CHANGELOG.rst 90 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997998999100010011002100310041005100610071008100910101011101210131014101510161017101810191020102110221023102410251026102710281029103010311032103310341035103610371038103910401041104210431044104510461047104810491050105110521053105410551056105710581059106010611062106310641065106610671068106910701071107210731074107510761077107810791080108110821083108410851086108710881089109010911092109310941095109610971098109911001101110211031104110511061107110811091110111111121113111411151116111711181119112011211122112311241125112611271128112911301131113211331134113511361137113811391140114111421143114411451146114711481149115011511152115311541155115611571158115911601161116211631164116511661167116811691170117111721173117411751176117711781179118011811182118311841185118611871188118911901191119211931194119511961197119811991200120112021203120412051206120712081209121012111212121312141215121612171218121912201221122212231224122512261227122812291230123112321233123412351236123712381239124012411242124312441245124612471248124912501251125212531254125512561257125812591260126112621263126412651266126712681269127012711272127312741275127612771278127912801281128212831284128512861287128812891290129112921293129412951296129712981299130013011302130313041305130613071308130913101311131213131314131513161317131813191320132113221323132413251326132713281329133013311332133313341335133613371338133913401341134213431344134513461347134813491350135113521353135413551356135713581359136013611362136313641365136613671368136913701371137213731374137513761377137813791380138113821383138413851386138713881389139013911392139313941395139613971398139914001401140214031404140514061407140814091410141114121413141414151416141714181419142014211422142314241425142614271428142914301431143214331434143514361437143814391440144114421443144414451446144714481449145014511452145314541455145614571458145914601461146214631464146514661467146814691470147114721473147414751476147714781479148014811482148314841485148614871488148914901491149214931494149514961497149814991500150115021503150415051506150715081509151015111512151315141515151615171518151915201521152215231524152515261527152815291530153115321533153415351536153715381539154015411542154315441545154615471548154915501551155215531554155515561557155815591560156115621563156415651566156715681569157015711572157315741575157615771578157915801581158215831584158515861587158815891590159115921593159415951596159715981599160016011602160316041605160616071608160916101611161216131614161516161617161816191620162116221623162416251626162716281629163016311632163316341635163616371638163916401641164216431644164516461647164816491650165116521653165416551656165716581659166016611662166316641665166616671668166916701671167216731674167516761677167816791680168116821683168416851686168716881689169016911692169316941695169616971698169917001701170217031704170517061707170817091710171117121713171417151716171717181719172017211722172317241725172617271728172917301731173217331734173517361737173817391740174117421743174417451746174717481749175017511752175317541755175617571758175917601761176217631764176517661767176817691770177117721773177417751776177717781779178017811782178317841785178617871788178917901791179217931794179517961797179817991800180118021803180418051806180718081809181018111812181318141815181618171818181918201821182218231824182518261827182818291830183118321833183418351836183718381839184018411842184318441845184618471848184918501851185218531854185518561857185818591860186118621863186418651866186718681869187018711872187318741875187618771878187918801881188218831884188518861887188818891890189118921893189418951896189718981899190019011902190319041905190619071908190919101911191219131914191519161917191819191920192119221923192419251926192719281929193019311932193319341935193619371938193919401941194219431944194519461947194819491950195119521953195419551956195719581959196019611962196319641965196619671968196919701971197219731974197519761977197819791980198119821983198419851986198719881989199019911992199319941995199619971998199920002001200220032004200520062007200820092010201120122013201420152016201720182019202020212022202320242025202620272028202920302031203220332034203520362037203820392040204120422043204420452046204720482049205020512052205320542055205620572058205920602061206220632064206520662067206820692070207120722073207420752076207720782079208020812082208320842085208620872088208920902091209220932094209520962097209820992100210121022103210421052106210721082109211021112112211321142115211621172118211921202121212221232124212521262127212821292130213121322133213421352136213721382139214021412142214321442145214621472148214921502151215221532154215521562157215821592160216121622163216421652166216721682169217021712172217321742175217621772178217921802181218221832184218521862187218821892190219121922193219421952196219721982199220022012202220322042205220622072208220922102211221222132214221522162217221822192220222122222223222422252226222722282229223022312232223322342235223622372238223922402241224222432244224522462247224822492250225122522253225422552256225722582259226022612262226322642265226622672268226922702271227222732274227522762277227822792280228122822283228422852286
  1. Changelog
  2. =========
  3. .. _v41-0-6:
  4. 41.0.6 - 2023-11-27
  5. ~~~~~~~~~~~~~~~~~~~
  6. * Fixed a null-pointer-dereference and segfault that could occur when loading
  7. certificates from a PKCS#7 bundle. Credit to **pkuzco** for reporting the
  8. issue. **CVE-2023-49083**
  9. .. _v41-0-5:
  10. 41.0.5 - 2023-10-24
  11. ~~~~~~~~~~~~~~~~~~~
  12. * Updated Windows, macOS, and Linux wheels to be compiled with OpenSSL 3.1.4.
  13. * Added a function to support an upcoming ``pyOpenSSL`` release.
  14. .. _v41-0-4:
  15. 41.0.4 - 2023-09-19
  16. ~~~~~~~~~~~~~~~~~~~
  17. * Updated Windows, macOS, and Linux wheels to be compiled with OpenSSL 3.1.3.
  18. .. _v41-0-3:
  19. 41.0.3 - 2023-08-01
  20. ~~~~~~~~~~~~~~~~~~~
  21. * Fixed performance regression loading DH public keys.
  22. * Fixed a memory leak when using
  23. :class:`~cryptography.hazmat.primitives.ciphers.aead.ChaCha20Poly1305`.
  24. * Updated Windows, macOS, and Linux wheels to be compiled with OpenSSL 3.1.2.
  25. .. _v41-0-2:
  26. 41.0.2 - 2023-07-10
  27. ~~~~~~~~~~~~~~~~~~~
  28. * Fixed bugs in creating and parsing SSH certificates where critical options
  29. with values were handled incorrectly. Certificates are now created correctly
  30. and parsing accepts correct values as well as the previously generated
  31. invalid forms with a warning. In the next release, support for parsing these
  32. invalid forms will be removed.
  33. .. _v41-0-1:
  34. 41.0.1 - 2023-06-01
  35. ~~~~~~~~~~~~~~~~~~~
  36. * Temporarily allow invalid ECDSA signature algorithm parameters in X.509
  37. certificates, which are generated by older versions of Java.
  38. * Allow null bytes in pass phrases when serializing private keys.
  39. .. _v41-0-0:
  40. 41.0.0 - 2023-05-30
  41. ~~~~~~~~~~~~~~~~~~~
  42. * **BACKWARDS INCOMPATIBLE:** Support for OpenSSL less than 1.1.1d has been
  43. removed. Users on older version of OpenSSL will need to upgrade.
  44. * **BACKWARDS INCOMPATIBLE:** Support for Python 3.6 has been removed.
  45. * **BACKWARDS INCOMPATIBLE:** Dropped support for LibreSSL < 3.6.
  46. * Updated the minimum supported Rust version (MSRV) to 1.56.0, from 1.48.0.
  47. * Updated Windows, macOS, and Linux wheels to be compiled with OpenSSL 3.1.1.
  48. * Added support for the :class:`~cryptography.x509.OCSPAcceptableResponses`
  49. OCSP extension.
  50. * Added support for the :class:`~cryptography.x509.MSCertificateTemplate`
  51. proprietary Microsoft certificate extension.
  52. * Implemented support for equality checks on all asymmetric public key types.
  53. * Added support for ``aes256-gcm@openssh.com`` encrypted keys in
  54. :func:`~cryptography.hazmat.primitives.serialization.load_ssh_private_key`.
  55. * Added support for obtaining X.509 certificate signature algorithm parameters
  56. (including PSS) via
  57. :meth:`~cryptography.x509.Certificate.signature_algorithm_parameters`.
  58. * Support signing :class:`~cryptography.hazmat.primitives.asymmetric.padding.PSS`
  59. X.509 certificates via the new keyword-only argument ``rsa_padding`` on
  60. :meth:`~cryptography.x509.CertificateBuilder.sign`.
  61. * Added support for
  62. :class:`~cryptography.hazmat.primitives.ciphers.aead.ChaCha20Poly1305`
  63. on BoringSSL.
  64. .. _v40-0-2:
  65. 40.0.2 - 2023-04-14
  66. ~~~~~~~~~~~~~~~~~~~
  67. * Fixed compilation when using LibreSSL 3.7.2.
  68. * Added some functions to support an upcoming ``pyOpenSSL`` release.
  69. .. _v40-0-1:
  70. 40.0.1 - 2023-03-24
  71. ~~~~~~~~~~~~~~~~~~~
  72. * Fixed a bug where certain operations would fail if an object happened to be
  73. in the top-half of the memory-space. This only impacted 32-bit systems.
  74. .. _v40-0-0:
  75. 40.0.0 - 2023-03-24
  76. ~~~~~~~~~~~~~~~~~~~
  77. * **BACKWARDS INCOMPATIBLE:** As announced in the 39.0.0 changelog, the way
  78. ``cryptography`` links OpenSSL has changed. This only impacts users who
  79. build ``cryptography`` from source (i.e., not from a ``wheel``), and
  80. specify their own version of OpenSSL. For those users, the ``CFLAGS``,
  81. ``LDFLAGS``, ``INCLUDE``, ``LIB``, and ``CRYPTOGRAPHY_SUPPRESS_LINK_FLAGS``
  82. environment variables are no longer valid. Instead, users need to configure
  83. their builds `as documented here`_.
  84. * Support for Python 3.6 is deprecated and will be removed in the next
  85. release.
  86. * Deprecated the current minimum supported Rust version (MSRV) of 1.48.0.
  87. In the next release we will raise MSRV to 1.56.0. Users with the latest
  88. ``pip`` will typically get a wheel and not need Rust installed, but check
  89. :doc:`/installation` for documentation on installing a newer ``rustc`` if
  90. required.
  91. * Deprecated support for OpenSSL less than 1.1.1d. The next release of
  92. ``cryptography`` will drop support for older versions.
  93. * Deprecated support for DSA keys in
  94. :func:`~cryptography.hazmat.primitives.serialization.load_ssh_public_key`
  95. and
  96. :func:`~cryptography.hazmat.primitives.serialization.load_ssh_private_key`.
  97. * Deprecated support for OpenSSH serialization in
  98. :class:`~cryptography.hazmat.primitives.asymmetric.dsa.DSAPublicKey`
  99. and
  100. :class:`~cryptography.hazmat.primitives.asymmetric.dsa.DSAPrivateKey`.
  101. * The minimum supported version of PyPy3 is now 7.3.10.
  102. * Updated Windows, macOS, and Linux wheels to be compiled with OpenSSL 3.1.0.
  103. * Added support for parsing SSH certificates in addition to public keys with
  104. :func:`~cryptography.hazmat.primitives.serialization.load_ssh_public_identity`.
  105. :func:`~cryptography.hazmat.primitives.serialization.load_ssh_public_key`
  106. continues to support only public keys.
  107. * Added support for generating SSH certificates with
  108. :class:`~cryptography.hazmat.primitives.serialization.SSHCertificateBuilder`.
  109. * Added :meth:`~cryptography.x509.Certificate.verify_directly_issued_by` to
  110. :class:`~cryptography.x509.Certificate`.
  111. * Added a check to :class:`~cryptography.x509.NameConstraints` to ensure that
  112. :class:`~cryptography.x509.DNSName` constraints do not contain any ``*``
  113. wildcards.
  114. * Removed many unused CFFI OpenSSL bindings. This will not impact you unless
  115. you are using ``cryptography`` to directly invoke OpenSSL's C API. Note that
  116. these have never been considered a stable, supported, public API by
  117. ``cryptography``, this note is included as a courtesy.
  118. * The X.509 builder classes now raise ``UnsupportedAlgorithm`` instead of
  119. ``ValueError`` if an unsupported hash algorithm is passed.
  120. * Added public union type aliases for type hinting:
  121. * Asymmetric types:
  122. :const:`~cryptography.hazmat.primitives.asymmetric.types.PublicKeyTypes`,
  123. :const:`~cryptography.hazmat.primitives.asymmetric.types.PrivateKeyTypes`,
  124. :const:`~cryptography.hazmat.primitives.asymmetric.types.CertificatePublicKeyTypes`,
  125. :const:`~cryptography.hazmat.primitives.asymmetric.types.CertificateIssuerPublicKeyTypes`,
  126. :const:`~cryptography.hazmat.primitives.asymmetric.types.CertificateIssuerPrivateKeyTypes`.
  127. * SSH keys:
  128. :const:`~cryptography.hazmat.primitives.serialization.SSHPublicKeyTypes`,
  129. :const:`~cryptography.hazmat.primitives.serialization.SSHPrivateKeyTypes`,
  130. :const:`~cryptography.hazmat.primitives.serialization.SSHCertPublicKeyTypes`,
  131. :const:`~cryptography.hazmat.primitives.serialization.SSHCertPrivateKeyTypes`.
  132. * PKCS12:
  133. :const:`~cryptography.hazmat.primitives.serialization.pkcs12.PKCS12PrivateKeyTypes`
  134. * PKCS7:
  135. :const:`~cryptography.hazmat.primitives.serialization.pkcs7.PKCS7HashTypes`,
  136. :const:`~cryptography.hazmat.primitives.serialization.pkcs7.PKCS7PrivateKeyTypes`.
  137. * Two-factor:
  138. :const:`~cryptography.hazmat.primitives.twofactor.hotp.HOTPHashTypes`
  139. * Deprecated previously undocumented but not private type aliases in the
  140. ``cryptography.hazmat.primitives.asymmetric.types`` module in favor of new
  141. ones above.
  142. .. _v39-0-2:
  143. 39.0.2 - 2023-03-02
  144. ~~~~~~~~~~~~~~~~~~~
  145. * Fixed a bug where the content type header was not properly encoded for
  146. PKCS7 signatures when using the ``Text`` option and ``SMIME`` encoding.
  147. .. _v39-0-1:
  148. 39.0.1 - 2023-02-07
  149. ~~~~~~~~~~~~~~~~~~~
  150. * **SECURITY ISSUE** - Fixed a bug where ``Cipher.update_into`` accepted Python
  151. buffer protocol objects, but allowed immutable buffers. **CVE-2023-23931**
  152. * Updated Windows, macOS, and Linux wheels to be compiled with OpenSSL 3.0.8.
  153. .. _v39-0-0:
  154. 39.0.0 - 2023-01-01
  155. ~~~~~~~~~~~~~~~~~~~
  156. * **BACKWARDS INCOMPATIBLE:** Support for OpenSSL 1.1.0 has been removed.
  157. Users on older version of OpenSSL will need to upgrade.
  158. * **BACKWARDS INCOMPATIBLE:** Dropped support for LibreSSL < 3.5. The new
  159. minimum LibreSSL version is 3.5.0. Going forward our policy is to support
  160. versions of LibreSSL that are available in versions of OpenBSD that are
  161. still receiving security support.
  162. * **BACKWARDS INCOMPATIBLE:** Removed the ``encode_point`` and
  163. ``from_encoded_point`` methods on
  164. :class:`~cryptography.hazmat.primitives.asymmetric.ec.EllipticCurvePublicNumbers`,
  165. which had been deprecated for several years.
  166. :meth:`~cryptography.hazmat.primitives.asymmetric.ec.EllipticCurvePublicKey.public_bytes`
  167. and
  168. :meth:`~cryptography.hazmat.primitives.asymmetric.ec.EllipticCurvePublicKey.from_encoded_point`
  169. should be used instead.
  170. * **BACKWARDS INCOMPATIBLE:** Support for using MD5 or SHA1 in
  171. :class:`~cryptography.x509.CertificateBuilder`, other X.509 builders, and
  172. PKCS7 has been removed.
  173. * **BACKWARDS INCOMPATIBLE:** Dropped support for macOS 10.10 and 10.11, macOS
  174. users must upgrade to 10.12 or newer.
  175. * **ANNOUNCEMENT:** The next version of ``cryptography`` (40.0) will change
  176. the way we link OpenSSL. This will only impact users who build
  177. ``cryptography`` from source (i.e., not from a ``wheel``), and specify their
  178. own version of OpenSSL. For those users, the ``CFLAGS``, ``LDFLAGS``,
  179. ``INCLUDE``, ``LIB``, and ``CRYPTOGRAPHY_SUPPRESS_LINK_FLAGS`` environment
  180. variables will no longer be respected. Instead, users will need to
  181. configure their builds `as documented here`_.
  182. * Added support for
  183. :ref:`disabling the legacy provider in OpenSSL 3.0.x<legacy-provider>`.
  184. * Added support for disabling RSA key validation checks when loading RSA
  185. keys via
  186. :func:`~cryptography.hazmat.primitives.serialization.load_pem_private_key`,
  187. :func:`~cryptography.hazmat.primitives.serialization.load_der_private_key`,
  188. and
  189. :meth:`~cryptography.hazmat.primitives.asymmetric.rsa.RSAPrivateNumbers.private_key`.
  190. This speeds up key loading but is :term:`unsafe` if you are loading potentially
  191. attacker supplied keys.
  192. * Significantly improved performance for
  193. :class:`~cryptography.hazmat.primitives.ciphers.aead.ChaCha20Poly1305`
  194. when repeatedly calling ``encrypt`` or ``decrypt`` with the same key.
  195. * Added support for creating OCSP requests with precomputed hashes using
  196. :meth:`~cryptography.x509.ocsp.OCSPRequestBuilder.add_certificate_by_hash`.
  197. * Added support for loading multiple PEM-encoded X.509 certificates from
  198. a single input via :func:`~cryptography.x509.load_pem_x509_certificates`.
  199. .. _v38-0-4:
  200. 38.0.4 - 2022-11-27
  201. ~~~~~~~~~~~~~~~~~~~
  202. * Fixed compilation when using LibreSSL 3.6.0.
  203. * Fixed error when using ``py2app`` to build an application with a
  204. ``cryptography`` dependency.
  205. .. _v38-0-3:
  206. 38.0.3 - 2022-11-01
  207. ~~~~~~~~~~~~~~~~~~~
  208. * Updated Windows, macOS, and Linux wheels to be compiled with OpenSSL 3.0.7,
  209. which resolves *CVE-2022-3602* and *CVE-2022-3786*.
  210. .. _v38-0-2:
  211. 38.0.2 - 2022-10-11 (YANKED)
  212. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~
  213. .. attention::
  214. This release was subsequently yanked from PyPI due to a regression in OpenSSL.
  215. * Updated Windows, macOS, and Linux wheels to be compiled with OpenSSL 3.0.6.
  216. .. _v38-0-1:
  217. 38.0.1 - 2022-09-07
  218. ~~~~~~~~~~~~~~~~~~~
  219. * Fixed parsing TLVs in ASN.1 with length greater than 65535 bytes (typically
  220. seen in large CRLs).
  221. .. _v38-0-0:
  222. 38.0.0 - 2022-09-06
  223. ~~~~~~~~~~~~~~~~~~~
  224. * Final deprecation of OpenSSL 1.1.0. The next release of ``cryptography``
  225. will drop support.
  226. * We no longer ship ``manylinux2010`` wheels. Users should upgrade to the
  227. latest ``pip`` to ensure this doesn't cause issues downloading wheels on
  228. their platform. We now ship ``manylinux_2_28`` wheels for users on new
  229. enough platforms.
  230. * Updated the minimum supported Rust version (MSRV) to 1.48.0, from 1.41.0.
  231. Users with the latest ``pip`` will typically get a wheel and not need Rust
  232. installed, but check :doc:`/installation` for documentation on installing a
  233. newer ``rustc`` if required.
  234. * :meth:`~cryptography.fernet.Fernet.decrypt` and related methods now accept
  235. both ``str`` and ``bytes`` tokens.
  236. * Parsing ``CertificateSigningRequest`` restores the behavior of enforcing
  237. that the ``Extension`` ``critical`` field must be correctly encoded DER. See
  238. `the issue <https://github.com/pyca/cryptography/issues/6368>`_ for complete
  239. details.
  240. * Added two new OpenSSL functions to the bindings to support an upcoming
  241. ``pyOpenSSL`` release.
  242. * When parsing :class:`~cryptography.x509.CertificateRevocationList` and
  243. :class:`~cryptography.x509.CertificateSigningRequest` values, it is now
  244. enforced that the ``version`` value in the input must be valid according to
  245. the rules of :rfc:`2986` and :rfc:`5280`.
  246. * Using MD5 or SHA1 in :class:`~cryptography.x509.CertificateBuilder` and
  247. other X.509 builders is deprecated and support will be removed in the next
  248. version.
  249. * Added additional APIs to
  250. :class:`~cryptography.x509.certificate_transparency.SignedCertificateTimestamp`, including
  251. :attr:`~cryptography.x509.certificate_transparency.SignedCertificateTimestamp.signature_hash_algorithm`,
  252. :attr:`~cryptography.x509.certificate_transparency.SignedCertificateTimestamp.signature_algorithm`,
  253. :attr:`~cryptography.x509.certificate_transparency.SignedCertificateTimestamp.signature`, and
  254. :attr:`~cryptography.x509.certificate_transparency.SignedCertificateTimestamp.extension_bytes`.
  255. * Added :attr:`~cryptography.x509.Certificate.tbs_precertificate_bytes`, allowing
  256. users to access the to-be-signed pre-certificate data needed for signed
  257. certificate timestamp verification.
  258. * :class:`~cryptography.hazmat.primitives.kdf.kbkdf.KBKDFHMAC` and
  259. :class:`~cryptography.hazmat.primitives.kdf.kbkdf.KBKDFCMAC` now support
  260. :attr:`~cryptography.hazmat.primitives.kdf.kbkdf.CounterLocation.MiddleFixed`
  261. counter location.
  262. * Fixed :rfc:`4514` name parsing to reverse the order of the RDNs according
  263. to the section 2.1 of the RFC, affecting method
  264. :meth:`~cryptography.x509.Name.from_rfc4514_string`.
  265. * It is now possible to customize some aspects of encryption when serializing
  266. private keys, using
  267. :meth:`~cryptography.hazmat.primitives.serialization.PrivateFormat.encryption_builder`.
  268. * Removed several legacy symbols from our OpenSSL bindings. Users of pyOpenSSL
  269. versions older than 22.0 will need to upgrade.
  270. * Added
  271. :class:`~cryptography.hazmat.primitives.ciphers.algorithms.AES128` and
  272. :class:`~cryptography.hazmat.primitives.ciphers.algorithms.AES256` classes.
  273. These classes do not replace
  274. :class:`~cryptography.hazmat.primitives.ciphers.algorithms.AES` (which
  275. allows all AES key lengths), but are intended for applications where
  276. developers want to be explicit about key length.
  277. .. _v37-0-4:
  278. 37.0.4 - 2022-07-05
  279. ~~~~~~~~~~~~~~~~~~~
  280. * Updated Windows, macOS, and Linux wheels to be compiled with OpenSSL 3.0.5.
  281. .. _v37-0-3:
  282. 37.0.3 - 2022-06-21 (YANKED)
  283. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~
  284. .. attention::
  285. This release was subsequently yanked from PyPI due to a regression in OpenSSL.
  286. * Updated Windows, macOS, and Linux wheels to be compiled with OpenSSL 3.0.4.
  287. .. _v37-0-2:
  288. 37.0.2 - 2022-05-03
  289. ~~~~~~~~~~~~~~~~~~~
  290. * Updated Windows, macOS, and Linux wheels to be compiled with OpenSSL 3.0.3.
  291. * Added a constant needed for an upcoming pyOpenSSL release.
  292. .. _v37-0-1:
  293. 37.0.1 - 2022-04-27
  294. ~~~~~~~~~~~~~~~~~~~
  295. * Fixed an issue where parsing an encrypted private key with the public
  296. loader functions would hang waiting for console input on OpenSSL 3.0.x rather
  297. than raising an error.
  298. * Restored some legacy symbols for older ``pyOpenSSL`` users. These will be
  299. removed again in the future, so ``pyOpenSSL`` users should still upgrade
  300. to the latest version of that package when they upgrade ``cryptography``.
  301. .. _v37-0-0:
  302. 37.0.0 - 2022-04-26
  303. ~~~~~~~~~~~~~~~~~~~
  304. * Updated Windows, macOS, and Linux wheels to be compiled with OpenSSL 3.0.2.
  305. * **BACKWARDS INCOMPATIBLE:** Dropped support for LibreSSL 2.9.x and 3.0.x.
  306. The new minimum LibreSSL version is 3.1+.
  307. * **BACKWARDS INCOMPATIBLE:** Removed ``signer`` and ``verifier`` methods
  308. from the public key and private key classes. These methods were originally
  309. deprecated in version 2.0, but had an extended deprecation timeline due
  310. to usage. Any remaining users should transition to ``sign`` and ``verify``.
  311. * Deprecated OpenSSL 1.1.0 support. OpenSSL 1.1.0 is no longer supported by
  312. the OpenSSL project. The next release of ``cryptography`` will be the last
  313. to support compiling with OpenSSL 1.1.0.
  314. * Deprecated Python 3.6 support. Python 3.6 is no longer supported by the
  315. Python core team. Support for Python 3.6 will be removed in a future
  316. ``cryptography`` release.
  317. * Deprecated the current minimum supported Rust version (MSRV) of 1.41.0.
  318. In the next release we will raise MSRV to 1.48.0. Users with the latest
  319. ``pip`` will typically get a wheel and not need Rust installed, but check
  320. :doc:`/installation` for documentation on installing a newer ``rustc`` if
  321. required.
  322. * Deprecated
  323. :class:`~cryptography.hazmat.primitives.ciphers.algorithms.CAST5`,
  324. :class:`~cryptography.hazmat.primitives.ciphers.algorithms.SEED`,
  325. :class:`~cryptography.hazmat.primitives.ciphers.algorithms.IDEA`, and
  326. :class:`~cryptography.hazmat.primitives.ciphers.algorithms.Blowfish` because
  327. they are legacy algorithms with extremely low usage. These will be removed
  328. in a future version of ``cryptography``.
  329. * Added limited support for distinguished names containing a bit string.
  330. * We now ship ``universal2`` wheels on macOS, which contain both ``arm64``
  331. and ``x86_64`` architectures. Users on macOS should upgrade to the latest
  332. ``pip`` to ensure they can use this wheel, although we will continue to
  333. ship ``x86_64`` specific wheels for now to ease the transition.
  334. * This will be the final release for which we ship ``manylinux2010`` wheels.
  335. Going forward the minimum supported ``manylinux`` ABI for our wheels will
  336. be ``manylinux2014``. The vast majority of users will continue to receive
  337. ``manylinux`` wheels provided they have an up to date ``pip``. For PyPy
  338. wheels this release already requires ``manylinux2014`` for compatibility
  339. with binaries distributed by upstream.
  340. * Added support for multiple
  341. :class:`~cryptography.x509.ocsp.OCSPSingleResponse` in a
  342. :class:`~cryptography.x509.ocsp.OCSPResponse`.
  343. * Restored support for signing certificates and other structures in
  344. :doc:`/x509/index` with SHA3 hash algorithms.
  345. * :class:`~cryptography.hazmat.primitives.ciphers.algorithms.TripleDES` is
  346. disabled in FIPS mode.
  347. * Added support for serialization of PKCS#12 CA friendly names/aliases in
  348. :func:`~cryptography.hazmat.primitives.serialization.pkcs12.serialize_key_and_certificates`
  349. * Added support for 12-15 byte (96 to 120 bit) nonces to
  350. :class:`~cryptography.hazmat.primitives.ciphers.aead.AESOCB3`. This class
  351. previously supported only 12 byte (96 bit).
  352. * Added support for
  353. :class:`~cryptography.hazmat.primitives.ciphers.aead.AESSIV` when using
  354. OpenSSL 3.0.0+.
  355. * Added support for serializing PKCS7 structures from a list of
  356. certificates with
  357. :class:`~cryptography.hazmat.primitives.serialization.pkcs7.serialize_certificates`.
  358. * Added support for parsing :rfc:`4514` strings with
  359. :meth:`~cryptography.x509.Name.from_rfc4514_string`.
  360. * Added :attr:`~cryptography.hazmat.primitives.asymmetric.padding.PSS.AUTO` to
  361. :class:`~cryptography.hazmat.primitives.asymmetric.padding.PSS`. This can
  362. be used to verify a signature where the salt length is not already known.
  363. * Added :attr:`~cryptography.hazmat.primitives.asymmetric.padding.PSS.DIGEST_LENGTH`
  364. to :class:`~cryptography.hazmat.primitives.asymmetric.padding.PSS`. This
  365. constant will set the salt length to the same length as the ``PSS`` hash
  366. algorithm.
  367. * Added support for loading RSA-PSS key types with
  368. :func:`~cryptography.hazmat.primitives.serialization.load_pem_private_key`
  369. and
  370. :func:`~cryptography.hazmat.primitives.serialization.load_der_private_key`.
  371. This functionality is limited to OpenSSL 1.1.1e+ and loads the key as a
  372. normal RSA private key, discarding the PSS constraint information.
  373. .. _v36-0-2:
  374. 36.0.2 - 2022-03-15
  375. ~~~~~~~~~~~~~~~~~~~
  376. * Updated Windows, macOS, and Linux wheels to be compiled with OpenSSL 1.1.1n.
  377. .. _v36-0-1:
  378. 36.0.1 - 2021-12-14
  379. ~~~~~~~~~~~~~~~~~~~
  380. * Updated Windows, macOS, and Linux wheels to be compiled with OpenSSL 1.1.1m.
  381. .. _v36-0-0:
  382. 36.0.0 - 2021-11-21
  383. ~~~~~~~~~~~~~~~~~~~
  384. * **FINAL DEPRECATION** Support for ``verifier`` and ``signer`` on our
  385. asymmetric key classes was deprecated in version 2.0. These functions had an
  386. extended deprecation due to usage, however the next version of
  387. ``cryptography`` will drop support. Users should migrate to ``sign`` and
  388. ``verify``.
  389. * The entire :doc:`/x509/index` layer is now written in Rust. This allows
  390. alternate asymmetric key implementations that can support cloud key
  391. management services or hardware security modules provided they implement
  392. the necessary interface (for example:
  393. :class:`~cryptography.hazmat.primitives.asymmetric.ec.EllipticCurvePrivateKey`).
  394. * :ref:`Deprecated the backend argument<faq-missing-backend>` for all
  395. functions.
  396. * Added support for
  397. :class:`~cryptography.hazmat.primitives.ciphers.aead.AESOCB3`.
  398. * Added support for iterating over arbitrary request
  399. :attr:`~cryptography.x509.CertificateSigningRequest.attributes`.
  400. * Deprecated the ``get_attribute_for_oid`` method on
  401. :class:`~cryptography.x509.CertificateSigningRequest` in favor of
  402. :meth:`~cryptography.x509.Attributes.get_attribute_for_oid` on the new
  403. :class:`~cryptography.x509.Attributes` object.
  404. * Fixed handling of PEM files to allow loading when certificate and key are
  405. in the same file.
  406. * Fixed parsing of :class:`~cryptography.x509.CertificatePolicies` extensions
  407. containing legacy ``BMPString`` values in their ``explicitText``.
  408. * Allow parsing of negative serial numbers in certificates. Negative serial
  409. numbers are prohibited by :rfc:`5280` so a deprecation warning will be
  410. raised whenever they are encountered. A future version of ``cryptography``
  411. will drop support for parsing them.
  412. * Added support for parsing PKCS12 files with friendly names for all
  413. certificates with
  414. :func:`~cryptography.hazmat.primitives.serialization.pkcs12.load_pkcs12`,
  415. which will return an object of type
  416. :class:`~cryptography.hazmat.primitives.serialization.pkcs12.PKCS12KeyAndCertificates`.
  417. * :meth:`~cryptography.x509.Name.rfc4514_string` and related methods now have
  418. an optional ``attr_name_overrides`` parameter to supply custom OID to name
  419. mappings, which can be used to match vendor-specific extensions.
  420. * **BACKWARDS INCOMPATIBLE:** Reverted the nonstandard formatting of
  421. email address fields as ``E`` in
  422. :meth:`~cryptography.x509.Name.rfc4514_string` methods from version 35.0.
  423. The previous behavior can be restored with:
  424. ``name.rfc4514_string({NameOID.EMAIL_ADDRESS: "E"})``
  425. * Allow
  426. :class:`~cryptography.hazmat.primitives.asymmetric.x25519.X25519PublicKey`
  427. and
  428. :class:`~cryptography.hazmat.primitives.asymmetric.x448.X448PublicKey` to
  429. be used as public keys when parsing certificates or creating them with
  430. :class:`~cryptography.x509.CertificateBuilder`. These key types must be
  431. signed with a different signing algorithm as ``X25519`` and ``X448`` do
  432. not support signing.
  433. * Extension values can now be serialized to a DER byte string by calling
  434. :func:`~cryptography.x509.ExtensionType.public_bytes`.
  435. * Added experimental support for compiling against BoringSSL. As BoringSSL
  436. does not commit to a stable API, ``cryptography`` tests against the
  437. latest commit only. Please note that several features are not available
  438. when building against BoringSSL.
  439. * Parsing ``CertificateSigningRequest`` from DER and PEM now, for a limited
  440. time period, allows the ``Extension`` ``critical`` field to be incorrectly
  441. encoded. See `the issue <https://github.com/pyca/cryptography/issues/6368>`_
  442. for complete details. This will be reverted in a future ``cryptography``
  443. release.
  444. * When :class:`~cryptography.x509.OCSPNonce` are parsed and generated their
  445. value is now correctly wrapped in an ASN.1 ``OCTET STRING``. This conforms
  446. to :rfc:`6960` but conflicts with the original behavior specified in
  447. :rfc:`2560`. For a temporary period for backwards compatibility, we will
  448. also parse values that are encoded as specified in :rfc:`2560` but this
  449. behavior will be removed in a future release.
  450. .. _v35-0-0:
  451. 35.0.0 - 2021-09-29
  452. ~~~~~~~~~~~~~~~~~~~
  453. * Changed the :ref:`version scheme <api-stability:versioning>`. This will
  454. result in us incrementing the major version more frequently, but does not
  455. change our existing backwards compatibility policy.
  456. * **BACKWARDS INCOMPATIBLE:** The :doc:`/x509/index` PEM parsers now require
  457. that the PEM string passed have PEM delimiters of the correct type. For
  458. example, parsing a private key PEM concatenated with a certificate PEM will
  459. no longer be accepted by the PEM certificate parser.
  460. * **BACKWARDS INCOMPATIBLE:** The X.509 certificate parser no longer allows
  461. negative serial numbers. :rfc:`5280` has always prohibited these.
  462. * **BACKWARDS INCOMPATIBLE:** Additional forms of invalid ASN.1 found during
  463. :doc:`/x509/index` parsing will raise an error on initial parse rather than
  464. when the malformed field is accessed.
  465. * Rust is now required for building ``cryptography``, the
  466. ``CRYPTOGRAPHY_DONT_BUILD_RUST`` environment variable is no longer
  467. respected.
  468. * Parsers for :doc:`/x509/index` no longer use OpenSSL and have been
  469. rewritten in Rust. This should be backwards compatible (modulo the items
  470. listed above) and improve both security and performance.
  471. * Added support for OpenSSL 3.0.0 as a compilation target.
  472. * Added support for
  473. :class:`~cryptography.hazmat.primitives.hashes.SM3` and
  474. :class:`~cryptography.hazmat.primitives.ciphers.algorithms.SM4`,
  475. when using OpenSSL 1.1.1. These algorithms are provided for compatibility
  476. in regions where they may be required, and are not generally recommended.
  477. * We now ship ``manylinux_2_24`` and ``musllinux_1_1`` wheels, in addition to
  478. our ``manylinux2010`` and ``manylinux2014`` wheels. Users on distributions
  479. like Alpine Linux should ensure they upgrade to the latest ``pip`` to
  480. correctly receive wheels.
  481. * Added ``rfc4514_attribute_name`` attribute to :attr:`x509.NameAttribute
  482. <cryptography.x509.NameAttribute.rfc4514_attribute_name>`.
  483. * Added :class:`~cryptography.hazmat.primitives.kdf.kbkdf.KBKDFCMAC`.
  484. .. _v3-4-8:
  485. 3.4.8 - 2021-08-24
  486. ~~~~~~~~~~~~~~~~~~
  487. * Updated Windows, macOS, and ``manylinux`` wheels to be compiled with
  488. OpenSSL 1.1.1l.
  489. .. _v3-4-7:
  490. 3.4.7 - 2021-03-25
  491. ~~~~~~~~~~~~~~~~~~
  492. * Updated Windows, macOS, and ``manylinux`` wheels to be compiled with
  493. OpenSSL 1.1.1k.
  494. .. _v3-4-6:
  495. 3.4.6 - 2021-02-16
  496. ~~~~~~~~~~~~~~~~~~
  497. * Updated Windows, macOS, and ``manylinux`` wheels to be compiled with
  498. OpenSSL 1.1.1j.
  499. .. _v3-4-5:
  500. 3.4.5 - 2021-02-13
  501. ~~~~~~~~~~~~~~~~~~
  502. * Various improvements to type hints.
  503. * Lower the minimum supported Rust version (MSRV) to >=1.41.0. This change
  504. improves compatibility with system-provided Rust on several Linux
  505. distributions.
  506. * ``cryptography`` will be switching to a new versioning scheme with its next
  507. feature release. More information is available in our
  508. :doc:`/api-stability` documentation.
  509. .. _v3-4-4:
  510. 3.4.4 - 2021-02-09
  511. ~~~~~~~~~~~~~~~~~~
  512. * Added a ``py.typed`` file so that ``mypy`` will know to use our type
  513. annotations.
  514. * Fixed an import cycle that could be triggered by certain import sequences.
  515. .. _v3-4-3:
  516. 3.4.3 - 2021-02-08
  517. ~~~~~~~~~~~~~~~~~~
  518. * Specify our supported Rust version (>=1.45.0) in our ``setup.py`` so users
  519. on older versions will get a clear error message.
  520. .. _v3-4-2:
  521. 3.4.2 - 2021-02-08
  522. ~~~~~~~~~~~~~~~~~~
  523. * Improvements to make the rust transition a bit easier. This includes some
  524. better error messages and small dependency fixes. If you experience
  525. installation problems **Be sure to update pip** first, then check the
  526. :doc:`FAQ </faq>`.
  527. .. _v3-4-1:
  528. 3.4.1 - 2021-02-07
  529. ~~~~~~~~~~~~~~~~~~
  530. * Fixed a circular import issue.
  531. * Added additional debug output to assist users seeing installation errors
  532. due to outdated ``pip`` or missing ``rustc``.
  533. .. _v3-4:
  534. 3.4 - 2021-02-07
  535. ~~~~~~~~~~~~~~~~
  536. * **BACKWARDS INCOMPATIBLE:** Support for Python 2 has been removed.
  537. * We now ship ``manylinux2014`` wheels and no longer ship ``manylinux1``
  538. wheels. Users should upgrade to the latest ``pip`` to ensure this doesn't
  539. cause issues downloading wheels on their platform.
  540. * ``cryptography`` now incorporates Rust code. Users building ``cryptography``
  541. themselves will need to have the Rust toolchain installed. Users who use an
  542. officially produced wheel will not need to make any changes. The minimum
  543. supported Rust version is 1.45.0.
  544. * ``cryptography`` now has :pep:`484` type hints on nearly all of of its public
  545. APIs. Users can begin using them to type check their code with ``mypy``.
  546. .. _v3-3-2:
  547. 3.3.2 - 2021-02-07
  548. ~~~~~~~~~~~~~~~~~~
  549. * **SECURITY ISSUE:** Fixed a bug where certain sequences of ``update()`` calls
  550. when symmetrically encrypting very large payloads (>2GB) could result in an
  551. integer overflow, leading to buffer overflows. *CVE-2020-36242* **Update:**
  552. This fix is a workaround for *CVE-2021-23840* in OpenSSL, fixed in OpenSSL
  553. 1.1.1j.
  554. .. _v3-3-1:
  555. 3.3.1 - 2020-12-09
  556. ~~~~~~~~~~~~~~~~~~
  557. * Re-added a legacy symbol causing problems for older ``pyOpenSSL`` users.
  558. .. _v3-3:
  559. 3.3 - 2020-12-08
  560. ~~~~~~~~~~~~~~~~
  561. * **BACKWARDS INCOMPATIBLE:** Support for Python 3.5 has been removed due to
  562. low usage and maintenance burden.
  563. * **BACKWARDS INCOMPATIBLE:** The
  564. :class:`~cryptography.hazmat.primitives.ciphers.modes.GCM` and
  565. :class:`~cryptography.hazmat.primitives.ciphers.aead.AESGCM` now require
  566. 64-bit to 1024-bit (8 byte to 128 byte) initialization vectors. This change
  567. is to conform with an upcoming OpenSSL release that will no longer support
  568. sizes outside this window.
  569. * **BACKWARDS INCOMPATIBLE:** When deserializing asymmetric keys we now
  570. raise ``ValueError`` rather than ``UnsupportedAlgorithm`` when an
  571. unsupported cipher is used. This change is to conform with an upcoming
  572. OpenSSL release that will no longer distinguish between error types.
  573. * **BACKWARDS INCOMPATIBLE:** We no longer allow loading of finite field
  574. Diffie-Hellman parameters of less than 512 bits in length. This change is to
  575. conform with an upcoming OpenSSL release that no longer supports smaller
  576. sizes. These keys were already wildly insecure and should not have been used
  577. in any application outside of testing.
  578. * Updated Windows, macOS, and ``manylinux`` wheels to be compiled with
  579. OpenSSL 1.1.1i.
  580. * Python 2 support is deprecated in ``cryptography``. This is the last release
  581. that will support Python 2.
  582. * Added the
  583. :meth:`~cryptography.hazmat.primitives.asymmetric.rsa.RSAPublicKey.recover_data_from_signature`
  584. function to
  585. :class:`~cryptography.hazmat.primitives.asymmetric.rsa.RSAPublicKey`
  586. for recovering the signed data from an RSA signature.
  587. .. _v3-2-1:
  588. 3.2.1 - 2020-10-27
  589. ~~~~~~~~~~~~~~~~~~
  590. * Disable blinding on RSA public keys to address an error with some versions
  591. of OpenSSL.
  592. .. _v3-2:
  593. 3.2 - 2020-10-25
  594. ~~~~~~~~~~~~~~~~
  595. * **SECURITY ISSUE:** Attempted to make RSA PKCS#1v1.5 decryption more constant
  596. time, to protect against Bleichenbacher vulnerabilities. Due to limitations
  597. imposed by our API, we cannot completely mitigate this vulnerability and a
  598. future release will contain a new API which is designed to be resilient to
  599. these for contexts where it is required. Credit to **Hubert Kario** for
  600. reporting the issue. *CVE-2020-25659*
  601. * Support for OpenSSL 1.0.2 has been removed. Users on older version of OpenSSL
  602. will need to upgrade.
  603. * Added basic support for PKCS7 signing (including SMIME) via
  604. :class:`~cryptography.hazmat.primitives.serialization.pkcs7.PKCS7SignatureBuilder`.
  605. .. _v3-1-1:
  606. 3.1.1 - 2020-09-22
  607. ~~~~~~~~~~~~~~~~~~
  608. * Updated Windows, macOS, and ``manylinux`` wheels to be compiled with
  609. OpenSSL 1.1.1h.
  610. .. _v3-1:
  611. 3.1 - 2020-08-26
  612. ~~~~~~~~~~~~~~~~
  613. * **BACKWARDS INCOMPATIBLE:** Removed support for ``idna`` based
  614. :term:`U-label` parsing in various X.509 classes. This support was originally
  615. deprecated in version 2.1 and moved to an extra in 2.5.
  616. * Deprecated OpenSSL 1.0.2 support. OpenSSL 1.0.2 is no longer supported by
  617. the OpenSSL project. The next version of ``cryptography`` will drop support
  618. for it.
  619. * Deprecated support for Python 3.5. This version sees very little use and will
  620. be removed in the next release.
  621. * ``backend`` arguments to functions are no longer required and the
  622. default backend will automatically be selected if no ``backend`` is provided.
  623. * Added initial support for parsing certificates from PKCS7 files with
  624. :func:`~cryptography.hazmat.primitives.serialization.pkcs7.load_pem_pkcs7_certificates`
  625. and
  626. :func:`~cryptography.hazmat.primitives.serialization.pkcs7.load_der_pkcs7_certificates`
  627. .
  628. * Calling ``update`` or ``update_into`` on
  629. :class:`~cryptography.hazmat.primitives.ciphers.CipherContext` with ``data``
  630. longer than 2\ :sup:`31` bytes no longer raises an ``OverflowError``. This
  631. also resolves the same issue in :doc:`/fernet`.
  632. .. _v3-0:
  633. 3.0 - 2020-07-20
  634. ~~~~~~~~~~~~~~~~
  635. * **BACKWARDS INCOMPATIBLE:** Removed support for passing an
  636. :class:`~cryptography.x509.Extension` instance to
  637. :meth:`~cryptography.x509.AuthorityKeyIdentifier.from_issuer_subject_key_identifier`,
  638. as per our deprecation policy.
  639. * **BACKWARDS INCOMPATIBLE:** Support for LibreSSL 2.7.x, 2.8.x, and 2.9.0 has
  640. been removed (2.9.1+ is still supported).
  641. * **BACKWARDS INCOMPATIBLE:** Dropped support for macOS 10.9, macOS users must
  642. upgrade to 10.10 or newer.
  643. * **BACKWARDS INCOMPATIBLE:** RSA
  644. :meth:`~cryptography.hazmat.primitives.asymmetric.rsa.generate_private_key`
  645. no longer accepts ``public_exponent`` values except 65537 and 3 (the latter
  646. for legacy purposes).
  647. * **BACKWARDS INCOMPATIBLE:** X.509 certificate parsing now enforces that the
  648. ``version`` field contains a valid value, rather than deferring this check
  649. until :attr:`~cryptography.x509.Certificate.version` is accessed.
  650. * Deprecated support for Python 2. At the time there is no time table for
  651. actually dropping support, however we strongly encourage all users to upgrade
  652. their Python, as Python 2 no longer receives support from the Python core
  653. team.
  654. If you have trouble suppressing this warning in tests view the :ref:`FAQ
  655. entry addressing this issue <faq-howto-handle-deprecation-warning>`.
  656. * Added support for ``OpenSSH`` serialization format for
  657. ``ec``, ``ed25519``, ``rsa`` and ``dsa`` private keys:
  658. :func:`~cryptography.hazmat.primitives.serialization.load_ssh_private_key`
  659. for loading and
  660. :attr:`~cryptography.hazmat.primitives.serialization.PrivateFormat.OpenSSH`
  661. for writing.
  662. * Added support for ``OpenSSH`` certificates to
  663. :func:`~cryptography.hazmat.primitives.serialization.load_ssh_public_key`.
  664. * Added :meth:`~cryptography.fernet.Fernet.encrypt_at_time` and
  665. :meth:`~cryptography.fernet.Fernet.decrypt_at_time` to
  666. :class:`~cryptography.fernet.Fernet`.
  667. * Added support for the :class:`~cryptography.x509.SubjectInformationAccess`
  668. X.509 extension.
  669. * Added support for parsing
  670. :class:`~cryptography.x509.SignedCertificateTimestamps` in OCSP responses.
  671. * Added support for parsing attributes in certificate signing requests via
  672. ``CertificateSigningRequest.get_attribute_for_oid``.
  673. * Added support for encoding attributes in certificate signing requests via
  674. :meth:`~cryptography.x509.CertificateSigningRequestBuilder.add_attribute`.
  675. * On OpenSSL 1.1.1d and higher ``cryptography`` now uses OpenSSL's
  676. built-in CSPRNG instead of its own OS random engine because these versions of
  677. OpenSSL properly reseed on fork.
  678. * Added initial support for creating PKCS12 files with
  679. :func:`~cryptography.hazmat.primitives.serialization.pkcs12.serialize_key_and_certificates`.
  680. .. _v2-9-2:
  681. 2.9.2 - 2020-04-22
  682. ~~~~~~~~~~~~~~~~~~
  683. * Updated the macOS wheel to fix an issue where it would not run on macOS
  684. versions older than 10.15.
  685. .. _v2-9-1:
  686. 2.9.1 - 2020-04-21
  687. ~~~~~~~~~~~~~~~~~~
  688. * Updated Windows, macOS, and ``manylinux`` wheels to be compiled with
  689. OpenSSL 1.1.1g.
  690. .. _v2-9:
  691. 2.9 - 2020-04-02
  692. ~~~~~~~~~~~~~~~~
  693. * **BACKWARDS INCOMPATIBLE:** Support for Python 3.4 has been removed due to
  694. low usage and maintenance burden.
  695. * **BACKWARDS INCOMPATIBLE:** Support for OpenSSL 1.0.1 has been removed.
  696. Users on older version of OpenSSL will need to upgrade.
  697. * **BACKWARDS INCOMPATIBLE:** Support for LibreSSL 2.6.x has been removed.
  698. * Removed support for calling
  699. :meth:`~cryptography.hazmat.primitives.asymmetric.x25519.X25519PublicKey.public_bytes`
  700. with no arguments, as per our deprecation policy. You must now pass
  701. ``encoding`` and ``format``.
  702. * **BACKWARDS INCOMPATIBLE:** Reversed the order in which
  703. :meth:`~cryptography.x509.Name.rfc4514_string` returns the RDNs
  704. as required by :rfc:`4514`.
  705. * Updated Windows, macOS, and ``manylinux`` wheels to be compiled with
  706. OpenSSL 1.1.1f.
  707. * Added support for parsing
  708. :attr:`~cryptography.x509.ocsp.OCSPResponse.single_extensions` in an OCSP
  709. response.
  710. * :class:`~cryptography.x509.NameAttribute` values can now be empty strings.
  711. .. _v2-8:
  712. 2.8 - 2019-10-16
  713. ~~~~~~~~~~~~~~~~
  714. * Updated Windows, macOS, and ``manylinux`` wheels to be compiled with
  715. OpenSSL 1.1.1d.
  716. * Added support for Python 3.8.
  717. * Added class methods
  718. :meth:`Poly1305.generate_tag
  719. <cryptography.hazmat.primitives.poly1305.Poly1305.generate_tag>`
  720. and
  721. :meth:`Poly1305.verify_tag
  722. <cryptography.hazmat.primitives.poly1305.Poly1305.verify_tag>`
  723. for Poly1305 sign and verify operations.
  724. * Deprecated support for OpenSSL 1.0.1. Support will be removed in
  725. ``cryptography`` 2.9.
  726. * We now ship ``manylinux2010`` wheels in addition to our ``manylinux1``
  727. wheels.
  728. * Added support for ``ed25519`` and ``ed448`` keys in the
  729. :class:`~cryptography.x509.CertificateBuilder`,
  730. :class:`~cryptography.x509.CertificateSigningRequestBuilder`,
  731. :class:`~cryptography.x509.CertificateRevocationListBuilder` and
  732. :class:`~cryptography.x509.ocsp.OCSPResponseBuilder`.
  733. * ``cryptography`` no longer depends on ``asn1crypto``.
  734. * :class:`~cryptography.x509.FreshestCRL` is now allowed as a
  735. :class:`~cryptography.x509.CertificateRevocationList` extension.
  736. .. _v2-7:
  737. 2.7 - 2019-05-30
  738. ~~~~~~~~~~~~~~~~
  739. * **BACKWARDS INCOMPATIBLE:** We no longer distribute 32-bit ``manylinux1``
  740. wheels. Continuing to produce them was a maintenance burden.
  741. * **BACKWARDS INCOMPATIBLE:** Removed the
  742. ``cryptography.hazmat.primitives.mac.MACContext`` interface. The ``CMAC`` and
  743. ``HMAC`` APIs have not changed, but they are no longer registered as
  744. ``MACContext`` instances.
  745. * Updated Windows, macOS, and ``manylinux1`` wheels to be compiled with
  746. OpenSSL 1.1.1c.
  747. * Removed support for running our tests with ``setup.py test``. Users
  748. interested in running our tests can continue to follow the directions in our
  749. :doc:`development documentation</development/getting-started>`.
  750. * Add support for :class:`~cryptography.hazmat.primitives.poly1305.Poly1305`
  751. when using OpenSSL 1.1.1 or newer.
  752. * Support serialization with ``Encoding.OpenSSH`` and ``PublicFormat.OpenSSH``
  753. in
  754. :meth:`Ed25519PublicKey.public_bytes
  755. <cryptography.hazmat.primitives.asymmetric.ed25519.Ed25519PublicKey.public_bytes>`
  756. .
  757. * Correctly allow passing a ``SubjectKeyIdentifier`` to
  758. :meth:`~cryptography.x509.AuthorityKeyIdentifier.from_issuer_subject_key_identifier`
  759. and deprecate passing an ``Extension`` object. The documentation always
  760. required ``SubjectKeyIdentifier`` but the implementation previously
  761. required an ``Extension``.
  762. .. _v2-6-1:
  763. 2.6.1 - 2019-02-27
  764. ~~~~~~~~~~~~~~~~~~
  765. * Resolved an error in our build infrastructure that broke our Python3 wheels
  766. for macOS and Linux.
  767. .. _v2-6:
  768. 2.6 - 2019-02-27
  769. ~~~~~~~~~~~~~~~~
  770. * **BACKWARDS INCOMPATIBLE:** Removed
  771. ``cryptography.hazmat.primitives.asymmetric.utils.encode_rfc6979_signature``
  772. and
  773. ``cryptography.hazmat.primitives.asymmetric.utils.decode_rfc6979_signature``,
  774. which had been deprecated for nearly 4 years. Use
  775. :func:`~cryptography.hazmat.primitives.asymmetric.utils.encode_dss_signature`
  776. and
  777. :func:`~cryptography.hazmat.primitives.asymmetric.utils.decode_dss_signature`
  778. instead.
  779. * **BACKWARDS INCOMPATIBLE**: Removed ``cryptography.x509.Certificate.serial``,
  780. which had been deprecated for nearly 3 years. Use
  781. :attr:`~cryptography.x509.Certificate.serial_number` instead.
  782. * Updated Windows, macOS, and ``manylinux1`` wheels to be compiled with
  783. OpenSSL 1.1.1b.
  784. * Added support for :doc:`/hazmat/primitives/asymmetric/ed448` when using
  785. OpenSSL 1.1.1b or newer.
  786. * Added support for :doc:`/hazmat/primitives/asymmetric/ed25519` when using
  787. OpenSSL 1.1.1b or newer.
  788. * :func:`~cryptography.hazmat.primitives.serialization.load_ssh_public_key` can
  789. now load ``ed25519`` public keys.
  790. * Add support for easily mapping an object identifier to its elliptic curve
  791. class via
  792. :func:`~cryptography.hazmat.primitives.asymmetric.ec.get_curve_for_oid`.
  793. * Add support for OpenSSL when compiled with the ``no-engine``
  794. (``OPENSSL_NO_ENGINE``) flag.
  795. .. _v2-5:
  796. 2.5 - 2019-01-22
  797. ~~~~~~~~~~~~~~~~
  798. * **BACKWARDS INCOMPATIBLE:** :term:`U-label` strings were deprecated in
  799. version 2.1, but this version removes the default ``idna`` dependency as
  800. well. If you still need this deprecated path please install cryptography
  801. with the ``idna`` extra: ``pip install cryptography[idna]``.
  802. * **BACKWARDS INCOMPATIBLE:** The minimum supported PyPy version is now 5.4.
  803. * Numerous classes and functions have been updated to allow :term:`bytes-like`
  804. types for keying material and passwords, including symmetric algorithms, AEAD
  805. ciphers, KDFs, loading asymmetric keys, and one time password classes.
  806. * Updated Windows, macOS, and ``manylinux1`` wheels to be compiled with
  807. OpenSSL 1.1.1a.
  808. * Added support for :class:`~cryptography.hazmat.primitives.hashes.SHA512_224`
  809. and :class:`~cryptography.hazmat.primitives.hashes.SHA512_256` when using
  810. OpenSSL 1.1.1.
  811. * Added support for :class:`~cryptography.hazmat.primitives.hashes.SHA3_224`,
  812. :class:`~cryptography.hazmat.primitives.hashes.SHA3_256`,
  813. :class:`~cryptography.hazmat.primitives.hashes.SHA3_384`, and
  814. :class:`~cryptography.hazmat.primitives.hashes.SHA3_512` when using OpenSSL
  815. 1.1.1.
  816. * Added support for :doc:`/hazmat/primitives/asymmetric/x448` when using
  817. OpenSSL 1.1.1.
  818. * Added support for :class:`~cryptography.hazmat.primitives.hashes.SHAKE128`
  819. and :class:`~cryptography.hazmat.primitives.hashes.SHAKE256` when using
  820. OpenSSL 1.1.1.
  821. * Added initial support for parsing PKCS12 files with
  822. :func:`~cryptography.hazmat.primitives.serialization.pkcs12.load_key_and_certificates`.
  823. * Added support for :class:`~cryptography.x509.IssuingDistributionPoint`.
  824. * Added ``rfc4514_string()`` method to
  825. :meth:`x509.Name <cryptography.x509.Name.rfc4514_string>`,
  826. :meth:`x509.RelativeDistinguishedName
  827. <cryptography.x509.RelativeDistinguishedName.rfc4514_string>`, and
  828. :meth:`x509.NameAttribute <cryptography.x509.NameAttribute.rfc4514_string>`
  829. to format the name or component an :rfc:`4514` Distinguished Name string.
  830. * Added
  831. :meth:`~cryptography.hazmat.primitives.asymmetric.ec.EllipticCurvePublicKey.from_encoded_point`,
  832. which immediately checks if the point is on the curve and supports compressed
  833. points. Deprecated the previous method
  834. :meth:`~cryptography.hazmat.primitives.asymmetric.ec.EllipticCurvePublicNumbers.from_encoded_point`.
  835. * Added :attr:`~cryptography.x509.ocsp.OCSPResponse.signature_hash_algorithm`
  836. to ``OCSPResponse``.
  837. * Updated :doc:`/hazmat/primitives/asymmetric/x25519` support to allow
  838. additional serialization methods. Calling
  839. :meth:`~cryptography.hazmat.primitives.asymmetric.x25519.X25519PublicKey.public_bytes`
  840. with no arguments has been deprecated.
  841. * Added support for encoding compressed and uncompressed points via
  842. :meth:`~cryptography.hazmat.primitives.asymmetric.ec.EllipticCurvePublicKey.public_bytes`. Deprecated the previous method
  843. ``cryptography.hazmat.primitives.asymmetric.ec.EllipticCurvePublicNumbers.encode_point``.
  844. .. _v2-4-2:
  845. 2.4.2 - 2018-11-21
  846. ~~~~~~~~~~~~~~~~~~
  847. * Updated Windows, macOS, and ``manylinux1`` wheels to be compiled with
  848. OpenSSL 1.1.0j.
  849. .. _v2-4-1:
  850. 2.4.1 - 2018-11-11
  851. ~~~~~~~~~~~~~~~~~~
  852. * Fixed a build breakage in our ``manylinux1`` wheels.
  853. .. _v2-4:
  854. 2.4 - 2018-11-11
  855. ~~~~~~~~~~~~~~~~
  856. * **BACKWARDS INCOMPATIBLE:** Dropped support for LibreSSL 2.4.x.
  857. * Deprecated OpenSSL 1.0.1 support. OpenSSL 1.0.1 is no longer supported by
  858. the OpenSSL project. At this time there is no time table for dropping
  859. support, however we strongly encourage all users to upgrade or install
  860. ``cryptography`` from a wheel.
  861. * Added initial :doc:`OCSP </x509/ocsp>` support.
  862. * Added support for :class:`~cryptography.x509.PrecertPoison`.
  863. .. _v2-3-1:
  864. 2.3.1 - 2018-08-14
  865. ~~~~~~~~~~~~~~~~~~
  866. * Updated Windows, macOS, and ``manylinux1`` wheels to be compiled with
  867. OpenSSL 1.1.0i.
  868. .. _v2-3:
  869. 2.3 - 2018-07-18
  870. ~~~~~~~~~~~~~~~~
  871. * **SECURITY ISSUE:**
  872. :meth:`~cryptography.hazmat.primitives.ciphers.AEADDecryptionContext.finalize_with_tag`
  873. allowed tag truncation by default which can allow tag forgery in some cases.
  874. The method now enforces the ``min_tag_length`` provided to the
  875. :class:`~cryptography.hazmat.primitives.ciphers.modes.GCM` constructor.
  876. *CVE-2018-10903*
  877. * Added support for Python 3.7.
  878. * Added :meth:`~cryptography.fernet.Fernet.extract_timestamp` to get the
  879. authenticated timestamp of a :doc:`Fernet </fernet>` token.
  880. * Support for Python 2.7.x without ``hmac.compare_digest`` has been deprecated.
  881. We will require Python 2.7.7 or higher (or 2.7.6 on Ubuntu) in the next
  882. ``cryptography`` release.
  883. * Fixed multiple issues preventing ``cryptography`` from compiling against
  884. LibreSSL 2.7.x.
  885. * Added
  886. :class:`~cryptography.x509.CertificateRevocationList.get_revoked_certificate_by_serial_number`
  887. for quick serial number searches in CRLs.
  888. * The :class:`~cryptography.x509.RelativeDistinguishedName` class now
  889. preserves the order of attributes. Duplicate attributes now raise an error
  890. instead of silently discarding duplicates.
  891. * :func:`~cryptography.hazmat.primitives.keywrap.aes_key_unwrap` and
  892. :func:`~cryptography.hazmat.primitives.keywrap.aes_key_unwrap_with_padding`
  893. now raise :class:`~cryptography.hazmat.primitives.keywrap.InvalidUnwrap` if
  894. the wrapped key is an invalid length, instead of ``ValueError``.
  895. .. _v2-2-2:
  896. 2.2.2 - 2018-03-27
  897. ~~~~~~~~~~~~~~~~~~
  898. * Updated Windows, macOS, and ``manylinux1`` wheels to be compiled with
  899. OpenSSL 1.1.0h.
  900. .. _v2-2-1:
  901. 2.2.1 - 2018-03-20
  902. ~~~~~~~~~~~~~~~~~~
  903. * Reverted a change to ``GeneralNames`` which prohibited having zero elements,
  904. due to breakages.
  905. * Fixed a bug in
  906. :func:`~cryptography.hazmat.primitives.keywrap.aes_key_unwrap_with_padding`
  907. that caused it to raise ``InvalidUnwrap`` when key length modulo 8 was
  908. zero.
  909. .. _v2-2:
  910. 2.2 - 2018-03-19
  911. ~~~~~~~~~~~~~~~~
  912. * **BACKWARDS INCOMPATIBLE:** Support for Python 2.6 has been dropped.
  913. * Resolved a bug in ``HKDF`` that incorrectly constrained output size.
  914. * Added :class:`~cryptography.hazmat.primitives.asymmetric.ec.BrainpoolP256R1`,
  915. :class:`~cryptography.hazmat.primitives.asymmetric.ec.BrainpoolP384R1`, and
  916. :class:`~cryptography.hazmat.primitives.asymmetric.ec.BrainpoolP512R1` to
  917. support inter-operating with systems like German smart meters.
  918. * Added token rotation support to :doc:`Fernet </fernet>` with
  919. :meth:`~cryptography.fernet.MultiFernet.rotate`.
  920. * Fixed a memory leak in
  921. :func:`~cryptography.hazmat.primitives.asymmetric.ec.derive_private_key`.
  922. * Added support for AES key wrapping with padding via
  923. :func:`~cryptography.hazmat.primitives.keywrap.aes_key_wrap_with_padding`
  924. and
  925. :func:`~cryptography.hazmat.primitives.keywrap.aes_key_unwrap_with_padding`
  926. .
  927. * Allow loading DSA keys with 224 bit ``q``.
  928. .. _v2-1-4:
  929. 2.1.4 - 2017-11-29
  930. ~~~~~~~~~~~~~~~~~~
  931. * Added ``X509_up_ref`` for an upcoming ``pyOpenSSL`` release.
  932. .. _v2-1-3:
  933. 2.1.3 - 2017-11-02
  934. ~~~~~~~~~~~~~~~~~~
  935. * Updated Windows, macOS, and ``manylinux1`` wheels to be compiled with
  936. OpenSSL 1.1.0g.
  937. .. _v2-1-2:
  938. 2.1.2 - 2017-10-24
  939. ~~~~~~~~~~~~~~~~~~
  940. * Corrected a bug with the ``manylinux1`` wheels where OpenSSL's stack was
  941. marked executable.
  942. .. _v2-1-1:
  943. 2.1.1 - 2017-10-12
  944. ~~~~~~~~~~~~~~~~~~
  945. * Fixed support for install with the system ``pip`` on Ubuntu 16.04.
  946. .. _v2-1:
  947. 2.1 - 2017-10-11
  948. ~~~~~~~~~~~~~~~~
  949. * **FINAL DEPRECATION** Python 2.6 support is deprecated, and will be removed
  950. in the next release of ``cryptography``.
  951. * **BACKWARDS INCOMPATIBLE:** ``Whirlpool``, ``RIPEMD160``, and
  952. ``UnsupportedExtension`` have been removed in accordance with our
  953. :doc:`/api-stability` policy.
  954. * **BACKWARDS INCOMPATIBLE:**
  955. :attr:`DNSName.value <cryptography.x509.DNSName.value>`,
  956. :attr:`RFC822Name.value <cryptography.x509.RFC822Name.value>`, and
  957. :attr:`UniformResourceIdentifier.value
  958. <cryptography.x509.UniformResourceIdentifier.value>`
  959. will now return an :term:`A-label` string when parsing a certificate
  960. containing an internationalized domain name (IDN) or if the caller passed
  961. a :term:`U-label` to the constructor. See below for additional deprecations
  962. related to this change.
  963. * Installing ``cryptography`` now requires ``pip`` 6 or newer.
  964. * Deprecated passing :term:`U-label` strings to the
  965. :class:`~cryptography.x509.DNSName`,
  966. :class:`~cryptography.x509.UniformResourceIdentifier`, and
  967. :class:`~cryptography.x509.RFC822Name` constructors. Instead, users should
  968. pass values as :term:`A-label` strings with ``idna`` encoding if necessary.
  969. This change will not affect anyone who is not processing internationalized
  970. domains.
  971. * Added support for
  972. :class:`~cryptography.hazmat.primitives.ciphers.algorithms.ChaCha20`. In
  973. most cases users should choose
  974. :class:`~cryptography.hazmat.primitives.ciphers.aead.ChaCha20Poly1305`
  975. rather than using this unauthenticated form.
  976. * Added :meth:`~cryptography.x509.CertificateRevocationList.is_signature_valid`
  977. to :class:`~cryptography.x509.CertificateRevocationList`.
  978. * Support :class:`~cryptography.hazmat.primitives.hashes.BLAKE2b` and
  979. :class:`~cryptography.hazmat.primitives.hashes.BLAKE2s` with
  980. :class:`~cryptography.hazmat.primitives.hmac.HMAC`.
  981. * Added support for
  982. :class:`~cryptography.hazmat.primitives.ciphers.modes.XTS` mode for
  983. AES.
  984. * Added support for using labels with
  985. :class:`~cryptography.hazmat.primitives.asymmetric.padding.OAEP` when using
  986. OpenSSL 1.0.2 or greater.
  987. * Improved compatibility with NSS when issuing certificates from an issuer
  988. that has a subject with non-``UTF8String`` string types.
  989. * Add support for the :class:`~cryptography.x509.DeltaCRLIndicator` extension.
  990. * Add support for the :class:`~cryptography.x509.TLSFeature`
  991. extension. This is commonly used for enabling ``OCSP Must-Staple`` in
  992. certificates.
  993. * Add support for the :class:`~cryptography.x509.FreshestCRL` extension.
  994. .. _v2-0-3:
  995. 2.0.3 - 2017-08-03
  996. ~~~~~~~~~~~~~~~~~~
  997. * Fixed an issue with weak linking symbols when compiling on macOS
  998. versions older than 10.12.
  999. .. _v2-0-2:
  1000. 2.0.2 - 2017-07-27
  1001. ~~~~~~~~~~~~~~~~~~
  1002. * Marked all symbols as hidden in the ``manylinux1`` wheel to avoid a
  1003. bug with symbol resolution in certain scenarios.
  1004. .. _v2-0-1:
  1005. 2.0.1 - 2017-07-26
  1006. ~~~~~~~~~~~~~~~~~~
  1007. * Fixed a compilation bug affecting OpenBSD.
  1008. * Altered the ``manylinux1`` wheels to statically link OpenSSL instead of
  1009. dynamically linking and bundling the shared object. This should resolve
  1010. crashes seen when using ``uwsgi`` or other binaries that link against
  1011. OpenSSL independently.
  1012. * Fixed the stack level for the ``signer`` and ``verifier`` warnings.
  1013. .. _v2-0:
  1014. 2.0 - 2017-07-17
  1015. ~~~~~~~~~~~~~~~~
  1016. * **BACKWARDS INCOMPATIBLE:** Support for Python 3.3 has been dropped.
  1017. * We now ship ``manylinux1`` wheels linked against OpenSSL 1.1.0f. These wheels
  1018. will be automatically used with most Linux distributions if you are running
  1019. the latest pip.
  1020. * Deprecated the use of ``signer`` on
  1021. :class:`~cryptography.hazmat.primitives.asymmetric.rsa.RSAPrivateKey`,
  1022. :class:`~cryptography.hazmat.primitives.asymmetric.dsa.DSAPrivateKey`,
  1023. and
  1024. :class:`~cryptography.hazmat.primitives.asymmetric.ec.EllipticCurvePrivateKey`
  1025. in favor of ``sign``.
  1026. * Deprecated the use of ``verifier`` on
  1027. :class:`~cryptography.hazmat.primitives.asymmetric.rsa.RSAPublicKey`,
  1028. :class:`~cryptography.hazmat.primitives.asymmetric.dsa.DSAPublicKey`,
  1029. and
  1030. :class:`~cryptography.hazmat.primitives.asymmetric.ec.EllipticCurvePublicKey`
  1031. in favor of ``verify``.
  1032. * Added support for parsing
  1033. :class:`~cryptography.x509.certificate_transparency.SignedCertificateTimestamp`
  1034. objects from X.509 certificate extensions.
  1035. * Added support for
  1036. :class:`~cryptography.hazmat.primitives.ciphers.aead.ChaCha20Poly1305`.
  1037. * Added support for
  1038. :class:`~cryptography.hazmat.primitives.ciphers.aead.AESCCM`.
  1039. * Added
  1040. :class:`~cryptography.hazmat.primitives.ciphers.aead.AESGCM`, a "one shot"
  1041. API for AES GCM encryption.
  1042. * Added support for :doc:`/hazmat/primitives/asymmetric/x25519`.
  1043. * Added support for serializing and deserializing Diffie-Hellman parameters
  1044. with
  1045. :func:`~cryptography.hazmat.primitives.serialization.load_pem_parameters`,
  1046. :func:`~cryptography.hazmat.primitives.serialization.load_der_parameters`,
  1047. and
  1048. :meth:`~cryptography.hazmat.primitives.asymmetric.dh.DHParameters.parameter_bytes`
  1049. .
  1050. * The ``extensions`` attribute on :class:`~cryptography.x509.Certificate`,
  1051. :class:`~cryptography.x509.CertificateSigningRequest`,
  1052. :class:`~cryptography.x509.CertificateRevocationList`, and
  1053. :class:`~cryptography.x509.RevokedCertificate` now caches the computed
  1054. ``Extensions`` object. There should be no performance change, just a
  1055. performance improvement for programs accessing the ``extensions`` attribute
  1056. multiple times.
  1057. .. _v1-9:
  1058. 1.9 - 2017-05-29
  1059. ~~~~~~~~~~~~~~~~
  1060. * **BACKWARDS INCOMPATIBLE:** Elliptic Curve signature verification no longer
  1061. returns ``True`` on success. This brings it in line with the interface's
  1062. documentation, and our intent. The correct way to use
  1063. :meth:`~cryptography.hazmat.primitives.asymmetric.ec.EllipticCurvePublicKey.verify`
  1064. has always been to check whether or not
  1065. :class:`~cryptography.exceptions.InvalidSignature` was raised.
  1066. * **BACKWARDS INCOMPATIBLE:** Dropped support for macOS 10.7 and 10.8.
  1067. * **BACKWARDS INCOMPATIBLE:** The minimum supported PyPy version is now 5.3.
  1068. * Python 3.3 support has been deprecated, and will be removed in the next
  1069. ``cryptography`` release.
  1070. * Add support for providing ``tag`` during
  1071. :class:`~cryptography.hazmat.primitives.ciphers.modes.GCM` finalization via
  1072. :meth:`~cryptography.hazmat.primitives.ciphers.AEADDecryptionContext.finalize_with_tag`.
  1073. * Fixed an issue preventing ``cryptography`` from compiling against
  1074. LibreSSL 2.5.x.
  1075. * Added
  1076. :meth:`~cryptography.hazmat.primitives.asymmetric.ec.EllipticCurvePublicKey.key_size`
  1077. and
  1078. :meth:`~cryptography.hazmat.primitives.asymmetric.ec.EllipticCurvePrivateKey.key_size`
  1079. as convenience methods for determining the bit size of a secret scalar for
  1080. the curve.
  1081. * Accessing an unrecognized extension marked critical on an X.509 object will
  1082. no longer raise an ``UnsupportedExtension`` exception, instead an
  1083. :class:`~cryptography.x509.UnrecognizedExtension` object will be returned.
  1084. This behavior was based on a poor reading of the RFC, unknown critical
  1085. extensions only need to be rejected on certificate verification.
  1086. * The CommonCrypto backend has been removed.
  1087. * MultiBackend has been removed.
  1088. * ``Whirlpool`` and ``RIPEMD160`` have been deprecated.
  1089. .. _v1-8-2:
  1090. 1.8.2 - 2017-05-26
  1091. ~~~~~~~~~~~~~~~~~~
  1092. * Fixed a compilation bug affecting OpenSSL 1.1.0f.
  1093. * Updated Windows and macOS wheels to be compiled against OpenSSL 1.1.0f.
  1094. .. _v1-8-1:
  1095. 1.8.1 - 2017-03-10
  1096. ~~~~~~~~~~~~~~~~~~
  1097. * Fixed macOS wheels to properly link against 1.1.0 rather than 1.0.2.
  1098. .. _v1-8:
  1099. 1.8 - 2017-03-09
  1100. ~~~~~~~~~~~~~~~~
  1101. * Added support for Python 3.6.
  1102. * Windows and macOS wheels now link against OpenSSL 1.1.0.
  1103. * macOS wheels are no longer universal. This change significantly shrinks the
  1104. size of the wheels. Users on macOS 32-bit Python (if there are any) should
  1105. migrate to 64-bit or build their own packages.
  1106. * Changed ASN.1 dependency from ``pyasn1`` to ``asn1crypto`` resulting in a
  1107. general performance increase when encoding/decoding ASN.1 structures. Also,
  1108. the ``pyasn1_modules`` test dependency is no longer required.
  1109. * Added support for
  1110. :meth:`~cryptography.hazmat.primitives.ciphers.CipherContext.update_into` on
  1111. :class:`~cryptography.hazmat.primitives.ciphers.CipherContext`.
  1112. * Added
  1113. :meth:`~cryptography.hazmat.primitives.asymmetric.dh.DHPrivateKey.private_bytes`
  1114. to
  1115. :class:`~cryptography.hazmat.primitives.asymmetric.dh.DHPrivateKey`.
  1116. * Added
  1117. :meth:`~cryptography.hazmat.primitives.asymmetric.dh.DHPublicKey.public_bytes`
  1118. to
  1119. :class:`~cryptography.hazmat.primitives.asymmetric.dh.DHPublicKey`.
  1120. * :func:`~cryptography.hazmat.primitives.serialization.load_pem_private_key`
  1121. and
  1122. :func:`~cryptography.hazmat.primitives.serialization.load_der_private_key`
  1123. now require that ``password`` must be bytes if provided. Previously this
  1124. was documented but not enforced.
  1125. * Added support for subgroup order in :doc:`/hazmat/primitives/asymmetric/dh`.
  1126. .. _v1-7-2:
  1127. 1.7.2 - 2017-01-27
  1128. ~~~~~~~~~~~~~~~~~~
  1129. * Updated Windows and macOS wheels to be compiled against OpenSSL 1.0.2k.
  1130. .. _v1-7-1:
  1131. 1.7.1 - 2016-12-13
  1132. ~~~~~~~~~~~~~~~~~~
  1133. * Fixed a regression in ``int_from_bytes`` where it failed to accept
  1134. ``bytearray``.
  1135. .. _v1-7:
  1136. 1.7 - 2016-12-12
  1137. ~~~~~~~~~~~~~~~~
  1138. * Support for OpenSSL 1.0.0 has been removed. Users on older version of OpenSSL
  1139. will need to upgrade.
  1140. * Added support for Diffie-Hellman key exchange using
  1141. :meth:`~cryptography.hazmat.primitives.asymmetric.dh.DHPrivateKey.exchange`.
  1142. * The OS random engine for OpenSSL has been rewritten to improve compatibility
  1143. with embedded Python and other edge cases. More information about this change
  1144. can be found in the
  1145. `pull request <https://github.com/pyca/cryptography/pull/3229>`_.
  1146. .. _v1-6:
  1147. 1.6 - 2016-11-22
  1148. ~~~~~~~~~~~~~~~~
  1149. * Deprecated support for OpenSSL 1.0.0. Support will be removed in
  1150. ``cryptography`` 1.7.
  1151. * Replaced the Python-based OpenSSL locking callbacks with a C version to fix
  1152. a potential deadlock that could occur if a garbage collection cycle occurred
  1153. while inside the lock.
  1154. * Added support for :class:`~cryptography.hazmat.primitives.hashes.BLAKE2b` and
  1155. :class:`~cryptography.hazmat.primitives.hashes.BLAKE2s` when using OpenSSL
  1156. 1.1.0.
  1157. * Added
  1158. :attr:`~cryptography.x509.Certificate.signature_algorithm_oid` support to
  1159. :class:`~cryptography.x509.Certificate`.
  1160. * Added
  1161. :attr:`~cryptography.x509.CertificateSigningRequest.signature_algorithm_oid`
  1162. support to :class:`~cryptography.x509.CertificateSigningRequest`.
  1163. * Added
  1164. :attr:`~cryptography.x509.CertificateRevocationList.signature_algorithm_oid`
  1165. support to :class:`~cryptography.x509.CertificateRevocationList`.
  1166. * Added support for :class:`~cryptography.hazmat.primitives.kdf.scrypt.Scrypt`
  1167. when using OpenSSL 1.1.0.
  1168. * Added a workaround to improve compatibility with Python application bundling
  1169. tools like ``PyInstaller`` and ``cx_freeze``.
  1170. * Added support for generating a
  1171. :meth:`~cryptography.x509.random_serial_number`.
  1172. * Added support for encoding ``IPv4Network`` and ``IPv6Network`` in X.509
  1173. certificates for use with :class:`~cryptography.x509.NameConstraints`.
  1174. * Added :meth:`~cryptography.x509.Name.public_bytes` to
  1175. :class:`~cryptography.x509.Name`.
  1176. * Added :class:`~cryptography.x509.RelativeDistinguishedName`
  1177. * :class:`~cryptography.x509.DistributionPoint` now accepts
  1178. :class:`~cryptography.x509.RelativeDistinguishedName` for
  1179. :attr:`~cryptography.x509.DistributionPoint.relative_name`.
  1180. Deprecated use of :class:`~cryptography.x509.Name` as
  1181. :attr:`~cryptography.x509.DistributionPoint.relative_name`.
  1182. * :class:`~cryptography.x509.Name` now accepts an iterable of
  1183. :class:`~cryptography.x509.RelativeDistinguishedName`. RDNs can
  1184. be accessed via the :attr:`~cryptography.x509.Name.rdns`
  1185. attribute. When constructed with an iterable of
  1186. :class:`~cryptography.x509.NameAttribute`, each attribute becomes
  1187. a single-valued RDN.
  1188. * Added
  1189. :func:`~cryptography.hazmat.primitives.asymmetric.ec.derive_private_key`.
  1190. * Added support for signing and verifying RSA, DSA, and ECDSA signatures with
  1191. :class:`~cryptography.hazmat.primitives.asymmetric.utils.Prehashed`
  1192. digests.
  1193. .. _v1-5-3:
  1194. 1.5.3 - 2016-11-05
  1195. ~~~~~~~~~~~~~~~~~~
  1196. * **SECURITY ISSUE**: Fixed a bug where ``HKDF`` would return an empty
  1197. byte-string if used with a ``length`` less than ``algorithm.digest_size``.
  1198. Credit to **Markus Döring** for reporting the issue. *CVE-2016-9243*
  1199. .. _v1-5-2:
  1200. 1.5.2 - 2016-09-26
  1201. ~~~~~~~~~~~~~~~~~~
  1202. * Updated Windows and OS X wheels to be compiled against OpenSSL 1.0.2j.
  1203. .. _v1-5-1:
  1204. 1.5.1 - 2016-09-22
  1205. ~~~~~~~~~~~~~~~~~~
  1206. * Updated Windows and OS X wheels to be compiled against OpenSSL 1.0.2i.
  1207. * Resolved a ``UserWarning`` when used with cffi 1.8.3.
  1208. * Fixed a memory leak in name creation with X.509.
  1209. * Added a workaround for old versions of setuptools.
  1210. * Fixed an issue preventing ``cryptography`` from compiling against
  1211. OpenSSL 1.0.2i.
  1212. .. _v1-5:
  1213. 1.5 - 2016-08-26
  1214. ~~~~~~~~~~~~~~~~
  1215. * Added
  1216. :func:`~cryptography.hazmat.primitives.asymmetric.padding.calculate_max_pss_salt_length`.
  1217. * Added "one shot"
  1218. :meth:`~cryptography.hazmat.primitives.asymmetric.dsa.DSAPrivateKey.sign`
  1219. and
  1220. :meth:`~cryptography.hazmat.primitives.asymmetric.dsa.DSAPublicKey.verify`
  1221. methods to DSA keys.
  1222. * Added "one shot"
  1223. :meth:`~cryptography.hazmat.primitives.asymmetric.ec.EllipticCurvePrivateKey.sign`
  1224. and
  1225. :meth:`~cryptography.hazmat.primitives.asymmetric.ec.EllipticCurvePublicKey.verify`
  1226. methods to ECDSA keys.
  1227. * Switched back to the older callback model on Python 3.5 in order to mitigate
  1228. the locking callback problem with OpenSSL <1.1.0.
  1229. * :class:`~cryptography.x509.CertificateBuilder`,
  1230. :class:`~cryptography.x509.CertificateRevocationListBuilder`, and
  1231. :class:`~cryptography.x509.RevokedCertificateBuilder` now accept timezone
  1232. aware ``datetime`` objects as method arguments
  1233. * ``cryptography`` now supports OpenSSL 1.1.0 as a compilation target.
  1234. .. _v1-4:
  1235. 1.4 - 2016-06-04
  1236. ~~~~~~~~~~~~~~~~
  1237. * Support for OpenSSL 0.9.8 has been removed. Users on older versions of
  1238. OpenSSL will need to upgrade.
  1239. * Added :class:`~cryptography.hazmat.primitives.kdf.kbkdf.KBKDFHMAC`.
  1240. * Added support for ``OpenSSH`` public key serialization.
  1241. * Added support for SHA-2 in RSA
  1242. :class:`~cryptography.hazmat.primitives.asymmetric.padding.OAEP` when using
  1243. OpenSSL 1.0.2 or greater.
  1244. * Added "one shot"
  1245. :meth:`~cryptography.hazmat.primitives.asymmetric.rsa.RSAPrivateKey.sign`
  1246. and
  1247. :meth:`~cryptography.hazmat.primitives.asymmetric.rsa.RSAPublicKey.verify`
  1248. methods to RSA keys.
  1249. * Deprecated the ``serial`` attribute on
  1250. :class:`~cryptography.x509.Certificate`, in favor of
  1251. :attr:`~cryptography.x509.Certificate.serial_number`.
  1252. .. _v1-3-4:
  1253. 1.3.4 - 2016-06-03
  1254. ~~~~~~~~~~~~~~~~~~
  1255. * Added another OpenSSL function to the bindings to support an upcoming
  1256. ``pyOpenSSL`` release.
  1257. .. _v1-3-3:
  1258. 1.3.3 - 2016-06-02
  1259. ~~~~~~~~~~~~~~~~~~
  1260. * Added two new OpenSSL functions to the bindings to support an upcoming
  1261. ``pyOpenSSL`` release.
  1262. .. _v1-3-2:
  1263. 1.3.2 - 2016-05-04
  1264. ~~~~~~~~~~~~~~~~~~
  1265. * Updated Windows and OS X wheels to be compiled against OpenSSL 1.0.2h.
  1266. * Fixed an issue preventing ``cryptography`` from compiling against
  1267. LibreSSL 2.3.x.
  1268. .. _v1-3-1:
  1269. 1.3.1 - 2016-03-21
  1270. ~~~~~~~~~~~~~~~~~~
  1271. * Fixed a bug that caused an ``AttributeError`` when using ``mock`` to patch
  1272. some ``cryptography`` modules.
  1273. .. _v1-3:
  1274. 1.3 - 2016-03-18
  1275. ~~~~~~~~~~~~~~~~
  1276. * Added support for padding ANSI X.923 with
  1277. :class:`~cryptography.hazmat.primitives.padding.ANSIX923`.
  1278. * Deprecated support for OpenSSL 0.9.8. Support will be removed in
  1279. ``cryptography`` 1.4.
  1280. * Added support for the :class:`~cryptography.x509.PolicyConstraints`
  1281. X.509 extension including both parsing and generation using
  1282. :class:`~cryptography.x509.CertificateBuilder` and
  1283. :class:`~cryptography.x509.CertificateSigningRequestBuilder`.
  1284. * Added :attr:`~cryptography.x509.CertificateSigningRequest.is_signature_valid`
  1285. to :class:`~cryptography.x509.CertificateSigningRequest`.
  1286. * Fixed an intermittent ``AssertionError`` when performing an RSA decryption on
  1287. an invalid ciphertext, ``ValueError`` is now correctly raised in all cases.
  1288. * Added
  1289. :meth:`~cryptography.x509.AuthorityKeyIdentifier.from_issuer_subject_key_identifier`.
  1290. .. _v1-2-3:
  1291. 1.2.3 - 2016-03-01
  1292. ~~~~~~~~~~~~~~~~~~
  1293. * Updated Windows and OS X wheels to be compiled against OpenSSL 1.0.2g.
  1294. .. _v1-2-2:
  1295. 1.2.2 - 2016-01-29
  1296. ~~~~~~~~~~~~~~~~~~
  1297. * Updated Windows and OS X wheels to be compiled against OpenSSL 1.0.2f.
  1298. .. _v1-2-1:
  1299. 1.2.1 - 2016-01-08
  1300. ~~~~~~~~~~~~~~~~~~
  1301. * Reverts a change to an OpenSSL ``EVP_PKEY`` object that caused errors with
  1302. ``pyOpenSSL``.
  1303. .. _v1-2:
  1304. 1.2 - 2016-01-08
  1305. ~~~~~~~~~~~~~~~~
  1306. * **BACKWARDS INCOMPATIBLE:**
  1307. :class:`~cryptography.x509.RevokedCertificate`
  1308. :attr:`~cryptography.x509.RevokedCertificate.extensions` now uses extension
  1309. classes rather than returning raw values inside the
  1310. :class:`~cryptography.x509.Extension`
  1311. :attr:`~cryptography.x509.Extension.value`. The new classes
  1312. are:
  1313. * :class:`~cryptography.x509.CertificateIssuer`
  1314. * :class:`~cryptography.x509.CRLReason`
  1315. * :class:`~cryptography.x509.InvalidityDate`
  1316. * Deprecated support for OpenSSL 0.9.8 and 1.0.0. At this time there is no time
  1317. table for actually dropping support, however we strongly encourage all users
  1318. to upgrade, as those versions no longer receive support from the OpenSSL
  1319. project.
  1320. * The :class:`~cryptography.x509.Certificate` class now has
  1321. :attr:`~cryptography.x509.Certificate.signature` and
  1322. :attr:`~cryptography.x509.Certificate.tbs_certificate_bytes` attributes.
  1323. * The :class:`~cryptography.x509.CertificateSigningRequest` class now has
  1324. :attr:`~cryptography.x509.CertificateSigningRequest.signature` and
  1325. :attr:`~cryptography.x509.CertificateSigningRequest.tbs_certrequest_bytes`
  1326. attributes.
  1327. * The :class:`~cryptography.x509.CertificateRevocationList` class now has
  1328. :attr:`~cryptography.x509.CertificateRevocationList.signature` and
  1329. :attr:`~cryptography.x509.CertificateRevocationList.tbs_certlist_bytes`
  1330. attributes.
  1331. * :class:`~cryptography.x509.NameConstraints` are now supported in the
  1332. :class:`~cryptography.x509.CertificateBuilder` and
  1333. :class:`~cryptography.x509.CertificateSigningRequestBuilder`.
  1334. * Support serialization of certificate revocation lists using the
  1335. :meth:`~cryptography.x509.CertificateRevocationList.public_bytes` method of
  1336. :class:`~cryptography.x509.CertificateRevocationList`.
  1337. * Add support for parsing :class:`~cryptography.x509.CertificateRevocationList`
  1338. :meth:`~cryptography.x509.CertificateRevocationList.extensions` in the
  1339. OpenSSL backend. The following extensions are currently supported:
  1340. * :class:`~cryptography.x509.AuthorityInformationAccess`
  1341. * :class:`~cryptography.x509.AuthorityKeyIdentifier`
  1342. * :class:`~cryptography.x509.CRLNumber`
  1343. * :class:`~cryptography.x509.IssuerAlternativeName`
  1344. * Added :class:`~cryptography.x509.CertificateRevocationListBuilder` and
  1345. :class:`~cryptography.x509.RevokedCertificateBuilder` to allow creation of
  1346. CRLs.
  1347. * Unrecognized non-critical X.509 extensions are now parsed into an
  1348. :class:`~cryptography.x509.UnrecognizedExtension` object.
  1349. .. _v1-1-2:
  1350. 1.1.2 - 2015-12-10
  1351. ~~~~~~~~~~~~~~~~~~
  1352. * Fixed a SIGBUS crash with the OS X wheels caused by redefinition of a
  1353. method.
  1354. * Fixed a runtime error ``undefined symbol EC_GFp_nistp224_method`` that
  1355. occurred with some OpenSSL installations.
  1356. * Updated Windows and OS X wheels to be compiled against OpenSSL 1.0.2e.
  1357. .. _v1-1-1:
  1358. 1.1.1 - 2015-11-19
  1359. ~~~~~~~~~~~~~~~~~~
  1360. * Fixed several small bugs related to compiling the OpenSSL bindings with
  1361. unusual OpenSSL configurations.
  1362. * Resolved an issue where, depending on the method of installation and
  1363. which Python interpreter they were using, users on El Capitan (OS X 10.11)
  1364. may have seen an ``InternalError`` on import.
  1365. .. _v1-1:
  1366. 1.1 - 2015-10-28
  1367. ~~~~~~~~~~~~~~~~
  1368. * Added support for Elliptic Curve Diffie-Hellman with
  1369. :class:`~cryptography.hazmat.primitives.asymmetric.ec.ECDH`.
  1370. * Added :class:`~cryptography.hazmat.primitives.kdf.x963kdf.X963KDF`.
  1371. * Added support for parsing certificate revocation lists (CRLs) using
  1372. :func:`~cryptography.x509.load_pem_x509_crl` and
  1373. :func:`~cryptography.x509.load_der_x509_crl`.
  1374. * Add support for AES key wrapping with
  1375. :func:`~cryptography.hazmat.primitives.keywrap.aes_key_wrap` and
  1376. :func:`~cryptography.hazmat.primitives.keywrap.aes_key_unwrap`.
  1377. * Added a ``__hash__`` method to :class:`~cryptography.x509.Name`.
  1378. * Add support for encoding and decoding elliptic curve points to a byte string
  1379. form using
  1380. ``cryptography.hazmat.primitives.asymmetric.ec.EllipticCurvePublicNumbers.encode_point``
  1381. and
  1382. :meth:`~cryptography.hazmat.primitives.asymmetric.ec.EllipticCurvePublicNumbers.from_encoded_point`.
  1383. * Added :meth:`~cryptography.x509.Extensions.get_extension_for_class`.
  1384. * :class:`~cryptography.x509.CertificatePolicies` are now supported in the
  1385. :class:`~cryptography.x509.CertificateBuilder`.
  1386. * ``countryName`` is now encoded as a ``PrintableString`` when creating subject
  1387. and issuer distinguished names with the Certificate and CSR builder classes.
  1388. .. _v1-0-2:
  1389. 1.0.2 - 2015-09-27
  1390. ~~~~~~~~~~~~~~~~~~
  1391. * **SECURITY ISSUE**: The OpenSSL backend prior to 1.0.2 made extensive use
  1392. of assertions to check response codes where our tests could not trigger a
  1393. failure. However, when Python is run with ``-O`` these asserts are optimized
  1394. away. If a user ran Python with this flag and got an invalid response code
  1395. this could result in undefined behavior or worse. Accordingly, all response
  1396. checks from the OpenSSL backend have been converted from ``assert``
  1397. to a true function call. Credit **Emilia Käsper (Google Security Team)**
  1398. for the report.
  1399. .. _v1-0-1:
  1400. 1.0.1 - 2015-09-05
  1401. ~~~~~~~~~~~~~~~~~~
  1402. * We now ship OS X wheels that statically link OpenSSL by default. When
  1403. installing a wheel on OS X 10.10+ (and using a Python compiled against the
  1404. 10.10 SDK) users will no longer need to compile. See :doc:`/installation` for
  1405. alternate installation methods if required.
  1406. * Set the default string mask to UTF-8 in the OpenSSL backend to resolve
  1407. character encoding issues with older versions of OpenSSL.
  1408. * Several new OpenSSL bindings have been added to support a future pyOpenSSL
  1409. release.
  1410. * Raise an error during install on PyPy < 2.6. 1.0+ requires PyPy 2.6+.
  1411. .. _v1-0:
  1412. 1.0 - 2015-08-12
  1413. ~~~~~~~~~~~~~~~~
  1414. * Switched to the new `cffi`_ ``set_source`` out-of-line API mode for
  1415. compilation. This results in significantly faster imports and lowered
  1416. memory consumption. Due to this change we no longer support PyPy releases
  1417. older than 2.6 nor do we support any released version of PyPy3 (until a
  1418. version supporting cffi 1.0 comes out).
  1419. * Fix parsing of OpenSSH public keys that have spaces in comments.
  1420. * Support serialization of certificate signing requests using the
  1421. ``public_bytes`` method of
  1422. :class:`~cryptography.x509.CertificateSigningRequest`.
  1423. * Support serialization of certificates using the ``public_bytes`` method of
  1424. :class:`~cryptography.x509.Certificate`.
  1425. * Add ``get_provisioning_uri`` method to
  1426. :class:`~cryptography.hazmat.primitives.twofactor.hotp.HOTP` and
  1427. :class:`~cryptography.hazmat.primitives.twofactor.totp.TOTP` for generating
  1428. provisioning URIs.
  1429. * Add :class:`~cryptography.hazmat.primitives.kdf.concatkdf.ConcatKDFHash`
  1430. and :class:`~cryptography.hazmat.primitives.kdf.concatkdf.ConcatKDFHMAC`.
  1431. * Raise a ``TypeError`` when passing objects that are not text as the value to
  1432. :class:`~cryptography.x509.NameAttribute`.
  1433. * Add support for :class:`~cryptography.x509.OtherName` as a general name
  1434. type.
  1435. * Added new X.509 extension support in :class:`~cryptography.x509.Certificate`
  1436. The following new extensions are now supported:
  1437. * :class:`~cryptography.x509.OCSPNoCheck`
  1438. * :class:`~cryptography.x509.InhibitAnyPolicy`
  1439. * :class:`~cryptography.x509.IssuerAlternativeName`
  1440. * :class:`~cryptography.x509.NameConstraints`
  1441. * Extension support was added to
  1442. :class:`~cryptography.x509.CertificateSigningRequest`.
  1443. * Add support for creating signed certificates with
  1444. :class:`~cryptography.x509.CertificateBuilder`. This includes support for
  1445. the following extensions:
  1446. * :class:`~cryptography.x509.BasicConstraints`
  1447. * :class:`~cryptography.x509.SubjectAlternativeName`
  1448. * :class:`~cryptography.x509.KeyUsage`
  1449. * :class:`~cryptography.x509.ExtendedKeyUsage`
  1450. * :class:`~cryptography.x509.SubjectKeyIdentifier`
  1451. * :class:`~cryptography.x509.AuthorityKeyIdentifier`
  1452. * :class:`~cryptography.x509.AuthorityInformationAccess`
  1453. * :class:`~cryptography.x509.CRLDistributionPoints`
  1454. * :class:`~cryptography.x509.InhibitAnyPolicy`
  1455. * :class:`~cryptography.x509.IssuerAlternativeName`
  1456. * :class:`~cryptography.x509.OCSPNoCheck`
  1457. * Add support for creating certificate signing requests with
  1458. :class:`~cryptography.x509.CertificateSigningRequestBuilder`. This includes
  1459. support for the same extensions supported in the ``CertificateBuilder``.
  1460. * Deprecate ``encode_rfc6979_signature`` and ``decode_rfc6979_signature`` in
  1461. favor of
  1462. :func:`~cryptography.hazmat.primitives.asymmetric.utils.encode_dss_signature`
  1463. and
  1464. :func:`~cryptography.hazmat.primitives.asymmetric.utils.decode_dss_signature`.
  1465. .. _v0-9-3:
  1466. 0.9.3 - 2015-07-09
  1467. ~~~~~~~~~~~~~~~~~~
  1468. * Updated Windows wheels to be compiled against OpenSSL 1.0.2d.
  1469. .. _v0-9-2:
  1470. 0.9.2 - 2015-07-04
  1471. ~~~~~~~~~~~~~~~~~~
  1472. * Updated Windows wheels to be compiled against OpenSSL 1.0.2c.
  1473. .. _v0-9-1:
  1474. 0.9.1 - 2015-06-06
  1475. ~~~~~~~~~~~~~~~~~~
  1476. * **SECURITY ISSUE**: Fixed a double free in the OpenSSL backend when using DSA
  1477. to verify signatures. Note that this only affects PyPy 2.6.0 and (presently
  1478. unreleased) CFFI versions greater than 1.1.0.
  1479. .. _v0-9:
  1480. 0.9 - 2015-05-13
  1481. ~~~~~~~~~~~~~~~~
  1482. * Removed support for Python 3.2. This version of Python is rarely used
  1483. and caused support headaches. Users affected by this should upgrade to 3.3+.
  1484. * Deprecated support for Python 2.6. At the time there is no time table for
  1485. actually dropping support, however we strongly encourage all users to upgrade
  1486. their Python, as Python 2.6 no longer receives support from the Python core
  1487. team.
  1488. * Add support for the
  1489. :class:`~cryptography.hazmat.primitives.asymmetric.ec.SECP256K1` elliptic
  1490. curve.
  1491. * Fixed compilation when using an OpenSSL which was compiled with the
  1492. ``no-comp`` (``OPENSSL_NO_COMP``) option.
  1493. * Support :attr:`~cryptography.hazmat.primitives.serialization.Encoding.DER`
  1494. serialization of public keys using the ``public_bytes`` method of
  1495. :class:`~cryptography.hazmat.primitives.asymmetric.rsa.RSAPublicKey`,
  1496. :class:`~cryptography.hazmat.primitives.asymmetric.dsa.DSAPublicKey`,
  1497. and
  1498. :class:`~cryptography.hazmat.primitives.asymmetric.ec.EllipticCurvePublicKey`.
  1499. * Support :attr:`~cryptography.hazmat.primitives.serialization.Encoding.DER`
  1500. serialization of private keys using the ``private_bytes`` method of
  1501. :class:`~cryptography.hazmat.primitives.asymmetric.rsa.RSAPrivateKey`,
  1502. :class:`~cryptography.hazmat.primitives.asymmetric.dsa.DSAPrivateKey`,
  1503. and
  1504. :class:`~cryptography.hazmat.primitives.asymmetric.ec.EllipticCurvePrivateKey`.
  1505. * Add support for parsing X.509 certificate signing requests (CSRs) with
  1506. :func:`~cryptography.x509.load_pem_x509_csr` and
  1507. :func:`~cryptography.x509.load_der_x509_csr`.
  1508. * Moved ``cryptography.exceptions.InvalidToken`` to
  1509. :class:`cryptography.hazmat.primitives.twofactor.InvalidToken` and deprecated
  1510. the old location. This was moved to minimize confusion between this exception
  1511. and :class:`cryptography.fernet.InvalidToken`.
  1512. * Added support for X.509 extensions in :class:`~cryptography.x509.Certificate`
  1513. objects. The following extensions are supported as of this release:
  1514. * :class:`~cryptography.x509.BasicConstraints`
  1515. * :class:`~cryptography.x509.AuthorityKeyIdentifier`
  1516. * :class:`~cryptography.x509.SubjectKeyIdentifier`
  1517. * :class:`~cryptography.x509.KeyUsage`
  1518. * :class:`~cryptography.x509.SubjectAlternativeName`
  1519. * :class:`~cryptography.x509.ExtendedKeyUsage`
  1520. * :class:`~cryptography.x509.CRLDistributionPoints`
  1521. * :class:`~cryptography.x509.AuthorityInformationAccess`
  1522. * :class:`~cryptography.x509.CertificatePolicies`
  1523. Note that unsupported extensions with the critical flag raise
  1524. ``UnsupportedExtension`` while unsupported extensions set to non-critical are
  1525. silently ignored. Read the :doc:`X.509 documentation</x509/index>` for more
  1526. information.
  1527. .. _v0-8-2:
  1528. 0.8.2 - 2015-04-10
  1529. ~~~~~~~~~~~~~~~~~~
  1530. * Fixed a race condition when initializing the OpenSSL or CommonCrypto backends
  1531. in a multi-threaded scenario.
  1532. .. _v0-8-1:
  1533. 0.8.1 - 2015-03-20
  1534. ~~~~~~~~~~~~~~~~~~
  1535. * Updated Windows wheels to be compiled against OpenSSL 1.0.2a.
  1536. .. _v0-8:
  1537. 0.8 - 2015-03-08
  1538. ~~~~~~~~~~~~~~~~
  1539. * :func:`~cryptography.hazmat.primitives.serialization.load_ssh_public_key` can
  1540. now load elliptic curve public keys.
  1541. * Added
  1542. :attr:`~cryptography.x509.Certificate.signature_hash_algorithm` support to
  1543. :class:`~cryptography.x509.Certificate`.
  1544. * Added
  1545. :func:`~cryptography.hazmat.primitives.asymmetric.rsa.rsa_recover_prime_factors`
  1546. * :class:`~cryptography.hazmat.primitives.kdf.KeyDerivationFunction` was moved
  1547. from ``cryptography.hazmat.primitives.interfaces`` to
  1548. :mod:`~cryptography.hazmat.primitives.kdf`.
  1549. * Added support for parsing X.509 names. See the
  1550. :doc:`X.509 documentation</x509/index>` for more information.
  1551. * Added
  1552. :func:`~cryptography.hazmat.primitives.serialization.load_der_private_key` to
  1553. support loading of DER encoded private keys and
  1554. :func:`~cryptography.hazmat.primitives.serialization.load_der_public_key` to
  1555. support loading DER encoded public keys.
  1556. * Fixed building against LibreSSL, a compile-time substitute for OpenSSL.
  1557. * FreeBSD 9.2 was removed from the continuous integration system.
  1558. * Updated Windows wheels to be compiled against OpenSSL 1.0.2.
  1559. * :func:`~cryptography.hazmat.primitives.serialization.load_pem_public_key`
  1560. and :func:`~cryptography.hazmat.primitives.serialization.load_der_public_key`
  1561. now support PKCS1 RSA public keys (in addition to the previous support for
  1562. SubjectPublicKeyInfo format for RSA, EC, and DSA).
  1563. * Added ``EllipticCurvePrivateKeyWithSerialization`` and deprecated
  1564. ``EllipticCurvePrivateKeyWithNumbers``.
  1565. * Added
  1566. :meth:`~cryptography.hazmat.primitives.asymmetric.ec.EllipticCurvePrivateKey.private_bytes`
  1567. to
  1568. :class:`~cryptography.hazmat.primitives.asymmetric.ec.EllipticCurvePrivateKey`.
  1569. * Added ``RSAPrivateKeyWithSerialization`` and deprecated ``RSAPrivateKeyWithNumbers``.
  1570. * Added
  1571. :meth:`~cryptography.hazmat.primitives.asymmetric.rsa.RSAPrivateKey.private_bytes`
  1572. to
  1573. :class:`~cryptography.hazmat.primitives.asymmetric.rsa.RSAPrivateKey`.
  1574. * Added ``DSAPrivateKeyWithSerialization`` and deprecated ``DSAPrivateKeyWithNumbers``.
  1575. * Added
  1576. :meth:`~cryptography.hazmat.primitives.asymmetric.dsa.DSAPrivateKey.private_bytes`
  1577. to
  1578. :class:`~cryptography.hazmat.primitives.asymmetric.dsa.DSAPrivateKey`.
  1579. * Added ``RSAPublicKeyWithSerialization`` and deprecated ``RSAPublicKeyWithNumbers``.
  1580. * Added ``public_bytes`` to
  1581. :class:`~cryptography.hazmat.primitives.asymmetric.rsa.RSAPublicKey`.
  1582. * Added ``EllipticCurvePublicKeyWithSerialization`` and deprecated
  1583. ``EllipticCurvePublicKeyWithNumbers``.
  1584. * Added ``public_bytes`` to
  1585. :class:`~cryptography.hazmat.primitives.asymmetric.ec.EllipticCurvePublicKey`.
  1586. * Added ``DSAPublicKeyWithSerialization`` and deprecated ``DSAPublicKeyWithNumbers``.
  1587. * Added ``public_bytes`` to
  1588. :class:`~cryptography.hazmat.primitives.asymmetric.dsa.DSAPublicKey`.
  1589. * :class:`~cryptography.hazmat.primitives.hashes.HashAlgorithm` and
  1590. :class:`~cryptography.hazmat.primitives.hashes.HashContext` were moved from
  1591. ``cryptography.hazmat.primitives.interfaces`` to
  1592. :mod:`~cryptography.hazmat.primitives.hashes`.
  1593. * :class:`~cryptography.hazmat.primitives.ciphers.CipherContext`,
  1594. :class:`~cryptography.hazmat.primitives.ciphers.AEADCipherContext`,
  1595. :class:`~cryptography.hazmat.primitives.ciphers.AEADEncryptionContext`,
  1596. :class:`~cryptography.hazmat.primitives.ciphers.CipherAlgorithm`, and
  1597. :class:`~cryptography.hazmat.primitives.ciphers.BlockCipherAlgorithm`
  1598. were moved from ``cryptography.hazmat.primitives.interfaces`` to
  1599. :mod:`~cryptography.hazmat.primitives.ciphers`.
  1600. * :class:`~cryptography.hazmat.primitives.ciphers.modes.Mode`,
  1601. :class:`~cryptography.hazmat.primitives.ciphers.modes.ModeWithInitializationVector`,
  1602. :class:`~cryptography.hazmat.primitives.ciphers.modes.ModeWithNonce`, and
  1603. :class:`~cryptography.hazmat.primitives.ciphers.modes.ModeWithAuthenticationTag`
  1604. were moved from ``cryptography.hazmat.primitives.interfaces`` to
  1605. :mod:`~cryptography.hazmat.primitives.ciphers.modes`.
  1606. * :class:`~cryptography.hazmat.primitives.padding.PaddingContext` was moved
  1607. from ``cryptography.hazmat.primitives.interfaces`` to
  1608. :mod:`~cryptography.hazmat.primitives.padding`.
  1609. *
  1610. :class:`~cryptography.hazmat.primitives.asymmetric.padding.AsymmetricPadding`
  1611. was moved from ``cryptography.hazmat.primitives.interfaces`` to
  1612. :mod:`~cryptography.hazmat.primitives.asymmetric.padding`.
  1613. * ``AsymmetricSignatureContext`` and ``AsymmetricVerificationContext``
  1614. were moved from ``cryptography.hazmat.primitives.interfaces`` to
  1615. ``cryptography.hazmat.primitives.asymmetric``.
  1616. * :class:`~cryptography.hazmat.primitives.asymmetric.dsa.DSAParameters`,
  1617. ``DSAParametersWithNumbers``,
  1618. :class:`~cryptography.hazmat.primitives.asymmetric.dsa.DSAPrivateKey`,
  1619. ``DSAPrivateKeyWithNumbers``,
  1620. :class:`~cryptography.hazmat.primitives.asymmetric.dsa.DSAPublicKey` and
  1621. ``DSAPublicKeyWithNumbers`` were moved from
  1622. ``cryptography.hazmat.primitives.interfaces`` to
  1623. :mod:`~cryptography.hazmat.primitives.asymmetric.dsa`
  1624. * :class:`~cryptography.hazmat.primitives.asymmetric.ec.EllipticCurve`,
  1625. :class:`~cryptography.hazmat.primitives.asymmetric.ec.EllipticCurveSignatureAlgorithm`,
  1626. :class:`~cryptography.hazmat.primitives.asymmetric.ec.EllipticCurvePrivateKey`,
  1627. ``EllipticCurvePrivateKeyWithNumbers``,
  1628. :class:`~cryptography.hazmat.primitives.asymmetric.ec.EllipticCurvePublicKey`,
  1629. and ``EllipticCurvePublicKeyWithNumbers``
  1630. were moved from ``cryptography.hazmat.primitives.interfaces`` to
  1631. :mod:`~cryptography.hazmat.primitives.asymmetric.ec`.
  1632. * :class:`~cryptography.hazmat.primitives.asymmetric.rsa.RSAPrivateKey`,
  1633. ``RSAPrivateKeyWithNumbers``,
  1634. :class:`~cryptography.hazmat.primitives.asymmetric.rsa.RSAPublicKey` and
  1635. ``RSAPublicKeyWithNumbers`` were moved from
  1636. ``cryptography.hazmat.primitives.interfaces`` to
  1637. :mod:`~cryptography.hazmat.primitives.asymmetric.rsa`.
  1638. .. _v0-7-2:
  1639. 0.7.2 - 2015-01-16
  1640. ~~~~~~~~~~~~~~~~~~
  1641. * Updated Windows wheels to be compiled against OpenSSL 1.0.1l.
  1642. * ``enum34`` is no longer installed on Python 3.4, where it is included in
  1643. the standard library.
  1644. * Added a new function to the OpenSSL bindings to support additional
  1645. functionality in pyOpenSSL.
  1646. .. _v0-7-1:
  1647. 0.7.1 - 2014-12-28
  1648. ~~~~~~~~~~~~~~~~~~
  1649. * Fixed an issue preventing compilation on platforms where ``OPENSSL_NO_SSL3``
  1650. was defined.
  1651. .. _v0-7:
  1652. 0.7 - 2014-12-17
  1653. ~~~~~~~~~~~~~~~~
  1654. * Cryptography has been relicensed from the Apache Software License, Version
  1655. 2.0, to being available under *either* the Apache Software License, Version
  1656. 2.0, or the BSD license.
  1657. * Added key-rotation support to :doc:`Fernet </fernet>` with
  1658. :class:`~cryptography.fernet.MultiFernet`.
  1659. * More bit-lengths are now supported for ``p`` and ``q`` when loading DSA keys
  1660. from numbers.
  1661. * Added ``MACContext`` as a common interface for CMAC and HMAC and
  1662. deprecated ``CMACContext``.
  1663. * Added support for encoding and decoding :rfc:`6979` signatures in
  1664. :doc:`/hazmat/primitives/asymmetric/utils`.
  1665. * Added
  1666. :func:`~cryptography.hazmat.primitives.serialization.load_ssh_public_key` to
  1667. support the loading of OpenSSH public keys (:rfc:`4253`). Only RSA and DSA
  1668. keys are currently supported.
  1669. * Added initial support for X.509 certificate parsing. See the
  1670. :doc:`X.509 documentation</x509/index>` for more information.
  1671. .. _v0-6-1:
  1672. 0.6.1 - 2014-10-15
  1673. ~~~~~~~~~~~~~~~~~~
  1674. * Updated Windows wheels to be compiled against OpenSSL 1.0.1j.
  1675. * Fixed an issue where OpenSSL 1.0.1j changed the errors returned by some
  1676. functions.
  1677. * Added our license file to the ``cryptography-vectors`` package.
  1678. * Implemented DSA hash truncation support (per FIPS 186-3) in the OpenSSL
  1679. backend. This works around an issue in 1.0.0, 1.0.0a, and 1.0.0b where
  1680. truncation was not implemented.
  1681. .. _v0-6:
  1682. 0.6 - 2014-09-29
  1683. ~~~~~~~~~~~~~~~~
  1684. * Added
  1685. :func:`~cryptography.hazmat.primitives.serialization.load_pem_private_key` to
  1686. ease loading private keys, and
  1687. :func:`~cryptography.hazmat.primitives.serialization.load_pem_public_key` to
  1688. support loading public keys.
  1689. * Removed the, deprecated in 0.4, support for the ``salt_length`` argument to
  1690. the :class:`~cryptography.hazmat.primitives.asymmetric.padding.MGF1`
  1691. constructor. The ``salt_length`` should be passed to
  1692. :class:`~cryptography.hazmat.primitives.asymmetric.padding.PSS` instead.
  1693. * Fix compilation on OS X Yosemite.
  1694. * Deprecated ``elliptic_curve_private_key_from_numbers`` and
  1695. ``elliptic_curve_public_key_from_numbers`` in favor of
  1696. ``load_elliptic_curve_private_numbers`` and
  1697. ``load_elliptic_curve_public_numbers`` on ``EllipticCurveBackend``.
  1698. * Added ``EllipticCurvePrivateKeyWithNumbers`` and
  1699. ``EllipticCurvePublicKeyWithNumbers`` support.
  1700. * Work around three GCM related bugs in CommonCrypto and OpenSSL.
  1701. * On the CommonCrypto backend adding AAD but not subsequently calling update
  1702. would return null tag bytes.
  1703. * One the CommonCrypto backend a call to update without an empty add AAD call
  1704. would return null ciphertext bytes.
  1705. * On the OpenSSL backend with certain versions adding AAD only would give
  1706. invalid tag bytes.
  1707. * Support loading EC private keys from PEM.
  1708. .. _v0-5-4:
  1709. 0.5.4 - 2014-08-20
  1710. ~~~~~~~~~~~~~~~~~~
  1711. * Added several functions to the OpenSSL bindings to support new
  1712. functionality in pyOpenSSL.
  1713. * Fixed a redefined constant causing compilation failure with Solaris 11.2.
  1714. .. _v0-5-3:
  1715. 0.5.3 - 2014-08-06
  1716. ~~~~~~~~~~~~~~~~~~
  1717. * Updated Windows wheels to be compiled against OpenSSL 1.0.1i.
  1718. .. _v0-5-2:
  1719. 0.5.2 - 2014-07-09
  1720. ~~~~~~~~~~~~~~~~~~
  1721. * Add ``TraditionalOpenSSLSerializationBackend`` support to ``multibackend``.
  1722. * Fix compilation error on OS X 10.8 (Mountain Lion).
  1723. .. _v0-5-1:
  1724. 0.5.1 - 2014-07-07
  1725. ~~~~~~~~~~~~~~~~~~
  1726. * Add ``PKCS8SerializationBackend`` support to ``multibackend``.
  1727. .. _v0-5:
  1728. 0.5 - 2014-07-07
  1729. ~~~~~~~~~~~~~~~~
  1730. * **BACKWARDS INCOMPATIBLE:**
  1731. :class:`~cryptography.hazmat.primitives.ciphers.modes.GCM` no longer allows
  1732. truncation of tags by default. Previous versions of ``cryptography`` allowed
  1733. tags to be truncated by default, applications wishing to preserve this
  1734. behavior (not recommended) can pass the ``min_tag_length`` argument.
  1735. * Windows builds now statically link OpenSSL by default. When installing a
  1736. wheel on Windows you no longer need to install OpenSSL separately. Windows
  1737. users can switch between static and dynamic linking with an environment
  1738. variable. See :doc:`/installation` for more details.
  1739. * Added :class:`~cryptography.hazmat.primitives.kdf.hkdf.HKDFExpand`.
  1740. * Added :class:`~cryptography.hazmat.primitives.ciphers.modes.CFB8` support
  1741. for :class:`~cryptography.hazmat.primitives.ciphers.algorithms.AES` and
  1742. :class:`~cryptography.hazmat.primitives.ciphers.algorithms.TripleDES` on
  1743. ``commoncrypto`` and ``openssl``.
  1744. * Added ``AES`` :class:`~cryptography.hazmat.primitives.ciphers.modes.CTR`
  1745. support to the OpenSSL backend when linked against 0.9.8.
  1746. * Added ``PKCS8SerializationBackend`` and
  1747. ``TraditionalOpenSSLSerializationBackend`` support to ``openssl``.
  1748. * Added :doc:`/hazmat/primitives/asymmetric/ec` and ``EllipticCurveBackend``.
  1749. * Added :class:`~cryptography.hazmat.primitives.ciphers.modes.ECB` support
  1750. for :class:`~cryptography.hazmat.primitives.ciphers.algorithms.TripleDES` on
  1751. ``commoncrypto`` and ``openssl``.
  1752. * Deprecated the concrete ``RSAPrivateKey`` class in favor of backend
  1753. specific providers of the
  1754. :class:`cryptography.hazmat.primitives.asymmetric.rsa.RSAPrivateKey`
  1755. interface.
  1756. * Deprecated the concrete ``RSAPublicKey`` in favor of backend specific
  1757. providers of the
  1758. :class:`cryptography.hazmat.primitives.asymmetric.rsa.RSAPublicKey`
  1759. interface.
  1760. * Deprecated the concrete ``DSAPrivateKey`` class in favor of backend
  1761. specific providers of the
  1762. :class:`cryptography.hazmat.primitives.asymmetric.dsa.DSAPrivateKey`
  1763. interface.
  1764. * Deprecated the concrete ``DSAPublicKey`` class in favor of backend specific
  1765. providers of the
  1766. :class:`cryptography.hazmat.primitives.asymmetric.dsa.DSAPublicKey`
  1767. interface.
  1768. * Deprecated the concrete ``DSAParameters`` class in favor of backend specific
  1769. providers of the
  1770. :class:`cryptography.hazmat.primitives.asymmetric.dsa.DSAParameters`
  1771. interface.
  1772. * Deprecated ``encrypt_rsa``, ``decrypt_rsa``, ``create_rsa_signature_ctx`` and
  1773. ``create_rsa_verification_ctx`` on ``RSABackend``.
  1774. * Deprecated ``create_dsa_signature_ctx`` and ``create_dsa_verification_ctx``
  1775. on ``DSABackend``.
  1776. .. _v0-4:
  1777. 0.4 - 2014-05-03
  1778. ~~~~~~~~~~~~~~~~
  1779. * Deprecated ``salt_length`` on
  1780. :class:`~cryptography.hazmat.primitives.asymmetric.padding.MGF1` and added it
  1781. to :class:`~cryptography.hazmat.primitives.asymmetric.padding.PSS`. It will
  1782. be removed from ``MGF1`` in two releases per our :doc:`/api-stability`
  1783. policy.
  1784. * Added :class:`~cryptography.hazmat.primitives.ciphers.algorithms.SEED`
  1785. support.
  1786. * Added :class:`~cryptography.hazmat.primitives.cmac.CMAC`.
  1787. * Added decryption support to
  1788. :class:`~cryptography.hazmat.primitives.asymmetric.rsa.RSAPrivateKey`
  1789. and encryption support to
  1790. :class:`~cryptography.hazmat.primitives.asymmetric.rsa.RSAPublicKey`.
  1791. * Added signature support to
  1792. :class:`~cryptography.hazmat.primitives.asymmetric.dsa.DSAPrivateKey`
  1793. and verification support to
  1794. :class:`~cryptography.hazmat.primitives.asymmetric.dsa.DSAPublicKey`.
  1795. .. _v0-3:
  1796. 0.3 - 2014-03-27
  1797. ~~~~~~~~~~~~~~~~
  1798. * Added :class:`~cryptography.hazmat.primitives.twofactor.hotp.HOTP`.
  1799. * Added :class:`~cryptography.hazmat.primitives.twofactor.totp.TOTP`.
  1800. * Added :class:`~cryptography.hazmat.primitives.ciphers.algorithms.IDEA`
  1801. support.
  1802. * Added signature support to
  1803. :class:`~cryptography.hazmat.primitives.asymmetric.rsa.RSAPrivateKey`
  1804. and verification support to
  1805. :class:`~cryptography.hazmat.primitives.asymmetric.rsa.RSAPublicKey`.
  1806. * Moved test vectors to the new ``cryptography_vectors`` package.
  1807. .. _v0-2-2:
  1808. 0.2.2 - 2014-03-03
  1809. ~~~~~~~~~~~~~~~~~~
  1810. * Removed a constant definition that was causing compilation problems with
  1811. specific versions of OpenSSL.
  1812. .. _v0-2-1:
  1813. 0.2.1 - 2014-02-22
  1814. ~~~~~~~~~~~~~~~~~~
  1815. * Fix a bug where importing cryptography from multiple paths could cause
  1816. initialization to fail.
  1817. .. _v0-2:
  1818. 0.2 - 2014-02-20
  1819. ~~~~~~~~~~~~~~~~
  1820. * Added ``commoncrypto``.
  1821. * Added initial ``commoncrypto``.
  1822. * Removed ``register_cipher_adapter`` method from ``CipherBackend``.
  1823. * Added support for the OpenSSL backend under Windows.
  1824. * Improved thread-safety for the OpenSSL backend.
  1825. * Fixed compilation on systems where OpenSSL's ``ec.h`` header is not
  1826. available, such as CentOS.
  1827. * Added :class:`~cryptography.hazmat.primitives.kdf.pbkdf2.PBKDF2HMAC`.
  1828. * Added :class:`~cryptography.hazmat.primitives.kdf.hkdf.HKDF`.
  1829. * Added ``multibackend``.
  1830. * Set default random for ``openssl`` to the OS random engine.
  1831. * Added :class:`~cryptography.hazmat.primitives.ciphers.algorithms.CAST5`
  1832. (CAST-128) support.
  1833. .. _v0-1:
  1834. 0.1 - 2014-01-08
  1835. ~~~~~~~~~~~~~~~~
  1836. * Initial release.
  1837. .. _`as documented here`: https://docs.rs/openssl/latest/openssl/#automatic
  1838. .. _`main`: https://github.com/pyca/cryptography/
  1839. .. _`cffi`: https://cffi.readthedocs.io/