x509
- Sign up for GitHub or sign in to edit this page
Here are 188 public repositories matching this topic...
A native implementation of TLS in Javascript and tools to write crypto-based and network-heavy webapps
-
Updated
Oct 23, 2019 - 1 commits
- JavaScript
:lock: acmetool, an automatic certificate acquisition tool for ACME (Let's Encrypt)
-
Updated
Oct 21, 2019 - 417 commits
- Go
Description
Add docs on how to configure an OIDC provisioner on different OAuth 2.0/OpenID Connect providers:
- Microsoft
- Okta
- Auth0
- Keycloak
- ...
🧰 A zero trust swiss army knife for working with X509, OAuth, JWT, OATH OTP, etc.
-
Updated
Oct 23, 2019 - 889 commits
- Go
A utility to examine and validate certificates in a variety of formats
-
Updated
Oct 15, 2019 - 415 commits
- Go
Certificate Transparency Log Monitor
-
Updated
Oct 15, 2019 - 177 commits
- Go
Compiler-free Python crypto library backed by the OS, supporting CPython and PyPy
-
Updated
Oct 18, 2019 - 557 commits
- Python
A miniature version of Boulder, Pebble is a small RFC 8555 ACME test server not suited for a production CA
-
Updated
Oct 22, 2019 - 212 commits
- Go
trust_anchor_util doesn't need any cryptography so it should be in a crate that doesn't depend on ring. When using trust_anchor_util in a program that doesn't use ring, we shouldn't need to build ring. In particular, when trust_anchor_util is used in a build script, we shouldn't need to build ring for the host platform.
Python ASN.1 library with a focus on performance and a pythonic API
-
Updated
Oct 18, 2019 - 668 commits
- Python
Can't even get the example command to run, getting an error:
PS C:\some\current\dir\with\the script file> . .\New-SelfSignedCertificateEx.ps1
PS C:\some\current\dir\with\the script file> New-SelfsignedCertificateEx -Subject "CN=www.domain.com" -EKU "Server
Authentication", "Client authentication" `
>> -KeyUsage "KeyEncipherment, DigitalSignature" -SAN "sub.domain.com","www.domain.com",
For quite a long time Chrome has checked CT for EV certificates, very soon they will do the same for OV and DV certificates.
It seems it would be good to add a (W) or (N) when the CT policy of chrome is not met.
A short description of the feature you're requesting:
Tapping the "Server Redirected To" cell starts a new query with the specified domain.
How do you imagine this feature looking? Are there any examples of other implementations?
Currently, the cell "Server Redirected To" under "SECURITY HTTP HEADERS" gives a text string of the domain an HTTP server is redirecting to. I'm requesti
A tool to monitor a CT log for operational problems
-
Updated
Oct 19, 2019 - 80 commits
- Go
Keeps track of certificates as they are deployed in a network environment.
-
Updated
Aug 16, 2019 - 225 commits
- PHP
A Fiddler extension for examining certificates.
-
Updated
Oct 10, 2019 - 144 commits
- C#
Python script that collects SSL information from hosts
-
Updated
Oct 23, 2019 - 63 commits
- Python
The comment in the data file has them all coming from P1619 and most of them seem to be, but some of the vectors do not appear in http://libeccio.di.unisa.it/Crypto14/Lab/p1619.pdf and others from the spec are missing in the vector file.