;;; GNU Guix --- Functional package management for GNU ;;; Copyright © 2015 Eric Dvorsak ;;; Copyright © 2015, 2016, 2017, 2018, 2019, 2020 Efraim Flashner ;;; Copyright © 2015, 2016, 2017, 2019 Leo Famulari ;;; Copyright © 2016, 2017, 2020 Marius Bakke ;;; Copyright © 2017 Ben Sturmfels ;;; Copyright © 2016 Sou Bunnbu ;;; Copyright © 2015 Cyril Roelandt ;;; Copyright © 2014, 2017 Eric Bavier ;;; Copyright © 2015, 2016 David Thompson ;;; Copyright © 2016, 2017, 2018, 2019, 2020 Tobias Geerinckx-Rice ;;; Copyright © 2016, 2017 Nikita ;;; Copyright © 2014, 2015 Mark H Weaver ;;; Copyright © 2015, 2016, 2017, 2019 Ricardo Wurmus ;;; Copyright © 2016 Danny Milosavljevic ;;; Copyright © 2016, 2017, 2020 Arun Isaac ;;; Copyright © 2017 Carlo Zancanaro ;;; Copyright © 2018 Tomáš Čech ;;; Copyright © 2018 Nicolas Goaziou ;;; Copyright © 2018 Vagrant Cascadian ;;; Copyright © 2018 Nam Nguyen ;;; Copyright © 2019 Guillaume Le Vaillant ;;; Copyright © 2019 Clément Lassieur ;;; Copyright © 2020 Alexandros Theodotou ;;; Copyright © 2020 Justus Winter ;;; Copyright © 2020 Vinicius Monego ;;; ;;; This file is part of GNU Guix. ;;; ;;; GNU Guix is free software; you can redistribute it and/or modify it ;;; under the terms of the GNU General Public License as published by ;;; the Free Software Foundation; either version 3 of the License, or (at ;;; your option) any later version. ;;; ;;; GNU Guix is distributed in the hope that it will be useful, but ;;; WITHOUT ANY WARRANTY; without even the implied warranty of ;;; MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the ;;; GNU General Public License for more details. ;;; ;;; You should have received a copy of the GNU General Public License ;;; along with GNU Guix. If not, see . (define-module (gnu packages python-crypto) #:use-module (guix packages) #:use-module (guix download) #:use-module (guix git-download) #:use-module (guix build-system python) #:use-module (gnu packages) #:use-module (gnu packages check) #:use-module (gnu packages crypto) #:use-module (gnu packages kerberos) #:use-module (gnu packages libffi) #:use-module (gnu packages multiprecision) #:use-module (gnu packages password-utils) #:use-module (gnu packages protobuf) #:use-module (gnu packages python) #:use-module (gnu packages python-check) #:use-module (gnu packages python-compression) #:use-module (gnu packages python-web) #:use-module (gnu packages python-xyz) #:use-module (gnu packages swig) #:use-module (gnu packages time) #:use-module (gnu packages tls) #:use-module (gnu packages xml) #:use-module ((guix licenses) #:prefix license:) #:use-module (srfi srfi-1)) (define-public python-potr (package (name "python-potr") (version "1.0.2") (source (origin (method git-fetch) (uri (git-reference (url "https://github.com/python-otr/pure-python-otr") (commit version))) (file-name (git-file-name name version)) (sha256 (base32 "1hzw6h01fm216nmipyylgz0zybd80w1xsk12m7djycnhqrnrvvv1")))) (build-system python-build-system) (propagated-inputs `(("python-pycrypto" ,python-pycrypto))) (synopsis "Python OTR Implementation") (description "Python OTR is an Off-The-Record Protocol Implementation in Python. It does not bind to libotr.") (home-page "https://github.com/python-otr/pure-python-otr") (license license:lgpl3+))) (define-public python-base58 (package (name "python-base58") (version "2.0.1") (source (origin (method url-fetch) (uri (pypi-uri "base58" version)) (sha256 (base32 "0yfaqp76kbdb62hikr5n4jkkfjfmii89grwfy6sw3fmsv5hrap1n")))) (build-system python-build-system) (native-inputs `(("python-pyhamcrest" ,python-pyhamcrest))) (home-page "https://github.com/keis/base58") (synopsis "Base58 and Base58Check implementation") (description "Base58 and Base58Check implementation compatible with what is used by the Bitcoin network.") (license license:expat))) (define-public python-bcrypt (package (name "python-bcrypt") (version "3.1.7") (source (origin (method url-fetch) (uri (pypi-uri "bcrypt" version)) (sha256 (base32 "0hhywhxx301cxivgxrpslrangbfpccc8y83qbwn1f57cab3nj00b")))) (build-system python-build-system) (native-inputs `(("python-pycparser" ,python-pycparser) ("python-pytest" ,python-pytest))) (propagated-inputs `(("python-cffi" ,python-cffi) ("python-six" ,python-six))) (home-page "https://github.com/pyca/bcrypt/") (synopsis "Modern password hashing library") (description "Bcrypt is a Python module which provides a password hashing method based on the Blowfish password hashing algorithm, as described in @url{http://static.usenix.org/events/usenix99/provos.html,\"A Future-Adaptable Password Scheme\"} by Niels Provos and David Mazieres.") (license license:asl2.0))) (define-public python2-bcrypt (package-with-python2 python-bcrypt)) (define-public python-passlib (package (name "python-passlib") (version "1.7.4") (source (origin (method url-fetch) (uri (pypi-uri "passlib" version)) (sha256 (base32 "015y5qaw9qnxr29lg60dml1g5rbqd4586wy5n8m41ib55gvm1zfy")))) (build-system python-build-system) (native-inputs `(("python-nose" ,python-nose))) (propagated-inputs `(("python-py-bcrypt" ,python-py-bcrypt))) (arguments `(#:phases (modify-phases %standard-phases (add-before 'check 'set-PYTHON_EGG_CACHE ;; Some tests require access to "$HOME/.cython". (lambda _ (setenv "PYTHON_EGG_CACHE" "/tmp") #t))))) (home-page "https://bitbucket.org/ecollins/passlib") (synopsis "Comprehensive password hashing framework") (description "Passlib is a password hashing library for Python 2 & 3, which provides cross-platform implementations of over 30 password hashing algorithms, as well as a framework for managing existing password hashes. It's designed to be useful for a wide range of tasks, from verifying a hash found in /etc/shadow, to providing full-strength password hashing for multi-user application.") (license license:bsd-3))) (define-public python2-passlib (package-with-python2 python-passlib)) (define-public python-py-bcrypt (package (name "python-py-bcrypt") (version "0.4") (source (origin (method url-fetch) (uri (pypi-uri "py-bcrypt" version)) (sha256 (base32 "0y6smdggwi5s72v6p1nn53dg6w05hna3d264cq6kas0lap73p8az")))) (build-system python-build-system) (home-page "https://code.google.com/p/py-bcrypt") (synopsis "Bcrypt password hashing and key derivation") (description "A python wrapper of OpenBSD's Blowfish password hashing code. This system hashes passwords using a version of Bruce Schneier's Blowfish block cipher with modifications designed to raise the cost of off-line password cracking and frustrate fast hardware implementation. The computation cost of the algorithm is parametrised, so it can be increased as computers get faster. The intent is to make a compromise of a password database less likely to result in an attacker gaining knowledge of the plaintext passwords (e.g. using John the Ripper).") ;; "sha2.c" is under BSD-3; ;; "blowfish.c" and "bcrypt.c" are under BSD-4; ;; the rest is under ISC. (license (list license:isc license:bsd-3 license:bsd-4)))) (define-public python2-py-bcrypt (package-with-python2 python-py-bcrypt)) (define-public python-pyblake2 (package (name "python-pyblake2") (version "1.1.2") (source (origin (method url-fetch) (uri (pypi-uri "pyblake2" version)) (sha256 (base32 "0gz9hgznv5zw4qjq43xa56y0yikimx30gffvibxzm0nv5sq7xk2w")))) (build-system python-build-system) (home-page "https://github.com/dchest/pyblake2") (synopsis "BLAKE2 hash function for Python") (description "BLAKE2 is a cryptographic hash function, which offers stronger security while being as fast as MD5 or SHA-1, and comes in two flavors: @code{BLAKE2b}, optimized for 64-bit platforms and produces digests of any size between 1 and 64 bytes, and @code{BLAKE2s}, optimized for 8- to 32-bit platforms and produces digests of any size between 1 and 32 bytes. This package provides a Python interface for BLAKE2.") ;; The COPYING file declares it as public domain, with the option to ;; alternatively use and redistribute it under a variety of permissive ;; licenses. cc0 is explicitly mentioned in setup.py and pyblake2module.c. (license (list license:public-domain license:cc0)))) (define-public python-paramiko (package (name "python-paramiko") (version "2.7.2") (source (origin (method url-fetch) (uri (pypi-uri "paramiko" version)) (sha256 (base32 "0dahwq623jnna7gsr9j0mkwr9k2n1pvkapjryhcx508d5jxg8dkz")))) (build-system python-build-system) (arguments `(;; FIXME: Tests require many unpackaged libraries, see dev-requirements.txt. #:tests? #f)) (propagated-inputs `(("python-bcrypt" ,python-bcrypt) ("python-pyasn1" ,python-pyasn1) ("python-pynacl" ,python-pynacl) ("python-cryptography" ,python-cryptography))) (home-page "https://www.paramiko.org/") (synopsis "SSHv2 protocol library") (description "Paramiko is a python implementation of the SSHv2 protocol, providing both client and server functionality. While it leverages a Python C extension for low level cryptography (PyCrypto), Paramiko itself is a pure Python interface around SSH networking concepts.") (license license:lgpl2.1+))) (define-public python2-paramiko (package-with-python2 python-paramiko)) (define-public python-ecdsa (package (name "python-ecdsa") (version "0.14.1") (source (origin (method url-fetch) (uri (pypi-uri "ecdsa" version)) (sha256 (base32 "13nx5cbfxc0gnax5zwdmp9xc40qd1llk62mv85jyrvqkbw017ik4")))) (build-system python-build-system) (arguments '(#:phases (modify-phases %standard-phases (replace 'check (lambda _ (invoke "pytest")))))) (propagated-inputs `(("python-six" ,python-six))) (native-inputs `(("openssl" ,openssl) ("python-pytest" ,python-pytest))) (home-page "https://github.com/warner/python-ecdsa") (synopsis "ECDSA cryptographic signature library (pure python)") (description "This is an easy-to-use implementation of ECDSA cryptography (Elliptic Curve Digital Signature Algorithm), implemented purely in Python. With this library, you can quickly create key pairs (signing key and verifying key), sign messages, and verify the signatures. The keys and signatures are very short, making them easy to handle and incorporate into other protocols.") (license license:expat))) (define-public python2-ecdsa (package-with-python2 python-ecdsa)) ;;; Pycrypto is abandoned upstream: ;;; ;;; https://github.com/dlitz/pycrypto/issues/173 ;;; ;;; TODO Remove this package from GNU Guix. (define-public python-pycrypto (package (name "python-pycrypto") (version "2.6.1") (source (origin (method url-fetch) (uri (pypi-uri "pycrypto" version)) (patches (search-patches "python-pycrypto-CVE-2013-7459.patch" "python-pycrypto-time-clock.patch")) (sha256 (base32 "0g0ayql5b9mkjam8hym6zyg6bv77lbh66rv1fyvgqb17kfc1xkpj")))) (build-system python-build-system) (inputs `(("python" ,python) ("gmp" ,gmp))) (arguments `(#:phases (modify-phases %standard-phases (add-before 'build 'set-build-env ;; pycrypto runs an autoconf configure script behind the scenes (lambda _ (setenv "CONFIG_SHELL" (which "bash")) #t))))) (home-page "https://www.dlitz.net/software/pycrypto/") (synopsis "Cryptographic modules for Python") (description "Pycrypto is a collection of both secure hash functions (such as SHA256 and RIPEMD160), and various encryption algorithms (AES, DES, RSA, ElGamal, etc.). The package is structured to make adding new modules easy.") (license license:public-domain))) (define-public python2-pycrypto (let ((pycrypto (package-with-python2 python-pycrypto))) (package (inherit pycrypto) (inputs `(("python" ,python-2) ,@(alist-delete "python" (package-inputs pycrypto))))))) (define-public python-kerberos (package (name "python-kerberos") (version "1.3.0") (source (origin (method url-fetch) (uri (pypi-uri "kerberos" version)) (sha256 (base32 "19663qxmma0i8bfbjc2iwy5hgq0g4pfb75r023v5dps68zfvffgh")))) (build-system python-build-system) (inputs `(("mit-krb5" ,mit-krb5))) (home-page "https://github.com/apple/ccs-pykerberos") (synopsis "Python Kerberos library used by CalendarServer") (description "This Python package is a high-level wrapper for Kerberos (GSSAPI) operations. The goal is to avoid having to build a module that wraps the entire Kerberos.framework, and instead offer a limited set of functions that do what is needed for client/server Kerberos authentication based on .") (license license:asl2.0))) (define-public python-keyring (package (name "python-keyring") (version "21.0.0") (source (origin (method url-fetch) (uri (pypi-uri "keyring" version)) (sha256 (base32 "1k0w3yh3fz0qp0cvkxdiinq9jzbrnc6bd88qpjz34x3cgcr94psz")) (modules '((guix build utils))) (snippet ;; https://github.com/jaraco/keyring/issues/414 '(begin (substitute* "tests/test_packaging.py" (("ep, =") "(ep,) =")) #t)))) (build-system python-build-system) (arguments `(#:phases (modify-phases %standard-phases (replace 'check (lambda _ ;; Not clear why this test fails. (delete-file "tests/test_packaging.py") (substitute* "pytest.ini" (("--black ") "")) (invoke "pytest")))))) (native-inputs `(("python-pytest" ,python-pytest) ("python-pytest-checkdocs" ,python-pytest-checkdocs) ("python-pytest-cov" ,python-pytest-cov) ("python-pytest-flake8" ,python-pytest-flake8) ("python-setuptools-scm" ,python-setuptools-scm))) (propagated-inputs `(("python-importlib-metadata" ,python-importlib-metadata) ("python-secretstorage" ,python-secretstorage))) (home-page "https://github.com/jaraco/keyring") (synopsis "Store and access your passwords safely") (description "The Python keyring lib provides a easy way to access the system keyring service from python. It can be used in any application that needs safe password storage.") ;; "MIT" and PSF dual license (properties `((python2-variant . ,(delay python2-keyring)))) (license license:x11))) (define-public python2-keyring (let ((keyring (package-with-python2 (strip-python2-variant python-keyring)))) (package (inherit keyring) (name "python2-keyring") (version "8.7") (source (origin (method url-fetch) (uri (pypi-uri "keyring" version)) (sha256 (base32 "0482rmi2x6p78wl2kz8qzyq21xz1sbbfwnv5x7dggar4vkwxhzfx")))) (arguments `(#:python ,python-2)) (native-inputs `(("python2-pytest" ,python2-pytest) ("python2-pytest-runner" ,python2-pytest-runner) ("python2-setuptools-scm" ,python2-setuptools-scm))) (propagated-inputs `(("python2-pycrypto" ,python2-pycrypto)))))) (define-public python-keyrings.alt (package (name "python-keyrings.alt") (version "3.4.0") (source (origin (method url-fetch) (uri (pypi-uri "keyrings.alt" version)) (sha256 (base32 "0gdjdqpq2hf770p6iwi891mil0vbsdhvy88x0v8b2w4y4b28lcli")) (modules '((guix build utils))) (snippet '(begin (delete-file "keyrings/alt/_win_crypto.py") ;; Rely on python-keyring>20: ;; https://github.com/jaraco/keyrings.alt/issues/33 (substitute* '("keyrings/alt/tests/test_Gnome.py" "keyrings/alt/tests/test_Google.py" "keyrings/alt/tests/test_Windows.py" "keyrings/alt/tests/test_file.py" "keyrings/alt/tests/test_pyfs.py") (("keyring.tests.test_backend") "keyring.testing.backend") (("keyring.tests.util") "keyring.testing.util")) #t)))) (build-system python-build-system) (native-inputs `(("python-keyring" ,python-keyring) ("python-pytest" ,python-pytest) ("python-setuptools-scm" ,python-setuptools-scm))) (home-page "https://github.com/jaraco/keyrings.alt") (synopsis "Alternate keyring implementations") (description "Keyrings in this package may have security risks or other implications. These backends were extracted from the main keyring project to make them available for those who wish to employ them, but are discouraged for general production use. Include this module and use its backends at your own risk.") (license license:expat))) (define-public python-certifi (package (name "python-certifi") (version "2020.11.8") (source (origin (method url-fetch) (uri (pypi-uri "certifi" version)) (sha256 (base32 "1x4w18gm71dbwys5g2mbcnbw27b3dvphj5d56icg5ys45h4yypgh")))) (build-system python-build-system) (arguments '(#:tests? #f)) ;no tests (home-page "https://certifi.io/") (synopsis "Python CA certificate bundle") (description "Certifi is a Python library that contains a CA certificate bundle, which is used by the Requests library to verify HTTPS requests.") (license license:asl2.0))) (define-public python2-certifi (package-with-python2 python-certifi)) (define-public python-cryptography-vectors (package (name "python-cryptography-vectors") (version "3.1.1") (source (origin (method url-fetch) (uri (pypi-uri "cryptography_vectors" version)) (sha256 (base32 "1xp2j79c1y8qj4b97ygx451gzp8l4cp830hnvg3zw8j134bcaaam")))) (build-system python-build-system) (home-page "https://github.com/pyca/cryptography") (synopsis "Test vectors for the cryptography package") (description "This package contains test vectors for the cryptography package.") ;; Distributed under either BSD-3 or ASL2.0 (license (list license:bsd-3 license:asl2.0)))) (define-public python2-cryptography-vectors (package-with-python2 python-cryptography-vectors)) (define-public python-cryptography (package (name "python-cryptography") (version "3.1.1") (source (origin (method url-fetch) (uri (pypi-uri "cryptography" version)) (sha256 (base32 "0z81q4d1nangw3r0v5f41mfl4d9r04qnbayl5ll5v5jpcfhwd7wx")))) (build-system python-build-system) (inputs `(("openssl" ,openssl))) (propagated-inputs `(("python-asn1crypto" ,python-asn1crypto) ("python-cffi" ,python-cffi) ("python-six" ,python-six) ("python-idna" ,python-idna) ("python-iso8601" ,python-iso8601))) (native-inputs `(("python-cryptography-vectors" ,python-cryptography-vectors) ("python-hypothesis" ,python-hypothesis) ("python-pretend" ,python-pretend) ("python-pytz" ,python-pytz) ("python-pytest" ,python-pytest))) (home-page "https://github.com/pyca/cryptography") (synopsis "Cryptographic recipes and primitives for Python") (description "cryptography is a package which provides cryptographic recipes and primitives to Python developers. It aims to be the “cryptographic standard library” for Python. The package includes both high level recipes, and low level interfaces to common cryptographic algorithms such as symmetric ciphers, message digests and key derivation functions.") ;; Distributed under either BSD-3 or ASL2.0 (license (list license:bsd-3 license:asl2.0)) (properties `((python2-variant . ,(delay python2-cryptography)))))) (define-public python2-cryptography (let ((crypto (package-with-python2 (strip-python2-variant python-cryptography)))) (package (inherit crypto) (propagated-inputs `(("python2-ipaddress" ,python2-ipaddress) ("python2-backport-ssl-match-hostname" ,python2-backport-ssl-match-hostname) ("python2-enum34" ,python2-enum34) ,@(package-propagated-inputs crypto)))))) (define-public python-pyopenssl (package (name "python-pyopenssl") (version "19.1.0") (source (origin (method url-fetch) (uri (pypi-uri "pyOpenSSL" version)) (sha256 (base32 "01wmsq6w0frzbr3zps4ga9kmqjidp2h317jwpq1g9ah24r5lj94s")))) (build-system python-build-system) (arguments '(#:phases (modify-phases %standard-phases (delete 'check) (add-after 'install 'check (lambda* (#:key inputs outputs #:allow-other-keys) (add-installed-pythonpath inputs outputs) ;; PyOpenSSL runs tests against a certificate with a fixed ;; expiry time. To ensure successful builds in the future, ;; set the time to roughly the release date. (invoke "faketime" "2019-01-01" "py.test" "-v" "-k" (string-append ;; This test tries to look up certificates from ;; the compiled-in default path in OpenSSL, which ;; does not exist in the build environment. "not test_fallback_default_verify_paths " ;; This test attempts to make a connection to ;; an external web service. "and not test_set_default_verify_paths"))))))) (propagated-inputs `(("python-cryptography" ,python-cryptography) ("python-six" ,python-six))) (inputs `(("openssl" ,openssl))) (native-inputs `(("libfaketime" ,libfaketime) ("python-flaky" ,python-flaky) ("python-pretend" ,python-pretend) ("python-pytest" ,python-pytest))) (home-page "https://github.com/pyca/pyopenssl") (synopsis "Python wrapper module around the OpenSSL library") (description "PyOpenSSL is a high-level wrapper around a subset of the OpenSSL library.") (license license:asl2.0))) (define-public python2-pyopenssl (package-with-python2 python-pyopenssl)) (define-public python-ed25519 (package (name "python-ed25519") (version "1.4") (source (origin (method url-fetch) (uri (pypi-uri "ed25519" version)) (sha256 (base32 "0ahx1nkxa0xis3cw0h5c4fpgv8mq4znkq7kajly33lc3317bk499")))) (build-system python-build-system) (home-page "https://github.com/warner/python-ed25519") (synopsis "Ed25519 public-key signatures") (description "Ed25519 public-key signatures") (license license:expat))) (define-public python2-ed25519 (package-with-python2 python-ed25519)) (define-public python-axolotl-curve25519 (package (name "python-axolotl-curve25519") (version "0.4.1.post2") (source (origin (method url-fetch) (uri (pypi-uri "python-axolotl-curve25519" version)) (sha256 (base32 "18v3rfyv7xi26fb97nw1xc0l6x8wi0i4xj8dlq4gblpbjxiac187")))) (build-system python-build-system) (home-page "https://github.com/tgalal/python-axolotl-curve25519") (synopsis "Python wrapper for curve25519 library") (description "This is a python wrapper for the curve25519 library with ed25519 signatures. The C code was pulled from libaxolotl-android. At the moment this wrapper is meant for use by python-axolotl.") (license (list license:gpl3 ; Most files license:bsd-3)))) ; curve/curve25519-donna.c (define-public python2-axolotl-curve25519 (package-with-python2 python-axolotl-curve25519)) (define-public python-axolotl (package (name "python-axolotl") (version "0.2.3") (source (origin (method url-fetch) (uri (pypi-uri "python-axolotl" version)) (sha256 (base32 "1bwdp24fmriffwx91aigs9k162albb51iskp23nc939z893q23py")))) (build-system python-build-system) (arguments `(#:phases (modify-phases %standard-phases ;; Don't install tests (add-before 'install 'remove-tests (lambda _ (for-each delete-file-recursively '("axolotl/tests" "build/lib/axolotl/tests")) #t))))) (propagated-inputs `(("python-axolotl-curve25519" ,python-axolotl-curve25519) ("python-cryptography" ,python-cryptography) ("python-protobuf" ,python-protobuf))) (home-page "https://github.com/tgalal/python-axolotl") (synopsis "Python port of libaxolotl-android") (description "This is a python port of libaxolotl-android. This is a ratcheting forward secrecy protocol that works in synchronous and asynchronous messaging environments.") (license license:gpl3))) (define-public python2-axolotl (package-with-python2 python-axolotl)) ;; SlowAES isn't compatible with Python 3. (define-public python2-slowaes (package (name "python2-slowaes") (version "0.1a1") (source (origin (method url-fetch) (uri (pypi-uri "slowaes" version)) (sha256 (base32 "02dzajm83a7lqgxf6r3hgj64wfmcxz8gs4nvgxpvj5n19kjqlrc3")))) (build-system python-build-system) (arguments `(#:python ,python-2)) (home-page "http://code.google.com/p/slowaes/") (synopsis "Implementation of AES in Python") (description "This package contains an implementation of AES in Python. This implementation is slow (hence the project name) but still useful when faster ones are not available.") (license license:asl2.0))) (define-public python-pyaes (package (name "python-pyaes") (version "1.6.1") (source (origin (method url-fetch) (uri (pypi-uri "pyaes" version)) (sha256 (base32 "13vdaff15k0jyfcss4b4xvfgm8xyv0nrbyw5n1qc7lrqbi0b3h82")))) (build-system python-build-system) (home-page "https://github.com/ricmoo/pyaes") (synopsis "Implementation of AES in Python") (description "This package contains a pure-Python implementation of the AES block cipher algorithm and the common modes of operation (CBC, CFB, CTR, ECB and OFB).") (license license:expat))) (define-public python2-pyaes (package-with-python2 python-pyaes)) (define-public python-asn1crypto (package (name "python-asn1crypto") (version "1.4.0") (source (origin (method git-fetch) (uri (git-reference (url "https://github.com/wbond/asn1crypto") (commit version))) (file-name (git-file-name name version)) (sha256 (base32 "19abibn6jw20mzi1ln4n9jjvpdka8ygm4m439hplyrdfqbvgm01r")))) (build-system python-build-system) (arguments '(#:phases (modify-phases %standard-phases (replace 'check (lambda _ (invoke "python" "run.py" "tests")))))) (home-page "https://github.com/wbond/asn1crypto") (synopsis "ASN.1 parser and serializer in Python") (description "asn1crypto is an ASN.1 parser and serializer with definitions for private keys, public keys, certificates, CRL, OCSP, CMS, PKCS#3, PKCS#7, PKCS#8, PKCS#12, PKCS#5, X.509 and TSP.") (license license:expat))) (define-public python2-asn1crypto (package-with-python2 python-asn1crypto)) (define-public python-pynacl (package (name "python-pynacl") (version "1.4.0") (source (origin (method url-fetch) (uri (pypi-uri "PyNaCl" version)) (modules '((guix build utils))) (snippet '(begin ;; Remove spurious dependency on python-wheel, can be removed ;; for 1.5. (substitute* "setup.py" (("\"wheel\"") "")) ;; Remove bundled libsodium. (delete-file-recursively "src/libsodium") #t)) (sha256 (base32 "01b56hxrbif3hx8l6rwz5kljrgvlbj7shmmd2rjh0hn7974a5sal")))) (build-system python-build-system) (arguments `(#:modules (,@%python-build-system-modules (guix build utils) (ice-9 ftw) (srfi srfi-26)) #:phases (modify-phases (@ (guix build python-build-system) %standard-phases) (add-before 'build 'use-system-sodium (lambda _ (setenv "SODIUM_INSTALL" "system") #t)) (replace 'check (lambda _ (let ((build-directory (car (scandir "build" (cut string-prefix? "lib" <>))))) (setenv "PYTHONPATH" (string-append "./build/" build-directory ":" (getenv "PYTHONPATH"))) (invoke "pytest" "-vv"))))))) (native-inputs `(("python-hypothesis" ,python-hypothesis) ("python-pytest" ,python-pytest))) (propagated-inputs `(("python-cffi" ,python-cffi) ("python-six" ,python-six) ("libsodium" ,libsodium))) (home-page "https://github.com/pyca/pynacl/") (synopsis "Python bindings to libsodium") (description "PyNaCl is a Python binding to libsodium, which is a fork of the Networking and Cryptography library. These libraries have a stated goal of improving usability, security and speed.") (license license:asl2.0))) (define-public python2-pynacl (package-with-python2 python-pynacl)) (define-public python2-pgpdump (package (name "python2-pgpdump") (version "1.5") (source (origin (method url-fetch) (uri (pypi-uri "pgpdump" version)) (sha256 (base32 "0s4nh8h7qsdj2yf29bspjs1zvxd4lcd11r6g11dp7fppgf2h0iqw")))) (build-system python-build-system) ;; Currently fails to build with Python 3. (arguments `(#:python ,python-2)) (home-page "https://github.com/toofishes/python-pgpdump") (synopsis "Python library for parsing PGP packets") (description "Python-pgpdump is an OpenPGP packet parser based on @uref{http://www.mew.org/~kazu/proj/pgpdump/, pgpdump}. It notably supports: @itemize @item signature packets; @item public key packets; @item secret key packets; @item trust, user ID, and user attribute packets; @item ASCII-armor decoding and CRC check. @end itemize\n") (license license:bsd-3))) (define-public python2-roca-detect (package (name "python2-roca-detect") (version "1.0.8") (source (origin (method url-fetch) (uri (pypi-uri "roca-detect" version)) (sha256 (base32 "1di4akyw2lf5r8zfwvyhkilz8jv8g4b66rgaqwfabmjwma6gnw27")))) (build-system python-build-system) (native-inputs ;; TODO: apk_parse_ph4, pyjks `(("python2-dateutil" ,python2-dateutil) ("python2-six" ,python2-six) ("python2-cryptography" ,python2-cryptography) ("python2-future" ,python2-future) ("python2-coloredlogs" ,python2-coloredlogs) ("python2-pgpdump" ,python2-pgpdump))) (arguments `(;; Basic testing routine is quite simple and works with Py3 ;; but the rest of the code that processes the different ;; key formats and extracts the modulus for inspection is ;; not yet fully py3 ready. #:python ,python-2)) (home-page "https://github.com/crocs-muni/roca") (synopsis "ROCA detection tool") (description "This tool is related to the paper entitled @i{Return of the Coppersmith’s Attack: Practical Factorization of Widely Used RSA Moduli}. It enables you to test public RSA keys for a presence of the described vulnerability. Currently the tool supports the following key formats: X.509 Certificate (DER encoded, PEM encoded), RSA PEM (encoded private key, public key), SSH public key, ASC-encoded OpenPGP key, APK Android application, LDIFF file, and more.") (license license:gpl3))) (define-public python-blurhash (package (name "python-blurhash") (version "1.1.4") (source (origin ;; Tests not included in pypi release and releases not tagged in git repo. (method git-fetch) (uri (git-reference (url "https://github.com/halcy/blurhash-python") (commit "22e081ef1c24da1bb5c5eaa2c1d6649724deaef8"))) (file-name (git-file-name name version)) (sha256 (base32 "1qq6mhydlp7q3na4kmaq3871h43wh3pyfyxr4b79bia73wjdylxf")))) (build-system python-build-system) (arguments '(#:phases (modify-phases %standard-phases (replace 'check (lambda _ (delete-file "setup.cfg") (invoke "pytest")))))) (native-inputs `(("python-numpy" ,python-numpy) ("python-pillow" ,python-pillow) ("python-pytest" ,python-pytest))) (home-page "https://github.com/halcy/blurhash-python") (synopsis "Pure-Python implementation of the blurhash algorithm") (description "Pure-Python implementation of the blurhash algorithm.") (license license:expat))) (define-public python-ecpy (package (name "python-ecpy") (version "0.10.0") (source (origin (method url-fetch) (uri (pypi-uri "ECPy" version)) (sha256 (base32 "1gc3i5s93zq6x1nkaxkq1dvmsc12vmrw0hns9f5s1hcb78ni52c8")))) (build-system python-build-system) (propagated-inputs `(("python-future" ,python-future))) (home-page "https://github.com/ubinity/ECPy") (synopsis "Pure Python Elliptic Curve Library") (description "This package provides a Elliptic Curve Library in pure Python.") (license license:asl2.0))) (define-public python2-ecpy (package-with-python2 python-ecpy)) (define-public python-josepy (package (name "python-josepy") (version "1.1.0") (source (origin (method url-fetch) (uri (pypi-uri "josepy" version)) (sha256 (base32 "11khz8malzrv375b27jjkv66z6z6khdx1v5mkkr4vq16gp3n4p7v")))) (build-system python-build-system) (arguments ;; The tests require flake8 >= 3.5, which is not yet packaged. '(#:tests? #f)) (propagated-inputs `(("python-cryptography" ,python-cryptography) ("python-pyopenssl" ,python-pyopenssl) ("python-six" ,python-six))) ;; TODO Enable when we have flake8 >= 3.5. ; (native-inputs ; `(("python-coverage" ,python-coverage) ; ("python-flake8" ,python-flake8) ; ("python-isort" ,python-isort) ; ("python-mock" ,python-mock) ; ("python-pytest" ,python-pytest) ; ("python-pytest-cov" ,python-pytest-cov) ; ("python-pytest-cache" ,python-pytest-cache) ; ("python-pytest-flake8" ,python-pytest-flake8))) (home-page "https://github.com/certbot/josepy") (synopsis "JOSE protocol implementation in Python") (description "This package provides a Python implementation of the JOSE protocol (Javascript Object Signing and Encryption).") (license license:asl2.0))) (define-public python2-josepy (package-with-python2 python-josepy)) (define-public python-pycryptodome (package (name "python-pycryptodome") (version "3.9.9") (source (origin (method url-fetch) (uri (pypi-uri "pycryptodome" version)) (sha256 (base32 "1i4m74f88qj9ci8rpyzrbk2slmsdj5ipmwdkq6qk24byalm203li")))) (build-system python-build-system) (home-page "https://www.pycryptodome.org") (synopsis "Low-level cryptographic Python library") (description "PyCryptodome is a self-contained Python package of low-level cryptographic primitives. It's not a wrapper to a separate C library like OpenSSL. To the largest possible extent, algorithms are implemented in pure Python. Only the pieces that are extremely critical to performance (e.g., block ciphers) are implemented as C extensions. You are expected to have a solid understanding of cryptography and security engineering to successfully use these primitives. You must also be able to recognize that some are obsolete (e.g., TDES) or even insecure (RC4). It provides many enhancements over the last release of PyCrypto (2.6.1): @itemize @item Authenticated encryption modes (GCM, CCM, EAX, SIV, OCB) @item Accelerated AES on Intel platforms via AES-NI @item First-class support for PyPy @item Elliptic curves cryptography (NIST P-256 curve only) @item Better and more compact API (nonce and iv attributes for ciphers, automatic generation of random nonces and IVs, simplified CTR cipher mode, and more) @item SHA-3 (including SHAKE XOFs) and BLAKE2 hash algorithms @item Salsa20 and ChaCha20 stream ciphers @item scrypt and HKDF @item Deterministic (EC)DSA @item Password-protected PKCS#8 key containers @item Shamir’s Secret Sharing scheme @item Random numbers get sourced directly from the OS (and not from a CSPRNG in userspace) @item Cleaner RSA and DSA key generation (largely based on FIPS 186-4) @item Major clean-ups and simplification of the code base @end itemize This package provides drop-in compatibility with PyCrypto. It is one of two PyCryptodome variants, the other being python-pycryptodomex.") (license (list license:bsd-2 license:public-domain)))) ; code inherited from PyCrypto (define-public python2-pycryptodome (package-with-python2 python-pycryptodome)) (define-public python-pycryptodomex (package (inherit python-pycryptodome) (name "python-pycryptodomex") (version (package-version python-pycryptodome)) (source (origin (method url-fetch) (uri (pypi-uri "pycryptodomex" version)) (sha256 (base32 "0lbx4qk3xmwqiidhmkj8qa7bh2lf8bwzg0xjpsh2w5zqjrc7qnvv")))) (description "PyCryptodome is a self-contained Python package of low-level cryptographic primitives. It's not a wrapper to a separate C library like OpenSSL. To the largest possible extent, algorithms are implemented in pure Python. Only the pieces that are extremely critical to performance (e.g., block ciphers) are implemented as C extensions. You are expected to have a solid understanding of cryptography and security engineering to successfully use these primitives. You must also be able to recognize that some are obsolete (e.g., TDES) or even insecure (RC4). It provides many enhancements over the last release of PyCrypto (2.6.1): @itemize @item Authenticated encryption modes (GCM, CCM, EAX, SIV, OCB) @item Accelerated AES on Intel platforms via AES-NI @item First-class support for PyPy @item Elliptic curves cryptography (NIST P-256 curve only) @item Better and more compact API (nonce and iv attributes for ciphers, automatic generation of random nonces and IVs, simplified CTR cipher mode, and more) @item SHA-3 (including SHAKE XOFs) and BLAKE2 hash algorithms @item Salsa20 and ChaCha20 stream ciphers @item scrypt and HKDF @item Deterministic (EC)DSA @item Password-protected PKCS#8 key containers @item Shamir’s Secret Sharing scheme @item Random numbers get sourced directly from the OS (and not from a CSPRNG in userspace) @item Cleaner RSA and DSA key generation (largely based on FIPS 186-4) @item Major clean-ups and simplification of the code base @end itemize PyCryptodomex is the stand-alone version of PyCryptodome that no longer provides drop-in compatibility with PyCrypto."))) (define-public python-m2crypto (package (name "python-m2crypto") (version "0.35.2") (source (origin (method url-fetch) (uri (pypi-uri "M2Crypto" version)) (sha256 (base32 "09yirf3w77w6f49q6nxhrjm9c3a4y9s30s1k09chqrw8zdgx8sjc")))) (build-system python-build-system) (inputs `(("openssl" ,openssl))) (native-inputs `(("swig" ,swig))) (home-page "https://gitlab.com/m2crypto/m2crypto") (synopsis "Python crypto and TLS toolkit") (description "@code{M2Crypto} is a complete Python wrapper for OpenSSL featuring RSA, DSA, DH, EC, HMACs, message digests, symmetric ciphers (including AES); TLS functionality to implement clients and servers; HTTPS extensions to Python's httplib, urllib, and xmlrpclib; unforgeable HMAC'ing AuthCookies for web session management; FTP/TLS client and server; S/MIME; M2Crypto can also be used to provide TLS for Twisted. Smartcards supported through the Engine interface.") (properties `((python2-variant . ,(delay python2-m2crypto)))) (license license:expat))) (define-public python2-m2crypto (let ((m2crypto (package-with-python2 (strip-python2-variant python-m2crypto)))) (package (inherit m2crypto) (propagated-inputs `(("python2-typing" ,python2-typing)))))) (define-public python-pykeepass (package (name "python-pykeepass") (version "3.2.1") (source (origin (method git-fetch) ;; Source tarball on PyPI doesn't include tests. (uri (git-reference (url "https://github.com/libkeepass/pykeepass") (commit version))) (file-name (git-file-name name version)) (sha256 (base32 "1symxf4ahylynihnp9z4z3lh2vy65ipvg8s4hjrnn936hcaaxghk")))) (build-system python-build-system) (arguments `(#:phases (modify-phases %standard-phases (add-after 'unpack 'make-kdbx-writable ;; Tests have to write to the .kdbx files in the test directory. (lambda _ (with-directory-excursion "tests" (for-each make-file-writable (find-files ".")) #t))) (add-before 'build 'patch-requirements (lambda _ ;; Update requirements from dependency==version ;; to dependency>=version. (substitute* "setup.py" (("==") ">=")) #t))))) (propagated-inputs `(("python-argon2-cffi" ,python-argon2-cffi) ("python-construct" ,python-construct) ("python-dateutil" ,python-dateutil) ("python-future" ,python-future) ("python-lxml" ,python-lxml) ("python-pycryptodomex" ,python-pycryptodomex))) (home-page "https://github.com/libkeepass/pykeepass") (synopsis "Python library to interact with keepass databases") (description "This library allows you to write entries to a KeePass database. It supports KDBX3 and KDBX4.") ;; There are no copyright headers in the source code. The LICENSE file ;; indicates GPL3. (license license:gpl3+))) (define-public python-pylibscrypt (package (name "python-pylibscrypt") (version "1.7.1") (source (origin (method url-fetch) (uri (pypi-uri "pylibscrypt" version)) (sha256 (base32 "1b3rgzl6dbzs08vhv41b6y4n5189wv7lr27acxn104hs45745abs")))) (build-system python-build-system) (arguments `(#:phases (modify-phases %standard-phases (add-before 'build 'hard-code-path-to-libscrypt (lambda* (#:key inputs #:allow-other-keys) (let ((libscrypt (assoc-ref inputs "libscrypt"))) (substitute* "pylibscrypt/pylibscrypt.py" (("find_library\\('scrypt'\\)") (string-append "'" libscrypt "/lib/libscrypt.so'"))) #t)))) ;; The library can use various scrypt implementations and tests all of ;; them. Since we only provide a single implementation, most tests ;; fail. Simply skip them. #:tests? #f)) ;; FIXME: Using "libscrypt" is the second best choice. The best one ;; requires "hashlib.scrypt", provided by Python 3.6+ built with OpenSSL ;; 1.1+. Use that as soon as Guix provides it. (inputs `(("libscrypt" ,libscrypt))) (home-page "https://github.com/jvarho/pylibscrypt") (synopsis "Scrypt for Python") (description "There are a lot of different scrypt modules for Python, but none of them have everything that I'd like, so here's one more. It uses @code{libscrypt}.") (license license:isc))) (define-public python-libnacl (package (name "python-libnacl") (version "1.7.2") (source (origin (method url-fetch) (uri (pypi-uri "libnacl" version)) (sha256 (base32 "0srx7i264v4dq9and8y6gpzzhrg8jpxs5iy9ggw4plimfj0rjfdm")))) (build-system python-build-system) (arguments `(#:phases (modify-phases %standard-phases (add-after 'unpack 'locate-libsodium (lambda* (#:key inputs #:allow-other-keys) (substitute* "libnacl/__init__.py" (("/usr/local/lib/libsodium.so") (string-append (assoc-ref inputs "libsodium") "/lib/libsodium.so"))) #t))))) (native-inputs `(("python-pyhamcrest" ,python-pyhamcrest))) (inputs `(("libsodium" ,libsodium))) (home-page "https://libnacl.readthedocs.org/") (synopsis "Python bindings for libsodium based on ctypes") (description "@code{libnacl} is used to gain direct access to the functions exposed by @code{NaCl} library via @code{libsodium}. It has been constructed to maintain extensive documentation on how to use @code{NaCl} as well as being completely portable.") (license license:asl2.0))) (define-public python-pyotp (package (name "python-pyotp") (version "2.4.1") (source (origin (method url-fetch) (uri (pypi-uri "pyotp" version)) (sha256 (base32 "0jsqfmx9i7j8z81r4zazv76xzy1fcq8v9s2r4kvx7ajfndq3z2h3")))) (build-system python-build-system) (home-page "https://github.com/pyauth/pyotp") (synopsis "Python One Time Password Library") (description "PyOTP is a Python library for generating and verifying one-time passwords. It can be used to implement two-factor (2FA) or multi-factor (MFA) authentication methods in web applications and in other systems that require users to log in.") (license license:expat))) (define-public python-scrypt (package (name "python-scrypt") (version "0.8.7") (source (origin (method url-fetch) (uri (pypi-uri "scrypt" version)) (sha256 (base32 "0hjk71k3mgnl8siikm9lii9im8kv0rb7inkjzx78rnancra48xxr")))) (build-system python-build-system) (inputs `(("openssl" ,openssl))) (home-page "https://bitbucket.org/mhallin/py-scrypt") (synopsis "Bindings for the scrypt key derivation function library") (description "This is a set of Python bindings for the scrypt key derivation function.") (license license:bsd-2))) (define-public python-service-identity (package (name "python-service-identity") (version "18.1.0") (source (origin (method url-fetch) (uri (pypi-uri "service_identity" version)) (sha256 (base32 "0b9f5qiqjy8ralzgwjgkhx82h6h8sa7532psmb8mkd65md5aan08")))) (build-system python-build-system) (propagated-inputs `(("python-attrs" ,python-attrs) ("python-pyasn1" ,python-pyasn1) ("python-pyasn1-modules" ,python-pyasn1-modules) ("python-pyopenssl" ,python-pyopenssl))) (home-page "https://service-identity.readthedocs.io/") (synopsis "Service identity verification for PyOpenSSL") (description "@code{service_identity} aspires to give you all the tools you need for verifying whether a certificate is valid for the intended purposes. In the simplest case, this means host name verification. However, service_identity implements RFC 6125 fully and plans to add other relevant RFCs too.") (license license:expat))) (define-public python2-service-identity (package-with-python2 python-service-identity)) (define-public python-hkdf (package (name "python-hkdf") (version "0.0.3") (source (origin (method url-fetch) (uri (pypi-uri "hkdf" version)) (sha256 (base32 "1jhxk5vhxmxxjp3zj526ry521v9inzzl8jqaaf0ma65w6k332ak2")))) (build-system python-build-system) (native-inputs `(("python-nose" ,python-nose))) (home-page "https://github.com/casebeer/python-hkdf") (synopsis "HMAC-based Extract-and-Expand Key Derivation Function (HKDF)") (description "This package provides a Python implementation of the HMAC Key Derivation function (HKDF) defined in RFC 5869.") (license license:bsd-2))) (define-public python-spake2 (package (name "python-spake2") (version "0.8") (source (origin (method url-fetch) (uri (pypi-uri "spake2" version)) (sha256 (base32 "1x16r7lrbklvfzbacb66qv9iiih6liq1y612dqh2chgf555n2yn1")))) (build-system python-build-system) (propagated-inputs `(("python-hkdf" ,python-hkdf))) (home-page "https://github.com/warner/python-spake2") (synopsis "SPAKE2 password-authenticated key exchange in Python") (description "This package provides a Python implementation of the SPAKE2 Password-Authenticated Key Exchange algorithm.") (license license:expat))) (define-public python-txtorcon (package (name "python-txtorcon") (version "19.0.0") (source (origin (method url-fetch) (uri (pypi-uri "txtorcon" version)) (sha256 (base32 "0fxzhsc62bhmr730vj9pzallmw56gz6iykvl28a5agrycm0bfc9p")))) (build-system python-build-system) (arguments ;; The tests fail immediately due to a missing file. Reported upstream: ;; `(#:tests? #f)) (propagated-inputs `(("python-automat" ,python-automat) ("python-idna" ,python-idna) ("python-incremental" ,python-incremental) ("python-service-identity" ,python-service-identity) ("python-twisted" ,python-twisted) ("python-zope-interface" ,python-zope-interface))) (home-page "https://github.com/meejah/txtorcon") (synopsis "Twisted-based Tor controller client") (description "This package provides a Twisted-based Tor controller client, with state-tracking and configuration abstractions.") (license license:expat))) (define-public python-keyutils (package (name "python-keyutils") (version "0.6") (source (origin (method url-fetch) (uri (pypi-uri "keyutils" version)) (sha256 (base32 "0lipygpzhwzzsq2k5imb1jgkmj8y4khxdwhzadjs3bd56g6bmkx9")))) (build-system python-build-system) (native-inputs `(("python-pytest" ,python-pytest) ("python-pytest-runner" ,python-pytest-runner))) (inputs `(("keyutils" ,keyutils))) (arguments '(#:tests? #f)) (home-page "https://github.com/sassoftware/python-keyutils") (synopsis "Python bindings for keyutils") (description "This is a set of python bindings for keyutils, a key management suite that leverages the infrastructure provided by the Linux kernel for safely storing and retrieving sensitive information in your programs.") (license license:asl2.0))) (define-public python-mcuboot-imgtool (package (name "python-mcuboot-imgtool") (version "1.4.0") (source (origin (method git-fetch) (uri (git-reference (url "https://github.com/JuulLabs-OSS/mcuboot") (commit (string-append "v" version)))) (file-name (git-file-name name version)) (sha256 (base32 "1m1csyvzq4jx81zg635ssy1n7sc0z539z0myh872ll3nwqx7wa0q")))) (build-system python-build-system) (arguments `(#:phases (modify-phases %standard-phases (add-after 'unpack 'fix-broken-test (lambda _ (substitute* "scripts/imgtool/keys/ed25519_test.py" (("raw_sign") "sign_digest")) #t)) (add-before 'build 'change-directory (lambda _ (chdir "scripts") #t))))) (propagated-inputs `(("python-click" ,python-click) ("python-intelhex" ,python-intelhex) ("python-cryptography" ,python-cryptography))) (home-page "https://mcuboot.com") (synopsis "Tool to securely sign firmware images for booting by MCUboot") (description "MCUboot is a secure bootloader for 32-bit MCUs. This package provides a tool to securely sign firmware images for booting by MCUboot.") (license license:expat))) (define-public python-ntlm-auth (package (name "python-ntlm-auth") (version "1.4.0") (source (origin (method url-fetch) (uri (pypi-uri "ntlm-auth" version)) (sha256 (base32 "16mavidki4ma5ip8srqalr19gz4f5yn3cnmmgps1fmgfr24j63rm")))) (build-system python-build-system) (propagated-inputs `(("python-cryptography" ,python-cryptography))) (home-page "https://github.com/jborean93/ntlm-auth") (synopsis "Calculates NTLM Authentication codes") (description "This library handles the low-level details of NTLM authentication for use in authenticating with a service that uses NTLM. It will create and parse the 3 different message types in the order required and produce a base64 encoded value that can be attached to the HTTP header. The goal of this library is to offer full NTLM support including signing and sealing of messages as well as supporting MIC for message integrity and the ability to customise and set limits on the messages sent. Please see Features and Backlog for a list of what is and is not currently supported.") (license license:expat))) (define-public python-secretstorage (package (name "python-secretstorage") (version "3.1.2") (source (origin (method url-fetch) (uri (pypi-uri "SecretStorage" version)) (sha256 (base32 "1xmzr0j3066s220bss4nkgqbiwb5k4kkp2rkpqlqwjb5kfc8mnhm")))) (build-system python-build-system) (arguments '(#:tests? #f)) ; Tests require a running dbus service. (propagated-inputs `(("python-cryptography" ,python-cryptography) ("python-jeepney" ,python-jeepney))) (home-page "https://github.com/mitya57/secretstorage") (synopsis "Python bindings to FreeDesktop.org Secret Service API") (description "@code{python-secretstorage} provides a way for securely storing passwords and other secrets. It uses D-Bus Secret Service API that is supported by GNOME Keyring (since version 2.30) and KSecretsService. SecretStorage supports most of the functions provided by Secret Service, including creating and deleting items and collections, editing items, locking and unlocking collections (asynchronous unlocking is also supported).") (license license:bsd-3))) (define-public python-trustme (package (name "python-trustme") (version "0.6.0") (source (origin (method url-fetch) (uri (pypi-uri "trustme" version)) (sha256 (base32 "0v3vr5z6apnfmklf07m45kv5kaqvm6hxrkaqywch57bjd2siiywx")))) (build-system python-build-system) (arguments `(#:phases (modify-phases %standard-phases (replace 'check (lambda* (#:key inputs outputs #:allow-other-keys) (add-installed-pythonpath inputs outputs) (invoke "pytest" "-vv")))))) (native-inputs `(("python-more-itertools" ,python-more-itertools) ("python-pyopenssl" ,python-pyopenssl) ("python-pytest" ,python-pytest) ("python-pytest-cov" ,python-pytest-cov) ("python-service-identity" ,python-service-identity) ("python-zipp" ,python-zipp))) (propagated-inputs `(("python-cryptography" ,python-cryptography))) (home-page "https://github.com/python-trio/trustme") (synopsis "Fake a certificate authority for tests") (description "@code{trustme} is a tiny Python package that does one thing: it gives you a fake certificate authority (CA) that you can use to generate fake TLS certs to use in your tests.") ;; Either license applies. (license (list license:expat license:asl2.0)))) (define-public python-certipy (package (name "python-certipy") (version "0.1.3") (source (origin (method url-fetch) (uri (pypi-uri "certipy" version)) (sha256 (base32 "0n980gqpzh0fm58h3i4mi2i10wgj606lscm1r5sk60vbf6vh8mv9")))) (build-system python-build-system) (propagated-inputs `(("python-pyopenssl" ,python-pyopenssl))) (native-inputs `(("python-pytest" ,python-pytest))) (home-page "https://github.com/LLNL/certipy") (synopsis "Utility to create and sign CAs and certificates") (description "Certipy was made to simplify the certificate creation process. To that end, certipy exposes methods for creating and managing certificate authorities, certificates, signing and building trust bundles.") (license license:bsd-3))) (define-public python-jeepney (package (name "python-jeepney") (version "0.4.3") (source (origin (method url-fetch) (uri (pypi-uri "jeepney" version)) (sha256 (base32 "0vp3p1lqhqk2kd3254q5sxr50znmm2hmysc8a7g0fr1brihvhy9l")))) (build-system python-build-system) (native-inputs `(("python-testpath" ,python-testpath) ("python-tornado" ,python-tornado) ("python-pytest" ,python-pytest))) (home-page "https://gitlab.com/takluyver/jeepney") (synopsis "Low-level, pure Python DBus protocol wrapper") (description "This is a low-level, pure Python DBus protocol client. It has an I/O-free core, and integration modules for different event loops.") (license license:expat))) (define-public python-argon2-cffi (package (name "python-argon2-cffi") (version "20.1.0") (source (origin (method url-fetch) (uri (pypi-uri "argon2-cffi" version)) (sha256 (base32 "0zgr4mnnm0p4i99023safb0qb8cgvl202nly1rvylk2b7qnrn0nq")) (modules '((guix build utils))) (snippet '(begin (delete-file-recursively "extras") #t)))) (build-system python-build-system) (arguments '(#:phases (modify-phases %standard-phases (replace 'build (lambda _ (setenv "ARGON2_CFFI_USE_SYSTEM" "1") (invoke "python" "setup.py" "build"))) (replace 'check (lambda* (#:key inputs outputs #:allow-other-keys) (add-installed-pythonpath inputs outputs) (invoke "pytest") (invoke "python" "-m" "argon2" "--help") ;; see tox.ini (invoke "python" "-m" "argon2" "-n" "1" "-t" "1" "-m" "8" "-p" "1")))))) (propagated-inputs `(("python-cffi" ,python-cffi) ("python-six" ,python-six))) (inputs `(("argon2" ,argon2))) (native-inputs `(("python-hypothesis" ,python-hypothesis) ("python-pytest" ,python-pytest))) (home-page "https://argon2-cffi.readthedocs.io/") (synopsis "Secure Password Hashes for Python") (description "Argon2 is a secure password hashing algorithm. It is designed to have both a configurable runtime as well as memory consumption. This means that you can decide how long it takes to hash a password and how much memory is required.") (license license:expat))) (define-public python-privy (package (name "python-privy") (version "6.0.0") (source (origin (method git-fetch) (uri (git-reference ;; Releases are untagged (url "https://github.com/ofek/privy") (commit "2838db3df239797c71bddacc48a4c49a83f35747"))) (file-name (git-file-name name version)) (sha256 (base32 "1m32dh5fqc8cy7jyf1z5fs6zvmdkbq5fi98hr609gbl7s0l0y0i9")))) (build-system python-build-system) (arguments '(#:phases (modify-phases %standard-phases (replace 'check (lambda _ (invoke "python" "-m" "pytest")))))) (native-inputs `(("python-pytest" ,python-pytest))) (propagated-inputs `(("python-argon2-cffi" ,python-argon2-cffi) ("python-cryptography" ,python-cryptography))) (home-page "https://www.dropbox.com/developers") (synopsis "Library to password-protect your data") (description "Privy is a small and fast utility for password-protecting secret data such as API keys, cryptocurrency wallets, or seeds for digital signatures.") (license (list license:expat license:asl2.0)))) ; dual licensed (define-public python-pgpy (package (name "python-pgpy") (version "0.5.3") (source (origin (method url-fetch) (uri (pypi-uri "PGPy" version)) (sha256 (base32 "11rrq15gmn6qbahli7czflfcngjl7zyybjlvk732my6axnf2d754")))) (build-system python-build-system) (arguments `(#:phases (modify-phases %standard-phases (replace 'check (lambda* (#:key tests? #:allow-other-keys) (when tests? (invoke "pytest"))))))) (native-inputs `(("python-cryptography" ,python-cryptography) ("python-pyasn1" ,python-pyasn1) ("python-pytest" ,python-pytest) ("python-singledispatch" ,python-singledispatch) ("python-six" ,python-six) ("python-wheel" ,python-wheel))) (home-page "https://github.com/SecurityInnovation/PGPy") (synopsis "Python implementation of OpenPGP") (description "Currently, PGPy can load keys and signatures of all kinds in both ASCII armored and binary formats. It can create and verify RSA, DSA, and ECDSA signatures, at the moment. It can also encrypt and decrypt messages using RSA and ECDH.") (license license:bsd-3))) (define-public python-sop (package (name "python-sop") (version "0.2.0") (source (origin (method url-fetch) (uri (pypi-uri "sop" version)) (sha256 (base32 "0gljyjsdn6hdmwlwwb5g5s0c031p6izamvfxp0d39x60af8k5jyf")))) (build-system python-build-system) (arguments '(#:tests? #f)) ; There are no tests, and unittest throws an error trying ; to find some: ; TypeError: don't know how to make test from: 0.2.0 (home-page "https://gitlab.com/dkg/python-sop") (synopsis "Stateless OpenPGP Command-Line Interface") (description "The Stateless OpenPGP Command-Line Interface (or sop) is a specification that encourages OpenPGP implementors to provide a common, relatively simple command-line API for purposes of object security. This Python module helps implementers build such a CLI from any implementation accessible to the Python interpreter. It does not provide such an implementation itself -- this is just the scaffolding for the command line, which should make it relatively easy to supply a handful of python functions as methods to a class.") (license license:expat))) ; MIT license