python-cryptography
No description set
- Developed at devel:languages:python
- Sources inherited from project openSUSE:Factory
-
15
derived packages
- Download package
-
Checkout Package
osc -A https://api.opensuse.org checkout openSUSE:Factory:ARM/python-cryptography && cd $_
- Create Badge
Refresh
Refresh
Source Files
Filename | Size | Changed |
---|---|---|
cryptography-2.2.1.tar.gz | 0000443853 433 KB | |
cryptography-2.2.1.tar.gz.asc | 0000000488 488 Bytes | |
cryptography_vectors-2.2.1.tar.gz | 0027271546 26 MB | |
cryptography_vectors-2.2.1.tar.gz.asc | 0000000488 488 Bytes | |
disable-uneven-sizes-tests.patch | 0000000678 678 Bytes | |
python-cryptography.changes | 0000031857 31.1 KB | |
python-cryptography.keyring | 0000001847 1.8 KB | |
python-cryptography.spec | 0000004439 4.33 KB | |
skip_openssl_memleak_test.patch | 0000000674 674 Bytes |
Revision 38 (latest revision is 90)
Dominique Leuenberger (dimstar_suse)
accepted
request 591618
from
Tomáš Chvátal (scarabeus_iv)
(revision 38)
- Cleanup with spec-cleaner - Use %setup to unpack all archives do not rely on tar calls - Update to upstream release 2.2.1: * Reverted a change to GeneralNames which prohibited having zero elements, due to breakages. * Fixed a bug in :func:`~cryptography.hazmat.primitives.keywrap.aes_key_unwrap_with_padding` that caused it to raise InvalidUnwrap when key length modulo 8 was zero. * BACKWARDS INCOMPATIBLE: Support for Python 2.6 has been dropped. * Resolved a bug in HKDF that incorrectly constrained output size. * Added :class:`~cryptography.hazmat.primitives.asymmetric.ec.BrainpoolP256R1`, :class:`~cryptography.hazmat.primitives.asymmetric.ec.BrainpoolP384R1`, and :class:`~cryptography.hazmat.primitives.asymmetric.ec.BrainpoolP512R1` to support inter-operating with systems like German smart meters. * Added token rotation support to :doc:`Fernet </fernet>` with :meth:`~cryptography.fernet.MultiFernet.rotate`. * Fixed a memory leak in :func:`~cryptography.hazmat.primitives.asymmetric.ec.derive_private_key`. * Added support for AES key wrapping with padding via :func:`~cryptography.hazmat.primitives.keywrap.aes_key_wrap_with_padding` and :func:`~cryptography.hazmat.primitives.keywrap.aes_key_unwrap_with_padding` . * Allow loading DSA keys with 224 bit q.
Comments 0