| Commit message (Collapse) | Author | Age | Files | Lines |
|
|
| |
Also replace one DH function with a simpler implementation
|
|
|
| |
OpenBSD 7.1 is no longer supported so neither is LibreSSL 3.5.x
|
| |
|
|
|
|
|
| |
This removes the OS random engine, which contained the only CPython PSF
licensed code in the repository. Accordingly, that license has now been
removed.
|
| |
|
| |
|
| |
|
|
|
|
|
| |
The theory here is that we're already doing sufficient validation key loading, and this is purely duplicative.
Note that there's at least _some_ validationg that was previously occurring only ECDH, the LowOrderPublic check that can be seen in wycheproof.
|
| |
|
|
|
|
|
| |
* deprecate support for OpenSSL <1.1.1d
* use an actually exported constant
|
| |
|
| |
|
| |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
(#7935)
In openssl 1.1.1 docs/man3/EVP_PKEY_set1_RSA.pod
(https://github.com/openssl/openssl/blob/OpenSSL_1_1_1/doc/man3/EVP_PKEY_set1_RSA.pod)
The EVP_PKEY_set_alias_type(pkey, EVP_PKEY_SM2) API is possible to convert it to using
SM2 algorithms After loading an ECC key.
So the EVP_PKEY_set_alias_type API is important for people who want to use cryptography
with using SM2 algorithms. Therefore, we need to export EVP_PKEY_set_alias_type in FUNCTIONS.
Signed-off-by: YiLin.Li <YiLin.Li@linux.alibaba.com>
Signed-off-by: YiLin.Li <YiLin.Li@linux.alibaba.com>
|
|
|
|
|
|
|
|
|
| |
This was added alongside X509_STORE_set_get_issuer in
21ef4080ec7666299f1268f3bbfb136582744359. It makes sense to want to
override issuer lookup, but I've never seen a valid use case for
querying the callbacks. If you're trying to get at the function that was
already configured, you presumably already know it. (And if you don't,
it's not safe to call because an arbitrary callback may have been
written to only be usable in particular contexts.)
|
|
|
| |
This is the version of LibreSSL in OpenBSD 7.1, which is the oldest currently supported.
|
| |
|
|
|
|
|
| |
You must pass CRYPTOGRAPHY_OPENSSL_NO_LEGACY for this to be allowed.
Downstreams can easily patch this check out if they want to default to
this behavior.
|
|
|
| |
They're leaving a ton of performance on the table.
|
| |
|
| |
|
|
|
| |
This policy is to support things that are in supported versions of openbsd. the current oldest supported openbsd is 7.0, which included libressl 3.4
|
|
|
| |
OpenBSD 7.0 ships 3.4, and Alpine 3.14 ships 3.3.6
|
|
|
|
|
| |
There's still a few TODOs for cleanup.
Refs #7109
|
|
|
| |
Fixes https://github.com/pyca/cryptography/issues/7336
|
|
|
|
|
|
|
|
|
|
|
| |
* Expose SSL_OP_IGNORE_UNEXPECTED_EOF
Expose SSL_OP_IGNORE_UNEXPECTED_EOF.
https://www.openssl.org/docs/manmaster/man3/SSL_CTX_set_options.html#:~:text=this%20by%20default.-,SSL_OP_IGNORE_UNEXPECTED_EOF,-Some%20TLS%20implementations
* Make this conditional.
* Add to _conditionals.py
|
|
|
|
|
| |
OpenSSL 3 changed the default MAC to sha256, which is fine and good
except Windows Server 2016 can't handle that so we need to build some
APIs allowing worse things and name them scary legacy names.
|
| |
|
| |
|
| |
|
|
|
|
|
|
|
|
|
| |
* TLSv1.3 PSKs function bindings
* add PSK related functions to be conditional
* add Cryptography_SSL_SESSION_new to avoid namespace collision
Co-authored-by: d00624431 <dongpu1@huawei.com>
|
| |
|
|
|
| |
I'm reasonably certain it's not required in recent OpenSSL's
|
| |
|
|
|
| |
As someone who first with Python in 2.4 or so, this habit is going to be hard to break.
|
| |
|
|
|
|
|
|
|
| |
* more backend typing
slow progress in a variety of places
* type checking isn't the only way we run code
|
|
|
| |
does this have value? ours is not to question the machine
|
|
|
|
|
|
|
|
|
| |
* more internal typing. supported mehods, hash, hmac
* cursed
* cursed again
* has this man ever linted a thing
|
|
|
|
|
|
|
| |
* Expand typing coverage to exceptions
Involves making _OpenSSLErrorWithText a typing.NamedTuple
* Poke for CI
|
|
|
|
|
|
|
| |
* Remove read_only_property and precisely type all these getters
* flake8
* unused
|
| |
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
* Drop supported for older LibreSSL
3.1 covers the oldest version used by versions of Alpine and OpenBSD that are supported by their upstreams.
* Remove tests that are now unused
* Update CHANGELOG.rst
Co-authored-by: Paul Kehrer <paul.l.kehrer@gmail.com>
Co-authored-by: Paul Kehrer <paul.l.kehrer@gmail.com>
|
|
|
| |
we don't support these but advanced users may make use of them
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
* Attempt to build against BoringSSL in CI
* Check for BoringSSL in the SSL bindings
* Check for BoringSSL in the err bindings
* Check for BoringSSL in the pkcs7 bindings
* Check for BoringSSL in the bignum bindings
* Check for BoringSSL in the EVP bindings
* Check for BoringSSL in the X.509 verify bindings
|
| |
|
| |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
* FIPS 3.0.0 support
* comments
* remove unneeded error clear
* review comments
* small refactor
* black
* flake8 too
* review feedback
* oops
* fix
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
* Expose a few more OpenSSL functions that are useful for DTLS support
* Move BIO_ADDR gunk to proper place
* const correct
* Throw more #ifdefs at the wall and see if they stick
* njsmith used "think about what he's doing"
it's probably not very effective
* LibreSSL is not my favorite library
* Attempt to hide my new undefined symbols
* deflake
* Give up on trying to check function pointers for NULLness
AFAICT it works fine in CFFI's ABI mode, but I can't figure out how to
do it in the API mode.
|
|
|
| |
remove it everywhere and assert on the code/lib/reason
|