python-cryptography
No description set
- Developed at devel:languages:python
- Sources inherited from project openSUSE:Factory
-
17
derived packages
- Download package
-
Checkout Package
osc -A https://api.opensuse.org checkout openSUSE:Factory:Rebuild/python-cryptography && cd $_
- Create Badge
Refresh
Refresh
Source Files
Filename | Size | Changed |
---|---|---|
_multibuild | 0000000053 53 Bytes | |
_service | 0000000299 299 Bytes | |
cargo_config | 0000000100 100 Bytes | |
cryptography-41.0.1.tar.gz | 0000629124 614 KB | |
python-cryptography.changes | 0000071104 69.4 KB | |
python-cryptography.keyring | 0000001847 1.8 KB | |
python-cryptography.spec | 0000004118 4.02 KB | |
remove_python_3_6_deprecation_warning.patch | 0000000954 954 Bytes | |
skip_openssl_memleak_test.patch | 0000001028 1 KB | |
vendor.tar.zst | 0006149053 5.86 MB |
Revision 78 (latest revision is 97)
Dominique Leuenberger (dimstar_suse)
accepted
request 1095411
from
Daniel Garcia (dgarcia)
(revision 78)
- update to 41.0.1 (bsc#1212568): * Temporarily allow invalid ECDSA signature algorithm parameters in X.509 certificates, which are generated by older versions of Java. * Allow null bytes in pass phrases when serializing private keys. * **BACKWARDS INCOMPATIBLE:** Support for OpenSSL less than 1.1.1d has been removed. Users on older version of OpenSSL will need to upgrade. * **BACKWARDS INCOMPATIBLE:** Support for Python 3.6 has been removed. * **BACKWARDS INCOMPATIBLE:** Dropped support for LibreSSL < 3.6. * Updated the minimum supported Rust version (MSRV) to 1.56.0, from 1.48.0. * Added support for the :class:`~cryptography.x509.OCSPAcceptableResponses` OCSP extension. * Added support for the :class:`~cryptography.x509.MSCertificateTemplate` proprietary Microsoft certificate extension. * Implemented support for equality checks on all asymmetric public key types. * Added support for ``aes256-gcm@openssh.com`` encrypted keys in :func:`~cryptography.hazmat.primitives.serialization.load_ssh _private_key`. * Added support for obtaining X.509 certificate signature algorithm parameters (including PSS)
Comments 0