Commit graph

9786 commits

Author SHA1 Message Date
adam
60e7962dfd py-m2crypto: updated to 0.32.0
0.32.0:
- setup.py: use ${CPP} as path to cpp
- Bump pipeline OpenSSL from 1.1.0i to 1.1.0j
- Stub wchar_t helpers and ignore unused WCHAR defs
- Add type comment to setup.py
2019-03-04 18:41:48 +00:00
tnn
fa7c8068a1 hitch-1.5.0 (2018-12-17)
Support for UNIX domain socket connections.
New configuration file settings pem-dir and pem-dir-glob.
Support for TLS 1.3.
Fixed a bug that would cause a crash on reload if ocsp-dir was changed.
Add log-level. This supersedes the previous quiet setting.
Add proxy-tlv. This enables extra reporting of cipher and protocol.
Drop TLSv1.1 from the default TLS protocols list.
2019-03-04 13:56:19 +00:00
taca
9a34c8e003 security/f-prot-antivirus6: remove files for f-prot-antivirus6-*-bin
Remove common files for f-prot-antivirus6-*-bin packages.
2019-03-03 15:22:33 +00:00
taca
4dfa6b8661 security/f-prot-antivirus6-ws-bin: remove package
Remove f-prot-antivirus6-ws-bin package version 6.2.3.

Althoguth F-PROT Antivirus is still supported for licensed users,
its antivirus engine (i.e. program itself) did not updated since 2013 and
it is sold for Linux and Windows (no *BSD).

So it's time to remove it from pkgsrc.
2019-03-03 15:21:50 +00:00
taca
a658c5af61 security/f-prot-antivirus6-fs-bin: remove package
Remove f-prot-antivirus6-fs-bin package version 6.2.3.

Althoguth F-PROT Antivirus is still supported for licensed users,
its antivirus engine (i.e. program itself) did not updated since 2013 and
it is sold for Linux and Windows (no *BSD).

So it's time to remove it from pkgsrc.
2019-03-03 15:21:28 +00:00
taca
74e061bec6 security/Makefile: remove f-prot-antivirus6* 2019-03-03 15:21:03 +00:00
taca
b1df43cdd1 security/f-prot-antivirus6-ms-bin: remove package
Remove f-prot-antivirus6-ms-bin package version 6.2.3.

Althoguth F-PROT Antivirus is still supported for licensed users,
its antivirus engine (i.e. program itself) did not updated since 2013 and
it is sold for Linux and Windows (no *BSD).

So it's time to remove it from pkgsrc.
2019-03-03 15:20:17 +00:00
adam
6e5528def4 py-asyncssh: updated to 1.16.0
1.16.0:
Added support for Ed448 host/client keys and certificates and rewrote Ed25519 support to use the PyCA implementation, reducing the dependency on libnacl and libsodium to only be needed to support the chacha20-poly1305 cipher.
Added support for PKCS-8 format Ed25519 and Ed448 private and public keys (in addition to the OpenSSH format previously supported).
Added support for multiple delimiters in SSHReader’s readuntil() function, causing it to return data as soon as any of the specified delimiters are matched.
Added the ability to register custom key handlers in the line editor which can modify the input line, extending the built-in editing functionality.
Added SSHSubprocessProtocol and SSHSubprocessTransport classes to provide compatibility with asyncio.SubprocessProtocol and asyncio.SubprocessTransport. Code which is designed to call BaseEventLoop.subprocess_shell() or BaseEventLoop.subprocess_exec() can be easily adapted to work against a remote process by calling SSHClientConnection.create_subprocess().
Added support for sending keepalive messages when the SSH connection is idle, with an option to automatically disconnect the connection if the remote system doesn’t respond to these keepalives.
Changed AsyncSSH to ignore errors when loading unsupported key types from the default file locations.
Changed the reuse_port option to only be available on Python releases which support it (3.4.4 and later).
Fixed an issue where MSG_IGNORE packets could sometimes be sent between MSG_NEWKEYS and MSG_EXT_INFO, which caused some SSH implementations to fail to properly parse the MSG_EXT_INFO.
Fixed a couple of errors in the handling of disconnects occurring prior to authentication completing.
Renamed “session_encoding” and “session_errors” arguments in asyncssh.create_server() to “encoding” and “errors”, to match the names used for these arguments in other AsyncSSH APIs. The old names are still supported for now, but they are marked as deprecated and will be removed in a future release.
2019-03-03 12:32:12 +00:00
adam
8b82236ca5 py-cryptography[_vectors]: updated to 2.6.1
2.6.1:
* Resolved an error in our build infrastructure that broke our Python3 wheels
  for macOS and Linux.

2.6:
* **BACKWARDS INCOMPATIBLE:** Removed
  cryptography.hazmat.primitives.asymmetric.utils.encode_rfc6979_signature
  and
  cryptography.hazmat.primitives.asymmetric.utils.decode_rfc6979_signature,
  which had been deprecated for nearly 4 years. Use
  :func:~cryptography.hazmat.primitives.asymmetric.utils.encode_dss_signature
  and
  :func:~cryptography.hazmat.primitives.asymmetric.utils.decode_dss_signature
  instead.
* **BACKWARDS INCOMPATIBLE**: Removed cryptography.x509.Certificate.serial,
  which had been deprecated for nearly 3 years. Use
  :attr:~cryptography.x509.Certificate.serial_number instead.
* Updated Windows, macOS, and manylinux1 wheels to be compiled with
  OpenSSL 1.1.1b.
* Added support for :doc:/hazmat/primitives/asymmetric/ed448 when using
  OpenSSL 1.1.1b or newer.
* Added support for :doc:/hazmat/primitives/asymmetric/ed25519 when using
  OpenSSL 1.1.1b or newer.
* :func:~cryptography.hazmat.primitives.serialization.load_ssh_public_key can
  now load ed25519 public keys.
* Add support for easily mapping an object identifier to its elliptic curve
  class via
  :func:~cryptography.hazmat.primitives.asymmetric.ec.get_curve_for_oid.
* Add support for OpenSSL when compiled with the no-engine
  (OPENSSL_NO_ENGINE) flag.
2019-02-28 09:06:08 +00:00
adam
73cd82899c py-keyring: updated to 18.0.0
18.0.0
* On macOS, the backend now raises a KeyringLocked
  when access to the keyring is denied (on get or set) instead
  of PasswordSetError or KeyringError. Any API users
  may need to account for this change, probably by catching
  the parent KeyringError.
  Additionally, the error message from the underying error is
  now included in any errors that occur.

17.1.1
* Update packaging technique to avoid 0.0.0 releases.

17.1.0
* When calling keyring.core.init_backend, if any
  limit function is supplied, it is saved and later honored by
  the ChainerBackend as well.

17.0.0
* Remove application attribute from stored passwords
  using SecretService, addressing regression introduced in
  10.5.0. Impacted Linux keyrings will once again
  prompt for a password for "Python program".

16.1.1
* Fix error on import due to circular imports
  on Python 3.4.

16.1.0
* Refactor ChainerBackend, introduced in 16.0 to function
  as any other backend, activating when relevant.

16.0.2
* In Windows backend, trap all exceptions when
  attempting to import pywin32.

16.0.1
* Once again allow all positive, non-zero priority
  keyrings to participate.

16.0.0
* Fix race condition in delete_password on Windows.
* All suitable backends (priority 1 and greater) are
  allowed to participate.

15.2.0
* Added new API for get_credentials, for backends
  that can resolve both a username and password for a service.

15.1.0
* Add the Null keyring, disabled by default.
* Added --disable option to command-line
  interface.
* Now honor a PYTHON_KEYRING_BACKEND
  environment variable to select a backend. Environments
  may set to keyring.backends.null.Keyring to disable
  keyring.
2019-02-27 13:27:22 +00:00
wiz
7474c8534e tor-browser: update to 8.5.
This is based on a git checkout from a couple days ago; not completely
sure about the version number.

The Makefile now contains a short how-to for updating this package.

Many thanks for the www/firefox60 patches!

Use at your own risk!
Survives basic browsing and check.torproject.org claims it connects via tor.

Changes: too many to document.
2019-02-25 15:32:23 +00:00
triaxx
a9c25afaa0 py-certbot-dns-luadns: add version 0.31.0
LuaDNS Authenticator plugin for Certbot
2019-02-23 20:33:16 +00:00
triaxx
e4f2ae30e8 py-certbot-dns-nsone: add version 0.31.0
NS1 DNS Authenticator plugin for Certbot
2019-02-23 20:27:47 +00:00
wiz
81a53cbcab tor-browser: comment out non-existing URL (MASTER_SITES) 2019-02-23 18:58:48 +00:00
tm
49106b7962 py-nacl: Fix correct name of the package (remove py-prefix) 2019-02-19 17:49:24 +00:00
tm
1d3eae6e67 py-nacl: Provide PKGNAME fix to work with lintpkgsrc 2019-02-19 14:22:58 +00:00
tm
cdc57a0d2c py-nacl: remove unwanted example file 2019-02-19 12:43:51 +00:00
tm
5e53168409 py-nacl: update to 1.3.0
1.3.0 2018-09-26
- Added support for Python 3.7.
- Update libsodium to 1.0.16.
- Run and test all code examples in PyNaCl docs through sphinx's doctest builder.
- Add low-level bindings for chacha20-poly1305 AEAD constructions.
- Add low-level bindings for the chacha20-poly1305 secretstream constructions.
- Add low-level bindings for ed25519ph pre-hashed signing construction.
- Add low-level bindings for constant-time increment and addition on fixed-precision big integers represented as little-endian byte sequences.
- Add low-level bindings for the ISO/IEC 7816-4 compatible padding API.
- Add low-level bindings for libsodium's crypto_kx... key exchange construction.
- Set hypothesis deadline to None in tests/test_pwhash.py to avoid incorrect test failures on slower processor architectures. GitHub issue #370

1.2.1 - 2017-12-04
- Update hypothesis minimum allowed version.
- Infrastructure: add proper configuration for readthedocs builder runtime environment.

1.2.0 - 2017-11-01
- Update libsodium to 1.0.15.
- Infrastructure: add jenkins support for automatic build of manylinux1 binary wheels
- Added support for SealedBox construction.
- Added support for argon2i and argon2id password hashing constructs and restructured high-level password hashing implementation to expose the same interface for all hashers.
- Added support for 128 bit siphashx24 variant of siphash24.
- Added support for from_seed APIs for X25519 keypair generation.
- Dropped support for Python 3.3.
2019-02-19 12:14:22 +00:00
adam
d7bb352f3c py-cryptopp: updated to 0.7.1
release pycryptopp-0.7.1
disable optimized assembly implementations by default
tweaks to the benchmarking scripts
2019-02-14 12:56:38 +00:00
tron
51c6b5744f caff: Fix build under macOS and possibly other platforms
Add GNU sed to the list of required build tools because the makefile
uses the non standard option "-i".
2019-02-14 12:16:03 +00:00
jnemeth
5d6868cc21 add and enable pinentry-fltk 2019-02-14 05:38:57 +00:00
wiz
7470c3216b libssh: update to 0.86.
version 0.8.6 (released 2018-12-24)
  * Fixed compilation issues with different OpenSSL versions
  * Fixed StrictHostKeyChecking in new knownhosts API
  * Fixed ssh_send_keepalive() with packet filter
  * Fixed possible crash with knownhosts options
  * Fixed issus with rekeying
  * Fixed strong ECDSA keys
  * Fixed some issues with rsa-sha2 extentions
  * Fixed access violation in ssh_init() (static linking)
  * Fixed ssh_channel_close() handling
2019-02-13 20:07:29 +00:00
wiz
ded18a5576 caff: update to 2.8.
signing-party (2.8-1) unstable; urgency=low

  [ Guilhem Moulin ]
  * caff:
    + Add the "only-sign-text-ids" to the list of gpg(1) options imported from
      ~/.gnupg/gpg.conf.
    + Ensure the terminal is "sane enough" when asking questions ('echo',
      'echok', 'icanon', 'icrnl' settings are all set), and restore original
      settings when exit()'ing the program. (Closes: #872529)
  * caff, gpglist, gpgsigs: in `gpg --with-colons` output, allow signature
    class to be followed with an optional revocation reason. gpg(1) does that
    since 2.2.9. (Closes: #905097.)
  * caff, gpg-key2latex, gpg-key2ps, gpglist, gpgsigs, keylookup: Remove
    references to https://pgp-tools.alioth.debian.org/ .
  * caff, gpg-key2latex, gpg-key2ps, gpg-mailkeys, gpglist, gpgparticipants,
    gpgsigs, keylookup: Remove SVN keywords ($Id$, $Rev$, etc.)

 -- Guilhem Moulin <guilhem@debian.org>  Mon, 28 Jan 2019 03:05:33 +0100
2019-02-13 19:57:11 +00:00
wiz
960426e20f libsecret: update to 0.18.7.
0.18.7
 * Migrate from intltool to gettext [!2]
 * Fix uninitialized memory returned by secret_item_get_schema_name() [#15]
 * secret-session: Avoid double-free in service_encode_plain_secret()
 * Port tap script to Python 3 [!4]
 * Build and test fixes [#734630]
 * Updated translations
2019-02-13 19:52:08 +00:00
wiz
7c6718841e pinentry/Makefile.common: mention pinentry-fltk 2019-02-13 17:42:07 +00:00
wiz
7a2feff35b pinentry*: improve DESCR 2019-02-13 17:41:41 +00:00
wiz
a320937983 pinentry-fltk: on second thought, use local distinfo
Since this has a patch only needed for the fltk version.
2019-02-13 17:40:53 +00:00
wiz
1eb4cd7a85 security/pinentry-fltk: import pinentry-fltk-1.1.0
Packaged for wip by Michael Bäuerle.

This is a collection of simple PIN or passphrase entry dialogs which
utilize the Assuan protocol as described by the aegypten project.
It provides programs for several graphical toolkits, such as FLTK,
GTK+ and QT, as well as for the console, using curses.

This package contains the FLTK frontend.
2019-02-13 17:39:36 +00:00
adam
73e37e4368 gnupg2: updated to 2.2.13
Noteworthy changes in version 2.2.13:
* gpg: Implement key lookup via keygrip (using the & prefix).
* gpg: Allow generating Ed25519 key from existing key.
* gpg: Emit an ERROR status line if no key was found with -k.
* gpg: Stop early when trying to create a primary Elgamal key.
* gpgsm: Print the card's key algorithms along with their keygrips
  in interactive key generation.
* agent: Clear bogus pinentry cache in the error case.
* scd: Support "acknowledge button" feature.
* scd: Fix for USB INTERRUPT transfer.
* wks: Do no use compression for the the encrypted challenge and
  response
2019-02-13 16:06:44 +00:00
adam
1e7f50f61a libassuan2: updated to 2.5.3
Noteworthy changes in version 2.5.3:
* Add a timeout for writing to a SOCKS5 proxy.  This helps if another
  service is running on the standard tor socket (e.g. Windows 10).
* Add workaround for a problem with LD_LIBRARY_PATH on newer systems.
2019-02-13 16:05:48 +00:00
adam
8144d75596 py-certbot-apache: added version 0.31.0
Apache plugin for Certbot
2019-02-12 12:57:19 +00:00
adam
79e7b63a9f py-acme,py-certbot*: updated to 0.31.0
0.31.0:

Added
Avoid reprocessing challenges that are already validated when a certificate is issued.
Support for initiating (but not solving end-to-end) TLS-ALPN-01 challenges with the acme module.

Changed
Certbot's official Docker images are now based on Alpine Linux 3.9 rather than 3.7. The new version comes with OpenSSL 1.1.1.
Lexicon-based DNS plugins are now fully compatible with Lexicon 3.x (support on 2.x branch is maintained).
Apache plugin now attempts to configure all VirtualHosts matching requested domain name instead of only a single one when answering the HTTP-01 challenge.

Fixed
Fixed accessing josepy contents through acme.jose when the full acme.jose path is used.
Clarify behavior for deleting certs as part of revocation.
Despite us having broken lockstep, we are continuing to release new versions of all Certbot components during releases for the time being, however, the only package with changes other than its version number was:

acme
certbot
certbot-apache
certbot-dns-cloudxns
certbot-dns-dnsimple
certbot-dns-dnsmadeeasy
certbot-dns-gehirn
certbot-dns-linode
certbot-dns-luadns
certbot-dns-nsone
certbot-dns-ovh
certbot-dns-sakuracloud
More details about these changes can be found on our GitHub repo.
2019-02-12 12:56:31 +00:00
tnn
83b7b83718 heimdal: fix Linux PLIST.hcrypto issue in a more generic way
Tested under Debian unstable. PR pkg/53806
2019-02-06 11:36:38 +00:00
adam
2303583ab6 easy-rsa: updated to 3.0.6
3.0.6:
Certifcates that are revoked now move to a revoked subdirectory
EasyRSA no longer clobbers non-EASYRSA environment variables
More sane string checking, allowingn for commas in CN
Support for reasonCode in CRL
Better handling for capturing passphrases
Improved LibreSSL/MacOS support
Adds support to renew certificates up to 30 days before expiration
This changes previous behavior allowing for certificate creation using
duplicate CNs.
2019-02-06 08:07:59 +00:00
wiz
ffb5aa8ddc *: mirror.switch.ch does not provide ftp/http service any longer 2019-02-04 09:36:41 +00:00
wiz
3f4bd054b1 *: ftp.freenet.de does not provide ftp/http service any longer 2019-02-04 09:34:48 +00:00
markd
d0ba927cb8 gnupg2: teach about PKG_SYSCONFDIR and VARBASE 2019-02-02 03:38:30 +00:00
adam
74cc2b8ef9 libgpg-error: updated to 1.35
Noteworthy changes in version 1.35:
* Distribute the correct gpgrt-config.
2019-01-29 08:08:04 +00:00
adam
7fbbdef9b9 py-asn1-modules: updated to 0.2.4
Revision 0.2.4:
- Added modules for RFC8226 implementing JWT Claim Constraints
  and TN Authorization List for X.509 certificate extensions
- Fixed bug in rfc5280.AlgorithmIdentifier ANY type definition
2019-01-28 09:14:22 +00:00
wen
58458cb3d3 Update to 1.11
Upstream changes:
1.11 Dec 11, 2018

        Explain why compilation aborted in Net::DNS::SEC::DSA et al.

        Fix Makefile.PL to suppress parallel test execution.
2019-01-27 13:58:25 +00:00
adam
843cfe403b py-trustme: updated to 0.5.0
Trustme 0.5.0:

Features
Added CA.create_child_ca() to allow for certificate chains
Added CA.private_key_pem to export CA private keys; this allows signing other certs with the same CA outside of trustme.
CAs now include the KeyUsage and ExtendedKeyUsage extensions configured for SSL certificates.
CA.issue_cert now accepts email addresses as a valid form of identity.
It’s now possible to set the “common name” of generated certs; see CA.issue_cert for details
CA.issue_server_cert has been renamed to CA.issue_cert, since it supports both server and client certs. To preserve backwards compatibility, the old name is retained as an undocumented alias.

Bugfixes
Make sure cert expiration dates don’t exceed 2038-01-01, to avoid issues on some 32-bit platforms that suffer from the Y2038 problem.
2019-01-25 13:33:15 +00:00
adam
17f9c00289 py-oauthlib: updated to 3.0.1
3.0.1:
Fixed Revocation & Introspection Endpoints when using Client Authentication with HTTP Basic Auth.
2019-01-25 12:28:32 +00:00
perseant
58fcaf2001 Make packages build again. Partially addresses PR pkg/52851. 2019-01-24 16:46:21 +00:00
bsiegert
066e1db646 Revbump Go packages after lang/go111 update. 2019-01-24 10:00:33 +00:00
adam
74adee2b44 py-cryptography[_vectors]: updated to 2.5
2.5:
* **BACKWARDS INCOMPATIBLE:** :term:U-label strings were deprecated in
  version 2.1, but this version removes the default idna dependency as
  well. If you still need this deprecated path please install cryptography
  with the idna extra: pip install cryptography[idna].
* **BACKWARDS INCOMPATIBLE:** The minimum supported PyPy version is now 5.4.
* Numerous classes and functions have been updated to allow :term:bytes-like
  types for keying material and passwords, including symmetric algorithms, AEAD
  ciphers, KDFs, loading asymmetric keys, and one time password classes.
* Updated Windows, macOS, and manylinux1 wheels to be compiled with
  OpenSSL 1.1.1a.
* Added support for :class:~cryptography.hazmat.primitives.hashes.SHA512_224
  and :class:~cryptography.hazmat.primitives.hashes.SHA512_256 when using
  OpenSSL 1.1.1.
* Added support for :class:~cryptography.hazmat.primitives.hashes.SHA3_224,
  :class:~cryptography.hazmat.primitives.hashes.SHA3_256,
  :class:~cryptography.hazmat.primitives.hashes.SHA3_384, and
  :class:~cryptography.hazmat.primitives.hashes.SHA3_512 when using OpenSSL
  1.1.1.
* Added support for :doc:/hazmat/primitives/asymmetric/x448 when using
  OpenSSL 1.1.1.
* Added support for :class:~cryptography.hazmat.primitives.hashes.SHAKE128
  and :class:~cryptography.hazmat.primitives.hashes.SHAKE256 when using
  OpenSSL 1.1.1.
* Added initial support for parsing PKCS12 files with
  :func:~cryptography.hazmat.primitives.serialization.pkcs12.load_key_and_certificates.
* Added support for :class:~cryptography.x509.IssuingDistributionPoint.
* Added rfc4514_string() method to
  :meth:x509.Name <cryptography.x509.Name.rfc4514_string>,
  :meth:x509.RelativeDistinguishedName
  <cryptography.x509.RelativeDistinguishedName.rfc4514_string>, and
  :meth:x509.NameAttribute <cryptography.x509.NameAttribute.rfc4514_string>
  to format the name or component an :rfc:4514 Distinguished Name string.
* Added
  :meth:~cryptography.hazmat.primitives.asymmetric.ec.EllipticCurvePublicKey.from_encoded_point,
  which immediately checks if the point is on the curve and supports compressed
  points. Deprecated the previous method
  :meth:~cryptography.hazmat.primitives.asymmetric.ec.EllipticCurvePublicNumbers.from_encoded_point.
* Added :attr:~cryptography.x509.ocsp.OCSPResponse.signature_hash_algorithm
  to OCSPResponse.
* Updated :doc:/hazmat/primitives/asymmetric/x25519 support to allow
  additional serialization methods. Calling
  :meth:~cryptography.hazmat.primitives.asymmetric.x25519.X25519PublicKey.public_bytes
  with no arguments has been deprecated.
* Added support for encoding compressed and uncompressed points via
  :meth:~cryptography.hazmat.primitives.asymmetric.ec.EllipticCurvePublicKey.public_bytes. Deprecated the previous method
  :meth:~cryptography.hazmat.primitives.asymmetric.ec.EllipticCurvePublicNumbers.encode_point.
2019-01-23 12:21:04 +00:00
adam
13f97fe101 py-asyncssh: updated to 1.15.1
Release 1.15.1:
Added callback-based host validation in SSHClient, allowing callers to decide programmatically whether to trust server host keys and certificates rather than having to provide a list of trusted values in advance.
Changed SSH client code to only load the default known hosts file if if exists. Previously an error was returned if a known_hosts value wasn’t specified and the default known_hosts file didn’t exist. For host validate to work in this case, verification callbacks must be implemented or other forms of validation such as X.509 trusted CAs or GSS-based key exchange must be used.
Fixed known hosts validation to completely disable certificate checks when known_hosts is set to None. Previously, key checking was disabled in this case but other checks for certificate expiration and hostname mismatch were still performed, causing connections to fail even when checking was supposed to be disabled.
Switched curve25519 key exchange to use the PyCA implementation, avoiding a dependency on libnacl/libsodium. For now, support for Ed25519 keys still requires these libraries, but once that support appears in PyCA, it may be possible to remove this dependency entirely.
Added get_fingerprint() method to return a fingerprint of an SSHKey.
2019-01-22 09:17:57 +00:00
adam
96bc8c839b py-OpenSSL: updated to 19.0.0
19.0.0:

Backward-incompatible changes:
- X509Store.add_cert no longer raises an error if you add a duplicate cert.

Changes:
- pyOpenSSL now works with OpenSSL 1.1.1.
- pyOpenSSL now handles NUL bytes in X509Name.get_components()
2019-01-22 09:12:09 +00:00
adam
42a4f7ec4b py-argon2_cffi: updated to 19.1.0
19.1.0:
- Added support for Argon2 v1.2 hashes in argon2.extract_parameters().
2019-01-21 13:01:16 +00:00
agc
1a04200480 Update security/bearssl from 0.5 to 0.6
Changes since previous version:

+ Added general-purpose implementations of EAX and CCM modes (including
shared precomputation support for EAX).
+ Added general-purpose RSA/OAEP implementation.
+ Added general-purpose HKDF implementation.
+ Added support for CCM and CCM_8 TLS cipher suites (RFC 6655 and RFC 7251).
+ Added RSA and EC key generation.
+ Added private key encoding support ("raw" and PKCS#8 formats, both
in DER and PEM, for RSA and EC key pairs).
+ Made Base64 encoding/decoding constant-time (with regards to the
encoded data bytes).
+ Added a generic API for random seed providers.
+ Added an extra DRBG based on AES/CTR + Hirose construction for reseeding.
+ Some cosmetic fixes to avoid warnings with picky compilers.
+ Makefile fix to achieve compatibility with OpenBSD.
+ Fixed a bug in bit length computation for big integers (this was
breaking RSA signatures with some specific implementations and key lengths).
+ Made SSL/TLS client stricter in cipher suite selection (to align with
server behaviour).
2019-01-21 06:59:58 +00:00
adam
df82ccf9bc py-cryptodome: updated to 3.7.3
3.7.3:
Resolved issues
False positive on PSS signatures when externally provided salt is too long.
Include type stub files for Crypto.IO and Crypto.Util.
2019-01-20 11:54:23 +00:00