aboutsummaryrefslogtreecommitdiffstats
path: root/src/_cffi_src
Commit message (Collapse)AuthorAgeFilesLines
* Remove spaces.Cory Benfield2015-12-231-1/+1
|
* Add binding for CommonCrypto SecTrustCopyAnchorCertificatesCory Benfield2015-12-232-0/+23
|
* Comment lingering SSLv2 symbol.Cory Benfield2015-12-141-0/+4
|
* Remove SSLv2 bindings.Cory Benfield2015-12-141-16/+1
| | | | | | | | | This commit removes bindings that allow users to set SSLv2 handshake methods. These are regarded as unnecessary and out-of-date: see #2527. This commit does leave in a few options that refer to SSLv2 in order to avoid breaking deployments that rely on them, and in order to allow users to continue to request that SSLv2 not be enabled at all in their OpenSSL.
* Merge pull request #2515 from reaperhulk/sigbusAlex Gaynor2015-12-091-16/+0
|\ | | | | remove the bindings for these x86_64 specific EC functions
| * remove the bindings for these x86_64 specific EC functionsPaul Kehrer2015-12-091-16/+0
| | | | | | | | | | | | | | | | We have no need to invoke them directly and their presence triggers a bug related to Fedora 23's hobbling of openssl EC functions (uugh) This also fixes the SIGBUS issue in #2503, although that is more appropriately resolved via header fixes for universal libraries on OS X.
* | expose tbs_certrequest_bytes and signature on CertificateSigningRequestPaul Kehrer2015-12-031-0/+4
| |
* | Merge pull request #2504 from reaperhulk/encode-name-constraintsAlex Gaynor2015-12-031-0/+12
|\ \ | | | | | | implement support for encoding name constraints
| * | implement support for encoding name constraintsPaul Kehrer2015-12-021-0/+12
| |/
* | shouldn't need values herePaul Kehrer2015-12-011-3/+3
| |
* | if EC isn't present we need to declare this enumPaul Kehrer2015-12-011-1/+5
| |
* | let the compiler figure out these valuesPaul Kehrer2015-12-011-3/+4
| |
* | fix a warning in cffiPaul Kehrer2015-12-011-1/+5
|/ | | | | cffi doesn't want to guess the type, so we'll deopaque the enum and strip the values out of the lib if EC is unavailable
* Add more CRYPTO_EX_DATA functionsChristian Heimes2015-11-203-0/+20
| | | | | | | | The patch adds a couple of additional functions to create, store and retrieve ex_data on SSL, SSL_CTX and X509 objects. It also adds the missing get_ex_new_index function for X509_STORE_CTX. Signed-off-by: Christian Heimes <cheimes@redhat.com>
* add tbsCertList and signature interfaces to CRLsErik Trauschke2015-11-191-0/+3
|
* RHEL 6.4 and below don't even claim to be 1.0.0 final...Paul Kehrer2015-11-121-1/+1
|
* whoopsPaul Kehrer2015-11-121-0/+1
|
* reorganize and renamePaul Kehrer2015-11-121-10/+10
|
* these functions were added in 1.0.0, while CMS was added in 0.9.8hPaul Kehrer2015-11-121-0/+10
| | | | | We didn't catch this in our CI because all our 0.9.8 targets have CMS disabled or are older than 0.9.8h
* Merge pull request #2467 from reaperhulk/fix-version-checkAlex Gaynor2015-11-041-2/+2
|\ | | | | these flags were actually added in 1.0.2beta2, not before that.
| * these flags were actually added in 1.0.2beta2, not before that.Paul Kehrer2015-11-051-2/+2
| |
* | remove malloc_debug_init as it has occasionally caused compile issuesPaul Kehrer2015-11-051-1/+0
|/ | | | We also don't use it in our backend (and neither does pyOpenSSL)
* add support for Certificate signature and tbs_certificatePaul Kehrer2015-11-032-1/+3
|
* make engine addition idempotentPaul Kehrer2015-10-211-0/+2
| | | | | | | | | | | Threading issues keep cropping up. ENGINE_add already acquires a lock at the C layer via CRYPTO_w_lock (provided you have registered the locking callbacks) so let's try to use that. As part of this we'll try to init the openssl locks, but of course there's potentially a race there as well. Clearly this isn't the real fix but it might improve the situation while we try to determine what to do.
* Remove long comments and workarounds, use new cffi syntaxAlex Gaynor2015-10-212-36/+2
|
* add binding for d2i_GENERAL_NAMES()Erik Trauschke2015-10-151-0/+2
|
* extend pkcs7 openssl bindingsDominic Chen2015-10-132-2/+32
|
* rename env var to CRYPTOGRAPHY_OSX_NO_LINK_FLAGSPaul Kehrer2015-08-311-1/+1
|
* no need for NonePaul Kehrer2015-08-291-1/+1
|
* add support for static linking of the openssl backend on OS XPaul Kehrer2015-08-291-3/+16
|
* Removed SSL_renegotiate_abbreviated bindingkjav2015-08-281-1/+0
| | | As this is not supported in OpenSSL < 1.01
* Added bindings for SSL_renegotiate_<pending/abbreviated>kjav2015-08-281-0/+2
|
* Add SSL_renegotiate binding.Terry Chia2015-08-281-0/+1
|
* add set_cert_cbMaximilian Hils2015-08-251-0/+17
|
* libre doesn't have these fields (and might only be used in sslv2 anyway)Paul Kehrer2015-08-191-2/+0
|
* compilation fixPaul Kehrer2015-08-191-2/+4
|
* style fix + remove some elements of the struct that aren't in 0.9.8Paul Kehrer2015-08-181-5/+2
|
* added attribs to SSL_SESSION, SSL_SESSION_print. CIPHER_descriptionMiWCryptAnalytics2015-08-181-0/+11
| | | For a project I am working on I need some session reflection directly from python. This change adds the required openssl SSL_SESSION struct attributes and functions within OpenSSL API
* support InhibitAnyPolicy in CertificateBuilderPaul Kehrer2015-08-081-0/+1
|
* Merge pull request #2226 from lluixhi/masterPaul Kehrer2015-08-081-1/+1
|\ | | | | Fix build with LibreSSL >= 2.2.2
| * Fix build with LibreSSL >= 2.2.2Lluixhi Scura2015-08-081-1/+1
| | | | | | | | LIBRESSL_VERSION_NUMBER is now being incremented.
* | more openssl bindings for encoding certificate policy structuresPaul Kehrer2015-08-082-0/+5
| |
* | add support for encoding SubjectKeyIdentifier to CertificateBuilderPaul Kehrer2015-08-081-0/+1
|/
* add a few additional bindings for AuthorityKeyIdentifier in OpenSSLPaul Kehrer2015-08-051-0/+2
|
* more bindings for CRLDistributionPoints encodingPaul Kehrer2015-08-052-2/+11
|
* Merge pull request #2180 from reaperhulk/easy-conditional-fixDonald Stufft2015-08-0442-514/+0
|\ | | | | create a ConditionalLibrary and remove unsupported items
| * remove commoncrypto CONDITIONAL_NAMESPaul Kehrer2015-08-0312-25/+0
| |
| * remove openssl CONDITIONAL_NAMESPaul Kehrer2015-08-0330-489/+0
| |
* | encode authority information accessPaul Kehrer2015-08-031-0/+6
|/
* Merge pull request #2177 from reaperhulk/cp-bindingsAlex Gaynor2015-07-271-0/+21
|\ | | | | add many bindings we'll need to encode a certificate policies extension