Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Update to use Zcrypto instead of stdlib crypto for RevocationList #4

Merged

Conversation

christopher-henderson
Copy link

No description provided.

@@ -76,7 +75,7 @@ func LintRevocationList(r *ox509.RevocationList) *ResultSet {
//
// If registry is nil then the global registry of all lints is used and this
// function is equivalent to calling LintRevocationListEx(r).
Copy link
Owner

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Thanks to the correction above I realized this should be LintRevocationList(r)

v3/go.sum Show resolved Hide resolved
@aaomidi aaomidi merged commit 7042d85 into aaomidi:crls Feb 12, 2023
aaomidi added a commit that referenced this pull request May 5, 2023
* Add the skeleton around linting CRLs

* Change the entrypoint of zlint

* Add tests for the new skeleton

* Address reviews

* starting my own suggestions to work coopertaively on he change

* Take out generics from the registration struct (#3)

* Update to use Zcrypto instead of stdlib crypto for RevocationList (#4)

* Take out generics from the registration struct (#3)

* updating to use zcrypto

* pointing zcrypto back to master

* go tidy up

---------

Co-authored-by: Amir Omidi <amir@aaomidi.com>

* Tidy go mod

* Update zcrypto

* go mod tidy one more time

* Bypass lint for Registry

* Add NextUpdate CRL lint (#5)

---------

Co-authored-by: christopher-henderson <chris@chenderson.org>
This pull request was closed.
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants