Commit graph

257 commits

Author SHA1 Message Date
André Almeida
8a35a20045 Enhance info on pip requirements intallation (#4499)
* Enhance info on pip requirements intallation

* Remove virtualenv files from remote

* Fix "pacakges" typo

* Removing trailling whitespaces
2018-10-19 10:20:03 +08:00
Paul Kehrer
3cc0079024 add OCSP request with a request extension (nonce) (#4462) 2018-09-07 09:06:17 -04:00
Paul Kehrer
1ded081139 More OCSP vectors (#4451)
* yet another ocsp response vector.

and yet there will be at least one more after this

* add one more
2018-09-01 15:09:10 -05:00
Paul Kehrer
8e499b2dfa add LE subordinate certificate to test vectors (#4450) 2018-09-01 14:07:44 -05:00
Paul Kehrer
5d9c8e2559 add more OCSP response vectors (#4445)
* add more OCSP response vectors

* another vector and better docs
2018-09-01 09:41:25 -05:00
Paul Kehrer
33dbd9365f OCSP response vector (#4443)
* OCSP response vector

* oops, wrong name

* move ocsp response vector docs

* make alex happy
2018-08-31 17:58:53 -05:00
Alex Gaynor
ef3b38d2ac Added vector for pre-certificate poison extension (#4432) 2018-08-30 12:46:47 -04:00
Alex Gaynor
2284eea988 Fixes #4426 -- use modern idiom in our bindings docs (#4428) 2018-08-30 09:40:46 -04:00
David Benjamin
3ce8883fd6 Fix encoding errors in RSA test keys. (#4410)
* Fix encoding errors in RSA test keys.

enc-rsa-pkcs8.pem and unenc-rsa-pkcs8.pem did not encode the RSA key
correctly. Per RFC 8017, appendix A.1:

   The object identifier rsaEncryption identifies RSA public and private
   keys as defined in Appendices A.1.1 and A.1.2.  The parameters field
   has associated with this OID in a value of type AlgorithmIdentifier
   SHALL have a value of type NULL.

      rsaEncryption    OBJECT IDENTIFIER ::= { pkcs-1 1 }

unenc-rsa-pkcs8.pem, however, was missing that NULL, which was, in turn,
carried into the encrypted payload of enc-rsa-pkcs8.pem. The DER
version, enc-rsa-pkcs8.der, carries this mistake too. Interestingly,
unenc-rsa-pkcs8.der does *not* have it. I'm guessing it was converted
with the openssl command-line tool which fixed the encoding in
conversion.

Current versions of OpenSSL are lax and ignore the parameters field, but
it's best to test against spec-compliant inputs. Fix unenc-rsa-pkcs8.pem
to match unenc-rsa-pkcs8.der and then refresh enc-rsa-pkcs8.{der,pem}
with the new encoding but otherwise the same encryption parameters.

I've refreshed the dumpasn1 (at least that's what it looks like)
preamble at the top of each file, but the current version of dumpasn1
appears to have changed the spacing slightly, so there's some whitespace
diff noise.

* Update test-vectors.rst.
2018-08-23 14:58:30 -05:00
Paul Kehrer
b3f4df1947 add new OCSP request vectors (#4399) 2018-08-15 10:19:15 -04:00
Alex Gaynor
37d2947b44 Document wycheproof revision we're current as of (#4390)
* Document wycheproof revision we're current as of

* Wycheproof is a real word!

* line length
2018-08-12 16:39:10 -05:00
Paul Kehrer
aedb3f0714 Add SHA512/224 and SHA512/256 test vectors from NIST CAVP (#4237) 2018-05-14 08:45:42 -04:00
Ville Skyttä
40c6d40512 Use pytest instead of py.test per upstream recommendation, #dropthedot (#4236)
http://blog.pytest.org/2016/whats-new-in-pytest-30/
https://twitter.com/hashtag/dropthedot
2018-05-13 10:23:49 -04:00
Paul Kehrer
2bc941d85d add SHA3 and SHAKE vectors (#4213)
These can be used when OpenSSL 1.1.1 is released
2018-05-09 12:45:55 -04:00
Alex Gaynor
3414f5c885 Update URLs for new pypi! (#4194)
* Update URLs for new pypi!

* trailing slash

* grump
2018-04-16 07:41:11 +08:00
Alex Gaynor
2920a310f2 Fixed links to sphinx docs (#4182) 2018-04-01 09:19:18 -05:00
Alex Gaynor
b9051a3532 updated link to sphinx docs (#4181) 2018-04-01 08:16:41 -05:00
Joshua Crowgey
99470a4648 Added badtime.pem vector (#4179)
* Added badtime.pem vector

In connection with forthcoming PR to fix #4158

* shortened line, corrected and->and
2018-03-30 13:10:29 -05:00
Paul Kehrer
9b4423b254 add botan's AESKWP vectors reformatted for our NIST loader (#4159) 2018-03-20 12:14:59 -04:00
Paul Kehrer
2250aafd6f brainpool vectors from rfc 7027 (#4143) 2018-03-15 11:59:22 -04:00
Alex Gaynor
15cc998c1f Fixed import path in go script (#4075) 2018-01-06 18:39:57 -06:00
Paul Kehrer
323f2ad66b add 1200 byte HKDF test vector and a generator/verifier for it (#4074)
* add 1200 byte HKDF test vector and a generator/verifier for it

* exit non-zero when failing

* ugh
2018-01-06 16:00:28 -05:00
Paul Kehrer
582b2b4d85 remove whirlpool vectors since we no longer support whirlpool (#4054) 2017-12-10 21:31:42 -05:00
Paul Kehrer
4cf6e785ca expunge python 2.6 (#3962)
* expunge python 2.6

* how did THAT happen

* remove another unsupported python from the tox envlist

* hypothesis can now be unconditionally imported
2017-10-11 18:06:01 -04:00
Paul Kehrer
003f56fbd7 add utf8 DNSName x509 vector (#3952) 2017-10-09 22:23:24 -04:00
Paul Kehrer
d02842b03b add Freshest CRL and Delta CRL Indicator test vectors (#3932) 2017-09-20 11:40:05 -04:00
Alex Gaynor
53e4505861 Switch NIST PDFs from nvlpubs to csrc which is HTTPS (#3929) 2017-09-20 21:57:47 +08:00
Paul Kehrer
ba7041596e add unique identifier test vector (#3925)
* add unique identifier test vector

* wrap a line I didn't even touch...
2017-09-19 20:03:11 -04:00
Alex Gaynor
8cb1d36690 Update PKITS link (#3923) 2017-09-20 06:46:21 +08:00
Alex Gaynor
e3fc93af73 Update NIST CAVP url (#3922) 2017-09-19 13:28:53 +08:00
Paul Kehrer
d8371a8290 add chacha20 test vectors from RFC 7539 (#3918) 2017-09-14 08:38:40 -04:00
Paul Kehrer
52067bc300 add X509 test vector with a TLS Feature (RFC 7633) extension (#3898) 2017-09-08 19:02:22 -04:00
Paul Kehrer
2b01c55736 oaep label vector (#3895)
* oaep label vector

* add count so we can use the nist vector loader

* add RSA key from the boring vectors as well

https://boringssl.googlesource.com/boringssl/+/ce3773f9fe25c3b54390bc51d72572f251c7d7e6/crypto/evp/evp_tests.txt#8
2017-09-07 07:14:25 -04:00
Paul Kehrer
9a8e29eda7 add initial OCSP request test vector (#3890) 2017-09-07 07:11:47 -04:00
Paul Kehrer
64dc16b9f9 add test vector with invalid basicconstraints (#3866)
* add test vector with invalid basicconstraints

* sigh
2017-08-15 21:17:01 -04:00
Vincent Pelletier
6c02ee85bc Add is_signature_valid method on CertificateRevocationList (#3849) 2017-08-12 08:05:00 -05:00
Alex Gaynor
601ed631ad Attempt to use coverage to quantify how many of the CONDITIONAL_NAMES we really use (#3763)
* Attempt to use coverage to quantify how many of the CONDITIONAL_NAMES we really use

* rewrite file to improve coverage

* Write it this way so we can use line coverage

* lost this one :-(

* fix comment and flake8

* update the docs as well

* flake8
2017-07-08 19:35:02 -05:00
Paul Kehrer
bf128a470b add rfc 3526 DH groups (#3767) 2017-07-08 18:36:58 -04:00
Paul Kehrer
491fd7cc5a Funcs macros gone (#3695)
* No more FUNCS/MACROS distinction

* change the docs to not talk about MACROS since they're gone

* remove out of date comment
2017-06-27 14:15:37 -07:00
Paul Kehrer
e67354e9e9 add NIST CAVP CCM vectors (#3698)
http://csrc.nist.gov/groups/STM/cavp/documents/mac/ccmtestvectors.zip

No TLS :(
2017-06-18 20:35:05 -04:00
Paul Kehrer
cfdc6057e1 add X25519 test vectors from RFC 7748 section 5.2 (#3685) 2017-06-06 08:01:03 -04:00
Alex Gaynor
5afd5694d2 Change the link to appease linkcheck (#3677) 2017-06-04 13:25:53 -10:00
Paul Kehrer
66dcd38fad add ChaCha20Poly1305 test vectors from OpenSSL/RFC7539 (#3673)
* add ChaCha20Poly1305 test vectors from OpenSSL/RFC7539

* add the boringssl tests as well

* highlight the lines
2017-06-04 17:09:03 -04:00
Fraser Tweedale
d607dd7e5b Enlarge _oid2txt buffer to handle larger OIDs (#3612)
The OpenSSL manual recommends a buffer size of 80 for OBJ_oid2txt:
https://www.openssl.org/docs/crypto/OBJ_nid2ln.html#return_values.
But OIDs longer than this occur in real life (e.g. Active Directory
makes some very long OIDs).  If the length of the stringified OID
exceeds the buffer size, allocate a new buffer that is big enough to
hold the stringified OID, and re-do the conversion into the new
buffer.
2017-05-29 16:33:20 -05:00
Paul Kehrer
adeaacfa56 allow global suppression of link flags (#3592)
CRYPTOGRAPHY_SUPPRESS_LINK_FLAGS will now suppress link flags regardless
of platform. Additionally, CRYPTOGRAPHY_WINDOWS_LINK_LEGACY_OPENSSL is
now the flag you need if you want to link against < 1.1.0 on windows.
2017-05-24 12:49:18 -07:00
Paul Kehrer
5103235129 time to remove commoncrypto, fare thee well (#3551)
* time to remove commoncrypto, fare thee well

* remove even more

* update the changelog

* remove more things

* don't need this function

* remove CAST5 CTR tests since that was only supported in commoncrypto

* assert a thing
2017-05-20 10:09:02 -07:00
Alex Gaynor
89c2ce4652 Update docs to reflect a change that occured long ago with bindings (#3517) 2017-04-26 09:44:14 -05:00
Alex Gaynor
de569c58ff format some function names in docs (#3511) 2017-04-21 21:24:57 +08:00
Alex Gaynor
4a772a823d Another site goes HTTPS! (#3477) 2017-03-23 09:23:24 -04:00
Alex Gaynor
5f9c5cb4b8 Refs #3461 -- added a test vector with SCTs (#3462)
* Refs #3461 -- added a test vector with SCTs

* timestamp is a word
2017-03-19 23:12:19 -04:00