-
Notifications
You must be signed in to change notification settings - Fork 422
add get_digest
method to X509Req
#170
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
OpenSSL/crypto.py
Outdated
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
You can write this as _ffi.new("unsigned int *", len(result_buffer))
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Fixed. Admittedly whole function was copied and pasted from X509.digest
.
The test for X509.digest
is currently failing (#150) so I haven't made the corresponding change there.
Also added bit to the documentation.
This probably needs an entry in the docs as well |
There have been a few releases of cryptography since this PR was submitted. Perhaps we should get this retested? |
pyca/cryptography#1472 has been merged so it should indeed work now. I figured I would need to wait for the release before bumping here and then forgot... Sorry |
This needs to be rebased and a changelog entry. |
de3dbb8
to
a5a5dad
Compare
1 similar comment
Apparently default digest was changed in 0.9.8 to SHA1. This is causing the tests to fail. Will figure out what the digest should be and fix the tests. |
bb329df
to
6a9ace7
Compare
6a9ace7
to
a66105d
Compare
a66105d
to
dfed66e
Compare
First of all, please accept my sincere apologies for this PR not moving along as we’d like to. I’ve tried to come up with a long-term solution to the general x509 problem domain and would also welcome your feedback to this thread: https://mail.python.org/pipermail/cryptography-dev/2015-December/000539.html (please note that there’s already responses: https://mail.python.org/pipermail/cryptography-dev/2015-December/thread.html https://mail.python.org/pipermail/cryptography-dev/2016-January/thread.html ). I really hope this could be a way to loosen the guardian knot that the pyOpenSSL’s x509 layer currently presents to us maintainers and lightens the frustrations for contributors like you. |
7b220f2
to
c158328
Compare
c158328
to
e04e104
Compare
Current coverage is
|
At this point this functionality can be obtained via converting to a cryptography object ( |
Not a problem. Thank you for following up. |
(depends on bwhmather/cryptography@1b55947c).
Writing a simple ca and need to be able verify that a certificate request received by the server is the same as the one sent by the client. Comparing digests seems like the obvious way to do it.