aboutsummaryrefslogtreecommitdiffstats
path: root/tests/hazmat
Commit message (Collapse)AuthorAgeFilesLines
...
* | CertificateRevocationListBuilderPaul Kehrer2015-12-241-3/+6
|/ | | | | RSA keys only. Currently does not support CRL extensions or CRLEntry extensions.
* coveragePaul Kehrer2015-12-241-0/+5
|
* add create_x509_crl interfacePaul Kehrer2015-12-241-0/+8
|
* Change password callback to use userdata pointerChristian Heimes2015-12-201-2/+15
| | | | | | | | | Instead of a closure the pem_password_cb now uses the void *userdata argument to exchange data with the callback function. It's a necessary step to port all callbacks to new static callbacks. See: #2477 Signed-off-by: Christian Heimes <christian@python.org>
* use the non-deprecated name for this functionAlex Gaynor2015-12-191-3/+3
|
* Add support for 160 bit ARC4 keysEhren Kret2015-11-281-0/+1
|
* Swapping modified x509 test with modified ec testPeter Hamilton2015-10-301-11/+2
|
* Adding elliptic curve test fixturesPeter Hamilton2015-10-291-0/+296
| | | | This change adds pre-generated elliptic curve keys to be used in elliptic curve tests.
* Error cleanly if the public and private keys to an ECDH key exchange are on ↵Alex Gaynor2015-10-281-1/+27
| | | | different curves
* add ellipticcurvepublicnumbers reprPaul Kehrer2015-10-281-0/+5
|
* address review feedbackPaul Kehrer2015-10-281-7/+0
|
* modify approach to use EllipticCurvePublicNumbers methodsPaul Kehrer2015-10-272-73/+76
|
* remove support for null points, improve docsPaul Kehrer2015-10-271-2/+4
|
* add support for encoding/decoding elliptic curve pointsPaul Kehrer2015-10-261-2/+71
| | | | Based on the work of @ronf in #2346.
* Merge pull request #2293 from reaperhulk/idempotent-engine-addAlex Gaynor2015-10-241-2/+2
|\ | | | | idempotent engine add
| * make engine addition idempotentPaul Kehrer2015-10-211-2/+2
| | | | | | | | | | | | | | | | | | | | | | Threading issues keep cropping up. ENGINE_add already acquires a lock at the C layer via CRYPTO_w_lock (provided you have registered the locking callbacks) so let's try to use that. As part of this we'll try to init the openssl locks, but of course there's potentially a race there as well. Clearly this isn't the real fix but it might improve the situation while we try to determine what to do.
* | add comments on test cases to explain reasons a bit betterPaul Kehrer2015-10-221-0/+5
| |
* | make skip message more verbosePaul Kehrer2015-10-211-11/+10
| |
* | AES keywrap supportPaul Kehrer2015-10-211-0/+112
|/
* Merge branch 'master' into crl_ossl_backendErik Trauschke2015-10-203-5/+146
|\
| * better place for this testAlex Gaynor2015-10-192-7/+16
| |
| * another testAlex Gaynor2015-10-191-0/+7
| |
| * removed unused code, and added a testAlex Gaynor2015-10-191-12/+13
| |
| * be more pro-active in handling invalid keysAlex Gaynor2015-10-181-23/+27
| |
| * unusedAlex Gaynor2015-10-171-6/+0
| |
| * a refactor to the APIAlex Gaynor2015-10-173-76/+59
| |
| * Add an Elliptic Curve Key Exchange Algorithm(ECDH)Simo Sorce2015-10-173-3/+117
| | | | | | | | | | | | | | | | | | The ECDH Key Exchange algorithm as standardized in NIST publication 800-56A Revision 2 Includes tests with vectors from NIST. Signed-off-by: Simo Sorce <simo@redhat.com>
| * Catch Invalid X or Y points and raise a ValueErrorSimo Sorce2015-10-121-0/+29
| | | | | | | | Signed-off-by: Simo Sorce <simo@redhat.com>
* | Merge branch 'master' into crl_ossl_backendErik Trauschke2015-09-281-19/+1
|\|
| * Use InternalError for stuffAlex Gaynor2015-09-261-19/+1
| |
* | Merge branch 'crl_ossl_backend' of github.com:etrauschke/cryptography into ↵Erik Trauschke2015-09-281-0/+12
|\ \ | |/ |/| | | crl_ossl_backend
| * Merge branch 'master' into crl_ossl_backendErik Trauschke2015-09-251-1/+6
| |\
| * \ Merge branch 'master' into crl_ossl_backendErik Trauschke2015-09-252-0/+192
| |\ \
| * | | OpenSSL backend code for CRLsErik Trauschke2015-09-241-0/+12
| | | |
* | | | fix the testsAlex Gaynor2015-09-261-1/+2
| | | |
* | | | rename this file for consistencyAlex Gaynor2015-09-261-0/+0
| |_|/ |/| |
* | | add test for openssl_assertPaul Kehrer2015-09-251-1/+6
| |/ |/|
* | Some cleanupsAlex Gaynor2015-09-241-3/+3
| |
* | Test X9.63 with NIST test vectorsSimo Sorce2015-09-241-0/+72
| | | | | | | | Signed-off-by: Simo Sorce <simo@redhat.com>
* | Add X963KDF from ANSI X9.63:2001Simo Sorce2015-09-241-0/+120
|/ | | | | | | | | | The implemention allows the use a Hash function to implement a KDF very similar to ConcatKDFHash, just different enough to require a separate derivation function. Closes #2203 Signed-off-by: Simo Sorce <simo@redhat.com>
* fix up test coverage on multibackendAlex Gaynor2015-09-221-2/+9
|
* skip if check on ec testPaul Kehrer2015-08-121-1/+2
|
* Merge pull request #2262 from viraptor/non-bytes-signaturesPaul Kehrer2015-08-123-0/+31
|\ | | | | Ensure early exeption on non-bytes signature
| * Enforce signature type in ECDSA and add testsStanisław Pitucha2015-08-123-0/+31
| | | | | | | | | | Ensure that ECDSA signatures are bytes to match RSA/DSA and add tests for all three.
* | resolve incorrect docs/naming around DSA (r, s) tuple encode/decodePaul Kehrer2015-08-102-23/+31
|/
* pep8 fixPaul Kehrer2015-08-091-2/+0
|
* move a testPaul Kehrer2015-08-091-26/+0
|
* support issuer alternative name encodingPaul Kehrer2015-08-091-1/+6
|
* fix unsupported testPaul Kehrer2015-08-081-1/+1
|
* rename sign_x509_certificate backend method to create_x509_certificatePaul Kehrer2015-08-062-4/+4
|