82 Commits

Author SHA1 Message Date
Jiri Tyr
fb4d8d8e26 Fix comment indicating the end of the function
This patch corrects the comment indicating the end of the `verify_file()` function.
2016-06-21 14:17:34 +01:00
Eric Crist
b887f3bf1a Merge pull request #92 from websafe/master
Fixes #91 basename: invalid option -- 's'.
2016-05-09 17:33:57 -05:00
Eric Crist
de2b5bee95 Merge pull request #96 from drewandersonnz/doc-fixes
docs: spelling fixes and setence structure improvements
2016-05-09 17:20:19 -05:00
Drew Anderson
b93d0a1675 spelling fixes and setence structure improvements 2016-05-09 10:24:02 +10:00
Thomas Szteliga
29d4dee508 Fixes #91 basename: invalid option -- 's'. 2016-03-21 17:25:58 +01:00
Eric Crist
f174800136 Merge pull request #87 from ValdikSS/gen-serial
Generate random serial number for all certificates
2016-02-29 14:04:14 -06:00
ValdikSS
d309c6aaa2 Generate random serial number for all certificates 2016-02-29 21:30:53 +03:00
Eric F Crist
3ec4f245dd Merge branch 'sskaje-master': Correct bad move operation 2015-10-25 23:01:47 -05:00
Eric F Crist
97a4852c65 Merge branch 'master' of https://github.com/sskaje/easy-rsa into sskaje-master 2015-10-25 22:59:24 -05:00
Eric F Crist
6e643f7224 Corrected output path for zip file in build tool
Signed-off-by: Eric F Crist <ecrist@secure-computing.net>
2015-10-25 22:51:55 -05:00
Eric F Crist
d92d29803b Repackaging to include Windows utilities needed.
In the 3.0.0 release, Windows utilities were mistakenly omitted from the
package.  The build utility has been updated to include these files, as
well as to convert the .md documentation files to html.

Signed-off-by: Eric F Crist <ecrist@secure-computing.net>
2015-10-25 22:37:17 -05:00
Eric F Crist
21ac0a76bc Use tmp file for gen-crl output
The mv operation following the CRL creation isn't useful as there is no
temp file to move.  Instead, create the temp file during CRL creation,
preventing a potential overwrite of a previous, valid, CRL.

Thanks go to matteo.guglielmi@epfl.ch for this patch (via email).

Signed-off-by: Eric F Crist <ecrist@secure-computing.net>
2015-09-09 18:19:22 -05:00
sskaje
02e490f436 Fix Bad move in gen_curl
Error msg:

Note: using Easy-RSA configuration from: ./vars
Using configuration from /Users/sskaje/Work/CA/Easy/openssl-1.0.cnf
Enter pass phrase for /Users/sskaje/Work/CA/Easy/pki/private/ca.key:
mv: /Users/sskaje/Work/CA/Easy/pki/crl.pem.tpH4U0wpn3: No such file or directory

An updated CRL has been created.
CRL file: /Users/sskaje/Work/CA/Easy/pki/crl.pem
2015-09-03 20:38:37 +08:00
Eric F Crist
7c1fa0a258 Add GPG key info for Eric Crist
Signed-off-by: Eric F Crist <ecrist@secure-computing.net>
2015-09-02 20:01:34 -05:00
Eric F Crist
ed597da0fc Prepare for v3.0.0 release
* Update ChangeLog to reflect minor last-minute commits.
* Modify build-dist.sh to create both zip and tgz files
* Add notable changes to Upgrade-Notes
2015-09-02 19:53:04 -05:00
Eric Crist
f2f4ac8eb8 Merge pull request #32 from roubert/utf-8
Pass the flag -utf8 to openssl to interpret field values as UTF-8.
2015-09-02 18:40:08 -05:00
Eric Crist
8b42eead58 Merge pull request #61 from keros/change_default_private_key_encryption
changed default encrpytion algorithmus for keyfiles from des3 to aes256
2015-09-02 18:33:59 -05:00
Fredrik Roubert
e269c7fa84 Pass the flag -utf8 to openssl to interpret field values as UTF-8.
By default, field values are interpreted as ASCII but UTF-8 would be a
more reasonable default. Without the -utf8 flag, non-ASCII text gets
garbled without warning. ASCII text works fine either way.
2015-08-31 13:23:09 +02:00
Eric Crist
cd270b48a2 Merge pull request #66 from ljani/patch-1
ljani: Fix typo Helllman
2015-08-30 22:20:54 -05:00
Eric Crist
34b87846ea Merge pull request #26 from luizluca/temp_files_even_simplier
luizluca: use temp files.  clean up is more stream lined and errors prevent loss of working files.
2015-08-30 22:20:11 -05:00
Jani
3ab4a07c16 Fix typo: Helllman 2015-07-09 00:18:50 +03:00
keros
3124b41923 changed default encrpytion algorithmus for keyfiles from des3 to aes256 2015-05-13 12:14:05 +00:00
keros
d89231ab2d Revert "changed default encrpytion algorithmus for keyfiles from des3 to aes256"
This reverts commit cf9e4731b8f2170e529e8b18d64f8f21883ecb85.
2015-05-13 12:11:31 +00:00
keros
127488692d Revert "added passin and passout option to set-rsa-pass, set-ec-pass and export-p12 to allow passowrd scripting"
This reverts commit bd8583b9585a2a1ed3d3188b01a89ce6a80ba409.
2015-05-13 12:11:16 +00:00
keros
8534e06872 Revert "revoked files will be moved to subfolders"
This reverts commit 550fb40868966bce63e66311c22ee74836eb0efd.
2015-05-13 12:10:41 +00:00
keros
550fb40868 revoked files will be moved to subfolders 2015-05-13 11:42:47 +00:00
keros
bd8583b958 added passin and passout option to set-rsa-pass, set-ec-pass and export-p12 to allow passowrd scripting 2015-05-13 11:29:42 +00:00
keros
cf9e4731b8 changed default encrpytion algorithmus for keyfiles from des3 to aes256 2015-05-13 10:23:31 +00:00
Josh Cepek
bc586578b4 gen_req() no longer alters the global EXTRA_EXTS variable
When forming the OpenSSL config replacement text, gen_req() should not
alter the global variable as it is referred to again by sign_req() when
the wrapper-commands build-*-full are called.

This change localizes the replacement text to avoid competing over the
global variable.

Signed-off-by: Josh Cepek <josh.cepek@usa.net>
Based-On: patch submitted by Joe Hu <i@sapika.ch>
Fixes: Issue #25
2014-12-17 11:47:09 -06:00
Josh Cepek
5c1ca9543d Support LibreSSL by its version output
The command-line API for LibreSSL is currently identical to OpenSSL
1.0.1.  This support is implemented in a case so any future version
distinctions can key off the features in the available implementation.

Such feature-specific support may become more important during the 3.1
development cycle where 0.9.x OpenSSL cannot handle newer features.

Signed-off-by: Josh Cepek <josh.cepek@usa.net>
Fixes: #48
2014-12-17 11:32:23 -06:00
allo-
171834dd29 typo: Defualt 2014-09-14 17:50:14 +02:00
Eric Crist
556d77b94f update README to explain what the project does
fixes #28
2014-09-08 08:38:09 -04:00
Josh Cepek
2fe709339d Update ChangeLog for release: 3.0.0-rc2 2014-07-27 08:15:26 -05:00
Josh Cepek
1551e5f335 docs: fix typo 2014-07-27 08:02:43 -05:00
Josh Cepek
7ae44b3469 Add KNOWN_ISSUES to stage next -rc release 2014-07-27 07:49:34 -05:00
Josh Cepek
a0d58b2faf Update documentation 2014-07-27 07:24:40 -05:00
Josh Cepek
5758825baa Fix vars.example with proper path to extensions.temp
Related to issue #24. This does not yet resolve the vars_setup() logic
to assure unmodified variables use defaults rather than empty strings.
2014-07-27 07:19:49 -05:00
Luiz Angelo Daros de Luca
100d9af333 use temp files to avoid loss of files on error 2014-03-20 14:27:22 -03:00
Josh Cepek
89f369c5bb Add support to change private key passphrases
Adds the 'set-rsa-pass' and 'set-ec-pass' commands. Both are able to set
or remove a passphrase, and can optionally act on a direct file path
instead of a relative filename base name.

Signed-off-by: Josh Cepek <josh.cepek@usa.net>
2013-12-23 12:36:00 -06:00
Josh Cepek
49d7c102ec Improve docs: add Upgrade-Notes; add online support refs
Upgrade-Notes includes v2 to v3 upgrade changes that users should be
aware of.

The updated top-level README helps point users to online support
locations.

Signed-off-by: Josh Cepek <josh.cepek@usa.net>
2013-12-23 12:35:40 -06:00
Josh Cepek
fcc4547542 Add build-dist packaging script; update Building docs
This initial packaging script creates a release-ready tarball for
Unix-alikes. Windows support will be added in a separate commit.

Signed-off-by: Josh Cepek <josh.cepek@usa.net>
2013-12-12 12:29:29 -06:00
Josh Cepek
f74d08eace docs: update Hacking.md with layout & git conventions
Updates include listing project dir layout, git conventions on
commits/merges/tags, and code spacing/indent recommendations.

Signed-off-by: Josh Cepek <josh.cepek@usa.net>
2013-12-12 08:33:49 -06:00
Josh Cepek
0754f23404 Offload temp file removal to a clean_temp() function
This simplifies code flow where temp files are used.

Signed-off-by: Josh Cepek <josh.cepek@usa.net>
2013-12-11 13:07:37 -06:00
Josh Cepek
1c90df94ea Fix incorrect handling of invalid --use-algo option
The prior warn/fallback to rsa didn't work, and fallback is probably the
wrong thing to do, especially for batch callers. It is now an error to
supply an invalid value.

No need to export the EASYRSA_ALGO_PARAMS either.

Signed-off-by: Josh Cepek <josh.cepek@usa.net>
2013-12-11 12:01:04 -06:00
Josh Cepek
c86289ba17 Fix batch-mode handling with changes in e75ad75
The --batch CLI arg now takes no options and enables batch-mode when
present.

init-pki no longer takes a 'force' value which did the same as --batch.

Signed-off-by: Josh Cepek <josh.cepek@usa.net>
2013-12-11 11:29:51 -06:00
Eric F Crist
e75ad75421 refine how booleans are evaluated
Signed-Off-By: Josh Cepek <josh.cepek@usa.net>
2013-12-10 14:23:11 -06:00
Josh Cepek
cc19823fb3 Merge PKCS#7 feature from pull req #14
This adds export support for PKCS#7 bundles, and adds the option to
export PKCS#12 without private keys

Author: Luiz Angelo Daros de Luca <luizluca@tre-sc.gov.br>
Signed-off-by: Josh Cepek <josh.cepek@usa.net>
2013-12-10 10:18:31 -06:00
Josh Cepek
90dc74c034 Modify error message from export_pkcs() to avoid console wrapping
Signed-off-by: Josh Cepek <josh.cepek@usa.net>
2013-12-10 10:08:53 -06:00
Luiz Angelo Daros de Luca
cf4cc319e5 - removed unecessary arg check in export_pkcs func
- Changed expanded tabs (spaces) to normal tabs
- fixed pkcs12 nokey message
- changed export dir for pkcs7 to issued
2013-12-10 12:55:47 -02:00
Luiz Angelo Daros de Luca
4fa57bff6b - added option nokey for pkcs12 to avoid exporting private keys
- added command export-p7 to export certs using pkcs7 format.
2013-12-10 12:55:47 -02:00