Age | Commit message (Collapse) | Author | |
---|---|---|---|
2021-02-12 | [LSC] Add LOCAL_LICENSE_KINDS to external/python/asn1cryptoandroid-s-preview-1 | Bob Badour | |
Added SPDX-license-identifier-MIT to: Android.bp asn1crypto/Android.bp Bug: 68860345 Bug: 151177513 Bug: 151953481 Test: m all Exempt-From-Owner-Approval: janitorial work Change-Id: Ie246bed6727ab34428a782b6d8bc08825d965150 | |||
2020-10-28 | Upgrade python/asn1crypto to 1.4.0 | Haibo Huang | |
Test: make Change-Id: I91c1d9e084d4804e09aa5d686816dba41512357e | |||
2020-07-28 | Version 1.4.0 | wbond | |
2020-07-25 | Ensure keys.PublicKeyInfo.bit_size returns an int | wbond | |
2020-07-25 | Tweak error messages on invalid OIDs | wbond | |
2020-07-25 | Merge pull request #174 from joernheissler/oid-arc-2 | Will Bond | |
Fix parsing of ObjectIdentifier's first octet. | |||
2020-05-04 | Fix a syntax typo | Miro Hrončok | |
This worked for now, but is SyntaxError in Python 3.9.0a6: File "/usr/lib/python3.9/site-packages/asn1crypto/x509.py", line 1139 return', '.join( ^ SyntaxError: invalid string prefix (The Python change might actually be reverted before 3.9 final, but this can be fixed anyway.) | |||
2020-01-05 | Fix parsing of ObjectIdentifier's first octet. | Jörn Heissler | |
X.660 §7.6 specifies that the first arc of an OID must be 0 to 2 and the second arc below arcs 0 and 1 must be 0 to 39. Arc 2 is not restricted in that way. The algorithm for parsing ObjectIdentifiers did not work for OID 2.X with X >= 40. This change also enforces above restrictions when setting an ObjectIdentifier. | |||
2020-01-04 | Upgrade python/asn1crypto to 1.3.0android-r-preview-1 | Haibo Huang | |
Test: None Change-Id: I27182f97cedcedcd74d014428a888fb7bb1e3f0d | |||
2020-01-04 | Version 1.3.0 | wbond | |
2019-12-25 | Merge pull request #171 from commonism/encrypt_key_pref | Will Bond | |
add support for id-aa-encrypKeyPref in pkcs7/cms mail signatures | |||
2019-11-20 | lint | Markus Kötter | |
2019-11-20 | lint | Markus Kötter | |
2019-11-20 | id-aa-encrypKeyPref - as defined in RFC2633 | Markus Kötter | |
2019-11-19 | fix fq import names | Markus Kötter | |
2019-11-19 | add support for id-aa-encrypKeyPref in pkcs7/cms mail signatures | Markus Kötter | |
- oid 1.2.840.113549.1.9.16.2.11 | |||
2019-11-11 | Add __getinitargs__ method to util.timezone | Jörn Heissler | |
If a timezone object is copied, its __reduce__ method is called which in turn calls __getinitargs__ to get arguments for __init__ on the new object. If that function is missing, __init_ is called with too few parameters. Problem can be triggered by calling copy or untag on UTCTime or GeneralizedTime or any other object where the native value includes a datetime Fixes #167 | |||
2019-11-05 | Merge pull request #166 from joernheissler/i163 | Will Bond | |
Add brainpool curves from rfc5639 | |||
2019-11-05 | Merge pull request #165 from joernheissler/fix_key_sizes | Will Bond | |
Fixed some incorrectly computed EC private key sizes. | |||
2019-11-04 | Fixed some incorrectly computed EC private key sizes. | Jörn Heissler | |
Private key is an integer from interval [1, curve_order). The curve order is denoted by n in SECG or q in some RFCs. The byte length is therefore ceil(log2(n) / 8). Double checked by comparing to what openssl generates. | |||
2019-11-04 | Fix x509.Certificate.subject_directory_attributes_value property | Jörn Heissler | |
Closes: #159 | |||
2019-11-04 | Add brainpool curves from rfc5639 | Jörn Heissler | |
Closes: #163 | |||
2019-10-16 | Version 1.2.0 | wbond | |
2019-10-16 | Remove comments in load_order() showing dependencies | wbond | |
The comments resulted in making it hard to copy-paste and messy looking. | |||
2019-10-14 | Add asn1crypto.load_order() | wbond | |
2019-10-12 | Version 1.1.0 | wbond | |
2019-10-12 | Add more (legacy) OIDs to keys.NamedCurve() | wbond | |
2019-10-08 | Add UID attribute from RFC4519 | spchan | |
2019-10-04 | Version 1.0.1 | wbond | |
2019-10-04 | Fix an absolute import that should have been relative | wbond | |
2019-10-02 | Upgrade python/asn1crypto to 1.0.0ndk-sysroot-r21 | Haibo Huang | |
Test: None Change-Id: Id976fdd7c170f3111e35c4a2cde69aba8715c243 | |||
2019-10-02 | Version 1.0.0 | wbond | |
2019-10-01 | Preserve the ability to pass core.Null() into ocsp.CertStatus() | wbond | |
2019-10-01 | Added ocsp.StatusGood() and ocsp.StatusUnknown() for ocsp.CerStatus().native | wbond | |
2019-10-01 | Allow X.509 certificates with improperly encoded DNSName and EmailAddress | wbond | |
2019-10-01 | Prevent UnboundLocalError on empty asn1crypto.x509.IPAddress() | wbond | |
2019-10-01 | Handle BER-encoded indefinite length values better | wbond | |
- Ensure when we have trailing EOC bytes to include them when dumping - If we know the encoding is indefinite length, re-encode using DER | |||
2019-09-28 | Add trailer info to .debug() output | wbond | |
2019-09-28 | When copying a BER-encoded indefinite-length value, force it to be DER-encoded | wbond | |
2019-09-27 | Restrict core.IntegerBitString() and core.IntegerOctetString() to positive ↵ | wbond | |
integers | |||
2019-09-27 | Merge pull request #148 from joernheissler/bit_string_parsing | Will Bond | |
Refactor BitString parsing | |||
2019-09-23 | Fix encoding of tag values over 30 | wbond | |
2019-09-23 | Fix passing class_ to core.Asn1Value(), add support for passing method | wbond | |
2019-09-21 | Add unused_bits property to BitString classes | Jörn Heissler | |
Encoded Bit Strings can have 0-7 unused bits in the rightmost byte. With DER encoding, those bits must be zero. But some encoders might put in other values. Sometimes this feature is abused (CVE-2014-8275). The added property allows to read those bits for debugging or for detecting such tampering. | |||
2019-09-21 | Refactor BitString parsing | Jörn Heissler | |
Closes: #147 | |||
2019-09-21 | Merge pull request #138 from space88man/rsassa_pss | Will Bond | |
keys.py: add RSASSA_PSS OIDs from RFC4055 | |||
2019-09-13 | Create asn1crypto_tests package, along with supporting tooling | wbond | |
Adds the following tasks: - python run.py build - python run.py version {pep440_version} Tests may now be executed a number of different ways and will automatically ensure the local copy of asn1crypto is used, if run from a Git working copy, or archive of a working copy. Versioning scheme switched from SemVer to PEP 440 since that is what the Python ecosystem tooling supports. | |||
2019-09-10 | Ensure keys.NamedCurve.register() works if setup() has been run or not | wbond | |
2019-08-21 | Fix ValueError in keys.NamedCurve.register() | wbond | |
If any NamedCurve object was created before calling register(), the _reverse_map would not be properly set for the custom value. | |||
2019-08-21 | Ensure EC private keys are encoded to the correct width, per RFC 5915 | wbond | |