open-vault/builtin/logical/pki
Jeff Mitchell 7fc4ee1ed7 Disallow 1024-bit RSA keys.
Existing certificates are kept but roles with key bits < 2048 will need
to be updated as the signing/issuing functions now enforce this.
2016-02-19 14:33:02 -05:00
..
backend.go Add listing of roles to PKI 2016-01-28 15:18:07 -05:00
backend_test.go Disallow 1024-bit RSA keys. 2016-02-19 14:33:02 -05:00
ca_util.go Disallow 1024-bit RSA keys. 2016-02-19 14:33:02 -05:00
cert_util.go Disallow 1024-bit RSA keys. 2016-02-19 14:33:02 -05:00
crl_util.go Allow backends to see taint status. 2016-01-22 17:01:22 -05:00
fields.go Fix comment text 2016-02-01 17:20:16 -05:00
path_config_ca.go WriteOperation -> UpdateOperation 2016-01-08 13:03:03 -05:00
path_config_crl.go WriteOperation -> UpdateOperation 2016-01-08 13:03:03 -05:00
path_config_urls.go WriteOperation -> UpdateOperation 2016-01-08 13:03:03 -05:00
path_fetch.go A few things: 2015-06-19 12:48:18 -04:00
path_intermediate.go Typo in error message in path_intermediate.go 2016-02-09 15:08:30 -06:00
path_issue_sign.go Allow the format to be specified as pem_bundle, which creates a 2016-02-01 13:19:41 -05:00
path_revoke.go WriteOperation -> UpdateOperation 2016-01-08 13:03:03 -05:00
path_roles.go Disallow 1024-bit RSA keys. 2016-02-19 14:33:02 -05:00
path_root.go Allow the format to be specified as pem_bundle, which creates a 2016-02-01 13:19:41 -05:00
secret_certs.go Make backends much more consistent: 2016-01-29 20:03:37 -05:00