summaryrefslogtreecommitdiff
path: root/CHANGELOG.rst
Commit message (Collapse)AuthorAgeFilesLines
...
* Reopen master for 19.1 (#810)Alex Gaynor2019-01-211-0/+24
|
* release 19.0.0 (#808)19.0.0Paul Kehrer2019-01-211-1/+1
|
* changelog and call it 19 now (#807)Paul Kehrer2019-01-211-2/+6
|
* X509Store.add_cert no longer raises an error on duplicate cert (#787)Paul Kehrer2018-08-231-1/+2
| | | | | | * X509Store.add_cert no longer raises an error on duplicate cert * move changelog entry
* reopen master for 18.1 (#761)Paul Kehrer2018-05-161-0/+24
| | | | | | * reopen master for 18.1 * there are four dashes
* 18.0.0 release time (#760)18.0.0Paul Kehrer2018-05-161-1/+1
|
* Add Connection.get_certificate method (#733)Jeremy Lainé2018-05-161-0/+2
| | | | | | | | This makes it possible to retrieve the local certificate (if any) for a Connection. An example where this is useful is when negotiating a DTLS-SRTP connection, the fingerprint of the local certificate needs to be communicated to the remote party out-of-band via SDP.
* Add Context.set_tlsext_use_srtp (#734)Jeremy Lainé2018-05-161-0/+2
| | | | This allows negotiating SRTP keying material, which is useful when using DTLS-SRTP, as WebRTC does for example.
* Always enable auto retry (#753)Paul Kehrer2018-05-141-2/+3
| | | | | | | | | | | | * test using auto retry * add/update changelog and add comment * wordsmithing * Update CHANGELOG.rst * Update CHANGELOG.rst
* Make the changelog consistent (#754)Alex Gaynor2018-05-141-3/+3
|
* Raise minimum cryptography version to 2.2.1, drop python 2.6 (#742)Jeremy Lainé2018-03-211-1/+2
|
* open for 17.6.0 (#727)Paul Kehrer2017-12-011-0/+24
|
* 17.5.0 version bump (#726)17.5.0Paul Kehrer2017-11-301-1/+1
|
* Export keying material support (#725)Paul Kehrer2017-11-301-0/+2
| | | | | | | | | | | | | | * added method to export keying material from an ssl connection * updated tests to use bytestrings to avoid breaking python3 tests * added additional comments to test * simplify export_keying_material * add changelog * address review feedback
* fix a memory leak and a potential UAF and also #722 (#723)Paul Kehrer2017-11-301-3/+3
| | | | | | | | * fix a memory leak and a potential UAF and also #722 * sanity check * bump cryptography minimum version, add changelog
* reopen master (#718)Paul Kehrer2017-11-211-0/+26
|
* bump to 17.4.0 (#714)17.4.0Paul Kehrer2017-11-211-1/+1
|
* restore a subset of the rand module (#708)Paul Kehrer2017-11-201-0/+3
| | | | | | | | | | * restore a subset of the rand module * flake * remove cleanup, go ahead and assume status will always be 1 * lighten and add power
* Don't use things after they're freed...duh (#709)Alex Gaynor2017-11-201-1/+2
| | | | | | | | * Don't use things after they're freed...duh * changelog * more details
* 17.4.0.dev0 bump (#694)Paul Kehrer2017-09-131-0/+24
|
* bump version and update changelog (#693)17.3.0Paul Kehrer2017-09-131-2/+5
| | | | | | | | * bump version and update changelog * add changelog entries for the memory leak fixes * backticks
* Delete rand.py (#675)Alex Gaynor2017-07-251-0/+4
|
* Drop py33 (#677)Alex Gaynor2017-07-251-1/+2
|
* Fixes #655 -- deprecate OpenSSL.tsafe (#673)Alex Gaynor2017-07-221-2/+2
| | | | | | * Fixes #655 -- deprecate OpenSSL.tsafe * changelog
* Start new release cycle (#672)Hynek Schlawack2017-07-201-0/+25
|
* Prepare 17.2.0 (#671)17.2.0Hynek Schlawack2017-07-201-1/+1
| | | | | | * Fix version * Prepare 17.2.0
* (EC)DSA signature fix (#670)Paul Kehrer2017-07-201-0/+2
| | | | | | | | | | | | | * Write a test - signatures with EC keys (#609) * Ask for signature length before allocating a buffer. This fixes a potential heap buffer overflow that may happen when a signature is longer than the private key, as with X9.62 ECDSA (#609). * change approach to EVP_PKEY_size and add changelog * add a small assert
* Bend some recent changes to standards (#669)Hynek Schlawack2017-07-201-4/+1
|
* fix #664 (#665)Paul Kehrer2017-07-191-0/+4
| | | | | | | | | | | | * fix #664 bytes and strings are different things. * update changelog * let's just make the sentinel values byte strings * flake8
* Fixed #631 -- deprecate all of OpenSSL.rand (#658)Alex Gaynor2017-07-061-1/+2
| | | | | | | | * Fixed #631 -- deprecate all of OpenSSL.rand * syntax fix * flake8
* Start new release cycle (#654)Hynek Schlawack2017-06-301-0/+25
|
* Prepare 17.1 (#653)17.1.0Hynek Schlawack2017-06-301-2/+2
| | | | | | * Prepare 17.1.0 * Fix changelog markup
* Removed the deprecated md5 default on CRL.export() (#652)Alex Gaynor2017-06-301-0/+3
| | | | | | | | | | | | | | * Removed the deprecated md5 default on CRL.export() * Doh * unused import * fixed tests * last one * py3k!!!!!
* Bend CHANGELOG.rst to our shape (#651)Hynek Schlawack2017-06-301-9/+13
| | | Add semantic newlines and parens that make functions and methods more obvious.
* try loading trusted certs from a list of fallbacks (#633)Paul Kehrer2017-06-291-0/+1
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | * try loading trusted certs from a list of fallbacks pyca/cryptography will shortly begin shipping a wheel. Since SSL_CTX_set_default_verify_paths uses a hardcoded path compiled into the library, this will start failing to load the proper certificates for users on many linux distributions. To avoid this we can use the Go solution of iterating over a list of potential candidates and loading it when found. * capath is lazy loaded so we need to do a lot more checks This now checks to see if env vars are set as well as seeing if the dir exists and has valid certs in it. If either of those are true (or the number of certs is > 0) it won't load the fallback. If it does do the fallback it will also attempt to load certs from a dir as a final fallback * remove an early return * this shouldn't be commented out * oops * very limited testing * sigh, can't use these py3 exceptions of course * expand the tests a bit * coverage! * don't need this now * change the approach to use a pyca/cryptography guard value * test fix * older python sometimes calls itself linux2 * flake8 * add changelog * coverage * slash opt
* add to_cryptography/from_cryptography on CRL and X509Req (#645)Paul Kehrer2017-06-291-0/+1
| | | | | | * add to_cryptography/from_cryptography on CRL and X509Req * add changelog entry
* Fixed #486 -- deprecate the backwards compat names (#643)Alex Gaynor2017-06-291-1/+2
| | | | | | | | * Fixed #486 -- deprecate the backwards compat names * remove the docs for these, pretend they don't exist * CHANGELOG
* Added an API for converting X509 to/from cryptography (#640)Alex Gaynor2017-06-251-0/+1
| | | | | | * Added an API for converting X509 to/from cryptography * changelog
* update docs and and changelog for #612 (#639)Paul Kehrer2017-06-211-0/+5
| | | | | | | | * update docs and and changelog for #612 * update changelog * more detail
* Drop the deprecated rand.egd function (#630)Alex Gaynor2017-05-311-1/+3
| | | | | | | | | | | | | | * Drop the deprecated rand.egd function * Removed egd tests * Removed egd docs * Document the removal * unused imports * Update CHANGELOG.rst
* Add an informative __main__.py (#620)Hynek Schlawack2017-05-131-1/+2
| | | | | | | | | | | | | | | | | | | | | | * Add an informative __main__.py Give users an easy way to figure out what versions they're running. * Why not more info! * Add test * No empty last line * Make @alex happy * DIAF Python 2.6 * Add cffi's version * Make debug a module * Add cryptography's compile-time OpenSSL
* Start new release cycle (#618)Hynek Schlawack2017-04-201-0/+25
|
* Prepare 17.0.0 (#617)Hynek Schlawack2017-04-201-1/+1
|
* Prepare for 17.0.0 (#615)Hynek Schlawack2017-04-201-2/+2
| | | | | | | | * Prepare for 17.0.0 Fix a bunch URLs and account for the non-existance of 16.3. * Fix codecov link
* Prevent _PassphraseHelper.raise_if_problem() from eating exceptions (#581)Greg Bowser2017-01-251-0/+2
| | | | | | | | | | | | | | | | | | | | | | | * Modify tests to detect empty crypto.Errors from load_privatekey This reproduces #119 and #456. * Prevent _PassphraseHelper.raise_if_problem() from eating exceptions. This resolves #119, resolves #456. `_PassphraseHelper.raise_if_problem()` always flushes the OpenSSL exception queue, but does not always raise an exception. In some cases, other code attempts to raise an error from OpenSSL after `raise_if_problem()` has flushed the queue, thus causing an empty exception to be raised (i.e. `raise Error([])`). This commit modifies `_PassphraseHelper.raise_if_problem` to flush the OpenSSL error queue only if it has en exception to raise. Subsequent code that detects an error should now be able to raise an non-empty exception. * Add CHANGELOG entry for #581.
* Link to PR #580 in changelog. (#590)Cory Benfield2017-01-241-0/+1
|
* Add support for OCSP stapling. (#580)Cory Benfield2017-01-241-0/+4
| | | | | | | | | | | | | | | | | | | | | | | | * Define the OCSPCallbackHelper. * Define set_ocsp_status_callback function. * Reframe this as the "server" helper. * Add OCSP helper. * Allow clients to request OCSP * Some tests for OCSP. * Don't forget to throw callback errors. * Add changelog entry for OCSP stapling. * Require at least cryptography 1.7 * Sorry Flake8, won't happen again. * How does spelling work?
* automatically set SSL_CTX_set_ecdh_auto when available (#575)Paul Kehrer2016-12-191-0/+2
|
* Don't zero memory when we don't have to. (#578)Cory Benfield2016-11-281-0/+4
|
* Add the ability to set a custom verification time on X509Store (#567)Thomas Sileo2016-11-221-1/+2
|