Arthur de Jong

Open Source / Free Software developer

summaryrefslogtreecommitdiffstats
Commit message (Collapse)AuthorAgeFilesLines
...
* Support more AES-CBC encryption schemesArthur de Jong2014-05-291-4/+8
| | | | | This also moves the crypto imports to the places where they are used to avoid a depenency on pycrypto if no encryption is used.
* Add test for missing secret valueArthur de Jong2014-05-291-0/+2
|
* Add a function for adding a new keyArthur de Jong2014-05-253-2/+26
|
* Consistency improvementArthur de Jong2014-05-251-2/+2
|
* Support creating an empty PSKC instanceArthur de Jong2014-05-252-6/+14
|
* Be more lenient in accepting algorithmsArthur de Jong2014-05-252-16/+3
|
* Code simplificationArthur de Jong2014-05-251-9/+5
|
* Raise an exception if decryption failsArthur de Jong2014-05-255-4/+67
|
* Make decryption code better readableArthur de Jong2014-05-251-5/+9
|
* Add tests for invalid PSKC filesArthur de Jong2014-05-235-1/+66
|
* Raise exceptions on some parsing problemsArthur de Jong2014-05-232-2/+44
|
* Fix install_requiresArthur de Jong2014-05-231-1/+1
|
* Get files ready for 0.1 release0.1Arthur de Jong2014-05-233-1/+258
|
* Use pskcxml as file name extensionArthur de Jong2014-05-2310-9/+9
| | | | This is the extension that is suggested in RFC6030.
* Improve IANA linksArthur de Jong2014-05-232-2/+2
|
* Improve testArthur de Jong2014-05-231-2/+7
| | | | | This tests that, before the PSKC ecnryption is key available, the secret from the key cannot be extracted.
* Provide Sphinx documentationArthur de Jong2014-05-197-0/+720
|
* Add missing policy constantArthur de Jong2014-05-191-0/+3
|
* Fix attribute name in docstringArthur de Jong2014-05-191-1/+1
|
* Update READMEArthur de Jong2014-05-191-5/+28
|
* Fix dateutil dependencyArthur de Jong2014-05-172-2/+2
| | | | This also ignores downloaded .egg files.
* Fix module descriptionArthur de Jong2014-04-191-2/+1
|
* Move PSKC class to toplevel moduleArthur de Jong2014-04-192-42/+44
| | | | This also splits the parsing to a parse() function for consistency.
* Provide pskc.key docstringsArthur de Jong2014-04-192-48/+115
| | | | | | | | | This documents most of the information that is available per key and adds a few other minor cosmetic changes. This also re-organises the key properties to be in a slightly more logical order and renames the userid key property to key_userid to more clearly distinguish it from device_userid.
* Provide pskc.parse docstringsArthur de Jong2014-04-191-1/+19
| | | | | This documents most of the API of the parsing functions and the PSKC class.
* Complete pskc.policy docstringsArthur de Jong2014-04-191-2/+4
| | | | Also contains small consistency improvement.
* Provide pskc.mac docstringsArthur de Jong2014-04-191-8/+34
| | | | This also hides two properties that are not part of the public API.
* Provide pskc.encryption docstringsArthur de Jong2014-04-191-5/+41
| | | | This documents classes in the pskc.encryption module.
* Move Key class to separate moduleArthur de Jong2014-04-194-188/+239
| | | | This also allows re-organising the imports a bit.
* Add initial setup scriptArthur de Jong2014-04-164-2/+98
|
* Include a license file (LGPL)Arthur de Jong2014-04-161-0/+504
|
* Add bulk provisioning test from Figure 10Arthur de Jong2014-04-162-0/+154
|
* Use slightly clearer namesArthur de Jong2014-04-161-4/+4
|
* Add test for Figure 7 from RFC6030Arthur de Jong2014-04-132-0/+94
| | | | | This tests encrypted key derivation using PBKDF2 and a pre-shared passphrase.
* Implement PBKDF2 key derivationArthur de Jong2014-04-131-0/+64
| | | | | This supports deriving the key from a passphrase and information present in the DerivedKey and PBKDF2-params XML elements.
* Add id attribute from EncryptionKeyArthur de Jong2014-04-131-2/+5
|
* Add test for Figure 6 from RFC6030Arthur de Jong2014-04-122-0/+78
| | | | This test key encryption with a pre-shared key and MAC checks.
* Implement MAC checkingArthur de Jong2014-04-122-0/+95
| | | | | This implements message message authentication code checking for the encrypted values if MACMethod and ValueMAC are present.
* Support decrypting with a pre-shared keyArthur de Jong2014-04-122-2/+108
| | | | | This adds an encryption module that provides wrappers for handling decryption.
* Refactor DataType value handlingArthur de Jong2014-04-121-35/+55
| | | | | This ensures that DataType values are retrieved dynamically instead of at the time the PSKC file was parsed in order to make decryption work.
* Document key and pin usage valuesArthur de Jong2014-04-111-0/+42
|
* Add test for Figure 5 from RFC6030Arthur de Jong2014-04-112-0/+114
| | | | This test extraction of key policy information and cross-key references.
* Implement key policy parsingArthur de Jong2014-04-112-2/+125
| | | | | This parses key policy from PSKC files and provides a few utility methods to help with policy validation.
* Support parsing date and integer valuesArthur de Jong2014-04-111-8/+23
|
* Add test for Figure 4 from RFC6030Arthur de Jong2014-04-112-0/+54
| | | | | This tests for key profile and key reference properties that can be used to reference external keys.
* Add test for Figure 3 from RFC6030Arthur de Jong2014-04-112-0/+71
| | | | | This tests Figure 3 from RFC6030 with a very basic plain text secret key and some supplementary data.
* Get more data from KeyPackageArthur de Jong2014-04-071-0/+42
| | | | | This gets most simple string values from the KeyPackage as well as some integer and boolean values.
* Add test for example from RFC6030Arthur de Jong2014-04-072-0/+60
| | | | | This tests Figure 2 from RFC6030 with a very basic plain text secret key.
* Support getting plaintext keyArthur de Jong2014-04-071-0/+58
|
* Minimal testArthur de Jong2014-04-071-0/+35
| | | | | This adds a doctest for the absolute minimum PSKC file that does not contain any useful information.