Sha256: 7b3de49f03f5d1325dff8aaca423d20dd00d3151ca45ec9cfd9f37f28d5cb505
Contents?: true
Size: 1.09 KB
Versions: 3
Compression:
Stored size: 1.09 KB
Contents
Feature: Signature algorithm policy As the operator of a conditionally autosigning certification authority When deciding whether to sign a certificate I want to reject certificate signing requests with weak signature algorithms In order to enforce the use of strong cryptography across our network. Desired rspec output: Certmeister::Policy::SignatureAlgorithm may be configured with a set of strong signature algorithms defaults to ["sha256"] as the set of strong signature algorithms demands a request refuses to authenticate a request with a missing pem refuses to authenticate an invalid pem refuses to authenticate a request with a weak signature algorithm authenticates a request with a strong signature algorithm Use spec/certmeister/policy/key_bits_spec.rb as a guide to specifying the behaviour. Use lib/certmeister/policy/key_bits.rb as a guide to implementing the behaviour. You may find these fixtures useful: fixtures/sha1_4096bit.csr fixtures/sha256_4096bit.csr The signature algorithm of a CSR is provided by the OpenSSL::X509::Request#signature_algorithm method.
Version data entries
3 entries across 3 versions & 1 rubygems
Version | Path |
---|---|
certmeister-2.3.2 | SignatureAlgorithm.txt |
certmeister-2.3.1 | SignatureAlgorithm.txt |
certmeister-2.3.0 | SignatureAlgorithm.txt |