<feed xmlns='http://www.w3.org/2005/Atom'>
<title>delta/python-packages/cryptography.git/src/cryptography/x509, branch github-actions-windows</title>
<subtitle>github.com: pyca/cryptography.git
</subtitle>
<link rel='alternate' type='text/html' href='http://91.123.203.49/cgit/delta/python-packages/cryptography.git/'/>
<entry>
<title>Allow NameAttribute.value to be an empty string (#5109)</title>
<updated>2020-03-19T19:23:35+00:00</updated>
<author>
<name>Andrea De Pasquale</name>
<email>447065+adepasquale@users.noreply.github.com</email>
</author>
<published>2020-03-19T19:23:35+00:00</published>
<link rel='alternate' type='text/html' href='http://91.123.203.49/cgit/delta/python-packages/cryptography.git/commit/?id=87b2749c52e688c809f1861e55d958c64147493c'/>
<id>87b2749c52e688c809f1861e55d958c64147493c</id>
<content type='text'>
* Allow NameAttribute.value to be an empty string

RFC 4514 https://tools.ietf.org/html/rfc4514 does not mention that
"AttributeValue" can not be an empty (zero-length) string.

Fixes #5106

* reverse order to match fix from another PR

Co-authored-by: Paul Kehrer &lt;paul.l.kehrer@gmail.com&gt;</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
* Allow NameAttribute.value to be an empty string

RFC 4514 https://tools.ietf.org/html/rfc4514 does not mention that
"AttributeValue" can not be an empty (zero-length) string.

Fixes #5106

* reverse order to match fix from another PR

Co-authored-by: Paul Kehrer &lt;paul.l.kehrer@gmail.com&gt;</pre>
</div>
</content>
</entry>
<entry>
<title>Reversed the order of RDNs in x509.Name.rfc4514_string() (#5120)</title>
<updated>2020-03-03T02:26:07+00:00</updated>
<author>
<name>Thomas Erbesdobler</name>
<email>t.erbesdobler@gmx.de</email>
</author>
<published>2020-03-03T02:26:07+00:00</published>
<link rel='alternate' type='text/html' href='http://91.123.203.49/cgit/delta/python-packages/cryptography.git/commit/?id=ed71c5cc07e4a0bb7a58f4e0731e5af3d4d4aa53'/>
<id>ed71c5cc07e4a0bb7a58f4e0731e5af3d4d4aa53</id>
<content type='text'>
RFC4514 requires in section 2.1 that RDNs are converted to string
representation in reversed order.</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
RFC4514 requires in section 2.1 that RDNs are converted to string
representation in reversed order.</pre>
</div>
</content>
</entry>
<entry>
<title>Use literals for collections and comprehensions. (#5091)</title>
<updated>2020-01-12T22:29:17+00:00</updated>
<author>
<name>Mads Jensen</name>
<email>mje@inducks.org</email>
</author>
<published>2020-01-12T22:29:17+00:00</published>
<link rel='alternate' type='text/html' href='http://91.123.203.49/cgit/delta/python-packages/cryptography.git/commit/?id=a849f40556bd022c7478a44e935359c5fac83193'/>
<id>a849f40556bd022c7478a44e935359c5fac83193</id>
<content type='text'>
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
</pre>
</div>
</content>
</entry>
<entry>
<title>Use dict literals. (#5080)</title>
<updated>2019-12-02T14:02:30+00:00</updated>
<author>
<name>Mads Jensen</name>
<email>mje@inducks.org</email>
</author>
<published>2019-12-02T14:02:30+00:00</published>
<link rel='alternate' type='text/html' href='http://91.123.203.49/cgit/delta/python-packages/cryptography.git/commit/?id=1340c0080c750867297b3f20bbecbad707c18157'/>
<id>1340c0080c750867297b3f20bbecbad707c18157</id>
<content type='text'>
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
</pre>
</div>
</content>
</entry>
<entry>
<title>Parse single_extensions in OCSP responses (#5059)</title>
<updated>2019-11-11T05:40:11+00:00</updated>
<author>
<name>Paul Kehrer</name>
<email>paul.l.kehrer@gmail.com</email>
</author>
<published>2019-11-11T05:40:11+00:00</published>
<link rel='alternate' type='text/html' href='http://91.123.203.49/cgit/delta/python-packages/cryptography.git/commit/?id=2e86983a77d02a38ef0485ebe7ab05c1c98a7685'/>
<id>2e86983a77d02a38ef0485ebe7ab05c1c98a7685</id>
<content type='text'>
* add single_extensions to OCSPResponse (#4753)

* new vector, updateed docs, more stringent parser, changelog, etc

* simplify PR (no SCT for now)

* add a comment

* finish pulling out the sct stuff so tests might actually run
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
* add single_extensions to OCSPResponse (#4753)

* new vector, updateed docs, more stringent parser, changelog, etc

* simplify PR (no SCT for now)

* add a comment

* finish pulling out the sct stuff so tests might actually run
</pre>
</div>
</content>
</entry>
<entry>
<title>Simplify implementing sequence methods (#4987)</title>
<updated>2019-09-09T21:32:59+00:00</updated>
<author>
<name>Alex Gaynor</name>
<email>alex.gaynor@gmail.com</email>
</author>
<published>2019-09-09T21:32:59+00:00</published>
<link rel='alternate' type='text/html' href='http://91.123.203.49/cgit/delta/python-packages/cryptography.git/commit/?id=7b2b3a65800b7c004399da5b3b6f431aa30946cc'/>
<id>7b2b3a65800b7c004399da5b3b6f431aa30946cc</id>
<content type='text'>
* Simplify implementing sequence methods

* flake8
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
* Simplify implementing sequence methods

* flake8
</pre>
</div>
</content>
</entry>
<entry>
<title>Finish ed25519 and ed448 support in x509 module (#4972)</title>
<updated>2019-09-08T23:44:02+00:00</updated>
<author>
<name>Marko Kreen</name>
<email>markokr@gmail.com</email>
</author>
<published>2019-09-08T23:44:02+00:00</published>
<link rel='alternate' type='text/html' href='http://91.123.203.49/cgit/delta/python-packages/cryptography.git/commit/?id=f7c77712d6611dc72cb2ef6fb1fe72fee4ab88de'/>
<id>f7c77712d6611dc72cb2ef6fb1fe72fee4ab88de</id>
<content type='text'>
* Support ed25519 in csr/crl creation

* Tests for ed25519/x509

* Support ed448 in crt/csr/crl creation

* Tests for ed448/x509

* Support ed25519/ed448 in OCSPResponseBuilder

* Tests for eddsa in OCSPResponseBuilder

* Builder check missing in create_x509_csr

* Documentation update for ed25519+ed448 in x509
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
* Support ed25519 in csr/crl creation

* Tests for ed25519/x509

* Support ed448 in crt/csr/crl creation

* Tests for ed448/x509

* Support ed25519/ed448 in OCSPResponseBuilder

* Tests for eddsa in OCSPResponseBuilder

* Builder check missing in create_x509_csr

* Documentation update for ed25519+ed448 in x509
</pre>
</div>
</content>
</entry>
<entry>
<title>Make DER reader into a context manager (#4957)</title>
<updated>2019-07-29T02:58:04+00:00</updated>
<author>
<name>Alex Gaynor</name>
<email>alex.gaynor@gmail.com</email>
</author>
<published>2019-07-29T02:58:04+00:00</published>
<link rel='alternate' type='text/html' href='http://91.123.203.49/cgit/delta/python-packages/cryptography.git/commit/?id=9cd41ac714d9bff819ece6d8cdcde064d403c671'/>
<id>9cd41ac714d9bff819ece6d8cdcde064d403c671</id>
<content type='text'>
* Make DER reader into a context manager

* Added another test case

* flake8
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
* Make DER reader into a context manager

* Added another test case

* flake8
</pre>
</div>
</content>
</entry>
<entry>
<title>Remove asn1crypto dependency (#4941)</title>
<updated>2019-07-28T17:06:40+00:00</updated>
<author>
<name>David Benjamin</name>
<email>davidben@google.com</email>
</author>
<published>2019-07-28T17:06:40+00:00</published>
<link rel='alternate' type='text/html' href='http://91.123.203.49/cgit/delta/python-packages/cryptography.git/commit/?id=2d3b420383fc6aa16675e04caec56ca6b16069a1'/>
<id>2d3b420383fc6aa16675e04caec56ca6b16069a1</id>
<content type='text'>
* Remove non-test dependencies on asn1crypto.

cryptography.io actually contains two OpenSSL bindings right now, the
expected cffi one, and an optional one hidden in asn1crypto. asn1crypto
contains a lot of things that cryptography.io doesn't use, including a
BER parser and a hand-rolled and not constant-time EC implementation.

Instead, check in a much small DER-only parser in cryptography/hazmat. A
quick benchmark suggests this parser is also faster than asn1crypto:

  from __future__ import absolute_import, division, print_function
  import timeit

  print(timeit.timeit(
      "decode_dss_signature(sig)",
      setup=r"""
  from cryptography.hazmat.primitives.asymmetric.utils import decode_dss_signature
  sig=b"\x30\x2d\x02\x15\x00\xb5\xaf\x30\x78\x67\xfb\x8b\x54\x39\x00\x13\xcc\x67\x02\x0d\xdf\x1f\x2c\x0b\x81\x02\x14\x62\x0d\x3b\x22\xab\x50\x31\x44\x0c\x3e\x35\xea\xb6\xf4\x81\x29\x8f\x9e\x9f\x08"
  """,
      number=10000))

Python 2.7:
  asn1crypto: 0.25
  _der.py: 0.098

Python 3.5:
  asn1crypto: 0.17
  _der.py: 0.10

* Remove test dependencies on asn1crypto.

The remaining use of asn1crypto was some sanity-checking of
Certificates. Add a minimal X.509 parser to extract the relevant fields.

* Add a read_single_element helper function.

The outermost read is a little tedious.

* Address flake8 warnings

* Fix test for long-form vs short-form lengths.

Testing a zero length trips both this check and the non-minimal long
form check. Use a one-byte length to cover the missing branch.

* Remove support for negative integers.

These never come up in valid signatures. Note, however, this does
change public API.

* Update src/cryptography/hazmat/primitives/asymmetric/utils.py

Co-Authored-By: Alex Gaynor &lt;alex.gaynor@gmail.com&gt;

* Review comments

* Avoid hardcoding the serialization of NULL in decode_asn1.py too.
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
* Remove non-test dependencies on asn1crypto.

cryptography.io actually contains two OpenSSL bindings right now, the
expected cffi one, and an optional one hidden in asn1crypto. asn1crypto
contains a lot of things that cryptography.io doesn't use, including a
BER parser and a hand-rolled and not constant-time EC implementation.

Instead, check in a much small DER-only parser in cryptography/hazmat. A
quick benchmark suggests this parser is also faster than asn1crypto:

  from __future__ import absolute_import, division, print_function
  import timeit

  print(timeit.timeit(
      "decode_dss_signature(sig)",
      setup=r"""
  from cryptography.hazmat.primitives.asymmetric.utils import decode_dss_signature
  sig=b"\x30\x2d\x02\x15\x00\xb5\xaf\x30\x78\x67\xfb\x8b\x54\x39\x00\x13\xcc\x67\x02\x0d\xdf\x1f\x2c\x0b\x81\x02\x14\x62\x0d\x3b\x22\xab\x50\x31\x44\x0c\x3e\x35\xea\xb6\xf4\x81\x29\x8f\x9e\x9f\x08"
  """,
      number=10000))

Python 2.7:
  asn1crypto: 0.25
  _der.py: 0.098

Python 3.5:
  asn1crypto: 0.17
  _der.py: 0.10

* Remove test dependencies on asn1crypto.

The remaining use of asn1crypto was some sanity-checking of
Certificates. Add a minimal X.509 parser to extract the relevant fields.

* Add a read_single_element helper function.

The outermost read is a little tedious.

* Address flake8 warnings

* Fix test for long-form vs short-form lengths.

Testing a zero length trips both this check and the non-minimal long
form check. Use a one-byte length to cover the missing branch.

* Remove support for negative integers.

These never come up in valid signatures. Note, however, this does
change public API.

* Update src/cryptography/hazmat/primitives/asymmetric/utils.py

Co-Authored-By: Alex Gaynor &lt;alex.gaynor@gmail.com&gt;

* Review comments

* Avoid hardcoding the serialization of NULL in decode_asn1.py too.
</pre>
</div>
</content>
</entry>
<entry>
<title>ed25519 support in x509 certificate builder (#4937)</title>
<updated>2019-07-06T23:01:33+00:00</updated>
<author>
<name>Paul Kehrer</name>
<email>paul.l.kehrer@gmail.com</email>
</author>
<published>2019-07-06T23:01:33+00:00</published>
<link rel='alternate' type='text/html' href='http://91.123.203.49/cgit/delta/python-packages/cryptography.git/commit/?id=7b1391bfd4949140432bd003a8e43e32bfe968c5'/>
<id>7b1391bfd4949140432bd003a8e43e32bfe968c5</id>
<content type='text'>
* ed25519 support in x509 certificate builder

This adds minimal ed25519 support. More to come.

* Apply suggestions from code review

Co-Authored-By: Alex Gaynor &lt;alex.gaynor@gmail.com&gt;
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
* ed25519 support in x509 certificate builder

This adds minimal ed25519 support. More to come.

* Apply suggestions from code review

Co-Authored-By: Alex Gaynor &lt;alex.gaynor@gmail.com&gt;
</pre>
</div>
</content>
</entry>
</feed>
