aboutsummaryrefslogtreecommitdiffstats
path: root/tests/hazmat/backends/test_multibackend.py
Commit message (Collapse)AuthorAgeFilesLines
* remove multibackend (#3555)Paul Kehrer2017-05-201-654/+0
| | | | | | | | * remove multibackend * oops * goodbye pointless tests
* missing coverage for dh_x942_serialization_supported in MultiBackend (#3432)Paul Kehrer2017-03-081-0/+1
|
* DH subgroup order (q) (#3369)Aviv Palivoda2017-03-051-1/+6
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | * Support DH q (subgroup order) * Change RFC5114.txt to NIST format * Add tests for DH q * Update docs for DH q * Fix pep8 * Improve test covergae for DH q * Create _dh_params_dup that copy q if DHparams_dup don't On OpenSSL < 1.0.2 DHparams_dup don't copy q. _dh_params_dup call DHparams_dup and if the version is smaller than 1.0.2 copy q manually * Copy q manually on libressl * Add to test vectors serialized RFC5114 2048 bit DH parameters with 224 bit subgroup * Support serialization of DH with q * Add tests for serialization of DH with q * Support DH serialization with q only if Cryptography_HAS_EVP_PKEY_DHX is true * Raise exception when trying to serialize DH X9.42 when not supported * raise unsupported key type when deserilizing DH X9.42 if not supported * pep8 fixes * Fix test_serialization * Add dhx_serialization_supported method to DHBacked * document q in dh_parameters_supported * Rename dhx_serialization_supported to dh_x942_serialization_supported
* OpenSSL DH backend implementation [Second attempt] (#2914)Aviv Palivoda2016-11-261-3/+55
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | * Start of OpenSSL DH backend implementation * Supporting DH in MultiBackend * DHBackend has dh_parameters_supported method * Removed DHParametersWithNumbers and DHPrivateKeyWithNumbers from documentation * Removed ExchangeContext. exchange is a method of DHPrivateKeyWithSerialization * PEP8 fixes * Fixed TestDH.test_bad_tls_exchange * Fixed generate_private_key reference in dh documentation * test DH multibackend support * testing DH coversion to serialized * Validating that we receive serialized class in test_generate_dh * Testing DH exchange symmetric key padding * struct DH is now opaqued * PEP8 fixes * Testing load_dh_private_numbers throws ValueError when DH_check fails * Using openssl_assert * Passing keywords arguments in DH key exchange example * test_dh::test_bad_tls_exchange now uses pre calculated parameters * TestDH - Add test that the computed secret is equivalent to the definition by comparing with secret computed in pure python * Add missing generator parameter to DHBackend interface docs. * Include parameter type in DHBackend abc docs. * Add docs for dh.generate_parameters function * Remove the dh Numbers section, and move the DHNumbers class docs to where they are first used. * Add note of big endian byte packing to DH exchange method. * DH documentation updates. Add single sentence overview with wikipedia link. Add paragraph on assembling using Numbers objects. Add link to backend interface docs. First section was all indented, I think by mistake. * Add exchange method to DHPrivateKey abstract base class. * Small tweaks to DH documentation - remove Provider. * Add endian to dictionary * Use utils.int_from_bytes in test_tls_exchange_algorithm * Removed duplicate line * Change dh.rst exchange algorithm from doctest to code-block The example in the Diffie-Hellman exhange algorithm is using 2048 bits key. Generating the parameters of 2048 takes long time. This caused the automated tests to fail. In order to pass the tests we change the example to code-block so it will not run in the doc tests. * Fix dh docs * Document the generator in DHBackend relevant methods * Fix dh tests * use DHparams_dup * Fix key type to unsigned char as expected by DH_compute_key * Validate that DH generator is 2 or 5 * test dh exchange using botan vectors * group all numbers classes * Simplify _DHPrivateKey * Rename test with serialized to numbers * Move bad exchange params to external vector file * update exchange versionadded to 1.7 * Make key_size bit accurate * Change botan link * Added CHANGELOG entry
* change derive_elliptic_curve_public_point to return EllipticCurvePubl… (#3243)Paul Kehrer2016-11-181-3/+3
| | | | | | | | | | | | | | * change derive_elliptic_curve_public_point to return EllipticCurvePublicKey * also rename the backend interface method * review feedback * Rename to derive_elliptic_curve_private_key * Returns EllipticCurvePrivateKey * Reuses the EC_POINT in the openssl impl * Rename "secret" arg to "private_value" which is consistent with our naming for the value in ECPrivateNumbers.
* Add a bytes method to get the DER ASN.1 encoding of an X509 name. (#3236)Paul Kehrer2016-11-131-0/+6
| | | | | | | | | | * Add a bytes method to get the DER ASN.1 encoding of an X509 name. This is useful for creating an OpenSSL style subject_name_hash (#3011) * add to backend interface and update multibackend * bytes -> public_bytes
* add ec.private_key_from_secret_and_curve (#3225)Ofek Lev2016-11-111-0/+16
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | * finish https://github.com/pyca/cryptography/pull/1973 * change API & add test Function will now return an instance of EllipticCurvePrivateKey, as that is the users' ultimate goal anyway. * fix test * improve coverage * complete coverage * final fix * centos fix * retry * cleanup asserts * use openssl_assert * skip unsupported platforms * change API name to derive_private_key * change version added * improve description of `secret` param * separate successful and failure test cases * simplify successful case * add docs for derive_elliptic_curve_public_point * add period
* Scrypt Implementation (#3117)Terry Chia2016-09-011-1/+15
| | | | | | | | | | | | | | | | | | | | | | | | * Scrypt implementation. * Docs stuff. * Make example just an example and not a doctest. * Add changelog entry. * Docs cleanup. * Add more tests. * Add multibackend tests. * PEP8. * Add docs about Scrypt parameters. * Docs cleanup. * Add AlreadyFinalized.
* make multibackend error with an empty list. fixes #2717Paul Kehrer2016-03-111-5/+15
|
* add create_x509_revoked_certificate to x509backend interfacePaul Kehrer2015-12-251-0/+6
|
* add create_x509_crl interfacePaul Kehrer2015-12-241-0/+8
|
* Merge branch 'master' into crl_ossl_backendErik Trauschke2015-10-201-4/+15
|\
| * a refactor to the APIAlex Gaynor2015-10-171-12/+15
| |
| * Add an Elliptic Curve Key Exchange Algorithm(ECDH)Simo Sorce2015-10-171-2/+10
| | | | | | | | | | | | | | | | | | The ECDH Key Exchange algorithm as standardized in NIST publication 800-56A Revision 2 Includes tests with vectors from NIST. Signed-off-by: Simo Sorce <simo@redhat.com>
* | OpenSSL backend code for CRLsErik Trauschke2015-09-241-0/+12
|/
* fix up test coverage on multibackendAlex Gaynor2015-09-221-2/+9
|
* rename sign_x509_certificate backend method to create_x509_certificatePaul Kehrer2015-08-061-3/+3
|
* Add test coverage for MultiBackend.sign_x509_certificateIan Cordasco2015-08-021-0/+8
|
* Renames sign_509_request to create_x509_csr.Andre Caron2015-06-241-0/+6
|
* add load_der_x509_csr to support loading DER encoded CSRsPaul Kehrer2015-03-301-0/+6
|
* rename request to CSRPaul Kehrer2015-03-291-3/+3
|
* basic support for parsing x509 requestsPaul Kehrer2015-03-291-0/+6
|
* add multibackend support for DERSerializationBackendPaul Kehrer2015-01-171-3/+24
|
* remove fully deprecated items from 0.6 deprecation cyclePaul Kehrer2014-12-181-87/+1
|
* add X509Backend support to multibackendPaul Kehrer2014-11-261-1/+22
|
* Update the license header for every source file, as well as the documentation.Alex Gaynor2014-11-161-12/+3
| | | | Fixes #1209
* Changed methods on interface providers to have argument names match the ↵Alex Gaynor2014-10-231-7/+7
| | | | | | interface. This is important because it means passing things as keyword arguments will work consistently
* add load_dsa_parameter_numbers on multibackendPaul Kehrer2014-10-211-0/+9
|
* update multibackend to remove deprecated methodsPaul Kehrer2014-10-011-75/+0
|
* fix test coverage on multibackend deprecated methodsPaul Kehrer2014-09-271-2/+31
|
* deprecate backend method names for elliptic curve number loadingPaul Kehrer2014-09-271-5/+31
| | | | fixes #1270
* Corrected testsmichael-hart2014-09-261-1/+1
|
* Added all changes lost in merge resetmichael-hart2014-09-261-1/+1
|
* Corrected testsmichael-hart2014-09-261-1/+1
|
* Added all changes lost in merge resetmichael-hart2014-09-261-0/+6
|
* multibacken for docsAlex Gaynor2014-09-081-1/+17
|
* add missing DSABackend numbers loading methods to MultibackendPaul Kehrer2014-07-181-0/+18
|
* add TraditionalOpenSSLSerializationBackend to MultiBackendPaul Kehrer2014-07-091-1/+17
|
* change some nomenclaturePaul Kehrer2014-07-071-1/+1
|
* add PKCS8SerializationBackend support to MultiBackendPaul Kehrer2014-07-071-1/+16
|
* add multibackend support for new DSABackend methodPaul Kehrer2014-06-271-0/+9
|
* Multibackend support for ECAlex Stapleton2014-06-071-3/+104
|
* pep8David Reid2014-06-031-1/+1
|
* Split load_rsa_numbers into load_rsa_private_numbers and ↵David Reid2014-06-031-3/+13
| | | | load_rsa_public_numbers.
* Remove trailing whitespaceDavid Reid2014-06-031-1/+1
|
* Semantic conflict resolution anyone?David Reid2014-06-031-1/+2
|
* Add load_rsa_numbers support to MultiBackend.David Reid2014-06-031-1/+10
|
* add generate_rsa_parameters_supported to RSABackendPaul Kehrer2014-05-251-0/+10
|
* add rsa_padding_supported interface to RSABackend and OpenSSL backendPaul Kehrer2014-05-241-0/+10
|
* Multibackend now supports all of RSABackendPaul Kehrer2014-05-091-0/+30
| | | | Also convert some examples to doctest