aboutsummaryrefslogtreecommitdiffstats
path: root/docs/development
Commit message (Collapse)AuthorAgeFilesLines
* Test vectors for OpenSSH serialization format (#5151)Marko Kreen2020-05-251-0/+35
|
* Added wycheproof hmac vectors (#5238)Alex Gaynor2020-04-261-1/+1
|
* Replace legacy file handling with a context manager. (#5092)Mads Jensen2020-01-121-21/+22
| | | | | | | | * Replace legacy file handling with a context manager. * flake8 fix Co-authored-by: Alex Gaynor <alex.gaynor@gmail.com>
* Use literals for collections and comprehensions. (#5091)Mads Jensen2020-01-121-8/+8
|
* drop python 3.4 support (#5087)Paul Kehrer2019-12-081-1/+1
| | | | | | | | | | | | * drop python 3.4 support Our dependencies have started dropping support so it is becoming difficult to test. Additionally, Python 3.4 represents <2% of our downloads, so taking on a large maintenance burden to maintain support isn't a good use of limited time. Accordingly, we're dropping testing infrastructure and migrating our abi3 wheels to py35+. * use removed instead of dropped
* Added a test vector of an OCSP response with SCT extension (#5066)Alex Gaynor2019-11-161-0/+2
|
* Parse single_extensions in OCSP responses (#5059)Paul Kehrer2019-11-111-0/+2
| | | | | | | | | | | | * add single_extensions to OCSPResponse (#4753) * new vector, updateed docs, more stringent parser, changelog, etc * simplify PR (no SCT for now) * add a comment * finish pulling out the sct stuff so tests might actually run
* Fixed link for linkcheck (#5047)Alex Gaynor2019-11-011-1/+1
|
* Finish ed25519 and ed448 support in x509 module (#4972)Marko Kreen2019-09-091-0/+6
| | | | | | | | | | | | | | | | | | * Support ed25519 in csr/crl creation * Tests for ed25519/x509 * Support ed448 in crt/csr/crl creation * Tests for ed448/x509 * Support ed25519/ed448 in OCSPResponseBuilder * Tests for eddsa in OCSPResponseBuilder * Builder check missing in create_x509_csr * Documentation update for ed25519+ed448 in x509
* fix coverage by adding two artificial DSA public keys (#4984)Paul Kehrer2019-09-061-0/+5
| | | | | | | | | | * fix coverage by adding two artificial DSA public keys One key removes the optional parameters from the structure to cover a branch conditional, and the other key has its BITSTRING padding value set to a non-zero value. * lexicographic? never heard of it
* add x509 CSR with challenge password (#4942)Paul Kehrer2019-07-091-0/+2
|
* fix inaccurate ed25519 vector docs (#4938)Paul Kehrer2019-07-061-1/+1
|
* more ed25519 vectors, better description of RFC 8410 vector (#4936)Paul Kehrer2019-07-061-2/+10
| | | | | | | | * more ed25519 vectors, better description of RFC 8410 vector * typo * oops, doc'd wrong
* add ed25519ph x509 test vector (#4933)Paul Kehrer2019-07-031-0/+2
|
* Order the elements in reviewing patches reasonably (#4883)Alex Gaynor2019-05-091-6/+6
|
* add RSA PSS certificate (#4865)Paul Kehrer2019-05-041-0/+1
| | | | | | * add RSA PSS certificate * i still maintain that 257 is slightly better than 256
* Refs #4830 -- added a vector of an x.509 certificate with a negative … (#4842)Alex Gaynor2019-04-131-0/+2
| | | | | | * Refs #4830 -- added a vector of an x.509 certificate with a negative serial number * Line wrap
* add poly1305 test vectors from rfc 7539 (#4800)Paul Kehrer2019-03-071-0/+5
|
* add ed25519 PKCS8 and subjectPublicKeyInfo vectors (#4719)Paul Kehrer2019-02-201-0/+7
| | | | | | * add ed25519 PKCS8 and subjectPublicKeyInfo vectors * line length fix
* add ed448 PKCS8 and subjectPublicKeyInfo vectors (#4718)Paul Kehrer2019-02-201-0/+7
|
* concede to digicert's garbage CDN (#4747)Paul Kehrer2019-02-031-1/+1
| | | Which, despite supporting HTTPS, is non-deterministically providing 404s and DigiCert has asserted that http is the only "supported" protocol.
* consistently linky RFC in the docs (#4716)Alex Gaynor2019-01-183-4/+4
| | | | | | * consistently linky RFC in the docs * oops
* Update wycheproof commit in docs (#4687)Alex Gaynor2019-01-131-1/+1
|
* add x25519 pkcs8/subjectpublickeyinfo vectors (#4685)Paul Kehrer2019-01-131-0/+7
|
* add signature_hash_algorithm to OCSPResponse (#4681)Paul Kehrer2019-01-101-0/+2
| | | | | | * add signature_hash_algorithm to OCSPResponse * fix pointless asserts
* add x448 private/public PEM/DER pkcs8/subjectpublickeyinfo vectors (#4667)Paul Kehrer2019-01-011-0/+7
|
* Sphinx's website is now https (#4662)Alex Gaynor2018-12-302-2/+2
| | | | | | * Sphinx's website is now https * Sphinx's website is now https
* DigiCert's root is now available over https (#4664)Alex Gaynor2018-12-301-1/+1
|
* add compressed point EC vectors (#4637)Paul Kehrer2018-12-101-0/+2
|
* add ed448 test vectors (#4608)Paul Kehrer2018-11-241-0/+1
|
* x448 test vectors (#4576)Paul Kehrer2018-11-121-1/+1
|
* another pkcs12 vector (#4557)Paul Kehrer2018-11-041-2/+8
| | | | | | | | * another pkcs12 vector also fixed the pathing to be consistent in the docs for PKCS12 vectors * add a cert with no key pkcs12 as well
* additional pkcs12 test vector (#4554)Paul Kehrer2018-11-031-0/+3
|
* add pkcs12 test vectors (#4535)Paul Kehrer2018-10-301-0/+20
| | | | | | * add pkcs12 test vectors * add more explanatino
* add issuingDistributionPoint vectors (#4537)Paul Kehrer2018-10-291-0/+24
|
* add a new SCT vector (#4528)Paul Kehrer2018-10-271-0/+2
| | | | | | * add a new SCT vector * ridiculous
* next_update is not a required field on OCSP responses (#4513)Paul Kehrer2018-10-231-0/+2
|
* Another URL goes https! (#4512)Alex Gaynor2018-10-241-1/+1
|
* Enhance info on pip requirements intallation (#4499)André Almeida2018-10-191-0/+4
| | | | | | | | | | * Enhance info on pip requirements intallation * Remove virtualenv files from remote * Fix "pacakges" typo * Removing trailling whitespaces
* add OCSP request with a request extension (nonce) (#4462)Paul Kehrer2018-09-071-0/+2
|
* More OCSP vectors (#4451)Paul Kehrer2018-09-011-0/+5
| | | | | | | | * yet another ocsp response vector. and yet there will be at least one more after this * add one more
* add LE subordinate certificate to test vectors (#4450)Paul Kehrer2018-09-011-0/+2
|
* add more OCSP response vectors (#4445)Paul Kehrer2018-09-011-0/+7
| | | | | | * add more OCSP response vectors * another vector and better docs
* OCSP response vector (#4443)Paul Kehrer2018-08-311-0/+5
| | | | | | | | | | * OCSP response vector * oops, wrong name * move ocsp response vector docs * make alex happy
* Added vector for pre-certificate poison extension (#4432)Alex Gaynor2018-08-301-0/+2
|
* Fixes #4426 -- use modern idiom in our bindings docs (#4428)Alex Gaynor2018-08-301-1/+1
|
* Fix encoding errors in RSA test keys. (#4410)David Benjamin2018-08-231-2/+4
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | * Fix encoding errors in RSA test keys. enc-rsa-pkcs8.pem and unenc-rsa-pkcs8.pem did not encode the RSA key correctly. Per RFC 8017, appendix A.1: The object identifier rsaEncryption identifies RSA public and private keys as defined in Appendices A.1.1 and A.1.2. The parameters field has associated with this OID in a value of type AlgorithmIdentifier SHALL have a value of type NULL. rsaEncryption OBJECT IDENTIFIER ::= { pkcs-1 1 } unenc-rsa-pkcs8.pem, however, was missing that NULL, which was, in turn, carried into the encrypted payload of enc-rsa-pkcs8.pem. The DER version, enc-rsa-pkcs8.der, carries this mistake too. Interestingly, unenc-rsa-pkcs8.der does *not* have it. I'm guessing it was converted with the openssl command-line tool which fixed the encoding in conversion. Current versions of OpenSSL are lax and ignore the parameters field, but it's best to test against spec-compliant inputs. Fix unenc-rsa-pkcs8.pem to match unenc-rsa-pkcs8.der and then refresh enc-rsa-pkcs8.{der,pem} with the new encoding but otherwise the same encryption parameters. I've refreshed the dumpasn1 (at least that's what it looks like) preamble at the top of each file, but the current version of dumpasn1 appears to have changed the spacing slightly, so there's some whitespace diff noise. * Update test-vectors.rst.
* add new OCSP request vectors (#4399)Paul Kehrer2018-08-151-0/+4
|
* Document wycheproof revision we're current as of (#4390)Alex Gaynor2018-08-121-1/+13
| | | | | | | | * Document wycheproof revision we're current as of * Wycheproof is a real word! * line length
* Add SHA512/224 and SHA512/256 test vectors from NIST CAVP (#4237)Paul Kehrer2018-05-141-1/+1
|