aboutsummaryrefslogtreecommitdiffstats
Commit message (Collapse)AuthorAgeFilesLines
...
* Correctly document `backend` argument of KBKDFHMAC (#5026)Jeremy Lainé2019-10-181-2/+2
| | | | The documentation states that `backend` should be a `HashBackend` instance when in fact it should be a `HMACBackend` instance.
* Fixes #5018 -- break users on OpenSSL 1.0.1 (#5022)Alex Gaynor2019-10-186-9/+47
| | | | | | | | | | | | * Fixes #5018 -- break users on OpenSSL 1.0.1 * Grammar * Syntax error * Missing import * Missing import
* reopen master for the 2.9 release (#5017)Paul Kehrer2019-10-173-3/+10
|
* Bump versions for 2.8 release (#5014)Alex Gaynor2019-10-173-8/+6
|
* Don’t downgrade pip on windows wheel building (#5015)Paul Kehrer2019-10-171-4/+3
| | | | | | | | * Don’t downgrade pip on windows wheel building * Conditionally install enum34 * Syntax
* Comply with PEP 508 by using platform_python_implementation (#5006)Sebastian Jordan2019-10-171-1/+1
|
* UniversalString needs to be encoded as UCS-4 (#5000)Marko Kreen2019-10-172-0/+19
|
* Fixes #5010 -- test and build 3.8 wheels (#5013)Alex Gaynor2019-10-176-1/+30
| | | | | | * Fixes #5010 -- test and build 3.8 wheels * try using isolated_build = True to work around a failure
* update openssls (#4995)Paul Kehrer2019-10-153-11/+25
| | | | | | | | | | * update openssls * missed one * what will this do * only do this check for 1.1.0+
* update our test to be more robust wrt some changes from upstream (#4993)Paul Kehrer2019-09-111-2/+9
|
* Simplify implementing sequence methods (#4987)Alex Gaynor2019-09-101-94/+31
| | | | | | * Simplify implementing sequence methods * flake8
* update libressl and pypy2.7 and pypy3.5 (#4989)Paul Kehrer2019-09-091-3/+5
| | | | | | | | | | * update libressl and pypy2.7 and pypy3.5 * okay can't get 7.1, let's try to at least do 7.0 * 7.1.1 does actually exist * also an empty commit to appease the codecov gods
* we're done here (#4991)Paul Kehrer2019-09-091-0/+2
|
* it's called FIPS_mode_set, not FIPS_set_mode (#4988)Paul Kehrer2019-09-091-1/+1
|
* one more missing branch (#4992)Paul Kehrer2019-09-091-0/+23
|
* fix coverage, small cleanups in tests (#4990)Paul Kehrer2019-09-093-30/+40
|
* Finish ed25519 and ed448 support in x509 module (#4972)Marko Kreen2019-09-0914-64/+662
| | | | | | | | | | | | | | | | | | * Support ed25519 in csr/crl creation * Tests for ed25519/x509 * Support ed448 in crt/csr/crl creation * Tests for ed448/x509 * Support ed25519/ed448 in OCSPResponseBuilder * Tests for eddsa in OCSPResponseBuilder * Builder check missing in create_x509_csr * Documentation update for ed25519+ed448 in x509
* be clear that NoEncryption must be an instance in the exception (#4985)Paul Kehrer2019-09-074-4/+4
|
* changelog addition for freshestcrl in CRLs (#4986)Paul Kehrer2019-09-071-0/+2
|
* Allow FreshestCRL extension in CRL (#4975)Marko Kreen2019-09-073-0/+35
| | | Per RFC5280 it is allowed in both certificates and CRL-s.
* fix coverage by adding two artificial DSA public keys (#4984)Paul Kehrer2019-09-064-0/+37
| | | | | | | | | | * fix coverage by adding two artificial DSA public keys One key removes the optional parameters from the structure to cover a branch conditional, and the other key has its BITSTRING padding value set to a non-zero value. * lexicographic? never heard of it
* Improve documentation for ECDSA sign and verify (#4970)Harry Stern2019-08-161-6/+17
| | | | - Note that signatures are DER-encoded - Note that signatures can be encoded from r,s using util function
* Add SSL_get0_verified_chain to cffi lib (#4965)arjenzorgdoc2019-08-142-0/+16
| | | | | | | | * Add SSL_get0_verified_chain to cffi lib OpenSSL 1.1.0 supports SSL_get0_verified_chain. This gives the full chain from the peer cert including your trusted CA cert. * Work around no support for #if in cdef in old cffi
* Fixes #4956 -- added a changelog entry for the removal of the asn1crypto dep ↵Alex Gaynor2019-07-281-0/+1
| | | | (#4959)
* Make DER reader into a context manager (#4957)Alex Gaynor2019-07-285-54/+65
| | | | | | | | * Make DER reader into a context manager * Added another test case * flake8
* Run pep8 tests first in travis (#4958)Alex Gaynor2019-07-281-2/+2
|
* Remove asn1crypto dependency (#4941)David Benjamin2019-07-2810-64/+509
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | * Remove non-test dependencies on asn1crypto. cryptography.io actually contains two OpenSSL bindings right now, the expected cffi one, and an optional one hidden in asn1crypto. asn1crypto contains a lot of things that cryptography.io doesn't use, including a BER parser and a hand-rolled and not constant-time EC implementation. Instead, check in a much small DER-only parser in cryptography/hazmat. A quick benchmark suggests this parser is also faster than asn1crypto: from __future__ import absolute_import, division, print_function import timeit print(timeit.timeit( "decode_dss_signature(sig)", setup=r""" from cryptography.hazmat.primitives.asymmetric.utils import decode_dss_signature sig=b"\x30\x2d\x02\x15\x00\xb5\xaf\x30\x78\x67\xfb\x8b\x54\x39\x00\x13\xcc\x67\x02\x0d\xdf\x1f\x2c\x0b\x81\x02\x14\x62\x0d\x3b\x22\xab\x50\x31\x44\x0c\x3e\x35\xea\xb6\xf4\x81\x29\x8f\x9e\x9f\x08" """, number=10000)) Python 2.7: asn1crypto: 0.25 _der.py: 0.098 Python 3.5: asn1crypto: 0.17 _der.py: 0.10 * Remove test dependencies on asn1crypto. The remaining use of asn1crypto was some sanity-checking of Certificates. Add a minimal X.509 parser to extract the relevant fields. * Add a read_single_element helper function. The outermost read is a little tedious. * Address flake8 warnings * Fix test for long-form vs short-form lengths. Testing a zero length trips both this check and the non-minimal long form check. Use a one-byte length to cover the missing branch. * Remove support for negative integers. These never come up in valid signatures. Note, however, this does change public API. * Update src/cryptography/hazmat/primitives/asymmetric/utils.py Co-Authored-By: Alex Gaynor <alex.gaynor@gmail.com> * Review comments * Avoid hardcoding the serialization of NULL in decode_asn1.py too.
* fix osrandom/builtin switching methods for 1.1.0+ (#4955)Paul Kehrer2019-07-272-7/+9
| | | | | | | | | | * fix osrandom/builtin switching methods for 1.1.0+ In 1.1.0 RAND_cleanup became a no-op. This broke changing to the builtin random engine via activate_builtin_random(). Fixed by directly calling RAND_set_rand_method. This works on 1.0.x and 1.1.x * missed an assert
* some test improvements (#4954)Paul Kehrer2019-07-271-1/+25
| | | | detect md5 and don't generate short RSA keys these changes will help if we actually try to run FIPS enabled
* add x509 CSR with challenge password (#4942)Paul Kehrer2019-07-092-0/+18
|
* add bindings to parse and create challenge passwords in X509 CSRs (#4943)Paul Kehrer2019-07-092-1/+11
| | | | | | * add bindings to parse and create challenge passwords in X509 CSRs * moved away from the 1.1.0 section
* add class methods for poly1305 sign verify operations (#4932)Jeff Yang2019-07-084-0/+91
|
* Fix some backend feature checks in tests (#4931)David Benjamin2019-07-088-20/+10
| | | | | | | | | | | | | | | * Remove irrelevant DHBackend test conditions DHBackend provides functions for plain finite-field Diffie-Hellman. X25519 and X448 are their own algorithms, and Ed25519 and Ed448 aren't even Diffie-Hellman primitives. * Add missing backend support checks. Some new AES and EC tests did not check for whether the corresponding mode or curve was supported by the backend. * Add a DummyMode for coverage
* Write a test for an uncovered line (#4940)Alex Gaynor2019-07-061-0/+24
|
* prevaricate more about anyextendedkeyusage (#4939)Paul Kehrer2019-07-061-1/+6
|
* ed25519 support in x509 certificate builder (#4937)Paul Kehrer2019-07-066-14/+168
| | | | | | | | | | * ed25519 support in x509 certificate builder This adds minimal ed25519 support. More to come. * Apply suggestions from code review Co-Authored-By: Alex Gaynor <alex.gaynor@gmail.com>
* fix inaccurate ed25519 vector docs (#4938)Paul Kehrer2019-07-061-1/+1
|
* more ed25519 vectors, better description of RFC 8410 vector (#4936)Paul Kehrer2019-07-064-2/+33
| | | | | | | | * more ed25519 vectors, better description of RFC 8410 vector * typo * oops, doc'd wrong
* add ed25519ph x509 test vector (#4933)Paul Kehrer2019-07-032-0/+11
|
* we do not use getrandom in nonblocking mode any more (#4934)Paul Kehrer2019-07-031-1/+1
|
* Alpine linux now contains python 3.7 (#4929)Alex Gaynor2019-06-221-2/+2
|
* Make the rst headers in limitations.rst consistent (#4926)Alex Gaynor2019-06-161-2/+2
|
* Fixes #4731 -- update the secure memory wiping docs (#4925)Alex Gaynor2019-06-152-7/+13
| | | | | | * Fixes #4731 -- update the secure memory wiping docs * It's a word!
* Refs #4923; deprecate OpenSSL 1.0.1 (#4924)Alex Gaynor2019-06-153-3/+5
| | | | | | * Refs #4923; deprecate OpenSSL 1.0.1 * changelog
* Switch to new notBefore/After APIs (#4914)Rosen Penev2019-06-073-4/+13
| | | Introduced in OpenSSL 1.1. Added compatibility for older versions.
* Only EVP_CTRL_AEAD_SET_TAG in _aead_setup for CCM mode (#4916)Christian Heimes2019-06-051-1/+2
|
* fixed broken random order (#4913)Alex Gaynor2019-06-031-1/+1
| | | | | | * fixed broken random order * Err, fix
* Simplify how we define random order tests in tox (#4912)Alex Gaynor2019-06-022-10/+4
|
* Manylinux2010 wheel (#4910)Paul Kehrer2019-06-025-18/+43
| | | | | | | | | | | | * add manylinux2010 wheel builder * various updates * empty commit * need to pass a plat tag * hacks need hacks
* Use the official pytest random order plugin (#4911)Alex Gaynor2019-06-021-2/+2
|