aboutsummaryrefslogtreecommitdiffstats
path: root/src
Commit message (Collapse)AuthorAgeFilesLines
* Add more CRYPTO_EX_DATA functionsChristian Heimes2015-11-203-0/+20
| | | | | | | | The patch adds a couple of additional functions to create, store and retrieve ex_data on SSL, SSL_CTX and X509 objects. It also adds the missing get_ex_new_index function for X509_STORE_CTX. Signed-off-by: Christian Heimes <cheimes@redhat.com>
* add tbsCertList and signature interfaces to CRLsErik Trauschke2015-11-193-0/+30
|
* RHEL 6.4 and below don't even claim to be 1.0.0 final...Paul Kehrer2015-11-121-1/+1
|
* whoopsPaul Kehrer2015-11-121-0/+1
|
* reorganize and renamePaul Kehrer2015-11-122-11/+11
|
* these functions were added in 1.0.0, while CMS was added in 0.9.8hPaul Kehrer2015-11-122-0/+15
| | | | | We didn't catch this in our CI because all our 0.9.8 targets have CMS disabled or are older than 0.9.8h
* Include the full OpenSSL error in the exception messageAlex Gaynor2015-11-081-1/+1
|
* Merge pull request #2467 from reaperhulk/fix-version-checkAlex Gaynor2015-11-041-2/+2
|\ | | | | these flags were actually added in 1.0.2beta2, not before that.
| * these flags were actually added in 1.0.2beta2, not before that.Paul Kehrer2015-11-051-2/+2
| |
* | remove malloc_debug_init as it has occasionally caused compile issuesPaul Kehrer2015-11-051-1/+0
|/ | | | We also don't use it in our backend (and neither does pyOpenSSL)
* rename tbs_certificate to tbs_certificate_bytes, add a commentPaul Kehrer2015-11-032-2/+3
|
* add support for Certificate signature and tbs_certificatePaul Kehrer2015-11-034-1/+29
|
* Provide more aggressive language about dropping 2.6Alex Gaynor2015-11-011-1/+2
|
* flake8Alex Gaynor2015-11-011-2/+2
|
* corrected a few typos in commentsAlex Gaynor2015-11-011-3/+3
|
* Merge pull request #2455 from alex/different-curvesPaul Kehrer2015-10-291-0/+5
|\ | | | | Error cleanly if the public and private keys to an ECDH key exchange …
| * please flake8Alex Gaynor2015-10-291-1/+1
| |
| * Error cleanly if the public and private keys to an ECDH key exchange are on ↵Alex Gaynor2015-10-281-0/+5
| | | | | | | | different curves
* | oh right pep8 is a thingPaul Kehrer2015-10-291-3/+0
| |
* | do the deprecation dance for the twelfth releasePaul Kehrer2015-10-292-13/+1
|/
* reopen master for development on the twelfth releasePaul Kehrer2015-10-291-1/+1
|
* bump version and update changelog for eleventh release (1.1)Paul Kehrer2015-10-291-1/+1
| | | | Add some missing changelog entries
* add ellipticcurvepublicnumbers reprPaul Kehrer2015-10-281-0/+6
|
* Merge pull request #2447 from reaperhulk/encode-decode-pointAlex Gaynor2015-10-272-2/+30
|\ | | | | add support for encoding/decoding elliptic curve points
| * address review feedbackPaul Kehrer2015-10-281-5/+2
| |
| * modify approach to use EllipticCurvePublicNumbers methodsPaul Kehrer2015-10-272-34/+28
| |
| * remove support for null points, improve docsPaul Kehrer2015-10-271-4/+4
| |
| * add support for encoding/decoding elliptic curve pointsPaul Kehrer2015-10-262-2/+39
| | | | | | | | Based on the work of @ronf in #2346.
* | Merge pull request #2435 from reaperhulk/fix-2407Alex Gaynor2015-10-271-6/+8
|\ \ | | | | | | encode countryName with PrintableString
| * | update comment to include a bit more detailPaul Kehrer2015-10-271-2/+2
| | |
| * | encode countryName with PrintableStringPaul Kehrer2015-10-201-6/+8
| | | | | | | | | | | | | | | | | | | | | This commit adds a dependency on asn1crypto for testing purposes to parse the certificate and confirm that countryName is encoded with PrintableString while other fields are UTF8String. This is a test only dep.
* | | Merge pull request #2446 from reaperhulk/init-locksAlex Gaynor2015-10-262-2/+8
|\ \ \ | |_|/ |/| | move lock initialization to during binding import
| * | modify sadness prosePaul Kehrer2015-10-271-3/+5
| | |
| * | expand commentPaul Kehrer2015-10-241-1/+3
| | |
| * | move lock initialization to during binding importPaul Kehrer2015-10-242-2/+4
| | | | | | | | | | | | | | | | | | | | | | | | Previously we attempted to register our openssl locks only if the backend was initialized, but we should really just do it immediately. Consumers like PyOpenSSL already call init_static_locks after importing the binding and if a library wants to replace the locks with something else they can do so themselves.
* | | Merge pull request #2220 from reaperhulk/encode-cpAlex Gaynor2015-10-241-0/+90
|\ \ \ | |/ / |/| | support encoding certificate policies in CertificateBuilder
| * | use new ExtensionOIDPaul Kehrer2015-10-241-1/+1
| | |
| * | one more assertPaul Kehrer2015-10-241-1/+1
| | |
| * | convert asserts to openssl_assertPaul Kehrer2015-10-241-10/+10
| | |
| * | support encoding certificate policies in CertificateBuilderPaul Kehrer2015-10-241-0/+90
| | |
* | | Merge pull request #2293 from reaperhulk/idempotent-engine-addAlex Gaynor2015-10-242-6/+9
|\ \ \ | |/ / |/| | idempotent engine add
| * | address review commentsPaul Kehrer2015-10-241-5/+2
| | |
| * | make engine addition idempotentPaul Kehrer2015-10-212-5/+11
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Threading issues keep cropping up. ENGINE_add already acquires a lock at the C layer via CRYPTO_w_lock (provided you have registered the locking callbacks) so let's try to use that. As part of this we'll try to init the openssl locks, but of course there's potentially a race there as well. Clearly this isn't the real fix but it might improve the situation while we try to determine what to do.
* | | Fixed #2444 -- added an __hash__ to x509 NamesAlex Gaynor2015-10-241-0/+8
| | |
* | | update a commentPaul Kehrer2015-10-221-2/+3
| | |
* | | pep8!Paul Kehrer2015-10-211-1/+1
| | |
* | | AES keywrap supportPaul Kehrer2015-10-212-1/+85
|/ /
* | hoist a dict up to module scope so we don't recreate it every callPaul Kehrer2015-10-211-12/+15
| |
* | Merge pull request #2315 from etrauschke/crl_ossl_backendPaul Kehrer2015-10-215-22/+263
|\ \ | | | | | | OpenSSL backend code for CRLs
| * | remove convenience functions for revoked extensionsErik Trauschke2015-10-211-30/+0
| | | | | | | | | | | | fix docs regarding CRL PEM format