aboutsummaryrefslogtreecommitdiffstats
path: root/CHANGELOG.rst
Commit message (Collapse)AuthorAgeFilesLines
* The HKDF limit is actually 255 * digest_length_in_bytes (#4037)Paul Kehrer2018-01-061-0/+1
| | | | | | | | | | | * The HKDF limit is actually 255 * digest_length_in_bytes Previously we had a bug where we divided digest_size by 8...but HashAlgorithm.digest_size is already in bytes. * test longer output * changelog
* port changelog for 2.1.4 to master (#4031)Paul Kehrer2017-11-291-0/+7
|
* forward port changelog (#4009)Alex Gaynor2017-11-021-0/+8
|
* Forward port 2.1.2 changelog (#3998)Alex Gaynor2017-10-241-0/+8
|
* Add Multifernet.rotate method (#3979)Chris Wolfe2017-10-191-0/+2
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | * add rotate method * add some more tests for the failure modes * start adding some documentation for the rotate method * operate on a single token at a time, leave lists to the caller * add versionadded add versionadded, drop rotate from class doctest * give rotate a doctest * single level, not aligned * add changelog for mf.rotate * show that, once rotated, the old fernet instance can no longer decrypt the token * add the instead of just the how * update docs to reflect removal of ttl from rotate * update tests * refactor internal methods so that we can extract the timestamp * implement rotate * update wordlist (case sensitive?) * lints * consistent naming * get_token_data/get_unverified_token_data -> better name * doc changes * use the static method, do not treat as imethod * move up to MultiFernet docs * add to authors * alter wording * monkeypatch time to make it less possible for the test to pass simply due to calls occuring in less than one second * set the time after encryption to make sure that the time is preserved as part of re-encryption
* Make changelog for A-label more readable (#3977)Christian Heimes2017-10-171-7/+9
| | | | | "value, value, and value" isn't very helpful. Signed-off-by: Christian Heimes <cheimes@redhat.com>
* port 2.1.1 changelog (#3975)Paul Kehrer2017-10-121-0/+7
|
* expunge python 2.6 (#3962)Paul Kehrer2017-10-111-0/+1
| | | | | | | | | | * expunge python 2.6 * how did THAT happen * remove another unsupported python from the tox envlist * hypothesis can now be unconditionally imported
* start the twenty second release cycle (#3960)Paul Kehrer2017-10-111-0/+7
|
* update changelog release date and bump version for 2.1 release (#3958)Paul Kehrer2017-10-111-4/+2
|
* Update docs and changelog for URI, RFC822Name, and DNSName (#3955)Paul Kehrer2017-10-111-20/+14
| | | | | | | | | | | | | | | | * Update docs and changelog for URI, RFC822Name, and DNSName As of 2.1 we want users to pass A-label strings, but we still accept U-label strings and auto-encode on their behalf (with a deprecation warning). However, we do not return U-label in the value attribute so we are making a backwards incompatible change for users that utilize internationalized domain names. * language updates * add presentational to the word list * the linux dictionary is pathetic
* Add support for AES XTS (#3900)Paul Kehrer2017-10-011-1/+3
| | | | | | | | | | | | | | | | | | | | | | | | * Add support for AES XTS We drop the non-byte aligned test vectors because according to NIST http://csrc.nist.gov/groups/STM/cavp/documents/aes/XTSVS.pdf "An implementation may support a data unit length that is not a multiple of 8 bits." OpenSSL does not support this, so we can't use those test vectors. * fix docs and pep8 * docs fix * the spellchecker is so frustrating * add note about AES 192 for XTS (it's not supported) * docs work * enforce key length on ECB mode in AES as well (thanks XTS) * a few more words about why we exclude some test vectors for XTS
* Declare that 2.1 is the last version to support Python 2.6 (#3944)Alex Gaynor2017-10-011-0/+2
| | | | | | * Declare that 2.1 is the last version to support Python 2.6 * It's the Final Countdown!
* add ChaCha20 support (#3919)Paul Kehrer2017-09-281-0/+5
| | | | | | | | | | * add ChaCha20 support * review feedback * 256 divided by 8 is what again? * ...
* both parse and encode the ASN1 string type for Name attributes (#3896)Paul Kehrer2017-09-251-0/+2
| | | | | | | | | | | | | | | * both parse and encode the ASN1 string type for Name attributes Previously cryptography encoded everything (except country names) as UTF8String. This caused problems with chain building in libraries like NSS where the subject and issuer are expected to match byte-for-byte. With this change we now parse and store the ASN1 string type as a private _type in NameAttribute. We then use this to encode when issuing a new certificate. This allows the CertificateBuilder to properly construct an identical issuer and fixes the issue with NSS. * make the sentinel private too
* FreshestCRL extension support (#3937)Paul Kehrer2017-09-231-0/+1
| | | | | | | | | | * add freshest CRL support * add tests * add changelog * add tests for FreshestCRL generation
* support delta crl indicator extension (#3936)Paul Kehrer2017-09-221-0/+1
| | | This is an extension for CRLs
* [WIP] add support for the TLSFeature extension in x509 (#3899)Paul Kehrer2017-09-101-1/+3
| | | | | | | | | | | | | | | | | | * add support for the TLSFeature extension in x509 This extension is used for OCSP Must-Staple. * fix changelog link * pep8 * refactor to support the sequence properly and add status_request_v2 * update some language * add test vector, implement eq/ne/hash on TLSFeature * address review comments
* RSA OAEP label support for OpenSSL 1.0.2+ (#3897)Paul Kehrer2017-09-081-0/+4
| | | | | | | | | | * RSA OAEP label support for OpenSSL 1.0.2+ * changelog * move around tests, address review feedback, use backend supported method * unsupported padding catches this now
* Switch to using the other style of environment markers (#3796)Alex Gaynor2017-08-241-0/+1
| | | | | | | | * Switch to using the other style of environment markers * We don't do py3.3 any more! * changelog
* add blake2b/blake2s support for hmac (#3873)Paul Kehrer2017-08-221-0/+3
| | | | | | | | | | * add blake2b/blake2s support for hmac This was a bug, but it turns out the noise protocol suggests using the HMAC construction with BLAKE2 (rather than BLAKE2's own keyed functionality) for a few reasons, so we should support it. * actually test the thing
* add changelog and a warning for is_signature_valid on crl (#3861)Paul Kehrer2017-08-121-0/+2
| | | | | | * add changelog and a warning * document this properly
* fixed a typo (#3847)Alex Gaynor2017-08-031-1/+1
|
* port 2.0.3 changelog (#3845)Paul Kehrer2017-08-031-0/+9
|
* Make changelog anchors stable ids (#3840)Christian Heimes2017-08-031-0/+165
| | | | | Closes: #3839 Signed-off-by: Christian Heimes <christian@python.org>
* deprecate unicode input for RFC822Name (#3836)Paul Kehrer2017-08-011-1/+7
| | | | | | * deprecate unicode input for RFC822Name * pep8...?
* deprecate auto-idna on UniformResourceIdentifier (#3832)Paul Kehrer2017-08-011-0/+8
| | | | | | | | | | * deprecate auto-idna on UniformResourceIdentifier * fix repr test * docs * some updated language
* Begin the deprecation of auto-idna for x509.DNSName (#3830)Alex Gaynor2017-07-301-0/+6
| | | | | | | | | | | | | | | | | | | | | | | | | | | | * Begin the deprecation of auto-idna for x509.DNSName Refs #3357 * fix warning * py3k fixes * fix docs * sigh * flake8 * these are words * words * tests for coverage * another test * do idna things * more idna things
* port 2.0.2 changelog (#3828)Paul Kehrer2017-07-271-0/+6
|
* port 2.0.1 changelog (#3823)Paul Kehrer2017-07-261-0/+10
|
* remove deprecated items (#3794)Paul Kehrer2017-07-201-0/+4
| | | | | | | | | | * remove deprecated items whirlpool, ripemd160, unsupportedextension, and the old interfaces * flake8 and remove a test generator we no longe use * make it clear we warned you about these things
* Open master for 2.1 (#3788)Alex Gaynor2017-07-171-0/+5
|
* 2.0 version bump and changelog (#3787)Paul Kehrer2017-07-171-4/+2
| | | | | | * 2.0 version bump and changelog * dates are just an illusion
* add AESGCM AEAD support (#3785)Paul Kehrer2017-07-171-0/+3
| | | | | | | | * add AESGCM AEAD support * remove stray newline * move AESGCM docs above CCM
* AESCCM support (#3700)Paul Kehrer2017-07-161-0/+2
|
* Fixed #3747 -- cache extensions on x.509 objects (#3769)Alex Gaynor2017-07-081-0/+7
| | | | | | | | | | * Fixed #3747 -- cache extensions on x.509 objects * be kind to cpython, save a dict lookup * flake8 * changelog
* add manylinux1 wheel building to the wheel builder (#3736)Paul Kehrer2017-07-011-0/+3
| | | | | | * add manylinux1 wheel building to the wheel builder * add changelog
* remove python 3.3 from CI (#3729)Paul Kehrer2017-06-261-0/+1
| | | | | | * remove python 3.3 from CI * remove 3.3 everywhere, not just from CI
* Reorganize DHParameters and DHPublicKey *WithSerialization (#3722)Paul Kehrer2017-06-241-3/+3
| | | | | | | | * Reorganize DHParameters and DHPublicKey *WithSerialization fixes #3720 * fix up the changelog
* changelog entry and a few updates to the new DH params docs (#3718)Paul Kehrer2017-06-241-0/+7
|
* X25519 Support (#3686)Paul Kehrer2017-06-091-0/+1
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | * early days * sort of working * more things * remove private_bytes * public bytes, interface fix * load public keys * x25519 support basically done now * private_bytes is gone * some reminders * doctest this too * remove a thing that doesn't matter * x25519 supported checks * libressl has the NID, but a different API, so check for OpenSSL * pep8 * add missing coverage * update to use reasons * expand test a little * add changelog entry * review feedback
* ChaCha20Poly1305 support (#3680)Paul Kehrer2017-06-081-0/+2
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | * chacha20poly1305 support * add chacha20poly1305 backend and some fixes * refactor * forgot to remove this * pep8 * review feedback and a lot of type/value checking * review feedback * raise unsupportedalgorithm when creating a ChaCha20Poly1305 object if it's not supported. * switch to ciphertext||tag * typo * remove a branch we don't need * review feedback * decrypts is *also* a word * use reasons
* Refs #3461 -- parse SCTs from x.509 extension (#3480)Alex Gaynor2017-06-041-0/+3
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | * Stub API for SCTs, feedback wanted * grr, flake8 * finish up the __init__ * Initial implementation and tests * write a test. it fails because computer * get the tests passing and fix some TODOs * changelog entry * This can go now * Put a skip in this test * grump * Removed unreachable code * moved changelog to the correct section * Use the deocrator for expressing requirements * This needs f for the right entry_type * coverage * syntax error * tests for coverage * better sct eq tests * docs * technically correct, the most useless kind of correct * typo and more details * bug * drop __eq__
* deprecate signer/verifier on asymmetric keys (#3663)Paul Kehrer2017-06-031-5/+15
| | | | | | * deprecate signer/verifier on asymmetric keys * review feedback, switch deprecated_call to work around a bug
* Post release tasks to open master for 2.0 (#3644)Alex Gaynor2017-05-291-0/+5
|
* 1.9 version bump and changelog (#3641)Paul Kehrer2017-05-291-4/+2
|
* move MACContext to mac.py and eliminate interfaces.py (#3631)Paul Kehrer2017-05-291-11/+11
| | | | | | | | | | | | | * move MACContext to mac.py and eliminate interfaces.py finally * improve title * re-add and deprecate interfaces.MACContext * use pytest.warns instead of deprecated_call The pytest docs insist that deprecation warnings are handled differently and that you should use deprecated_call, but this works so okay then
* Typo fix (#3625)Paul Kehrer2017-05-271-1/+1
|
* port 1.8.2 changelog to master (#3616)Paul Kehrer2017-05-261-1/+5
| | | | | | * port 1.8.2 changelog to master * we did this in 1.8.2
* 1.1.0f for the next release (#3599)Paul Kehrer2017-05-251-0/+1
|