aboutsummaryrefslogtreecommitdiff
path: root/asn1crypto
AgeCommit message (Collapse)Author
2019-10-02Upgrade python/asn1crypto to 1.0.0ndk-sysroot-r21Haibo Huang
Test: None Change-Id: Id976fdd7c170f3111e35c4a2cde69aba8715c243
2019-10-02Version 1.0.0wbond
2019-10-01Preserve the ability to pass core.Null() into ocsp.CertStatus()wbond
2019-10-01Added ocsp.StatusGood() and ocsp.StatusUnknown() for ocsp.CerStatus().nativewbond
2019-10-01Allow X.509 certificates with improperly encoded DNSName and EmailAddresswbond
2019-10-01Prevent UnboundLocalError on empty asn1crypto.x509.IPAddress()wbond
2019-10-01Handle BER-encoded indefinite length values betterwbond
- Ensure when we have trailing EOC bytes to include them when dumping - If we know the encoding is indefinite length, re-encode using DER
2019-09-28Add trailer info to .debug() outputwbond
2019-09-28When copying a BER-encoded indefinite-length value, force it to be DER-encodedwbond
2019-09-27Restrict core.IntegerBitString() and core.IntegerOctetString() to positive ↵wbond
integers
2019-09-27Merge pull request #148 from joernheissler/bit_string_parsingWill Bond
Refactor BitString parsing
2019-09-23Fix encoding of tag values over 30wbond
2019-09-23Fix passing class_ to core.Asn1Value(), add support for passing methodwbond
2019-09-21Add unused_bits property to BitString classesJörn Heissler
Encoded Bit Strings can have 0-7 unused bits in the rightmost byte. With DER encoding, those bits must be zero. But some encoders might put in other values. Sometimes this feature is abused (CVE-2014-8275). The added property allows to read those bits for debugging or for detecting such tampering.
2019-09-21Refactor BitString parsingJörn Heissler
Closes: #147
2019-09-21Merge pull request #138 from space88man/rsassa_pssWill Bond
keys.py: add RSASSA_PSS OIDs from RFC4055
2019-09-13Create asn1crypto_tests package, along with supporting toolingwbond
Adds the following tasks: - python run.py build - python run.py version {pep440_version} Tests may now be executed a number of different ways and will automatically ensure the local copy of asn1crypto is used, if run from a Git working copy, or archive of a working copy. Versioning scheme switched from SemVer to PEP 440 since that is what the Python ecosystem tooling supports.
2019-09-10Ensure keys.NamedCurve.register() works if setup() has been run or notwbond
2019-08-21Fix ValueError in keys.NamedCurve.register()wbond
If any NamedCurve object was created before calling register(), the _reverse_map would not be properly set for the custom value.
2019-08-21Ensure EC private keys are encoded to the correct width, per RFC 5915wbond
2019-08-10Mark master as working towards 0.25.0wbond
2019-08-10Formatting tweakswbond
2019-08-08Add more allowed formats for UTCTime and GeneralizedTimeJörn Heissler
Closes: #86 UTCTime and GeneralizedTime now support all time formats defined in sections 42 and 43 of X.680 and ISO 8601. In particular, add support for time zones and fractions.
2019-08-08Refactor extended_date and extended_datetimeJörn Heissler
Refactor extended_date and extended_datetime to enable full timezone support, required by #86. Those classes now delegate most method calls to a datetime or date object which has year 2000 substituted. Also fixes several corner cases and adds test cases.
2019-08-08Improve timezone supportJörn Heissler
To fix #86, timezone support with different utc offsets is required. - Implement py2 version of util.timezone - Add function create_timezone which caches timezone objects - Add utc_with_dst timezone object which can be used with datetime.astimezone - Add test cases
2019-08-08Corner cases in int_to_bytesJörn Heissler
int_to_bytes(0, width=0) returns b'' in py3 but b'\x00' in py2. py2 implementation will now return b'' too. int_to_bytes(12345, width=1) raises OverflowError in py3 but not in py2. py2 will now also raise the Exception Also completed test coverage for int_to_bytes and int_from_bytes
2019-08-01Tweak the names given to the Microsoft Authenticode OIDswbond
2019-08-01Merge pull request #135 from shuxin/patch-1Will Bond
support windows pe file nested sha256 signature
2019-08-01Add parameters for rsaes_oaep in cms.KeyEncryptionAlgorithmwbond
2019-08-01Update KeyEncryptionAlgorithmId OID mapping for 1.2.840.113549.1.1.1wbond
Was "rsa", is now "rsaes_pkcs1v15". Added custom _reverse_map to preserve ability to use "rsa".
2019-08-01Merge pull request #111 from luckylud/pull-request-rsaes_oaepWill Bond
Add rsaes_oaep to KeyEncryptionAlgorithmId
2019-08-01Add encryption algorithm id for RC4wbond
2019-07-19Merge pull request #137 from dpward/masterwbond
2019-07-13Move functionality to derive public keys from private keys into oscryptowbond
- keys.PrivateKeyInfo().unwrap() is now oscrypto.asymmetric.PrivateKey().unwrap() - keys.PrivateKeyInfo().public_key is now oscrypto.asymmetric.PrivateKey().public_key.unwrap() - keys.PrivateKeyInfo().public_key_info is now oscrypto.asymmetric.PrivateKey().public_key.asn1 - keys.PrivateKeyInfo().fingerprint is now oscrypto.asymmetric.PrivateKey().fingerprint - keys.PublicKeyInfo().unwrap() is now oscrypto.asymmetric.PublicKey().unwrap() - keys.PublicKeyInfo().fingerprint is now oscrypto.asymmetric.PublicKey().fingerprint
2019-04-29keys.py: add RSASSA_PSS to private key classesspchan
2019-04-24keys.py: add RSASSA_PSS OIDs from RFC4055spchan
2019-04-22Fix missing return value from core.Choice.parse() used by core.Choice.chosenDavid Ward
2019-04-17Merge commit '6060d29' into importKevin Cheng
This is 0.24.0. Also add in misc files (METADATA, LICENSE, etc). Bug: 122778810 Test: None Change-Id: I22fd12046f4218ba859e705c767bc95dd2a21fba
2019-04-04support windows pe file nested sha256 signatureshuxin
now windows pe file are signed with both sha1 and sha256.
2019-02-19Add type checks for sequence fieldswbond
2019-02-18Fix core.Choice().contents to work when the chosen alternative is a Choice alsowbond
2019-02-14Update keys.pyJörn Heissler
2019-02-14Add secp256k1 to NamedCurvesnkostoulas
2018-10-03Merge pull request #116 from wiml/sha3Jörn Heissler
Add NIST OIDs for SHA-3 (and SHAKE) algorithms.
2018-10-03Minor typo fixFred Rolland
2018-09-21Add NIST OIDs for SHA-3 (and SHAKE) algorithms.Wim Lewis
2018-09-04Only normalize URIs when comparingwbond
2018-08-07Add rsaes_oaep to KeyEncryptionAlgorithmIdLudovic Watteaux
2018-07-06Fix a bug where parsing a broken core.Sequence or core.SequenceOf could ↵wbond
leave the object in a bad state
2018-07-03Grammar fixJörn Heissler