-
Notifications
You must be signed in to change notification settings - Fork 4
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add initial CRL logic to cert chain verification #71
Conversation
Current dependencies on/for this PR:
This comment was auto-generated by Graphite. |
❌ Unreviewed dependencies found
|
Codecov Report
@@ Coverage Diff @@
## nick/chain #71 +/- ##
=============================================
Coverage ? 96.99%
=============================================
Files ? 7
Lines ? 1665
Branches ? 0
=============================================
Hits ? 1615
Misses ? 50
Partials ? 0 📣 We’re building smart automated test selection to slash your CI/CD build times. Learn more |
7e1cb0e
to
413781d
Compare
if crl.issuer() == trust_anchor.subject_name() { | ||
let verified_crl = crl.verify(&trust_anchor.public_key(), unix_time)?; | ||
if verified_crl.is_cert_revoked(cert.serial_number()) { | ||
return Err(Error::CertificateRevoked); |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Added a bullet item to #50, we're going to need more robust test data the current CRL has no revoked cert also need to better list out what we're planning on supporting from https://www.rfc-editor.org/rfc/rfc5280
6bb0e3d
to
e3ab151
Compare
413781d
to
2bf5d6f
Compare
e3ab151
to
224104a
Compare
ec9be0e
to
243e3dc
Compare
224104a
to
687cf04
Compare
243e3dc
to
946aa56
Compare
punting on implementing x509 chain parsing logic. |
Motivation