Merge branch 'master' into '8705_rapi_private_key'
Re #8705 - `verify_key` bugfix - added check whether the passed PEM is an actual key
Re #8708 - Added a unit test covering a scenario in which an empty identity password is passed to the generate_pkcs_identity method of the CryptographyService
Improved the generate_pkcs_identity method in such way that when None is passed as the identity password then an empty string literal ("") is used instead.
Re #8708 - Changed the behaviour of the generate_pkcs_identity method in the CryptographyService that now does not use the -CAfile argument when the passed chain of trust is empty
Added a unit test verifying that the changed method works as expected when empty chain of trust is passed
Re #8705 - Added the `verify_key` method to CryptoService.
Re #8708 - Implemented a new method in the CryptographyService that allows the caller to create a PKCS12 identity of a certificate and it's chain of trust
Covered the new method with unit tests.
Merge branch '8570_Implement_logging'
Re #8570 - Added logs
Re #8585 - Fixed an issue where required extensions based on cert. usages were not present in the generated certificate
Created an utility that converts usages to extension configuration linesDefined which extension field flags are required for certain usages
Merge remote-tracking branch 'origin/8576_crl_endpoint' into 8576_crl_endpoint
Re #8576 - openssl config template update, comment added
Re #8577 - Added a `generate_ocsp` method to the CryptoService - calls OpenSSL to generate the response.
Re #8576 - calling CryptographyService from CrlService, passphrase support
Re #8576 - cryptography.py implemented generate_crl()
Re #8576 - CrlService implemented generate_crl_response(), prepared method generate_crl in CryptographyService
Re #8575 - Fixed an issue where serial number was not passed when creating certificatesRemoved a TODO that has already been fixed
Re #8575 - Implemented CrlService that allows the caller to generate a CA database index of revoked certificates
Added an integration test verifying its validity.Renamed NOT_BEFORE_AFTER_DATE_FORMAT constant to VALID_FROM_TO_DATE_FORMAT in certificate_service.py....
Re #8575 - Added unit tests verifying that serial number is set when creating a self signed certificate
Re #8575 - Fixed an issue where the serial number was not passed when signing a CSR
Re #8575 - Added a "sn" parameter to some CryptographyService
Re #8571 - Fixed problems during walk-through code review
Re #8571 - cryptography.py unified extension specification and support for CRL LF
Re #8573 - Implemented extract_public_key_from_certificate
Re #8573 - Changed extract_public_key method in such way that it now extracts a public key from a private key instead of a certificate
Re #8573 - Implemented extract_public_key method that allows the caller to extract a public key from a certificate
Re #8569 Checking presence of OpenSSL during init
Re #8569 Parsing datetime in cryptography.py service on windows (stripping \r)
Re #8472 - Added a parameter to the craete_sscrt method in CryptographyService in order to be able to specify tha number of days for which the generated certificate will be valid.
Re #8472 - Added missing docstrings to KeyService and CertificateService classes
Re #8472 - Implemented get_chain_of_trust method and added an integration test validating it
Added return type specification to read_all method in CertificateRepository
Re #8472 - Improved parse_cert_pem method in such way that it also parses notBefore and notAfter fields now
Re #8472 - Finished implementation of parse_cert_pem method that parses a subject out of a PEM formatted certificate
Added few unit tests testing this method.
Re #8472 - WIP commit of adding a method capable of parsing a Subject from a cert PEM
Re #8471 - Merge implement DAO - source code