summaryrefslogtreecommitdiff
path: root/docs
Commit message (Collapse)AuthorAgeFilesLines
* support parsing bitstring values in DNs (#6629)Paul Kehrer2021-11-281-0/+2
| | | | | | | | | | | * support bitstring values in DNs parsing is limited to x500UniqueIdentifier only * Update src/cryptography/x509/name.py Co-authored-by: Alex Gaynor <alex.gaynor@gmail.com> Co-authored-by: Alex Gaynor <alex.gaynor@gmail.com>
* closes #6663 -- deprecate openssl 1.1.0 support (#6667)Alex Gaynor2021-11-281-0/+4
|
* fix: fixed confusing typo on DSA docs (#6662)Natalia Maximo2021-11-271-1/+1
|
* allow parsing of nonstandard country name and jurisdiction country name (#6641)Paul Kehrer2021-11-211-0/+3
| | | | | | The spec requires both of these to be exactly two characters to correspond with ISO country codes. Reality is sometimes messier, so this allows parsing (but not encoding) of this invalid data. Parsing will raise a UserWarning if incorrect lengths are detected.
* Update fernet docs to use latest Django recommendations (#6611)April King2021-11-161-4/+4
| | | | | * Update fernet docs to use latest Django recommendations * Err, remember how RST works
* add AES SIV vectors (#6608)Paul Kehrer2021-11-151-0/+2
|
* OCB3 support (#6607)Paul Kehrer2021-11-141-0/+72
| | | | | * OCB3 support in aead package * improve comment
* add AES OCB3 test vectors (#6606)Paul Kehrer2021-11-151-0/+1
|
* support attributes on csrs with an iterable (#6603)Paul Kehrer2021-11-141-9/+46
|
* Allow parsing CSR extensions with the critical bit having an explicitly ↵Alex Gaynor2021-11-141-0/+2
| | | | | | | encoded default (#6600) * Allow parsing CSR extensions with the critical bit having an explicitly encoded default * Poke for zuul
* Mention LibreSSL and BoringSSL in our installation docs (#6597)Alex Gaynor2021-11-131-0/+3
|
* boring changelog (#6595)Paul Kehrer2021-11-121-0/+1
|
* Allow to serialize extension values as DER bytes strings (#6346)Felix Fontein2021-11-121-0/+8
| | | | | * Allow to serialize extension values as DER bytes string. * Prepare test for SignedCertificateTimestamps.
* allow x25519/x448 public keys in certificatebuilder (#6562)Paul Kehrer2021-11-071-4/+8
| | | | also document that we can return these key types in a certificate, although they can't be self-signed of course
* allow multiple identical pem blocks (#6551)Paul Kehrer2021-11-051-2/+2
| | | | | this matches our behavior to OpenSSL and allows users to pass a chain to our PEM loaders. To make this a little less magical it is now documented.
* deprecate backend part 6 of n (#6524)Paul Kehrer2021-11-035-699/+15
|
* some installation doc improvements (#6525)Paul Kehrer2021-11-031-25/+4
|
* deprecate backend part 5 of n (#6523)Paul Kehrer2021-11-031-14/+2
| | | | | * deprecate backend part 5 of n * remove doc8
* deprecate backend part 4 of n (#6522)Paul Kehrer2021-11-029-204/+41
|
* deprecate backend part 3 of n (#6521)Paul Kehrer2021-11-025-134/+42
| | | finish the asymmetric docs
* deprecate backend part 2 of n (#6518)Paul Kehrer2021-11-022-19/+19
|
* deprecate backend part 1 of n (#6517)Paul Kehrer2021-11-028-19/+6
| | | | * update all custom vector generation scripts to not use backends * remove references to backends in test-vectors.rst
* Allow custom attribute shortnames in rfc4514_string (#6490)Marti Raudsepp2021-11-011-5/+53
| | | | | | | | | | | | | `rfc4514_string()` and related methods now have an optional `attr_name_overrides` parameter to supply custom OID to name mappings, which can be used to match vendor-specific extensions. **BACKWARDS INCOMPATIBLE:** Reverted the nonstandard formatting of email address fields as `E` in `rfc4514_string()` methods from version 35.0. The previous behavior can be restored with: `name.rfc4514_string({NameOID.EMAIL_ADDRESS: "E"})` Expanded documentation of `Name.rfc4514_string`.
* add accvraiz1 bmpstring test vector (#6503)Paul Kehrer2021-10-311-0/+2
|
* Convert CRL creation to Rust (#6496)Alex Gaynor2021-10-311-20/+0
| | | | | | | | | | | * Convert CRL creation to Rust * fixes * small reflows * Delete all teh code * flake8
* Convert CSR creation to Rust (#6495)Alex Gaynor2021-10-311-22/+0
| | | | | | | | | * Convert CSR creation to Rust * put this back * unused * coverage
* remove docs for removed backend methods (#6493)Alex Gaynor2021-10-291-26/+0
|
* Convert x.509 certificate generation to Rust (#6479)Alex Gaynor2021-10-291-19/+0
| | | | | | | | | | | * Convert x.509 certificate generation to Rust * flake8 * Coverage shenangins * moar hashes * moar hashes
* fixes #6486 -- update the bounds on how much data AEADs can handle (#6488)Alex Gaynor2021-10-281-3/+3
|
* add two additional DSA signature algorithm oids & test dsa_with_sha224 (#6483)Paul Kehrer2021-10-261-0/+14
|
* Ban cffi version that makes CI sad (#6418)Alex Gaynor2021-10-171-2/+2
| | | | | | | | | * Update installation for testing against bookworm * Try bumping macOS timeout * Try pinning cffi * Ban 1.15.0
* fixes #6391 -- link AWS's lamba docs (#6394)Alex Gaynor2021-10-101-0/+9
|
* PKCS12: return 'friendly name' with PKCS12KeyAndCertificates API (#6348)Felix Fontein2021-10-061-0/+60
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | * Propose a new load_key_and_certificates_with_name API to return the PKCS12 'friendly name' as well. * Extend load_key_and_certificates_with_name to return friendly names for all certificates; add serialize_key_and_certificates_with_names; add X509_alias_set1 to cffi; add basic tests for all these. * Add changelog entry and documentation. * Revert "Extend load_key_and_certificates_with_name to return friendly names for all certificates; add serialize_key_and_certificates_with_names; add X509_alias_set1 to cffi; add basic tests for all these." This reverts commit 125935e8cf1d27028c5b593bb058e2716311fd72. * Create new interface. * Rename load_key_and_certificates_object -> load_pkcs12. * Add constructor validation, improve repr tests. * Mention '... or None'. * Allow all private key types. * Fix/improve tests. * Ignore type errors when intentionally passing wrong types. * Fix type; linting. * Use correct ignore.
* Add new PKCS12 test vectors (#6383)Felix Fontein2021-10-061-0/+102
| | | | | | | * Add new PKCS12 test vectors for #6348. * Re-create test certs without DSA. * Forgot to adjust the docs.
* Accept combined PEM files with multiple sections (#6365)Maximilian Hils2021-10-031-0/+4
| | | | | * accept combined PEM files with multiple sections * pass error messages into `find_in_pem`
* Replace broken viewcode with linkcode in doc (#6207)gpotter22021-10-033-2/+111
|
* support legacy PEM headers for certificate and CSR (#6356)Paul Kehrer2021-10-021-0/+5
|
* Improve changelog for cryptography.x509 changes (#6326)Alex Gaynor2021-09-291-0/+2
| | | | | | | | | | | * Improve changelog for cryptography.x509 changes * Update CHANGELOG.rst * Update CHANGELOG.rst * Update CHANGELOG.rst * this is a word
* add new x509 request vector (#6313)Paul Kehrer2021-09-271-0/+3
|
* add several OCSP response vectors (#6298)Paul Kehrer2021-09-231-0/+6
| | | | | * add several OCSP response vectors * fix naming
* add faq entry about why rust (#6290)Paul Kehrer2021-09-192-0/+14
| | | | | * add faq entry about why rust * de facto isn't misspelled
* Migrate CRL implementation to Rust (#6276)Alex Gaynor2021-09-201-1/+1
| | | (Lots of commits that got squashed)
* musllinux ftw (#6285)Nathaniel J. Smith2021-09-191-5/+5
| | | | | * musllinux ftw * appease the spellchecker
* Don't internal error on CRL with no nextUpdate value (#6282)Alex Gaynor2021-09-191-0/+2
| | | | | | | * Don't internal error on CRL with no nextUpdate value * Fix typing * docs
* per discussion in #6236 (#6254)John Jones2021-09-192-17/+15
|
* add vector omitting optional ASN.1 SEQUENCE for an empty CRL (#6279)Paul Kehrer2021-09-181-0/+2
|
* add more eku oids (#6271)Paul Kehrer2021-09-122-0/+18
| | | | | | | * add more eku oids fixes #5892 * kerberos is a word in our world
* updated installation docs to reflect what we test on (#6265)Alex Gaynor2021-09-071-2/+4
|
* Make OAEP test vector generating works on python3 (#6255)match man2021-09-061-20/+20
| | | | | Use always string as output format Co-authored-by: Baofeng Wang <baofeng.wang67@gmail.com>
* Implement KBKDFCMAC (#6181)kjackiewicz2021-09-031-0/+137
| | | | | | | | | | | | | | | | | | | * Implement KBKDFCMAC Also adjust KBKDFHMAC to avoid code duplication. * Add KBKDFCMAC unit tests * Enable KBKDFCMAC vector tests * Fix doc8 too long line issue in changelog Adding bullet list entries after line 30 in the CHANGELOG.rst leads to doc8 D001 error in line 30. Looks like a doc8 bug. Breaking the line in the middle of the cross-reference solves the problem for now. Also replace the trailing comma with a dot. * Add KBKDFCMAC documentation and update changelog