aboutsummaryrefslogtreecommitdiffstats
path: root/tests/hazmat/backends
Commit message (Collapse)AuthorAgeFilesLines
* Actually allocate a buffer that is the correct size.Tristan Seligmann2016-02-081-2/+3
|
* give a real EVP_PKEY with an invalid default key type to the testPaul Kehrer2016-01-071-2/+0
|
* opaque EVP_PKEY since EVP_PKEY_id existsPaul Kehrer2016-01-071-1/+1
|
* Support EC and DSA signing of CRLs in the OpenSSL backendPaul Kehrer2015-12-271-0/+37
|
* move two tests to the openssl backend tests where they belongPaul Kehrer2015-12-261-1/+51
|
* RevokedCertificateBuilderPaul Kehrer2015-12-251-2/+2
|
* add create_x509_revoked_certificate to x509backend interfacePaul Kehrer2015-12-252-0/+12
|
* Merge pull request #2567 from alex/this-is-americaPaul Kehrer2015-12-241-1/+1
|\ | | | | Spell serialization consistently
| * Spell serialization consistentlyAlex Gaynor2015-12-241-1/+1
| |
* | CertificateRevocationListBuilderPaul Kehrer2015-12-241-3/+6
|/ | | | | RSA keys only. Currently does not support CRL extensions or CRLEntry extensions.
* coveragePaul Kehrer2015-12-241-0/+5
|
* add create_x509_crl interfacePaul Kehrer2015-12-241-0/+8
|
* Change password callback to use userdata pointerChristian Heimes2015-12-201-2/+15
| | | | | | | | | Instead of a closure the pem_password_cb now uses the void *userdata argument to exchange data with the callback function. It's a necessary step to port all callbacks to new static callbacks. See: #2477 Signed-off-by: Christian Heimes <christian@python.org>
* Merge branch 'master' into crl_ossl_backendErik Trauschke2015-10-202-4/+21
|\
| * better place for this testAlex Gaynor2015-10-191-7/+0
| |
| * another testAlex Gaynor2015-10-191-0/+7
| |
| * a refactor to the APIAlex Gaynor2015-10-172-23/+18
| |
| * Add an Elliptic Curve Key Exchange Algorithm(ECDH)Simo Sorce2015-10-172-2/+24
| | | | | | | | | | | | | | | | | | The ECDH Key Exchange algorithm as standardized in NIST publication 800-56A Revision 2 Includes tests with vectors from NIST. Signed-off-by: Simo Sorce <simo@redhat.com>
* | Merge branch 'master' into crl_ossl_backendErik Trauschke2015-09-281-19/+1
|\|
| * Use InternalError for stuffAlex Gaynor2015-09-261-19/+1
| |
* | Merge branch 'crl_ossl_backend' of github.com:etrauschke/cryptography into ↵Erik Trauschke2015-09-281-0/+12
|\ \ | |/ |/| | | crl_ossl_backend
| * Merge branch 'master' into crl_ossl_backendErik Trauschke2015-09-251-1/+6
| |\
| * | OpenSSL backend code for CRLsErik Trauschke2015-09-241-0/+12
| | |
* | | fix the testsAlex Gaynor2015-09-261-1/+2
| |/ |/|
* | add test for openssl_assertPaul Kehrer2015-09-251-1/+6
|/
* fix up test coverage on multibackendAlex Gaynor2015-09-221-2/+9
|
* pep8 fixPaul Kehrer2015-08-091-2/+0
|
* move a testPaul Kehrer2015-08-091-26/+0
|
* support issuer alternative name encodingPaul Kehrer2015-08-091-1/+6
|
* fix unsupported testPaul Kehrer2015-08-081-1/+1
|
* rename sign_x509_certificate backend method to create_x509_certificatePaul Kehrer2015-08-062-4/+4
|
* fix a few tests that were missedPaul Kehrer2015-08-051-0/+2
|
* missed onePaul Kehrer2015-08-031-1/+1
|
* Merge remote-tracking branch 'upstream/master' into cert-builderIan Cordasco2015-08-031-0/+27
|\
| * this is gonna be unicode nowPaul Kehrer2015-08-011-3/+3
| |
| * move urandom engine testPaul Kehrer2015-08-011-0/+27
| | | | | | | | | | | | | | | | | | | | This test was in the bindings dir, which is incorrect. We do not set the urandom engine to default unless the openssl backend is loaded. The reason the test wasn't failing (even in the random test case) is that the backends are loaded during pytest_generate_tests by a call to _available_backends. So no matter what order it occurred in the engine was already set to default. I discovered this when I tried to run the test_openssl.py bindings tests directly via pytest. Hooray global state.
* | Add test coverage for MultiBackend.sign_x509_certificateIan Cordasco2015-08-021-0/+8
| |
* | Add note to serial_number parameter about entropyIan Cordasco2015-08-021-11/+3
| | | | | | | | | | | | | | | | | | | | - Add reference to random-numbers.rst for easy intra-linking - Document critical parameter of CertificateBuilder.add_extension - Support InhibitAnyPolicy in the CertificateBuilder frontend but not in the backend - Slim down more tests - Fix up test that asserts the backend does not allow for unsupported extensions
* | Remove CertificateBuilder.versionIan Cordasco2015-07-241-3/+1
| | | | | | | | Default CertificateBuilder to Version.v3
* | Add tests to test_openssl backend for extra coverageIan Cordasco2015-07-201-0/+39
|/
* pointer shenanigansGlyph2015-06-261-9/+8
| | | | | | | | apparently (?) ENGINE_by_id treats its ID as an opaque *pointer* key and not actually as a string, and while CPython's CFFI support seems to manage to preserve the pointer identity when using the same Python string, PyPy doesn't. Fix things to use a cffi-wrapped pointer again and tests pass on PyPy.
* remove remaining vestiges, make adding twice workGlyph2015-06-261-3/+1
|
* compare contents and not pointersGlyph2015-06-261-9/+12
|
* Use SECP256R1 instead of SECT283K1 in CSR testsIan Cordasco2015-06-241-2/+2
|
* Skip tests when the EC curve is unsupportedIan Cordasco2015-06-241-0/+2
|
* Add tests to the CSR Builder for EC and DSA keysIan Cordasco2015-06-241-1/+24
| | | | | | This skips certain tests on certain versions of differences in how X509_REQ_sign works on those versions. A separate pull request will address those differences.
* Renames sign_509_request to create_x509_csr.Andre Caron2015-06-241-0/+6
|
* convert to cffi 1.0 precompile systemPaul Kehrer2015-06-071-2/+6
|
* add load_der_x509_csr to support loading DER encoded CSRsPaul Kehrer2015-03-301-0/+6
|
* rename request to CSRPaul Kehrer2015-03-291-3/+3
|