aboutsummaryrefslogtreecommitdiffstats
path: root/src/cryptography/hazmat
Commit message (Collapse)AuthorAgeFilesLines
...
* | Merge pull request #1910 from eeshangarg/add-openssl-binding-for-SSL_set_verifyAlex Gaynor2015-05-071-0/+1
|\ \ | | | | | | Add OpenSSL binding for SSL_set_verify
| * | Add OpenSSL binding for SSL_set_verifyEeshan Garg2015-05-071-0/+1
| | |
* | | Add OpenSSL binding for SSL_set_tlsext_status_typeEeshan Garg2015-05-051-0/+13
|/ /
* | add support for authority information access in the openssl backendPaul Kehrer2015-05-042-0/+37
| |
* | Rewrite check to read clearer.Terry Chia2015-05-041-2/+2
| |
* | Merge pull request #1901 from ↵Paul Kehrer2015-05-041-0/+3
|\ \ | | | | | | | | | | | | eeshangarg/openssl-binding-SSL-get-tlsext-status-ocsp-resp Add OpenSSL binding for SSL_get_tlsext_status_ocsp_resp
| * | Add OpenSSL binding for SSL_get_tlsext_status_ocsp_respEeshan Garg2015-05-041-0/+3
| | |
* | | authority key identifier support in the openssl backendPaul Kehrer2015-05-032-0/+44
|/ /
* | oops this was already definedPaul Kehrer2015-05-021-1/+0
| |
* | Extended key usage support for the openssl backendPaul Kehrer2015-05-022-0/+26
| |
* | Merge pull request #1881 from reaperhulk/san-rfc822nameAlex Gaynor2015-05-021-0/+22
|\ \ | | | | | | add support for rfc822name general names
| * | error if it's all emptyPaul Kehrer2015-05-021-1/+2
| | |
| * | u prefixes for everyonePaul Kehrer2015-05-021-1/+1
| | |
| * | improve if/elif chain, add some commentsPaul Kehrer2015-05-011-6/+11
| | |
| * | add support for rfc822name general namesPaul Kehrer2015-04-301-0/+16
| | |
* | | Expose SSL_CTX_set_cert_verify_callbackCory Benfield2015-05-021-0/+3
| |/ |/|
* | Merge pull request #1883 from reaperhulk/fix-1866Alex Gaynor2015-04-302-0/+11
|\ \ | | | | | | add support for equality testing to x509.Certificate
| * | add support for equality testing to x509.CertificatePaul Kehrer2015-04-302-0/+11
| |/
* | Merge pull request #1880 from endreszabo/patch-1Paul Kehrer2015-04-301-0/+1
|\ \ | |/ |/| Add X509_delete_ext binding needed by Zorp
| * Add del_extension needed by ZorpEndre Szabo2015-04-301-0/+1
| | | | | | Balabit Zorp application level firewall relies on the del_extension function to remove attributes like CRL pathes from the mimicked certificates when doing man-in-the-middle traffic filtering.
* | add support for directory name general namesPaul Kehrer2015-04-301-0/+4
|/
* add support for ipaddress to general name parsingPaul Kehrer2015-04-301-0/+9
|
* Merge pull request #1862 from reaperhulk/san-uriAlex Gaynor2015-04-281-0/+28
|\ | | | | add URI general name support
| * add URI general name supportPaul Kehrer2015-04-281-0/+28
| |
* | Merge pull request #1795 from public/dh-backend-interfaces-2015Paul Kehrer2015-04-281-0/+52
|\ \ | | | | | | DH backend interfaces
| * | DH backend interfacesAlex Stapleton2015-04-251-0/+52
| | |
* | | Added support for ssl_get_versionJim Shaver2015-04-261-0/+1
|/ /
* / some initial OCSP bindingsPaul Kehrer2015-04-241-0/+30
|/
* support registeredID general name in OpenSSL backendPaul Kehrer2015-04-221-0/+3
|
* return only an int for unsupported general name type, update docsPaul Kehrer2015-04-221-1/+1
|
* update exception to contain detailPaul Kehrer2015-04-211-1/+2
|
* handle otherName, x400Address, and ediPartyName in OpenSSL backendPaul Kehrer2015-04-211-0/+7
|
* review fixesPaul Kehrer2015-04-211-4/+2
|
* Support Subject Alternative Name in the OpenSSL backendPaul Kehrer2015-04-201-0/+30
| | | | Adds only DNS support first
* LibreSSL added ALPN support in 2.1.3Bernard Spil2015-04-151-1/+1
| | | This fixes build issues on FreeBSD
* Merge pull request #1848 from reaperhulk/invalid-tokenAlex Gaynor2015-04-143-2/+8
|\ | | | | Twofactor invalid token
| * Move cryptography.exceptions.InvalidToken to ↵Steven Buss2015-04-133-2/+8
| | | | | | | | cryptography.hazmat.primitives.twofactor
* | Fix comparison between pyasn1 objects introduced in #1843Geoffrey Thomas2015-04-141-1/+1
| | | | | | | | | | | | | | __eq__ compares values, so e.g. univ.Integer(0) == eoo.endOfOctets. I believe this isn't a logic error for what we're doing now, but keep the code right in case it gets reused. This is the pattern used by pyasn1 internally.
* | Work around pyasn1's willingness to return endOfOctets in DER parsingGeoffrey Thomas2015-04-131-0/+7
|/ | | | See #1838 for discussion.
* free the bit stringPaul Kehrer2015-04-122-0/+4
|
* keyusage support in the OpenSSL backendPaul Kehrer2015-04-121-9/+28
|
* free the ASN1_OCTET_STRING instancePaul Kehrer2015-04-101-0/+3
|
* add subjectkeyidentifier supportPaul Kehrer2015-04-101-0/+12
|
* Merge pull request #1727 from public/dh-key-iface-2015Paul Kehrer2015-04-091-12/+77
|\ | | | | DH key interfaces
| * DH key interfacesAlex Stapleton2015-04-051-12/+77
| |
* | after closer review, it would appear that PKCS7_NOSMIMECAP was added in ↵Mahmoud Hashemi2015-04-081-16/+3
| | | | | | | | 0.9.6. Removing conditional logic and making it a normal constant. (source: http://marc.info/?l=openssl-cvs&m=96816036412988&w=2 )
* | remove stray PKCS7_encrypt arg 'certs'Mahmoud Hashemi2015-04-081-1/+1
| |
* | PKCS7 signature, encryption and serialization bindings.Mark Williams2015-04-082-1/+44
| | | | | | | | | | These bindings do NOT expose the APIs necessary to add multiple signatures.
* | support openssl no-comp on linux/os xPaul Kehrer2015-04-041-5/+1
| |
* | Merge pull request #1820 from schlenk/get_crl_propertiesAlex Gaynor2015-04-031-0/+11
|\ \ | | | | | | More CRL related bindings