Commit graph

1867 commits

Author SHA1 Message Date
Paul Kehrer
f92f2d4d64 update static wheel install docs (#3754)
* update static wheel install docs

* parentheses
2017-07-04 17:00:08 -04:00
Alex Gaynor
a509496e48 Order our supported OpenSSL versions reasonably (#3752) 2017-07-03 17:00:52 -05:00
Alex Gaynor
b7912eea2a Fixes #3745 -- add the any EKU EKU (#3750)
* Fixes #3745 -- add the any EKU EKU

* docs

* whitespace

* versionadded
2017-07-03 09:07:02 -05:00
Paul Kehrer
1eeaabbbbc update linux install docs and release instructions (#3746)
* update linux install docs and release instructions

* rhel/centos is so bad they don't even have python3
2017-07-01 15:34:36 -07:00
Paul Kehrer
a857fe6650 don't use long keys because they can be confusing wrt bits/bytes (#3734)
* don't use long keys because they can be confusing wrt bits/bytes

* make sure we say bytes everywhere

* shorten the scrypt output to 32 bytes as well
2017-06-28 21:03:29 -07:00
Paul Kehrer
491fd7cc5a Funcs macros gone (#3695)
* No more FUNCS/MACROS distinction

* change the docs to not talk about MACROS since they're gone

* remove out of date comment
2017-06-27 14:15:37 -07:00
Paul Kehrer
e3a2fb209b remove python 3.3 from CI (#3729)
* remove python 3.3 from CI

* remove 3.3 everywhere, not just from CI
2017-06-26 21:08:33 -04:00
Paul Kehrer
5bc8c7d801 doc the relationship between PrivateKey and PrivateKeyWithSerialization (#3721)
* doc the relationship between PrivateKey and PrivateKeyWithSerialization

Or at least do it better.

* let's talk about opaque keys
2017-06-24 19:21:20 -04:00
Paul Kehrer
2748e2e4ae Reorganize DHParameters and DHPublicKey *WithSerialization (#3722)
* Reorganize DHParameters and DHPublicKey *WithSerialization

fixes #3720

* fix up the changelog
2017-06-24 19:20:15 -04:00
Paul Kehrer
361a9fc2b7 changelog entry and a few updates to the new DH params docs (#3718) 2017-06-24 16:12:04 -04:00
Aviv Palivoda
6b08aba7f1 Dh parameters serialization (#3504)
* Support DH parameter serizalization - no X9.42

* Support X9.42 serialization - DER not working

* Fix dhp_rfc5114_2.der

Changing the DER parameters serialization after the
fix in openssl commit a292c9f1b835

* DH parameters X9.42 DER serialization fixed

* fix _skip_dhx_unsupported

* document DH parameter_bytes

* PEP8 fixes

* Document load_pem_parameters

* Document load_der_parameters

* document ParameterFormat

* Increase test coverage

* Increase test covrage

* Remove unneeded check

* Fix typo

* Fix error in load_der_parameters

* Add load_pem_parameters and load_der_parameters to interfaces

* CR fixes

* Removed unverified phrase

* Update version to 2.0

* Fix pep8

* Rename ParameterFormat.ASN1 to ParameterFormat.DHParameter

* link pkcs3

* Add new line at end of file to serialization.rst

* Rename DHparameters to PKCS3

* doc CR fix
2017-06-24 09:00:28 -10:00
Paul Kehrer
3dccf6a87d be clearer that 65537 is the right answer (#3714)
* be clearer that 65537 is the right answer

* Different language

* remove trailing whitespace
2017-06-23 07:31:51 -04:00
Paul Kehrer
c38e5508ca add FAQ entry for failed to install (#3710) 2017-06-19 06:54:12 -04:00
Paul Kehrer
e67354e9e9 add NIST CAVP CCM vectors (#3698)
http://csrc.nist.gov/groups/STM/cavp/documents/mac/ccmtestvectors.zip

No TLS :(
2017-06-18 20:35:05 -04:00
Paul Kehrer
9e19428029 fix typo in docs for curve name (#3705)
fixes #3704
2017-06-14 16:28:53 -04:00
Jean-Paul Calderone
61858f36b6 It's a method you must call (#3696)
Fix misworded guidance for how to serialize a private key to bytes.
2017-06-09 11:18:55 -10:00
Paul Kehrer
3e357f7040 X25519 Support (#3686)
* early days

* sort of working

* more things

* remove private_bytes

* public bytes, interface fix

* load public keys

* x25519 support basically done now

* private_bytes is gone

* some reminders

* doctest this too

* remove a thing that doesn't matter

* x25519 supported checks

* libressl has the NID, but a different API, so check for OpenSSL

* pep8

* add missing coverage

* update to use reasons

* expand test a little

* add changelog entry

* review feedback
2017-06-09 08:31:30 -04:00
Paul Kehrer
7e53d91157 ChaCha20Poly1305 support (#3680)
* chacha20poly1305 support

* add chacha20poly1305 backend and some fixes

* refactor

* forgot to remove this

* pep8

* review feedback and a lot of type/value checking

* review feedback

* raise unsupportedalgorithm when creating a ChaCha20Poly1305 object

if it's not supported.

* switch to ciphertext||tag

* typo

* remove a branch we don't need

* review feedback

* decrypts is *also* a word

* use reasons
2017-06-08 00:08:57 -04:00
Paul Kehrer
f12955cd24 scrypt can be doctested now that we're using 1.1.0 (#3688) 2017-06-07 08:20:33 -04:00
Paul Kehrer
cfdc6057e1 add X25519 test vectors from RFC 7748 section 5.2 (#3685) 2017-06-06 08:01:03 -04:00
Alex Gaynor
e2e8782405 Do more retries in linkcheck because NIST websites are down a lot (#3683) 2017-06-05 15:51:48 -10:00
Alex Gaynor
5afd5694d2 Change the link to appease linkcheck (#3677) 2017-06-04 13:25:53 -10:00
Paul Kehrer
e3ff364f68 fix symmetric encryption interfaces heading (#3676) 2017-06-04 17:48:32 -04:00
Paul Kehrer
a8b1c6e9b1 document invalidtag (#3675)
* document invalidtag

* move invalidtag
2017-06-04 17:48:24 -04:00
Paul Kehrer
66dcd38fad add ChaCha20Poly1305 test vectors from OpenSSL/RFC7539 (#3673)
* add ChaCha20Poly1305 test vectors from OpenSSL/RFC7539

* add the boringssl tests as well

* highlight the lines
2017-06-04 17:09:03 -04:00
Alex Gaynor
3661011e39 Remove a line from "Why do we exist" (#3672)
I have no idea what this meant
2017-06-04 10:02:09 -10:00
Alex Gaynor
6a0718fadd Refs #3461 -- parse SCTs from x.509 extension (#3480)
* Stub API for SCTs, feedback wanted

* grr, flake8

* finish up the __init__

* Initial implementation and tests

* write a test. it fails because computer

* get the tests passing and fix some TODOs

* changelog entry

* This can go now

* Put a skip in this test

* grump

* Removed unreachable code

* moved changelog to the correct section

* Use the deocrator for expressing requirements

* This needs f for the right entry_type

* coverage

* syntax error

* tests for coverage

* better sct eq tests

* docs

* technically correct, the most useless kind of correct

* typo and more details

* bug

* drop __eq__
2017-06-04 07:36:58 -10:00
Alex Gaynor
140ec5d6e2 Fixes #2347 -- link to the stdlib secrets module in our random number generation section (#3669) 2017-06-04 05:51:31 -10:00
Paul Kehrer
1a5d70e876 deprecate signer/verifier on asymmetric keys (#3663)
* deprecate signer/verifier on asymmetric keys

* review feedback, switch deprecated_call to work around a bug
2017-06-03 23:11:55 -04:00
Paul Kehrer
26fcc5c24d make signature and verification contexts error better re: prehashed (#3658)
* make signature and verification contexts error better re: prehashed

* code review feedback
2017-06-02 13:51:09 -04:00
Jeroen Ruigrok van der Werven
5f84523b6c FreeBSD 10 and higher use Fortuna, not Yarrow (#3652) 2017-06-01 08:29:16 -04:00
Paul Kehrer
ece3af1aa5 for humans is irritating, let's stop saying it (#3647) 2017-05-30 00:03:10 -04:00
Paul Kehrer
5a284e6ded update the docs with new jenkins CI URL & mac openssl upgrade process (#3639) 2017-05-29 18:09:23 -04:00
Paul Kehrer
0db218e7d8 reorder the primitives list and improve a few titles (#3640) 2017-05-29 18:09:05 -04:00
Fraser Tweedale
d607dd7e5b Enlarge _oid2txt buffer to handle larger OIDs (#3612)
The OpenSSL manual recommends a buffer size of 80 for OBJ_oid2txt:
https://www.openssl.org/docs/crypto/OBJ_nid2ln.html#return_values.
But OIDs longer than this occur in real life (e.g. Active Directory
makes some very long OIDs).  If the length of the stringified OID
exceeds the buffer size, allocate a new buffer that is big enough to
hold the stringified OID, and re-do the conversion into the new
buffer.
2017-05-29 16:33:20 -05:00
Paul Kehrer
7bc36865fc move MACContext to mac.py and eliminate interfaces.py (#3631)
* move MACContext to mac.py and eliminate interfaces.py finally

* improve title

* re-add and deprecate interfaces.MACContext

* use pytest.warns instead of deprecated_call

The pytest docs insist that deprecation warnings are handled differently
and that you should use deprecated_call, but this works so okay then
2017-05-29 11:13:35 -04:00
Paul Kehrer
e10d0d61ca reorganize our toc to look nicer and make more sense (#3632) 2017-05-29 09:49:47 -04:00
Alex Gaynor
aef8ebc988 Ignore linkcheck errors from cryptrec (#3629) 2017-05-28 23:12:30 -05:00
Paul Kehrer
6a10b29ac7 Improve accuracy of install docs page (#3626)
* Improve accuracy of install docs page

* fix line length
2017-05-27 20:32:26 -04:00
Paul Kehrer
afa84f10a2 strongly encourage the use of fernet, document its limitation (#3623) 2017-05-27 16:11:24 -04:00
Paul Kehrer
35acb37330 Modify DH/ECDH examples to be explicit for DHE/ECDHE (#3622)
* Modify DH/ECDH examples to be explicit for DHE/ECDHE

Also add note to DH docs that you should probably use ECDH

* give a reason
2017-05-27 15:58:24 -04:00
Paul Kehrer
f916dfcdbc re-add the why of cryptography to the faq with some small updates (#3621)
* re-add the why of cryptography to the faq with some small updates

* reorder the items a bit
2017-05-27 15:24:28 -04:00
Paul Kehrer
136b324214 add some explicit instructions on determining key type in a cert (#3596)
* add some explicit instructions on determining key type in a cert

* can't call it a CSR
2017-05-24 21:24:54 -05:00
Paul Kehrer
9bab8bd3c0 comma comma comma (#3595) 2017-05-24 18:15:37 -07:00
Alex Gaynor
a9b86905bf Put the exchange method on the correct interface (#3591)
* Put the exchange method on the correct interface

* fixed links in docs
2017-05-24 15:01:14 -07:00
Paul Kehrer
312d75dfde Update the docs to not be redundant and wrong (#3593) 2017-05-24 13:18:02 -07:00
Paul Kehrer
adeaacfa56 allow global suppression of link flags (#3592)
CRYPTOGRAPHY_SUPPRESS_LINK_FLAGS will now suppress link flags regardless
of platform. Additionally, CRYPTOGRAPHY_WINDOWS_LINK_LEGACY_OPENSSL is
now the flag you need if you want to link against < 1.1.0 on windows.
2017-05-24 12:49:18 -07:00
Paul Kehrer
1adb9aa5d4 can we convince people we're pyca/cryptography and not cryptography.io (#3588) 2017-05-23 23:39:07 -07:00
Paul Kehrer
416f526a3d add convenience methods for key_size on EC{Public,Private}Key (#3587) 2017-05-23 23:38:59 -07:00
Paul Kehrer
70e8f90b25 let's deprecate some hashes we should never have exposed (#3584) 2017-05-23 16:55:19 -07:00