certificates/cas/apiv1
Mariano Cano 6d644880bd Allow to kms signers to define the SignatureAlgorithm
CloudKMS keys signs data using an specific signature algorithm, in RSA keys,
this can be PKCS#1 RSA or RSA-PSS, if the later is used, x509.CreateCertificate
will fail unless the template SignatureCertificate is properly set.

On contrast, AWSKMS RSA keys, are just RSA keys, and can sign with PKCS#1 or
RSA-PSS schemes, so right now the way to enforce one or the other is to used
templates.
2021-09-08 17:48:50 -07:00
..
extension.go Fix typos. 2020-10-05 17:20:22 -07:00
extension_test.go Add missing tests 2020-09-16 12:34:42 -07:00
options.go Add an option to avoid password prompts on step cas 2021-08-04 16:16:35 -07:00
options_test.go leverage intermediate_ca.crt for appending certs. 2020-12-23 22:41:10 -06:00
registry.go Improve initialization of SCEP authority 2021-03-12 15:49:39 +01:00
registry_test.go Do not use go 1.15 methods. 2020-09-16 13:51:49 -07:00
requests.go Add support for revocation using an extra provisioner in the RA. 2021-03-17 19:47:36 -07:00
services.go Allow to kms signers to define the SignatureAlgorithm 2021-09-08 17:48:50 -07:00
services_test.go Return a non-implemented error in stepcas.RenewCertificate. 2021-03-22 12:56:12 -07:00