summaryrefslogtreecommitdiff
path: root/lib/public_key/test/public_key_SUITE.erl
Commit message (Collapse)AuthorAgeFilesLines
...
* public_key & ssl: Add ASN-1 dependencyIngela Anderton Andin2013-06-071-0/+2
| | | | | | | As the ASN-1 application relies on a nif in R16 for decodeing (that was not the case in R15), public_key currently has a runtime dependency on ASN-1. Hopefully we will be able to remove this dependency again in the future.
* crypto: Deprecate functions, update doc and specsIngela Anderton Andin2013-05-081-1/+1
|
* public_key & ssl: Add support for ISO oids 1.3.14.3.2.29 and 1.3.14.3.2.27Ingela Anderton Andin2013-03-131-2/+28
| | | | | | | | | | Some certificates may use these OIDs instead of the ones defined by PKIX/PKCS standard. Refactor code so that all handling of the "duplicate" oids is done by public_key. Update algorithm information in documentation.
* public_key: CTify test suitesIngela Anderton Andin2013-01-111-185/+91
|
* Support CRL verification in public_keyIngela Anderton Andin2013-01-111-2/+2
|
* All basic test cases passIngela Anderton Andin2013-01-111-1/+2
|
* Merge remote branch 'upstream/maint'Ingela Anderton Andin2012-11-161-2/+37
|\
| * public_key: Add PKCS-10 documentation and PKCS-7 test caseIngela Anderton Andin2012-11-161-1/+17
| | | | | | | | | | | | Note that PKCS-7 is an undocumented feature for now. Also added some minor enhancements to the documentation.
| * public_key: Simplified PKCS-7 and PKCS-10 specs.Ingela Anderton Andin2012-11-151-2/+6
| | | | | | | | | | | | Used defenitions from PKIX1Explicit88 to avoid most of the overcomplicated InformationalFrameWork (and friends) ASN-1 specs. We want to keep the public_key API as small and simple as possible.
| * public_key: Added PKCS-10Fredrik Gustafsson2012-11-151-0/+15
| |
* | public_key: ssh_decode now handles comments, at the end of the line, ↵Ingela Anderton Andin2012-09-051-7/+42
|/ | | | containing withespaces correctly
* ssl & public_key: Workaround that some certificates encode countryname as ↵Ingela Anderton Andin2012-08-241-2/+33
| | | | | | | | utf8 and close down gracefully if other ASN-1 errors occur. The reason certificate_unknown that is used as ALERT for ASN-1 encoding failure is described as: Some other (unspecified) issue arose in processing the certificate, rendering it unacceptable.
* Clean up of public_key code adding specs and documentationSverker Eriksson2011-11-011-25/+4
|
* Add PKCS-8 support to public_keyIngela Anderton Andin2011-11-011-24/+24
|
* Revert "Support md2WithRSAEncryption certificates in public_key"Sverker Eriksson2011-09-211-4/+1
| | | | This reverts commit c7e5f7576e213060cbb332be64a7c3798f6a2cc2.
* Support md2WithRSAEncryption certificates in public_keyChristian von Roques2011-09-061-1/+4
|
* Implemented encode/decode support for ssh public key filesIngela Anderton Andin2011-03-241-76/+340
|
* Workaround for application:start(crypto) inconsistencyIngela Anderton Andin2011-03-071-3/+3
|
* Rename Suite Callback to Common Test HookLukas Larsson2011-02-171-1/+1
|
* Fix formatting for public_keyLukas Larsson2011-02-171-4/+4
|
* Add ts_install_scb to suite/0Lukas Larsson2011-02-171-0/+2
|
* Update common_test tests to conform with common_test standardLukas Larsson2011-02-171-1/+1
|
* Update public_key tests to conform with common_test standardLukas Larsson2011-02-171-13/+14
|
* Strip new lines at end of PEM entry when comparing as it may be more than oneIngela Anderton Andin2011-02-171-3/+9
|
* Improved support for RSA and DSA public keysSeth Falcon2011-02-141-0/+26
| | | | | | | This patch allows the public_key module to decode and encode RSA and DSA keys encoded using the SubjectPublicKeyInfo format. When pem_entry_encode is called on an RSA or DSA public key type, the key is wrapped in the SubjectPublicKeyInfo format.
* Changed crypto start test so that it works as intendedIngela Anderton Andin2011-01-241-2/+2
|
* Skip ssl and public key tests if crypto fails to startIngela Anderton Andin2011-01-201-4/+7
|
* Fixed guard and test caseIngela Anderton Andin2010-11-301-3/+1
| | | | | Data to sign and verify should be inputed as binaries. Also cleaned up and moved some dialyzer specs.
* Merge branch 'ia/ssl-and-public_key/verify_fun_peer_awarness/OTP-8873' into ↵Erlang/OTP2010-09-291-0/+2
|\ | | | | | | | | | | | | maint-r14 * ia/ssl-and-public_key/verify_fun_peer_awarness/OTP-8873: Peer awarness
| * Peer awarnessIngela Anderton Andin2010-09-291-0/+2
| | | | | | | | | | | | | | Changed the verify fun so that it differentiate between the peer certificate and CA certificates by using valid_peer or valid as the second argument to the verify fun. It may not always be trivial or even possible to know when the peer certificate is reached otherwise.
* | Backwards compatibilityIngela Anderton Andin2010-09-241-3/+3
|/ | | | | | | Changed implementation to retain backwards compatibility for old option {verify, 0} that shall be equivalent to {verify, verify_none}, also separate the cases unknown CA and selfsigned peer cert, and restored return value of deprecated function public_key:pem_to_der/1.
* Improved certificate extension handlingIngela Anderton Andin2010-09-101-2/+6
| | | | | | | | | | | | | Added the functionality so that the verification fun will be called when a certificate is considered valid by the path validation to allow access to eachs certificate in the path to the user application. Removed clause that only check that a extension is not critical, it does alter the verification rusult only withholds information from the application. Try to verify subject-AltName, if unable to verify it let application try.
* Handling of path validation errors by the applicationIngela Anderton Andin2010-09-061-8/+27
| | | | | | | | | | | | | | | | | Changed the behavior of the verify_fun option so that the application can be responsible for handling path validation errors even on the server side. Also replaced the not yet documented validate_extensions_fun to be handled by the verify_fun instead. If the verify callback fun returns {fail, Reason}, the verification process is immediately stopped and an alert is sent to the peer and the TLS/SSL handshake is terminated. If the verify callback fun returns {valid, UserState}, the verification process is continued. If the verify callback fun always returns {valid, UserState}, the TLS/SSL handshake will not be terminated with respect to verification failures and the connection will be established. The verify callback fun will also be able to verify application specific extensions.
* Merge branch 'dgud/public_key/make_cert_fix' into devDan Gudmundsson2010-09-011-30/+30
|\ | | | | | | | | | | | | * dgud/public_key/make_cert_fix: Complete rename of erl_make_certs Rename Fix issuer issue in generated certs
| * Complete rename of erl_make_certsDan Gudmundsson2010-08-311-29/+29
| |
| * Fix issuer issue in generated certsDan Gudmundsson2010-08-311-1/+1
| |
* | Empty certificate chainIngela Anderton Andin2010-09-011-0/+5
|/ | | | | | | | | Handling of unkown CA certificats was changed in ssl and public_key to work as intended. In the process of doing this some test cases has been corrected as they where wrong but happened to work together with the incorrect unknown CA handling.
* Revise the public_key APIIngela Anderton Andin2010-08-231-119/+183
| | | | | Cleaned up and documented the public_key API to make it useful for general use.
* Public key test fixesDan Gudmundsson2010-06-071-3/+3
|
* OTP-8649 dg/public_key-test-coverageRaimo Niskanen2010-06-011-77/+161
|
* Merge branch 'bg/public_key-include_lib' into ccase/r13b04_devErlang/OTP2010-01-211-7/+8
|\ | | | | | | | | * bg/public_key-include_lib: public_key: fix build of test suites on Windows
| * public_key: fix build of test suites on WindowsBjörn Gustavsson2010-01-191-2/+3
|/ | | | | | | | | | | | On Windows, the ERL_TOP environment variable contains a path that only is valid for cygwin-enabled programs, such as 'make'. It is not meaningful to pass the value of $ERL_TOP in the -I option to the Erlang compiler, because the Erlang emualator does not interpret cygwin paths correctly. Therefore, -include("test_server.hrl") will fail to find test_server.hrl. Work around the problem by using -include_lib().
* The R13B03 release.OTP_R13B03Erlang/OTP2009-11-201-0/+260