| Commit message (Collapse) | Author | Age | Files | Lines |
... | |
| |
|
| |
|
| |
|
|
|
| |
we already didn't support signing (released in 39.0)
|
|
|
|
|
| |
* deprecate the rest of DSA support for SSH
* review comments
|
|
|
|
|
| |
* deprecate support for DSA in load_ssh_public_key
* try to prevent bad things a bit more
|
|
|
|
|
|
|
| |
* switch to using integers for valid_after/valid_before in SSH certs
* i know this, it's a unix timestamp
* one more review nit
|
|
|
|
|
|
|
|
|
|
|
| |
* SSHCertificateBuilder
This adds support for generating SSH certificates
* add deterministic signing tests and valid_for_all_principals
* test another edge
* one of these two fixes makes no sense
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
* support SSH certificate parsing
DSA (deliberately) not supported
* make a unified API
* Update src/cryptography/hazmat/primitives/serialization/ssh.py
Co-authored-by: Alex Gaynor <alex.gaynor@gmail.com>
Co-authored-by: Alex Gaynor <alex.gaynor@gmail.com>
|
|
|
| |
this prevents duplicating this logic more times for ssh certs
|
| |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
(#7935)
In openssl 1.1.1 docs/man3/EVP_PKEY_set1_RSA.pod
(https://github.com/openssl/openssl/blob/OpenSSL_1_1_1/doc/man3/EVP_PKEY_set1_RSA.pod)
The EVP_PKEY_set_alias_type(pkey, EVP_PKEY_SM2) API is possible to convert it to using
SM2 algorithms After loading an ECC key.
So the EVP_PKEY_set_alias_type API is important for people who want to use cryptography
with using SM2 algorithms. Therefore, we need to export EVP_PKEY_set_alias_type in FUNCTIONS.
Signed-off-by: YiLin.Li <YiLin.Li@linux.alibaba.com>
Signed-off-by: YiLin.Li <YiLin.Li@linux.alibaba.com>
|
| |
|
|
|
|
| |
Deprecated since version 3.3, see
https://docs.python.org/3/library/abc.html#abc.abstractproperty
|
| |
|
|
|
| |
It's more than 60x faster.
|
|
|
|
|
|
|
|
|
| |
This was added alongside X509_STORE_set_get_issuer in
21ef4080ec7666299f1268f3bbfb136582744359. It makes sense to want to
override issuer lookup, but I've never seen a valid use case for
querying the callbacks. If you're trying to get at the function that was
already configured, you presumably already know it. (And if you don't,
it's not safe to call because an arbitrary callback may have been
written to only be usable in particular contexts.)
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
* x509: add `load_pem_x509_certificates`
This behaves similarly to `load_pem_x509_certificate`, except that it
returns a list of loaded certificates instead of just the first X.509
certificate.
It raises if the input contains no PEM-encoded certificates, or if PEM
or certificate parsing fail.
Signed-off-by: William Woodruff <william@trailofbits.com>
* tests/x509: blacken
Signed-off-by: William Woodruff <william@trailofbits.com>
* Update docs/x509/reference.rst
Co-authored-by: Alex Gaynor <alex.gaynor@gmail.com>
* tests/x509: assert each item in the list is actually a certificate
Signed-off-by: William Woodruff <william@trailofbits.com>
* bindings: expose `load_pem_x509_certificates` in `x509.pyi`
Signed-off-by: William Woodruff <william@trailofbits.com>
* tests/x509: test the structure of each cert a bit
This has the transitive effect of establishing a fixed order.
Signed-off-by: William Woodruff <william@trailofbits.com>
* CHANGELOG: record changes
Signed-off-by: William Woodruff <william@trailofbits.com>
* docs: add PEM to spellcheck allowlist
Signed-off-by: William Woodruff <william@trailofbits.com>
* docs/x509: document expected param
Signed-off-by: William Woodruff <william@trailofbits.com>
Signed-off-by: William Woodruff <william@trailofbits.com>
Co-authored-by: Alex Gaynor <alex.gaynor@gmail.com>
|
| |
|
| |
|
|
|
|
|
| |
* Rewrite PKCS7 signature generation in Rust
* Update src/rust/src/pkcs7.rs
|
|
|
|
|
|
|
|
|
| |
* LibreSSL 3.7 adds support for Ed25519
This brings support for the raw public key API.
* Use feature variable to enable Ed25519
Ed25519 support is available since OpenSSL 1.1.1b and LibreSSL 3.7.0.
|
|
|
|
|
|
|
| |
* Add test for issue 7818
* Add *_SHA3 signature algorithms to OID <-> hash map
* Use type instead of __class__
|
| |
|
|
|
| |
This is the version of LibreSSL in OpenBSD 7.1, which is the oldest currently supported.
|
|
|
| |
Partial revert of 6578d86ec557e0b4af2ba9d0c0a821fe939044ee
|
| |
|
| |
|
| |
|
|
|
|
|
|
|
|
|
|
|
| |
* bump tests to 3.0.6
* qs become rs
* fix openssl 3.0.6 error stack bug in pkcs12
* flake
* more comment
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
* add unsafe_skip_rsa_key_validation
This allows users to skip RSA key validation when calling
load_pem_private_key, load_der_private_key, and
RSAPrivateNumbers.private_key. This is a significant performance
improvement but is **only safe if you know the key is valid**. If you
use this when the key is invalid OpenSSL makes no guarantees about what
might happen. Infinite loops, crashes, and all manner of terrible things
become possible if that occurs. Beware, beware, beware.
* Apply suggestions from code review
Co-authored-by: Alex Gaynor <alex.gaynor@gmail.com>
* remove unneeded variable
Co-authored-by: Alex Gaynor <alex.gaynor@gmail.com>
|
|
|
| |
Detected by OSS-Fuzz: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=52024
|
|
|
|
|
| |
You must pass CRYPTOGRAPHY_OPENSSL_NO_LEGACY for this to be allowed.
Downstreams can easily patch this check out if they want to default to
this behavior.
|
| |
|
|
|
| |
They're leaving a ton of performance on the table.
|
| |
|
| |
|
| |
|
|
|
| |
This policy is to support things that are in supported versions of openbsd. the current oldest supported openbsd is 7.0, which included libressl 3.4
|
|
|
|
|
|
|
|
| |
* use fixed pool to improve perf of aead ChaCha20Poly1305
~35-45% speedup on benchmarks when reusing the same key for multiple
operations
* remove unneeded call
|
|
|
| |
turns out we don't need it
|
|
|
|
| |
(#7598)
|
| |
|
| |
|
|
|
| |
We already require pyOpenSSL>=22.0, but pyOpenSSL has not required this fallback since 21.0.
|
| |
|
| |
|
|
|
| |
OpenBSD 7.0 ships 3.4, and Alpine 3.14 ships 3.3.6
|
|
|
|
|
| |
There's still a few TODOs for cleanup.
Refs #7109
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
* support setting more PKCS12 serialization encryption options
This is limited support, but makes it possible to set two different PBES
choices as well as set KDF rounds and MAC algorithm
* Apply suggestions from code review
Co-authored-by: Alex Gaynor <alex.gaynor@gmail.com>
* review feedback redux
* Update docs/hazmat/primitives/asymmetric/serialization.rst
Co-authored-by: Alex Gaynor <alex.gaynor@gmail.com>
Co-authored-by: Alex Gaynor <alex.gaynor@gmail.com>
|