Jacob Barthelmeh
2daeecdb90
BIO s_socket and BN mod exp
2016-12-28 14:45:29 -07:00
Jacob Barthelmeh
ff05c8a7a5
expanding compatibility layer
2016-12-28 14:45:29 -07:00
Chris Conlon
41f6863970
add missing certs and keys to certs/include.am
2016-12-14 09:46:41 -07:00
David Garske
039aedcfba
Added "wolfSSL_use_certificate_chain_buffer_format". Added "wolfSSL_SESSION_CIPHER_get_name" to get cipher suite name using WOLFSSL_SESSION*. Moved the "wolfSSL_get_cipher_name_from_suite" function to internal.c. Added new server-cert-chain.der, which is combination of ca-cert.der and server-cert.der. Enhanced load_buffer to detect format using file extension. Can test use of DER cert chain with NO_FILESYSTEM defined using "./examples/server/server -c ./certs/server-cert-chain.der -k ./certs/server-key.der".
2016-11-30 16:26:02 -08:00
Jacob Barthelmeh
b686deecbe
PKCS12 : Add PKCS12 parsing
2016-10-29 13:12:26 -06:00
John Safranek
74002ce66a
Add the new path length test certs to include.am.
2016-09-21 12:34:01 -07:00
John Safranek
a42bd30278
CA Certificate Path Length Checking
...
1. Check the path length between an intermediate CA cert and its
signer's path length.
2. Always decode the path length if present and store it in the decoded
certificate.
3. Save the path length into the signer list.
4. Path length capped at 127.
5. Added some test certs for checking CA path lengths.
2016-09-20 21:36:37 -07:00
John Safranek
ef9c4bf5c9
Add client-ca.pem to the automake include for dist.
2016-09-15 15:38:41 -07:00
John Safranek
e3bb4c29e2
Fix openssl.test with the lean-TLS option
...
1. Make new CA cert for test that is both client-cert.pem andr
client-ecc-cert.pem.
2. Use the new client-ca.pem cert in the test script.
3. Update renewcerts script to generate client-ca.pem.
2016-09-15 11:39:30 -07:00
kaleb-himes
03295ec6d7
update certs, extend ntru to 1000 days, add der formatted ecc, new ecc buffer test
...
changes from first review
move to 256 bit defines
2016-08-12 13:00:52 -06:00
kaleb-himes
4121667586
update certs pre-release: NTRU certs expired in mid june
2016-07-25 13:05:52 -06:00
Moisés Guimarães
858da86c05
restore original certs, without OCSP Authority Information Access;
2016-01-04 17:15:29 -03:00
Moisés Guimarães
d817f0fbc8
fixes test scripts to avoid bash-isms
2016-01-04 09:27:58 -03:00
Moisés Guimarães
5fb8ea691a
updates ocsp certs with better OCSP Responder URI.
2015-12-30 16:50:22 -03:00
Jacob Barthelmeh
0c21b67bb6
add ocsp needed certs to dist
2015-12-30 10:19:20 -07:00
Moisés Guimarães
ec9d23a9c3
Merge branch 'csr'
2015-12-28 19:38:04 -03:00
toddouska
d2bdea9d96
add new ca to wolfssl website
2015-10-20 11:28:25 -07:00
Chris Conlon
edc9a24681
fix hard tabs in icerts/1024/include.am
2015-09-24 10:03:27 -06:00
Chris Conlon
86bdeaf490
add new 1024 certs/keys to include.am
2015-09-24 10:00:32 -06:00
toddouska
dc1baabd27
update wolfssl website ca
2015-09-23 16:19:55 -07:00
Chris Conlon
aa3780f6b0
add example 1024-bit server/CA certs and keys for testing
2015-09-23 13:37:34 -06:00
toddouska
088467d312
fix autoconf with new certext files
2015-09-11 14:10:11 -07:00
Ludovic FLAMENT
d2ea6f7ef0
Add support for :
...
- PEM public key loading
- set/get KeyUsage in CSR and X.509
- set/get SKID in CSR and X.509
- set/get AKID in X.509
- set/get two Certificate Policies OID in X.509
2015-09-07 09:51:21 +02:00
toddouska
9f7209b484
add new certs to include.am
2015-07-23 16:37:37 -07:00
kaleb-himes
1a0a9de9c6
changes post review
...
crl-revoked dash compliant. revoked-cert has unique fields
new print statements
2015-07-23 17:05:25 -06:00
Nickolas Lapp
3732d31955
Fixed file cleanup in gencrls, finished support for crl.test update crls sign revoked cert
2015-07-22 10:37:24 -06:00
kaleb-himes
d2de4719eb
added way to gen revoked without running renewcerts
2015-07-22 09:31:23 -06:00
Nickolas Lapp
27202912e8
Adjusted gencrls and renewcerts to add a revoked server cert
2015-07-21 17:17:41 -06:00
kaleb-himes
4743dfe813
add a uniquely, always revoked server-cert for testing
2015-07-21 15:35:24 -06:00
John Safranek
e61592b9d8
Added ECC test certificate for having keyUsage without digitalSignature.
2015-06-17 13:46:09 -07:00
John Safranek
64602d1969
added check for allowed minimum DH key size
2015-05-21 10:11:21 -07:00
kaleb-himes
173b1147b5
updated certs
2015-05-07 12:21:50 -06:00
kaleb-himes
fc24885f17
updated subject matter for server-ecc.pem
2015-05-06 11:57:32 -06:00
toddouska
47ba1368c2
add wolfssl website ca, go daddy class2 CA
2015-04-28 14:15:31 -07:00
toddouska
b12a1bb2e3
switch pkcs12 encrypted key to 3des since arc4 now off by default
2015-03-29 11:10:21 -07:00
toddouska
defc66f8db
update client encrypt key to 2048 bit version
2015-03-29 10:53:21 -07:00
toddouska
a92d4c5719
fix server-keyPkcs8Enc.pem name change error, password, and add ecc pkcs8 encrypted file
2015-02-11 17:24:15 -08:00
kaleb-himes
c539393ca4
updated all certs
2015-02-04 23:34:04 -07:00
kaleb-himes
b7ba495924
all certs in renewcerts.sh -> 1000 days
2015-02-04 23:29:56 -07:00
kaleb-himes
9261aa1d6d
crls updated
2015-02-02 11:24:30 -07:00
kaleb-himes
55d30ca277
new client-ecc-cert.pem/renewcerts updates/certs relavent name changes
2015-02-02 09:10:07 -07:00
kaleb-himes
bd1ff08aa9
certs name changes
2014-12-29 11:53:25 -07:00
toddouska
3072edb696
add compressed key support
2014-08-29 14:25:58 -07:00
toddouska
e99c7c2870
don't copy ntru-cert.der into certs/
2014-07-31 16:45:30 -07:00
Kaleb Himes
f51bba0a43
line 221 fix, portability improvements
2014-07-23 15:58:09 -06:00
Kaleb Himes
2f18af2f5f
added --override-ntru, -h, -help, and error checking
2014-07-21 15:13:37 -06:00
toddouska
161fe4894b
update ntru cert key w/ new ca
2014-07-11 15:22:16 -07:00
Kaleb Himes
ba34ba0f0f
crls to sha1 from sha256
2014-07-11 14:41:57 -06:00
Kaleb Himes
4972e0a70b
updated certs
2014-07-11 14:14:53 -06:00
Kaleb Himes
15f432c521
updated certs
2014-07-11 13:55:10 -06:00