python-cryptography

Edit Package python-cryptography
No description set
Refresh
Refresh
Source Files
Filename Size Changed
_service 0000000206 206 Bytes
cargo_config 0000000100 100 Bytes
cryptography-36.0.0.tar.gz 0000571931 559 KB
cryptography-36.0.0.tar.gz.asc 0000000488 488 Bytes
python-cryptography.changes 0000052850 51.6 KB
python-cryptography.keyring 0000001847 1.8 KB
python-cryptography.spec 0000003618 3.53 KB
skip_openssl_memleak_test.patch 0000000794 794 Bytes
vendor.tar.xz 0005896808 5.62 MB
Revision 57 (latest revision is 90)
Dominique Leuenberger's avatar Dominique Leuenberger (dimstar_suse) accepted request 934527 from Dirk Mueller's avatar Dirk Mueller (dirkmueller) (revision 57)
- update to 36.0.0:
  * FINAL DEPRECATION Support for verifier and signer on our asymmetric key
    classes was deprecated in version 2.1. These functions had an extended
    deprecation due to usage, however the next version of cryptography will
    drop support. Users should migrate to sign and verify.
  * The entire X.509 layer is now written in Rust. This allows alternate
    asymmetric key implementations that can support cloud key management
    services or hardware security modules provided they implement the necessary
    interface (for example: EllipticCurvePrivateKey).
  * Deprecated the backend argument for all functions.
  * Added support for AESOCB3.
  * Added support for iterating over arbitrary request attributes.
  * Deprecated the get_attribute_for_oid method on CertificateSigningRequest in
    favor of get_attribute_for_oid() on the new Attributes object.
  * Fixed handling of PEM files to allow loading when certificate and key are
    in the same file.
  * Fixed parsing of CertificatePolicies extensions containing legacy BMPString values in their explicitText.
  * Allow parsing of negative serial numbers in certificates. Negative serial
    numbers are prohibited by RFC 5280 so a deprecation warning will be raised
    whenever they are encountered. A future version of cryptography will drop
    support for parsing them.
  * Added support for parsing PKCS12 files with friendly names for all
    certificates with load_pkcs12(), which will return an object of type
    PKCS12KeyAndCertificates.
  * rfc4514_string() and related methods now have an optional
    attr_name_overrides parameter to supply custom OID to name mappings, which
    can be used to match vendor-specific extensions.
  * BACKWARDS INCOMPATIBLE: Reverted the nonstandard formatting of email
    address fields as E in rfc4514_string() methods from version 35.0.
  * The previous behavior can be restored with:
Comments 0
openSUSE Build Service is sponsored by