| Commit message (Collapse) | Author | Age | Files | Lines |
|
|
|
|
|
|
|
|
| |
This patch adds wrapper methods to allow the user to sign and verify a
single message block without having to go through the multi-step
process of creating a signer or verifier, updating it with the one
message, and finalizing the result. This will make signing and
verifying data more user-friendly when only using small messages.
Partial bug #1529
|
|
|
|
|
|
| |
* Refs #1478 -- attempt to improve our nonsense docs for ECCurve.key_size
* fix
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
* SSH serialization for public keys
* name errors ahoy!
* id, ego, superego
* dsa support
* EC support
* Don't keyerror
* Documentation OpenSSH
* flake8
* fix
* bytes bytes bytes
* skip curve unsupported
* bytes!
* Move a function
* reorganize code for coverage
|
| |
|
|
|
|
|
|
|
|
| |
* Add alias for Certificate serial as serial number
* Adding deprecation to utils
* Now with catch warnings and proper vers
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
* add RSA OAEP SHA2 vectors via custom vector creation
* update the docs
* retab
* remove sha2 oaep support (it will be added again in another PR)
* add header to each vector file
* Add Java 8 Bouncy Castle based verification of RSA-OAEP SHA-2 test vectors (#4)
* Update Java verifier to skip past test vector file header if present (#5)
* Update Java verifier to skip past test vector file header if present
* Fix tabs vs. space whitespace
* generate sha1 oaep permutations as well + verify support in java
* address review feedback
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
* NIST SP 800-108 Counter Mode and Feedback Mode KDF
* CounterKDF unit tests
* Refactor to support multiple key based KDF modes.
* Extracting supported algorithms for KBKDF Counter Mode test vectors
* Adding support for different rlen and counter location in KBKDF
* support for multiple L lengths and 24 bit counter length.
* Adding KBKDF Documentation.
* Refactoring KBKDF to KBKDFHMAC to describe hash algorithm used.
|
|
|
|
|
|
| |
* Fixed #2859 -- document that SHA-1 is the worst
* words words words
|
| |
|
| |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
* Update getting-started.rst to clarify OS X Homebrew pip install
On OS X El Capitan following the current instructions fails with fatal error: 'openssl/opensslv.h' file not found on pip install -r dev-requirements.txt; this change adds to the instructions to clarify that CFLAGS and LDFLAGS may need to be set. I based this on the instructions in the Installation page.
* Address reaperhulk comments, OpenSSL must be installed.
Clarify that OpenSSL must be installed via Homebrew or MacPorts and how to build statically.
* Make Homebrew, MacPorts, OpenSSL links
* Fix doc errors and improve overall flow
Insert tip about tox needing the same flags
Make console example multi-line so that pip install is visible
Change heading levels to allow OS X sub-section
|
| |
|
| |
|
|
|
|
|
|
|
|
|
|
| |
* Add vectors for unkeyed blake2s and blake2b.
* Add short note describing source of vectors.
* Add link to OpenSSL repository.
* Amend docs.
|
|
|
|
| |
and update the pip version needed to get wheels
|
| |
|
| |
|
| |
|
|\
| |
| | |
Added support for padding ANSI X.923
|
| | |
|
| | |
|
| | |
|
|\ \
| | |
| | | |
NIST SP 800-108 Counter Mode KDF test vectors.
|
| | | |
|
| | |
| | |
| | |
| | | |
NIST CAVP test vectors for Counter Mode KDF using HMAC-SHA1, HMAC-SHA224, HMAC-SHA256 and HMAC-SHA512 as the PRF.
|
| | | |
|
| | | |
|
| | | |
|
| | | |
|
| | | |
|
|\ \ \
| | | |
| | | | |
Add AuthorityKeyIdentifier.from_issuer_subject_key_identifier
|
| | | | |
|
| | | | |
|
|/ / / |
|
| | | |
|
| | | |
|
|/ / |
|
| |
| |
| |
| | |
care about authentication, integrity, or confidentiality
|
|\ \
| | |
| | | |
Add verify method on CertificateSigningRequest
|
| | | |
|
| | | |
|
|\ \ \
| | | |
| | | | |
Several updates to our security docs:
|
| | | | |
|
| | | | |
|
| | | | |
|
| | | |
| | | |
| | | |
| | | |
| | | |
| | | | |
- Document what we consider a vulnerability
- Update my prefered PGP key identifier
- Clarify that we only provide security support for the most recent release (this has empirically been true for all of our releases
|
| | | | |
|
| |_|/
|/| | |
|
|\ \ \
| | | |
| | | | |
add policy constraints class
|
| | | | |
|