Age | Commit message (Collapse) | Author | |
---|---|---|---|
2015-03-13 | public_key: dialyzer fixes | Ingela Anderton Andin | |
2015-03-09 | public_key: Improve CRL handling support | Ingela Anderton Andin | |
2014-08-27 | public_key: Fix spec and documentation for pkix_crls_validate | Ingela Anderton Andin | |
2014-08-27 | public_key: Fix spec and documentation for PBES | Ingela Anderton Andin | |
2014-08-25 | public_key: Add encodeing functionality for PBES1 and PBES2 | Ingela Anderton Andin | |
2014-08-22 | public_key: Add PBES1 decoding support | Ingela Anderton Andin | |
2014-02-06 | public_key: Export some dialyzer types | Ingela Anderton Andin | |
Move dilayzer types from include file to erl file and use -export_type | |||
2013-12-02 | ssl, public_key: Dialyzer fixes | Ingela Anderton Andin | |
2013-08-29 | Allow public_key:pem_entry_decode/2) to handle AES-128-CBC ciphered keys | Simon Cornish | |
Private keys generated by modern versions of ssh-keygen are ciphered with AES-128-CBC instead of DES-EDE3-CBC. Since DES-EDE3-CBC ciphered keys are handled, and the underlying support for AES-128-CBC is already present, it seems a bug of omission that AES-128-CBC ciphered keys are not. | |||
2013-06-07 | ssl: Correct rebase mistakes | Ingela Anderton Andin | |
2013-05-24 | crypto, public_key & ssl: Make more functions accept integer keys | Sverker Eriksson | |
2013-05-20 | crypto,public_key,ssl: Change return value of crypto:generate_key(ecdh,..) | Sverker Eriksson | |
to conform with the return value of the other types. | |||
2013-05-08 | ssl & public_key: Use standard name | Ingela Anderton Andin | |
2013-05-08 | ssl & public_key: Use new crypto API functions | Ingela Anderton Andin | |
2013-05-08 | crypto: Deprecate functions, update doc and specs | Ingela Anderton Andin | |
2013-05-08 | ssl, crypto: Eliminate remaining mpint and EC resource key from API | Ingela Anderton Andin | |
2013-05-08 | ssl, public_key, crypto: General generate_key and compute_key functions | Ingela Anderton Andin | |
2013-05-08 | ssl & public_key: API refinement | Ingela Anderton Andin | |
Change API so public_key:generate_key/compute_key are only called with "public_key arguments" otherwhise crypto functions can be called explicitly. | |||
2013-05-08 | public_key: use new crypto | Ingela Anderton Andin | |
2013-05-08 | crypto, public_key: Switch places of ecdh_compute_key arguments | Sverker Eriksson | |
2013-05-08 | crypto, public_key & ssl: Change API to hide resource format for EC KEY | Sverker Eriksson | |
2013-05-08 | ssl & public_key: Improved handling ECDH keys | Ingela Anderton Andin | |
2013-05-08 | ssl & public_key: New public_key API for DH/ECDH/SRP keys | Ingela Anderton Andin | |
2013-05-08 | public_key: Eliminate mpints in rsa_public/private_encrypt/decrypt | Ingela Anderton Andin | |
2013-05-08 | public_key: Use new crypto API functions sign and verify | Ingela Anderton Andin | |
2013-05-08 | PUBLIC_KEY: add support for Elliptic Curves to public_key app | Andreas Schultz | |
2013-03-13 | public_key & ssl: Add support for ISO oids 1.3.14.3.2.29 and 1.3.14.3.2.27 | Ingela Anderton Andin | |
Some certificates may use these OIDs instead of the ones defined by PKIX/PKCS standard. Refactor code so that all handling of the "duplicate" oids is done by public_key. Update algorithm information in documentation. | |||
2013-01-25 | Update copyright years | Björn-Egil Dahlberg | |
2013-01-18 | Fixed specs | Fredrik Gustafsson | |
2013-01-11 | public_key: Document pkix_path_validation/3 and pkix_crls_validate/3 | Ingela Anderton Andin | |
2013-01-11 | All basic test cases pass | Ingela Anderton Andin | |
2012-08-22 | public_key: Add sha224 to RSA sign/verify | Sverker Eriksson | |
2012-08-22 | public_key: Align the interface of sign and verify with crypto | Sverker Eriksson | |
2012-08-22 | public_key: Generalised API | Ingela Anderton Andin | |
2012-08-22 | public_key: Add rsa and dss hash signing support | Andreas Schultz | |
2012-04-20 | public_key: Use optimized RSA private key handling | Sverker Eriksson | |
by providing extra redundant information to crypto. | |||
2011-12-09 | Converted pk12 test suite files to pem and adjusted our framework | Ingela Anderton Andin | |
to deal with changes to the pkits suite. | |||
2011-11-01 | Clean up of public_key code adding specs and documentation | Sverker Eriksson | |
2011-11-01 | Additions to crypto and public_key needed for full PKCS-8 support | Ingela Anderton Andin | |
2011-11-01 | Add PKCS-8 support to public_key | Ingela Anderton Andin | |
2011-09-21 | Revert "Support md2WithRSAEncryption certificates in public_key" | Sverker Eriksson | |
This reverts commit c7e5f7576e213060cbb332be64a7c3798f6a2cc2. | |||
2011-09-06 | Support md2WithRSAEncryption certificates in public_key | Christian von Roques | |
2011-08-08 | reindent pkix_path_validation/3 | Christian von Roques | |
2011-03-24 | Implemented encode/decode support for ssh public key files | Ingela Anderton Andin | |
2011-02-14 | Improved support for RSA and DSA public keys | Seth Falcon | |
This patch allows the public_key module to decode and encode RSA and DSA keys encoded using the SubjectPublicKeyInfo format. When pem_entry_encode is called on an RSA or DSA public key type, the key is wrapped in the SubjectPublicKeyInfo format. | |||
2010-11-30 | Fixed guard and test case | Ingela Anderton Andin | |
Data to sign and verify should be inputed as binaries. Also cleaned up and moved some dialyzer specs. | |||
2010-11-29 | Fixed broken links in the documentation and dialyzer warnings | Ingela Anderton Andin | |
2010-10-01 | Merge branch 'maint-r14' into dev | Ingela Anderton Andin | |
Conflicts: lib/public_key/src/pubkey_cert.erl | |||
2010-09-29 | Merge branch 'ia/ssl-and-public_key/verify_fun_peer_awarness/OTP-8873' into ↵ | Erlang/OTP | |
maint-r14 * ia/ssl-and-public_key/verify_fun_peer_awarness/OTP-8873: Peer awarness | |||
2010-09-29 | Peer awarness | Ingela Anderton Andin | |
Changed the verify fun so that it differentiate between the peer certificate and CA certificates by using valid_peer or valid as the second argument to the verify fun. It may not always be trivial or even possible to know when the peer certificate is reached otherwise. |