Commit message (Collapse) | Author | Age | Files | Lines | ||
---|---|---|---|---|---|---|
... | ||||||
* | X509_REVOKED_dup isn't available everywhere, we get to define our own | Paul Kehrer | 2015-12-25 | 1 | -1/+3 | |
| | ||||||
* | support revoked certificates in CertificateRevocationListBuilder | Paul Kehrer | 2015-12-25 | 1 | -0/+9 | |
| | ||||||
* | RevokedCertificateBuilder | Paul Kehrer | 2015-12-25 | 1 | -2/+19 | |
| | ||||||
* | add create_x509_revoked_certificate to x509backend interface | Paul Kehrer | 2015-12-25 | 1 | -0/+3 | |
| | ||||||
* | use _create_x509_extensions in create_x509_crl | Paul Kehrer | 2015-12-25 | 1 | -20/+8 | |
| | ||||||
* | add extension support to the CRLBuilder | Paul Kehrer | 2015-12-25 | 1 | -1/+41 | |
| | ||||||
* | a different approach to refactoring the x509 extension addition | Paul Kehrer | 2015-12-24 | 1 | -21/+24 | |
| | ||||||
* | don't reuse a variable, it's confusing | Paul Kehrer | 2015-12-24 | 1 | -4/+6 | |
| | ||||||
* | refactor x509 extension creation to make it a bit more reusable | Paul Kehrer | 2015-12-24 | 1 | -38/+39 | |
| | | | | | Unfortunately X509 certs and CSRs add extensions differently, so we can't reuse quite as much as we'd like to... | |||||
* | CertificateRevocationListBuilder | Paul Kehrer | 2015-12-24 | 1 | -1/+67 | |
| | | | | | RSA keys only. Currently does not support CRL extensions or CRLEntry extensions. | |||||
* | coverage | Paul Kehrer | 2015-12-24 | 1 | -1/+1 | |
| | ||||||
* | add create_x509_crl interface | Paul Kehrer | 2015-12-24 | 1 | -0/+3 | |
| | ||||||
* | Change password callback to use userdata pointer | Christian Heimes | 2015-12-20 | 1 | -33/+48 | |
| | | | | | | | | | Instead of a closure the pem_password_cb now uses the void *userdata argument to exchange data with the callback function. It's a necessary step to port all callbacks to new static callbacks. See: #2477 Signed-off-by: Christian Heimes <christian@python.org> | |||||
* | X509_set_subject_name and X509_set_issuer_name copy the object | Paul Kehrer | 2015-12-15 | 1 | -2/+2 | |
| | | | | | So we need to register our own copy for gc. This fixes a memory leak reported by Wulf. | |||||
* | move _encode_name_constraints and _encode_general_subtrees | Paul Kehrer | 2015-12-02 | 1 | -36/+36 | |
| | ||||||
* | implement support for encoding name constraints | Paul Kehrer | 2015-12-02 | 1 | -0/+37 | |
| | ||||||
* | flake8 | Alex Gaynor | 2015-11-01 | 1 | -2/+2 | |
| | ||||||
* | corrected a few typos in comments | Alex Gaynor | 2015-11-01 | 1 | -3/+3 | |
| | ||||||
* | Merge pull request #2435 from reaperhulk/fix-2407 | Alex Gaynor | 2015-10-27 | 1 | -6/+8 | |
|\ | | | | | encode countryName with PrintableString | |||||
| * | update comment to include a bit more detail | Paul Kehrer | 2015-10-27 | 1 | -2/+2 | |
| | | ||||||
| * | encode countryName with PrintableString | Paul Kehrer | 2015-10-20 | 1 | -6/+8 | |
| | | | | | | | | | | | | | | This commit adds a dependency on asn1crypto for testing purposes to parse the certificate and confirm that countryName is encoded with PrintableString while other fields are UTF8String. This is a test only dep. | |||||
* | | Merge pull request #2446 from reaperhulk/init-locks | Alex Gaynor | 2015-10-26 | 1 | -2/+0 | |
|\ \ | | | | | | | move lock initialization to during binding import | |||||
| * | | move lock initialization to during binding import | Paul Kehrer | 2015-10-24 | 1 | -2/+0 | |
| | | | | | | | | | | | | | | | | | | | | | | | | Previously we attempted to register our openssl locks only if the backend was initialized, but we should really just do it immediately. Consumers like PyOpenSSL already call init_static_locks after importing the binding and if a library wants to replace the locks with something else they can do so themselves. | |||||
* | | | use new ExtensionOID | Paul Kehrer | 2015-10-24 | 1 | -1/+1 | |
| | | | ||||||
* | | | one more assert | Paul Kehrer | 2015-10-24 | 1 | -1/+1 | |
| | | | ||||||
* | | | convert asserts to openssl_assert | Paul Kehrer | 2015-10-24 | 1 | -10/+10 | |
| | | | ||||||
* | | | support encoding certificate policies in CertificateBuilder | Paul Kehrer | 2015-10-24 | 1 | -0/+90 | |
|/ / | ||||||
* | | Merge branch 'master' into crl_ossl_backend | Erik Trauschke | 2015-10-20 | 1 | -2/+13 | |
|\| | ||||||
| * | a refactor to the API | Alex Gaynor | 2015-10-17 | 1 | -19/+6 | |
| | | ||||||
| * | Add an Elliptic Curve Key Exchange Algorithm(ECDH) | Simo Sorce | 2015-10-17 | 1 | -0/+20 | |
| | | | | | | | | | | | | | | | | | | The ECDH Key Exchange algorithm as standardized in NIST publication 800-56A Revision 2 Includes tests with vectors from NIST. Signed-off-by: Simo Sorce <simo@redhat.com> | |||||
| * | Catch Invalid X or Y points and raise a ValueError | Simo Sorce | 2015-10-12 | 1 | -2/+6 | |
| | | | | | | | | Signed-off-by: Simo Sorce <simo@redhat.com> | |||||
* | | Merge branch 'crl_ossl_backend' of github.com:etrauschke/cryptography into ↵ | Erik Trauschke | 2015-10-20 | 1 | -2/+24 | |
|\ \ | |/ |/| | | | crl_ossl_backend | |||||
| * | Merge branch 'master' into crl_ossl_backend | Erik Trauschke | 2015-09-28 | 1 | -16/+1 | |
| |\ | ||||||
| * \ | Merge branch 'crl_ossl_backend' of github.com:etrauschke/cryptography into ↵ | Erik Trauschke | 2015-09-28 | 1 | -2/+24 | |
| |\ \ | | | | | | | | | | | | | crl_ossl_backend | |||||
| | * \ | Merge branch 'master' into crl_ossl_backend | Erik Trauschke | 2015-09-25 | 1 | -153/+172 | |
| | |\ \ | ||||||
| | * | | | OpenSSL backend code for CRLs | Erik Trauschke | 2015-09-24 | 1 | -2/+24 | |
| | | | | | ||||||
* | | | | | Change '!=' to 'is not' | Manoel Domingues Junior | 2015-10-01 | 1 | -1/+1 | |
| | | | | | ||||||
* | | | | | Handling path_length when ca is True | Manoel Domingues Junior | 2015-10-01 | 1 | -1/+1 | |
| |_|_|/ |/| | | | | | | | | | | | | | | | | | | | Using CertificateBuilder: builder = builder.add_extension(x509.BasicConstraints(ca=True,path_length=None), critical=True) return TypeError in line 792 because None can't be converted to hex. In https://tools.ietf.org/html/rfc5280.html#section-4.2.1.9: CAs MUST NOT include the pathLenConstraint field unless the cA boolean is asserted and the key usage extension asserts the keyCertSign bit. | |||||
* | | | | unused import | Alex Gaynor | 2015-09-26 | 1 | -3/+1 | |
| | | | | ||||||
* | | | | Use InternalError for stuff | Alex Gaynor | 2015-09-26 | 1 | -13/+0 | |
|/ / / | ||||||
* | | | flake8 it | Alex Gaynor | 2015-09-26 | 1 | -6/+4 | |
| | | | ||||||
* | | | Convert asserts in bindings as well | Alex Gaynor | 2015-09-26 | 1 | -29/+5 | |
| |/ |/| | ||||||
* | | remove unnecessary check | Paul Kehrer | 2015-09-25 | 1 | -1/+0 | |
| | | ||||||
* | | change some asserts back since they're not openssl specific | Paul Kehrer | 2015-09-25 | 1 | -18/+19 | |
| | | | | | | | | plus bonus better exception msg | |||||
* | | start converting asserts to a function call | Paul Kehrer | 2015-09-25 | 1 | -166/+185 | |
|/ | | | | | This prevents situations where asserts are bypassed when running python with -O. | |||||
* | should have _asn1_* utility functions in a common place | Erik Trauschke | 2015-09-24 | 1 | -0/+47 | |
| | ||||||
* | Resolve an unusual test bug related to initializing the bindings | Paul Kehrer | 2015-08-29 | 1 | -7/+0 | |
| | | | | | | | | | | | | | | | | | | | To make calls against the "SSL" parts of OpenSSL you need to call SSL_library_init. There are multiple ways this can be called: * If you're using the same OpenSSL in cryptography as you are in your Python then Python will call it for you. * If you import the openssl backend. These tests need SSL_library_init to be called. When run in our CI SSL_library_init is called because during the parametrization step the OpenSSL backend is imported (thus triggering it). However, you can also run tests directly via py.test and without this change py.test tests/hazmat/bindings/test_openssl.py would crash if you had cryptography linked against a different OpenSSL than your Python used. | |||||
* | set the default stringmask to utf8 | Paul Kehrer | 2015-08-22 | 1 | -0/+6 | |
| | | | | | This corrects a problem where older OpenSSL versions don't do this by default. fixes #2291 | |||||
* | switch the openssl backend to use the OID namespace | Paul Kehrer | 2015-08-10 | 1 | -11/+12 | |
| | ||||||
* | Merge pull request #2233 from reaperhulk/encode-nocheck | Alex Gaynor | 2015-08-09 | 1 | -0/+9 | |
|\ | | | | | add support for OCSPNoCheck to the CertificateBuilder |