forked from pool/python-cryptography
Accepting request 1304683 from devel:languages:python
- update to 45.0.7: * Added a function to support an upcoming pyOpenSSL release. * Added basic support for PKCS7 decryption (including S/MIME 3.2) via :func:`~cryptography.hazmat.primitives.serialization.pkcs7.pkcs7_decrypt_der`, OBS-URL: https://build.opensuse.org/request/show/1304683 OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/python-cryptography?expand=0&rev=104
This commit is contained in:
@@ -7,8 +7,10 @@ Subject: [PATCH] Make unsafe subinterpreter support available via cfg flag
|
|||||||
src/impl_/pymodule.rs | 2 +-
|
src/impl_/pymodule.rs | 2 +-
|
||||||
1 file changed, 1 insertion(+), 1 deletion(-)
|
1 file changed, 1 insertion(+), 1 deletion(-)
|
||||||
|
|
||||||
--- a/vendor/pyo3-0.25.1/src/impl_/pymodule.rs
|
Index: cryptography-45.0.7/vendor/pyo3-0.25.1/src/impl_/pymodule.rs
|
||||||
+++ b/vendor/pyo3-0.25.1/src/impl_/pymodule.rs
|
===================================================================
|
||||||
|
--- cryptography-45.0.7.orig/vendor/pyo3-0.25.1/src/impl_/pymodule.rs
|
||||||
|
+++ cryptography-45.0.7/vendor/pyo3-0.25.1/src/impl_/pymodule.rs
|
||||||
@@ -100,7 +100,7 @@ impl ModuleDef {
|
@@ -100,7 +100,7 @@ impl ModuleDef {
|
||||||
// that static data is not reused across interpreters.
|
// that static data is not reused across interpreters.
|
||||||
//
|
//
|
||||||
@@ -18,8 +20,10 @@ Subject: [PATCH] Make unsafe subinterpreter support available via cfg flag
|
|||||||
{
|
{
|
||||||
// PyInterpreterState_Get is only available on 3.9 and later, but is missing
|
// PyInterpreterState_Get is only available on 3.9 and later, but is missing
|
||||||
// from python3.dll for Windows stable API on 3.9
|
// from python3.dll for Windows stable API on 3.9
|
||||||
--- a/Cargo.toml
|
Index: cryptography-45.0.7/Cargo.toml
|
||||||
+++ b/Cargo.toml
|
===================================================================
|
||||||
|
--- cryptography-45.0.7.orig/Cargo.toml
|
||||||
|
+++ cryptography-45.0.7/Cargo.toml
|
||||||
@@ -29,3 +29,6 @@ openssl-sys = "0.9.108"
|
@@ -29,3 +29,6 @@ openssl-sys = "0.9.108"
|
||||||
|
|
||||||
[profile.release]
|
[profile.release]
|
||||||
@@ -27,9 +31,11 @@ Subject: [PATCH] Make unsafe subinterpreter support available via cfg flag
|
|||||||
+
|
+
|
||||||
+[patch.crates-io]
|
+[patch.crates-io]
|
||||||
+pyo3 = { path="vendor/pyo3-0.25.1" }
|
+pyo3 = { path="vendor/pyo3-0.25.1" }
|
||||||
--- a/Cargo.lock
|
Index: cryptography-45.0.7/Cargo.lock
|
||||||
+++ b/Cargo.lock
|
===================================================================
|
||||||
@@ -269,8 +269,6 @@ dependencies = [
|
--- cryptography-45.0.7.orig/Cargo.lock
|
||||||
|
+++ cryptography-45.0.7/Cargo.lock
|
||||||
|
@@ -276,8 +276,6 @@ dependencies = [
|
||||||
[[package]]
|
[[package]]
|
||||||
name = "pyo3"
|
name = "pyo3"
|
||||||
version = "0.25.1"
|
version = "0.25.1"
|
||||||
|
@@ -1,3 +0,0 @@
|
|||||||
version https://git-lfs.github.com/spec/v1
|
|
||||||
oid sha256:72e76caa004ab63accdf26023fccd1d087f6d90ec6048ff33ad0445abf7f605a
|
|
||||||
size 744903
|
|
3
cryptography-45.0.7.tar.gz
Normal file
3
cryptography-45.0.7.tar.gz
Normal file
@@ -0,0 +1,3 @@
|
|||||||
|
version https://git-lfs.github.com/spec/v1
|
||||||
|
oid sha256:4b1654dfc64ea479c242508eb8c724044f1e964a47d1d1cacc5132292d851971
|
||||||
|
size 744980
|
@@ -1,10 +1,10 @@
|
|||||||
Index: cryptography-45.0.5/pyproject.toml
|
Index: cryptography-45.0.7/pyproject.toml
|
||||||
===================================================================
|
===================================================================
|
||||||
--- cryptography-45.0.5.orig/pyproject.toml
|
--- cryptography-45.0.7.orig/pyproject.toml
|
||||||
+++ cryptography-45.0.5/pyproject.toml
|
+++ cryptography-45.0.7/pyproject.toml
|
||||||
@@ -67,8 +67,6 @@ nox = ["nox >=2024.04.15", "nox[uv] >=20
|
@@ -67,8 +67,6 @@ nox = ["nox >=2024.04.15", "nox[uv] >=20
|
||||||
test = [
|
test = [
|
||||||
"cryptography_vectors==45.0.5",
|
"cryptography_vectors==45.0.7",
|
||||||
"pytest >=7.4.0",
|
"pytest >=7.4.0",
|
||||||
- "pytest-benchmark >=4.0",
|
- "pytest-benchmark >=4.0",
|
||||||
- "pytest-cov >=2.10.1",
|
- "pytest-cov >=2.10.1",
|
||||||
@@ -51,10 +51,10 @@ Index: cryptography-45.0.5/pyproject.toml
|
|||||||
[tool.ruff]
|
[tool.ruff]
|
||||||
line-length = 79
|
line-length = 79
|
||||||
|
|
||||||
Index: cryptography-45.0.5/tests/bench/test_aead.py
|
Index: cryptography-45.0.7/tests/bench/test_aead.py
|
||||||
===================================================================
|
===================================================================
|
||||||
--- cryptography-45.0.5.orig/tests/bench/test_aead.py
|
--- cryptography-45.0.7.orig/tests/bench/test_aead.py
|
||||||
+++ cryptography-45.0.5/tests/bench/test_aead.py
|
+++ cryptography-45.0.7/tests/bench/test_aead.py
|
||||||
@@ -26,84 +26,84 @@ def _aead_supported(cls):
|
@@ -26,84 +26,84 @@ def _aead_supported(cls):
|
||||||
not _aead_supported(ChaCha20Poly1305),
|
not _aead_supported(ChaCha20Poly1305),
|
||||||
reason="Requires OpenSSL with ChaCha20Poly1305 support",
|
reason="Requires OpenSSL with ChaCha20Poly1305 support",
|
||||||
@@ -160,10 +160,10 @@ Index: cryptography-45.0.5/tests/bench/test_aead.py
|
|||||||
ct = aes.encrypt(b"\x00" * 12, b"hello world plaintext", None)
|
ct = aes.encrypt(b"\x00" * 12, b"hello world plaintext", None)
|
||||||
- benchmark(aes.decrypt, b"\x00" * 12, ct, None)
|
- benchmark(aes.decrypt, b"\x00" * 12, ct, None)
|
||||||
+ aes.decrypt(b"\x00" * 12, ct, None)
|
+ aes.decrypt(b"\x00" * 12, ct, None)
|
||||||
Index: cryptography-45.0.5/tests/bench/test_ec_load.py
|
Index: cryptography-45.0.7/tests/bench/test_ec_load.py
|
||||||
===================================================================
|
===================================================================
|
||||||
--- cryptography-45.0.5.orig/tests/bench/test_ec_load.py
|
--- cryptography-45.0.7.orig/tests/bench/test_ec_load.py
|
||||||
+++ cryptography-45.0.5/tests/bench/test_ec_load.py
|
+++ cryptography-45.0.7/tests/bench/test_ec_load.py
|
||||||
@@ -5,9 +5,9 @@
|
@@ -5,9 +5,9 @@
|
||||||
from ..hazmat.primitives.fixtures_ec import EC_KEY_SECP256R1
|
from ..hazmat.primitives.fixtures_ec import EC_KEY_SECP256R1
|
||||||
|
|
||||||
@@ -178,10 +178,10 @@ Index: cryptography-45.0.5/tests/bench/test_ec_load.py
|
|||||||
- benchmark(EC_KEY_SECP256R1.private_key)
|
- benchmark(EC_KEY_SECP256R1.private_key)
|
||||||
+def test_load_ec_private_numbers():
|
+def test_load_ec_private_numbers():
|
||||||
+ EC_KEY_SECP256R1.private_key()
|
+ EC_KEY_SECP256R1.private_key()
|
||||||
Index: cryptography-45.0.5/tests/bench/test_hashes.py
|
Index: cryptography-45.0.7/tests/bench/test_hashes.py
|
||||||
===================================================================
|
===================================================================
|
||||||
--- cryptography-45.0.5.orig/tests/bench/test_hashes.py
|
--- cryptography-45.0.7.orig/tests/bench/test_hashes.py
|
||||||
+++ cryptography-45.0.5/tests/bench/test_hashes.py
|
+++ cryptography-45.0.7/tests/bench/test_hashes.py
|
||||||
@@ -5,10 +5,10 @@
|
@@ -5,10 +5,10 @@
|
||||||
from cryptography.hazmat.primitives import hashes
|
from cryptography.hazmat.primitives import hashes
|
||||||
|
|
||||||
@@ -195,10 +195,10 @@ Index: cryptography-45.0.5/tests/bench/test_hashes.py
|
|||||||
|
|
||||||
- benchmark(bench)
|
- benchmark(bench)
|
||||||
+ bench()
|
+ bench()
|
||||||
Index: cryptography-45.0.5/tests/bench/test_hmac.py
|
Index: cryptography-45.0.7/tests/bench/test_hmac.py
|
||||||
===================================================================
|
===================================================================
|
||||||
--- cryptography-45.0.5.orig/tests/bench/test_hmac.py
|
--- cryptography-45.0.7.orig/tests/bench/test_hmac.py
|
||||||
+++ cryptography-45.0.5/tests/bench/test_hmac.py
|
+++ cryptography-45.0.7/tests/bench/test_hmac.py
|
||||||
@@ -5,10 +5,10 @@
|
@@ -5,10 +5,10 @@
|
||||||
from cryptography.hazmat.primitives import hashes, hmac
|
from cryptography.hazmat.primitives import hashes, hmac
|
||||||
|
|
||||||
@@ -212,10 +212,10 @@ Index: cryptography-45.0.5/tests/bench/test_hmac.py
|
|||||||
|
|
||||||
- benchmark(bench)
|
- benchmark(bench)
|
||||||
+ bench()
|
+ bench()
|
||||||
Index: cryptography-45.0.5/tests/bench/test_x509.py
|
Index: cryptography-45.0.7/tests/bench/test_x509.py
|
||||||
===================================================================
|
===================================================================
|
||||||
--- cryptography-45.0.5.orig/tests/bench/test_x509.py
|
--- cryptography-45.0.7.orig/tests/bench/test_x509.py
|
||||||
+++ cryptography-45.0.5/tests/bench/test_x509.py
|
+++ cryptography-45.0.7/tests/bench/test_x509.py
|
||||||
@@ -13,40 +13,40 @@ from cryptography import x509
|
@@ -13,40 +13,40 @@ from cryptography import x509
|
||||||
from ..utils import load_vectors_from_file
|
from ..utils import load_vectors_from_file
|
||||||
|
|
||||||
|
@@ -1,3 +1,9 @@
|
|||||||
|
-------------------------------------------------------------------
|
||||||
|
Sun Sep 14 20:45:39 UTC 2025 - Dirk Müller <dmueller@suse.com>
|
||||||
|
|
||||||
|
- update to 45.0.7:
|
||||||
|
* Added a function to support an upcoming pyOpenSSL release.
|
||||||
|
|
||||||
-------------------------------------------------------------------
|
-------------------------------------------------------------------
|
||||||
Mon Sep 1 14:46:55 UTC 2025 - James Oakley <jfunk@opensuse.org>
|
Mon Sep 1 14:46:55 UTC 2025 - James Oakley <jfunk@opensuse.org>
|
||||||
|
|
||||||
@@ -167,8 +173,8 @@ Sun Jan 26 10:59:13 UTC 2025 - Soc Virnyl Estela <uncomfyhalomacro@opensuse.org>
|
|||||||
:class:`~cryptography.hazmat.primitives.kdf.argon2.Argon2id` when using
|
:class:`~cryptography.hazmat.primitives.kdf.argon2.Argon2id` when using
|
||||||
OpenSSL 3.2.0+.
|
OpenSSL 3.2.0+.
|
||||||
* Added support for the :class:`~cryptography.x509.Admissions` certificate extension.
|
* Added support for the :class:`~cryptography.x509.Admissions` certificate extension.
|
||||||
* Added basic support for PKCS7 decryption (including S/MIME 3.2) via
|
* Added basic support for PKCS7 decryption (including S/MIME 3.2) via
|
||||||
:func:`~cryptography.hazmat.primitives.serialization.pkcs7.pkcs7_decrypt_der`,
|
:func:`~cryptography.hazmat.primitives.serialization.pkcs7.pkcs7_decrypt_der`,
|
||||||
:func:`~cryptography.hazmat.primitives.serialization.pkcs7.pkcs7_decrypt_pem`,
|
:func:`~cryptography.hazmat.primitives.serialization.pkcs7.pkcs7_decrypt_pem`,
|
||||||
and :func:`~cryptography.hazmat.primitives.serialization.pkcs7.pkcs7_decrypt_smime`.
|
and :func:`~cryptography.hazmat.primitives.serialization.pkcs7.pkcs7_decrypt_smime`.
|
||||||
- Update specfile to accommodate new project structure at version 44.0.0
|
- Update specfile to accommodate new project structure at version 44.0.0
|
||||||
|
@@ -28,7 +28,7 @@
|
|||||||
%{?sle15_python_module_pythons}
|
%{?sle15_python_module_pythons}
|
||||||
Name: python-cryptography%{psuffix}
|
Name: python-cryptography%{psuffix}
|
||||||
# ALWAYS KEEP IN SYNC WITH python-cryptography-vectors!
|
# ALWAYS KEEP IN SYNC WITH python-cryptography-vectors!
|
||||||
Version: 45.0.5
|
Version: 45.0.7
|
||||||
Release: 0
|
Release: 0
|
||||||
Summary: Python library which exposes cryptographic recipes and primitives
|
Summary: Python library which exposes cryptographic recipes and primitives
|
||||||
License: Apache-2.0 OR BSD-3-Clause
|
License: Apache-2.0 OR BSD-3-Clause
|
||||||
|
@@ -1,3 +1,3 @@
|
|||||||
version https://git-lfs.github.com/spec/v1
|
version https://git-lfs.github.com/spec/v1
|
||||||
oid sha256:66027fde33c455f0cb3d01f7daba90d0e8a87378f1b48bcc5cb23bc2fb9c98bb
|
oid sha256:bf99c9e48b00d21870a3579e7c84eb32889dee6c82848be97e0b2408091194a7
|
||||||
size 2651262
|
size 2652902
|
||||||
|
Reference in New Issue
Block a user