./security/py-ecdsa, Easy-to-use implementation of ECDSA cryptography

[ CVSweb ] [ Homepage ] [ RSS ] [ Required by ] [ Add to tracker ]

Branch: CURRENT, Version: 0.16.0, Package name: py37-ecdsa-0.16.0, Maintainer: gls

This is an easy-to-use implementation of ECDSA cryptography (Elliptic Curve
Digital Signature Algorithm), implemented purely in Python, released under the
MIT license. With this library, you can quickly create keypairs (signing key
and verifying key), sign messages, and verify the signatures. The keys and
signatures are very short, making them easy to handle and incorporate into
other protocols.

This library provides key generation, signing, and verifying, for five popular
NIST "Suite B" GF(p) curves, with key lengths of 192, 224, 256, 384, and 521
bits. The "short names" for these curves, as known by the OpenSSL tool, are:
prime192v1, secp224r1, prime256v1, secp384r1, and secp521r1. No other curves
are included, but it would not be too hard to add more.

Required to run:
[devel/py-setuptools] [lang/py-six] [lang/python37]

Required to build:

Master sites:

SHA1: 52b4b3e423662f90c4bbbbdcf0fd6bcf52fdee01
RMD160: 4fdfc7188776539ce64f482936f6454da8ca4595
Filesize: 122.901 KB

Version history: (Expand)

CVS history: (Expand)

   2020-10-03 08:13:27 by Adam Ciarcinski | Files touched by this commit (2) | Package updated
Log message:
py-ecdsa: updated to 0.16.0

Release 0.16.0

New features:
Support for reading and writing private keys in PKCS#8 format.

New API:
`to_pem` and `to_der` now accept new parameter, `format`, to specify
the format of the encoded files, either the dafault, legacy "ssleay", or
the new `pkcs8` to use PKCS#8. Note that only unencrypted PKCS#8 files are
Add `allow_truncate` to `verify` in `VerifyingKey`, it defaults to True,
when specified as False, use of large hashes smaller than curves will be
disallowed (as it was in 0.14.1 and earlier).

Bug fix:
Correctly calculate signatures for private keys equal to n-1.
Make `PointJacobi` and thus `SigningKey` and `VerifyingKey` pickleable.

Doc fixes:
`to_pem` functions return `bytes` not `str`, document them as such.
`from_pem` and `from_pem` in `SigningKey` returns `SigningKey`, document them
as such.

Ensure that version checks will work with Python 4.
Format the source with black.
Fix uses of `assert_` in test suite.
Use newer Ubuntu in Travis to test against OpenSSL 1.1.1 (and thus
test the interoperability of ECDH code in Travis).
   2020-05-23 10:08:54 by Adam Ciarcinski | Files touched by this commit (1)
Log message:
py-ecdsa: python/application.mk is not needed
   2020-05-09 22:16:59 by Roland Illig | Files touched by this commit (1)
Log message:
security/py-ecdsa: remove unnecessary REPLACE_PYTHON

These files are not installed as executables, therefore they don't need a
script interpreter. The paths to the files were wrong anyway.
   2020-02-27 17:55:07 by Benny Siegert | Files touched by this commit (3) | Package updated
Log message:
Update py-ecdsa to 0.15.

Patch from Jonathan Schleifer via PR pkg/54883.

Contains a fix for broken signature verification.
   2015-11-04 02:18:12 by Alistair G. Crooks | Files touched by this commit (434)
Log message:
Add SHA512 digests for distfiles for security category

Problems found locating distfiles:
	Package f-prot-antivirus6-fs-bin: missing distfile fp-NetBSD.x86.32-fs-6.2.3.tar.gz
	Package f-prot-antivirus6-ws-bin: missing distfile fp-NetBSD.x86.32-ws-6.2.3.tar.gz
	Package libidea: missing distfile libidea-0.8.2b.tar.gz
	Package openssh: missing distfile openssh-7.1p1-hpn-20150822.diff.bz2
	Package uvscan: missing distfile vlp4510e.tar.Z

Otherwise, existing SHA1 digests verified and found to be the same on
the machine holding the existing distfiles (morden).  All existing
SHA1 digests retained for now as an audit trail.
   2015-06-29 19:01:09 by Guillaume Lasmayous | Files touched by this commit (2)
Log message:
Remove patch
   2015-06-29 19:00:00 by Guillaume Lasmayous | Files touched by this commit (3) | Package updated
Log message:
Update security/py-ecdsa to 0.13

pkgsrc changes:

- Adjust EGG_NAME

Upstream changes:

* Release 0.13 (07 Feb 2015)

Fix the argument order for Curve constructor (put openssl_name= at the end,
with a default value) to unbreak compatibility with external callers who used
the 0.11 convention.

* Release 0.12 (06 Feb 2015)

Switch to Versioneer for version-string management (fixing the broken
`ecdsa.__version__` attribute). Add Curve.openssl_name property. Mention
secp256k1 in README, test against OpenSSL. Produce "wheel" \ 
distributions. Add
py3.4 and pypy3 compatibility testing. Other minor fixes.
   2014-06-12 02:28:26 by Guillaume Lasmayous | Files touched by this commit (2) | Package updated
Log message:
Update security/py-ecdsa to 0.11

Upstream changes:

* Release 0.11 (10 Mar 2014)

Add signature-encoding functions "sigencode_{strings,string,der}_canonize"
which canonicalize the S value (using the smaller of the two possible
values). Add "validate_point=" argument to VerifyingKey.from_string()
constructor (defaults to True) which can be used to disable time-consuming
point validation when importing a pre-validated verifying key. Drop python2.5
support (untested but not explicitly broken yet), update trove classifiers.