aboutsummaryrefslogtreecommitdiffstats
path: root/docs/hazmat
Commit message (Expand)AuthorAgeFilesLines
* add ec.private_key_from_secret_and_curve (#3225)Ofek Lev2016-11-112-0/+25
* Last pass over fixing the links (#3224)Alex Gaynor2016-11-062-2/+2
* Update the commoncrypto links (#3223)Alex Gaynor2016-11-062-2/+2
* Link to our implementation of scrypt, now that we have it (#3189)Alex Gaynor2016-10-071-2/+2
* EC samples for verifying a singature, + serialization (#3076)Alex Railean2016-09-251-0/+79
* Fix typo in `symmetric-encryption.rst` (#3138)Alex Chan2016-09-041-1/+1
* Add bounds checking for Scrypt parameters. (#3130)Terry Chia2016-09-021-0/+3
* Scrypt Implementation (#3117)Terry Chia2016-09-013-0/+142
* some docs cleanups + changelog (#3122)Alex Gaynor2016-08-301-3/+2
* Mention that blake2 is not vulnerable to length-extension attacks (#3118)Alex Gaynor2016-08-291-1/+4
* blake2b/blake2s support (#3116)Paul Kehrer2016-08-281-0/+31
* Fix docs to clarify the less than 256 limit for Padding(). (#3099)Terry Chia2016-08-241-2/+2
* Update example code to use recommended 160 bits (#3088)Dave Brondsema2016-08-161-2/+2
* Remove provider language from docs (#3072)Gabriel Orisaka2016-07-318-68/+54
* Clarify what to pass to the sign-function (#3066)Loy2016-07-301-1/+1
* Removed provider language from asymmetric primitives docs (#3052)Gabriel Orisaka2016-07-265-132/+91
* Enforce that p > q to improve OpenSSL compatibility (fixes #2990) (#3010)Dirkjan Ochtman2016-07-191-1/+3
* Removed provider language from backend interfaces (#3047)Gabriel Orisaka2016-07-181-110/+81
* A few small cleanups (#3046)Alex Gaynor2016-07-181-2/+2
* Add flag to toggle key length check for HOTP and TOTP. (#3012)Terry Chia2016-07-161-2/+22
* One shot sign/verification ECDSA (#3029)Aviv Palivoda2016-07-022-5/+46
* one shot verify documentation fix (#3031)Aviv Palivoda2016-06-302-4/+4
* One shot sign/verify DSA (#3003)Aviv Palivoda2016-06-301-0/+53
* Fixed #3008 -- expose calculate max pss salt length (#3014)Alex Gaynor2016-06-271-4/+17
* rest syntaxAlex Gaynor2016-06-271-1/+1
* Remove some 0.9.8 cruft from the docs (#3015)Alex Gaynor2016-06-261-3/+1
* Fixes #2992 -- clearly link to a key dumping docs in serialization mo… (#3013)Alex Gaynor2016-06-251-0/+10
* Use `d` instead of `private_exponent` for consistency (#2991)Dirkjan Ochtman2016-06-221-4/+4
* Drop OpenSSL 0.9.8 (#2978)Alex Gaynor2016-06-182-5/+3
* Clean up some of the nonsense in our DSA docs. (#2969)Alex Gaynor2016-06-041-5/+5
* Add convenience methods to sign and verify w/ RSA (#2945)Colleen Murphy2016-06-041-3/+73
* Refs #1478 -- attempt to improve our nonsense docs for ECCurve.key_size (#2959)Alex Gaynor2016-06-031-1/+2
* SSH serialization for public keys (#2957)Alex Gaynor2016-06-031-0/+13
* NIST SP 800-108 Counter Mode KDF (#2748)Jared2016-05-291-0/+150
* Fixed #2859 -- document that SHA-1 is the worst (#2925)Alex Gaynor2016-05-291-1/+3
* Update URLs for new RTD domain (#2879)Alex Gaynor2016-04-282-2/+2
* Make a paragraph slightly more clear (#2874)Alex Gaynor2016-04-211-1/+1
* Merge pull request #2736 from cedk/ANSI_X.923Paul Kehrer2016-03-161-0/+45
|\
| * Add version in the docCédric Krier2016-03-151-0/+2
| * Add wikipedia link to ANSI X.923Cédric Krier2016-02-271-4/+6
| * Added support for padding ANSI X.923Cédric Krier2016-02-271-0/+41
* | HTTPS some links, in the odd event users of a cryptographic library would car...Alex Gaynor2016-03-063-3/+3
|/
* Clearly document that this is a good exampleAlex Gaynor2016-02-101-0/+3
* As always, recommend cryptoing while you cryptoAlex Gaynor2016-02-021-1/+1
* Merge pull request #2701 from alex/document-keyPaul Kehrer2016-01-301-1/+3
|\
| * Fixed #2700 -- corrtected the create_hmac_ctx interface docsAlex Gaynor2016-01-301-1/+3
* | Minor doc tweak per issue #2694Phoebe Queen2016-01-291-1/+5
|/
* Merge pull request #2621 from reaperhulk/update-linksAlex Gaynor2016-01-011-1/+1
|\
| * update some links with the redirects shown in the linkcheckerPaul Kehrer2016-01-011-1/+1
* | provide a bit more detail about the underlying public key formatsPaul Kehrer2015-12-311-2/+4
|/