The NetBSD Project

CVS log for pkgsrc/security/py-crypto/PLIST

[BACK] Up to [] / pkgsrc / security / py-crypto

Request diff between arbitrary revisions

Default branch: MAIN

Revision 1.11 / (download) - annotate - [select for diffs], Tue Oct 29 08:42:14 2013 UTC (5 years ago) by gls
Branch: MAIN
CVS Tags: pkgsrc-2018Q3-base, pkgsrc-2018Q3, pkgsrc-2018Q2-base, pkgsrc-2018Q2, pkgsrc-2018Q1-base, pkgsrc-2018Q1, pkgsrc-2017Q4-base, pkgsrc-2017Q4, pkgsrc-2017Q3-base, pkgsrc-2017Q3, pkgsrc-2017Q2-base, pkgsrc-2017Q2, pkgsrc-2017Q1-base, pkgsrc-2017Q1, pkgsrc-2016Q4-base, pkgsrc-2016Q4, pkgsrc-2016Q3-base, pkgsrc-2016Q3, pkgsrc-2016Q2-base, pkgsrc-2016Q2, pkgsrc-2016Q1-base, pkgsrc-2016Q1, pkgsrc-2015Q4-base, pkgsrc-2015Q4, pkgsrc-2015Q3-base, pkgsrc-2015Q3, pkgsrc-2015Q2-base, pkgsrc-2015Q2, pkgsrc-2015Q1-base, pkgsrc-2015Q1, pkgsrc-2014Q4-base, pkgsrc-2014Q4, pkgsrc-2014Q3-base, pkgsrc-2014Q3, pkgsrc-2014Q2-base, pkgsrc-2014Q2, pkgsrc-2014Q1-base, pkgsrc-2014Q1, pkgsrc-2013Q4-base, pkgsrc-2013Q4, pkgsrc-, HEAD
Changes since 1.10: +3 -0 lines
Diff to previous 1.10 (colored)

Update security/py-crypto to 2..6.1
This is a security fix to address CVE-2013-1445

Upstream changes:

        * [CVE-2013-1445] Fix PRNG not correctly reseeded in some situations.

         In previous versions of PyCrypto, the Crypto.Random PRNG exhibits a
         race condition that may cause forked processes to generate identical
         sequences of 'random' numbers.

Revision 1.10 / (download) - annotate - [select for diffs], Fri May 25 08:28:13 2012 UTC (6 years, 5 months ago) by wiz
Branch: MAIN
CVS Tags: pkgsrc-2013Q3-base, pkgsrc-2013Q3, pkgsrc-2013Q2-base, pkgsrc-2013Q2, pkgsrc-2013Q1-base, pkgsrc-2013Q1, pkgsrc-2012Q4-base, pkgsrc-2012Q4, pkgsrc-2012Q3-base, pkgsrc-2012Q3, pkgsrc-2012Q2-base, pkgsrc-2012Q2
Changes since 1.9: +42 -15 lines
Diff to previous 1.9 (colored)

Update to 2.6:

	* [CVE-2012-2417] Fix LP#985164: insecure ElGamal key generation.
	  (thanks: Legrandin)

	  In the ElGamal schemes (for both encryption and signatures), g is
	  supposed to be the generator of the entire Z^*_p group.  However, in
	  PyCrypto 2.5 and earlier, g is more simply the generator of a random
	  sub-group of Z^*_p.

	  The result is that the signature space (when the key is used for
	  signing) or the public key space (when the key is used for encryption)
	  may be greatly reduced from its expected size of log(p) bits, possibly
	  down to 1 bit (the worst case if the order of g is 2).

	  While it has not been confirmed, it has also been suggested that an
	  attacker might be able to use this fact to determine the private key.

	  Anyone using ElGamal keys should generate new keys as soon as practical.

	  Any additional information about this bug will be tracked at

	* Huge documentation cleanup (thanks: Legrandin).

	* Added more tests, including test vectors from NIST 800-38A
	  (thanks: Legrandin)

	* Remove broken MODE_PGP, which never actually worked properly.
	  A new mode, MODE_OPENPGP, has been added for people wishing to write
	  OpenPGP implementations.  Note that this does not implement the full
	  OpenPGP specification, only the "OpenPGP CFB mode" part of that

	* Fix: getPrime with invalid input causes Python to abort with fatal error

	* Fix: Segfaults within error-handling paths
	  (thanks: Paul Howarth & Dave Malcolm)

	* Fix: Block ciphers allow empty string as IV

	* Fix DevURandomRNG to work with Python3's new I/O stack.
	  (thanks: Sebastian Ramacher)

	* Remove automagic dependencies on libgmp and libmpir, let the caller
	  disable them using args.

	* Many other minor bug fixes and improvements (mostly thanks to Legrandin)

Revision 1.9 / (download) - annotate - [select for diffs], Sun Apr 8 20:21:55 2012 UTC (6 years, 7 months ago) by wiz
Branch: MAIN
Changes since 1.8: +2 -2 lines
Diff to previous 1.8 (colored)

All supported python versions in pkgsrc support eggs, so remove
${PLIST.eggfile} from PLISTs and support code from lang/python.

Revision 1.8 / (download) - annotate - [select for diffs], Sun Feb 12 14:37:52 2012 UTC (6 years, 9 months ago) by gls
Branch: MAIN
CVS Tags: pkgsrc-2012Q1-base, pkgsrc-2012Q1
Changes since 1.7: +64 -13 lines
Diff to previous 1.7 (colored)

Update security/py-crypto to 2.5

Upstream changes:

* Added PKCS#1 encryption schemes (v1.5 and OAEP). We now have
a decent, easy-to-use non-textbook RSA implementation. Yay!

* Added PKCS#1 signature schemes (v1.5 and PSS). v1.5 required some
extensive changes to Hash modules to contain the algorithm specific
ASN.1 OID. To that end, we now always have a (thin) Python module to
hide the one in pure C.

* Added 2 standard Key Derivation Functions (PBKDF1 and PBKDF2).

* Added export/import of RSA keys in OpenSSH and PKCS#8 formats.

* Added password-protected export/import of RSA keys (one old method
for PKCS#8 PEM only).

* Added ability to generate RSA key pairs with configurable public
exponent e.

* Added ability to construct an RSA key pair even if only the private
exponent d is known, and not p and q.

* Added SHA-2 C source code (fully from Lorenz Quack).

* Unit tests for all the above.

* Updates to documentation (both inline and in Doc/pycrypt.rst)

* All of the above changes were put together by Legrandin (Thanks!)

* Minor bug fixes ( and tests).

Revision 1.7 / (download) - annotate - [select for diffs], Sun Oct 30 13:30:36 2011 UTC (7 years ago) by obache
Branch: MAIN
CVS Tags: pkgsrc-2011Q4-base, pkgsrc-2011Q4
Changes since 1.6: +30 -6 lines
Diff to previous 1.6 (colored)

Update py-cryoto to 2.4.

	* Python 3 support!  (Thorsten E. Behrens, Anders Sundman)
	  PyCrypto now supports every version of Python from 2.1 through 3.2.

	* Timing-attack countermeasures in _fastmath: When built against
	  libgmp version 5 or later, we use mpz_powm_sec instead of mpz_powm.
	  This should prevent the timing attack described by Geremy Condra at
	  PyCon 2011:

	* New hash modules (for Python >= 2.5 only): SHA224, SHA384, and
	  SHA512 (Frédéric Bertolus)

	* Configuration using GNU autoconf.  This should help fix a bunch of
	  build issues.

	* Support using MPIR as an alternative to GMP.

	* Improve the test command in, by allowing tests to be
	  performed on a single sub-package or module only. (Legrandin)

	  You can now do something like this:

	    python test -m Hash.SHA256 --skip-slow-tests

	* Fix double-decref of "counter" when Cipher object initialisation
	  fails (Ryan Kelly)

	* Apply patches from Debian's python-crypto 2.3-3 package (Jan
	  Dittberner, Sebastian Ramacher):
	 - fix-RSA-generate-exception.patch
	 - epydoc-exclude-introspect.patch
	 - no-usr-local.patch

	* Fix launchpad bug #702835: "Import key code is not compatible with
	  GMP library" (Legrandin)

	* More tests, better documentation, various bugfixes.

Revision 1.6 / (download) - annotate - [select for diffs], Sun Dec 5 17:13:09 2010 UTC (7 years, 11 months ago) by gls
Branch: MAIN
CVS Tags: pkgsrc-2011Q3-base, pkgsrc-2011Q3, pkgsrc-2011Q2-base, pkgsrc-2011Q2, pkgsrc-2011Q1-base, pkgsrc-2011Q1, pkgsrc-2010Q4-base, pkgsrc-2010Q4
Changes since 1.5: +11 -1 lines
Diff to previous 1.5 (colored)

Update py-crypto to version 2.3

pkgsrc changes:
 - add a patch to fix an hardcoded interpreter path
 - add a patch to actually find gmp library.
 - add CONFLICTS with py-amkCrypto, both have files in common.

upstream changes:

* Fix NameError when attempting to use deprecated getRandomNumber()
* _slowmath: Compute RSA u parameter when it's not given to
RSA.construct. This makes _slowmath behave the same as _fastmath in
this regard.
* Make RSA.generate raise a more user-friendly exception message when
the user tries to generate a bogus-length key.

* Deprecated Crypto.Util.number.getRandomNumber(), which had confusing
semantics.  It's been replaced by getRandomNBitInteger and
getRandomInteger.  (Thanks: Lorenz Quack)
* Better isPrime() and getPrime() implementations that do a real
Rabin-Miller probabilistic primality test (not the phony test we did
before with fixed bases).  (Thanks: Lorenz Quack)
* getStrongPrime() implementation for generating RSA primes.
(Thanks: Lorenz Quack)
* Support for importing and exporting RSA keys in DER and PEM format
(Thanks: Legrandin)
* Fix PyCrypto when floor division (python -Qnew) is enabled.
* When building using gcc, use -std=c99 for compilation.  This should
fix building on FreeBSD and NetBSD.

Revision 1.5 / (download) - annotate - [select for diffs], Sat Jul 24 12:33:19 2010 UTC (8 years, 3 months ago) by gdt
Branch: MAIN
CVS Tags: pkgsrc-2010Q3-base, pkgsrc-2010Q3
Changes since 1.4: +2 -2 lines
Diff to previous 1.4 (colored)

Use new lang/python/, simplifying Makefile.
Support conditional egg generation, making this build on 2.4.

Revision 1.4 / (download) - annotate - [select for diffs], Fri Jul 23 23:24:19 2010 UTC (8 years, 3 months ago) by wiz
Branch: MAIN
Changes since 1.3: +1 -2 lines
Diff to previous 1.3 (colored)

Remove empty line.

Revision 1.3 / (download) - annotate - [select for diffs], Fri Jul 23 23:12:36 2010 UTC (8 years, 3 months ago) by gdt
Branch: MAIN
Changes since 1.2: +3 -2 lines
Diff to previous 1.2 (colored)

Substitute egg file name to avoid hardcoded version.

Revision 1.2 / (download) - annotate - [select for diffs], Fri Jul 23 18:30:51 2010 UTC (8 years, 3 months ago) by gdt
Branch: MAIN
Changes since 1.1: +2 -1 lines
Diff to previous 1.1 (colored)

Add PY_NO_EGG=no and egg file to PLIST.

Revision / (download) - annotate - [select for diffs] (vendor branch), Thu Jul 22 19:30:42 2010 UTC (8 years, 3 months ago) by gdt
Branch: TNF
CVS Tags: pkgsrc-base
Changes since 1.1: +0 -0 lines
Diff to previous 1.1 (colored)

Import py26-crypto-2.1.0 as security/py-crypto.

Python extensions using OpenSSL which contains hashing algorithms,

This package more or less supersedes py-amkCrypto.
chaffing/winnowing, random number generation, various utility modules,
and several block encryption and digital signature algorithms.

Revision 1.1 / (download) - annotate - [select for diffs], Thu Jul 22 19:30:42 2010 UTC (8 years, 3 months ago) by gdt
Branch: MAIN

Initial revision

This form allows you to request diff's between any two revisions of a file. You may select a symbolic revision name using the selection box or you may type in a numeric name using the type-in text box.

CVSweb <>