Skip to content

Conversation

JordanYates
Copy link
Contributor

Add a dedicated subcommand for managing credentials. Includes the option
to load base network keys into the keyring for usage by the device
database.

Add a dedicated subcommand for managing credentials. Includes the option
to load base network keys into the keyring for usage by the device
database.

Signed-off-by: Jordan Yates <[email protected]>
Attempt to load base networks from the credential manager.

Signed-off-by: Jordan Yates <[email protected]>
Cache network keys to remove the need to run the expensive HKDF
computation on each packet.

Signed-off-by: Jordan Yates <[email protected]>
Be more specific about the key error types so that higher levels can
handle different errors in different ways.

Signed-off-by: Jordan Yates <[email protected]>
Knowing the network ID is a prerequisite before we can query the device
keys, as we need to construct the device key RPC using the network ID.

Update the decrypt failure handler to respect this dependancy.

Signed-off-by: Jordan Yates <[email protected]>
Only run CI on pushes to the main branch, instead of every push.

Signed-off-by: Jordan Yates <[email protected]>
@JordanYates JordanYates merged commit 49887e6 into main Nov 20, 2024
8 checks passed
@JordanYates JordanYates deleted the feature/cred_load branch November 20, 2024 00:46
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant