aboutsummaryrefslogtreecommitdiffstats
Commit message (Collapse)AuthorAgeFilesLines
* i hate groovy and i hate hard to test scripts (#4149)Paul Kehrer2018-03-181-11/+11
|
* change our manylinux1 and macos wheel builders to build limited api (#4113)Paul Kehrer2018-03-181-8/+32
| | | | | | | | | | | | | | | * change our manylinux1 and macos wheel builders to build limited api pip does not currently support the--py-limited-api cli flag that wheel uses so we have to switch to downloading and then building via setup.py bdist_wheel for now. However, we can get rid of everything but the py34 builder on mac/linux/linux32, saving us 6 wheels now (and soon 9 with the release of python 3.7) * some newlines * review feedback
* Update authors (#4148)Denis Gladkikh2018-03-181-0/+1
|
* Allow DSA q=224 (#4147)Paul Kehrer2018-03-183-93/+20
| | | | | | | | * load Q=224 vectors * DSA parameters should support 224 for q length * oxford comma
* Brainpool curves (#4129)Paul Kehrer2018-03-154-1/+76
| | | | | | | | | | | | | | | | | | * added brainpool ec-curves key_length >= 256bit * limit brainpool curves to the set that appear required + docs * oops * typos all around me * add brainpool ECDH kex tests * switch to using rfc 7027 vectors * review feedback * empty commits are the best
* brainpool vectors from rfc 7027 (#4143)Paul Kehrer2018-03-153-0/+37
|
* bump travis to latest pypy version (#4134)Paul Kehrer2018-03-051-2/+2
|
* install only the minimum required to build our docs for rtd (#4133)Paul Kehrer2018-03-054-3/+7
| | | | | | | | * install only the minimum required to build our docs for rtd We don't need to install sphinxcontrib-spelling or doc8 in rtd. * move another package
* Check all .so's are noexecstack (#3994) (#4130)Jeremy Lainé2018-03-051-0/+3
| | | | | | | | The ouput of execstack -q is one line per file, either: - starting with a '-' (dash) if the file does not require an executable stack - start with an 'X' if the file *does* require an executable stack We check there are no files which require an executable stack.
* add X509_CRL_dup function (#4127)Dominic Chen2018-03-051-0/+1
|
* remove cms bindings we don't use (#4131)Paul Kehrer2018-03-053-149/+0
|
* Document motivation for a KDF after key-exchange (#4005) (#4124)Jeremy Lainé2018-03-053-5/+64
|
* Remove unused bindings from asn1.py (#4082)David Benjamin2018-03-052-66/+1
| | | | | | | | | | | * Remove unused bindings from asn1.py This also includes a couple removals from x509v3.py which also reference ASN1_ITEM_EXP. * re-add int ASN1_STRING_set_default_mask_asc(char *); * also re-add static const int MBSTRING_UTF8
* don't allow GeneralNames to be an empty list (#4128)Paul Kehrer2018-03-052-0/+7
| | | | | | * don't allow GeneralNames to be an empty list * flake8
* test acme and also josepy as a downstream in jenkins (#4123)Paul Kehrer2018-02-251-0/+15
|
* Add certbot to downstream tests (#3740) (#4120)Jeremy Lainé2018-02-251-0/+16
|
* Expose BN_rand and BN_rand_range (#4118)Tux2018-02-231-0/+3
|
* switch RSA OAEP examples to use SHA256 (#4117)Paul Kehrer2018-02-221-4/+4
|
* Reorder this to reflect Alex's Opinions On What Is Good (#4115)Alex Gaynor2018-02-221-2/+2
|
* add aws-encryption-sdk as a downstream (#4106)Paul Kehrer2018-02-131-0/+15
| | | they're probably important, let's not break them.
* fixed docs with latest sphinx (#4107)Alex Gaynor2018-02-131-2/+1
|
* Add binding for SSL_get_certificate (#4100)Jeremy Lainé2018-02-061-0/+1
| | | | | | | | | | | | | | Currently we only expose SSL_get_peer_certificate, which allows you to retrieve the remote party's certificate. This adds the symetrical binding to retrieve the local party's certificate. The motivation for this additional binding is to make it possible to query the local certificate regardless of the method which was used to load the certificate into the SSL connection (from a file, from an in-memory object). An example where this is useful is when negotiating a DTLS-SRTP connection, the fingerprint of the local certificate needs to be communicated to the remote party out-of-band via SDP. This binding can be exposed in pyopenssl as Connection.get_certificate().
* Add myself to AUTHORS.rst (#4101)Jeremy Lainé2018-02-061-0/+1
|
* Add bindings for SRTP support (#4099)Jeremy Lainé2018-02-061-0/+3
|
* memory leak changelog (#4097)Paul Kehrer2018-02-051-0/+2
|
* fix a memory leak in ec derive_private_key (#4096)Paul Kehrer2018-02-042-2/+11
| | | | | | | | * fix a memory leak in ec derive_private_key fixes #4095 * pep8!
* Add bindings for DTLS support (#4089)gesslerpd2018-01-233-0/+30
| | | | | | | | | | | | | | | | * + more DTLS bindings * + BIO_CTRL_DGRAM* * + read ahead functions * rm BIO_CTRL_DGRAM_SET_PEEK_MODE * rm BIO_CTRL_DGRAM_SET_DONT_FRAG * + link mtu conditional logic * rm some BIO_CTRL_DGRAM* bindings
* Add bindings for PSK (#4084)gesslerpd2018-01-182-1/+53
| | | | | | | | | | * + PSK function bindings * + PSK conditional * trigger CI * trigger CI
* Add bindings for SSL_OP_NO_DTLS* (#4079)gesslerpd2018-01-163-1/+7
| | | | | | | | * + bindings for SSL_OP_NO_DTLS* * + conditional for not HAS_GENERIC_DTLS_METHOD * flag SSL_OP_NO_DTLS* for unsupported deletion
* Use the real X509_REVOKED_dup when available. (#4080)David Benjamin2018-01-121-0/+4
| | | This avoids reaching into the ASN1_ITEM mess if not necessary.
* temporarily pin cffi to avoid bug related to virtualenv (#4083)Paul Kehrer2018-01-121-1/+1
| | | | | | * temporarily pin cffi to avoid bug related to virtualenv * right, don't duplicate the name
* Fixes #4076 - simplify the implementation of int_from_bytes on python2 (#4077)Alex Gaynor2018-01-102-2/+3
| | | | | | | | * Fixes #4076 - simplify the implementation of int_from_bytes on python2 * whitespace * Added a test
* Add a Versioning section to the API stability docs (#4027)David Tucker2018-01-072-4/+21
|
* Fixed import path in go script (#4075)Alex Gaynor2018-01-061-1/+1
|
* The HKDF limit is actually 255 * digest_length_in_bytes (#4037)Paul Kehrer2018-01-063-3/+22
| | | | | | | | | | | * The HKDF limit is actually 255 * digest_length_in_bytes Previously we had a bug where we divided digest_size by 8...but HashAlgorithm.digest_size is already in bytes. * test longer output * changelog
* add 1200 byte HKDF test vector and a generator/verifier for it (#4074)Paul Kehrer2018-01-065-2/+149
| | | | | | | | * add 1200 byte HKDF test vector and a generator/verifier for it * exit non-zero when failing * ugh
* Drop conda workaround from installation docs (#4073)Alex Gaynor2018-01-061-23/+0
| | | I don't think it's relevant anymore
* Use `BN_clear_free` in places where `BN_free` is being used (#4072)Tux2018-01-051-2/+2
| | | | | | | | | | * Expose BN_clear_free * Use BN_clear_free in test_int_to_bn * Use BN_clear_free in lieu of BN_free * Use BN_free on public values
* Expose `BN_clear_free` in the OpenSSL backend (#4071)Tux2018-01-052-1/+2
| | | | | | * Expose BN_clear_free * Use BN_clear_free in test_int_to_bn
* just a quick confirmation that it really is an x25519 evp key (#4070)Paul Kehrer2018-01-053-0/+13
| | | | | | * just a quick confirmation that it really is an x25519 evp key * openssl assert. take that python -O
* DH interfaces existed in 0.9 but we didn't implement until 1.7 (#4068)Paul Kehrer2018-01-051-9/+7
| | | | | | * DH interfaces existed in 0.9 but we didn't implement until 1.7 * sigh empty
* grammar nit, use a comma here (#4066)Alex Gaynor2017-12-291-1/+1
|
* Fixed #4039 -- added a python_requires to setup.py (#4064)Alex Gaynor2017-12-261-0/+2
|
* Fixed #4006 -- bind functions for dealing with sigalgs (#4063)Alex Gaynor2017-12-262-0/+23
| | | | | | * Fixed #4006 -- bind functions for dealing with sigalgs * oops
* bump libressl version (#4062)Alex Gaynor2017-12-251-1/+1
|
* Add import default backend (#4061)Pablo Lefort2017-12-201-0/+1
| | | | | | * Add import default backend * Revert blank line in
* Fixed #4058 -- use the thread-safe API from OpenSSL, not the danger one (#4059)Alex Gaynor2017-12-183-7/+7
|
* remove whirlpool vectors since we no longer support whirlpool (#4054)Paul Kehrer2017-12-102-73/+0
|
* Don't use whirlpool as an example (#4053)Alex Gaynor2017-12-111-1/+1
| | | | | Both because it's weirdo crypto, but also because we don't even support it. Adhere to our documented policy of using good crypto for all examples
* Fixed 120 warnings from the RSA tests (#4052)Alex Gaynor2017-12-111-9/+6
| | | | | | * Fixed 120 warnings from the RSA tests * typo