Commit message (Collapse) | Author | Age | Files | Lines | |
---|---|---|---|---|---|
* | remove convenience functions for revoked extensions | Erik Trauschke | 2015-10-21 | 1 | -30/+0 |
| | | | | fix docs regarding CRL PEM format | ||||
* | add comments | Erik Trauschke | 2015-10-20 | 2 | -26/+37 |
| | |||||
* | Merge branch 'master' into crl_ossl_backend | Erik Trauschke | 2015-10-20 | 11 | -23/+102 |
|\ | |||||
| * | add __repr__ to x509.Extensions | Paul Kehrer | 2015-10-20 | 1 | -0/+5 |
| | | | | | | | | fix #2434 | ||||
| * | Merge pull request #2427 from alex/ecdh | Paul Kehrer | 2015-10-19 | 6 | -0/+56 |
| |\ | | | | | | | ECDH take 4 | ||||
| | * | better document hte iface | Alex Gaynor | 2015-10-17 | 1 | -0/+7 |
| | | | |||||
| | * | unused import | Alex Gaynor | 2015-10-17 | 1 | -1/+0 |
| | | | |||||
| | * | a refactor to the API | Alex Gaynor | 2015-10-17 | 5 | -43/+35 |
| | | | |||||
| | * | Add an Elliptic Curve Key Exchange Algorithm(ECDH) | Simo Sorce | 2015-10-17 | 5 | -0/+58 |
| | | | | | | | | | | | | | | | | | | | | | | | | | | | The ECDH Key Exchange algorithm as standardized in NIST publication 800-56A Revision 2 Includes tests with vectors from NIST. Signed-off-by: Simo Sorce <simo@redhat.com> | ||||
| * | | Fix wrong mention of class in docstring. | Terry Chia | 2015-10-18 | 1 | -1/+1 |
| |/ | |||||
| * | Kill Key Exchange as a separate interface | Simo Sorce | 2015-10-15 | 1 | -18/+0 |
| | | | | | | | | | | | | | | | | Ultimately it was decided that ECDH and the others can be implemented as simple classes without the overhead of an interface. So ... let's kill it, it was a fun process. Signed-off-by: Simo Sorce <simo@redhat.com> | ||||
| * | add binding for d2i_GENERAL_NAMES() | Erik Trauschke | 2015-10-15 | 1 | -0/+2 |
| | | |||||
| * | extend pkcs7 openssl bindings | Dominic Chen | 2015-10-13 | 2 | -2/+32 |
| | | |||||
| * | Catch Invalid X or Y points and raise a ValueError | Simo Sorce | 2015-10-12 | 1 | -2/+6 |
| | | | | | | | | Signed-off-by: Simo Sorce <simo@redhat.com> | ||||
* | | Merge branch 'crl_ossl_backend' of github.com:etrauschke/cryptography into ↵ | Erik Trauschke | 2015-10-20 | 6 | -22/+282 |
|\ \ | |/ |/| | | | crl_ossl_backend | ||||
| * | removing caching mechanism for x509 properties | Erik Trauschke | 2015-10-15 | 4 | -76/+51 |
| | | | | | | | | | | | | undo name change of CRLExtensionOID use custom parsing mechanism for certIssuer entry extension add new crl to vectors for testing invalid certIssuer entry ext | ||||
| * | import fix | Erik Trauschke | 2015-10-14 | 1 | -2/+2 |
| | | |||||
| * | use X509ExtensionParser for Revoked extensions | Erik Trauschke | 2015-10-14 | 4 | -113/+88 |
| | | | | | | | | | | | | remove revoked_certificates property from RevokedCertificate class CRLExtensions should actually be RevokedExtensions doctest cleanup for RevokedCertificate | ||||
| * | fix indentations | Erik Trauschke | 2015-10-13 | 1 | -68/+65 |
| | | | | | | | | | | | | | | | | change docs to indicate CRL objects are iterable fix docs for revoked certs make _decode_crl_reason more readable add __getitem__ method to CRL object remove double underscores | ||||
| * | use openssl assert | Erik Trauschke | 2015-09-28 | 1 | -22/+27 |
| | | | | | | | | | | | | change _build* to _decode* make CRLs into iterators various fixes | ||||
| * | Merge branch 'master' into crl_ossl_backend | Erik Trauschke | 2015-09-28 | 6 | -44/+22 |
| |\ | |||||
| * \ | Merge branch 'crl_ossl_backend' of github.com:etrauschke/cryptography into ↵ | Erik Trauschke | 2015-09-28 | 5 | -4/+312 |
| |\ \ | | | | | | | | | | | | | crl_ossl_backend | ||||
| | * \ | Merge branch 'master' into crl_ossl_backend | Erik Trauschke | 2015-09-25 | 1 | -153/+172 |
| | |\ \ | |||||
| | * \ \ | Merge branch 'master' into crl_ossl_backend | Erik Trauschke | 2015-09-25 | 1 | -0/+70 |
| | |\ \ \ | |||||
| | * | | | | OpenSSL backend code for CRLs | Erik Trauschke | 2015-09-24 | 5 | -4/+312 |
| | | | | | | |||||
* | | | | | | Merge pull request #2402 from ddcc/patch-1 | Paul Kehrer | 2015-10-11 | 1 | -2/+7 |
|\ \ \ \ \ \ | | | | | | | | | | | | | | | minor fix to handle malformed certificates without hostname | ||||
| * | | | | | | fix to handle malformed certificates without hostname | Dominic Chen | 2015-10-10 | 1 | -2/+7 |
| | | | | | | | |||||
* | | | | | | | typo | Alex Gaynor | 2015-10-11 | 1 | -1/+1 |
| | | | | | | | |||||
* | | | | | | | handle errors | Alex Gaynor | 2015-10-10 | 1 | -0/+2 |
| | | | | | | | |||||
* | | | | | | | Fixed #2404 -- handle a certificate with an unknown public key | Alex Gaynor | 2015-10-10 | 1 | -1/+3 |
|/ / / / / / | |||||
* | | | | | | Introduce Key Exchange Agreements interface | Simo Sorce | 2015-10-07 | 1 | -0/+18 |
| | | | | | | | | | | | | | | | | | | | | | | | | Signed-off-by: Simo Sorce <simo@redhat.com> | ||||
* | | | | | | Change '!=' to 'is not' | Manoel Domingues Junior | 2015-10-01 | 1 | -1/+1 |
| | | | | | | |||||
* | | | | | | Handling path_length when ca is True | Manoel Domingues Junior | 2015-10-01 | 1 | -1/+1 |
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Using CertificateBuilder: builder = builder.add_extension(x509.BasicConstraints(ca=True,path_length=None), critical=True) return TypeError in line 792 because None can't be converted to hex. In https://tools.ietf.org/html/rfc5280.html#section-4.2.1.9: CAs MUST NOT include the pathLenConstraint field unless the cA boolean is asserted and the key usage extension asserts the keyCertSign bit. | ||||
* | | | | | | flake8 | Alex Gaynor | 2015-09-29 | 1 | -0/+1 |
| | | | | | | |||||
* | | | | | | sigh, fix | Alex Gaynor | 2015-09-29 | 1 | -1/+1 |
| | | | | | | |||||
* | | | | | | use signature so stuff works on 3.6 -- fixes #2382 | Alex Gaynor | 2015-09-29 | 1 | -3/+8 |
| |_|_|_|/ |/| | | | | |||||
* | | | | | unused import | Alex Gaynor | 2015-09-26 | 1 | -3/+1 |
| | | | | | |||||
* | | | | | Use InternalError for stuff | Alex Gaynor | 2015-09-26 | 6 | -41/+21 |
|/ / / / | |||||
* | | | | fix the tests | Alex Gaynor | 2015-09-26 | 1 | -4/+4 |
| | | | | |||||
* | | | | flake8 it | Alex Gaynor | 2015-09-26 | 1 | -6/+4 |
| | | | | |||||
* | | | | Convert asserts in bindings as well | Alex Gaynor | 2015-09-26 | 2 | -36/+49 |
| | | | | |||||
* | | | | converted a few more asserts | Alex Gaynor | 2015-09-26 | 3 | -3/+3 |
| | | | | |||||
* | | | | move two asserts much closer to call site | Paul Kehrer | 2015-09-25 | 1 | -2/+2 |
| | | | | |||||
* | | | | convert the rest of the openssl backend to using openssl_assert | Paul Kehrer | 2015-09-25 | 8 | -87/+90 |
| |_|/ |/| | | |||||
* | | | remove unnecessary check | Paul Kehrer | 2015-09-25 | 1 | -1/+0 |
| | | | |||||
* | | | change some asserts back since they're not openssl specific | Paul Kehrer | 2015-09-25 | 1 | -18/+19 |
| | | | | | | | | | | | | plus bonus better exception msg | ||||
* | | | start converting asserts to a function call | Paul Kehrer | 2015-09-25 | 1 | -166/+185 |
| |/ |/| | | | | | | | This prevents situations where asserts are bypassed when running python with -O. | ||||
* | | Add X963KDF from ANSI X9.63:2001 | Simo Sorce | 2015-09-24 | 1 | -0/+70 |
|/ | | | | | | | | | | The implemention allows the use a Hash function to implement a KDF very similar to ConcatKDFHash, just different enough to require a separate derivation function. Closes #2203 Signed-off-by: Simo Sorce <simo@redhat.com> | ||||
* | should have _asn1_* utility functions in a common place | Erik Trauschke | 2015-09-24 | 2 | -73/+63 |
| | |||||
* | Made import order alphabetical. | Predrag Gruevski | 2015-09-23 | 1 | -1/+1 |
| |