Commit message (Collapse) | Author | Age | Files | Lines | ||
---|---|---|---|---|---|---|
... | ||||||
* | | | Fixed #2732 -- added support for x.509 policy constraints extension | Alex Gaynor | 2016-02-27 | 1 | -0/+24 | |
| |/ |/| | ||||||
* | | drop this for now | Alex Gaynor | 2016-02-27 | 1 | -1/+0 | |
| | | ||||||
* | | void | Alex Gaynor | 2016-02-27 | 1 | -1/+1 | |
| | | ||||||
* | | More policy constraint bindings | Alex Gaynor | 2016-02-27 | 1 | -0/+4 | |
| | | ||||||
* | | Merge pull request #2737 from alex/policy-constraints-bindings | Paul Kehrer | 2016-02-26 | 1 | -0/+5 | |
|\ \ | | | | | | | Added policy constraint struct binding | |||||
| * | | Added policy constraint struct binding | Alex Gaynor | 2016-02-26 | 1 | -0/+5 | |
| | | | ||||||
* | | | Merge pull request #2733 from reaperhulk/policy-constraints | Alex Gaynor | 2016-02-26 | 2 | -3/+61 | |
|\ \ \ | |/ / |/| | | add policy constraints class | |||||
| * | | export PolicyConstraints | Paul Kehrer | 2016-02-26 | 1 | -3/+5 | |
| | | | ||||||
| * | | add the oid required by the extensiontype interface | Paul Kehrer | 2016-02-26 | 1 | -0/+2 | |
| | | | ||||||
| * | | add policy constraints class | Paul Kehrer | 2016-02-26 | 1 | -0/+54 | |
| | | | ||||||
* | | | Fixes #2710 -- silence a deprecation warning. | Alex Gaynor | 2016-02-06 | 1 | -1/+9 | |
| | | | | | | | | | | | | Use the new name and alias to the old one | |||||
* | | | Added a comment so the efficiency of this jumps out to the next person | Alex Gaynor | 2016-02-06 | 1 | -0/+1 | |
| | | | ||||||
* | | | treat the RSA struct more opaquely when getting public key values | Paul Kehrer | 2016-02-02 | 1 | -3/+1 | |
|/ / | ||||||
* | | Refs #2578 -- implement __hash__ on InhibitAnyPolicy | Eeshan Garg | 2016-02-01 | 1 | -0/+3 | |
| | | ||||||
* | | Refs #2578 -- implement __hash__ on AccessDescription | Eeshan Garg | 2016-01-31 | 1 | -0/+3 | |
| | | ||||||
* | | one more function | Alex Gaynor | 2016-01-31 | 1 | -0/+2 | |
| | | ||||||
* | | Added an addition binding that PyOpenSSL might want | Alex Gaynor | 2016-01-31 | 1 | -0/+2 | |
| | | ||||||
* | | Merge pull request #2684 from alex/deprecated-0.9.8 | Paul Kehrer | 2016-01-27 | 2 | -2/+10 | |
|\ \ | | | | | | | Formally deprecated support for OpenSSL 0.9.8 | |||||
| * | | Formally deprecated support for OpenSSL 0.9.8 | Alex Gaynor | 2016-01-22 | 2 | -2/+10 | |
| | | | ||||||
* | | | Merge pull request #2685 from alex/setuptools-dep | Donald Stufft | 2016-01-23 | 1 | -6/+1 | |
|\ \ \ | | | | | | | | | Require a newer setuptools. | |||||
| * | | | Require a newer setuptools. | Alex Gaynor | 2016-01-23 | 1 | -6/+1 | |
| |/ / | | | | | | | | | | This lets a long confusing comment. | |||||
* / / | Removed kSecTrustResultConfirm, which breaks the build on 10.10 since it's ↵ | Alex Gaynor | 2016-01-23 | 1 | -1/+0 | |
|/ / | | | | | | | deprecated | |||||
* | | Merge pull request #2683 from Lukasa/more-common-crypto | Alex Gaynor | 2016-01-22 | 5 | -0/+76 | |
|\ \ | | | | | | | Bindings for validating TLS cert chains using Security.framework | |||||
| * | | Move SecTrustCreateWithCertificates to MACROS. | Cory Benfield | 2016-01-22 | 1 | -0/+4 | |
| | | | | | | | | | | | | Annoyingly, the type of the first parameter changed across versions. | |||||
| * | | Fix indentation. | Cory Benfield | 2016-01-22 | 1 | -8/+8 | |
| | | | ||||||
| * | | Remove SecTrustCreateWithCertificates. | Cory Benfield | 2016-01-22 | 1 | -1/+0 | |
| | | | | | | | | | | | | It's not present on 10.8. | |||||
| * | | Dedent closing brace. | Cory Benfield | 2016-01-22 | 1 | -1/+1 | |
| | | | ||||||
| * | | New bindings for evaluating certificates. | Cory Benfield | 2016-01-22 | 3 | -0/+48 | |
| | | | ||||||
| * | | SecTrust for evaluating certificates. | Cory Benfield | 2016-01-22 | 1 | -0/+15 | |
| | | | ||||||
| * | | Basic mutable array bindings. | Cory Benfield | 2016-01-22 | 1 | -0/+10 | |
| | | | ||||||
* | | | fernet fix: ignore the timestamp entirely when no ttl is set | Paul Kehrer | 2016-01-21 | 1 | -2/+4 | |
|/ / | | | | | | | | | | | Previously if the token claimed to have been generated more than 60 seconds in the future we would raise InvalidToken even if ttl was set to None. | |||||
* | | add initial OCSP bindings | Paul Kehrer | 2016-01-18 | 2 | -0/+68 | |
| | | ||||||
* | | consolidate the windows specific header trickery we need to do | Paul Kehrer | 2016-01-18 | 2 | -9/+8 | |
| | | ||||||
* | | Add docstring to cryptography.hazmat | Daniël van Eeden | 2016-01-16 | 1 | -0/+6 | |
|/ | | | | | | This shows the warning which is in the docs if someone does this: >>>> import cryptography.hazmat >>>> help(cryptography.hazmat) | |||||
* | move more functions out of the openssl backend class | Paul Kehrer | 2016-01-10 | 3 | -77/+87 | |
| | ||||||
* | move openssl asn1 decode functions to a new module | Paul Kehrer | 2016-01-10 | 3 | -710/+723 | |
| | ||||||
* | remove duplicated memorybio namedtuple | Paul Kehrer | 2016-01-10 | 1 | -4/+0 | |
| | ||||||
* | move openssl asn1 encode functions to a new module | Paul Kehrer | 2016-01-10 | 2 | -587/+611 | |
| | ||||||
* | bump values for development of the thirteenth release | Paul Kehrer | 2016-01-08 | 1 | -1/+1 | |
| | ||||||
* | Merge pull request #2650 from reaperhulk/1.2-changelog | Alex Gaynor | 2016-01-08 | 1 | -1/+1 | |
|\ | | | | | bump version and changelog for the twelfth release | |||||
| * | bump version and changelog for the twelfth release | Paul Kehrer | 2016-01-07 | 1 | -1/+1 | |
| | | ||||||
* | | Merge pull request #2646 from reaperhulk/static-callbacks | Alex Gaynor | 2016-01-08 | 4 | -13/+94 | |
|\ \ | | | | | | | Static callbacks | |||||
| * | | remove the callbacks we don't use in cryptography | Paul Kehrer | 2016-01-07 | 1 | -61/+0 | |
| | | | ||||||
| * | | Port callbacks to new static callback | Christian Heimes | 2016-01-07 | 4 | -14/+155 | |
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | cffi 1.4.0 will introduce a new API to create static callbacks. Contrary to the old callback API, static callbacks no longer depend on libffi's dynamic code generation for closures. Static code has some benefits over dynamic generation. For example the code is faster. Also it doesn't need writeable and executable memory mappings, which makes it compatible with SELinux's deny execmem policy. The branch depends on PR #2488. https://bitbucket.org/cffi/cffi/issues/232/static-callbacks Closes: #2477 Signed-off-by: Christian Heimes <cheimes@redhat.com> | |||||
| * | | Change password callback to use userdata pointer | Christian Heimes | 2016-01-07 | 1 | -0/+1 | |
| | | | | | | | | | | | | | | | | | | | | | | | | | | | Instead of a closure the pem_password_cb now uses the void *userdata argument to exchange data with the callback function. It's a necessary step to port all callbacks to new static callbacks. See: #2477 Signed-off-by: Christian Heimes <christian@python.org> | |||||
* | | | Merge pull request #2647 from reaperhulk/opaque-evp-pkey | Alex Gaynor | 2016-01-08 | 2 | -13/+22 | |
|\ \ \ | | | | | | | | | opaque EVP_PKEY since EVP_PKEY_id exists | |||||
| * | | | use EVP_PKEY_id where we can | Paul Kehrer | 2016-01-07 | 1 | -2/+7 | |
| | | | | ||||||
| * | | | add Cryptography_EVP_PKEY_id | Paul Kehrer | 2016-01-07 | 2 | -4/+12 | |
| | | | | ||||||
| * | | | opaque EVP_PKEY since EVP_PKEY_id exists | Paul Kehrer | 2016-01-07 | 2 | -13/+9 | |
| | |/ | |/| | ||||||
* | | | Merge pull request #2649 from reaperhulk/cleanup-naming | Alex Gaynor | 2016-01-08 | 2 | -8/+8 | |
|\ \ \ | |/ / |/| | | rename _create_mem_bio to _create_mem_bio_gc for consistency |