Commit message (Collapse) | Author | Age | Files | Lines | ||
---|---|---|---|---|---|---|
... | ||||||
* | | Merge pull request #2446 from reaperhulk/init-locks | Alex Gaynor | 2015-10-26 | 1 | -2/+0 | |
|\ \ | | | | | | | move lock initialization to during binding import | |||||
| * | | move lock initialization to during binding import | Paul Kehrer | 2015-10-24 | 1 | -2/+0 | |
| | | | | | | | | | | | | | | | | | | | | | | | | Previously we attempted to register our openssl locks only if the backend was initialized, but we should really just do it immediately. Consumers like PyOpenSSL already call init_static_locks after importing the binding and if a library wants to replace the locks with something else they can do so themselves. | |||||
* | | | use new ExtensionOID | Paul Kehrer | 2015-10-24 | 1 | -1/+1 | |
| | | | ||||||
* | | | one more assert | Paul Kehrer | 2015-10-24 | 1 | -1/+1 | |
| | | | ||||||
* | | | convert asserts to openssl_assert | Paul Kehrer | 2015-10-24 | 1 | -10/+10 | |
| | | | ||||||
* | | | support encoding certificate policies in CertificateBuilder | Paul Kehrer | 2015-10-24 | 1 | -0/+90 | |
|/ / | ||||||
* | | hoist a dict up to module scope so we don't recreate it every call | Paul Kehrer | 2015-10-21 | 1 | -12/+15 | |
| | | ||||||
* | | remove convenience functions for revoked extensions | Erik Trauschke | 2015-10-21 | 1 | -30/+0 | |
| | | | | | | | | fix docs regarding CRL PEM format | |||||
* | | add comments | Erik Trauschke | 2015-10-20 | 1 | -24/+37 | |
| | | ||||||
* | | Merge branch 'master' into crl_ossl_backend | Erik Trauschke | 2015-10-20 | 2 | -2/+38 | |
|\| | ||||||
| * | a refactor to the API | Alex Gaynor | 2015-10-17 | 2 | -19/+31 | |
| | | ||||||
| * | Add an Elliptic Curve Key Exchange Algorithm(ECDH) | Simo Sorce | 2015-10-17 | 1 | -0/+20 | |
| | | | | | | | | | | | | | | | | | | The ECDH Key Exchange algorithm as standardized in NIST publication 800-56A Revision 2 Includes tests with vectors from NIST. Signed-off-by: Simo Sorce <simo@redhat.com> | |||||
| * | Catch Invalid X or Y points and raise a ValueError | Simo Sorce | 2015-10-12 | 1 | -2/+6 | |
| | | | | | | | | Signed-off-by: Simo Sorce <simo@redhat.com> | |||||
* | | Merge branch 'crl_ossl_backend' of github.com:etrauschke/cryptography into ↵ | Erik Trauschke | 2015-10-20 | 2 | -14/+250 | |
|\ \ | |/ |/| | | | crl_ossl_backend | |||||
| * | removing caching mechanism for x509 properties | Erik Trauschke | 2015-10-15 | 1 | -67/+40 | |
| | | | | | | | | | | | | undo name change of CRLExtensionOID use custom parsing mechanism for certIssuer entry extension add new crl to vectors for testing invalid certIssuer entry ext | |||||
| * | use X509ExtensionParser for Revoked extensions | Erik Trauschke | 2015-10-14 | 1 | -99/+80 | |
| | | | | | | | | | | | | remove revoked_certificates property from RevokedCertificate class CRLExtensions should actually be RevokedExtensions doctest cleanup for RevokedCertificate | |||||
| * | fix indentations | Erik Trauschke | 2015-10-13 | 1 | -68/+65 | |
| | | | | | | | | | | | | | | | | change docs to indicate CRL objects are iterable fix docs for revoked certs make _decode_crl_reason more readable add __getitem__ method to CRL object remove double underscores | |||||
| * | use openssl assert | Erik Trauschke | 2015-09-28 | 1 | -22/+27 | |
| | | | | | | | | | | | | change _build* to _decode* make CRLs into iterators various fixes | |||||
| * | Merge branch 'master' into crl_ossl_backend | Erik Trauschke | 2015-09-28 | 2 | -32/+15 | |
| |\ | ||||||
| * \ | Merge branch 'crl_ossl_backend' of github.com:etrauschke/cryptography into ↵ | Erik Trauschke | 2015-09-28 | 2 | -2/+282 | |
| |\ \ | | | | | | | | | | | | | crl_ossl_backend | |||||
| | * \ | Merge branch 'master' into crl_ossl_backend | Erik Trauschke | 2015-09-25 | 1 | -153/+172 | |
| | |\ \ | ||||||
| | * | | | OpenSSL backend code for CRLs | Erik Trauschke | 2015-09-24 | 2 | -2/+282 | |
| | | | | | ||||||
* | | | | | Merge pull request #2402 from ddcc/patch-1 | Paul Kehrer | 2015-10-11 | 1 | -2/+7 | |
|\ \ \ \ \ | | | | | | | | | | | | | minor fix to handle malformed certificates without hostname | |||||
| * | | | | | fix to handle malformed certificates without hostname | Dominic Chen | 2015-10-10 | 1 | -2/+7 | |
| | | | | | | ||||||
* | | | | | | typo | Alex Gaynor | 2015-10-11 | 1 | -1/+1 | |
| | | | | | | ||||||
* | | | | | | handle errors | Alex Gaynor | 2015-10-10 | 1 | -0/+2 | |
| | | | | | | ||||||
* | | | | | | Fixed #2404 -- handle a certificate with an unknown public key | Alex Gaynor | 2015-10-10 | 1 | -1/+3 | |
|/ / / / / | ||||||
* | | | | | Change '!=' to 'is not' | Manoel Domingues Junior | 2015-10-01 | 1 | -1/+1 | |
| | | | | | ||||||
* | | | | | Handling path_length when ca is True | Manoel Domingues Junior | 2015-10-01 | 1 | -1/+1 | |
| |_|_|/ |/| | | | | | | | | | | | | | | | | | | | Using CertificateBuilder: builder = builder.add_extension(x509.BasicConstraints(ca=True,path_length=None), critical=True) return TypeError in line 792 because None can't be converted to hex. In https://tools.ietf.org/html/rfc5280.html#section-4.2.1.9: CAs MUST NOT include the pathLenConstraint field unless the cA boolean is asserted and the key usage extension asserts the keyCertSign bit. | |||||
* | | | | unused import | Alex Gaynor | 2015-09-26 | 1 | -3/+1 | |
| | | | | ||||||
* | | | | Use InternalError for stuff | Alex Gaynor | 2015-09-26 | 2 | -29/+14 | |
|/ / / | ||||||
* | | | flake8 it | Alex Gaynor | 2015-09-26 | 1 | -6/+4 | |
| | | | ||||||
* | | | Convert asserts in bindings as well | Alex Gaynor | 2015-09-26 | 1 | -29/+5 | |
| | | | ||||||
* | | | converted a few more asserts | Alex Gaynor | 2015-09-26 | 3 | -3/+3 | |
| | | | ||||||
* | | | move two asserts much closer to call site | Paul Kehrer | 2015-09-25 | 1 | -2/+2 | |
| | | | ||||||
* | | | convert the rest of the openssl backend to using openssl_assert | Paul Kehrer | 2015-09-25 | 8 | -87/+90 | |
| |/ |/| | ||||||
* | | remove unnecessary check | Paul Kehrer | 2015-09-25 | 1 | -1/+0 | |
| | | ||||||
* | | change some asserts back since they're not openssl specific | Paul Kehrer | 2015-09-25 | 1 | -18/+19 | |
| | | | | | | | | plus bonus better exception msg | |||||
* | | start converting asserts to a function call | Paul Kehrer | 2015-09-25 | 1 | -166/+185 | |
|/ | | | | | This prevents situations where asserts are bypassed when running python with -O. | |||||
* | should have _asn1_* utility functions in a common place | Erik Trauschke | 2015-09-24 | 2 | -73/+63 | |
| | ||||||
* | Resolve an unusual test bug related to initializing the bindings | Paul Kehrer | 2015-08-29 | 1 | -7/+0 | |
| | | | | | | | | | | | | | | | | | | | To make calls against the "SSL" parts of OpenSSL you need to call SSL_library_init. There are multiple ways this can be called: * If you're using the same OpenSSL in cryptography as you are in your Python then Python will call it for you. * If you import the openssl backend. These tests need SSL_library_init to be called. When run in our CI SSL_library_init is called because during the parametrization step the OpenSSL backend is imported (thus triggering it). However, you can also run tests directly via py.test and without this change py.test tests/hazmat/bindings/test_openssl.py would crash if you had cryptography linked against a different OpenSSL than your Python used. | |||||
* | set the default stringmask to utf8 | Paul Kehrer | 2015-08-22 | 1 | -0/+6 | |
| | | | | | This corrects a problem where older OpenSSL versions don't do this by default. fixes #2291 | |||||
* | Move signature type checks | Stanisław Pitucha | 2015-08-14 | 3 | -8/+9 | |
| | | | | Move the point of checking signatures, as suggested by alex in PR 2262. | |||||
* | Enforce signature type in ECDSA and add tests | Stanisław Pitucha | 2015-08-12 | 1 | -0/+2 | |
| | | | | | Ensure that ECDSA signatures are bytes to match RSA/DSA and add tests for all three. | |||||
* | Ensure early exeption on non-bytes signature | Stanisław Pitucha | 2015-08-11 | 2 | -0/+6 | |
| | | | | | Signature must be in bytes. If the check is skipped, verify() can explode later in cffi call in _verify_pkey_ctx() for example. | |||||
* | switch the openssl backend to use the OID namespace | Paul Kehrer | 2015-08-10 | 2 | -26/+28 | |
| | ||||||
* | Merge pull request #2233 from reaperhulk/encode-nocheck | Alex Gaynor | 2015-08-09 | 1 | -0/+9 | |
|\ | | | | | add support for OCSPNoCheck to the CertificateBuilder | |||||
| * | improve comment for ocsp_nocheck encoding | Paul Kehrer | 2015-08-09 | 1 | -3/+2 | |
| | | ||||||
| * | add support for OCSPNoCheck to the CertificateBuilder | Paul Kehrer | 2015-08-09 | 1 | -0/+10 | |
| | | ||||||
* | | support issuer alternative name encoding | Paul Kehrer | 2015-08-09 | 1 | -2/+3 | |
|/ |