Commit message (Collapse) | Author | Age | Files | Lines | |
---|---|---|---|---|---|
* | add support for encoding/decoding elliptic curve points | Paul Kehrer | 2015-10-26 | 2 | -2/+39 |
| | | | | Based on the work of @ronf in #2346. | ||||
* | Merge pull request #2220 from reaperhulk/encode-cp | Alex Gaynor | 2015-10-24 | 1 | -0/+90 |
|\ | | | | | support encoding certificate policies in CertificateBuilder | ||||
| * | use new ExtensionOID | Paul Kehrer | 2015-10-24 | 1 | -1/+1 |
| | | |||||
| * | one more assert | Paul Kehrer | 2015-10-24 | 1 | -1/+1 |
| | | |||||
| * | convert asserts to openssl_assert | Paul Kehrer | 2015-10-24 | 1 | -10/+10 |
| | | |||||
| * | support encoding certificate policies in CertificateBuilder | Paul Kehrer | 2015-10-24 | 1 | -0/+90 |
| | | |||||
* | | Merge pull request #2293 from reaperhulk/idempotent-engine-add | Alex Gaynor | 2015-10-24 | 2 | -6/+9 |
|\ \ | |/ |/| | idempotent engine add | ||||
| * | address review comments | Paul Kehrer | 2015-10-24 | 1 | -5/+2 |
| | | |||||
| * | make engine addition idempotent | Paul Kehrer | 2015-10-21 | 2 | -5/+11 |
| | | | | | | | | | | | | | | | | | | | | | | Threading issues keep cropping up. ENGINE_add already acquires a lock at the C layer via CRYPTO_w_lock (provided you have registered the locking callbacks) so let's try to use that. As part of this we'll try to init the openssl locks, but of course there's potentially a race there as well. Clearly this isn't the real fix but it might improve the situation while we try to determine what to do. | ||||
* | | Fixed #2444 -- added an __hash__ to x509 Names | Alex Gaynor | 2015-10-24 | 1 | -0/+8 |
| | | |||||
* | | update a comment | Paul Kehrer | 2015-10-22 | 1 | -2/+3 |
| | | |||||
* | | pep8! | Paul Kehrer | 2015-10-21 | 1 | -1/+1 |
| | | |||||
* | | AES keywrap support | Paul Kehrer | 2015-10-21 | 2 | -1/+85 |
|/ | |||||
* | hoist a dict up to module scope so we don't recreate it every call | Paul Kehrer | 2015-10-21 | 1 | -12/+15 |
| | |||||
* | Merge pull request #2315 from etrauschke/crl_ossl_backend | Paul Kehrer | 2015-10-21 | 5 | -22/+263 |
|\ | | | | | OpenSSL backend code for CRLs | ||||
| * | remove convenience functions for revoked extensions | Erik Trauschke | 2015-10-21 | 1 | -30/+0 |
| | | | | | | | | fix docs regarding CRL PEM format | ||||
| * | add comments | Erik Trauschke | 2015-10-20 | 2 | -26/+37 |
| | | |||||
| * | Merge branch 'master' into crl_ossl_backend | Erik Trauschke | 2015-10-20 | 11 | -23/+102 |
| |\ | |||||
| * \ | Merge branch 'crl_ossl_backend' of github.com:etrauschke/cryptography into ↵ | Erik Trauschke | 2015-10-20 | 6 | -22/+282 |
| |\ \ | | | | | | | | | | | | | crl_ossl_backend | ||||
| | * | | removing caching mechanism for x509 properties | Erik Trauschke | 2015-10-15 | 4 | -76/+51 |
| | | | | | | | | | | | | | | | | | | | | | | | | undo name change of CRLExtensionOID use custom parsing mechanism for certIssuer entry extension add new crl to vectors for testing invalid certIssuer entry ext | ||||
| | * | | import fix | Erik Trauschke | 2015-10-14 | 1 | -2/+2 |
| | | | | |||||
| | * | | use X509ExtensionParser for Revoked extensions | Erik Trauschke | 2015-10-14 | 4 | -113/+88 |
| | | | | | | | | | | | | | | | | | | | | | | | | remove revoked_certificates property from RevokedCertificate class CRLExtensions should actually be RevokedExtensions doctest cleanup for RevokedCertificate | ||||
| | * | | fix indentations | Erik Trauschke | 2015-10-13 | 1 | -68/+65 |
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | change docs to indicate CRL objects are iterable fix docs for revoked certs make _decode_crl_reason more readable add __getitem__ method to CRL object remove double underscores | ||||
| | * | | use openssl assert | Erik Trauschke | 2015-09-28 | 1 | -22/+27 |
| | | | | | | | | | | | | | | | | | | | | | | | | change _build* to _decode* make CRLs into iterators various fixes | ||||
| | * | | Merge branch 'master' into crl_ossl_backend | Erik Trauschke | 2015-09-28 | 6 | -44/+22 |
| | |\ \ | |||||
| | * \ \ | Merge branch 'crl_ossl_backend' of github.com:etrauschke/cryptography into ↵ | Erik Trauschke | 2015-09-28 | 5 | -4/+312 |
| | |\ \ \ | | | | | | | | | | | | | | | | | | | crl_ossl_backend | ||||
| | | * \ \ | Merge branch 'master' into crl_ossl_backend | Erik Trauschke | 2015-09-25 | 1 | -153/+172 |
| | | |\ \ \ | |||||
| | | * \ \ \ | Merge branch 'master' into crl_ossl_backend | Erik Trauschke | 2015-09-25 | 1 | -0/+70 |
| | | |\ \ \ \ | |||||
| | | * | | | | | OpenSSL backend code for CRLs | Erik Trauschke | 2015-09-24 | 5 | -4/+312 |
| | | | | | | | | |||||
* | | | | | | | | Remove long comments and workarounds, use new cffi syntax | Alex Gaynor | 2015-10-21 | 2 | -36/+2 |
| |_|_|_|_|_|/ |/| | | | | | | |||||
* | | | | | | | add __repr__ to x509.Extensions | Paul Kehrer | 2015-10-20 | 1 | -0/+5 |
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | fix #2434 | ||||
* | | | | | | | Merge pull request #2427 from alex/ecdh | Paul Kehrer | 2015-10-19 | 6 | -0/+56 |
|\ \ \ \ \ \ \ | | | | | | | | | | | | | | | | | ECDH take 4 | ||||
| * | | | | | | | better document hte iface | Alex Gaynor | 2015-10-17 | 1 | -0/+7 |
| | | | | | | | | |||||
| * | | | | | | | unused import | Alex Gaynor | 2015-10-17 | 1 | -1/+0 |
| | | | | | | | | |||||
| * | | | | | | | a refactor to the API | Alex Gaynor | 2015-10-17 | 5 | -43/+35 |
| | | | | | | | | |||||
| * | | | | | | | Add an Elliptic Curve Key Exchange Algorithm(ECDH) | Simo Sorce | 2015-10-17 | 5 | -0/+58 |
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | The ECDH Key Exchange algorithm as standardized in NIST publication 800-56A Revision 2 Includes tests with vectors from NIST. Signed-off-by: Simo Sorce <simo@redhat.com> | ||||
* | | | | | | | | Fix wrong mention of class in docstring. | Terry Chia | 2015-10-18 | 1 | -1/+1 |
|/ / / / / / / | |||||
* | | | | | | | Kill Key Exchange as a separate interface | Simo Sorce | 2015-10-15 | 1 | -18/+0 |
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Ultimately it was decided that ECDH and the others can be implemented as simple classes without the overhead of an interface. So ... let's kill it, it was a fun process. Signed-off-by: Simo Sorce <simo@redhat.com> | ||||
* | | | | | | | add binding for d2i_GENERAL_NAMES() | Erik Trauschke | 2015-10-15 | 1 | -0/+2 |
| | | | | | | | |||||
* | | | | | | | extend pkcs7 openssl bindings | Dominic Chen | 2015-10-13 | 2 | -2/+32 |
| | | | | | | | |||||
* | | | | | | | Catch Invalid X or Y points and raise a ValueError | Simo Sorce | 2015-10-12 | 1 | -2/+6 |
|/ / / / / / | | | | | | | | | | | | | | | | | | | Signed-off-by: Simo Sorce <simo@redhat.com> | ||||
* | | | | | | Merge pull request #2402 from ddcc/patch-1 | Paul Kehrer | 2015-10-11 | 1 | -2/+7 |
|\ \ \ \ \ \ | | | | | | | | | | | | | | | minor fix to handle malformed certificates without hostname | ||||
| * | | | | | | fix to handle malformed certificates without hostname | Dominic Chen | 2015-10-10 | 1 | -2/+7 |
| | | | | | | | |||||
* | | | | | | | typo | Alex Gaynor | 2015-10-11 | 1 | -1/+1 |
| | | | | | | | |||||
* | | | | | | | handle errors | Alex Gaynor | 2015-10-10 | 1 | -0/+2 |
| | | | | | | | |||||
* | | | | | | | Fixed #2404 -- handle a certificate with an unknown public key | Alex Gaynor | 2015-10-10 | 1 | -1/+3 |
|/ / / / / / | |||||
* | | | | | | Introduce Key Exchange Agreements interface | Simo Sorce | 2015-10-07 | 1 | -0/+18 |
| | | | | | | | | | | | | | | | | | | | | | | | | Signed-off-by: Simo Sorce <simo@redhat.com> | ||||
* | | | | | | Change '!=' to 'is not' | Manoel Domingues Junior | 2015-10-01 | 1 | -1/+1 |
| | | | | | | |||||
* | | | | | | Handling path_length when ca is True | Manoel Domingues Junior | 2015-10-01 | 1 | -1/+1 |
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Using CertificateBuilder: builder = builder.add_extension(x509.BasicConstraints(ca=True,path_length=None), critical=True) return TypeError in line 792 because None can't be converted to hex. In https://tools.ietf.org/html/rfc5280.html#section-4.2.1.9: CAs MUST NOT include the pathLenConstraint field unless the cA boolean is asserted and the key usage extension asserts the keyCertSign bit. | ||||
* | | | | | | flake8 | Alex Gaynor | 2015-09-29 | 1 | -0/+1 |
| | | | | | |