aboutsummaryrefslogtreecommitdiffstats
path: root/docs
Commit message (Collapse)AuthorAgeFilesLines
* scrypt can be doctested now that we're using 1.1.0 (#3688)Paul Kehrer2017-06-071-1/+1
|
* add X25519 test vectors from RFC 7748 section 5.2 (#3685)Paul Kehrer2017-06-061-0/+1
|
* Do more retries in linkcheck because NIST websites are down a lot (#3683)Alex Gaynor2017-06-051-1/+1
|
* Change the link to appease linkcheck (#3677)Alex Gaynor2017-06-041-1/+1
|
* fix symmetric encryption interfaces heading (#3676)Paul Kehrer2017-06-041-1/+1
|
* document invalidtag (#3675)Paul Kehrer2017-06-041-0/+11
| | | | | | * document invalidtag * move invalidtag
* add ChaCha20Poly1305 test vectors from OpenSSL/RFC7539 (#3673)Paul Kehrer2017-06-041-0/+4
| | | | | | | | * add ChaCha20Poly1305 test vectors from OpenSSL/RFC7539 * add the boringssl tests as well * highlight the lines
* Remove a line from "Why do we exist" (#3672)Alex Gaynor2017-06-041-1/+0
| | | I have no idea what this meant
* Refs #3461 -- parse SCTs from x.509 extension (#3480)Alex Gaynor2017-06-042-3/+29
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | * Stub API for SCTs, feedback wanted * grr, flake8 * finish up the __init__ * Initial implementation and tests * write a test. it fails because computer * get the tests passing and fix some TODOs * changelog entry * This can go now * Put a skip in this test * grump * Removed unreachable code * moved changelog to the correct section * Use the deocrator for expressing requirements * This needs f for the right entry_type * coverage * syntax error * tests for coverage * better sct eq tests * docs * technically correct, the most useless kind of correct * typo and more details * bug * drop __eq__
* Fixes #2347 -- link to the stdlib secrets module in our random number ↵Alex Gaynor2017-06-041-0/+5
| | | | generation section (#3669)
* deprecate signer/verifier on asymmetric keys (#3663)Paul Kehrer2017-06-035-196/+105
| | | | | | * deprecate signer/verifier on asymmetric keys * review feedback, switch deprecated_call to work around a bug
* make signature and verification contexts error better re: prehashed (#3658)Paul Kehrer2017-06-021-0/+12
| | | | | | * make signature and verification contexts error better re: prehashed * code review feedback
* FreeBSD 10 and higher use Fortuna, not Yarrow (#3652)Jeroen Ruigrok van der Werven2017-06-011-2/+4
|
* for humans is irritating, let's stop saying it (#3647)Paul Kehrer2017-05-301-2/+2
|
* update the docs with new jenkins CI URL & mac openssl upgrade process (#3639)Paul Kehrer2017-05-292-3/+2
|
* reorder the primitives list and improve a few titles (#3640)Paul Kehrer2017-05-293-9/+9
|
* Enlarge _oid2txt buffer to handle larger OIDs (#3612)Fraser Tweedale2017-05-291-0/+3
| | | | | | | | | The OpenSSL manual recommends a buffer size of 80 for OBJ_oid2txt: https://www.openssl.org/docs/crypto/OBJ_nid2ln.html#return_values. But OIDs longer than this occur in real life (e.g. Active Directory makes some very long OIDs). If the length of the stringified OID exceeds the buffer size, allocate a new buffer that is big enough to hold the stringified OID, and re-do the conversion into the new buffer.
* move MACContext to mac.py and eliminate interfaces.py (#3631)Paul Kehrer2017-05-296-87/+38
| | | | | | | | | | | | | * move MACContext to mac.py and eliminate interfaces.py finally * improve title * re-add and deprecate interfaces.MACContext * use pytest.warns instead of deprecated_call The pytest docs insist that deprecation warnings are handled differently and that you should use deprecated_call, but this works so okay then
* reorganize our toc to look nicer and make more sense (#3632)Paul Kehrer2017-05-291-5/+5
|
* Ignore linkcheck errors from cryptrec (#3629)Alex Gaynor2017-05-281-0/+5
|
* Improve accuracy of install docs page (#3626)Paul Kehrer2017-05-271-5/+5
| | | | | | * Improve accuracy of install docs page * fix line length
* strongly encourage the use of fernet, document its limitation (#3623)Paul Kehrer2017-05-272-0/+10
|
* Modify DH/ECDH examples to be explicit for DHE/ECDHE (#3622)Paul Kehrer2017-05-272-3/+32
| | | | | | | | * Modify DH/ECDH examples to be explicit for DHE/ECDHE Also add note to DH docs that you should probably use ECDH * give a reason
* re-add the why of cryptography to the faq with some small updates (#3621)Paul Kehrer2017-05-271-0/+19
| | | | | | * re-add the why of cryptography to the faq with some small updates * reorder the items a bit
* add some explicit instructions on determining key type in a cert (#3596)Paul Kehrer2017-05-241-0/+17
| | | | | | * add some explicit instructions on determining key type in a cert * can't call it a CSR
* comma comma comma (#3595)Paul Kehrer2017-05-241-2/+2
|
* Put the exchange method on the correct interface (#3591)Alex Gaynor2017-05-241-12/+12
| | | | | | * Put the exchange method on the correct interface * fixed links in docs
* Update the docs to not be redundant and wrong (#3593)Paul Kehrer2017-05-241-3/+0
|
* allow global suppression of link flags (#3592)Paul Kehrer2017-05-242-6/+6
| | | | | CRYPTOGRAPHY_SUPPRESS_LINK_FLAGS will now suppress link flags regardless of platform. Additionally, CRYPTOGRAPHY_WINDOWS_LINK_LEGACY_OPENSSL is now the flag you need if you want to link against < 1.1.0 on windows.
* can we convince people we're pyca/cryptography and not cryptography.io (#3588)Paul Kehrer2017-05-231-2/+2
|
* add convenience methods for key_size on EC{Public,Private}Key (#3587)Paul Kehrer2017-05-231-0/+18
|
* let's deprecate some hashes we should never have exposed (#3584)Paul Kehrer2017-05-231-16/+0
|
* update the docs index (#3583)Paul Kehrer2017-05-231-23/+19
|
* Document DH in serialization (#3569)Aviv Palivoda2017-05-231-1/+10
|
* Let's help out the newbies (#3572)Cory Benfield2017-05-221-2/+5
|
* Deprecate Python 3.3 support, with the intention of being removed in the ↵Alex Gaynor2017-05-221-0/+2
| | | | | | | | next release (#3566) * Deprecate Python 3.3 support, with the intention of being removed in the next release * whoops
* Replace release automation with click (#3557)Alex Gaynor2017-05-201-1/+1
| | | | | | | | * Replace release automation with click * Fix * fix
* remove multibackend (#3555)Paul Kehrer2017-05-202-52/+2
| | | | | | | | * remove multibackend * oops * goodbye pointless tests
* Dropped support for really old macOS (#3554)Alex Gaynor2017-05-201-2/+1
| | | | | | | | * Dropped support for really old macOS Fixes #3503 * literally, how does spelling
* time to remove commoncrypto, fare thee well (#3551)Paul Kehrer2017-05-206-80/+0
| | | | | | | | | | | | | | | | * time to remove commoncrypto, fare thee well * remove even more * update the changelog * remove more things * don't need this function * remove CAST5 CTR tests since that was only supported in commoncrypto * assert a thing
* Don't raise an UnsupportedExtension for critical extensions. (#3550)Alex Gaynor2017-05-201-21/+2
| | | | | | | | | | | | | | | | | | | | | | | | | | * Don't raise an UnsupportedExtension for critical extensions. Fixes #2903 Fixes #2901 Fixes #3325 * Don't link * Revert "Don't link" This reverts commit 4fe847f91d9dd45cdc28a4984c4e44aad62a5de6. * fix * Revert "Revert "Don't link"" This reverts commit 856031b5a1fbad04ac218fa94ebf37dcd402f3ed. * fix * Deprecate this * Better changelog entry
* Make the code compatible with the latest sphinx release (#3543)Alex Gaynor2017-05-171-15/+6
|
* Fixes #3538 -- Make our OpenSSL EC verifier's implementation match the API ↵Alex Gaynor2017-05-101-14/+19
| | | | | | | | | | | | | | (#3539) * Document our real API for EC verification, not an accident * formatting consistency * fix the code itself * fixed class name * fixed a test too
* add a changelog entry for finalize_with_tag and move the note (#3531)Paul Kehrer2017-05-021-4/+4
|
* postpone GCM authentication tag requirement until finalization (#3421)Philipp Gesang2017-05-021-8/+48
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | * postpone GCM authentication tag requirement until finalization Add a .finalize_with_tag() variant of the .finalize() function of the GCM context. At the same time, do not enforce the requirement of supplying the tag with the mode ctor. This facilitates streamed decryption when the MAC is appended to the ciphertext and cannot be efficiently retrieved ahead of decryption. According to the GCM spec (section 7.2: “Algorithm for the Authenticated Decryption Function”), the tag itself is not needed until the ciphertext has been decrypted. Addresses #3380 Signed-off-by: Philipp Gesang <philipp.gesang@intra2net.com> * disallow delayed GCM tag passing for legacy OpenSSL Old versions of Ubuntu supported by Cryptography ship a v1.0.1 of OpenSSL which is no longer supported by upstream. This library seems to cause erratic test failures with the delayed GCM tag functionality which are not reproducible outside the CI. Unfortunately OpenSSL v1.0.1 does not even document the required API (``EVP_EncryptInit(3)``) so there is no by-the-book fix. For backends of version 1.0.1 and earlier, verify the GCM tag at the same stage as before. Also, indicate to the user that late passing of GCM tags is unsupported by throwing ``NotImplementedError`` for these backend versions if - the method ``finalize_with_tag()`` is invoked, or - the mode ctor is called without passing a tag. Unit tests have been adapted to account for different backend versions.
* Update docs to reflect a change that occured long ago with bindings (#3517)Alex Gaynor2017-04-261-3/+4
|
* format some function names in docs (#3511)Alex Gaynor2017-04-211-1/+1
|
* Fixed #3489 -- document that we don't have wheels for pypy (#3496)Alex Gaynor2017-04-092-0/+5
| | | | | | * Fixed #3489 -- document that we don't have wheels for pypy * homebrew is a word
* I don't know what a bug issue is (#3481)Alex Gaynor2017-03-241-1/+1
|
* Update symmetric-encryption.rst (#3479)gdmnbt2017-03-231-0/+1
| | | | | | | | | | * Update symmetric-encryption.rst Import default_backend so the example works out-of-the-box. * Update symmetric-encryption.rst * newline nit