<feed xmlns='http://www.w3.org/2005/Atom'>
<title>delta/python-packages/cryptography.git/src, branch 3.3</title>
<subtitle>github.com: pyca/cryptography.git
</subtitle>
<link rel='alternate' type='text/html' href='http://git.baserock.org/cgit/delta/python-packages/cryptography.git/'/>
<entry>
<title>Prepare for 3.3 release (#5603)</title>
<updated>2020-12-08T22:26:19+00:00</updated>
<author>
<name>Alex Gaynor</name>
<email>alex.gaynor@gmail.com</email>
</author>
<published>2020-12-08T22:26:19+00:00</published>
<link rel='alternate' type='text/html' href='http://git.baserock.org/cgit/delta/python-packages/cryptography.git/commit/?id=7e8fff73cf0c597fe2df34daf2027506f84b9d3b'/>
<id>7e8fff73cf0c597fe2df34daf2027506f84b9d3b</id>
<content type='text'>
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
</pre>
</div>
</content>
</entry>
<entry>
<title>Add support for RSA signature recovery (#5573)</title>
<updated>2020-12-08T04:58:04+00:00</updated>
<author>
<name>Zoltan Kelemen</name>
<email>39551158+misterzed88@users.noreply.github.com</email>
</author>
<published>2020-12-08T04:58:04+00:00</published>
<link rel='alternate' type='text/html' href='http://git.baserock.org/cgit/delta/python-packages/cryptography.git/commit/?id=6693d55cbe05c98c9e1fe3a8b08639f5491a572a'/>
<id>6693d55cbe05c98c9e1fe3a8b08639f5491a572a</id>
<content type='text'>
* Removed unused argument.

* Added support for RSA signature recovery.

* Syntatic corrections for passing pep8 tests.

* Corrected typo.

* Added test of invalid Prehashed parameter to RSA signature recover.

* Renamed recover to a more descriptive name.

* Extended RSA signature recovery with option to return full data (not
only the digest part).

* Added missing words to pass spell check.</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
* Removed unused argument.

* Added support for RSA signature recovery.

* Syntatic corrections for passing pep8 tests.

* Corrected typo.

* Added test of invalid Prehashed parameter to RSA signature recover.

* Renamed recover to a more descriptive name.

* Extended RSA signature recovery with option to return full data (not
only the digest part).

* Added missing words to pass spell check.</pre>
</div>
</content>
</entry>
<entry>
<title>Added tls bindings for new OpenSSL APIs (#5595)</title>
<updated>2020-12-01T15:10:56+00:00</updated>
<author>
<name>Alex Gaynor</name>
<email>alex.gaynor@gmail.com</email>
</author>
<published>2020-12-01T15:10:56+00:00</published>
<link rel='alternate' type='text/html' href='http://git.baserock.org/cgit/delta/python-packages/cryptography.git/commit/?id=a2096694853aed0828d0aaf38e364577a52b3780'/>
<id>a2096694853aed0828d0aaf38e364577a52b3780</id>
<content type='text'>
fixes #5379
closes #5483</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
fixes #5379
closes #5483</pre>
</div>
</content>
</entry>
<entry>
<title>fixes #4531 -- support encoding SCTs in certificates (#5594)</title>
<updated>2020-12-01T03:56:52+00:00</updated>
<author>
<name>Alex Gaynor</name>
<email>alex.gaynor@gmail.com</email>
</author>
<published>2020-12-01T03:56:52+00:00</published>
<link rel='alternate' type='text/html' href='http://git.baserock.org/cgit/delta/python-packages/cryptography.git/commit/?id=6d858c8bacc86da7dd1f9907f134767a0c8f91de'/>
<id>6d858c8bacc86da7dd1f9907f134767a0c8f91de</id>
<content type='text'>
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
</pre>
</div>
</content>
</entry>
<entry>
<title>Don't build our custom osrandom engine on libressl (#5593)</title>
<updated>2020-11-29T18:12:18+00:00</updated>
<author>
<name>Alex Gaynor</name>
<email>alex.gaynor@gmail.com</email>
</author>
<published>2020-11-29T18:12:18+00:00</published>
<link rel='alternate' type='text/html' href='http://git.baserock.org/cgit/delta/python-packages/cryptography.git/commit/?id=f133a3029a56d869084bc9839131bd57283027e0'/>
<id>f133a3029a56d869084bc9839131bd57283027e0</id>
<content type='text'>
* Don't build our custom osrandom engine on libressl

As far as I can tell it's never used on LibreSSL -- they're `RAND_bytes` function unconditionally calls `arc4random_buf`

* Update cryptography.py</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
* Don't build our custom osrandom engine on libressl

As far as I can tell it's never used on LibreSSL -- they're `RAND_bytes` function unconditionally calls `arc4random_buf`

* Update cryptography.py</pre>
</div>
</content>
</entry>
<entry>
<title>disallow p less than 512-bit on DH (#5592)</title>
<updated>2020-11-29T16:01:16+00:00</updated>
<author>
<name>Paul Kehrer</name>
<email>paul.l.kehrer@gmail.com</email>
</author>
<published>2020-11-29T16:01:16+00:00</published>
<link rel='alternate' type='text/html' href='http://git.baserock.org/cgit/delta/python-packages/cryptography.git/commit/?id=4645f02c25d7d336a6d922e428c72beb55fb04cb'/>
<id>4645f02c25d7d336a6d922e428c72beb55fb04cb</id>
<content type='text'>
* disallow p less than 512-bit on DH

OpenSSL 3.0.0 enforces this so we'll go ahead and enforce it everywhere
that's practical for us. (Note that we do not enforce on deserializing
PKCS1/PKCS8 keys in &lt; 3.0.0, but this PR adds a test so that in the
3.0.0 support branch we can test an error path)

* missing test

* black

* _MIN_MODULUS_SIZE is now a thing

* skip on fips</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
* disallow p less than 512-bit on DH

OpenSSL 3.0.0 enforces this so we'll go ahead and enforce it everywhere
that's practical for us. (Note that we do not enforce on deserializing
PKCS1/PKCS8 keys in &lt; 3.0.0, but this PR adds a test so that in the
3.0.0 support branch we can test an error path)

* missing test

* black

* _MIN_MODULUS_SIZE is now a thing

* skip on fips</pre>
</div>
</content>
</entry>
<entry>
<title>don't require errors to be on the stack when loading a key (#5590)</title>
<updated>2020-11-26T20:13:47+00:00</updated>
<author>
<name>Paul Kehrer</name>
<email>paul.l.kehrer@gmail.com</email>
</author>
<published>2020-11-26T20:13:47+00:00</published>
<link rel='alternate' type='text/html' href='http://git.baserock.org/cgit/delta/python-packages/cryptography.git/commit/?id=fd7ed6704087f1d71781e48e6c268341429b3abc'/>
<id>fd7ed6704087f1d71781e48e6c268341429b3abc</id>
<content type='text'>
In OpenSSL 3.0.0 no error is added in many cases for this path and
since we don't do anything with the error anyway we should just
consume and move on</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
In OpenSSL 3.0.0 no error is added in many cases for this path and
since we don't do anything with the error anyway we should just
consume and move on</pre>
</div>
</content>
</entry>
<entry>
<title>Reduce granularity of error msging when deserializing keys (#5588)</title>
<updated>2020-11-26T19:07:25+00:00</updated>
<author>
<name>Paul Kehrer</name>
<email>paul.l.kehrer@gmail.com</email>
</author>
<published>2020-11-26T19:07:25+00:00</published>
<link rel='alternate' type='text/html' href='http://git.baserock.org/cgit/delta/python-packages/cryptography.git/commit/?id=ac4c22168f196921bfe00348250ff138e64bcd37'/>
<id>ac4c22168f196921bfe00348250ff138e64bcd37</id>
<content type='text'>
* Reduce granularity of error msging when deserializing keys

In OpenSSL 3.0 it is no longer possible to determine whether the reason
a key failed to deserialize is because of an unsupported cipher. Since
we want to be more resilient to OpenSSL error code instability we'll
just remove these paths.

* black

* changelog and update docs</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
* Reduce granularity of error msging when deserializing keys

In OpenSSL 3.0 it is no longer possible to determine whether the reason
a key failed to deserialize is because of an unsupported cipher. Since
we want to be more resilient to OpenSSL error code instability we'll
just remove these paths.

* black

* changelog and update docs</pre>
</div>
</content>
</entry>
<entry>
<title>define OAEP properties for all openssl versions (#5589)</title>
<updated>2020-11-26T17:52:47+00:00</updated>
<author>
<name>Paul Kehrer</name>
<email>paul.l.kehrer@gmail.com</email>
</author>
<published>2020-11-26T17:52:47+00:00</published>
<link rel='alternate' type='text/html' href='http://git.baserock.org/cgit/delta/python-packages/cryptography.git/commit/?id=d890e2a60616af098d6ec1d4e4a53cc82a335731'/>
<id>d890e2a60616af098d6ec1d4e4a53cc82a335731</id>
<content type='text'>
In 3.0 these aren't macros so we can't test this way. All our supported
OpenSSLs have these bindings now and LibreSSL does not.</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
In 3.0 these aren't macros so we can't test this way. All our supported
OpenSSLs have these bindings now and LibreSSL does not.</pre>
</div>
</content>
</entry>
<entry>
<title>in OpenSSL 1.1.0+ error strings are automatically loaded (#5587)</title>
<updated>2020-11-26T17:10:44+00:00</updated>
<author>
<name>Paul Kehrer</name>
<email>paul.l.kehrer@gmail.com</email>
</author>
<published>2020-11-26T17:10:44+00:00</published>
<link rel='alternate' type='text/html' href='http://git.baserock.org/cgit/delta/python-packages/cryptography.git/commit/?id=417f684f6109357a97eee013de7d10fade25bdf7'/>
<id>417f684f6109357a97eee013de7d10fade25bdf7</id>
<content type='text'>
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
</pre>
</div>
</content>
</entry>
</feed>
