Skip to content
This repository has been archived by the owner on May 1, 2024. It is now read-only.

Bump ecdsa from 0.13 to 0.13.3 in /requirements #854

Open
wants to merge 1 commit into
base: master
Choose a base branch
from

Conversation

dependabot[bot]
Copy link

@dependabot dependabot bot commented on behalf of github Jan 7, 2021

Bumps ecdsa from 0.13 to 0.13.3.

Release notes

Sourced from ecdsa's releases.

ecdsa 0.13.3

Fix CVE-2019-14853 - possible DoS caused by malformed signature decoding Fix CVE-2019-14859 - signature malleability caused by insufficient checks of DER encoding

Also harden key decoding from string and DER encodings.

ecdsa 0.13.2

Restore compatibility of setup.py with Python 2.6 and 2.7.

ecdsa 0.13.1

Fix the PyPI wheel - the old version included .pyc files.

Changelog

Sourced from ecdsa's changelog.

  • Release 0.16.1 (12 Nov 2020)

New API: VerifyingKey.precompute() supports lazy argument to delay precomputation to the first time the key is used to verify a signature.

Doc fixes: Documentation for the VerifyingKey.precompute() method.

Bug fix: Make created signatures correct when the hash used is bigger than the curve order bit size and the curve order is not a multiple of 8 (this affects only users of custom curves or hashes with output larger than 512 bits).

Performance: Speed up library load time by calculating the generator point multiplication tables the first time the points are used, not when they are initialised.

Maintenance: Include Python 3.9 in CI testing. Test coverage for the VerifyingKey.precompute() method. Small speed-ups for the test suite.

  • Release 0.16.0 (27 Aug 2020)

New features: Support for reading and writing private keys in PKCS#8 format.

New API: to_pem and to_der now accept new parameter, format, to specify the format of the encoded files, either the dafault, legacy "ssleay", or the new pkcs8 to use PKCS#8. Note that only unencrypted PKCS#8 files are supported. Add allow_truncate to verify in VerifyingKey, it defaults to True, when specified as False, use of large hashes smaller than curves will be disallowed (as it was in 0.14.1 and earlier).

Bug fix: Correctly calculate signatures for private keys equal to n-1. Make PointJacobi and thus SigningKey and VerifyingKey pickleable.

Doc fixes: to_pem functions return bytes not str, document them as such. from_pem and from_pem in SigningKey returns SigningKey, document them as such.

Maintenance: Ensure that version checks will work with Python 4. Format the source with black. Fix uses of assert_ in test suite.

... (truncated)

Commits
  • 7add221 update NEWS file for 0.13.3
  • 5c4c74a Merge pull request #124 from tomato42/backport-sig-decode
  • 1eb2c04 update README with error handling of from_string() and from_der()
  • b95be03 execute also new tests in Travis
  • 99c907d harden also key decoding
  • 3427fa2 ensure that the encoding is actually the minimal one for length and integer
  • 563d2ee make variable names in remove_integer more aproppriate
  • 14abfe0 explicitly specify the distro to get py26 and py33
  • 9080d1d fix length decoding
  • 897178c give the same handling to string encoded signatures as to DER
  • Additional commits viewable in compare view

Dependabot compatibility score

Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.


Dependabot commands and options

You can trigger Dependabot actions by commenting on this PR:

  • @dependabot rebase will rebase this PR
  • @dependabot recreate will recreate this PR, overwriting any edits that have been made to it
  • @dependabot merge will merge this PR after your CI passes on it
  • @dependabot squash and merge will squash and merge this PR after your CI passes on it
  • @dependabot cancel merge will cancel a previously requested merge and block automerging
  • @dependabot reopen will reopen this PR if it is closed
  • @dependabot close will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually
  • @dependabot ignore this major version will close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this minor version will close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this dependency will close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself)
  • @dependabot use these labels will set the current labels as the default for future PRs for this repo and language
  • @dependabot use these reviewers will set the current reviewers as the default for future PRs for this repo and language
  • @dependabot use these assignees will set the current assignees as the default for future PRs for this repo and language
  • @dependabot use this milestone will set the current milestone as the default for future PRs for this repo and language

You can disable automated security fix PRs for this repo from the Security Alerts page.

@dependabot dependabot bot added the dependencies Pull requests that update a dependency file label Jan 7, 2021
@dependabot @github
Copy link
Author

dependabot bot commented on behalf of github Jan 7, 2021

Dependabot tried to update this pull request, but something went wrong. We're looking into it, but in the meantime you can retry the update by commenting @dependabot rebase.

5 similar comments
@dependabot @github
Copy link
Author

dependabot bot commented on behalf of github Feb 1, 2021

Dependabot tried to update this pull request, but something went wrong. We're looking into it, but in the meantime you can retry the update by commenting @dependabot rebase.

@dependabot @github
Copy link
Author

dependabot bot commented on behalf of github Apr 1, 2021

Dependabot tried to update this pull request, but something went wrong. We're looking into it, but in the meantime you can retry the update by commenting @dependabot rebase.

@dependabot @github
Copy link
Author

dependabot bot commented on behalf of github Apr 21, 2021

Dependabot tried to update this pull request, but something went wrong. We're looking into it, but in the meantime you can retry the update by commenting @dependabot rebase.

@dependabot @github
Copy link
Author

dependabot bot commented on behalf of github Aug 11, 2021

Dependabot tried to update this pull request, but something went wrong. We're looking into it, but in the meantime you can retry the update by commenting @dependabot rebase.

@dependabot @github
Copy link
Author

dependabot bot commented on behalf of github Aug 20, 2021

Dependabot tried to update this pull request, but something went wrong. We're looking into it, but in the meantime you can retry the update by commenting @dependabot rebase.

Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
dependencies Pull requests that update a dependency file
Projects
None yet
Development

Successfully merging this pull request may close these issues.

0 participants