0.24.0 - `x509.Certificate().self_signed` will no longer return `"yes"` under any circumstances. This helps prevent confusion since the library does not verify the signature. Instead a library like oscrypto should be used to confirm if a certificate is self-signed. - Added various OIDs to `x509.KeyPurposeId()` - Added `x509.Certificate().private_key_usage_period_value` - Added structures for parsing common subject directory attributes for X.509 certificates, including `x509.SubjectDirectoryAttribute()` - Added `algos.AnyAlgorithmIdentifier()` for situations where an algorithm identifier may contain a digest, signed digest or encryption algorithm OID - Fixed a bug with `x509.Certificate().subject_directory_attributes_value` not returning the correct value - Fixed a bug where explicitly-tagged fields in a `core.Sequence()` would not function properly when the field had a default value - Fixed a bug with type checking in `pem.armor()`
6 lines
420 B
Text
6 lines
420 B
Text
$NetBSD: distinfo,v 1.4 2017/12/17 16:54:02 adam Exp $
|
|
|
|
SHA1 (asn1crypto-0.24.0.tar.gz) = c8f64e99bc01d90c412891cdad97675d8fe79cc7
|
|
RMD160 (asn1crypto-0.24.0.tar.gz) = 64af381c1ea47881370b0c8ee77b9220311327c1
|
|
SHA512 (asn1crypto-0.24.0.tar.gz) = 44d442a6ddfa971e31e24712fe084368356deb5e1c4c3b3e813e0910931860215bc1c4f9eb2c4bd4fdef607c324086c096e9357068646efd28c97f2d4f85c62f
|
|
Size (asn1crypto-0.24.0.tar.gz) = 104964 bytes
|