aboutsummaryrefslogtreecommitdiffstats
path: root/vectors
Commit message (Collapse)AuthorAgeFilesLines
* Test vectors for OpenSSH serialization format (#5151)Marko Kreen2020-05-2521-0/+207
|
* reopen master for 3.0 dev (#5175)Paul Kehrer2020-04-021-1/+1
|
* 2.9 version and changelog bump (#5172)Paul Kehrer2020-04-021-1/+1
|
* Added a test vector of an OCSP response with SCT extension (#5066)Alex Gaynor2019-11-161-0/+0
|
* Parse single_extensions in OCSP responses (#5059)Paul Kehrer2019-11-111-0/+0
| | | | | | | | | | | | * add single_extensions to OCSPResponse (#4753) * new vector, updateed docs, more stringent parser, changelog, etc * simplify PR (no SCT for now) * add a comment * finish pulling out the sct stuff so tests might actually run
* reopen master for the 2.9 release (#5017)Paul Kehrer2019-10-171-1/+1
|
* Bump versions for 2.8 release (#5014)Alex Gaynor2019-10-171-2/+2
|
* Finish ed25519 and ed448 support in x509 module (#4972)Marko Kreen2019-09-092-0/+25
| | | | | | | | | | | | | | | | | | * Support ed25519 in csr/crl creation * Tests for ed25519/x509 * Support ed448 in crt/csr/crl creation * Tests for ed448/x509 * Support ed25519/ed448 in OCSPResponseBuilder * Tests for eddsa in OCSPResponseBuilder * Builder check missing in create_x509_csr * Documentation update for ed25519+ed448 in x509
* fix coverage by adding two artificial DSA public keys (#4984)Paul Kehrer2019-09-062-0/+0
| | | | | | | | | | * fix coverage by adding two artificial DSA public keys One key removes the optional parameters from the structure to cover a branch conditional, and the other key has its BITSTRING padding value set to a non-zero value. * lexicographic? never heard of it
* add x509 CSR with challenge password (#4942)Paul Kehrer2019-07-091-0/+16
|
* more ed25519 vectors, better description of RFC 8410 vector (#4936)Paul Kehrer2019-07-063-0/+23
| | | | | | | | * more ed25519 vectors, better description of RFC 8410 vector * typo * oops, doc'd wrong
* add ed25519ph x509 test vector (#4933)Paul Kehrer2019-07-031-0/+9
|
* reopen master for 2.8 (#4906)Paul Kehrer2019-05-301-1/+1
| | | | | | | | * reopen master for 2.8 also add the missing changelog * sigh, empty commit to trigger azure pipelines
* bump for 2.7 release (#4903)Paul Kehrer2019-05-301-1/+1
|
* add RSA PSS certificate (#4865)Paul Kehrer2019-05-041-0/+20
| | | | | | * add RSA PSS certificate * i still maintain that 257 is slightly better than 256
* Refs #4830 -- added a vector of an x.509 certificate with a negative … (#4842)Alex Gaynor2019-04-131-0/+25
| | | | | | * Refs #4830 -- added a vector of an x.509 certificate with a negative serial number * Line wrap
* add poly1305 test vectors from rfc 7539 (#4800)Paul Kehrer2019-03-071-0/+56
|
* Reopen master for 2.7 (#4788)Alex Gaynor2019-02-281-1/+1
|
* 2.6.1 release with fixed wheels (#4792)Alex Gaynor2019-02-281-1/+1
|
* bump version and update changelog for 2.6 release (#4787)Paul Kehrer2019-02-271-1/+1
| | | | | | * bump version and update changelog for 2.6 release * 1.1.1b wheels for 2.6
* add ed25519 PKCS8 and subjectPublicKeyInfo vectors (#4719)Paul Kehrer2019-02-206-0/+12
| | | | | | * add ed25519 PKCS8 and subjectPublicKeyInfo vectors * line length fix
* add ed448 PKCS8 and subjectPublicKeyInfo vectors (#4718)Paul Kehrer2019-02-206-0/+14
|
* Rename [wheel] section to [bdist_wheel] as the former is legacy (#4743)Jon Dufresne2019-02-031-1/+1
| | | | | | | For additional details, see: https://github.com/pypa/wheel/blob/3dc261abc98a5e43bc7fcf5783d080aaf8f9f0cf/wheel/bdist_wheel.py#L127-L133 http://pythonwheels.com/
* reopen master for 2.6 work (#4730)Paul Kehrer2019-01-221-1/+1
|
* changelog and version bump for 2.5 (#4729)Paul Kehrer2019-01-221-1/+1
|
* add x25519 pkcs8/subjectpublickeyinfo vectors (#4685)Paul Kehrer2019-01-136-0/+12
|
* add signature_hash_algorithm to OCSPResponse (#4681)Paul Kehrer2019-01-101-0/+0
| | | | | | * add signature_hash_algorithm to OCSPResponse * fix pointless asserts
* Another HTTPS (#4674)Alex Gaynor2019-01-021-1/+1
|
* add x448 private/public PEM/DER pkcs8/subjectpublickeyinfo vectors (#4667)Paul Kehrer2019-01-016-0/+14
|
* HTTPS a bunch of links in random places (#4666)Alex Gaynor2018-12-316-7/+7
| | | | | | * HTTPS a bunch of links in random places * What the heck happened here?
* document what the vector format is a little better (#4639)Paul Kehrer2018-12-111-0/+1
|
* add compressed point EC vectors (#4637)Paul Kehrer2018-12-101-0/+25
|
* add ed448 test vectors (#4608)Paul Kehrer2018-11-241-0/+58
|
* x448 test vectors (#4576)Paul Kehrer2018-11-121-0/+16
|
* reopen master for 2.5 development (#4571)Paul Kehrer2018-11-111-1/+1
|
* Revert O_CLOEXEC change to fix builds (#4570)Alex Gaynor2018-11-111-1/+1
|
* bump versions and update changelog for 2.4 release (#4568)Paul Kehrer2018-11-111-1/+1
|
* another pkcs12 vector (#4557)Paul Kehrer2018-11-042-0/+0
| | | | | | | | * another pkcs12 vector also fixed the pathing to be consistent in the docs for PKCS12 vectors * add a cert with no key pkcs12 as well
* additional pkcs12 test vector (#4554)Paul Kehrer2018-11-031-0/+0
|
* add pkcs12 test vectors (#4535)Paul Kehrer2018-10-305-0/+15
| | | | | | * add pkcs12 test vectors * add more explanatino
* add issuingDistributionPoint vectors (#4537)Paul Kehrer2018-10-298-0/+87
|
* add a new SCT vector (#4528)Paul Kehrer2018-10-271-0/+35
| | | | | | * add a new SCT vector * ridiculous
* next_update is not a required field on OCSP responses (#4513)Paul Kehrer2018-10-231-0/+0
|
* add OCSP request with a request extension (nonce) (#4462)Paul Kehrer2018-09-071-0/+0
|
* More OCSP vectors (#4451)Paul Kehrer2018-09-012-0/+0
| | | | | | | | * yet another ocsp response vector. and yet there will be at least one more after this * add one more
* add LE subordinate certificate to test vectors (#4450)Paul Kehrer2018-09-011-0/+27
|
* add more OCSP response vectors (#4445)Paul Kehrer2018-09-013-0/+2
| | | | | | * add more OCSP response vectors * another vector and better docs
* OCSP response vector (#4443)Paul Kehrer2018-08-311-0/+0
| | | | | | | | | | * OCSP response vector * oops, wrong name * move ocsp response vector docs * make alex happy
* Added vector for pre-certificate poison extension (#4432)Alex Gaynor2018-08-301-0/+30
|
* Fix encoding errors in RSA test keys. (#4410)David Benjamin2018-08-233-111/+110
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | * Fix encoding errors in RSA test keys. enc-rsa-pkcs8.pem and unenc-rsa-pkcs8.pem did not encode the RSA key correctly. Per RFC 8017, appendix A.1: The object identifier rsaEncryption identifies RSA public and private keys as defined in Appendices A.1.1 and A.1.2. The parameters field has associated with this OID in a value of type AlgorithmIdentifier SHALL have a value of type NULL. rsaEncryption OBJECT IDENTIFIER ::= { pkcs-1 1 } unenc-rsa-pkcs8.pem, however, was missing that NULL, which was, in turn, carried into the encrypted payload of enc-rsa-pkcs8.pem. The DER version, enc-rsa-pkcs8.der, carries this mistake too. Interestingly, unenc-rsa-pkcs8.der does *not* have it. I'm guessing it was converted with the openssl command-line tool which fixed the encoding in conversion. Current versions of OpenSSL are lax and ignore the parameters field, but it's best to test against spec-compliant inputs. Fix unenc-rsa-pkcs8.pem to match unenc-rsa-pkcs8.der and then refresh enc-rsa-pkcs8.{der,pem} with the new encoding but otherwise the same encryption parameters. I've refreshed the dumpasn1 (at least that's what it looks like) preamble at the top of each file, but the current version of dumpasn1 appears to have changed the spacing slightly, so there's some whitespace diff noise. * Update test-vectors.rst.