Age | Commit message (Collapse) | Author | |
---|---|---|---|
2019-02-05 | ssl: Use specs to generate type documentation | Ingela Anderton Andin | |
2018-12-12 | Add empty 'since' attribute for old modules and functions | Sverker Eriksson | |
2018-12-11 | Add "since" attributes in xml for new functions and modules | Sverker Eriksson | |
introduced after OTP_R13B03. | |||
2018-11-19 | public_key: Add Edward curves to the documentation | Hans Nilsson | |
2018-09-13 | public_key: Generate refman from types and specs | Hans Nilsson | |
2018-06-18 | Update copyright year | Henrik Nord | |
2018-06-12 | public: minor doc fixes | Hans Nilsson | |
2018-06-12 | public_key: Clearify pkix_verify_hostname documentation | Hans Nilsson | |
2018-06-04 | public_key: Doc | Hans Nilsson | |
2018-04-25 | public_key: Add markers for private and public keys | Hans Nilsson | |
2017-12-01 | Facilitate test certs with common root | Raimo Niskanen | |
2017-10-16 | public_key: Polish verify_hostname doc | Hans Nilsson | |
2017-10-02 | public_key: verify ip (both v4 and v6) | Hans Nilsson | |
2017-09-22 | public_key: Add app (ssl) to marker in seelalso tag | Hans Nilsson | |
2017-09-20 | public_key, ssl: Provide certitifate test data generation function in public_key | Ingela Anderton Andin | |
The ssl application uses the new function in many of its test cases. | |||
2017-07-10 | Merge branch 'ingela/public_key/ssl/CRL-error-propagation/OTP-14236' into maint | Ingela Anderton Andin | |
* ingela/public_key/ssl/CRL-error-propagation/OTP-14236: ssl: Try to make asn1 decode errors of certificates as specific as possible ssl,public_key: Provide details for CRL check failiures when revokation state can not be determined ssl: Enhance error logging | |||
2017-07-07 | ssl,public_key: Provide details for CRL check failiures when revokation ↵ | Ingela Anderton Andin | |
state can not be determined | |||
2017-07-07 | public_key: doc for new sign/4 and verify/5 | Hans Nilsson | |
2017-05-04 | Update copyright year | Raimo Niskanen | |
2017-04-12 | public_key: Public RSA key is present in private key | Ingela Anderton Andin | |
Change the return value from {#'RSAPublicKey'{}, #'RSAPrivateKey'{}} to #'RSAPrivateKey'{} This conforms to the #'ECPrivateKey'{} return value. Note that DH key will be returned as {Public::integer(), Private::integer()} as there is no key structure (record) only two integers. Maybe we would like to add extraction functions for the public key from the private ones later. | |||
2017-03-13 | Merge branch 'wiml/crypto/rsa-generate-key/ERL-165/PR-1299/OTP-14140' | Hans Nilsson | |
2017-03-09 | public_key: RSA key gen documentation | Hans Nilsson | |
2017-02-14 | public_key: generate a list of ssh fingerprints on request | Hans Nilsson | |
2017-01-25 | public_key: pkix_verify_hostname (RFC 6125) | Hans Nilsson | |
2016-12-07 | Update copyright-year | Erlang/OTP | |
2016-11-22 | public_key: ssh host key fingerprint generator added | Hans Nilsson | |
2016-06-16 | public_key: Fix Xmllint errors | Ingela Anderton Andin | |
2016-06-14 | Merge branch 'legoscia/ssl_crl_hash_dir-bis/PR-982/OTP-13530' | Ingela Anderton Andin | |
* legoscia/ssl_crl_hash_dir-bis/PR-982/OTP-13530: Skip crl_hash_dir_expired test for LibreSSL Add ssl_crl_hash_dir module Function for generating OpenSSL-style name hashes Add public_key:pkix_match_dist_point Improve formatting for crl_{check,cache} options Add issuer arg to ssl_crl_cache_api lookup callback Conflicts: lib/public_key/test/public_key_SUITE.erl | |||
2016-06-03 | public_key: Create application manual page that is man(6) | Ingela Anderton Andin | |
2016-04-25 | public_key: Remove use of crypto:rand_bytes/1 | Ingela Anderton Andin | |
public_key use cases are cryptographical so use crypto:strong_rand_bytes/1 instead. | |||
2016-04-05 | Function for generating OpenSSL-style name hashes | Magnus Henoch | |
OpenSSL has functions to generate short (eight hex digits) hashes of issuers of certificates and CRLs. These hashes are used by the "c_rehash" script to populate directories of CA certificates and CRLs, e.g. in the Apache web server. Adding this function lets an Erlang program find the right CRL for a given certificate in such a directory. | |||
2016-04-01 | Add public_key:pkix_match_dist_point | Magnus Henoch | |
2016-03-10 | public_key: Handle PEM encoded EC public keys | Ingela Anderton Andin | |
Also add missing test for PEM encoded private EC keys. | |||
2016-02-19 | Fix public_key documentation typos | Magnus Henoch | |
2015-11-05 | ssh, public_key: updates after doc review | Hans Nilsson | |
2015-11-04 | ssh, public_key: random selection of diffie-hellman moduli | Hans Nilsson | |
Also tool (public_key:gen_moduli_hrl) to convert an openssh moduli file to erlang format. | |||
2015-09-11 | Fix public_key doc | Yuki Ito | |
2015-06-28 | Updated documentation to match implementation | Red | |
Line number references are with respect to sources in public_key.erl Changes: - pkix_sign replaced public with private (L510) (Certificates are signed by private keys) - pki_asn1_type() added 'CertificateList' (L73) - pkix_sign_types added ecdsa (L404) - pkix_verify added ec_public_key() (L530) - pkix_is_issuer added 'CertificateList' (L569) | |||
2015-06-18 | Change license text to APLv2 | Bruce Yinhe | |
2015-05-11 | public_key: Align "=" sign in type declarations to decided policy | Ingela Anderton Andin | |
2015-05-07 | public_key: Align to alphabetical order | Ingela Anderton Andin | |
2015-05-07 | public_key: Correct application names and typos | Ingela Anderton Andin | |
2015-05-07 | public_key: Change structure to what editor intended | Ingela Anderton Andin | |
2015-05-07 | Editorial changes | tmanevik | |
2015-03-09 | Merge branch 'mururu/fix-type' into maint | Zandra Hird | |
* mururu/fix-type: Fix typos in the public_key doc OTP-12549 | |||
2015-03-09 | public_key: Improve CRL handling support | Ingela Anderton Andin | |
2015-02-24 | Fix typos in the public_key doc | Yuki Ito | |
2014-09-11 | public_key: Fix link errors in documentation | Ingela Anderton Andin | |
2014-09-09 | ssl, public_key: Add new option partial_chain | Ingela Anderton Andin | |
Check that the certificate chain ends with a trusted ROOT CA e.i. a self-signed certificate, but provide an option partial_chain to enable the application to define an intermediat CA as trusted. TLS RFC says: "unknown_ca A valid certificate chain or partial chain was received, but the certificate was not accepted because the CA certificate could not be located or couldn't be matched with a known, trusted CA. This message is always fatal." and also states: "certificate_list This is a sequence (chain) of certificates. The sender's certificate MUST come first in the list. Each following certificate MUST directly certify the one preceding it. Because certificate validation requires that root keys be distributed independently, the self-signed certificate that specifies the root certificate authority MAY be omitted from the chain, under the assumption that the remote end must already possess it in order to validate it in any case." X509 RFC says: "The selection of a trust anchor is a matter of policy: it could be the top CA in a hierarchical PKI, the CA that issued the verifier's own certificate(s), or any other CA in a network PKI. The path validation procedure is the same regardless of the choice of trust anchor. In addition, different applications may rely on different trust anchors, or may accept paths that begin with any of a set of trust anchors." | |||
2014-08-27 | public_key: Fix spec and documentation for pkix_crls_validate | Ingela Anderton Andin | |