aboutsummaryrefslogtreecommitdiffstats
path: root/vectors/cryptography_vectors/x509
Commit message (Collapse)AuthorAgeFilesLines
* add new OCSP request vectors (#4399)Paul Kehrer2018-08-152-0/+0
|
* Added badtime.pem vector (#4179)Joshua Crowgey2018-03-301-0/+18
| | | | | | | | * Added badtime.pem vector In connection with forthcoming PR to fix #4158 * shortened line, corrected and->and
* add utf8 DNSName x509 vector (#3952)Paul Kehrer2017-10-091-0/+41
|
* add Freshest CRL and Delta CRL Indicator test vectors (#3932)Paul Kehrer2017-09-202-0/+30
|
* add unique identifier test vector (#3925)Paul Kehrer2017-09-191-0/+11
| | | | | | * add unique identifier test vector * wrap a line I didn't even touch...
* add X509 test vector with a TLS Feature (RFC 7633) extension (#3898)Paul Kehrer2017-09-081-0/+33
|
* add initial OCSP request test vector (#3890)Paul Kehrer2017-09-071-0/+0
|
* add test vector with invalid basicconstraints (#3866)Paul Kehrer2017-08-151-0/+34
| | | | | | * add test vector with invalid basicconstraints * sigh
* Add is_signature_valid method on CertificateRevocationList (#3849)Vincent Pelletier2017-08-122-0/+56
|
* Enlarge _oid2txt buffer to handle larger OIDs (#3612)Fraser Tweedale2017-05-291-0/+32
| | | | | | | | | The OpenSSL manual recommends a buffer size of 80 for OBJ_oid2txt: https://www.openssl.org/docs/crypto/OBJ_nid2ln.html#return_values. But OIDs longer than this occur in real life (e.g. Active Directory makes some very long OIDs). If the length of the stringified OID exceeds the buffer size, allocate a new buffer that is big enough to hold the stringified OID, and re-do the conversion into the new buffer.
* Refs #3461 -- added a test vector with SCTs (#3462)Alex Gaynor2017-03-191-0/+30
| | | | | | * Refs #3461 -- added a test vector with SCTs * timestamp is a word
* add alternate signature OID for RSA with SHA1 + test and vector (#3227)Paul Kehrer2016-11-111-0/+12
| | | | | | * add alternate signature OID for RSA with SHA1 + test and vector * mozilla is a proper noun leave me alone spellchecker
* add e-trust russian x509 test vectorPaul Kehrer2016-03-111-0/+0
|
* Merge pull request #2670 from joernheissler/x509_req_verifyPaul Kehrer2016-03-061-0/+10
|\ | | | | Add verify method on CertificateSigningRequest
| * Add verify method on CertificateSigningRequestJoern Heissler2016-01-131-0/+10
| |
* | add another policy constraints test vectorPaul Kehrer2016-02-271-0/+17
| |
* | Added the department of state root, which has a policyConstraints extensionAlex Gaynor2016-02-261-0/+40
|/
* new unsupported extension x509 test vectorPaul Kehrer2015-12-301-0/+14
| | | | see #2288
* add new CRL test vectorPaul Kehrer2015-12-221-0/+14
|
* support CRLs with no revoked certificatesPaul Kehrer2015-12-201-0/+12
|
* add new CRL to test invalid certIssuer entry extensionErik Trauschke2015-10-151-0/+11
|
* Merge pull request #2402 from ddcc/patch-1Paul Kehrer2015-10-112-0/+65
|\ | | | | minor fix to handle malformed certificates without hostname
| * fix to handle malformed certificates without hostnameDominic Chen2015-10-102-0/+65
| |
* | Fixed #2404 -- handle a certificate with an unknown public keyAlex Gaynor2015-10-101-0/+28
|/
* remove critical flag from cert issuer entry ext to work with OpenSSL < 1.0.0Erik Trauschke2015-09-031-34/+33
|
* add intermediate CA vector for future AuthorityKeyIdentifier testingPaul Kehrer2015-08-051-0/+25
|
* add test vector from #2183Paul Kehrer2015-08-011-0/+16
|
* add SAN ediPartyName and x400Address test vectorsPaul Kehrer2015-07-042-0/+0
|
* add name constraints vector with /32 and /128 IP networksPaul Kehrer2015-07-011-0/+19
|
* add more basic name constraints vectorPaul Kehrer2015-06-292-0/+36
|
* add new name constraints vector with invalid IP netmaskPaul Kehrer2015-06-281-0/+18
|
* fix permitted/excluded nameconstraints vector to have valid IP netmaskPaul Kehrer2015-06-281-11/+11
|
* add wildcard IDNA SANPaul Kehrer2015-06-261-0/+18
|
* Merge pull request #2059 from reaperhulk/add-wildcard-sanAlex Gaynor2015-06-231-0/+36
|\ | | | | add wildcard SAN x509 test vector
| * add wildcard SAN x509 test vectorPaul Kehrer2015-06-231-0/+36
| |
* | name constraints should not contain a wildcard characterPaul Kehrer2015-06-233-36/+35
|/ | | | | According to RFC 5280 you should just start with a . (e.g. .domain.com instead of *.domain.com)
* Merge pull request #2040 from reaperhulk/policy-constraints-vectorsAlex Gaynor2015-06-183-0/+54
|\ | | | | add x509 policy constraints test vectors
| * add x509 policy constraints test vectorsPaul Kehrer2015-06-173-0/+54
| |
* | Merge pull request #2043 from reaperhulk/nc-vectorsAlex Gaynor2015-06-183-0/+57
|\ \ | | | | | | add name constraints test vectors
| * | add name constraints test vectorsPaul Kehrer2015-06-173-0/+57
| |/
* / add issuer alternative name test vectorPaul Kehrer2015-06-171-0/+19
|/
* add OCSPNoCheck test vectorPaul Kehrer2015-06-071-0/+18
|
* add example CRL PEM files to vectorsErik Trauschke2015-05-294-0/+70
|
* add SAN vector with IDNA 2003 encodingPaul Kehrer2015-05-181-0/+17
|
* Adds new CSR test vector.Andre Caron2015-05-161-0/+64
|
* Moves CSR test vectors to requests folder.Andre Caron2015-05-163-0/+0
|
* Fixes critical flag in CSR test vector.Andre Caron2015-05-161-48/+48
|
* Adds test vectors for X.509 CSR decoding.Andre Caron2015-05-153-0/+194
|
* more CDP vectors!Paul Kehrer2015-05-122-0/+28
|
* add another certificate policies test vectorPaul Kehrer2015-05-121-0/+18
|