steffen2012-07-271-34/+14
* with --relative --file do not insert absolute filenames into databaseAndreas Steffen2012-07-271-3/+5
* Don't include acquiring packet traffic selectors in IKEv1Martin Willi2012-07-261-0/+5
* Implement late peer config switching after XAuth authenticationMartin Willi2012-07-261-15/+80
* Check if XAuth round complies to configured authentication roundMartin Willi2012-07-261-7/+18
* Show which group would be required when failing in constraint checkMartin Willi2012-07-261-8/+10
* Don't add ANY identity constraint to auth config, as XAuth rounds don't use oneMartin Willi2012-07-262-3/+15
* Merge auth config items added from XAuth backends to IKE_SAMartin Willi2012-07-261-0/+1
* Add an ipsec.conf leftgroups2 parameter for the second authentication roundMartin Willi2012-07-268-3/+15
* IMA SHA1 file measurement is not needed any moreAndreas Steffen2012-07-231-9/+1