| Commit message (Collapse) | Author | Age | Files | Lines |
... | |
| |
|
| |
|
| |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
Bumps [libc](https://github.com/rust-lang/libc) from 0.2.107 to 0.2.108.
- [Release notes](https://github.com/rust-lang/libc/releases)
- [Commits](https://github.com/rust-lang/libc/compare/0.2.107...0.2.108)
---
updated-dependencies:
- dependency-name: libc
dependency-type: indirect
update-type: version-update:semver-patch
...
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
|
| |
|
| |
|
| |
|
|
|
|
|
|
| |
The spec requires both of these to be exactly two characters to
correspond with ISO country codes. Reality is sometimes messier, so this
allows parsing (but not encoding) of this invalid data. Parsing will
raise a UserWarning if incorrect lengths are detected.
|
| |
|
| |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
* support negative serials in certificate parsing
but raise a warning every time we see it. also proactively raise on
initial parse of the certificate, not just when accessing the
serial_number attribute
* cargo fmt
* review feedback and changelog
* pssh
* Update CHANGELOG.rst
Co-authored-by: Alex Gaynor <alex.gaynor@gmail.com>
Co-authored-by: Alex Gaynor <alex.gaynor@gmail.com>
|
|
|
| |
This is an awful hybrid, but hopefully puts us on a path to removing this nonsense
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
Bumps [pyo3](https://github.com/pyo3/pyo3) from 0.15.0 to 0.15.1.
- [Release notes](https://github.com/pyo3/pyo3/releases)
- [Changelog](https://github.com/PyO3/pyo3/blob/main/CHANGELOG.md)
- [Commits](https://github.com/pyo3/pyo3/compare/v0.15.0...v0.15.1)
---
updated-dependencies:
- dependency-name: pyo3
dependency-type: direct:production
update-type: version-update:semver-patch
...
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
Bumps [asn1](https://github.com/alex/rust-asn1) from 0.8.6 to 0.8.7.
- [Release notes](https://github.com/alex/rust-asn1/releases)
- [Commits](https://github.com/alex/rust-asn1/compare/0.8.6...0.8.7)
---
updated-dependencies:
- dependency-name: asn1
dependency-type: direct:production
update-type: version-update:semver-patch
...
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
|
| |
|
| |
|
|
|
|
|
| |
* OCB3 support in aead package
* improve comment
|
| |
|
|
|
|
|
|
|
| |
encoded default (#6600)
* Allow parsing CSR extensions with the critical bit having an explicitly encoded default
* Poke for zuul
|
|
|
| |
we don't support these but advanced users may make use of them
|
| |
|
| |
|
|
|
|
|
| |
* skip pkcs7 tests on boring
* make it work
|
|
|
|
|
| |
* Allow to serialize extension values as DER bytes string.
* Prepare test for SignedCertificateTimestamps.
|
| |
|
|
|
| |
Refs #6576
|
| |
|
| |
|
| |
|
|
|
|
|
|
|
|
|
|
|
| |
* Move certificate extension encoding code to new crate x509::extensions.
* Move more extension serialization code to x509::extensions.
* Unify extension encoding into one function.
* Move all extension OIDs to x509::extensions.
* Move all OIDs to x509::oid.
|
|
|
|
|
|
|
|
|
| |
(#6575)
* Simplify how we test boring, in a way that'll be extensible to the future
* Break out what we ignore
* Get fernet tests passing on boringssl
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
Bumps [libc](https://github.com/rust-lang/libc) from 0.2.106 to 0.2.107.
- [Release notes](https://github.com/rust-lang/libc/releases)
- [Commits](https://github.com/rust-lang/libc/compare/0.2.106...0.2.107)
---
updated-dependencies:
- dependency-name: libc
dependency-type: indirect
update-type: version-update:semver-patch
...
Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
|
|
|
|
| |
also document that we can return these key types in a certificate,
although they can't be self-signed of course
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
* Attempt to build against BoringSSL in CI
* Check for BoringSSL in the SSL bindings
* Check for BoringSSL in the err bindings
* Check for BoringSSL in the pkcs7 bindings
* Check for BoringSSL in the bignum bindings
* Check for BoringSSL in the EVP bindings
* Check for BoringSSL in the X.509 verify bindings
|
| |
|
| |
|
|
|
|
|
| |
this matches our behavior to OpenSSL and allows users to pass a chain to
our PEM loaders. To make this a little less magical it is now
documented.
|
|
|
|
| |
oid implements the Display trait so to_string is redundant when passing
to format!
|
| |
|
|
|
|
|
|
|
|
|
|
|
| |
* remove some unused functions and add some docs about use
The functions being removed are unused by both cryptography and
pyopenssl and the existing functions (x509_getm_notBefore/notAfter) are
not deprecated.
* more bindings removed and docs
Cryptography_EVP_PKEY_id was dropped from pyOpenSSL in 2017
|
| |
|
| |
|
|
|
|
|
|
|
|
| |
* * CMAC
* HMAC
* * hashes
* * keywrap
|
|
|
| |
cipher class
|
|
|
| |
* DSA, DH, EC converted to ignore backend arg
|
| |
|
|
|
|
|
| |
The RSA chapter:
* Retype backend args to typing.Any
* Stop using _get_backend and directly import
|
|
|
|
| |
* Move around some code to kill the need for a backend method
* Type the backend arg to typing.Any since we just don't care now
|
|
|
| |
All the KDFs
|
|
|
| |
* OTPs
|