Hello community,

here is the log from the commit of package python-pycryptodomex for 
openSUSE:Leap:15.2 checked in at 2020-02-21 23:53:14
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Leap:15.2/python-pycryptodomex (Old)
 and      /work/SRC/openSUSE:Leap:15.2/.python-pycryptodomex.new.26092 (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Package is "python-pycryptodomex"

Fri Feb 21 23:53:14 2020 rev:11 rq:778092 version:3.9.2

Changes:
--------
--- 
/work/SRC/openSUSE:Leap:15.2/python-pycryptodomex/python-pycryptodomex.changes  
    2020-01-15 15:51:51.119543175 +0100
+++ 
/work/SRC/openSUSE:Leap:15.2/.python-pycryptodomex.new.26092/python-pycryptodomex.changes
   2020-02-21 23:53:15.145031570 +0100
@@ -2 +2 @@
-Mon Jul 10 07:41:17 UTC 2017 - [email protected]
+Mon Nov 11 11:21:53 UTC 2019 - Hans-Peter Jansen <[email protected]>
@@ -4,5 +4 @@
-- Update to version 3.4.6
- * Resolved issues:
-  * GH#65. Keccak, SHA3, SHAKE and the seek functionality for ChaCha20 were
-    not working on big endian machines. Fixed. Thanks to Mike Gilbert.
-  * A few fixes in the documentation.
+- Use the pycryptodome tarball
@@ -11 +7 @@
-Thu Apr  6 10:09:40 UTC 2017 - [email protected]
+Sun Nov 10 16:54:21 UTC 2019 - Hans-Peter Jansen <[email protected]>
@@ -13,2 +9,203 @@
-- Upstream update 3.4.5
-- HTTPS project URL
+- Update to 3.9.2 (10 November 2019):
+  + New features
+    * Add Python 3.8 wheels for Mac.
+  + Resolved issues
+    * GH#308: Avoid allocating arrays of __m128i on the stack, to
+      cope with buggy compilers.
+    * GH#322: Remove blanket -O3 optimization for gcc and clang, to
+      cope with buggy compilers.
+    * GH#337: Fix typing stubs for signatures.
+    * GH#338: Deal with gcc installations that don't have
+      x86intrin.h.
+
+- Update to version 3.9.1 (1 November 2019):
+  + New features
+    * Add Python 3.8 wheels for Linux and Windows.
+  + Resolved issues
+    * GH#328: minor speed-up when importing RSA.
+
+- sync spec file with python-pycryptodome
+
+-------------------------------------------------------------------
+Wed Sep 11 12:23:49 UTC 2019 - Thomas Bechtold <[email protected]>
+
+- Add export LC_ALL=en_US.UTF-8 to %build, %install and %check to
+  fix the build on older distros
+
+-------------------------------------------------------------------
+Tue Sep 10 12:15:52 UTC 2019 - Tomáš Chvátal <[email protected]>
+
+- Update to 3.9.0:
+  * Add support for loading PEM files encrypted with AES256-CBC.
+  * Add support for XChaCha20 and XChaCha20-Poly1305 ciphers.
+  * Add support for bcrypt key derivation function 
(Crypto.Protocol.KDF.bcrypt).
+  * Add support for left multiplication of an EC point by a scalar.
+  * Add support for importing ECC and RSA keys in the new OpenSSH format.
+
+-------------------------------------------------------------------
+Mon Jun  3 10:23:01 UTC 2019 - Tomáš Chvátal <[email protected]>
+
+- Update to 3.8.2:
+  * GH#291: fix strict aliasing problem, emerged with GCC 9.1.
+
+-------------------------------------------------------------------
+Tue May 14 13:15:38 UTC 2019 - Marketa Calabkova <[email protected]>
+
+- Update to 3.8.1
+  * Add support for loading PEM files encrypted with AES192-CBC,
+    AES256-CBC, and AES256-GCM.
+  * When importing ECC keys, ignore EC PARAMS section that was
+    included by some openssl commands.
+  * repr() did not work for ECC.EccKey.
+  * Minimal length for Blowfish cipher is 32 bits, not 40 bits.
+  3.8.0
+  * Speed-up ECC performance. ECDSA is 33 times faster on the
+    NIST P-256 curve.
+  * Added support for NIST P-384 and P-521 curves.
+  * EccKey has new methods size_in_bits() and size_in_bytes().
+  * Support HMAC-SHA224, HMAC-SHA256, HMAC-SHA384, and HMAC-SHA512
+    in PBE2/PBKDF2.
+  * DER objects were not rejected if their length field had
+    a leading zero.
+  * Allow legacy RC2 ciphers to have 40-bit keys.
+  * point_at_infinity() becomes an instance method for
+    Crypto.PublicKey.ECC.EccKey, from a static one.
+  3.7.3
+  * GH#258: False positive on PSS signatures when externally
+    provided salt is too long.
+
+-------------------------------------------------------------------
+Sun Jan  6 14:30:43 UTC 2019 - Hans-Peter Jansen <[email protected]>
+
+- fix tarball: use the one from PyPI...
+
+-------------------------------------------------------------------
+Thu Nov 29 16:41:53 UTC 2018 - Hans-Peter Jansen <[email protected]>
+
+- Update to 3.7.2
+  - Resolved issues
+    * GH#242: Fixed compilation problem on ARM platforms.
+
+- Update to 3.7.1
+  - New features
+    * Added type stubs to enable static type checking with mypy.
+      Thanks to Michael Nix.
+    * New ``update_after_digest`` flag for CMAC.
+
+  - Resolved issues
+    * GH#232: Fixed problem with gcc 4.x when compiling
+      ``ghash_clmul.c``.
+    * GH#238: Incorrect digest value produced by CMAC after cloning
+      the object.
+    * Method ``update()`` of an EAX cipher object was returning the
+      underlying CMAC object, instead of the EAX object itself.
+    * Method ``update()`` of a CMAC object was not throwing an
+      exception after the digest was computed (with ``digest()`` or
+      ``verify()``).
+
+-------------------------------------------------------------------
+Thu Nov 29 16:34:47 UTC 2018 - Hans-Peter Jansen <[email protected]>
+
+- checked in python-pycrytodomex as separate package on request of
+  Dirk Müller
+
+-------------------------------------------------------------------
+Sun Nov 25 10:54:15 UTC 2018 - Hans-Peter Jansen <[email protected]>
+
+- fixed source url
+
+-------------------------------------------------------------------
+Thu Nov  1 10:42:04 UTC 2018 - Hans-Peter Jansen <[email protected]>
+
+- Update to 3.7.0
+  - New features
+    * Added support for Poly1305 MAC (with AES and ChaCha20 ciphers
+      for key derivation).
+    * Added support for ChaCha20-Poly1305 AEAD cipher.
+    * New parameter output for Crypto.Util.strxor.strxor, 
+      Crypto.Util.strxor.strxor_c, encrypt and decrypt methods in 
+      symmetric ciphers (Crypto.Cipher package). output is a 
+      pre-allocated buffer (a bytearray or a writeable memoryview) 
+      where the result must be stored. This requires less memory for 
+      very large payloads; it is also more efficient when encrypting 
+      (or decrypting) several small payloads.
+
+  - Resolved issues
+    * GH#266: AES-GCM hangs when processing more than 4GB at a time
+      on x86 with PCLMULQDQ instruction.
+
+  - Breaks in compatibility
+    * Drop support for Python 3.3.
+    * Remove Crypto.Util.py3compat.unhexlify and
+      Crypto.Util.py3compat.hexlify.
+    * With the old Python 2.6, use only ctypes (and not cffi) to
+      interface to native code.
+
+- Clean up spec
+- pycryptodomex package spec added
+-------------------------------------------------------------------
+Fri Oct 19 13:02:22 UTC 2018 - Dirk Mueller <[email protected]>
+
+- remove pycryptodomex copy in this package container
+
+-------------------------------------------------------------------
+Mon Sep  3 14:21:25 UTC 2018 - Marketa Calabkova <[email protected]>
+
+- Update to 3.6.6
+  - Resolved issues:
+    * Fix vulnerability on AESNI ECB with payloads smaller than 
+      16 bytes.
+
+- Update to 3.5.5
+  - Resolved issues
+
+    * Fixed incorrect AES encryption/decryption with AES 
+      acceleration on x86 due to gcc’s optimization and strict 
+      aliasing rules.
+    * More prime number candidates than necessary where discarded 
+      as composite due to the limited way D values were searched 
+      in the Lucas test.
+    * Fixed ResouceWarnings and DeprecationWarnings.
+
+- Update to 3.5.4
+  - New features:
+    * Build Python 3.7 wheels on Linux, Windows and Mac.
+  - Resolved issues:
+    * More meaningful exceptions in case of mismatch in IV length 
+      (CBC/OFB/CFB modes).
+
+-------------------------------------------------------------------
+Tue Jul  3 10:17:10 UTC 2018 - [email protected]
+
+- Update to 3.6.3 (21 June 2018)
+  - Resolved issues
+    * GH#175: Fixed incorrect results for CTR encryption/decryption
+      with more than 8 blocks.
+
+- Update to 3.6.2 (19 June 2018)
+  - New features
+    * ChaCha20 accepts 96 bit nonces (in addition to 64 bit nonces)
+      as defined in RFC7539.
+    * Accelerate AES-GCM on x86 using PCLMULQDQ instruction.
+    * Accelerate AES-ECB and AES-CTR on x86 by pipelining AESNI
++++ 129 more lines (skipped)
++++ between 
/work/SRC/openSUSE:Leap:15.2/python-pycryptodomex/python-pycryptodomex.changes
++++ and 
/work/SRC/openSUSE:Leap:15.2/.python-pycryptodomex.new.26092/python-pycryptodomex.changes

Old:
----
  pycryptodomex-3.4.6.tar.gz

New:
----
  v3.9.2.tar.gz

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Other differences:
------------------
++++++ python-pycryptodomex.spec ++++++
--- /var/tmp/diff_new_pack.5IR0Ql/_old  2020-02-21 23:53:16.521034304 +0100
+++ /var/tmp/diff_new_pack.5IR0Ql/_new  2020-02-21 23:53:16.521034304 +0100
@@ -1,7 +1,7 @@
 #
 # spec file for package python-pycryptodomex
 #
-# Copyright (c) 2017 SUSE LINUX GmbH, Nuernberg, Germany.
+# Copyright (c) 2019 SUSE LINUX GmbH, Nuernberg, Germany.
 #
 # All modifications and additions to the file contributed by third parties
 # remain the property of their copyright owners, unless otherwise agreed
@@ -12,68 +12,90 @@
 # license that conforms to the Open Source Definition (Version 1.9)
 # published by the Open Source Initiative.
 
-# Please submit bugfixes or comments via http://bugs.opensuse.org/
+# Please submit bugfixes or comments via https://bugs.opensuse.org/
 #
 
 
 %{?!python_module:%define python_module() python-%{**} python3-%{**}}
+%define oldpython python
 Name:           python-pycryptodomex
-%global modname pycryptodomex
-Version:        3.4.6
+Version:        3.9.2
 Release:        0
 Summary:        Cryptographic library for Python
 License:        BSD-2-Clause
 Group:          Development/Languages/Python
-Url:            https://www.pycryptodome.org
-Source:         
https://pypi.io/packages/source/p/%{modname}/%{modname}-%{version}.tar.gz
+URL:            https://www.pycryptodome.org
+Source:         
https://github.com/Legrandin/pycryptodome/archive/v%{version}.tar.gz
 BuildRequires:  %{python_module devel}
 BuildRequires:  %{python_module setuptools}
 BuildRequires:  fdupes
 BuildRequires:  python-rpm-macros
-BuildRoot:      %{_tmppath}/%{name}-%{version}-build
-
+%if !0%{?_no_weakdeps}
+# PyCryptodomex uses gmp via cffi as runtime optimization
+# would be better, if libgmp* would provide gmp
+Suggests:       libgmp10
+Suggests:       python-cffi
+%endif
 %python_subpackages
 
 %description
-PyCryptodome is a self-contained Python package of low-level
+PyCryptodomex is a self-contained Python package of low-level
 cryptographic primitives.
 
+Unlike PyCryptodome, it resides in its own namespace `Cryptodome`.
+
+PyCryptodome is a fork of PyCrypto. It brings several enhancements
+with respect to the last official version of PyCrypto (2.6.1),
+for instance:
+
 * Authenticated encryption modes (GCM, CCM, EAX, SIV, OCB)
 * Accelerated AES on Intel platforms via AES-NI
 * First class support for PyPy
 * Elliptic curves cryptography (NIST P-256 curve only)
-* Better and more compact API (`nonce` and `iv` attributes for ciphers,
-  automatic generation of random nonces and IVs, simplified CTR cipher mode,
-  and more)
-* SHA-3 (including SHAKE XOFs) and BLAKE2 hash algorithms
+* Better and more compact API (`nonce` and `iv` attributes for
+  ciphers, automatic generation of random nonces and IVs, simplified
+  CTR cipher mode, and more)
+* SHA-3 (including SHAKE XOFs), SHA-512/t and BLAKE2 hash algorithms
 * Salsa20 and ChaCha20 stream ciphers
+* Poly1305 MAC
+* ChaCha20-Poly1305 authenticated cipher
 * scrypt and HKDF
 * Deterministic (EC)DSA
 * Password-protected PKCS#8 key containers
 * Shamir's Secret Sharing scheme
-* Random numbers get sourced directly from the OS (and not from a CSPRNG in 
userspace)
+* Random numbers get sourced directly from the OS (and not from a
+  CSPRNG in userspace)
 * Simplified install process, including better support for Windows
 * Cleaner RSA and DSA key generation (largely based on FIPS 186-4)
 * Major clean ups and simplification of the code base
 
+PyCryptodomex is not a wrapper to a separate C library like *OpenSSL*.
+To the largest possible extent, algorithms are implemented in pure
+Python. Only the pieces that are extremely critical to performance
+(e.g. block ciphers) are implemented as C extensions.
+
 %prep
-%setup -q -n %{modname}-%{version}
+%setup -q -n pycryptodome-%{version}
+touch .separate_namespace
 
 %build
+export LC_ALL=en_US.UTF-8
 export CFLAGS="%{optflags}"
 %python_build
 
 %install
-%python_expand rm -rf %{buildroot}%{$python_sitelib}/Cryptodome/SelfTest/
+export LC_ALL=en_US.UTF-8
 %python_install
 %python_expand %fdupes %{buildroot}%{$python_sitearch}
 
 %check
+export LC_ALL=en_US.UTF-8
 %python_exec setup.py test
 
 %files %{python_files}
-%defattr(-,root,root,-)
-%doc Changelog.rst AUTHORS.rst LICENSE.rst README.rst
-%{python_sitearch}/*
+%license LICENSE.rst
+%doc AUTHORS.rst Changelog.rst README.rst
+%{python_sitearch}/Cryptodome/
+%{python_sitearch}/pycryptodomex-%{version}-py*.egg-info
 
 %changelog


Reply via email to