aboutsummaryrefslogtreecommitdiffstats
Commit message (Collapse)AuthorAgeFilesLines
* Fixes #4683 -- fixed linux kernel version that has getrandom (#4684)Alex Gaynor2019-01-123-3/+3
|
* Add bindings to get SRTP protection profile (#4679)Jeremy Lainé2019-01-111-0/+6
| | | | | This adds the ability to retrieve the selected SRTP protection profile after the DTLS handshake completes. This is needed to perform the correct key derivation if multiple profiles were offered.
* add signature_hash_algorithm to OCSPResponse (#4681)Paul Kehrer2019-01-107-18/+63
| | | | | | * add signature_hash_algorithm to OCSPResponse * fix pointless asserts
* Another HTTPS (#4674)Alex Gaynor2019-01-021-1/+1
|
* Use the contents of the ecrypt docs from the University website (#4673)Alex Gaynor2019-01-023-3/+3
|
* Update URL to EFF (#4672)Alex Gaynor2019-01-011-1/+1
|
* Fixed anchor for URL (#4670)Alex Gaynor2019-01-011-1/+1
|
* Don't try to linkcheck nist links for the time being (#4668)Alex Gaynor2019-01-011-0/+2
|
* add x448 private/public PEM/DER pkcs8/subjectpublickeyinfo vectors (#4667)Paul Kehrer2019-01-017-0/+21
|
* HTTPS a bunch of links in random places (#4666)Alex Gaynor2018-12-3110-15/+15
| | | | | | * HTTPS a bunch of links in random places * What the heck happened here?
* Sphinx's website is now https (#4662)Alex Gaynor2018-12-302-2/+2
| | | | | | * Sphinx's website is now https * Sphinx's website is now https
* DigiCert's root is now available over https (#4664)Alex Gaynor2018-12-301-1/+1
|
* Debian buster goes py3.7 (#4663)Alex Gaynor2018-12-301-2/+2
|
* Fixes #4645 -- poll() on /dev/random before reading from /dev/urandom on ↵Alex Gaynor2018-12-291-17/+55
| | | | | | | | | | | | | | | | | | Linux (#4656) * Fixes #4645 -- select() on /dev/random before reading from /dev/urandom on linux * whoops * Missing header * whoops * Review notes * Potential uninitialized fix * Signals are literally impossible
* Bump libressl versions in travis (#4654)Alex Gaynor2018-12-241-2/+4
|
* add x448 to changelog (#4652)Paul Kehrer2018-12-221-0/+2
|
* Improve error message for unsupported ciphers (#4650)Alex Gaynor2018-12-181-6/+8
| | | | | | | | | | | | * Improve error message for unsupported ciphers * fix spacing * include the openssl version number in the message * backwards * pep8
* Support compressed points in the wycheproof tests (#4648)Alex Gaynor2018-12-181-15/+5
| | | | | | | | * Support compressed points in the wycheproof tests * Handle entries with no public key * Ok, let's try this
* handle empty byte string in from_encoded_point (#4649)Paul Kehrer2018-12-172-0/+10
| | | | | | * handle empty byte string in from_encoded_point * move the error
* Fedora has rev'd its Python to 3.7 (#4647)Alex Gaynor2018-12-181-2/+2
| | | | | | * Fedora has rev'd it's Python to 3.7 * here too
* Remove spaces from RFC 4514 strings for better compliance (#4643) (#4646)Marti Raudsepp2018-12-183-8/+8
| | | | | | RFC 4514 does not explicitly allow whitespace between separators: https://tools.ietf.org/html/rfc4514 Reported-by: David Arnold <dar@xoe.solutions>
* deprecate old from_encoded_point (#4640)Paul Kehrer2018-12-115-13/+34
|
* Compressed point support (#4629)Paul Kehrer2018-12-116-3/+133
| | | | | | | | | | | | | | | | | | | | | | | | * compressed point support * refactor to use oct2point directly * small docs change * remove deprecation for the moment and a bit of review feedback * no backend arg, implicitly import it * missed a spot * double oops * remove superfluous call * use refactored method * use vector file * one last item
* document what the vector format is a little better (#4639)Paul Kehrer2018-12-111-0/+1
|
* add compressed point EC vectors (#4637)Paul Kehrer2018-12-102-0/+27
|
* convert some asserts to function calls (#4636)Paul Kehrer2018-12-101-10/+14
|
* ec key creation by curve name refactored into a method (#4634)Paul Kehrer2018-12-101-21/+10
| | | | | | * ec key creation by curve name refactored into a method * typo
* allow bytes-like for key/iv/data for symmetric encryption (#4621)Paul Kehrer2018-12-0913-49/+141
| | | | | | | | | | | | | | | | | | * allow bytearrays for key/iv for symmetric encryption * bump pypy/cffi requirements * update docs, fix some tests * old openssl is naught but pain * revert a typo * use trusty for old pypy * better error msg again * restore match
* make the same doc changes to DH as we did for ECDH (#4631)Paul Kehrer2018-12-091-6/+50
|
* Update link to MS docs (#4632)Alex Gaynor2018-12-091-1/+1
|
* Jenkins is fixed! (#4630)Alex Gaynor2018-12-091-5/+0
|
* Adds a more descriptive error msg for wrong wrapping (#4504)André Almeida2018-12-082-3/+44
| | | | | | | | | | | | | | | | | | | | * PoC code for check PEM wrap * Remove PoC check wrap code * Add PEM file info to FAQ * Add FAQ/PEM link in exception message * Fix flake8 style issues * refactor, update language * it's really amazing how bad the spell checker is * review feedback * change to etc
* Updated BLAKE2s and BLAKE2b error messages from unsupportedalgorithm … (#4519)Colin Metcalf2018-12-081-14/+6
| | | | | | | | | | | | | | | | | * Updated BLAKE2s and BLAKE2b error messages from unsupportedalgorithm exception to an explicit error. The error is now "ValueError: Digest size must be 32" (or 64 for BLAKE2b) This was done to give a more contextual error message and should be in place until OpenSSL supports variable lengths. * Updated if statements in hashes.py so that they no longer wrap to separate line. Updated test_hashes.py to unclude a test for non 32 or 64 digest_sizes that fall between 0-32/64. * Removed the new tests in test_hashes.py as the old ones were satisfactory. This also solved misaligned tabs and spaces. * Removed dead code in hashes.py that could no longer be reached after error message updates. * pep8 fix * remove superfluous parens
* Raise MemoryError when backend.derive_scrypt can't malloc enough (#4592)Tux2018-12-083-1/+34
| | | | | | | | | | | | * Raise MemoryError when backend.derive_scrypt can't malloc enough * Expose ERR_R_MALLOC_FAILURE and use the reason_match pattern to catch it * Add test_scrypt_malloc_failure in test_scrypt * let's see if this passes * add comment to filippo's blog post about scrypt's params
* Add RFC 4514 Distinguished Name formatting for Name, RDN and NameAttribute ↵Marti Raudsepp2018-12-087-72/+146
| | | | (#4304)
* remove idna as a primary dependency (#4624)Paul Kehrer2018-12-067-21/+67
| | | | | | | | | | * remove idna as a primary dependency * empty commit * dynamodb test fix (thanks to Matt Bullock) * review feedback
* encode IssuingDistributionPoint (#4618)Paul Kehrer2018-12-023-0/+205
|
* switch to twine check for verifying our readme renders on pypi (#4623)Paul Kehrer2018-12-022-2/+3
|
* centralize our bytes check (#4622)Paul Kehrer2018-12-0217-92/+50
| | | this will make life a bit easier when we support bytearrays
* switch osrandom engine to blocking mode when getting entropy (#4620)Paul Kehrer2018-12-022-15/+3
| | | | | | | | * switch osrandom engine to blocking mode when getting entropy * review feedback * we can remove this too
* reuse the libressl branch for OpenSSL built with OPENSSL_NO_PSK (#4619)Paul Kehrer2018-12-011-1/+1
|
* refactor some code into separate functions in asn1 encode (#4617)Paul Kehrer2018-12-011-20/+31
| | | | | | | | * refactor some code into separate functions in asn1 encode this will be useful in IDP encoding * review feedback
* allow multi-valued RDNs (#4616)Paul Kehrer2018-11-302-1/+18
| | | | RDNs can have multiple values. This allows them in FreshestCRL and upcoming IssuingDistributionPoint encoding support.
* IssuingDistributionPoint support (parse only) (#4552)Paul Kehrer2018-11-306-3/+519
| | | | | | | | | | | | | | | | | | | | | | * IssuingDistributionPoint support h/t to Irina Renteria for the initial work here * python 2 unfortunately still exists * py2 repr * typo caught by flake8 * add docs * review feedback * reorder args, other fixes * use the alex name * add changelog
* PKCS12 Basic Parsing (#4553)Paul Kehrer2018-11-286-0/+222
| | | | | | | | | | | | | | | | | | * PKCS12 parsing support * running all the tests is so gauche * rename func * various significant fixes * dangerous idiot here * move pkcs12 * docs updates * a bit more prose
* fix certbot downstream, show commit hash for all downstreams (#4614)Paul Kehrer2018-11-288-4/+14
| | | | | | | | * fix certbot downstream, show commit hash for all downstreams * Update aws-encryption-sdk.sh * lol
* Add a retry on docker pull to be more resilient to intermittent failures (#4609)Alex Gaynor2018-11-251-1/+1
|
* add ed448 test vectors (#4608)Paul Kehrer2018-11-242-0/+59
|
* Move SSH serialization to it's own file (#4607)Alex Gaynor2018-11-244-148/+158
| | | | | | * Move SSH serialization to it's own file * flake8
* refactor serialization module into package (#4606)Paul Kehrer2018-11-233-11/+35
| | | | | | * refactor serialization into a package so we can add a pkcs12 module * oops