aboutsummaryrefslogtreecommitdiffstats
path: root/docs
Commit message (Collapse)AuthorAgeFilesLines
* changelog entry and a few updates to the new DH params docs (#3718)Paul Kehrer2017-06-244-7/+9
|
* Dh parameters serialization (#3504)Aviv Palivoda2017-06-243-0/+129
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | * Support DH parameter serizalization - no X9.42 * Support X9.42 serialization - DER not working * Fix dhp_rfc5114_2.der Changing the DER parameters serialization after the fix in openssl commit a292c9f1b835 * DH parameters X9.42 DER serialization fixed * fix _skip_dhx_unsupported * document DH parameter_bytes * PEP8 fixes * Document load_pem_parameters * Document load_der_parameters * document ParameterFormat * Increase test coverage * Increase test covrage * Remove unneeded check * Fix typo * Fix error in load_der_parameters * Add load_pem_parameters and load_der_parameters to interfaces * CR fixes * Removed unverified phrase * Update version to 2.0 * Fix pep8 * Rename ParameterFormat.ASN1 to ParameterFormat.DHParameter * link pkcs3 * Add new line at end of file to serialization.rst * Rename DHparameters to PKCS3 * doc CR fix
* be clearer that 65537 is the right answer (#3714)Paul Kehrer2017-06-231-1/+2
| | | | | | | | * be clearer that 65537 is the right answer * Different language * remove trailing whitespace
* add FAQ entry for failed to install (#3710)Paul Kehrer2017-06-191-0/+10
|
* add NIST CAVP CCM vectors (#3698)Paul Kehrer2017-06-181-1/+1
| | | | | http://csrc.nist.gov/groups/STM/cavp/documents/mac/ccmtestvectors.zip No TLS :(
* fix typo in docs for curve name (#3705)Paul Kehrer2017-06-141-1/+1
| | | fixes #3704
* It's a method you must call (#3696)Jean-Paul Calderone2017-06-091-1/+1
| | | Fix misworded guidance for how to serialize a private key to bytes.
* X25519 Support (#3686)Paul Kehrer2017-06-092-0/+86
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | * early days * sort of working * more things * remove private_bytes * public bytes, interface fix * load public keys * x25519 support basically done now * private_bytes is gone * some reminders * doctest this too * remove a thing that doesn't matter * x25519 supported checks * libressl has the NID, but a different API, so check for OpenSSL * pep8 * add missing coverage * update to use reasons * expand test a little * add changelog entry * review feedback
* ChaCha20Poly1305 support (#3680)Paul Kehrer2017-06-083-0/+81
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | * chacha20poly1305 support * add chacha20poly1305 backend and some fixes * refactor * forgot to remove this * pep8 * review feedback and a lot of type/value checking * review feedback * raise unsupportedalgorithm when creating a ChaCha20Poly1305 object if it's not supported. * switch to ciphertext||tag * typo * remove a branch we don't need * review feedback * decrypts is *also* a word * use reasons
* scrypt can be doctested now that we're using 1.1.0 (#3688)Paul Kehrer2017-06-071-1/+1
|
* add X25519 test vectors from RFC 7748 section 5.2 (#3685)Paul Kehrer2017-06-061-0/+1
|
* Do more retries in linkcheck because NIST websites are down a lot (#3683)Alex Gaynor2017-06-051-1/+1
|
* Change the link to appease linkcheck (#3677)Alex Gaynor2017-06-041-1/+1
|
* fix symmetric encryption interfaces heading (#3676)Paul Kehrer2017-06-041-1/+1
|
* document invalidtag (#3675)Paul Kehrer2017-06-041-0/+11
| | | | | | * document invalidtag * move invalidtag
* add ChaCha20Poly1305 test vectors from OpenSSL/RFC7539 (#3673)Paul Kehrer2017-06-041-0/+4
| | | | | | | | * add ChaCha20Poly1305 test vectors from OpenSSL/RFC7539 * add the boringssl tests as well * highlight the lines
* Remove a line from "Why do we exist" (#3672)Alex Gaynor2017-06-041-1/+0
| | | I have no idea what this meant
* Refs #3461 -- parse SCTs from x.509 extension (#3480)Alex Gaynor2017-06-042-3/+29
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | * Stub API for SCTs, feedback wanted * grr, flake8 * finish up the __init__ * Initial implementation and tests * write a test. it fails because computer * get the tests passing and fix some TODOs * changelog entry * This can go now * Put a skip in this test * grump * Removed unreachable code * moved changelog to the correct section * Use the deocrator for expressing requirements * This needs f for the right entry_type * coverage * syntax error * tests for coverage * better sct eq tests * docs * technically correct, the most useless kind of correct * typo and more details * bug * drop __eq__
* Fixes #2347 -- link to the stdlib secrets module in our random number ↵Alex Gaynor2017-06-041-0/+5
| | | | generation section (#3669)
* deprecate signer/verifier on asymmetric keys (#3663)Paul Kehrer2017-06-035-196/+105
| | | | | | * deprecate signer/verifier on asymmetric keys * review feedback, switch deprecated_call to work around a bug
* make signature and verification contexts error better re: prehashed (#3658)Paul Kehrer2017-06-021-0/+12
| | | | | | * make signature and verification contexts error better re: prehashed * code review feedback
* FreeBSD 10 and higher use Fortuna, not Yarrow (#3652)Jeroen Ruigrok van der Werven2017-06-011-2/+4
|
* for humans is irritating, let's stop saying it (#3647)Paul Kehrer2017-05-301-2/+2
|
* update the docs with new jenkins CI URL & mac openssl upgrade process (#3639)Paul Kehrer2017-05-292-3/+2
|
* reorder the primitives list and improve a few titles (#3640)Paul Kehrer2017-05-293-9/+9
|
* Enlarge _oid2txt buffer to handle larger OIDs (#3612)Fraser Tweedale2017-05-291-0/+3
| | | | | | | | | The OpenSSL manual recommends a buffer size of 80 for OBJ_oid2txt: https://www.openssl.org/docs/crypto/OBJ_nid2ln.html#return_values. But OIDs longer than this occur in real life (e.g. Active Directory makes some very long OIDs). If the length of the stringified OID exceeds the buffer size, allocate a new buffer that is big enough to hold the stringified OID, and re-do the conversion into the new buffer.
* move MACContext to mac.py and eliminate interfaces.py (#3631)Paul Kehrer2017-05-296-87/+38
| | | | | | | | | | | | | * move MACContext to mac.py and eliminate interfaces.py finally * improve title * re-add and deprecate interfaces.MACContext * use pytest.warns instead of deprecated_call The pytest docs insist that deprecation warnings are handled differently and that you should use deprecated_call, but this works so okay then
* reorganize our toc to look nicer and make more sense (#3632)Paul Kehrer2017-05-291-5/+5
|
* Ignore linkcheck errors from cryptrec (#3629)Alex Gaynor2017-05-281-0/+5
|
* Improve accuracy of install docs page (#3626)Paul Kehrer2017-05-271-5/+5
| | | | | | * Improve accuracy of install docs page * fix line length
* strongly encourage the use of fernet, document its limitation (#3623)Paul Kehrer2017-05-272-0/+10
|
* Modify DH/ECDH examples to be explicit for DHE/ECDHE (#3622)Paul Kehrer2017-05-272-3/+32
| | | | | | | | * Modify DH/ECDH examples to be explicit for DHE/ECDHE Also add note to DH docs that you should probably use ECDH * give a reason
* re-add the why of cryptography to the faq with some small updates (#3621)Paul Kehrer2017-05-271-0/+19
| | | | | | * re-add the why of cryptography to the faq with some small updates * reorder the items a bit
* add some explicit instructions on determining key type in a cert (#3596)Paul Kehrer2017-05-241-0/+17
| | | | | | * add some explicit instructions on determining key type in a cert * can't call it a CSR
* comma comma comma (#3595)Paul Kehrer2017-05-241-2/+2
|
* Put the exchange method on the correct interface (#3591)Alex Gaynor2017-05-241-12/+12
| | | | | | * Put the exchange method on the correct interface * fixed links in docs
* Update the docs to not be redundant and wrong (#3593)Paul Kehrer2017-05-241-3/+0
|
* allow global suppression of link flags (#3592)Paul Kehrer2017-05-242-6/+6
| | | | | CRYPTOGRAPHY_SUPPRESS_LINK_FLAGS will now suppress link flags regardless of platform. Additionally, CRYPTOGRAPHY_WINDOWS_LINK_LEGACY_OPENSSL is now the flag you need if you want to link against < 1.1.0 on windows.
* can we convince people we're pyca/cryptography and not cryptography.io (#3588)Paul Kehrer2017-05-231-2/+2
|
* add convenience methods for key_size on EC{Public,Private}Key (#3587)Paul Kehrer2017-05-231-0/+18
|
* let's deprecate some hashes we should never have exposed (#3584)Paul Kehrer2017-05-231-16/+0
|
* update the docs index (#3583)Paul Kehrer2017-05-231-23/+19
|
* Document DH in serialization (#3569)Aviv Palivoda2017-05-231-1/+10
|
* Let's help out the newbies (#3572)Cory Benfield2017-05-221-2/+5
|
* Deprecate Python 3.3 support, with the intention of being removed in the ↵Alex Gaynor2017-05-221-0/+2
| | | | | | | | next release (#3566) * Deprecate Python 3.3 support, with the intention of being removed in the next release * whoops
* Replace release automation with click (#3557)Alex Gaynor2017-05-201-1/+1
| | | | | | | | * Replace release automation with click * Fix * fix
* remove multibackend (#3555)Paul Kehrer2017-05-202-52/+2
| | | | | | | | * remove multibackend * oops * goodbye pointless tests
* Dropped support for really old macOS (#3554)Alex Gaynor2017-05-201-2/+1
| | | | | | | | * Dropped support for really old macOS Fixes #3503 * literally, how does spelling
* time to remove commoncrypto, fare thee well (#3551)Paul Kehrer2017-05-206-80/+0
| | | | | | | | | | | | | | | | * time to remove commoncrypto, fare thee well * remove even more * update the changelog * remove more things * don't need this function * remove CAST5 CTR tests since that was only supported in commoncrypto * assert a thing
* Don't raise an UnsupportedExtension for critical extensions. (#3550)Alex Gaynor2017-05-201-21/+2
| | | | | | | | | | | | | | | | | | | | | | | | | | * Don't raise an UnsupportedExtension for critical extensions. Fixes #2903 Fixes #2901 Fixes #3325 * Don't link * Revert "Don't link" This reverts commit 4fe847f91d9dd45cdc28a4984c4e44aad62a5de6. * fix * Revert "Revert "Don't link"" This reverts commit 856031b5a1fbad04ac218fa94ebf37dcd402f3ed. * fix * Deprecate this * Better changelog entry