Revisions of python-cryptography

Ana Guerrero's avatar Ana Guerrero (anag+factory) accepted request 1217043 from Dirk Mueller's avatar Dirk Mueller (dirkmueller) (revision 95)
- update to 43.0.3:
  * Fixed release metadata for cryptography-vectors
  * Fixed compilation when using LibreSSL 4.0.0.
Ana Guerrero's avatar Ana Guerrero (anag+factory) accepted request 1204397 from Dirk Mueller's avatar Dirk Mueller (dirkmueller) (revision 94)
- update to 43.0.1:
  * Updated Windows, macOS, and Linux wheels to be compiled with
    OpenSSL 3.3.2.
Dominique Leuenberger's avatar Dominique Leuenberger (dimstar_suse) accepted request 1193532 from Matej Cepl's avatar Matej Cepl (mcepl) (revision 92)
- Fix building optimized binaries with debuginfo.

- Update building of Rust modules to use modern cargo_vendor
  service
- Remove unneeded use-offline-build.patch
Dominique Leuenberger's avatar Dominique Leuenberger (dimstar_suse) accepted request 1189786 from Dirk Mueller's avatar Dirk Mueller (dirkmueller) (revision 91)
- update to 43.0.0:
  * BACKWARDS INCOMPATIBLE: Support for OpenSSL less than 1.1.1e
    has been removed.  Users on older version of OpenSSL will
    need to upgrade.
  * BACKWARDS INCOMPATIBLE: Dropped support for LibreSSL < 3.8.
  * Updated Windows, macOS, and Linux wheels to be compiled with
    OpenSSL 3.3.1.
  * Updated the minimum supported Rust version (MSRV) to 1.65.0,
    from 1.63.0.
  * :func:`~cryptography.hazmat.primitives.asymmetric.rsa.generat
    e_private_key` now enforces a minimum RSA key size of
    1024-bit. Note that 1024-bit is still considered insecure,
    users should generally use a key size of 2048-bits.
  * :func:`~cryptography.hazmat.primitives.serialization.pkcs7.se
    rialize_certificates` now emits ASN.1 that more closely
    follows the recommendations in RFC 2315.
  * Added new :doc:`/hazmat/decrepit/index` module which contains
    outdated and insecure cryptographic primitives. :class:`~cryp
    tography.hazmat.primitives.ciphers.algorithms.CAST5`, :class:
    `~cryptography.hazmat.primitives.ciphers.algorithms.SEED`, :c
    lass:`~cryptography.hazmat.primitives.ciphers.algorithms.IDEA
    `, and :class:`~cryptography.hazmat.primitives.ciphers.algori
    thms.Blowfish`, which were deprecated in 37.0.0, have been
    added to this module. They will be removed from the cipher
    module in 45.0.0.
  * Moved :class:`~cryptography.hazmat.primitives.ciphers.algorit
    hms.TripleDES` and :class:`~cryptography.hazmat.primitives.ci
    phers.algorithms.ARC4` into :doc:`/hazmat/decrepit/index` and
    deprecated them in the cipher module. They will be removed
    from the cipher module in 48.0.0.
Ana Guerrero's avatar Ana Guerrero (anag+factory) accepted request 1179508 from Dirk Mueller's avatar Dirk Mueller (dirkmueller) (revision 90)
- update to 42.0.8:
  * Updated Windows, macOS, and Linux wheels to be compiled with
    OpenSSL 3.2.2.
Ana Guerrero's avatar Ana Guerrero (anag+factory) accepted request 1174053 from Factory Maintainer's avatar Factory Maintainer (factory-maintainer) (revision 89)
Automatic submission by obs-autosubmit
Dominique Leuenberger's avatar Dominique Leuenberger (dimstar_suse) accepted request 1172344 from Dirk Mueller's avatar Dirk Mueller (dirkmueller) (revision 88)
- update to 42.0.6:
  * Fixed compilation when using LibreSSL 3.9.1.
Ana Guerrero's avatar Ana Guerrero (anag+factory) accepted request 1164122 from Dirk Mueller's avatar Dirk Mueller (dirkmueller) (revision 87)
- update to 42.0.5:
  * Limit the number of name constraint checks that will be
    performed in :mod:`X.509 path validation
    <cryptography.x509.verification>` to protect against denial
    of service attacks.
  * Upgrade pyo3 version, which fixes building on PowerPC.
Ana Guerrero's avatar Ana Guerrero (anag+factory) accepted request 1149625 from Daniel Garcia's avatar Daniel Garcia (dgarcia) (revision 86)
- update to 42.0.4 (bsc#1220210, CVE-2024-26130):
  * Fixed a null-pointer-dereference and segfault that could occur
    when creating a PKCS#12 bundle. Credit to Alexander-Programming
    for reporting the issue. CVE-2024-26130
  * Fixed ASN.1 encoding for PKCS7/SMIME signed messages. The fields
    SMIMECapabilities and SignatureAlgorithmIdentifier should now be
    correctly encoded according to the definitions in :rfc:2633
    :rfc:3370.
- update to 42.0.3:
  * Fixed an initialization issue that caused key loading failures for some
    users.
- Drop patch skip_openssl_memleak_test.patch not needed anymore.
Ana Guerrero's avatar Ana Guerrero (anag+factory) accepted request 1129560 from Dirk Mueller's avatar Dirk Mueller (dirkmueller) (revision 85)
- update to 41.0.7 (CVE-2023-49083, bsc#1217592):
  * Fixed compilation when using LibreSSL 3.8.2.
  * Fixed a null-pointer-dereference and segfault that could
    occur when loading certificates from a PKCS#7 bundle.
    Credit to **pkuzco** for reporting the issue. **CVE-2023-49083**
Ana Guerrero's avatar Ana Guerrero (anag+factory) accepted request 1124982 from Dirk Mueller's avatar Dirk Mueller (dirkmueller) (revision 84)
- update to 41.0.5:
  * Updated Windows, macOS, and Linux wheels to be compiled with
    OpenSSL 3.1.4.
  * Added a function to support an upcoming ``pyOpenSSL``
    release.

    parameters in X.509 certificates, which are
  * Fixed error when using py2app to build an application with a cryptography dependency.
  * Updated Windows, macOS, and Linux wheels to be compiled with OpenSSL 1.1.1n.
- split tests in a multibuild variant to optimize rebuild time a bit
  * Updated Windows, macOS, and Linux wheels to be compiled with OpenSSL 1.1.1m.
- drop disable-RustExtension.patch: building rust extension now
  * Re-added a legacy symbol causing problems for older ``pyOpenSSL`` use
    signature.
  * wheels compiled with OpenSSL 1.1.1h.
    - Removed support for calling public_bytes() with no arguments, as per
  * BACKWARDS INCOMPATIBLE:
    Removedcryptography.hazmat.primitives.asymmetric.utils.encode_rfc6979_signature
    andcryptography.hazmat.primitives.asymmetric.utils.decode_rfc6979_signature,
    which had been deprecated for nearly 4 years. Use encode_dss_signature()
  * BACKWARDS INCOMPATIBLE: Removed cryptography.x509.Certificate.serial, which
  * Add support for easily mapping an object identifier to its elliptic curve
  * Add support for OpenSSL when compiled with the no-engine
  * BACKWARDS INCOMPATIBLE: U-label strings were deprecated in version 2.1,
    but this version removes the default idna dependency as well. If you still
    need this deprecated path please install cryptography with the idna extra:
  * Numerous classes and functions have been updated to allow bytes-like
    types for keying material and passwords, including symmetric algorithms,
  * Added rfc4514_string() method to x509.Name,
    x509.RelativeDistinguishedName, and x509.NameAttribute to format the name
Ana Guerrero's avatar Ana Guerrero (anag+factory) accepted request 1115782 from Dirk Mueller's avatar Dirk Mueller (dirkmueller) (revision 83)
- update to 41.0.4:
  * ~~~~~~~~~~~~~~~~~~~
  * Updated Windows, macOS, and Linux wheels to be compiled with
    OpenSSL 3.1.3.
  * .. _v41-0-3:
Ana Guerrero's avatar Ana Guerrero (anag+factory) accepted request 1109339 from Dirk Mueller's avatar Dirk Mueller (dirkmueller) (revision 82)
- Update to 39.0.1 (bsc#1208036, CVE-2023-23931):
  * drops CVE-2023-23931-dont-allow-update-into.patch in older dists
Dominique Leuenberger's avatar Dominique Leuenberger (dimstar_suse) accepted request 1102868 from Dirk Mueller's avatar Dirk Mueller (dirkmueller) (revision 81)
- update to 41.0.3:
  * Fixed performance regression loading DH public keys.
  * Fixed a memory leak when using
  * :class:`~cryptography.hazmat.primitives.ciphers.aead.ChaCha20
    Poly1305`.
Ana Guerrero's avatar Ana Guerrero (anag+factory) accepted request 1100618 from Factory Maintainer's avatar Factory Maintainer (factory-maintainer) (revision 80)
Automatic submission by obs-autosubmit
Dominique Leuenberger's avatar Dominique Leuenberger (dimstar_suse) accepted request 1098185 from Dirk Mueller's avatar Dirk Mueller (dirkmueller) (revision 79)
- update to 41.0.2:
  * Fixed bugs in creating and parsing SSH certificates where
    critical options with values were handled incorrectly.
    Certificates are now created correctly and parsing accepts
    correct values as well as the previously generated
    invalid forms with a warning. In the next release, support
    for parsing these invalid forms will be removed.

- remove patch remove_python_3_6_deprecation_warning.patch as the
  warning was already removed upstream

- Add no-pytest_benchmark.patch, which remove dependency on
  pytest-benchmark and coveralls (We don't need no benchmarking
  and coverage measurement; bsc#1213005).
Dominique Leuenberger's avatar Dominique Leuenberger (dimstar_suse) accepted request 1095411 from Daniel Garcia's avatar Daniel Garcia (dgarcia) (revision 78)
- update to 41.0.1 (bsc#1212568):
  * Temporarily allow invalid ECDSA signature algorithm
    parameters in X.509 certificates, which are 
    generated by older versions of Java.
  * Allow null bytes in pass phrases when serializing private
    keys.
  * **BACKWARDS INCOMPATIBLE:** Support for OpenSSL less than
    1.1.1d has been removed.  Users on older version of
    OpenSSL will need to upgrade.
  * **BACKWARDS INCOMPATIBLE:** Support for Python 3.6 has been
    removed.
  * **BACKWARDS INCOMPATIBLE:** Dropped support for LibreSSL <
    3.6.
  * Updated the minimum supported Rust version (MSRV) to 1.56.0,
    from 1.48.0.
  * Added support for the
    :class:`~cryptography.x509.OCSPAcceptableResponses`
    OCSP extension.
  * Added support for the
    :class:`~cryptography.x509.MSCertificateTemplate`
    proprietary Microsoft certificate extension.
  * Implemented support for equality checks on all asymmetric
    public key types.
  * Added support for ``aes256-gcm@openssh.com`` encrypted keys
    in :func:`~cryptography.hazmat.primitives.serialization.load_ssh
    _private_key`.
  * Added support for obtaining X.509 certificate signature
    algorithm parameters (including PSS)
Displaying revisions 1 - 20 of 97
openSUSE Build Service is sponsored by