aboutsummaryrefslogtreecommitdiffstats
path: root/src
Commit message (Collapse)AuthorAgeFilesLines
...
* starter: Don't define any hard-coded proposal stringsTobias Brunner2017-10-101-9/+0
| | | | | | | | Just rely on the default proposals by charon if nothing is defined. The hard-coded IKE proposal used curve25519, which depends on an optional plugin (while enabled by default it might still not be loaded, or, like on Debian, shipped in an optional package). With charon's default proposal only loaded algorithms are proposed for IKE avoiding this issue.
* openssl: Fix call of X509_CRL_get0_signature() with OpenSSL 1.1.0Tobias Brunner2017-10-101-3/+3
| | | | | | | The order of arguments in X509_CRL_get0_signature() is not the same as that of X509_get0_signature(). Fixes: 989ba4b6cd16 ("openssl: Update CRL API to OpenSSL 1.1.0")
* kernel-netlink: Add strings for newer XFRM attribute typesTobias Brunner2017-10-061-1/+6
|
* configure: Fix gperf length parameter determinationTobias Brunner2017-10-0211-14/+38
| | | | | | | | | | gperf is not actually a build dependency as the generated files are shipped in the tarball. So the type depends on the gperf version on the host that ran gperf and created the tarball, which might not be the same as that on the actual build host, and gperf might not even be installed there, leaving the type undetermined. Fixes: e0e43229736a ("configure: Detect type of length parameter for gperf generated function")
* libimcv: Renamed SW Request to SWIMA RequestAndreas Steffen2017-09-271-1/+1
|
* SWIMA attribute name changesAndreas Steffen2017-09-2611-36/+36
| | | | | draft-ietf-sacm-nea-swima-patnc-01 changes some SWIMA attribute names.
* kernel-pfroute: Delay call to if_indextoname(3) when handling RTM_IFINFOTobias Brunner2017-09-261-0/+5
| | | | | | | It seems that there is a race, at least in 10.13, that lets if_indextoname() fail for the new TUN device. So we delay the call a bit, which seems to "fix" the issue. It's strange anyway that the previous delay was only applied when an iface entry was already found.
* controller: Consider any IKE_SA destruction as success when terminatingTobias Brunner2017-09-251-4/+1
|
* configure: Detect type of length parameter for gperf generated functionTobias Brunner2017-09-193-6/+6
| | | | | Since 3.1 gperf uses size_t for the length parameter instead of an unsigned int.
* utils: Include stdint.hTobias Brunner2017-09-191-0/+1
| | | | | | | | | Recent releases of glibc don't include the full stdint.h header in some network headers included by utils.h. So uintptr_t might not be defined. Since we use fixed width integers, including the latter, all over the place we make sure the complete file is included. Fixes #2425.
* sec-updater: Make sure `success` is initializedTobias Brunner2017-09-181-1/+1
|
* dhcp: Fix warning regarding unaligned pointer value due to packed structTobias Brunner2017-09-181-1/+1
| | | | We don't need to access this as uint32_t so just cast it to a char*.
* dhcp: Don't use signed char for DHCP optionsTobias Brunner2017-09-181-1/+1
| | | | | | The value of DHCP_OPTEND is 255. When it is assigned this result in a sign change as the positive int constant is cast to a signed char and -1 results. Clang 4.0 complains about this.
* imv-agent: Fix get_attribute() call for preferred languageTobias Brunner2017-09-181-2/+2
|
* bliss: Fix compile error of unit tests due to uninitialized variableTobias Brunner2017-09-181-1/+1
|
* settings: Fix possible undefined behavior with va_start() and boolTobias Brunner2017-09-182-4/+6
| | | | | | | | | | | | | | | | | | | | | | | | | | | | This fixes compilation with -Werror when using Clang 4.0 (but not 3.9) and possibly prevents undefined behavior. According to the C standard the following applies to the second parameter of the va_start() macro (subclause 7.16.1.4, paragraph 4): The parameter parmN is the identifier of the rightmost parameter in the variable parameter list in the function definition (the one just before the ...). If the parameter parmN is declared with the register storage class, with a function or array type, or with a type that is not compatible with the type that results after application of the default argument promotions, the behavior is undefined. Because bool is usually just 1 byte and therefore smaller than int (i.e. the result of default argument promotion) its use as last argument before ... might result in undefined behavior. This theoretically can also apply to enums as a compiler may use a smaller base type than int. Since Clang 3.9 (currently in use on Travis by default) a warning is issued about this, however, that version did not yet compare the actual size of the argument's type, causing warnings where they are not warranted (basically for all cases where enum types are used for the last argument). This was apparently fixed with Clang 4.0, which only warns about this use of bool with va_start(), which makes sense.
* Define MODP_CUSTOM constructors as variadic functionsTobias Brunner2017-09-188-22/+28
| | | | | | They now match the dh_constructor_t signature. This is a follow up for the changes merged with b668bf3f9ec1 and should fix use of MODP_CUSTOM on Apple's ARM64 platform.
* libtnccs: Correctly read dlopen_use_rtld_now optionTobias Brunner2017-09-182-2/+2
| | | | Fixes: 50e4aeb22f49 ("libtnccs: Optionally use RTLD_NOW to load IMC/IMVs with dlopen()")
* plugin-loader: Correctly read dlopen_use_rtld_now optionTobias Brunner2017-09-181-1/+1
| | | | Fixes: 305c4aa82cb0 ("plugin-loader: Optionally use RTLD_NOW with dlopen()")
* android: New release after adding delta CRL support and some bug fixesTobias Brunner2017-09-181-2/+2
|
* android: Ignore IllegalArgumentException for multicast addressesTobias Brunner2017-09-181-2/+23
| | | | | | Some Android versions seem to reject routes that use multicast addresses. Fixes #2420.
* openssl: Add support for delta CRLsTobias Brunner2017-09-182-19/+74
|
* certificates: Use shared destructor for x509_cdp_tTobias Brunner2017-09-186-46/+22
|
* child-create: Don't consider a DH group mismatch as failure as responderTobias Brunner2017-09-181-1/+0
| | | | | | | This causes problems e.g. on Android where we handle the alert (and reestablish the IKE_SA) even though it usually is no problem if the peer retries with the requested group. We don't consider it as a failure on the initiator either.
* libipsec: Make sure to expire the right SATobias Brunner2017-09-181-2/+9
| | | | | | | | | | | | | | If an IPsec SA is actually replaced with a rekeying its entry in the manager is freed. That means that when the hard expire is triggered a new entry might be found at the cached pointer location. So we have to make sure we trigger the expire only if we found the right SA. We could use SPI and addresses for the lookup, but this here requires a bit less memory and is just a small change. Another option would be to somehow cancel the queued job, but our scheduler doesn't allow that at the moment. Fixes #2399.
* ip-packet: Correctly determine protocol in fragmented IPv6 packetsTobias Brunner2017-09-181-6/+57
| | | | | | We don't attempt to parse the transport headers for fragments, not even for the initial fragment (it's not guaranteed they contain the header, depending on the number and type of extension headers).
* ip-packet: Fix "packet too short" error when parsing fragmented IPv4 packetsTobias Brunner2017-09-181-1/+6
| | | | | Only attempt to parse the transport header of an IPv4 packet if it's not fragmented or the first fragment.
* charon-tkm: Reset ESA on child SA create failureAdrian-Ken Rueegsegger2017-09-151-0/+1
| | | | | | Since we are also releasing the ESA ID we have to make sure that the ESA context is reset and in a clean state in order for it to be actually reusable.
* charon-tkm: Check for error when acquiring ESA IDAdrian-Ken Rueegsegger2017-09-151-0/+7
|
* charon-tkm: Fix AE context life-cycle handlingAdrian-Ken Rueegsegger2017-09-151-7/+10
| | | | | | Use new reference counting feature of ID manager for AE contexts and only perform reset if count is zero. Also, do not pass on AE ID as every IKE SA must decrement AE ID count once it is not used any longer.
* charon-tkm: Return current refcount when releasing IDAdrian-Ken Rueegsegger2017-09-153-23/+23
|
* charon-tkm: Add acquire_ref method to ID managerAdrian-Ken Rueegsegger2017-09-153-0/+108
| | | | | The function acquires a reference to the given context reference id for a specific context kind.
* charon-tkm: Store context ids as int instead of boolAdrian-Ken Rueegsegger2017-09-151-5/+8
| | | | This is in preparation of making context ids refcountable.
* charon-tkm: Add missing whitespace log messageAdrian-Ken Rueegsegger2017-09-151-1/+1
|
* child-delete: Only let SAs expire naturally if they not already didTobias Brunner2017-09-151-1/+1
|
* sec-updater: Import SWID tags of updated packagesAndreas Steffen2017-09-093-57/+207
| | | | | | | sec-updater downloads the deb package files from security updates from a given linux repository and uses the swid_generator command to derive a SWID tag. The SWID tag is then imported into strongTNC using the manage.py importswid command.
* libimcv: Corrected captionAndreas Steffen2017-09-091-1/+1
|
* pt-tls-client: Introduced --options as a synonym for --optionsfromAndreas Steffen2017-09-092-3/+4
|
* sec-updater: Write to log only if at least one update is found.Andreas Steffen2017-09-072-19/+98
|
* android: New release after adding OCSP, CRL cache and some other stuffTobias Brunner2017-09-041-2/+2
|
* ike: Reset local SPI if retrying to connect in state IKE_CONNECTINGTobias Brunner2017-09-043-11/+19
| | | | | | | | | | | | | | In case we send retransmits for an IKE_SA_INIT where we propose a DH group the responder will reject we might later receive delayed responses that either contain INVALID_KE_PAYLOAD notifies with the group we already use or, if we retransmitted an IKE_SA_INIT with the requested group but then had to restart again, a KE payload with a group different from the one we proposed. So far we didn't change the initiator SPI when restarting the connection, i.e. these delayed responses were processed and might have caused fatal errors due to a failed DH negotiation or because of the internal retry counter in the ike-init task. Changing the initiator SPI avoids that as we won't process the delayed responses anymore that caused this confusion.
* ike-sa-manager: Add method to change the initiator SPI of an IKE_SATobias Brunner2017-09-042-4/+99
|
* ike-init: Fail if DH group in KE payload does not match proposed groupTobias Brunner2017-09-041-1/+5
|
* android: Add disconnect button to dialog if already connected to profileTobias Brunner2017-09-041-31/+54
|
* android: Load x509 plugin to generate OCSP requests and parse responsesTobias Brunner2017-09-041-1/+1
| | | | BoringSSL does not support OpenSSL's OCSP API.
* android: Add support to POST data via SimpleFetcherTobias Brunner2017-09-042-6/+62
| | | | That's required for OCSP verification.
* android: Add option to clear cached CRLsTobias Brunner2017-09-049-1/+146
|
* android: Cache CRLs in app directoryTobias Brunner2017-09-043-10/+132
| | | | Fixes #2405.
* android: Pass absolute path to the app's data directory via JNITobias Brunner2017-09-042-6/+11
|
* android: Hide app selection in profile editor on Android < 5Tobias Brunner2017-09-042-0/+9
|