aboutsummaryrefslogtreecommitdiffstats
path: root/src/swanctl/commands/load_creds.c
Commit message (Collapse)AuthorAgeFilesLines
* swanctl: Use returned key ID to track loaded private keysTobias Brunner2017-05-231-13/+6
| | | | | | There was a direct call to load_key() for unencrypted keys that didn't remove the key ID from the hashtable, which caused keys to get unloaded when --load-creds was called multiple times.
* swanctl: Add `token` secrets for keys on tokens/smartcardsTobias Brunner2017-02-161-0/+90
|
* vici: Add support for NT Hash secretsTobias Brunner2017-02-161-1/+3
| | | | Fixes #1002.
* swanctl: Automatically unload removed shared keysTobias Brunner2017-02-161-15/+49
|
* swanctl: Automatically unload removed private keysTobias Brunner2017-02-161-76/+175
|
* swanctl: Add 'private' directory/section to load any type of private keyTobias Brunner2016-10-051-5/+10
|
* swanctl: Load pubkeys with load-credsAndreas Steffen2016-01-091-0/+1
|
* Refactored certificate management for the vici and stroke interfaces5.4.0dr1Andreas Steffen2015-12-121-9/+20
|
* Share vici_cert_info.c with vici_cred.cAndreas Steffen2015-12-111-6/+17
|
* swanctl: Cache entered PKCS#12 decryption secretMartin Willi2015-03-181-6/+23
| | | | | It is usually used more than once, but most likely the same for decryption and MAC verification.
* swanctl: Support loading PKCS#12 containers from a pkcs12 swanctl directoryMartin Willi2015-03-181-0/+113
|
* swanctl: Generalize private key decryption to support other credential typesMartin Willi2015-03-181-55/+97
|
* swanctl: Complete --load-creds command summaryMartin Willi2014-09-221-1/+1
|
* swanctl: Add a --load-all command, performing --load-{creds,pools,conns}Martin Willi2014-09-221-27/+42
|
* swanctl: Support private key decryption passhprases in swanctl.confMartin Willi2014-06-171-19/+108
| | | | | | | While there is no real security benefit of storing private keys encrypted if the passphrase is stored along with it, there still seems to be demand for this functionality. We add it for compatibility with ipsec.secrets, even if it is not really recommended.
* Split swanctl --raw mode into single-line and --pretty modeAndreas Steffen2014-06-141-36/+46
|
* Make sure getpass() is availableTobias Brunner2014-05-291-1/+3
| | | | It's not on Android for example.
* swanctl: Change syntax of secrets to accept identities with special charsMartin Willi2014-05-071-40/+46
| | | | | | | | | | | Having identity strings in the settings key is problematic, as the parser can't handle arbitrary characters in it. Further, the space separation makes it impossible to define identities with spaces. The new format uses key prefixes, similar to those used in local/remote auth sections of connections. The secrets section takes subsections with type prefixes, and each subsection uses "id" prefixes to define an arbitrary number of identities.
* swanctl: Be more verbose while loading connections and credentialsMartin Willi2014-05-071-2/+22
|
* swanctl: Load shared secrets from the swanctl.conf secrets sectionMartin Willi2014-05-071-1/+96
|
* swanctl: Load different private keys with load-credsMartin Willi2014-05-071-1/+183
|
* swanctl: Add a command to (re-)load credentialsMartin Willi2014-05-071-0/+170