<feed xmlns='http://www.w3.org/2005/Atom'>
<title>delta/python-packages/cryptography.git/src/cryptography/hazmat/backends, branch github-actions-windows</title>
<subtitle>github.com: pyca/cryptography.git
</subtitle>
<link rel='alternate' type='text/html' href='http://91.123.203.49/cgit/delta/python-packages/cryptography.git/'/>
<entry>
<title>Use literals for collections and comprehensions. (#5091)</title>
<updated>2020-01-12T22:29:17+00:00</updated>
<author>
<name>Mads Jensen</name>
<email>mje@inducks.org</email>
</author>
<published>2020-01-12T22:29:17+00:00</published>
<link rel='alternate' type='text/html' href='http://91.123.203.49/cgit/delta/python-packages/cryptography.git/commit/?id=a849f40556bd022c7478a44e935359c5fac83193'/>
<id>a849f40556bd022c7478a44e935359c5fac83193</id>
<content type='text'>
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
</pre>
</div>
</content>
</entry>
<entry>
<title>Fixes #5065 -- skip serialization tests which use RC2 if OpenSSL doesn't have RC2 (#5072)</title>
<updated>2019-11-24T23:16:14+00:00</updated>
<author>
<name>Alex Gaynor</name>
<email>alex.gaynor@gmail.com</email>
</author>
<published>2019-11-24T23:16:14+00:00</published>
<link rel='alternate' type='text/html' href='http://91.123.203.49/cgit/delta/python-packages/cryptography.git/commit/?id=aa7c2992c91ea90dc967e6acc6b2fb190aed0000'/>
<id>aa7c2992c91ea90dc967e6acc6b2fb190aed0000</id>
<content type='text'>
* Refs #5065 -- have a CI job with OpenSSL built with no-rc2

* Fixes #5065 -- skip serialization tests which use RC2 if OpenSSL doesn't have RC2
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
* Refs #5065 -- have a CI job with OpenSSL built with no-rc2

* Fixes #5065 -- skip serialization tests which use RC2 if OpenSSL doesn't have RC2
</pre>
</div>
</content>
</entry>
<entry>
<title>Parse single_extensions in OCSP responses (#5059)</title>
<updated>2019-11-11T05:40:11+00:00</updated>
<author>
<name>Paul Kehrer</name>
<email>paul.l.kehrer@gmail.com</email>
</author>
<published>2019-11-11T05:40:11+00:00</published>
<link rel='alternate' type='text/html' href='http://91.123.203.49/cgit/delta/python-packages/cryptography.git/commit/?id=2e86983a77d02a38ef0485ebe7ab05c1c98a7685'/>
<id>2e86983a77d02a38ef0485ebe7ab05c1c98a7685</id>
<content type='text'>
* add single_extensions to OCSPResponse (#4753)

* new vector, updateed docs, more stringent parser, changelog, etc

* simplify PR (no SCT for now)

* add a comment

* finish pulling out the sct stuff so tests might actually run
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
* add single_extensions to OCSPResponse (#4753)

* new vector, updateed docs, more stringent parser, changelog, etc

* simplify PR (no SCT for now)

* add a comment

* finish pulling out the sct stuff so tests might actually run
</pre>
</div>
</content>
</entry>
<entry>
<title>Deal with the 2.5 deprecations (#5048)</title>
<updated>2019-11-03T05:47:13+00:00</updated>
<author>
<name>Alex Gaynor</name>
<email>alex.gaynor@gmail.com</email>
</author>
<published>2019-11-03T05:47:13+00:00</published>
<link rel='alternate' type='text/html' href='http://91.123.203.49/cgit/delta/python-packages/cryptography.git/commit/?id=9668b000326585339267a42176facd9ff81481ee'/>
<id>9668b000326585339267a42176facd9ff81481ee</id>
<content type='text'>
* Deal with the 2.5 deprecations

* pep8 + test fixes

* docs typo

* Why did I do this?

* typo
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
* Deal with the 2.5 deprecations

* pep8 + test fixes

* docs typo

* Why did I do this?

* typo
</pre>
</div>
</content>
</entry>
<entry>
<title>UniversalString needs to be encoded as UCS-4 (#5000)</title>
<updated>2019-10-17T01:07:56+00:00</updated>
<author>
<name>Marko Kreen</name>
<email>markokr@gmail.com</email>
</author>
<published>2019-10-17T01:07:56+00:00</published>
<link rel='alternate' type='text/html' href='http://91.123.203.49/cgit/delta/python-packages/cryptography.git/commit/?id=16d3ae1b8e96b4c112c0f17911b5d14f0ed20385'/>
<id>16d3ae1b8e96b4c112c0f17911b5d14f0ed20385</id>
<content type='text'>
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
</pre>
</div>
</content>
</entry>
<entry>
<title>update openssls (#4995)</title>
<updated>2019-10-16T03:51:09+00:00</updated>
<author>
<name>Paul Kehrer</name>
<email>paul.l.kehrer@gmail.com</email>
</author>
<published>2019-10-16T03:51:09+00:00</published>
<link rel='alternate' type='text/html' href='http://91.123.203.49/cgit/delta/python-packages/cryptography.git/commit/?id=9c759d08870d972f1d84e8543130bfb26be4e442'/>
<id>9c759d08870d972f1d84e8543130bfb26be4e442</id>
<content type='text'>
* update openssls

* missed one

* what will this do

* only do this check for 1.1.0+
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
* update openssls

* missed one

* what will this do

* only do this check for 1.1.0+
</pre>
</div>
</content>
</entry>
<entry>
<title>Finish ed25519 and ed448 support in x509 module (#4972)</title>
<updated>2019-09-08T23:44:02+00:00</updated>
<author>
<name>Marko Kreen</name>
<email>markokr@gmail.com</email>
</author>
<published>2019-09-08T23:44:02+00:00</published>
<link rel='alternate' type='text/html' href='http://91.123.203.49/cgit/delta/python-packages/cryptography.git/commit/?id=f7c77712d6611dc72cb2ef6fb1fe72fee4ab88de'/>
<id>f7c77712d6611dc72cb2ef6fb1fe72fee4ab88de</id>
<content type='text'>
* Support ed25519 in csr/crl creation

* Tests for ed25519/x509

* Support ed448 in crt/csr/crl creation

* Tests for ed448/x509

* Support ed25519/ed448 in OCSPResponseBuilder

* Tests for eddsa in OCSPResponseBuilder

* Builder check missing in create_x509_csr

* Documentation update for ed25519+ed448 in x509
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
* Support ed25519 in csr/crl creation

* Tests for ed25519/x509

* Support ed448 in crt/csr/crl creation

* Tests for ed448/x509

* Support ed25519/ed448 in OCSPResponseBuilder

* Tests for eddsa in OCSPResponseBuilder

* Builder check missing in create_x509_csr

* Documentation update for ed25519+ed448 in x509
</pre>
</div>
</content>
</entry>
<entry>
<title>be clear that NoEncryption must be an instance in the exception (#4985)</title>
<updated>2019-09-07T13:40:00+00:00</updated>
<author>
<name>Paul Kehrer</name>
<email>paul.l.kehrer@gmail.com</email>
</author>
<published>2019-09-07T13:40:00+00:00</published>
<link rel='alternate' type='text/html' href='http://91.123.203.49/cgit/delta/python-packages/cryptography.git/commit/?id=c918fef88670fc46433d3edd91957231c654ff05'/>
<id>c918fef88670fc46433d3edd91957231c654ff05</id>
<content type='text'>
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
</pre>
</div>
</content>
</entry>
<entry>
<title>Allow FreshestCRL extension in CRL (#4975)</title>
<updated>2019-09-07T07:32:13+00:00</updated>
<author>
<name>Marko Kreen</name>
<email>markokr@gmail.com</email>
</author>
<published>2019-09-07T07:32:13+00:00</published>
<link rel='alternate' type='text/html' href='http://91.123.203.49/cgit/delta/python-packages/cryptography.git/commit/?id=202f5675b246764461d40725abab704495e0dba2'/>
<id>202f5675b246764461d40725abab704495e0dba2</id>
<content type='text'>
Per RFC5280 it is allowed in both certificates and CRL-s.</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Per RFC5280 it is allowed in both certificates and CRL-s.</pre>
</div>
</content>
</entry>
<entry>
<title>Remove asn1crypto dependency (#4941)</title>
<updated>2019-07-28T17:06:40+00:00</updated>
<author>
<name>David Benjamin</name>
<email>davidben@google.com</email>
</author>
<published>2019-07-28T17:06:40+00:00</published>
<link rel='alternate' type='text/html' href='http://91.123.203.49/cgit/delta/python-packages/cryptography.git/commit/?id=2d3b420383fc6aa16675e04caec56ca6b16069a1'/>
<id>2d3b420383fc6aa16675e04caec56ca6b16069a1</id>
<content type='text'>
* Remove non-test dependencies on asn1crypto.

cryptography.io actually contains two OpenSSL bindings right now, the
expected cffi one, and an optional one hidden in asn1crypto. asn1crypto
contains a lot of things that cryptography.io doesn't use, including a
BER parser and a hand-rolled and not constant-time EC implementation.

Instead, check in a much small DER-only parser in cryptography/hazmat. A
quick benchmark suggests this parser is also faster than asn1crypto:

  from __future__ import absolute_import, division, print_function
  import timeit

  print(timeit.timeit(
      "decode_dss_signature(sig)",
      setup=r"""
  from cryptography.hazmat.primitives.asymmetric.utils import decode_dss_signature
  sig=b"\x30\x2d\x02\x15\x00\xb5\xaf\x30\x78\x67\xfb\x8b\x54\x39\x00\x13\xcc\x67\x02\x0d\xdf\x1f\x2c\x0b\x81\x02\x14\x62\x0d\x3b\x22\xab\x50\x31\x44\x0c\x3e\x35\xea\xb6\xf4\x81\x29\x8f\x9e\x9f\x08"
  """,
      number=10000))

Python 2.7:
  asn1crypto: 0.25
  _der.py: 0.098

Python 3.5:
  asn1crypto: 0.17
  _der.py: 0.10

* Remove test dependencies on asn1crypto.

The remaining use of asn1crypto was some sanity-checking of
Certificates. Add a minimal X.509 parser to extract the relevant fields.

* Add a read_single_element helper function.

The outermost read is a little tedious.

* Address flake8 warnings

* Fix test for long-form vs short-form lengths.

Testing a zero length trips both this check and the non-minimal long
form check. Use a one-byte length to cover the missing branch.

* Remove support for negative integers.

These never come up in valid signatures. Note, however, this does
change public API.

* Update src/cryptography/hazmat/primitives/asymmetric/utils.py

Co-Authored-By: Alex Gaynor &lt;alex.gaynor@gmail.com&gt;

* Review comments

* Avoid hardcoding the serialization of NULL in decode_asn1.py too.
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
* Remove non-test dependencies on asn1crypto.

cryptography.io actually contains two OpenSSL bindings right now, the
expected cffi one, and an optional one hidden in asn1crypto. asn1crypto
contains a lot of things that cryptography.io doesn't use, including a
BER parser and a hand-rolled and not constant-time EC implementation.

Instead, check in a much small DER-only parser in cryptography/hazmat. A
quick benchmark suggests this parser is also faster than asn1crypto:

  from __future__ import absolute_import, division, print_function
  import timeit

  print(timeit.timeit(
      "decode_dss_signature(sig)",
      setup=r"""
  from cryptography.hazmat.primitives.asymmetric.utils import decode_dss_signature
  sig=b"\x30\x2d\x02\x15\x00\xb5\xaf\x30\x78\x67\xfb\x8b\x54\x39\x00\x13\xcc\x67\x02\x0d\xdf\x1f\x2c\x0b\x81\x02\x14\x62\x0d\x3b\x22\xab\x50\x31\x44\x0c\x3e\x35\xea\xb6\xf4\x81\x29\x8f\x9e\x9f\x08"
  """,
      number=10000))

Python 2.7:
  asn1crypto: 0.25
  _der.py: 0.098

Python 3.5:
  asn1crypto: 0.17
  _der.py: 0.10

* Remove test dependencies on asn1crypto.

The remaining use of asn1crypto was some sanity-checking of
Certificates. Add a minimal X.509 parser to extract the relevant fields.

* Add a read_single_element helper function.

The outermost read is a little tedious.

* Address flake8 warnings

* Fix test for long-form vs short-form lengths.

Testing a zero length trips both this check and the non-minimal long
form check. Use a one-byte length to cover the missing branch.

* Remove support for negative integers.

These never come up in valid signatures. Note, however, this does
change public API.

* Update src/cryptography/hazmat/primitives/asymmetric/utils.py

Co-Authored-By: Alex Gaynor &lt;alex.gaynor@gmail.com&gt;

* Review comments

* Avoid hardcoding the serialization of NULL in decode_asn1.py too.
</pre>
</div>
</content>
</entry>
</feed>
