#
2a5bbc1b |
| 23-Jan-2021 |
tobhe <tobhe@openbsd.org> |
Handle write() errors.
ok patrick@
|
#
c03e9c27 |
| 23-Jan-2021 |
tobhe <tobhe@openbsd.org> |
Handle errors and truncated output from snprintf().
ok patrick@
|
#
731c78a3 |
| 08-May-2019 |
tedu <tedu@openbsd.org> |
convert system() calls to an execv() like interface. avoids sh difficulties, etc. from Matthew Martin. ok deraadt reyk
|
#
c492211e |
| 26-Feb-2019 |
sthen <sthen@openbsd.org> |
ikectl's built-in CA command for simple configurations has a fixed certificate validity for the ca certificate. Raise this from 365 days to 4500 as expiry means installing new CA certificates on all
ikectl's built-in CA command for simple configurations has a fixed certificate validity for the ca certificate. Raise this from 365 days to 4500 as expiry means installing new CA certificates on all client machines which can cause significant pain. This doesn't change the default validity for server certificates which remains at 1 year (controlled by ikeca.cnf) - refreshing key and certificate on these can be done easily without visiting all machines. ok deraadt@
show more ...
|
#
8068c079 |
| 08-Nov-2017 |
patrick <patrick@openbsd.org> |
Since r1.41 the extensions are included in the CSR. Thus ca_request() already sets the extension values and returns. ca_sign() re-uses the information to write out the extension file. Since ca_req
Since r1.41 the extensions are included in the CSR. Thus ca_request() already sets the extension values and returns. ca_sign() re-uses the information to write out the extension file. Since ca_request() uses strings stored on the stack, on return the pointers to those strings will be unusable. To fix this, strdup() the strings passed ca_setenv() so we can re-use them in another scope. And free() them when we clear the environment in ca_clrenv().
Initial report and diff from Andrei-Marius Radu.
ok markus@
show more ...
|
#
d535b9ed |
| 08-Jun-2017 |
jsg <jsg@openbsd.org> |
Invoke openssl with -passin file rather than -key in ca_revoke(). From Andrei-Marius Radu via sthen@
|
#
55ace1c0 |
| 31-May-2017 |
jsg <jsg@openbsd.org> |
ca_revoke() gets called two ways. Directly from ca_opt() with keyname set to the cert to revoke, and indirectly from ca_create() with a keyname set to NULL.
ca_create() sets REQ_EXT so avoid settin
ca_revoke() gets called two ways. Directly from ca_opt() with keyname set to the cert to revoke, and indirectly from ca_create() with a keyname set to NULL.
ca_create() sets REQ_EXT so avoid setting it in ca_revoke() when keyname is NULL and the crl database is being initialised.
Avoids "REQ_EXT already set" when creating a CA error introduced in rev 1.44 which set REQ_EXT unconditionally in ca_revoke().
show more ...
|
#
2174bbc4 |
| 24-May-2017 |
jsg <jsg@openbsd.org> |
Set REQ_EXT in req section so ikectl ca certificate revoke will work again.
|
#
29b4e2ea |
| 21-May-2017 |
deraadt <deraadt@openbsd.org> |
A few more freezero() uses ok yasuoka mikeb
|
#
7cc3ce1d |
| 29-Mar-2017 |
sthen <sthen@openbsd.org> |
set REQ_EXT to x509v3_CA, fixing "ikectl ca XX create" inadvertently broken in r1.41. ok reyk deraadt
|
#
37c7452d |
| 31-Jan-2017 |
sthen <sthen@openbsd.org> |
Teach ikectl to include extensions in the CSR, rather than just adding them when signing the certificates by the local CA. This can make things easier if you want to take a CSR from ikectl to another
Teach ikectl to include extensions in the CSR, rather than just adding them when signing the certificates by the local CA. This can make things easier if you want to take a CSR from ikectl to another CA for signing, they often copy extensions from the request. ok reyk@
show more ...
|
#
e89077ce |
| 02-Nov-2015 |
jsg <jsg@openbsd.org> |
switch from using sha1 to sha256
As the ca section of the cnf file requires a default_md line (unlike req) this change also requires updating the installed ikeca.cnf or equivalent files.
Requested
switch from using sha1 to sha256
As the ca section of the cnf file requires a default_md line (unlike req) this change also requires updating the installed ikeca.cnf or equivalent files.
Requested by and ok reyk@ who also tested this against ios9 with iked.
show more ...
|
#
8e3cf88f |
| 02-Nov-2015 |
jsg <jsg@openbsd.org> |
sign csrs with openssl ca instead of x509 -req
This way openssl will add valid signed certs to the index file which is required to use the builtin openssl OCSP server.
This change requires installi
sign csrs with openssl ca instead of x509 -req
This way openssl will add valid signed certs to the index file which is required to use the builtin openssl OCSP server.
This change requires installing a new ikeca.cnf or updating the default cnf files with equivalent sections.
Requested by and ok reyk@
show more ...
|
#
ab7171b1 |
| 02-Nov-2015 |
jsg <jsg@openbsd.org> |
Accept an ocsp option when creating certificates to set the extended key usage for OCSP signing.
Requested by and ok reyk@
|
#
47e28f79 |
| 19-Aug-2015 |
reyk <reyk@openbsd.org> |
ca_hier() und ca_newpass() abort on failure, return void instead of int.
Based on previous observation by semarie@
|
#
2733338e |
| 19-Aug-2015 |
reyk <reyk@openbsd.org> |
spacing
|
#
bfcdcf42 |
| 19-Aug-2015 |
reyk <reyk@openbsd.org> |
fcopy_env() should return void as it aborts on failure.
Pointed out by semarie@
|
#
ef316c85 |
| 19-Aug-2015 |
reyk <reyk@openbsd.org> |
Use C99 integer types in ikectl(8).
OK jsg@
|
#
4f23bdab |
| 19-Aug-2015 |
reyk <reyk@openbsd.org> |
Support for overwriting $ENV:: variables in OpenSSL .cnf files from the environment has been removed in LibreSSL. This was a good step but it unintentionally broke the "ikectl ca" commands. Rework
Support for overwriting $ENV:: variables in OpenSSL .cnf files from the environment has been removed in LibreSSL. This was a good step but it unintentionally broke the "ikectl ca" commands. Rework the implementation for copying the .cnf files and expanding the $ENV:: variables ourselves before passing the generated .cnf file to the "openssl" command.
Reported and tested by Jona Joachim (thanks!) OK jsg@
show more ...
|
#
d513b0f4 |
| 15-Aug-2015 |
semarie <semarie@openbsd.org> |
correct mode_t 644 to 0644
ok sthen@
|
#
12d9f607 |
| 15-Aug-2015 |
semarie <semarie@openbsd.org> |
corrects three err() to errx() calls - a if condition don't set errno - strlcpy(3) don't set errno (no mention is man page) - ca_readpass() already manage errno error message with warn(3)
ok s
corrects three err() to errx() calls - a if condition don't set errno - strlcpy(3) don't set errno (no mention is man page) - ca_readpass() already manage errno error message with warn(3)
ok sthen@
show more ...
|
#
b9fc9a72 |
| 16-Jan-2015 |
deraadt <deraadt@openbsd.org> |
Replace <sys/param.h> with <limits.h> and other less dirty headers where possible. Annotate <sys/param.h> lines with their current reasons. Switch to PATH_MAX, NGROUPS_MAX, HOST_NAME_MAX+1, LOGIN_N
Replace <sys/param.h> with <limits.h> and other less dirty headers where possible. Annotate <sys/param.h> lines with their current reasons. Switch to PATH_MAX, NGROUPS_MAX, HOST_NAME_MAX+1, LOGIN_NAME_MAX, etc. Change MIN() and MAX() to local definitions of MINIMUM() and MAXIMUM() where sensible to avoid pulling in the pollution. These are the files confirmed through binary verification. ok guenther, millert, doug (helped with the verification protocol)
show more ...
|
#
dab3f910 |
| 26-Aug-2014 |
jsing <jsing@openbsd.org> |
Move openssl(1) from /usr/sbin/openssl to /usr/bin/openssl, since it is not a system/superuser binary. At the same time, move the source code from its current lib/libssl/src/apps location to a more a
Move openssl(1) from /usr/sbin/openssl to /usr/bin/openssl, since it is not a system/superuser binary. At the same time, move the source code from its current lib/libssl/src/apps location to a more appropriate home under usr.bin/openssl.
ok deraadt@ miod@
show more ...
|
#
8fbd7fcb |
| 25-Aug-2014 |
doug <doug@openbsd.org> |
Delete secret or secret-derived data with explicit_bzero.
concept ok deraadt@ diff looks ok tedu@
|
#
ffb4dd05 |
| 20-Jul-2014 |
guenther <guenther@openbsd.org> |
Make sure the correct errno is reported by warn* or err* and not the errno of an intervening cleanup operation like close/unlink/etc.
Diff from Doug Hogan (doug (at) acyclic.org)
|