aboutsummaryrefslogtreecommitdiffstats
path: root/tests/hazmat
Commit message (Collapse)AuthorAgeFilesLines
...
| * a refactor to the APIAlex Gaynor2015-10-173-76/+59
| |
| * Add an Elliptic Curve Key Exchange Algorithm(ECDH)Simo Sorce2015-10-173-3/+117
| | | | | | | | | | | | | | | | | | The ECDH Key Exchange algorithm as standardized in NIST publication 800-56A Revision 2 Includes tests with vectors from NIST. Signed-off-by: Simo Sorce <simo@redhat.com>
| * Catch Invalid X or Y points and raise a ValueErrorSimo Sorce2015-10-121-0/+29
| | | | | | | | Signed-off-by: Simo Sorce <simo@redhat.com>
* | Merge branch 'master' into crl_ossl_backendErik Trauschke2015-09-281-19/+1
|\|
| * Use InternalError for stuffAlex Gaynor2015-09-261-19/+1
| |
* | Merge branch 'crl_ossl_backend' of github.com:etrauschke/cryptography into ↵Erik Trauschke2015-09-281-0/+12
|\ \ | |/ |/| | | crl_ossl_backend
| * Merge branch 'master' into crl_ossl_backendErik Trauschke2015-09-251-1/+6
| |\
| * \ Merge branch 'master' into crl_ossl_backendErik Trauschke2015-09-252-0/+192
| |\ \
| * | | OpenSSL backend code for CRLsErik Trauschke2015-09-241-0/+12
| | | |
* | | | fix the testsAlex Gaynor2015-09-261-1/+2
| | | |
* | | | rename this file for consistencyAlex Gaynor2015-09-261-0/+0
| |_|/ |/| |
* | | add test for openssl_assertPaul Kehrer2015-09-251-1/+6
| |/ |/|
* | Some cleanupsAlex Gaynor2015-09-241-3/+3
| |
* | Test X9.63 with NIST test vectorsSimo Sorce2015-09-241-0/+72
| | | | | | | | Signed-off-by: Simo Sorce <simo@redhat.com>
* | Add X963KDF from ANSI X9.63:2001Simo Sorce2015-09-241-0/+120
|/ | | | | | | | | | The implemention allows the use a Hash function to implement a KDF very similar to ConcatKDFHash, just different enough to require a separate derivation function. Closes #2203 Signed-off-by: Simo Sorce <simo@redhat.com>
* fix up test coverage on multibackendAlex Gaynor2015-09-221-2/+9
|
* skip if check on ec testPaul Kehrer2015-08-121-1/+2
|
* Merge pull request #2262 from viraptor/non-bytes-signaturesPaul Kehrer2015-08-123-0/+31
|\ | | | | Ensure early exeption on non-bytes signature
| * Enforce signature type in ECDSA and add testsStanisław Pitucha2015-08-123-0/+31
| | | | | | | | | | Ensure that ECDSA signatures are bytes to match RSA/DSA and add tests for all three.
* | resolve incorrect docs/naming around DSA (r, s) tuple encode/decodePaul Kehrer2015-08-102-23/+31
|/
* pep8 fixPaul Kehrer2015-08-091-2/+0
|
* move a testPaul Kehrer2015-08-091-26/+0
|
* support issuer alternative name encodingPaul Kehrer2015-08-091-1/+6
|
* fix unsupported testPaul Kehrer2015-08-081-1/+1
|
* rename sign_x509_certificate backend method to create_x509_certificatePaul Kehrer2015-08-062-4/+4
|
* fix a few tests that were missedPaul Kehrer2015-08-051-0/+2
|
* Merge pull request #2180 from reaperhulk/easy-conditional-fixDonald Stufft2015-08-041-0/+18
|\ | | | | create a ConditionalLibrary and remove unsupported items
| * add test for conditional removalPaul Kehrer2015-08-011-0/+18
| |
* | Fixes #2199 -- allow SSH keys to have spaces in their commentsAlex Gaynor2015-08-031-6/+4
| |
* | missed onePaul Kehrer2015-08-031-1/+1
| |
* | Merge remote-tracking branch 'upstream/master' into cert-builderIan Cordasco2015-08-032-30/+27
|\ \
| * | this is gonna be unicode nowPaul Kehrer2015-08-011-3/+3
| | |
| * | move urandom engine testPaul Kehrer2015-08-012-30/+27
| |/ | | | | | | | | | | | | | | | | | | This test was in the bindings dir, which is incorrect. We do not set the urandom engine to default unless the openssl backend is loaded. The reason the test wasn't failing (even in the random test case) is that the backends are loaded during pytest_generate_tests by a call to _available_backends. So no matter what order it occurred in the engine was already set to default. I discovered this when I tried to run the test_openssl.py bindings tests directly via pytest. Hooray global state.
* | Add test coverage for MultiBackend.sign_x509_certificateIan Cordasco2015-08-021-0/+8
| |
* | Add note to serial_number parameter about entropyIan Cordasco2015-08-021-11/+3
| | | | | | | | | | | | | | | | | | | | - Add reference to random-numbers.rst for easy intra-linking - Document critical parameter of CertificateBuilder.add_extension - Support InhibitAnyPolicy in the CertificateBuilder frontend but not in the backend - Slim down more tests - Fix up test that asserts the backend does not allow for unsupported extensions
* | Remove CertificateBuilder.versionIan Cordasco2015-07-241-3/+1
| | | | | | | | Default CertificateBuilder to Version.v3
* | Add tests to test_openssl backend for extra coverageIan Cordasco2015-07-201-0/+39
|/
* Fixed #2143 -- added __hash__ to RSA{Public,Private}NumbersAlex Gaynor2015-07-121-0/+16
|
* do the same simplification to the aad testPaul Kehrer2015-07-011-3/+1
|
* add missing test, simplify encrypted byte near limit calculationPaul Kehrer2015-07-011-3/+15
|
* add additional increment testsPaul Kehrer2015-07-011-8/+18
|
* put the AAD and encrypted byte limit checks in the parent contextPaul Kehrer2015-07-011-0/+30
|
* Merge pull request #2073 from glyph/no-c-randomPaul Kehrer2015-06-302-8/+38
|\ | | | | Replace C implementation of OS Random engine with Python one that just calls os.urandom
| * test libressl when there is no libresslGlyph2015-06-301-2/+15
| |
| * pep8Glyph2015-06-301-0/+1
| |
| * Detect and ignore LibreSSL.Glyph2015-06-301-1/+3
| |
| * the output of RAND_bytes is os.urandom's resultGlyph2015-06-291-0/+14
| |
| * handle previous registration by raising RuntimeErrorGlyph2015-06-271-2/+2
| |
| * pointer shenanigansGlyph2015-06-261-9/+8
| | | | | | | | | | | | | | | | apparently (?) ENGINE_by_id treats its ID as an opaque *pointer* key and not actually as a string, and while CPython's CFFI support seems to manage to preserve the pointer identity when using the same Python string, PyPy doesn't. Fix things to use a cffi-wrapped pointer again and tests pass on PyPy.
| * remove remaining vestiges, make adding twice workGlyph2015-06-262-4/+2
| |