Skip to content

Releases: mirleft/ocaml-x509

0.6.2

24 Aug 18:01
Compare
Choose a tag to compare

0.6.2 (2018-08-24)

  • compatibility with ppx_sexp_conv >v0.11.0 (#109), required for 4.07.0

0.6.1

21 Dec 22:38
Compare
Choose a tag to compare

0.6.1 (2017-12-21)

  • provide X509.distinguished_name sexp converter (#103)
  • drop non-exported X509_types module from distinguished_name (#102, @yomimono)

0.6.0

13 Dec 22:25
Compare
Choose a tag to compare

0.6.0 (2017-12-13)

  • Certificate Revocation List (CRL) support (#99)
  • track asn1-combinators 0.2.0 changes (#97)
  • provide Extension.subject_alt_names (#95)
  • compute length of certificate length, instead of hardcoding 4 (#95)
  • enable safe-string (#89)
  • use astring instead of custom String_ext.split (#89)
  • use topkg instead of oasis (#88, #89)
  • provide Encoding.cs_of_distinguished_name (#87 by @reynir)

late summer

13 Sep 09:31
Compare
Choose a tag to compare
  • provide Encoding.parse_signing_request and Encoding.cs_of_signing_request (#81)
  • provide validity : t -> (Time.t * Time.t) (#86, fixes #85)

building chain bugfix

13 Apr 10:41
Compare
Choose a tag to compare
  • bugfix release for broken build_chain functionality

nocamlp4

21 Mar 10:56
Compare
Choose a tag to compare

Now using PPX instead of camlp4, and nocrypto-0.5.3 compat

after lunch

04 Dec 23:07
Compare
Choose a tag to compare
  • avoid dependency on sexplib.syntax (#55)
  • document how to combine extensions and a CSR into a certificate (@reynir, #63 #64)
  • expose fingerprint : t -> hash -> Cstruct.t, the hash of the certificate (@cfcs, #66)
  • trust_fingerprint / server_fingerprint are renamed to trust_cert_fingerprint / server_cert_fingerprint (now deprecated!)
  • fingerprint public keys (rather than certificates): trust_key_fingerprint / server_key_fingerprint
  • build certificate paths from the received set (RFC 4158) instead of requiring a strict chain (#74)
  • the given trust anchors to Authenticator.chain_of_trust are not validated (to contain KeyUsage / BasicConstraint extensions) anymore, users can use valid_ca and valid_cas to filter CAs upfront

all the PKCS!!!11!!!

02 Jul 13:14
Compare
Choose a tag to compare

from our CHANGES:

  • certificate signing request support (PKCS10)
  • basic CA functionality (in CA module): create and sign certificate signing requests
  • PEM encoding of X.509 certificates, RSA public and private keys, and certificate signing requests
  • new module Extension contains X509v3 extensions as polymorphic variants
  • expose distinguished_name as polymorphic variant
  • type pubkey is now public_key
  • function cert_pubkey is now public_key
  • functions supports_usage, supports_extended_usage are now in Extension module
  • types key_usage, extended_key_usage are now in Extension module
  • Encoding.Pem.Cert has been renamed to Encoding.Pem.Certificate
  • Encoding.Pem.PK has been renamed to Encoding.Pem.Private_key (now uses type private_key instead of Nocrypto.Rsa.priv)

partial PKCS8 support

02 May 20:56
Compare
Choose a tag to compare
  • unencrypted PKCS8 private key support #49

solar eclipse - special edition release

19 Mar 16:09
Compare
Choose a tag to compare
  • more detailed error messages (type certificate_failure modified)
  • no longer Printf.printf debug messages
  • error reporting: Ok of certificate option |Fail of certificate_failure
  • fingerprint verification can work with None as host (useful for client authentication where host is not known upfront)
  • API reshape: X509 is the only public module, X509.t is the abstract certificate