summaryrefslogtreecommitdiff
path: root/tests
Commit message (Collapse)AuthorAgeFilesLines
* support negative serials in certificate parsing (#6626)Paul Kehrer2021-11-201-2/+7
| | | | | | | | | | | | | | | | | | | * support negative serials in certificate parsing but raise a warning every time we see it. also proactively raise on initial parse of the certificate, not just when accessing the serial_number attribute * cargo fmt * review feedback and changelog * pssh * Update CHANGELOG.rst Co-authored-by: Alex Gaynor <alex.gaynor@gmail.com> Co-authored-by: Alex Gaynor <alex.gaynor@gmail.com>
* fixes #6404 -- attempt to treat OCSP Nonce as being an octet string (#6625)Alex Gaynor2021-11-202-3/+3
| | | This is an awful hybrid, but hopefully puts us on a path to removing this nonsense
* more typing (#6616)Paul Kehrer2021-11-174-92/+120
|
* raise warning on encoded default value in csr (#6615)Paul Kehrer2021-11-171-3/+4
|
* type some more things in the tests (#6614)Paul Kehrer2021-11-176-14/+32
|
* OCB3 support (#6607)Paul Kehrer2021-11-141-0/+132
| | | | | * OCB3 support in aead package * improve comment
* remove deprecated calls in tests (#6604)Paul Kehrer2021-11-141-5/+7
|
* support attributes on csrs with an iterable (#6603)Paul Kehrer2021-11-141-73/+274
|
* Allow parsing CSR extensions with the critical bit having an explicitly ↵Alex Gaynor2021-11-141-0/+18
| | | | | | | encoded default (#6600) * Allow parsing CSR extensions with the critical bit having an explicitly encoded default * Poke for zuul
* handle unused bits in distribution point reasons as well (#6594)Paul Kehrer2021-11-121-6/+7
|
* encode KeyUsage with unused bits (#6593)Paul Kehrer2021-11-121-13/+63
|
* Run tests/hazmat/bindings/test_openssl.py on BoringSSL (#6592)Alex Gaynor2021-11-121-9/+20
| | | Refs #6576
* skip pkcs7 tests on boring (#6591)Paul Kehrer2021-11-121-19/+27
| | | | | * skip pkcs7 tests on boring * make it work
* Allow to serialize extension values as DER bytes strings (#6346)Felix Fontein2021-11-121-2/+424
| | | | | * Allow to serialize extension values as DER bytes string. * Prepare test for SignedCertificateTimestamps.
* x509 tests for boring (#6590)Paul Kehrer2021-11-122-4/+8
|
* Run tests/primitives/test_{dh,serialization}.py on BoringSSL (#6589)Alex Gaynor2021-11-122-0/+20
| | | Refs #6576
* Run tests/hazmat/backends/ under BoringSSL (#6588)Alex Gaynor2021-11-121-1/+5
| | | Refs #6576
* Run tests/primitives/ (minus a few files) on BoringSSL (#6584)Alex Gaynor2021-11-111-1/+1
|
* Move extension encoding code to new crate x509::extensions (#6571)Felix Fontein2021-11-111-1/+1
| | | | | | | | | | | * Move certificate extension encoding code to new crate x509::extensions. * Move more extension serialization code to x509::extensions. * Unify extension encoding into one function. * Move all extension OIDs to x509::extensions. * Move all OIDs to x509::oid.
* allow x25519/x448 public keys in certificatebuilder (#6562)Paul Kehrer2021-11-071-0/+52
| | | | also document that we can return these key types in a certificate, although they can't be self-signed of course
* Simplify backed name check in tests (#6558)Alex Gaynor2021-11-071-2/+2
| | | | | * Simplify backed name check in tests * poke GHA
* allow multiple identical pem blocks (#6551)Paul Kehrer2021-11-051-6/+14
| | | | | this matches our behavior to OpenSSL and allows users to pass a chain to our PEM loaders. To make this a little less magical it is now documented.
* deprecate backend part 14 of...probably 15? (#6534)Paul Kehrer2021-11-033-26/+0
| | | | | | | | * * CMAC * HMAC * * hashes * * keywrap
* deprecate backend part 11 of n (#6530)Paul Kehrer2021-11-032-18/+7
| | | cipher class
* deprecate backend part 8 of n (#6527)Paul Kehrer2021-11-031-9/+0
| | | | | The RSA chapter: * Retype backend args to typing.Any * Stop using _get_backend and directly import
* deprecate backend part 7 of n (#6526)Paul Kehrer2021-11-031-8/+0
| | | | * Move around some code to kill the need for a backend method * Type the backend arg to typing.Any since we just don't care now
* deprecate backend part 12 of n (#6532)Paul Kehrer2021-11-036-119/+14
| | | All the KDFs
* deprecate backend part 13 of n (#6533)Paul Kehrer2021-11-032-30/+0
| | | * OTPs
* support BMPString in explicitText parsing for legacy certificates (#6516)Paul Kehrer2021-11-021-0/+14
|
* handle case where private_value is the point at infinity (#6515)Paul Kehrer2021-11-021-0/+9
| | | Previously we raised InternalError, but now we raise a ValueError
* Allow custom attribute shortnames in rfc4514_string (#6490)Marti Raudsepp2021-11-011-0/+17
| | | | | | | | | | | | | `rfc4514_string()` and related methods now have an optional `attr_name_overrides` parameter to supply custom OID to name mappings, which can be used to match vendor-specific extensions. **BACKWARDS INCOMPATIBLE:** Reverted the nonstandard formatting of email address fields as `E` in `rfc4514_string()` methods from version 35.0. The previous behavior can be restored with: `name.rfc4514_string({NameOID.EMAIL_ADDRESS: "E"})` Expanded documentation of `Name.rfc4514_string`.
* Take backend as a parameter so skips work (#6504)Alex Gaynor2021-11-011-1/+1
| | | | | * Take backend as a parameter so skips work * Bump timeout threshold since alpine appears to be right on the line
* Convert CRL creation to Rust (#6496)Alex Gaynor2021-10-312-14/+2
| | | | | | | | | | | * Convert CRL creation to Rust * fixes * small reflows * Delete all teh code * flake8
* Convert CSR creation to Rust (#6495)Alex Gaynor2021-10-312-12/+14
| | | | | | | | | * Convert CSR creation to Rust * put this back * unused * coverage
* Check for CCM support in their tests (#6497)Alex Gaynor2021-10-311-0/+4
| | | Needed for BoringSSL (https://github.com/pyca/cryptography/pull/5305)
* support bmpstring and universalstring decoding in name (#6492)Paul Kehrer2021-10-291-0/+35
| | | | | | | | * support bmpstring and universalstring decoding in name this doesn't fix BMPString/UniversalString in DisplayText; that requires altering our implementation or adding those types to rust-asn1 * cargo fmt
* Convert x.509 certificate generation to Rust (#6479)Alex Gaynor2021-10-292-23/+2
| | | | | | | | | | | * Convert x.509 certificate generation to Rust * flake8 * Coverage shenangins * moar hashes * moar hashes
* Attempt to turn FIPS small RSA errors into something useful (#6487)Alex Gaynor2021-10-291-0/+9
| | | | | | | | | * Attempt to turn FIPS small RSA errors into something useful * Black * fix * doh
* add two additional DSA signature algorithm oids & test dsa_with_sha224 (#6483)Paul Kehrer2021-10-261-0/+1
|
* expand signing tests to encompass more signature OIDs (#6480)Paul Kehrer2021-10-261-6/+49
| | | | | | | | | * expand signing tests to encompass more signature OIDs also test those OIDs * black * skip sha1 in fips
* Added a test for signing an OCSP response with None as a hash algorithm (#6471)Alex Gaynor2021-10-251-0/+22
|
* Added a test for signing an OCSP response with an unknown private key type ↵Alex Gaynor2021-10-251-0/+22
| | | | | | | (#6469) * Added a test for signing an OCSP response with an unknown private key type * Update test_ocsp.py
* Added a test for signing an OCSP response with an invalid hash (#6468)Alex Gaynor2021-10-251-0/+29
| | | | | * Added a test for signing an OCSP response with an invalid hash * Fix for libressl
* Added test for signing an unknown cert status response (#6467)Alex Gaynor2021-10-251-0/+27
| | | | | | | * Added test for signing an unknown cert status response refs #6460 * Update test_ocsp.py
* Revert "Ban cffi version that makes CI sad (#6418)" (#6441)Alex Gaynor2021-10-191-21/+23
| | | | | | | | | * Revert "Ban cffi version that makes CI sad (#6418)" This reverts commit bba65084eadca64776d520004ded10375ab5d30e. * Run the necessary teardown code always * Restore this
* Make memleak test assertion more precise (#6440)Alex Gaynor2021-10-191-1/+1
|
* port some crl extensions, refactor a bit (#6425)Paul Kehrer2021-10-171-1/+16
| | | | | | | * port some crl extensions, refactor a bit * add a test * black
* Encode general names in rust (#6423)Paul Kehrer2021-10-161-1/+2
| | | | | | | | | | | | | | | * Encode general names in rust Enable SAN/IAN encoding in rust * fmt * simplify * satisfy mypy, review comment * coverage lol * more coverage
* encode x509.Name.public_bytes using rust (#6424)Paul Kehrer2021-10-161-1/+1
| | | | | | | | | | | | | | | * encode x509.Name.public_bytes using rust * mypy * remove x509_name_bytes entirely * black * simplify type signature * black again * remove branches
* Convert CertificatePolicies to Rust (#6400)Alex Gaynor2021-10-121-0/+34
| | | | | | | | | | | | | | | | | | | | | | | | | * Convert CertificatePolicies to Rust * Satisfy clippy * Incorporate rust tests into coverage * Attempt to get the coverage integrated * Debugging, as a treat * Attempt to get the coverage integrated * cursed * Maybe? * Required! * lol * unused * Handle non-ascii qualifiers