python-pyasn1-modules/python-pyasn1-modules.changes

312 lines
12 KiB
Plaintext

-------------------------------------------------------------------
Mon Oct 7 15:29:49 UTC 2024 - Markéta Machová <mmachova@suse.com>
- Update to 0.4.1
* Added support for Python 3.13
- Add upstream pyasn1-061.patch to fix tests with recent pyasn1
-------------------------------------------------------------------
Thu Mar 28 12:16:19 UTC 2024 - Dirk Müller <dmueller@suse.com>
- update to 0.4.0:
* Added support for Python 3.11, 3.12
* Removed support for EOL Pythons 2.7, 3.6, 3.7
-------------------------------------------------------------------
Thu May 4 19:28:21 UTC 2023 - Dirk Müller <dmueller@suse.com>
- update to 0.3.0:
* Added support for Python 3.8, 3.9, 3.10, 3.11
* Removed support for EOL Pythons 2.4, 2.5, 2.6, 3.2, 3.3, 3.4,
3.5
* Added support for PyPy 3.7, 3.8, 3.9
* Modernized packaging and testing. pyasn1-modules now uses
``setup.cfg``, ``pyproject.toml``,
* PyPI package ownership for `pyasn1` and `pyasn1-module` has
been transfered to *Christian Heimes* and *Simon Pichugin* in
* The upstream repositories for `pyasn1` and `pyasn1-modules`
are now in the GitHub organization https://github.com/pyasn1/.
* Added tox runner with a handful of basic jobs
* Add RFC3125 providing Electronic Signature Policies
* Add RFC5126 providing CMS Advanced Electronic Signatures
* Improve test routines for RFC5126
* Add RFC4387 providing Certificate Store Access via HTTP
* Changed assertion in unit tests from Python built-in to
`unittest` provided
* Add RFC8692 providing Algorithm Identifiers for RSASSA-PSS
and ECDSA Using SHAKEs
* Add RFC5753 providing CMS Elliptic Curve Cryptography
Algorithms
* Add RFC3820 providing Proxy Certificates
* Add RFC3370 providing Cryptographic Message Syntax (CMS)
Algorithms
* Add RFC3537 providing HMAC Key Wrapping
* Add RFC3739 providing Qualified Certificates
* Add RFC2876 providing KEA and SKIPJACK for CMS
* Add RFC3058 providing IDEA Encryption Algorithm for CMS
* Add RFC3657 providing Camellia Encryption Algorithm for CMS
* Add RFC4010 providing SEED Encryption Algorithm for CMS
* Add RFC4357 providing Additional Cryptographic Algorithms for
* Add RFC4490 providing GOST 28147-89, GOST R 34.11-94, GOST R
34.10-94, and GOST R 34.10-2001 Algorithms for CMS
* Add RFC4491 providing GOST R 34.10-94, GOST R 34.10-2001, and
GOST R 34.11-94 Algorithms for certificates and CRLs
* Add RFC8696 providing using Pre-Shared Key (PSK) in the CMS
* Add RFC5639 providing identifiers for the Brainpool curves in
Elliptic Curve Cryptography
* Add RFC5697 providing Other Certificates Extension
* Add RFC4683 providing Subject Identification Method (SIM)
* Add RFC4476 providing Attribute Certificate Policies
Extension
* Add RFC5636 providing Traceable Anonymous Certificate
* Add RFC5752 providing Multiple Signatures attribute for CMS
* Add RFC5275 providing CMS Symmetric Key Management and
Distribution
* Add RFC8702 providing SHAKE One-way Hash Functions in the CMS
* Add RFC8708 providing HSS/LMS Hash-based Signature Algorithm
for CMS
* Advance copyright statement to year 2020
* Add RFC8769 providing CBOR and CBOR Sequence content types
for CMS
-------------------------------------------------------------------
Fri Apr 21 12:30:22 UTC 2023 - Dirk Müller <dmueller@suse.com>
- add sle15_python_module_pythons (jsc#PED-68)
-------------------------------------------------------------------
Thu Apr 13 22:43:31 UTC 2023 - Matej Cepl <mcepl@suse.com>
- Make calling of %{sle15modernpython} optional.
-------------------------------------------------------------------
Sat Feb 8 20:40:52 UTC 2020 - Arun Persaud <arun@gmx.de>
- specfile:
* update copyright year
* be more specific in %files section
- update to version 0.2.8:
* Improve test routines for modules that use certificate extensions
* Improve test for RFC3709 with a real world certificate
* Added RFC7633 providing TLS Features Certificate Extension
* Added RFC7229 providing OIDs for Test Certificate Policies
* Added tests for RFC3280, RFC3281, RFC3852, and RFC4211
* Added RFC6960 providing Online Certificate Status Protocol (OCSP)
* Added RFC6955 providing Diffie-Hellman Proof-of-Possession
Algorithms
* Updated the handling of maps for use with openType for RFC 3279
* Added RFC6486 providing RPKI Manifests
* Added RFC6487 providing Profile for X.509 PKIX Resource
Certificates
* Added RFC6170 providing Certificate Image in the Internet X.509
Public Key Infrastructure, and import the object identifier into
RFC3709.
* Added RFC6187 providing Certificates for Secure Shell
Authentication
* Added RFC6482 providing RPKI Route Origin Authorizations (ROAs)
* Added RFC6664 providing S/MIME Capabilities for Public Keys
* Added RFC6120 providing Extensible Messaging and Presence Protocol
names in certificates
* Added RFC4985 providing Subject Alternative Name for expression of
service names in certificates
* Added RFC5924 providing Extended Key Usage for Session Initiation
Protocol (SIP) in X.509 certificates
* Added RFC5916 providing Device Owner Attribute
* Added RFC7508 providing Securing Header Fields with S/MIME
* Update RFC8226 to use ComponentPresentConstraint() instead of the
previous work around
* Add RFC2631 providing OtherInfo for Diffie-Hellman Key Agreement
* Add RFC3114 providing test values for the S/MIME Security Label
* Add RFC5755 providing Attribute Certificate Profile for
Authorization
* Add RFC5913 providing Clearance Attribute and Authority Clearance
Constraints Certificate Extension
* Add RFC5917 providing Clearance Sponsor Attribute
* Add RFC4043 providing Internet X.509 PKI Permanent Identifier
* Add RFC7585 providing Network Access Identifier (NAI) Realm Name
for Certificates
* Update RFC3770 to support openType for attributes and reported
errata
* Add RFC4334 providing Certificate Extensions and Attributes for
Authentication in PPP and Wireless LAN Networks
-------------------------------------------------------------------
Sun Nov 17 09:11:49 UTC 2019 - Michael Ströder <michael@stroeder.com>
- Update to 0.2.7
* various RFC enhancements, see CHANGES.txt
-------------------------------------------------------------------
Tue Sep 10 12:44:26 UTC 2019 - Tomáš Chvátal <tchvatal@suse.com>
- Update to 0.2.6:
* various RFC enhancements, see CHANGES.txt
-------------------------------------------------------------------
Sat May 25 09:39:16 UTC 2019 - Tomáš Chvátal <tchvatal@suse.com>
- Update to 0.2.5:
- Added RFC3560 providing RSAES-OAEP Key Transport Algorithm
in CMS
- Added RFC6019 providing BinaryTime - an alternate format
for representing Date and Time
- RFC3565 superseded by RFC5649
- Added RFC5480 providng Elliptic Curve Cryptography Subject
Public Key Information
- Added RFC8520 providing X.509 Extensions for MUD URL and
MUD Signer
- Added RFC3161 providing Time-Stamp Protocol support
- Added RFC3709 providing Logotypes in X.509 Certificates
- Added RFC3274 providing CMS Compressed Data Content Type
- Added RFC4073 providing Multiple Contents protection
with CMS
- Execute testsuite
-------------------------------------------------------------------
Mon Jan 28 14:26:26 UTC 2019 - Michael Ströder <michael@stroeder.com>
- update to version 0.2.4
Revision 0.2.4:
- Added modules for RFC8226 implementing JWT Claim Constraints
and TN Authorization List for X.509 certificate extensions
- Fixed bug in `rfc5280.AlgorithmIdentifier` ANY type definition
Revision 0.2.3:
- Added modules for RFC5083 and RFC5084 (CMS)
- Copyright notice extended to the year 2019
-------------------------------------------------------------------
Tue Jul 3 10:21:47 UTC 2018 - michael@stroeder.com
- update to version 0.2.2:
* Copyright notice extended to the year 2018
* Migrated references from SourceForge
* rfc2986 module added
-------------------------------------------------------------------
Sun Nov 26 21:20:48 UTC 2017 - arun@gmx.de
- update to version 0.2.1:
* Allow ANY DEFINED BY objects expanding automatically if requested
* Imports PEP8'ed
-------------------------------------------------------------------
Thu Oct 12 07:45:00 UTC 2017 - michael@stroeder.com
- Update to upstream release 0.1.5
* OCSP response blob fixed in test
* Fixed wrong OCSP ResponderID components tagging
-------------------------------------------------------------------
Thu Sep 7 22:05:22 UTC 2017 - michael@stroeder.com
- Update to upstream release 0.1.4
* more onversion pinning
-------------------------------------------------------------------
Thu Sep 7 12:03:08 UTC 2017 - michael@stroeder.com
- Update to upstream release 0.1.2
* Tests refactored into proper unit tests
* pem.readBase64fromText() convenience function added
* Pinned to pyasn1 0.3.4+
-------------------------------------------------------------------
Tue Aug 15 17:34:02 UTC 2017 - michael@stroeder.com
- Update to upstream release 0.0.11
* Fixed typo in ASN.1 definitions at rfc2315.py
-------------------------------------------------------------------
Sat Jul 29 21:04:04 UTC 2017 - michael@stroeder.com
- Updated project URL
- Update to upstream release 0.0.10
* Fixed SequenceOf initializer to pass now-mandatory componentType
keyword argument (since pyasn1 0.3.1)
* Temporarily fixed recursive ASN.1 type definition to work with
pyasn1 0.3.1+. This is going to be fixed properly shortly.
-------------------------------------------------------------------
Wed Jun 14 12:44:59 UTC 2017 - michael@stroeder.com
- Update to upstream release 0.0.9
* More CRL data structures added (RFC3279)
* Added X.509 certificate extensions map
* Added X.509 attribute type map
* Fix to __doc__ use in setup.py to make -O0 installation mode working
* Copyright added to source files
* More PEP-8'ing done on the code
* Author's e-mail changed
-------------------------------------------------------------------
Thu Mar 16 13:46:56 UTC 2017 - tbechtold@suse.com
- Switch to singlespec approach
-------------------------------------------------------------------
Tue Dec 29 17:10:09 UTC 2015 - michael@stroeder.com
- Update to upstream release 0.0.8
- Wheel distribution format now supported
- Fix to misspelled rfc2459.id_at_sutname variable
- Fix to misspelled rfc2459.NameConstraints component tag ID
- Fix to misspelled rfc2459.GeneralSubtree component default status
-------------------------------------------------------------------
Thu Aug 13 13:02:16 UTC 2015 - michael@stroeder.com
- Added file ext .txt to doc files like in upstream
- Update to upstream release 0.0.7
- Extensions added to text files, CVS attic flushed.
- Fix to rfc2459.BasicConstraints syntax.
-------------------------------------------------------------------
Sat Jul 4 20:46:59 UTC 2015 - michael@stroeder.com
- Update to upstream release 0.0.6
- Typo fix to id_kp_serverAuth object value
- A test case for indefinite length encoding eliminated as it's
forbidden in DER.
-------------------------------------------------------------------
Thu Oct 24 11:11:23 UTC 2013 - speilicke@suse.com
- Require python-setuptools instead of distribute (upstreams merged)
-------------------------------------------------------------------
Tue May 7 08:25:25 UTC 2013 - michael@stroeder.com
- Update to upstream release 0.0.5
Revision 0.0.5
--------------
- License updated to vanilla BSD 2-Clause to ease package use
(http://opensource.org/licenses/BSD-2-Clause).
-------------------------------------------------------------------
Wed Jan 2 19:44:41 UTC 2013 - toddrme2178@gmail.com
- Fix building on SLES
-------------------------------------------------------------------
Fri Jul 27 18:03:12 UTC 2012 - michael@stroeder.com
- Update to upstream release 0.0.4
The pyasn1-modules collection now includes Certificate Management Protocol
(RFC4210) data structures.
-------------------------------------------------------------------
Mon Apr 23 19:23:07 UTC 2012 - michael@stroeder.com
- Update to upstream release 0.0.3
-------------------------------------------------------------------
Fri Mar 23 09:58:53 UTC 2012 - michael@stroeder.com
- Initial submission of upstream release 0.0.2