aboutsummaryrefslogtreecommitdiffstats
path: root/docs
Commit message (Collapse)AuthorAgeFilesLines
...
* Remove the final vestigates of Jenkins (#4897)Alex Gaynor2019-05-261-1/+1
| | | | | | * Remove the final vestigates of Jenkins * flake8
* Fix typo in docs hazmat Ed448 (#4886)Stephen.Y2019-05-101-1/+1
|
* Order the elements in reviewing patches reasonably (#4883)Alex Gaynor2019-05-091-6/+6
|
* Replace debian wheezy with ubuntu trusty (#4871)Alex Gaynor2019-05-051-2/+2
| | | | | | | | * Try running tests without wheezy * Added a trusty builder * Update our supported versions in docs
* add RSA PSS certificate (#4865)Paul Kehrer2019-05-041-0/+1
| | | | | | * add RSA PSS certificate * i still maintain that 257 is slightly better than 256
* Set a timeout for linkcheck (#4870)Alex Gaynor2019-05-041-0/+2
|
* Un-linkcheck-ignore a domain that's now properly serving a chain (#4859)Alex Gaynor2019-04-271-2/+0
|
* ... regular expressions... what can you do? (#4849)Alex Gaynor2019-04-171-3/+3
| | | | | | * ... regular expressions... what can you do? * These are raw strings
* Crypto Docs Get Cryptography (#4850)Alex Gaynor2019-04-173-3/+3
|
* It's fixed! (#4851)Alex Gaynor2019-04-171-2/+0
|
* Yet Another Broken Webserver (#4848)Alex Gaynor2019-04-161-0/+2
|
* update a link since MS redid all their MSDN blogs (#4847)Paul Kehrer2019-04-161-1/+1
|
* More linkcheck ignores (#4844)Alex Gaynor2019-04-131-0/+2
|
* Refs #4830 -- added a vector of an x.509 certificate with a negative … (#4842)Alex Gaynor2019-04-131-0/+2
| | | | | | * Refs #4830 -- added a vector of an x.509 certificate with a negative serial number * Line wrap
* Update linkcheck ignores for the latest nonsense (#4838)Alex Gaynor2019-04-121-1/+1
|
* Fix typo (#4829)Ofek Lev2019-04-021-1/+1
|
* Ignore the Russian CA for now (#4827)Alex Gaynor2019-04-011-0/+2
|
* update ed25519 docs to note we support openssh serialization (#4814)Paul Kehrer2019-03-181-5/+12
|
* poly1305 support (#4802)Paul Kehrer2019-03-093-0/+90
| | | | | | | | | | | | | | | | | | | | * poly1305 support * some more tests * have I mentioned how bad the spellchecker is? * doc improvements * EVP_PKEY_new_raw_private_key copies the key but that's not documented Let's assume that might change and be very defensive * review feedback * add a test that fails on a tag of the correct length but wrong value * docs improvements
* remove maccontext (#4803)Paul Kehrer2019-03-072-39/+6
|
* add poly1305 test vectors from rfc 7539 (#4800)Paul Kehrer2019-03-071-0/+5
|
* support ed25519 openssh public keys (#4785)Paul Kehrer2019-02-271-5/+2
| | | | | | * support ed25519 openssh public keys * don't need this check
* ed448 support (#4610)Paul Kehrer2019-02-272-0/+132
| | | | | | | | * ed448 support * move the changelog entry * flake8
* ed25519 support (#4114)Paul Kehrer2019-02-263-0/+161
| | | | | | * ed25519 support * review feedback
* add an EC OID to curve dictionary mapping (#4759)Paul Kehrer2019-02-201-0/+15
| | | | | | | | | | * add an EC OID to curve dictionary mapping * oid_to_curve function * changelog and docs fix * rename to get_curve_for_oid
* add ed25519 PKCS8 and subjectPublicKeyInfo vectors (#4719)Paul Kehrer2019-02-201-0/+7
| | | | | | * add ed25519 PKCS8 and subjectPublicKeyInfo vectors * line length fix
* add ed448 PKCS8 and subjectPublicKeyInfo vectors (#4718)Paul Kehrer2019-02-201-0/+7
|
* full state or province name (#4758)itinerarium2019-02-201-2/+2
| | | | | | | CA -> California 6.3.5 of ITU-T X.520 (10/2016) provides a spelled out sample state. In other contexts, hints generally suggest the "full name" of a state or province. A spelled out state in the sample code might be more consistent with general usage.
* update the thread link (#4748)Paul Kehrer2019-02-031-10/+9
| | | | | | | | * update the thread link linkcheck doing its job! * update our locking information
* concede to digicert's garbage CDN (#4747)Paul Kehrer2019-02-031-1/+1
| | | Which, despite supporting HTTPS, is non-deterministically providing 404s and DigiCert has asserted that http is the only "supported" protocol.
* Also suggest cryptopals to learn crypo (#4745)Alex Gaynor2019-02-031-1/+3
|
* Updated link to PKCS#3 -- fixes #4671 (#4722)Alex Gaynor2019-01-211-1/+1
|
* Apparently NIST crypto resources are essential to life and property (#4721)Alex Gaynor2019-01-201-2/+0
|
* deprecate encode_point and migrate all internal callers (#4720)Paul Kehrer2019-01-201-0/+6
|
* add support for encoding compressed points (#4638)Paul Kehrer2019-01-202-4/+34
| | | | | | * add support for encoding compressed points * review feedback
* shake128/256 support (#4611)Paul Kehrer2019-01-192-0/+31
| | | | | | | | | | | | | | * shake128/256 support * remove block_size * doc an exception * change how we detect XOF by adding _xof attribute * interface! * review feedback
* consistently linky RFC in the docs (#4716)Alex Gaynor2019-01-184-9/+8
| | | | | | * consistently linky RFC in the docs * oops
* Bump this way up and see if it helps (#4713)Alex Gaynor2019-01-171-1/+1
|
* support byteslike in KBKDFHMAC (#4711)Paul Kehrer2019-01-171-1/+2
|
* support byteslike in ConcatKDF{HMAC,Hash}, Scrypt, and X963KDF (#4709)Paul Kehrer2019-01-171-3/+6
| | | | | | | | * byteslike concatkdf * byteslike scrypt * byteslike x963kdf
* support byteslike for OTP (#4710)Paul Kehrer2019-01-171-6/+8
|
* Support byteslike in HKDF and PBKDF2HMAC (#4707)Paul Kehrer2019-01-171-2/+4
| | | | | | | | * support byteslike in HKDF * support byteslike in PBKDF2HMAC * add missing docs
* support byteslike in hmac update (#4705)Paul Kehrer2019-01-171-1/+2
| | | needed for some KDF keying material
* support bytes-like keys in CMAC and HMAC contexts (#4701)Paul Kehrer2019-01-161-1/+2
|
* add support for byteslike password/data to load_{pem,der}_private_key (#4693)Paul Kehrer2019-01-161-4/+8
| | | | | | * add support for byteslike password/data to load_{pem,der}_private_key * pypy 5.4 can't do memoryview from_buffer
* support byteslike in aead for key and nonce (#4695)Paul Kehrer2019-01-151-10/+18
|
* support byteslike in X448PrivateKey.from_private_bytes (#4694)Paul Kehrer2019-01-151-1/+2
|
* add support for byteslike on password and data for pkcs12 loading (#4690)Paul Kehrer2019-01-151-2/+4
| | | | | | | | | | | | * add support for byteslike on password and data for pkcs12 loading * use a contextmanager to yield a null terminated buffer we can zero * review feedback * updated text * one last change
* Serialization x25519 (#4688)Paul Kehrer2019-01-141-4/+84
| | | | | | | | | | | | | | | | | * modify x25519 serialization to match x448 supports raw and pkcs8 encoding on private_bytes supports raw and subjectpublickeyinfo on public_bytes deprecates zero argument call to public_bytes * add docs * this is public now * don't need that * review feedback
* Update wycheproof commit in docs (#4687)Alex Gaynor2019-01-131-1/+1
|