Arthur de Jong

Open Source / Free Software developer

summaryrefslogtreecommitdiffstats
Commit message (Collapse)AuthorAgeFilesLines
* Get files ready for 0.5 release0.5Arthur de Jong2017-01-217-51/+347
|
* Split vendor testsArthur de Jong2017-01-152-27/+55
| | | | Have one doctest file per vendor to make tests a little more manageable.
* Add tests for Yubikey filesArthur de Jong2017-01-154-0/+295
| | | | This adds tests from draft-josefsson-keyprov-pskc-yubikey-00.
* Support legacy ActivIdentity filesArthur de Jong2017-01-153-12/+129
| | | | | | This adds support for parsing ActivIdentity files that conform to a very old version of an Internet Draft. The implementation and test were based on a file provided by Jaap Ruijgrok.
* Use original examples from old profiles Internet DraftArthur de Jong2017-01-115-129/+139
| | | | | | | | | | | | | This updates the tests to use the original examples from draft-hoyer-keyprov-pskc-algorithm-profiles-01 instead of modifying them to fit the RFC 6030 schema (but does include some minor changes to make them valid XML). This adds a few additions to the parser to handle legacy challenge and resposne encoding and a few key policy properties. This also includes a fix for 0b757ec in the handling of the <ChallengeFormat> element under a <Usage> element.
* Add all figures from RFC 6030 to test suiteArthur de Jong2016-12-213-10/+191
| | | | Note that asymmetric encryption and digital signature checking has not yet been implemented so the tests are pretty minimal.
* Add support for older Internet Draft versionArthur de Jong2016-12-2111-35/+839
| | | | | | | | | | | | | | This adds support for parsing most examples from draft-ietf-keyprov-pskc-02. That file uses a few other names for elements and attributes of the PSKC file and a few other minor differences. The XML parsing has been changed to allow specifying multiple matches and the find*() functions now return the first found match. While all examples from draft-ietf-keyprov-pskc-02 are tested support for verifying digital signatures and asymmetric keys have not yet been implemented.
* Fix typo in testArthur de Jong2016-12-201-4/+4
|
* Fail tests on missing coverageArthur de Jong2016-12-201-0/+2
|
* Allow MAC over plaintext or ciphertextArthur de Jong2016-12-208-102/+84
| | | | | | | | | | | | | | | | | | RFC 6030 implies that the MAC should be performed over the ciphertext but some earlier drafts implied that the MAC should be performed on the plaintext. This change accpets the MAC if either the plaintext or ciphertext match. Note that this change allows for a padding oracle attack when CBC encryption modes are used because decryption (and unpadding) needs to be done before MAC checking. However, this module is not expected to be available to users to process arbitrary PSKC files repeatedly. This removes the tests for a missing MAC key (and replaces it for tests of missing EncryptionMethod) because falling back to using the encryption key (implemented in a444f78) in combination with this change means that decryption is performed before MAC checking and is no longer possible to trigger a missing MAC key error.
* Add sanity checks to unpaddingArthur de Jong2016-12-203-4/+86
|
* Ensure XML file ends with a newlineArthur de Jong2016-12-201-1/+1
|
* Adapt coverage pragma annotationsArthur de Jong2016-12-201-2/+2
| | | | | This fixes the pragma directives to be be correct independently of whether lxml is installed or not.
* Add Tox configurationArthur de Jong2016-12-192-0/+32
| | | | | This sets up Tox with various versions of Python and for each version a run with and without lxml.
* Close read files in testsArthur de Jong2016-12-191-2/+4
| | | | | This ensures that the files that are read in the test suite are properly closed to avoid leaking open file descriptors.
* Support missing or lowercase version attributeArthur de Jong2016-12-181-2/+2
|
* Fix copy-pasto in documentationArthur de Jong2016-09-261-7/+0
| | | This accidentally slipped in as part of beafc6b.
* Also move outer writing and parsing to modulesArthur de Jong2016-09-243-17/+23
|
* Add writing example to toplevel documentationArthur de Jong2016-09-243-1/+20
|
* Use custom data descriptors for key propertiesArthur de Jong2016-09-171-24/+25
| | | | | This uses a custom data descriptor (property) for secret, counter, time_offset, time_interval and time_drift.
* Support separate device from keyArthur de Jong2016-09-179-149/+361
| | | | | | | | This allows having multiple keys per device while also maintaining the previous API. Note that having multiple keys per device is not allowed by the RFC 6030 schema but is allowed by some older internet drafts.
* Move XML generation to own moduleArthur de Jong2016-09-176-183/+216
| | | | | Similar to the change for parsing, move the XML serialisation of PSKC data to a single class in a separate module.
* Move document parsing to own moduleArthur de Jong2016-09-176-204/+229
| | | | | | This moves all the parse() functions to a single class in a dedicated module that can be used for parsing PSKC files. This should make it easier to subclass the parser.
* Some minor improvements to the testsArthur de Jong2016-09-143-2/+18
|
* Improve branch coverageArthur de Jong2016-09-1414-16/+285
| | | | This enables branch coverage testing and adds tests to improve coverage.
* Support specifying PRF in setup_pbkdf2()Arthur de Jong2016-09-112-3/+10
| | | | This also ensures that the PRF URL is normalised.
* Fix bug in passing explicit key to setup_preshared_key()Arthur de Jong2016-09-111-2/+2
|
* Clarify encryption.setup_*() documentationArthur de Jong2016-09-112-4/+4
| | | | | | This tries to make it clearer that the setup_preshared_key() and setup_pbkdf2() functions are meant to be used when writing out PSKC files.
* Fall back to encryption key for MACArthur de Jong2016-04-236-1/+102
| | | | | | This uses the encryption key also as MAC key if no MAC key has been specified in the PSKC file. Earlier versions of the PSKC draft specified this behaviour.
* Allow global specification of IVArthur de Jong2016-04-233-9/+62
| | | | | | In older versions of the PSKC standard it was allowed to have a global initialization vector for CBC based encryption algorithms. It is probably not a good idea to re-use an IV in general.
* Move crypto to functionsArthur de Jong2016-04-232-93/+108
| | | | | This makes it much easier to test the encryption, decryption and HMAC processing separate from the PSKC parsing.
* Remove parse call from constructorsArthur de Jong2016-04-054-12/+7
| | | | This makes the creation if internal instances a litte more consistent.
* Move algorithm uri handling to separate moduleArthur de Jong2016-04-053-51/+75
|
* Move padding functions to crypto packageArthur de Jong2016-04-052-11/+36
|
* Get files ready for 0.4 release0.4Arthur de Jong2016-03-284-2/+378
|
* Document may_use() policy functionArthur de Jong2016-03-281-4/+4
|
* Implement writing encrypted filesArthur de Jong2016-03-2712-88/+816
|\ | | | | | | | | | | This adds support for setting up encryption keys and password-based key derivation when writing PSKC files. Also MAC keys are set up when needed.
| * Document writing encrypted filesArthur de Jong2016-03-276-25/+105
| |
| * Add encryption error testsArthur de Jong2016-03-261-0/+74
| |
| * Add tests for writing encrypted PSKC filesArthur de Jong2016-03-261-0/+175
| |
| * Allow configuring a pre-shared keyArthur de Jong2016-03-261-13/+38
| | | | | | | | | | | | | | This method allows configuring a pre-shared encryption key and will chose reasonable defaults for needed encryption values (e.g. it will choose an algorithm, generate a new key of the appropriate length if needed, etc.).
| * Allow configuring PBKDF2 key derivationArthur de Jong2016-03-262-12/+127
| | | | | | | | | | This factors out the PBKDF2 key derivation to a separate function and introduces a function to configure KeyDerivation instances with PBKDF2.
| * Allow configuring a MAC keyArthur de Jong2016-03-262-0/+60
| | | | | | | | | | This method will set up a MAC key and algorithm as specified or use reasonable defauts.
| * Generate MAC valuesArthur de Jong2016-03-262-13/+30
| |
| * Write MACMethodArthur de Jong2016-03-263-3/+52
| | | | | | | | | | | | This also makes the MAC.algorithm a property similarly as what is done for Encryption (normalise algorithm names) and adds a setter for the MAC.key property.
| * Write out encrypted valuesArthur de Jong2016-03-262-11/+88
| | | | | | | | | | | | | | | | | | The Encryption class now has a fields property that lists the fields that should be encrypted when writing the PSKC file. This adds an encrypt_value() function that performs the encryption and various functions to convert the plain value to binary before writing the encrypted XML elements.
| * Make Encryption and MAC constructors consistentArthur de Jong2016-03-263-6/+4
| | | | | | | | | | | | This removes calling parse() from the Encryption and MAC constructors and stores a reference to the PSKC object in both objects so it can be used later on.
| * Write encryption key informationArthur de Jong2016-03-263-3/+40
| | | | | | | | | | | | This writes information about a pre-shared key or PBKDF2 key derivation in the PSKC file. This also means that writing a decrypted version of a previously encrypted file requires actively removing the encryption.
| * Add algorithm_key_lengths propertyArthur de Jong2016-03-262-16/+37
|/ | | | | This property on the Encryption object provides a list of key sizes (in bytes) that the configured encryption algorithm supports.
* Also check key expiry in may_use()Arthur de Jong2016-03-234-12/+50
|