Hello community,

here is the log from the commit of package python-pycryptodome for 
openSUSE:Leap:15.2 checked in at 2020-02-21 23:53:20
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Leap:15.2/python-pycryptodome (Old)
 and      /work/SRC/openSUSE:Leap:15.2/.python-pycryptodome.new.26092 (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Package is "python-pycryptodome"

Fri Feb 21 23:53:20 2020 rev:11 rq:778100 version:3.9.0

Changes:
--------
--- 
/work/SRC/openSUSE:Leap:15.2/python-pycryptodome/python-pycryptodome.changes    
    2020-01-15 15:51:50.671542918 +0100
+++ 
/work/SRC/openSUSE:Leap:15.2/.python-pycryptodome.new.26092/python-pycryptodome.changes
     2020-02-21 23:53:20.929043064 +0100
@@ -1,0 +2,291 @@
+Tue Sep 10 12:29:30 UTC 2019 - Tomáš Chvátal <[email protected]>
+
+- Update to 3.9.0:
+  * Add support for loading PEM files encrypted with AES256-CBC.
+  * Add support for XChaCha20 and XChaCha20-Poly1305 ciphers.
+  * Add support for bcrypt key derivation function 
(Crypto.Protocol.KDF.bcrypt).
+  * Add support for left multiplication of an EC point by a scalar.
+  * Add support for importing ECC and RSA keys in the new OpenSSH format.
+
+-------------------------------------------------------------------
+Thu May 30 15:03:25 UTC 2019 - Martin Liška <[email protected]>
+
+- Update Source to point to github.
+
+-------------------------------------------------------------------
+Thu May 30 11:47:57 UTC 2019 - Martin Liška <[email protected]>
+
+  - Update to 3.8.2
+    * GH#291: fix strict aliasing problem, emerged with GCC 9.1.
+
+-------------------------------------------------------------------
+Fri May 24 11:36:30 UTC 2019 - Martin Liška <[email protected]>
+
+-  Use -fno-strict-aliasing in order to bypass:
+   https://github.com/Legrandin/pycryptodome/issues/291.
+
+-------------------------------------------------------------------
+Tue May 14 13:03:34 UTC 2019 - Marketa Calabkova <[email protected]>
+
+- Update to 3.8.1
+  * Add support for loading PEM files encrypted with AES192-CBC, 
+    AES256-CBC, and AES256-GCM.
+  * When importing ECC keys, ignore EC PARAMS section that was 
+    included by some openssl commands.
+  * repr() did not work for ECC.EccKey.
+  * Minimal length for Blowfish cipher is 32 bits, not 40 bits.
+  3.8.0
+  * Speed-up ECC performance. ECDSA is 33 times faster on the 
+    NIST P-256 curve.
+  * Added support for NIST P-384 and P-521 curves.
+  * EccKey has new methods size_in_bits() and size_in_bytes().
+  * Support HMAC-SHA224, HMAC-SHA256, HMAC-SHA384, and HMAC-SHA512 
+    in PBE2/PBKDF2.
+  * DER objects were not rejected if their length field had 
+    a leading zero.
+  * Allow legacy RC2 ciphers to have 40-bit keys.
+  * point_at_infinity() becomes an instance method for 
+    Crypto.PublicKey.ECC.EccKey, from a static one.
+  3.7.3
+  * GH#258: False positive on PSS signatures when externally 
+    provided salt is too long.
+
+-------------------------------------------------------------------
+Wed Jan  9 21:55:51 UTC 2019 - Jonathan Brownell <[email protected]>
+
+- Protect older platforms from encountering "Suggests:" keyword
+
+-------------------------------------------------------------------
+Thu Nov 29 16:41:53 UTC 2018 - Hans-Peter Jansen <[email protected]>
+
+- Update to 3.7.2
+  - Resolved issues
+    * GH#242: Fixed compilation problem on ARM platforms.
+
+- Update to 3.7.1
+  - New features
+    * Added type stubs to enable static type checking with mypy.
+      Thanks to Michael Nix.
+    * New ``update_after_digest`` flag for CMAC.
+
+  - Resolved issues
+    * GH#232: Fixed problem with gcc 4.x when compiling
+      ``ghash_clmul.c``.
+    * GH#238: Incorrect digest value produced by CMAC after cloning
+      the object.
+    * Method ``update()`` of an EAX cipher object was returning the
+      underlying CMAC object, instead of the EAX object itself.
+    * Method ``update()`` of a CMAC object was not throwing an
+      exception after the digest was computed (with ``digest()`` or
+      ``verify()``).
+
+-------------------------------------------------------------------
+Thu Nov 29 16:34:47 UTC 2018 - Hans-Peter Jansen <[email protected]>
+
+- checked in python-pycrytodomex as separate package on request of
+  Dirk Müller
+
+-------------------------------------------------------------------
+Sun Nov 25 10:54:15 UTC 2018 - Hans-Peter Jansen <[email protected]>
+
+- fixed source url
+
+-------------------------------------------------------------------
+Thu Nov  1 10:42:04 UTC 2018 - Hans-Peter Jansen <[email protected]>
+
+- Update to 3.7.0
+  - New features
+    * Added support for Poly1305 MAC (with AES and ChaCha20 ciphers
+      for key derivation).
+    * Added support for ChaCha20-Poly1305 AEAD cipher.
+    * New parameter output for Crypto.Util.strxor.strxor, 
+      Crypto.Util.strxor.strxor_c, encrypt and decrypt methods in 
+      symmetric ciphers (Crypto.Cipher package). output is a 
+      pre-allocated buffer (a bytearray or a writeable memoryview) 
+      where the result must be stored. This requires less memory for 
+      very large payloads; it is also more efficient when encrypting 
+      (or decrypting) several small payloads.
+
+  - Resolved issues
+    * GH#266: AES-GCM hangs when processing more than 4GB at a time
+      on x86 with PCLMULQDQ instruction.
+
+  - Breaks in compatibility
+    * Drop support for Python 3.3.
+    * Remove Crypto.Util.py3compat.unhexlify and
+      Crypto.Util.py3compat.hexlify.
+    * With the old Python 2.6, use only ctypes (and not cffi) to
+      interface to native code.
+
+- Clean up spec
+- pycryptodomex package spec added
+-------------------------------------------------------------------
+Fri Oct 19 13:02:22 UTC 2018 - Dirk Mueller <[email protected]>
+
+- remove pycryptodomex copy in this package container
+
+-------------------------------------------------------------------
+Mon Sep  3 14:21:25 UTC 2018 - Marketa Calabkova <[email protected]>
+
+- Update to 3.6.6
+  - Resolved issues:
+    * Fix vulnerability on AESNI ECB with payloads smaller than 
+      16 bytes.
+
+- Update to 3.5.5
+  - Resolved issues
+
+    * Fixed incorrect AES encryption/decryption with AES 
+      acceleration on x86 due to gcc’s optimization and strict 
+      aliasing rules.
+    * More prime number candidates than necessary where discarded 
+      as composite due to the limited way D values were searched 
+      in the Lucas test.
+    * Fixed ResouceWarnings and DeprecationWarnings.
+
+- Update to 3.5.4
+  - New features:
+    * Build Python 3.7 wheels on Linux, Windows and Mac.
+  - Resolved issues:
+    * More meaningful exceptions in case of mismatch in IV length 
+      (CBC/OFB/CFB modes).
+
+-------------------------------------------------------------------
+Tue Jul  3 10:17:10 UTC 2018 - [email protected]
+
+- Update to 3.6.3 (21 June 2018)
+  - Resolved issues
+    * GH#175: Fixed incorrect results for CTR encryption/decryption
+      with more than 8 blocks.
+
+- Update to 3.6.2 (19 June 2018)
+  - New features
+    * ChaCha20 accepts 96 bit nonces (in addition to 64 bit nonces)
+      as defined in RFC7539.
+    * Accelerate AES-GCM on x86 using PCLMULQDQ instruction.
+    * Accelerate AES-ECB and AES-CTR on x86 by pipelining AESNI
+      instructions.
+    * As result of the two improvements above, on x86 (Broadwell):
+      - AES-ECB and AES-CTR are 3x faster
+      - AES-GCM is 9x faster
+
+  - Resolved issues
+    * On Windows, MPIR library was stilled pulled in if renamed to
+      ``gmp.dll``.
+
+  - Breaks in compatibility
+    * In ``Crypto.Util.number``, functions ``floor_div`` and
+      ``exact_div`` have been removed. Also, ``ceil_div`` is limited
+      to non-negative terms only.
+
+- suggesting libgmp10 and python-cffi
+- add license file tag
+
+-------------------------------------------------------------------
+Wed May 16 12:26:23 UTC 2018 - [email protected]
+
+- Provide/obsolete also python-crypto for py2 package
+
+-------------------------------------------------------------------
+Mon May  7 20:17:35 UTC 2018 - [email protected]
+
+- fix condition to act as drop in replacement for python-pycrypto
+
+-------------------------------------------------------------------
+Fri May  4 18:29:29 UTC 2018 - [email protected]
+
+- Update to 3.6.1 (15 April 2018)
++++ 94 more lines (skipped)
++++ between 
/work/SRC/openSUSE:Leap:15.2/python-pycryptodome/python-pycryptodome.changes
++++ and 
/work/SRC/openSUSE:Leap:15.2/.python-pycryptodome.new.26092/python-pycryptodome.changes

Old:
----
  pycryptodome-3.4.7.tar.gz

New:
----
  v3.9.0.tar.gz

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Other differences:
------------------
++++++ python-pycryptodome.spec ++++++
--- /var/tmp/diff_new_pack.k7Owmr/_old  2020-02-21 23:53:23.705048580 +0100
+++ /var/tmp/diff_new_pack.k7Owmr/_new  2020-02-21 23:53:23.705048580 +0100
@@ -1,7 +1,7 @@
 #
 # spec file for package python-pycryptodome
 #
-# Copyright (c) 2017 SUSE LINUX GmbH, Nuernberg, Germany.
+# Copyright (c) 2019 SUSE LINUX GmbH, Nuernberg, Germany.
 #
 # All modifications and additions to the file contributed by third parties
 # remain the property of their copyright owners, unless otherwise agreed
@@ -12,78 +12,90 @@
 # license that conforms to the Open Source Definition (Version 1.9)
 # published by the Open Source Initiative.
 
-# Please submit bugfixes or comments via http://bugs.opensuse.org/
+# Please submit bugfixes or comments via https://bugs.opensuse.org/
 #
 
 
 %{?!python_module:%define python_module() python-%{**} python3-%{**}}
-%bcond_without test
+%define oldpython python
 Name:           python-pycryptodome
-Version:        3.4.7
+Version:        3.9.0
 Release:        0
 Summary:        Cryptographic library for Python
 License:        BSD-2-Clause
 Group:          Development/Languages/Python
-Url:            http://www.pycryptodome.org
-Source:         
https://files.pythonhosted.org/packages/source/p/pycryptodome/pycryptodome-%{version}.tar.gz
+URL:            https://www.pycryptodome.org
+Source:         
https://github.com/Legrandin/pycryptodome/archive/v%{version}.tar.gz
 BuildRequires:  %{python_module devel}
 BuildRequires:  %{python_module setuptools}
 BuildRequires:  fdupes
 BuildRequires:  python-rpm-macros
-Conflicts:      python-pycrypto
-
+%if !0%{?_no_weakdeps}
+# PyCryptodome uses gmp via cffi as runtime optimization
+# would be better, if libgmp* would provide gmp
+Suggests:       libgmp10
+Suggests:       python-cffi
+%endif
+Provides:       python-pycrypto = %{version}
+Obsoletes:      python-pycrypto < %{version}
+%ifpython2
+Provides:       %{oldpython}-pycrypto = %{version}
+Obsoletes:      %{oldpython}-pycrypto < %{version}
+%endif
 %python_subpackages
 
 %description
 PyCryptodome is a self-contained Python package of low-level
 cryptographic primitives.
 
-PyCryptodome is a fork of PyCrypto. It brings several enhancements
-with respect to the last official version of PyCrypto (2.6.1),
-for instance:
+PyCryptodome is a fork of PyCrypto, residing in the `Crypto`
+namespace for better drop-in compatibility, while it brings several
+enhancements with respect to the last official version of PyCrypto
+(2.6.1), for instance:
 
 * Authenticated encryption modes (GCM, CCM, EAX, SIV, OCB)
 * Accelerated AES on Intel platforms via AES-NI
 * First class support for PyPy
 * Elliptic curves cryptography (NIST P-256 curve only)
-* Better and more compact API (`nonce` and `iv` attributes for ciphers,
-  automatic generation of random nonces and IVs, simplified CTR cipher mode,
-  and more)
-* SHA-3 (including SHAKE XOFs) and BLAKE2 hash algorithms
+* Better and more compact API (`nonce` and `iv` attributes for
+  ciphers, automatic generation of random nonces and IVs, simplified
+  CTR cipher mode, and more)
+* SHA-3 (including SHAKE XOFs), SHA-512/t and BLAKE2 hash algorithms
 * Salsa20 and ChaCha20 stream ciphers
+* Poly1305 MAC
+* ChaCha20-Poly1305 authenticated cipher
 * scrypt and HKDF
 * Deterministic (EC)DSA
 * Password-protected PKCS#8 key containers
 * Shamir's Secret Sharing scheme
-* Random numbers get sourced directly from the OS (and not from a CSPRNG in 
userspace)
+* Random numbers get sourced directly from the OS (and not from a
+  CSPRNG in userspace)
 * Simplified install process, including better support for Windows
 * Cleaner RSA and DSA key generation (largely based on FIPS 186-4)
 * Major clean ups and simplification of the code base
 
 PyCryptodome is not a wrapper to a separate C library like *OpenSSL*.
-To the largest possible extent, algorithms are implemented in pure Python.
-Only the pieces that are extremely critical to performance (e.g. block ciphers)
-are implemented as C extensions.
+To the largest possible extent, algorithms are implemented in pure
+Python. Only the pieces that are extremely critical to performance
+(e.g. block ciphers) are implemented as C extensions.
 
 %prep
 %setup -q -n pycryptodome-%{version}
 
 %build
-export CFLAGS="%{optflags}"
 %python_build
 
 %install
 %python_install
 %python_expand %fdupes %{buildroot}%{$python_sitearch}
 
-%if %{with test}
 %check
 %python_exec setup.py test
-%endif
 
 %files %{python_files}
-%defattr(-,root,root,-)
-%doc AUTHORS.rst Changelog.rst LICENSE.rst README.rst
-%{python_sitearch}/*
+%license LICENSE.rst
+%doc AUTHORS.rst Changelog.rst README.rst
+%{python_sitearch}/Crypto/
+%{python_sitearch}/pycryptodome-%{version}-py*.egg-info
 
 %changelog


Reply via email to