Hello community,
here is the log from the commit of package python-pycryptodome for
openSUSE:Leap:15.2 checked in at 2020-02-21 23:53:20
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Leap:15.2/python-pycryptodome (Old)
and /work/SRC/openSUSE:Leap:15.2/.python-pycryptodome.new.26092 (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Package is "python-pycryptodome"
Fri Feb 21 23:53:20 2020 rev:11 rq:778100 version:3.9.0
Changes:
--------
---
/work/SRC/openSUSE:Leap:15.2/python-pycryptodome/python-pycryptodome.changes
2020-01-15 15:51:50.671542918 +0100
+++
/work/SRC/openSUSE:Leap:15.2/.python-pycryptodome.new.26092/python-pycryptodome.changes
2020-02-21 23:53:20.929043064 +0100
@@ -1,0 +2,291 @@
+Tue Sep 10 12:29:30 UTC 2019 - Tomáš Chvátal <[email protected]>
+
+- Update to 3.9.0:
+ * Add support for loading PEM files encrypted with AES256-CBC.
+ * Add support for XChaCha20 and XChaCha20-Poly1305 ciphers.
+ * Add support for bcrypt key derivation function
(Crypto.Protocol.KDF.bcrypt).
+ * Add support for left multiplication of an EC point by a scalar.
+ * Add support for importing ECC and RSA keys in the new OpenSSH format.
+
+-------------------------------------------------------------------
+Thu May 30 15:03:25 UTC 2019 - Martin Liška <[email protected]>
+
+- Update Source to point to github.
+
+-------------------------------------------------------------------
+Thu May 30 11:47:57 UTC 2019 - Martin Liška <[email protected]>
+
+ - Update to 3.8.2
+ * GH#291: fix strict aliasing problem, emerged with GCC 9.1.
+
+-------------------------------------------------------------------
+Fri May 24 11:36:30 UTC 2019 - Martin Liška <[email protected]>
+
+- Use -fno-strict-aliasing in order to bypass:
+ https://github.com/Legrandin/pycryptodome/issues/291.
+
+-------------------------------------------------------------------
+Tue May 14 13:03:34 UTC 2019 - Marketa Calabkova <[email protected]>
+
+- Update to 3.8.1
+ * Add support for loading PEM files encrypted with AES192-CBC,
+ AES256-CBC, and AES256-GCM.
+ * When importing ECC keys, ignore EC PARAMS section that was
+ included by some openssl commands.
+ * repr() did not work for ECC.EccKey.
+ * Minimal length for Blowfish cipher is 32 bits, not 40 bits.
+ 3.8.0
+ * Speed-up ECC performance. ECDSA is 33 times faster on the
+ NIST P-256 curve.
+ * Added support for NIST P-384 and P-521 curves.
+ * EccKey has new methods size_in_bits() and size_in_bytes().
+ * Support HMAC-SHA224, HMAC-SHA256, HMAC-SHA384, and HMAC-SHA512
+ in PBE2/PBKDF2.
+ * DER objects were not rejected if their length field had
+ a leading zero.
+ * Allow legacy RC2 ciphers to have 40-bit keys.
+ * point_at_infinity() becomes an instance method for
+ Crypto.PublicKey.ECC.EccKey, from a static one.
+ 3.7.3
+ * GH#258: False positive on PSS signatures when externally
+ provided salt is too long.
+
+-------------------------------------------------------------------
+Wed Jan 9 21:55:51 UTC 2019 - Jonathan Brownell <[email protected]>
+
+- Protect older platforms from encountering "Suggests:" keyword
+
+-------------------------------------------------------------------
+Thu Nov 29 16:41:53 UTC 2018 - Hans-Peter Jansen <[email protected]>
+
+- Update to 3.7.2
+ - Resolved issues
+ * GH#242: Fixed compilation problem on ARM platforms.
+
+- Update to 3.7.1
+ - New features
+ * Added type stubs to enable static type checking with mypy.
+ Thanks to Michael Nix.
+ * New ``update_after_digest`` flag for CMAC.
+
+ - Resolved issues
+ * GH#232: Fixed problem with gcc 4.x when compiling
+ ``ghash_clmul.c``.
+ * GH#238: Incorrect digest value produced by CMAC after cloning
+ the object.
+ * Method ``update()`` of an EAX cipher object was returning the
+ underlying CMAC object, instead of the EAX object itself.
+ * Method ``update()`` of a CMAC object was not throwing an
+ exception after the digest was computed (with ``digest()`` or
+ ``verify()``).
+
+-------------------------------------------------------------------
+Thu Nov 29 16:34:47 UTC 2018 - Hans-Peter Jansen <[email protected]>
+
+- checked in python-pycrytodomex as separate package on request of
+ Dirk Müller
+
+-------------------------------------------------------------------
+Sun Nov 25 10:54:15 UTC 2018 - Hans-Peter Jansen <[email protected]>
+
+- fixed source url
+
+-------------------------------------------------------------------
+Thu Nov 1 10:42:04 UTC 2018 - Hans-Peter Jansen <[email protected]>
+
+- Update to 3.7.0
+ - New features
+ * Added support for Poly1305 MAC (with AES and ChaCha20 ciphers
+ for key derivation).
+ * Added support for ChaCha20-Poly1305 AEAD cipher.
+ * New parameter output for Crypto.Util.strxor.strxor,
+ Crypto.Util.strxor.strxor_c, encrypt and decrypt methods in
+ symmetric ciphers (Crypto.Cipher package). output is a
+ pre-allocated buffer (a bytearray or a writeable memoryview)
+ where the result must be stored. This requires less memory for
+ very large payloads; it is also more efficient when encrypting
+ (or decrypting) several small payloads.
+
+ - Resolved issues
+ * GH#266: AES-GCM hangs when processing more than 4GB at a time
+ on x86 with PCLMULQDQ instruction.
+
+ - Breaks in compatibility
+ * Drop support for Python 3.3.
+ * Remove Crypto.Util.py3compat.unhexlify and
+ Crypto.Util.py3compat.hexlify.
+ * With the old Python 2.6, use only ctypes (and not cffi) to
+ interface to native code.
+
+- Clean up spec
+- pycryptodomex package spec added
+-------------------------------------------------------------------
+Fri Oct 19 13:02:22 UTC 2018 - Dirk Mueller <[email protected]>
+
+- remove pycryptodomex copy in this package container
+
+-------------------------------------------------------------------
+Mon Sep 3 14:21:25 UTC 2018 - Marketa Calabkova <[email protected]>
+
+- Update to 3.6.6
+ - Resolved issues:
+ * Fix vulnerability on AESNI ECB with payloads smaller than
+ 16 bytes.
+
+- Update to 3.5.5
+ - Resolved issues
+
+ * Fixed incorrect AES encryption/decryption with AES
+ acceleration on x86 due to gcc’s optimization and strict
+ aliasing rules.
+ * More prime number candidates than necessary where discarded
+ as composite due to the limited way D values were searched
+ in the Lucas test.
+ * Fixed ResouceWarnings and DeprecationWarnings.
+
+- Update to 3.5.4
+ - New features:
+ * Build Python 3.7 wheels on Linux, Windows and Mac.
+ - Resolved issues:
+ * More meaningful exceptions in case of mismatch in IV length
+ (CBC/OFB/CFB modes).
+
+-------------------------------------------------------------------
+Tue Jul 3 10:17:10 UTC 2018 - [email protected]
+
+- Update to 3.6.3 (21 June 2018)
+ - Resolved issues
+ * GH#175: Fixed incorrect results for CTR encryption/decryption
+ with more than 8 blocks.
+
+- Update to 3.6.2 (19 June 2018)
+ - New features
+ * ChaCha20 accepts 96 bit nonces (in addition to 64 bit nonces)
+ as defined in RFC7539.
+ * Accelerate AES-GCM on x86 using PCLMULQDQ instruction.
+ * Accelerate AES-ECB and AES-CTR on x86 by pipelining AESNI
+ instructions.
+ * As result of the two improvements above, on x86 (Broadwell):
+ - AES-ECB and AES-CTR are 3x faster
+ - AES-GCM is 9x faster
+
+ - Resolved issues
+ * On Windows, MPIR library was stilled pulled in if renamed to
+ ``gmp.dll``.
+
+ - Breaks in compatibility
+ * In ``Crypto.Util.number``, functions ``floor_div`` and
+ ``exact_div`` have been removed. Also, ``ceil_div`` is limited
+ to non-negative terms only.
+
+- suggesting libgmp10 and python-cffi
+- add license file tag
+
+-------------------------------------------------------------------
+Wed May 16 12:26:23 UTC 2018 - [email protected]
+
+- Provide/obsolete also python-crypto for py2 package
+
+-------------------------------------------------------------------
+Mon May 7 20:17:35 UTC 2018 - [email protected]
+
+- fix condition to act as drop in replacement for python-pycrypto
+
+-------------------------------------------------------------------
+Fri May 4 18:29:29 UTC 2018 - [email protected]
+
+- Update to 3.6.1 (15 April 2018)
++++ 94 more lines (skipped)
++++ between
/work/SRC/openSUSE:Leap:15.2/python-pycryptodome/python-pycryptodome.changes
++++ and
/work/SRC/openSUSE:Leap:15.2/.python-pycryptodome.new.26092/python-pycryptodome.changes
Old:
----
pycryptodome-3.4.7.tar.gz
New:
----
v3.9.0.tar.gz
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Other differences:
------------------
++++++ python-pycryptodome.spec ++++++
--- /var/tmp/diff_new_pack.k7Owmr/_old 2020-02-21 23:53:23.705048580 +0100
+++ /var/tmp/diff_new_pack.k7Owmr/_new 2020-02-21 23:53:23.705048580 +0100
@@ -1,7 +1,7 @@
#
# spec file for package python-pycryptodome
#
-# Copyright (c) 2017 SUSE LINUX GmbH, Nuernberg, Germany.
+# Copyright (c) 2019 SUSE LINUX GmbH, Nuernberg, Germany.
#
# All modifications and additions to the file contributed by third parties
# remain the property of their copyright owners, unless otherwise agreed
@@ -12,78 +12,90 @@
# license that conforms to the Open Source Definition (Version 1.9)
# published by the Open Source Initiative.
-# Please submit bugfixes or comments via http://bugs.opensuse.org/
+# Please submit bugfixes or comments via https://bugs.opensuse.org/
#
%{?!python_module:%define python_module() python-%{**} python3-%{**}}
-%bcond_without test
+%define oldpython python
Name: python-pycryptodome
-Version: 3.4.7
+Version: 3.9.0
Release: 0
Summary: Cryptographic library for Python
License: BSD-2-Clause
Group: Development/Languages/Python
-Url: http://www.pycryptodome.org
-Source:
https://files.pythonhosted.org/packages/source/p/pycryptodome/pycryptodome-%{version}.tar.gz
+URL: https://www.pycryptodome.org
+Source:
https://github.com/Legrandin/pycryptodome/archive/v%{version}.tar.gz
BuildRequires: %{python_module devel}
BuildRequires: %{python_module setuptools}
BuildRequires: fdupes
BuildRequires: python-rpm-macros
-Conflicts: python-pycrypto
-
+%if !0%{?_no_weakdeps}
+# PyCryptodome uses gmp via cffi as runtime optimization
+# would be better, if libgmp* would provide gmp
+Suggests: libgmp10
+Suggests: python-cffi
+%endif
+Provides: python-pycrypto = %{version}
+Obsoletes: python-pycrypto < %{version}
+%ifpython2
+Provides: %{oldpython}-pycrypto = %{version}
+Obsoletes: %{oldpython}-pycrypto < %{version}
+%endif
%python_subpackages
%description
PyCryptodome is a self-contained Python package of low-level
cryptographic primitives.
-PyCryptodome is a fork of PyCrypto. It brings several enhancements
-with respect to the last official version of PyCrypto (2.6.1),
-for instance:
+PyCryptodome is a fork of PyCrypto, residing in the `Crypto`
+namespace for better drop-in compatibility, while it brings several
+enhancements with respect to the last official version of PyCrypto
+(2.6.1), for instance:
* Authenticated encryption modes (GCM, CCM, EAX, SIV, OCB)
* Accelerated AES on Intel platforms via AES-NI
* First class support for PyPy
* Elliptic curves cryptography (NIST P-256 curve only)
-* Better and more compact API (`nonce` and `iv` attributes for ciphers,
- automatic generation of random nonces and IVs, simplified CTR cipher mode,
- and more)
-* SHA-3 (including SHAKE XOFs) and BLAKE2 hash algorithms
+* Better and more compact API (`nonce` and `iv` attributes for
+ ciphers, automatic generation of random nonces and IVs, simplified
+ CTR cipher mode, and more)
+* SHA-3 (including SHAKE XOFs), SHA-512/t and BLAKE2 hash algorithms
* Salsa20 and ChaCha20 stream ciphers
+* Poly1305 MAC
+* ChaCha20-Poly1305 authenticated cipher
* scrypt and HKDF
* Deterministic (EC)DSA
* Password-protected PKCS#8 key containers
* Shamir's Secret Sharing scheme
-* Random numbers get sourced directly from the OS (and not from a CSPRNG in
userspace)
+* Random numbers get sourced directly from the OS (and not from a
+ CSPRNG in userspace)
* Simplified install process, including better support for Windows
* Cleaner RSA and DSA key generation (largely based on FIPS 186-4)
* Major clean ups and simplification of the code base
PyCryptodome is not a wrapper to a separate C library like *OpenSSL*.
-To the largest possible extent, algorithms are implemented in pure Python.
-Only the pieces that are extremely critical to performance (e.g. block ciphers)
-are implemented as C extensions.
+To the largest possible extent, algorithms are implemented in pure
+Python. Only the pieces that are extremely critical to performance
+(e.g. block ciphers) are implemented as C extensions.
%prep
%setup -q -n pycryptodome-%{version}
%build
-export CFLAGS="%{optflags}"
%python_build
%install
%python_install
%python_expand %fdupes %{buildroot}%{$python_sitearch}
-%if %{with test}
%check
%python_exec setup.py test
-%endif
%files %{python_files}
-%defattr(-,root,root,-)
-%doc AUTHORS.rst Changelog.rst LICENSE.rst README.rst
-%{python_sitearch}/*
+%license LICENSE.rst
+%doc AUTHORS.rst Changelog.rst README.rst
+%{python_sitearch}/Crypto/
+%{python_sitearch}/pycryptodome-%{version}-py*.egg-info
%changelog