generated from smedev/Template-for-SMEServer-Contribs-Package
* Thu Sep 11 2025 Jean-Philippe Pialasse <jpp@koozali.org> 0.84-17.sme
- import from SME10 CVS and rename back to phpki
This commit is contained in:
@@ -601,7 +601,7 @@ function CA_revoke_cert($serial)
|
||||
$cmd_output[] = 'Revoking the certificate.';
|
||||
$configCa_pwd = $config['ca_pwd'];
|
||||
$configOpenssl_cnf = $config['openssl_cnf'];
|
||||
exec(CA." -config $configOpenssl_cnf -revoke ".escshellarg($certfile)." -passin pass:$configCa_pwd 2>&1", $cmd_output, $ret);
|
||||
exec(CA." -config $configOpenssl_cnf -revoke ".escshellarg($certfile)." -passin pass:'$configCa_pwd' 2>&1", $cmd_output, $ret);
|
||||
|
||||
if ($ret == 0) {
|
||||
unset($cmd_output);
|
||||
@@ -652,7 +652,7 @@ function CA_create_cert($cert_type = 'email', $country, $province, $locality, $o
|
||||
$cmd_output[] = 'Creating certificate request.';
|
||||
|
||||
if (($_passwd) && ($_passwd != "''")) {
|
||||
exec(REQ." -new -newkey rsa:$keysize -keyout '$userkey' -out '$userreq' -config '$cnf_file' -days '$expiry_days' -passout pass:$_passwd 2>&1", $cmd_output, $ret);
|
||||
exec(REQ." -new -newkey rsa:$keysize -keyout '$userkey' -out '$userreq' -config '$cnf_file' -days '$expiry_days' -passout pass:'$_passwd' 2>&1", $cmd_output, $ret);
|
||||
} else {
|
||||
exec(REQ." -new -newkey rsa:$keysize -keyout '$userkey' -out '$userreq' -config '$cnf_file' -days '$expiry_days' -nodes 2>&1", $cmd_output, $ret);
|
||||
}
|
||||
@@ -681,8 +681,8 @@ function CA_create_cert($cert_type = 'email', $country, $province, $locality, $o
|
||||
$configRandom = $config['random'];
|
||||
|
||||
if (($_passwd) && ($_passwd != "''")) {
|
||||
$cmd_output[] = "infile: $usercert keyfile: $userkey outfile: $userpfx pass: $_passwd";
|
||||
exec(PKCS12." -export -in '$usercert' -inkey '$userkey' -certfile '$configCacert_pem' -caname '$configOrganization' -out '$userpfx' -name $friendly_name -rand '$configRandom' -passin pass:$_passwd -passout pass:$_passwd 2>&1", $cmd_output, $ret);
|
||||
$cmd_output[] = "infile: $usercert keyfile: $userkey outfile: $userpfx pass:'$_passwd'";
|
||||
exec(PKCS12." -export -in '$usercert' -inkey '$userkey' -certfile '$configCacert_pem' -caname '$configOrganization' -out '$userpfx' -name $friendly_name -rand '$configRandom' -passin pass:'$_passwd' -passout pass:'$_passwd' 2>&1", $cmd_output, $ret);
|
||||
} else {
|
||||
$cmd_output[] = "infile: $usercert keyfile: $userkey outfile: $userpfx";
|
||||
// reetp - this needs looking at
|
||||
@@ -823,8 +823,8 @@ function CA_renew_cert($old_serial, $expiry, $passwd)
|
||||
unset($cmd_output);
|
||||
$cmd_output[] = "Creating PKCS12 format certificate.";
|
||||
if (($_passwd) && ($_passwd != "''")) {
|
||||
$cmd_output[] = "infile: $usercert keyfile: $userkey outfile: $userpfx pass: $_passwd";
|
||||
exec(PKCS12." -export -in '$usercert' -inkey '$userkey' -certfile '$configCacert_pem' -caname '$configOrganization' -out '$userpfx' -name $friendly_name -rand '$configRandom' -passin pass:$_passwd -passout pass:$_passwd 2>&1", $cmd_output, $ret);
|
||||
$cmd_output[] = "infile: $usercert keyfile: $userkey outfile: $userpfx pass:'$_passwd'";
|
||||
exec(PKCS12." -export -in '$usercert' -inkey '$userkey' -certfile '$configCacert_pem' -caname '$configOrganization' -out '$userpfx' -name $friendly_name -rand '$configRandom' -passin pass:'$_passwd' -passout pass:'$_passwd' 2>&1", $cmd_output, $ret);
|
||||
} else {
|
||||
$cmd_output[] = "infile: $usercert keyfile: $userkey outfile: $userpfx";
|
||||
// reetp - this needs looking at
|
||||
|
Reference in New Issue
Block a user