Commit message (Collapse) | Author | Age | Files | Lines | |
---|---|---|---|---|---|
* | Bump this way up and see if it helps (#4713) | Alex Gaynor | 2019-01-17 | 1 | -1/+1 |
| | |||||
* | changelog for byteslike (#4712) | Paul Kehrer | 2019-01-17 | 1 | -0/+3 |
| | | | | | | * changelog for byteslike * bertter prose | ||||
* | support byteslike in KBKDFHMAC (#4711) | Paul Kehrer | 2019-01-17 | 3 | -2/+11 |
| | |||||
* | support byteslike in ConcatKDF{HMAC,Hash}, Scrypt, and X963KDF (#4709) | Paul Kehrer | 2019-01-17 | 8 | -7/+70 |
| | | | | | | | | * byteslike concatkdf * byteslike scrypt * byteslike x963kdf | ||||
* | support byteslike for OTP (#4710) | Paul Kehrer | 2019-01-17 | 3 | -6/+19 |
| | |||||
* | normalize KBKDF tests (#4708) | Paul Kehrer | 2019-01-17 | 1 | -38/+37 |
| | |||||
* | Support byteslike in HKDF and PBKDF2HMAC (#4707) | Paul Kehrer | 2019-01-17 | 6 | -6/+42 |
| | | | | | | | | * support byteslike in HKDF * support byteslike in PBKDF2HMAC * add missing docs | ||||
* | support bytes-like for X25519PrivateKey.from_private_bytes (#4698) | Paul Kehrer | 2019-01-17 | 2 | -6/+40 |
| | | | yuck. | ||||
* | x448 and x25519 should enforce key lengths in backend (#4703) | Paul Kehrer | 2019-01-17 | 5 | -4/+42 |
| | | | | | | | | | | | * x448 and x25519 should enforce key lengths in from_private_bytes they should also check if the algorithm is supported like the public bytes class methods do * oops * move the checks | ||||
* | support byteslike in hmac update (#4705) | Paul Kehrer | 2019-01-17 | 4 | -4/+6 |
| | | | needed for some KDF keying material | ||||
* | support byteslike in hash updates (#4702) | Paul Kehrer | 2019-01-16 | 3 | -2/+17 |
| | | | This is needed to handle keying material in some of the KDFs | ||||
* | support bytes-like keys in CMAC and HMAC contexts (#4701) | Paul Kehrer | 2019-01-16 | 5 | -3/+29 |
| | |||||
* | add support for byteslike password/data to load_{pem,der}_private_key (#4693) | Paul Kehrer | 2019-01-16 | 3 | -7/+58 |
| | | | | | | * add support for byteslike password/data to load_{pem,der}_private_key * pypy 5.4 can't do memoryview from_buffer | ||||
* | turn off hypothesis deadlines, enforced by default in 4.0 (#4696) | Paul Kehrer | 2019-01-16 | 2 | -2/+2 |
| | | | | we don't care about exceeding a deadline in CI because our infra has wild variability and this can just randomly happen. | ||||
* | support byteslike in aead for key and nonce (#4695) | Paul Kehrer | 2019-01-15 | 4 | -18/+73 |
| | |||||
* | support byteslike in X448PrivateKey.from_private_bytes (#4694) | Paul Kehrer | 2019-01-15 | 3 | -2/+16 |
| | |||||
* | add support for byteslike on password and data for pkcs12 loading (#4690) | Paul Kehrer | 2019-01-15 | 3 | -15/+54 |
| | | | | | | | | | | | | * add support for byteslike on password and data for pkcs12 loading * use a contextmanager to yield a null terminated buffer we can zero * review feedback * updated text * one last change | ||||
* | Remove a dead assignment (#4692) | Alex Gaynor | 2019-01-15 | 1 | -1/+0 |
| | |||||
* | Serialization x25519 (#4688) | Paul Kehrer | 2019-01-14 | 10 | -21/+378 |
| | | | | | | | | | | | | | | | | | * modify x25519 serialization to match x448 supports raw and pkcs8 encoding on private_bytes supports raw and subjectpublickeyinfo on public_bytes deprecates zero argument call to public_bytes * add docs * this is public now * don't need that * review feedback | ||||
* | Update wycheproof commit in docs (#4687) | Alex Gaynor | 2019-01-13 | 1 | -1/+1 |
| | |||||
* | add x25519 pkcs8/subjectpublickeyinfo vectors (#4685) | Paul Kehrer | 2019-01-13 | 7 | -0/+19 |
| | |||||
* | support x448 public/private serialization both raw and pkcs8 (#4653) | Paul Kehrer | 2019-01-13 | 12 | -21/+497 |
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | * support x448 public/private serialization both raw and pkcs8 * add tests for all other asym key types to prevent Raw * more tests * better tests * fix a test * funny story, I'm actually illiterate. * pep8 * require PrivateFormat.Raw or PublicFormat.Raw with Encoding.Raw * missing docs * parametrize * docs fixes * remove dupe line * assert something | ||||
* | Fixes #4683 -- fixed linux kernel version that has getrandom (#4684) | Alex Gaynor | 2019-01-12 | 3 | -3/+3 |
| | |||||
* | Add bindings to get SRTP protection profile (#4679) | Jeremy Lainé | 2019-01-11 | 1 | -0/+6 |
| | | | | | This adds the ability to retrieve the selected SRTP protection profile after the DTLS handshake completes. This is needed to perform the correct key derivation if multiple profiles were offered. | ||||
* | add signature_hash_algorithm to OCSPResponse (#4681) | Paul Kehrer | 2019-01-10 | 7 | -18/+63 |
| | | | | | | * add signature_hash_algorithm to OCSPResponse * fix pointless asserts | ||||
* | Another HTTPS (#4674) | Alex Gaynor | 2019-01-02 | 1 | -1/+1 |
| | |||||
* | Use the contents of the ecrypt docs from the University website (#4673) | Alex Gaynor | 2019-01-02 | 3 | -3/+3 |
| | |||||
* | Update URL to EFF (#4672) | Alex Gaynor | 2019-01-01 | 1 | -1/+1 |
| | |||||
* | Fixed anchor for URL (#4670) | Alex Gaynor | 2019-01-01 | 1 | -1/+1 |
| | |||||
* | Don't try to linkcheck nist links for the time being (#4668) | Alex Gaynor | 2019-01-01 | 1 | -0/+2 |
| | |||||
* | add x448 private/public PEM/DER pkcs8/subjectpublickeyinfo vectors (#4667) | Paul Kehrer | 2019-01-01 | 7 | -0/+21 |
| | |||||
* | HTTPS a bunch of links in random places (#4666) | Alex Gaynor | 2018-12-31 | 10 | -15/+15 |
| | | | | | | * HTTPS a bunch of links in random places * What the heck happened here? | ||||
* | Sphinx's website is now https (#4662) | Alex Gaynor | 2018-12-30 | 2 | -2/+2 |
| | | | | | | * Sphinx's website is now https * Sphinx's website is now https | ||||
* | DigiCert's root is now available over https (#4664) | Alex Gaynor | 2018-12-30 | 1 | -1/+1 |
| | |||||
* | Debian buster goes py3.7 (#4663) | Alex Gaynor | 2018-12-30 | 1 | -2/+2 |
| | |||||
* | Fixes #4645 -- poll() on /dev/random before reading from /dev/urandom on ↵ | Alex Gaynor | 2018-12-29 | 1 | -17/+55 |
| | | | | | | | | | | | | | | | | | | Linux (#4656) * Fixes #4645 -- select() on /dev/random before reading from /dev/urandom on linux * whoops * Missing header * whoops * Review notes * Potential uninitialized fix * Signals are literally impossible | ||||
* | Bump libressl versions in travis (#4654) | Alex Gaynor | 2018-12-24 | 1 | -2/+4 |
| | |||||
* | add x448 to changelog (#4652) | Paul Kehrer | 2018-12-22 | 1 | -0/+2 |
| | |||||
* | Improve error message for unsupported ciphers (#4650) | Alex Gaynor | 2018-12-18 | 1 | -6/+8 |
| | | | | | | | | | | | | * Improve error message for unsupported ciphers * fix spacing * include the openssl version number in the message * backwards * pep8 | ||||
* | Support compressed points in the wycheproof tests (#4648) | Alex Gaynor | 2018-12-18 | 1 | -15/+5 |
| | | | | | | | | * Support compressed points in the wycheproof tests * Handle entries with no public key * Ok, let's try this | ||||
* | handle empty byte string in from_encoded_point (#4649) | Paul Kehrer | 2018-12-17 | 2 | -0/+10 |
| | | | | | | * handle empty byte string in from_encoded_point * move the error | ||||
* | Fedora has rev'd its Python to 3.7 (#4647) | Alex Gaynor | 2018-12-18 | 1 | -2/+2 |
| | | | | | | * Fedora has rev'd it's Python to 3.7 * here too | ||||
* | Remove spaces from RFC 4514 strings for better compliance (#4643) (#4646) | Marti Raudsepp | 2018-12-18 | 3 | -8/+8 |
| | | | | | | RFC 4514 does not explicitly allow whitespace between separators: https://tools.ietf.org/html/rfc4514 Reported-by: David Arnold <dar@xoe.solutions> | ||||
* | deprecate old from_encoded_point (#4640) | Paul Kehrer | 2018-12-11 | 5 | -13/+34 |
| | |||||
* | Compressed point support (#4629) | Paul Kehrer | 2018-12-11 | 6 | -3/+133 |
| | | | | | | | | | | | | | | | | | | | | | | | | * compressed point support * refactor to use oct2point directly * small docs change * remove deprecation for the moment and a bit of review feedback * no backend arg, implicitly import it * missed a spot * double oops * remove superfluous call * use refactored method * use vector file * one last item | ||||
* | document what the vector format is a little better (#4639) | Paul Kehrer | 2018-12-11 | 1 | -0/+1 |
| | |||||
* | add compressed point EC vectors (#4637) | Paul Kehrer | 2018-12-10 | 2 | -0/+27 |
| | |||||
* | convert some asserts to function calls (#4636) | Paul Kehrer | 2018-12-10 | 1 | -10/+14 |
| | |||||
* | ec key creation by curve name refactored into a method (#4634) | Paul Kehrer | 2018-12-10 | 1 | -21/+10 |
| | | | | | | * ec key creation by curve name refactored into a method * typo | ||||
* | allow bytes-like for key/iv/data for symmetric encryption (#4621) | Paul Kehrer | 2018-12-09 | 13 | -49/+141 |
| | | | | | | | | | | | | | | | | | | * allow bytearrays for key/iv for symmetric encryption * bump pypy/cffi requirements * update docs, fix some tests * old openssl is naught but pain * revert a typo * use trusty for old pypy * better error msg again * restore match |