summaryrefslogtreecommitdiff
path: root/src/_cffi_src
Commit message (Collapse)AuthorAgeFilesLines
...
* remove unused CRL bindings (#8333)Alex Gaynor2023-02-191-4/+0
|
* remove series of unused Cryptography_HAS bindings (#8328)Alex Gaynor2023-02-191-30/+1
|
* remove unused pkcs7 binding (#8327)Alex Gaynor2023-02-191-1/+0
|
* remove unused bio bindings (#8322)Alex Gaynor2023-02-191-6/+0
|
* remove verification error code bindings (#8326)Alex Gaynor2023-02-191-57/+0
|
* remove unused x509name bindings (#8325)Alex Gaynor2023-02-191-3/+0
|
* remove unused x509 bindings (#8324)Alex Gaynor2023-02-191-2/+0
|
* remove unused ssl bindings (#8323)Alex Gaynor2023-02-191-6/+0
|
* Remove unused bindings (#8321)Alex Gaynor2023-02-193-26/+0
|
* remove unused typedefs (#8305)Alex Gaynor2023-02-161-8/+0
|
* remove two bindings functions that were unused (#8304)Alex Gaynor2023-02-161-7/+0
| | | just sort of sitting there
* try to resolve two compilation warnings (#8286)Alex Gaynor2023-02-141-1/+1
|
* fix a warning in C code via explicit cast (#8280)Alex Gaynor2023-02-131-2/+2
|
* fix some binding declarations (#8273)Paul Kehrer2023-02-121-20/+19
| | | | | | | | * fix some binding declarations also adds a comment about why we deliberately incorrectly declare some of them, sigh * it's actually safe to do this since no high bit mode options exist
* Remove now-unused bindings (#8264)Alex Gaynor2023-02-111-13/+0
|
* Simplify X25519 key loading (#8263)Alex Gaynor2023-02-111-0/+2
|
* this function doesn't return anything (#8091)Alex Gaynor2023-01-181-1/+1
|
* src/_cffi_src/openssl/evp.py: export EVP_PKEY_set_alias_type in FUNCTIONS ↵hustliyilin2022-12-281-0/+10
| | | | | | | | | | | | | | | (#7935) In openssl 1.1.1 docs/man3/EVP_PKEY_set1_RSA.pod (https://github.com/openssl/openssl/blob/OpenSSL_1_1_1/doc/man3/EVP_PKEY_set1_RSA.pod) The EVP_PKEY_set_alias_type(pkey, EVP_PKEY_SM2) API is possible to convert it to using SM2 algorithms After loading an ECC key. So the EVP_PKEY_set_alias_type API is important for people who want to use cryptography with using SM2 algorithms. Therefore, we need to export EVP_PKEY_set_alias_type in FUNCTIONS. Signed-off-by: YiLin.Li <YiLin.Li@linux.alibaba.com> Signed-off-by: YiLin.Li <YiLin.Li@linux.alibaba.com>
* Typo fixes (#7942)Alex Gaynor2022-12-281-1/+1
|
* Add SSL_CTX_set_msg_callback functions (#7926)Nuno Veloso2022-12-221-0/+12
| | | | | | | * Add SSL_CTX_set_msg_callback functions to openssl/ssl.py function definitions * Fix E501 Line too long Co-authored-by: Nuno Veloso <nuno.veloso@bitsighttech.com>
* Switch from flake8 to ruff (#7920)Alex Gaynor2022-12-211-1/+0
| | | It's more than 60x faster.
* Remove binding for X509_STORE_get_get_issuer (#7918)David Benjamin2022-12-201-2/+0
| | | | | | | | | This was added alongside X509_STORE_set_get_issuer in 21ef4080ec7666299f1268f3bbfb136582744359. It makes sense to want to override issuer lookup, but I've never seen a valid use case for querying the callbacks. If you're trying to get at the function that was already configured, you presumably already know it. (And if you don't, it's not safe to call because an arbitrary callback may have been written to only be usable in particular contexts.)
* put binding back that pyOpenSSL just started using (#7903)Alex Gaynor2022-12-171-0/+1
|
* Bump OpenSSL/BoringSSL and adapt for OpenSSL RSA bleichenbacher mitigation ↵Alex Gaynor2022-12-141-0/+8
| | | | | | | | | (#7895) * Bump BoringSSL and/or OpenSSL in CI * Attempt to work-around wycheproof tests Co-authored-by: pyca-boringbot[bot] <pyca-boringbot[bot]+106132319@users.noreply.github.com>
* LibreSSL 3.7 adds support for Ed25519 (#7803)Theo Buehler2022-11-222-1/+13
| | | | | | | | | * LibreSSL 3.7 adds support for Ed25519 This brings support for the raw public key API. * Use feature variable to enable Ed25519 Ed25519 support is available since OpenSSL 1.1.1b and LibreSSL 3.7.0.
* Remove some unused bindings (#7825)Alex Gaynor2022-11-211-13/+0
|
* Remove bindings related to SSLeay (#7826)Alex Gaynor2022-11-211-33/+0
|
* Clear out some dead code from the OS random engine, now that macOS 10.12 is ↵Alex Gaynor2022-11-162-51/+16
| | | | our minimum (#7813)
* Update minimum LibreSSL to 3.5 (#7780)Alex Gaynor2022-11-075-143/+3
| | | This is the version of LibreSSL in OpenBSD 7.1, which is the oldest currently supported.
* Try raising OPENSSL_API_COMPAT to 1.1.0 (#6948)Alex Gaynor2022-10-286-51/+3
|
* fixes #7454 -- added SSL_get_extms_support (#7697)Alex Gaynor2022-10-121-0/+7
|
* fixes #7653 -- handle OPENSSL_cleanup existing on LibreSSL 3.6.0 (#7654)Alex Gaynor2022-09-272-1/+4
|
* delete a few more old comments (#7619)Alex Gaynor2022-09-173-10/+0
|
* Act on a bunch of comments saying things are const (#7616)Alex Gaynor2022-09-1411-43/+22
|
* Remove reimplementation of OpenSSL function in DHX (#7611)Alex Gaynor2022-09-141-14/+5
|
* remove unused branch in bindings (#7610)Alex Gaynor2022-09-141-6/+0
|
* undef some conflicting macro/types on windows (#7588)Paul Kehrer2022-09-132-7/+20
| | | | | related: https://chromium.googlesource.com/chromium/src/+/refs/heads/main/base/win/wincrypt_shim.h this only affects boring on windows as of this commit
* Move to a libressl policy (#7605)Alex Gaynor2022-09-133-26/+2
| | | This policy is to support things that are in supported versions of openbsd. the current oldest supported openbsd is 7.0, which included libressl 3.4
* Final set of cleanups to comments and bindings for dropping OpenSSL 1.1.0 ↵Alex Gaynor2022-09-111-1/+1
| | | | (#7598)
* remove openssl header include that no longer appears required (#7592)Alex Gaynor2022-09-111-7/+0
|
* Increase our minimum LibreSSL. (#7571)Alex Gaynor2022-09-073-20/+0
| | | OpenBSD 7.0 ships 3.4, and Alpine 3.14 ships 3.3.6
* Drop OpenSSL 1.1.0 (#7570)Alex Gaynor2022-09-073-30/+9
| | | | | There's still a few TODOs for cleanup. Refs #7109
* Revert "restore some bindings for older pyopenssl temporarily (#7136)" (#7532)Alex Gaynor2022-08-235-42/+0
| | | | | | | * Revert "restore some bindings for older pyopenssl temporarily (#7136)" This reverts commit be4c22256ef0f76c6bc727420dafdac51f4badf8. * Changelog entry
* remove ext_package so top_level.txt is accurate in wheel metadata (#7511)anthony sottile2022-08-151-1/+1
|
* Bump BoringSSL version to 401137fec2fd855ceed7931f15a623d3cb18efdc (#7502)pyca-boringbot[bot]2022-08-131-4/+0
| | | | | | | | * Bump BoringSSL version to 401137fec2fd855ceed7931f15a623d3cb18efdc * remove boringssl ifdef Co-authored-by: BoringSSL Bot <pyca-boringbot@users.noreply.github.com> Co-authored-by: Alex Gaynor <alex.gaynor@gmail.com>
* fixed two bindings that don't match our style guide (#7471)Alex Gaynor2022-08-021-2/+2
|
* Bind functions for dealing with sigalgs (#7349)Jean-Daniel2022-06-191-0/+10
| | | Fixes https://github.com/pyca/cryptography/issues/7336
* Expose SSL_OP_IGNORE_UNEXPECTED_EOF (#7321)dreid2022-06-081-0/+9
| | | | | | | | | | | * Expose SSL_OP_IGNORE_UNEXPECTED_EOF Expose SSL_OP_IGNORE_UNEXPECTED_EOF. https://www.openssl.org/docs/manmaster/man3/SSL_CTX_set_options.html#:~:text=this%20by%20default.-,SSL_OP_IGNORE_UNEXPECTED_EOF,-Some%20TLS%20implementations * Make this conditional. * Add to _conditionals.py
* add binding for PKCS12_set_mac (#7217)Paul Kehrer2022-05-121-0/+11
| | | | | OpenSSL 3 changed the default MAC to sha256, which is fine and good except Windows Server 2016 can't handle that so we need to build some APIs allowing worse things and name them scary legacy names.
* add SSL_use_* OpenSSL bindings (#7210)Maximilian Hils2022-05-111-0/+2
|