| Commit message (Collapse) | Author | Age | Files | Lines |
... | |
| |
|
|
|
|
| |
actively
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
|
|
|
| |
requests
|
| |
|
| |
|
| |
|
| |
|
|
|
|
| |
This requires a Linux kernel >= 2.6.33.
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
Any line in ipsec.secrets starting with " or ' was treated as PSK
without ID selectors by pluto. This prevented it from supporting DNs
like "C=CH, O=Linux strongSwan, OU=Sales, CN=alice@strongswan.org" as
ID selectors.
PSKs defined in this legacy format can easily be updated by changing
"thisIsASecret"
into
: PSK "thisIsASecret"
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
|
|
|
| |
This avoids error messages if later builders can successfully decode something.
|
| |
|
| |
|
| |
|
|
|
|
|
|
|
| |
parameters.
This is needed in case the key itself does not contain the parameters,
which is the case for PKCS#8.
|
| |
|
|
|
|
|
|
|
| |
named curve).
Explicit EC parameters are not supported with this function, but before this
change no parameters were actually ever returned.
|
| |
|
| |
|
|
|
|
|
|
| |
Enabling this option treats all certificates in ipsec.d/cacerts and
ipsec.conf ca sections as CA certificates even if they do not contain a
CA basic constraint.
|
|
|
|
| |
Inbound/Outbound-Octets
|
| |
|