Re: [Cryptography-dev] pyca/cryptography python 3.2 support

2015-04-14 Thread Glyph
Is there a way to answer this question as a query against PyPI metadata? It seems like the information ought to be there, in some form... -g > On Apr 14, 2015, at 11:22, Alex Gaynor wrote: > > Have we confirmed that all important downstreams (pyOpenSSL, Twisted, > eventually Fabric/Paramiko,

Re: [Cryptography-dev] [ANN] pyOpenSSL 0.15

2015-04-15 Thread Glyph
Thank you very much to Jean-Paul and Hynek for getting out this most recent release! (And thanks to Hynek for my opportunity to contribute my first patch to pyOpenSSL ;-)). -glyph > On Apr 15, 2015, at 14:10, Alex Gaynor wrote: > > Thank you for your years of maintenance of

Re: [Cryptography-dev] PyCA cryptography 1.0.1 released

2015-09-05 Thread Glyph
h cryptography, and speed up `pip install twisted[tls]´ on OS X. Thanks for making this happen, Paul! -glyph ___ Cryptography-dev mailing list Cryptography-dev@python.org https://mail.python.org/mailman/listinfo/cryptography-dev

Re: [Cryptography-dev] pyOpenSSL: non-blocking socket support

2016-06-27 Thread Glyph
> On Jun 27, 2016, at 22:23, Vladimir Didenko > wrote: > > Resume: you can use nonblocking ssl socket with standard ssl module and > PyOpenSSL. Though it requires some work from you (but it is not hard!). The better way to use pyOpenSSL (and more recent stdlib ssl modules) is to use Memory B

Re: [Cryptography-dev] New OpenSSH key format

2020-03-02 Thread Glyph
we'll have a new release fairly soon (I know the goal is to have one out before April). -glyph > On Mar 2, 2020, at 10:36 PM, Ron Frederick wrote: > > You might want to see if AsyncSSH (https://asyncssh.readthedocs.io > <https://asyncssh.readthedocs.io/>) can do what

Re: [Cryptography-dev] Cryptographic recipes

2024-06-30 Thread Glyph
> On Jun 30, 2024, at 10:45 AM, Ben Portner via Cryptography-dev > wrote: > > I am thinking: Isn't this exactly where you come in and show *the one* > configuration of the options and knobs that is safe to use? I mean, you are > spelling it out right there. Many people (me included) have no i

Re: [Cryptography-dev] Cryptographic recipes

2024-07-10 Thread Glyph
> On Jul 10, 2024, at 2:45 PM, Benjamin W. Portner via Cryptography-dev > wrote: > > Hi Glyph, > > thanks for chiming in and for the interesting insights from the > implementation side. I wasn't aware of the difficulties involved in providing > the recipien

Re: [Cryptography-dev] Cryptographic recipes

2024-07-10 Thread Glyph
> On Jul 10, 2024, at 2:45 PM, Benjamin W. Portner via Cryptography-dev > wrote: > > Hi Glyph, > > thanks for chiming in and for the interesting insights from the > implementation side. I wasn't aware of the difficulties involved in providing > the recipien

Re: [Cryptography-dev] Cryptographic recipes

2024-07-15 Thread Glyph
> On Jul 15, 2024, at 11:23 AM, Ben Portner via Cryptography-dev > wrote: > >> "What would you do with metadata about KDF parameters, if you had them?" > > Correct me if I'm wrong. I believe those parameters (initial vector, number > of rounds...) are required to restore the AES key from the

Re: [Cryptography-dev] Extracting pub key from a csr

2024-08-29 Thread Glyph
You will note that https://cryptography.io/en/latest/hazmat/primitives/asymmetric/ed25519/#cryptography.hazmat.primitives.asymmetric.ed25519.Ed25519PrivateKey.public_key has parentheses after it in its description. That's it. You just forgot the parens. i.e., try: public_bytes = csr.public_k

Re: [Cryptography-dev] Extended Key Usage of keyCertSign

2024-09-11 Thread Glyph
> On Sep 11, 2024, at 6:27 AM, Robert Moskowitz wrote: > >> This is a fairly elementary Python mistake. Our documents and >> resources are generally oriented towards people who have an existing >> familiarity with Python. I'd strongly encourage you to develop a >> greater comfort with Python in

Re: [Cryptography-dev] PyCA cryptography 1.0.2 released

2015-09-27 Thread Glyph Lefkowitz
implicitly assumes this option will never be used. If running the test suite is impossible in such an interpreter, then perhaps it would be better to detect this configuration and fail hard, rather than piecemeal supporting bits of it, especially if bugs like this potentially cause security issue

Re: [Cryptography-dev] Keys/Certificates/CRLs/x509 in pyOpenSSL

2015-12-29 Thread Glyph Lefkowitz
gs are in a bit of a muddled state; pyOpenSSL is still the only package available to do many things (in particular: TLS) but pull requests are being refused on the grounds that Cryptography has superseded it, when there still isn't a clear interop strategy. These methods (especially if prope

Re: [Cryptography-dev] Keys/Certificates/CRLs/x509 in pyOpenSSL

2016-01-04 Thread Glyph Lefkowitz
> On Jan 4, 2016, at 5:59 AM, Hynek Schlawack wrote: > > AFAIK, there hasn’t been a PR refused for this reason so far but there have > always been awkward nudges in that direction. Sorry, I probably contributed to some confusion there. I thought I saw earlier in the thread that PRs had been r

Re: [Cryptography-dev] use of poor implementations of algorithms

2016-06-30 Thread Glyph Lefkowitz
> On Jun 29, 2016, at 23:09, Jay Gupta wrote: > > could you provide concrete examples of your criticism of other Python > cryptographic packages, especially about poor algorithm interpretations? What specific criticism are you referring to? Cryptography developers have been critical of other