diff --git a/Make-unsafe-subinterpreter-support-available-via-cfg.patch b/Make-unsafe-subinterpreter-support-available-via-cfg.patch index 7391612..64fd3d0 100644 --- a/Make-unsafe-subinterpreter-support-available-via-cfg.patch +++ b/Make-unsafe-subinterpreter-support-available-via-cfg.patch @@ -7,8 +7,10 @@ Subject: [PATCH] Make unsafe subinterpreter support available via cfg flag src/impl_/pymodule.rs | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) ---- a/vendor/pyo3-0.25.1/src/impl_/pymodule.rs -+++ b/vendor/pyo3-0.25.1/src/impl_/pymodule.rs +Index: cryptography-45.0.7/vendor/pyo3-0.25.1/src/impl_/pymodule.rs +=================================================================== +--- cryptography-45.0.7.orig/vendor/pyo3-0.25.1/src/impl_/pymodule.rs ++++ cryptography-45.0.7/vendor/pyo3-0.25.1/src/impl_/pymodule.rs @@ -100,7 +100,7 @@ impl ModuleDef { // that static data is not reused across interpreters. // @@ -18,8 +20,10 @@ Subject: [PATCH] Make unsafe subinterpreter support available via cfg flag { // PyInterpreterState_Get is only available on 3.9 and later, but is missing // from python3.dll for Windows stable API on 3.9 ---- a/Cargo.toml -+++ b/Cargo.toml +Index: cryptography-45.0.7/Cargo.toml +=================================================================== +--- cryptography-45.0.7.orig/Cargo.toml ++++ cryptography-45.0.7/Cargo.toml @@ -29,3 +29,6 @@ openssl-sys = "0.9.108" [profile.release] @@ -27,9 +31,11 @@ Subject: [PATCH] Make unsafe subinterpreter support available via cfg flag + +[patch.crates-io] +pyo3 = { path="vendor/pyo3-0.25.1" } ---- a/Cargo.lock -+++ b/Cargo.lock -@@ -269,8 +269,6 @@ dependencies = [ +Index: cryptography-45.0.7/Cargo.lock +=================================================================== +--- cryptography-45.0.7.orig/Cargo.lock ++++ cryptography-45.0.7/Cargo.lock +@@ -276,8 +276,6 @@ dependencies = [ [[package]] name = "pyo3" version = "0.25.1" diff --git a/cryptography-45.0.5.tar.gz b/cryptography-45.0.5.tar.gz deleted file mode 100644 index 9404ff5..0000000 --- a/cryptography-45.0.5.tar.gz +++ /dev/null @@ -1,3 +0,0 @@ -version https://git-lfs.github.com/spec/v1 -oid sha256:72e76caa004ab63accdf26023fccd1d087f6d90ec6048ff33ad0445abf7f605a -size 744903 diff --git a/cryptography-45.0.7.tar.gz b/cryptography-45.0.7.tar.gz new file mode 100644 index 0000000..bd466a4 --- /dev/null +++ b/cryptography-45.0.7.tar.gz @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:4b1654dfc64ea479c242508eb8c724044f1e964a47d1d1cacc5132292d851971 +size 744980 diff --git a/no-pytest_benchmark.patch b/no-pytest_benchmark.patch index 3ba477a..79a4797 100644 --- a/no-pytest_benchmark.patch +++ b/no-pytest_benchmark.patch @@ -1,10 +1,10 @@ -Index: cryptography-45.0.5/pyproject.toml +Index: cryptography-45.0.7/pyproject.toml =================================================================== ---- cryptography-45.0.5.orig/pyproject.toml -+++ cryptography-45.0.5/pyproject.toml +--- cryptography-45.0.7.orig/pyproject.toml ++++ cryptography-45.0.7/pyproject.toml @@ -67,8 +67,6 @@ nox = ["nox >=2024.04.15", "nox[uv] >=20 test = [ - "cryptography_vectors==45.0.5", + "cryptography_vectors==45.0.7", "pytest >=7.4.0", - "pytest-benchmark >=4.0", - "pytest-cov >=2.10.1", @@ -51,10 +51,10 @@ Index: cryptography-45.0.5/pyproject.toml [tool.ruff] line-length = 79 -Index: cryptography-45.0.5/tests/bench/test_aead.py +Index: cryptography-45.0.7/tests/bench/test_aead.py =================================================================== ---- cryptography-45.0.5.orig/tests/bench/test_aead.py -+++ cryptography-45.0.5/tests/bench/test_aead.py +--- cryptography-45.0.7.orig/tests/bench/test_aead.py ++++ cryptography-45.0.7/tests/bench/test_aead.py @@ -26,84 +26,84 @@ def _aead_supported(cls): not _aead_supported(ChaCha20Poly1305), reason="Requires OpenSSL with ChaCha20Poly1305 support", @@ -160,10 +160,10 @@ Index: cryptography-45.0.5/tests/bench/test_aead.py ct = aes.encrypt(b"\x00" * 12, b"hello world plaintext", None) - benchmark(aes.decrypt, b"\x00" * 12, ct, None) + aes.decrypt(b"\x00" * 12, ct, None) -Index: cryptography-45.0.5/tests/bench/test_ec_load.py +Index: cryptography-45.0.7/tests/bench/test_ec_load.py =================================================================== ---- cryptography-45.0.5.orig/tests/bench/test_ec_load.py -+++ cryptography-45.0.5/tests/bench/test_ec_load.py +--- cryptography-45.0.7.orig/tests/bench/test_ec_load.py ++++ cryptography-45.0.7/tests/bench/test_ec_load.py @@ -5,9 +5,9 @@ from ..hazmat.primitives.fixtures_ec import EC_KEY_SECP256R1 @@ -178,10 +178,10 @@ Index: cryptography-45.0.5/tests/bench/test_ec_load.py - benchmark(EC_KEY_SECP256R1.private_key) +def test_load_ec_private_numbers(): + EC_KEY_SECP256R1.private_key() -Index: cryptography-45.0.5/tests/bench/test_hashes.py +Index: cryptography-45.0.7/tests/bench/test_hashes.py =================================================================== ---- cryptography-45.0.5.orig/tests/bench/test_hashes.py -+++ cryptography-45.0.5/tests/bench/test_hashes.py +--- cryptography-45.0.7.orig/tests/bench/test_hashes.py ++++ cryptography-45.0.7/tests/bench/test_hashes.py @@ -5,10 +5,10 @@ from cryptography.hazmat.primitives import hashes @@ -195,10 +195,10 @@ Index: cryptography-45.0.5/tests/bench/test_hashes.py - benchmark(bench) + bench() -Index: cryptography-45.0.5/tests/bench/test_hmac.py +Index: cryptography-45.0.7/tests/bench/test_hmac.py =================================================================== ---- cryptography-45.0.5.orig/tests/bench/test_hmac.py -+++ cryptography-45.0.5/tests/bench/test_hmac.py +--- cryptography-45.0.7.orig/tests/bench/test_hmac.py ++++ cryptography-45.0.7/tests/bench/test_hmac.py @@ -5,10 +5,10 @@ from cryptography.hazmat.primitives import hashes, hmac @@ -212,10 +212,10 @@ Index: cryptography-45.0.5/tests/bench/test_hmac.py - benchmark(bench) + bench() -Index: cryptography-45.0.5/tests/bench/test_x509.py +Index: cryptography-45.0.7/tests/bench/test_x509.py =================================================================== ---- cryptography-45.0.5.orig/tests/bench/test_x509.py -+++ cryptography-45.0.5/tests/bench/test_x509.py +--- cryptography-45.0.7.orig/tests/bench/test_x509.py ++++ cryptography-45.0.7/tests/bench/test_x509.py @@ -13,40 +13,40 @@ from cryptography import x509 from ..utils import load_vectors_from_file diff --git a/python-cryptography.changes b/python-cryptography.changes index 8699907..9242444 100644 --- a/python-cryptography.changes +++ b/python-cryptography.changes @@ -1,3 +1,9 @@ +------------------------------------------------------------------- +Sun Sep 14 20:45:39 UTC 2025 - Dirk Müller + +- update to 45.0.7: + * Added a function to support an upcoming pyOpenSSL release. + ------------------------------------------------------------------- Mon Sep 1 14:46:55 UTC 2025 - James Oakley @@ -167,8 +173,8 @@ Sun Jan 26 10:59:13 UTC 2025 - Soc Virnyl Estela :class:`~cryptography.hazmat.primitives.kdf.argon2.Argon2id` when using OpenSSL 3.2.0+. * Added support for the :class:`~cryptography.x509.Admissions` certificate extension. - * Added basic support for PKCS7 decryption (including S/MIME 3.2) via - :func:`~cryptography.hazmat.primitives.serialization.pkcs7.pkcs7_decrypt_der`, + * Added basic support for PKCS7 decryption (including S/MIME 3.2) via + :func:`~cryptography.hazmat.primitives.serialization.pkcs7.pkcs7_decrypt_der`, :func:`~cryptography.hazmat.primitives.serialization.pkcs7.pkcs7_decrypt_pem`, and :func:`~cryptography.hazmat.primitives.serialization.pkcs7.pkcs7_decrypt_smime`. - Update specfile to accommodate new project structure at version 44.0.0 diff --git a/python-cryptography.spec b/python-cryptography.spec index 3642f1b..447ec9b 100644 --- a/python-cryptography.spec +++ b/python-cryptography.spec @@ -28,7 +28,7 @@ %{?sle15_python_module_pythons} Name: python-cryptography%{psuffix} # ALWAYS KEEP IN SYNC WITH python-cryptography-vectors! -Version: 45.0.5 +Version: 45.0.7 Release: 0 Summary: Python library which exposes cryptographic recipes and primitives License: Apache-2.0 OR BSD-3-Clause diff --git a/vendor.tar.zst b/vendor.tar.zst index 6b5d751..1ecfffa 100644 --- a/vendor.tar.zst +++ b/vendor.tar.zst @@ -1,3 +1,3 @@ version https://git-lfs.github.com/spec/v1 -oid sha256:66027fde33c455f0cb3d01f7daba90d0e8a87378f1b48bcc5cb23bc2fb9c98bb -size 2651262 +oid sha256:bf99c9e48b00d21870a3579e7c84eb32889dee6c82848be97e0b2408091194a7 +size 2652902