aboutsummaryrefslogtreecommitdiffstats
Commit message (Collapse)AuthorAgeFilesLines
* OCSP response abstract base classes (#4431)Paul Kehrer2018-08-311-0/+130
| | | | | | | | | | | | * ocsp response abc * collapse SingleReponse into OCSPResponse now that we only support one * split responder_id into two properties, add tbs_response_bytes * typo * rename one method and add a mapping we'll need shortly
* refactor ocsp request parsing and generation to support only one cert (#4439)Paul Kehrer2018-08-315-177/+78
| | | | | | | | * refactor ocsp request parsing and generation to support only one cert * small doc change * notimplementederror
* Fixes #3460 -- deprecate OpenSSL 1.0.1 (#4427)Alex Gaynor2018-08-313-0/+24
| | | | | | | | | | | | * Fixes #3460 -- deprecate OpenSSL 1.0.1 * We need to import warnings * flake8 * words are hard * rephrase
* Fixed two memory leaks in x509 csr extensions (#4434)Alex Gaynor2018-08-314-6/+75
| | | | | | | | | | | | * Fixed a memory leak in x.509 OCSP no check * Fix the _actual_ leak * Speed up symbolizations * Disable backtrace by default, because it doesn't work on Windows * line length
* Lock aws-encryption-sdk and dynamodb-encryption-sdk downstream test ↵Matt Bullock2018-08-312-3/+3
| | | | | | | | | | dependencies (#4441) * lock aws-encryption-sdk and dynamodb-encryption-sdk downstream tests to frozen dependencies * explicitly identify test directory in dynanmodb-encryption-sdk downstream tests * install the frozen dependencies after installing the package to force dependencies to the frozen set
* Use a less YOLO debian (#4438)Alex Gaynor2018-08-301-1/+1
|
* Run things with -ex and shellcheck (#4436)Alex Gaynor2018-08-3010-16/+13
|
* fixed test name (#4433)Alex Gaynor2018-08-301-1/+1
| | | | | | * fixed test name * spelling is hard
* reorganize downstream tests to avoid dependency squashing (#4418)Matt Bullock2018-08-3010-60/+154
| | | | | | | | | | | | | | * reorganize downstream tests * fix run.sh syntax * add instructions for adding more downstream tests * rework downstream CI test guide into rst readme * remove unnecessary example test handler * all test handlers should "exit 1" if an unexpected argument is received
* Fixes #4357 -- document the additional release steps for a security release ↵Alex Gaynor2018-08-302-0/+17
| | | | | | | | | | | | | | (#4429) * Fixes #4357 -- document the additional release steps for a security release * One additional step * Fix a few typos * this is a word * link these
* Added vector for pre-certificate poison extension (#4432)Alex Gaynor2018-08-302-0/+32
|
* Update our security documentation to match what we actually do (#4430)Alex Gaynor2018-08-301-37/+7
| | | | | | * Update our security documentation to match what we actually do * If you stand for nothing Burr, what will you fall for?
* make an ocsp request (#4402)Paul Kehrer2018-08-305-0/+225
| | | | | | | | | | | | | | | | * make an ocsp request * update test, add docs * make it an OCSPRequestBuilder * review feedback and more tests * make it a class * empty commit to retrigger * type check
* Fixes #4426 -- use modern idiom in our bindings docs (#4428)Alex Gaynor2018-08-301-1/+1
|
* Fixes #4408 -- added an FAQ about abi3 wheels (#4425)Alex Gaynor2018-08-301-0/+8
| | | | | | * Fixes #4408 -- added an FAQ about abi3 wheels * abi3 is a word, sort of
* Fixes #4421 -- use the latest openssl 1.1.0 in travis (#4424)Alex Gaynor2018-08-291-5/+5
|
* Mention that PyCA also maintains pynacl (#4422)Alex Gaynor2018-08-291-1/+2
| | | | | | * Mention that PyCA also maintains pynacl * line wrap
* Remove several very old FAQ entries (#4423)Alex Gaynor2018-08-291-11/+1
|
* openssl 1.1.1 testing (#4112)Paul Kehrer2018-08-292-0/+7
| | | | | | | | | | | | | | * test openssl 1.1.1 * let's see what a 1.1.1 pyopenssl does * 1.1.1-pre8 * pre9 * docs and test more things * 3.7 needs xenial
* 1.1.0 locks (#4420)Paul Kehrer2018-08-294-5/+13
| | | | | | | | | | | | * Do conditional compiling of Cryptography_setup_ssl_threads * Check Cryptography_HAS_LOCKING_CALLBACKS before initing static locks Check if compiling and initing locking callbacks is necessary PEP8 fix * Make test_crypto_lock_init more complete
* Don't clone wycheproof if we're doing a downstream test (#4416)Alex Gaynor2018-08-261-1/+3
| | | | | | * Don't clone wycheproof if we're doing a downstream test * you and your rules
* Fix encoding errors in RSA test keys. (#4410)David Benjamin2018-08-234-113/+114
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | * Fix encoding errors in RSA test keys. enc-rsa-pkcs8.pem and unenc-rsa-pkcs8.pem did not encode the RSA key correctly. Per RFC 8017, appendix A.1: The object identifier rsaEncryption identifies RSA public and private keys as defined in Appendices A.1.1 and A.1.2. The parameters field has associated with this OID in a value of type AlgorithmIdentifier SHALL have a value of type NULL. rsaEncryption OBJECT IDENTIFIER ::= { pkcs-1 1 } unenc-rsa-pkcs8.pem, however, was missing that NULL, which was, in turn, carried into the encrypted payload of enc-rsa-pkcs8.pem. The DER version, enc-rsa-pkcs8.der, carries this mistake too. Interestingly, unenc-rsa-pkcs8.der does *not* have it. I'm guessing it was converted with the openssl command-line tool which fixed the encoding in conversion. Current versions of OpenSSL are lax and ignore the parameters field, but it's best to test against spec-compliant inputs. Fix unenc-rsa-pkcs8.pem to match unenc-rsa-pkcs8.der and then refresh enc-rsa-pkcs8.{der,pem} with the new encoding but otherwise the same encryption parameters. I've refreshed the dumpasn1 (at least that's what it looks like) preamble at the top of each file, but the current version of dumpasn1 appears to have changed the spacing slightly, so there's some whitespace diff noise. * Update test-vectors.rst.
* test to see what coverage pypy is providing (#4411)Paul Kehrer2018-08-231-2/+2
|
* add bindings for SCT creation (#4407)Paul Kehrer2018-08-202-0/+22
|
* Added OCSP to the changelog (#4405)Alex Gaynor2018-08-161-0/+2
|
* remove freebsd11 builder (#4401)Paul Kehrer2018-08-153-8/+0
| | | | | | | | | | | | * remove freebsd11 builder it's out of date, we can't update it, and it is unreliable * we don't test against freebsd for now * what did case sensitivity ever do for me * don't assert on bsd since we don't test on for now
* OCSP request parsing (#4393)Paul Kehrer2018-08-156-0/+419
| | | | | | | | | | | | * add public_bytes to OCSPRequest * review feedback * OCSP request parsing * change some prose * add __len__ as a required method
* Added missing methods from CRL Interface (#4400)Alex Gaynor2018-08-151-0/+18
|
* add new OCSP request vectors (#4399)Paul Kehrer2018-08-153-0/+4
|
* port 2.3.1 changelog (#4397)Paul Kehrer2018-08-141-0/+8
|
* sigh, missed one TLSv1 (#4392)Alex Gaynor2018-08-121-1/+2
|
* Document wycheproof revision we're current as of (#4390)Alex Gaynor2018-08-122-1/+14
| | | | | | | | * Document wycheproof revision we're current as of * Wycheproof is a real word! * line length
* Fixed #4380 -- do not assume TLSv1 is available in OpenSSL (#4389)Alex Gaynor2018-08-122-3/+5
| | | | | | | | * Fixed #4380 -- do not assume TLSv1 is available in OpenSSL Hallelujah! It's starting to become the case that some OpenSSLs are disabling it. * cover this file as well
* Fixes #4388 -- when running the aws-encryption-sdk tests only point pytest ↵Alex Gaynor2018-08-121-2/+2
| | | | | | | | at one directory (#4391) * Fixes #4388 -- when running the aws-encryption-sdk tests only point pytest at one directory * Drop -l, there's no purpose for how we use these
* Refs #4375 -- added ECDH EC point wycheproof tests (#4384)Alex Gaynor2018-08-061-0/+41
|
* make a certificate expire a few years in the future, fixes doctests (#4383)Alex Gaynor2018-08-061-1/+1
| | | | | | | | * make a certificate expire a few years in the future, fixes doctests 👋 to future alex when this test breaks in two years * short lived certs are a good idea
* Refs #4375 -- added RSA PSS wycheproof tests (#4381)Alex Gaynor2018-08-031-1/+41
|
* Refs #4375 -- integrate wycheproof AES CCM tests (#4379)Alex Gaynor2018-08-023-3/+41
| | | | | | * Refs #4375 -- integrate wycheproof AES CCM tests * Skip these tests if we don't have CCM support
* Updated wycheproof tests for new upstream vectors (#4378)Alex Gaynor2018-08-012-8/+18
| | | | | | | | * updated tests for upstream wycheproof changes * Updated AES tests * oops, flake8
* Use A-label strings in tests (#4374)Tim Burke2018-07-301-2/+2
| | | | | We already have coverage of the U-label deprecation warnings in test_x509_ext.py; see TestRFC822Name.test_idna and TestUniformResourceIdentifier.test_idna_no_port
* Test for expected CryptographyDeprecationWarnings (#4372)Tim Burke2018-07-283-56/+48
| | | | | | | The remaining calls to `signer()` and `verifier()` are exercising the deprecated API intentionally. Let's test that the deprecation warnings are being raised as expected. Closes #4311; see also #4314.
* Update comment (#4371)Alex Gaynor2018-07-261-2/+2
|
* Fixes #3548 - add a pyproject.toml (#4363)Alex Gaynor2018-07-233-0/+10
|
* block_size isn't part of our interface and future hashes won't have it (#4366)Paul Kehrer2018-07-232-12/+3
|
* Add more SSL_CIPHER_* functions, necessary to implement ctx.get_ciphers() in ↵Amaury Forgeot d'Arc2018-07-232-0/+30
| | | | | | | | | | | | | | | | PyPy (#4364) * Add more SSL_CIPHER_* functions, necessary to implement ctx.get_ciphers() added by Python 3.6.1. * Add placeholders for other versions * Remove parameter names * LibreSSL 2.7 has the new functions * Add entries in _conditional.py * SSL_CIPHER_get_id returns int, not char*
* sign is a method (#4362)Paul Kehrer2018-07-201-1/+1
|
* add CVE ID to security issue (#4360)Paul Kehrer2018-07-181-0/+1
|
* reopen master (#4359)Paul Kehrer2018-07-183-2/+9
|
* bump version and changelog for 2.3 release (#4356)Paul Kehrer2018-07-183-6/+4
|
* Refs #3331 -- integrated wycheproof ECDH tests (#4354)Alex Gaynor2018-07-182-0/+87
| | | | | | | | | | | | * Refs #3331 -- integrated wycheproof ECDH tests * flake8 + missing assert * Handle this error case * skip on unsupported * shouldn't need to try here any more