summaryrefslogtreecommitdiff
path: root/lib/public_key/test/public_key_SUITE.erl
Commit message (Collapse)AuthorAgeFilesLines
* public_key: export_all -> exportHans Nilsson2020-06-241-2/+90
|
* public_key: Add API function to retrive the subject-ID of an X509 certificateIngela Anderton Andin2020-06-051-4/+10
|
* Merge pull request #2635 from ↵Ingela Andin2020-05-261-0/+13
|\ | | | | | | | | | | | | sircinek/user-defined-tls-alert-for-selfsigned-cert Enable User defined TLS alert for selfsigned cert OTP-16592
| * Use user returned path validation error for selfsigned cert;Marcin Sikora2020-05-031-0/+13
| | | | | | | | It allows user to trigger different TLS alerts than Bad Certificate for path validation erros
* | public_key: Add support for generating certificates using RSA-PSS signaturesIngela Anderton Andin2020-04-091-5/+80
| |
* | public_key: Add API function pkix_hash_type/1Ingela Anderton Andin2020-04-091-1/+18
| |
* | public_key: Make OTP-PKIX RSASSA-PSS awareIngela Anderton Andin2020-04-091-1/+14
|/
* Update copyright yearRickard Green2020-03-131-1/+1
|
* public_key: Move parts of public_key_SUITE to new pubkey_ssh_SUITEHans Nilsson2020-02-141-345/+3
| | | | The ssh part is growing, so let's have it in a separate test suite.
* public_key: Add DSA with SHA2 supportIngela Anderton Andin2018-10-231-1/+10
|
* public_key: Remove special type signature for one testHans Nilsson2018-09-131-4/+0
|
* Update copyright yearHenrik Nord2018-06-181-1/+1
|
* public_key: Extend test case pkix_verify_hostname_subjAltNameHans Nilsson2018-06-071-2/+18
|
* public_key: Testcase for cert with wildcard in SANHans Nilsson2018-06-041-5/+14
|
* PKCS8 handling improvements:Maxim Fedorov2018-05-211-10/+19
| | | | | | * added PKCS8 encoder for DSA, RSA and EC private keys * added tests (full loop, PKCS8 decode/encode operations) * rewritten private key decoder to be more Erlang-y
* public_key: PKCS8 (Private-Key Information Syntax Standard) encoded private ↵Maxim Fedorov2018-05-211-0/+30
| | | | | | | | | | key support This patch adds support for RSA, DSA and EC private keys encoded using PKCS8 format. Test *.pem files are made with converting existing *.pem files using openssl: openssl pkcs8 -in ... -out ... -topk8 -nocrypt
* public_key: Separated failing gen_ec_param test case into twoHans Nilsson2017-12-011-17/+43
| | | | because two different curve classes were tested in one TC and on one test machine only one was supported
* Merge branch 'maint-20' into maintIngela Anderton Andin2017-11-231-2/+0
|\ | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | * maint-20: Updated OTP version Update release notes Update version numbers public_key: verify ip (both v4 and v6) public_key: Added IP4 address checks to hostname_verification tests ssl: Fix test cases to work on all test platforms public_key: Fix dialyzer spec ssl: Sessions must be registered with SNI if exists ssl: Extend hostname check to fallback to checking IP-address public_key, ssl: Handles keys so that APIs are preserved correctly ssl: Use ?FUNCTION_NAME ssl: Prepare for release ssl: Countermeasurements for Bleichenbacher attack Conflicts: lib/public_key/doc/src/public_key.xml lib/public_key/test/public_key_SUITE.erl lib/public_key/test/public_key_SUITE_data/pkix_verify_hostname_subjAltName_IP.pem lib/public_key/test/public_key_SUITE_data/verify_hostname_ip.conf lib/ssl/src/dtls_connection.erl lib/ssl/src/ssl_connection.erl lib/ssl/src/ssl_handshake.erl
| * public_key: verify ip (both v4 and v6)Hans Nilsson2017-11-221-14/+10
| |
| * public_key: Added IP4 address checks to hostname_verification testsHans Nilsson2017-11-221-0/+40
| |
* | public_key: Check that ec curve used for test is supportedIngela Anderton Andin2017-10-261-3/+16
| |
* | public_key: Handle formatting of ECC params from DER to crypto APIIngela Anderton Andin2017-10-211-3/+23
| | | | | | | | Solves ERL-482
* | public_key: Fix bug in pkix_verify_hostname with IP addressesHans Nilsson2017-10-121-6/+8
| | | | | | | | | | An IP address could in some circomstances be converted to a list and then to_lower was applied to it. So {$A,1,1,1} was changed to {$a,1,1,1} which of course didn't match....
* | public_key: verify ip (both v4 and v6)Hans Nilsson2017-10-021-14/+10
| |
* | public_key: Added IP4 address checks to hostname_verification testsHans Nilsson2017-10-021-0/+40
|/
* public_key, ssl: Provide certitifate test data generation function in public_keyIngela Anderton Andin2017-09-201-0/+100
| | | | The ssl application uses the new function in many of its test cases.
* skip ec_pem_encode_generated when underlying crypto not availableDaniel Goertzen2017-09-151-0/+7
|
* fix ERL-481 ecpkParameters representationDaniel Goertzen2017-09-111-2/+35
| | | | | | | | | | - type spec ecpk_parameters() added to represent DER-encodable ecpkParameters - type spec ecpk_parameters_api() added to represent ecpkParameters provided by the user through public_key API functions - API is now more generous in its input, and more strict in its output. - update to public key records documentation - add tests, including tests against EC key with explicit curve parameters - also fixes ERL-480
* Update copyright yearRaimo Niskanen2017-05-041-1/+1
|
* public_key: generate a list of ssh fingerprints on requestHans Nilsson2017-02-141-12/+22
|
* public_key: pkix_verify_hostname (RFC 6125)Hans Nilsson2017-01-251-0/+111
|
* public_key: ssh host key fingerprint generator addedHans Nilsson2016-11-221-2/+80
|
* public_key: Add missing comma form merge commit ↵Ingela Anderton Andin2016-06-141-1/+1
| | | | 5268c7b957c30c31e551f197463cdd55a792ea69
* Merge branch 'legoscia/ssl_crl_hash_dir-bis/PR-982/OTP-13530'Ingela Anderton Andin2016-06-141-1/+38
|\ | | | | | | | | | | | | | | | | | | | | | | | | * legoscia/ssl_crl_hash_dir-bis/PR-982/OTP-13530: Skip crl_hash_dir_expired test for LibreSSL Add ssl_crl_hash_dir module Function for generating OpenSSL-style name hashes Add public_key:pkix_match_dist_point Improve formatting for crl_{check,cache} options Add issuer arg to ssl_crl_cache_api lookup callback Conflicts: lib/public_key/test/public_key_SUITE.erl
| * Function for generating OpenSSL-style name hashesMagnus Henoch2016-04-051-1/+38
| | | | | | | | | | | | | | | | | | OpenSSL has functions to generate short (eight hex digits) hashes of issuers of certificates and CRLs. These hashes are used by the "c_rehash" script to populate directories of CA certificates and CRLs, e.g. in the Apache web server. Adding this function lets an Erlang program find the right CRL for a given certificate in such a directory.
* | public_key: Support more general name typesIngela Anderton Andin2016-06-031-6/+17
| |
* | public_key: Remove test_server config macros and unsed hooksIngela Anderton Andin2016-05-131-26/+27
| |
* | public_key: Remove use of crypto:rand_bytes/1Ingela Anderton Andin2016-04-251-2/+2
| | | | | | | | | | public_key use cases are cryptographical so use crypto:strong_rand_bytes/1 instead.
* | Merge branch 'henrik/update-copyrightyear'Henrik Nord2016-04-131-1/+1
|\ \ | |/ |/| | | | | * henrik/update-copyrightyear: update copyright-year
| * update copyright-yearHenrik Nord2016-03-151-1/+1
| |
* | public_key: Handle PEM encoded EC public keysIngela Anderton Andin2016-03-101-9/+44
|/ | | | Also add missing test for PEM encoded private EC keys.
* public_key: An encapsulated PEM header shall be followed by a blank lineIngela Anderton Andin2016-02-291-0/+11
| | | | | | | | | | | | | | | | | | | | | | | | | | | RFC 1421 Privacy Enhancement for Electronic Mail February 1993 Encapsulated Message Pre-Encapsulation Boundary (Pre-EB) -----BEGIN PRIVACY-ENHANCED MESSAGE----- Encapsulated Header Portion (Contains encryption control fields inserted in plaintext. Examples include "DEK-Info:" and "Key-Info:". Note that, although these control fields have line-oriented representations similar to RFC 822 header fields, the set of fields valid in this context is disjoint from those used in RFC 822 processing.) Blank Line (Separates Encapsulated Header from subsequent Encapsulated Text Portion) Encapsulated Text Portion (Contains message data encoded as specified in Section 4.3.) Post-Encapsulation Boundary (Post-EB) -----END PRIVACY-ENHANCED MESSAGE-----
* public_key: Add ssh2 ECDSA pub key handling + test caseHans Nilsson2015-10-081-2/+30
| | | | | Added encode/decode for ecdsa public keys in openssh and rfc4716 format. This is for the ssh public key algorithm ecdsa-sha2-*.
* Change license text to APLv2Bruce Yinhe2015-06-181-9/+10
|
* public_key: Improve CRL handling supportIngela Anderton Andin2015-03-091-2/+38
|
* Add test suites performing app and appup file checksTobias Schlager2014-02-241-1/+8
| | | | | Add the mentioned test suites for *all* library and touched non-library applications.
* public_key_SUITE: Rename id-at-countryName to id-emailAddressAndrew Bennett2013-11-081-1/+1
|
* public_key: Workaround for incorrectly encoded utf8 emailAddressAndrew Bennett2013-11-071-5/+33
| | | | | | | | | | | | | | Author: Daniel Barney <daniel@pagodabox.com> Date: Thu Oct 25 14:33:11 2012 -0600 Most common browsers are lax in thier handling of how the emailAddress field is encoded. RFC 3280 section 4.1.2.6 defines the encoding as IA5String, however browsers will also handle certificates with the emailAddress field encoded as UTF8String. This fix allows the emailAddress to be decoded as both an IA5String and an UTF8String. Reviewed by: Andrew Bennett <andrew@pagodabox.com>
* public_key: Add support for "Simple Certificate Enrollment Protocol" to PKCS-7Ingela Anderton Andin2013-08-291-43/+24
|
* public_key: Make test cases independent of failure of other test casesIngela Anderton Andin2013-06-241-0/+1
| | | | to clean up.