Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add support for certificate chains #4

Merged
merged 2 commits into from
Feb 27, 2017
Merged

Add support for certificate chains #4

merged 2 commits into from
Feb 27, 2017

Conversation

jvehent
Copy link

@jvehent jvehent commented Feb 22, 2017

This patch adds the ability to both sign and verify
signatures that contain a certificate chain. The root
of the chain is expected to be provided separately via
an x509.CertPool passed to the Verifier.

The added FirefoxAddon test case uses a certificate
chain to check the addon signature against the Firefox
Root CA.

@jvehent jvehent force-pushed the verifycertchain branch 3 times, most recently from dc1ac19 to d1f2542 Compare February 26, 2017 16:29
This patch adds the ability to both sign and verify
signatures that contain a certificate chain. The root
of the chain is expected to be provided separately via
an x509.CertPool passed to the Verifier.

The added FirefoxAddon test case uses a certificate
chain to check the addon signature against the Firefox
Root CA.
@jvehent jvehent merged commit 876afa2 into master Feb 27, 2017
jentfoo pushed a commit to gravitational/pkcs7 that referenced this pull request Jul 24, 2023
* Refactor verification to handle passing multiple cert pools (#2)

* pass VerifyOptions instead of one cert pool

Signed-off-by: Meredith Lancaster <[email protected]>

* add eku usage to test

Signed-off-by: Meredith Lancaster <[email protected]>

* add new method for non breaking changes

Signed-off-by: Meredith Lancaster <[email protected]>

* add default EKU settings

Signed-off-by: Meredith Lancaster <[email protected]>

* verifySignatureAtTime should be used

Signed-off-by: Meredith Lancaster <[email protected]>

Signed-off-by: Meredith Lancaster <[email protected]>

* remove print statements made during testing

Signed-off-by: Meredith Lancaster <[email protected]>

* fix tests that were accidentally updated

Signed-off-by: Meredith Lancaster <[email protected]>

* comment out use of more insecure algorithms

Signed-off-by: Meredith Lancaster <[email protected]>

* use GODEBUG so tests can run with sha1 algorithm

Signed-off-by: Meredith Lancaster <[email protected]>

* add sha1 algorithms back

Signed-off-by: Meredith Lancaster <[email protected]>

* update comment

Signed-off-by: Meredith Lancaster <[email protected]>

* Cleanup tests (#3)

* remove print statements made during testing

Signed-off-by: Meredith Lancaster <[email protected]>

* comment out use of more insecure algorithms

Signed-off-by: Meredith Lancaster <[email protected]>

* use GODEBUG so tests can run with sha1 algorithm

Signed-off-by: Meredith Lancaster <[email protected]>

* add sha1 algorithms back

Signed-off-by: Meredith Lancaster <[email protected]>

* update comment

Signed-off-by: Meredith Lancaster <[email protected]>

Signed-off-by: Meredith Lancaster <[email protected]>

---------

Signed-off-by: Meredith Lancaster <[email protected]>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant