aboutsummaryrefslogtreecommitdiffstats
path: root/docs/hazmat/primitives/asymmetric
Commit message (Collapse)AuthorAgeFilesLines
* deprecate encode_point and migrate all internal callers (#4720)Paul Kehrer2019-01-201-0/+6
|
* add support for encoding compressed points (#4638)Paul Kehrer2019-01-202-4/+34
| | | | | | * add support for encoding compressed points * review feedback
* add support for byteslike password/data to load_{pem,der}_private_key (#4693)Paul Kehrer2019-01-161-4/+8
| | | | | | * add support for byteslike password/data to load_{pem,der}_private_key * pypy 5.4 can't do memoryview from_buffer
* support byteslike in X448PrivateKey.from_private_bytes (#4694)Paul Kehrer2019-01-151-1/+2
|
* add support for byteslike on password and data for pkcs12 loading (#4690)Paul Kehrer2019-01-151-2/+4
| | | | | | | | | | | | * add support for byteslike on password and data for pkcs12 loading * use a contextmanager to yield a null terminated buffer we can zero * review feedback * updated text * one last change
* Serialization x25519 (#4688)Paul Kehrer2019-01-141-4/+84
| | | | | | | | | | | | | | | | | * modify x25519 serialization to match x448 supports raw and pkcs8 encoding on private_bytes supports raw and subjectpublickeyinfo on public_bytes deprecates zero argument call to public_bytes * add docs * this is public now * don't need that * review feedback
* support x448 public/private serialization both raw and pkcs8 (#4653)Paul Kehrer2019-01-132-9/+106
| | | | | | | | | | | | | | | | | | | | | | | | | | | | * support x448 public/private serialization both raw and pkcs8 * add tests for all other asym key types to prevent Raw * more tests * better tests * fix a test * funny story, I'm actually illiterate. * pep8 * require PrivateFormat.Raw or PublicFormat.Raw with Encoding.Raw * missing docs * parametrize * docs fixes * remove dupe line * assert something
* Use the contents of the ecrypt docs from the University website (#4673)Alex Gaynor2019-01-023-3/+3
|
* deprecate old from_encoded_point (#4640)Paul Kehrer2018-12-111-0/+5
|
* Compressed point support (#4629)Paul Kehrer2018-12-111-0/+21
| | | | | | | | | | | | | | | | | | | | | | | | * compressed point support * refactor to use oct2point directly * small docs change * remove deprecation for the moment and a bit of review feedback * no backend arg, implicitly import it * missed a spot * double oops * remove superfluous call * use refactored method * use vector file * one last item
* make the same doc changes to DH as we did for ECDH (#4631)Paul Kehrer2018-12-091-6/+50
|
* PKCS12 Basic Parsing (#4553)Paul Kehrer2018-11-281-0/+37
| | | | | | | | | | | | | | | | | | * PKCS12 parsing support * running all the tests is so gauche * rename func * various significant fixes * dangerous idiot here * move pkcs12 * docs updates * a bit more prose
* X448 support (#4580)Paul Kehrer2018-11-222-0/+105
| | | | | | | | | | | | | | | | | | | | * x448 support This work was originally authored by derwolfe * update docs to have a more useful derived key length * error if key is not a valid length in from_public_bytes * one more * switch to using evp_pkey_keygen_gc for x448 keygen * review feedback * switch to using evp_pkey_derive * nit fix
* add a few more EC OIDs (#4572)Paul Kehrer2018-11-111-0/+78
| | | | | | * add a few more EC OIDs * spaces matter
* add EC OIDs (#4435)Paul Kehrer2018-10-301-0/+32
| | | | | | * add EC OIDs * move ec oid docs to bottom
* change ECDH documentation to show both classical ECDH and ECDHE (#4530)Paul Kehrer2018-10-281-6/+52
|
* reorder curves to put binary (SECT) curves down at the bottom (#4529)Paul Kehrer2018-10-281-48/+59
| | | also add a disclaimer that you shouldn't use them
* HTTPS one last URL (#4522)Alex Gaynor2018-10-251-1/+1
|
* Colin's website went HTTPS! (#4515)Alex Gaynor2018-10-241-2/+2
|
* a few docs fixes and language improvements (#4472)Paul Kehrer2018-09-141-1/+1
|
* document that an ECPublicNumbers object has some unexpected properties (#4319)Paul Kehrer2018-07-091-0/+8
| | | | | | | | | | | | | * document that an ECPublicNumbers object has some unexpected properties It is not guaranteed to be a valid point on the curve as that is not checked until you convert it to a PublicKey object. * different language * move the text, make it a warning, alter the language * new language
* Add serialisation output examples (#4286)Коренберг Марк2018-06-261-0/+24
|
* switch to py3 on docs job (#4230)Paul Kehrer2018-05-122-5/+5
| | | | | | * switch to py3 on docs job * somehow unicode isn't a word
* Brainpool curves (#4129)Paul Kehrer2018-03-151-0/+22
| | | | | | | | | | | | | | | | | | * added brainpool ec-curves key_length >= 256bit * limit brainpool curves to the set that appear required + docs * oops * typos all around me * add brainpool ECDH kex tests * switch to using rfc 7027 vectors * review feedback * empty commits are the best
* Document motivation for a KDF after key-exchange (#4005) (#4124)Jeremy Lainé2018-03-053-5/+64
|
* switch RSA OAEP examples to use SHA256 (#4117)Paul Kehrer2018-02-221-4/+4
|
* Reorder this to reflect Alex's Opinions On What Is Good (#4115)Alex Gaynor2018-02-221-2/+2
|
* DH interfaces existed in 0.9 but we didn't implement until 1.7 (#4068)Paul Kehrer2018-01-051-9/+7
| | | | | | * DH interfaces existed in 0.9 but we didn't implement until 1.7 * sigh empty
* Add import default backend (#4061)Pablo Lefort2017-12-201-0/+1
| | | | | | * Add import default backend * Revert blank line in
* let's talk about bits baby (#3956)Paul Kehrer2017-10-113-13/+13
|
* Switch NIST PDFs from nvlpubs to csrc which is HTTPS (#3929)Alex Gaynor2017-09-202-3/+3
|
* Update the rest of the NIST urls to their new HTTPS homes (#3928)Alex Gaynor2017-09-201-2/+2
|
* Fix mistake in `RSAPublicKey.verify` documentation (#3872)David Sanders2017-08-201-1/+1
|
* update docs to reflect #3364 (#3786)Paul Kehrer2017-07-171-1/+1
|
* we forgot to document these DH methods (#3757)Paul Kehrer2017-07-061-0/+27
|
* doc the relationship between PrivateKey and PrivateKeyWithSerialization (#3721)Paul Kehrer2017-06-244-8/+25
| | | | | | | | * doc the relationship between PrivateKey and PrivateKeyWithSerialization Or at least do it better. * let's talk about opaque keys
* Reorganize DHParameters and DHPublicKey *WithSerialization (#3722)Paul Kehrer2017-06-241-15/+13
| | | | | | | | * Reorganize DHParameters and DHPublicKey *WithSerialization fixes #3720 * fix up the changelog
* changelog entry and a few updates to the new DH params docs (#3718)Paul Kehrer2017-06-242-5/+6
|
* Dh parameters serialization (#3504)Aviv Palivoda2017-06-242-0/+110
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | * Support DH parameter serizalization - no X9.42 * Support X9.42 serialization - DER not working * Fix dhp_rfc5114_2.der Changing the DER parameters serialization after the fix in openssl commit a292c9f1b835 * DH parameters X9.42 DER serialization fixed * fix _skip_dhx_unsupported * document DH parameter_bytes * PEP8 fixes * Document load_pem_parameters * Document load_der_parameters * document ParameterFormat * Increase test coverage * Increase test covrage * Remove unneeded check * Fix typo * Fix error in load_der_parameters * Add load_pem_parameters and load_der_parameters to interfaces * CR fixes * Removed unverified phrase * Update version to 2.0 * Fix pep8 * Rename ParameterFormat.ASN1 to ParameterFormat.DHParameter * link pkcs3 * Add new line at end of file to serialization.rst * Rename DHparameters to PKCS3 * doc CR fix
* be clearer that 65537 is the right answer (#3714)Paul Kehrer2017-06-231-1/+2
| | | | | | | | * be clearer that 65537 is the right answer * Different language * remove trailing whitespace
* fix typo in docs for curve name (#3705)Paul Kehrer2017-06-141-1/+1
| | | fixes #3704
* It's a method you must call (#3696)Jean-Paul Calderone2017-06-091-1/+1
| | | Fix misworded guidance for how to serialize a private key to bytes.
* X25519 Support (#3686)Paul Kehrer2017-06-092-0/+86
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | * early days * sort of working * more things * remove private_bytes * public bytes, interface fix * load public keys * x25519 support basically done now * private_bytes is gone * some reminders * doctest this too * remove a thing that doesn't matter * x25519 supported checks * libressl has the NID, but a different API, so check for OpenSSL * pep8 * add missing coverage * update to use reasons * expand test a little * add changelog entry * review feedback
* deprecate signer/verifier on asymmetric keys (#3663)Paul Kehrer2017-06-035-196/+105
| | | | | | * deprecate signer/verifier on asymmetric keys * review feedback, switch deprecated_call to work around a bug
* make signature and verification contexts error better re: prehashed (#3658)Paul Kehrer2017-06-021-0/+12
| | | | | | * make signature and verification contexts error better re: prehashed * code review feedback
* Modify DH/ECDH examples to be explicit for DHE/ECDHE (#3622)Paul Kehrer2017-05-272-3/+32
| | | | | | | | * Modify DH/ECDH examples to be explicit for DHE/ECDHE Also add note to DH docs that you should probably use ECDH * give a reason
* Put the exchange method on the correct interface (#3591)Alex Gaynor2017-05-241-12/+12
| | | | | | * Put the exchange method on the correct interface * fixed links in docs
* Update the docs to not be redundant and wrong (#3593)Paul Kehrer2017-05-241-3/+0
|
* add convenience methods for key_size on EC{Public,Private}Key (#3587)Paul Kehrer2017-05-231-0/+18
|
* Document DH in serialization (#3569)Aviv Palivoda2017-05-231-1/+10
|