| Commit message (Collapse) | Author | Age | Files | Lines |
| |
|
|
|
|
| |
Required to link in static part of pthread, e.g. pthread_atfork
Fixes https://github.com/pyca/cryptography/issues/5084
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
support them (#5042)
* check for suitable compiler (platform) before adding special flags
* pep8 corrections
* later pep8 messages
* add clang to auto accepted compilers
* modify syntax so multi-line is accepted
|
| |
|
| |
|
| |
|
|
|
|
|
|
| |
* Fixed #5050 -- dropped support for an old LibresSSL release
* Changelog
|
|
|
|
|
|
| |
* Add a comment so we can easily find a place to update later
* flake8
|
|
|
|
|
|
|
|
| |
macOS 10.12 (#5019)
* silence `Wunguarded-availability` when building with a `MACOSX_DEPLOYMENT_TARGET < 10.12`
* use `__builtin_available` rather than a `NULL` echo upon init on mac
|
|
|
|
|
|
| |
* Test against libressl 3.0
* Correctly type these ints
|
|
|
|
|
|
|
|
|
|
| |
* update openssls
* missed one
* what will this do
* only do this check for 1.1.0+
|
|
|
|
|
|
|
|
| |
* Add SSL_get0_verified_chain to cffi lib
OpenSSL 1.1.0 supports SSL_get0_verified_chain. This gives the full chain from the peer cert including your trusted CA cert.
* Work around no support for #if in cdef in old cffi
|
|
|
|
|
|
|
|
|
|
| |
* fix osrandom/builtin switching methods for 1.1.0+
In 1.1.0 RAND_cleanup became a no-op. This broke changing to the builtin
random engine via activate_builtin_random(). Fixed by directly calling
RAND_set_rand_method. This works on 1.0.x and 1.1.x
* missed an assert
|
|
|
|
|
|
| |
* add bindings to parse and create challenge passwords in X509 CSRs
* moved away from the 1.1.0 section
|
|
|
| |
Introduced in OpenSSL 1.1. Added compatibility for older versions.
|
| |
|
|
|
|
|
|
|
|
|
|
| |
* Use generic DTLS functions added in LibreSSL 2.9.1
While here, bump travis.
* Remove LibreSSL 2.9.0 from travis now that 2.9.1 exists.
Requested by: @reaperhulk
|
|
|
|
|
|
| |
* fix a memory leak in AIA parsing
* oops can't remove that
|
| |
|
|
|
|
|
|
| |
* Try to use getrandom even in manylinux1 wheels
* typo
|
| |
|
|
|
|
|
|
| |
* ed25519 support
* review feedback
|
| |
|
|
|
|
|
|
|
|
| |
* remove unused locking functions
we do all this in C when necessary
* oops, need this
|
| |
|
| |
|
|
|
|
|
|
| |
* how about we have less NIDs
* pyopenssl needs these two NIDs still
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
|
|
|
|
|
|
|
| |
* support OPENSSL_NO_ENGINE
* support some new openssl config args
* sigh
|
| |
|
|
|
|
|
|
|
|
|
|
| |
* encode the package version in the shared object
* review feedback
* move into build_ffi so the symbol is in all shared objects
* review feedback
|
|
|
|
|
|
|
|
| |
* Run wycheproof RSA tests on LibreSSL>=2.8
* Define it this way
* These are errors on libressl
|
|
|
|
|
|
|
|
| |
* Use O_CLOEXEC when it's available
* Don't have two vars with the same name
* A normal person would be emberassed
|
|
|
|
|
|
|
|
|
|
|
| |
* bind EVP_R_MEMORY_LIMIT_EXCEEDED and update a test
This will allow OpenSSL 1.1.1 on 32-bit (including our Windows 32-bit
builders) to fail as expected. Technically this isn't a malloc error,
but rather failing because the allocation requested is larger than
32-bits, but raising a MemoryError still seems appropriate
* what you want an endif too?
|
|
|
|
| |
we already did all the conditional binding, but forgot to actually
expose it.
|
| |
|
|
|
|
|
| |
This adds the ability to retrieve the selected SRTP protection profile
after the DTLS handshake completes. This is needed to perform the
correct key derivation if multiple profiles were offered.
|
|
|
|
|
|
| |
* HTTPS a bunch of links in random places
* What the heck happened here?
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
Linux (#4656)
* Fixes #4645 -- select() on /dev/random before reading from /dev/urandom on linux
* whoops
* Missing header
* whoops
* Review notes
* Potential uninitialized fix
* Signals are literally impossible
|
|
|
|
|
|
|
|
|
|
|
|
| |
* Raise MemoryError when backend.derive_scrypt can't malloc enough
* Expose ERR_R_MALLOC_FAILURE and use the reason_match pattern to catch it
* Add test_scrypt_malloc_failure in test_scrypt
* let's see if this passes
* add comment to filippo's blog post about scrypt's params
|
|
|
|
|
|
|
|
| |
* switch osrandom engine to blocking mode when getting entropy
* review feedback
* we can remove this too
|
| |
|
|
|
| |
OpenSSL defines these even with OPENSSL_NO_DTLS.
|
| |
|