<feed xmlns='http://www.w3.org/2005/Atom'>
<title>delta/python-packages/cryptography.git/CHANGELOG.rst, branch dependabot/github_actions/actions/setup-python-v2.2.1</title>
<subtitle>github.com: pyca/cryptography.git
</subtitle>
<link rel='alternate' type='text/html' href='http://91.123.203.49/cgit/delta/python-packages/cryptography.git/'/>
<entry>
<title>Build manylinux2014 wheels (#5642)</title>
<updated>2020-12-12T18:45:20+00:00</updated>
<author>
<name>Alex Gaynor</name>
<email>alex.gaynor@gmail.com</email>
</author>
<published>2020-12-12T18:45:20+00:00</published>
<link rel='alternate' type='text/html' href='http://91.123.203.49/cgit/delta/python-packages/cryptography.git/commit/?id=3e53910e90aaaa7652ff8952c512132481b3de1e'/>
<id>3e53910e90aaaa7652ff8952c512132481b3de1e</id>
<content type='text'>
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
</pre>
</div>
</content>
</entry>
<entry>
<title>re-add Cryptography_HAS_TLSEXT_HOSTNAME and port 3.3.1 changelog (#5627)</title>
<updated>2020-12-10T03:30:44+00:00</updated>
<author>
<name>Paul Kehrer</name>
<email>paul.l.kehrer@gmail.com</email>
</author>
<published>2020-12-10T03:30:44+00:00</published>
<link rel='alternate' type='text/html' href='http://91.123.203.49/cgit/delta/python-packages/cryptography.git/commit/?id=657b75a01de302c34bbd8890b9803a8821662227'/>
<id>657b75a01de302c34bbd8890b9803a8821662227</id>
<content type='text'>
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
</pre>
</div>
</content>
</entry>
<entry>
<title>Remove Python2 from CI and code that branched on it (#5607)</title>
<updated>2020-12-09T05:10:10+00:00</updated>
<author>
<name>Alex Gaynor</name>
<email>alex.gaynor@gmail.com</email>
</author>
<published>2020-12-09T05:10:10+00:00</published>
<link rel='alternate' type='text/html' href='http://91.123.203.49/cgit/delta/python-packages/cryptography.git/commit/?id=ff12a375521e5b702d9d58c8a04604c65496eb54'/>
<id>ff12a375521e5b702d9d58c8a04604c65496eb54</id>
<content type='text'>
* Remove Python2 from CI and code that branched on it

* Update setup.py

Co-authored-by: Hugo van Kemenade &lt;hugovk@users.noreply.github.com&gt;

* remove

* review feedback

Co-authored-by: Hugo van Kemenade &lt;hugovk@users.noreply.github.com&gt;</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
* Remove Python2 from CI and code that branched on it

* Update setup.py

Co-authored-by: Hugo van Kemenade &lt;hugovk@users.noreply.github.com&gt;

* remove

* review feedback

Co-authored-by: Hugo van Kemenade &lt;hugovk@users.noreply.github.com&gt;</pre>
</div>
</content>
</entry>
<entry>
<title>Reopen master for 3.4 (#5605)</title>
<updated>2020-12-09T02:01:11+00:00</updated>
<author>
<name>Alex Gaynor</name>
<email>alex.gaynor@gmail.com</email>
</author>
<published>2020-12-09T02:01:11+00:00</published>
<link rel='alternate' type='text/html' href='http://91.123.203.49/cgit/delta/python-packages/cryptography.git/commit/?id=d63473112119993bc5d556e0c37b03d5e5b560f0'/>
<id>d63473112119993bc5d556e0c37b03d5e5b560f0</id>
<content type='text'>
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
</pre>
</div>
</content>
</entry>
<entry>
<title>Prepare for 3.3 release (#5603)</title>
<updated>2020-12-08T22:26:19+00:00</updated>
<author>
<name>Alex Gaynor</name>
<email>alex.gaynor@gmail.com</email>
</author>
<published>2020-12-08T22:26:19+00:00</published>
<link rel='alternate' type='text/html' href='http://91.123.203.49/cgit/delta/python-packages/cryptography.git/commit/?id=7e8fff73cf0c597fe2df34daf2027506f84b9d3b'/>
<id>7e8fff73cf0c597fe2df34daf2027506f84b9d3b</id>
<content type='text'>
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
</pre>
</div>
</content>
</entry>
<entry>
<title>Add support for RSA signature recovery (#5573)</title>
<updated>2020-12-08T04:58:04+00:00</updated>
<author>
<name>Zoltan Kelemen</name>
<email>39551158+misterzed88@users.noreply.github.com</email>
</author>
<published>2020-12-08T04:58:04+00:00</published>
<link rel='alternate' type='text/html' href='http://91.123.203.49/cgit/delta/python-packages/cryptography.git/commit/?id=6693d55cbe05c98c9e1fe3a8b08639f5491a572a'/>
<id>6693d55cbe05c98c9e1fe3a8b08639f5491a572a</id>
<content type='text'>
* Removed unused argument.

* Added support for RSA signature recovery.

* Syntatic corrections for passing pep8 tests.

* Corrected typo.

* Added test of invalid Prehashed parameter to RSA signature recover.

* Renamed recover to a more descriptive name.

* Extended RSA signature recovery with option to return full data (not
only the digest part).

* Added missing words to pass spell check.</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
* Removed unused argument.

* Added support for RSA signature recovery.

* Syntatic corrections for passing pep8 tests.

* Corrected typo.

* Added test of invalid Prehashed parameter to RSA signature recover.

* Renamed recover to a more descriptive name.

* Extended RSA signature recovery with option to return full data (not
only the digest part).

* Added missing words to pass spell check.</pre>
</div>
</content>
</entry>
<entry>
<title>disallow p less than 512-bit on DH (#5592)</title>
<updated>2020-11-29T16:01:16+00:00</updated>
<author>
<name>Paul Kehrer</name>
<email>paul.l.kehrer@gmail.com</email>
</author>
<published>2020-11-29T16:01:16+00:00</published>
<link rel='alternate' type='text/html' href='http://91.123.203.49/cgit/delta/python-packages/cryptography.git/commit/?id=4645f02c25d7d336a6d922e428c72beb55fb04cb'/>
<id>4645f02c25d7d336a6d922e428c72beb55fb04cb</id>
<content type='text'>
* disallow p less than 512-bit on DH

OpenSSL 3.0.0 enforces this so we'll go ahead and enforce it everywhere
that's practical for us. (Note that we do not enforce on deserializing
PKCS1/PKCS8 keys in &lt; 3.0.0, but this PR adds a test so that in the
3.0.0 support branch we can test an error path)

* missing test

* black

* _MIN_MODULUS_SIZE is now a thing

* skip on fips</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
* disallow p less than 512-bit on DH

OpenSSL 3.0.0 enforces this so we'll go ahead and enforce it everywhere
that's practical for us. (Note that we do not enforce on deserializing
PKCS1/PKCS8 keys in &lt; 3.0.0, but this PR adds a test so that in the
3.0.0 support branch we can test an error path)

* missing test

* black

* _MIN_MODULUS_SIZE is now a thing

* skip on fips</pre>
</div>
</content>
</entry>
<entry>
<title>Reduce granularity of error msging when deserializing keys (#5588)</title>
<updated>2020-11-26T19:07:25+00:00</updated>
<author>
<name>Paul Kehrer</name>
<email>paul.l.kehrer@gmail.com</email>
</author>
<published>2020-11-26T19:07:25+00:00</published>
<link rel='alternate' type='text/html' href='http://91.123.203.49/cgit/delta/python-packages/cryptography.git/commit/?id=ac4c22168f196921bfe00348250ff138e64bcd37'/>
<id>ac4c22168f196921bfe00348250ff138e64bcd37</id>
<content type='text'>
* Reduce granularity of error msging when deserializing keys

In OpenSSL 3.0 it is no longer possible to determine whether the reason
a key failed to deserialize is because of an unsupported cipher. Since
we want to be more resilient to OpenSSL error code instability we'll
just remove these paths.

* black

* changelog and update docs</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
* Reduce granularity of error msging when deserializing keys

In OpenSSL 3.0 it is no longer possible to determine whether the reason
a key failed to deserialize is because of an unsupported cipher. Since
we want to be more resilient to OpenSSL error code instability we'll
just remove these paths.

* black

* changelog and update docs</pre>
</div>
</content>
</entry>
<entry>
<title>Added python2 removal to the changelog (#5567)</title>
<updated>2020-11-12T17:31:10+00:00</updated>
<author>
<name>Alex Gaynor</name>
<email>alex.gaynor@gmail.com</email>
</author>
<published>2020-11-12T17:31:10+00:00</published>
<link rel='alternate' type='text/html' href='http://91.123.203.49/cgit/delta/python-packages/cryptography.git/commit/?id=548b1b2d40f6ab94072871deb90e29e05dc520c4'/>
<id>548b1b2d40f6ab94072871deb90e29e05dc520c4</id>
<content type='text'>
* Added python2 removal to the changelog

* Update CHANGELOG.rst</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
* Added python2 removal to the changelog

* Update CHANGELOG.rst</pre>
</div>
</content>
</entry>
<entry>
<title>GCM IV size limits (#5553)</title>
<updated>2020-11-09T18:56:53+00:00</updated>
<author>
<name>Paul Kehrer</name>
<email>paul.l.kehrer@gmail.com</email>
</author>
<published>2020-11-09T18:56:53+00:00</published>
<link rel='alternate' type='text/html' href='http://91.123.203.49/cgit/delta/python-packages/cryptography.git/commit/?id=b59d2de9cf0dcf5c36d37007b6e756f18e9b0160'/>
<id>b59d2de9cf0dcf5c36d37007b6e756f18e9b0160</id>
<content type='text'>
* GCM IV size limits

OpenSSL 3.0.0 is going to enforce these size limits so we might as well
put them in now.

* fix the tests

* black

* these cases can't happen if we're limiting IV size already</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
* GCM IV size limits

OpenSSL 3.0.0 is going to enforce these size limits so we might as well
put them in now.

* fix the tests

* black

* these cases can't happen if we're limiting IV size already</pre>
</div>
</content>
</entry>
</feed>
