aboutsummaryrefslogtreecommitdiffstats
path: root/cryptography
diff options
context:
space:
mode:
authorAlex Gaynor <alex.gaynor@gmail.com>2014-06-21 12:45:52 -0700
committerAlex Gaynor <alex.gaynor@gmail.com>2014-06-21 12:45:52 -0700
commit79a5130f7985aecd6b0680aa4a3f2d142d0bdc26 (patch)
treea6ef1d1fbb76bdbf842fe22c542f23424a819d20 /cryptography
parent5c86c317bd4a37a6f78bb4f1c2a0a3ae88967abc (diff)
parent6e85b179a8da26b26ef53ff88c08172b61e37898 (diff)
downloadcryptography-79a5130f7985aecd6b0680aa4a3f2d142d0bdc26.tar.gz
cryptography-79a5130f7985aecd6b0680aa4a3f2d142d0bdc26.tar.bz2
cryptography-79a5130f7985aecd6b0680aa4a3f2d142d0bdc26.zip
Merge pull request #1159 from reaperhulk/deprecate-mgf1
deprecate mgf1_hash_supported
Diffstat (limited to 'cryptography')
-rw-r--r--cryptography/hazmat/backends/openssl/backend.py15
1 files changed, 12 insertions, 3 deletions
diff --git a/cryptography/hazmat/backends/openssl/backend.py b/cryptography/hazmat/backends/openssl/backend.py
index bf97e42d..53d92be3 100644
--- a/cryptography/hazmat/backends/openssl/backend.py
+++ b/cryptography/hazmat/backends/openssl/backend.py
@@ -560,6 +560,15 @@ class Backend(object):
algorithm)
def mgf1_hash_supported(self, algorithm):
+ warnings.warn(
+ "mgf1_hash_supported is deprecated and will be removed in "
+ "a future version.",
+ utils.DeprecatedIn05,
+ stacklevel=2
+ )
+ return self._mgf1_hash_supported(algorithm)
+
+ def _mgf1_hash_supported(self, algorithm):
if self._lib.Cryptography_HAS_MGF1_MD:
return self.hash_supported(algorithm)
else:
@@ -569,7 +578,7 @@ class Backend(object):
if isinstance(padding, PKCS1v15):
return True
elif isinstance(padding, PSS) and isinstance(padding._mgf, MGF1):
- return self.mgf1_hash_supported(padding._mgf._algorithm)
+ return self._mgf1_hash_supported(padding._mgf._algorithm)
elif isinstance(padding, OAEP) and isinstance(padding._mgf, MGF1):
return isinstance(padding._mgf._algorithm, hashes.SHA1)
else:
@@ -1518,7 +1527,7 @@ class _RSASignatureContext(object):
raise ValueError("Digest too large for key size. Use a larger "
"key.")
- if not self._backend.mgf1_hash_supported(padding._mgf._algorithm):
+ if not self._backend._mgf1_hash_supported(padding._mgf._algorithm):
raise UnsupportedAlgorithm(
"When OpenSSL is older than 1.0.1 then only SHA1 is "
"supported with MGF1.",
@@ -1709,7 +1718,7 @@ class _RSAVerificationContext(object):
"correct key and digest algorithm."
)
- if not self._backend.mgf1_hash_supported(padding._mgf._algorithm):
+ if not self._backend._mgf1_hash_supported(padding._mgf._algorithm):
raise UnsupportedAlgorithm(
"When OpenSSL is older than 1.0.1 then only SHA1 is "
"supported with MGF1.",