1760 lines
85 KiB
Plaintext
1760 lines
85 KiB
Plaintext
|
-------------------------------------------------------------------
|
|||
|
Fri Nov 8 10:08:46 UTC 2024 - Ben Greiner <code@bnavigator.de>
|
|||
|
|
|||
|
- Fix requires_eq replacement for distributions which do not have
|
|||
|
python3-cffi installed (such as SLE15 python module pythons)
|
|||
|
* gh#openSUSE/python-rpm-macros#185
|
|||
|
- Remove outdated section in description
|
|||
|
|
|||
|
-------------------------------------------------------------------
|
|||
|
Tue Nov 5 08:03:40 UTC 2024 - Dominique Leuenberger <dimstar@opensuse.org>
|
|||
|
|
|||
|
- Avoid using requires_eq, which after the last modifications
|
|||
|
conflicts with python singlespec (order of expansion).
|
|||
|
|
|||
|
-------------------------------------------------------------------
|
|||
|
Tue Oct 22 13:26:21 UTC 2024 - Dirk Müller <dmueller@suse.com>
|
|||
|
|
|||
|
- update to 43.0.3:
|
|||
|
* Fixed release metadata for cryptography-vectors
|
|||
|
* Fixed compilation when using LibreSSL 4.0.0.
|
|||
|
|
|||
|
-------------------------------------------------------------------
|
|||
|
Sat Sep 28 19:45:04 UTC 2024 - Dirk Müller <dmueller@suse.com>
|
|||
|
|
|||
|
- update to 43.0.1:
|
|||
|
* Updated Windows, macOS, and Linux wheels to be compiled with
|
|||
|
OpenSSL 3.3.2.
|
|||
|
|
|||
|
-------------------------------------------------------------------
|
|||
|
Sun Sep 15 08:51:52 UTC 2024 - Andreas Schneider <asn@cryptomilk.org>
|
|||
|
|
|||
|
- Fix building on SLE based distributions
|
|||
|
|
|||
|
-------------------------------------------------------------------
|
|||
|
Mon Aug 12 20:36:00 UTC 2024 - Matej Cepl <mcepl@cepl.eu>
|
|||
|
|
|||
|
- Fix building optimized binaries with debuginfo.
|
|||
|
|
|||
|
-------------------------------------------------------------------
|
|||
|
Wed Jul 31 21:45:43 UTC 2024 - Matej Cepl <mcepl@cepl.eu>
|
|||
|
|
|||
|
- Update building of Rust modules to use modern cargo_vendor
|
|||
|
service
|
|||
|
- Remove unneeded use-offline-build.patch
|
|||
|
|
|||
|
-------------------------------------------------------------------
|
|||
|
Fri Jul 26 10:33:45 UTC 2024 - Dirk Müller <dmueller@suse.com>
|
|||
|
|
|||
|
- update to 43.0.0:
|
|||
|
* BACKWARDS INCOMPATIBLE: Support for OpenSSL less than 1.1.1e
|
|||
|
has been removed. Users on older version of OpenSSL will
|
|||
|
need to upgrade.
|
|||
|
* BACKWARDS INCOMPATIBLE: Dropped support for LibreSSL < 3.8.
|
|||
|
* Updated Windows, macOS, and Linux wheels to be compiled with
|
|||
|
OpenSSL 3.3.1.
|
|||
|
* Updated the minimum supported Rust version (MSRV) to 1.65.0,
|
|||
|
from 1.63.0.
|
|||
|
* :func:`~cryptography.hazmat.primitives.asymmetric.rsa.generat
|
|||
|
e_private_key` now enforces a minimum RSA key size of
|
|||
|
1024-bit. Note that 1024-bit is still considered insecure,
|
|||
|
users should generally use a key size of 2048-bits.
|
|||
|
* :func:`~cryptography.hazmat.primitives.serialization.pkcs7.se
|
|||
|
rialize_certificates` now emits ASN.1 that more closely
|
|||
|
follows the recommendations in RFC 2315.
|
|||
|
* Added new :doc:`/hazmat/decrepit/index` module which contains
|
|||
|
outdated and insecure cryptographic primitives. :class:`~cryp
|
|||
|
tography.hazmat.primitives.ciphers.algorithms.CAST5`, :class:
|
|||
|
`~cryptography.hazmat.primitives.ciphers.algorithms.SEED`, :c
|
|||
|
lass:`~cryptography.hazmat.primitives.ciphers.algorithms.IDEA
|
|||
|
`, and :class:`~cryptography.hazmat.primitives.ciphers.algori
|
|||
|
thms.Blowfish`, which were deprecated in 37.0.0, have been
|
|||
|
added to this module. They will be removed from the cipher
|
|||
|
module in 45.0.0.
|
|||
|
* Moved :class:`~cryptography.hazmat.primitives.ciphers.algorit
|
|||
|
hms.TripleDES` and :class:`~cryptography.hazmat.primitives.ci
|
|||
|
phers.algorithms.ARC4` into :doc:`/hazmat/decrepit/index` and
|
|||
|
deprecated them in the cipher module. They will be removed
|
|||
|
from the cipher module in 48.0.0.
|
|||
|
* Added support for deterministic
|
|||
|
:class:`~cryptography.hazmat.primitives.asymmetric.ec.ECDSA`
|
|||
|
(RFC 6979)
|
|||
|
* Added support for client certificate verification to the
|
|||
|
:mod:`X.509 path validation <cryptography.x509.verification>`
|
|||
|
APIs in the form of
|
|||
|
:class:`~cryptography.x509.verification.ClientVerifier`,
|
|||
|
:class:`~cryptography.x509.verification.VerifiedClient`, and
|
|||
|
PolicyBuilder :meth:`~cryptography.x509.verification.PolicyBu
|
|||
|
ilder.build_client_verifier`.
|
|||
|
* Added Certificate :attr:`~cryptography.x509.Certificate.publi
|
|||
|
c_key_algorithm_oid` and Certificate Signing Request :attr:`~
|
|||
|
cryptography.x509.CertificateSigningRequest.public_key_algori
|
|||
|
thm_oid` to determine the
|
|||
|
:class:`~cryptography.hazmat._oid.PublicKeyAlgorithmOID`
|
|||
|
Object Identifier of the public key found inside the
|
|||
|
certificate.
|
|||
|
* Added :attr:`~cryptography.x509.InvalidityDate.invalidity_dat
|
|||
|
e_utc`, a timezone-aware alternative to the naïve datetime
|
|||
|
attribute
|
|||
|
:attr:`~cryptography.x509.InvalidityDate.invalidity_date`.
|
|||
|
* Added support for parsing empty DN string in
|
|||
|
:meth:`~cryptography.x509.Name.from_rfc4514_string`.
|
|||
|
* Added the following properties that return timezone-aware
|
|||
|
datetime objects:
|
|||
|
:meth:`~cryptography.x509.ocsp.OCSPResponse.produced_at_utc`,
|
|||
|
:meth:`~cryptography.x509.ocsp.OCSPResponse.revocation_time_u
|
|||
|
tc`,
|
|||
|
:meth:`~cryptography.x509.ocsp.OCSPResponse.this_update_utc`,
|
|||
|
:meth:`~cryptography.x509.ocsp.OCSPResponse.next_update_utc`,
|
|||
|
:meth:`~cryptography.x509.ocsp.OCSPSingleResponse.revocation_
|
|||
|
time_utc`, :meth:`~cryptography.x509.ocsp.OCSPSingleResponse.
|
|||
|
this_update_utc`, :meth:`~cryptography.x509.ocsp.OCSPSingleRe
|
|||
|
sponse.next_update_utc`, These are timezone-aware variants of
|
|||
|
existing properties that return naïve datetime objects.
|
|||
|
* Added :func:`~cryptography.hazmat.primitives.asymmetric.rsa.r
|
|||
|
sa_recover_private_exponent`
|
|||
|
* Added :meth:`~cryptography.hazmat.primitives.ciphers.CipherCo
|
|||
|
ntext.reset_nonce` for altering the nonce of a cipher context
|
|||
|
without initializing a new instance. See the docs for
|
|||
|
additional restrictions.
|
|||
|
* :class:`~cryptography.x509.NameAttribute` now raises an
|
|||
|
exception when attempting to create a common name whose
|
|||
|
length is shorter or longer than RFC 5280 permits.
|
|||
|
* Added basic support for PKCS7 encryption (including SMIME)
|
|||
|
via :class:`~cryptography.hazmat.primitives.serialization.pkc
|
|||
|
s7.PKCS7EnvelopeBuilder`.
|
|||
|
- add use-offline-build.patch
|
|||
|
|
|||
|
-------------------------------------------------------------------
|
|||
|
Sat Jun 8 12:04:15 UTC 2024 - Dirk Müller <dmueller@suse.com>
|
|||
|
|
|||
|
- update to 42.0.8:
|
|||
|
* Updated Windows, macOS, and Linux wheels to be compiled with
|
|||
|
OpenSSL 3.2.2.
|
|||
|
|
|||
|
-------------------------------------------------------------------
|
|||
|
Tue May 7 16:14:05 UTC 2024 - Dirk Müller <dmueller@suse.com>
|
|||
|
|
|||
|
- update to 42.0.7:
|
|||
|
* Restored Windows 7 compatibility for our pre-built wheels.
|
|||
|
Note that we do not test on Windows 7 and wheels for our next
|
|||
|
release will not support it. Microsoft no longer provides
|
|||
|
support for Windows 7 and users are encouraged to upgrade.
|
|||
|
|
|||
|
-------------------------------------------------------------------
|
|||
|
Tue May 7 07:34:43 UTC 2024 - Dirk Müller <dmueller@suse.com>
|
|||
|
|
|||
|
- update to 42.0.6:
|
|||
|
* Fixed compilation when using LibreSSL 3.9.1.
|
|||
|
|
|||
|
-------------------------------------------------------------------
|
|||
|
Tue Apr 2 13:19:19 UTC 2024 - Dirk Müller <dmueller@suse.com>
|
|||
|
|
|||
|
- update to 42.0.5:
|
|||
|
* Limit the number of name constraint checks that will be
|
|||
|
performed in :mod:`X.509 path validation
|
|||
|
<cryptography.x509.verification>` to protect against denial
|
|||
|
of service attacks.
|
|||
|
* Upgrade pyo3 version, which fixes building on PowerPC.
|
|||
|
|
|||
|
-------------------------------------------------------------------
|
|||
|
Thu Feb 22 17:10:39 UTC 2024 - Daniel Garcia <daniel.garcia@suse.com>
|
|||
|
|
|||
|
- update to 42.0.4 (bsc#1220210, CVE-2024-26130):
|
|||
|
* Fixed a null-pointer-dereference and segfault that could occur
|
|||
|
when creating a PKCS#12 bundle. Credit to Alexander-Programming
|
|||
|
for reporting the issue. CVE-2024-26130
|
|||
|
* Fixed ASN.1 encoding for PKCS7/SMIME signed messages. The fields
|
|||
|
SMIMECapabilities and SignatureAlgorithmIdentifier should now be
|
|||
|
correctly encoded according to the definitions in :rfc:2633
|
|||
|
:rfc:3370.
|
|||
|
- update to 42.0.3:
|
|||
|
* Fixed an initialization issue that caused key loading failures for some
|
|||
|
users.
|
|||
|
- Drop patch skip_openssl_memleak_test.patch not needed anymore.
|
|||
|
|
|||
|
-------------------------------------------------------------------
|
|||
|
Wed Jan 31 17:24:29 UTC 2024 - Dirk Müller <dmueller@suse.com>
|
|||
|
|
|||
|
- update to 42.0.2:
|
|||
|
* Updated Windows, macOS, and Linux wheels to be compiled with
|
|||
|
OpenSSL 3.2.1.
|
|||
|
* Fixed an issue that prevented the use of Python buffer
|
|||
|
protocol objects in sign and verify methods on asymmetric
|
|||
|
keys.
|
|||
|
* Fixed an issue with incorrect keyword-argument naming with
|
|||
|
EllipticCurvePrivateKey :meth:`~cryptography.hazmat.primitive
|
|||
|
s.asymmetric.ec.EllipticCurvePrivateKey.exchange`,
|
|||
|
X25519PrivateKey :meth:`~cryptography.hazmat.primitives.asymm
|
|||
|
etric.x25519.X25519PrivateKey.exchange`, X448PrivateKey :meth
|
|||
|
:`~cryptography.hazmat.primitives.asymmetric.x448.X448Private
|
|||
|
Key.exchange`, and DHPrivateKey :meth:`~cryptography.hazmat.p
|
|||
|
rimitives.asymmetric.dh.DHPrivateKey.exchange`.
|
|||
|
|
|||
|
-------------------------------------------------------------------
|
|||
|
Mon Jan 29 14:01:49 UTC 2024 - Dirk Müller <dmueller@suse.com>
|
|||
|
|
|||
|
- update to 42.0.1:
|
|||
|
* Fixed an issue with incorrect keyword-argument naming with
|
|||
|
EllipticCurvePrivateKey :meth:`~cryptography.hazmat.primitive
|
|||
|
s.asymmetric.ec.EllipticCurvePrivateKey.sign`.
|
|||
|
* Resolved compatibility issue with loading certain RSA public
|
|||
|
keys in :func:`~cryptography.hazmat.primitives.serialization.
|
|||
|
load_pem_public_key`.
|
|||
|
* BACKWARDS INCOMPATIBLE: Dropped support for LibreSSL < 3.7.
|
|||
|
* BACKWARDS INCOMPATIBLE: Loading a PKCS7 with no content field
|
|||
|
using :func:`~cryptography.hazmat.primitives.serialization.pk
|
|||
|
cs7.load_pem_pkcs7_certificates` or :func:`~cryptography.hazm
|
|||
|
at.primitives.serialization.pkcs7.load_der_pkcs7_certificates
|
|||
|
` will now raise a ValueError rather than return an empty
|
|||
|
list.
|
|||
|
* Parsing SSH certificates no longer permits malformed critical
|
|||
|
options with values, as documented in the 41.0.2 release
|
|||
|
notes.
|
|||
|
* Updated Windows, macOS, and Linux wheels to be compiled with
|
|||
|
OpenSSL 3.2.0.
|
|||
|
* Updated the minimum supported Rust version (MSRV) to 1.63.0,
|
|||
|
from 1.56.0.
|
|||
|
* We now publish both py37 and py39 abi3 wheels. This should
|
|||
|
resolve some errors relating to initializing a module
|
|||
|
multiple times per process.
|
|||
|
* Support :class:`~cryptography.hazmat.primitives.asymmetric.pa
|
|||
|
dding.PSS` for X.509 certificate signing requests and
|
|||
|
certificate revocation lists with the keyword-only argument
|
|||
|
rsa_padding on the sign methods for
|
|||
|
:class:`~cryptography.x509.CertificateSigningRequestBuilder`
|
|||
|
and
|
|||
|
:class:`~cryptography.x509.CertificateRevocationListBuilder`.
|
|||
|
* Added support for obtaining X.509 certificate signing request
|
|||
|
signature algorithm parameters (including PSS) via :meth:`~cr
|
|||
|
yptography.x509.CertificateSigningRequest.signature_algorithm
|
|||
|
_parameters`.
|
|||
|
* Added support for obtaining X.509 certificate revocation list
|
|||
|
signature algorithm parameters (including PSS) via :meth:`~cr
|
|||
|
yptography.x509.CertificateRevocationList.signature_algorithm
|
|||
|
_parameters`.
|
|||
|
* Added mgf property to :class:`~cryptography.hazmat.primitives
|
|||
|
.asymmetric.padding.PSS`.
|
|||
|
* Added algorithm and mgf properties to :class:`~cryptography.h
|
|||
|
azmat.primitives.asymmetric.padding.OAEP`.
|
|||
|
* Added the following properties that return timezone-aware
|
|||
|
datetime objects:
|
|||
|
:meth:`~cryptography.x509.Certificate.not_valid_before_utc`,
|
|||
|
:meth:`~cryptography.x509.Certificate.not_valid_after_utc`, :
|
|||
|
meth:`~cryptography.x509.RevokedCertificate.revocation_date_u
|
|||
|
tc`, :meth:`~cryptography.x509.CertificateRevocationList.next
|
|||
|
_update_utc`, :meth:`~cryptography.x509.CertificateRevocation
|
|||
|
List.last_update_utc`. These are timezone-aware variants of
|
|||
|
existing properties that return naïve datetime objects.
|
|||
|
* Deprecated the following properties that return naïve
|
|||
|
datetime objects:
|
|||
|
:meth:`~cryptography.x509.Certificate.not_valid_before`,
|
|||
|
:meth:`~cryptography.x509.Certificate.not_valid_after`, :meth
|
|||
|
:`~cryptography.x509.RevokedCertificate.revocation_date`, :me
|
|||
|
th:`~cryptography.x509.CertificateRevocationList.next_update`
|
|||
|
, :meth:`~cryptography.x509.CertificateRevocationList.last_up
|
|||
|
date` in favor of the new timezone-aware variants mentioned
|
|||
|
above.
|
|||
|
* Added support for :class:`~cryptography.hazmat.primitives.cip
|
|||
|
hers.algorithms.ChaCha20` on LibreSSL.
|
|||
|
* Added support for RSA PSS signatures in PKCS7 with :meth:`~cr
|
|||
|
yptography.hazmat.primitives.serialization.pkcs7.PKCS7Signatu
|
|||
|
reBuilder.add_signer`.
|
|||
|
* In the next release (43.0.0) of cryptography, loading an
|
|||
|
X.509 certificate with a negative serial number will raise an
|
|||
|
exception. This has been deprecated since 36.0.0.
|
|||
|
* Added support for :class:`~cryptography.hazmat.primitives.cip
|
|||
|
hers.aead.AESGCMSIV` when using OpenSSL 3.2.0+.
|
|||
|
* Added the :mod:`X.509 path validation
|
|||
|
<cryptography.x509.verification>` APIs for
|
|||
|
:class:`~cryptography.x509.Certificate` chains. These APIs
|
|||
|
should be considered unstable and not subject to our
|
|||
|
stability guarantees until documented as such in a future
|
|||
|
release.
|
|||
|
* Added support for :class:`~cryptography.hazmat.primitives.cip
|
|||
|
hers.algorithms.SM4`
|
|||
|
:class:`~cryptography.hazmat.primitives.ciphers.modes.GCM`
|
|||
|
when using OpenSSL 3.0 or greater.
|
|||
|
- use PEP517 build
|
|||
|
- switch to new cargo-vendor
|
|||
|
|
|||
|
-------------------------------------------------------------------
|
|||
|
Tue Nov 28 09:27:57 UTC 2023 - Dirk Müller <dmueller@suse.com>
|
|||
|
|
|||
|
- update to 41.0.7 (CVE-2023-49083, bsc#1217592):
|
|||
|
* Fixed compilation when using LibreSSL 3.8.2.
|
|||
|
* Fixed a null-pointer-dereference and segfault that could
|
|||
|
occur when loading certificates from a PKCS#7 bundle.
|
|||
|
Credit to **pkuzco** for reporting the issue. **CVE-2023-49083**
|
|||
|
|
|||
|
-------------------------------------------------------------------
|
|||
|
Fri Nov 10 13:28:56 UTC 2023 - Dirk Müller <dmueller@suse.com>
|
|||
|
|
|||
|
- update to 41.0.5:
|
|||
|
* Updated Windows, macOS, and Linux wheels to be compiled with
|
|||
|
OpenSSL 3.1.4.
|
|||
|
* Added a function to support an upcoming ``pyOpenSSL``
|
|||
|
release.
|
|||
|
|
|||
|
-------------------------------------------------------------------
|
|||
|
Thu Oct 5 09:30:35 UTC 2023 - Dirk Müller <dmueller@suse.com>
|
|||
|
|
|||
|
- update to 41.0.4:
|
|||
|
* Updated Windows, macOS, and Linux wheels to be compiled with
|
|||
|
OpenSSL 3.1.3.
|
|||
|
|
|||
|
-------------------------------------------------------------------
|
|||
|
Tue Aug 8 10:57:22 UTC 2023 - Dirk Müller <dmueller@suse.com>
|
|||
|
|
|||
|
- update to 41.0.3:
|
|||
|
* Fixed performance regression loading DH public keys.
|
|||
|
* Fixed a memory leak when using
|
|||
|
* :class:`~cryptography.hazmat.primitives.ciphers.aead.ChaCha20
|
|||
|
Poly1305`.
|
|||
|
|
|||
|
-------------------------------------------------------------------
|
|||
|
Tue Jul 11 13:44:14 UTC 2023 - Dirk Müller <dmueller@suse.com>
|
|||
|
|
|||
|
- update to 41.0.2 (bsc#1213378, CVE-2023-38325):
|
|||
|
* Fixed bugs in creating and parsing SSH certificates where
|
|||
|
critical options with values were handled incorrectly.
|
|||
|
Certificates are now created correctly and parsing accepts
|
|||
|
correct values as well as the previously generated
|
|||
|
invalid forms with a warning. In the next release, support
|
|||
|
for parsing these invalid forms will be removed.
|
|||
|
|
|||
|
-------------------------------------------------------------------
|
|||
|
Tue Jul 11 11:44:23 UTC 2023 - Johannes Kastl <kastl@b1-systems.de>
|
|||
|
|
|||
|
- remove patch remove_python_3_6_deprecation_warning.patch as the
|
|||
|
warning was already removed upstream
|
|||
|
|
|||
|
-------------------------------------------------------------------
|
|||
|
Mon Jul 10 22:52:18 UTC 2023 - Matej Cepl <mcepl@suse.com>
|
|||
|
|
|||
|
- Add no-pytest_benchmark.patch, which remove dependency on
|
|||
|
pytest-benchmark and coveralls (We don't need no benchmarking
|
|||
|
and coverage measurement; bsc#1213005).
|
|||
|
|
|||
|
-------------------------------------------------------------------
|
|||
|
Mon Jun 19 20:41:45 UTC 2023 - Dirk Müller <dmueller@suse.com>
|
|||
|
|
|||
|
- update to 41.0.1 (bsc#1212568):
|
|||
|
* Temporarily allow invalid ECDSA signature algorithm
|
|||
|
parameters in X.509 certificates, which are
|
|||
|
generated by older versions of Java.
|
|||
|
* Allow null bytes in pass phrases when serializing private
|
|||
|
keys.
|
|||
|
* **BACKWARDS INCOMPATIBLE:** Support for OpenSSL less than
|
|||
|
1.1.1d has been removed. Users on older version of
|
|||
|
OpenSSL will need to upgrade.
|
|||
|
* **BACKWARDS INCOMPATIBLE:** Support for Python 3.6 has been
|
|||
|
removed.
|
|||
|
* **BACKWARDS INCOMPATIBLE:** Dropped support for LibreSSL <
|
|||
|
3.6.
|
|||
|
* Updated the minimum supported Rust version (MSRV) to 1.56.0,
|
|||
|
from 1.48.0.
|
|||
|
* Added support for the
|
|||
|
:class:`~cryptography.x509.OCSPAcceptableResponses`
|
|||
|
OCSP extension.
|
|||
|
* Added support for the
|
|||
|
:class:`~cryptography.x509.MSCertificateTemplate`
|
|||
|
proprietary Microsoft certificate extension.
|
|||
|
* Implemented support for equality checks on all asymmetric
|
|||
|
public key types.
|
|||
|
* Added support for ``aes256-gcm@openssh.com`` encrypted keys
|
|||
|
in :func:`~cryptography.hazmat.primitives.serialization.load_ssh
|
|||
|
_private_key`.
|
|||
|
* Added support for obtaining X.509 certificate signature
|
|||
|
algorithm parameters (including PSS)
|
|||
|
|
|||
|
-------------------------------------------------------------------
|
|||
|
Fri Apr 21 12:23:51 UTC 2023 - Dirk Müller <dmueller@suse.com>
|
|||
|
|
|||
|
- add sle15_python_module_pythons (jsc#PED-68)
|
|||
|
|
|||
|
-------------------------------------------------------------------
|
|||
|
Sat Apr 15 10:26:40 UTC 2023 - Dirk Müller <dmueller@suse.com>
|
|||
|
|
|||
|
- update to 40.0.2:
|
|||
|
* Fixed compilation when using LibreSSL 3.7.2.
|
|||
|
|
|||
|
-------------------------------------------------------------------
|
|||
|
Thu Apr 13 22:40:44 UTC 2023 - Matej Cepl <mcepl@suse.com>
|
|||
|
|
|||
|
- Make calling of %{sle15modernpython} optional.
|
|||
|
|
|||
|
-------------------------------------------------------------------
|
|||
|
Mon Mar 27 06:38:01 UTC 2023 - Johannes Kastl <kastl@b1-systems.de>
|
|||
|
|
|||
|
- rebase patch remove_python_3_6_deprecation_warning.patch
|
|||
|
|
|||
|
-------------------------------------------------------------------
|
|||
|
Sun Mar 26 19:56:32 UTC 2023 - Dirk Müller <dmueller@suse.com>
|
|||
|
|
|||
|
- update to 40.0.1:
|
|||
|
* Support for Python 3.6 is deprecated and will be removed in
|
|||
|
the next release.
|
|||
|
* Deprecated the current minimum supported Rust version (MSRV)
|
|||
|
of 1.48.0. In the next release we will raise MSRV to 1.56.0.
|
|||
|
Users with the latest ``pip`` will typically get a wheel
|
|||
|
and not need Rust installed
|
|||
|
* Deprecated support for OpenSSL less than 1.1.1d. The next
|
|||
|
release of ``cryptography`` will drop support for older versions.
|
|||
|
* Deprecated support for DSA keys in
|
|||
|
:func:`~cryptography.hazmat.primitives.serialization.load_s
|
|||
|
sh_public_key`
|
|||
|
and
|
|||
|
:func:`~cryptography.hazmat.primitives.serialization.load_s
|
|||
|
sh_private_key`.
|
|||
|
* Deprecated support for OpenSSH serialization in
|
|||
|
:class:`~cryptography.hazmat.primitives.asymmetric.dsa.DSAP
|
|||
|
ublicKey`
|
|||
|
and
|
|||
|
:class:`~cryptography.hazmat.primitives.asymmetric.dsa.DSAP
|
|||
|
rivateKey`.
|
|||
|
* Added support for parsing SSH certificates in addition to
|
|||
|
public keys with
|
|||
|
:func:`~cryptography.hazmat.primitives.serialization.load_s
|
|||
|
sh_public_identity`.
|
|||
|
:func:`~cryptography.hazmat.primitives.serialization.load_s
|
|||
|
sh_public_key` continues to support only public keys.
|
|||
|
* Added support for generating SSH certificates with
|
|||
|
:class:`~cryptography.hazmat.primitives.serialization.SSHCe
|
|||
|
rtificateBuilder`.
|
|||
|
* Added :meth:`~cryptography.x509.Certificate.verify_directly_i
|
|||
|
ssued_by` to
|
|||
|
:class:`~cryptography.x509.Certificate`.
|
|||
|
* Added a check to :class:`~cryptography.x509.NameConstraints`
|
|||
|
to ensure that :class:`~cryptography.x509.DNSName` constraints
|
|||
|
do not contain any ``*`` wildcards.
|
|||
|
* Removed many unused CFFI OpenSSL bindings. This will not
|
|||
|
impact you unless you are using ``cryptography`` to directly
|
|||
|
invoke OpenSSL's C API. Note that
|
|||
|
these have never been considered a stable, supported,
|
|||
|
public API by ``cryptography``, this note is included as a courtesy.
|
|||
|
* The X.509 builder classes now raise ``UnsupportedAlgorithm``
|
|||
|
instead of ``ValueError`` if an unsupported hash algorithm is passed.
|
|||
|
* Added public union type aliases for type hinting
|
|||
|
|
|||
|
-------------------------------------------------------------------
|
|||
|
Tue Mar 7 07:34:20 UTC 2023 - Dirk Müller <dmueller@suse.com>
|
|||
|
|
|||
|
- update to 39.0.2:
|
|||
|
* Fixed a bug where the content type header was not properly
|
|||
|
encoded for PKCS7 signatures when using the ``Text`` option and
|
|||
|
``SMIME`` encoding.
|
|||
|
|
|||
|
-------------------------------------------------------------------
|
|||
|
Thu Feb 9 09:53:49 UTC 2023 - Matej Cepl <mcepl@suse.com>
|
|||
|
|
|||
|
- Update to 39.0.1 (bsc#1208036, CVE-2023-23931):
|
|||
|
* SECURITY ISSUE - Fixed a bug where Cipher.update_into
|
|||
|
accepted Python buffer protocol objects, but allowed
|
|||
|
immutable buffers. CVE-2023-23931
|
|||
|
* drops CVE-2023-23931-dont-allow-update-into.patch in older dists
|
|||
|
* Updated Windows, macOS, and Linux wheels to be compiled with
|
|||
|
OpenSSL 3.0.8.
|
|||
|
|
|||
|
-------------------------------------------------------------------
|
|||
|
Thu Jan 12 10:14:50 UTC 2023 - Johannes Kastl <kastl@b1-systems.de>
|
|||
|
|
|||
|
- adjust patch remove_python_3_6_deprecation_warning.patch to version
|
|||
|
39.0.0
|
|||
|
|
|||
|
-------------------------------------------------------------------
|
|||
|
Mon Jan 2 19:38:58 UTC 2023 - Dirk Müller <dmueller@suse.com>
|
|||
|
|
|||
|
- update to 39.0.0:
|
|||
|
* **BACKWARDS INCOMPATIBLE:** Support for OpenSSL 1.1.0 has been removed.
|
|||
|
Users on older version of OpenSSL will need to upgrade.
|
|||
|
* **BACKWARDS INCOMPATIBLE:** Dropped support for LibreSSL < 3.5. The new
|
|||
|
minimum LibreSSL version is 3.5.0. Going forward our policy is to support
|
|||
|
versions of LibreSSL that are available in versions of OpenBSD that are
|
|||
|
still receiving security support.
|
|||
|
* **BACKWARDS INCOMPATIBLE:** Removed the ``encode_point`` and
|
|||
|
``from_encoded_point`` methods on
|
|||
|
:class:`~cryptography.hazmat.primitives.asymmetric.ec.EllipticCurvePublicNumbers`,
|
|||
|
which had been deprecated for several years.
|
|||
|
:meth:`~cryptography.hazmat.primitives.asymmetric.ec.EllipticCurvePublicKey.public_bytes`
|
|||
|
and
|
|||
|
:meth:`~cryptography.hazmat.primitives.asymmetric.ec.EllipticCurvePublicKey.from_encoded_point`
|
|||
|
should be used instead.
|
|||
|
* **BACKWARDS INCOMPATIBLE:** Support for using MD5 or SHA1 in
|
|||
|
:class:`~cryptography.x509.CertificateBuilder`, other X.509 builders, and
|
|||
|
PKCS7 has been removed.
|
|||
|
* **ANNOUNCEMENT:** The next version of ``cryptography`` (40.0) will
|
|||
|
change
|
|||
|
the way we link OpenSSL. This will only impact users who build
|
|||
|
``cryptography`` from source (i.e., not from a ``wheel``), and specify their
|
|||
|
own version of OpenSSL. For those users, the ``CFLAGS``, ``LDFLAGS``,
|
|||
|
``INCLUDE``, ``LIB``, and ``CRYPTOGRAPHY_SUPPRESS_LINK_FLAGS`` environment
|
|||
|
variables will no longer be respected. Instead, users will need to
|
|||
|
configure their builds `as documented here`_.
|
|||
|
* Added support for disabling the legacy provider in OpenSSL 3.0.x
|
|||
|
* Added support for disabling RSA key validation checks when loading RSA
|
|||
|
keys via
|
|||
|
~cryptography.hazmat.primitives.serialization.load_pem_private_key
|
|||
|
~cryptography.hazmat.primitives.serialization.load_der_private_key
|
|||
|
~cryptography.hazmat.primitives.asymmetric.rsa.RSAPrivateNumbers.private_key
|
|||
|
* Added support for creating OCSP requests with precomputed hashes using
|
|||
|
:meth:`~cryptography.x509.ocsp.OCSPRequestBuilder.add_certificate_by_hash`.
|
|||
|
* Added support for loading multiple PEM-encoded X.509 certificates from
|
|||
|
a single input via :func:`~cryptography.x509.load_pem_x509_certificates`.
|
|||
|
|
|||
|
-------------------------------------------------------------------
|
|||
|
Wed Dec 7 16:43:26 UTC 2022 - Yogalakshmi Arunachalam <yarunachalam@suse.com>
|
|||
|
|
|||
|
- Update to version 38.0.4
|
|||
|
* Fixed compilation when using LibreSSL 3.6.0.
|
|||
|
* Fixed error when using py2app to build an application with a cryptography dependency.
|
|||
|
|
|||
|
-------------------------------------------------------------------
|
|||
|
Thu Nov 3 19:17:35 UTC 2022 - Matej Cepl <mcepl@suse.com>
|
|||
|
|
|||
|
- update to 38.0.3:
|
|||
|
- Updated Windows, macOS, and Linux wheels to be compiled
|
|||
|
with OpenSSL 3.0.7, which resolves CVE-2022-3602 and
|
|||
|
CVE-2022-3786.
|
|||
|
|
|||
|
-------------------------------------------------------------------
|
|||
|
Thu Sep 29 19:42:06 UTC 2022 - Dirk Müller <dmueller@suse.com>
|
|||
|
|
|||
|
- update to 38.0.1:
|
|||
|
* Fixed parsing TLVs in ASN.1 with length greater than 65535 bytes (typically
|
|||
|
seen in large CRLs).
|
|||
|
* Final deprecation of OpenSSL 1.1.0. The next release of ``cryptography``
|
|||
|
will drop support.
|
|||
|
* We no longer ship ``manylinux2010`` wheels. Users should upgrade to the
|
|||
|
latest ``pip`` to ensure this doesn't cause issues downloading wheels on
|
|||
|
their platform. We now ship ``manylinux_2_28`` wheels for users on new
|
|||
|
enough platforms.
|
|||
|
* Updated the minimum supported Rust version (MSRV) to 1.48.0, from 1.41.0.
|
|||
|
Users with the latest ``pip`` will typically get a wheel and not need Rust
|
|||
|
installed, but check :doc:`/installation` for documentation on installing a
|
|||
|
newer ``rustc`` if required.
|
|||
|
* :meth:`~cryptography.fernet.Fernet.decrypt` and related methods now accept
|
|||
|
both ``str`` and ``bytes`` tokens.
|
|||
|
* Parsing ``CertificateSigningRequest`` restores the behavior of enforcing
|
|||
|
that the ``Extension`` ``critical`` field must be correctly encoded DER. See
|
|||
|
`the issue <https://github.com/pyca/cryptography/issues/6368>`_ for complete
|
|||
|
details.
|
|||
|
* Added two new OpenSSL functions to the bindings to support an upcoming
|
|||
|
``pyOpenSSL`` release.
|
|||
|
* When parsing :class:`~cryptography.x509.CertificateRevocationList` and
|
|||
|
:class:`~cryptography.x509.CertificateSigningRequest` values, it is now
|
|||
|
enforced that the ``version`` value in the input must be valid according to
|
|||
|
the rules of :rfc:`2986` and :rfc:`5280`.
|
|||
|
* Using MD5 or SHA1 in :class:`~cryptography.x509.CertificateBuilder` and
|
|||
|
other X.509 builders is deprecated and support will be removed in the next
|
|||
|
version.
|
|||
|
* Added additional APIs to
|
|||
|
:class:`~cryptography.x509.certificate_transparency.SignedCertificateTimestamp`, including
|
|||
|
:attr:`~cryptography.x509.certificate_transparency.SignedCertificateTimestamp.signature_hash_algorithm`,
|
|||
|
:attr:`~cryptography.x509.certificate_transparency.SignedCertificateTimestamp.signature_algorithm`,
|
|||
|
:attr:`~cryptography.x509.certificate_transparency.SignedCertificateTimestamp.signature`, and
|
|||
|
:attr:`~cryptography.x509.certificate_transparency.SignedCertificateTimestamp.extension_bytes`.
|
|||
|
* Added :attr:`~cryptography.x509.Certificate.tbs_precertificate_bytes`, allowing
|
|||
|
users to access the to-be-signed pre-certificate data needed for signed
|
|||
|
certificate timestamp verification.
|
|||
|
* :class:`~cryptography.hazmat.primitives.kdf.kbkdf.KBKDFHMAC` and
|
|||
|
:class:`~cryptography.hazmat.primitives.kdf.kbkdf.KBKDFCMAC` now support
|
|||
|
:attr:`~cryptography.hazmat.primitives.kdf.kbkdf.CounterLocation.MiddleFixed`
|
|||
|
counter location.
|
|||
|
* Fixed :rfc:`4514` name parsing to reverse the order of the RDNs according
|
|||
|
to the section 2.1 of the RFC, affecting method
|
|||
|
:meth:`~cryptography.x509.Name.from_rfc4514_string`.
|
|||
|
* It is now possible to customize some aspects of encryption when serializing
|
|||
|
private keys, using
|
|||
|
:meth:`~cryptography.hazmat.primitives.serialization.PrivateFormat.encryption_builder`.
|
|||
|
* Removed several legacy symbols from our OpenSSL bindings. Users of pyOpenSSL
|
|||
|
versions older than 22.0 will need to upgrade.
|
|||
|
* Added
|
|||
|
:class:`~cryptography.hazmat.primitives.ciphers.algorithms.AES128` and
|
|||
|
:class:`~cryptography.hazmat.primitives.ciphers.algorithms.AES256` classes.
|
|||
|
These classes do not replace
|
|||
|
:class:`~cryptography.hazmat.primitives.ciphers.algorithms.AES` (which
|
|||
|
allows all AES key lengths), but are intended for applications where
|
|||
|
developers want to be explicit about key length.
|
|||
|
|
|||
|
-------------------------------------------------------------------
|
|||
|
Tue Jul 19 12:07:03 UTC 2022 - Dirk Müller <dmueller@suse.com>
|
|||
|
|
|||
|
- update to 37.0.4:
|
|||
|
* updated wheels to b ecompiled against openssl 3.0.5
|
|||
|
|
|||
|
-------------------------------------------------------------------
|
|||
|
Thu Jun 9 16:08:17 UTC 2022 - Andreas Schneider <asn@cryptomilk.org>
|
|||
|
|
|||
|
- Remove Python 3.6 deprecation warning on openSUSE Leap.
|
|||
|
* Added remove_python_3_6_deprecation_warning.patch
|
|||
|
|
|||
|
-------------------------------------------------------------------
|
|||
|
Tue May 24 06:57:55 UTC 2022 - Dirk Müller <dmueller@suse.com>
|
|||
|
|
|||
|
- update to 37.0.2:
|
|||
|
* Fixed an issue where parsing an encrypted private key with the public
|
|||
|
loader functions would hang waiting for console input on OpenSSL 3.0.x rather
|
|||
|
than raising an error.
|
|||
|
* Restored some legacy symbols for older ``pyOpenSSL`` users. These will be
|
|||
|
removed again in the future, so ``pyOpenSSL`` users should still upgrade
|
|||
|
to the latest version of that package when they upgrade ``cryptography``.
|
|||
|
* Updated Windows, macOS, and Linux wheels to be compiled with OpenSSL 3.0.2.
|
|||
|
* **BACKWARDS INCOMPATIBLE:** Dropped support for LibreSSL 2.9.x and 3.0.x.
|
|||
|
The new minimum LibreSSL version is 3.1+.
|
|||
|
* **BACKWARDS INCOMPATIBLE:** Removed ``signer`` and ``verifier`` methods
|
|||
|
from the public key and private key classes. These methods were originally
|
|||
|
deprecated in version 2.0, but had an extended deprecation timeline due
|
|||
|
to usage. Any remaining users should transition to ``sign`` and ``verify``.
|
|||
|
* Deprecated OpenSSL 1.1.0 support. OpenSSL 1.1.0 is no longer supported by
|
|||
|
the OpenSSL project. The next release of ``cryptography`` will be the last
|
|||
|
to support compiling with OpenSSL 1.1.0.
|
|||
|
* Deprecated Python 3.6 support. Python 3.6 is no longer supported by the
|
|||
|
Python core team. Support for Python 3.6 will be removed in a future
|
|||
|
``cryptography`` release.
|
|||
|
* Deprecated the current minimum supported Rust version (MSRV) of 1.41.0.
|
|||
|
In the next release we will raise MSRV to 1.48.0. Users with the latest
|
|||
|
``pip`` will typically get a wheel and not need Rust installed, but check
|
|||
|
:doc:`/installation` for documentation on installing a newer ``rustc`` if
|
|||
|
required.
|
|||
|
* Deprecated
|
|||
|
:class:`~cryptography.hazmat.primitives.ciphers.algorithms.CAST5`,
|
|||
|
:class:`~cryptography.hazmat.primitives.ciphers.algorithms.SEED`,
|
|||
|
:class:`~cryptography.hazmat.primitives.ciphers.algorithms.IDEA`, and
|
|||
|
:class:`~cryptography.hazmat.primitives.ciphers.algorithms.Blowfish` because
|
|||
|
they are legacy algorithms with extremely low usage. These will be removed
|
|||
|
in a future version of ``cryptography``.
|
|||
|
* Added limited support for distinguished names containing a bit string.
|
|||
|
* We now ship ``universal2`` wheels on macOS, which contain both ``arm64``
|
|||
|
and ``x86_64`` architectures. Users on macOS should upgrade to the latest
|
|||
|
``pip`` to ensure they can use this wheel, although we will continue to
|
|||
|
ship ``x86_64`` specific wheels for now to ease the transition.
|
|||
|
* This will be the final release for which we ship ``manylinux2010`` wheels.
|
|||
|
Going forward the minimum supported ``manylinux`` ABI for our wheels will
|
|||
|
be ``manylinux2014``. The vast majority of users will continue to receive
|
|||
|
``manylinux`` wheels provided they have an up to date ``pip``. For PyPy
|
|||
|
wheels this release already requires ``manylinux2014`` for compatibility
|
|||
|
with binaries distributed by upstream.
|
|||
|
* Added support for multiple
|
|||
|
:class:`~cryptography.x509.ocsp.OCSPSingleResponse` in a
|
|||
|
:class:`~cryptography.x509.ocsp.OCSPResponse`.
|
|||
|
* Restored support for signing certificates and other structures in
|
|||
|
:doc:`/x509/index` with SHA3 hash algorithms.
|
|||
|
* :class:`~cryptography.hazmat.primitives.ciphers.algorithms.TripleDES` is
|
|||
|
disabled in FIPS mode.
|
|||
|
* Added support for serialization of PKCS#12 CA friendly names/aliases in
|
|||
|
:func:`~cryptography.hazmat.primitives.serialization.pkcs12.serialize_key_and_certificates`
|
|||
|
* Added support for 12-15 byte (96 to 120 bit) nonces to
|
|||
|
:class:`~cryptography.hazmat.primitives.ciphers.aead.AESOCB3`. This class
|
|||
|
previously supported only 12 byte (96 bit).
|
|||
|
* Added support for
|
|||
|
:class:`~cryptography.hazmat.primitives.ciphers.aead.AESSIV` when using
|
|||
|
OpenSSL 3.0.0+.
|
|||
|
* Added support for serializing PKCS7 structures from a list of
|
|||
|
certificates with
|
|||
|
:class:`~cryptography.hazmat.primitives.serialization.pkcs7.serialize_certificates`.
|
|||
|
* Added support for parsing :rfc:`4514` strings with
|
|||
|
:meth:`~cryptography.x509.Name.from_rfc4514_string`.
|
|||
|
* Added :attr:`~cryptography.hazmat.primitives.asymmetric.padding.PSS.AUTO` to
|
|||
|
:class:`~cryptography.hazmat.primitives.asymmetric.padding.PSS`. This can
|
|||
|
be used to verify a signature where the salt length is not already known.
|
|||
|
* Added :attr:`~cryptography.hazmat.primitives.asymmetric.padding.PSS.DIGEST_LENGTH`
|
|||
|
to :class:`~cryptography.hazmat.primitives.asymmetric.padding.PSS`. This
|
|||
|
constant will set the salt length to the same length as the ``PSS`` hash
|
|||
|
algorithm.
|
|||
|
* Added support for loading RSA-PSS key types with
|
|||
|
:func:`~cryptography.hazmat.primitives.serialization.load_pem_private_key`
|
|||
|
and
|
|||
|
:func:`~cryptography.hazmat.primitives.serialization.load_der_private_key`.
|
|||
|
This functionality is limited to OpenSSL 1.1.1e+ and loads the key as a
|
|||
|
normal RSA private key, discarding the PSS constraint information.
|
|||
|
|
|||
|
-------------------------------------------------------------------
|
|||
|
Sat Mar 26 20:10:08 UTC 2022 - Dirk Müller <dmueller@suse.com>
|
|||
|
|
|||
|
- update to 36.0.2:
|
|||
|
* Updated Windows, macOS, and Linux wheels to be compiled with OpenSSL 1.1.1n.
|
|||
|
|
|||
|
-------------------------------------------------------------------
|
|||
|
Wed Feb 16 19:00:16 UTC 2022 - Dirk Müller <dmueller@suse.com>
|
|||
|
|
|||
|
- split tests in a multibuild variant to optimize rebuild time a bit
|
|||
|
|
|||
|
-------------------------------------------------------------------
|
|||
|
Mon Dec 20 22:52:53 UTC 2021 - Dirk Müller <dmueller@suse.com>
|
|||
|
|
|||
|
- update to 36.0.1:
|
|||
|
* Updated Windows, macOS, and Linux wheels to be compiled with OpenSSL 1.1.1m.
|
|||
|
|
|||
|
-------------------------------------------------------------------
|
|||
|
Sat Nov 27 15:56:28 UTC 2021 - Dirk Müller <dmueller@suse.com>
|
|||
|
|
|||
|
- update to 36.0.0:
|
|||
|
* FINAL DEPRECATION Support for verifier and signer on our asymmetric key
|
|||
|
classes was deprecated in version 2.1. These functions had an extended
|
|||
|
deprecation due to usage, however the next version of cryptography will
|
|||
|
drop support. Users should migrate to sign and verify.
|
|||
|
* The entire X.509 layer is now written in Rust. This allows alternate
|
|||
|
asymmetric key implementations that can support cloud key management
|
|||
|
services or hardware security modules provided they implement the necessary
|
|||
|
interface (for example: EllipticCurvePrivateKey).
|
|||
|
* Deprecated the backend argument for all functions.
|
|||
|
* Added support for AESOCB3.
|
|||
|
* Added support for iterating over arbitrary request attributes.
|
|||
|
* Deprecated the get_attribute_for_oid method on CertificateSigningRequest in
|
|||
|
favor of get_attribute_for_oid() on the new Attributes object.
|
|||
|
* Fixed handling of PEM files to allow loading when certificate and key are
|
|||
|
in the same file.
|
|||
|
* Fixed parsing of CertificatePolicies extensions containing legacy BMPString values in their explicitText.
|
|||
|
* Allow parsing of negative serial numbers in certificates. Negative serial
|
|||
|
numbers are prohibited by RFC 5280 so a deprecation warning will be raised
|
|||
|
whenever they are encountered. A future version of cryptography will drop
|
|||
|
support for parsing them.
|
|||
|
* Added support for parsing PKCS12 files with friendly names for all
|
|||
|
certificates with load_pkcs12(), which will return an object of type
|
|||
|
PKCS12KeyAndCertificates.
|
|||
|
* rfc4514_string() and related methods now have an optional
|
|||
|
attr_name_overrides parameter to supply custom OID to name mappings, which
|
|||
|
can be used to match vendor-specific extensions.
|
|||
|
* BACKWARDS INCOMPATIBLE: Reverted the nonstandard formatting of email
|
|||
|
address fields as E in rfc4514_string() methods from version 35.0.
|
|||
|
* The previous behavior can be restored with:
|
|||
|
name.rfc4514_string({NameOID.EMAIL_ADDRESS: "E"})
|
|||
|
* Allow X25519PublicKey and X448PublicKey to be used as public keys when
|
|||
|
parsing certificates or creating them with CertificateBuilder. These key
|
|||
|
types must be signed with a different signing algorithm as X25519 and X448
|
|||
|
do not support signing.
|
|||
|
* Extension values can now be serialized to a DER byte string by calling public_bytes().
|
|||
|
* Added experimental support for compiling against BoringSSL. As BoringSSL
|
|||
|
does not commit to a stable API, cryptography tests against the latest
|
|||
|
commit only. Please note that several features are not available when
|
|||
|
building against BoringSSL.
|
|||
|
* Parsing CertificateSigningRequest from DER and PEM now, for a limited time
|
|||
|
period, allows the Extension critical field to be incorrectly encoded. See
|
|||
|
the issue for complete details. This will be reverted in a future
|
|||
|
cryptography release.
|
|||
|
* When OCSPNonce are parsed and generated their value is now correctly
|
|||
|
wrapped in an ASN.1 OCTET STRING. This conforms to RFC 6960 but conflicts
|
|||
|
with the original behavior specified in RFC 2560. For a temporary period
|
|||
|
for backwards compatibility, we will also parse values that are encoded as
|
|||
|
specified in RFC 2560 but this behavior will be removed in a future
|
|||
|
release.
|
|||
|
* Changed the version scheme. This will result in us incrementing the major
|
|||
|
version more frequently, but does not change our existing backwards
|
|||
|
compatibility policy.
|
|||
|
* BACKWARDS INCOMPATIBLE: The X.509 PEM parsers now require that the PEM
|
|||
|
string passed have PEM delimiters of the correct type. For example, parsing
|
|||
|
a private key PEM concatenated with a certificate PEM will no longer be
|
|||
|
accepted by the PEM certificate parser.
|
|||
|
* BACKWARDS INCOMPATIBLE: The X.509 certificate parser no longer allows
|
|||
|
negative serial numbers. RFC 5280 has always prohibited these.
|
|||
|
* BACKWARDS INCOMPATIBLE: Additional forms of invalid ASN.1 found during
|
|||
|
X.509 parsing will raise an error on initial parse rather than when the
|
|||
|
malformed field is accessed.
|
|||
|
* Rust is now required for building cryptography, the
|
|||
|
CRYPTOGRAPHY_DONT_BUILD_RUST environment variable is no longer respected.
|
|||
|
* Parsers for X.509 no longer use OpenSSL and have been rewritten in Rust.
|
|||
|
This should be backwards compatible (modulo the items listed above) and
|
|||
|
improve both security and performance.
|
|||
|
* Added support for OpenSSL 3.0.0 as a compilation target.
|
|||
|
* Added support for SM3 and SM4, when using OpenSSL 1.1.1. These algorithms
|
|||
|
are provided for compatibility in regions where they may be required, and
|
|||
|
are not generally recommended.
|
|||
|
* We now ship manylinux_2_24 and musllinux_1_1 wheels, in addition to our
|
|||
|
manylinux2010 and manylinux2014 wheels. Users on distributions like Alpine
|
|||
|
Linux should ensure they upgrade to the latest pip to correctly receive
|
|||
|
wheels.
|
|||
|
* Added rfc4514_attribute_name attribute to x509.NameAttribute.
|
|||
|
- drop disable-uneven-sizes-tests.patch (upstream)
|
|||
|
- drop disable-RustExtension.patch: building rust extension now
|
|||
|
|
|||
|
-------------------------------------------------------------------
|
|||
|
Tue Oct 12 18:54:25 UTC 2021 - Ben Greiner <code@bnavigator.de>
|
|||
|
|
|||
|
- Add disable-RustExtension.patch in order to avoid a build
|
|||
|
requirement setuptools_rust
|
|||
|
- Next version (35.0) needs a full Rust toolchain.
|
|||
|
- Clean runtime, build and test requirements
|
|||
|
- Disable python2 build: Not supported anymore
|
|||
|
|
|||
|
-------------------------------------------------------------------
|
|||
|
Mon Oct 4 07:00:30 UTC 2021 - Adrian Schröter <adrian@suse.de>
|
|||
|
|
|||
|
- update to 3.4.8
|
|||
|
- keep new rust support disabled for now to avoid new dependencies
|
|||
|
|
|||
|
-------------------------------------------------------------------
|
|||
|
Mon Apr 26 10:07:08 UTC 2021 - Matej Cepl <mcepl@suse.com>
|
|||
|
|
|||
|
- Remove unnecessary %ifpython3 construct
|
|||
|
|
|||
|
-------------------------------------------------------------------
|
|||
|
Sun Feb 7 20:11:11 UTC 2021 - Michael Ströder <michael@stroeder.com>
|
|||
|
|
|||
|
- update to 3.3.2 (bsc#1182066, CVE-2020-36242, bsc#1198331):
|
|||
|
* SECURITY ISSUE: Fixed a bug where certain sequences of update()
|
|||
|
calls when symmetrically encrypting very large payloads (>2GB) could
|
|||
|
result in an integer overflow, leading to buffer overflows.
|
|||
|
CVE-2020-36242
|
|||
|
- drops CVE-2020-36242-buffer-overflow.patch on older dists
|
|||
|
|
|||
|
-------------------------------------------------------------------
|
|||
|
Sun Dec 20 09:31:33 UTC 2020 - Dirk Müller <dmueller@suse.com>
|
|||
|
|
|||
|
- update to 3.3.1:
|
|||
|
* Re-added a legacy symbol causing problems for older ``pyOpenSSL`` use
|
|||
|
|
|||
|
-------------------------------------------------------------------
|
|||
|
Wed Dec 9 11:56:30 UTC 2020 - Marcus Rueckert <mrueckert@suse.de>
|
|||
|
|
|||
|
- update to 3.3.0
|
|||
|
- BACKWARDS INCOMPATIBLE: Support for Python 3.5 has been removed
|
|||
|
due to low usage and maintenance burden.
|
|||
|
- BACKWARDS INCOMPATIBLE: The GCM and AESGCM now require 64-bit
|
|||
|
to 1024-bit (8 byte to 128 byte) initialization vectors. This
|
|||
|
change is to conform with an upcoming OpenSSL release that will
|
|||
|
no longer support sizes outside this window.
|
|||
|
- BACKWARDS INCOMPATIBLE: When deserializing asymmetric keys we
|
|||
|
now raise ValueError rather than UnsupportedAlgorithm when an
|
|||
|
unsupported cipher is used. This change is to conform with an
|
|||
|
upcoming OpenSSL release that will no longer distinguish
|
|||
|
between error types.
|
|||
|
- BACKWARDS INCOMPATIBLE: We no longer allow loading of finite
|
|||
|
field Diffie-Hellman parameters of less than 512 bits in
|
|||
|
length. This change is to conform with an upcoming OpenSSL
|
|||
|
release that no longer supports smaller sizes. These keys were
|
|||
|
already wildly insecure and should not have been used in any
|
|||
|
application outside of testing.
|
|||
|
- Updated Windows, macOS, and manylinux wheels to be compiled
|
|||
|
with OpenSSL 1.1.1i.
|
|||
|
- Python 2 support is deprecated in cryptography. This is the
|
|||
|
last release that will support Python 2.
|
|||
|
- Added the recover_data_from_signature() function to
|
|||
|
RSAPublicKey for recovering the signed data from an RSA
|
|||
|
signature.
|
|||
|
|
|||
|
-------------------------------------------------------------------
|
|||
|
Sun Dec 6 20:37:33 UTC 2020 - Matej Cepl <mcepl@suse.com>
|
|||
|
|
|||
|
- Remove unnecessary dependency virtualenv.
|
|||
|
|
|||
|
-------------------------------------------------------------------
|
|||
|
Wed Oct 28 14:29:05 UTC 2020 - Michael Ströder <michael@stroeder.com>
|
|||
|
|
|||
|
- update to 3.2.1:
|
|||
|
Disable blinding on RSA public keys to address an error with
|
|||
|
some versions of OpenSSL.
|
|||
|
|
|||
|
-------------------------------------------------------------------
|
|||
|
Mon Oct 26 11:39:02 UTC 2020 - Michael Ströder <michael@stroeder.com>
|
|||
|
|
|||
|
- update to 3.2 (bsc#1178168, CVE-2020-25659):
|
|||
|
* CVE-2020-25659: Attempted to make RSA PKCS#1v1.5 decryption more constant time,
|
|||
|
to protect against Bleichenbacher vulnerabilities. Due to limitations imposed
|
|||
|
by our API, we cannot completely mitigate this vulnerability.
|
|||
|
* Support for OpenSSL 1.0.2 has been removed.
|
|||
|
* Added basic support for PKCS7 signing (including SMIME) via PKCS7SignatureBuilder.
|
|||
|
- drops 5507-mitigate-Bleichenbacher-attacks.patch on older dists
|
|||
|
|
|||
|
-------------------------------------------------------------------
|
|||
|
Mon Sep 28 10:49:56 UTC 2020 - Dirk Mueller <dmueller@suse.com>
|
|||
|
|
|||
|
- update to 3.1.1:
|
|||
|
* wheels compiled with OpenSSL 1.1.1h.
|
|||
|
|
|||
|
-------------------------------------------------------------------
|
|||
|
Fri Sep 18 11:15:53 UTC 2020 - Dirk Mueller <dmueller@suse.com>
|
|||
|
|
|||
|
- update to 3.1:
|
|||
|
* **BACKWARDS INCOMPATIBLE:** Removed support for ``idna`` based
|
|||
|
:term:`U-label` parsing in various X.509 classes. This support was originally
|
|||
|
deprecated in version 2.1 and moved to an extra in 2.5.
|
|||
|
* Deprecated OpenSSL 1.0.2 support. OpenSSL 1.0.2 is no longer supported by
|
|||
|
the OpenSSL project. The next version of ``cryptography`` will drop support
|
|||
|
for it.
|
|||
|
* Deprecated support for Python 3.5. This version sees very little use and will
|
|||
|
be removed in the next release.
|
|||
|
* ``backend`` arguments to functions are no longer required and the
|
|||
|
default backend will automatically be selected if no ``backend`` is provided.
|
|||
|
* Added initial support for parsing certificates from PKCS7 files with
|
|||
|
:func:`~cryptography.hazmat.primitives.serialization.pkcs7.load_pem_pkcs7_certificates`
|
|||
|
and
|
|||
|
:func:`~cryptography.hazmat.primitives.serialization.pkcs7.load_der_pkcs7_certificates`
|
|||
|
.
|
|||
|
* Calling ``update`` or ``update_into`` on
|
|||
|
:class:`~cryptography.hazmat.primitives.ciphers.CipherContext` with ``data``
|
|||
|
longer than 2\ :sup:`31` bytes no longer raises an ``OverflowError``. This
|
|||
|
also resolves the same issue in :doc:`/fernet`.
|
|||
|
|
|||
|
-------------------------------------------------------------------
|
|||
|
Tue Jul 28 17:16:47 UTC 2020 - Ondřej Súkup <mimi.vx@gmail.com>
|
|||
|
|
|||
|
- update to 3.0
|
|||
|
- refreshed disable-uneven-sizes-tests.patch and skip_openssl_memleak_test.patch
|
|||
|
* Removed support for passing an Extension instance
|
|||
|
to from_issuer_subject_key_identifier(), as per our deprecation policy.
|
|||
|
* Support for LibreSSL 2.7.x, 2.8.x, and 2.9.0 has been removed
|
|||
|
* Dropped support for macOS 10.9, macOS users must upgrade to 10.10 or newer.
|
|||
|
* RSA generate_private_key() no longer accepts public_exponent values except
|
|||
|
65537 and 3 (the latter for legacy purposes).
|
|||
|
* X.509 certificate parsing now enforces that the version field contains
|
|||
|
a valid value, rather than deferring this check until version is accessed.
|
|||
|
* Deprecated support for Python 2
|
|||
|
* Added support for OpenSSH serialization format for ec, ed25519, rsa and dsa
|
|||
|
private keys: load_ssh_private_key() for loading and OpenSSH for writing.
|
|||
|
* Added support for OpenSSH certificates to load_ssh_public_key().
|
|||
|
* Added encrypt_at_time() and decrypt_at_time() to Fernet.
|
|||
|
* Added support for the SubjectInformationAccess X.509 extension.
|
|||
|
* Added support for parsing SignedCertificateTimestamps in OCSP responses.
|
|||
|
* Added support for parsing attributes in certificate signing requests via get_attribute_for_oid().
|
|||
|
* Added support for encoding attributes in certificate signing requests via add_attribute().
|
|||
|
* On OpenSSL 1.1.1d and higher cryptography now uses OpenSSL’s built-in CSPRNG
|
|||
|
instead of its own OS random engine because these versions of OpenSSL properly reseed on fork.
|
|||
|
* Added initial support for creating PKCS12 files with serialize_key_and_certificates().
|
|||
|
|
|||
|
-------------------------------------------------------------------
|
|||
|
Fri May 15 08:44:10 UTC 2020 - Michael Ströder <michael@stroeder.com>
|
|||
|
|
|||
|
- update to 2.9.2
|
|||
|
* 2.9.2 - 2020-04-22
|
|||
|
- Updated the macOS wheel to fix an issue where it would not run on macOS versions older than 10.15.
|
|||
|
* 2.9.1 - 2020-04-21
|
|||
|
- Updated Windows, macOS, and manylinux wheels to be compiled with OpenSSL 1.1.1g.
|
|||
|
* 2.9 - 2020-04-02
|
|||
|
- BACKWARDS INCOMPATIBLE: Support for Python 3.4 has been removed due to
|
|||
|
low usage and maintenance burden.
|
|||
|
- BACKWARDS INCOMPATIBLE: Support for OpenSSL 1.0.1 has been removed.
|
|||
|
Users on older version of OpenSSL will need to upgrade.
|
|||
|
- BACKWARDS INCOMPATIBLE: Support for LibreSSL 2.6.x has been removed.
|
|||
|
- Removed support for calling public_bytes() with no arguments, as per
|
|||
|
our deprecation policy. You must now pass encoding and format.
|
|||
|
- BACKWARDS INCOMPATIBLE: Reversed the order in which rfc4514_string()
|
|||
|
returns the RDNs as required by RFC 4514.
|
|||
|
- Updated Windows, macOS, and manylinux wheels to be compiled with OpenSSL 1.1.1f.
|
|||
|
- Added support for parsing single_extensions in an OCSP response.
|
|||
|
- NameAttribute values can now be empty strings.
|
|||
|
|
|||
|
-------------------------------------------------------------------
|
|||
|
Thu Oct 17 14:53:32 UTC 2019 - Michael Ströder <michael@stroeder.com>
|
|||
|
|
|||
|
- update to 2.8
|
|||
|
* Added support for Python 3.8.
|
|||
|
* Added class methods Poly1305.generate_tag and Poly1305.verify_tag for Poly1305 sign and verify operations.
|
|||
|
* Deprecated support for OpenSSL 1.0.1. Support will be removed in cryptography 2.9.
|
|||
|
* We now ship manylinux2010 wheels in addition to our manylinux1 wheels.
|
|||
|
* Added support for ed25519 and ed448 keys in the CertificateBuilder, CertificateSigningRequestBuilder, CertificateRevocationListBuilder and OCSPResponseBuilder.
|
|||
|
* cryptography no longer depends on asn1crypto.
|
|||
|
* FreshestCRL is now allowed as a CertificateRevocationList extension.
|
|||
|
|
|||
|
-------------------------------------------------------------------
|
|||
|
Mon Jun 3 13:45:56 UTC 2019 - Ondřej Súkup <mimi.vx@gmail.com>
|
|||
|
|
|||
|
- update to 2.7
|
|||
|
* BACKWARDS INCOMPATIBLE: Removed the cryptography.hazmat.primitives.mac.MACContext interface.
|
|||
|
The CMAC and HMAC APIs have not changed, but they are no longer registered
|
|||
|
as MACContext instances.
|
|||
|
* Removed support for running our tests with setup.py test.
|
|||
|
* Add support for :class:`~cryptography.hazmat.primitives.poly1305.Poly1305`
|
|||
|
when using OpenSSL 1.1.1 or newer.
|
|||
|
* Support serialization with Encoding.OpenSSH and PublicFormat.OpenSSH
|
|||
|
in :meth:`Ed25519PublicKey.public_bytes <cryptography.hazmat.primitives.asymmetric.ed25519.Ed25519PublicKey.public_bytes>` .
|
|||
|
* Correctly allow passing a SubjectKeyIdentifier to :meth:`~cryptography.x509.AuthorityKeyIdentifier.from_issuer_subject_key_identifier`
|
|||
|
and deprecate passing an Extension object.
|
|||
|
|
|||
|
-------------------------------------------------------------------
|
|||
|
Wed May 29 14:41:39 UTC 2019 - Tomáš Chvátal <tchvatal@suse.com>
|
|||
|
|
|||
|
- Simplify the test execution to be more understandable
|
|||
|
|
|||
|
-------------------------------------------------------------------
|
|||
|
Thu Feb 28 19:50:33 UTC 2019 - Michael Ströder <michael@stroeder.com>
|
|||
|
|
|||
|
- update to 2.6.1:
|
|||
|
* BACKWARDS INCOMPATIBLE:
|
|||
|
Removedcryptography.hazmat.primitives.asymmetric.utils.encode_rfc6979_signature
|
|||
|
andcryptography.hazmat.primitives.asymmetric.utils.decode_rfc6979_signature,
|
|||
|
which had been deprecated for nearly 4 years. Use encode_dss_signature()
|
|||
|
and decode_dss_signature()instead.
|
|||
|
* BACKWARDS INCOMPATIBLE: Removed cryptography.x509.Certificate.serial, which
|
|||
|
had been deprecated for nearly 3 years. Use serial_number instead.
|
|||
|
* Updated Windows, macOS, and manylinux1 wheels to be compiled with
|
|||
|
OpenSSL 1.1.1b.
|
|||
|
* Added support for Ed448 signing when using OpenSSL 1.1.1b or newer.
|
|||
|
* Added support for Ed25519 signing when using OpenSSL 1.1.1b or newer.
|
|||
|
* load_ssh_public_key() can now load ed25519 public keys.
|
|||
|
* Add support for easily mapping an object identifier to its elliptic curve
|
|||
|
class viaget_curve_for_oid().
|
|||
|
* Add support for OpenSSL when compiled with the no-engine
|
|||
|
(OPENSSL_NO_ENGINE) flag.
|
|||
|
|
|||
|
-------------------------------------------------------------------
|
|||
|
Fri Jan 25 08:25:35 UTC 2019 - Michael Ströder <michael@stroeder.com>
|
|||
|
|
|||
|
- Dependency on python-idna changed to "Recommends" aligned with
|
|||
|
change in upstream source (see below)
|
|||
|
- update to 2.5:
|
|||
|
* BACKWARDS INCOMPATIBLE: U-label strings were deprecated in version 2.1,
|
|||
|
but this version removes the default idna dependency as well. If you still
|
|||
|
need this deprecated path please install cryptography with the idna extra:
|
|||
|
pip install cryptography[idna].
|
|||
|
* BACKWARDS INCOMPATIBLE: The minimum supported PyPy version is now 5.4.
|
|||
|
* Numerous classes and functions have been updated to allow bytes-like
|
|||
|
types for keying material and passwords, including symmetric algorithms,
|
|||
|
AEAD ciphers, KDFs, loading asymmetric keys, and one time password classes.
|
|||
|
* Updated Windows, macOS, and manylinux1 wheels to be compiled with OpenSSL 1.1.1a.
|
|||
|
* Added support for SHA512_224 and SHA512_256 when using OpenSSL 1.1.1.
|
|||
|
* Added support for SHA3_224, SHA3_256, SHA3_384, and SHA3_512 when using OpenSSL 1.1.1.
|
|||
|
* Added support for X448 key exchange when using OpenSSL 1.1.1.
|
|||
|
* Added support for SHAKE128 and SHAKE256 when using OpenSSL 1.1.1.
|
|||
|
* Added initial support for parsing PKCS12 files with load_key_and_certificates().
|
|||
|
* Added support for IssuingDistributionPoint.
|
|||
|
* Added rfc4514_string() method to x509.Name,
|
|||
|
x509.RelativeDistinguishedName, and x509.NameAttribute to format the name
|
|||
|
or component an RFC 4514 Distinguished Name string.
|
|||
|
* Added from_encoded_point(), which immediately checks if the point is on
|
|||
|
the curve and supports compressed points. Deprecated the previous method
|
|||
|
from_encoded_point().
|
|||
|
* Added signature_hash_algorithm to OCSPResponse.
|
|||
|
* Updated X25519 key exchange support to allow additional serialization
|
|||
|
methods. Calling public_bytes() with no arguments has been deprecated.
|
|||
|
* Added support for encoding compressed and uncompressed points via
|
|||
|
public_bytes(). Deprecated the previous method encode_point().
|
|||
|
|
|||
|
-------------------------------------------------------------------
|
|||
|
Thu Jan 3 11:40:58 UTC 2019 - Martin Pluskal <mpluskal@suse.com>
|
|||
|
|
|||
|
- Update to version 2.4.2:
|
|||
|
* Updated Windows, macOS, and manylinux1 wheels to be compiled
|
|||
|
with OpenSSL 1.1.0j.
|
|||
|
|
|||
|
-------------------------------------------------------------------
|
|||
|
Thu Dec 6 13:13:21 CET 2018 - mcepl@suse.com
|
|||
|
|
|||
|
- Update to 2.4.1:
|
|||
|
* Dropped support for LibreSSL 2.4.x.
|
|||
|
* Deprecated OpenSSL 1.0.1 support. OpenSSL 1.0.1 is no
|
|||
|
longer supported by the OpenSSL project. At this time there
|
|||
|
is no time table for dropping support, however we strongly
|
|||
|
encourage all users to upgrade or install cryptography from
|
|||
|
a wheel.
|
|||
|
* Added initial :doc:`OCSP </x509/ocsp>` support.
|
|||
|
* Added support for cryptography.x509.PrecertPoison.
|
|||
|
|
|||
|
-------------------------------------------------------------------
|
|||
|
Thu Dec 6 11:48:31 UTC 2018 - Tomáš Chvátal <tchvatal@suse.com>
|
|||
|
|
|||
|
- Fix fdupes call
|
|||
|
|
|||
|
-------------------------------------------------------------------
|
|||
|
Tue Aug 21 07:43:31 UTC 2018 - tchvatal@suse.com
|
|||
|
|
|||
|
- Update to 2.3.1:
|
|||
|
* updated tests for upstream wycheproof changes
|
|||
|
* many other tiny test tweaks
|
|||
|
|
|||
|
-------------------------------------------------------------------
|
|||
|
Wed Jul 18 13:20:58 UTC 2018 - michael@stroeder.com
|
|||
|
|
|||
|
- update to 2.3:
|
|||
|
* SECURITY ISSUE: finalize_with_tag() allowed tag truncation by default
|
|||
|
which can allow tag forgery in some cases. The method now enforces the
|
|||
|
min_tag_length provided to the GCM constructor.
|
|||
|
* Added support for Python 3.7.
|
|||
|
* Added extract_timestamp() to get the authenticated timestamp of a Fernet token.
|
|||
|
* Support for Python 2.7.x without hmac.compare_digest has been deprecated.
|
|||
|
We will require Python 2.7.7 or higher (or 2.7.6 on Ubuntu) in the next
|
|||
|
cryptography release.
|
|||
|
* Fixed multiple issues preventing cryptography from compiling
|
|||
|
against LibreSSL 2.7.x.
|
|||
|
* Added get_revoked_certificate_by_serial_number for quick
|
|||
|
serial number searches in CRLs.
|
|||
|
* The RelativeDistinguishedName class now preserves the order of attributes.
|
|||
|
Duplicate attributes now raise an error instead of silently discarding duplicates.
|
|||
|
* aes_key_unwrap() and aes_key_unwrap_with_padding() now raise InvalidUnwrap
|
|||
|
if the wrapped key is an invalid length, instead of ValueError.
|
|||
|
|
|||
|
-------------------------------------------------------------------
|
|||
|
Tue Jun 12 07:24:12 UTC 2018 - mimi.vx@gmail.com
|
|||
|
|
|||
|
- update to 2.2.2
|
|||
|
* fix build on some systems with openssl 1.1.0h
|
|||
|
|
|||
|
-------------------------------------------------------------------
|
|||
|
Mon Mar 26 07:44:53 UTC 2018 - tchvatal@suse.com
|
|||
|
|
|||
|
- Cleanup with spec-cleaner
|
|||
|
- Use %setup to unpack all archives do not rely on tar calls
|
|||
|
|
|||
|
-------------------------------------------------------------------
|
|||
|
Sun Mar 25 20:39:43 UTC 2018 - michael@stroeder.com
|
|||
|
|
|||
|
- Update to upstream release 2.2.1:
|
|||
|
* Reverted a change to GeneralNames which prohibited having zero elements,
|
|||
|
due to breakages.
|
|||
|
* Fixed a bug in
|
|||
|
:func:`~cryptography.hazmat.primitives.keywrap.aes_key_unwrap_with_padding`
|
|||
|
that caused it to raise InvalidUnwrap when key length modulo 8 was zero.
|
|||
|
* BACKWARDS INCOMPATIBLE: Support for Python 2.6 has been dropped.
|
|||
|
* Resolved a bug in HKDF that incorrectly constrained output size.
|
|||
|
* Added
|
|||
|
:class:`~cryptography.hazmat.primitives.asymmetric.ec.BrainpoolP256R1`,
|
|||
|
:class:`~cryptography.hazmat.primitives.asymmetric.ec.BrainpoolP384R1`, and
|
|||
|
:class:`~cryptography.hazmat.primitives.asymmetric.ec.BrainpoolP512R1` to
|
|||
|
support inter-operating with systems like German smart meters.
|
|||
|
* Added token rotation support to :doc:`Fernet </fernet>` with
|
|||
|
:meth:`~cryptography.fernet.MultiFernet.rotate`.
|
|||
|
* Fixed a memory leak in
|
|||
|
:func:`~cryptography.hazmat.primitives.asymmetric.ec.derive_private_key`.
|
|||
|
* Added support for AES key wrapping with padding via
|
|||
|
:func:`~cryptography.hazmat.primitives.keywrap.aes_key_wrap_with_padding` and
|
|||
|
:func:`~cryptography.hazmat.primitives.keywrap.aes_key_unwrap_with_padding` .
|
|||
|
* Allow loading DSA keys with 224 bit q.
|
|||
|
|
|||
|
-------------------------------------------------------------------
|
|||
|
Fri Mar 2 16:44:33 UTC 2018 - chris@computersalat.de
|
|||
|
|
|||
|
- fix deps for hypothesis, pytest
|
|||
|
|
|||
|
-------------------------------------------------------------------
|
|||
|
Thu Feb 8 10:54:03 UTC 2018 - tbechtold@suse.com
|
|||
|
|
|||
|
- Fix previous change and explicitly require python2 instead of
|
|||
|
python because python itself is also provided by python3.
|
|||
|
This fixes:
|
|||
|
ImportError: No module named _ssl
|
|||
|
when using python-cryptography in a python2 build environment
|
|||
|
|
|||
|
-------------------------------------------------------------------
|
|||
|
Sat Feb 3 13:02:06 UTC 2018 - tchvatal@suse.com
|
|||
|
|
|||
|
- Fix the previous change to not pull in py2 on py3 enviroment
|
|||
|
|
|||
|
-------------------------------------------------------------------
|
|||
|
Sat Jan 27 11:25:02 UTC 2018 - dmueller@suse.com
|
|||
|
|
|||
|
- fix requires on python ssl once more after the last change
|
|||
|
|
|||
|
-------------------------------------------------------------------
|
|||
|
Thu Jan 18 13:30:12 UTC 2018 - tchvatal@suse.com
|
|||
|
|
|||
|
- Add proper conditional for the python2, the ifpython works only
|
|||
|
for the requires/etc
|
|||
|
|
|||
|
-------------------------------------------------------------------
|
|||
|
Tue Jan 16 10:14:37 UTC 2018 - dmueller@suse.com
|
|||
|
|
|||
|
- add missing dependency on python ssl
|
|||
|
|
|||
|
-------------------------------------------------------------------
|
|||
|
Fri Dec 8 18:04:13 UTC 2017 - arun@gmx.de
|
|||
|
|
|||
|
- update to version 2.1.4:
|
|||
|
* Added X509_up_ref for an upcoming pyOpenSSL release.
|
|||
|
|
|||
|
-------------------------------------------------------------------
|
|||
|
Thu Nov 9 06:06:39 UTC 2017 - arun@gmx.de
|
|||
|
|
|||
|
- update to version 2.1.3:
|
|||
|
* Updated Windows, macOS, and manylinux1 wheels to be compiled with
|
|||
|
OpenSSL 1.1.0g.
|
|||
|
|
|||
|
-------------------------------------------------------------------
|
|||
|
Fri Nov 3 15:47:03 UTC 2017 - arun@gmx.de
|
|||
|
|
|||
|
- update to version 2.1.2:
|
|||
|
* Corrected a bug with the manylinux1 wheels where OpenSSL’s stack
|
|||
|
was marked executable.
|
|||
|
|
|||
|
-------------------------------------------------------------------
|
|||
|
Thu Nov 2 08:41:18 UTC 2017 - mimi.vx@gmail.com
|
|||
|
|
|||
|
- fix BuildRequires conditions for python3
|
|||
|
|
|||
|
-------------------------------------------------------------------
|
|||
|
Thu Oct 12 07:41:48 UTC 2017 - michael@stroeder.com
|
|||
|
|
|||
|
- update to 2.1.1
|
|||
|
|
|||
|
-------------------------------------------------------------------
|
|||
|
Thu Sep 28 14:50:51 UTC 2017 - sean.marlow@suse.com
|
|||
|
|
|||
|
- Fix cffi version requirement.
|
|||
|
|
|||
|
-------------------------------------------------------------------
|
|||
|
Thu Sep 7 11:18:35 UTC 2017 - vcizek@suse.com
|
|||
|
|
|||
|
- Disable memleak tests to fix build with OpenSSL 1.1 (bsc#1055478)
|
|||
|
* add skip_openssl_memleak_test.patch
|
|||
|
|
|||
|
-------------------------------------------------------------------
|
|||
|
Thu Aug 3 23:14:49 UTC 2017 - michael@stroeder.com
|
|||
|
|
|||
|
- update to 2.0.3
|
|||
|
|
|||
|
-------------------------------------------------------------------
|
|||
|
Thu Jul 27 10:49:07 UTC 2017 - michael@stroeder.com
|
|||
|
|
|||
|
- update to 2.0.2
|
|||
|
|
|||
|
-------------------------------------------------------------------
|
|||
|
Mon Jul 17 17:08:59 UTC 2017 - michael@stroeder.com
|
|||
|
|
|||
|
- update to 2.0
|
|||
|
|
|||
|
-------------------------------------------------------------------
|
|||
|
Wed May 31 11:36:35 UTC 2017 - michael@stroeder.com
|
|||
|
|
|||
|
- update to 1.9
|
|||
|
|
|||
|
-------------------------------------------------------------------
|
|||
|
Tue May 2 12:58:37 UTC 2017 - jmatejek@suse.com
|
|||
|
|
|||
|
- add python-packaging to requirements explicitly instead of relying
|
|||
|
on setuptools to pull it in
|
|||
|
|
|||
|
-------------------------------------------------------------------
|
|||
|
Mon Mar 20 20:34:03 UTC 2017 - tbechtold@suse.com
|
|||
|
|
|||
|
- Switch to singlespec approach
|
|||
|
|
|||
|
-------------------------------------------------------------------
|
|||
|
Thu Mar 16 14:13:56 UTC 2017 - tbechtold@suse.com
|
|||
|
|
|||
|
- update to 1.8.1
|
|||
|
- Adust Requires and BuildRequires
|
|||
|
|
|||
|
-------------------------------------------------------------------
|
|||
|
Sun Jan 29 14:57:28 UTC 2017 - michael@stroeder.com
|
|||
|
|
|||
|
- update to 1.7.2
|
|||
|
|
|||
|
-------------------------------------------------------------------
|
|||
|
Wed Dec 14 20:31:53 UTC 2016 - michael@stroeder.com
|
|||
|
|
|||
|
- update to 1.7.1 which contains regression fix for 1.7
|
|||
|
|
|||
|
-------------------------------------------------------------------
|
|||
|
Tue Dec 13 12:21:24 UTC 2016 - mimi.vx@gmail.com
|
|||
|
|
|||
|
- update to 1.7
|
|||
|
* support for OpenSSL 1.0.0 has been removed.
|
|||
|
* Added support for Diffie-Hellman key exchange
|
|||
|
* The OS random engine for OpenSSL has been rewritten
|
|||
|
|
|||
|
-------------------------------------------------------------------
|
|||
|
Wed Nov 23 09:40:23 UTC 2016 - michael@stroeder.com
|
|||
|
|
|||
|
- update to 1.6
|
|||
|
|
|||
|
-------------------------------------------------------------------
|
|||
|
Fri Nov 11 19:13:36 UTC 2016 - michael@stroeder.com
|
|||
|
|
|||
|
- update to 1.5.3
|
|||
|
- python-cryptography-enable-gost.patch is obsolete
|
|||
|
|
|||
|
-------------------------------------------------------------------
|
|||
|
Mon Sep 26 06:26:21 UTC 2016 - meissner@suse.com
|
|||
|
|
|||
|
- python-cryptography-enable-gost.patch: temporary patch
|
|||
|
to run tests against 1.0.2i, GOST cert extraction now works.
|
|||
|
|
|||
|
-------------------------------------------------------------------
|
|||
|
Sun Jul 17 15:07:04 UTC 2016 - matwey.kornilov@gmail.com
|
|||
|
|
|||
|
- Introduce requirement setuptools >= 11.3
|
|||
|
to follow egg-info/requires.txt content
|
|||
|
|
|||
|
-------------------------------------------------------------------
|
|||
|
Mon Jun 6 13:03:35 UTC 2016 - dmueller@suse.com
|
|||
|
|
|||
|
- fix download urls
|
|||
|
|
|||
|
-------------------------------------------------------------------
|
|||
|
Fri Jun 3 19:37:40 UTC 2016 - michael@stroeder.com
|
|||
|
|
|||
|
- update to upstream release 1.3.4
|
|||
|
* Added new OpenSSL functions to the bindings to support an upcoming
|
|||
|
``pyOpenSSL`` release.
|
|||
|
|
|||
|
-------------------------------------------------------------------
|
|||
|
Fri May 6 07:43:10 UTC 2016 - dmueller@suse.com
|
|||
|
|
|||
|
- correct source urls
|
|||
|
|
|||
|
-------------------------------------------------------------------
|
|||
|
Thu May 5 17:08:06 UTC 2016 - michael@stroeder.com
|
|||
|
|
|||
|
- update to upstream release 1.3.2
|
|||
|
* Updated Windows and OS X wheels to be compiled against OpenSSL 1.0.2h.
|
|||
|
* Fixed an issue preventing ``cryptography`` from compiling against
|
|||
|
LibreSSL 2.3.x.
|
|||
|
|
|||
|
-------------------------------------------------------------------
|
|||
|
Fri Mar 18 14:39:05 UTC 2016 - michael@stroeder.com
|
|||
|
|
|||
|
- removed obsolete cryptography-new-bio-new-type.patch
|
|||
|
- update to upstream release 1.3.1
|
|||
|
* Fixed a bug that caused an AttributeError when using mock to patch
|
|||
|
some cryptography modules.
|
|||
|
* Added support for padding ANSI X.923 with ANSIX923.
|
|||
|
* Deprecated support for OpenSSL 0.9.8. Support will be removed in
|
|||
|
cryptography 1.4.
|
|||
|
* Added support for the PolicyConstraints X.509 extension including both
|
|||
|
parsing and generation using CertificateBuilder and
|
|||
|
CertificateSigningRequestBuilder.
|
|||
|
* Added is_signature_valid to CertificateSigningRequest.
|
|||
|
* Fixed an intermittent AssertionError when performing an RSA decryption
|
|||
|
on an invalid ciphertext, ValueError is now correctly raised in all
|
|||
|
cases.
|
|||
|
* Added from_issuer_subject_key_identifier().
|
|||
|
|
|||
|
-------------------------------------------------------------------
|
|||
|
Sun Mar 13 21:20:00 UTC 2016 - dmueller@suse.com
|
|||
|
|
|||
|
- fix license
|
|||
|
|
|||
|
-------------------------------------------------------------------
|
|||
|
Wed Mar 2 21:47:58 UTC 2016 - dimstar@opensuse.org
|
|||
|
|
|||
|
- Add pkg-config BuildRequires: in order for the last introduced
|
|||
|
condition to apply the patch to work, pkg-config has to be
|
|||
|
present.
|
|||
|
|
|||
|
-------------------------------------------------------------------
|
|||
|
Wed Mar 2 14:19:46 UTC 2016 - meissner@suse.com
|
|||
|
|
|||
|
- cryptography-new-bio-new-type.patch: openssl 1.0.2g changed
|
|||
|
the type of BIO_new_mem_buf() (added a const).
|
|||
|
|
|||
|
-------------------------------------------------------------------
|
|||
|
Sat Jan 9 16:58:46 UTC 2016 - michael@stroeder.com
|
|||
|
|
|||
|
- update to upstream release 1.2.1
|
|||
|
|
|||
|
1.2.1 - 2016-01-08
|
|||
|
* Reverts a change to an OpenSSL EVP_PKEY object that caused
|
|||
|
errors with pyOpenSSL.
|
|||
|
1.2 - 2016-01-08
|
|||
|
* BACKWARDS INCOMPATIBLE: RevokedCertificate extensions now
|
|||
|
uses extension classes rather than returning raw values
|
|||
|
inside the Extension value. The new classes are:
|
|||
|
o CertificateIssuer
|
|||
|
o CRLReason
|
|||
|
o InvalidityDate
|
|||
|
* Deprecated support for OpenSSL 0.9.8 and 1.0.0. At this time
|
|||
|
there is no time table for actually dropping support,
|
|||
|
however we strongly encourage all users to upgrade, as those
|
|||
|
versions no longer receive support from the OpenSSL project.
|
|||
|
* The Certificate class now has signature and
|
|||
|
tbs_certificate_bytes attributes.
|
|||
|
* The CertificateSigningRequest class now has signature and
|
|||
|
tbs_certrequest_bytes attributes.
|
|||
|
* The CertificateRevocationList class now has signature and
|
|||
|
tbs_certlist_bytes attributes.
|
|||
|
* NameConstraints are now supported in the CertificateBuilder
|
|||
|
and CertificateSigningRequestBuilder.
|
|||
|
* Support serialization of certificate revocation lists using
|
|||
|
the public_bytes() method of CertificateRevocationList.
|
|||
|
* Add support for parsing CertificateRevocationList extensions
|
|||
|
() in the OpenSSL backend. The following extensions are
|
|||
|
currently supported:
|
|||
|
o AuthorityInformationAccess
|
|||
|
o AuthorityKeyIdentifier
|
|||
|
o CRLNumber
|
|||
|
o IssuerAlternativeName
|
|||
|
* Added CertificateRevocationListBuilder and
|
|||
|
RevokedCertificateBuilder to allow creation of CRLs.
|
|||
|
* Unrecognized non-critical X.509 extensions are now parsed
|
|||
|
into an UnrecognizedExtension object.
|
|||
|
|
|||
|
-------------------------------------------------------------------
|
|||
|
Wed Dec 30 12:41:26 UTC 2015 - michael@stroeder.com
|
|||
|
|
|||
|
- update to 1.1.2:
|
|||
|
* Fixed a SIGBUS crash with the OS X wheels caused by redefinition of a
|
|||
|
method.
|
|||
|
* Fixed a runtime error ``undefined symbol EC_GFp_nistp224_method`` that
|
|||
|
occurred with some OpenSSL installations.
|
|||
|
* Updated Windows and OS X wheels to be compiled against OpenSSL 1.0.2e.
|
|||
|
|
|||
|
-------------------------------------------------------------------
|
|||
|
Wed Dec 9 10:35:20 UTC 2015 - dmueller@suse.com
|
|||
|
|
|||
|
- update to 1.1.1:
|
|||
|
* Fixed several small bugs related to compiling the OpenSSL bindings with
|
|||
|
unusual OpenSSL configurations.
|
|||
|
* Resolved an issue where, depending on the method of installation and
|
|||
|
which Python interpreter they were using, users on El Capitan (OS X 10.11)
|
|||
|
may have seen an ``InternalError`` on import.
|
|||
|
|
|||
|
-------------------------------------------------------------------
|
|||
|
Wed Dec 9 10:19:45 UTC 2015 - dmueller@suse.com
|
|||
|
|
|||
|
- fix build for sle11 (disable testsuite as it depends on python-hypothesis
|
|||
|
which is not available for sle11 anymore)
|
|||
|
|
|||
|
-------------------------------------------------------------------
|
|||
|
Tue Nov 10 04:16:13 UTC 2015 - tbechtold@suse.com
|
|||
|
|
|||
|
- update to 1.1:
|
|||
|
* Added support for Elliptic Curve Diffie-Hellman with
|
|||
|
:class:`~cryptography.hazmat.primitives.asymmetric.ec.ECDH`.
|
|||
|
* Added :class:`~cryptography.hazmat.primitives.kdf.x963kdf.X963KDF`.
|
|||
|
* Added support for parsing certificate revocation lists (CRLs) using
|
|||
|
:func:`~cryptography.x509.load_pem_x509_crl` and
|
|||
|
:func:`~cryptography.x509.load_der_x509_crl`.
|
|||
|
* Add support for AES key wrapping with
|
|||
|
:func:`~cryptography.hazmat.primitives.keywrap.aes_key_wrap` and
|
|||
|
:func:`~cryptography.hazmat.primitives.keywrap.aes_key_unwrap`.
|
|||
|
* Added a ``__hash__`` method to :class:`~cryptography.x509.Name`.
|
|||
|
* Add support for encoding and decoding elliptic curve points to a byte string
|
|||
|
form using
|
|||
|
:meth:`~cryptography.hazmat.primitives.asymmetric.ec.EllipticCurvePublicNumbers.encode_point`
|
|||
|
and
|
|||
|
:meth:`~cryptography.hazmat.primitives.asymmetric.ec.EllipticCurvePublicNumbers.from_encoded_point`.
|
|||
|
* Added :meth:`~cryptography.x509.Extensions.get_extension_for_class`.
|
|||
|
* :class:`~cryptography.x509.CertificatePolicies` are now supported in the
|
|||
|
:class:`~cryptography.x509.CertificateBuilder`.
|
|||
|
* ``countryName`` is now encoded as a ``PrintableString`` when creating subject
|
|||
|
and issuer distinguished names with the Certificate and CSR builder classes.
|
|||
|
* **SECURITY ISSUE**: The OpenSSL backend prior to 1.0.2 made extensive use
|
|||
|
of assertions to check response codes where our tests could not trigger a
|
|||
|
failure. However, when Python is run with ``-O`` these asserts are optimized
|
|||
|
away. If a user ran Python with this flag and got an invalid response code
|
|||
|
this could result in undefined behavior or worse. Accordingly, all response
|
|||
|
checks from the OpenSSL backend have been converted from ``assert``
|
|||
|
to a true function call. Credit **Emilia Käsper (Google Security Team)**
|
|||
|
for the report.
|
|||
|
* We now ship OS X wheels that statically link OpenSSL by default. When
|
|||
|
installing a wheel on OS X 10.10+ (and using a Python compiled against the
|
|||
|
10.10 SDK) users will no longer need to compile. See :doc:`/installation` for
|
|||
|
alternate installation methods if required.
|
|||
|
* Set the default string mask to UTF-8 in the OpenSSL backend to resolve
|
|||
|
character encoding issues with older versions of OpenSSL.
|
|||
|
* Several new OpenSSL bindings have been added to support a future pyOpenSSL
|
|||
|
release.
|
|||
|
* Raise an error during install on PyPy < 2.6. 1.0+ requires PyPy 2.6+.
|
|||
|
- Remove 2293.patch . Applied in a different way upstream.
|
|||
|
- Add BuildRequires for python-hypothesis and python-pyasn1-modules for running
|
|||
|
unittests
|
|||
|
|
|||
|
-------------------------------------------------------------------
|
|||
|
Wed Sep 30 12:01:27 UTC 2015 - dmueller@suse.com
|
|||
|
|
|||
|
- require the cffi version it was built against to avoid (bsc#948198)
|
|||
|
|
|||
|
-------------------------------------------------------------------
|
|||
|
Tue Sep 29 13:54:24 UTC 2015 - tbechtold@suse.com
|
|||
|
|
|||
|
- Add 2293.patch for "osrandom engine already registered" (bnc#947679)
|
|||
|
|
|||
|
-------------------------------------------------------------------
|
|||
|
Thu Sep 17 13:11:06 UTC 2015 - tbechtold@suse.com
|
|||
|
|
|||
|
- Add disable-uneven-sizes-tests.patch (bnc#944204)
|
|||
|
openssl in SLE12SP1 doesn't allow uneven bit sizes for rsa keys
|
|||
|
|
|||
|
-------------------------------------------------------------------
|
|||
|
Sat Aug 22 10:30:08 UTC 2015 - tbechtold@suse.com
|
|||
|
|
|||
|
- update to 1.0 (fate#318838):
|
|||
|
* Switched to the new `cffi`_ ``set_source`` out-of-line API mode for
|
|||
|
compilation. This results in significantly faster imports and lowered
|
|||
|
memory consumption. Due to this change we no longer support PyPy releases
|
|||
|
older than 2.6 nor do we support any released version of PyPy3 (until a
|
|||
|
version supporting cffi 1.0 comes out).
|
|||
|
* Fix parsing of OpenSSH public keys that have spaces in comments.
|
|||
|
* Support serialization of certificate signing requests using the
|
|||
|
``public_bytes`` method of
|
|||
|
:class:`~cryptography.x509.CertificateSigningRequest`.
|
|||
|
* Support serialization of certificates using the ``public_bytes`` method of
|
|||
|
:class:`~cryptography.x509.Certificate`.
|
|||
|
* Add ``get_provisioning_uri`` method to
|
|||
|
:class:`~cryptography.hazmat.primitives.twofactor.hotp.HOTP` and
|
|||
|
:class:`~cryptography.hazmat.primitives.twofactor.totp.TOTP` for generating
|
|||
|
provisioning URIs.
|
|||
|
* Add :class:`~cryptography.hazmat.primitives.kdf.concatkdf.ConcatKDFHash`
|
|||
|
and :class:`~cryptography.hazmat.primitives.kdf.concatkdf.ConcatKDFHMAC`.
|
|||
|
* Raise a ``TypeError`` when passing objects that are not text as the value to
|
|||
|
:class:`~cryptography.x509.NameAttribute`.
|
|||
|
* Add support for :class:`~cryptography.x509.OtherName` as a general name
|
|||
|
type.
|
|||
|
* Added new X.509 extension support in :class:`~cryptography.x509.Certificate`
|
|||
|
The following new extensions are now supported:
|
|||
|
|
|||
|
* :class:`~cryptography.x509.OCSPNoCheck`
|
|||
|
* :class:`~cryptography.x509.InhibitAnyPolicy`
|
|||
|
* :class:`~cryptography.x509.IssuerAlternativeName`
|
|||
|
* :class:`~cryptography.x509.NameConstraints`
|
|||
|
|
|||
|
* Extension support was added to
|
|||
|
:class:`~cryptography.x509.CertificateSigningRequest`.
|
|||
|
* Add support for creating signed certificates with
|
|||
|
:class:`~cryptography.x509.CertificateBuilder`. This includes support for
|
|||
|
the following extensions:
|
|||
|
|
|||
|
* :class:`~cryptography.x509.BasicConstraints`
|
|||
|
* :class:`~cryptography.x509.SubjectAlternativeName`
|
|||
|
* :class:`~cryptography.x509.KeyUsage`
|
|||
|
* :class:`~cryptography.x509.ExtendedKeyUsage`
|
|||
|
* :class:`~cryptography.x509.SubjectKeyIdentifier`
|
|||
|
* :class:`~cryptography.x509.AuthorityKeyIdentifier`
|
|||
|
* :class:`~cryptography.x509.AuthorityInformationAccess`
|
|||
|
* :class:`~cryptography.x509.CRLDistributionPoints`
|
|||
|
* :class:`~cryptography.x509.InhibitAnyPolicy`
|
|||
|
* :class:`~cryptography.x509.IssuerAlternativeName`
|
|||
|
* :class:`~cryptography.x509.OCSPNoCheck`
|
|||
|
|
|||
|
* Add support for creating certificate signing requests with
|
|||
|
:class:`~cryptography.x509.CertificateSigningRequestBuilder`. This includes
|
|||
|
support for the same extensions supported in the ``CertificateBuilder``.
|
|||
|
* Deprecate ``encode_rfc6979_signature`` and ``decode_rfc6979_signature`` in
|
|||
|
favor of
|
|||
|
:func:`~cryptography.hazmat.primitives.asymmetric.utils.encode_dss_signature`
|
|||
|
and
|
|||
|
:func:`~cryptography.hazmat.primitives.asymmetric.utils.decode_dss_signature`.
|
|||
|
- Adjust Requires according to requires.txt
|
|||
|
|
|||
|
-------------------------------------------------------------------
|
|||
|
Wed Jul 29 18:05:55 UTC 2015 - tbechtold@suse.com
|
|||
|
|
|||
|
- update to 0.9.3:
|
|||
|
* Updated Windows wheels to be compiled against OpenSSL 1.0.2d.
|
|||
|
* Updated Windows wheels to be compiled against OpenSSL 1.0.2c.
|
|||
|
* **SECURITY ISSUE**: Fixed a double free in the OpenSSL backend when using DSA
|
|||
|
to verify signatures. Note that this only affects PyPy 2.6.0 and (presently
|
|||
|
unreleased) CFFI versions greater than 1.1.0.
|
|||
|
* Removed support for Python 3.2. This version of Python is rarely used
|
|||
|
and caused support headaches. Users affected by this should upgrade to 3.3+.
|
|||
|
* Deprecated support for Python 2.6. At the time there is no time table for
|
|||
|
actually dropping support, however we strongly encourage all users to upgrade
|
|||
|
their Python, as Python 2.6 no longer receives support from the Python core
|
|||
|
team.
|
|||
|
* Add support for the
|
|||
|
:class:`~cryptography.hazmat.primitives.asymmetric.ec.SECP256K1` elliptic
|
|||
|
curve.
|
|||
|
* Fixed compilation when using an OpenSSL which was compiled with the
|
|||
|
``no-comp`` (``OPENSSL_NO_COMP``) option.
|
|||
|
* Support :attr:`~cryptography.hazmat.primitives.serialization.Encoding.DER`
|
|||
|
serialization of public keys using the ``public_bytes`` method of
|
|||
|
:class:`~cryptography.hazmat.primitives.asymmetric.rsa.RSAPublicKeyWithSerialization`,
|
|||
|
:class:`~cryptography.hazmat.primitives.asymmetric.dsa.DSAPublicKeyWithSerialization`,
|
|||
|
and
|
|||
|
:class:`~cryptography.hazmat.primitives.asymmetric.ec.EllipticCurvePublicKeyWithSerialization`.
|
|||
|
* Support :attr:`~cryptography.hazmat.primitives.serialization.Encoding.DER`
|
|||
|
serialization of private keys using the ``private_bytes`` method of
|
|||
|
:class:`~cryptography.hazmat.primitives.asymmetric.rsa.RSAPrivateKeyWithSerialization`,
|
|||
|
:class:`~cryptography.hazmat.primitives.asymmetric.dsa.DSAPrivateKeyWithSerialization`,
|
|||
|
and
|
|||
|
:class:`~cryptography.hazmat.primitives.asymmetric.ec.EllipticCurvePrivateKeyWithSerialization`.
|
|||
|
* Add support for parsing X.509 certificate signing requests (CSRs) with
|
|||
|
:func:`~cryptography.x509.load_pem_x509_csr` and
|
|||
|
:func:`~cryptography.x509.load_der_x509_csr`.
|
|||
|
* Moved ``cryptography.exceptions.InvalidToken`` to
|
|||
|
:class:`cryptography.hazmat.primitives.twofactor.InvalidToken` and deprecated
|
|||
|
the old location. This was moved to minimize confusion between this exception
|
|||
|
and :class:`cryptography.fernet.InvalidToken`.
|
|||
|
* Added support for X.509 extensions in :class:`~cryptography.x509.Certificate`
|
|||
|
objects. The following extensions are supported as of this release:
|
|||
|
|
|||
|
* :class:`~cryptography.x509.BasicConstraints`
|
|||
|
* :class:`~cryptography.x509.AuthorityKeyIdentifier`
|
|||
|
* :class:`~cryptography.x509.SubjectKeyIdentifier`
|
|||
|
* :class:`~cryptography.x509.KeyUsage`
|
|||
|
* :class:`~cryptography.x509.SubjectAlternativeName`
|
|||
|
* :class:`~cryptography.x509.ExtendedKeyUsage`
|
|||
|
* :class:`~cryptography.x509.CRLDistributionPoints`
|
|||
|
* :class:`~cryptography.x509.AuthorityInformationAccess`
|
|||
|
* :class:`~cryptography.x509.CertificatePolicies`
|
|||
|
|
|||
|
Note that unsupported extensions with the critical flag raise
|
|||
|
:class:`~cryptography.x509.UnsupportedExtension` while unsupported extensions
|
|||
|
set to non-critical are silently ignored. Read the
|
|||
|
:doc:`X.509 documentation</x509>` for more information.
|
|||
|
- add python-pyasn1, python-ipaddress and python-idna as Requires/BuildRequires
|
|||
|
|
|||
|
-------------------------------------------------------------------
|
|||
|
Thu Apr 23 06:38:42 UTC 2015 - mcihar@suse.cz
|
|||
|
|
|||
|
- Update to 0.8.2:
|
|||
|
* Fixed a race condition when initializing the OpenSSL or CommonCrypto backends
|
|||
|
in a multi-threaded scenario.
|
|||
|
|
|||
|
-------------------------------------------------------------------
|
|||
|
Tue Apr 7 10:00:28 UTC 2015 - tbechtold@suse.com
|
|||
|
|
|||
|
- update to 0.8.1:
|
|||
|
* Updated Windows wheels to be compiled against OpenSSL 1.0.2a.
|
|||
|
* func:`~cryptography.hazmat.primitives.serialization.load_ssh_public_key` can
|
|||
|
now load elliptic curve public keys.
|
|||
|
* Added
|
|||
|
:attr:`~cryptography.x509.Certificate.signature_hash_algorithm` support to
|
|||
|
:class:`~cryptography.x509.Certificate`.
|
|||
|
* Added
|
|||
|
:func:`~cryptography.hazmat.primitives.asymmetric.rsa.rsa_recover_prime_factor s`
|
|||
|
* :class:`~cryptography.hazmat.primitives.kdf.KeyDerivationFunction` was moved
|
|||
|
from :mod:`~cryptography.hazmat.primitives.interfaces` to
|
|||
|
:mod:`~cryptography.hazmat.primitives.kdf`.
|
|||
|
* Added support for parsing X.509 names. See the
|
|||
|
:doc:`X.509 documentation</x509>` for more information.
|
|||
|
* Added
|
|||
|
:func:`~cryptography.hazmat.primitives.serialization.load_der_private_key` to
|
|||
|
support loading of DER encoded private keys and
|
|||
|
:func:`~cryptography.hazmat.primitives.serialization.load_der_public_key` to
|
|||
|
support loading DER encoded public keys.
|
|||
|
* Fixed building against LibreSSL, a compile-time substitute for OpenSSL.
|
|||
|
* FreeBSD 9.2 was removed from the continuous integration system.
|
|||
|
* Updated Windows wheels to be compiled against OpenSSL 1.0.2.
|
|||
|
* :func:`~cryptography.hazmat.primitives.serialization.load_pem_public_key`
|
|||
|
and :func:`~cryptography.hazmat.primitives.serialization.load_der_public_key`
|
|||
|
now support PKCS1 RSA public keys (in addition to the previous support for
|
|||
|
SubjectPublicKeyInfo format for RSA, EC, and DSA).
|
|||
|
* Added
|
|||
|
:class:`~cryptography.hazmat.primitives.asymmetric.ec.EllipticCurvePrivateKeyWithSerialization`
|
|||
|
and deprecated
|
|||
|
:class:`~cryptography.hazmat.primitives.asymmetric.ec.EllipticCurvePrivateKeyWithNumbers`.
|
|||
|
* Added
|
|||
|
:meth:`~cryptography.hazmat.primitives.asymmetric.ec.EllipticCurvePrivateKeyWithSerialization.private_bytes`
|
|||
|
to
|
|||
|
:class:`~cryptography.hazmat.primitives.asymmetric.ec.EllipticCurvePrivateKeyWithSerialization`.
|
|||
|
* Added
|
|||
|
:class:`~cryptography.hazmat.primitives.asymmetric.rsa.RSAPrivateKeyWithSerialization`
|
|||
|
and deprecated
|
|||
|
:class:`~cryptography.hazmat.primitives.asymmetric.rsa.RSAPrivateKeyWithNumbers`.
|
|||
|
* Added
|
|||
|
:meth:`~cryptography.hazmat.primitives.asymmetric.rsa.RSAPrivateKeyWithSerialization.private_bytes`
|
|||
|
to
|
|||
|
:class:`~cryptography.hazmat.primitives.asymmetric.rsa.RSAPrivateKeyWithSerialization`.
|
|||
|
* Added
|
|||
|
:class:`~cryptography.hazmat.primitives.asymmetric.dsa.DSAPrivateKeyWithSerialization`
|
|||
|
and deprecated
|
|||
|
:class:`~cryptography.hazmat.primitives.asymmetric.dsa.DSAPrivateKeyWithNumbers`.
|
|||
|
* Added
|
|||
|
:meth:`~cryptography.hazmat.primitives.asymmetric.dsa.DSAPrivateKeyWithSerialization.private_bytes`
|
|||
|
to
|
|||
|
:class:`~cryptography.hazmat.primitives.asymmetric.dsa.DSAPrivateKeyWithSerialization`.
|
|||
|
* Added
|
|||
|
:class:`~cryptography.hazmat.primitives.asymmetric.rsa.RSAPublicKeyWithSerialization`
|
|||
|
and deprecated
|
|||
|
:class:`~cryptography.hazmat.primitives.asymmetric.rsa.RSAPublicKeyWithNumbers`.
|
|||
|
* Added
|
|||
|
:meth:`~cryptography.hazmat.primitives.asymmetric.rsa.RSAPublicKeyWithSerialization.public_bytes`
|
|||
|
to
|
|||
|
:class:`~cryptography.hazmat.primitives.asymmetric.rsa.RSAPublicKeyWithSerialization`.
|
|||
|
* Added
|
|||
|
:class:`~cryptography.hazmat.primitives.asymmetric.ec.EllipticCurvePublicKeyWithSerialization`
|
|||
|
and deprecated
|
|||
|
:class:`~cryptography.hazmat.primitives.asymmetric.ec.EllipticCurvePublicKeyWithNumbers`.
|
|||
|
* Added
|
|||
|
:meth:`~cryptography.hazmat.primitives.asymmetric.ec.EllipticCurvePublicKeyWithSerialization.public_bytes`
|
|||
|
to
|
|||
|
:class:`~cryptography.hazmat.primitives.asymmetric.ec.EllipticCurvePublicKeyWithSerialization`.
|
|||
|
* Added
|
|||
|
:class:`~cryptography.hazmat.primitives.asymmetric.dsa.DSAPublicKeyWithSerialization`
|
|||
|
and deprecated
|
|||
|
:class:`~cryptography.hazmat.primitives.asymmetric.dsa.DSAPublicKeyWithNumbers`.
|
|||
|
* Added
|
|||
|
:meth:`~cryptography.hazmat.primitives.asymmetric.dsa.DSAPublicKeyWithSerialization.public_bytes`
|
|||
|
to
|
|||
|
:class:`~cryptography.hazmat.primitives.asymmetric.dsa.DSAPublicKeyWithSerialization`.
|
|||
|
* :class:`~cryptography.hazmat.primitives.hashes.HashAlgorithm` and
|
|||
|
:class:`~cryptography.hazmat.primitives.hashes.HashContext` were moved from
|
|||
|
:mod:`~cryptography.hazmat.primitives.interfaces` to
|
|||
|
:mod:`~cryptography.hazmat.primitives.hashes`.
|
|||
|
* :class:`~cryptography.hazmat.primitives.ciphers.CipherContext`,
|
|||
|
:class:`~cryptography.hazmat.primitives.ciphers.AEADCipherContext`,
|
|||
|
:class:`~cryptography.hazmat.primitives.ciphers.AEADEncryptionContext`,
|
|||
|
:class:`~cryptography.hazmat.primitives.ciphers.CipherAlgorithm`, and
|
|||
|
:class:`~cryptography.hazmat.primitives.ciphers.BlockCipherAlgorithm`
|
|||
|
were moved from :mod:`~cryptography.hazmat.primitives.interfaces` to
|
|||
|
:mod:`~cryptography.hazmat.primitives.ciphers`.
|
|||
|
* :class:`~cryptography.hazmat.primitives.ciphers.modes.Mode`,
|
|||
|
:class:`~cryptography.hazmat.primitives.ciphers.modes.ModeWithInitializationVector`,
|
|||
|
:class:`~cryptography.hazmat.primitives.ciphers.modes.ModeWithNonce`, and
|
|||
|
:class:`~cryptography.hazmat.primitives.ciphers.modes.ModeWithAuthenticationTag`
|
|||
|
were moved from :mod:`~cryptography.hazmat.primitives.interfaces` to
|
|||
|
:mod:`~cryptography.hazmat.primitives.ciphers.modes`.
|
|||
|
* :class:`~cryptography.hazmat.primitives.padding.PaddingContext` was moved
|
|||
|
from :mod:`~cryptography.hazmat.primitives.interfaces` to
|
|||
|
:mod:`~cryptography.hazmat.primitives.padding`.
|
|||
|
*
|
|||
|
:class:`~cryptography.hazmat.primitives.asymmetric.padding.AsymmetricPadding`
|
|||
|
was moved from :mod:`~cryptography.hazmat.primitives.interfaces` to
|
|||
|
:mod:`~cryptography.hazmat.primitives.asymmetric.padding`.
|
|||
|
*
|
|||
|
:class:`~cryptography.hazmat.primitives.asymmetric.AsymmetricSignatureContext`
|
|||
|
and
|
|||
|
:class:`~cryptography.hazmat.primitives.asymmetric.AsymmetricVerificationContext`
|
|||
|
were moved from :mod:`~cryptography.hazmat.primitives.interfaces` to
|
|||
|
:mod:`~cryptography.hazmat.primitives.asymmetric`.
|
|||
|
* :class:`~cryptography.hazmat.primitives.asymmetric.dsa.DSAParameters`,
|
|||
|
:class:`~cryptography.hazmat.primitives.asymmetric.dsa.DSAParametersWithNumbers`,
|
|||
|
:class:`~cryptography.hazmat.primitives.asymmetric.dsa.DSAPrivateKey`,
|
|||
|
:class:`~cryptography.hazmat.primitives.asymmetric.dsa.DSAPrivateKeyWithNumbers`,
|
|||
|
:class:`~cryptography.hazmat.primitives.asymmetric.dsa.DSAPublicKey` and
|
|||
|
:class:`~cryptography.hazmat.primitives.asymmetric.dsa.DSAPublicKeyWithNumbers`
|
|||
|
were moved from :mod:`~cryptography.hazmat.primitives.interfaces` to
|
|||
|
:mod:`~cryptography.hazmat.primitives.asymmetric.dsa`
|
|||
|
* :class:`~cryptography.hazmat.primitives.asymmetric.ec.EllipticCurve`,
|
|||
|
:class:`~cryptography.hazmat.primitives.asymmetric.ec.EllipticCurveSignatureAlgorithm`,
|
|||
|
:class:`~cryptography.hazmat.primitives.asymmetric.ec.EllipticCurvePrivateKey`,
|
|||
|
:class:`~cryptography.hazmat.primitives.asymmetric.ec.EllipticCurvePrivateKeyWithNumbers`,
|
|||
|
:class:`~cryptography.hazmat.primitives.asymmetric.ec.EllipticCurvePublicKey`,
|
|||
|
and
|
|||
|
:class:`~cryptography.hazmat.primitives.asymmetric.ec.EllipticCurvePublicKeyWithNumbers`
|
|||
|
were moved from :mod:`~cryptography.hazmat.primitives.interfaces` to
|
|||
|
:mod:`~cryptography.hazmat.primitives.asymmetric.ec`.
|
|||
|
* :class:`~cryptography.hazmat.primitives.asymmetric.rsa.RSAPrivateKey`,
|
|||
|
:class:`~cryptography.hazmat.primitives.asymmetric.rsa.RSAPrivateKeyWithNumbers`,
|
|||
|
:class:`~cryptography.hazmat.primitives.asymmetric.rsa.RSAPublicKey` and
|
|||
|
:class:`~cryptography.hazmat.primitives.asymmetric.rsa.RSAPublicKeyWithNumbers`
|
|||
|
were moved from :mod:`~cryptography.hazmat.primitives.interfaces` to
|
|||
|
:mod:`~cryptography.hazmat.primitives.asymmetric.rsa`.
|
|||
|
* Updated Windows wheels to be compiled against OpenSSL 1.0.1l.
|
|||
|
* ``enum34`` is no longer installed on Python 3.4, where it is included in
|
|||
|
the standard library.
|
|||
|
* Added a new function to the OpenSSL bindings to support additional
|
|||
|
functionality in pyOpenSSL.
|
|||
|
|
|||
|
-------------------------------------------------------------------
|
|||
|
Mon Dec 29 18:08:34 UTC 2014 - jmatejek@suse.com
|
|||
|
|
|||
|
- update to 0.7.1
|
|||
|
* backwards-incompatible change: GCM module doesn't truncate tags
|
|||
|
by default anymore
|
|||
|
* removed deprecated arguments to MFG1 constructor
|
|||
|
* ECC support
|
|||
|
* added PEM and openssh key loading convenience methods
|
|||
|
* support for many new ciphers and new features of existing ones
|
|||
|
see CHANGELOG.rst for details
|
|||
|
- spec cleanup
|
|||
|
- reworked %check section
|
|||
|
- added changelog to docs
|
|||
|
|
|||
|
-------------------------------------------------------------------
|
|||
|
Mon May 19 16:14:52 UTC 2014 - jmatejek@suse.com
|
|||
|
|
|||
|
- update to 0.4
|
|||
|
* added IDEA algorithm
|
|||
|
* added HOTP, TOTP and CMAC primitives
|
|||
|
* improved support for RSA and DSA public key cryptography
|
|||
|
- include cryptography_vectors as a source, in order to run the full
|
|||
|
test suite (cryptography_vectors seems only useful for testing
|
|||
|
this module, so it's probably not worth making a separate installable
|
|||
|
package for it)
|
|||
|
- drop upstreamed cryptography-custom-install-cmd.patch
|
|||
|
|
|||
|
-------------------------------------------------------------------
|
|||
|
Mon Mar 31 16:03:46 UTC 2014 - speilicke@suse.com
|
|||
|
|
|||
|
- Add cryptography-custom-install-cmd.patch: Fix installation to plat_lib
|
|||
|
- Properly invoke testsuite, therefore add dependencies on iso8601 and pretend
|
|||
|
- Only use pkg-config for libffi on newer distros, stay with old-style
|
|||
|
devel package requires to fix SLE build
|
|||
|
|
|||
|
-------------------------------------------------------------------
|
|||
|
Mon Feb 24 12:43:32 UTC 2014 - mvyskocil@suse.com
|
|||
|
|
|||
|
- Initial packaging of python-cryptography for openSUSE
|
|||
|
|