aboutsummaryrefslogtreecommitdiffstats
path: root/lib/public_key/test/public_key_SUITE.erl
AgeCommit message (Collapse)Author
2017-03-10Update copyright yearRickard Green
2017-02-14public_key: generate a list of ssh fingerprints on requestHans Nilsson
2017-01-25public_key: pkix_verify_hostname (RFC 6125)Hans Nilsson
2016-11-22public_key: ssh host key fingerprint generator addedHans Nilsson
2016-06-14public_key: Add missing comma form merge commit ↵Ingela Anderton Andin
5268c7b957c30c31e551f197463cdd55a792ea69
2016-06-14Merge branch 'legoscia/ssl_crl_hash_dir-bis/PR-982/OTP-13530'Ingela Anderton Andin
* legoscia/ssl_crl_hash_dir-bis/PR-982/OTP-13530: Skip crl_hash_dir_expired test for LibreSSL Add ssl_crl_hash_dir module Function for generating OpenSSL-style name hashes Add public_key:pkix_match_dist_point Improve formatting for crl_{check,cache} options Add issuer arg to ssl_crl_cache_api lookup callback Conflicts: lib/public_key/test/public_key_SUITE.erl
2016-06-03public_key: Support more general name typesIngela Anderton Andin
2016-05-13public_key: Remove test_server config macros and unsed hooksIngela Anderton Andin
2016-04-25public_key: Remove use of crypto:rand_bytes/1Ingela Anderton Andin
public_key use cases are cryptographical so use crypto:strong_rand_bytes/1 instead.
2016-04-13Merge branch 'henrik/update-copyrightyear'Henrik Nord
* henrik/update-copyrightyear: update copyright-year
2016-04-05Function for generating OpenSSL-style name hashesMagnus Henoch
OpenSSL has functions to generate short (eight hex digits) hashes of issuers of certificates and CRLs. These hashes are used by the "c_rehash" script to populate directories of CA certificates and CRLs, e.g. in the Apache web server. Adding this function lets an Erlang program find the right CRL for a given certificate in such a directory.
2016-03-15update copyright-yearHenrik Nord
2016-03-10public_key: Handle PEM encoded EC public keysIngela Anderton Andin
Also add missing test for PEM encoded private EC keys.
2016-02-29public_key: An encapsulated PEM header shall be followed by a blank lineIngela Anderton Andin
RFC 1421 Privacy Enhancement for Electronic Mail February 1993 Encapsulated Message Pre-Encapsulation Boundary (Pre-EB) -----BEGIN PRIVACY-ENHANCED MESSAGE----- Encapsulated Header Portion (Contains encryption control fields inserted in plaintext. Examples include "DEK-Info:" and "Key-Info:". Note that, although these control fields have line-oriented representations similar to RFC 822 header fields, the set of fields valid in this context is disjoint from those used in RFC 822 processing.) Blank Line (Separates Encapsulated Header from subsequent Encapsulated Text Portion) Encapsulated Text Portion (Contains message data encoded as specified in Section 4.3.) Post-Encapsulation Boundary (Post-EB) -----END PRIVACY-ENHANCED MESSAGE-----
2015-10-08public_key: Add ssh2 ECDSA pub key handling + test caseHans Nilsson
Added encode/decode for ecdsa public keys in openssh and rfc4716 format. This is for the ssh public key algorithm ecdsa-sha2-*.
2015-06-18Change license text to APLv2Bruce Yinhe
2015-03-09public_key: Improve CRL handling supportIngela Anderton Andin
2014-02-24Add test suites performing app and appup file checksTobias Schlager
Add the mentioned test suites for *all* library and touched non-library applications.
2013-11-08public_key_SUITE: Rename id-at-countryName to id-emailAddressAndrew Bennett
2013-11-07public_key: Workaround for incorrectly encoded utf8 emailAddressAndrew Bennett
Author: Daniel Barney <[email protected]> Date: Thu Oct 25 14:33:11 2012 -0600 Most common browsers are lax in thier handling of how the emailAddress field is encoded. RFC 3280 section 4.1.2.6 defines the encoding as IA5String, however browsers will also handle certificates with the emailAddress field encoded as UTF8String. This fix allows the emailAddress to be decoded as both an IA5String and an UTF8String. Reviewed by: Andrew Bennett <[email protected]>
2013-08-29public_key: Add support for "Simple Certificate Enrollment Protocol" to PKCS-7Ingela Anderton Andin
2013-06-24public_key: Make test cases independent of failure of other test casesIngela Anderton Andin
to clean up.
2013-06-07public_key & ssl: Add ASN-1 dependencyIngela Anderton Andin
As the ASN-1 application relies on a nif in R16 for decodeing (that was not the case in R15), public_key currently has a runtime dependency on ASN-1. Hopefully we will be able to remove this dependency again in the future.
2013-05-08crypto: Deprecate functions, update doc and specsIngela Anderton Andin
2013-03-13public_key & ssl: Add support for ISO oids 1.3.14.3.2.29 and 1.3.14.3.2.27Ingela Anderton Andin
Some certificates may use these OIDs instead of the ones defined by PKIX/PKCS standard. Refactor code so that all handling of the "duplicate" oids is done by public_key. Update algorithm information in documentation.
2013-01-11public_key: CTify test suitesIngela Anderton Andin
2013-01-11Support CRL verification in public_keyIngela Anderton Andin
2013-01-11All basic test cases passIngela Anderton Andin
2012-11-16Merge remote branch 'upstream/maint'Ingela Anderton Andin
2012-11-16public_key: Add PKCS-10 documentation and PKCS-7 test caseIngela Anderton Andin
Note that PKCS-7 is an undocumented feature for now. Also added some minor enhancements to the documentation.
2012-11-15public_key: Simplified PKCS-7 and PKCS-10 specs.Ingela Anderton Andin
Used defenitions from PKIX1Explicit88 to avoid most of the overcomplicated InformationalFrameWork (and friends) ASN-1 specs. We want to keep the public_key API as small and simple as possible.
2012-11-15public_key: Added PKCS-10Fredrik Gustafsson
2012-09-05public_key: ssh_decode now handles comments, at the end of the line, ↵Ingela Anderton Andin
containing withespaces correctly
2012-08-24ssl & public_key: Workaround that some certificates encode countryname as ↵Ingela Anderton Andin
utf8 and close down gracefully if other ASN-1 errors occur. The reason certificate_unknown that is used as ALERT for ASN-1 encoding failure is described as: Some other (unspecified) issue arose in processing the certificate, rendering it unacceptable.
2011-11-01Clean up of public_key code adding specs and documentationSverker Eriksson
2011-11-01Add PKCS-8 support to public_keyIngela Anderton Andin
2011-09-21Revert "Support md2WithRSAEncryption certificates in public_key"Sverker Eriksson
This reverts commit c7e5f7576e213060cbb332be64a7c3798f6a2cc2.
2011-09-06Support md2WithRSAEncryption certificates in public_keyChristian von Roques
2011-03-24Implemented encode/decode support for ssh public key filesIngela Anderton Andin
2011-03-07Workaround for application:start(crypto) inconsistencyIngela Anderton Andin
2011-02-17Rename Suite Callback to Common Test HookLukas Larsson
2011-02-17Fix formatting for public_keyLukas Larsson
2011-02-17Add ts_install_scb to suite/0Lukas Larsson
2011-02-17Update common_test tests to conform with common_test standardLukas Larsson
2011-02-17Update public_key tests to conform with common_test standardLukas Larsson
2011-02-17Strip new lines at end of PEM entry when comparing as it may be more than oneIngela Anderton Andin
2011-02-14Improved support for RSA and DSA public keysSeth Falcon
This patch allows the public_key module to decode and encode RSA and DSA keys encoded using the SubjectPublicKeyInfo format. When pem_entry_encode is called on an RSA or DSA public key type, the key is wrapped in the SubjectPublicKeyInfo format.
2011-01-24Changed crypto start test so that it works as intendedIngela Anderton Andin
2011-01-20Skip ssl and public key tests if crypto fails to startIngela Anderton Andin
2010-11-30Fixed guard and test caseIngela Anderton Andin
Data to sign and verify should be inputed as binaries. Also cleaned up and moved some dialyzer specs.