Age | Commit message (Collapse) | Author | |
---|---|---|---|
2012-11-26 | Fix other applications | Björn Gustavsson | |
2012-11-16 | Merge remote branch 'upstream/maint' | Ingela Anderton Andin | |
2012-11-15 | public_key: Simplified PKCS-7 and PKCS-10 specs. | Ingela Anderton Andin | |
Used defenitions from PKIX1Explicit88 to avoid most of the overcomplicated InformationalFrameWork (and friends) ASN-1 specs. We want to keep the public_key API as small and simple as possible. | |||
2012-11-15 | public_key: Added PKCS-10 | Fredrik Gustafsson | |
2012-11-15 | public_key: Add PKCS-7 | Ingela Anderton Andin | |
First attempt to add PKCS-7 does not compile | |||
2012-09-11 | Merge branch 'ia/public_key/ssh_decode-comment-issue/OTP-9361' | Ingela Anderton Andin | |
* ia/public_key/ssh_decode-comment-issue/OTP-9361: public_key: ssh_decode now handles comments, at the end of the line, containing withespaces correctly | |||
2012-09-05 | public_key: Add missing references to sha224 and sha384 | Sverker Eriksson | |
2012-09-05 | public_key: ssh_decode now handles comments, at the end of the line, ↵ | Ingela Anderton Andin | |
containing withespaces correctly | |||
2012-08-31 | Update copyright years | Björn-Egil Dahlberg | |
2012-08-24 | ssl & public_key: Workaround that some certificates encode countryname as ↵ | Ingela Anderton Andin | |
utf8 and close down gracefully if other ASN-1 errors occur. The reason certificate_unknown that is used as ALERT for ASN-1 encoding failure is described as: Some other (unspecified) issue arose in processing the certificate, rendering it unacceptable. | |||
2012-08-22 | public_key: Add sha224 to RSA sign/verify | Sverker Eriksson | |
2012-08-22 | public_key: Align the interface of sign and verify with crypto | Sverker Eriksson | |
2012-08-22 | public_key: Generalised API | Ingela Anderton Andin | |
2012-08-22 | public_key: Add rsa and dss hash signing support | Andreas Schultz | |
2012-06-05 | Update to work with whitespace in exec path | Lukas Larsson | |
OTP-10106 OTP-10107 | |||
2012-04-20 | public_key: Use optimized RSA private key handling | Sverker Eriksson | |
by providing extra redundant information to crypto. | |||
2012-03-21 | Prepare for release | Ingela Anderton Andin | |
Updates for ssh that needs to restarted so no need for soft upgrade | |||
2012-02-10 | Use the public_key application for all public key handling | Ingela Anderton Andin | |
Also improved test suites to avoid copying of users keys to test server directories as this is a security liability | |||
2011-12-09 | Converted pk12 test suite files to pem and adjusted our framework | Ingela Anderton Andin | |
to deal with changes to the pkits suite. | |||
2011-11-15 | Prepare for release | Ingela Anderton Andin | |
2011-11-11 | Add clause for expected input to pubkey:pseudo_random_function/2 when | Ingela Anderton Andin | |
ASN-1 compiler is fixed. | |||
2011-11-01 | Clean up of public_key code adding specs and documentation | Sverker Eriksson | |
2011-11-01 | Additions to crypto and public_key needed for full PKCS-8 support | Ingela Anderton Andin | |
2011-11-01 | Add PKCS-8 support to public_key | Ingela Anderton Andin | |
2011-09-21 | Revert "Prepare for release" | Sverker Eriksson | |
This reverts commit a3193f17e111492bf508057ae6a26d0d7c1bc4fc. | |||
2011-09-21 | Revert "Support md2WithRSAEncryption certificates in public_key" | Sverker Eriksson | |
This reverts commit c7e5f7576e213060cbb332be64a7c3798f6a2cc2. | |||
2011-09-21 | Prepare for release | Ingela Anderton Andin | |
Updates version and appup-file | |||
2011-09-06 | Support md2WithRSAEncryption certificates in public_key | Christian von Roques | |
2011-08-08 | reindent pkix_path_validation/3 | Christian von Roques | |
2011-04-15 | Prepare for release | Ingela Anderton Andin | |
2011-03-24 | Implemented encode/decode support for ssh public key files | Ingela Anderton Andin | |
2011-03-07 | Prepare for release | Ingela Anderton Andin | |
2011-02-14 | Improved support for RSA and DSA public keys | Seth Falcon | |
This patch allows the public_key module to decode and encode RSA and DSA keys encoded using the SubjectPublicKeyInfo format. When pem_entry_encode is called on an RSA or DSA public key type, the key is wrapped in the SubjectPublicKeyInfo format. | |||
2010-12-02 | Prepare for release | Ingela Anderton Andin | |
2010-11-30 | Fixed guard and test case | Ingela Anderton Andin | |
Data to sign and verify should be inputed as binaries. Also cleaned up and moved some dialyzer specs. | |||
2010-11-29 | Fixed broken links in the documentation and dialyzer warnings | Ingela Anderton Andin | |
2010-10-20 | Fixed typo in dialyzer spec. | Ingela Anderton Andin | |
2010-10-01 | Merge branch 'maint-r14' into dev | Ingela Anderton Andin | |
Conflicts: lib/public_key/src/pubkey_cert.erl | |||
2010-09-29 | Merge branch 'ia/ssl-and-public_key/verify_fun_peer_awarness/OTP-8873' into ↵ | Erlang/OTP | |
maint-r14 * ia/ssl-and-public_key/verify_fun_peer_awarness/OTP-8873: Peer awarness | |||
2010-09-29 | Merge branch 'ia/public_key/basic_constraints/OTP-8867' into maint-r14 | Erlang/OTP | |
* ia/public_key/basic_constraints/OTP-8867: Better handling of v1 and v2 certificates. | |||
2010-09-29 | Peer awarness | Ingela Anderton Andin | |
Changed the verify fun so that it differentiate between the peer certificate and CA certificates by using valid_peer or valid as the second argument to the verify fun. It may not always be trivial or even possible to know when the peer certificate is reached otherwise. | |||
2010-09-28 | Better handling of v1 and v2 certificates. | Ingela Anderton Andin | |
V1 and v2 certificates does not have any extensions so then validate_extensions should just accept that there are none and not end up in missing_basic_constraints clause. | |||
2010-09-27 | Merge branch 'ia/public_key/basic_constraints/OTP-8867' into dev | Ingela Anderton Andin | |
* ia/public_key/basic_constraints/OTP-8867: Better handling of v1 and v2 certificates. | |||
2010-09-27 | Merge branch 'ia/ssl-and-public_key/backwards-compatibility/OTP-8858' into dev | Ingela Anderton Andin | |
* ia/ssl-and-public_key/backwards-compatibility/OTP-8858: Backwards compatibility Conflicts: lib/ssl/src/ssl_certificate_db.erl Use short INFO-message. Debugging information can be fairly easily recreated so we do not want to clutter the logs. | |||
2010-09-24 | Backwards compatibility | Ingela Anderton Andin | |
Changed implementation to retain backwards compatibility for old option {verify, 0} that shall be equivalent to {verify, verify_none}, also separate the cases unknown CA and selfsigned peer cert, and restored return value of deprecated function public_key:pem_to_der/1. | |||
2010-09-23 | Better handling of v1 and v2 certificates. | Ingela Anderton Andin | |
V1 and v2 certificates does not have any extensions so then validate_extensions should just accept that there are none and not end up in missing_basic_constraints clause. | |||
2010-09-21 | Handling of DSA key parameters | Ingela Anderton Andin | |
DSS-Params may be null in a certificate as it can inherit the parameters. Also ignore CA-certs that do not follow ASN-1 spec in RFC 5280. | |||
2010-09-15 | Corrected and added dialyzer specs | Ingela Anderton Andin | |
2010-09-10 | Improved certificate extension handling | Ingela Anderton Andin | |
Added the functionality so that the verification fun will be called when a certificate is considered valid by the path validation to allow access to eachs certificate in the path to the user application. Removed clause that only check that a extension is not critical, it does alter the verification rusult only withholds information from the application. Try to verify subject-AltName, if unable to verify it let application try. | |||
2010-09-10 | Add handling of SubjectAltName of type otherName | Ingela Anderton Andin | |