| Commit message (Collapse) | Author | Age | Files | Lines |
| | |
|
| | |
|
| |
|
|
|
|
|
|
|
|
|
|
|
| |
* Interface: Make annotation check optional
Fixes: https://github.com/pyca/cryptography/issues/5774
Signed-off-by: Christian Heimes <cheimes@redhat.com>
* Use param.replace()
Co-authored-by: Stanislav Levin <slev@altlinux.org>
Signed-off-by: Christian Heimes <cheimes@redhat.com>
Co-authored-by: Stanislav Levin <slev@altlinux.org>
|
| | |
|
| | |
|
| | |
|
| |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
* rsa type hinting
* remove unused import
* missed return type
* type fixes
* ignores no longer required
* black gets me every time
* Update src/cryptography/hazmat/backends/openssl/rsa.py
Co-authored-by: Alex Gaynor <alex.gaynor@gmail.com>
Co-authored-by: Alex Gaynor <alex.gaynor@gmail.com>
|
| |
|
|
|
|
|
| |
* KDF type hinting
* more types
* less contortions
|
| | |
|
| |
|
|
|
| |
* x25519 type hints
* x448 type hints
|
| | |
|
| | |
|
| | |
|
| | |
|
| | |
|
| | |
|
| |
|
|
|
|
|
|
|
| |
* clean mypy with tests dir
* remove most no_type_check annotations
* le sigh
* remove unneeded comments
|
| |
|
|
|
| |
* make PrivateKeyWithSerialization an alias of PrivateKey
* black
|
| |
|
|
|
| |
* type hinting for symmetric ciphers
* make our interface verifier happy
|
| | |
|
| | |
|
| |
|
|
|
|
|
|
|
|
| |
* switch to xdist in tox for faster runs
* not using auto to avoid too many processes on local laptops
* we need to use pytest-cov to generate coverage properly now
* these env vars aren't present on no coverage builds
* tox changes
|
| | |
|
| |
|
|
|
|
|
|
|
|
|
|
| |
* we already do this check in other places
This test is *incredibly* expensive and we already do roundtrips like
this on other DH groups. To make this test less expensive and also more
accurate to its name we now verify that the parameters on the generated
key match
* empty commit
the most important CI feature
|
| |
|
|
|
|
|
| |
* subtests ec
* continue instead of return
* indentation
|
| |
|
|
|
|
|
| |
* remove AES tests we will always skip
* constrain <64-bit IV vector removal to just GCM
* apparently this is only used by GCM
|
| | |
|
| | |
|
| | |
|
| |
|
|
|
| |
* Drop Python 2
* Black everything
|
| | |
|
| | |
|
| | |
|
| | |
|
| |
|
|
|
|
|
|
|
|
|
|
|
| |
* Remove Python2 from CI and code that branched on it
* Update setup.py
Co-authored-by: Hugo van Kemenade <hugovk@users.noreply.github.com>
* remove
* review feedback
Co-authored-by: Hugo van Kemenade <hugovk@users.noreply.github.com>
|
| |
|
| |
* Fixed DH tests for latest CentOS FIPS OpenSSL (1.1.1g)
|
| |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
* Removed unused argument.
* Added support for RSA signature recovery.
* Syntatic corrections for passing pep8 tests.
* Corrected typo.
* Added test of invalid Prehashed parameter to RSA signature recover.
* Renamed recover to a more descriptive name.
* Extended RSA signature recovery with option to return full data (not
only the digest part).
* Added missing words to pass spell check.
|
| | |
|
| |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
* disallow p less than 512-bit on DH
OpenSSL 3.0.0 enforces this so we'll go ahead and enforce it everywhere
that's practical for us. (Note that we do not enforce on deserializing
PKCS1/PKCS8 keys in < 3.0.0, but this PR adds a test so that in the
3.0.0 support branch we can test an error path)
* missing test
* black
* _MIN_MODULUS_SIZE is now a thing
* skip on fips
|
| |
|
|
|
|
|
|
|
|
|
|
| |
* Reduce granularity of error msging when deserializing keys
In OpenSSL 3.0 it is no longer possible to determine whether the reason
a key failed to deserialize is because of an unsupported cipher. Since
we want to be more resilient to OpenSSL error code instability we'll
just remove these paths.
* black
* changelog and update docs
|
| | |
|
| | |
|
| | |
|
| |
|
|
|
|
|
|
|
|
|
|
| |
* GCM IV size limits
OpenSSL 3.0.0 is going to enforce these size limits so we might as well
put them in now.
* fix the tests
* black
* these cases can't happen if we're limiting IV size already
|
| |
|
|
|
| |
This change allows future's newbytes class to be padded again.
Fixes https://github.com/pyca/cryptography/issues/5547.
|
| | |
|
| | |
|
| |
|
|
|
| |
* move blinding to __init__ on both RSA public and private
* change signature to guarantee this test is testing what we think
|
| | |
|
| | |
|