-
Notifications
You must be signed in to change notification settings - Fork 164
Issues: briansmith/webpki
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Author
Label
Projects
Milestones
Assignee
Sort
Issues list
Name constraints reject too many things (www.pki.bayern.de doesn't seem to work)
#20
opened Sep 8, 2016 by
briansmith
Add OCSP support sufficient for client-side OCSP stapling for end-entity certificates
#26
opened Nov 6, 2016 by
briansmith
Add OCSP support sufficient for server-side OCSP stapling for end-entity certs
#27
opened Nov 6, 2016 by
briansmith
Add API for verifying that a private key is valid for a certificate
#35
opened Jan 23, 2017 by
briansmith
Is verification inefficient when there are many trust anchors?
help wanted
performance
#38
opened Feb 2, 2017 by
briansmith
V1 certificates are rejected with
BadDER
instead of UnsupportedCertVersion
#53
opened Jun 1, 2017 by
briansmith
Create a
PresentedDNSID
type to represented DNS IDs in certificates
#66
opened Jan 10, 2018 by
briansmith
Provide a way to get the validity time period for an
EndEntityCert
#67
opened Jan 10, 2018 by
briansmith
Make
TrustAnchor::try_from_cert_der
less of an attractive nuisance
#294
opened Oct 13, 2023 by
briansmith
Previous Next
ProTip!
What’s not been updated in a month: updated:<2024-08-03.