aboutsummaryrefslogtreecommitdiffstats
path: root/src/cryptography/hazmat/backends/openssl
Commit message (Collapse)AuthorAgeFilesLines
...
* Merge pull request #2589 from reaperhulk/dict-dict-dictAlex Gaynor2015-12-271-2/+28
|\ | | | | add a comment and a dict we need in #2582
| * add a comment and a dict we need in #2582Paul Kehrer2015-12-261-2/+28
| |
* | Simplify code slightly by adding a new bindingAlex Gaynor2015-12-261-4/+1
|/
* unused importAlex Gaynor2015-12-261-1/+0
|
* A handful of small cleanups and simplificationsAlex Gaynor2015-12-262-6/+4
|
* add invaliditydate class for crl entry extensionsPaul Kehrer2015-12-261-1/+3
|
* switch CRLReason to use a classPaul Kehrer2015-12-261-1/+1
|
* start switching the CRL entry extensions to be full-fledged classesPaul Kehrer2015-12-251-1/+1
| | | | first up: CertificateIssuer
* Merge pull request #2574 from reaperhulk/rename-crlextensionAlex Gaynor2015-12-251-6/+6
|\ | | | | rename CRLExtensionOID to CRLEntryExtensionOID
| * rename CRLExtensionOID to CRLEntryExtensionOIDPaul Kehrer2015-12-251-6/+6
| |
* | X509_REVOKED_dup isn't available everywhere, we get to define our ownPaul Kehrer2015-12-251-1/+3
| |
* | support revoked certificates in CertificateRevocationListBuilderPaul Kehrer2015-12-251-0/+9
|/
* RevokedCertificateBuilderPaul Kehrer2015-12-251-2/+19
|
* add create_x509_revoked_certificate to x509backend interfacePaul Kehrer2015-12-251-0/+3
|
* use _create_x509_extensions in create_x509_crlPaul Kehrer2015-12-251-20/+8
|
* add extension support to the CRLBuilderPaul Kehrer2015-12-251-1/+41
|
* a different approach to refactoring the x509 extension additionPaul Kehrer2015-12-241-21/+24
|
* don't reuse a variable, it's confusingPaul Kehrer2015-12-241-4/+6
|
* refactor x509 extension creation to make it a bit more reusablePaul Kehrer2015-12-241-38/+39
| | | | | Unfortunately X509 certs and CSRs add extensions differently, so we can't reuse quite as much as we'd like to...
* CertificateRevocationListBuilderPaul Kehrer2015-12-241-1/+67
| | | | | RSA keys only. Currently does not support CRL extensions or CRLEntry extensions.
* coveragePaul Kehrer2015-12-241-1/+1
|
* add create_x509_crl interfacePaul Kehrer2015-12-241-0/+3
|
* please the great flake8 in the skyAlex Gaynor2015-12-241-3/+1
|
* full indexing support + testsgAlex Gaynor2015-12-241-4/+12
|
* Make indexing a CRL O(1) instead of O(n).Alex Gaynor2015-12-241-2/+5
| | | | This drops support for slicing, if that's important someone say something and I can add it back
* Simplify implementation of CRL indexing and iteration.Alex Gaynor2015-12-241-13/+8
| | | | No longer allocates a list just to iterate over it.
* coverage fixAlex Gaynor2015-12-241-8/+7
|
* Improve the performance of len(crl)Alex Gaynor2015-12-231-3/+6
|
* fix a potential memory issue when retaining revoked certs from a CRLPaul Kehrer2015-12-231-2/+13
|
* CRLNumber needs to be a class for reasons.Paul Kehrer2015-12-221-1/+1
|
* add support for parsing AuthorityInfoAccess and IssuerAltName CRL extsPaul Kehrer2015-12-221-0/+4
| | | | Expand the CRL extensions test to check the value
* support parsing CRL extensions in the OpenSSL backendPaul Kehrer2015-12-211-1/+18
|
* add a CRL public_bytes methodPaul Kehrer2015-12-201-0/+14
|
* support CRLs with no revoked certificatesPaul Kehrer2015-12-201-7/+6
|
* Change password callback to use userdata pointerChristian Heimes2015-12-201-33/+48
| | | | | | | | | Instead of a closure the pem_password_cb now uses the void *userdata argument to exchange data with the callback function. It's a necessary step to port all callbacks to new static callbacks. See: #2477 Signed-off-by: Christian Heimes <christian@python.org>
* X509_set_subject_name and X509_set_issuer_name copy the objectPaul Kehrer2015-12-151-2/+2
| | | | | So we need to register our own copy for gc. This fixes a memory leak reported by Wulf.
* fix the comment so that it is no longer nonsensePaul Kehrer2015-12-031-1/+1
|
* expose tbs_certrequest_bytes and signature on CertificateSigningRequestPaul Kehrer2015-12-031-0/+15
|
* move _encode_name_constraints and _encode_general_subtreesPaul Kehrer2015-12-021-36/+36
|
* implement support for encoding name constraintsPaul Kehrer2015-12-021-0/+37
|
* add tbsCertList and signature interfaces to CRLsErik Trauschke2015-11-191-0/+15
|
* rename tbs_certificate to tbs_certificate_bytes, add a commentPaul Kehrer2015-11-031-1/+2
|
* add support for Certificate signature and tbs_certificatePaul Kehrer2015-11-031-0/+14
|
* flake8Alex Gaynor2015-11-011-2/+2
|
* corrected a few typos in commentsAlex Gaynor2015-11-011-3/+3
|
* please flake8Alex Gaynor2015-10-291-1/+1
|
* Error cleanly if the public and private keys to an ECDH key exchange are on ↵Alex Gaynor2015-10-281-0/+5
| | | | different curves
* Merge pull request #2435 from reaperhulk/fix-2407Alex Gaynor2015-10-271-6/+8
|\ | | | | encode countryName with PrintableString
| * update comment to include a bit more detailPaul Kehrer2015-10-271-2/+2
| |
| * encode countryName with PrintableStringPaul Kehrer2015-10-201-6/+8
| | | | | | | | | | | | | | This commit adds a dependency on asn1crypto for testing purposes to parse the certificate and confirm that countryName is encoded with PrintableString while other fields are UTF8String. This is a test only dep.