| Commit message (Collapse) | Author | Age | Files | Lines |
|
|
| |
Also replace one DH function with a simpler implementation
|
|
|
| |
OpenBSD 7.1 is no longer supported so neither is LibreSSL 3.5.x
|
| |
|
|
|
|
|
| |
This removes the OS random engine, which contained the only CPython PSF
licensed code in the repository. Accordingly, that license has now been
removed.
|
|
|
|
|
| |
The theory here is that we're already doing sufficient validation key loading, and this is purely duplicative.
Note that there's at least _some_ validationg that was previously occurring only ECDH, the LowOrderPublic check that can be seen in wycheproof.
|
| |
|
| |
|
| |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
(#7935)
In openssl 1.1.1 docs/man3/EVP_PKEY_set1_RSA.pod
(https://github.com/openssl/openssl/blob/OpenSSL_1_1_1/doc/man3/EVP_PKEY_set1_RSA.pod)
The EVP_PKEY_set_alias_type(pkey, EVP_PKEY_SM2) API is possible to convert it to using
SM2 algorithms After loading an ECC key.
So the EVP_PKEY_set_alias_type API is important for people who want to use cryptography
with using SM2 algorithms. Therefore, we need to export EVP_PKEY_set_alias_type in FUNCTIONS.
Signed-off-by: YiLin.Li <YiLin.Li@linux.alibaba.com>
Signed-off-by: YiLin.Li <YiLin.Li@linux.alibaba.com>
|
|
|
|
|
|
|
|
|
| |
This was added alongside X509_STORE_set_get_issuer in
21ef4080ec7666299f1268f3bbfb136582744359. It makes sense to want to
override issuer lookup, but I've never seen a valid use case for
querying the callbacks. If you're trying to get at the function that was
already configured, you presumably already know it. (And if you don't,
it's not safe to call because an arbitrary callback may have been
written to only be usable in particular contexts.)
|
|
|
| |
This is the version of LibreSSL in OpenBSD 7.1, which is the oldest currently supported.
|
| |
|
| |
|
|
|
| |
This policy is to support things that are in supported versions of openbsd. the current oldest supported openbsd is 7.0, which included libressl 3.4
|
|
|
| |
OpenBSD 7.0 ships 3.4, and Alpine 3.14 ships 3.3.6
|
|
|
|
|
| |
There's still a few TODOs for cleanup.
Refs #7109
|
|
|
| |
Fixes https://github.com/pyca/cryptography/issues/7336
|
|
|
|
|
|
|
|
|
|
|
| |
* Expose SSL_OP_IGNORE_UNEXPECTED_EOF
Expose SSL_OP_IGNORE_UNEXPECTED_EOF.
https://www.openssl.org/docs/manmaster/man3/SSL_CTX_set_options.html#:~:text=this%20by%20default.-,SSL_OP_IGNORE_UNEXPECTED_EOF,-Some%20TLS%20implementations
* Make this conditional.
* Add to _conditionals.py
|
|
|
|
|
| |
OpenSSL 3 changed the default MAC to sha256, which is fine and good
except Windows Server 2016 can't handle that so we need to build some
APIs allowing worse things and name them scary legacy names.
|
| |
|
|
|
|
|
|
|
|
|
| |
* TLSv1.3 PSKs function bindings
* add PSK related functions to be conditional
* add Cryptography_SSL_SESSION_new to avoid namespace collision
Co-authored-by: d00624431 <dongpu1@huawei.com>
|
| |
|
|
|
| |
does this have value? ours is not to question the machine
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
* Drop supported for older LibreSSL
3.1 covers the oldest version used by versions of Alpine and OpenBSD that are supported by their upstreams.
* Remove tests that are now unused
* Update CHANGELOG.rst
Co-authored-by: Paul Kehrer <paul.l.kehrer@gmail.com>
Co-authored-by: Paul Kehrer <paul.l.kehrer@gmail.com>
|
|
|
| |
we don't support these but advanced users may make use of them
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
* Attempt to build against BoringSSL in CI
* Check for BoringSSL in the SSL bindings
* Check for BoringSSL in the err bindings
* Check for BoringSSL in the pkcs7 bindings
* Check for BoringSSL in the bignum bindings
* Check for BoringSSL in the EVP bindings
* Check for BoringSSL in the X.509 verify bindings
|
| |
|
| |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
* FIPS 3.0.0 support
* comments
* remove unneeded error clear
* review comments
* small refactor
* black
* flake8 too
* review feedback
* oops
* fix
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
* Expose a few more OpenSSL functions that are useful for DTLS support
* Move BIO_ADDR gunk to proper place
* const correct
* Throw more #ifdefs at the wall and see if they stick
* njsmith used "think about what he's doing"
it's probably not very effective
* LibreSSL is not my favorite library
* Attempt to hide my new undefined symbols
* deflake
* Give up on trying to check function pointers for NULLness
AFAICT it works fine in CFFI's ABI mode, but I can't figure out how to
do it in the API mode.
|
|
|
|
|
| |
* Remove unused gf2m bindings
* Update ec.py
|
| |
|
|
|
|
|
|
|
| |
* 3.0.0 support
* almost...there...
* make mypy happy
|
|
|
|
| |
These don't appear to be used in pyopenssl or cryptography.io. One less
source of conditionals.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
* add ssl version constants
* try to fix ci
* try harder to fix ci
* security: if unavailable, set protocol constants to nonexistent version
* make linter happy
* remove dtls constants
* remove superfluous comment
|
| |
|
|
|
|
| |
fixes #5379
closes #5483
|
| |
|
| |
|
| |
|
|
|
|
|
|
|
|
|
| |
* re-add a few engine bindings for advanced users
For users who are capable of compiling cryptography against custom
openssl and properly using these functions this hopefully allows
PKCS11 usage through OpenSSL engines.
* forgot to save my buffer
|
|
|
|
|
|
|
| |
* shrink bindings more
* readd a binding we do need
* readd two more bindings we need
|
|
|
| |
the quest to stop using unstable openssl error codes continues
|
|
|
|
|
|
|
|
|
| |
* start trying to make our error handling a bit more generic
* remove more and black
* attach error stack to memorylimit error
* blaaack
|
|
|
|
|
|
|
|
|
|
|
| |
OPENSSL_NO_SRTP (#5338)
* fixes #5113 - Making some SRTP related symbols conditional on OPENSSL_NO_SRTP.
* don't remove one symbol, test with no-srtp
* test against a no-srtp build
Co-authored-by: Paul Kehrer <paul.l.kehrer@gmail.com>
|
| |
|
|
|
|
| |
supported) (#5231)
|
|
|
|
|
|
|
| |
* add SSL_CTX_(get|set)_keylog_callback
* For travis
Co-authored-by: Alex Gaynor <alex.gaynor@gmail.com>
|
| |
|
| |
|