aboutsummaryrefslogtreecommitdiffstats
path: root/src/cryptography/hazmat/backends
Commit message (Expand)AuthorAgeFilesLines
...
* Remove a dead assignment (#4692)Alex Gaynor2019-01-151-1/+0
* Serialization x25519 (#4688)Paul Kehrer2019-01-143-6/+100
* support x448 public/private serialization both raw and pkcs8 (#4653)Paul Kehrer2019-01-132-2/+99
* add signature_hash_algorithm to OCSPResponse (#4681)Paul Kehrer2019-01-101-0/+11
* Improve error message for unsupported ciphers (#4650)Alex Gaynor2018-12-181-6/+8
* Compressed point support (#4629)Paul Kehrer2018-12-111-0/+20
* convert some asserts to function calls (#4636)Paul Kehrer2018-12-101-10/+14
* ec key creation by curve name refactored into a method (#4634)Paul Kehrer2018-12-101-21/+10
* allow bytes-like for key/iv/data for symmetric encryption (#4621)Paul Kehrer2018-12-091-8/+13
* Adds a more descriptive error msg for wrong wrapping (#4504)André Almeida2018-12-081-3/+12
* Raise MemoryError when backend.derive_scrypt can't malloc enough (#4592)Tux2018-12-081-1/+18
* encode IssuingDistributionPoint (#4618)Paul Kehrer2018-12-021-0/+23
* centralize our bytes check (#4622)Paul Kehrer2018-12-024-10/+7
* refactor some code into separate functions in asn1 encode (#4617)Paul Kehrer2018-12-011-20/+31
* allow multi-valued RDNs (#4616)Paul Kehrer2018-11-301-1/+1
* IssuingDistributionPoint support (parse only) (#4552)Paul Kehrer2018-11-301-0/+25
* PKCS12 Basic Parsing (#4553)Paul Kehrer2018-11-281-0/+46
* Move SSH serialization to it's own file (#4607)Alex Gaynor2018-11-241-14/+12
* refactor serialization module into package (#4606)Paul Kehrer2018-11-231-11/+14
* Added comments reminding us to improve this code when we go 1.1.1+ only (#4605)Alex Gaynor2018-11-231-0/+4
* X448 support (#4580)Paul Kehrer2018-11-222-0/+84
* refactor x25519 exchange into utils (#4603)Paul Kehrer2018-11-222-24/+27
* refactor x25519 keygen into evp_pkey_keygen (#4587)Paul Kehrer2018-11-131-7/+7
* Add eq/ne/hash to PrecertificateSignedCertificateTimestamps (#4534)Paul Kehrer2018-10-291-0/+20
* create & use _evp_md_from_algorithm and _evp_md_non_null_from_algorithm (#4542)Paul Kehrer2018-10-294-47/+37
* OCSP response builder (#4485)Paul Kehrer2018-10-282-1/+107
* refactor _decode_dist_points (#4536)Paul Kehrer2018-10-281-64/+67
* add _create_asn1_time (#4524)Paul Kehrer2018-10-241-12/+10
* refactor set_asn1_time to take a datetime (#4516)Paul Kehrer2018-10-231-14/+7
* next_update is not a required field on OCSP responses (#4513)Paul Kehrer2018-10-231-2/+4
* OCSP response serialization (#4482)Paul Kehrer2018-10-061-0/+13
* support extensions in the OCSP request builder (#4481)Paul Kehrer2018-10-062-1/+19
* Cleanup _encode_asn1_str_gc: don't require the length as an argument (#4484)Alex Gaynor2018-10-072-15/+11
* add OCSP basic response extension parsing (#4479)Paul Kehrer2018-10-062-1/+17
* support OCSP response parsing (#4452)Paul Kehrer2018-10-012-4/+254
* OCSP request extension parsing (#4464)Paul Kehrer2018-09-092-2/+23
* refactor asn1_time_set to be useful in a future PR (#4465)Paul Kehrer2018-09-091-27/+27
* don't sort the serial numbers in a parsed CRL (#4457)Paul Kehrer2018-09-041-2/+12
* small refactor of OCSP request parsing (#4447)Paul Kehrer2018-09-011-38/+54
* Fixes #4333 -- added support for precert poison extension (#4442)Alex Gaynor2018-08-312-5/+22
* Simplify OCSP no check serialization (#4444)Alex Gaynor2018-08-311-5/+2
* refactor ocsp request parsing and generation to support only one cert (#4439)Paul Kehrer2018-08-312-50/+22
* Fixed two memory leaks in x509 csr extensions (#4434)Alex Gaynor2018-08-312-3/+16
* make an ocsp request (#4402)Paul Kehrer2018-08-301-0/+16
* OCSP request parsing (#4393)Paul Kehrer2018-08-152-0/+130
* disallow implicit tag truncation with finalize_with_tag (#4342)Paul Kehrer2018-07-171-0/+5
* add crl.get_revoked_certificate method (#4331)Paul Kehrer2018-07-161-0/+19
* raise valueerror for null x25519 derived keys (#4332)Paul Kehrer2018-07-121-1/+5
* we don't actually care about the errstack here, it's an invalid signature (#4...Paul Kehrer2018-07-101-2/+1
* fix a memory leak when calling X25519PrivateKey.public_key() (#4326)Paul Kehrer2018-07-101-0/+4