aboutsummaryrefslogtreecommitdiffstats
path: root/src
Commit message (Collapse)AuthorAgeFilesLines
* Fixes #2710 -- silence a deprecation warning.Alex Gaynor2016-02-061-1/+9
| | | | Use the new name and alias to the old one
* Added a comment so the efficiency of this jumps out to the next personAlex Gaynor2016-02-061-0/+1
|
* treat the RSA struct more opaquely when getting public key valuesPaul Kehrer2016-02-021-3/+1
|
* Refs #2578 -- implement __hash__ on InhibitAnyPolicyEeshan Garg2016-02-011-0/+3
|
* Refs #2578 -- implement __hash__ on AccessDescriptionEeshan Garg2016-01-311-0/+3
|
* one more functionAlex Gaynor2016-01-311-0/+2
|
* Added an addition binding that PyOpenSSL might wantAlex Gaynor2016-01-311-0/+2
|
* Merge pull request #2684 from alex/deprecated-0.9.8Paul Kehrer2016-01-272-2/+10
|\ | | | | Formally deprecated support for OpenSSL 0.9.8
| * Formally deprecated support for OpenSSL 0.9.8Alex Gaynor2016-01-222-2/+10
| |
* | Merge pull request #2685 from alex/setuptools-depDonald Stufft2016-01-231-6/+1
|\ \ | | | | | | Require a newer setuptools.
| * | Require a newer setuptools.Alex Gaynor2016-01-231-6/+1
| |/ | | | | | | This lets a long confusing comment.
* / Removed kSecTrustResultConfirm, which breaks the build on 10.10 since it's ↵Alex Gaynor2016-01-231-1/+0
|/ | | | deprecated
* Merge pull request #2683 from Lukasa/more-common-cryptoAlex Gaynor2016-01-225-0/+76
|\ | | | | Bindings for validating TLS cert chains using Security.framework
| * Move SecTrustCreateWithCertificates to MACROS.Cory Benfield2016-01-221-0/+4
| | | | | | | | Annoyingly, the type of the first parameter changed across versions.
| * Fix indentation.Cory Benfield2016-01-221-8/+8
| |
| * Remove SecTrustCreateWithCertificates.Cory Benfield2016-01-221-1/+0
| | | | | | | | It's not present on 10.8.
| * Dedent closing brace.Cory Benfield2016-01-221-1/+1
| |
| * New bindings for evaluating certificates.Cory Benfield2016-01-223-0/+48
| |
| * SecTrust for evaluating certificates.Cory Benfield2016-01-221-0/+15
| |
| * Basic mutable array bindings.Cory Benfield2016-01-221-0/+10
| |
* | fernet fix: ignore the timestamp entirely when no ttl is setPaul Kehrer2016-01-211-2/+4
|/ | | | | | Previously if the token claimed to have been generated more than 60 seconds in the future we would raise InvalidToken even if ttl was set to None.
* add initial OCSP bindingsPaul Kehrer2016-01-182-0/+68
|
* consolidate the windows specific header trickery we need to doPaul Kehrer2016-01-182-9/+8
|
* Add docstring to cryptography.hazmatDaniël van Eeden2016-01-161-0/+6
| | | | | | This shows the warning which is in the docs if someone does this: >>>> import cryptography.hazmat >>>> help(cryptography.hazmat)
* move more functions out of the openssl backend classPaul Kehrer2016-01-103-77/+87
|
* move openssl asn1 decode functions to a new modulePaul Kehrer2016-01-103-710/+723
|
* remove duplicated memorybio namedtuplePaul Kehrer2016-01-101-4/+0
|
* move openssl asn1 encode functions to a new modulePaul Kehrer2016-01-102-587/+611
|
* bump values for development of the thirteenth releasePaul Kehrer2016-01-081-1/+1
|
* Merge pull request #2650 from reaperhulk/1.2-changelogAlex Gaynor2016-01-081-1/+1
|\ | | | | bump version and changelog for the twelfth release
| * bump version and changelog for the twelfth releasePaul Kehrer2016-01-071-1/+1
| |
* | Merge pull request #2646 from reaperhulk/static-callbacksAlex Gaynor2016-01-084-13/+94
|\ \ | | | | | | Static callbacks
| * | remove the callbacks we don't use in cryptographyPaul Kehrer2016-01-071-61/+0
| | |
| * | Port callbacks to new static callbackChristian Heimes2016-01-074-14/+155
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | cffi 1.4.0 will introduce a new API to create static callbacks. Contrary to the old callback API, static callbacks no longer depend on libffi's dynamic code generation for closures. Static code has some benefits over dynamic generation. For example the code is faster. Also it doesn't need writeable and executable memory mappings, which makes it compatible with SELinux's deny execmem policy. The branch depends on PR #2488. https://bitbucket.org/cffi/cffi/issues/232/static-callbacks Closes: #2477 Signed-off-by: Christian Heimes <cheimes@redhat.com>
| * | Change password callback to use userdata pointerChristian Heimes2016-01-071-0/+1
| | | | | | | | | | | | | | | | | | | | | | | | | | | Instead of a closure the pem_password_cb now uses the void *userdata argument to exchange data with the callback function. It's a necessary step to port all callbacks to new static callbacks. See: #2477 Signed-off-by: Christian Heimes <christian@python.org>
* | | Merge pull request #2647 from reaperhulk/opaque-evp-pkeyAlex Gaynor2016-01-082-13/+22
|\ \ \ | | | | | | | | opaque EVP_PKEY since EVP_PKEY_id exists
| * | | use EVP_PKEY_id where we canPaul Kehrer2016-01-071-2/+7
| | | |
| * | | add Cryptography_EVP_PKEY_idPaul Kehrer2016-01-072-4/+12
| | | |
| * | | opaque EVP_PKEY since EVP_PKEY_id existsPaul Kehrer2016-01-072-13/+9
| | |/ | |/|
* | | Merge pull request #2649 from reaperhulk/cleanup-namingAlex Gaynor2016-01-082-8/+8
|\ \ \ | |/ / |/| | rename _create_mem_bio to _create_mem_bio_gc for consistency
| * | rename _create_mem_bio to _create_mem_bio_gc for consistencyPaul Kehrer2016-01-072-8/+8
| |/
* / small cleanup to reduce code duplication for EVP_PKEY_new callsPaul Kehrer2016-01-071-7/+7
|/
* refactor the init validation of AuthorityKeyIdentifierPaul Kehrer2016-01-051-17/+20
| | | | Fixes #2640
* Merge pull request #2635 from alex/rfc-hashPaul Kehrer2016-01-031-0/+3
|\ | | | | Implement __hash__ on RFC822Name
| * Implement __hash__ on RFC822NameAlex Gaynor2016-01-031-0/+3
| |
* | Implement __hash__ on UniformResourceIdentifierAlex Gaynor2016-01-031-0/+3
|/
* Merge pull request #2624 from alex/2016Paul Kehrer2016-01-011-1/+1
|\ | | | | Bump the copyright year
| * Bump the copyright yearAlex Gaynor2016-01-011-1/+1
| |
* | convert other extra_link_args callsPaul Kehrer2016-01-012-6/+4
| |
* | don't add the NXCOMPAT and DYNAMICBASE flags if the compiler isn't msvcPaul Kehrer2016-01-012-8/+25
| |