aboutsummaryrefslogtreecommitdiffstats
path: root/src/_cffi_src
Commit message (Collapse)AuthorAgeFilesLines
* added the correct error handling for the failing testAlex Gaynor2016-03-051-0/+1
|
* move BIO_new_mem_buf to macros to handle 1.0.2g signature changePaul Kehrer2016-03-011-1/+2
|
* drop this for nowAlex Gaynor2016-02-271-1/+0
|
* voidAlex Gaynor2016-02-271-1/+1
|
* More policy constraint bindingsAlex Gaynor2016-02-271-0/+4
|
* Added policy constraint struct bindingAlex Gaynor2016-02-261-0/+5
|
* one more functionAlex Gaynor2016-01-311-0/+2
|
* Added an addition binding that PyOpenSSL might wantAlex Gaynor2016-01-311-0/+2
|
* Removed kSecTrustResultConfirm, which breaks the build on 10.10 since it's ↵Alex Gaynor2016-01-231-1/+0
| | | | deprecated
* Move SecTrustCreateWithCertificates to MACROS.Cory Benfield2016-01-221-0/+4
| | | | Annoyingly, the type of the first parameter changed across versions.
* Fix indentation.Cory Benfield2016-01-221-8/+8
|
* Remove SecTrustCreateWithCertificates.Cory Benfield2016-01-221-1/+0
| | | | It's not present on 10.8.
* Dedent closing brace.Cory Benfield2016-01-221-1/+1
|
* New bindings for evaluating certificates.Cory Benfield2016-01-223-0/+48
|
* SecTrust for evaluating certificates.Cory Benfield2016-01-221-0/+15
|
* Basic mutable array bindings.Cory Benfield2016-01-221-0/+10
|
* add initial OCSP bindingsPaul Kehrer2016-01-182-0/+68
|
* consolidate the windows specific header trickery we need to doPaul Kehrer2016-01-182-9/+8
|
* Merge pull request #2646 from reaperhulk/static-callbacksAlex Gaynor2016-01-082-0/+51
|\ | | | | Static callbacks
| * remove the callbacks we don't use in cryptographyPaul Kehrer2016-01-071-61/+0
| |
| * Port callbacks to new static callbackChristian Heimes2016-01-072-0/+112
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | cffi 1.4.0 will introduce a new API to create static callbacks. Contrary to the old callback API, static callbacks no longer depend on libffi's dynamic code generation for closures. Static code has some benefits over dynamic generation. For example the code is faster. Also it doesn't need writeable and executable memory mappings, which makes it compatible with SELinux's deny execmem policy. The branch depends on PR #2488. https://bitbucket.org/cffi/cffi/issues/232/static-callbacks Closes: #2477 Signed-off-by: Christian Heimes <cheimes@redhat.com>
* | use EVP_PKEY_id where we canPaul Kehrer2016-01-071-2/+7
| |
* | add Cryptography_EVP_PKEY_idPaul Kehrer2016-01-071-0/+6
| |
* | opaque EVP_PKEY since EVP_PKEY_id existsPaul Kehrer2016-01-071-4/+1
|/
* convert other extra_link_args callsPaul Kehrer2016-01-012-6/+4
|
* don't add the NXCOMPAT and DYNAMICBASE flags if the compiler isn't msvcPaul Kehrer2016-01-012-8/+25
|
* RSA_R_OAEP_DECODING_ERROR is pretty ubiquitousPaul Kehrer2015-12-271-8/+0
|
* Add support for RSA_R_OAEP_DECODING_ERROR error flag.Christopher Grebs2015-12-271-0/+9
|
* Simplify code slightly by adding a new bindingAlex Gaynor2015-12-261-0/+2
|
* new asn1 bindings needed for #2582Paul Kehrer2015-12-261-0/+3
|
* X509_REVOKED_dup isn't available everywhere, we get to define our ownPaul Kehrer2015-12-251-1/+10
|
* support revoked certificates in CertificateRevocationListBuilderPaul Kehrer2015-12-251-0/+1
|
* a different approach to refactoring the x509 extension additionPaul Kehrer2015-12-241-0/+1
|
* Add PEM_write_bio_DHparams bindingevilaliv32015-12-241-0/+1
|
* add binding for setting the revocation date of an X509_REVOKEDPaul Kehrer2015-12-231-0/+2
|
* Remove spaces.Cory Benfield2015-12-231-1/+1
|
* Add binding for CommonCrypto SecTrustCopyAnchorCertificatesCory Benfield2015-12-232-0/+23
|
* Comment lingering SSLv2 symbol.Cory Benfield2015-12-141-0/+4
|
* Remove SSLv2 bindings.Cory Benfield2015-12-141-16/+1
| | | | | | | | | This commit removes bindings that allow users to set SSLv2 handshake methods. These are regarded as unnecessary and out-of-date: see #2527. This commit does leave in a few options that refer to SSLv2 in order to avoid breaking deployments that rely on them, and in order to allow users to continue to request that SSLv2 not be enabled at all in their OpenSSL.
* Merge pull request #2515 from reaperhulk/sigbusAlex Gaynor2015-12-091-16/+0
|\ | | | | remove the bindings for these x86_64 specific EC functions
| * remove the bindings for these x86_64 specific EC functionsPaul Kehrer2015-12-091-16/+0
| | | | | | | | | | | | | | | | We have no need to invoke them directly and their presence triggers a bug related to Fedora 23's hobbling of openssl EC functions (uugh) This also fixes the SIGBUS issue in #2503, although that is more appropriately resolved via header fixes for universal libraries on OS X.
* | expose tbs_certrequest_bytes and signature on CertificateSigningRequestPaul Kehrer2015-12-031-0/+4
| |
* | Merge pull request #2504 from reaperhulk/encode-name-constraintsAlex Gaynor2015-12-031-0/+12
|\ \ | | | | | | implement support for encoding name constraints
| * | implement support for encoding name constraintsPaul Kehrer2015-12-021-0/+12
| |/
* | shouldn't need values herePaul Kehrer2015-12-011-3/+3
| |
* | if EC isn't present we need to declare this enumPaul Kehrer2015-12-011-1/+5
| |
* | let the compiler figure out these valuesPaul Kehrer2015-12-011-3/+4
| |
* | fix a warning in cffiPaul Kehrer2015-12-011-1/+5
|/ | | | | cffi doesn't want to guess the type, so we'll deopaque the enum and strip the values out of the lib if EC is unavailable
* Add more CRYPTO_EX_DATA functionsChristian Heimes2015-11-203-0/+20
| | | | | | | | The patch adds a couple of additional functions to create, store and retrieve ex_data on SSL, SSL_CTX and X509 objects. It also adds the missing get_ex_new_index function for X509_STORE_CTX. Signed-off-by: Christian Heimes <cheimes@redhat.com>
* add tbsCertList and signature interfaces to CRLsErik Trauschke2015-11-191-0/+3
|