Next | Query returned 85 messages, browsing 11 to 20 | Previous

History of commit frequency

CVS Commit History:


   2023-04-18 19:17:39 by Adam Ciarcinski | Files touched by this commit (2) | Package updated
Log message:
py-OpenSSL: updated to 23.1.1

23.1.1 (2023-03-28)

Changes:
- Worked around an issue in OpenSSL 3.1.0 which caused \ 
`X509Extension.get_short_name` to raise an exception when no short name was \ 
known to OpenSSL.

23.1.0 (2023-03-24)

Changes:
- ``cryptography`` maximum version has been increased to 40.0.x.
- Add ``OpenSSL.SSL.Connection.DTLSv1_get_timeout`` and \ 
``OpenSSL.SSL.Connection.DTLSv1_handle_timeout``
  to support DTLS timeouts
   2023-01-15 22:00:39 by Adam Ciarcinski | Files touched by this commit (1) | Package updated
Log message:
py-OpenSSL: update test status
   2023-01-15 20:40:15 by David Brownlee | Files touched by this commit (2)
Log message:
Updated security/py-OpenSSL to 23.0.0

The previous py-OpenSSL-22.1.0 would abort at runtime against
py-cryptography-39.0.x which broke py-certbot and similar.

changes:
- Add OpenSSL.SSL.X509StoreFlags.PARTIAL_CHAIN constant to allow
  for users to perform certificate verification on partial certificate
  chains. #1166
- cryptography maximum version has been increased to 39.0.x.
   2022-10-19 16:17:54 by Nia Alarie | Files touched by this commit (1)
Log message:
fighting a losing battle against the py-cryptography rustification, part 4

Add support for py-OpenSSL to versioned_dependencies.mk
   2022-09-26 19:57:07 by Adam Ciarcinski | Files touched by this commit (2) | Package updated
Log message:
py-OpenSSL: updated to 22.1.0

22.1.0:

Backward-incompatible changes:

Remove support for SSLv2 and SSLv3.
The minimum cryptography version is now 37.0.2.
The OpenSSL.crypto.X509StoreContextError exception has been refactored, changing \ 
its internal attributes.

Deprecations:

OpenSSL.SSL.SSLeay_version is deprecated in favor of \ 
OpenSSL.SSL.OpenSSL_version. The constants OpenSSL.SSL.SSLEAY_* are deprecated \ 
in favor of OpenSSL.SSL.OPENSSL_*.

Changes:

Add OpenSSL.SSL.Connection.set_verify and OpenSSL.SSL.Connection.get_verify_mode \ 
to override the context object’s verification flags.
Add OpenSSL.SSL.Connection.use_certificate and \ 
OpenSSL.SSL.Connection.use_privatekey to set a certificate per connection (and \ 
not just per context)
   2022-09-11 20:15:07 by Thomas Klausner | Files touched by this commit (2) | Package updated
Log message:
py-OpenSSL: update to 22.0.0.

22.0.0 (2022-01-29)
-------------------

Backward-incompatible changes:
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^

- Drop support for Python 2.7.
  `#1047 <https://github.com/pyca/pyopenssl/pull/1047>`_
- The minimum ``cryptography`` version is now 35.0.

Deprecations:
^^^^^^^^^^^^^

Changes:
^^^^^^^^

- Expose wrappers for some `DTLS
  <https://en.wikipedia.org/wiki/Datagram_Transport_Layer_Security>`_
  primitives. `#1026 <https://github.com/pyca/pyopenssl/pull/1026>`_
   2022-04-21 13:00:02 by Thomas Klausner | Files touched by this commit (18)
Log message:
*: convert to versioned_dependencies for py-cryptography
   2022-01-04 21:55:40 by Thomas Klausner | Files touched by this commit (1595)
Log message:
*: bump PKGREVISION for egg.mk users

They now have a tool dependency on py-setuptools instead of a DEPENDS
   2021-11-02 10:45:53 by Adam Ciarcinski | Files touched by this commit (2) | Package updated
Log message:
py-OpenSSL: updated to 21.0.0

21.0.0

Backward-incompatible changes:
- The minimum ``cryptography`` version is now 3.3.
- Drop support for Python 3.5

Changes:
- Raise an error when an invalid ALPN value is set.
- Added ``OpenSSL.SSL.Context.set_min_proto_version`` and \ 
``OpenSSL.SSL.Context.set_max_proto_version``
  to set the minimum and maximum supported TLS version
- Updated ``to_cryptography`` and ``from_cryptography`` methods to support an \ 
upcoming release of ``cryptography`` without raising deprecation warnings.
   2021-10-26 13:18:07 by Nia Alarie | Files touched by this commit (605)
Log message:
security: Replace RMD160 checksums with BLAKE2s checksums

All checksums have been double-checked against existing RMD160 and
SHA512 hashes

Unfetchable distfiles (fetched conditionally?):
./security/cyrus-sasl/distinfo \ 
cyrus-sasl-dedad73e5e7a75d01a5f3d5a6702ab8ccd2ff40d.patch.v2

Next | Query returned 85 messages, browsing 11 to 20 | Previous