pkgsrc-Changes-HG archive

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]

[pkgsrc/trunk]: pkgsrc/security py-cryptography py-cryptography_vectors: upda...



details:   https://anonhg.NetBSD.org/pkgsrc/rev/4734ccac879b
branches:  trunk
changeset: 443488:4734ccac879b
user:      adam <adam%pkgsrc.org@localhost>
date:      Mon Dec 14 07:31:18 2020 +0000

description:
py-cryptography py-cryptography_vectors: updated to 3.3.1

3.3.1:
* Re-added a legacy symbol causing problems for older ``pyOpenSSL`` users.

3.3:
* **BACKWARDS INCOMPATIBLE:** Support for Python 3.5 has been removed due to
  low usage and maintenance burden.
* **BACKWARDS INCOMPATIBLE:** The
  :class:`~cryptography.hazmat.primitives.ciphers.modes.GCM` and
  :class:`~cryptography.hazmat.primitives.ciphers.aead.AESGCM` now require
  64-bit to 1024-bit (8 byte to 128 byte) initialization vectors. This change
  is to conform with an upcoming OpenSSL release that will no longer support
  sizes outside this window.
* **BACKWARDS INCOMPATIBLE:** When deserializing asymmetric keys we now
  raise ``ValueError`` rather than ``UnsupportedAlgorithm`` when an
  unsupported cipher is used. This change is to conform with an upcoming
  OpenSSL release that will no longer distinguish between error types.
* **BACKWARDS INCOMPATIBLE:** We no longer allow loading of finite field
  Diffie-Hellman parameters of less than 512 bits in length. This change is to
  conform with an upcoming OpenSSL release that no longer supports smaller
  sizes. These keys were already wildly insecure and should not have been used
  in any application outside of testing.
* Updated Windows, macOS, and ``manylinux`` wheels to be compiled with
  OpenSSL 1.1.1i.
* Python 2 support is deprecated in ``cryptography``. This is the last release
  that will support Python 2.
* Added the
  :meth:`~cryptography.hazmat.primitives.asymmetric.rsa.RSAPublicKey.recover_data_from_signature`
  function to
  :class:`~cryptography.hazmat.primitives.asymmetric.rsa.RSAPublicKey`
  for recovering the signed data from an RSA signature.

diffstat:

 security/py-cryptography/Makefile         |   4 ++--
 security/py-cryptography/distinfo         |  10 +++++-----
 security/py-cryptography_vectors/Makefile |   4 ++--
 security/py-cryptography_vectors/PLIST    |   3 ++-
 security/py-cryptography_vectors/distinfo |  10 +++++-----
 5 files changed, 16 insertions(+), 15 deletions(-)

diffs (71 lines):

diff -r a2ac20673866 -r 4734ccac879b security/py-cryptography/Makefile
--- a/security/py-cryptography/Makefile Mon Dec 14 06:40:51 2020 +0000
+++ b/security/py-cryptography/Makefile Mon Dec 14 07:31:18 2020 +0000
@@ -1,6 +1,6 @@
-# $NetBSD: Makefile,v 1.81 2020/11/24 08:56:55 adam Exp $
+# $NetBSD: Makefile,v 1.82 2020/12/14 07:31:18 adam Exp $
 
-DISTNAME=      cryptography-3.2.1
+DISTNAME=      cryptography-3.3.1
 PKGNAME=       ${PYPKGPREFIX}-${DISTNAME}
 CATEGORIES=    security python
 MASTER_SITES=  ${MASTER_SITE_PYPI:=c/cryptography/}
diff -r a2ac20673866 -r 4734ccac879b security/py-cryptography/distinfo
--- a/security/py-cryptography/distinfo Mon Dec 14 06:40:51 2020 +0000
+++ b/security/py-cryptography/distinfo Mon Dec 14 07:31:18 2020 +0000
@@ -1,6 +1,6 @@
-$NetBSD: distinfo,v 1.64 2020/11/24 08:56:55 adam Exp $
+$NetBSD: distinfo,v 1.65 2020/12/14 07:31:18 adam Exp $
 
-SHA1 (cryptography-3.2.1.tar.gz) = 20708a4955dcf7e2bb53d05418273d2bc0f80ab4
-RMD160 (cryptography-3.2.1.tar.gz) = 8b1b4f3f45917f00035a4bc02a9ad0429a720a5f
-SHA512 (cryptography-3.2.1.tar.gz) = e3f1806693c24aadc3ef0df374ce1845760e87ad7c243226b75e80820b50bdc0760e4bb5f6ce26d62a6d23736b3109f72cd30b52ae2a36b26ec5656ec96c6175
-Size (cryptography-3.2.1.tar.gz) = 540994 bytes
+SHA1 (cryptography-3.3.1.tar.gz) = f63b7bbf6ae3b6f4c178d1e8c1f89aac9507ba38
+RMD160 (cryptography-3.3.1.tar.gz) = 2c2f9ad13d298bf5cbdf1375f9d7737da9714639
+SHA512 (cryptography-3.3.1.tar.gz) = 62192fe0fd3bb8844ccc0056ab72a42b038db2a4ecb0928543c520b85e1de93066dab0d604acf23d37395d68172b9618f81c6022a59ec49725bc1862096d15d1
+Size (cryptography-3.3.1.tar.gz) = 539756 bytes
diff -r a2ac20673866 -r 4734ccac879b security/py-cryptography_vectors/Makefile
--- a/security/py-cryptography_vectors/Makefile Mon Dec 14 06:40:51 2020 +0000
+++ b/security/py-cryptography_vectors/Makefile Mon Dec 14 07:31:18 2020 +0000
@@ -1,6 +1,6 @@
-# $NetBSD: Makefile,v 1.26 2020/11/24 08:56:55 adam Exp $
+# $NetBSD: Makefile,v 1.27 2020/12/14 07:31:18 adam Exp $
 
-DISTNAME=      cryptography_vectors-3.2.1
+DISTNAME=      cryptography_vectors-3.3.1
 PKGNAME=       ${PYPKGPREFIX}-${DISTNAME}
 CATEGORIES=    security python
 MASTER_SITES=  ${MASTER_SITE_PYPI:=c/cryptography_vectors/}
diff -r a2ac20673866 -r 4734ccac879b security/py-cryptography_vectors/PLIST
--- a/security/py-cryptography_vectors/PLIST    Mon Dec 14 06:40:51 2020 +0000
+++ b/security/py-cryptography_vectors/PLIST    Mon Dec 14 07:31:18 2020 +0000
@@ -1,4 +1,4 @@
-@comment $NetBSD: PLIST,v 1.15 2020/11/24 08:56:55 adam Exp $
+@comment $NetBSD: PLIST,v 1.16 2020/12/14 07:31:18 adam Exp $
 ${PYSITELIB}/${EGG_INFODIR}/PKG-INFO
 ${PYSITELIB}/${EGG_INFODIR}/SOURCES.txt
 ${PYSITELIB}/${EGG_INFODIR}/dependency_links.txt
@@ -49,6 +49,7 @@
 ${PYSITELIB}/cryptography_vectors/asymmetric/DH/KASValidityTest_FFCStatic_NOKC_ZZOnly_resp.fax
 ${PYSITELIB}/cryptography_vectors/asymmetric/DH/RFC5114.txt
 ${PYSITELIB}/cryptography_vectors/asymmetric/DH/bad_exchange.txt
+${PYSITELIB}/cryptography_vectors/asymmetric/DH/dh_key_256.pem
 ${PYSITELIB}/cryptography_vectors/asymmetric/DH/dhkey.der
 ${PYSITELIB}/cryptography_vectors/asymmetric/DH/dhkey.pem
 ${PYSITELIB}/cryptography_vectors/asymmetric/DH/dhkey.txt
diff -r a2ac20673866 -r 4734ccac879b security/py-cryptography_vectors/distinfo
--- a/security/py-cryptography_vectors/distinfo Mon Dec 14 06:40:51 2020 +0000
+++ b/security/py-cryptography_vectors/distinfo Mon Dec 14 07:31:18 2020 +0000
@@ -1,6 +1,6 @@
-$NetBSD: distinfo,v 1.26 2020/11/24 08:56:55 adam Exp $
+$NetBSD: distinfo,v 1.27 2020/12/14 07:31:18 adam Exp $
 
-SHA1 (cryptography_vectors-3.2.1.tar.gz) = 9af06241b094022e67fe94c4581d6fc17afdb7ab
-RMD160 (cryptography_vectors-3.2.1.tar.gz) = fbcc904b03018caa146c8654c887ef4102000446
-SHA512 (cryptography_vectors-3.2.1.tar.gz) = 44ff756a6ece9700f7657f8ba92417e95bf273cf500f1dab2141de5b2af6e61840d65c37b766abd752c76025ead1550bfc7b7340ce5774c75fd0bb8ac768cdd8
-Size (cryptography_vectors-3.2.1.tar.gz) = 35168164 bytes
+SHA1 (cryptography_vectors-3.3.1.tar.gz) = ad07ab39aba22759033f6df467db1949673bae62
+RMD160 (cryptography_vectors-3.3.1.tar.gz) = 93b4f69fe609d8ab702f89cf42da6d8c501c980c
+SHA512 (cryptography_vectors-3.3.1.tar.gz) = a102535bd3cf72118106ca7268d5a9921738d41f81247940c550961d61cb0d1869095b7891c39e8dc15816f7d38230622846747b4b7a3f226f09306cf86220bd
+Size (cryptography_vectors-3.3.1.tar.gz) = 35168171 bytes



Home | Main Index | Thread Index | Old Index