aboutsummaryrefslogtreecommitdiffstats
path: root/src/cryptography/hazmat/primitives
Commit message (Collapse)AuthorAgeFilesLines
...
* Move RSA*Key interfaces to cryptography.hazmat.primitives.asymmetric.rsaAlex Stapleton2015-01-242-63/+104
|
* Move DSA* interfaces to interfaces.dsa moduleAlex Stapleton2015-01-223-103/+150
|
* move attempts to a constant and add a comment about itPaul Kehrer2015-01-181-1/+7
|
* various improvements to rsa_recover_prime_factors per review feedbackPaul Kehrer2015-01-181-4/+4
|
* recover (p, q) given (n, e, d). fixes #975Paul Kehrer2015-01-181-0/+45
|
* Only split out ec and dsaGregory Haynes2015-01-032-84/+67
| | | | RSA is being mvoed out of the interfaces namespace in PR #1592.
* Split out asymmetric key interfacesGregory Haynes2015-01-025-229/+290
| | | | Splitting out RSA, DSA, and EllipticalCurve interfaces as part of #1495.
* Style fixes for interfaces importsGregory Haynes2014-12-311-6/+3
|
* Fix import ordering in interfacesGregory Haynes2014-12-301-2/+2
|
* Move ModeAuthenticationWithTag into ciphersGregory Haynes2014-12-302-9/+11
| | | | This class should be broken out into the ciphers module as well.
* Start splitting out interfaces with ciphersGregory Haynes2014-12-302-58/+82
| | | | | | | The interfaces module is getting unwieldy so starting to split this out. Beginning by creating a ciphers module. This starts implementing issue #1495
* Added test cases for NIST P-384 and 521. Fixed handling of key sizes which ↵Alex Gaynor2014-12-251-5/+7
| | | | aren't divisibly by 8
* Merge branch 'master' into openssh-elliptic-curveAlex Gaynor2014-12-241-8/+2
|\
| * Removed some deprecated codeAlex Gaynor2014-12-241-8/+2
| |
* | Improved docstringAlex Gaynor2014-12-241-1/+5
| |
* | THese are bytes for py3kAlex Gaynor2014-12-241-3/+3
| |
* | Reduce the duplicationAlex Gaynor2014-12-241-13/+11
| |
* | Attempt to remove some duplicationAlex Gaynor2014-12-241-26/+24
| |
* | Fixes #1533 -- Initial work at parsing ECDSA public keys in OpenSSH formatAlex Gaynor2014-12-241-8/+45
|/
* remove fully deprecated items from 0.6 deprecation cyclePaul Kehrer2014-12-181-26/+0
|
* Merge pull request #1537 from alex/cleanup-ssh-serializationPaul Kehrer2014-12-171-2/+2
|\ | | | | Use the slightly more natural API here
| * Use the slightly more natural API hereAlex Gaynor2014-12-171-2/+2
| |
* | Merge pull request #1499 from reaperhulk/x509-ossl-implAlex Gaynor2014-12-171-2/+2
|\ \ | |/ |/| X509Backend support in OpenSSL backend
| * change it to not_valid_* why notPaul Kehrer2014-12-151-2/+2
| |
| * move x509 to top level, add more docsPaul Kehrer2014-12-151-4/+0
| |
| * initial x509 openssl implementationPaul Kehrer2014-12-151-0/+4
| |
* | use the right comparisonPaul Kehrer2014-12-171-2/+2
| |
* | update docs, hoist b64decode up and re-add test for itPaul Kehrer2014-12-171-10/+11
| |
* | add OpenSSH DSS public key loadingPaul Kehrer2014-12-161-7/+33
|/ | | | fixes #1531
* two flake8 fixesAlex Gaynor2014-12-151-2/+0
|
* A handful of tiny fixesAlex Gaynor2014-12-151-19/+30
|
* Added optimization for Python 3 to use int.from_bytes instead of Python codeMark Adams2014-12-141-1/+7
|
* Made a couple of minor tweaks to clean up _read_next_string and _read_next_mpintMark Adams2014-12-141-3/+1
|
* Added better parsing for RFC 4251 string and mpint values.Mark Adams2014-12-141-22/+40
| | | | | Also moved several of the SSH key splitting and validation checks up into the load_ssh_public_key method since they will apply to more than just RSA. Added additional checks to make sure the key doesn't contain extraneous data
* Removed redundant tests for _load_ssh_rsa_public_key since it is now a ↵Mark Adams2014-12-131-2/+1
| | | | non-public part of the API and made a number of minor changes to tests and documentation
* Privatized the load_ssh_rsa_public_key function and fixed some coverage ↵Mark Adams2014-12-131-2/+2
| | | | issues on test_serialization.
* Added load_ssh_rsa_public_key to hazmat.primitives.serialization to allow ↵Mark Adams2014-12-131-0/+47
| | | | | | for loading of OpenSSH RSA public keys Also added load_ssh_public_key as a generic method that can be later extended to support more public key algorithms.
* add NotImplemented handlingPaul Kehrer2014-12-103-0/+21
|
* add __ne__ and __eq__ methods to RSA, DSA, and EC numbers classesPaul Kehrer2014-12-103-0/+63
| | | | fixes #1449
* directly test r, s for integer-nessPaul Kehrer2014-12-071-5/+9
|
* catch PyAsn1Error for encoding signature as wellPaul Kehrer2014-12-071-3/+7
|
* catch PyAsn1Error when decoding rfc6979 signaturePaul Kehrer2014-12-061-1/+6
|
* assign tuple to multiple vars for better readabilityPaul Kehrer2014-11-301-4/+4
|
* error if signature has trailing bytesPaul Kehrer2014-11-301-0/+4
|
* add encode_rfc6979_signature and refactor tests to use itPaul Kehrer2014-11-271-1/+8
|
* add decode_rfc6979_signature helper for DSA/ECDSAPaul Kehrer2014-11-271-0/+22
|
* add X509Certificate version attributePaul Kehrer2014-11-251-0/+6
|
* Initial minimal X509Certificate interfacesPaul Kehrer2014-11-241-0/+33
| | | | | This will be expanded in the future to include algorithm identifier, subject, issuer, extensions, etc
* Update the license header for every source file, as well as the documentation.Alex Gaynor2014-11-1625-301/+75
| | | | Fixes #1209
* Move the cryptography package into a src/ subdirectoryDonald Stufft2014-11-1325-0/+2421
Due to differences in how py.test determines which module to ``import`` the test suite actually runs against the cryptography which is in the *current* directory instead of the cryptography which is installed. The problem essentially boils down to when there is a tests/__init__.py then py.test adds the current directory to the front of the sys.path, causing it to take precedence over the installed location. This means that running the tests relies on the implicit compile that CFFI does instead of testing against what people will actually be runnning, which is the module compiled by setup.py.