Skip to content

Bump ecdsa from 0.13.3 to 0.14.1

Marvin Wilke requested to merge dependabot/pip/ecdsa-0.14.1 into master

Created by: dependabot[bot]

Bumps ecdsa from 0.13.3 to 0.14.1.

Release notes

Sourced from ecdsa's releases.

ecdsa 0.14.1

Remove the obsolete six.py file from wheel distribution file on pypi

ecdsa 0.14

tl;dr:

  • support for Brainpool curves
  • better test coverage, fixed bugs found by it
  • support for compressed point representation

Bug fixes:

  • Strict checking of DER requirements when parsing SEQUENCE, INTEGER, OBJECT IDENTIFIER and BITSTRING objects.
  • DER parsers now consistently raise UnexpectedDER exception on malformed DER encoded byte strings.
  • Make sure that both malformed and invalid signatures raise BadSignatureError.
  • Ensure that all SigningKey and VerifyingKey methods that should accept bytes-like objects actually do accept them (also avoid copying input strings).
  • Make SigningKey.sign_digest_deterministic use default object hashfunc when none was provided.
  • encode_integer now works for large integers.
  • Make encode_oid and remove_object correctly handle OBJECT IDENTIFIERs with large second subidentifier and padding in encoded subidentifiers.

New features:

  • Deterministic signature methods now accept extra_entropy parameter to further randomise the selection of k (the nonce) for signature, as specified in RFC6979.
  • Recovery of public key from signature is now supported.
  • Support for SEC1/X9.62 formatted keys, all three encodings are supported: "uncompressed", "compressed" and "hybrid". Both string, and PEM/DER will automatically accept them, if the size of the key matches the curve.
  • Benchmarking application now provides performance numbers that are easier to compare against OpenSSL.
  • Support for all Brainpool curves (non-twisted).

New API:

  • CurveFp: __str__ is now supported.
  • SigningKey.sign_deterministic, SigningKey.sign_digest_deterministic and
  • generate_k: extra_entropy parameter was added
  • Signature.recover_public_keys was added
  • VerifyingKey.from_public_key_recovery and
  • VerifyingKey.from_public_key_recovery_with_digest were added
  • VerifyingKey.to_string: encoding parameter was added
  • VerifyingKey.to_der and SigningKey.to_der: point_encoding parameter was added.
  • encode_bitstring: unused parameter was added
... (truncated)
Changelog

Sourced from ecdsa's changelog.

  • Release 0.14.1 (06 Nov 2019)

Remove the obsolete six.py file from wheel

  • Release 0.14 (06 Nov 2019)

Bug fixes: Strict checking of DER requirements when parsing SEQUENCE, INTEGER, OBJECT IDENTIFIER and BITSTRING objects. DER parsers now consistently raise UnexpectedDER exception on malformed DER encoded byte strings. Make sure that both malformed and invalid signatures raise BadSignatureError. Ensure that all SigningKey and VerifyingKey methods that should accept bytes-like objects actually do accept them (also avoid copying input strings). Make SigningKey.sign_digest_deterministic use default object hashfunc when none was provided. encode_integer now works for large integers. Make encode_oid and remove_object correctly handle OBJECT IDENTIFIERs with large second subidentifier and padding in encoded subidentifiers.

New features: Deterministic signature methods now accept extra_entropy parameter to further randomise the selection of k (the nonce) for signature, as specified in RFC6979. Recovery of public key from signature is now supported. Support for SEC1/X9.62 formatted keys, all three encodings are supported: "uncompressed", "compressed" and "hybrid". Both string, and PEM/DER will automatically accept them, if the size of the key matches the curve. Benchmarking application now provides performance numbers that are easier to compare against OpenSSL. Support for all Brainpool curves (non-twisted).

New API: CurveFp: __str__ is now supported. SigningKey.sign_deterministic, SigningKey.sign_digest_deterministic and generate_k: extra_entropy parameter was added Signature.recover_public_keys was added VerifyingKey.from_public_key_recovery and VerifyingKey.from_public_key_recovery_with_digest were added VerifyingKey.to_string: encoding parameter was added VerifyingKey.to_der and SigningKey.to_der: point_encoding parameter was added. encode_bitstring: unused parameter was added remove_bitstring: expect_unused parameter was added SECP256k1 is now part of curves * import Curves: __repr__ is now supported VerifyingKey: __repr__ is now supported

Deprecations: Python 2.5 is not supported any more - dead code removal.

... (truncated)
Commits
  • c3136e4 release 0.14.1
  • 84dbe0d Merge pull request #158 from tomato42/news-updates
  • 270fd9f update versioneer paths
  • 842064d add 0.14 changes to NEWS
  • c5e7ac2 Merge pull request #157 from tomato42/large-oids
  • 2dac8ee der: make the comment unambiguous
  • a127819 der: don't accept padded subidentifiers
  • 1bfb06f der: fix encoding and decoding OIDs
  • d6cb288 update Testing after changes to test coverage
  • 3c79616 update README after addition of Brainpool
  • Additional commits viewable in compare view

Dependabot compatibility score

Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.


Dependabot commands and options

You can trigger Dependabot actions by commenting on this PR:

  • @dependabot rebase will rebase this PR
  • @dependabot recreate will recreate this PR, overwriting any edits that have been made to it
  • @dependabot merge will merge this PR after your CI passes on it
  • @dependabot squash and merge will squash and merge this PR after your CI passes on it
  • @dependabot cancel merge will cancel a previously requested merge and block automerging
  • @dependabot reopen will reopen this PR if it is closed
  • @dependabot ignore this [patch|minor|major] version will close this PR and stop Dependabot creating any more for this minor/major version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this dependency will close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself)
  • @dependabot use these labels will set the current labels as the default for future PRs for this repo and language
  • @dependabot use these reviewers will set the current reviewers as the default for future PRs for this repo and language
  • @dependabot use these assignees will set the current assignees as the default for future PRs for this repo and language
  • @dependabot use this milestone will set the current milestone as the default for future PRs for this repo and language

You can disable automated security fix PRs for this repo from the Security Alerts page.

Merge request reports