aboutsummaryrefslogtreecommitdiffstats
path: root/docs/hazmat/primitives
Commit message (Collapse)AuthorAgeFilesLines
...
* blake2b/blake2s support (#3116)Paul Kehrer2016-08-281-0/+31
| | | | | | | | | | | | | | | | | | | | | | | | | * blake2b/blake2s support Doesn't support keying, personalization, salting, or tree hashes so the API is pretty simple right now. * implement digest_size via utils.read_only_property * un-keyed for spelling's sake * test copying + digest_size checks * unkeyed is too a word * line wrap * reword the docs * use the evp algorithm name in the error This will make BLAKE2 alternate digest size errors a bit less confusing * add changelog entry and docs about supported digest_size
* Fix docs to clarify the less than 256 limit for Padding(). (#3099)Terry Chia2016-08-241-2/+2
| | | | | | * Fix docs to clarify the less than 256 limit. * Add "inclusive".
* Update example code to use recommended 160 bits (#3088)Dave Brondsema2016-08-161-2/+2
| | | I found the examples with `os.urandom(16)` generated URIs that Google Authenticator and Duo two-factor apps did not even recognize as supported. This increases the key to the recommended 160 bits, and the URIs now work with both of those apps.
* Remove provider language from docs (#3072)Gabriel Orisaka2016-07-318-68/+54
|
* Clarify what to pass to the sign-function (#3066)Loy2016-07-301-1/+1
| | | Sign needs an ECDSA instance and from following the link to EllipticCurveSignatureAlgorithm, that wasn't clear directly.
* Removed provider language from asymmetric primitives docs (#3052)Gabriel Orisaka2016-07-265-132/+91
| | | | | | * Removed provider language from asymmetric primitives docs * Reverted changes to some examples
* Enforce that p > q to improve OpenSSL compatibility (fixes #2990) (#3010)Dirkjan Ochtman2016-07-191-1/+3
|
* A few small cleanups (#3046)Alex Gaynor2016-07-181-2/+2
|
* Add flag to toggle key length check for HOTP and TOTP. (#3012)Terry Chia2016-07-161-2/+22
| | | | | | | | | | * Add an enforce_key_length parameter to HOTP and TOTP. * Document changes in docs. * Add some words to the wordlist. * Add versionadded to docs.
* One shot sign/verification ECDSA (#3029)Aviv Palivoda2016-07-022-5/+46
| | | | | | | | | | | | | | * Add sign and verify methods to ECDSA * Documented ECDSA sign/verify methods * Added CHANGELOG entry * Skipping test verify and sign if curve is not supported * Fixed typo in documentation return type * Removed provider language from EllipticCurvePrivateKey and EllipticCurvePublicKey
* one shot verify documentation fix (#3031)Aviv Palivoda2016-06-302-4/+4
|
* One shot sign/verify DSA (#3003)Aviv Palivoda2016-06-301-0/+53
| | | | | | | | * Add sign and verify methods to DSA * Documented DSA sign/verify methods * Added CHANGELOG entry
* Fixed #3008 -- expose calculate max pss salt length (#3014)Alex Gaynor2016-06-271-4/+17
| | | | | | | | | | | | | | * Fixed #3008 -- expose calculate max pss salt length * Fixed a few mistakes in the docs * move all the code around * oops * write a unit test * versionadded + changelog
* rest syntaxAlex Gaynor2016-06-271-1/+1
|
* Fixes #2992 -- clearly link to a key dumping docs in serialization mo… (#3013)Alex Gaynor2016-06-251-0/+10
| | | | | | | | * Fixes #2992 -- clearly link to a key dumping docs in serialization module * fixed rest * guh, grammar
* Use `d` instead of `private_exponent` for consistency (#2991)Dirkjan Ochtman2016-06-221-4/+4
| | | | True story: I used `e` instead of `d` because it seemed more closely related to `e`. Should have looked it up, of course... but the docs could be better.
* Clean up some of the nonsense in our DSA docs. (#2969)Alex Gaynor2016-06-041-5/+5
| | | Fixes #1478
* Add convenience methods to sign and verify w/ RSA (#2945)Colleen Murphy2016-06-041-3/+73
| | | | | | | | | This patch adds wrapper methods to allow the user to sign and verify a single message block without having to go through the multi-step process of creating a signer or verifier, updating it with the one message, and finalizing the result. This will make signing and verifying data more user-friendly when only using small messages. Partial bug #1529
* Refs #1478 -- attempt to improve our nonsense docs for ECCurve.key_size (#2959)Alex Gaynor2016-06-031-1/+2
| | | | | | * Refs #1478 -- attempt to improve our nonsense docs for ECCurve.key_size * fix
* SSH serialization for public keys (#2957)Alex Gaynor2016-06-031-0/+13
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | * SSH serialization for public keys * name errors ahoy! * id, ego, superego * dsa support * EC support * Don't keyerror * Documentation OpenSSH * flake8 * fix * bytes bytes bytes * skip curve unsupported * bytes! * Move a function * reorganize code for coverage
* NIST SP 800-108 Counter Mode KDF (#2748)Jared2016-05-291-0/+150
| | | | | | | | | | | | | | | | | | * NIST SP 800-108 Counter Mode and Feedback Mode KDF * CounterKDF unit tests * Refactor to support multiple key based KDF modes. * Extracting supported algorithms for KBKDF Counter Mode test vectors * Adding support for different rlen and counter location in KBKDF * support for multiple L lengths and 24 bit counter length. * Adding KBKDF Documentation. * Refactoring KBKDF to KBKDFHMAC to describe hash algorithm used.
* Fixed #2859 -- document that SHA-1 is the worst (#2925)Alex Gaynor2016-05-291-1/+3
| | | | | | * Fixed #2859 -- document that SHA-1 is the worst * words words words
* Merge pull request #2736 from cedk/ANSI_X.923Paul Kehrer2016-03-161-0/+45
|\ | | | | Added support for padding ANSI X.923
| * Add version in the docCédric Krier2016-03-151-0/+2
| |
| * Add wikipedia link to ANSI X.923Cédric Krier2016-02-271-4/+6
| |
| * Added support for padding ANSI X.923Cédric Krier2016-02-271-0/+41
| |
* | HTTPS some links, in the odd event users of a cryptographic library would ↵Alex Gaynor2016-03-063-3/+3
|/ | | | care about authentication, integrity, or confidentiality
* Clearly document that this is a good exampleAlex Gaynor2016-02-101-0/+3
|
* As always, recommend cryptoing while you cryptoAlex Gaynor2016-02-021-1/+1
|
* Minor doc tweak per issue #2694Phoebe Queen2016-01-291-1/+5
|
* provide a bit more detail about the underlying public key formatsPaul Kehrer2015-12-311-2/+4
|
* Better document the return type of serialization load functionsAlex Gaynor2015-12-301-5/+31
|
* Port a few cr.yp.to links to be HTTPSAlex Gaynor2015-12-281-1/+1
| | | | Because researching crypto should probably be secure.
* modify approach to use EllipticCurvePublicNumbers methodsPaul Kehrer2015-10-272-45/+32
|
* remove support for null points, improve docsPaul Kehrer2015-10-271-6/+5
|
* rst continues to be a mysteryPaul Kehrer2015-10-271-2/+1
|
* fix some docsPaul Kehrer2015-10-271-6/+12
|
* add support for encoding/decoding elliptic curve pointsPaul Kehrer2015-10-261-0/+41
| | | | Based on the work of @ronf in #2346.
* some ec key exchange doc improvementsPaul Kehrer2015-10-221-1/+4
|
* add info about the rfcPaul Kehrer2015-10-221-0/+6
|
* expand keywrap intro docsPaul Kehrer2015-10-211-1/+4
|
* add version added info and doc exceptionPaul Kehrer2015-10-211-0/+7
|
* AES keywrap supportPaul Kehrer2015-10-212-0/+44
|
* add a little bit about ECDHEPaul Kehrer2015-10-201-0/+5
|
* Merge pull request #2427 from alex/ecdhPaul Kehrer2015-10-191-0/+44
|\ | | | | ECDH take 4
| * better document hte ifaceAlex Gaynor2015-10-171-0/+19
| |
| * a refactor to the APIAlex Gaynor2015-10-171-23/+4
| |
| * Add an Elliptic Curve Key Exchange Algorithm(ECDH)Simo Sorce2015-10-171-0/+44
| | | | | | | | | | | | | | | | | | The ECDH Key Exchange algorithm as standardized in NIST publication 800-56A Revision 2 Includes tests with vectors from NIST. Signed-off-by: Simo Sorce <simo@redhat.com>
* | Merge pull request #2425 from reaperhulk/fix-encoding-der-addedAlex Gaynor2015-10-191-2/+4
|\ \ | | | | | | make it clearer when PEM and DER encoding support was added
| * | fix extra spacePaul Kehrer2015-10-171-1/+1
| | |