Commit graph

2371 commits

Author SHA1 Message Date
Alex Gaynor
d89cd38afa
Enforce that CRL and CSR versions must be valid. (#7249)
Fixes #7231
2022-05-22 23:31:47 +00:00
Alex Gaynor
1407dd6339
Added vectors for invalid CSR/CRL versions (#7247)
* Added vectors for invalid CSR/CRL versions

* Update docs/development/test-vectors.rst

Co-authored-by: Paul Kehrer <paul.l.kehrer@gmail.com>

Co-authored-by: Paul Kehrer <paul.l.kehrer@gmail.com>
2022-05-22 22:52:32 +00:00
William Woodruff
e2ef761b4e
CT: extensions -> extension_bytes (#7238)
Signed-off-by: William Woodruff <william@trailofbits.com>
2022-05-19 21:48:41 +00:00
William Woodruff
e087b3e33c
CT: add SignedCertificateTimestamp.extensions (#7237)
Signed-off-by: William Woodruff <william@trailofbits.com>
2022-05-20 04:15:16 +08:00
Alex Gaynor
bf56c57c44
Remove vestiges of doc8 (#7233)
We don't use it since 1eccc52b63
2022-05-18 00:15:36 +00:00
Alex Gaynor
94cc3865df
Update install docs now that we test on Windows 2022 (#7230)
* Update install docs now that we test on Windows 2022

* Update installation.rst

* Update spelling_wordlist.txt

* Update docs/installation.rst

Co-authored-by: Paul Kehrer <paul.l.kehrer@gmail.com>

Co-authored-by: Paul Kehrer <paul.l.kehrer@gmail.com>
2022-05-17 19:38:31 +00:00
William Woodruff
b9f4ca35b5
x509/CT: expose more SCT internals (#7207)
* WIP

* x509: remove TBS work for now

Signed-off-by: William Woodruff <william@yossarian.net>

* CT: flake8

Signed-off-by: William Woodruff <william@yossarian.net>

* CT: remove TODO, add links

Signed-off-by: William Woodruff <william@yossarian.net>

* CT/SCT: strong enums for HashAlgorithm and SignatureAlgorithm

Signed-off-by: William Woodruff <william@yossarian.net>

* tests: add SCT hash/signature algorithm tests

Signed-off-by: William Woodruff <william@yossarian.net>

* tests: fix SignatureAlgorithm test, add signature contents test

Signed-off-by: William Woodruff <william@yossarian.net>

* rust: unit tests for {Hash,Signature}Algorithm

Signed-off-by: William Woodruff <william@yossarian.net>

* x509/sct: code coverage shenanigans

Signed-off-by: William Woodruff <william@yossarian.net>

* asn1, sct: pesky coverage

Signed-off-by: William Woodruff <william@yossarian.net>

* x509/sct: simplify parsing

Signed-off-by: William Woodruff <william@yossarian.net>

* docs: document new SCT APIs

Signed-off-by: William Woodruff <william@yossarian.net>

* docs: add refs to RFC 5246

Signed-off-by: William Woodruff <william@yossarian.net>

* SCT: forbid nonsense hash and signature algos

No tests, yet.

Signed-off-by: William Woodruff <william@yossarian.net>

* tests: add invalid hash/sig algo tests

Signed-off-by: William Woodruff <william@yossarian.net>

* sct: remove ToAttr trait

Inline impl into each struct's impl.

Signed-off-by: William Woodruff <william@yossarian.net>

* sct: remove invalid hash/sig variants

These should never appear in the context of SCTs.

Signed-off-by: William Woodruff <william@yossarian.net>

* sct: collapse matches

Handle invalid/unknown variants together.

Signed-off-by: William Woodruff <william@yossarian.net>

* tests: update SCT tests

Signed-off-by: William Woodruff <william@yossarian.net>

* sct: add a TODO

Signed-off-by: William Woodruff <william@yossarian.net>

* sct: return a primitives.hashes object instead of a custom enum

Signed-off-by: William Woodruff <william@yossarian.net>

Co-authored-by: Alex Cameron <asc@tetsuo.sh>
2022-05-13 20:42:27 +00:00
William Woodruff
6fe0aaf95a
docs, vectors: add two more x509 SCT testvectors (#7215)
Signed-off-by: William Woodruff <william@yossarian.net>
2022-05-12 17:40:47 -04:00
David Benjamin
1cc43f1886
Fix test CRLs and CSRs with invalid versions (#7216)
CRL versions only go up to v2 (numeric value 1) and CSRs only define v1
(numeric value 0). See
https://www.rfc-editor.org/rfc/rfc5280.html#section-5.1 and
https://www.rfc-editor.org/rfc/rfc2986.html#section-4. Some of the
inputs used in tests were misissued.

Unfortunately, the corresponding private keys for these test vectors
weren't provided, so I've just editted the inputs with der-ascii and
left the signatures invalid. The tests in question don't seem to rely on
valid signatures.
2022-05-12 19:50:43 +00:00
Yang Yang
387048108e
Doc: Add parameter nonce for class ChaCha20 (#7202) 2022-05-07 09:59:31 +00:00
Paul Kehrer
895a07abf2
add x509 pss certificate and public key (#7161)
* add x509 pss certificate and public key

the cert is signed using rsa_pss_2048.pem and the public key is the
public components of that private key

* Update docs/development/test-vectors.rst

Co-authored-by: Alex Gaynor <alex.gaynor@gmail.com>

Co-authored-by: Alex Gaynor <alex.gaynor@gmail.com>
2022-04-30 21:04:37 +00:00
Alex Gaynor
b2dc8a7228
Fixes #7127 -- added attr_name_overrides on from_rfc4514_string (#7160) 2022-04-30 20:38:47 +00:00
Robert Coup
a2a9109251
Allow Fernet decryption to accept string tokens (#7116)
* tests: better testid generation for fernet vectors

Use the vector filename and array index for the pytest id rather than a
concatenation of the vector content.

eg: `tests/test_fernet.py::TestFernet::test_invalid[invalid.json:2]`

* (Multi)Fernet: allow str tokens for decryption

Remove some developer friction by allowing string tokens to be passed to
Fernet decryption methods. Because a valid token as generated by
`Fernet.encrypt()` is url-safe base64-encoded, a non-ASCII token is
definitely invalid.

The stdlib base64 function already accepts and checks ASCII str values
so delegate to that.

* Kick CI
2022-04-29 22:27:47 +00:00
Alex Gaynor
bc00e8d676
Bump MSRV to 1.48.0 (#7128) 2022-04-27 13:47:46 +00:00
Alex Gaynor
4d58800fb7
Drop manylinux2010 (#6694)
It has very low usage
2022-04-26 19:31:00 +00:00
Robert Coup
2c3404b56b
docs: fix linting tox env name (#7117) 2022-04-26 18:09:12 +00:00
Alex Gaynor
1de0ea922e
Remove trailing white space in docs (#7115)
Apparently none of our linters care
2022-04-26 13:00:13 +00:00
Paul Kehrer
3b9a11b6d2
add RSA PSS test vectors (#7086) 2022-04-17 08:20:32 -05:00
Paul Kehrer
19546b9ccc
Add support for PSS.AUTO and PSS.DIGEST_LENGTH (#7082)
* add PSS auto support for verification

* add support for PSS.DIGEST_LENGTH

* review comments
2022-04-16 15:16:25 +00:00
Paul Kehrer
0724c5f1ee
check for invalid keys that RSA_check_key misses (#7080)
* check for invalid keys that RSA_check_key misses

RSA_check_key checks for primality but that fails to catch this case
since 2 is prime. Instead we fetch p and q and verify that they are odd
and if not reject the key as invalid.

* circleci sucks
2022-04-16 13:55:01 +00:00
Alex Gaynor
f3f695b1c1
Implement a parser for RFC4514 strings (#7055)
* Initial tests

* Implement.

Required updating many many tests based on my read of the RFC. Should be reviewed closely.

* Fix for py36

* flake8

* Improve coverage on hypothesis test

* Remove bad assertion in hypothesis test

* Update docs

* fix docs

* Fixed unicode support

* review

* docs review
2022-04-16 10:21:45 +02:00
Alex Gaynor
dc989d563a
Added Ubuntu Jammy to CI (#7047)
* Added Ubuntu Jammy to CI

* try thing
2022-04-07 02:15:09 -05:00
Dustin Ingram
033514708e
Fix indentation in docs/x509/reference.rst (#7044) 2022-04-05 21:11:10 +00:00
Paul Kehrer
7659fe4fd6
serialize certs to pkcs7 (#7034)
* serialize certs to pkcs7

* missed assert
2022-04-04 02:14:14 +00:00
Paul Kehrer
00c61b9537
update pkcs7 test vectors (#7030)
* update pkcs7 test vectors

* this is a word
2022-04-03 09:11:54 -04:00
Paul Kehrer
74e4202bd1
SIV support (#7029)
* SIV support

* empty commit to see if codecov sees the 3.0 coverage this time
2022-04-02 23:44:01 -04:00
Paul Kehrer
25cdad7d07
support 12-15 byte nonce sizes in OCB3 (#7011)
* support 12-15 byte nonce sizes in OCB3

* Update tests/hazmat/primitives/test_aead.py

Co-authored-by: Alex Gaynor <alex.gaynor@gmail.com>

Co-authored-by: Alex Gaynor <alex.gaynor@gmail.com>
2022-03-29 12:00:28 +00:00
Paul Kehrer
4a4f4d94ce
OCB3 test vectors for 104, 112, and 120-bit nonces (#7009) 2022-03-29 07:09:07 -04:00
ajoino
9d357cffb7
Serialize PKCS12 CA alias/friendlyName (#6910)
* PKCS12 serialization wrapper supports PKCS12Certificate cas

* Added code from Felix's gist to serialize_key_and_certificate_to_pkcs12. Doesn't break current behaviour/tests, need to write validate new behaviour, write tests, and format code.

* Simplified instance check

* Tried to write tests, but I cannot figure out how to read the friendlyName from parsed_more_certs.

* Fixed test function and renamed it.

* Fixed formatting.

* Commiting before trying black

* Formatted updates to make flake8 and black happy.

* Fixed first review comments.

* remove forgotten print statement

* use backend.openssl_assert instead of if ...

* Documented changes.

* Updated documentation.
2022-03-29 07:03:09 -04:00
Alex Gaynor
3714686044
Don't reference unsupported version in installation docs (#6946) 2022-03-13 05:21:45 +08:00
sanchayanghosh
9790f943df
Added OID for #6920 (#6925)
* Added OID

* Added to docuemntation for IPSec SAs

* Update docs/x509/reference.rst to correct the version change.

Co-authored-by: Paul Kehrer <paul.l.kehrer@gmail.com>

Co-authored-by: Paul Kehrer <paul.l.kehrer@gmail.com>
2022-03-03 07:11:46 +00:00
whiteowl3
fa75d77410
allow ed pk12, better tests (#6865)
* dont block pk12 serialization of ed pairs

* mimic test_ec curve skipping to satisfy alpine ci
2022-02-27 07:15:49 +08:00
Alex Gaynor
06e57ce62d
refs #6835 -- added oid constants for SHA3 signatures (#6850) 2022-02-07 16:38:07 -10:00
Alex Gaynor
3e0870468c
Test against Alpine on aarch64 (#6846)
* Test against Alpine on aarch64

* Update config.yml

* Update installation.rst

* Update config.yml
2022-02-06 22:32:16 -06:00
Alex Gaynor
7513197fc6
fixes #6804 -- improve error message quality with invalid characters in name attributes (#6843) 2022-02-06 21:42:56 -06:00
Alex Gaynor
05fa9c9833
Switch from centos to rhel in CI (#6844)
* Switch from centos to rhel in CI

* Update installation.rst

* Update installation.rst
2022-02-06 17:51:12 +00:00
Alex Gaynor
c9ac2c86d7
Remove FAQ that's no longer relevant (#6833)
We don't use environment markers anymore, now if you have a really old setuptools you get some different failure mode
2022-01-30 20:22:59 -08:00
Alex Gaynor
8114b3e61d
point to the AEAD version of GCM in the FAQ (#6832) 2022-01-31 01:55:42 +00:00
Alex Gaynor
02783d2297
Remove explicit subclassing of object now that all classes are new-style (#6830)
As someone who first with Python in 2.4 or so, this habit is going to be hard to break.
2022-01-30 16:29:24 +00:00
Alex Gaynor
335525a70d
Clean up the language in the docs now that 3.6 is the minimum we support (#6825) 2022-01-29 07:15:11 -08:00
April King
5ac3fdc46c
Found another place where ancient PBKDF2 iterations were listed (#6816) 2022-01-24 22:44:10 +00:00
Alex Gaynor
bab6faa262
Document M1 CI (#6799)
* Document M1 CI

* its a word
2022-01-07 00:22:06 +00:00
turettn
12497762be
Basic support for multiple SINGLERESP messages in one OCSP response, take 2 (#6410)
* OCSP responses can contain multiple SINGLERESPs

Instead of throwing an exception when encountering a OCSP
response with multiple SINGLERESPs, throw the exception when
attempting to pull a single structure if multiple are present.

Add a response_iter property to the OCSP Response object, which
allows for iteration through all the SINGLERESPs, and properties
to be individually accessed for each.

* Small fixes to OCSP multiple response handling.  Squash eventually

* Docs updates.  Should be squashed

* Get rid of mutating iterator, replace with separate return object

* Fix versionadded strings in docs

* Cleanup docs & python bindings.
2022-01-03 18:33:15 -05:00
Paul Kehrer
75be92de8e
support parsing bitstring values in DNs (#6629)
* support bitstring values in DNs

parsing is limited to x500UniqueIdentifier only

* Update src/cryptography/x509/name.py

Co-authored-by: Alex Gaynor <alex.gaynor@gmail.com>

Co-authored-by: Alex Gaynor <alex.gaynor@gmail.com>
2021-11-28 23:47:44 +00:00
Alex Gaynor
bd7e6ad653
closes #6663 -- deprecate openssl 1.1.0 support (#6667) 2021-11-28 12:12:47 +08:00
Natalia Maximo
e91d3047e9
fix: fixed confusing typo on DSA docs (#6662) 2021-11-27 00:15:38 +00:00
Paul Kehrer
5bd0c10d50
allow parsing of nonstandard country name and jurisdiction country name (#6641)
The spec requires both of these to be exactly two characters to
correspond with ISO country codes. Reality is sometimes messier, so this
allows parsing (but not encoding) of this invalid data. Parsing will
raise a UserWarning if incorrect lengths are detected.
2021-11-21 03:16:43 +00:00
April King
a9fa8015ae
Update fernet docs to use latest Django recommendations (#6611)
* Update fernet docs to use latest Django recommendations

* Err, remember how RST works
2021-11-16 03:44:52 +00:00
Paul Kehrer
78c2dd8a04
add AES SIV vectors (#6608) 2021-11-15 07:19:44 -05:00
Paul Kehrer
ffb40e6228
OCB3 support (#6607)
* OCB3 support in aead package

* improve comment
2021-11-14 23:10:06 -05:00