aboutsummaryrefslogtreecommitdiffstats
path: root/src/_cffi_src/openssl
Commit message (Collapse)AuthorAgeFilesLines
...
| * | implement support for encoding name constraintsPaul Kehrer2015-12-021-0/+12
| |/
* | shouldn't need values herePaul Kehrer2015-12-011-3/+3
| |
* | if EC isn't present we need to declare this enumPaul Kehrer2015-12-011-1/+5
| |
* | let the compiler figure out these valuesPaul Kehrer2015-12-011-3/+4
| |
* | fix a warning in cffiPaul Kehrer2015-12-011-1/+5
|/ | | | | cffi doesn't want to guess the type, so we'll deopaque the enum and strip the values out of the lib if EC is unavailable
* Add more CRYPTO_EX_DATA functionsChristian Heimes2015-11-203-0/+20
| | | | | | | | The patch adds a couple of additional functions to create, store and retrieve ex_data on SSL, SSL_CTX and X509 objects. It also adds the missing get_ex_new_index function for X509_STORE_CTX. Signed-off-by: Christian Heimes <cheimes@redhat.com>
* add tbsCertList and signature interfaces to CRLsErik Trauschke2015-11-191-0/+3
|
* RHEL 6.4 and below don't even claim to be 1.0.0 final...Paul Kehrer2015-11-121-1/+1
|
* whoopsPaul Kehrer2015-11-121-0/+1
|
* reorganize and renamePaul Kehrer2015-11-121-10/+10
|
* these functions were added in 1.0.0, while CMS was added in 0.9.8hPaul Kehrer2015-11-121-0/+10
| | | | | We didn't catch this in our CI because all our 0.9.8 targets have CMS disabled or are older than 0.9.8h
* Merge pull request #2467 from reaperhulk/fix-version-checkAlex Gaynor2015-11-041-2/+2
|\ | | | | these flags were actually added in 1.0.2beta2, not before that.
| * these flags were actually added in 1.0.2beta2, not before that.Paul Kehrer2015-11-051-2/+2
| |
* | remove malloc_debug_init as it has occasionally caused compile issuesPaul Kehrer2015-11-051-1/+0
|/ | | | We also don't use it in our backend (and neither does pyOpenSSL)
* add support for Certificate signature and tbs_certificatePaul Kehrer2015-11-032-1/+3
|
* make engine addition idempotentPaul Kehrer2015-10-211-0/+2
| | | | | | | | | | | Threading issues keep cropping up. ENGINE_add already acquires a lock at the C layer via CRYPTO_w_lock (provided you have registered the locking callbacks) so let's try to use that. As part of this we'll try to init the openssl locks, but of course there's potentially a race there as well. Clearly this isn't the real fix but it might improve the situation while we try to determine what to do.
* Remove long comments and workarounds, use new cffi syntaxAlex Gaynor2015-10-212-36/+2
|
* add binding for d2i_GENERAL_NAMES()Erik Trauschke2015-10-151-0/+2
|
* extend pkcs7 openssl bindingsDominic Chen2015-10-131-0/+30
|
* Removed SSL_renegotiate_abbreviated bindingkjav2015-08-281-1/+0
| | | As this is not supported in OpenSSL < 1.01
* Added bindings for SSL_renegotiate_<pending/abbreviated>kjav2015-08-281-0/+2
|
* Add SSL_renegotiate binding.Terry Chia2015-08-281-0/+1
|
* add set_cert_cbMaximilian Hils2015-08-251-0/+17
|
* libre doesn't have these fields (and might only be used in sslv2 anyway)Paul Kehrer2015-08-191-2/+0
|
* compilation fixPaul Kehrer2015-08-191-2/+4
|
* style fix + remove some elements of the struct that aren't in 0.9.8Paul Kehrer2015-08-181-5/+2
|
* added attribs to SSL_SESSION, SSL_SESSION_print. CIPHER_descriptionMiWCryptAnalytics2015-08-181-0/+11
| | | For a project I am working on I need some session reflection directly from python. This change adds the required openssl SSL_SESSION struct attributes and functions within OpenSSL API
* support InhibitAnyPolicy in CertificateBuilderPaul Kehrer2015-08-081-0/+1
|
* Merge pull request #2226 from lluixhi/masterPaul Kehrer2015-08-081-1/+1
|\ | | | | Fix build with LibreSSL >= 2.2.2
| * Fix build with LibreSSL >= 2.2.2Lluixhi Scura2015-08-081-1/+1
| | | | | | | | LIBRESSL_VERSION_NUMBER is now being incremented.
* | more openssl bindings for encoding certificate policy structuresPaul Kehrer2015-08-082-0/+5
| |
* | add support for encoding SubjectKeyIdentifier to CertificateBuilderPaul Kehrer2015-08-081-0/+1
|/
* add a few additional bindings for AuthorityKeyIdentifier in OpenSSLPaul Kehrer2015-08-051-0/+2
|
* more bindings for CRLDistributionPoints encodingPaul Kehrer2015-08-052-2/+11
|
* Merge pull request #2180 from reaperhulk/easy-conditional-fixDonald Stufft2015-08-0430-489/+0
|\ | | | | create a ConditionalLibrary and remove unsupported items
| * remove openssl CONDITIONAL_NAMESPaul Kehrer2015-08-0330-489/+0
| |
* | encode authority information accessPaul Kehrer2015-08-031-0/+6
|/
* Merge pull request #2177 from reaperhulk/cp-bindingsAlex Gaynor2015-07-271-0/+21
|\ | | | | add many bindings we'll need to encode a certificate policies extension
| * add many bindings we'll need to encode a certificate policies extensionPaul Kehrer2015-07-261-0/+21
| |
* | handle RSA key too small and consume errors on CSR signature failurePaul Kehrer2015-07-251-0/+1
|/
* let's also add the binding to make a new GENERAL_SUBTREE stackPaul Kehrer2015-07-241-0/+1
|
* bindings for CRL encodingPaul Kehrer2015-07-241-0/+7
|
* Support encoding ExtendedKeyUsage into certificate signing requestsPaul Kehrer2015-07-232-0/+5
|
* Support encoding KeyUsage into certificate signing requestsPaul Kehrer2015-07-231-0/+2
|
* this is constPaul Kehrer2015-07-111-1/+1
|
* support for OtherName encoding for general namesPaul Kehrer2015-07-112-0/+4
|
* Merge pull request #2108 from mail-in-a-box/masterPaul Kehrer2015-07-081-0/+2
|\ | | | | support othername in general names
| * parse SAN otherNames into OtherName instances rather than raising an exceptionJoshua Tauberer2015-07-061-0/+2
| | | | | | | | Test added.
* | Exposed the SSL_peek functionalityStelios2015-07-061-0/+1
|/
* Refs #2108 -- expand the OTHERNAME binding.Alex Gaynor2015-07-041-1/+2
|