* Updated Windows, macOS, and Linux wheels to be compiled with OpenSSL 3.3.2.
.. _v43-0-0:
43.0.0 - 2024-07-20
BACKWARDS INCOMPATIBLE: Support for OpenSSL less than 1.1.1e has been
removed. Users on older version of OpenSSL will need to upgrade.
BACKWARDS INCOMPATIBLE: Dropped support for LibreSSL < 3.8.
Updated Windows, macOS, and Linux wheels to be compiled with OpenSSL 3.3.1.
Updated the minimum supported Rust version (MSRV) to 1.65.0, from 1.63.0.
:func:~cryptography.hazmat.primitives.asymmetric.rsa.generate_private_key
now enforces a minimum RSA key size of 1024-bit. Note that 1024-bit is still
considered insecure, users should generally use a key size of 2048-bits.
:func:~cryptography.hazmat.primitives.serialization.pkcs7.serialize_certificates
now emits ASN.1 that more closely follows the recommendations in :rfc:2315.
Added new :doc:/hazmat/decrepit/index module which contains outdated and
insecure cryptographic primitives.
:class:~cryptography.hazmat.primitives.ciphers.algorithms.CAST5,
:class:~cryptography.hazmat.primitives.ciphers.algorithms.SEED,
:class:~cryptography.hazmat.primitives.ciphers.algorithms.IDEA, and
:class:~cryptography.hazmat.primitives.ciphers.algorithms.Blowfish, which were
deprecated in 37.0.0, have been added to this module. They will be removed
from the cipher module in 45.0.0.
Moved :class:~cryptography.hazmat.primitives.ciphers.algorithms.TripleDES
and :class:~cryptography.hazmat.primitives.ciphers.algorithms.ARC4 into
:doc:/hazmat/decrepit/index and deprecated them in the cipher module.
They will be removed from the cipher module in 48.0.0.
Added support for deterministic
:class:~cryptography.hazmat.primitives.asymmetric.ec.ECDSA (:rfc:6979)
Added support for client certificate verification to the
:mod:X.509 path validation <cryptography.x509.verification> APIs in the
form of :class:~cryptography.x509.verification.ClientVerifier,
:class:~cryptography.x509.verification.VerifiedClient, and
PolicyBuilder
:meth:~cryptography.x509.verification.PolicyBuilder.build_client_verifier.
Added Certificate
:attr:~cryptography.x509.Certificate.public_key_algorithm_oid
and Certificate Signing Request
:attr:~cryptography.x509.CertificateSigningRequest.public_key_algorithm_oid
to determine the :class:~cryptography.hazmat._oid.PublicKeyAlgorithmOID
Object Identifier of the public key found inside the certificate.
Added :attr:~cryptography.x509.InvalidityDate.invalidity_date_utc, a
timezone-aware alternative to the naïve datetime attribute
:attr:~cryptography.x509.InvalidityDate.invalidity_date.
Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.
Dependabot commands and options
You can trigger Dependabot actions by commenting on this PR:
- `@dependabot rebase` will rebase this PR
- `@dependabot recreate` will recreate this PR, overwriting any edits that have been made to it
- `@dependabot merge` will merge this PR after your CI passes on it
- `@dependabot squash and merge` will squash and merge this PR after your CI passes on it
- `@dependabot cancel merge` will cancel a previously requested merge and block automerging
- `@dependabot reopen` will reopen this PR if it is closed
- `@dependabot close` will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually
- `@dependabot show ignore conditions` will show all of the ignore conditions of the specified dependency
- `@dependabot ignore this major version` will close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself)
- `@dependabot ignore this minor version` will close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself)
- `@dependabot ignore this dependency` will close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself)
You can disable automated security fix PRs for this repo from the [Security Alerts page](https://github.com/polarmutex/fava-envelope/network/alerts).
Bumps cryptography from 41.0.6 to 43.0.1.
Changelog
Sourced from cryptography's changelog.
... (truncated)
Commits
a773387
bump for 43.0.1 (#11533)0393fef
Backport setuptools version ban (#11526)6687bab
Bump openssl from 0.10.65 to 0.10.66 in /src/rust (#11320) (#11324)ebf14f2
bump for 43.0.0 and update changelog (#11311)42788a0
Fix exchange with keys that had Q automatically computed (#11309)2dbdfb8
don't assign unused name (#11310)ccc66e6
Bump openssl from 0.10.64 to 0.10.65 in /src/rust (#11308)4310c87
Bump sphinxcontrib-qthelp from 1.0.7 to 1.0.8 (#11307)f66a9c4
Bump sphinxcontrib-htmlhelp from 2.0.5 to 2.0.6 (#11306)a8fcf18
Bump openssl-sys from 0.9.102 to 0.9.103 in /src/rust (#11305)Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting
@dependabot rebase
.Dependabot commands and options
You can trigger Dependabot actions by commenting on this PR: - `@dependabot rebase` will rebase this PR - `@dependabot recreate` will recreate this PR, overwriting any edits that have been made to it - `@dependabot merge` will merge this PR after your CI passes on it - `@dependabot squash and merge` will squash and merge this PR after your CI passes on it - `@dependabot cancel merge` will cancel a previously requested merge and block automerging - `@dependabot reopen` will reopen this PR if it is closed - `@dependabot close` will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually - `@dependabot show