Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add -key-encipherment-selector and use CA certs for verification #217

Merged
merged 2 commits into from
Jul 15, 2024

Commits on May 18, 2023

  1. Add -key-encipherment-selector and use CA certs for verification

    When a SCEP server returns multiple certificates, it is possible
    that not all certificates can or should be used for encryption.
    There already was a `KeyEnciphermentsSelector`, but that wasn't
    readily usable with the provided SCEP client. A new flag was added
    to enable this selector: `-key-encipherment-selector`. It will
    filter out certificates that aren't marked as being usable for
    key or data encryption.
    
    When verifying the `PKIMessage` from the CA only the `Recipients`
    in the outgoing message were being looked through when selecting
    a certificate to verify the signature. This commit changes that
    by including all certificates returned by the CA when the client
    performs the `GetCACerts` operation.
    hslatman committed May 18, 2023
    Configuration menu
    Copy the full SHA
    37da03c View commit details
    Browse the repository at this point in the history

Commits on Dec 1, 2023

  1. Configuration menu
    Copy the full SHA
    197f8b7 View commit details
    Browse the repository at this point in the history