-
Notifications
You must be signed in to change notification settings - Fork 165
Issues: briansmith/webpki
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Author
Label
Projects
Milestones
Assignee
Sort
Issues list
Import test from https://boringssl.googlesource.com/boringssl/+/93d8cf557f371d6a4d8e4edc5670192dab021b86/crypto/evp/evp_extra_test.cc
#8
opened Sep 29, 2015 by
briansmith
updated Sep 29, 2015
Considering only checking for duplicate keys in a chain to prevent loops
#10
opened Feb 7, 2016 by
briansmith
updated May 27, 2016
Tighten up acceptance of underscores in names
#12
opened Jun 6, 2016 by
briansmith
updated Jun 6, 2016
Add OCSP support sufficient for server-side OCSP stapling for end-entity certs
#27
opened Nov 6, 2016 by
briansmith
updated Nov 6, 2016
Verify signatures in parallel
help wanted
performance
#37
opened Feb 1, 2017 by
briansmith
updated Feb 2, 2017
Add OCSP support sufficient for client-side OCSP stapling for end-entity certificates
#26
opened Nov 6, 2016 by
briansmith
updated Apr 7, 2017
Name constraints reject too many things (www.pki.bayern.de doesn't seem to work)
#20
opened Sep 8, 2016 by
briansmith
updated May 1, 2017
Consider supporting draft-housley-rfc5280-i18n-update
#50
opened May 9, 2017 by
briansmith
updated May 9, 2017
Add API for verifying that a private key is valid for a certificate
#35
opened Jan 23, 2017 by
briansmith
updated Jul 21, 2017
Is verification inefficient when there are many trust anchors?
help wanted
performance
#38
opened Feb 2, 2017 by
briansmith
updated Aug 19, 2017
Support perfect-hash-based trust anchor lookup
#39
opened Feb 3, 2017 by
briansmith
updated Sep 26, 2017
Create a
PresentedDNSID
type to represented DNS IDs in certificates
#66
opened Jan 10, 2018 by
briansmith
updated Jan 10, 2018
Provide a way to get the validity time period for an
EndEntityCert
#67
opened Jan 10, 2018 by
briansmith
updated Jan 10, 2018
There is no way to construct the optimum certificate chain
#70
opened Jan 10, 2018 by
briansmith
updated Jan 10, 2018
Create an indexing system for efficiently selecting a cert chain given client SNI when there are many possible certificate chains to choose from.
#71
opened Jan 10, 2018 by
briansmith
updated Jan 25, 2018
Return the constructed certificate chain during verification
#68
opened Jan 10, 2018 by
briansmith
updated Sep 6, 2018
get rfc822Name/email from certificate's SAN?
#72
opened Jan 16, 2018 by
ian-p-cooke
updated Oct 9, 2018
try_from_* methods should either return an error-containing Result or an Option
good-first-bug
#73
opened May 18, 2018 by
fralalonde
updated Jan 24, 2019
V1 certificates are rejected with
BadDER
instead of UnsupportedCertVersion
#53
opened Jun 1, 2017 by
briansmith
updated Jan 28, 2019
Enforce Key Usage constraints in end-entity certificates
#95
opened Mar 16, 2019 by
briansmith
updated Mar 16, 2019
Check for required extensions when building a TrustAnchor
#99
opened May 10, 2019 by
djc
updated May 10, 2019
Previous Next
ProTip!
no:milestone will show everything without a milestone.