| Commit message (Collapse) | Author | Age | Files | Lines |
| |
|
| |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
* compressed point support
* refactor to use oct2point directly
* small docs change
* remove deprecation for the moment and a bit of review feedback
* no backend arg, implicitly import it
* missed a spot
* double oops
* remove superfluous call
* use refactored method
* use vector file
* one last item
|
|
|
|
|
|
| |
* add a few more EC OIDs
* spaces matter
|
|
|
|
|
|
| |
* add EC OIDs
* move ec oid docs to bottom
|
| |
|
|
|
| |
also add a disclaimer that you shouldn't use them
|
| |
|
| |
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
* document that an ECPublicNumbers object has some unexpected properties
It is not guaranteed to be a valid point on the curve as that is not
checked until you convert it to a PublicKey object.
* different language
* move the text, make it a warning, alter the language
* new language
|
|
|
|
|
|
| |
* switch to py3 on docs job
* somehow unicode isn't a word
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
* added brainpool ec-curves key_length >= 256bit
* limit brainpool curves to the set that appear required + docs
* oops
* typos all around me
* add brainpool ECDH kex tests
* switch to using rfc 7027 vectors
* review feedback
* empty commits are the best
|
| |
|
| |
|
| |
|
| |
|
|
|
|
|
|
|
|
| |
* doc the relationship between PrivateKey and PrivateKeyWithSerialization
Or at least do it better.
* let's talk about opaque keys
|
|
|
| |
fixes #3704
|
|
|
|
|
|
| |
* deprecate signer/verifier on asymmetric keys
* review feedback, switch deprecated_call to work around a bug
|
|
|
|
|
|
|
|
| |
* Modify DH/ECDH examples to be explicit for DHE/ECDHE
Also add note to DH docs that you should probably use ECDH
* give a reason
|
| |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
(#3539)
* Document our real API for EC verification, not an accident
* formatting consistency
* fix the code itself
* fixed class name
* fixed a test too
|
| |
|
|
|
|
|
|
| |
* add support for prehashing in ECDSA sign/verify
* move signature_algorithm check to its own function
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
* change derive_elliptic_curve_public_point to return EllipticCurvePublicKey
* also rename the backend interface method
* review feedback
* Rename to derive_elliptic_curve_private_key
* Returns EllipticCurvePrivateKey
* Reuses the EC_POINT in the openssl impl
* Rename "secret" arg to "private_value" which is consistent with our
naming for the value in ECPrivateNumbers.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
* finish https://github.com/pyca/cryptography/pull/1973
* change API & add test
Function will now return an instance of EllipticCurvePrivateKey, as that
is the users' ultimate goal anyway.
* fix test
* improve coverage
* complete coverage
* final fix
* centos fix
* retry
* cleanup asserts
* use openssl_assert
* skip unsupported platforms
* change API name to derive_private_key
* change version added
* improve description of `secret` param
* separate successful and failure test cases
* simplify successful case
* add docs for derive_elliptic_curve_public_point
* add period
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
* first draft of verification and serialization
* tweaks in the RST syntax
* added example of deserialization
* taking into account the returned value, so that doctests pass
* adjusted rst syntax and indentation for code samples
* removed print call
* forgot to actually call splitlines
* added missing argument when loading private key
* added Deserialization to dictionary
* made lines shorter to meet style requirements
* applied requested changes in style
|
|
|
| |
Sign needs an ECDSA instance and from following the link to EllipticCurveSignatureAlgorithm, that wasn't clear directly.
|
|
|
|
|
|
| |
* Removed provider language from asymmetric primitives docs
* Reverted changes to some examples
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
* Add sign and verify methods to ECDSA
* Documented ECDSA sign/verify methods
* Added CHANGELOG entry
* Skipping test verify and sign if curve is not supported
* Fixed typo in documentation return type
* Removed provider language from EllipticCurvePrivateKey and EllipticCurvePublicKey
|
|
|
|
|
|
| |
* Refs #1478 -- attempt to improve our nonsense docs for ECCurve.key_size
* fix
|
|
|
|
| |
care about authentication, integrity, or confidentiality
|
|
|
|
| |
Because researching crypto should probably be secure.
|
| |
|
| |
|
| |
|
|\
| |
| | |
ECDH take 4
|
| | |
|
| | |
|
| |
| |
| |
| |
| |
| |
| |
| |
| | |
The ECDH Key Exchange algorithm as standardized in NIST publication
800-56A Revision 2
Includes tests with vectors from NIST.
Signed-off-by: Simo Sorce <simo@redhat.com>
|
|/
|
|
|
|
| |
The first parameter is curve, not backend
Signed-off-by: Simo Sorce <simo@redhat.com>
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|