oscrypto


Nameoscrypto JSON
Version 1.3.0 PyPI version JSON
download
home_pagehttps://github.com/wbond/oscrypto
SummaryTLS (SSL) sockets, key generation, encryption, decryption, signing, verification and KDFs using the OS crypto libraries. Does not require a compiler, and relies on the OS for patching. Works on Windows, OS X and Linux/BSD.
upload_time2022-03-18 01:53:26
maintainer
docs_urlNone
authorwbond
requires_python
licenseMIT
keywords crypto pki tls ssl x509 certificate encrypt decrypt sign verify rsa dsa ec dh
VCS
bugtrack_url
requirements No requirements were recorded.
Travis-CI No Travis.
coveralls test coverage No coveralls.
            # oscrypto

A compilation-free, always up-to-date encryption library for Python that works
on Windows, OS X, Linux and BSD. Supports the following versions of Python:
2.6, 2.7, 3.2, 3.3, 3.4, 3.5, 3.6, 3.7, 3.8, 3.9, 3.10 and pypy.

 - [Supported Operating Systems](#supported-operationg-systems)
 - [Features](#features)
 - [Why Another Python Crypto Library?](#why-another-python-crypto-library)
 - [Related Crypto Libraries](#related-crypto-libraries)
 - [Current Release](#current-release)
 - [Dependencies](#dependencies)
 - [Installation](#installation)
 - [License](#license)
 - [Documentation](#documentation)
 - [Continuous Integration](#continuous-integration)
 - [Testing](#testing)
 - [Development](#development)
 - [CI Tasks](#ci-tasks)

[![GitHub Actions CI](https://github.com/wbond/oscrypto/workflows/CI/badge.svg)](https://github.com/wbond/oscrypto/actions?workflow=CI)
[![CircleCI](https://circleci.com/gh/wbond/oscrypto.svg?style=shield)](https://circleci.com/gh/wbond/oscrypto)
[![PyPI](https://img.shields.io/pypi/v/oscrypto.svg)](https://pypi.python.org/pypi/oscrypto)

## Supported Operating Systems

The library integrates with the encryption library that is part of the operating
system. This means that a compiler is never needed, and OS security updates take
care of patching vulnerabilities. Supported operating systems include:

 - Windows XP or newer
   - Uses:
     - [Cryptography API: Next Generation (CNG)](https://msdn.microsoft.com/en-us/library/windows/desktop/aa376210(v=vs.85).aspx)
     - [Secure Channel](https://msdn.microsoft.com/en-us/library/windows/desktop/aa380123(v=vs.85).aspx) for TLS
     - [CryptoAPI](https://msdn.microsoft.com/en-us/library/windows/desktop/aa380256(v=vs.85).aspx) for trust lists and XP support
   - Tested on:
     - Windows XP (no SNI)
     - Windows 7
     - Windows 8.1
     - Windows Server 2012
     - Windows 10
 - OS X 10.7 or newer
   - Uses:
     - [Security.framework](https://developer.apple.com/library/prerelease/mac/documentation/Security/Reference/SecurityFrameworkReference/index.html)
     - [Secure Transport](https://developer.apple.com/library/prerelease/mac/documentation/Security/Reference/secureTransportRef/index.html#//apple_ref/doc/uid/TP30000155) for TLS
     - [CommonCrypto](http://www.opensource.apple.com/source/CommonCrypto/CommonCrypto-55010/CommonCrypto/) for PBKDF2
     - OpenSSL (or LibreSSL on macOS 10.13) for the PKCS #12 KDF
   - Tested on:
     - OS X 10.7
     - OS X 10.8
     - OS X 10.9
     - OS X 10.10
     - OS X 10.11
     - OS X 10.11 with OpenSSL 1.1.0
     - macOS 10.12
     - macOS 10.13 with LibreSSL 2.2.7
     - macOS 10.14
     - macOS 10.15
     - macOS 10.15 with OpenSSL 3.0
     - macOS 11
     - macOS 12
 - Linux or BSD
   - Uses one of:
     - [OpenSSL 0.9.8](https://www.openssl.org/docs/man0.9.8/)
     - [OpenSSL 1.0.x](https://www.openssl.org/docs/man1.0.0/)
     - [OpenSSL 1.1.0](https://www.openssl.org/docs/man1.1.0/)
     - [OpenSSL 3.0](https://www.openssl.org/docs/man3.0/)
     - [LibreSSL](http://www.libressl.org/)
   - Tested on:
     - Arch Linux with OpenSSL 1.0.2
     - OpenBSD 5.7 with LibreSSL
     - Ubuntu 10.04 with OpenSSL 0.9.8
     - Ubuntu 12.04 with OpenSSL 1.0.1
     - Ubuntu 15.04 with OpenSSL 1.0.1
     - Ubuntu 16.04 with OpenSSL 1.0.2 on Raspberry Pi 3 (armhf)
     - Ubuntu 18.04 with OpenSSL 1.1.x (amd64, arm64, ppc64el)
     - Ubuntu 22.04 with OpenSSL 3.0 (amd64)

*OS X 10.6 will not be supported due to a lack of available
cryptographic primitives and due to lack of vendor support.*

## Features

Currently the following features are implemented. Many of these should only be
used for integration with existing/legacy systems. If you don't know which you
should, or should not use, please see [Learning](docs/readme.md#learning).

 - [TLSv1.x socket wrappers](docs/tls.md)
   - Certificate verification performed by OS trust roots
   - Custom CA certificate support
   - SNI support (except Windows XP)
   - Session reuse via IDs/tickets
   - Modern cipher suites (RC4, DES, anon and NULL ciphers disabled)
   - Weak DH parameters and certificate signatures rejected
   - SSLv3 disabled by default, SSLv2 unimplemented
   - CRL/OCSP revocation checks consistenty disabled
 - [Exporting OS trust roots](docs/trust_list.md)
   - PEM-formatted CA certs from the OS for OpenSSL-based code
 - [Encryption/decryption](docs/symmetric.md)
   - AES (128, 192, 256), CBC mode, PKCS7 padding
   - AES (128, 192, 256), CBC mode, no padding
   - TripleDES 3-key, CBC mode, PKCS5 padding
   - TripleDes 2-key, CBC mode, PKCS5 padding
   - DES, CBC mode, PKCS5 padding
   - RC2 (40-128), CBC mode, PKCS5 padding
   - RC4 (40-128)
   - RSA PKCSv1.5
   - RSA OAEP (SHA1 only)
 - [Generating public/private key pairs](docs/asymmetric.md)
   - RSA (1024, 2048, 3072, 4096 bit)
   - DSA (1024 bit on all platforms - 2048, 3072 bit with OpenSSL 1.x or
     Windows 8)
   - EC (secp256r1, secp384r1, secp521r1 curves)
 - [Generating DH parameters](docs/asymmetric.md)
 - [Signing and verification](docs/asymmetric.md)
   - RSA PKCSv1.5
   - RSA PSS
   - DSA
   - EC
 - [Loading and normalizing DER and PEM formatted keys](docs/keys.md)
   - RSA public and private keys
   - DSA public and private keys
   - EC public and private keys
   - X.509 Certificates
   - PKCS#12 archives (`.pfx`/`.p12`)
 - [Key derivation](docs/kdf.md)
   - PBKDF2
   - PBKDF1
   - PKCS#12 KDF
 - [Random byte generation](docs/util.md)

The feature set was largely driven by the technologies used related to
generating and validating X.509 certificates. The various CBC encryption schemes
and KDFs are used to load encrypted private keys, and the various RSA padding
schemes are part of X.509 signatures.

For modern cryptography not tied to an existing system, please see the
[Modern Cryptography](docs/readme.md#modern-cryptography) section of the docs.

*Please note that this library does not include modern block modes such as CTR
and GCM due to lack of support from both OS X and OpenSSL 0.9.8.*

## Why Another Python Crypto Library?

In short, the existing cryptography libraries for Python didn't fit the needs of
a couple of projects I was working on. Primarily these are applications
distributed to end-users who aren't programmers, that need to handle TLS and
various technologies related to X.509 certificates.

If your system is not tied to AES, TLS, X.509, or related technologies, you
probably want [more modern cryptography](docs/readme.md#modern-cryptography).

Depending on your needs, the [cryptography](https://cryptography.io) package may
be a good (or better) fit.

Some things that make oscrypto unique:

 - No compiler needed, ever. No need to pre-compile shared libraries. Just
   distribute the Python source files, any way you want.
 - Uses the operating system's crypto library - does not require OpenSSL on
   Windows or OS X.
 - Relies on the operating system for security patching. You don't need to
   rebuild all of your apps every time there is a new TLS vulnerability.
 - Intentionally limited in scope to crypto primitives. Other libraries
   built upon it deal with certificate path validation, creating certificates
   and CSRs, constructing CMS structures.
 - Built on top of a fast, pure-Python ASN.1 parser,
   [asn1crypto](https://github.com/wbond/asn1crypto).
 - TLS functionality uses the operating system's trust list/CA certs and is
   pre-configured with sane defaults
 - Public APIs are simple and use strict type checks to avoid errors

Some downsides include:

 - Does not currently implement:
   - standalone DH key exchange
   - various encryption modes such as GCM, CCM, CTR, CFB, OFB, ECB
   - key wrapping
   - CMAC
   - HKDF
 - Non-TLS functionality is architected for dealing with data that fits in
   memory and is available all at once
 - Developed by a single developer

## Related Crypto Libraries

*oscrypto* is part of the modularcrypto family of Python packages:

 - [asn1crypto](https://github.com/wbond/asn1crypto)
 - [oscrypto](https://github.com/wbond/oscrypto)
 - [csrbuilder](https://github.com/wbond/csrbuilder)
 - [certbuilder](https://github.com/wbond/certbuilder)
 - [crlbuilder](https://github.com/wbond/crlbuilder)
 - [ocspbuilder](https://github.com/wbond/ocspbuilder)
 - [certvalidator](https://github.com/wbond/certvalidator)

## Current Release

1.2.1 - [changelog](changelog.md)

## Dependencies

 - [*asn1crypto*](https://github.com/wbond/asn1crypto)
 - Python 2.6, 2.7, 3.2, 3.3, 3.4, 3.5, 3.6, 3.7, 3.8, 3.9, 3.10 or pypy
 - OpenSSL/LibreSSL if on Linux¹

*¹ On Linux, `ctypes.util.find_library()` is used to located OpenSSL. Alpine Linux does not have an appropriate install by default for `find_library()` to work properly. Instead, `oscrypto.use_openssl()` must be called with the path to the OpenSSL shared libraries.*

## Installation

```bash
pip install oscrypto
```

## License

*oscrypto* is licensed under the terms of the MIT license. See the
[LICENSE](LICENSE) file for the exact license text.

## Documentation

[*oscrypto* documentation](docs/readme.md)

## Continuous Integration

Various combinations of platforms and versions of Python are tested via:

 - [macOS, Linux, Windows](https://github.com/wbond/oscrypto/actions/workflows/ci.yml) via GitHub Actions
 - [arm64](https://circleci.com/gh/wbond/oscrypto) via CircleCI

## Testing

Tests are written using `unittest` and require no third-party packages.

Depending on what type of source is available for the package, the following
commands can be used to run the test suite.

### Git Repository

When working within a Git working copy, or an archive of the Git repository,
the full test suite is run via:

```bash
python run.py tests
```

To run only some tests, pass a regular expression as a parameter to `tests`.

```bash
python run.py tests aes
```

To run tests multiple times, in order to catch edge-case bugs, pass an integer
to `tests`. If combined with a regular expression for filtering, pass the
repeat count after the regular expression.

```bash
python run.py tests 20
python run.py tests aes 20
```

#### Backend Options

To run tests using a custom build of OpenSSL, or to use OpenSSL on Windows or
Mac, add `use_openssl` after `run.py`, like:

```bash
python run.py use_openssl=/path/to/libcrypto.so,/path/to/libssl.so tests
```

To run tests forcing the use of ctypes, even if cffi is installed, add
`use_ctypes` after `run.py`:

```bash
python run.py use_ctypes=true tests
```

To run tests using the legacy Windows crypto functions on Windows 7+, add
`use_winlegacy` after `run.py`:

```bash
python run.py use_winlegacy=true tests
```

#### Internet Tests

To skip tests that require an internet connection, add `skip_internet` after
`run.py`:

```bash
python run.py skip_internet=true tests
```

### PyPi Source Distribution

When working within an extracted source distribution (aka `.tar.gz`) from
PyPi, the full test suite is run via:

```bash
python setup.py test
```

#### Test Options

The following env vars can control aspects of running tests:

##### Force OpenSSL Shared Library Paths

Setting the env var `OSCRYPTO_USE_OPENSSL` to a string in the form:

```
/path/to/libcrypto.so,/path/to/libssl.so
```

will force use of specific OpenSSL shared libraries.

This also works on Mac and Windows to force use of OpenSSL instead of using
native crypto libraries.

##### Force Use of ctypes

By default, oscrypto will use the `cffi` module for FFI if it is installed.

To use the slightly slower, but more widely-tested, `ctypes` FFI layer, set
the env var `OPENSSL_USE_CTYPES=true`.

##### Force Use of Legacy Windows Crypto APIs

On Windows 7 and newer, oscrypto will use the CNG backend by default.

To force use of the older CryptoAPI, set the env var
`OPENSSL_USE_WINLEGACY=true`.

##### Skip Tests Requiring an Internet Connection

Some of the TLS tests require an active internet connection to ensure that
various "bad" server certificates are rejected.

To skip tests requiring an internet connection, set the env var
`OPENSSL_SKIP_INTERNET_TESTS=true`.

### Package

When the package has been installed via pip (or another method), the package
`oscrypto_tests` may be installed and invoked to run the full test suite:

```bash
pip install oscrypto_tests
python -m oscrypto_tests
```

## Development

To install the package used for linting, execute:

```bash
pip install --user -r requires/lint
```

The following command will run the linter:

```bash
python run.py lint
```

Support for code coverage can be installed via:

```bash
pip install --user -r requires/coverage
```

Coverage is measured by running:

```bash
python run.py coverage
```

To install the packages requires to generate the API documentation, run:

```bash
pip install --user -r requires/api_docs
```

The documentation can then be generated by running:

```bash
python run.py api_docs
```

To install the necessary packages for releasing a new version on PyPI, run:

```bash
pip install --user -r requires/release
```

Releases are created by:

 - Making a git tag in [semver](http://semver.org/) format
 - Running the command:

   ```bash
   python run.py release
   ```

Existing releases can be found at https://pypi.python.org/pypi/oscrypto.

## CI Tasks

A task named `deps` exists to download and stage all necessary testing
dependencies. On posix platforms, `curl` is used for downloads and on Windows
PowerShell with `Net.WebClient` is used. This configuration sidesteps issues
related to getting pip to work properly and messing with `site-packages` for
the version of Python being used.

The `ci` task runs `lint` (if flake8 is available for the version of Python) and
`coverage` (or `tests` if coverage is not available for the version of Python).
If the current directory is a clean git working copy, the coverage data is
submitted to codecov.io.

```bash
python run.py deps
python run.py ci
```



            

Raw data

            {
    "_id": null,
    "home_page": "https://github.com/wbond/oscrypto",
    "name": "oscrypto",
    "maintainer": "",
    "docs_url": null,
    "requires_python": "",
    "maintainer_email": "",
    "keywords": "crypto pki tls ssl x509 certificate encrypt decrypt sign verify rsa dsa ec dh",
    "author": "wbond",
    "author_email": "will@wbond.net",
    "download_url": "https://files.pythonhosted.org/packages/06/81/a7654e654a4b30eda06ef9ad8c1b45d1534bfd10b5c045d0c0f6b16fecd2/oscrypto-1.3.0.tar.gz",
    "platform": null,
    "description": "# oscrypto\n\nA compilation-free, always up-to-date encryption library for Python that works\non Windows, OS X, Linux and BSD. Supports the following versions of Python:\n2.6, 2.7, 3.2, 3.3, 3.4, 3.5, 3.6, 3.7, 3.8, 3.9, 3.10 and pypy.\n\n - [Supported Operating Systems](#supported-operationg-systems)\n - [Features](#features)\n - [Why Another Python Crypto Library?](#why-another-python-crypto-library)\n - [Related Crypto Libraries](#related-crypto-libraries)\n - [Current Release](#current-release)\n - [Dependencies](#dependencies)\n - [Installation](#installation)\n - [License](#license)\n - [Documentation](#documentation)\n - [Continuous Integration](#continuous-integration)\n - [Testing](#testing)\n - [Development](#development)\n - [CI Tasks](#ci-tasks)\n\n[![GitHub Actions CI](https://github.com/wbond/oscrypto/workflows/CI/badge.svg)](https://github.com/wbond/oscrypto/actions?workflow=CI)\n[![CircleCI](https://circleci.com/gh/wbond/oscrypto.svg?style=shield)](https://circleci.com/gh/wbond/oscrypto)\n[![PyPI](https://img.shields.io/pypi/v/oscrypto.svg)](https://pypi.python.org/pypi/oscrypto)\n\n## Supported Operating Systems\n\nThe library integrates with the encryption library that is part of the operating\nsystem. This means that a compiler is never needed, and OS security updates take\ncare of patching vulnerabilities. Supported operating systems include:\n\n - Windows XP or newer\n   - Uses:\n     - [Cryptography API: Next Generation (CNG)](https://msdn.microsoft.com/en-us/library/windows/desktop/aa376210(v=vs.85).aspx)\n     - [Secure Channel](https://msdn.microsoft.com/en-us/library/windows/desktop/aa380123(v=vs.85).aspx) for TLS\n     - [CryptoAPI](https://msdn.microsoft.com/en-us/library/windows/desktop/aa380256(v=vs.85).aspx) for trust lists and XP support\n   - Tested on:\n     - Windows XP (no SNI)\n     - Windows 7\n     - Windows 8.1\n     - Windows Server 2012\n     - Windows 10\n - OS X 10.7 or newer\n   - Uses:\n     - [Security.framework](https://developer.apple.com/library/prerelease/mac/documentation/Security/Reference/SecurityFrameworkReference/index.html)\n     - [Secure Transport](https://developer.apple.com/library/prerelease/mac/documentation/Security/Reference/secureTransportRef/index.html#//apple_ref/doc/uid/TP30000155) for TLS\n     - [CommonCrypto](http://www.opensource.apple.com/source/CommonCrypto/CommonCrypto-55010/CommonCrypto/) for PBKDF2\n     - OpenSSL (or LibreSSL on macOS 10.13) for the PKCS #12 KDF\n   - Tested on:\n     - OS X 10.7\n     - OS X 10.8\n     - OS X 10.9\n     - OS X 10.10\n     - OS X 10.11\n     - OS X 10.11 with OpenSSL 1.1.0\n     - macOS 10.12\n     - macOS 10.13 with LibreSSL 2.2.7\n     - macOS 10.14\n     - macOS 10.15\n     - macOS 10.15 with OpenSSL 3.0\n     - macOS 11\n     - macOS 12\n - Linux or BSD\n   - Uses one of:\n     - [OpenSSL 0.9.8](https://www.openssl.org/docs/man0.9.8/)\n     - [OpenSSL 1.0.x](https://www.openssl.org/docs/man1.0.0/)\n     - [OpenSSL 1.1.0](https://www.openssl.org/docs/man1.1.0/)\n     - [OpenSSL 3.0](https://www.openssl.org/docs/man3.0/)\n     - [LibreSSL](http://www.libressl.org/)\n   - Tested on:\n     - Arch Linux with OpenSSL 1.0.2\n     - OpenBSD 5.7 with LibreSSL\n     - Ubuntu 10.04 with OpenSSL 0.9.8\n     - Ubuntu 12.04 with OpenSSL 1.0.1\n     - Ubuntu 15.04 with OpenSSL 1.0.1\n     - Ubuntu 16.04 with OpenSSL 1.0.2 on Raspberry Pi 3 (armhf)\n     - Ubuntu 18.04 with OpenSSL 1.1.x (amd64, arm64, ppc64el)\n     - Ubuntu 22.04 with OpenSSL 3.0 (amd64)\n\n*OS X 10.6 will not be supported due to a lack of available\ncryptographic primitives and due to lack of vendor support.*\n\n## Features\n\nCurrently the following features are implemented. Many of these should only be\nused for integration with existing/legacy systems. If you don't know which you\nshould, or should not use, please see [Learning](docs/readme.md#learning).\n\n - [TLSv1.x socket wrappers](docs/tls.md)\n   - Certificate verification performed by OS trust roots\n   - Custom CA certificate support\n   - SNI support (except Windows XP)\n   - Session reuse via IDs/tickets\n   - Modern cipher suites (RC4, DES, anon and NULL ciphers disabled)\n   - Weak DH parameters and certificate signatures rejected\n   - SSLv3 disabled by default, SSLv2 unimplemented\n   - CRL/OCSP revocation checks consistenty disabled\n - [Exporting OS trust roots](docs/trust_list.md)\n   - PEM-formatted CA certs from the OS for OpenSSL-based code\n - [Encryption/decryption](docs/symmetric.md)\n   - AES (128, 192, 256), CBC mode, PKCS7 padding\n   - AES (128, 192, 256), CBC mode, no padding\n   - TripleDES 3-key, CBC mode, PKCS5 padding\n   - TripleDes 2-key, CBC mode, PKCS5 padding\n   - DES, CBC mode, PKCS5 padding\n   - RC2 (40-128), CBC mode, PKCS5 padding\n   - RC4 (40-128)\n   - RSA PKCSv1.5\n   - RSA OAEP (SHA1 only)\n - [Generating public/private key pairs](docs/asymmetric.md)\n   - RSA (1024, 2048, 3072, 4096 bit)\n   - DSA (1024 bit on all platforms - 2048, 3072 bit with OpenSSL 1.x or\n     Windows 8)\n   - EC (secp256r1, secp384r1, secp521r1 curves)\n - [Generating DH parameters](docs/asymmetric.md)\n - [Signing and verification](docs/asymmetric.md)\n   - RSA PKCSv1.5\n   - RSA PSS\n   - DSA\n   - EC\n - [Loading and normalizing DER and PEM formatted keys](docs/keys.md)\n   - RSA public and private keys\n   - DSA public and private keys\n   - EC public and private keys\n   - X.509 Certificates\n   - PKCS#12 archives (`.pfx`/`.p12`)\n - [Key derivation](docs/kdf.md)\n   - PBKDF2\n   - PBKDF1\n   - PKCS#12 KDF\n - [Random byte generation](docs/util.md)\n\nThe feature set was largely driven by the technologies used related to\ngenerating and validating X.509 certificates. The various CBC encryption schemes\nand KDFs are used to load encrypted private keys, and the various RSA padding\nschemes are part of X.509 signatures.\n\nFor modern cryptography not tied to an existing system, please see the\n[Modern Cryptography](docs/readme.md#modern-cryptography) section of the docs.\n\n*Please note that this library does not include modern block modes such as CTR\nand GCM due to lack of support from both OS X and OpenSSL 0.9.8.*\n\n## Why Another Python Crypto Library?\n\nIn short, the existing cryptography libraries for Python didn't fit the needs of\na couple of projects I was working on. Primarily these are applications\ndistributed to end-users who aren't programmers, that need to handle TLS and\nvarious technologies related to X.509 certificates.\n\nIf your system is not tied to AES, TLS, X.509, or related technologies, you\nprobably want [more modern cryptography](docs/readme.md#modern-cryptography).\n\nDepending on your needs, the [cryptography](https://cryptography.io) package may\nbe a good (or better) fit.\n\nSome things that make oscrypto unique:\n\n - No compiler needed, ever. No need to pre-compile shared libraries. Just\n   distribute the Python source files, any way you want.\n - Uses the operating system's crypto library - does not require OpenSSL on\n   Windows or OS X.\n - Relies on the operating system for security patching. You don't need to\n   rebuild all of your apps every time there is a new TLS vulnerability.\n - Intentionally limited in scope to crypto primitives. Other libraries\n   built upon it deal with certificate path validation, creating certificates\n   and CSRs, constructing CMS structures.\n - Built on top of a fast, pure-Python ASN.1 parser,\n   [asn1crypto](https://github.com/wbond/asn1crypto).\n - TLS functionality uses the operating system's trust list/CA certs and is\n   pre-configured with sane defaults\n - Public APIs are simple and use strict type checks to avoid errors\n\nSome downsides include:\n\n - Does not currently implement:\n   - standalone DH key exchange\n   - various encryption modes such as GCM, CCM, CTR, CFB, OFB, ECB\n   - key wrapping\n   - CMAC\n   - HKDF\n - Non-TLS functionality is architected for dealing with data that fits in\n   memory and is available all at once\n - Developed by a single developer\n\n## Related Crypto Libraries\n\n*oscrypto* is part of the modularcrypto family of Python packages:\n\n - [asn1crypto](https://github.com/wbond/asn1crypto)\n - [oscrypto](https://github.com/wbond/oscrypto)\n - [csrbuilder](https://github.com/wbond/csrbuilder)\n - [certbuilder](https://github.com/wbond/certbuilder)\n - [crlbuilder](https://github.com/wbond/crlbuilder)\n - [ocspbuilder](https://github.com/wbond/ocspbuilder)\n - [certvalidator](https://github.com/wbond/certvalidator)\n\n## Current Release\n\n1.2.1 - [changelog](changelog.md)\n\n## Dependencies\n\n - [*asn1crypto*](https://github.com/wbond/asn1crypto)\n - Python 2.6, 2.7, 3.2, 3.3, 3.4, 3.5, 3.6, 3.7, 3.8, 3.9, 3.10 or pypy\n - OpenSSL/LibreSSL if on Linux\u00b9\n\n*\u00b9 On Linux, `ctypes.util.find_library()` is used to located OpenSSL. Alpine Linux does not have an appropriate install by default for `find_library()` to work properly. Instead, `oscrypto.use_openssl()` must be called with the path to the OpenSSL shared libraries.*\n\n## Installation\n\n```bash\npip install oscrypto\n```\n\n## License\n\n*oscrypto* is licensed under the terms of the MIT license. See the\n[LICENSE](LICENSE) file for the exact license text.\n\n## Documentation\n\n[*oscrypto* documentation](docs/readme.md)\n\n## Continuous Integration\n\nVarious combinations of platforms and versions of Python are tested via:\n\n - [macOS, Linux, Windows](https://github.com/wbond/oscrypto/actions/workflows/ci.yml) via GitHub Actions\n - [arm64](https://circleci.com/gh/wbond/oscrypto) via CircleCI\n\n## Testing\n\nTests are written using `unittest` and require no third-party packages.\n\nDepending on what type of source is available for the package, the following\ncommands can be used to run the test suite.\n\n### Git Repository\n\nWhen working within a Git working copy, or an archive of the Git repository,\nthe full test suite is run via:\n\n```bash\npython run.py tests\n```\n\nTo run only some tests, pass a regular expression as a parameter to `tests`.\n\n```bash\npython run.py tests aes\n```\n\nTo run tests multiple times, in order to catch edge-case bugs, pass an integer\nto `tests`. If combined with a regular expression for filtering, pass the\nrepeat count after the regular expression.\n\n```bash\npython run.py tests 20\npython run.py tests aes 20\n```\n\n#### Backend Options\n\nTo run tests using a custom build of OpenSSL, or to use OpenSSL on Windows or\nMac, add `use_openssl` after `run.py`, like:\n\n```bash\npython run.py use_openssl=/path/to/libcrypto.so,/path/to/libssl.so tests\n```\n\nTo run tests forcing the use of ctypes, even if cffi is installed, add\n`use_ctypes` after `run.py`:\n\n```bash\npython run.py use_ctypes=true tests\n```\n\nTo run tests using the legacy Windows crypto functions on Windows 7+, add\n`use_winlegacy` after `run.py`:\n\n```bash\npython run.py use_winlegacy=true tests\n```\n\n#### Internet Tests\n\nTo skip tests that require an internet connection, add `skip_internet` after\n`run.py`:\n\n```bash\npython run.py skip_internet=true tests\n```\n\n### PyPi Source Distribution\n\nWhen working within an extracted source distribution (aka `.tar.gz`) from\nPyPi, the full test suite is run via:\n\n```bash\npython setup.py test\n```\n\n#### Test Options\n\nThe following env vars can control aspects of running tests:\n\n##### Force OpenSSL Shared Library Paths\n\nSetting the env var `OSCRYPTO_USE_OPENSSL` to a string in the form:\n\n```\n/path/to/libcrypto.so,/path/to/libssl.so\n```\n\nwill force use of specific OpenSSL shared libraries.\n\nThis also works on Mac and Windows to force use of OpenSSL instead of using\nnative crypto libraries.\n\n##### Force Use of ctypes\n\nBy default, oscrypto will use the `cffi` module for FFI if it is installed.\n\nTo use the slightly slower, but more widely-tested, `ctypes` FFI layer, set\nthe env var `OPENSSL_USE_CTYPES=true`.\n\n##### Force Use of Legacy Windows Crypto APIs\n\nOn Windows 7 and newer, oscrypto will use the CNG backend by default.\n\nTo force use of the older CryptoAPI, set the env var\n`OPENSSL_USE_WINLEGACY=true`.\n\n##### Skip Tests Requiring an Internet Connection\n\nSome of the TLS tests require an active internet connection to ensure that\nvarious \"bad\" server certificates are rejected.\n\nTo skip tests requiring an internet connection, set the env var\n`OPENSSL_SKIP_INTERNET_TESTS=true`.\n\n### Package\n\nWhen the package has been installed via pip (or another method), the package\n`oscrypto_tests` may be installed and invoked to run the full test suite:\n\n```bash\npip install oscrypto_tests\npython -m oscrypto_tests\n```\n\n## Development\n\nTo install the package used for linting, execute:\n\n```bash\npip install --user -r requires/lint\n```\n\nThe following command will run the linter:\n\n```bash\npython run.py lint\n```\n\nSupport for code coverage can be installed via:\n\n```bash\npip install --user -r requires/coverage\n```\n\nCoverage is measured by running:\n\n```bash\npython run.py coverage\n```\n\nTo install the packages requires to generate the API documentation, run:\n\n```bash\npip install --user -r requires/api_docs\n```\n\nThe documentation can then be generated by running:\n\n```bash\npython run.py api_docs\n```\n\nTo install the necessary packages for releasing a new version on PyPI, run:\n\n```bash\npip install --user -r requires/release\n```\n\nReleases are created by:\n\n - Making a git tag in [semver](http://semver.org/) format\n - Running the command:\n\n   ```bash\n   python run.py release\n   ```\n\nExisting releases can be found at https://pypi.python.org/pypi/oscrypto.\n\n## CI Tasks\n\nA task named `deps` exists to download and stage all necessary testing\ndependencies. On posix platforms, `curl` is used for downloads and on Windows\nPowerShell with `Net.WebClient` is used. This configuration sidesteps issues\nrelated to getting pip to work properly and messing with `site-packages` for\nthe version of Python being used.\n\nThe `ci` task runs `lint` (if flake8 is available for the version of Python) and\n`coverage` (or `tests` if coverage is not available for the version of Python).\nIf the current directory is a clean git working copy, the coverage data is\nsubmitted to codecov.io.\n\n```bash\npython run.py deps\npython run.py ci\n```\n\n\n",
    "bugtrack_url": null,
    "license": "MIT",
    "summary": "TLS (SSL) sockets, key generation, encryption, decryption, signing, verification and KDFs using the OS crypto libraries. Does not require a compiler, and relies on the OS for patching. Works on Windows, OS X and Linux/BSD.",
    "version": "1.3.0",
    "split_keywords": [
        "crypto",
        "pki",
        "tls",
        "ssl",
        "x509",
        "certificate",
        "encrypt",
        "decrypt",
        "sign",
        "verify",
        "rsa",
        "dsa",
        "ec",
        "dh"
    ],
    "urls": [
        {
            "comment_text": "",
            "digests": {
                "md5": "1afcabb8bc3432b2ba6ff24ef7ecaba1",
                "sha256": "2b2f1d2d42ec152ca90ccb5682f3e051fb55986e1b170ebde472b133713e7085"
            },
            "downloads": -1,
            "filename": "oscrypto-1.3.0-py2.py3-none-any.whl",
            "has_sig": false,
            "md5_digest": "1afcabb8bc3432b2ba6ff24ef7ecaba1",
            "packagetype": "bdist_wheel",
            "python_version": "py2.py3",
            "requires_python": null,
            "size": 194553,
            "upload_time": "2022-03-18T01:53:24",
            "upload_time_iso_8601": "2022-03-18T01:53:24.559582Z",
            "url": "https://files.pythonhosted.org/packages/01/7c/fa07d3da2b6253eb8474be16eab2eadf670460e364ccc895ca7ff388ee30/oscrypto-1.3.0-py2.py3-none-any.whl",
            "yanked": false,
            "yanked_reason": null
        },
        {
            "comment_text": "",
            "digests": {
                "md5": "1d5be9d502f9e2207513493ff2f03e90",
                "sha256": "6f5fef59cb5b3708321db7cca56aed8ad7e662853351e7991fcf60ec606d47a4"
            },
            "downloads": -1,
            "filename": "oscrypto-1.3.0.tar.gz",
            "has_sig": false,
            "md5_digest": "1d5be9d502f9e2207513493ff2f03e90",
            "packagetype": "sdist",
            "python_version": "source",
            "requires_python": null,
            "size": 184590,
            "upload_time": "2022-03-18T01:53:26",
            "upload_time_iso_8601": "2022-03-18T01:53:26.889336Z",
            "url": "https://files.pythonhosted.org/packages/06/81/a7654e654a4b30eda06ef9ad8c1b45d1534bfd10b5c045d0c0f6b16fecd2/oscrypto-1.3.0.tar.gz",
            "yanked": false,
            "yanked_reason": null
        }
    ],
    "upload_time": "2022-03-18 01:53:26",
    "github": true,
    "gitlab": false,
    "bitbucket": false,
    "github_user": "wbond",
    "github_project": "oscrypto",
    "travis_ci": false,
    "coveralls": false,
    "github_actions": true,
    "tox": true,
    "lcname": "oscrypto"
}
        
Elapsed time: 0.01266s