summaryrefslogtreecommitdiff
path: root/src/cryptography/hazmat/backends
Commit message (Collapse)AuthorAgeFilesLines
* port changelog and fix back to master for CVE-2020-36242 (#5748)Paul Kehrer2021-02-071-1/+1
|
* Added typing for more of ciphers (#5738)Alex Gaynor2021-02-011-5/+5
|
* rsa type hinting (#5733)Paul Kehrer2021-02-011-34/+94
| | | | | | | | | | | | | | | | | | | * rsa type hinting * remove unused import * missed return type * type fixes * ignores no longer required * black gets me every time * Update src/cryptography/hazmat/backends/openssl/rsa.py Co-authored-by: Alex Gaynor <alex.gaynor@gmail.com> Co-authored-by: Alex Gaynor <alex.gaynor@gmail.com>
* x25519/x448 type hints (#5731)Paul Kehrer2021-01-312-22/+34
| | | | | * x25519 type hints * x448 type hints
* add type hinting for ed25519 (#5728)Paul Kehrer2021-01-311-12/+19
|
* add EC type hinting (#5729)Paul Kehrer2021-01-311-32/+74
|
* ed448 type hints (#5730)Paul Kehrer2021-01-311-12/+19
|
* dsa type hinting (#5726)Paul Kehrer2021-01-311-27/+54
|
* DH types (#5725)Paul Kehrer2021-01-311-23/+33
|
* remove DSAParametersWithNumbers (#5724)Paul Kehrer2021-01-311-1/+1
| | | | Merged into DSAParameters, just like we did years ago for everything else. Somehow we missed this one.
* type updates from turning on unchecked-defs on tests (#5720)Paul Kehrer2021-01-311-1/+2
| | | test changes themselves will be in a separate PR
* make PrivateKeyWithSerialization an alias of PrivateKey (#5722)Paul Kehrer2021-01-314-11/+11
| | | | | * make PrivateKeyWithSerialization an alias of PrivateKey * black
* Apply type annotations to x509 ct and ocsp (#5712)Alex Gaynor2021-01-302-39/+43
|
* type hinting for hashes, hmac, and cmac (#5713)Paul Kehrer2021-01-303-18/+18
|
* Apply type annotations to the core x509 types (#5711)Alex Gaynor2021-01-301-60/+73
|
* Introduce the most very basic mypy type checking (#5706)Alex Gaynor2021-01-281-35/+26
| | | Nothing is really annotated, just getting to clean.
* Update APIs to use non-deprecated OpenSSL ones where possible (#5633)Alex Gaynor2020-12-103-7/+7
| | | cherry picked from #4920
* Complete removal of py2 (#5533)Alex Gaynor2020-12-094-36/+15
| | | | | * Drop Python 2 * Black everything
* we didn't actually commit the final doc fixes for the recover PR (#5614)Paul Kehrer2020-12-091-1/+1
|
* Remove __future__ import from our code (#5610)Alex Gaynor2020-12-0923-28/+0
|
* Switch black to py36 as the minimum version (#5608)Alex Gaynor2020-12-082-2/+2
|
* Remove Python2 from CI and code that branched on it (#5607)Alex Gaynor2020-12-081-37/+13
| | | | | | | | | | | | | * Remove Python2 from CI and code that branched on it * Update setup.py Co-authored-by: Hugo van Kemenade <hugovk@users.noreply.github.com> * remove * review feedback Co-authored-by: Hugo van Kemenade <hugovk@users.noreply.github.com>
* Add support for RSA signature recovery (#5573)Zoltan Kelemen2020-12-072-12/+64
| | | | | | | | | | | | | | | | | | * Removed unused argument. * Added support for RSA signature recovery. * Syntatic corrections for passing pep8 tests. * Corrected typo. * Added test of invalid Prehashed parameter to RSA signature recover. * Renamed recover to a more descriptive name. * Extended RSA signature recovery with option to return full data (not only the digest part). * Added missing words to pass spell check.
* fixes #4531 -- support encoding SCTs in certificates (#5594)Alex Gaynor2020-11-301-1/+14
|
* disallow p less than 512-bit on DH (#5592)Paul Kehrer2020-11-291-2/+7
| | | | | | | | | | | | | | | | * disallow p less than 512-bit on DH OpenSSL 3.0.0 enforces this so we'll go ahead and enforce it everywhere that's practical for us. (Note that we do not enforce on deserializing PKCS1/PKCS8 keys in < 3.0.0, but this PR adds a test so that in the 3.0.0 support branch we can test an error path) * missing test * black * _MIN_MODULUS_SIZE is now a thing * skip on fips
* don't require errors to be on the stack when loading a key (#5590)Paul Kehrer2020-11-261-2/+1
| | | | | In OpenSSL 3.0.0 no error is added in many cases for this path and since we don't do anything with the error anyway we should just consume and move on
* Reduce granularity of error msging when deserializing keys (#5588)Paul Kehrer2020-11-261-17/+9
| | | | | | | | | | | | * Reduce granularity of error msging when deserializing keys In OpenSSL 3.0 it is no longer possible to determine whether the reason a key failed to deserialize is because of an unsupported cipher. Since we want to be more resilient to OpenSSL error code instability we'll just remove these paths. * black * changelog and update docs
* Fix broken links (#5552)Felix Fontein2020-11-101-5/+8
| | | | | * Fix broken links. * Shorter lines.
* Disable blinding for RSA pub keys (#5524)Alex Gaynor2020-10-271-5/+0
|
* Simplify a number of branches around libressl (#5515)Alex Gaynor2020-10-265-15/+15
|
* Delete all the 1.0.2 code (#5511)Alex Gaynor2020-10-253-18/+8
|
* Attempt to mitigate Bleichenbacher attacks on RSA decryption (#5507)Alex Gaynor2020-10-251-15/+11
|
* move blinding to __init__ on both RSA public and private (#5506)Paul Kehrer2020-10-252-4/+10
| | | | | * move blinding to __init__ on both RSA public and private * change signature to guarantee this test is testing what we think
* PKCS7SignatureBuilder now supports new option NoCerts when signing (#5500)frennkie2020-10-251-0/+4
|
* chunking didn't actually work (#5499)Paul Kehrer2020-10-251-1/+1
|
* allow additional certificates to be added to a pkcs7 (#5498)Paul Kehrer2020-10-251-1/+10
| | | | | | | * allow additional certificates to be added to a pkcs7 * be more verbose about what these additional certs might be used for * missing test
* PKCS7SignatureBuilder now supports three serializations (#5497)Paul Kehrer2020-10-241-1/+7
| | | | | | | | * PKCS7SignatureBuilder now supports three serializations PEM, DER, and SMIME. SMIME embeds the S/MIME headers and has the detached signature concept. * thanks libre
* migrate smime builder to pkcs7 module and rename (#5496)Paul Kehrer2020-10-241-8/+8
| | | | | * migrate smime builder to pkcs7 module and rename * missed a rename
* smime signer support (#5465)Paul Kehrer2020-09-191-1/+61
| | | | | | | | | | | | | | | | | | | * smime signer support * fix ed25519 check * change some wording * python 2.7... * review feedback * s/secure/signed * do some verification in the tests * review feedback * doc return value
* new black, actually slightly different than the old black (#5429)Paul Kehrer2020-08-263-4/+10
|
* chunked update_into (#5419)Paul Kehrer2020-08-241-13/+21
| | | | | | | * chunked update_into * all pointer arithmetic all the time * review feedback
* move encoders into backend as well (#5406)Paul Kehrer2020-08-151-6/+22
| | | this will be useful later, i swear
* move the x509 parsers into the backend object (#5405)Paul Kehrer2020-08-154-118/+103
| | | | | | | | | * move the parser into the backend object This allows us to generate the list of supported extensions when instantiating the backend object rather than building multiple parsers and picking the right one at runtime when parsing the extensions themselves. * sigh
* clean up error stack in p7 (#5403)Alex Gaynor2020-08-151-0/+2
|
* Improve debugability of this internal error (#5399)Alex Gaynor2020-08-152-3/+4
|
* fixes #4706 -- don't internal error on corrupt private key (#5307)Alex Gaynor2020-08-151-0/+5
| | | | | * fixes #4706 -- don't internal error on corrupt private key * Temporary disable paramiko
* remove KDF backend requirements (#5389)Paul Kehrer2020-08-141-0/+7
|
* support PKCS7 certificate parsing (#5371)Paul Kehrer2020-08-041-0/+47
| | | | | | | | | | | | | * support PKCS7 certificate parsing * refcounts are different in 1.0.2 * rename the functions * black * empty commit * review feedback
* check if a value is null before we gc (#5369)Paul Kehrer2020-08-021-1/+1
|
* handle unnamed-but-really-named curves in 1.0.2u (#5362)Paul Kehrer2020-07-302-7/+13
| | | | | | | | | * handle unnamed-but-really-named curves in 1.0.2u * handle openssl 1.0.2 not supporting better install commands on make * do what openssl didn't feel was necessary in 1.0.2t/u I didn't bind the named curve constant, fight me.