summaryrefslogtreecommitdiff
path: root/src
Commit message (Collapse)AuthorAgeFilesLines
...
* Remove dead code (#1068)Alex Gaynor2021-12-201-7/+0
|
* Accept pathlib.Path as a valid path (#1027)Salvo 'LtWorf' Tomaselli2021-12-191-7/+8
| | | | | And also whatever supports the protocol. Way more pythonic now!
* Remove call to init_static_locks (#1066)Alex Gaynor2021-12-151-1/+0
| | | It has been a no-op (when called from an _instance_ of Binding) since 3.3
* Remove some more py27-isms (#1062)Alex Gaynor2021-11-241-1/+1
|
* use more functions guaranteed available in cryptography 35.0 (#1060)Paul Kehrer2021-11-041-10/+10
| | | | | * use more functions guaranteed available in cryptography 35.0 * these are also guaranteed
* remove SSL_CTX_set_ecdh_auto call (#1059)Paul Kehrer2021-11-031-6/+0
| | | | They are a noop on 1.1.0+ and pyOpenSSL only supports 1.1.0+ now due to cryptography versions
* Expose some DTLS-related features (#1026)Nathaniel J. Smith2021-11-021-1/+134
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | * Expose DTLS_METHOD and friends * Expose OP_NO_RENEGOTIATION * Expose DTLS MTU-related functions * Expose DTLSv1_listen and associated callbacks * Add a basic DTLS test * Cope with old versions of openssl/libressl * blacken * Soothe flake8 * Add temporary hack to skip DTLS test on old cryptography versions * Update for cryptography v35 release * Add changelog entry * Fix versionadded:: * get_cleartext_mtu doesn't exist on decrepit old openssl * Rewrite DTLS test to work around stupid OpenSSL misbehavior * flake8 go away * minor tidying
* Check for invalid ALPN lists before calling OpenSSL, for consistency (#1056)Nathaniel J. Smith2021-10-271-0/+12
| | | | | | | * Check for invalid ALPN lists before calling OpenSSL, for consistency Fixes gh-1043 * Soothe flake8
* py27 going, going, gone (#1047)Paul Kehrer2021-10-043-69/+43
| | | | | | | | | | | * py27 going, going, gone * black * more black * ok then * forgot to remove pypy2
* reopen main for 21.1 dev (#1042)Paul Kehrer2021-09-281-1/+1
|
* 21.0.0 release (#1041)21.0.0Paul Kehrer2021-09-281-1/+1
|
* use public interfaces for all cryptography<->pyopenssl translations (#1030)Paul Kehrer2021-07-251-26/+50
|
* add `NO_OVERLAPPING_PROTOCOLS` to `__all__` (#1025)Maximilian Hils2021-06-301-0/+1
|
* Add SSL_CTX_set_min_proto_version/SSL_CTX_set_max_proto_version bindings (#985)Maximilian Hils2021-03-101-2/+58
| | | | | | | | | | | | | | | | | | | * add Context.set_*_proto_version, fix #860 * docs: add new openssl tls methods * accept the fact that nothing can be taken for granted * bump minimum required cryptography version to 3.3 * drop support for Python 3.5 * use binary wheels for cryptography * Revert "use binary wheels for cryptography" This reverts commit 91a04c612ed1d0dd9fd541dfefe21cac7c25b1c1. * docker ci: compile cryptography with rust
* remove CB_ISSUER_CHECK (#982)Rosen Penev2021-02-201-1/+0
| | | | | Deprecated under OpenSSL 1.1 Signed-off-by: Rosen Penev <rosenp@gmail.com>
* Check return code of SSL_[CTX_]set_alpn_protos (#993)Maximilian Hils2021-02-171-2/+19
| | | | | | | * check return code of SSL_CTX_set_alpn_protos, fix #992 * paint it black! * fix line lengths as well :upside_down_face:
* cleanup from_buffer now that we just use cffi natively (#989)masterAlex Gaynor2021-01-162-7/+3
|
* reopen master for dev (#980)Paul Kehrer2020-12-151-1/+1
|
* Prepare for 20.0.1 release (#979)20.0.1Alex Gaynor2020-12-151-1/+1
|
* Fix for running on OpenSSL 1.1.0 + CI (#978)Alex Gaynor2020-12-141-1/+4
| | | | | | | * Test on OpenSSL 1.1.0 w/ Debian stretch * Make pyOpenSSL compatible with openssl 1.1.0 again Co-authored-by: Shane Harvey <shnhrv@gmail.com>
* reopen master for next dev cycle (#969)Paul Kehrer2020-11-271-1/+1
|
* 20.0.0 before 2020 is even over (#968)20.0.0Paul Kehrer2020-11-271-2/+2
|
* fix a memleak (#967)Paul Kehrer2020-11-271-1/+12
| | | | | * fix a memleak * black
* Keep reference to SSL verify_call in Connection object (#956)Arne Schwabe2020-11-271-0/+6
| | | | | | | | | | | | | | * Keep reference to SSL verify_call in Connection object If a set_verify is used on a context before and after a Connection the reference in the SSL* object still points to the old _verify_helper object. Since this object has no longer any references to it, the callback can result in a segfault. This commit fixes the issues by ensuring that as long as the Connection object/SSL* object lives a reference to the callback function is held. * Add Unit test for set_verify_callback deference
* Fix spelling of set in set_verify docstring (#959)Arne Schwabe2020-11-131-2/+2
|
* Fix typo in debug command output (#957)Michael Lazar2020-11-121-1/+1
| | | Co-authored-by: Michael Lazar <mlazar@doctorondemand.com>
* Drop CI for OpenSSL 1.0.2 (#953)Alex Gaynor2020-10-262-49/+8
| | | | | | | * Drop CI for OpenSSL 1.0.2 * Delete code for coverage reasons * Bump minimum cryptography version
* Fixing issue #798 (#907)jalberdi0042020-10-181-1/+4
| | | | | | * Fixing issue #798, thanks to @reaperhulk; removing undocumented '%s' option and getting the date in a more robust way Co-authored-by: Joseba Alberdi <j.alberdi@simuneatomistics.com> Co-authored-by: Alex Gaynor <alex.gaynor@gmail.com>
* Correct typos in crypto.py (#949)Felix Yan2020-10-141-2/+2
|
* crypto._PassphraseHelper: pass non-callable passphrase using callback (#947)Huw Jones2020-10-121-10/+9
| | | | | | | | | | | | * crypto._PassphraseHelper: pass non-callable passphrase using callback Fixes #945 Before this commit, we would pass a bytes passphrase as a null terminated string. This causes issue when a randomly generated key's first byte is null because OpenSSL rightly determines the key length is 0. This commit modifies the passphrase helper to pass the passphrase via the callback * Update changelog to document bug fix
* Allow using additional untrusted certificates for chain building in ↵Sándor Oroszi2020-10-121-2/+34
| | | | | | | | | | | | X509StoreContext (#948) The additional certificates provided in the new `chain` parameter will be untrusted but may be used to build the chain. This makes it easier to validate a certificate against a store which contains only root ca certificates, and the intermediates come from e.g. the same untrusted source as the certificate to be verified. Co-authored-by: Sandor Oroszi <sandor.oroszi@balabit.com>
* Allow using an OpenSSL hashed directory for verification in X509Store (#943)Sándor Oroszi2020-09-111-0/+48
| | | | | | | Add X509Store.load_locations() to set a CA bundle file and/or an OpenSSL- style hashed CA/CRL lookup directory, similar to the already existing SSL.Context.load_verify_locations(). Co-authored-by: Sandor Oroszi <sandor.oroszi@balabit.com>
* I'm back in black (#941)Alex Gaynor2020-08-261-4/+5
|
* Switch to new notBefore/After APIs (#843)Rosen Penev2020-08-131-6/+6
| | | Signed-off-by: Rosen Penev <rosenp@gmail.com>
* Context.set_verify: allow omission of callback (#933)Maximilian Hils2020-08-071-11/+17
| | | | | | | * Context.set_verify: allow omission of callback * squeeze to 80 chars * make it clear that default callback is used
* Allow accessing a connection's verfied certificate chain (#894)Shane Harvey2020-08-052-8/+95
| | | | | | | | | | | | | | | | | | | | | | | | | * Allow accessing a connection's verfied certificate chain Add X509StoreContext.get_verified_chain using X509_STORE_CTX_get1_chain. Add Connection.get_verified_chain using SSL_get0_verified_chain if available (ie OpenSSL 1.1+) and X509StoreContext.get_verified_chain otherwise. Fixes #740. * TLSv1_METHOD -> SSLv23_METHOD * Use X509_up_ref instead of X509_dup * Add _openssl_assert where appropriate * SSL_get_peer_cert_chain should not be null * Reformat with black * Fix <OpenSSL.crypto.X509 object at 0x7fdbb59e8050> != <OpenSSL.crypto.X509 object at 0x7fdbb59daad0> * Add Changelog entry * Remove _add_chain
* Deprecated pkcs7 and pkcs12 support (#921)Alex Gaynor2020-08-051-1/+23
|
* focal time (#929)Paul Kehrer2020-08-051-1/+2
| | | | | | | | | * focal time * larger dh params, assert on something * urllib3 fix * actually check an error
* remove npn support entirely. you should be using alpn (#932)Paul Kehrer2020-08-031-180/+0
| | | | | * remove npn support entirely. you should be using alpn * flake8
* newer pypy (#928)Paul Kehrer2020-08-031-12/+1
| | | | | | | * newer pypy * missed one * we don't support ancient cffi any more
* Add SSL.Context.set_keylog_callback (#910)Maximilian Hils2020-07-281-0/+31
| | | | | | | | | * add SSL.Context.set_keylog_callback * don't fail on missing attribute * lint! * make it black
* Paint it Black by the Rolling Stones (#920)Alex Gaynor2020-07-235-272/+387
|
* Remove deprecated tsafe module. (#913)Benjamin Peterson2020-05-221-31/+0
|
* Drop OpenSSL 1.0.1 (#908)Alex Gaynor2020-04-071-10/+6
|
* Remove asserts (#904)Adrián Chaves2020-03-312-5/+5
|
* Fix PKey.check for some broken keys (#897)Mrmaxmeier2020-03-111-1/+1
| | | | | | | | | * fix PKey.check for some broken keys RSA_check_key is documented to return 1 for valid keys. It (currently) returns 0 or -1 for invalid ones. The previous code accepted invalid keys if RSA_check_key returns -1! * add test
* Make the code slightly resillient to python4 (#880)Alex Gaynor2019-11-181-2/+2
|
* Random cleanup around our usage of binary_type (#879)Alex Gaynor2019-11-182-9/+7
|
* reopen master, call it 20.0 because let's be honest with ourselves (#878)Paul Kehrer2019-11-181-1/+1
|
* version bump for 19.1 release (#877)19.1.0Paul Kehrer2019-11-171-1/+1
|