aboutsummaryrefslogtreecommitdiffstats
path: root/src/libcharon/plugins/vici/vici_cred.c
Commit message (Collapse)AuthorAgeFilesLines
* vici: Return key ID from load-key commandTobias Brunner2017-05-231-3/+11
| | | | | We already do this for load-token and this should simplify client implementations.
* vici: Add command to load a private key from a tokenTobias Brunner2017-02-161-3/+99
| | | | | | | PINs are stored in a "hidden" credential set, so that its shared secrets are not exposed via VICI. Since they are not explicitly loaded as shared secrets via VICI a client might consider them as removed secrets and remove them.
* vici: Add support for NT Hash secretsTobias Brunner2017-02-161-0/+4
| | | | Fixes #1002.
* vici: Add possibility to remove shared keys by a unique identifierTobias Brunner2017-02-161-4/+51
| | | | | This identifier can be set when adding/replacing a secret. The unique identifiers of all secrets may be enumerated.
* vici: Add commands to enumerate and remove private keysTobias Brunner2017-02-161-2/+53
| | | | They are identified by their SHA-1 key identifier.
* Save both base and delta CRLs to diskAndreas Steffen2016-10-111-1/+4
|
* vici: strongswan.conf cache_crls = yes saves fetched CRLs to diskAndreas Steffen2016-10-111-1/+63
|
* vici: flush-certs command flushes certificate cacheAndreas Steffen2016-09-131-0/+19
| | | | | | | | | | When fresh CRLs are released with a high update frequency (e.g. every 24 hours) or OCSP is used then the certificate cache gets quickly filled with stale CRLs or OCSP responses. The new VICI flush-certs command allows to flush e.g. cached CRLs or OCSP responses only. Without the type argument all kind of certificates (e.g. also received end entity and intermediate CA certificates) are purged.
* vici: Support of raw public keysAndreas Steffen2016-01-091-1/+1
|
* Refactored certificate management for the vici and stroke interfaces5.4.0dr1Andreas Steffen2015-12-121-11/+23
|
* Share vici_cert_info.c with vici_cred.cAndreas Steffen2015-12-111-37/+28
|
* vici: Attribute certificates are not trustedTobias Brunner2015-11-121-1/+3
|
* vici: Properly add CRLs to the credential setTobias Brunner2015-11-121-2/+8
| | | | add_crl() ensures that old CLRs are not stored in the credential set.
* vici: Certification Authority support added.Andreas Steffen2015-07-211-0/+7
| | | | | | CDP and OCSP URIs for a one or multiple certification authorities can be added via the VICI interface. swanctl allows to read definitions from a new authorities section.
* vici: Return a success result for the clear-creds commandMartin Willi2014-10-101-4/+1
| | | | | Even if the command actually can't fail, this looks more aligned to similar commands.
* vici: Log owners of a just loaded shared-secretMartin Willi2014-05-071-2/+18
|
* vici: Handle "xauth" as an alias for "eap" secretsMartin Willi2014-05-071-1/+1
|
* vici: Add a load-shared command to load shared IKE and EAP secretsMartin Willi2014-05-071-0/+68
|
* vici: Add a load-key command to load private keysMartin Willi2014-05-071-0/+50
|
* vici: Support loading of different certificate typesMartin Willi2014-05-071-0/+93
|
* vici: Add a credential backendMartin Willi2014-05-071-0/+103