aboutsummaryrefslogtreecommitdiffstats
Commit message (Collapse)AuthorAgeFilesLines
...
* support byteslike in ConcatKDF{HMAC,Hash}, Scrypt, and X963KDF (#4709)Paul Kehrer2019-01-178-7/+70
| | | | | | | | * byteslike concatkdf * byteslike scrypt * byteslike x963kdf
* support byteslike for OTP (#4710)Paul Kehrer2019-01-173-6/+19
|
* normalize KBKDF tests (#4708)Paul Kehrer2019-01-171-38/+37
|
* Support byteslike in HKDF and PBKDF2HMAC (#4707)Paul Kehrer2019-01-176-6/+42
| | | | | | | | * support byteslike in HKDF * support byteslike in PBKDF2HMAC * add missing docs
* support bytes-like for X25519PrivateKey.from_private_bytes (#4698)Paul Kehrer2019-01-172-6/+40
| | | yuck.
* x448 and x25519 should enforce key lengths in backend (#4703)Paul Kehrer2019-01-175-4/+42
| | | | | | | | | | | * x448 and x25519 should enforce key lengths in from_private_bytes they should also check if the algorithm is supported like the public bytes class methods do * oops * move the checks
* support byteslike in hmac update (#4705)Paul Kehrer2019-01-174-4/+6
| | | needed for some KDF keying material
* support byteslike in hash updates (#4702)Paul Kehrer2019-01-163-2/+17
| | | This is needed to handle keying material in some of the KDFs
* support bytes-like keys in CMAC and HMAC contexts (#4701)Paul Kehrer2019-01-165-3/+29
|
* add support for byteslike password/data to load_{pem,der}_private_key (#4693)Paul Kehrer2019-01-163-7/+58
| | | | | | * add support for byteslike password/data to load_{pem,der}_private_key * pypy 5.4 can't do memoryview from_buffer
* turn off hypothesis deadlines, enforced by default in 4.0 (#4696)Paul Kehrer2019-01-162-2/+2
| | | | we don't care about exceeding a deadline in CI because our infra has wild variability and this can just randomly happen.
* support byteslike in aead for key and nonce (#4695)Paul Kehrer2019-01-154-18/+73
|
* support byteslike in X448PrivateKey.from_private_bytes (#4694)Paul Kehrer2019-01-153-2/+16
|
* add support for byteslike on password and data for pkcs12 loading (#4690)Paul Kehrer2019-01-153-15/+54
| | | | | | | | | | | | * add support for byteslike on password and data for pkcs12 loading * use a contextmanager to yield a null terminated buffer we can zero * review feedback * updated text * one last change
* Remove a dead assignment (#4692)Alex Gaynor2019-01-151-1/+0
|
* Serialization x25519 (#4688)Paul Kehrer2019-01-1410-21/+378
| | | | | | | | | | | | | | | | | * modify x25519 serialization to match x448 supports raw and pkcs8 encoding on private_bytes supports raw and subjectpublickeyinfo on public_bytes deprecates zero argument call to public_bytes * add docs * this is public now * don't need that * review feedback
* Update wycheproof commit in docs (#4687)Alex Gaynor2019-01-131-1/+1
|
* add x25519 pkcs8/subjectpublickeyinfo vectors (#4685)Paul Kehrer2019-01-137-0/+19
|
* support x448 public/private serialization both raw and pkcs8 (#4653)Paul Kehrer2019-01-1312-21/+497
| | | | | | | | | | | | | | | | | | | | | | | | | | | | * support x448 public/private serialization both raw and pkcs8 * add tests for all other asym key types to prevent Raw * more tests * better tests * fix a test * funny story, I'm actually illiterate. * pep8 * require PrivateFormat.Raw or PublicFormat.Raw with Encoding.Raw * missing docs * parametrize * docs fixes * remove dupe line * assert something
* Fixes #4683 -- fixed linux kernel version that has getrandom (#4684)Alex Gaynor2019-01-123-3/+3
|
* Add bindings to get SRTP protection profile (#4679)Jeremy Lainé2019-01-111-0/+6
| | | | | This adds the ability to retrieve the selected SRTP protection profile after the DTLS handshake completes. This is needed to perform the correct key derivation if multiple profiles were offered.
* add signature_hash_algorithm to OCSPResponse (#4681)Paul Kehrer2019-01-107-18/+63
| | | | | | * add signature_hash_algorithm to OCSPResponse * fix pointless asserts
* Another HTTPS (#4674)Alex Gaynor2019-01-021-1/+1
|
* Use the contents of the ecrypt docs from the University website (#4673)Alex Gaynor2019-01-023-3/+3
|
* Update URL to EFF (#4672)Alex Gaynor2019-01-011-1/+1
|
* Fixed anchor for URL (#4670)Alex Gaynor2019-01-011-1/+1
|
* Don't try to linkcheck nist links for the time being (#4668)Alex Gaynor2019-01-011-0/+2
|
* add x448 private/public PEM/DER pkcs8/subjectpublickeyinfo vectors (#4667)Paul Kehrer2019-01-017-0/+21
|
* HTTPS a bunch of links in random places (#4666)Alex Gaynor2018-12-3110-15/+15
| | | | | | * HTTPS a bunch of links in random places * What the heck happened here?
* Sphinx's website is now https (#4662)Alex Gaynor2018-12-302-2/+2
| | | | | | * Sphinx's website is now https * Sphinx's website is now https
* DigiCert's root is now available over https (#4664)Alex Gaynor2018-12-301-1/+1
|
* Debian buster goes py3.7 (#4663)Alex Gaynor2018-12-301-2/+2
|
* Fixes #4645 -- poll() on /dev/random before reading from /dev/urandom on ↵Alex Gaynor2018-12-291-17/+55
| | | | | | | | | | | | | | | | | | Linux (#4656) * Fixes #4645 -- select() on /dev/random before reading from /dev/urandom on linux * whoops * Missing header * whoops * Review notes * Potential uninitialized fix * Signals are literally impossible
* Bump libressl versions in travis (#4654)Alex Gaynor2018-12-241-2/+4
|
* add x448 to changelog (#4652)Paul Kehrer2018-12-221-0/+2
|
* Improve error message for unsupported ciphers (#4650)Alex Gaynor2018-12-181-6/+8
| | | | | | | | | | | | * Improve error message for unsupported ciphers * fix spacing * include the openssl version number in the message * backwards * pep8
* Support compressed points in the wycheproof tests (#4648)Alex Gaynor2018-12-181-15/+5
| | | | | | | | * Support compressed points in the wycheproof tests * Handle entries with no public key * Ok, let's try this
* handle empty byte string in from_encoded_point (#4649)Paul Kehrer2018-12-172-0/+10
| | | | | | * handle empty byte string in from_encoded_point * move the error
* Fedora has rev'd its Python to 3.7 (#4647)Alex Gaynor2018-12-181-2/+2
| | | | | | * Fedora has rev'd it's Python to 3.7 * here too
* Remove spaces from RFC 4514 strings for better compliance (#4643) (#4646)Marti Raudsepp2018-12-183-8/+8
| | | | | | RFC 4514 does not explicitly allow whitespace between separators: https://tools.ietf.org/html/rfc4514 Reported-by: David Arnold <dar@xoe.solutions>
* deprecate old from_encoded_point (#4640)Paul Kehrer2018-12-115-13/+34
|
* Compressed point support (#4629)Paul Kehrer2018-12-116-3/+133
| | | | | | | | | | | | | | | | | | | | | | | | * compressed point support * refactor to use oct2point directly * small docs change * remove deprecation for the moment and a bit of review feedback * no backend arg, implicitly import it * missed a spot * double oops * remove superfluous call * use refactored method * use vector file * one last item
* document what the vector format is a little better (#4639)Paul Kehrer2018-12-111-0/+1
|
* add compressed point EC vectors (#4637)Paul Kehrer2018-12-102-0/+27
|
* convert some asserts to function calls (#4636)Paul Kehrer2018-12-101-10/+14
|
* ec key creation by curve name refactored into a method (#4634)Paul Kehrer2018-12-101-21/+10
| | | | | | * ec key creation by curve name refactored into a method * typo
* allow bytes-like for key/iv/data for symmetric encryption (#4621)Paul Kehrer2018-12-0913-49/+141
| | | | | | | | | | | | | | | | | | * allow bytearrays for key/iv for symmetric encryption * bump pypy/cffi requirements * update docs, fix some tests * old openssl is naught but pain * revert a typo * use trusty for old pypy * better error msg again * restore match
* make the same doc changes to DH as we did for ECDH (#4631)Paul Kehrer2018-12-091-6/+50
|
* Update link to MS docs (#4632)Alex Gaynor2018-12-091-1/+1
|
* Jenkins is fixed! (#4630)Alex Gaynor2018-12-091-5/+0
|