aboutsummaryrefslogtreecommitdiffstats
path: root/docs/hazmat
Commit message (Collapse)AuthorAgeFilesLines
* PKCS12 Basic Parsing (#4553)Paul Kehrer2018-11-281-0/+37
| | | | | | | | | | | | | | | | | | * PKCS12 parsing support * running all the tests is so gauche * rename func * various significant fixes * dangerous idiot here * move pkcs12 * docs updates * a bit more prose
* X448 support (#4580)Paul Kehrer2018-11-222-0/+105
| | | | | | | | | | | | | | | | | | | | * x448 support This work was originally authored by derwolfe * update docs to have a more useful derived key length * error if key is not a valid length in from_public_bytes * one more * switch to using evp_pkey_keygen_gc for x448 keygen * review feedback * switch to using evp_pkey_derive * nit fix
* add sha3 support (#4573)Paul Kehrer2018-11-221-0/+37
| | | | | | | | * add sha3 support * missed versionadded * add prose, remove block_size
* add SHA512/224 and SHA512/256 support (#4575)Paul Kehrer2018-11-121-0/+14
| | | | | | * add SHA512/224 and SHA512/256 support * add missing docs
* add a few more EC OIDs (#4572)Paul Kehrer2018-11-111-0/+78
| | | | | | * add a few more EC OIDs * spaces matter
* add EC OIDs (#4435)Paul Kehrer2018-10-301-0/+32
| | | | | | * add EC OIDs * move ec oid docs to bottom
* change ECDH documentation to show both classical ECDH and ECDHE (#4530)Paul Kehrer2018-10-281-6/+52
|
* reorder curves to put binary (SECT) curves down at the bottom (#4529)Paul Kehrer2018-10-281-48/+59
| | | also add a disclaimer that you shouldn't use them
* HTTPS one last URL (#4522)Alex Gaynor2018-10-251-1/+1
|
* OpenPGP's website is also HTTPS! (#4518)Alex Gaynor2018-10-241-1/+1
|
* Colin's website went HTTPS! (#4515)Alex Gaynor2018-10-242-3/+3
|
* a few docs fixes and language improvements (#4472)Paul Kehrer2018-09-142-7/+7
|
* Refs #4375 -- integrate wycheproof AES CCM tests (#4379)Alex Gaynor2018-08-021-1/+1
| | | | | | * Refs #4375 -- integrate wycheproof AES CCM tests * Skip these tests if we don't have CCM support
* min_tag_length is an int (#4351)Paul Kehrer2018-07-171-1/+1
|
* raise ValueError on zero length GCM IV (#4348)Paul Kehrer2018-07-171-1/+2
|
* disallow implicit tag truncation with finalize_with_tag (#4342)Paul Kehrer2018-07-171-0/+1
|
* document one shot AEAD length restrictions (#4322)Paul Kehrer2018-07-141-0/+6
| | | | | | | | | | | | | | * document one shot AEAD length restrictions * write a test that won't consume infinity ram continue to raise OverflowError since that's what cffi did. * this applies to associated_data too * remove unneeded arg * review feedback on docs
* document that an ECPublicNumbers object has some unexpected properties (#4319)Paul Kehrer2018-07-091-0/+8
| | | | | | | | | | | | | * document that an ECPublicNumbers object has some unexpected properties It is not guaranteed to be a valid point on the curve as that is not checked until you convert it to a PublicKey object. * different language * move the text, make it a warning, alter the language * new language
* Make the docs clearer on why truncated tags are a bad idea (#4312)Alex Gaynor2018-07-061-4/+4
| | | | | | * Make the docs clearer on why truncated tags are a bad idea * clarify
* Add serialisation output examples (#4286)Коренберг Марк2018-06-261-0/+24
|
* remove block size as a required part of HashAlgorithm (#4249)Paul Kehrer2018-05-161-6/+0
| | | | | | Internal block size isn't a particularly useful piece of information and constructions like SHA3 make it even harder to determine what that really means. Accordingly, we're removing it from the interface (but leaving it on all existing hashes)
* switch to py3 on docs job (#4230)Paul Kehrer2018-05-128-25/+25
| | | | | | * switch to py3 on docs job * somehow unicode isn't a word
* Fixed some confusing type descriptions in docs (#4231)Alex Gaynor2018-05-121-4/+1
|
* implement AES KW with padding (RFC 5649) (#3880)Paul Kehrer2018-03-181-0/+39
| | | | | | | | | | | | | | | | | | * implement AES KW with padding (RFC 5649) fixes #3791 * oops, 2.2 * make sure this is the right valueerror * more match * make key padding easier to read * review feedback * review feedback
* Brainpool curves (#4129)Paul Kehrer2018-03-151-0/+22
| | | | | | | | | | | | | | | | | | * added brainpool ec-curves key_length >= 256bit * limit brainpool curves to the set that appear required + docs * oops * typos all around me * add brainpool ECDH kex tests * switch to using rfc 7027 vectors * review feedback * empty commits are the best
* Document motivation for a KDF after key-exchange (#4005) (#4124)Jeremy Lainé2018-03-053-5/+64
|
* switch RSA OAEP examples to use SHA256 (#4117)Paul Kehrer2018-02-221-4/+4
|
* Reorder this to reflect Alex's Opinions On What Is Good (#4115)Alex Gaynor2018-02-221-2/+2
|
* DH interfaces existed in 0.9 but we didn't implement until 1.7 (#4068)Paul Kehrer2018-01-051-9/+7
| | | | | | * DH interfaces existed in 0.9 but we didn't implement until 1.7 * sigh empty
* grammar nit, use a comma here (#4066)Alex Gaynor2017-12-291-1/+1
|
* Add import default backend (#4061)Pablo Lefort2017-12-201-0/+1
| | | | | | * Add import default backend * Revert blank line in
* Don't use whirlpool as an example (#4053)Alex Gaynor2017-12-111-1/+1
| | | | | Both because it's weirdo crypto, but also because we don't even support it. Adhere to our documented policy of using good crypto for all examples
* let's talk about bits baby (#3956)Paul Kehrer2017-10-117-57/+62
|
* Add support for AES XTS (#3900)Paul Kehrer2017-10-011-0/+41
| | | | | | | | | | | | | | | | | | | | | | | | * Add support for AES XTS We drop the non-byte aligned test vectors because according to NIST http://csrc.nist.gov/groups/STM/cavp/documents/aes/XTSVS.pdf "An implementation may support a data unit length that is not a multiple of 8 bits." OpenSSL does not support this, so we can't use those test vectors. * fix docs and pep8 * docs fix * the spellchecker is so frustrating * add note about AES 192 for XTS (it's not supported) * docs work * enforce key length on ECB mode in AES as well (thanks XTS) * a few more words about why we exclude some test vectors for XTS
* add ChaCha20 support (#3919)Paul Kehrer2017-09-281-0/+49
| | | | | | | | | | * add ChaCha20 support * review feedback * 256 divided by 8 is what again? * ...
* Switch NIST PDFs from nvlpubs to csrc which is HTTPS (#3929)Alex Gaynor2017-09-204-7/+7
|
* Update the rest of the NIST urls to their new HTTPS homes (#3928)Alex Gaynor2017-09-203-4/+4
|
* Fix `load_rsa_public_numbers` documentation (#3871)David Sanders2017-08-201-1/+1
|
* Fix mistake in `RSAPublicKey.verify` documentation (#3872)David Sanders2017-08-201-1/+1
|
* update docs to reflect #3364 (#3786)Paul Kehrer2017-07-171-1/+1
|
* add AESGCM AEAD support (#3785)Paul Kehrer2017-07-172-0/+76
| | | | | | | | * add AESGCM AEAD support * remove stray newline * move AESGCM docs above CCM
* move tag_length to the AESCCM constructor (#3783)Paul Kehrer2017-07-161-11/+7
| | | | | | * move tag_length to the AESCCM constructor * review feedback
* AESCCM support (#3700)Paul Kehrer2017-07-161-0/+88
|
* we forgot to document these DH methods (#3757)Paul Kehrer2017-07-061-0/+27
|
* don't use long keys because they can be confusing wrt bits/bytes (#3734)Paul Kehrer2017-06-281-17/+17
| | | | | | | | * don't use long keys because they can be confusing wrt bits/bytes * make sure we say bytes everywhere * shorten the scrypt output to 32 bytes as well
* doc the relationship between PrivateKey and PrivateKeyWithSerialization (#3721)Paul Kehrer2017-06-244-8/+25
| | | | | | | | * doc the relationship between PrivateKey and PrivateKeyWithSerialization Or at least do it better. * let's talk about opaque keys
* Reorganize DHParameters and DHPublicKey *WithSerialization (#3722)Paul Kehrer2017-06-241-15/+13
| | | | | | | | * Reorganize DHParameters and DHPublicKey *WithSerialization fixes #3720 * fix up the changelog
* changelog entry and a few updates to the new DH params docs (#3718)Paul Kehrer2017-06-243-7/+8
|
* Dh parameters serialization (#3504)Aviv Palivoda2017-06-243-0/+129
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | * Support DH parameter serizalization - no X9.42 * Support X9.42 serialization - DER not working * Fix dhp_rfc5114_2.der Changing the DER parameters serialization after the fix in openssl commit a292c9f1b835 * DH parameters X9.42 DER serialization fixed * fix _skip_dhx_unsupported * document DH parameter_bytes * PEP8 fixes * Document load_pem_parameters * Document load_der_parameters * document ParameterFormat * Increase test coverage * Increase test covrage * Remove unneeded check * Fix typo * Fix error in load_der_parameters * Add load_pem_parameters and load_der_parameters to interfaces * CR fixes * Removed unverified phrase * Update version to 2.0 * Fix pep8 * Rename ParameterFormat.ASN1 to ParameterFormat.DHParameter * link pkcs3 * Add new line at end of file to serialization.rst * Rename DHparameters to PKCS3 * doc CR fix
* be clearer that 65537 is the right answer (#3714)Paul Kehrer2017-06-231-1/+2
| | | | | | | | * be clearer that 65537 is the right answer * Different language * remove trailing whitespace