Commit message (Collapse) | Author | Age | Files | Lines | |
---|---|---|---|---|---|
* | block_size isn't part of our interface and future hashes won't have it (#4366) | Paul Kehrer | 2018-07-23 | 1 | -4/+3 |
| | |||||
* | In RSA test vectors, use verify() to avoid warnings (#4047) | Alex Gaynor | 2017-12-10 | 1 | -8/+14 |
| | | | | | | * In RSA test vectors, use verify() to avoid warnings * whoops | ||||
* | remove deprecated items (#3794) | Paul Kehrer | 2017-07-20 | 1 | -12/+0 |
| | | | | | | | | | | * remove deprecated items whirlpool, ripemd160, unsupportedextension, and the old interfaces * flake8 and remove a test generator we no longe use * make it clear we warned you about these things | ||||
* | time to remove commoncrypto, fare thee well (#3551) | Paul Kehrer | 2017-05-20 | 1 | -3/+2 |
| | | | | | | | | | | | | | | | | * time to remove commoncrypto, fare thee well * remove even more * update the changelog * remove more things * don't need this function * remove CAST5 CTR tests since that was only supported in commoncrypto * assert a thing | ||||
* | postpone GCM authentication tag requirement until finalization (#3421) | Philipp Gesang | 2017-05-02 | 1 | -2/+0 |
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | * postpone GCM authentication tag requirement until finalization Add a .finalize_with_tag() variant of the .finalize() function of the GCM context. At the same time, do not enforce the requirement of supplying the tag with the mode ctor. This facilitates streamed decryption when the MAC is appended to the ciphertext and cannot be efficiently retrieved ahead of decryption. According to the GCM spec (section 7.2: “Algorithm for the Authenticated Decryption Function”), the tag itself is not needed until the ciphertext has been decrypted. Addresses #3380 Signed-off-by: Philipp Gesang <philipp.gesang@intra2net.com> * disallow delayed GCM tag passing for legacy OpenSSL Old versions of Ubuntu supported by Cryptography ship a v1.0.1 of OpenSSL which is no longer supported by upstream. This library seems to cause erratic test failures with the delayed GCM tag functionality which are not reproducible outside the CI. Unfortunately OpenSSL v1.0.1 does not even document the required API (``EVP_EncryptInit(3)``) so there is no by-the-book fix. For backends of version 1.0.1 and earlier, verify the GCM tag at the same stage as before. Also, indicate to the user that late passing of GCM tags is unsupported by throwing ``NotImplementedError`` for these backend versions if - the method ``finalize_with_tag()`` is invoked, or - the mode ctor is called without passing a tag. Unit tests have been adapted to account for different backend versions. | ||||
* | disable blowfish in commoncrypto backend for key lengths under 64-bit (#3040) | Paul Kehrer | 2016-07-10 | 1 | -0/+5 |
| | | | | This is due to a bug in CommonCrypto present in 10.11.x. Filed as radar://26636600 | ||||
* | KBKDF cleanup (#2929) | Paul Kehrer | 2016-05-29 | 1 | -5/+7 |
| | | | | | | | | * unicode characters make everything angry * changelog entry and make skip msgs more informative * typo fix | ||||
* | NIST SP 800-108 Counter Mode KDF (#2748) | Jared | 2016-05-29 | 1 | -0/+52 |
| | | | | | | | | | | | | | | | | | | * NIST SP 800-108 Counter Mode and Feedback Mode KDF * CounterKDF unit tests * Refactor to support multiple key based KDF modes. * Extracting supported algorithms for KBKDF Counter Mode test vectors * Adding support for different rlen and counter location in KBKDF * support for multiple L lengths and 24 bit counter length. * Adding KBKDF Documentation. * Refactoring KBKDF to KBKDFHMAC to describe hash algorithm used. | ||||
* | consolidate dsa serialization loading tests and improve verifier | Paul Kehrer | 2014-12-22 | 1 | -0/+7 |
| | |||||
* | Update the license header for every source file, as well as the documentation. | Alex Gaynor | 2014-11-16 | 1 | -12/+3 |
| | | | | Fixes #1209 | ||||
* | Simplify code and add test | Alex Gaynor | 2014-06-30 | 1 | -0/+3 |
| | |||||
* | Fixes #1200 -- disallow GCM truncation by default | Alex Gaynor | 2014-06-29 | 1 | -4/+6 |
| | |||||
* | modify RSA numbers loading to match elliptic curve | Paul Kehrer | 2014-06-20 | 1 | -4/+1 |
| | | | | fixes #1111 | ||||
* | backend specific RSA*Key implementation for OpenSSL | Paul Kehrer | 2014-06-12 | 1 | -17/+15 |
| | |||||
* | Minor fixes | Ayrx | 2014-05-09 | 1 | -1/+1 |
| | |||||
* | Modified HKDF to use HKDFExpand | Ayrx | 2014-05-07 | 1 | -3/+2 |
| | |||||
* | Rename OpenSSLSerializationBackend | Alex Stapleton | 2014-04-25 | 1 | -0/+18 |
| | |||||
* | switch to a lambda | Paul Kehrer | 2014-03-19 | 1 | -13/+5 |
| | |||||
* | rename some things | Paul Kehrer | 2014-03-19 | 1 | -6/+6 |
| | |||||
* | add FIPS 186-2/3 signature verification tests for RSA PKCSv15 and PSS | Paul Kehrer | 2014-03-19 | 1 | -11/+21 |
| | |||||
* | import order fixes for future automated checking | Paul Kehrer | 2014-03-19 | 1 | -8/+6 |
| | |||||
* | pass the hash class rather than using getattr | Paul Kehrer | 2014-03-16 | 1 | -7/+7 |
| | |||||
* | fix indentation | Paul Kehrer | 2014-03-16 | 1 | -18/+18 |
| | |||||
* | add RSA PSS verification support | Paul Kehrer | 2014-03-16 | 1 | -0/+33 |
| | |||||
* | Added future imports and licenses that are missing | Alex Gaynor | 2014-03-08 | 1 | -0/+15 |
| | |||||
* | Don't expose extract and expand on this class yet because we don't know how ↵ | David Reid | 2014-02-03 | 1 | -2/+2 |
| | | | | best to expose verify functionality, continue testing the stages using the private methods. | ||||
* | Closer to proposed interface in #513. | David Reid | 2014-02-03 | 1 | -14/+18 |
| | |||||
* | Use the nist vector loader. | David Reid | 2014-02-03 | 1 | -18/+12 |
| | |||||
* | Break up hkdf_derive into hkdf_extract and hkdf_expand. | David Reid | 2014-02-03 | 1 | -9/+41 |
| | | | | | | | | Testing each individually against all the vectors and actually asserting about the intermediate state. hkdf_derive is now just a helper function which copes with the default arguments. | ||||
* | Refactor HKDF support and provide vectors for tests. | David Reid | 2014-02-03 | 1 | -0/+31 |
| | |||||
* | okay this time really finish the rename. Up example iterations to 100k | Paul Kehrer | 2014-01-28 | 1 | -2/+2 |
| | |||||
* | PBKDF2 support for OpenSSL backend | Paul Kehrer | 2014-01-28 | 1 | -0/+25 |
| | |||||
* | Represent the hash vectors more cleanly | Alex Gaynor | 2014-01-27 | 1 | -5/+2 |
| | |||||
* | Fixed test for earlier exceptino | Alex Gaynor | 2014-01-01 | 1 | -6/+3 |
| | |||||
* | re-add some removed generators to simplify patch | Paul Kehrer | 2013-12-27 | 1 | -0/+20 |
| | |||||
* | refactor all tests to use mark instead of generator skips | Paul Kehrer | 2013-12-26 | 1 | -141/+25 |
| | |||||
* | Cover a missed branch | Alex Gaynor | 2013-12-24 | 1 | -2/+1 |
| | |||||
* | restrict gcm tags to a minimum of 4 bytes in length | Paul Kehrer | 2013-12-21 | 1 | -0/+7 |
| | |||||
* | don't modify params on parametrized tests | Paul Kehrer | 2013-12-20 | 1 | -8/+8 |
| | | | | | multiple backends receive the same params dicts, but we were modifying them using pop. | ||||
* | pep8 | Alex Gaynor | 2013-12-13 | 1 | -1/+1 |
| | |||||
* | Make this less invasive | Alex Gaynor | 2013-12-13 | 1 | -177/+280 |
| | |||||
* | Clean up test generation to not use generators anymore and use parametrization | Alex Gaynor | 2013-12-13 | 1 | -332/+209 |
| | |||||
* | raise ValueErrors when supplying/not supplying tags for GCM | Paul Kehrer | 2013-12-04 | 1 | -0/+35 |
| | |||||
* | create AEADEncryptionContext and DecryptionContext | Paul Kehrer | 2013-11-29 | 1 | -1/+1 |
| | |||||
* | raise TypeError if you attempt to get the tag attribute on a decrypt | Paul Kehrer | 2013-11-29 | 1 | -0/+9 |
| | | | | | * To support this the _AEADCipherContext in base.py now needs to be aware of whether it is encrypting/decrypting | ||||
* | rename add_data to authenticate_additional_data for clarity (hopefully) | Paul Kehrer | 2013-11-29 | 1 | -5/+5 |
| | |||||
* | invalidtag exception for gcm | Paul Kehrer | 2013-11-29 | 1 | -2/+2 |
| | | | | | This exception is probably not safe. It depends on the assumption that if ERR_get_error returns a 0 then it is an AEAD tag error. | ||||
* | enforce AEAD add_data before update | Paul Kehrer | 2013-11-29 | 1 | -8/+10 |
| | |||||
* | _AEADCipherContext refactor | Paul Kehrer | 2013-11-29 | 1 | -0/+4 |
| | | | | | | * No longer extends _CipherContext * Remove _tag from _CipherContext * This change duplicates a small amount of code from _CipherContext | ||||
* | rename NotFinalized exception to NotYetFinalized because alex is right | Paul Kehrer | 2013-11-29 | 1 | -2/+2 |
| | | | | ...it does read better that way |