summaryrefslogtreecommitdiff
path: root/src/leap/crypto
AgeCommit message (Collapse)Author
2013-05-11updated documentationkali
* documentation reviewed after rewrite, ready for 0.2.1 * updated docstrings format to fit sphinx autodoc
2013-05-11pep8kali
2013-04-11Emit session_id and uid through eventsTomas Touceda
2013-04-08Several fixes as per reviewkali
2013-03-26workaround for srp server timing out on consecutive runskali
2013-03-26tests for srpregister and srpauthkali
in this commit too, the twisted fake_provider implementation
2013-03-15namespace leap + leap.common splitkali
leap is a namespace package from here on. common folder will be deleted and moved to leap_pycommon repository.
2013-03-13Default to port 443 if no port is specifiedTomás Touceda
2013-03-13Separate stdlibs from non-std in importsTomás Touceda
2013-03-12Get eip cert with session_id when possibleTomás Touceda
2013-03-08Add keyring and username/password saving capabilitiesTomás Touceda
Also: - Fix translations in SRPAuth - Support non-ascii passwords - Make the server check if the characters are allowed, just check for easy passwords
2013-03-08Add translation supportTomás Touceda
Also: - Make OpenVPN use a random port every time - Logout in parallel so the UI doesn't block - Add the WAIT status from OpenVPN to the mainwindow displays - Support non-unix sockets in the LinuxVPNLauncher
2013-03-07Change asserts for a custom leap_assert methodTomás Touceda
Also: - Make SRPAuth and the Bootstrappers be a QObject instead of a QThread so we can use them inside another more generic thread - Add a generic CheckerThread that runs checks or whatever operation as long as it returns a boolean value - Closes the whole application if the wizard is rejected at the first run - Do not fail when the config directory doesn't exist - Set the wizard pixmap logo as LEAP's logo - Improve wizard checks - Make SRPRegister play nice with the CheckerThread
2013-03-06Add SRP related code: authentication and registrationTomás Touceda
2013-03-06Remove everything to start from scratchTomás Touceda
2013-01-24check cert time_boundaries uses pyOpenSSLkali
I had missed this one while deprecating gnutls
2013-01-24all tests green againkali
plus: * added soledad test requirements * removed soledad from run_tests run (+1K tests failing) * added option to run All tests to run_tests script * pep8 cleanup
2013-01-24switch dependency to pyopensslkali
2013-01-17fix ctypes dependency discovery for libgnutlskali
2012-12-20fix broken testskali
2012-12-18catch gnutls error while validating pemfilekali
2012-12-15use gnutls to parse pemfileskali
2012-12-12tests for firstrun/wizardkali
2012-10-26user credentials saved on login/signup branches.kali
cert request is using magick decorator that retrieves the certificates using srp.
2012-10-19ca cert fingerprint check + api cert verificationkali
2012-10-19add more digest functionskali
separate get_cert and get_fingerprint functions added separator
2012-10-18catch cert verification errors and ask user for trustkali
with a little helper function using gnutls
2012-10-11make file_path explicitkali
2012-10-06pep8kali
2012-10-05use keyring to store user passwordkali
using a quite lame cryptedfile by the moment until dbus bug makes gnome-keyring usable again or we come up with the encrypted database solution. we might want to explore the option of using this python-keyring with the different native backends for win and macosx. for now: we generate a random secret that we store in the qsettings file. so, the whole thing is just to avoid plaintext stuff. for this, we could have done rot13, haha.