Commit message (Collapse) | Author | Age | Files | Lines | |
---|---|---|---|---|---|
* | More linkcheck ignores (#4844) | Alex Gaynor | 2019-04-13 | 1 | -0/+2 |
| | |||||
* | Refs #4830 -- added a vector of an x.509 certificate with a negative … (#4842) | Alex Gaynor | 2019-04-13 | 1 | -0/+2 |
| | | | | | | * Refs #4830 -- added a vector of an x.509 certificate with a negative serial number * Line wrap | ||||
* | Update linkcheck ignores for the latest nonsense (#4838) | Alex Gaynor | 2019-04-12 | 1 | -1/+1 |
| | |||||
* | Fix typo (#4829) | Ofek Lev | 2019-04-02 | 1 | -1/+1 |
| | |||||
* | Ignore the Russian CA for now (#4827) | Alex Gaynor | 2019-04-01 | 1 | -0/+2 |
| | |||||
* | update ed25519 docs to note we support openssh serialization (#4814) | Paul Kehrer | 2019-03-18 | 1 | -5/+12 |
| | |||||
* | poly1305 support (#4802) | Paul Kehrer | 2019-03-09 | 3 | -0/+90 |
| | | | | | | | | | | | | | | | | | | | | * poly1305 support * some more tests * have I mentioned how bad the spellchecker is? * doc improvements * EVP_PKEY_new_raw_private_key copies the key but that's not documented Let's assume that might change and be very defensive * review feedback * add a test that fails on a tag of the correct length but wrong value * docs improvements | ||||
* | remove maccontext (#4803) | Paul Kehrer | 2019-03-07 | 2 | -39/+6 |
| | |||||
* | add poly1305 test vectors from rfc 7539 (#4800) | Paul Kehrer | 2019-03-07 | 1 | -0/+5 |
| | |||||
* | support ed25519 openssh public keys (#4785) | Paul Kehrer | 2019-02-27 | 1 | -5/+2 |
| | | | | | | * support ed25519 openssh public keys * don't need this check | ||||
* | ed448 support (#4610) | Paul Kehrer | 2019-02-27 | 2 | -0/+132 |
| | | | | | | | | * ed448 support * move the changelog entry * flake8 | ||||
* | ed25519 support (#4114) | Paul Kehrer | 2019-02-26 | 3 | -0/+161 |
| | | | | | | * ed25519 support * review feedback | ||||
* | add an EC OID to curve dictionary mapping (#4759) | Paul Kehrer | 2019-02-20 | 1 | -0/+15 |
| | | | | | | | | | | * add an EC OID to curve dictionary mapping * oid_to_curve function * changelog and docs fix * rename to get_curve_for_oid | ||||
* | add ed25519 PKCS8 and subjectPublicKeyInfo vectors (#4719) | Paul Kehrer | 2019-02-20 | 1 | -0/+7 |
| | | | | | | * add ed25519 PKCS8 and subjectPublicKeyInfo vectors * line length fix | ||||
* | add ed448 PKCS8 and subjectPublicKeyInfo vectors (#4718) | Paul Kehrer | 2019-02-20 | 1 | -0/+7 |
| | |||||
* | full state or province name (#4758) | itinerarium | 2019-02-20 | 1 | -2/+2 |
| | | | | | | | CA -> California 6.3.5 of ITU-T X.520 (10/2016) provides a spelled out sample state. In other contexts, hints generally suggest the "full name" of a state or province. A spelled out state in the sample code might be more consistent with general usage. | ||||
* | update the thread link (#4748) | Paul Kehrer | 2019-02-03 | 1 | -10/+9 |
| | | | | | | | | * update the thread link linkcheck doing its job! * update our locking information | ||||
* | concede to digicert's garbage CDN (#4747) | Paul Kehrer | 2019-02-03 | 1 | -1/+1 |
| | | | Which, despite supporting HTTPS, is non-deterministically providing 404s and DigiCert has asserted that http is the only "supported" protocol. | ||||
* | Also suggest cryptopals to learn crypo (#4745) | Alex Gaynor | 2019-02-03 | 1 | -1/+3 |
| | |||||
* | Updated link to PKCS#3 -- fixes #4671 (#4722) | Alex Gaynor | 2019-01-21 | 1 | -1/+1 |
| | |||||
* | Apparently NIST crypto resources are essential to life and property (#4721) | Alex Gaynor | 2019-01-20 | 1 | -2/+0 |
| | |||||
* | deprecate encode_point and migrate all internal callers (#4720) | Paul Kehrer | 2019-01-20 | 1 | -0/+6 |
| | |||||
* | add support for encoding compressed points (#4638) | Paul Kehrer | 2019-01-20 | 2 | -4/+34 |
| | | | | | | * add support for encoding compressed points * review feedback | ||||
* | shake128/256 support (#4611) | Paul Kehrer | 2019-01-19 | 2 | -0/+31 |
| | | | | | | | | | | | | | | * shake128/256 support * remove block_size * doc an exception * change how we detect XOF by adding _xof attribute * interface! * review feedback | ||||
* | consistently linky RFC in the docs (#4716) | Alex Gaynor | 2019-01-18 | 4 | -9/+8 |
| | | | | | | * consistently linky RFC in the docs * oops | ||||
* | Bump this way up and see if it helps (#4713) | Alex Gaynor | 2019-01-17 | 1 | -1/+1 |
| | |||||
* | support byteslike in KBKDFHMAC (#4711) | Paul Kehrer | 2019-01-17 | 1 | -1/+2 |
| | |||||
* | support byteslike in ConcatKDF{HMAC,Hash}, Scrypt, and X963KDF (#4709) | Paul Kehrer | 2019-01-17 | 1 | -3/+6 |
| | | | | | | | | * byteslike concatkdf * byteslike scrypt * byteslike x963kdf | ||||
* | support byteslike for OTP (#4710) | Paul Kehrer | 2019-01-17 | 1 | -6/+8 |
| | |||||
* | Support byteslike in HKDF and PBKDF2HMAC (#4707) | Paul Kehrer | 2019-01-17 | 1 | -2/+4 |
| | | | | | | | | * support byteslike in HKDF * support byteslike in PBKDF2HMAC * add missing docs | ||||
* | support byteslike in hmac update (#4705) | Paul Kehrer | 2019-01-17 | 1 | -1/+2 |
| | | | needed for some KDF keying material | ||||
* | support bytes-like keys in CMAC and HMAC contexts (#4701) | Paul Kehrer | 2019-01-16 | 1 | -1/+2 |
| | |||||
* | add support for byteslike password/data to load_{pem,der}_private_key (#4693) | Paul Kehrer | 2019-01-16 | 1 | -4/+8 |
| | | | | | | * add support for byteslike password/data to load_{pem,der}_private_key * pypy 5.4 can't do memoryview from_buffer | ||||
* | support byteslike in aead for key and nonce (#4695) | Paul Kehrer | 2019-01-15 | 1 | -10/+18 |
| | |||||
* | support byteslike in X448PrivateKey.from_private_bytes (#4694) | Paul Kehrer | 2019-01-15 | 1 | -1/+2 |
| | |||||
* | add support for byteslike on password and data for pkcs12 loading (#4690) | Paul Kehrer | 2019-01-15 | 1 | -2/+4 |
| | | | | | | | | | | | | * add support for byteslike on password and data for pkcs12 loading * use a contextmanager to yield a null terminated buffer we can zero * review feedback * updated text * one last change | ||||
* | Serialization x25519 (#4688) | Paul Kehrer | 2019-01-14 | 1 | -4/+84 |
| | | | | | | | | | | | | | | | | | * modify x25519 serialization to match x448 supports raw and pkcs8 encoding on private_bytes supports raw and subjectpublickeyinfo on public_bytes deprecates zero argument call to public_bytes * add docs * this is public now * don't need that * review feedback | ||||
* | Update wycheproof commit in docs (#4687) | Alex Gaynor | 2019-01-13 | 1 | -1/+1 |
| | |||||
* | add x25519 pkcs8/subjectpublickeyinfo vectors (#4685) | Paul Kehrer | 2019-01-13 | 1 | -0/+7 |
| | |||||
* | support x448 public/private serialization both raw and pkcs8 (#4653) | Paul Kehrer | 2019-01-13 | 2 | -9/+106 |
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | * support x448 public/private serialization both raw and pkcs8 * add tests for all other asym key types to prevent Raw * more tests * better tests * fix a test * funny story, I'm actually illiterate. * pep8 * require PrivateFormat.Raw or PublicFormat.Raw with Encoding.Raw * missing docs * parametrize * docs fixes * remove dupe line * assert something | ||||
* | Fixes #4683 -- fixed linux kernel version that has getrandom (#4684) | Alex Gaynor | 2019-01-12 | 1 | -1/+1 |
| | |||||
* | add signature_hash_algorithm to OCSPResponse (#4681) | Paul Kehrer | 2019-01-10 | 2 | -0/+12 |
| | | | | | | * add signature_hash_algorithm to OCSPResponse * fix pointless asserts | ||||
* | Use the contents of the ecrypt docs from the University website (#4673) | Alex Gaynor | 2019-01-02 | 3 | -3/+3 |
| | |||||
* | Update URL to EFF (#4672) | Alex Gaynor | 2019-01-01 | 1 | -1/+1 |
| | |||||
* | Fixed anchor for URL (#4670) | Alex Gaynor | 2019-01-01 | 1 | -1/+1 |
| | |||||
* | Don't try to linkcheck nist links for the time being (#4668) | Alex Gaynor | 2019-01-01 | 1 | -0/+2 |
| | |||||
* | add x448 private/public PEM/DER pkcs8/subjectpublickeyinfo vectors (#4667) | Paul Kehrer | 2019-01-01 | 1 | -0/+7 |
| | |||||
* | Sphinx's website is now https (#4662) | Alex Gaynor | 2018-12-30 | 2 | -2/+2 |
| | | | | | | * Sphinx's website is now https * Sphinx's website is now https | ||||
* | DigiCert's root is now available over https (#4664) | Alex Gaynor | 2018-12-30 | 1 | -1/+1 |
| | |||||
* | Remove spaces from RFC 4514 strings for better compliance (#4643) (#4646) | Marti Raudsepp | 2018-12-18 | 1 | -3/+3 |
| | | | | | | RFC 4514 does not explicitly allow whitespace between separators: https://tools.ietf.org/html/rfc4514 Reported-by: David Arnold <dar@xoe.solutions> |