{"payload":{"feedbackUrl":"https://github.com/orgs/community/discussions/53140","repo":{"id":201510866,"defaultBranch":"main","name":"DirectXShaderCompiler","ownerLogin":"EpicGames","currentUserCanPush":false,"isFork":true,"isEmpty":false,"createdAt":"2019-08-09T17:13:06.000Z","ownerAvatar":"https://avatars.githubusercontent.com/u/6615685?v=4","public":true,"private":false,"isOrgOwned":true},"refInfo":{"name":"","listCacheKey":"v0:1706897041.0","currentOid":""},"activityList":{"items":[{"before":"09475fcaaff0c956689f507504f0f68e3eeffe94","after":"5852de760be2e0e70ee62fa427e0ff5a86dafc23","ref":"refs/heads/fixes-2","pushedAt":"2024-03-13T20:52:00.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"LukasBanana","name":"Laura Hermanns","path":"/LukasBanana","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/3158638?s=80&v=4"},"commit":{"message":"Bump cryptography from 41.0.6 to 42.0.4 in /utils/git (#6339)\n\nBumps [cryptography](https://github.com/pyca/cryptography) from 41.0.6\r\nto 42.0.4.\r\n Sourced from cryptography's\r\nchangelog. 42.0.4 - 2024-02-20 .. _v42-0-3: 42.0.3 - 2024-02-15\r\nChangelog
\r\n\r\n
\r\n* Fixed a null-pointer-dereference and segfault that could occur when\r\ncreating\r\na PKCS#12 bundle. Credit to **Alexander-Programming** for reporting the\r\n issue. **CVE-2024-26130**\r\n* Fixed ASN.1 encoding for PKCS7/SMIME signed messages. The fields\r\n``SMIMECapabilities``\r\nand ``SignatureAlgorithmIdentifier`` should now be correctly encoded\r\naccording to the\r\n definitions in :rfc:`2633` :rfc:`3370`.\r\n
.. _v42-0-2:
\r\n42.0.2 - 2024-01-30
\r\n\r\n* Updated Windows, macOS, and Linux wheels to be compiled with OpenSSL\r\n3.2.1.\r\n* Fixed an issue that prevented the use of Python buffer protocol\r\nobjects in\r\n ``sign`` and ``verify`` methods on asymmetric keys.\r\n* Fixed an issue with incorrect keyword-argument naming with\r\n``EllipticCurvePrivateKey``\r\n\r\n:meth:`~cryptography.hazmat.primitives.asymmetric.ec.EllipticCurvePrivateKey.exchange`,\r\n ``X25519PrivateKey``\r\n\r\n:meth:`~cryptography.hazmat.primitives.asymmetric.x25519.X25519PrivateKey.exchange`,\r\n ``X448PrivateKey``\r\n\r\n:meth:`~cryptography.hazmat.primitives.asymmetric.x448.X448PrivateKey.exchange`,\r\n and ``DHPrivateKey``\r\n\r\n:meth:`~cryptography.hazmat.primitives.asymmetric.dh.DHPrivateKey.exchange`.\r\n.. _v42-0-1:
\r\n42.0.1 - 2024-01-24\r\n
\r\nEllipticCurvePrivateKey
\r\n\r\n:meth:~cryptography.hazmat.primitives.asymmetric.ec.EllipticCurvePrivateKey.sign
.~cryptography.hazmat.primitives.serialization.load_pem_public_key
... _v42-0-0:
\r\n42.0.0 - 2024-01-22
\r\n\r\n</tr></table> \r\n
\r\n\r\n... (truncated)
\r\n\r\nfe18470
\r\nBump for 42.0.4 release (#10445)aaa2dd0
\r\nFix ASN.1 issues in PKCS#7 and S/MIME signing (#10373)\r\n(#10442)7a4d012
\r\nFixes #10422\r\n-- don't crash when a PKCS#12 key and cert don't match (#10423)\r\n...df314bb
\r\nbackport actions m1 switch to 42.0.x (#10415)c49a7a5
\r\nchangelog and version bump for 42.0.3 (#10396)396bcf6
\r\nfix provider loading take two (#10390)\r\n(#10395)0e0e46f
\r\nbackport: initialize openssl's legacy provider in rust (#10323)\r\n(#10333)2202123
\r\nchangelog and version bump 42.0.2 (#10268)f7032bd
\r\nbump openssl in CI (#10298)\r\n(#10299)002e886
\r\nFixes #10294\r\n-- correct accidental change to exchange kwarg (#10295)\r\n(#10296)Sourced from cryptography's\r\nchangelog.
\r\n\r\n\r\n42.0.4 - 2024-02-20
\r\n\r\n\r\n* Fixed a null-pointer-dereference and segfault that could occur when\r\ncreating\r\na PKCS#12 bundle. Credit to **Alexander-Programming** for reporting the\r\n issue. **CVE-2024-26130**\r\n* Fixed ASN.1 encoding for PKCS7/SMIME signed messages. The fields\r\n``SMIMECapabilities``\r\nand ``SignatureAlgorithmIdentifier`` should now be correctly encoded\r\naccording to the\r\n definitions in :rfc:`2633` :rfc:`3370`.\r\n
.. _v42-0-3:
\r\n42.0.3 - 2024-02-15\r\n
\r\n
\r\n- Fixed an initialization issue that caused key loading failures for\r\nsome\r\nusers.
\r\n.. _v42-0-2:
\r\n42.0.2 - 2024-01-30
\r\n\r\n\r\n* Updated Windows, macOS, and Linux wheels to be compiled with OpenSSL\r\n3.2.1.\r\n* Fixed an issue that prevented the use of Python buffer protocol\r\nobjects in\r\n ``sign`` and ``verify`` methods on asymmetric keys.\r\n* Fixed an issue with incorrect keyword-argument naming with\r\n``EllipticCurvePrivateKey``\r\n\r\n:meth:`~cryptography.hazmat.primitives.asymmetric.ec.EllipticCurvePrivateKey.exchange`,\r\n ``X25519PrivateKey``\r\n\r\n:meth:`~cryptography.hazmat.primitives.asymmetric.x25519.X25519PrivateKey.exchange`,\r\n ``X448PrivateKey``\r\n\r\n:meth:`~cryptography.hazmat.primitives.asymmetric.x448.X448PrivateKey.exchange`,\r\n and ``DHPrivateKey``\r\n\r\n:meth:`~cryptography.hazmat.primitives.asymmetric.dh.DHPrivateKey.exchange`.\r\n
.. _v42-0-1:
\r\n42.0.1 - 2024-01-24\r\n
\r\n
\r\n- Fixed an issue with incorrect keyword-argument naming with\r\n
\r\nEllipticCurvePrivateKey
\r\n\r\n:meth:~cryptography.hazmat.primitives.asymmetric.ec.EllipticCurvePrivateKey.sign
.- Resolved compatibility issue with loading certain RSA public keys in\r\n\r\n:func:
\r\n~cryptography.hazmat.primitives.serialization.load_pem_public_key
... _v42-0-0:
\r\n42.0.0 - 2024-01-22
\r\n\r\n\r\n</tr></table> \r\n
... (truncated)
\r\nfe18470
\r\nBump for 42.0.4 release (#10445)aaa2dd0
\r\nFix ASN.1 issues in PKCS#7 and S/MIME signing (#10373)\r\n(#10442)7a4d012
\r\nFixes #10422\r\n-- don't crash when a PKCS#12 key and cert don't match (#10423)\r\n...df314bb
\r\nbackport actions m1 switch to 42.0.x (#10415)c49a7a5
\r\nchangelog and version bump for 42.0.3 (#10396)396bcf6
\r\nfix provider loading take two (#10390)\r\n(#10395)0e0e46f
\r\nbackport: initialize openssl's legacy provider in rust (#10323)\r\n(#10333)2202123
\r\nchangelog and version bump 42.0.2 (#10268)f7032bd
\r\nbump openssl in CI (#10298)\r\n(#10299)002e886
\r\nFixes #10294\r\n-- correct accidental change to exchange kwarg (#10295)\r\n(#10296)