aboutsummaryrefslogtreecommitdiffstats
path: root/src/cryptography/hazmat/backends/openssl/dsa.py
Commit message (Collapse)AuthorAgeFilesLines
* Cleanup serialize (#5149)Marko Kreen2020-05-251-6/+2
| | | | | | | | | | | | | | * Additional tests for public/private_bytes They expose few places that raise TypeError and AssertionError! before, and ValueError later. * Cleanup of private_bytes() backend Also pass key itself down to backend. * Cleanup of public_bytes() backend * Test handling of unsupported key type
* centralize our bytes check (#4622)Paul Kehrer2018-12-021-2/+1
| | | this will make life a bit easier when we support bytearrays
* deprecate signer/verifier on asymmetric keys (#3663)Paul Kehrer2017-06-031-1/+4
| | | | | | * deprecate signer/verifier on asymmetric keys * review feedback, switch deprecated_call to work around a bug
* make signature and verification contexts error better re: prehashed (#3658)Paul Kehrer2017-06-021-1/+3
| | | | | | * make signature and verification contexts error better re: prehashed * code review feedback
* Drop 1.0.0 (#3312)Alex Gaynor2016-12-131-27/+1
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | * delete the 1.0.0 support * drop the version check * drop the AES-CTR stuff * Update the example * openssl truncates for us now * delete unused test * unused imports * Remove a bunch of conditional bindings for NPN * no more 1.0.0 builders * libressl fix * update the docs * remove dead branches * oops * this is a word, damnit * spelling * try removing this * this test is not needed * unused import
* support prehashed sign/verify in DSA (#3266)Paul Kehrer2016-11-201-7/+13
|
* refactor dsa sign/verify as prep for prehash (#3262)Paul Kehrer2016-11-191-23/+32
|
* One shot sign/verify DSA (#3003)Aviv Palivoda2016-06-301-0/+10
| | | | | | | | * Add sign and verify methods to DSA * Documented DSA sign/verify methods * Added CHANGELOG entry
* Use DSAparams_dup in yet another please (#3007)Alex Gaynor2016-06-201-27/+2
|
* use DSAparams_dup now that we no longer support 0.9.8 (#3006)Paul Kehrer2016-06-201-13/+1
|
* Remove a binding and comments that reference 0.9.8 (#2984)Alex Gaynor2016-06-181-3/+2
|
* SSH serialization for public keys (#2957)Alex Gaynor2016-06-031-0/+1
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | * SSH serialization for public keys * name errors ahoy! * id, ego, superego * dsa support * EC support * Don't keyerror * Documentation OpenSSH * flake8 * fix * bytes bytes bytes * skip curve unsupported * bytes! * Move a function * reorganize code for coverage
* treat DSA as opaque (#2936)Paul Kehrer2016-05-311-25/+109
|
* converted a few more assertsAlex Gaynor2015-09-261-1/+1
|
* convert the rest of the openssl backend to using openssl_assertPaul Kehrer2015-09-251-4/+4
|
* Move signature type checksStanisław Pitucha2015-08-141-3/+3
| | | | Move the point of checking signatures, as suggested by alex in PR 2262.
* Ensure early exeption on non-bytes signatureStanisław Pitucha2015-08-111-0/+3
| | | | | Signature must be in bytes. If the check is skipped, verify() can explode later in cffi call in _verify_pkey_ctx() for example.
* evp_pkey in openssl asymmetric key constructorsPaul Kehrer2015-06-201-19/+8
|
* don't double free DSA cdata when verifying thingsPaul Kehrer2015-06-061-4/+1
|
* Don't trigger any deprecation warnings on importAlex Gaynor2015-03-141-1/+1
|
* refactor OpenSSL backend private_key_bytesPaul Kehrer2015-03-111-1/+0
|
* support DER serialization of public keysPaul Kehrer2015-03-101-1/+0
|
* DSA public key serializationPaul Kehrer2015-03-081-1/+22
|
* serialize DSA private keysPaul Kehrer2015-03-021-6/+20
|
* move asymmetric signature/verification interfacesPaul Kehrer2015-02-161-4/+6
|
* Don't check DSA error stackAlex Stapleton2014-11-241-5/+1
|
* Update the license header for every source file, as well as the documentation.Alex Gaynor2014-11-161-12/+3
| | | | Fixes #1209
* Move the cryptography package into a src/ subdirectoryDonald Stufft2014-11-131-0/+207
Due to differences in how py.test determines which module to ``import`` the test suite actually runs against the cryptography which is in the *current* directory instead of the cryptography which is installed. The problem essentially boils down to when there is a tests/__init__.py then py.test adds the current directory to the front of the sys.path, causing it to take precedence over the installed location. This means that running the tests relies on the implicit compile that CFFI does instead of testing against what people will actually be runnning, which is the module compiled by setup.py.