aboutsummaryrefslogtreecommitdiffstats
path: root/src
Commit message (Collapse)AuthorAgeFilesLines
...
* | Fixed some typos in Ukrainian translationPavel Kopchyk2013-01-091-15/+16
| |
* | conftest: Add support for time_format and ike_name options in log sectionsThomas Klute2013-01-081-1/+18
| | | | | | | | | | | | Both options are well supported for normal operation but were completely ignored by conftest, which used hard coded defaults. File options are still missing but could be added in a similar way.
* | conftest: Fix log level settings for stdoutThomas Klute2013-01-081-0/+3
| | | | | | | | | | | | | | | | | | | | | | | | This patch fixes bug #272 ("conftest ignores log settings for stdout"). http://wiki.strongswan.org/issues/272 According to the documentation of add_logger in src/libcharon/bus/bus.h, the relevant log levels of a logger are registered with the logging subsystem when adding the logger. If the log levels change later, the logger must be re-added to propagate the new settings. In conftest.c, the stdout logger is initialized and added before reading the logging settings, but wasn't re-added after reading the settings.
* | conftest: Make outgoing sequence number set by reset_seq configurableThomas Klute2013-01-082-8/+70
| | | | | | | | | | | | | | | | This is useful for certain test cases. Passing the sequence number to the callback requires a new struct that contains both the number and the xfrm_usersa_id. The new configuration parameter is called oseq in accordance with the kernel name, see the comment in the reset_cb callback function for details.
* | Include opensslconf.h before checking its definesMartin Willi2013-01-031-0/+2
| |
* | Don't build OpenSSL PKCS#7 code if OPENSSL_NO_CMS definedMartin Willi2013-01-031-0/+4
| |
* | make pacman.sh run under cronAndreas Steffen2012-12-261-9/+13
| |
* | deleted newly constructed attributes in send_assessmentAndreas Steffen2012-12-243-21/+7
| |
* | Added Russian and Ukrainian strings for Android clientDmitry Korzhevin2012-12-244-0/+252
|/
* Add parantheses to avoid compiler warningMartin Willi2012-12-241-1/+1
|
* Send empty CDATA batch if TNC client has no data to sendAndreas Steffen2012-12-231-16/+28
|
* Fixed some typos, courtesy of codespellTobias Brunner2012-12-2010-11/+11
|
* Raise an alert if IKE SA is keptAdrian-Ken Rueegsegger2012-12-202-0/+3
| | | | | This alert is raised when the establishment of a child SA fails but the IKE SA is kept.
* stroke: Drop unneeded [MY|OTHER]_NETBITSReto Buerki2012-12-191-2/+2
|
* stroke: Enable install_policy in add_connection()Reto Buerki2012-12-191-0/+1
|
* Add support for draft-ietf-ipsec-nat-t-ike-03 and earlierVolker RĂ¼melin2012-12-1914-90/+311
| | | | | This adds support for early versions of the draft that eventually resulted in RFC 3947.
* Add missing error_notify_msg.h to distribution tarballMartin Willi2012-12-191-1/+2
|
* Add an error-notify sample application to listen to error notificationsMartin Willi2012-12-193-0/+66
|
* Add an error-notify plugin to send catched alerts to listening applicationsMartin Willi2012-12-199-0/+743
|
* Raise an alert if half-open timeout limit reachedMartin Willi2012-12-192-0/+3
|
* Raise an alert if an authorize() hook failsMartin Willi2012-12-192-0/+6
|
* Raise an alert if allocating virtual IPs failsMartin Willi2012-12-192-0/+4
|
* Raise an alert if kernel policy installation failsMartin Willi2012-12-192-0/+4
|
* Raise an alert if kernel SA installation failsMartin Willi2012-12-192-0/+4
|
* Raise an alert on traffic selector mismatchMartin Willi2012-12-192-0/+5
|
* Raise alerts when enforcing IKE_SA unique policyMartin Willi2012-12-194-0/+7
|
* Raise an alert if CHILD_SA proposals mismatchMartin Willi2012-12-192-0/+4
|
* Raise an alert if IKE proposals mismatchMartin Willi2012-12-192-0/+7
|
* Raise an alert of generating local authentication data failsMartin Willi2012-12-192-6/+12
|
* Free leaking scep attributesMartin Willi2012-12-191-0/+4
|
* Corrected error message if enveloped-data decryption failsMartin Willi2012-12-191-1/+1
|
* Fix up serialNumber in openssl PKCS#7 if it has a leading MSB setMartin Willi2012-12-191-2/+7
|
* Don't handle PKCS#7 containers with infinite length encodings in pkcs7 pluginMartin Willi2012-12-191-0/+6
|
* Implement PKCS#7 decryption using opensslMartin Willi2012-12-191-16/+255
|
* Make available wrapped certificates while verifying PKCS#7 signatures in opensslMartin Willi2012-12-191-0/+22
|
* Implement openssl PKCS#7 certficiate enumerationMartin Willi2012-12-191-0/+72
|
* Fix doxygen grouping regarding containers and PKCS#7Martin Willi2012-12-198-11/+14
|
* Enable pkcs7 plugin when building scepclient on AndroidMartin Willi2012-12-191-0/+2
|
* Move PKCS#9 attribute lists to pkcs7 plugin, as we currently use it there onlyMartin Willi2012-12-196-45/+48
|
* Implement get_attribute() in openssl PKCS#7 backendMartin Willi2012-12-191-1/+35
|
* Allocate data returned by pkcs7_t.get_attribute()Martin Willi2012-12-194-2/+9
|
* Implement OpenSSL PKCS#7 signed-data parsing and verificationMartin Willi2012-12-191-4/+287
|
* Add a stub for OpenSSL PKCS#7 parsingMartin Willi2012-12-194-0/+172
|
* Remove unused monolithic PKCS#7 codeMartin Willi2012-12-194-1241/+3
|
* Migrated scepclient to new modular PKCS# APIMartin Willi2012-12-193-95/+172
|
* Fix encryption algorithm/key size argument processing in PKCS#7 enveloped-dataMartin Willi2012-12-191-1/+1
|
* Properly clone PKCS#7 attributes passed to builderMartin Willi2012-12-191-1/+1
|
* Fix enum names for container_type_tMartin Willi2012-12-191-1/+1
|
* Add a --show option to pki --pkcs7 to print contained certificatesMartin Willi2012-12-191-1/+50
|
* Add an enumerator for PKCS#7 contained certificatesMartin Willi2012-12-194-0/+17
|