head	1.145;
access;
symbols
	pkgsrc-2026Q1:1.140.0.2
	pkgsrc-2026Q1-base:1.140
	pkgsrc-2025Q4:1.135.0.2
	pkgsrc-2025Q4-base:1.135
	pkgsrc-2025Q3:1.132.0.2
	pkgsrc-2025Q3-base:1.132
	pkgsrc-2025Q2:1.129.0.2
	pkgsrc-2025Q2-base:1.129
	pkgsrc-2025Q1:1.125.0.2
	pkgsrc-2025Q1-base:1.125
	pkgsrc-2024Q4:1.123.0.2
	pkgsrc-2024Q4-base:1.123
	pkgsrc-2024Q3:1.119.0.2
	pkgsrc-2024Q3-base:1.119
	pkgsrc-2024Q2:1.116.0.2
	pkgsrc-2024Q2-base:1.116
	pkgsrc-2024Q1:1.113.0.2
	pkgsrc-2024Q1-base:1.113
	pkgsrc-2023Q4:1.107.0.2
	pkgsrc-2023Q4-base:1.107
	pkgsrc-2023Q3:1.103.0.2
	pkgsrc-2023Q3-base:1.103
	pkgsrc-2023Q2:1.100.0.2
	pkgsrc-2023Q2-base:1.100
	pkgsrc-2023Q1:1.95.0.2
	pkgsrc-2023Q1-base:1.95
	pkgsrc-2022Q4:1.92.0.2
	pkgsrc-2022Q4-base:1.92
	pkgsrc-2022Q3:1.90.0.2
	pkgsrc-2022Q3-base:1.90
	pkgsrc-2022Q2:1.85.0.2
	pkgsrc-2022Q2-base:1.85
	pkgsrc-2022Q1:1.84.0.2
	pkgsrc-2022Q1-base:1.84
	pkgsrc-2021Q4:1.83.0.8
	pkgsrc-2021Q4-base:1.83
	pkgsrc-2021Q3:1.83.0.6
	pkgsrc-2021Q3-base:1.83
	pkgsrc-2021Q2:1.83.0.4
	pkgsrc-2021Q2-base:1.83
	pkgsrc-2021Q1:1.83.0.2
	pkgsrc-2021Q1-base:1.83
	pkgsrc-2020Q4:1.82.0.2
	pkgsrc-2020Q4-base:1.82
	pkgsrc-2020Q3:1.79.0.4
	pkgsrc-2020Q3-base:1.79
	pkgsrc-2020Q2:1.79.0.2
	pkgsrc-2020Q2-base:1.79
	pkgsrc-2020Q1:1.75.0.2
	pkgsrc-2020Q1-base:1.75
	pkgsrc-2019Q4:1.74.0.4
	pkgsrc-2019Q4-base:1.74
	pkgsrc-2019Q3:1.73.0.4
	pkgsrc-2019Q3-base:1.73
	pkgsrc-2019Q2:1.73.0.2
	pkgsrc-2019Q2-base:1.73
	pkgsrc-2019Q1:1.72.0.2
	pkgsrc-2019Q1-base:1.72
	pkgsrc-2018Q4:1.70.0.2
	pkgsrc-2018Q4-base:1.70
	pkgsrc-2018Q3:1.68.0.2
	pkgsrc-2018Q3-base:1.68
	pkgsrc-2018Q2:1.66.0.2
	pkgsrc-2018Q2-base:1.66
	pkgsrc-2018Q1:1.65.0.2
	pkgsrc-2018Q1-base:1.65
	pkgsrc-2017Q4:1.63.0.2
	pkgsrc-2017Q4-base:1.63
	pkgsrc-2017Q3:1.59.0.4
	pkgsrc-2017Q3-base:1.59
	pkgsrc-2017Q2:1.56.0.2
	pkgsrc-2017Q2-base:1.56
	pkgsrc-2017Q1:1.53.0.2
	pkgsrc-2017Q1-base:1.53
	pkgsrc-2016Q4:1.49.0.2
	pkgsrc-2016Q4-base:1.49
	pkgsrc-2016Q3:1.43.0.2
	pkgsrc-2016Q3-base:1.43
	pkgsrc-2016Q2:1.41.0.2
	pkgsrc-2016Q2-base:1.41
	pkgsrc-2016Q1:1.38.0.2
	pkgsrc-2016Q1-base:1.38
	pkgsrc-2015Q4:1.34.0.2
	pkgsrc-2015Q4-base:1.34
	pkgsrc-2015Q3:1.30.0.2
	pkgsrc-2015Q3-base:1.30
	pkgsrc-2015Q2:1.25.0.2
	pkgsrc-2015Q2-base:1.25
	pkgsrc-2015Q1:1.19.0.2
	pkgsrc-2015Q1-base:1.19
	pkgsrc-2014Q4:1.12.0.2
	pkgsrc-2014Q4-base:1.12
	pkgsrc-2014Q3:1.10.0.2
	pkgsrc-2014Q3-base:1.10
	pkgsrc-2014Q2:1.7.0.2
	pkgsrc-2014Q2-base:1.7
	pkgsrc-2014Q1:1.5.0.2
	pkgsrc-2014Q1-base:1.5;
locks; strict;
comment	@# @;


1.145
date	2026.05.12.22.02.05;	author wiz;	state Exp;
branches;
next	1.144;
commitid	LaHDGKssdYHCDzFG;

1.144
date	2026.05.08.10.03.20;	author adam;	state Exp;
branches;
next	1.143;
commitid	snUqjKg2v7wZMZEG;

1.143
date	2026.04.26.09.01.42;	author adam;	state Exp;
branches;
next	1.142;
commitid	mKGmKWYtC5qJPrDG;

1.142
date	2026.04.08.20.35.35;	author wiz;	state Exp;
branches;
next	1.141;
commitid	tA8UXceWGf5LfcBG;

1.141
date	2026.03.27.10.06.27;	author adam;	state Exp;
branches;
next	1.140;
commitid	Aiixk2sMheRL9BzG;

1.140
date	2026.02.17.06.32.37;	author adam;	state Exp;
branches;
next	1.139;
commitid	tlS8X8OuPUIfcHuG;

1.139
date	2026.02.16.21.47.54;	author wiz;	state Exp;
branches;
next	1.138;
commitid	deVREbYzSe19iEuG;

1.138
date	2026.02.16.19.08.07;	author wiz;	state Exp;
branches;
next	1.137;
commitid	skknRjeDgUHjpDuG;

1.137
date	2026.02.10.22.45.05;	author wiz;	state Exp;
branches;
next	1.136;
commitid	XFVca8pjslcKNStG;

1.136
date	2026.01.28.08.39.31;	author adam;	state Exp;
branches;
next	1.135;
commitid	ywdAkFpdOOFAx8sG;

1.135
date	2025.10.16.09.21.03;	author adam;	state Exp;
branches;
next	1.134;
commitid	WrJytVGRTJm57MeG;

1.134
date	2025.10.02.13.14.50;	author adam;	state Exp;
branches;
next	1.133;
commitid	v0Qvf5LZBdEbRZcG;

1.133
date	2025.09.22.17.40.08;	author adam;	state Exp;
branches;
next	1.132;
commitid	1tmOew5C5a97EJbG;

1.132
date	2025.09.02.09.16.44;	author adam;	state Exp;
branches;
next	1.131;
commitid	a4Dt0TKuSifhv79G;

1.131
date	2025.08.06.07.41.41;	author adam;	state Exp;
branches;
next	1.130;
commitid	b4DZAngE2PIsQD5G;

1.130
date	2025.07.06.08.41.40;	author wiz;	state Exp;
branches;
next	1.129;
commitid	qR1o8Dy6rT1OaF1G;

1.129
date	2025.06.10.08.02.55;	author adam;	state Exp;
branches;
next	1.128;
commitid	Cg8k8eJubFUmNjYF;

1.128
date	2025.05.26.05.08.41;	author adam;	state Exp;
branches;
next	1.127;
commitid	pJ1Ri6LmFqotjnWF;

1.127
date	2025.05.18.08.34.00;	author adam;	state Exp;
branches;
next	1.126;
commitid	A1Sr38vzw1aMHmVF;

1.126
date	2025.05.04.12.56.22;	author adam;	state Exp;
branches;
next	1.125;
commitid	FeaarBFnzVQKBATF;

1.125
date	2025.03.02.20.17.43;	author wiz;	state Exp;
branches;
next	1.124;
commitid	s8gpEgSo0xVL4xLF;

1.124
date	2025.02.12.06.13.07;	author adam;	state Exp;
branches;
next	1.123;
commitid	VlpBNUecmeZPY8JF;

1.123
date	2024.11.28.10.31.24;	author adam;	state Exp;
branches;
next	1.122;
commitid	y5mNvoV4DrsTQozF;

1.122
date	2024.11.13.13.32.26;	author jperkin;	state Exp;
branches;
next	1.121;
commitid	loY9SKD45VXTkuxF;

1.121
date	2024.11.11.07.28.54;	author wiz;	state Exp;
branches;
next	1.120;
commitid	1fBDq3LwS98NncxF;

1.120
date	2024.10.19.05.47.43;	author adam;	state Exp;
branches;
next	1.119;
commitid	LNC15bG74wvizeuF;

1.119
date	2024.09.04.05.03.35;	author adam;	state Exp;
branches;
next	1.118;
commitid	8bTEUYp95RlQLroF;

1.118
date	2024.08.22.13.30.17;	author wiz;	state Exp;
branches;
next	1.117;
commitid	qkTGwjySqXMxZOmF;

1.117
date	2024.07.21.09.12.25;	author wiz;	state Exp;
branches;
next	1.116;
commitid	whlQWXyuyUKVAGiF;

1.116
date	2024.06.05.07.26.46;	author adam;	state Exp;
branches;
next	1.115;
commitid	XMtIAJxM6ftmuLcF;

1.115
date	2024.05.07.03.45.28;	author adam;	state Exp;
branches;
next	1.114;
commitid	z2IJLFUubNGcc19F;

1.114
date	2024.05.05.10.06.57;	author wiz;	state Exp;
branches;
next	1.113;
commitid	5C3gISrfGEZ6nN8F;

1.113
date	2024.02.25.15.54.57;	author wiz;	state Exp;
branches;
next	1.112;
commitid	nxte2MuaJiwXxPZE;

1.112
date	2024.02.21.06.42.23;	author adam;	state Exp;
branches;
next	1.111;
commitid	6xe3EYM9zgLkCgZE;

1.111
date	2024.02.16.19.10.49;	author adam;	state Exp;
branches;
next	1.110;
commitid	HoM5lzsouRn3VGYE;

1.110
date	2024.01.30.19.42.46;	author adam;	state Exp;
branches;
next	1.109;
commitid	bS1Arb5pRcGTDvWE;

1.109
date	2024.01.25.05.56.58;	author adam;	state Exp;
branches;
next	1.108;
commitid	237ugL4IfzTxeNVE;

1.108
date	2024.01.23.06.33.48;	author adam;	state Exp;
branches;
next	1.107;
commitid	cID10IHgAdo9vxVE;

1.107
date	2023.12.13.17.39.07;	author schmonz;	state Exp;
branches;
next	1.106;
commitid	ok4r2yyfjEzQukQE;

1.106
date	2023.11.28.17.37.24;	author adam;	state Exp;
branches;
next	1.105;
commitid	sfsQ7ch7zAXpYoOE;

1.105
date	2023.10.25.08.38.07;	author adam;	state Exp;
branches;
next	1.104;
commitid	T7zJiKZTzB2d5ZJE;

1.104
date	2023.10.24.22.10.57;	author wiz;	state Exp;
branches;
next	1.103;
commitid	MTsrqKm6aGrQAVJE;

1.103
date	2023.09.20.07.35.08;	author adam;	state Exp;
branches;
next	1.102;
commitid	mfoJkPwC1mqnRtFE;

1.102
date	2023.08.02.07.38.49;	author adam;	state Exp;
branches;
next	1.101;
commitid	KOys7ihI1gYhsbzE;

1.101
date	2023.07.11.07.49.22;	author adam;	state Exp;
branches;
next	1.100;
commitid	jDwW4q9eIwtJdmwE;

1.100
date	2023.06.06.08.13.32;	author wiz;	state Exp;
branches;
next	1.99;
commitid	dBHJ6sFgpjOQtRrE;

1.99
date	2023.05.31.12.57.15;	author adam;	state Exp;
branches;
next	1.98;
commitid	qErZcSeYJAq0f7rE;

1.98
date	2023.04.20.10.43.16;	author tnn;	state Exp;
branches;
next	1.97;
commitid	ymqTY9pVLJ2TOPlE;

1.97
date	2023.04.18.22.20.25;	author wiz;	state Exp;
branches;
next	1.96;
commitid	wds01kTVU7zYJDlE;

1.96
date	2023.04.18.17.16.21;	author adam;	state Exp;
branches;
next	1.95;
commitid	R19cOgGpuVrh3ClE;

1.95
date	2023.03.03.10.12.56;	author adam;	state Exp;
branches;
next	1.94;
commitid	4Rk0qnjXmag2cFfE;

1.94
date	2023.02.08.10.20.20;	author adam;	state Exp;
branches;
next	1.93;
commitid	QSaNHNrd8tqrYHcE;

1.93
date	2023.01.11.10.17.19;	author adam;	state Exp;
branches;
next	1.92;
commitid	I9iZAOaubKK9R69E;

1.92
date	2022.11.28.08.49.08;	author adam;	state Exp;
branches;
next	1.91;
commitid	0VHe0YIL5WdBMr3E;

1.91
date	2022.11.02.08.41.16;	author adam;	state Exp;
branches;
next	1.90;
commitid	TVAvO4RvTiLHz60E;

1.90
date	2022.09.08.05.08.52;	author adam;	state Exp;
branches;
next	1.89;
commitid	FLOlmx7Mp7hta1TD;

1.89
date	2022.09.07.08.04.18;	author adam;	state Exp;
branches;
next	1.88;
commitid	pKw2DMh1f9fCaUSD;

1.88
date	2022.07.09.18.18.00;	author gutteridge;	state Exp;
branches;
next	1.87;
commitid	QRWyVZl9kglBsfLD;

1.87
date	2022.07.05.18.07.38;	author adam;	state Exp;
branches;
next	1.86;
commitid	ZodEiIQf4u98zJKD;

1.86
date	2022.07.03.10.51.05;	author wiz;	state Exp;
branches;
next	1.85;
commitid	HN34KL8unrGcdrKD;

1.85
date	2022.04.21.11.09.04;	author wiz;	state Exp;
branches;
next	1.84;
commitid	pjgpPOx1y4i8F3BD;

1.84
date	2022.01.04.20.54.40;	author wiz;	state Exp;
branches;
next	1.83;
commitid	CYyhdK9qtoffkmnD;

1.83
date	2021.02.08.06.08.02;	author adam;	state Exp;
branches;
next	1.82;
commitid	VoQIaC4J6MFD2SGC;

1.82
date	2020.12.14.07.31.18;	author adam;	state Exp;
branches;
next	1.81;
commitid	nMoPS3w1kXQMiGzC;

1.81
date	2020.11.24.08.56.55;	author adam;	state Exp;
branches;
next	1.80;
commitid	D13aq3fI3HTWp7xC;

1.80
date	2020.10.06.10.51.22;	author wiz;	state Exp;
branches;
next	1.79;
commitid	2RV3QCrN1rkTCPqC;

1.79
date	2020.05.17.19.34.12;	author adam;	state Exp;
branches;
next	1.78;
commitid	bTxyopGVhy8s5D8C;

1.78
date	2020.04.23.05.49.00;	author adam;	state Exp;
branches;
next	1.77;
commitid	VHVJ3tAQoQ08it5C;

1.77
date	2020.04.22.07.20.20;	author adam;	state Exp;
branches;
next	1.76;
commitid	2jfJPHqIoCPnPl5C;

1.76
date	2020.04.03.06.25.50;	author adam;	state Exp;
branches;
next	1.75;
commitid	bNGdoNCwN7Uv8U2C;

1.75
date	2020.01.18.21.50.45;	author jperkin;	state Exp;
branches;
next	1.74;
commitid	JW4hJgY8ZdoTFdTB;

1.74
date	2019.10.21.11.17.47;	author adam;	state Exp;
branches;
next	1.73;
commitid	ZtYsT5brZW653JHB;

1.73
date	2019.05.31.17.28.48;	author adam;	state Exp;
branches;
next	1.72;
commitid	POoLKMxO4iBEHnpB;

1.72
date	2019.02.28.09.06.08;	author adam;	state Exp;
branches;
next	1.71;
commitid	yZudjIRZMxaBSvdB;

1.71
date	2019.01.23.12.21.04;	author adam;	state Exp;
branches;
next	1.70;
commitid	o5RqlzwgemPG5U8B;

1.70
date	2018.11.21.10.38.38;	author adam;	state Exp;
branches;
next	1.69;
commitid	S0zHCpkGP1VJzN0B;

1.69
date	2018.11.13.11.23.38;	author adam;	state Exp;
branches;
next	1.68;
commitid	kyqBsMq1KN505MZA;

1.68
date	2018.08.15.08.21.42;	author adam;	state Exp;
branches;
next	1.67;
commitid	umJdCEqop6f0YbOA;

1.67
date	2018.07.19.09.24.37;	author adam;	state Exp;
branches;
next	1.66;
commitid	I0RMNCr2uxqobJKA;

1.66
date	2018.04.02.13.19.31;	author adam;	state Exp;
branches;
next	1.65;
commitid	QISh7PcHa0SkXRwA;

1.65
date	2018.03.22.11.49.19;	author adam;	state Exp;
branches;
next	1.64;
commitid	dwWJeAQzXINfOrvA;

1.64
date	2018.03.19.09.01.46;	author adam;	state Exp;
branches;
next	1.63;
commitid	LMQpuatR6KDIY2vA;

1.63
date	2017.11.30.08.23.27;	author adam;	state Exp;
branches;
next	1.62;
commitid	aWw78YL3NNiQg2hA;

1.62
date	2017.11.03.10.36.12;	author adam;	state Exp;
branches;
next	1.61;
commitid	553Veodh1kZ9SzdA;

1.61
date	2017.10.25.03.53.05;	author adam;	state Exp;
branches;
next	1.60;
commitid	zFVnVI8rCdYGVncA;

1.60
date	2017.10.12.08.28.40;	author adam;	state Exp;
branches;
next	1.59;
commitid	TW6fN5ZzrZVbSJaA;

1.59
date	2017.08.04.05.31.11;	author adam;	state Exp;
branches;
next	1.58;
commitid	XofQiQzELcmZ6R1A;

1.58
date	2017.07.27.18.39.26;	author adam;	state Exp;
branches;
next	1.57;
commitid	CHmafWzIF2ejJT0A;

1.57
date	2017.07.18.13.58.25;	author adam;	state Exp;
branches;
next	1.56;
commitid	bq6XKjHLUZPPsIZz;

1.56
date	2017.06.19.21.03.19;	author wiz;	state Exp;
branches;
next	1.55;
commitid	2ETN3VYUoZTrK1Wz;

1.55
date	2017.05.29.13.22.31;	author wiz;	state Exp;
branches;
next	1.54;
commitid	lgbVJ8JIosnfShTz;

1.54
date	2017.05.29.12.07.01;	author wiz;	state Exp;
branches;
next	1.53;
commitid	bD6O2hL30pIGrhTz;

1.53
date	2017.03.21.16.04.59;	author wiz;	state Exp;
branches;
next	1.52;
commitid	XT7aQc9pwjgsZqKz;

1.52
date	2017.03.13.09.42.25;	author wiz;	state Exp;
branches;
next	1.51;
commitid	OdRiwEKianha8nJz;

1.51
date	2017.01.28.11.15.07;	author wiz;	state Exp;
branches;
next	1.50;
commitid	akil8Jq4kS883JDz;

1.50
date	2017.01.28.01.20.01;	author wiz;	state Exp;
branches;
next	1.49;
commitid	863o8QwRp3mpLFDz;

1.49
date	2016.12.19.08.57.51;	author wiz;	state Exp;
branches;
next	1.48;
commitid	Lv0BjT4er4GbAzyz;

1.48
date	2016.11.28.13.15.51;	author wiz;	state Exp;
branches;
next	1.47;
commitid	DmDrgr7xnGXCGTvz;

1.47
date	2016.11.07.10.48.13;	author wiz;	state Exp;
branches;
next	1.46;
commitid	gct6hDuCpVKRxbtz;

1.46
date	2016.10.03.12.25.37;	author wiz;	state Exp;
branches;
next	1.45;
commitid	OqMNOcbLF2C0dHoz;

1.45
date	2016.10.03.12.21.16;	author wiz;	state Exp;
branches;
next	1.44;
commitid	eO6WAsL3oLpxbHoz;

1.44
date	2016.09.30.11.17.39;	author wiz;	state Exp;
branches;
next	1.43;
commitid	3sOi9J5O0kfHVioz;

1.43
date	2016.09.12.18.34.31;	author wiz;	state Exp;
branches;
next	1.42;
commitid	uCMGuaux3aFoV1mz;

1.42
date	2016.08.31.06.47.09;	author wiz;	state Exp;
branches;
next	1.41;
commitid	Slj7h5L5vZnGoqkz;

1.41
date	2016.06.06.11.58.09;	author wiz;	state Exp;
branches;
next	1.40;
commitid	L8CAdYwuqZ6JSo9z;

1.40
date	2016.05.12.14.08.29;	author wiz;	state Exp;
branches;
next	1.39;
commitid	89zIbDwfE0lhpc6z;

1.39
date	2016.04.08.15.22.03;	author wiz;	state Exp;
branches;
next	1.38;
commitid	foIDtQ6eW6lhUP1z;

1.38
date	2016.03.08.15.14.38;	author wiz;	state Exp;
branches;
next	1.37;
commitid	UQKLKQKwKTavRQXy;

1.37
date	2016.03.05.11.29.25;	author jperkin;	state Exp;
branches;
next	1.36;
commitid	1LoxeQftu903HrXy;

1.36
date	2016.02.01.11.53.45;	author wiz;	state Exp;
branches;
next	1.35;
commitid	BPEodHU7NrSlUcTy;

1.35
date	2016.01.13.20.22.52;	author wiz;	state Exp;
branches;
next	1.34;
commitid	ewlOAPgYsQDRkOQy;

1.34
date	2015.12.13.21.09.09;	author wiz;	state Exp;
branches;
next	1.33;
commitid	nrs8R9FezAhxAPMy;

1.33
date	2015.11.23.00.06.18;	author wiz;	state Exp;
branches;
next	1.32;
commitid	vliRikpGmGjaf9Ky;

1.32
date	2015.11.12.16.37.00;	author wiz;	state Exp;
branches;
next	1.31;
commitid	gMOlTsnVXUlW4PIy;

1.31
date	2015.10.19.09.37.29;	author wiz;	state Exp;
branches;
next	1.30;
commitid	EHVQ6qXsOEnOwHFy;

1.30
date	2015.09.06.20.32.28;	author wiz;	state Exp;
branches;
next	1.29;
commitid	OpkOUmoOhZnfxeAy;

1.29
date	2015.09.05.12.00.10;	author jperkin;	state Exp;
branches;
next	1.28;
commitid	tiYMgDDQT70uJ3Ay;

1.28
date	2015.08.17.15.55.28;	author wiz;	state Exp;
branches;
next	1.27;
commitid	I2f55Lof63c5EDxy;

1.27
date	2015.07.14.08.51.47;	author wiz;	state Exp;
branches;
next	1.26;
commitid	PVcel5M0Hi8voety;

1.26
date	2015.07.05.18.34.42;	author wiz;	state Exp;
branches;
next	1.25;
commitid	FRFbd910M1BpU7sy;

1.25
date	2015.06.07.08.49.22;	author wiz;	state Exp;
branches;
next	1.24;
commitid	9mQaoGk5hrDoztoy;

1.24
date	2015.05.28.18.42.16;	author wiz;	state Exp;
branches;
next	1.23;
commitid	wAmKDKgjGUBEafny;

1.23
date	2015.05.28.07.11.08;	author wiz;	state Exp;
branches;
next	1.22;
commitid	6AE8osgkF5tDlbny;

1.22
date	2015.04.14.11.40.31;	author wiz;	state Exp;
branches;
next	1.21;
commitid	EkiNWHedwJrGfyhy;

1.21
date	2015.04.12.14.42.30;	author wiz;	state Exp;
branches;
next	1.20;
commitid	mRQ4NN1q4pT9kjhy;

1.20
date	2015.04.02.22.37.57;	author wiz;	state Exp;
branches;
next	1.19;
commitid	0QTwiU5mbkJbh4gy;

1.19
date	2015.03.15.21.10.16;	author wiz;	state Exp;
branches;
next	1.18;
commitid	rlfEFSa2IQjYmKdy;

1.18
date	2015.01.18.17.25.39;	author wiz;	state Exp;
branches;
next	1.17;
commitid	xh339QfyDyTwVw6y;

1.17
date	2015.01.07.01.01.12;	author wiz;	state Exp;
branches;
next	1.16;
commitid	S9Gb9tOZGSxIP15y;

1.16
date	2015.01.06.22.58.41;	author joerg;	state Exp;
branches;
next	1.15;
commitid	2MOzAemYoWCH915y;

1.15
date	2015.01.05.08.42.32;	author wiz;	state Exp;
branches;
next	1.14;
commitid	Vocvq4acTF6XrO4y;

1.14
date	2015.01.04.10.25.08;	author wiz;	state Exp;
branches;
next	1.13;
commitid	LHBghmQ7uZ853H4y;

1.13
date	2015.01.03.16.00.55;	author wiz;	state Exp;
branches;
next	1.12;
commitid	fT1qAewXrZJiWA4y;

1.12
date	2014.10.20.11.21.06;	author wiz;	state Exp;
branches;
next	1.11;
commitid	SUu0sRV2cpaPNVUx;

1.11
date	2014.10.05.14.53.10;	author wiz;	state Exp;
branches;
next	1.10;
commitid	Bgd9WPGONSXDr1Tx;

1.10
date	2014.08.25.18.37.18;	author wiz;	state Exp;
branches;
next	1.9;
commitid	f624Pasfk3Z21MNx;

1.9
date	2014.08.10.14.42.25;	author wiz;	state Exp;
branches;
next	1.8;
commitid	8AekYSgKAQSncPLx;

1.8
date	2014.07.29.11.51.36;	author wiz;	state Exp;
branches;
next	1.7;
commitid	9FvLLHEfTC5GDgKx;

1.7
date	2014.05.06.10.30.54;	author wiz;	state Exp;
branches;
next	1.6;
commitid	9fbaEJAxZs4oTszx;

1.6
date	2014.03.31.13.42.29;	author wiz;	state Exp;
branches;
next	1.5;
commitid	UsYG9yJpgeHS6Rux;

1.5
date	2014.03.22.00.07.20;	author wiz;	state Exp;
branches;
next	1.4;
commitid	ByH5sEaNK4v7TCtx;

1.4
date	2014.03.21.23.39.28;	author gdt;	state Exp;
branches;
next	1.3;
commitid	BcTZ5lMBm9pDJCtx;

1.3
date	2014.03.21.22.04.19;	author wiz;	state Exp;
branches;
next	1.2;
commitid	LukuV58LabrRcCtx;

1.2
date	2014.03.21.14.02.45;	author wiz;	state Exp;
branches;
next	1.1;
commitid	hyrqf96JE3rIxztx;

1.1
date	2014.03.21.13.20.35;	author wiz;	state Exp;
branches;
next	;
commitid	TLdiWIbUOftjjztx;


desc
@@


1.145
log
@py-cryptography reqires openssl3, make it so

PR 60255 by riastradh
@
text
@# $NetBSD: Makefile,v 1.144 2026/05/08 10:03:20 adam Exp $

DISTNAME=	cryptography-48.0.0
PKGNAME=	${PYPKGPREFIX}-${DISTNAME}
CATEGORIES=	security python
MASTER_SITES=	${MASTER_SITE_PYPI:=c/cryptography/}

MAINTAINER=	pkgsrc-users@@NetBSD.org
HOMEPAGE=	https://github.com/pyca/cryptography
COMMENT=	Cryptographic recipes and primitives for Python
LICENSE=	apache-2.0 OR modified-bsd

TOOL_DEPENDS+=	${PYPKGPREFIX}-setuptools>=61.0.0:../../devel/py-setuptools
DEPENDS+=	${PYPKGPREFIX}-cffi>=1.12:../../devel/py-cffi
TEST_DEPENDS+=	${PYPKGPREFIX}-cryptography_vectors-${PKGVERSION_NOREV}:../../security/py-cryptography_vectors
TEST_DEPENDS+=	${PYPKGPREFIX}-certifi-[0-9]*:../../security/py-certifi
TEST_DEPENDS+=	${PYPKGPREFIX}-pretend-[0-9]*:../../devel/py-pretend
TEST_DEPENDS+=	${PYPKGPREFIX}-test-benchmark-[0-9]*:../../devel/py-test-benchmark
TEST_DEPENDS+=	${PYPKGPREFIX}-test-cov-[0-9]*:../../devel/py-test-cov
TEST_DEPENDS+=	${PYPKGPREFIX}-test-xdist-[0-9]*:../../devel/py-test-xdist

USE_TOOLS+=	pkg-config
MAKE_ENV+=	CARGO_NET_OFFLINE=true
MAKE_ENV+=	OPENSSL_DIR=${BUILDLINK_PREFIX.openssl}
RUSTFLAGS+=	-C link-arg=${COMPILER_RPATH_FLAG}${BUILDLINK_PREFIX.openssl}/lib

pre-build:
	cd ${WRKSRC} && ${LN} -f -s src/rust/.cargo .cargo

.include "cargo-depends.mk"

.include "../../devel/py-maturin/tool.mk"
.include "../../lang/python/wheel.mk"
.include "../../lang/rust/cargo.mk"
BUILDLINK_API_DEPENDS.openssl+=	openssl>=3.0
.include "../../security/openssl/buildlink3.mk"
.include "../../mk/bsd.pkg.mk"
@


1.144
log
@py-cryptography py-cryptography_vectors: updated to 48.0.0

48.0.0 - 2026-05-04

* **BACKWARDS INCOMPATIBLE:** Support for Python 3.8 has been removed.
  ``cryptography`` now requires Python 3.9 or later.
* **BACKWARDS INCOMPATIBLE:** Loading an X.509 CRL whose inner
  ``TBSCertList.signature`` algorithm does not match the outer
  ``signatureAlgorithm`` now raises ``ValueError``. Previously, such CRLs
  were parsed successfully and only rejected during signature validation.
* Added support for :doc:`/hazmat/primitives/asymmetric/mlkem` and
  :doc:`/hazmat/primitives/asymmetric/mldsa` when using OpenSSL 3.5.0 or
  later, in addition to the existing AWS-LC and BoringSSL support. This means
  post-quantum algorithms are now available to users of our wheels.

  * **Note:** Going forward, we do not guarantee that all functionality
    in ``cryptography`` will be available when building against
    OpenSSL. See :doc:`/statements/state-of-openssl` for more information.
@
text
@d1 1
a1 1
# $NetBSD: Makefile,v 1.143 2026/04/26 09:01:42 adam Exp $
d35 1
@


1.143
log
@py-cryptography py-cryptography_vectors: updated to 47.0.0

47.0.0 - 2026-04-24

Support for Python 3.8 is deprecated and will be removed in the next cryptography release.
BACKWARDS INCOMPATIBLE: Support for binary elliptic curves (SECT* classes) has been removed. These curves are rarely used and have additional security considerations that make them undesirable.
BACKWARDS INCOMPATIBLE: Support for OpenSSL 1.1.x has been removed. OpenSSL 3.0.0 or later is now required. LibreSSL, BoringSSL, and AWS-LC continue to be supported.
BACKWARDS INCOMPATIBLE: Dropped support for LibreSSL < 4.1.
BACKWARDS INCOMPATIBLE: Loading keys with unsupported algorithms or keys with unsupported explicit curve encodings now raises :class:`~cryptography.exceptions.UnsupportedAlgorithm` instead of ValueError. This change affects :func:`~cryptography.hazmat.primitives.serialization.load_pem_private_key`, :func:`~cryptography.hazmat.primitives.serialization.load_der_private_key`, :func:`~cryptography.hazmat.primitives.serialization.load_pem_public_key`, :func:`~cryptography.hazmat.primitives.serialization.load_der_public_key`, and :meth:`~cryptography.x509.Certificate.public_key` when called on certificates with unsupported public key algorithms.
BACKWARDS INCOMPATIBLE: When parsing elliptic curve private keys, we now reject keys that incorrectly encode a private key of the wrong length because such keys are impossible to process in a constant-time manner. We do not believe keys with this problem are in wide use, however we may revert this change based on the feedback we receive.
Deprecated passing 64-bit (8-byte) and 128-bit (16-byte) keys to :class:`~cryptography.hazmat.decrepit.ciphers.algorithms.TripleDES`. In a future release, only 192-bit (24-byte) keys will be accepted. Users should expand shorter keys themselves (e.g., for single DES: key + key + key, for two-key: key + key[:8]).
Updated the minimum supported Rust version (MSRV) to 1.83.0, from 1.74.0.
Support for x86_64 macOS (including publishing wheels) is deprecated and will be removed in the next release. We will switch to publishing an arm64 only wheel for macOS.
Support for 32-bit Windows (including publishing wheels) is deprecated and will be removed in the next release. Users should move to a 64-bit Python installation.
public_bytes and private_bytes methods on keys now raise TypeError (instead of ValueError) if an invalid encoding is provided for the given format.
Moved :class:`~cryptography.hazmat.decrepit.ciphers.modes.CFB`, :class:`~cryptography.hazmat.decrepit.ciphers.modes.OFB`, and :class:`~cryptography.hazmat.decrepit.ciphers.modes.CFB8` into :doc:`/hazmat/decrepit/index` and deprecated them in the modes module. They will be removed from the modes module in 49.0.0.
Moved :class:`~cryptography.hazmat.primitives.ciphers.algorithms.Camellia` into :doc:`/hazmat/decrepit/index` and deprecated it in the cipher module. It will be removed from the cipher module in 49.0.0.
Added :meth:`~cryptography.hazmat.primitives.kdf.hkdf.HKDF.extract` to :class:`~cryptography.hazmat.primitives.kdf.hkdf.HKDF`. The previous private implementation will be removed in 49.0.0.
Added support for loading elliptic curve keys that contain explicit encodings of the curves secp256r1, secp384r1, and secp521r1.
Added support for :class:`~cryptography.hazmat.primitives.kdf.argon2.Argon2d` and :class:`~cryptography.hazmat.primitives.kdf.argon2.Argon2i` when using OpenSSL 3.2.0+.
Added derive_into methods to :class:`~cryptography.hazmat.primitives.kdf.hkdf.HKDF`, :class:`~cryptography.hazmat.primitives.kdf.hkdf.HKDFExpand`, :class:`~cryptography.hazmat.primitives.kdf.concatkdf.ConcatKDFHash`, :class:`~cryptography.hazmat.primitives.kdf.concatkdf.ConcatKDFHMAC`, :class:`~cryptography.hazmat.primitives.kdf.argon2.Argon2id`, :class:`~cryptography.hazmat.primitives.kdf.pbkdf2.PBKDF2HMAC`, :class:`~cryptography.hazmat.primitives.kdf.kbkdf.KBKDFHMAC`, :class:`~cryptography.hazmat.primitives.kdf.kbkdf.KBKDFCMAC`, :class:`~cryptography.hazmat.primitives.kdf.scrypt.Scrypt`, and :class:`~cryptography.hazmat.primitives.kdf.x963kdf.X963KDF` to allow deriving keys directly into pre-allocated buffers.
Added encrypt_into and decrypt_into methods to :class:`~cryptography.hazmat.primitives.ciphers.aead.AESCCM`, :class:`~cryptography.hazmat.primitives.ciphers.aead.AESGCM`, :class:`~cryptography.hazmat.primitives.ciphers.aead.AESGCMSIV`, :class:`~cryptography.hazmat.primitives.ciphers.aead.AESOCB3`, :class:`~cryptography.hazmat.primitives.ciphers.aead.AESSIV`, and :class:`~cryptography.hazmat.primitives.ciphers.aead.ChaCha20Poly1305` to allow encrypting directly into a pre-allocated buffer.
Added support for PKCS1v15 signing without DigestInfo using :class:`~cryptography.hazmat.primitives.asymmetric.utils.NoDigestInfo`.
Added :meth:`~cryptography.hazmat.primitives.hashes.Hash.hash`, a one-shot method for computing hashes.
Added :doc:`/hazmat/primitives/hpke` support implementing RFC 9180 for hybrid authenticated encryption.
Added new :doc:`/hazmat/primitives/asymmetric/mlkem` module with support for ML-KEM key encapsulation with AWS-LC and BoringSSL.
Note: Post-quantum algorithm support requires AWS-LC or BoringSSL. As we ship our wheels with OpenSSL, most users will not have access to these APIs yet. See :doc:`/statements/state-of-openssl` for more information on OpenSSL support.
Added new :doc:`/hazmat/primitives/asymmetric/mldsa` module with support for ML-DSA signing and verification with AWS-LC and BoringSSL.
Note: Post-quantum algorithm support requires AWS-LC or BoringSSL. As we ship our wheels with OpenSSL, most users will not have access to these APIs yet. See :doc:`/statements/state-of-openssl` for more information on OpenSSL support.
Added new :doc:`/hazmat/asn1/index` module with support for declaratively defining custom ASN.1 types and encoding/decoding them.
Fixed compilation when using LibreSSL 4.3.0 and OpenSSL 4.0.0.
Updated Windows, macOS, and Linux wheels to be compiled with OpenSSL 4.0.0.
@
text
@d1 1
a1 1
# $NetBSD: Makefile,v 1.142 2026/04/08 20:35:35 wiz Exp $
d3 1
a3 1
DISTNAME=	cryptography-47.0.0
@


1.142
log
@py-cryptography: update to 46.0.7.

46.0.7 - 2026-01-27
~~~~~~~~~~~~~~~~~~~

* **SECURITY ISSUE**: Fixed an issue where non-contiguous buffers could be
  passed to APIs that accept Python buffers, which could lead to buffer
  overflow. **CVE-2026-39892**
* Updated Windows, macOS, and Linux wheels to be compiled with OpenSSL 3.5.6.
@
text
@d1 1
a1 1
# $NetBSD: Makefile,v 1.141 2026/03/27 10:06:27 adam Exp $
d3 1
a3 1
DISTNAME=	cryptography-46.0.7
@


1.141
log
@py-cryptography py-cryptography_vectors: updated to 46.0.6

46.0.6 - 2026-03-25

* **SECURITY ISSUE**: Fixed a bug where name constraints were not applied
  to peer names during verification when the leaf certificate contains a
  wildcard DNS SAN. Ordinary X.509 topologies are not affected by this bug,
  including those used by the Web PKI. Credit to **Oleh Konko (1seal)** for
  reporting the issue. **CVE-2026-34073**
@
text
@d1 1
a1 1
# $NetBSD: Makefile,v 1.140 2026/02/17 06:32:37 adam Exp $
d3 1
a3 1
DISTNAME=	cryptography-46.0.6
@


1.140
log
@py-cryptography: proper fix for Maturin 1.12
@
text
@d1 1
a1 1
# $NetBSD: Makefile,v 1.139 2026/02/16 21:47:54 wiz Exp $
d3 1
a3 1
DISTNAME=	cryptography-46.0.5
a4 1
PKGREVISION=	2
@


1.139
log
@py-cryptography: manually delete newly installed files

Bug report filed upstream.

Bump PKGREVISION.
@
text
@d1 1
a1 1
# $NetBSD: Makefile,v 1.138 2026/02/16 19:08:07 wiz Exp $
a30 4
# https://github.com/PyO3/maturin/issues/3006
post-install:
	cd ${DESTDIR}${PREFIX}/${PYSITELIB} && ${RM} -rf CHANGELOG.rst CONTRIBUTING.rst docs tests

@


1.138
log
@py-cryptography: fix PLIST

setuptools? maturin? update?

Bump PKGREVISION.
@
text
@d1 1
a1 1
# $NetBSD: Makefile,v 1.137 2026/02/10 22:45:05 wiz Exp $
d5 1
a5 1
PKGREVISION=	1
d31 4
@


1.137
log
@py-cryptography*: update to 46.0.5

* An attacker could create a malicious public key that reveals portions of
your private key when using certain uncommon elliptic curves (binary
curves). This version now includes additional security checks to prevent
this attack. This issue only affects binary elliptic curves, which are
rarely used in real-world applications. Credit to **XlabAI Team of Tencent
Xuanwu Lab and Atuin Automated Vulnerability Discovery Engine** for
reporting the issue. **CVE-2026-26007**
* Support for SECT binary elliptic curves is deprecated and will be removed
in the next release.
@
text
@d1 1
a1 1
# $NetBSD: Makefile,v 1.136 2026/01/28 08:39:31 adam Exp $
d5 1
@


1.136
log
@py-cryptography py-cryptography_vectors: updated to 46.0.4

46.0.4 - 2026-01-27

Dropped support for win_arm64 wheels.
Updated Windows, macOS, and Linux wheels to be compiled with OpenSSL 3.5.5.
@
text
@d1 1
a1 1
# $NetBSD: Makefile,v 1.135 2025/10/16 09:21:03 adam Exp $
d3 1
a3 1
DISTNAME=	cryptography-46.0.4
@


1.135
log
@py-cryptography py-cryptography_vectors: updated to 46.0.3

46.0.3 - 2025-10-15

* Fixed compilation when using LibreSSL 4.2.0.
@
text
@d1 1
a1 1
# $NetBSD: Makefile,v 1.134 2025/10/02 13:14:50 adam Exp $
d3 1
a3 1
DISTNAME=	cryptography-46.0.3
@


1.134
log
@py-cryptography py-cryptography_vectors: updated t 46.0.2

46.0.2
Updated Windows, macOS, and Linux wheels to be compiled with OpenSSL 3.5.4.
@
text
@d1 1
a1 1
# $NetBSD: Makefile,v 1.133 2025/09/22 17:40:08 adam Exp $
d3 1
a3 1
DISTNAME=	cryptography-46.0.2
@


1.133
log
@py-cryptography py-cryptography_vectors: updated to 46.0.1

46.0.1 - 2025-09-16

* Fixed an issue where users installing via ``pip`` on Python 3.14 development
  versions would not properly install a dependency.
* Fixed an issue building the free-threaded macOS 3.14 wheels.


46.0.0 - 2025-09-16

* **BACKWARDS INCOMPATIBLE:** Support for Python 3.7 has been removed.
* Support for OpenSSL < 3.0 is deprecated and will be removed in the next
  release.
* Support for ``x86_64`` macOS (including publishing wheels) is deprecated
  and will be removed in two releases. We will switch to publishing an
  ``arm64`` only wheel for macOS.
* Support for 32-bit Windows (including publishing wheels) is deprecated
  and will be removed in two releases. Users should move to a 64-bit
  Python installation.
* Updated Windows, macOS, and Linux wheels to be compiled with OpenSSL 3.5.3.
* We now build ``ppc64le`` ``manylinux`` wheels and publish them to PyPI.
* We now build ``win_arm64`` (Windows on Arm) wheels and publish them to PyPI.
* Added support for free-threaded Python 3.14.
* Removed the deprecated ``get_attribute_for_oid`` method on
  :class:`~cryptography.x509.CertificateSigningRequest`. Users should use
  :meth:`~cryptography.x509.Attributes.get_attribute_for_oid` instead.
* Removed the deprecated ``CAST5``, ``SEED``, ``IDEA``, and ``Blowfish``
  classes from the cipher module. These are still available in
  :doc:`/hazmat/decrepit/index`.
* In X.509, when performing a PSS signature with a SHA-3 hash, it is now
  encoded with the official NIST SHA3 OID.
@
text
@d1 1
a1 1
# $NetBSD: Makefile,v 1.132 2025/09/02 09:16:44 adam Exp $
d3 1
a3 1
DISTNAME=	cryptography-46.0.1
@


1.132
log
@py-cryptography: updated to 45.0.7

45.0.7 - 2025-09-01
* Added a function to support an upcoming ``pyOpenSSL`` release.
@
text
@d1 1
a1 1
# $NetBSD: Makefile,v 1.131 2025/08/06 07:41:41 adam Exp $
d3 1
a3 1
DISTNAME=	cryptography-45.0.7
@


1.131
log
@py-cryptography py-cryptography_vectors: updated to 45.0.6

45.0.6 - 2025-08-05

* Updated Windows, macOS, and Linux wheels to be compiled with OpenSSL 3.5.2.
@
text
@d1 1
a1 1
# $NetBSD: Makefile,v 1.130 2025/07/06 08:41:40 wiz Exp $
d3 1
a3 1
DISTNAME=	cryptography-45.0.6
@


1.130
log
@py-cryptography*: update to 45.0.5

Updated Windows, macOS, and Linux wheels to be compiled with OpenSSL 3.5.1.
@
text
@d1 1
a1 1
# $NetBSD: Makefile,v 1.129 2025/06/10 08:02:55 adam Exp $
d3 1
a3 1
DISTNAME=	cryptography-45.0.5
@


1.129
log
@py-cryptography py-cryptography_vectors: updated to 45.0.4

45.0.4

Fixed decrypting PKCS#8 files encrypted with SHA1-RC4. (This is not considered secure, and is supported only for backwards compatibility.)
@
text
@d1 1
a1 1
# $NetBSD: Makefile,v 1.128 2025/05/26 05:08:41 adam Exp $
d3 1
a3 1
DISTNAME=	cryptography-45.0.4
@


1.128
log
@py-cryptography py-cryptography_vectors: updated to 45.0.3

45.0.3 - 2025-05-25

* Fixed decrypting PKCS#8 files encrypted with long salts (this impacts keys
  encrypted by Bouncy Castle).
* Fixed decrypting PKCS#8 files encrypted with DES-CBC-MD5. While wildly
  insecure, this remains prevalent.
@
text
@d1 1
a1 1
# $NetBSD: Makefile,v 1.127 2025/05/18 08:34:00 adam Exp $
d3 1
a3 1
DISTNAME=	cryptography-45.0.3
@


1.127
log
@py-cryptography py-cryptography_vectors: updated to 45.0.2

45.0.2

Fixed using mypy with cryptography on older versions of Python.

45.0.1

Updated Windows, macOS, and Linux wheels to be compiled with OpenSSL 3.5.0.

45.0.0

Support for Python 3.7 is deprecated and will be removed in the next cryptography release.
Updated the minimum supported Rust version (MSRV) to 1.74.0, from 1.65.0.
Added support for serialization of PKCS#12 Java truststores in :func:`~cryptography.hazmat.primitives.serialization.pkcs12.serialize_java_truststore`
Added :meth:`~cryptography.hazmat.primitives.kdf.argon2.Argon2id.derive_phc_encoded` and :meth:`~cryptography.hazmat.primitives.kdf.argon2.Argon2id.verify_phc_encoded` methods to support password hashing in the PHC string format
Added support for PKCS7 decryption and encryption using AES-256 as the content algorithm, in addition to AES-128.
BACKWARDS INCOMPATIBLE: Made SSH private key loading more consistent with other private key loading: :func:`~cryptography.hazmat.primitives.serialization.load_ssh_private_key` now raises a TypeError if the key is unencrypted but a password is provided (previously no exception was raised), and raises a TypeError if the key is encrypted but no password is provided (previously a ValueError was raised).
We significantly refactored how private key loading ( :func:`~cryptography.hazmat.primitives.serialization.load_pem_private_key` and :func:`~cryptography.hazmat.primitives.serialization.load_der_private_key`) works. This is intended to be backwards compatible for all well-formed keys, therefore if you discover a key that now raises an exception, please file a bug with instructions for reproducing.
Added unsafe_skip_rsa_key_validation keyword-argument to :func:`~cryptography.hazmat.primitives.serialization.load_ssh_private_key`.
Added :class:`~cryptography.hazmat.primitives.hashes.XOFHash` to support repeated :meth:`~cryptography.hazmat.primitives.hashes.XOFHash.squeeze` operations on extendable output functions.
Added :meth:`~cryptography.x509.ocsp.OCSPResponseBuilder.add_response_by_hash` method to allow creating OCSP responses using certificate hash values rather than full certificates.
Extended the :mod:`X.509 path validation <cryptography.x509.verification>` API to support user-configured extension policies via the :meth:`PolicyBuilder.extension_policies <cryptography.x509.verification.PolicyBuilder.extension_policies>` method.
Deprecated the subject, verification_time and max_chain_depth properties on :class:`~cryptography.x509.verification.ClientVerifier` and :class:`~cryptography.x509.verification.ServerVerifier` in favor of a new policy property. These properties will be removed in the next release of cryptography.
BACKWARDS INCOMPATIBLE: The :meth:`VerifiedClient.subject <cryptography.x509.verification.VerifiedClient.subjects>` property can now be None since a custom extension policy may allow certificates without a Subject Alternative Name extension.
Changed the behavior when the OpenSSL 3 legacy provider fails to load. Instead of raising an exception, a warning is now emitted. The CRYPTOGRAPHY_OPENSSL_NO_LEGACY environment variable can still be used to disable the legacy provider at runtime.
Added support for the CRYPTOGRAPHY_BUILD_OPENSSL_NO_LEGACY environment variable during build time, which prevents the library from ever attempting to load the legacy provider.
Added support for the :class:`~cryptography.x509.PrivateKeyUsagePeriod` X.509 extension. This extension defines the period during which the private key corresponding to the certificate's public key may be used.
Added support for compiling against aws-lc.
Parsing X.509 structures now more strictly enforces that Name structures do not have malformed ASN.1.
We now publish py311 wheels that utilize the faster pyo3::buffer::PyBuffer interface, resulting in significantly improved performance for operations involving small buffers.
Added :func:`~cryptography.hazmat.primitives.serialization.ssh_key_fingerprint` for computing fingerprints of SSH public keys.
Added support for deterministic ECDSA signing via the new keyword-only argument ecdsa_deterministic in :meth:`~cryptography.x509.CertificateBuilder.sign`, :meth:`~cryptography.x509.CertificateRevocationListBuilder.sign` and :meth:`~cryptography.x509.CertificateSigningRequestBuilder.sign`.
@
text
@d1 1
a1 1
# $NetBSD: Makefile,v 1.126 2025/05/04 12:56:22 adam Exp $
d3 1
a3 1
DISTNAME=	cryptography-45.0.2
@


1.126
log
@py-cryptography py-cryptography_vectors: updated to 44.0.3

44.0.3
Fixed compilation when using LibreSSL 4.1.0.
@
text
@d1 1
a1 1
# $NetBSD: Makefile,v 1.125 2025/03/02 20:17:43 wiz Exp $
d3 1
a3 1
DISTNAME=	cryptography-44.0.3
@


1.125
log
@py-cryptography: update to 44.0.2.

44.0.2 - 2025-03-01
~~~~~~~~~~~~~~~~~~~

* We now build wheels for PyPy 3.11.
@
text
@d1 1
a1 1
# $NetBSD: Makefile,v 1.124 2025/02/12 06:13:07 adam Exp $
d3 1
a3 1
DISTNAME=	cryptography-44.0.2
@


1.124
log
@py-cryptography py-cryptography_vectors: updated to 44.0.1

44.0.1 - 2025-02-11

* Updated Windows, macOS, and Linux wheels to be compiled with OpenSSL 3.4.1.
* We now build ``armv7l`` ``manylinux`` wheels and publish them to PyPI.
* We now build ``manylinux_2_34`` wheels and publish them to PyPI.
@
text
@d1 1
a1 1
# $NetBSD: Makefile,v 1.123 2024/11/28 10:31:24 adam Exp $
d3 1
a3 1
DISTNAME=	cryptography-44.0.1
@


1.123
log
@py-cryptography py-cryptography_vectors: updated to 44.0.0

44.0.0 - 2024-11-27

* **BACKWARDS INCOMPATIBLE:** Dropped support for LibreSSL < 3.9.
* Deprecated Python 3.7 support. Python 3.7 is no longer supported by the
  Python core team. Support for Python 3.7 will be removed in a future
  ``cryptography`` release.
* Updated Windows, macOS, and Linux wheels to be compiled with OpenSSL 3.4.0.
* macOS wheels are now built against the macOS 10.13 SDK. Users on older
  versions of macOS should upgrade, or they will need to build
  ``cryptography`` themselves.
* Enforce the :rfc:`5280` requirement that extended key usage extensions must
  not be empty.
* Added support for timestamp extraction to the
  :class:`~cryptography.fernet.MultiFernet` class.
* Relax the Authority Key Identifier requirements on root CA certificates
  during X.509 verification to allow fields permitted by :rfc:`5280` but
  forbidden by the CA/Browser BRs.
* Added support for :class:`~cryptography.hazmat.primitives.kdf.argon2.Argon2id`
  when using OpenSSL 3.2.0+.
* Added support for the :class:`~cryptography.x509.Admissions` certificate extension.
* Added basic support for PKCS7 decryption (including S/MIME 3.2) via
  :func:`~cryptography.hazmat.primitives.serialization.pkcs7.pkcs7_decrypt_der`,
  :func:`~cryptography.hazmat.primitives.serialization.pkcs7.pkcs7_decrypt_pem`, and
  :func:`~cryptography.hazmat.primitives.serialization.pkcs7.pkcs7_decrypt_smime`.
@
text
@d1 1
a1 1
# $NetBSD: Makefile,v 1.122 2024/11/13 13:32:26 jperkin Exp $
d3 1
a3 1
DISTNAME=	cryptography-44.0.0
a21 1
#CARGO_WRKSRC=	${WRKSRC}/src/rust
@


1.122
log
@*: Switch to py-maturin's tool.mk
@
text
@d1 1
a1 1
# $NetBSD: Makefile,v 1.121 2024/11/11 07:28:54 wiz Exp $
d3 1
a3 1
DISTNAME=	cryptography-43.0.3
a13 1
TOOL_DEPENDS+=	${PYPKGPREFIX}-setuptools-rust>=1.7.0:../../devel/py-setuptools-rust
d22 1
a22 1
CARGO_WRKSRC=	${WRKSRC}/src/rust
@


1.121
log
@py-*: remove unused tool dependency

py-setuptools includes the py-wheel functionality nowadays
@
text
@d1 1
a1 1
# $NetBSD: Makefile,v 1.120 2024/10/19 05:47:43 adam Exp $
a14 1
TOOL_DEPENDS+=	${PYPKGPREFIX}-maturin>=1.7.1:../../devel/py-maturin
d34 1
@


1.120
log
@py-cryptography py-cryptography_vectors: updated to 43.0.3

43.0.3 - 2024-10-18

* Fixed release metadata for ``cryptography-vectors``


43.0.2 - 2024-10-18

* Fixed compilation when using LibreSSL 4.0.0.
@
text
@d1 1
a1 1
# $NetBSD: Makefile,v 1.119 2024/09/04 05:03:35 adam Exp $
a14 1
TOOL_DEPENDS+=	${PYPKGPREFIX}-wheel-[0-9]*:../../devel/py-wheel
@


1.119
log
@py-cryptography py-cryptography_vectors: updated to 43.0.1

43.0.1 - 2024-09-03

* Updated Windows, macOS, and Linux wheels to be compiled with OpenSSL 3.3.2.
@
text
@d1 1
a1 1
# $NetBSD: Makefile,v 1.118 2024/08/22 13:30:17 wiz Exp $
d3 1
a3 1
DISTNAME=	cryptography-43.0.1
@


1.118
log
@py-cryptography: py-maturin changed license location

Update PLIST and depends.

Bump PKGREVISION
@
text
@d1 1
a1 1
# $NetBSD: Makefile,v 1.117 2024/07/21 09:12:25 wiz Exp $
d3 1
a3 1
DISTNAME=	cryptography-43.0.0
a4 1
PKGREVISION=	1
a30 2
PYTHON_VERSIONS_INCOMPATIBLE=	27

@


1.117
log
@py-cryptography: update to 43.0.0.

43.0.0 - 2024-07-20
~~~~~~~~~~~~~~~~~~~

* **BACKWARDS INCOMPATIBLE:** Support for OpenSSL less than 1.1.1e has been
  removed.  Users on older version of OpenSSL will need to upgrade.
* **BACKWARDS INCOMPATIBLE:** Dropped support for LibreSSL < 3.8.
* Updated Windows, macOS, and Linux wheels to be compiled with OpenSSL 3.3.1.
* Updated the minimum supported Rust version (MSRV) to 1.65.0, from 1.63.0.
* :func:`~cryptography.hazmat.primitives.asymmetric.rsa.generate_private_key`
  now enforces a minimum RSA key size of 1024-bit. Note that 1024-bit is still
  considered insecure, users should generally use a key size of 2048-bits.
* :func:`~cryptography.hazmat.primitives.serialization.pkcs7.serialize_certificates`
  now emits ASN.1 that more closely follows the recommendations in :rfc:`2315`.
* Added new :doc:`/hazmat/decrepit/index` module which contains outdated and
  insecure cryptographic primitives.
  :class:`~cryptography.hazmat.primitives.ciphers.algorithms.CAST5`,
  :class:`~cryptography.hazmat.primitives.ciphers.algorithms.SEED`,
  :class:`~cryptography.hazmat.primitives.ciphers.algorithms.IDEA`, and
  :class:`~cryptography.hazmat.primitives.ciphers.algorithms.Blowfish`, which were
  deprecated in 37.0.0, have been added to this module. They will be removed
  from the ``cipher`` module in 45.0.0.
* Moved :class:`~cryptography.hazmat.primitives.ciphers.algorithms.TripleDES`
  and :class:`~cryptography.hazmat.primitives.ciphers.algorithms.ARC4` into
  :doc:`/hazmat/decrepit/index` and deprecated them in the ``cipher`` module.
  They will be removed from the ``cipher`` module in 48.0.0.
* Added support for deterministic
  :class:`~cryptography.hazmat.primitives.asymmetric.ec.ECDSA` (:rfc:`6979`)
* Added support for client certificate verification to the
  :mod:`X.509 path validation <cryptography.x509.verification>` APIs in the
  form of :class:`~cryptography.x509.verification.ClientVerifier`,
  :class:`~cryptography.x509.verification.VerifiedClient`, and
  ``PolicyBuilder``
  :meth:`~cryptography.x509.verification.PolicyBuilder.build_client_verifier`.
* Added Certificate
  :attr:`~cryptography.x509.Certificate.public_key_algorithm_oid`
  and Certificate Signing Request
  :attr:`~cryptography.x509.CertificateSigningRequest.public_key_algorithm_oid`
  to determine the :class:`~cryptography.hazmat._oid.PublicKeyAlgorithmOID`
  Object Identifier of the public key found inside the certificate.
* Added :attr:`~cryptography.x509.InvalidityDate.invalidity_date_utc`, a
  timezone-aware alternative to the naïve ``datetime`` attribute
  :attr:`~cryptography.x509.InvalidityDate.invalidity_date`.
* Added support for parsing empty DN string in
  :meth:`~cryptography.x509.Name.from_rfc4514_string`.
* Added the following properties that return timezone-aware ``datetime`` objects:
  :meth:`~cryptography.x509.ocsp.OCSPResponse.produced_at_utc`,
  :meth:`~cryptography.x509.ocsp.OCSPResponse.revocation_time_utc`,
  :meth:`~cryptography.x509.ocsp.OCSPResponse.this_update_utc`,
  :meth:`~cryptography.x509.ocsp.OCSPResponse.next_update_utc`,
  :meth:`~cryptography.x509.ocsp.OCSPSingleResponse.revocation_time_utc`,
  :meth:`~cryptography.x509.ocsp.OCSPSingleResponse.this_update_utc`,
  :meth:`~cryptography.x509.ocsp.OCSPSingleResponse.next_update_utc`,
  These are timezone-aware variants of existing properties that return naïve
  ``datetime`` objects.
* Added
  :func:`~cryptography.hazmat.primitives.asymmetric.rsa.rsa_recover_private_exponent`
* Added :meth:`~cryptography.hazmat.primitives.ciphers.CipherContext.reset_nonce`
  for altering the ``nonce`` of a cipher context without initializing a new
  instance. See the docs for additional restrictions.
* :class:`~cryptography.x509.NameAttribute` now raises an exception when
  attempting to create a common name whose length is shorter or longer than
  :rfc:`5280` permits.
* Added basic support for PKCS7 encryption (including SMIME) via
  :class:`~cryptography.hazmat.primitives.serialization.pkcs7.PKCS7EnvelopeBuilder`.
@
text
@d1 1
a1 1
# $NetBSD: Makefile,v 1.116 2024/06/05 07:26:46 adam Exp $
d5 1
d17 1
a17 1
TOOL_DEPENDS+=	${PYPKGPREFIX}-maturin-[0-9]*:../../devel/py-maturin
@


1.116
log
@py-cryptography py-cryptography_vectors: updated to 42.0.8

42.0.8 - 2024-06-04

* Updated Windows, macOS, and Linux wheels to be compiled with OpenSSL 3.2.2.
@
text
@d1 1
a1 1
# $NetBSD: Makefile,v 1.115 2024/05/07 03:45:28 adam Exp $
d3 1
a3 1
DISTNAME=	cryptography-42.0.8
d16 1
@


1.115
log
@py-cryptography py-cryptography_vectors: updated to 42.0.7

42.0.7 - 2024-05-06

* Restored Windows 7 compatibility for our pre-built wheels. Note that we do
  not test on Windows 7 and wheels for our next release will not support it.
  Microsoft no longer provides support for Windows 7 and users are encouraged
  to upgrade.
@
text
@d1 1
a1 1
# $NetBSD: Makefile,v 1.114 2024/05/05 10:06:57 wiz Exp $
d3 1
a3 1
DISTNAME=	cryptography-42.0.7
@


1.114
log
@py-cryptography: update to 42.0.6.

42.0.6 - 2024-05-04
~~~~~~~~~~~~~~~~~~~

* Fixed compilation when using LibreSSL 3.9.1.
@
text
@d1 1
a1 1
# $NetBSD: Makefile,v 1.113 2024/02/25 15:54:57 wiz Exp $
d3 1
a3 1
DISTNAME=	cryptography-42.0.6
@


1.113
log
@py-cryptography*: update to 42.0.5

42.0.5 - 2024-02-23
~~~~~~~~~~~~~~~~~~~

* Limit the number of name constraint checks that will be performed in
  :mod:`X.509 path validation <cryptography.x509.verification>` to protect
  against denial of service attacks.
* Upgrade ``pyo3`` version, which fixes building on PowerPC.
@
text
@d1 1
a1 1
# $NetBSD: Makefile,v 1.112 2024/02/21 06:42:23 adam Exp $
d3 1
a3 1
DISTNAME=	cryptography-42.0.5
@


1.112
log
@py-cryptography py-cryptography_vectors: updated to 42.0.4

42.0.4 - 2024-02-20

* Fixed a null-pointer-dereference and segfault that could occur when creating
  a PKCS#12 bundle. Credit to **Alexander-Programming** for reporting the
  issue. **CVE-2024-26130**
* Fixed ASN.1 encoding for PKCS7/SMIME signed messages. The fields ``SMIMECapabilities``
  and ``SignatureAlgorithmIdentifier`` should now be correctly encoded according to the
  definitions in :rfc:`2633` :rfc:`3370`.
@
text
@d1 1
a1 1
# $NetBSD: Makefile,v 1.111 2024/02/16 19:10:49 adam Exp $
d3 1
a3 1
DISTNAME=	cryptography-42.0.4
@


1.111
log
@py-cryptography[_vectors]: updated to 42.0.3

42.0.3 - 2024-02-15

* Fixed an initialization issue that caused key loading failures for some
  users.
@
text
@d1 1
a1 1
# $NetBSD: Makefile,v 1.110 2024/01/30 19:42:46 adam Exp $
d3 1
a3 1
DISTNAME=	cryptography-42.0.3
@


1.110
log
@py-cryptography py-cryptography_vectors: updated to 42.0.2

42.0.2 - 2024-01-30
~~~~~~~~~~~~~~~~~~~

* Updated Windows, macOS, and Linux wheels to be compiled with OpenSSL 3.2.1.
* Fixed an issue that prevented the use of Python buffer protocol objects in
  ``sign`` and ``verify`` methods on asymmetric keys.
* Fixed an issue with incorrect keyword-argument naming with ``EllipticCurvePrivateKey``
  :meth:`~cryptography.hazmat.primitives.asymmetric.ec.EllipticCurvePrivateKey.exchange`,
  ``X25519PrivateKey``
  :meth:`~cryptography.hazmat.primitives.asymmetric.x25519.X25519PrivateKey.exchange`,
  ``X448PrivateKey``
  :meth:`~cryptography.hazmat.primitives.asymmetric.x448.X448PrivateKey.exchange`,
  and ``DHPrivateKey``
  :meth:`~cryptography.hazmat.primitives.asymmetric.dh.DHPrivateKey.exchange`.
@
text
@d1 1
a1 1
# $NetBSD: Makefile,v 1.109 2024/01/25 05:56:58 adam Exp $
d3 1
a3 1
DISTNAME=	cryptography-42.0.2
@


1.109
log
@py-cryptography py-cryptography_vectors: updated to 42.0.1

42.0.1 - 2024-01-24

* Fixed an issue with incorrect keyword-argument naming with ``EllipticCurvePrivateKey``
  :meth:`~cryptography.hazmat.primitives.asymmetric.ec.EllipticCurvePrivateKey.sign`.
* Resolved compatibility issue with loading certain RSA public keys in
  :func:`~cryptography.hazmat.primitives.serialization.load_pem_public_key`.
@
text
@d1 1
a1 1
# $NetBSD: Makefile,v 1.108 2024/01/23 06:33:48 adam Exp $
d3 1
a3 1
DISTNAME=	cryptography-42.0.1
@


1.108
log
@py-cryptography py-cryptography_vectors: updated to 42.0.0

42.0.0 - 2024-01-22
~~~~~~~~~~~~~~~~~~~

* **BACKWARDS INCOMPATIBLE:** Dropped support for LibreSSL < 3.7.
* **BACKWARDS INCOMPATIBLE:** Loading a PKCS7 with no content field using
  :func:`~cryptography.hazmat.primitives.serialization.pkcs7.load_pem_pkcs7_certificates`
  or
  :func:`~cryptography.hazmat.primitives.serialization.pkcs7.load_der_pkcs7_certificates`
  will now raise a ``ValueError`` rather than return an empty list.
* Parsing SSH certificates no longer permits malformed critical options with
  values, as documented in the 41.0.2 release notes.
* Updated Windows, macOS, and Linux wheels to be compiled with OpenSSL 3.2.0.
* Updated the minimum supported Rust version (MSRV) to 1.63.0, from 1.56.0.
* We now publish both ``py37`` and ``py39`` ``abi3`` wheels. This should
  resolve some errors relating to initializing a module multiple times per
  process.
* Support :class:`~cryptography.hazmat.primitives.asymmetric.padding.PSS` for
  X.509 certificate signing requests and certificate revocation lists with the
  keyword-only argument ``rsa_padding`` on the ``sign`` methods for
  :class:`~cryptography.x509.CertificateSigningRequestBuilder` and
  :class:`~cryptography.x509.CertificateRevocationListBuilder`.
* Added support for obtaining X.509 certificate signing request signature
  algorithm parameters (including PSS) via
  :meth:`~cryptography.x509.CertificateSigningRequest.signature_algorithm_parameters`.
* Added support for obtaining X.509 certificate revocation list signature
  algorithm parameters (including PSS) via
  :meth:`~cryptography.x509.CertificateRevocationList.signature_algorithm_parameters`.
* Added ``mgf`` property to
  :class:`~cryptography.hazmat.primitives.asymmetric.padding.PSS`.
* Added ``algorithm`` and ``mgf`` properties to
  :class:`~cryptography.hazmat.primitives.asymmetric.padding.OAEP`.
* Added the following properties that return timezone-aware ``datetime`` objects:
  :meth:`~cryptography.x509.Certificate.not_valid_before_utc`,
  :meth:`~cryptography.x509.Certificate.not_valid_after_utc`,
  :meth:`~cryptography.x509.RevokedCertificate.revocation_date_utc`,
  :meth:`~cryptography.x509.CertificateRevocationList.next_update_utc`,
  :meth:`~cryptography.x509.CertificateRevocationList.last_update_utc`.
  These are timezone-aware variants of existing properties that return naïve
  ``datetime`` objects.
* Deprecated the following properties that return naïve ``datetime`` objects:
  :meth:`~cryptography.x509.Certificate.not_valid_before`,
  :meth:`~cryptography.x509.Certificate.not_valid_after`,
  :meth:`~cryptography.x509.RevokedCertificate.revocation_date`,
  :meth:`~cryptography.x509.CertificateRevocationList.next_update`,
  :meth:`~cryptography.x509.CertificateRevocationList.last_update`
  in favor of the new timezone-aware variants mentioned above.
* Added support for
  :class:`~cryptography.hazmat.primitives.ciphers.algorithms.ChaCha20`
  on LibreSSL.
* Added support for RSA PSS signatures in PKCS7 with
  :meth:`~cryptography.hazmat.primitives.serialization.pkcs7.PKCS7SignatureBuilder.add_signer`.
* In the next release (43.0.0) of cryptography, loading an X.509 certificate
  with a negative serial number will raise an exception. This has been
  deprecated since 36.0.0.
* Added support for
  :class:`~cryptography.hazmat.primitives.ciphers.aead.AESGCMSIV` when using
  OpenSSL 3.2.0+.
* Added the :mod:`X.509 path validation <cryptography.x509.verification>` APIs
  for :class:`~cryptography.x509.Certificate` chains. These APIs should be
  considered unstable and not subject to our stability guarantees until
  documented as such in a future release.
* Added support for
  :class:`~cryptography.hazmat.primitives.ciphers.algorithms.SM4`
  :class:`~cryptography.hazmat.primitives.ciphers.modes.GCM`
  when using OpenSSL 3.0 or greater.
@
text
@d1 1
a1 1
# $NetBSD: Makefile,v 1.107 2023/12/13 17:39:07 schmonz Exp $
d3 1
a3 1
DISTNAME=	cryptography-42.0.0
@


1.107
log
@cargo.mk: centralize Darwin -install_name workaround.
@
text
@d1 1
a1 1
# $NetBSD: Makefile,v 1.106 2023/11/28 17:37:24 adam Exp $
d3 1
a3 1
DISTNAME=	cryptography-41.0.7
d14 1
a14 1
TOOL_DEPENDS+=	${PYPKGPREFIX}-setuptools-rust>=0.11.4:../../devel/py-setuptools-rust
d18 1
a18 1
TEST_DEPENDS+=	${PYPKGPREFIX}-iso8601-[0-9]*:../../time/py-iso8601
a21 1
TEST_DEPENDS+=	${PYPKGPREFIX}-test-subtests-[0-9]*:../../devel/py-test-subtests
@


1.106
log
@py-cryptography py-cryptography_vectors: updated to 41.0.7

41.0.7 - 2023-11-27

Fixed compilation when using LibreSSL 3.8.2.

41.0.6 - 2023-11-27

Fixed a null-pointer-dereference and segfault that could occur when loading certificates from a PKCS#7 bundle. Credit to pkuzco for reporting the issue. CVE-2023-49083
@
text
@d1 1
a1 1
# $NetBSD: Makefile,v 1.105 2023/10/25 08:38:07 adam Exp $
a35 7
.include "../../mk/bsd.prefs.mk"
.if ${OPSYS} == "Darwin"
post-install:
	install_name_tool -id ${PREFIX}/${PYSITELIB}/cryptography/hazmat/bindings/_rust.abi3.so \
	${DESTDIR}${PREFIX}/${PYSITELIB}/cryptography/hazmat/bindings/_rust.abi3.so
.endif

@


1.105
log
@py-cryptography py-cryptography_vectors: updated to 41.0.5

41.0.5 - 2023-10-24

Updated Windows, macOS, and Linux wheels to be compiled with OpenSSL 3.1.4.
Added a function to support an upcoming pyOpenSSL release.
@
text
@d1 1
a1 1
# $NetBSD: Makefile,v 1.104 2023/10/24 22:10:57 wiz Exp $
d3 1
a3 1
DISTNAME=	cryptography-41.0.5
d13 3
a15 1
TOOL_DEPENDS+=	${PYPKGPREFIX}-setuptools-rust-[0-9]*:../../devel/py-setuptools-rust
a19 1
TEST_DEPENDS+=	${PYPKGPREFIX}-test>=6.2.0:../../devel/py-test
a42 3
do-test:
	cd ${WRKSRC} && ${SETENV} ${TEST_ENV} pytest-${PYVERSSUFFIX} tests

d45 1
a45 1
.include "../../lang/python/egg.mk"
@


1.104
log
@*: bump for openssl 3
@
text
@d1 1
a1 1
# $NetBSD: Makefile,v 1.103 2023/09/20 07:35:08 adam Exp $
d3 1
a3 1
DISTNAME=	cryptography-41.0.4
a4 1
PKGREVISION=	1
@


1.103
log
@py-cryptography py-cryptography_vectors: updated to 41.0.4

41.0.4 - 2023-09-19

* Updated Windows, macOS, and Linux wheels to be compiled with OpenSSL 3.1.3.
@
text
@d1 1
a1 1
# $NetBSD: Makefile,v 1.102 2023/08/02 07:38:49 adam Exp $
d5 1
@


1.102
log
@py-cryptography py-cryptography_vectors: updated to 41.0.3

41.0.3 - 2023-08-01

* Fixed performance regression loading DH public keys.
* Fixed a memory leak when using
  :class:`~cryptography.hazmat.primitives.ciphers.aead.ChaCha20Poly1305`.
* Updated Windows, macOS, and Linux wheels to be compiled with OpenSSL 3.1.2.
@
text
@d1 1
a1 1
# $NetBSD: Makefile,v 1.101 2023/07/11 07:49:22 adam Exp $
d3 1
a3 1
DISTNAME=	cryptography-41.0.3
@


1.101
log
@py-cryptography py-cryptography_vectors: updated to 41.0.2

41.0.2 - 2023-07-10
~~~~~~~~~~~~~~~~~~~

* Fixed bugs in creating and parsing SSH certificates where critical options
  with values were handled incorrectly. Certificates are now created correctly
  and parsing accepts correct values as well as the previously generated
  invalid forms with a warning. In the next release, support for parsing these
  invalid forms will be removed.
@
text
@d1 1
a1 1
# $NetBSD: Makefile,v 1.100 2023/06/06 08:13:32 wiz Exp $
d3 1
a3 1
DISTNAME=	cryptography-41.0.2
@


1.100
log
@py-cryptography: update to 41.0.1.

41.0.1 - 2023-06-01
~~~~~~~~~~~~~~~~~~~

* Temporarily allow invalid ECDSA signature algorithm parameters in X.509
  certificates, which are generated by older versions of Java.
* Allow null bytes in pass phrases when serializing private keys.
@
text
@d1 1
a1 1
# $NetBSD: Makefile,v 1.99 2023/05/31 12:57:15 adam Exp $
d3 1
a3 1
DISTNAME=	cryptography-41.0.1
@


1.99
log
@py-cryptography py-cryptography_vectors: updated to 41.0.0

41.0.0 - 2023-05-30

BACKWARDS INCOMPATIBLE: Support for OpenSSL less than 1.1.1d has been removed. Users on older version of OpenSSL will need to upgrade.
BACKWARDS INCOMPATIBLE: Support for Python 3.6 has been removed.
BACKWARDS INCOMPATIBLE: Dropped support for LibreSSL < 3.6.
Updated the minimum supported Rust version (MSRV) to 1.56.0, from 1.48.0.
Updated Windows, macOS, and Linux wheels to be compiled with OpenSSL 3.1.1.
Added support for the :class:`~cryptography.x509.OCSPAcceptableResponses` OCSP extension.
Added support for the :class:`~cryptography.x509.MSCertificateTemplate` proprietary Microsoft certificate extension.
Implemented support for equality checks on all asymmetric public key types.
Added support for aes256-gcm@@openssh.com encrypted keys in :func:`~cryptography.hazmat.primitives.serialization.load_ssh_private_key`.
Added support for obtaining X.509 certificate signature algorithm parameters (including PSS) via :meth:`~cryptography.x509.Certificate.signature_algorithm_parameters`.
Support signing :class:`~cryptography.hazmat.primitives.asymmetric.padding.PSS` X.509 certificates via the new keyword-only argument rsa_padding on :meth:`~cryptography.x509.CertificateBuilder.sign`.
Added support for :class:`~cryptography.hazmat.primitives.ciphers.aead.ChaCha20Poly1305` on BoringSSL.
@
text
@d1 1
a1 1
# $NetBSD: Makefile,v 1.98 2023/04/20 10:43:16 tnn Exp $
d3 1
a3 1
DISTNAME=	cryptography-41.0.0
@


1.98
log
@py-cryptography: fix openssl rpath for rust code
@
text
@d1 1
a1 1
# $NetBSD: Makefile,v 1.97 2023/04/18 22:20:25 wiz Exp $
d3 1
a3 1
DISTNAME=	cryptography-40.0.2
@


1.97
log
@py-cryptography: explicitly set OPENSSL_DIR to fix build on NetBSD
@
text
@d1 1
a1 1
# $NetBSD: Makefile,v 1.96 2023/04/18 17:16:21 adam Exp $
d28 1
@


1.96
log
@py-cryptography py-cryptography_vectors: updated to 40.0.2

40.0.2 - 2023-04-14

* Fixed compilation when using LibreSSL 3.7.2.


40.0.1 - 2023-03-24

* Fixed a bug where certain operations would fail if an object happened to be
  in the top-half of the memory-space. This only impacted 32-bit systems.


40.0.0 - 2023-03-24

* **BACKWARDS INCOMPATIBLE:** As announced in the 39.0.0 changelog, the way
  ``cryptography`` links OpenSSL has changed. This only impacts users who
  build ``cryptography`` from source (i.e., not from a ``wheel``), and
  specify their own version of OpenSSL. For those users, the ``CFLAGS``,
  ``LDFLAGS``, ``INCLUDE``, ``LIB``, and ``CRYPTOGRAPHY_SUPPRESS_LINK_FLAGS``
  environment variables are no longer valid. Instead, users need to configure
  their builds `as documented here`_.
* Support for Python 3.6 is deprecated and will be removed in the next
  release.
* Deprecated the current minimum supported Rust version (MSRV) of 1.48.0.
  In the next release we will raise MSRV to 1.56.0. Users with the latest
  ``pip`` will typically get a wheel and not need Rust installed, but check
  :doc:`/installation` for documentation on installing a newer ``rustc`` if
  required.
* Deprecated support for OpenSSL less than 1.1.1d. The next release of
  ``cryptography`` will drop support for older versions.
* Deprecated support for DSA keys in
  :func:`~cryptography.hazmat.primitives.serialization.load_ssh_public_key`
  and
  :func:`~cryptography.hazmat.primitives.serialization.load_ssh_private_key`.
* Deprecated support for OpenSSH serialization in
  :class:`~cryptography.hazmat.primitives.asymmetric.dsa.DSAPublicKey`
  and
  :class:`~cryptography.hazmat.primitives.asymmetric.dsa.DSAPrivateKey`.
* The minimum supported version of PyPy3 is now 7.3.10.
* Updated Windows, macOS, and Linux wheels to be compiled with OpenSSL 3.1.0.
* Added support for parsing SSH certificates in addition to public keys with
  :func:`~cryptography.hazmat.primitives.serialization.load_ssh_public_identity`.
  :func:`~cryptography.hazmat.primitives.serialization.load_ssh_public_key`
  continues to support only public keys.
* Added support for generating SSH certificates with
  :class:`~cryptography.hazmat.primitives.serialization.SSHCertificateBuilder`.
* Added :meth:`~cryptography.x509.Certificate.verify_directly_issued_by` to
  :class:`~cryptography.x509.Certificate`.
* Added a check to :class:`~cryptography.x509.NameConstraints` to ensure that
  :class:`~cryptography.x509.DNSName` constraints do not contain any ``*``
  wildcards.
* Removed many unused CFFI OpenSSL bindings. This will not impact you unless
  you are using ``cryptography`` to directly invoke OpenSSL's C API. Note that
  these have never been considered a stable, supported, public API by
  ``cryptography``, this note is included as a courtesy.
* The X.509 builder classes now raise ``UnsupportedAlgorithm`` instead of
  ``ValueError`` if an unsupported hash algorithm is passed.
* Added public union type aliases for type hinting:

  * Asymmetric types:
    :const:`~cryptography.hazmat.primitives.asymmetric.types.PublicKeyTypes`,
    :const:`~cryptography.hazmat.primitives.asymmetric.types.PrivateKeyTypes`,
    :const:`~cryptography.hazmat.primitives.asymmetric.types.CertificatePublicKeyTypes`,
    :const:`~cryptography.hazmat.primitives.asymmetric.types.CertificateIssuerPublicKeyTypes`,
    :const:`~cryptography.hazmat.primitives.asymmetric.types.CertificateIssuerPrivateKeyTypes`.
  * SSH keys:
    :const:`~cryptography.hazmat.primitives.serialization.SSHPublicKeyTypes`,
    :const:`~cryptography.hazmat.primitives.serialization.SSHPrivateKeyTypes`,
    :const:`~cryptography.hazmat.primitives.serialization.SSHCertPublicKeyTypes`,
    :const:`~cryptography.hazmat.primitives.serialization.SSHCertPrivateKeyTypes`.
  * PKCS12:
    :const:`~cryptography.hazmat.primitives.serialization.pkcs12.PKCS12PrivateKeyTypes`
  * PKCS7:
    :const:`~cryptography.hazmat.primitives.serialization.pkcs7.PKCS7HashTypes`,
    :const:`~cryptography.hazmat.primitives.serialization.pkcs7.PKCS7PrivateKeyTypes`.
  * Two-factor:
    :const:`~cryptography.hazmat.primitives.twofactor.hotp.HOTPHashTypes`

* Deprecated previously undocumented but not private type aliases in the
  ``cryptography.hazmat.primitives.asymmetric.types`` module in favor of new
  ones above.
@
text
@d1 1
a1 1
# $NetBSD: Makefile,v 1.95 2023/03/03 10:12:56 adam Exp $
d27 1
@


1.95
log
@py-cryptography py-cryptography_vectors: updated to 39.0.2

39.0.2
Fixed a bug where the content type header was not properly encoded for PKCS7 signatures when using the Text option and SMIME encoding.
@
text
@d1 1
a1 1
# $NetBSD: Makefile,v 1.94 2023/02/08 10:20:20 adam Exp $
d3 1
a3 1
DISTNAME=	cryptography-39.0.2
d14 2
a15 4
DEPENDS+=	${PYPKGPREFIX}-cffi>=1.11.4:../../devel/py-cffi
DEPENDS+=	${PYPKGPREFIX}-six>=1.4.1:../../lang/py-six
TEST_DEPENDS+=	${PYPKGPREFIX}-cryptography_vectors-[0-9]*:../../security/py-cryptography_vectors
TEST_DEPENDS+=	${PYPKGPREFIX}-hypothesis>=3.79.3:../../devel/py-hypothesis
a17 1
TEST_DEPENDS+=	${PYPKGPREFIX}-pytz-[0-9]*:../../time/py-pytz
d20 1
d22 1
d25 1
a25 1

@


1.94
log
@py-cryptography py-cryptography_vectors: updated to 39.0.1

39.0.1

SECURITY ISSUE - Fixed a bug where Cipher.update_into accepted Python buffer protocol objects, but allowed immutable buffers. CVE-2023-23931
Updated Windows, macOS, and Linux wheels to be compiled with OpenSSL 3.0.8.
@
text
@d1 1
a1 1
# $NetBSD: Makefile,v 1.93 2023/01/11 10:17:19 adam Exp $
d3 1
a3 1
DISTNAME=	cryptography-39.0.1
@


1.93
log
@py-cryptography py-cryptography_vectors: updated to 39.0.0

39.0.0 - 2023-01-01

* **BACKWARDS INCOMPATIBLE:** Support for OpenSSL 1.1.0 has been removed.
  Users on older version of OpenSSL will need to upgrade.
* **BACKWARDS INCOMPATIBLE:** Dropped support for LibreSSL < 3.5. The new
  minimum LibreSSL version is 3.5.0. Going forward our policy is to support
  versions of LibreSSL that are available in versions of OpenBSD that are
  still receiving security support.
* **BACKWARDS INCOMPATIBLE:** Removed the ``encode_point`` and
  ``from_encoded_point`` methods on
  :class:`~cryptography.hazmat.primitives.asymmetric.ec.EllipticCurvePublicNumbers`,
  which had been deprecated for several years.
  :meth:`~cryptography.hazmat.primitives.asymmetric.ec.EllipticCurvePublicKey.public_bytes`
  and
  :meth:`~cryptography.hazmat.primitives.asymmetric.ec.EllipticCurvePublicKey.from_encoded_point`
  should be used instead.
* **BACKWARDS INCOMPATIBLE:** Support for using MD5 or SHA1 in
  :class:`~cryptography.x509.CertificateBuilder`, other X.509 builders, and
  PKCS7 has been removed.
* **BACKWARDS INCOMPATIBLE:** Dropped support for macOS 10.10 and 10.11, macOS
  users must upgrade to 10.12 or newer.
* **ANNOUNCEMENT:** The next version of ``cryptography`` (40.0) will change
  the way we link OpenSSL. This will only impact users who build
  ``cryptography`` from source (i.e., not from a ``wheel``), and specify their
  own version of OpenSSL. For those users, the ``CFLAGS``, ``LDFLAGS``,
  ``INCLUDE``, ``LIB``, and ``CRYPTOGRAPHY_SUPPRESS_LINK_FLAGS`` environment
  variables will no longer be respected. Instead, users will need to
  configure their builds `as documented here`_.
* Added support for
  :ref:`disabling the legacy provider in OpenSSL 3.0.x<legacy-provider>`.
* Added support for disabling RSA key validation checks when loading RSA
  keys via
  :func:`~cryptography.hazmat.primitives.serialization.load_pem_private_key`,
  :func:`~cryptography.hazmat.primitives.serialization.load_der_private_key`,
  and
  :meth:`~cryptography.hazmat.primitives.asymmetric.rsa.RSAPrivateNumbers.private_key`.
  This speeds up key loading but is :term:`unsafe` if you are loading potentially
  attacker supplied keys.
* Significantly improved performance for
  :class:`~cryptography.hazmat.primitives.ciphers.aead.ChaCha20Poly1305`
  when repeatedly calling ``encrypt`` or ``decrypt`` with the same key.
* Added support for creating OCSP requests with precomputed hashes using
  :meth:`~cryptography.x509.ocsp.OCSPRequestBuilder.add_certificate_by_hash`.
* Added support for loading multiple PEM-encoded X.509 certificates from
  a single input via :func:`~cryptography.x509.load_pem_x509_certificates`.
@
text
@d1 1
a1 1
# $NetBSD: Makefile,v 1.92 2022/11/28 08:49:08 adam Exp $
d3 1
a3 1
DISTNAME=	cryptography-39.0.0
@


1.92
log
@py-cryptography py-cryptography_vectors: updated to 38.0.4

38.0.4 - 2022-11-27

Fixed compilation when using LibreSSL 3.6.0.
Fixed error when using py2app to build an application with a cryptography dependency.
@
text
@d1 1
a1 1
# $NetBSD: Makefile,v 1.91 2022/11/02 08:41:16 adam Exp $
d3 1
a3 1
DISTNAME=	cryptography-38.0.4
@


1.91
log
@py-cryptography: updated to 38.0.3

38.0.3 - 2022-11-01
~~~~~~~~~~~~~~~~~~~
* Updated Windows, macOS, and Linux wheels to be compiled with OpenSSL 3.0.7,
  which resolves *CVE-2022-3602* and *CVE-2022-3786*.


38.0.2 - 2022-10-11
~~~~~~~~~~~~~~~~~~~
This release was subsequently yanked from PyPI due to a regression in OpenSSL.

* Updated Windows, macOS, and Linux wheels to be compiled with OpenSSL 3.0.6.
@
text
@d1 1
a1 1
# $NetBSD: Makefile,v 1.90 2022/09/08 05:08:52 adam Exp $
d3 1
a3 1
DISTNAME=	cryptography-38.0.3
d13 1
a13 1
BUILD_DEPENDS+=	${PYPKGPREFIX}-setuptools-rust-[0-9]*:../../devel/py-setuptools-rust
@


1.90
log
@py-cryptography py-cryptography_vectors: updated to 38.0.1

38.0.1
* Fixed parsing TLVs in ASN.1 with length greater than 65535 bytes (typically
  seen in large CRLs).
@
text
@d1 1
a1 1
# $NetBSD: Makefile,v 1.89 2022/09/07 08:04:18 adam Exp $
d3 1
a3 1
DISTNAME=	cryptography-38.0.1
@


1.89
log
@py-cryptography py-cryptography_vectors: updated to 38.0.0

38.0.0 - 2022-09-06
~~~~~~~~~~~~~~~~~~~

* Final deprecation of OpenSSL 1.1.0. The next release of ``cryptography``
  will drop support.
* We no longer ship ``manylinux2010`` wheels. Users should upgrade to the
  latest ``pip`` to ensure this doesn't cause issues downloading wheels on
  their platform. We now ship ``manylinux_2_28`` wheels for users on new
  enough platforms.
* Updated the minimum supported Rust version (MSRV) to 1.48.0, from 1.41.0.
  Users with the latest ``pip`` will typically get a wheel and not need Rust
  installed, but check :doc:`/installation` for documentation on installing a
  newer ``rustc`` if required.
* :meth:`~cryptography.fernet.Fernet.decrypt` and related methods now accept
  both ``str`` and ``bytes`` tokens.
* Parsing ``CertificateSigningRequest`` restores the behavior of enforcing
  that the ``Extension`` ``critical`` field must be correctly encoded DER. See
  `the issue <https://github.com/pyca/cryptography/issues/6368>`_ for complete
  details.
* Added two new OpenSSL functions to the bindings to support an upcoming
  ``pyOpenSSL`` release.
* When parsing :class:`~cryptography.x509.CertificateRevocationList` and
  :class:`~cryptography.x509.CertificateSigningRequest` values, it is now
  enforced that the ``version`` value in the input must be valid according to
  the rules of :rfc:`2986` and :rfc:`5280`.
* Using MD5 or SHA1 in :class:`~cryptography.x509.CertificateBuilder` and
  other X.509 builders is deprecated and support will be removed in the next
  version.
* Added additional APIs to
  :class:`~cryptography.x509.certificate_transparency.SignedCertificateTimestamp`, including
  :attr:`~cryptography.x509.certificate_transparency.SignedCertificateTimestamp.signature_hash_algorithm`,
  :attr:`~cryptography.x509.certificate_transparency.SignedCertificateTimestamp.signature_algorithm`,
  :attr:`~cryptography.x509.certificate_transparency.SignedCertificateTimestamp.signature`, and
  :attr:`~cryptography.x509.certificate_transparency.SignedCertificateTimestamp.extension_bytes`.
* Added :attr:`~cryptography.x509.Certificate.tbs_precertificate_bytes`, allowing
  users to access the to-be-signed pre-certificate data needed for signed
  certificate timestamp verification.
* :class:`~cryptography.hazmat.primitives.kdf.kbkdf.KBKDFHMAC` and
  :class:`~cryptography.hazmat.primitives.kdf.kbkdf.KBKDFCMAC` now support
  :attr:`~cryptography.hazmat.primitives.kdf.kbkdf.CounterLocation.MiddleFixed`
  counter location.
* Fixed :rfc:`4514` name parsing to reverse the order of the RDNs according
  to the section 2.1 of the RFC, affecting method
  :meth:`~cryptography.x509.Name.from_rfc4514_string`.
* It is now possible to customize some aspects of encryption when serializing
  private keys, using
  :meth:`~cryptography.hazmat.primitives.serialization.PrivateFormat.encryption_builder`.
* Removed several legacy symbols from our OpenSSL bindings. Users of pyOpenSSL
  versions older than 22.0 will need to upgrade.
* Added
  :class:`~cryptography.hazmat.primitives.ciphers.algorithms.AES128` and
  :class:`~cryptography.hazmat.primitives.ciphers.algorithms.AES256` classes.
  These classes do not replace
  :class:`~cryptography.hazmat.primitives.ciphers.algorithms.AES` (which
  allows all AES key lengths), but are intended for applications where
  developers want to be explicit about key length.
@
text
@d1 1
a1 1
# $NetBSD: Makefile,v 1.88 2022/07/09 18:18:00 gutteridge Exp $
d3 1
a3 1
DISTNAME=	cryptography-38.0.0
@


1.88
log
@py-cryptography: fix Rust build dependency specification

As noted by Robert Swindells on pkgsrc-users@@, we should not be directly
specifying lang/rust as a build dependency, as this will prevent builds
where rust-bin is preferred to select it accordingly. All this is
already handled in rust.mk, which is pulled in via cargo.mk.
@
text
@d1 1
a1 1
# $NetBSD: Makefile,v 1.87 2022/07/05 18:07:38 adam Exp $
d3 1
a3 1
DISTNAME=	cryptography-37.0.4
d42 1
a42 1
	cd ${WRKSRC} && ${SETENV} ${TEST_ENV} pytest-${PYVERSSUFFIX}
@


1.87
log
@py-cryptography py-cryptography_vectors: updated too 37.0.4

37.0.4 - 2022-07-05
* Updated Windows, macOS, and Linux wheels to be compiled with OpenSSL 3.0.5.

37.0.3 - 2022-06-21
* Updated Windows, macOS, and Linux wheels to be compiled with OpenSSL 3.0.4.
@
text
@d1 1
a1 1
# $NetBSD: Makefile,v 1.86 2022/07/03 10:51:05 wiz Exp $
a13 1
BUILD_DEPENDS+=	rust>=1.41:../../lang/rust
@


1.86
log
@py-cryptography: update to 37.0.2.

Based mostly on work by adam@@ in wip.

.. _v37-0-2:

37.0.2 - 2022-05-03
~~~~~~~~~~~~~~~~~~~

* Updated Windows, macOS, and Linux wheels to be compiled with OpenSSL 3.0.3.
* Added a constant needed for an upcoming pyOpenSSL release.

.. _v37-0-1:

37.0.1 - 2022-04-27
~~~~~~~~~~~~~~~~~~~

* Fixed an issue where parsing an encrypted private key with the public
  loader functions would hang waiting for console input on OpenSSL 3.0.x rather
  than raising an error.
* Restored some legacy symbols for older ``pyOpenSSL`` users. These will be
  removed again in the future, so ``pyOpenSSL`` users should still upgrade
  to the latest version of that package when they upgrade ``cryptography``.

.. _v37-0-0:

37.0.0 - 2022-04-26
~~~~~~~~~~~~~~~~~~~

* Updated Windows, macOS, and Linux wheels to be compiled with OpenSSL 3.0.2.
* **BACKWARDS INCOMPATIBLE:** Dropped support for LibreSSL 2.9.x and 3.0.x.
  The new minimum LibreSSL version is 3.1+.
* **BACKWARDS INCOMPATIBLE:** Removed ``signer`` and ``verifier`` methods
  from the public key and private key classes. These methods were originally
  deprecated in version 2.0, but had an extended deprecation timeline due
  to usage. Any remaining users should transition to ``sign`` and ``verify``.
* Deprecated OpenSSL 1.1.0 support. OpenSSL 1.1.0 is no longer supported by
  the OpenSSL project. The next release of ``cryptography`` will be the last
  to support compiling with OpenSSL 1.1.0.
* Deprecated Python 3.6 support. Python 3.6 is no longer supported by the
  Python core team. Support for Python 3.6 will be removed in a future
  ``cryptography`` release.
* Deprecated the current minimum supported Rust version (MSRV) of 1.41.0.
  In the next release we will raise MSRV to 1.48.0. Users with the latest
  ``pip`` will typically get a wheel and not need Rust installed, but check
  :doc:`/installation` for documentation on installing a newer ``rustc`` if
  required.
* Deprecated
  :class:`~cryptography.hazmat.primitives.ciphers.algorithms.CAST5`,
  :class:`~cryptography.hazmat.primitives.ciphers.algorithms.SEED`,
  :class:`~cryptography.hazmat.primitives.ciphers.algorithms.IDEA`, and
  :class:`~cryptography.hazmat.primitives.ciphers.algorithms.Blowfish` because
  they are legacy algorithms with extremely low usage. These will be removed
  in a future version of ``cryptography``.
* Added limited support for distinguished names containing a bit string.
* We now ship ``universal2`` wheels on macOS, which contain both ``arm64``
  and ``x86_64`` architectures. Users on macOS should upgrade to the latest
  ``pip`` to ensure they can use this wheel, although we will continue to
  ship ``x86_64`` specific wheels for now to ease the transition.
* This will be the final release for which we ship ``manylinux2010`` wheels.
  Going forward the minimum supported ``manylinux`` ABI for our wheels will
  be ``manylinux2014``. The vast majority of users will continue to receive
  ``manylinux`` wheels provided they have an up to date ``pip``. For PyPy
  wheels this release already requires ``manylinux2014`` for compatibility
  with binaries distributed by upstream.
* Added support for multiple
  :class:`~cryptography.x509.ocsp.OCSPSingleResponse` in a
  :class:`~cryptography.x509.ocsp.OCSPResponse`.
* Restored support for signing certificates and other structures in
  :doc:`/x509/index` with SHA3 hash algorithms.
* :class:`~cryptography.hazmat.primitives.ciphers.algorithms.TripleDES` is
  disabled in FIPS mode.
* Added support for serialization of PKCS#12 CA friendly names/aliases in
  :func:`~cryptography.hazmat.primitives.serialization.pkcs12.serialize_key_and_certificates`
* Added support for 12-15 byte (96 to 120 bit) nonces to
  :class:`~cryptography.hazmat.primitives.ciphers.aead.AESOCB3`. This class
  previously supported only 12 byte (96 bit).
* Added support for
  :class:`~cryptography.hazmat.primitives.ciphers.aead.AESSIV` when using
  OpenSSL 3.0.0+.
* Added support for serializing PKCS7 structures from a list of
  certificates with
  :class:`~cryptography.hazmat.primitives.serialization.pkcs7.serialize_certificates`.
* Added support for parsing :rfc:`4514` strings with
  :meth:`~cryptography.x509.Name.from_rfc4514_string`.
* Added :attr:`~cryptography.hazmat.primitives.asymmetric.padding.PSS.AUTO` to
  :class:`~cryptography.hazmat.primitives.asymmetric.padding.PSS`. This can
  be used to verify a signature where the salt length is not already known.
* Added :attr:`~cryptography.hazmat.primitives.asymmetric.padding.PSS.DIGEST_LENGTH`
  to :class:`~cryptography.hazmat.primitives.asymmetric.padding.PSS`. This
  constant will set the salt length to the same length as the ``PSS`` hash
  algorithm.
* Added support for loading RSA-PSS key types with
  :func:`~cryptography.hazmat.primitives.serialization.load_pem_private_key`
  and
  :func:`~cryptography.hazmat.primitives.serialization.load_der_private_key`.
  This functionality is limited to OpenSSL 1.1.1e+ and loads the key as a
  normal RSA private key, discarding the PSS constraint information.

.. _v36-0-2:

36.0.2 - 2022-03-15
~~~~~~~~~~~~~~~~~~~

* Updated Windows, macOS, and Linux wheels to be compiled with OpenSSL 1.1.1n.

.. _v36-0-1:

36.0.1 - 2021-12-14
~~~~~~~~~~~~~~~~~~~

* Updated Windows, macOS, and Linux wheels to be compiled with OpenSSL 1.1.1m.

.. _v36-0-0:

36.0.0 - 2021-11-21
~~~~~~~~~~~~~~~~~~~

* **FINAL DEPRECATION** Support for ``verifier`` and ``signer`` on our
  asymmetric key classes was deprecated in version 2.0. These functions had an
  extended deprecation due to usage, however the next version of
  ``cryptography`` will drop support. Users should migrate to ``sign`` and
  ``verify``.
* The entire :doc:`/x509/index` layer is now written in Rust. This allows
  alternate asymmetric key implementations that can support cloud key
  management services or hardware security modules provided they implement
  the necessary interface (for example:
  :class:`~cryptography.hazmat.primitives.asymmetric.ec.EllipticCurvePrivateKey`).
* :ref:`Deprecated the backend argument<faq-missing-backend>` for all
  functions.
* Added support for
  :class:`~cryptography.hazmat.primitives.ciphers.aead.AESOCB3`.
* Added support for iterating over arbitrary request
  :attr:`~cryptography.x509.CertificateSigningRequest.attributes`.
* Deprecated the ``get_attribute_for_oid`` method on
  :class:`~cryptography.x509.CertificateSigningRequest` in favor of
  :meth:`~cryptography.x509.Attributes.get_attribute_for_oid` on the new
  :class:`~cryptography.x509.Attributes` object.
* Fixed handling of PEM files to allow loading when certificate and key are
  in the same file.
* Fixed parsing of :class:`~cryptography.x509.CertificatePolicies` extensions
  containing legacy ``BMPString`` values in their ``explicitText``.
* Allow parsing of negative serial numbers in certificates. Negative serial
  numbers are prohibited by :rfc:`5280` so a deprecation warning will be
  raised whenever they are encountered. A future version of ``cryptography``
  will drop support for parsing them.
* Added support for parsing PKCS12 files with friendly names for all
  certificates with
  :func:`~cryptography.hazmat.primitives.serialization.pkcs12.load_pkcs12`,
  which will return an object of type
  :class:`~cryptography.hazmat.primitives.serialization.pkcs12.PKCS12KeyAndCertificates`.
* :meth:`~cryptography.x509.Name.rfc4514_string` and related methods now have
  an optional ``attr_name_overrides`` parameter to supply custom OID to name
  mappings, which can be used to match vendor-specific extensions.
* **BACKWARDS INCOMPATIBLE:** Reverted the nonstandard formatting of
  email address fields as ``E`` in
  :meth:`~cryptography.x509.Name.rfc4514_string` methods from version 35.0.

  The previous behavior can be restored with:
  ``name.rfc4514_string({NameOID.EMAIL_ADDRESS: "E"})``
* Allow
  :class:`~cryptography.hazmat.primitives.asymmetric.x25519.X25519PublicKey`
  and
  :class:`~cryptography.hazmat.primitives.asymmetric.x448.X448PublicKey` to
  be used as public keys when parsing certificates or creating them with
  :class:`~cryptography.x509.CertificateBuilder`. These key types must be
  signed with a different signing algorithm as ``X25519`` and ``X448`` do
  not support signing.
* Extension values can now be serialized to a DER byte string by calling
  :func:`~cryptography.x509.ExtensionType.public_bytes`.
* Added experimental support for compiling against BoringSSL. As BoringSSL
  does not commit to a stable API, ``cryptography`` tests against the
  latest commit only. Please note that several features are not available
  when building against BoringSSL.
* Parsing ``CertificateSigningRequest`` from DER and PEM now, for a limited
  time period, allows the ``Extension`` ``critical`` field to be incorrectly
  encoded. See `the issue <https://github.com/pyca/cryptography/issues/6368>`_
  for complete details. This will be reverted in a future ``cryptography``
  release.
* When :class:`~cryptography.x509.OCSPNonce` are parsed and generated their
  value is now correctly wrapped in an ASN.1 ``OCTET STRING``. This conforms
  to :rfc:`6960` but conflicts with the original behavior specified in
  :rfc:`2560`. For a temporary period for backwards compatibility, we will
  also parse values that are encoded as specified in :rfc:`2560` but this
  behavior will be removed in a future release.

.. _v35-0-0:

35.0.0 - 2021-09-29
~~~~~~~~~~~~~~~~~~~

* Changed the :ref:`version scheme <api-stability:versioning>`. This will
  result in us incrementing the major version more frequently, but does not
  change our existing backwards compatibility policy.
* **BACKWARDS INCOMPATIBLE:** The :doc:`/x509/index` PEM parsers now require
  that the PEM string passed have PEM delimiters of the correct type. For
  example, parsing a private key PEM concatenated with a certificate PEM will
  no longer be accepted by the PEM certificate parser.
* **BACKWARDS INCOMPATIBLE:** The X.509 certificate parser no longer allows
  negative serial numbers. :rfc:`5280` has always prohibited these.
* **BACKWARDS INCOMPATIBLE:** Additional forms of invalid ASN.1 found during
  :doc:`/x509/index` parsing will raise an error on initial parse rather than
  when the malformed field is accessed.
* Rust is now required for building ``cryptography``, the
  ``CRYPTOGRAPHY_DONT_BUILD_RUST`` environment variable is no longer
  respected.
* Parsers for :doc:`/x509/index` no longer use OpenSSL and have been
  rewritten in Rust. This should be backwards compatible (modulo the items
  listed above) and improve both security and performance.
* Added support for OpenSSL 3.0.0 as a compilation target.
* Added support for
  :class:`~cryptography.hazmat.primitives.hashes.SM3` and
  :class:`~cryptography.hazmat.primitives.ciphers.algorithms.SM4`,
  when using OpenSSL 1.1.1. These algorithms are provided for compatibility
  in regions where they may be required, and are not generally recommended.
* We now ship ``manylinux_2_24`` and ``musllinux_1_1`` wheels, in addition to
  our ``manylinux2010`` and ``manylinux2014`` wheels. Users on distributions
  like Alpine Linux should ensure they upgrade to the latest ``pip`` to
  correctly receive wheels.
* Added ``rfc4514_attribute_name`` attribute to :attr:`x509.NameAttribute
  <cryptography.x509.NameAttribute.rfc4514_attribute_name>`.
* Added :class:`~cryptography.hazmat.primitives.kdf.kbkdf.KBKDFCMAC`.

.. _v3-4-8:

3.4.8 - 2021-08-24
~~~~~~~~~~~~~~~~~~

* Updated Windows, macOS, and ``manylinux`` wheels to be compiled with
  OpenSSL 1.1.1l.

.. _v3-4-7:

3.4.7 - 2021-03-25
~~~~~~~~~~~~~~~~~~

* Updated Windows, macOS, and ``manylinux`` wheels to be compiled with
  OpenSSL 1.1.1k.

.. _v3-4-6:

3.4.6 - 2021-02-16
~~~~~~~~~~~~~~~~~~

* Updated Windows, macOS, and ``manylinux`` wheels to be compiled with
  OpenSSL 1.1.1j.

.. _v3-4-5:

3.4.5 - 2021-02-13
~~~~~~~~~~~~~~~~~~

* Various improvements to type hints.
* Lower the minimum supported Rust version (MSRV) to >=1.41.0. This change
  improves compatibility with system-provided Rust on several Linux
  distributions.
* ``cryptography`` will be switching to a new versioning scheme with its next
  feature release. More information is available in our
  :doc:`/api-stability` documentation.

.. _v3-4-4:

3.4.4 - 2021-02-09
~~~~~~~~~~~~~~~~~~

* Added a ``py.typed`` file so that ``mypy`` will know to use our type
  annotations.
* Fixed an import cycle that could be triggered by certain import sequences.

.. _v3-4-3:

3.4.3 - 2021-02-08
~~~~~~~~~~~~~~~~~~

* Specify our supported Rust version (>=1.45.0) in our ``setup.py`` so users
  on older versions will get a clear error message.

.. _v3-4-2:

3.4.2 - 2021-02-08
~~~~~~~~~~~~~~~~~~

* Improvements to make the rust transition a bit easier. This includes some
  better error messages and small dependency fixes. If you experience
  installation problems **Be sure to update pip** first, then check the
  :doc:`FAQ </faq>`.

.. _v3-4-1:

3.4.1 - 2021-02-07
~~~~~~~~~~~~~~~~~~

* Fixed a circular import issue.
* Added additional debug output to assist users seeing installation errors
  due to outdated ``pip`` or missing ``rustc``.

.. _v3-4:

3.4 - 2021-02-07
~~~~~~~~~~~~~~~~

* **BACKWARDS INCOMPATIBLE:** Support for Python 2 has been removed.
* We now ship ``manylinux2014`` wheels and no longer ship ``manylinux1``
  wheels. Users should upgrade to the latest ``pip`` to ensure this doesn't
  cause issues downloading wheels on their platform.
* ``cryptography`` now incorporates Rust code. Users building ``cryptography``
  themselves will need to have the Rust toolchain installed. Users who use an
  officially produced wheel will not need to make any changes. The minimum
  supported Rust version is 1.45.0.
* ``cryptography`` now has :pep:`484` type hints on nearly all of of its public
  APIs. Users can begin using them to type check their code with ``mypy``.
@
text
@d1 1
a1 1
# $NetBSD: Makefile,v 1.84 2022/01/04 20:54:40 wiz Exp $
d3 1
a3 1
DISTNAME=	cryptography-37.0.2
d18 1
a18 1
TEST_DEPENDS+=	${PYPKGPREFIX}-hypothesis-[0-9]*:../../devel/py-hypothesis
d22 3
a24 1
TEST_DEPENDS+=	${PYPKGPREFIX}-test-[0-9]*:../../devel/py-test
@


1.85
log
@py-cryptography: make python 3.x only
@
text
@d3 1
a3 1
DISTNAME=	cryptography-3.3.2
a4 1
PKGREVISION=	1
d13 2
d18 1
d23 4
a26 1
TEST_DEPENDS+=	${PYPKGPREFIX}-hypothesis-[0-9]*:../../devel/py-hypothesis
d30 10
d41 3
a43 1
	cd ${WRKSRC} && pytest-${PYVERSSUFFIX}
d46 1
@


1.84
log
@*: bump PKGREVISION for egg.mk users

They now have a tool dependency on py-setuptools instead of a DEPENDS
@
text
@d1 1
a1 1
# $NetBSD: Makefile,v 1.83 2021/02/08 06:08:02 adam Exp $
d20 2
d23 1
a23 8
PYTHON_VERSIONED_DEPENDENCIES=	test:test
PYTHON_VERSIONED_DEPENDENCIES+=	hypothesis:test

.include "../../lang/python/pyversion.mk"
.if ${_PYTHON_VERSION} == 27
DEPENDS+=	${PYPKGPREFIX}-enum34-[0-9]*:../../devel/py-enum34
DEPENDS+=	${PYPKGPREFIX}-ipaddress-[0-9]*:../../net/py-ipaddress
.endif
a28 1
.include "../../lang/python/versioned_dependencies.mk"
@


1.83
log
@py-cryptography, py-cryptography_vectors: updated to 3.3.2

3.3.2:
SECURITY ISSUE: Fixed a bug where certain sequences of update() calls when symmetrically encrypting very large payloads (>2GB) could result in an integer overflow, leading to buffer overflows. CVE-2020-36242
@
text
@d1 1
a1 1
# $NetBSD: Makefile,v 1.82 2020/12/14 07:31:18 adam Exp $
d5 1
@


1.82
log
@py-cryptography py-cryptography_vectors: updated to 3.3.1

3.3.1:
* Re-added a legacy symbol causing problems for older ``pyOpenSSL`` users.

3.3:
* **BACKWARDS INCOMPATIBLE:** Support for Python 3.5 has been removed due to
  low usage and maintenance burden.
* **BACKWARDS INCOMPATIBLE:** The
  :class:`~cryptography.hazmat.primitives.ciphers.modes.GCM` and
  :class:`~cryptography.hazmat.primitives.ciphers.aead.AESGCM` now require
  64-bit to 1024-bit (8 byte to 128 byte) initialization vectors. This change
  is to conform with an upcoming OpenSSL release that will no longer support
  sizes outside this window.
* **BACKWARDS INCOMPATIBLE:** When deserializing asymmetric keys we now
  raise ``ValueError`` rather than ``UnsupportedAlgorithm`` when an
  unsupported cipher is used. This change is to conform with an upcoming
  OpenSSL release that will no longer distinguish between error types.
* **BACKWARDS INCOMPATIBLE:** We no longer allow loading of finite field
  Diffie-Hellman parameters of less than 512 bits in length. This change is to
  conform with an upcoming OpenSSL release that no longer supports smaller
  sizes. These keys were already wildly insecure and should not have been used
  in any application outside of testing.
* Updated Windows, macOS, and ``manylinux`` wheels to be compiled with
  OpenSSL 1.1.1i.
* Python 2 support is deprecated in ``cryptography``. This is the last release
  that will support Python 2.
* Added the
  :meth:`~cryptography.hazmat.primitives.asymmetric.rsa.RSAPublicKey.recover_data_from_signature`
  function to
  :class:`~cryptography.hazmat.primitives.asymmetric.rsa.RSAPublicKey`
  for recovering the signed data from an RSA signature.
@
text
@d1 1
a1 1
# $NetBSD: Makefile,v 1.81 2020/11/24 08:56:55 adam Exp $
d3 1
a3 1
DISTNAME=	cryptography-3.3.1
@


1.81
log
@py-cryptography py-cryptography_vectors: updated to 3.2.1

3.2.1 - 2020-10-27

Disable blinding on RSA public keys to address an error with some versions of OpenSSL.

3.2 - 2020-10-25

SECURITY ISSUE: Attempted to make RSA PKCS#1v1.5 decryption more constant time, to protect against Bleichenbacher vulnerabilities. Due to limitations imposed by our API, we cannot completely mitigate this vulnerability and a future release will contain a new API which is designed to be resilient to these for contexts where it is required. Credit to Hubert Kario for reporting the issue. CVE-2020-25659
Support for OpenSSL 1.0.2 has been removed. Users on older version of OpenSSL will need to upgrade.
Added basic support for PKCS7 signing (including SMIME) via :class:`~cryptography.hazmat.primitives.serialization.pkcs7.PKCS7SignatureBuilder`.

3.1.1 - 2020-09-22

Updated Windows, macOS, and manylinux wheels to be compiled with OpenSSL 1.1.1h.

3.1 - 2020-08-26

BACKWARDS INCOMPATIBLE: Removed support for idna based :term:`U-label` parsing in various X.509 classes. This support was originally deprecated in version 2.1 and moved to an extra in 2.5.
Deprecated OpenSSL 1.0.2 support. OpenSSL 1.0.2 is no longer supported by the OpenSSL project. The next version of cryptography will drop support for it.
Deprecated support for Python 3.5. This version sees very little use and will be removed in the next release.
backend arguments to functions are no longer required and the default backend will automatically be selected if no backend is provided.
Added initial support for parsing certificates from PKCS7 files with :func:`~cryptography.hazmat.primitives.serialization.pkcs7.load_pem_pkcs7_certificates` and :func:`~cryptography.hazmat.primitives.serialization.pkcs7.load_der_pkcs7_certificates` .
Calling update or update_into on :class:`~cryptography.hazmat.primitives.ciphers.CipherContext` with data longer than 231 bytes no longer raises an OverflowError. This also resolves the same issue in :doc:`/fernet`.
3.0 - 2020-07-20

BACKWARDS INCOMPATIBLE: Removed support for passing an :class:`~cryptography.x509.Extension` instance to :meth:`~cryptography.x509.AuthorityKeyIdentifier.from_issuer_subject_key_identifier`, as per our deprecation policy.

BACKWARDS INCOMPATIBLE: Support for LibreSSL 2.7.x, 2.8.x, and 2.9.0 has been removed (2.9.1+ is still supported).

BACKWARDS INCOMPATIBLE: Dropped support for macOS 10.9, macOS users must upgrade to 10.10 or newer.

BACKWARDS INCOMPATIBLE: RSA :meth:`~cryptography.hazmat.primitives.asymmetric.rsa.generate_private_key` no longer accepts public_exponent values except 65537 and 3 (the latter for legacy purposes).

BACKWARDS INCOMPATIBLE: X.509 certificate parsing now enforces that the version field contains a valid value, rather than deferring this check until :attr:`~cryptography.x509.Certificate.version` is accessed.

Deprecated support for Python 2. At the time there is no time table for actually dropping support, however we strongly encourage all users to upgrade their Python, as Python 2 no longer receives support from the Python core team.

If you have trouble suppressing this warning in tests view the :ref:`FAQ entry addressing this issue <faq-howto-handle-deprecation-warning>`.

Added support for OpenSSH serialization format for ec, ed25519, rsa and dsa private keys: :func:`~cryptography.hazmat.primitives.serialization.load_ssh_private_key` for loading and :attr:`~cryptography.hazmat.primitives.serialization.PrivateFormat.OpenSSH` for writing.

Added support for OpenSSH certificates to :func:`~cryptography.hazmat.primitives.serialization.load_ssh_public_key`.

Added :meth:`~cryptography.fernet.Fernet.encrypt_at_time` and :meth:`~cryptography.fernet.Fernet.decrypt_at_time` to :class:`~cryptography.fernet.Fernet`.

Added support for the :class:`~cryptography.x509.SubjectInformationAccess` X.509 extension.

Added support for parsing :class:`~cryptography.x509.SignedCertificateTimestamps` in OCSP responses.

Added support for parsing attributes in certificate signing requests via :meth:`~cryptography.x509.CertificateSigningRequest.get_attribute_for_oid`.

Added support for encoding attributes in certificate signing requests via :meth:`~cryptography.x509.CertificateSigningRequestBuilder.add_attribute`.

On OpenSSL 1.1.1d and higher cryptography now uses OpenSSL's built-in CSPRNG instead of its own OS random engine because these versions of OpenSSL properly reseed on fork.

Added initial support for creating PKCS12 files with :func:`~cryptography.hazmat.primitives.serialization.pkcs12.serialize_key_and_certificates`.
@
text
@d1 1
a1 1
# $NetBSD: Makefile,v 1.80 2020/10/06 10:51:22 wiz Exp $
d3 1
a3 1
DISTNAME=	cryptography-3.2.1
@


1.80
log
@*: use py-hypothesis via versioned_dependencies.mk
@
text
@d1 1
a1 1
# $NetBSD: Makefile,v 1.79 2020/05/17 19:34:12 adam Exp $
d3 1
a3 1
DISTNAME=	cryptography-2.9.2
a12 1
DEPENDS+=	${PYPKGPREFIX}-asn1crypto>=0.21.0:../../security/py-asn1crypto
a13 2
DEPENDS+=	${PYPKGPREFIX}-cparser>=2.10:../../devel/py-cparser
DEPENDS+=	${PYPKGPREFIX}-idna>=2.1:../../www/py-idna
@


1.79
log
@pytest from versioned depends
@
text
@d1 1
a1 1
# $NetBSD: Makefile,v 1.78 2020/04/23 05:49:00 adam Exp $
a18 1
TEST_DEPENDS+=	${PYPKGPREFIX}-hypothesis>=1.11.4:../../devel/py-hypothesis
d24 1
@


1.78
log
@py-cryptography py-cryptography_vectors: updated to 2.9.2

2.9.2:
* Updated the macOS wheel to fix an issue where it would not run on macOS
  versions older than 10.15.
@
text
@d1 1
a1 1
# $NetBSD: Makefile,v 1.77 2020/04/22 07:20:20 adam Exp $
d23 2
a24 1
TEST_DEPENDS+=	${PYPKGPREFIX}-test>=3.9.3:../../devel/py-test
d36 1
@


1.77
log
@py-cryptography py-cryptography_vectors: updated to 2.9.1

2.9.1:
* Updated Windows, macOS, and ``manylinux`` wheels to be compiled with
  OpenSSL 1.1.1g.
@
text
@d1 1
a1 1
# $NetBSD: Makefile,v 1.76 2020/04/03 06:25:50 adam Exp $
d3 1
a3 1
DISTNAME=	cryptography-2.9.1
@


1.76
log
@py-cryptography{_vectors}: updated to 2.9

2.9:
* **BACKWARDS INCOMPATIBLE:** Support for Python 3.4 has been removed due to
  low usage and maintenance burden.
* **BACKWARDS INCOMPATIBLE:** Support for OpenSSL 1.0.1 has been removed.
  Users on older version of OpenSSL will need to upgrade.
* **BACKWARDS INCOMPATIBLE:** Support for LibreSSL 2.6.x has been removed.
* Removed support for calling
  :meth:`~cryptography.hazmat.primitives.asymmetric.x25519.X25519PublicKey.public_bytes`
  with no arguments, as per our deprecation policy. You must now pass
  ``encoding`` and ``format``.
* **BACKWARDS INCOMPATIBLE:** Reversed the order in which
  :meth:`~cryptography.x509.Name.rfc4514_string` returns the RDNs
  as required by :rfc:`4514`.
* Updated Windows, macOS, and ``manylinux`` wheels to be compiled with
  OpenSSL 1.1.1f.
* Added support for parsing
  :attr:`~cryptography.x509.ocsp.OCSPResponse.single_extensions` in an OCSP
  response.
* :class:`~cryptography.x509.NameAttribute` values can now be empty strings.
@
text
@d1 1
a1 1
# $NetBSD: Makefile,v 1.75 2020/01/18 21:50:45 jperkin Exp $
d3 1
a3 1
DISTNAME=	cryptography-2.9
d32 1
a32 1
	cd ${WRKSRC} && py.test-${PYVERSSUFFIX}
@


1.75
log
@*: Recursive revision bump for openssl 1.1.1.
@
text
@d1 1
a1 1
# $NetBSD: Makefile,v 1.74 2019/10/21 11:17:47 adam Exp $
d3 1
a3 1
DISTNAME=	cryptography-2.8
a4 1
PKGREVISION=	1
@


1.74
log
@py-cryptography[_vectors]: updated to 2.8

2.8:
* Updated Windows, macOS, and ``manylinux1`` wheels to be compiled with
  OpenSSL 1.1.1d.
* Added support for Python 3.8.
* Added class methods
  :meth:`Poly1305.generate_tag
  <cryptography.hazmat.primitives.poly1305.Poly1305.generate_tag>`
  and
  :meth:`Poly1305.verify_tag
  <cryptography.hazmat.primitives.poly1305.Poly1305.verify_tag>`
  for Poly1305 sign and verify operations.
* Deprecated support for OpenSSL 1.0.1. Support will be removed in
  ``cryptography`` 2.9.
* We now ship ``manylinux2010`` wheels in addition to our ``manylinux1``
  wheels.
* Added support for ``ed25519`` and ``ed448`` keys in the
  :class:`~cryptography.x509.CertificateBuilder`,
  :class:`~cryptography.x509.CertificateSigningRequestBuilder`,
  :class:`~cryptography.x509.CertificateRevocationListBuilder` and
  :class:`~cryptography.x509.ocsp.OCSPResponseBuilder`.
* ``cryptography`` no longer depends on ``asn1crypto``.
* :class:`~cryptography.x509.FreshestCRL` is now allowed as a
  :class:`~cryptography.x509.CertificateRevocationList` extension.
@
text
@d1 1
a1 1
# $NetBSD: Makefile,v 1.73 2019/05/31 17:28:48 adam Exp $
d5 1
@


1.73
log
@py-cryptography[_vectors]: updated to 2.7

2.7:
BACKWARDS INCOMPATIBLE: We no longer distribute 32-bit manylinux1 wheels. Continuing to produce them was a maintenance burden.
BACKWARDS INCOMPATIBLE: Removed the cryptography.hazmat.primitives.mac.MACContext interface. The CMAC and HMAC APIs have not changed, but they are no longer registered as MACContext instances.
Updated Windows, macOS, and manylinux1 wheels to be compiled with OpenSSL 1.1.1c.
Removed support for running our tests with setup.py test. Users interested in running our tests can continue to follow the directions in our :doc:development documentation</development/getting-started>.
Add support for :class:~cryptography.hazmat.primitives.poly1305.Poly1305 when using OpenSSL 1.1.1 or newer.
Support serialization with Encoding.OpenSSH and PublicFormat.OpenSSH in :meth:Ed25519PublicKey.public_bytes <cryptography.hazmat.primitives.asymmetric.ed25519.Ed25519PublicKey.public_bytes> .
Correctly allow passing a SubjectKeyIdentifier to :meth:~cryptography.x509.AuthorityKeyIdentifier.from_issuer_subject_key_identifier and deprecate passing an Extension object. The documentation always required SubjectKeyIdentifier but the implementation previously required an Extension.
@
text
@d1 1
a1 1
# $NetBSD: Makefile,v 1.72 2019/02/28 09:06:08 adam Exp $
d3 1
a3 1
DISTNAME=	cryptography-2.7
@


1.72
log
@py-cryptography[_vectors]: updated to 2.6.1

2.6.1:
* Resolved an error in our build infrastructure that broke our Python3 wheels
  for macOS and Linux.

2.6:
* **BACKWARDS INCOMPATIBLE:** Removed
  cryptography.hazmat.primitives.asymmetric.utils.encode_rfc6979_signature
  and
  cryptography.hazmat.primitives.asymmetric.utils.decode_rfc6979_signature,
  which had been deprecated for nearly 4 years. Use
  :func:~cryptography.hazmat.primitives.asymmetric.utils.encode_dss_signature
  and
  :func:~cryptography.hazmat.primitives.asymmetric.utils.decode_dss_signature
  instead.
* **BACKWARDS INCOMPATIBLE**: Removed cryptography.x509.Certificate.serial,
  which had been deprecated for nearly 3 years. Use
  :attr:~cryptography.x509.Certificate.serial_number instead.
* Updated Windows, macOS, and manylinux1 wheels to be compiled with
  OpenSSL 1.1.1b.
* Added support for :doc:/hazmat/primitives/asymmetric/ed448 when using
  OpenSSL 1.1.1b or newer.
* Added support for :doc:/hazmat/primitives/asymmetric/ed25519 when using
  OpenSSL 1.1.1b or newer.
* :func:~cryptography.hazmat.primitives.serialization.load_ssh_public_key can
  now load ed25519 public keys.
* Add support for easily mapping an object identifier to its elliptic curve
  class via
  :func:~cryptography.hazmat.primitives.asymmetric.ec.get_curve_for_oid.
* Add support for OpenSSL when compiled with the no-engine
  (OPENSSL_NO_ENGINE) flag.
@
text
@d1 1
a1 1
# $NetBSD: Makefile,v 1.71 2019/01/23 12:21:04 adam Exp $
d3 1
a3 1
DISTNAME=	cryptography-2.6.1
@


1.71
log
@py-cryptography[_vectors]: updated to 2.5

2.5:
* **BACKWARDS INCOMPATIBLE:** :term:U-label strings were deprecated in
  version 2.1, but this version removes the default idna dependency as
  well. If you still need this deprecated path please install cryptography
  with the idna extra: pip install cryptography[idna].
* **BACKWARDS INCOMPATIBLE:** The minimum supported PyPy version is now 5.4.
* Numerous classes and functions have been updated to allow :term:bytes-like
  types for keying material and passwords, including symmetric algorithms, AEAD
  ciphers, KDFs, loading asymmetric keys, and one time password classes.
* Updated Windows, macOS, and manylinux1 wheels to be compiled with
  OpenSSL 1.1.1a.
* Added support for :class:~cryptography.hazmat.primitives.hashes.SHA512_224
  and :class:~cryptography.hazmat.primitives.hashes.SHA512_256 when using
  OpenSSL 1.1.1.
* Added support for :class:~cryptography.hazmat.primitives.hashes.SHA3_224,
  :class:~cryptography.hazmat.primitives.hashes.SHA3_256,
  :class:~cryptography.hazmat.primitives.hashes.SHA3_384, and
  :class:~cryptography.hazmat.primitives.hashes.SHA3_512 when using OpenSSL
  1.1.1.
* Added support for :doc:/hazmat/primitives/asymmetric/x448 when using
  OpenSSL 1.1.1.
* Added support for :class:~cryptography.hazmat.primitives.hashes.SHAKE128
  and :class:~cryptography.hazmat.primitives.hashes.SHAKE256 when using
  OpenSSL 1.1.1.
* Added initial support for parsing PKCS12 files with
  :func:~cryptography.hazmat.primitives.serialization.pkcs12.load_key_and_certificates.
* Added support for :class:~cryptography.x509.IssuingDistributionPoint.
* Added rfc4514_string() method to
  :meth:x509.Name <cryptography.x509.Name.rfc4514_string>,
  :meth:x509.RelativeDistinguishedName
  <cryptography.x509.RelativeDistinguishedName.rfc4514_string>, and
  :meth:x509.NameAttribute <cryptography.x509.NameAttribute.rfc4514_string>
  to format the name or component an :rfc:4514 Distinguished Name string.
* Added
  :meth:~cryptography.hazmat.primitives.asymmetric.ec.EllipticCurvePublicKey.from_encoded_point,
  which immediately checks if the point is on the curve and supports compressed
  points. Deprecated the previous method
  :meth:~cryptography.hazmat.primitives.asymmetric.ec.EllipticCurvePublicNumbers.from_encoded_point.
* Added :attr:~cryptography.x509.ocsp.OCSPResponse.signature_hash_algorithm
  to OCSPResponse.
* Updated :doc:/hazmat/primitives/asymmetric/x25519 support to allow
  additional serialization methods. Calling
  :meth:~cryptography.hazmat.primitives.asymmetric.x25519.X25519PublicKey.public_bytes
  with no arguments has been deprecated.
* Added support for encoding compressed and uncompressed points via
  :meth:~cryptography.hazmat.primitives.asymmetric.ec.EllipticCurvePublicKey.public_bytes. Deprecated the previous method
  :meth:~cryptography.hazmat.primitives.asymmetric.ec.EllipticCurvePublicNumbers.encode_point.
@
text
@d1 1
a1 1
# $NetBSD: Makefile,v 1.70 2018/11/21 10:38:38 adam Exp $
d3 1
a3 1
DISTNAME=	cryptography-2.5
@


1.70
log
@py-cryptography[_vectors]: updated to 2.4.2

2.4.2:
Updated Windows, macOS, and manylinux1 wheels to be compiled with OpenSSL 1.1.0j.
@
text
@d1 1
a1 1
# $NetBSD: Makefile,v 1.69 2018/11/13 11:23:38 adam Exp $
d3 1
a3 1
DISTNAME=	cryptography-2.4.2
@


1.69
log
@py-cryptography[_vectors]: updated to 2.4.1

2.4.1:
Fixed a build breakage in our manylinux1 wheels.

2.4:
BACKWARDS INCOMPATIBLE: Dropped support for LibreSSL 2.4.x.
Deprecated OpenSSL 1.0.1 support. OpenSSL 1.0.1 is no longer supported by the OpenSSL project. At this time there is no time table for dropping support, however we strongly encourage all users to upgrade or install cryptography from a wheel.
Added initial :doc:OCSP </x509/ocsp> support.
Added support for :class:~cryptography.x509.PrecertPoison.
@
text
@d1 1
a1 1
# $NetBSD: Makefile,v 1.68 2018/08/15 08:21:42 adam Exp $
d3 1
a3 1
DISTNAME=	cryptography-2.4.1
d9 1
a9 1
HOMEPAGE=	https://pypi.python.org/pypi/cryptography/
@


1.68
log
@py-cryptography[_vectors]: updated to 2.3.1

2.3.1:
Updated Windows, macOS, and manylinux1 wheels to be compiled with OpenSSL 1.1.0i.
@
text
@d1 1
a1 1
# $NetBSD: Makefile,v 1.67 2018/07/19 09:24:37 adam Exp $
d3 1
a3 1
DISTNAME=	cryptography-2.3.1
d13 2
a14 2
DEPENDS+=	${PYPKGPREFIX}-asn1crypto-[0-9]*:../../security/py-asn1crypto
DEPENDS+=	${PYPKGPREFIX}-cffi>=1.8.2:../../devel/py-cffi
d16 2
a17 2
DEPENDS+=	${PYPKGPREFIX}-idna-[0-9]*:../../www/py-idna
DEPENDS+=	${PYPKGPREFIX}-six-[0-9]*:../../lang/py-six
d19 1
d23 1
a23 2
TEST_DEPENDS+=	${PYPKGPREFIX}-requests>=0.8:../../devel/py-requests
TEST_DEPENDS+=	${PYPKGPREFIX}-test>=0.8:../../devel/py-test
d26 1
a26 2

.if ${PYPKGPREFIX} == "py27"
@


1.67
log
@py-cryptography[_vectors]: updated to 2.3

2.3:

SECURITY ISSUE: :meth:~cryptography.hazmat.primitives.ciphers.AEADDecryptionContext.finalize_with_tag allowed tag truncation by default which can allow tag forgery in some cases. The method now enforces the min_tag_length provided to the :class:~cryptography.hazmat.primitives.ciphers.modes.GCM constructor. CVE-2018-10903
Added support for Python 3.7.
Added :meth:~cryptography.fernet.Fernet.extract_timestamp to get the authenticated timestamp of a :doc:Fernet </fernet> token.
Support for Python 2.7.x without hmac.compare_digest has been deprecated. We will require Python 2.7.7 or higher (or 2.7.6 on Ubuntu) in the next cryptography release.
Fixed multiple issues preventing cryptography from compiling against LibreSSL 2.7.x.
Added :class:~cryptography.x509.CertificateRevocationList.get_revoked_certificate_by_serial_number for quick serial number searches in CRLs.
The :class:~cryptography.x509.RelativeDistinguishedName class now preserves the order of attributes. Duplicate attributes now raise an error instead of silently discarding duplicates.
:func:~cryptography.hazmat.primitives.keywrap.aes_key_unwrap and :func:~cryptography.hazmat.primitives.keywrap.aes_key_unwrap_with_padding now raise :class:~cryptography.hazmat.primitives.keywrap.InvalidUnwrap if the wrapped key is an invalid length, instead of ValueError.
@
text
@d1 1
a1 1
# $NetBSD: Makefile,v 1.66 2018/04/02 13:19:31 adam Exp $
d3 1
a3 1
DISTNAME=	cryptography-2.3
@


1.66
log
@py-cryptography py-cryptography_vectors: updated to 2.2.2

2.2.2:
Updated Windows, macOS, and manylinux1 wheels to be compiled with OpenSSL 1.1.0h.
@
text
@d1 1
a1 1
# $NetBSD: Makefile,v 1.65 2018/03/22 11:49:19 adam Exp $
d3 1
a3 1
DISTNAME=	cryptography-2.2.2
@


1.65
log
@py-cryptography[_vectors]: updated to 2.2.1

2.2.1:
Reverted a change to GeneralNames which prohibited having zero elements, due to breakages.
Fixed a bug in :func:~cryptography.hazmat.primitives.keywrap.aes_key_unwrap_with_padding that caused it to raise InvalidUnwrap when key length modulo 8 was zero.
@
text
@d1 1
a1 1
# $NetBSD: Makefile,v 1.64 2018/03/19 09:01:46 adam Exp $
d3 1
a3 1
DISTNAME=	cryptography-2.2.1
@


1.64
log
@py-cryptography[_vectors]: updated to 2.2

2.2:
BACKWARDS INCOMPATIBLE: Support for Python 2.6 has been dropped.
Resolved a bug in HKDF that incorrectly constrained output size.
Added :class:~cryptography.hazmat.primitives.asymmetric.ec.BrainpoolP256R1, :class:~cryptography.hazmat.primitives.asymmetric.ec.BrainpoolP384R1, and :class:~cryptography.hazmat.primitives.asymmetric.ec.BrainpoolP512R1 to support inter-operating with systems like German smart meters.
Added token rotation support to :doc:Fernet </fernet> with :meth:~cryptography.fernet.MultiFernet.rotate.
Fixed a memory leak in :func:~cryptography.hazmat.primitives.asymmetric.ec.derive_private_key.
Added support for AES key wrapping with padding via :func:~cryptography.hazmat.primitives.keywrap.aes_key_wrap_with_padding and :func:~cryptography.hazmat.primitives.keywrap.aes_key_unwrap_with_padding .
Allow loading DSA keys with 224 bit q.
@
text
@d1 1
a1 1
# $NetBSD: Makefile,v 1.63 2017/11/30 08:23:27 adam Exp $
d3 1
a3 1
DISTNAME=	cryptography-2.2
d18 6
a23 8
# TEST_DEPENDS
BUILD_DEPENDS+=	${PYPKGPREFIX}-iso8601-[0-9]*:../../time/py-iso8601
BUILD_DEPENDS+=	${PYPKGPREFIX}-pretend-[0-9]*:../../devel/py-pretend
BUILD_DEPENDS+=	${PYPKGPREFIX}-test>=0.8:../../devel/py-test
BUILD_DEPENDS+=	${PYPKGPREFIX}-pytz-[0-9]*:../../time/py-pytz
BUILD_DEPENDS+=	${PYPKGPREFIX}-cryptography_vectors-[0-9]*:../../security/py-cryptography_vectors
# but py-requests depends on py-cryptography
#BUILD_DEPENDS+=	${PYPKGPREFIX}-requests>=0.8:../../devel/py-requests
@


1.63
log
@py-cryptography[_vectors]: updated to 2.1.4

2.1.4:
Added X509_up_ref for an upcoming pyOpenSSL release.
@
text
@d1 1
a1 1
# $NetBSD: Makefile,v 1.62 2017/11/03 10:36:12 adam Exp $
d3 1
a3 1
DISTNAME=	cryptography-2.1.4
@


1.62
log
@py-cryptography[_vectors]: updated to 2.1.3

2.1.3:
Updated Windows, macOS, and manylinux1 wheels to be compiled with OpenSSL 1.1.0g.
@
text
@d1 1
a1 1
# $NetBSD: Makefile,v 1.61 2017/10/25 03:53:05 adam Exp $
d3 1
a3 1
DISTNAME=	cryptography-2.1.3
@


1.61
log
@py-cryptography[_vectors]: updated to 2.1.2

2.1.2:
Corrected a bug with the manylinux1 wheels where OpenSSL's stack was marked executable.
@
text
@d1 1
a1 1
# $NetBSD: Makefile,v 1.60 2017/10/12 08:28:40 adam Exp $
d3 1
a3 1
DISTNAME=	cryptography-2.1.2
d18 1
a18 1
# actually, TEST_DEPENDS
@


1.60
log
@py-cryptography[_vectors]: update to 2.1.1

2.1:
FINAL DEPRECATION Python 2.6 support is deprecated, and will be removed in the next release of cryptography.
BACKWARDS INCOMPATIBLE: Whirlpool, RIPEMD160, and UnsupportedExtension have been removed in accordance with our :doc:`/api-stability` policy.
BACKWARDS INCOMPATIBLE: :attr:`~cryptography.x509.DNSName.value`, :attr:`~cryptography.x509.RFC822Name.value`, and :attr:`~cryptography.x509.UniformResourceIdentifier.value` will now return an :term:`A-label` string when parsing a certificate containing an internationalized domain name (IDN) or if the caller passed a :term:`U-label` to the constructor. See below for additional deprecations related to this change.
Installing cryptography now requires pip 6 or newer.
Deprecated passing :term:`U-label` strings to the :class:`~cryptography.x509.DNSName`, :class:`~cryptography.x509.UniformResourceIdentifier`, and :class:`~cryptography.x509.RFC822Name` constructors. Instead, users should pass values as :term:`A-label` strings with idna encoding if necessary. This change will not affect anyone who is not processing internationalized domains.
Added support for :class:`~cryptography.hazmat.primitives.ciphers.algorithms.ChaCha20`. In most cases users should choose :class:`~cryptography.hazmat.primitives.ciphers.aead.ChaCha20Poly1305` rather than using this unauthenticated form.
Added :meth:`~cryptography.x509.CertificateRevocationList.is_signature_valid` to :class:`~cryptography.x509.CertificateRevocationList`.
Support :class:`~cryptography.hazmat.primitives.hashes.BLAKE2b` and :class:`~cryptography.hazmat.primitives.hashes.BLAKE2s` with :class:`~cryptography.hazmat.primitives.hmac.HMAC`.
Added support for :class:`~cryptography.hazmat.primitives.ciphers.modes.XTS` mode for AES.
Added support for using labels with :class:`~cryptography.hazmat.primitives.asymmetric.padding.OAEP` when using OpenSSL 1.0.2 or greater.
Improved compatibility with NSS when issuing certificates from an issuer that has a subject with non-UTF8String string types.
Add support for the :class:`~cryptography.x509.DeltaCRLIndicator` extension.
Add support for the :class:`~cryptography.x509.TLSFeature` extension. This is commonly used for enabling OCSP Must-Staple in certificates.
Add support for the :class:`~cryptography.x509.FreshestCRL` extension.
@
text
@d1 1
a1 1
# $NetBSD: Makefile,v 1.59 2017/08/04 05:31:11 adam Exp $
d3 1
a3 1
DISTNAME=	cryptography-2.1.1
@


1.59
log
@2.0.3:
Fixed an issue with weak linking symbols when compiling on macOS versions older than 10.12.
@
text
@d1 1
a1 1
# $NetBSD: Makefile,v 1.58 2017/07/27 18:39:26 adam Exp $
d3 1
a3 1
DISTNAME=	cryptography-2.0.3
@


1.58
log
@2.0.2:
Marked all symbols as hidden in the manylinux1 wheel to avoid a bug with symbol resolution in certain scenarios.

2.0.1:
Fixed a compilation bug affecting OpenBSD.
Altered the manylinux1 wheels to statically link OpenSSL instead of dynamically linking and bundling the shared object. This should resolve crashes seen when using uwsgi or other binaries that link against OpenSSL independently.
Fixed the stack level for the signer and verifier warnings.
@
text
@d1 1
a1 1
# $NetBSD: Makefile,v 1.57 2017/07/18 13:58:25 adam Exp $
d3 1
a3 1
DISTNAME=	cryptography-2.0.2
@


1.57
log
@2.0:

BACKWARDS INCOMPATIBLE: Support for Python 3.3 has been dropped.
We now ship manylinux1 wheels linked against OpenSSL 1.1.0f. These wheels will be automatically used with most Linux distributions if you are running the latest pip.
Deprecated the use of signer on :class:`~cryptography.hazmat.primitives.asymmetric.rsa.RSAPrivateKey`, :class:`~cryptography.hazmat.primitives.asymmetric.dsa.DSAPrivateKey`, and :class:`~cryptography.hazmat.primitives.asymmetric.ec.EllipticCurvePrivateKey` in favor of sign.
Deprecated the use of verifier on :class:`~cryptography.hazmat.primitives.asymmetric.rsa.RSAPublicKey`, :class:`~cryptography.hazmat.primitives.asymmetric.dsa.DSAPublicKey`, and :class:`~cryptography.hazmat.primitives.asymmetric.ec.EllipticCurvePublicKey` in favor of verify.
Added support for parsing :class:`~cryptography.x509.certificate_transparency.SignedCertificateTimestamp` objects from X.509 certificate extensions.
Added support for :class:`~cryptography.hazmat.primitives.ciphers.aead.ChaCha20Poly1305`.
Added support for :class:`~cryptography.hazmat.primitives.ciphers.aead.AESCCM`.
Added :class:`~cryptography.hazmat.primitives.ciphers.aead.AESGCM`, a "one shot" API for AES GCM encryption.
Added support for :doc:`/hazmat/primitives/asymmetric/x25519`.
Added support for serializing and deserializing Diffie-Hellman parameters with :func:`~cryptography.hazmat.primitives.serialization.load_pem_parameters`, :func:`~cryptography.hazmat.primitives.serialization.load_der_parameters`, and :meth:`~cryptography.hazmat.primitives.asymmetric.dh.DHParameters.parameter_bytes` .
The extensions attribute on :class:`~cryptography.x509.Certificate`, :class:`~cryptography.x509.CertificateSigningRequest`, :class:`~cryptography.x509.CertificateRevocationList`, and :class:`~cryptography.x509.RevokedCertificate` now caches the computed Extensions object. There should be no performance change, just a performance improvement for programs accessing the extensions attribute multiple times.
@
text
@d1 1
a1 1
# $NetBSD: Makefile,v 1.56 2017/06/19 21:03:19 wiz Exp $
d3 1
a3 1
DISTNAME=	cryptography-2.0
@


1.56
log
@Updated py-cryptography to 1.9.

1.9 - 2017-05-29
~~~~~~~~~~~~~~~~

* **BACKWARDS INCOMPATIBLE:** Elliptic Curve signature verification no longer
  returns ``True`` on success. This brings it in line with the interface's
  documentation, and our intent. The correct way to use
  :meth:`~cryptography.hazmat.primitives.asymmetric.ec.EllipticCurvePublicKey.verify`
  has always been to check whether or not
  :class:`~cryptography.exceptions.InvalidSignature` was raised.
* **BACKWARDS INCOMPATIBLE:** Dropped support for macOS 10.7 and 10.8.
* **BACKWARDS INCOMPATIBLE:** The minimum supported PyPy version is now 5.3.
* Python 3.3 support has been deprecated, and will be removed in the next
  ``cryptography`` release.
* Add support for providing ``tag`` during
  :class:`~cryptography.hazmat.primitives.ciphers.modes.GCM` finalization via
  :meth:`~cryptography.hazmat.primitives.ciphers.AEADDecryptionContext.finalize_with_tag`.
* Fixed an issue preventing ``cryptography`` from compiling against
  LibreSSL 2.5.x.
* Added
  :meth:`~cryptography.hazmat.primitives.asymmetric.ec.EllipticCurvePublicKey.key_size`
  and
  :meth:`~cryptography.hazmat.primitives.asymmetric.ec.EllipticCurvePrivateKey.key_size`
  as convenience methods for determining the bit size of a secret scalar for
  the curve.
* Accessing an unrecognized extension marked critical on an X.509 object will
  no longer raise an ``UnsupportedExtension`` exception, instead an
  :class:`~cryptography.x509.UnrecognizedExtension` object will be returned.
  This behavior was based on a poor reading of the RFC, unknown critical
  extensions only need to be rejected on certificate verification.
* The CommonCrypto backend has been removed.
* MultiBackend has been removed.
* ``Whirlpool`` and ``RIPEMD160`` have been deprecated.
@
text
@d1 1
a1 1
# $NetBSD: Makefile,v 1.55 2017/05/29 13:22:31 wiz Exp $
d3 1
a3 1
DISTNAME=	cryptography-1.9
@


1.55
log
@Comment out py-requests test dependency to fix cyclic dependency
with py-requests-2.16.x.
@
text
@d1 1
a1 1
# $NetBSD: Makefile,v 1.54 2017/05/29 12:07:01 wiz Exp $
d3 1
a3 1
DISTNAME=	cryptography-1.8.2
@


1.54
log
@Updated py-cryptography to 1.8.2.

1.8.2 - 2017-05-26
~~~~~~~~~~~~~~~~~~

* Fixed a compilation bug affecting OpenSSL 1.1.0f.
* Updated Windows and macOS wheels to be compiled against OpenSSL 1.1.0f.
@
text
@d1 1
a1 1
# $NetBSD: Makefile,v 1.53 2017/03/21 16:04:59 wiz Exp $
a20 1
BUILD_DEPENDS+=	${PYPKGPREFIX}-requests>=0.8:../../devel/py-requests
d24 2
@


1.53
log
@Remove comment -- test failures not repeatable.
@
text
@d1 1
a1 1
# $NetBSD: Makefile,v 1.52 2017/03/13 09:42:25 wiz Exp $
d3 1
a3 1
DISTNAME=	cryptography-1.8.1
@


1.52
log
@Updated py-cryptography to 1.8.1.

1.8.1 - 2017-03-10
~~~~~~~~~~~~~~~~~~

* Fixed macOS wheels to properly link against 1.1.0 rather than 1.0.2.

1.8 - 2017-03-09
~~~~~~~~~~~~~~~~

* Added support for Python 3.6.
* Windows and macOS wheels now link against OpenSSL 1.1.0.
* macOS wheels are no longer universal. This change significantly shrinks the
  size of the wheels. Users on macOS 32-bit Python (if there are any) should
  migrate to 64-bit or build their own packages.
* Changed ASN.1 dependency from ``pyasn1`` to ``asn1crypto`` resulting in a
  general performance increase when encoding/decoding ASN.1 structures. Also,
  the ``pyasn1_modules`` test dependency is no longer required.
* Added support for
  :meth:`~cryptography.hazmat.primitives.ciphers.CipherContext.update_into` on
  :class:`~cryptography.hazmat.primitives.ciphers.CipherContext`.
* Added
  :meth:`~cryptography.hazmat.primitives.asymmetric.dh.DHPrivateKeyWithSerialization.private_bytes`
  to
  :class:`~cryptography.hazmat.primitives.asymmetric.dh.DHPrivateKeyWithSerialization`.
* Added
  :meth:`~cryptography.hazmat.primitives.asymmetric.dh.DHPublicKeyWithSerialization.public_bytes`
  to
  :class:`~cryptography.hazmat.primitives.asymmetric.dh.DHPublicKeyWithSerialization`.
* :func:`~cryptography.hazmat.primitives.serialization.load_pem_private_key`
  and
  :func:`~cryptography.hazmat.primitives.serialization.load_der_private_key`
  now require that ``password`` must be bytes if provided. Previously this
  was documented but not enforced.
* Added support for subgroup order in :doc:`/hazmat/primitives/asymmetric/dh`.
@
text
@d1 1
a1 1
# $NetBSD: Makefile,v 1.51 2017/01/28 11:15:07 wiz Exp $
a32 2
# two test failures in 1.8.1
# https://github.com/pyca/cryptography/issues/3445
@


1.51
log
@Fix test segfault by using upstream patch #3350:
https://github.com/pyca/cryptography/pull/3350

Bump PKGREVISION.

Identified by @@reaperhulk in https://github.com/pyca/cryptography/issues/3372
@
text
@d1 1
a1 1
# $NetBSD: Makefile,v 1.50 2017/01/28 01:20:01 wiz Exp $
d3 1
a3 1
DISTNAME=	cryptography-1.7.2
a4 1
PKGREVISION=	1
d13 1
a13 1
DEPENDS+=	${PYPKGPREFIX}-asn1-[0-9]*:../../security/py-asn1
a24 1
BUILD_DEPENDS+=	${PYPKGPREFIX}-asn1-modules-[0-9]*:../../security/py-asn1-modules
d33 2
@


1.50
log
@Updated py-cryptography to 1.7.2.

Add more test dependencies.
Self tests cause a python core dump, see
https://github.com/pyca/cryptography/issues/3372

1.7.2 - 2017-01-27
~~~~~~~~~~~~~~~~~~

* Updated Windows and macOS wheels to be compiled against OpenSSL 1.0.2k.
@
text
@d1 1
a1 1
# $NetBSD: Makefile,v 1.49 2016/12/19 08:57:51 wiz Exp $
d5 1
@


1.49
log
@Updated py-cryptography to 1.7.1.

1.7.1 - 2016-12-13
~~~~~~~~~~~~~~~~~~

* Fixed a regression in ``int_from_bytes`` where it failed to accept
  ``bytearray``.

1.7 - 2016-12-12
~~~~~~~~~~~~~~~~

* Support for OpenSSL 1.0.0 has been removed. Users on older version of OpenSSL
  will need to upgrade.
* Added support for Diffie-Hellman key exchange using
  :meth:`~cryptography.hazmat.primitives.asymmetric.dh.DHPrivateKeyWithSerialization.exchange`
* The OS random engine for OpenSSL has been rewritten to improve compatibility
  with embedded Python and other edge cases. More information about this change
  can be found in the
  `pull request <https://github.com/pyca/cryptography/pull/3229>`_.
@
text
@d1 1
a1 1
# $NetBSD: Makefile,v 1.48 2016/11/28 13:15:51 wiz Exp $
d3 1
a3 1
DISTNAME=	cryptography-1.7.1
d23 3
@


1.48
log
@Updated py-cryptography to 1.6.

1.6 - 2016-11-22
~~~~~~~~~~~~~~~~

* Deprecated support for OpenSSL 1.0.0. Support will be removed in
  ``cryptography`` 1.7.
* Replaced the Python-based OpenSSL locking callbacks with a C version to fix
  a potential deadlock that could occur if a garbage collection cycle occurred
  while inside the lock.
* Added support for :class:`~cryptography.hazmat.primitives.hashes.BLAKE2b` and
  :class:`~cryptography.hazmat.primitives.hashes.BLAKE2s` when using OpenSSL
  1.1.0.
* Added
  :attr:`~cryptography.x509.Certificate.signature_algorithm_oid` support to
  :class:`~cryptography.x509.Certificate`.
* Added
  :attr:`~cryptography.x509.CertificateSigningRequest.signature_algorithm_oid`
  support to :class:`~cryptography.x509.CertificateSigningRequest`.
* Added
  :attr:`~cryptography.x509.CertificateRevocationList.signature_algorithm_oid`
  support to :class:`~cryptography.x509.CertificateRevocationList`.
* Added support for :class:`~cryptography.hazmat.primitives.kdf.scrypt.Scrypt`
  when using OpenSSL 1.1.0.
* Added a workaround to improve compatibility with Python application bundling
  tools like ``PyInstaller`` and ``cx_freeze``.
* Added support for generating a
  :meth:`~cryptography.x509.random_serial_number`.
* Added support for encoding ``IPv4Network`` and ``IPv6Network`` in X.509
  certificates for use with :class:`~cryptography.x509.NameConstraints`.
* Added :meth:`~cryptography.x509.Name.public_bytes` to
  :class:`~cryptography.x509.Name`.
* Added :class:`~cryptography.x509.RelativeDistinguishedName`
* :class:`~cryptography.x509.DistributionPoint` now accepts
  :class:`~cryptography.x509.RelativeDistinguishedName` for
  :attr:`~cryptography.x509.DistributionPoint.relative_name`.
  Deprecated use of :class:`~cryptography.x509.Name` as
  :attr:`~cryptography.x509.DistributionPoint.relative_name`.
* :class:`~cryptography.x509.Name` now accepts an iterable of
  :class:`~cryptography.x509.RelativeDistinguishedName`.  RDNs can
  be accessed via the :attr:`~cryptography.x509.Name.rdns`
  attribute.  When constructed with an iterable of
  :class:`~cryptography.x509.NameAttribute`, each attribute becomes
  a single-valued RDN.
* Added
  :func:`~cryptography.hazmat.primitives.asymmetric.ec.derive_private_key`.
* Added support for signing and verifying RSA, DSA, and ECDSA signatures with
  :class:`~cryptography.hazmat.primitives.asymmetric.utils.Prehashed`
  digests.
@
text
@d1 1
a1 1
# $NetBSD: Makefile,v 1.47 2016/11/07 10:48:13 wiz Exp $
d3 1
a3 1
DISTNAME=	cryptography-1.6
@


1.47
log
@Updated py-cryptography to 1.5.3.

1.5.3 - 2016-11-05
~~~~~~~~~~~~~~~~~~

* **SECURITY ISSUE**: Fixed a bug where ``HKDF`` would return an empty
  byte-string if used with a ``length`` less than ``algorithm.digest_size``.
  Credit to **Markus Döring** for reporting the issue.
@
text
@d1 1
a1 1
# $NetBSD: Makefile,v 1.46 2016/10/03 12:25:37 wiz Exp $
d3 1
a3 1
DISTNAME=	cryptography-1.5.3
@


1.46
log
@Remove some dead code, python-3.3 is no more.
@
text
@d1 1
a1 1
# $NetBSD: Makefile,v 1.45 2016/10/03 12:21:16 wiz Exp $
d3 1
a3 1
DISTNAME=	cryptography-1.5.2
@


1.45
log
@Updated py-cryptography to 1.5.2.

1.5.2 - 2016-09-26
~~~~~~~~~~~~~~~~~~

* Updated Windows and OS X wheels to be compiled against OpenSSL 1.0.2j.
@
text
@d1 1
a1 1
# $NetBSD: Makefile,v 1.44 2016/09/30 11:17:39 wiz Exp $
d27 1
a29 3
.if ${PYPKGPREFIX} == "py27" || ${PYPKGPREFIX} == "py33"
DEPENDS+=	${PYPKGPREFIX}-enum34-[0-9]*:../../devel/py-enum34
.endif
@


1.44
log
@Updated py-cryptography to 1.5.1.

1.5.1 - 2016-09-22
~~~~~~~~~~~~~~~~~~

* Updated Windows and OS X wheels to be compiled against OpenSSL 1.0.2i.
* Resolved a ``UserWarning`` when used with cffi 1.8.3.
* Fixed a memory leak in name creation with X.509.
* Added a workaround for old versions of setuptools.
* Fixed an issue preventing ``cryptography`` from compiling against
  OpenSSL 1.0.2i.
@
text
@d1 1
a1 1
# $NetBSD: Makefile,v 1.43 2016/09/12 18:34:31 wiz Exp $
d3 1
a3 1
DISTNAME=	cryptography-1.5.1
@


1.43
log
@ld with python-3.x and py-cffi-1.8.x and bump PKGREVISION.
@
text
@d1 1
a1 1
# $NetBSD: Makefile,v 1.42 2016/08/31 06:47:09 wiz Exp $
d3 1
a3 1
DISTNAME=	cryptography-1.5
a4 1
PKGREVISION=	1
@


1.42
log
@Updated py-cryptography to 1.5.

1.5 - 2016-08-26
~~~~~~~~~~~~~~~~

* Added
  :func:`~cryptography.hazmat.primitives.asymmetric.padding.calculate_max_pss_salt_length`.
* Added "one shot"
  :meth:`~cryptography.hazmat.primitives.asymmetric.dsa.DSAPrivateKey.sign`
  and
  :meth:`~cryptography.hazmat.primitives.asymmetric.dsa.DSAPublicKey.verify`
  methods to DSA keys.
* Added "one shot"
  :meth:`~cryptography.hazmat.primitives.asymmetric.ec.EllipticCurvePrivateKey.sign`
  and
  :meth:`~cryptography.hazmat.primitives.asymmetric.ec.EllipticCurvePublicKey.verify`
  methods to ECDSA keys.
* Switched back to the older callback model on Python 3.5 in order to mitigate
  the locking callback problem with OpenSSL <1.1.0.
* :class:`~cryptography.x509.CertificateBuilder`,
  :class:`~cryptography.x509.CertificateRevocationListBuilder`, and
  :class:`~cryptography.x509.RevokedCertificateBuilder` now accept timezone
  aware ``datetime`` objects as method arguments
* ``cryptography`` now supports OpenSSL 1.1.0 as a compilation target.
@
text
@d1 1
a1 1
# $NetBSD: Makefile,v 1.41 2016/06/06 11:58:09 wiz Exp $
d5 1
d15 1
a15 1
DEPENDS+=	${PYPKGPREFIX}-cffi>=0.8:../../devel/py-cffi
@


1.41
log
@Updated py-cryptography to 1.4.

1.4 - 2016-06-04
~~~~~~~~~~~~~~~~

* Support for OpenSSL 0.9.8 has been removed. Users on older versions of
  OpenSSL will need to upgrade.
* Added :class:`~cryptography.hazmat.primitives.kdf.kbkdf.KBKDFHMAC`.
* Added support for ``OpenSSH`` public key serialization.
* Added support for SHA-2 in RSA
  :class:`~cryptography.hazmat.primitives.asymmetric.padding.OAEP` when using
  OpenSSL 1.0.2 or greater.
* Added "one shot"
  :meth:`~cryptography.hazmat.primitives.asymmetric.rsa.RSAPrivateKey.sign`
  and
  :meth:`~cryptography.hazmat.primitives.asymmetric.rsa.RSAPublicKey.verify`
  methods to RSA keys.
@
text
@d1 1
a1 1
# $NetBSD: Makefile,v 1.40 2016/05/12 14:08:29 wiz Exp $
d3 1
a3 1
DISTNAME=	cryptography-1.4
@


1.40
log
@Updated py-cryptography to 1.3.2.

1.3.2 - 2016-05-04
~~~~~~~~~~~~~~~~~~

* Updated Windows and OS X wheels to be compiled against OpenSSL 1.0.2h.
* Fixed an issue preventing ``cryptography`` from compiling against
  LibreSSL 2.3.x.
@
text
@d1 1
a1 1
# $NetBSD: Makefile,v 1.39 2016/04/08 15:22:03 wiz Exp $
d3 1
a3 1
DISTNAME=	cryptography-1.3.2
d6 1
a6 1
MASTER_SITES=	https://pypi.python.org/packages/04/da/35f9a1d34dab5d777f65fb87731288f338ab0ae46a525ffdf0405b573dd0/
@


1.39
log
@Update py-cryptography to 1.3.1.

1.3.1 - 2016-03-21
~~~~~~~~~~~~~~~~~~

* Fixed a bug that caused an ``AttributeError`` when using ``mock`` to patch
  some ``cryptography`` modules.

1.3 - 2016-03-18
~~~~~~~~~~~~~~~~

* Added support for padding ANSI X.923 with
  :class:`~cryptography.hazmat.primitives.padding.ANSIX923`.
* Deprecated support for OpenSSL 0.9.8. Support will be removed in
  ``cryptography`` 1.4.
* Added support for the :class:`~cryptography.x509.PolicyConstraints`
  X.509 extension including both parsing and generation using
  :class:`~cryptography.x509.CertificateBuilder` and
  :class:`~cryptography.x509.CertificateSigningRequestBuilder`.
* Added :attr:`~cryptography.x509.CertificateSigningRequest.is_signature_valid`
  to :class:`~cryptography.x509.CertificateSigningRequest`.
* Fixed an intermittent ``AssertionError`` when performing an RSA decryption on
  an invalid ciphertext, ``ValueError`` is now correctly raised in all cases.
* Added
  :meth:`~cryptography.x509.AuthorityKeyIdentifier.from_issuer_subject_key_identifier`.
@
text
@d1 1
a1 1
# $NetBSD: Makefile,v 1.38 2016/03/08 15:14:38 wiz Exp $
d3 1
a3 1
DISTNAME=	cryptography-1.3.1
d6 1
a6 1
MASTER_SITES=	${MASTER_SITE_PYPI:=c/cryptography/}
@


1.38
log
@Update py-cryptography to 1.2.3:

1.2.3 - 2016-03-01
~~~~~~~~~~~~~~~~~~

* Updated Windows and OS X wheels to be compiled against OpenSSL 1.0.2g.
@
text
@d1 1
a1 1
# $NetBSD: Makefile,v 1.37 2016/03/05 11:29:25 jperkin Exp $
d3 1
a3 1
DISTNAME=	cryptography-1.2.3
@


1.37
log
@Bump PKGREVISION for security/openssl ABI bump.
@
text
@d1 1
a1 1
# $NetBSD: Makefile,v 1.36 2016/02/01 11:53:45 wiz Exp $
d3 1
a3 1
DISTNAME=	cryptography-1.2.2
a4 1
PKGREVISION=	1
@


1.36
log
@Update py-cryptography to 1.2.2:

1.2.2 - 2016-01-29
~~~~~~~~~~~~~~~~~~

* Updated Windows and OS X wheels to be compiled against OpenSSL 1.0.2f.
@
text
@d1 1
a1 1
# $NetBSD: Makefile,v 1.35 2016/01/13 20:22:52 wiz Exp $
d5 1
@


1.35
log
@Update py-cryptography to 1.2.1:

1.2.1 - 2016-01-08
~~~~~~~~~~~~~~~~~~

* Reverts a change to an OpenSSL ``EVP_PKEY`` object that caused errors with
  ``pyOpenSSL``.

1.2 - 2016-01-08
~~~~~~~~~~~~~~~~

* **BACKWARDS INCOMPATIBLE:**
  :class:`~cryptography.x509.RevokedCertificate`
  :attr:`~cryptography.x509.RevokedCertificate.extensions` now uses extension
  classes rather than returning raw values inside the
  :class:`~cryptography.x509.Extension`
  :attr:`~cryptography.x509.Extension.value`. The new classes
  are:

  * :class:`~cryptography.x509.CertificateIssuer`
  * :class:`~cryptography.x509.CRLReason`
  * :class:`~cryptography.x509.InvalidityDate`
* Deprecated support for OpenSSL 0.9.8 and 1.0.0. At this time there is no time
  table for actually dropping support, however we strongly encourage all users
  to upgrade, as those versions no longer receives support from the OpenSSL
  project.
* The :class:`~cryptography.x509.Certificate` class now has
  :attr:`~cryptography.x509.Certificate.signature` and
  :attr:`~cryptography.x509.Certificate.tbs_certificate_bytes` attributes.
* The :class:`~cryptography.x509.CertificateSigningRequest` class now has
  :attr:`~cryptography.x509.CertificateSigningRequest.signature` and
  :attr:`~cryptography.x509.CertificateSigningRequest.tbs_certrequest_bytes`
  attributes.
* The :class:`~cryptography.x509.CertificateRevocationList` class now has
  :attr:`~cryptography.x509.CertificateRevocationList.signature` and
  :attr:`~cryptography.x509.CertificateRevocationList.tbs_certlist_bytes`
  attributes.
* :class:`~cryptography.x509.NameConstraints` are now supported in the
  :class:`~cryptography.x509.CertificateBuilder` and
  :class:`~cryptography.x509.CertificateSigningRequestBuilder`.
* Support serialization of certificate revocation lists using the
  :meth:`~cryptography.x509.CertificateRevocationList.public_bytes` method of
  :class:`~cryptography.x509.CertificateRevocationList`.
* Add support for parsing :class:`~cryptography.x509.CertificateRevocationList`
  :meth:`~cryptography.x509.CertificateRevocationList.extensions` in the
  OpenSSL backend. The following extensions are currently supported:

  * :class:`~cryptography.x509.AuthorityInformationAccess`
  * :class:`~cryptography.x509.AuthorityKeyIdentifier`
  * :class:`~cryptography.x509.CRLNumber`
  * :class:`~cryptography.x509.IssuerAlternativeName`
* Added :class:`~cryptography.x509.CertificateRevocationListBuilder` and
  :class:`~cryptography.x509.RevokedCertificateBuilder` to allow creation of
  CRLs.
* Unrecognized non-critical X.509 extensions are now parsed into an
  :class:`~cryptography.x509.UnrecognizedExtension` object.
@
text
@d1 1
a1 1
# $NetBSD: Makefile,v 1.34 2015/12/13 21:09:09 wiz Exp $
d3 1
a3 1
DISTNAME=	cryptography-1.2.1
@


1.34
log
@Update py-cryptography to 1.1.2:

1.1.2 - 2015-12-10
~~~~~~~~~~~~~~~~~~

* Fixed a SIGBUS crash with the OS X wheels caused by redefinition of a
  method.
* Fixed a runtime error ``undefined symbol EC_GFp_nistp224_method`` that
  occurred with some OpenSSL installations.
* Updated Windows and OS X wheels to be compiled against OpenSSL 1.0.2e.
@
text
@d1 1
a1 1
# $NetBSD: Makefile,v 1.33 2015/11/23 00:06:18 wiz Exp $
d3 1
a3 1
DISTNAME=	cryptography-1.1.2
@


1.33
log
@Update py-cryptography to 1.1.1:

1.1.1 - 2015-11-19
~~~~~~~~~~~~~~~~~~

* Fixed several small bugs related to compiling the OpenSSL bindings with
  unusual OpenSSL configurations.
* Resolved an issue where, depending on the method of installation and
  which Python interpreter they were using, users on El Capitan (OS X 10.11)
  may have seen an ``InternalError`` on import.
@
text
@d1 1
a1 1
# $NetBSD: Makefile,v 1.32 2015/11/12 16:37:00 wiz Exp $
d3 1
a3 1
DISTNAME=	cryptography-1.1.1
@


1.32
log
@Update py-cryptography to 1.1:

1.1 - 2015-10-28
~~~~~~~~~~~~~~~~

* Added support for Elliptic Curve Diffie-Hellman with
  :class:`~cryptography.hazmat.primitives.asymmetric.ec.ECDH`.
* Added :class:`~cryptography.hazmat.primitives.kdf.x963kdf.X963KDF`.
* Added support for parsing certificate revocation lists (CRLs) using
  :func:`~cryptography.x509.load_pem_x509_crl` and
  :func:`~cryptography.x509.load_der_x509_crl`.
* Add support for AES key wrapping with
  :func:`~cryptography.hazmat.primitives.keywrap.aes_key_wrap` and
  :func:`~cryptography.hazmat.primitives.keywrap.aes_key_unwrap`.
* Added a ``__hash__`` method to :class:`~cryptography.x509.Name`.
* Add support for encoding and decoding elliptic curve points to a byte string
  form using
  :meth:`~cryptography.hazmat.primitives.asymmetric.ec.EllipticCurvePublicNumbers.encode_point`
  and
  :meth:`~cryptography.hazmat.primitives.asymmetric.ec.EllipticCurvePublicNumbers.from_encoded_point`.
* Added :meth:`~cryptography.x509.Extensions.get_extension_for_class`.
* :class:`~cryptography.x509.CertificatePolicies` are now supported in the
  :class:`~cryptography.x509.CertificateBuilder`.
* ``countryName`` is now encoded as a ``PrintableString`` when creating subject
  and issuer distinguished names with the Certificate and CSR builder classes.
@
text
@d1 1
a1 1
# $NetBSD: Makefile,v 1.31 2015/10/19 09:37:29 wiz Exp $
d3 1
a3 1
DISTNAME=	cryptography-1.1
@


1.31
log
@Update py-cryptography to 1.0.2:

1.0.2 - 2015-09-27
~~~~~~~~~~~~~~~~~~
* **SECURITY ISSUE**: The OpenSSL backend prior to 1.0.2 made extensive use
  of assertions to check response codes where our tests could not trigger a
  failure.  However, when Python is run with ``-O`` these asserts are optimized
  away.  If a user ran Python with this flag and got an invalid response code
  this could result in undefined behavior or worse. Accordingly, all response
  checks from the OpenSSL backend have been converted from ``assert``
  to a true function call. Credit **Emilia Käsper (Google Security Team)**
  for the report.
@
text
@d1 1
a1 1
# $NetBSD: Makefile,v 1.30 2015/09/06 20:32:28 wiz Exp $
d3 1
a3 1
DISTNAME=	cryptography-1.0.2
@


1.30
log
@Update to 1.0.1:

1.0.1 - 2015-09-05
~~~~~~~~~~~~~~~~~~

* We now ship OS X wheels that statically link OpenSSL by default. When
  installing a wheel on OS X 10.10+ (and using a Python compiled against the
  10.10 SDK) users will no longer need to compile. See :doc:`/installation` for
  alternate installation methods if required.
* Set the default string mask to UTF-8 in the OpenSSL backend to resolve
  character encoding issues with older versions of OpenSSL.
* Several new OpenSSL bindings have been added to support a future pyOpenSSL
  release.
* Raise an error during install on PyPy < 2.6. 1.0+ requires PyPy 2.6+.
@
text
@d1 1
a1 1
# $NetBSD: Makefile,v 1.29 2015/09/05 12:00:10 jperkin Exp $
d3 1
a3 1
DISTNAME=	cryptography-1.0.1
@


1.29
log
@Fix PLIST on Darwin.  Use MASTER_SITE_PYPI.
@
text
@d1 1
a1 1
# $NetBSD: Makefile,v 1.28 2015/08/17 15:55:28 wiz Exp $
d3 1
a3 1
DISTNAME=	cryptography-1.0
@


1.28
log
@Update to 1.0:

1.0 - 2015-08-12
~~~~~~~~~~~~~~~~

* Switched to the new `cffi`_ ``set_source`` out-of-line API mode for
  compilation. This results in significantly faster imports and lowered
  memory consumption. Due to this change we no longer support PyPy releases
  older than 2.6 nor do we support any released version of PyPy3 (until a
  version supporting cffi 1.0 comes out).
* Fix parsing of OpenSSH public keys that have spaces in comments.
* Support serialization of certificate signing requests using the
  ``public_bytes`` method of
  :class:`~cryptography.x509.CertificateSigningRequest`.
* Support serialization of certificates using the ``public_bytes`` method of
  :class:`~cryptography.x509.Certificate`.
* Add ``get_provisioning_uri`` method to
  :class:`~cryptography.hazmat.primitives.twofactor.hotp.HOTP` and
  :class:`~cryptography.hazmat.primitives.twofactor.totp.TOTP` for generating
  provisioning URIs.
* Add :class:`~cryptography.hazmat.primitives.kdf.concatkdf.ConcatKDFHash`
  and :class:`~cryptography.hazmat.primitives.kdf.concatkdf.ConcatKDFHMAC`.
* Raise a ``TypeError`` when passing objects that are not text as the value to
  :class:`~cryptography.x509.NameAttribute`.
* Add support for :class:`~cryptography.x509.OtherName` as a general name
  type.
* Added new X.509 extension support in :class:`~cryptography.x509.Certificate`
  The following new extensions are now supported:

  * :class:`~cryptography.x509.OCSPNoCheck`
  * :class:`~cryptography.x509.InhibitAnyPolicy`
  * :class:`~cryptography.x509.IssuerAlternativeName`
  * :class:`~cryptography.x509.NameConstraints`

* Extension support was added to
  :class:`~cryptography.x509.CertificateSigningRequest`.
* Add support for creating signed certificates with
  :class:`~cryptography.x509.CertificateBuilder`. This includes support for
  the following extensions:

  * :class:`~cryptography.x509.BasicConstraints`
  * :class:`~cryptography.x509.SubjectAlternativeName`
  * :class:`~cryptography.x509.KeyUsage`
  * :class:`~cryptography.x509.ExtendedKeyUsage`
  * :class:`~cryptography.x509.SubjectKeyIdentifier`
  * :class:`~cryptography.x509.AuthorityKeyIdentifier`
  * :class:`~cryptography.x509.AuthorityInformationAccess`
  * :class:`~cryptography.x509.CRLDistributionPoints`
  * :class:`~cryptography.x509.InhibitAnyPolicy`
  * :class:`~cryptography.x509.IssuerAlternativeName`
  * :class:`~cryptography.x509.OCSPNoCheck`

* Add support for creating certificate signing requests with
  :class:`~cryptography.x509.CertificateSigningRequestBuilder`. This includes
  support for the same extensions supported in the ``CertificateBuilder``.
* Deprecate ``encode_rfc6979_signature`` and ``decode_rfc6979_signature`` in
  favor of
  :func:`~cryptography.hazmat.primitives.asymmetric.utils.encode_dss_signature`
  and
  :func:`~cryptography.hazmat.primitives.asymmetric.utils.decode_dss_signature`.
@
text
@d1 1
a1 1
# $NetBSD: Makefile,v 1.27 2015/07/14 08:51:47 wiz Exp $
d6 1
a6 1
MASTER_SITES=	https://pypi.python.org/packages/source/c/cryptography/
@


1.27
log
@Update to 0.9.3:

0.9.3 - 2015-07-09
~~~~~~~~~~~~~~~~~~

* Updated Windows wheels to be compiled against OpenSSL 1.0.2d.
@
text
@d1 1
a1 1
# $NetBSD: Makefile,v 1.26 2015/07/05 18:34:42 wiz Exp $
d3 1
a3 1
DISTNAME=	cryptography-0.9.3
@


1.26
log
@Update to 0.9.2:

0.9.2 - 2015-07-04
~~~~~~~~~~~~~~~~~~

* Updated Windows wheels to be compiled against OpenSSL 1.0.2c.
@
text
@d1 1
a1 1
# $NetBSD: Makefile,v 1.25 2015/06/07 08:49:22 wiz Exp $
d3 1
a3 1
DISTNAME=	cryptography-0.9.2
@


1.25
log
@Update to 0.9.1:

0.9.1 - 2015-06-06
~~~~~~~~~~~~~~~~~~

* **SECURITY ISSUE**: Fixed a double free in the OpenSSL backend when using DSA
  to verify signatures. Note that this only affects PyPy 2.6.0 and (presently
  unreleased) CFFI versions greater than 1.1.0.
@
text
@d1 1
a1 1
# $NetBSD: Makefile,v 1.24 2015/05/28 18:42:16 wiz Exp $
d3 1
a3 1
DISTNAME=	cryptography-0.9.1
@


1.24
log
@Add missing dependency for py27 version of this package.
Broke build, so no PKGREVISION bump needed.
@
text
@d1 1
a1 1
# $NetBSD: Makefile,v 1.23 2015/05/28 07:11:08 wiz Exp $
d3 1
a3 1
DISTNAME=	cryptography-0.9
@


1.23
log
@Update to 0.9:

0.9 - 2015-05-13
~~~~~~~~~~~~~~~~

* Removed support for Python 3.2. This version of Python is rarely used
  and caused support headaches. Users affected by this should upgrade to 3.3+.
* Deprecated support for Python 2.6. At the time there is no time table for
  actually dropping support, however we strongly encourage all users to upgrade
  their Python, as Python 2.6 no longer receives support from the Python core
  team.
* Add support for the
  :class:`~cryptography.hazmat.primitives.asymmetric.ec.SECP256K1` elliptic
  curve.
* Fixed compilation when using an OpenSSL which was compiled with the
  ``no-comp`` (``OPENSSL_NO_COMP``) option.
* Support :attr:`~cryptography.hazmat.primitives.serialization.Encoding.DER`
  serialization of public keys using the ``public_bytes`` method of
  :class:`~cryptography.hazmat.primitives.asymmetric.rsa.RSAPublicKeyWithSerialization`,
  :class:`~cryptography.hazmat.primitives.asymmetric.dsa.DSAPublicKeyWithSerialization`,
  and
  :class:`~cryptography.hazmat.primitives.asymmetric.ec.EllipticCurvePublicKeyWithSerialization`.
* Support :attr:`~cryptography.hazmat.primitives.serialization.Encoding.DER`
  serialization of private keys using the ``private_bytes`` method of
  :class:`~cryptography.hazmat.primitives.asymmetric.rsa.RSAPrivateKeyWithSerialization`,
  :class:`~cryptography.hazmat.primitives.asymmetric.dsa.DSAPrivateKeyWithSerialization`,
  and
  :class:`~cryptography.hazmat.primitives.asymmetric.ec.EllipticCurvePrivateKeyWithSerialization`.
* Add support for parsing X.509 certificate signing requests (CSRs) with
  :func:`~cryptography.x509.load_pem_x509_csr` and
  :func:`~cryptography.x509.load_der_x509_csr`.
* Moved ``cryptography.exceptions.InvalidToken`` to
  :class:`cryptography.hazmat.primitives.twofactor.InvalidToken` and deprecated
  the old location. This was moved to minimize confusion between this exception
  and :class:`cryptography.fernet.InvalidToken`.
* Added support for X.509 extensions in :class:`~cryptography.x509.Certificate`
  objects. The following extensions are supported as of this release:

  * :class:`~cryptography.x509.BasicConstraints`
  * :class:`~cryptography.x509.AuthorityKeyIdentifier`
  * :class:`~cryptography.x509.SubjectKeyIdentifier`
  * :class:`~cryptography.x509.KeyUsage`
  * :class:`~cryptography.x509.SubjectAlternativeName`
  * :class:`~cryptography.x509.ExtendedKeyUsage`
  * :class:`~cryptography.x509.CRLDistributionPoints`
  * :class:`~cryptography.x509.AuthorityInformationAccess`
  * :class:`~cryptography.x509.CertificatePolicies`

  Note that unsupported extensions with the critical flag raise
  :class:`~cryptography.x509.UnsupportedExtension` while unsupported extensions
  set to non-critical are silently ignored. Read the
  :doc:`X.509 documentation</x509>` for more information.
@
text
@d1 1
a1 1
# $NetBSD: Makefile,v 1.22 2015/04/14 11:40:31 wiz Exp $
d26 3
@


1.22
log
@Remove more references to python-2.6.
@
text
@d1 1
a1 1
# $NetBSD: Makefile,v 1.21 2015/04/12 14:42:30 wiz Exp $
d3 1
a3 1
DISTNAME=	cryptography-0.8.2
d16 1
@


1.21
log
@Update to 0.8.2:

0.8.2 - 2015-04-10
~~~~~~~~~~~~~~~~~~

* Fixed a race condition when initializing the OpenSSL or CommonCrypto backends
  in a multi-threaded scenario.
@
text
@d1 1
a1 1
# $NetBSD: Makefile,v 1.20 2015/04/02 22:37:57 wiz Exp $
d25 1
a25 1
.if ${PYPKGPREFIX} == "py26" || ${PYPKGPREFIX} == "py27" || ${PYPKGPREFIX} == "py33"
@


1.20
log
@Update to 0.8.1:

0.8.1 - 2015-03-20
~~~~~~~~~~~~~~~~~~

* Updated Windows wheels to be compiled against OpenSSL 1.0.2a.
@
text
@d1 1
a1 1
# $NetBSD: Makefile,v 1.19 2015/03/15 21:10:16 wiz Exp $
d3 1
a3 1
DISTNAME=	cryptography-0.8.1
@


1.19
log
@Update to 0.8:

0.8 - 2015-03-08
~~~~~~~~~~~~~~~~

* :func:`~cryptography.hazmat.primitives.serialization.load_ssh_public_key` can
  now load elliptic curve public keys.
* Added
  :attr:`~cryptography.x509.Certificate.signature_hash_algorithm` support to
  :class:`~cryptography.x509.Certificate`.
* Added
  :func:`~cryptography.hazmat.primitives.asymmetric.rsa.rsa_recover_prime_factors`
* :class:`~cryptography.hazmat.primitives.kdf.KeyDerivationFunction` was moved
  from :mod:`~cryptography.hazmat.primitives.interfaces` to
  :mod:`~cryptography.hazmat.primitives.kdf`.
* Added support for parsing X.509 names. See the
  :doc:`X.509 documentation</x509>` for more information.
* Added
  :func:`~cryptography.hazmat.primitives.serialization.load_der_private_key` to
  support loading of DER encoded private keys and
  :func:`~cryptography.hazmat.primitives.serialization.load_der_public_key` to
  support loading DER encoded public keys.
* Fixed building against LibreSSL, a compile-time substitute for OpenSSL.
* FreeBSD 9.2 was removed from the continuous integration system.
* Updated Windows wheels to be compiled against OpenSSL 1.0.2.
* :func:`~cryptography.hazmat.primitives.serialization.load_pem_public_key`
  and :func:`~cryptography.hazmat.primitives.serialization.load_der_public_key`
  now support PKCS1 RSA public keys (in addition to the previous support for
  SubjectPublicKeyInfo format for RSA, EC, and DSA).
* Added
  :class:`~cryptography.hazmat.primitives.asymmetric.ec.EllipticCurvePrivateKeyWithSerialization`
  and deprecated
  :class:`~cryptography.hazmat.primitives.asymmetric.ec.EllipticCurvePrivateKeyWithNumbers`.
* Added
  :meth:`~cryptography.hazmat.primitives.asymmetric.ec.EllipticCurvePrivateKeyWithSerialization.private_bytes`
  to
  :class:`~cryptography.hazmat.primitives.asymmetric.ec.EllipticCurvePrivateKeyWithSerialization`.
* Added
  :class:`~cryptography.hazmat.primitives.asymmetric.rsa.RSAPrivateKeyWithSerialization`
  and deprecated
  :class:`~cryptography.hazmat.primitives.asymmetric.rsa.RSAPrivateKeyWithNumbers`.
* Added
  :meth:`~cryptography.hazmat.primitives.asymmetric.rsa.RSAPrivateKeyWithSerialization.private_bytes`
  to
  :class:`~cryptography.hazmat.primitives.asymmetric.rsa.RSAPrivateKeyWithSerialization`.
* Added
  :class:`~cryptography.hazmat.primitives.asymmetric.dsa.DSAPrivateKeyWithSerialization`
  and deprecated
  :class:`~cryptography.hazmat.primitives.asymmetric.dsa.DSAPrivateKeyWithNumbers`.
* Added
  :meth:`~cryptography.hazmat.primitives.asymmetric.dsa.DSAPrivateKeyWithSerialization.private_bytes`
  to
  :class:`~cryptography.hazmat.primitives.asymmetric.dsa.DSAPrivateKeyWithSerialization`.
* Added
  :class:`~cryptography.hazmat.primitives.asymmetric.rsa.RSAPublicKeyWithSerialization`
  and deprecated
  :class:`~cryptography.hazmat.primitives.asymmetric.rsa.RSAPublicKeyWithNumbers`.
* Added
  :meth:`~cryptography.hazmat.primitives.asymmetric.rsa.RSAPublicKeyWithSerialization.public_bytes`
  to
  :class:`~cryptography.hazmat.primitives.asymmetric.rsa.RSAPublicKeyWithSerialization`.
* Added
  :class:`~cryptography.hazmat.primitives.asymmetric.ec.EllipticCurvePublicKeyWithSerialization`
  and deprecated
  :class:`~cryptography.hazmat.primitives.asymmetric.ec.EllipticCurvePublicKeyWithNumbers`.
* Added
  :meth:`~cryptography.hazmat.primitives.asymmetric.ec.EllipticCurvePublicKeyWithSerialization.public_bytes`
  to
  :class:`~cryptography.hazmat.primitives.asymmetric.ec.EllipticCurvePublicKeyWithSerialization`.
* Added
  :class:`~cryptography.hazmat.primitives.asymmetric.dsa.DSAPublicKeyWithSerialization`
  and deprecated
  :class:`~cryptography.hazmat.primitives.asymmetric.dsa.DSAPublicKeyWithNumbers`.
* Added
  :meth:`~cryptography.hazmat.primitives.asymmetric.dsa.DSAPublicKeyWithSerialization.public_bytes`
  to
  :class:`~cryptography.hazmat.primitives.asymmetric.dsa.DSAPublicKeyWithSerialization`.
* :class:`~cryptography.hazmat.primitives.hashes.HashAlgorithm` and
  :class:`~cryptography.hazmat.primitives.hashes.HashContext` were moved from
  :mod:`~cryptography.hazmat.primitives.interfaces` to
  :mod:`~cryptography.hazmat.primitives.hashes`.
* :class:`~cryptography.hazmat.primitives.ciphers.CipherContext`,
  :class:`~cryptography.hazmat.primitives.ciphers.AEADCipherContext`,
  :class:`~cryptography.hazmat.primitives.ciphers.AEADEncryptionContext`,
  :class:`~cryptography.hazmat.primitives.ciphers.CipherAlgorithm`, and
  :class:`~cryptography.hazmat.primitives.ciphers.BlockCipherAlgorithm`
  were moved from :mod:`~cryptography.hazmat.primitives.interfaces` to
  :mod:`~cryptography.hazmat.primitives.ciphers`.
* :class:`~cryptography.hazmat.primitives.ciphers.modes.Mode`,
  :class:`~cryptography.hazmat.primitives.ciphers.modes.ModeWithInitializationVector`,
  :class:`~cryptography.hazmat.primitives.ciphers.modes.ModeWithNonce`, and
  :class:`~cryptography.hazmat.primitives.ciphers.modes.ModeWithAuthenticationTag`
  were moved from :mod:`~cryptography.hazmat.primitives.interfaces` to
  :mod:`~cryptography.hazmat.primitives.ciphers.modes`.
* :class:`~cryptography.hazmat.primitives.padding.PaddingContext` was moved
  from :mod:`~cryptography.hazmat.primitives.interfaces` to
  :mod:`~cryptography.hazmat.primitives.padding`.
*
  :class:`~cryptography.hazmat.primitives.asymmetric.padding.AsymmetricPadding`
  was moved from :mod:`~cryptography.hazmat.primitives.interfaces` to
  :mod:`~cryptography.hazmat.primitives.asymmetric.padding`.
*
  :class:`~cryptography.hazmat.primitives.asymmetric.AsymmetricSignatureContext`
  and
  :class:`~cryptography.hazmat.primitives.asymmetric.AsymmetricVerificationContext`
  were moved from :mod:`~cryptography.hazmat.primitives.interfaces` to
  :mod:`~cryptography.hazmat.primitives.asymmetric`.
* :class:`~cryptography.hazmat.primitives.asymmetric.dsa.DSAParameters`,
  :class:`~cryptography.hazmat.primitives.asymmetric.dsa.DSAParametersWithNumbers`,
  :class:`~cryptography.hazmat.primitives.asymmetric.dsa.DSAPrivateKey`,
  :class:`~cryptography.hazmat.primitives.asymmetric.dsa.DSAPrivateKeyWithNumbers`,
  :class:`~cryptography.hazmat.primitives.asymmetric.dsa.DSAPublicKey` and
  :class:`~cryptography.hazmat.primitives.asymmetric.dsa.DSAPublicKeyWithNumbers`
  were moved from :mod:`~cryptography.hazmat.primitives.interfaces` to
  :mod:`~cryptography.hazmat.primitives.asymmetric.dsa`
* :class:`~cryptography.hazmat.primitives.asymmetric.ec.EllipticCurve`,
  :class:`~cryptography.hazmat.primitives.asymmetric.ec.EllipticCurveSignatureAlgorithm`,
  :class:`~cryptography.hazmat.primitives.asymmetric.ec.EllipticCurvePrivateKey`,
  :class:`~cryptography.hazmat.primitives.asymmetric.ec.EllipticCurvePrivateKeyWithNumbers`,
  :class:`~cryptography.hazmat.primitives.asymmetric.ec.EllipticCurvePublicKey`,
  and
  :class:`~cryptography.hazmat.primitives.asymmetric.ec.EllipticCurvePublicKeyWithNumbers`
  were moved from :mod:`~cryptography.hazmat.primitives.interfaces` to
  :mod:`~cryptography.hazmat.primitives.asymmetric.ec`.
* :class:`~cryptography.hazmat.primitives.asymmetric.rsa.RSAPrivateKey`,
  :class:`~cryptography.hazmat.primitives.asymmetric.rsa.RSAPrivateKeyWithNumbers`,
  :class:`~cryptography.hazmat.primitives.asymmetric.rsa.RSAPublicKey` and
  :class:`~cryptography.hazmat.primitives.asymmetric.rsa.RSAPublicKeyWithNumbers`
  were moved from :mod:`~cryptography.hazmat.primitives.interfaces` to
  :mod:`~cryptography.hazmat.primitives.asymmetric.rsa`.
@
text
@d1 1
a1 1
# $NetBSD: Makefile,v 1.18 2015/01/18 17:25:39 wiz Exp $
d3 1
a3 1
DISTNAME=	cryptography-0.8
@


1.18
log
@Update to 0.7.2:

0.7.2 - 2015-01-16
~~~~~~~~~~~~~~~~~~

* Updated Windows wheels to be compiled against OpenSSL 1.0.1l.
* ``enum34`` is no longer installed on Python 3.4, where it is included in
  the standard library.
* Added a new function to the OpenSSL bindings to support additional
  functionality in pyOpenSSL.
@
text
@d1 1
a1 1
# $NetBSD: Makefile,v 1.17 2015/01/07 01:01:12 wiz Exp $
d3 1
a3 1
DISTNAME=	cryptography-0.7.2
@


1.17
log
@Revert previous, already fixed.
@
text
@d1 1
a1 1
# $NetBSD: Makefile,v 1.16 2015/01/06 22:58:41 joerg Exp $
d3 1
a3 1
DISTNAME=	cryptography-0.7.1
a4 1
PKGREVISION=	1
@


1.16
log
@Needs py-enum34.
@
text
@d1 1
a1 1
# $NetBSD: Makefile,v 1.15 2015/01/05 08:42:32 wiz Exp $
a15 1
DEPENDS+=	${PYPKGPREFIX}-enum34-[0-9]*:../../devel/py-enum34
@


1.15
log
@Depend on py-enum34 if not building for python-3.4.
@
text
@d1 1
a1 1
# $NetBSD: Makefile,v 1.14 2015/01/04 10:25:08 wiz Exp $
d5 1
d16 1
@


1.14
log
@Add missing py-asn1 dependency causing build breakage.
XXX: No idea why I missed that when updating the package.
@
text
@d1 1
a1 1
# $NetBSD: Makefile,v 1.13 2015/01/03 16:00:55 wiz Exp $
d23 6
@


1.13
log
@Update to 0.7.1:

0.7.1 - 2014-12-28
~~~~~~~~~~~~~~~~~~

* Fixed an issue preventing compilation on platforms where ``OPENSSL_NO_SSL3``
  was defined.

0.7 - 2014-12-17
~~~~~~~~~~~~~~~~

* Cryptography has been relicensed from the Apache Software License, Version
  2.0, to being available under *either* the Apache Software License, Version
  2.0, or the BSD license.
* Added key-rotation support to :doc:`Fernet </fernet>` with
  :class:`~cryptography.fernet.MultiFernet`.
* More bit-lengths are now support for ``p`` and ``q`` when loading DSA keys
  from numbers.
* Added :class:`~cryptography.hazmat.primitives.interfaces.MACContext` as a
  common interface for CMAC and HMAC and deprecated
  :class:`~cryptography.hazmat.primitives.interfaces.CMACContext`.
* Added support for encoding and decoding :rfc:`6979` signatures in
  :doc:`/hazmat/primitives/asymmetric/utils`.
* Added
  :func:`~cryptography.hazmat.primitives.serialization.load_ssh_public_key` to
  support the loading of OpenSSH public keys (:rfc:`4253`). Only RSA and DSA
  keys are currently supported.
* Added initial support for X.509 certificate parsing. See the
  :doc:`X.509 documentation</x509>` for more information.
@
text
@d1 1
a1 1
# $NetBSD: Makefile,v 1.12 2014/10/20 11:21:06 wiz Exp $
d13 1
@


1.12
log
@Update to 0.6.1:

0.6.1 - 2014-10-15
~~~~~~~~~~~~~~~~~~

* Updated Windows wheels to be compiled against OpenSSL 1.0.1j.
* Fixed an issue where OpenSSL 1.0.1j changed the errors returned by some
  functions.
* Added our license file to the ``cryptography-vectors`` package.
* Implemented DSA hash truncation support (per FIPS 186-3) in the OpenSSL
  backend. This works around an issue in 1.0.0, 1.0.0a, and 1.0.0b where
  truncation was not implemented.
@
text
@d1 1
a1 1
# $NetBSD: Makefile,v 1.11 2014/10/05 14:53:10 wiz Exp $
d3 1
a3 1
DISTNAME=	cryptography-0.6.1
d11 1
a11 1
LICENSE=	apache-2.0
@


1.11
log
@Update to 0.6:

0.6 - 2014-09-29
~~~~~~~~~~~~~~~~

* Added
  :func:`~cryptography.hazmat.primitives.serialization.load_pem_private_key` to
  ease loading private keys, and
  :func:`~cryptography.hazmat.primitives.serialization.load_pem_public_key` to
  support loading public keys.
* Removed the, deprecated in 0.4, support for the ``salt_length`` argument to
  the :class:`~cryptography.hazmat.primitives.asymmetric.padding.MGF1`
  constructor. The ``salt_length`` should be passed to
  :class:`~cryptography.hazmat.primitives.asymmetric.padding.PSS` instead.
* Fix compilation on OS X Yosemite.
* Deprecated ``elliptic_curve_private_key_from_numbers`` and
  ``elliptic_curve_public_key_from_numbers`` in favor of
  ``load_elliptic_curve_private_numbers`` and
  ``load_elliptic_curve_public_numbers`` on
  :class:`~cryptography.hazmat.backends.interfaces.EllipticCurveBackend`.
* Added
  :class:`~cryptography.hazmat.primitives.interfaces.EllipticCurvePrivateKeyWithNumbers`
  and
  :class:`~cryptography.hazmat.primitives.interfaces.EllipticCurvePublicKeyWithNumbers`
  support.
* Work around three GCM related bugs in CommonCrypto and OpenSSL.

  * On the CommonCrypto backend adding AAD but not subsequently calling update
    would return null tag bytes.

  * One the CommonCrypto backend a call to update without an empty add AAD call
    would return null ciphertext bytes.

  * On the OpenSSL backend with certain versions adding AAD only would give
    invalid tag bytes.

* Support loading EC private keys from PEM.
@
text
@d1 1
a1 1
# $NetBSD: Makefile,v 1.10 2014/08/25 18:37:18 wiz Exp $
d3 1
a3 1
DISTNAME=	cryptography-0.6
@


1.10
log
@Update to 0.5.4:

0.5.4 - 2014-08-20
~~~~~~~~~~~~~~~~~~

* Added several functions to the OpenSSL bindings to support new
  functionality in pyOpenSSL.
* Fixed a redefined constant causing compilation failure with Solaris 11.2.
@
text
@d1 1
a1 1
# $NetBSD: Makefile,v 1.9 2014/08/10 14:42:25 wiz Exp $
d3 1
a3 1
DISTNAME=	cryptography-0.5.4
@


1.9
log
@Update to 0.5.3:

0.5.3 - 2014-08-06
~~~~~~~~~~~~~~~~~~

* Updated Windows wheels to be compiled against OpenSSL 1.0.1i.
@
text
@d1 1
a1 1
# $NetBSD: Makefile,v 1.8 2014/07/29 11:51:36 wiz Exp $
d3 1
a3 1
DISTNAME=	cryptography-0.5.3
@


1.8
log
@Update to 0.5.2:

0.5.2 - 2014-07-09
~~~~~~~~~~~~~~~~~~

* Add
  :class:`~cryptography.hazmat.backends.interfaces.TraditionalOpenSSLSerializationBackend`
  support to :doc:`/hazmat/backends/multibackend`.
* Fix compilation error on OS X 10.8 (Mountain Lion).

0.5.1 - 2014-07-07
~~~~~~~~~~~~~~~~~~

* Add
  :class:`~cryptography.hazmat.backends.interfaces.PKCS8SerializationBackend`
  support to :doc:`/hazmat/backends/multibackend`.

0.5 - 2014-07-07
~~~~~~~~~~~~~~~~

* **BACKWARDS INCOMPATIBLE:**
  :class:`~cryptography.hazmat.primitives.ciphers.modes.GCM` no longer allows
  truncation of tags by default. Previous versions of ``cryptography`` allowed
  tags to be truncated by default, applications wishing to preserve this
  behavior (not recommended) can pass the ``min_tag_length`` argument.
* Windows builds now statically link OpenSSL by default. When installing a
  wheel on Windows you no longer need to install OpenSSL separately. Windows
  users can switch between static and dynamic linking with an environment
  variable. See :doc:`/installation` for more details.
* Added :class:`~cryptography.hazmat.primitives.kdf.hkdf.HKDFExpand`.
* Added :class:`~cryptography.hazmat.primitives.ciphers.modes.CFB8` support
  for :class:`~cryptography.hazmat.primitives.ciphers.algorithms.AES` and
  :class:`~cryptography.hazmat.primitives.ciphers.algorithms.TripleDES` on
  :doc:`/hazmat/backends/commoncrypto` and :doc:`/hazmat/backends/openssl`.
* Added ``AES`` :class:`~cryptography.hazmat.primitives.ciphers.modes.CTR`
  support to the OpenSSL backend when linked against 0.9.8.
* Added
  :class:`~cryptography.hazmat.backends.interfaces.PKCS8SerializationBackend`
  and
  :class:`~cryptography.hazmat.backends.interfaces.TraditionalOpenSSLSerializationBackend`
  support to the :doc:`/hazmat/backends/openssl`.
* Added :doc:`/hazmat/primitives/asymmetric/ec` and
  :class:`~cryptography.hazmat.backends.interfaces.EllipticCurveBackend`.
* Added :class:`~cryptography.hazmat.primitives.ciphers.modes.ECB` support
  for :class:`~cryptography.hazmat.primitives.ciphers.algorithms.TripleDES` on
  :doc:`/hazmat/backends/commoncrypto` and :doc:`/hazmat/backends/openssl`.
* Deprecated :class:`~cryptography.hazmat.primitives.asymmetric.rsa.RSAPrivateKey`
  in favor of backend specific providers of the
  :class:`~cryptography.hazmat.primitives.interfaces.RSAPrivateKey` interface.
* Deprecated :class:`~cryptography.hazmat.primitives.asymmetric.rsa.RSAPublicKey`
  in favor of backend specific providers of the
  :class:`~cryptography.hazmat.primitives.interfaces.RSAPublicKey` interface.
* Deprecated :class:`~cryptography.hazmat.primitives.asymmetric.dsa.DSAPrivateKey`
  in favor of backend specific providers of the
  :class:`~cryptography.hazmat.primitives.interfaces.DSAPrivateKey` interface.
* Deprecated :class:`~cryptography.hazmat.primitives.asymmetric.dsa.DSAPublicKey`
  in favor of backend specific providers of the
  :class:`~cryptography.hazmat.primitives.interfaces.DSAPublicKey` interface.
* Deprecated :class:`~cryptography.hazmat.primitives.asymmetric.dsa.DSAParameters`
  in favor of backend specific providers of the
  :class:`~cryptography.hazmat.primitives.interfaces.DSAParameters` interface.
* Deprecated ``encrypt_rsa``, ``decrypt_rsa``, ``create_rsa_signature_ctx`` and
  ``create_rsa_verification_ctx`` on
  :class:`~cryptography.hazmat.backends.interfaces.RSABackend`.
* Deprecated ``create_dsa_signature_ctx`` and ``create_dsa_verification_ctx``
  on :class:`~cryptography.hazmat.backends.interfaces.DSABackend`.
@
text
@d1 1
a1 1
# $NetBSD: Makefile,v 1.7 2014/05/06 10:30:54 wiz Exp $
d3 1
a3 1
DISTNAME=	cryptography-0.5.2
@


1.7
log
@Update to 0.4:

0.4 - 2014-05-03
~~~~~~~~~~~~~~~~

* Deprecated ``salt_length`` on
  :class:`~cryptography.hazmat.primitives.asymmetric.padding.MGF1` and added it
  to :class:`~cryptography.hazmat.primitives.asymmetric.padding.PSS`. It will be
  removed from ``MGF1`` in two releases per our :doc:`/api-stability` policy.
* Added :class:`~cryptography.hazmat.primitives.ciphers.algorithms.SEED` support.
* Added :class:`~cryptography.hazmat.primitives.cmac.CMAC`.
* Added decryption support to
  :class:`~cryptography.hazmat.primitives.asymmetric.rsa.RSAPrivateKey`
  and encryption support to
  :class:`~cryptography.hazmat.primitives.asymmetric.rsa.RSAPublicKey`.
* Added signature support to
  :class:`~cryptography.hazmat.primitives.asymmetric.dsa.DSAPrivateKey`
  and verification support to
  :class:`~cryptography.hazmat.primitives.asymmetric.dsa.DSAPublicKey`.

0.3 - 2014-03-27
~~~~~~~~~~~~~~~~

* Added :class:`~cryptography.hazmat.primitives.twofactor.hotp.HOTP`.
* Added :class:`~cryptography.hazmat.primitives.twofactor.totp.TOTP`.
* Added :class:`~cryptography.hazmat.primitives.ciphers.algorithms.IDEA` support.
* Added signature support to
  :class:`~cryptography.hazmat.primitives.asymmetric.rsa.RSAPrivateKey`
  and verification support to
  :class:`~cryptography.hazmat.primitives.asymmetric.rsa.RSAPublicKey`.
* Moved test vectors to the new ``cryptography_vectors`` package.
@
text
@d1 1
a1 1
# $NetBSD: Makefile,v 1.6 2014/03/31 13:42:29 wiz Exp $
d3 1
a3 1
DISTNAME=	cryptography-0.4
@


1.6
log
@Add more test dependencies. Bump PKGREVISION.
@
text
@d1 1
a1 1
# $NetBSD: Makefile,v 1.5 2014/03/22 00:07:20 wiz Exp $
d3 1
a3 1
DISTNAME=	cryptography-0.2.2
a4 1
PKGREVISION=	3
@


1.5
log
@Revert previous, the PKGNAME is ${PYPKGPREFIX}-test nowadays.
@
text
@d1 1
a1 1
# $NetBSD: Makefile,v 1.4 2014/03/21 23:39:28 gdt Exp $
d5 1
a5 1
PKGREVISION=	2
d17 3
@


1.4
log
@Fix dependency pattern.
@
text
@d1 1
a1 1
# $NetBSD: Makefile,v 1.3 2014/03/21 22:04:19 wiz Exp $
d18 1
a18 1
BUILD_DEPENDS+=	${PYPKGPREFIX}-pytest>=0.8:../../devel/py-test
@


1.3
log
@Fix use with python-2.x.
Add test target and most of the needed dependencies.
(Two more packages ready, will be added after the freeze.)
Bump PKGREVISION.
@
text
@d1 1
a1 1
# $NetBSD: Makefile,v 1.2 2014/03/21 14:02:45 wiz Exp $
d18 1
a18 1
BUILD_DEPENDS+=	${PYPKGPREFIX}-test>=0.8:../../devel/py-test
@


1.2
log
@Define modulenames for cffi modules.
Fix PLIST issues on different compilers.
@
text
@d1 1
a1 1
# $NetBSD: Makefile,v 1.1 2014/03/21 13:20:35 wiz Exp $
d5 1
a5 1
PKGREVISION=	1
d17 5
@


1.1
log
@Import py27-cryptography-0.2.2 as security/py-cryptography.

cryptography is a package designed to expose cryptographic recipes
and primitives to Python developers.  Our goal is for it to be your
"cryptographic standard library".

cryptography includes both high level recipes, and low level
interfaces to common cryptographic algorithms such as symmetric
ciphers, message digests and key derivation functions.

Comitted during the freeze since py-OpenSSL needs it.
@
text
@d1 1
a1 1
# $NetBSD$
d5 1
a17 16
.include "../../lang/python/pyversion.mk"

.if ${PYPKGPREFIX} == "py33"
PLIST_SUBST+=   SONAME1=_cffi__xcd368b2dx4a8b9ec1.so
PLIST_SUBST+=   SONAME2=_cffi__xdf1872a9xf0ae7e21.so
PLIST_SUBST+=   SONAME3=_cffi__xf2e3c1f8xfba2f231.so
.elif ${PYPKGPREFIX} == "py27"
PLIST_SUBST+=   SONAME1=_cffi__x5fea2bacx4a8b9ec1.so
PLIST_SUBST+=   SONAME2=_cffi__x657b2f6exf0ae7e21.so
PLIST_SUBST+=   SONAME3=_cffi__xcfd0a060xfba2f231.so
.elif ${PYPKGPREFIX} == "py26"
PLIST_SUBST+=	SONAME1=_cffi__x63e6cd6axfba2f231.so
PLIST_SUBST+=	SONAME2=_cffi__xcc2cb6a8xf0ae7e21.so
PLIST_SUBST+=	SONAME3=_cffi__xe2e07463x4a8b9ec1.so
.endif

@

