certificates/kms
Mariano Cano 6d644880bd Allow to kms signers to define the SignatureAlgorithm
CloudKMS keys signs data using an specific signature algorithm, in RSA keys,
this can be PKCS#1 RSA or RSA-PSS, if the later is used, x509.CreateCertificate
will fail unless the template SignatureCertificate is properly set.

On contrast, AWSKMS RSA keys, are just RSA keys, and can sign with PKCS#1 or
RSA-PSS schemes, so right now the way to enforce one or the other is to used
templates.
2021-09-08 17:48:50 -07:00
..
apiv1 Address (most) PR comments 2021-03-21 16:42:41 +01:00
awskms Fix credentials file parameter on awskms 2021-06-11 21:40:04 -07:00
cloudkms Allow to kms signers to define the SignatureAlgorithm 2021-09-08 17:48:50 -07:00
pkcs11 gofmt linting errors 2021-09-07 11:35:51 -07:00
softkms Add tests for CreateDecrypter 2021-05-07 15:32:07 +02:00
sshagentkms add //nolint for new 1.16 deprecation warnings 2021-02-18 20:14:20 -08:00
uri Make kms uri compatible with Go 1.17. 2021-08-17 13:25:55 -07:00
yubikey gofmt linting errors 2021-09-07 11:35:51 -07:00
kms.go Move load of kms to main package. 2020-06-12 14:55:35 -07:00
kms_test.go Fix unit tests. 2020-05-19 17:45:15 -07:00