Index index by Group index by Distribution index by Vendor index by creation date index by Name Mirrors Help Search

python311-cryptography-42.0.4-slfo.1.1.8 RPM for s390x

From OpenSuSE Leap 16.0 for s390x

Name: python311-cryptography Distribution: SUSE Linux Framework One
Version: 42.0.4 Vendor: SUSE LLC <https://www.suse.com/>
Release: slfo.1.1.8 Build date: Thu Feb 22 18:10:39 2024
Group: Development/Languages/Python Build host: reproducible
Size: 6164262 Source RPM: python-cryptography-42.0.4-slfo.1.1.8.src.rpm
Packager: https://www.suse.com/
Url: https://cryptography.io/en/latest/
Summary: Python library which exposes cryptographic recipes and primitives
cryptography is a package designed to expose cryptographic
recipes and primitives to Python developers.  Our goal is
for it to be your "cryptographic standard library". It
supports Python 2.7, Python 3.4+, and PyPy-5.3+.

cryptography includes both high level recipes, and low
level interfaces to common cryptographic algorithms such as
symmetric ciphers, message digests and key derivation
functions.

Provides

Requires

License

Apache-2.0 OR BSD-3-Clause

Changelog

* Thu Feb 22 2024 daniel.garcia@suse.com
  - update to 42.0.4 (bsc#1220210, CVE-2024-26130):
    * Fixed a null-pointer-dereference and segfault that could occur
      when creating a PKCS#12 bundle. Credit to Alexander-Programming
      for reporting the issue. CVE-2024-26130
    * Fixed ASN.1 encoding for PKCS7/SMIME signed messages. The fields
      SMIMECapabilities and SignatureAlgorithmIdentifier should now be
      correctly encoded according to the definitions in :rfc:2633
      :rfc:3370.
  - update to 42.0.3:
    * Fixed an initialization issue that caused key loading failures for some
      users.
  - Drop patch skip_openssl_memleak_test.patch not needed anymore.
* Wed Jan 31 2024 dmueller@suse.com
  - update to 42.0.2:
    * Updated Windows, macOS, and Linux wheels to be compiled with
      OpenSSL 3.2.1.
    * Fixed an issue that prevented the use of Python buffer
      protocol objects in sign and verify methods on asymmetric
      keys.
    * Fixed an issue with incorrect keyword-argument naming with
      EllipticCurvePrivateKey :meth:`~cryptography.hazmat.primitive
      s.asymmetric.ec.EllipticCurvePrivateKey.exchange`,
      X25519PrivateKey :meth:`~cryptography.hazmat.primitives.asymm
      etric.x25519.X25519PrivateKey.exchange`, X448PrivateKey :meth
      :`~cryptography.hazmat.primitives.asymmetric.x448.X448Private
      Key.exchange`, and DHPrivateKey :meth:`~cryptography.hazmat.p
      rimitives.asymmetric.dh.DHPrivateKey.exchange`.
* Mon Jan 29 2024 dmueller@suse.com
  - update to 42.0.1:
    * Fixed an issue with incorrect keyword-argument naming with
      EllipticCurvePrivateKey :meth:`~cryptography.hazmat.primitive
      s.asymmetric.ec.EllipticCurvePrivateKey.sign`.
    * Resolved compatibility issue with loading certain RSA public
      keys in :func:`~cryptography.hazmat.primitives.serialization.
      load_pem_public_key`.
    * BACKWARDS INCOMPATIBLE: Dropped support for LibreSSL < 3.7.
    * BACKWARDS INCOMPATIBLE: Loading a PKCS7 with no content field
      using :func:`~cryptography.hazmat.primitives.serialization.pk
      cs7.load_pem_pkcs7_certificates` or :func:`~cryptography.hazm
      at.primitives.serialization.pkcs7.load_der_pkcs7_certificates
      ` will now raise a ValueError rather than return an empty
      list.
    * Parsing SSH certificates no longer permits malformed critical
      options with values, as documented in the 41.0.2 release
      notes.
    * Updated Windows, macOS, and Linux wheels to be compiled with
      OpenSSL 3.2.0.
    * Updated the minimum supported Rust version (MSRV) to 1.63.0,
      from 1.56.0.
    * We now publish both py37 and py39 abi3 wheels. This should
      resolve some errors relating to initializing a module
      multiple times per process.
    * Support :class:`~cryptography.hazmat.primitives.asymmetric.pa
      dding.PSS` for X.509 certificate signing requests and
      certificate revocation lists with the keyword-only argument
      rsa_padding on the sign methods for
      :class:`~cryptography.x509.CertificateSigningRequestBuilder`
      and
      :class:`~cryptography.x509.CertificateRevocationListBuilder`.
    * Added support for obtaining X.509 certificate signing request
      signature algorithm parameters (including PSS) via :meth:`~cr
      yptography.x509.CertificateSigningRequest.signature_algorithm
      _parameters`.
    * Added support for obtaining X.509 certificate revocation list
      signature algorithm parameters (including PSS) via :meth:`~cr
      yptography.x509.CertificateRevocationList.signature_algorithm
      _parameters`.
    * Added mgf property to :class:`~cryptography.hazmat.primitives
      .asymmetric.padding.PSS`.
    * Added algorithm and mgf properties to :class:`~cryptography.h
      azmat.primitives.asymmetric.padding.OAEP`.
    * Added the following properties that return timezone-aware
      datetime objects:
      :meth:`~cryptography.x509.Certificate.not_valid_before_utc`,
      :meth:`~cryptography.x509.Certificate.not_valid_after_utc`, :
      meth:`~cryptography.x509.RevokedCertificate.revocation_date_u
      tc`, :meth:`~cryptography.x509.CertificateRevocationList.next
      _update_utc`, :meth:`~cryptography.x509.CertificateRevocation
      List.last_update_utc`. These are timezone-aware variants of
      existing properties that return naïve datetime objects.
    * Deprecated the following properties that return naïve
      datetime objects:
      :meth:`~cryptography.x509.Certificate.not_valid_before`,
      :meth:`~cryptography.x509.Certificate.not_valid_after`, :meth
      :`~cryptography.x509.RevokedCertificate.revocation_date`, :me
      th:`~cryptography.x509.CertificateRevocationList.next_update`
      , :meth:`~cryptography.x509.CertificateRevocationList.last_up
      date` in favor of the new timezone-aware variants mentioned
      above.
    * Added support for :class:`~cryptography.hazmat.primitives.cip
      hers.algorithms.ChaCha20` on LibreSSL.
    * Added support for RSA PSS signatures in PKCS7 with :meth:`~cr
      yptography.hazmat.primitives.serialization.pkcs7.PKCS7Signatu
      reBuilder.add_signer`.
    * In the next release (43.0.0) of cryptography, loading an
      X.509 certificate with a negative serial number will raise an
      exception. This has been deprecated since 36.0.0.
    * Added support for :class:`~cryptography.hazmat.primitives.cip
      hers.aead.AESGCMSIV` when using OpenSSL 3.2.0+.
    * Added the :mod:`X.509 path validation
      <cryptography.x509.verification>` APIs for
      :class:`~cryptography.x509.Certificate` chains. These APIs
      should be considered unstable and not subject to our
      stability guarantees until documented as such in a future
      release.
    * Added support for :class:`~cryptography.hazmat.primitives.cip
      hers.algorithms.SM4`
      :class:`~cryptography.hazmat.primitives.ciphers.modes.GCM`
      when using OpenSSL 3.0 or greater.
  - use PEP517 build
  - switch to new cargo-vendor
* Tue Nov 28 2023 dmueller@suse.com
  - update to 41.0.7 (CVE-2023-49083, bsc#1217592):
    * Fixed compilation when using LibreSSL 3.8.2.
    * Fixed a null-pointer-dereference and segfault that could
      occur when loading certificates from a PKCS#7 bundle.
      Credit to **pkuzco** for reporting the issue. **CVE-2023-49083**
* Fri Nov 10 2023 dmueller@suse.com
  - update to 41.0.5:
    * Updated Windows, macOS, and Linux wheels to be compiled with
      OpenSSL 3.1.4.
    * Added a function to support an upcoming ``pyOpenSSL``
      release.
* Thu Oct 05 2023 dmueller@suse.com
  - update to 41.0.4:
    * Updated Windows, macOS, and Linux wheels to be compiled with
      OpenSSL 3.1.3.
* Tue Aug 08 2023 dmueller@suse.com
  - update to 41.0.3:
    * Fixed performance regression loading DH public keys.
    * Fixed a memory leak when using
    * :class:`~cryptography.hazmat.primitives.ciphers.aead.ChaCha20
      Poly1305`.
* Tue Jul 11 2023 dmueller@suse.com
  - update to 41.0.2 (bsc#1213378, CVE-2023-38325):
    * Fixed bugs in creating and parsing SSH certificates where
      critical options with values were handled incorrectly.
      Certificates are now created correctly and parsing accepts
      correct values as well as the previously generated
      invalid forms with a warning. In the next release, support
      for parsing these invalid forms will be removed.
* Tue Jul 11 2023 kastl@b1-systems.de
  - remove patch remove_python_3_6_deprecation_warning.patch as the
    warning was already removed upstream
* Mon Jul 10 2023 mcepl@suse.com
  - Add no-pytest_benchmark.patch, which remove dependency on
    pytest-benchmark and coveralls (We don't need no benchmarking
    and coverage measurement; bsc#1213005).
* Mon Jun 19 2023 dmueller@suse.com
  - update to 41.0.1 (bsc#1212568):
    * Temporarily allow invalid ECDSA signature algorithm
      parameters in X.509 certificates, which are
      generated by older versions of Java.
    * Allow null bytes in pass phrases when serializing private
      keys.
    * **BACKWARDS INCOMPATIBLE:** Support for OpenSSL less than
      1.1.1d has been removed.  Users on older version of
      OpenSSL will need to upgrade.
    * **BACKWARDS INCOMPATIBLE:** Support for Python 3.6 has been
      removed.
    * **BACKWARDS INCOMPATIBLE:** Dropped support for LibreSSL <
      3.6.
    * Updated the minimum supported Rust version (MSRV) to 1.56.0,
      from 1.48.0.
    * Added support for the
      :class:`~cryptography.x509.OCSPAcceptableResponses`
      OCSP extension.
    * Added support for the
      :class:`~cryptography.x509.MSCertificateTemplate`
      proprietary Microsoft certificate extension.
    * Implemented support for equality checks on all asymmetric
      public key types.
    * Added support for ``aes256-gcm@openssh.com`` encrypted keys
      in :func:`~cryptography.hazmat.primitives.serialization.load_ssh
      _private_key`.
    * Added support for obtaining X.509 certificate signature
      algorithm parameters (including PSS)
* Fri Apr 21 2023 dmueller@suse.com
  - add sle15_python_module_pythons (jsc#PED-68)
* Sat Apr 15 2023 dmueller@suse.com
  - update to 40.0.2:
    * Fixed compilation when using LibreSSL 3.7.2.
* Thu Apr 13 2023 mcepl@suse.com
  - Make calling of %{sle15modernpython} optional.
* Mon Mar 27 2023 kastl@b1-systems.de
  - rebase patch remove_python_3_6_deprecation_warning.patch
* Sun Mar 26 2023 dmueller@suse.com
  - update to 40.0.1:
    * Support for Python 3.6 is deprecated and will be removed in
      the next release.
    * Deprecated the current minimum supported Rust version (MSRV)
      of 1.48.0. In the next release we will raise MSRV to 1.56.0.
      Users with the latest ``pip`` will typically get a wheel
      and not need Rust installed
    * Deprecated support for OpenSSL less than 1.1.1d. The next
      release of ``cryptography`` will drop support for older versions.
    * Deprecated support for DSA keys in
      :func:`~cryptography.hazmat.primitives.serialization.load_s
      sh_public_key`
      and
      :func:`~cryptography.hazmat.primitives.serialization.load_s
      sh_private_key`.
    * Deprecated support for OpenSSH serialization in
      :class:`~cryptography.hazmat.primitives.asymmetric.dsa.DSAP
      ublicKey`
      and
      :class:`~cryptography.hazmat.primitives.asymmetric.dsa.DSAP
      rivateKey`.
    * Added support for parsing SSH certificates in addition to
      public keys with
      :func:`~cryptography.hazmat.primitives.serialization.load_s
      sh_public_identity`.
      :func:`~cryptography.hazmat.primitives.serialization.load_s
      sh_public_key` continues to support only public keys.
    * Added support for generating SSH certificates with
      :class:`~cryptography.hazmat.primitives.serialization.SSHCe
      rtificateBuilder`.
    * Added :meth:`~cryptography.x509.Certificate.verify_directly_i
      ssued_by` to
    :class:`~cryptography.x509.Certificate`.
    * Added a check to :class:`~cryptography.x509.NameConstraints`
      to ensure that :class:`~cryptography.x509.DNSName` constraints
      do not contain any ``*`` wildcards.
    * Removed many unused CFFI OpenSSL bindings. This will not
      impact you unless you are using ``cryptography`` to directly
      invoke OpenSSL's C API. Note that
      these have never been considered a stable, supported,
      public API by ``cryptography``, this note is included as a courtesy.
    * The X.509 builder classes now raise ``UnsupportedAlgorithm``
      instead of ``ValueError`` if an unsupported hash algorithm is passed.
    * Added public union type aliases for type hinting
* Tue Mar 07 2023 dmueller@suse.com
  - update to 39.0.2:
    * Fixed a bug where the content type header was not properly
      encoded for PKCS7 signatures when using the ``Text`` option and
      ``SMIME`` encoding.
* Thu Feb 09 2023 mcepl@suse.com
  - Update to 39.0.1 (bsc#1208036, CVE-2023-23931):
    * SECURITY ISSUE - Fixed a bug where Cipher.update_into
      accepted Python buffer protocol objects, but allowed
      immutable buffers. CVE-2023-23931
    * drops CVE-2023-23931-dont-allow-update-into.patch in older dists
    * Updated Windows, macOS, and Linux wheels to be compiled with
      OpenSSL 3.0.8.
* Thu Jan 12 2023 kastl@b1-systems.de
  - adjust patch remove_python_3_6_deprecation_warning.patch to version
    39.0.0
* Mon Jan 02 2023 dmueller@suse.com
  - update to 39.0.0:
    * **BACKWARDS INCOMPATIBLE:** Support for OpenSSL 1.1.0 has been removed.
    Users on older version of OpenSSL will need to upgrade.
    * **BACKWARDS INCOMPATIBLE:** Dropped support for LibreSSL < 3.5. The new
    minimum LibreSSL version is 3.5.0. Going forward our policy is to support
    versions of LibreSSL that are available in versions of OpenBSD that are
    still receiving security support.
    * **BACKWARDS INCOMPATIBLE:** Removed the ``encode_point`` and
    ``from_encoded_point`` methods on
    :class:`~cryptography.hazmat.primitives.asymmetric.ec.EllipticCurvePublicNumbers`,
    which had been deprecated for several years.
    :meth:`~cryptography.hazmat.primitives.asymmetric.ec.EllipticCurvePublicKey.public_bytes`
    and
    :meth:`~cryptography.hazmat.primitives.asymmetric.ec.EllipticCurvePublicKey.from_encoded_point`
    should be used instead.
    * **BACKWARDS INCOMPATIBLE:** Support for using MD5 or SHA1 in
    :class:`~cryptography.x509.CertificateBuilder`, other X.509 builders, and
    PKCS7 has been removed.
    * **ANNOUNCEMENT:** The next version of ``cryptography`` (40.0) will
      change
    the way we link OpenSSL. This will only impact users who build
    ``cryptography`` from source (i.e., not from a ``wheel``), and specify their
    own version of OpenSSL. For those users, the ``CFLAGS``, ``LDFLAGS``,
    ``INCLUDE``, ``LIB``, and ``CRYPTOGRAPHY_SUPPRESS_LINK_FLAGS`` environment
    variables will no longer be respected. Instead, users will need to
    configure their builds `as documented here`_.
    * Added support for disabling the legacy provider in OpenSSL 3.0.x
    * Added support for disabling RSA key validation checks when loading RSA
    keys via
    ~cryptography.hazmat.primitives.serialization.load_pem_private_key
    ~cryptography.hazmat.primitives.serialization.load_der_private_key
    ~cryptography.hazmat.primitives.asymmetric.rsa.RSAPrivateNumbers.private_key
    * Added support for creating OCSP requests with precomputed hashes using
    :meth:`~cryptography.x509.ocsp.OCSPRequestBuilder.add_certificate_by_hash`.
    * Added support for loading multiple PEM-encoded X.509 certificates from
    a single input via :func:`~cryptography.x509.load_pem_x509_certificates`.
* Wed Dec 07 2022 yarunachalam@suse.com
  - Update to version 38.0.4
    * Fixed compilation when using LibreSSL 3.6.0.
    * Fixed error when using py2app to build an application with a cryptography dependency.
* Thu Nov 03 2022 mcepl@suse.com
  - update to 38.0.3:
    - Updated Windows, macOS, and Linux wheels to be compiled
      with OpenSSL 3.0.7, which resolves CVE-2022-3602 and
      CVE-2022-3786.
* Thu Sep 29 2022 dmueller@suse.com
  - update to 38.0.1:
    * Fixed parsing TLVs in ASN.1 with length greater than 65535 bytes (typically
      seen in large CRLs).
    * Final deprecation of OpenSSL 1.1.0. The next release of ``cryptography``
      will drop support.
    * We no longer ship ``manylinux2010`` wheels. Users should upgrade to the
      latest ``pip`` to ensure this doesn't cause issues downloading wheels on
      their platform. We now ship ``manylinux_2_28`` wheels for users on new
      enough platforms.
    * Updated the minimum supported Rust version (MSRV) to 1.48.0, from 1.41.0.
      Users with the latest ``pip`` will typically get a wheel and not need Rust
      installed, but check :doc:`/installation` for documentation on installing a
      newer ``rustc`` if required.
    * :meth:`~cryptography.fernet.Fernet.decrypt` and related methods now accept
      both ``str`` and ``bytes`` tokens.
    * Parsing ``CertificateSigningRequest`` restores the behavior of enforcing
      that the ``Extension`` ``critical`` field must be correctly encoded DER. See
      `the issue <https://github.com/pyca/cryptography/issues/6368>`_ for complete
      details.
    * Added two new OpenSSL functions to the bindings to support an upcoming
      ``pyOpenSSL`` release.
    * When parsing :class:`~cryptography.x509.CertificateRevocationList` and
      :class:`~cryptography.x509.CertificateSigningRequest` values, it is now
      enforced that the ``version`` value in the input must be valid according to
      the rules of :rfc:`2986` and :rfc:`5280`.
    * Using MD5 or SHA1 in :class:`~cryptography.x509.CertificateBuilder` and
      other X.509 builders is deprecated and support will be removed in the next
      version.
    * Added additional APIs to
      :class:`~cryptography.x509.certificate_transparency.SignedCertificateTimestamp`, including
      :attr:`~cryptography.x509.certificate_transparency.SignedCertificateTimestamp.signature_hash_algorithm`,
      :attr:`~cryptography.x509.certificate_transparency.SignedCertificateTimestamp.signature_algorithm`,
      :attr:`~cryptography.x509.certificate_transparency.SignedCertificateTimestamp.signature`, and
      :attr:`~cryptography.x509.certificate_transparency.SignedCertificateTimestamp.extension_bytes`.
    * Added :attr:`~cryptography.x509.Certificate.tbs_precertificate_bytes`, allowing
      users to access the to-be-signed pre-certificate data needed for signed
      certificate timestamp verification.
    * :class:`~cryptography.hazmat.primitives.kdf.kbkdf.KBKDFHMAC` and
      :class:`~cryptography.hazmat.primitives.kdf.kbkdf.KBKDFCMAC` now support
      :attr:`~cryptography.hazmat.primitives.kdf.kbkdf.CounterLocation.MiddleFixed`
      counter location.
    * Fixed :rfc:`4514` name parsing to reverse the order of the RDNs according
      to the section 2.1 of the RFC, affecting method
      :meth:`~cryptography.x509.Name.from_rfc4514_string`.
    * It is now possible to customize some aspects of encryption when serializing
      private keys, using
      :meth:`~cryptography.hazmat.primitives.serialization.PrivateFormat.encryption_builder`.
    * Removed several legacy symbols from our OpenSSL bindings. Users of pyOpenSSL
      versions older than 22.0 will need to upgrade.
    * Added
      :class:`~cryptography.hazmat.primitives.ciphers.algorithms.AES128` and
      :class:`~cryptography.hazmat.primitives.ciphers.algorithms.AES256` classes.
      These classes do not replace
      :class:`~cryptography.hazmat.primitives.ciphers.algorithms.AES` (which
      allows all AES key lengths), but are intended for applications where
      developers want to be explicit about key length.
* Tue Jul 19 2022 dmueller@suse.com
  - update to 37.0.4:
    * updated wheels to b ecompiled against openssl 3.0.5
* Thu Jun 09 2022 asn@cryptomilk.org
  - Remove Python 3.6 deprecation warning on openSUSE Leap.
    * Added remove_python_3_6_deprecation_warning.patch
* Tue May 24 2022 dmueller@suse.com
  - update to 37.0.2:
    * Fixed an issue where parsing an encrypted private key with the public
      loader functions would hang waiting for console input on OpenSSL 3.0.x rather
      than raising an error.
    * Restored some legacy symbols for older ``pyOpenSSL`` users. These will be
      removed again in the future, so ``pyOpenSSL`` users should still upgrade
      to the latest version of that package when they upgrade ``cryptography``.
    * Updated Windows, macOS, and Linux wheels to be compiled with OpenSSL 3.0.2.
    * **BACKWARDS INCOMPATIBLE:** Dropped support for LibreSSL 2.9.x and 3.0.x.
      The new minimum LibreSSL version is 3.1+.
    * **BACKWARDS INCOMPATIBLE:** Removed ``signer`` and ``verifier`` methods
      from the public key and private key classes. These methods were originally
      deprecated in version 2.0, but had an extended deprecation timeline due
      to usage. Any remaining users should transition to ``sign`` and ``verify``.
    * Deprecated OpenSSL 1.1.0 support. OpenSSL 1.1.0 is no longer supported by
      the OpenSSL project. The next release of ``cryptography`` will be the last
      to support compiling with OpenSSL 1.1.0.
    * Deprecated Python 3.6 support. Python 3.6 is no longer supported by the
      Python core team. Support for Python 3.6 will be removed in a future
      ``cryptography`` release.
    * Deprecated the current minimum supported Rust version (MSRV) of 1.41.0.
      In the next release we will raise MSRV to 1.48.0. Users with the latest
      ``pip`` will typically get a wheel and not need Rust installed, but check
      :doc:`/installation` for documentation on installing a newer ``rustc`` if
      required.
    * Deprecated
      :class:`~cryptography.hazmat.primitives.ciphers.algorithms.CAST5`,
      :class:`~cryptography.hazmat.primitives.ciphers.algorithms.SEED`,
      :class:`~cryptography.hazmat.primitives.ciphers.algorithms.IDEA`, and
      :class:`~cryptography.hazmat.primitives.ciphers.algorithms.Blowfish` because
      they are legacy algorithms with extremely low usage. These will be removed
      in a future version of ``cryptography``.
    * Added limited support for distinguished names containing a bit string.
    * We now ship ``universal2`` wheels on macOS, which contain both ``arm64``
      and ``x86_64`` architectures. Users on macOS should upgrade to the latest
      ``pip`` to ensure they can use this wheel, although we will continue to
      ship ``x86_64`` specific wheels for now to ease the transition.
    * This will be the final release for which we ship ``manylinux2010`` wheels.
      Going forward the minimum supported ``manylinux`` ABI for our wheels will
      be ``manylinux2014``. The vast majority of users will continue to receive
      ``manylinux`` wheels provided they have an up to date ``pip``. For PyPy
      wheels this release already requires ``manylinux2014`` for compatibility
      with binaries distributed by upstream.
    * Added support for multiple
      :class:`~cryptography.x509.ocsp.OCSPSingleResponse` in a
      :class:`~cryptography.x509.ocsp.OCSPResponse`.
    * Restored support for signing certificates and other structures in
      :doc:`/x509/index` with SHA3 hash algorithms.
    * :class:`~cryptography.hazmat.primitives.ciphers.algorithms.TripleDES` is
      disabled in FIPS mode.
    * Added support for serialization of PKCS#12 CA friendly names/aliases in
      :func:`~cryptography.hazmat.primitives.serialization.pkcs12.serialize_key_and_certificates`
    * Added support for 12-15 byte (96 to 120 bit) nonces to
      :class:`~cryptography.hazmat.primitives.ciphers.aead.AESOCB3`. This class
      previously supported only 12 byte (96 bit).
    * Added support for
      :class:`~cryptography.hazmat.primitives.ciphers.aead.AESSIV` when using
      OpenSSL 3.0.0+.
    * Added support for serializing PKCS7 structures from a list of
      certificates with
      :class:`~cryptography.hazmat.primitives.serialization.pkcs7.serialize_certificates`.
    * Added support for parsing :rfc:`4514` strings with
      :meth:`~cryptography.x509.Name.from_rfc4514_string`.
    * Added :attr:`~cryptography.hazmat.primitives.asymmetric.padding.PSS.AUTO` to
      :class:`~cryptography.hazmat.primitives.asymmetric.padding.PSS`. This can
      be used to verify a signature where the salt length is not already known.
    * Added :attr:`~cryptography.hazmat.primitives.asymmetric.padding.PSS.DIGEST_LENGTH`
      to :class:`~cryptography.hazmat.primitives.asymmetric.padding.PSS`. This
      constant will set the salt length to the same length as the ``PSS`` hash
      algorithm.
    * Added support for loading RSA-PSS key types with
      :func:`~cryptography.hazmat.primitives.serialization.load_pem_private_key`
      and
      :func:`~cryptography.hazmat.primitives.serialization.load_der_private_key`.
      This functionality is limited to OpenSSL 1.1.1e+ and loads the key as a
      normal RSA private key, discarding the PSS constraint information.
* Sat Mar 26 2022 dmueller@suse.com
  - update to 36.0.2:
    * Updated Windows, macOS, and Linux wheels to be compiled with OpenSSL 1.1.1n.
* Wed Feb 16 2022 dmueller@suse.com
  - split tests in a multibuild variant to optimize rebuild time a bit
* Mon Dec 20 2021 dmueller@suse.com
  - update to 36.0.1:
    * Updated Windows, macOS, and Linux wheels to be compiled with OpenSSL 1.1.1m.
* Sat Nov 27 2021 dmueller@suse.com
  - update to 36.0.0:
    * FINAL DEPRECATION Support for verifier and signer on our asymmetric key
      classes was deprecated in version 2.1. These functions had an extended
      deprecation due to usage, however the next version of cryptography will
      drop support. Users should migrate to sign and verify.
    * The entire X.509 layer is now written in Rust. This allows alternate
      asymmetric key implementations that can support cloud key management
      services or hardware security modules provided they implement the necessary
      interface (for example: EllipticCurvePrivateKey).
    * Deprecated the backend argument for all functions.
    * Added support for AESOCB3.
    * Added support for iterating over arbitrary request attributes.
    * Deprecated the get_attribute_for_oid method on CertificateSigningRequest in
      favor of get_attribute_for_oid() on the new Attributes object.
    * Fixed handling of PEM files to allow loading when certificate and key are
      in the same file.
    * Fixed parsing of CertificatePolicies extensions containing legacy BMPString values in their explicitText.
    * Allow parsing of negative serial numbers in certificates. Negative serial
      numbers are prohibited by RFC 5280 so a deprecation warning will be raised
      whenever they are encountered. A future version of cryptography will drop
      support for parsing them.
    * Added support for parsing PKCS12 files with friendly names for all
      certificates with load_pkcs12(), which will return an object of type
      PKCS12KeyAndCertificates.
    * rfc4514_string() and related methods now have an optional
      attr_name_overrides parameter to supply custom OID to name mappings, which
      can be used to match vendor-specific extensions.
    * BACKWARDS INCOMPATIBLE: Reverted the nonstandard formatting of email
      address fields as E in rfc4514_string() methods from version 35.0.
    * The previous behavior can be restored with:
      name.rfc4514_string({NameOID.EMAIL_ADDRESS: "E"})
    * Allow X25519PublicKey and X448PublicKey to be used as public keys when
      parsing certificates or creating them with CertificateBuilder. These key
      types must be signed with a different signing algorithm as X25519 and X448
      do not support signing.
    * Extension values can now be serialized to a DER byte string by calling public_bytes().
    * Added experimental support for compiling against BoringSSL. As BoringSSL
      does not commit to a stable API, cryptography tests against the latest
      commit only. Please note that several features are not available when
      building against BoringSSL.
    * Parsing CertificateSigningRequest from DER and PEM now, for a limited time
      period, allows the Extension critical field to be incorrectly encoded. See
      the issue for complete details. This will be reverted in a future
      cryptography release.
    * When OCSPNonce are parsed and generated their value is now correctly
      wrapped in an ASN.1 OCTET STRING. This conforms to RFC 6960 but conflicts
      with the original behavior specified in RFC 2560. For a temporary period
      for backwards compatibility, we will also parse values that are encoded as
      specified in RFC 2560 but this behavior will be removed in a future
      release.
    * Changed the version scheme. This will result in us incrementing the major
      version more frequently, but does not change our existing backwards
      compatibility policy.
    * BACKWARDS INCOMPATIBLE: The X.509 PEM parsers now require that the PEM
      string passed have PEM delimiters of the correct type. For example, parsing
      a private key PEM concatenated with a certificate PEM will no longer be
      accepted by the PEM certificate parser.
    * BACKWARDS INCOMPATIBLE: The X.509 certificate parser no longer allows
      negative serial numbers. RFC 5280 has always prohibited these.
    * BACKWARDS INCOMPATIBLE: Additional forms of invalid ASN.1 found during
      X.509 parsing will raise an error on initial parse rather than when the
      malformed field is accessed.
    * Rust is now required for building cryptography, the
      CRYPTOGRAPHY_DONT_BUILD_RUST environment variable is no longer respected.
    * Parsers for X.509 no longer use OpenSSL and have been rewritten in Rust.
      This should be backwards compatible (modulo the items listed above) and
      improve both security and performance.
    * Added support for OpenSSL 3.0.0 as a compilation target.
    * Added support for SM3 and SM4, when using OpenSSL 1.1.1. These algorithms
      are provided for compatibility in regions where they may be required, and
      are not generally recommended.
    * We now ship manylinux_2_24 and musllinux_1_1 wheels, in addition to our
      manylinux2010 and manylinux2014 wheels. Users on distributions like Alpine
      Linux should ensure they upgrade to the latest pip to correctly receive
      wheels.
    * Added rfc4514_attribute_name attribute to x509.NameAttribute.
  - drop disable-uneven-sizes-tests.patch (upstream)
  - drop disable-RustExtension.patch: building rust extension now
* Tue Oct 12 2021 code@bnavigator.de
  - Add disable-RustExtension.patch in order to avoid a build
    requirement setuptools_rust
  - Next version (35.0) needs a full Rust toolchain.
  - Clean runtime, build and test requirements
  - Disable python2 build: Not supported anymore
* Mon Oct 04 2021 adrian@suse.de
  - update to 3.4.8
  - keep new rust support disabled for now to avoid new dependencies
* Mon Apr 26 2021 mcepl@suse.com
  - Remove unnecessary %ifpython3 construct
* Sun Feb 07 2021 michael@stroeder.com
  - update to 3.3.2 (bsc#1182066, CVE-2020-36242, bsc#1198331):
    * SECURITY ISSUE: Fixed a bug where certain sequences of update()
      calls when symmetrically encrypting very large payloads (>2GB) could
      result in an integer overflow, leading to buffer overflows.
      CVE-2020-36242
    - drops CVE-2020-36242-buffer-overflow.patch on older dists
* Sun Dec 20 2020 dmueller@suse.com
  - update to 3.3.1:
    * Re-added a legacy symbol causing problems for older ``pyOpenSSL`` use
* Wed Dec 09 2020 mrueckert@suse.de
  - update to 3.3.0
    - BACKWARDS INCOMPATIBLE: Support for Python 3.5 has been removed
      due to low usage and maintenance burden.
    - BACKWARDS INCOMPATIBLE: The GCM and AESGCM now require 64-bit
      to 1024-bit (8 byte to 128 byte) initialization vectors. This
      change is to conform with an upcoming OpenSSL release that will
      no longer support sizes outside this window.
    - BACKWARDS INCOMPATIBLE: When deserializing asymmetric keys we
      now raise ValueError rather than UnsupportedAlgorithm when an
      unsupported cipher is used. This change is to conform with an
      upcoming OpenSSL release that will no longer distinguish
      between error types.
    - BACKWARDS INCOMPATIBLE: We no longer allow loading of finite
      field Diffie-Hellman parameters of less than 512 bits in
      length. This change is to conform with an upcoming OpenSSL
      release that no longer supports smaller sizes. These keys were
      already wildly insecure and should not have been used in any
      application outside of testing.
    - Updated Windows, macOS, and manylinux wheels to be compiled
      with OpenSSL 1.1.1i.
    - Python 2 support is deprecated in cryptography. This is the
      last release that will support Python 2.
    - Added the recover_data_from_signature() function to
      RSAPublicKey for recovering the signed data from an RSA
      signature.
* Sun Dec 06 2020 mcepl@suse.com
  - Remove unnecessary dependency virtualenv.
* Wed Oct 28 2020 michael@stroeder.com
  - update to 3.2.1:
    Disable blinding on RSA public keys to address an error with
    some versions of OpenSSL.
* Mon Oct 26 2020 michael@stroeder.com
  - update to 3.2 (bsc#1178168, CVE-2020-25659):
    * CVE-2020-25659: Attempted to make RSA PKCS#1v1.5 decryption more constant time,
      to protect against Bleichenbacher vulnerabilities. Due to limitations imposed
      by our API, we cannot completely mitigate this vulnerability.
    * Support for OpenSSL 1.0.2 has been removed.
    * Added basic support for PKCS7 signing (including SMIME) via PKCS7SignatureBuilder.
  - drops 5507-mitigate-Bleichenbacher-attacks.patch on older dists
* Mon Sep 28 2020 dmueller@suse.com
  - update to 3.1.1:
    * wheels compiled with OpenSSL 1.1.1h.
* Fri Sep 18 2020 dmueller@suse.com
  - update to 3.1:
    * **BACKWARDS INCOMPATIBLE:** Removed support for ``idna`` based
      :term:`U-label` parsing in various X.509 classes. This support was originally
      deprecated in version 2.1 and moved to an extra in 2.5.
    * Deprecated OpenSSL 1.0.2 support. OpenSSL 1.0.2 is no longer supported by
      the OpenSSL project. The next version of ``cryptography`` will drop support
      for it.
    * Deprecated support for Python 3.5. This version sees very little use and will
      be removed in the next release.
    * ``backend`` arguments to functions are no longer required and the
      default backend will automatically be selected if no ``backend`` is provided.
    * Added initial support for parsing certificates from PKCS7 files with
      :func:`~cryptography.hazmat.primitives.serialization.pkcs7.load_pem_pkcs7_certificates`
      and
      :func:`~cryptography.hazmat.primitives.serialization.pkcs7.load_der_pkcs7_certificates`
      .
    * Calling ``update`` or ``update_into`` on
      :class:`~cryptography.hazmat.primitives.ciphers.CipherContext` with ``data``
      longer than 2\ :sup:`31` bytes no longer raises an ``OverflowError``. This
      also resolves the same issue in :doc:`/fernet`.
* Tue Jul 28 2020 mimi.vx@gmail.com
  - update to 3.0
  - refreshed disable-uneven-sizes-tests.patch and  skip_openssl_memleak_test.patch
    * Removed support for passing an Extension instance
      to from_issuer_subject_key_identifier(), as per our deprecation policy.
    * Support for LibreSSL 2.7.x, 2.8.x, and 2.9.0 has been removed
    * Dropped support for macOS 10.9, macOS users must upgrade to 10.10 or newer.
    * RSA generate_private_key() no longer accepts public_exponent values except
      65537 and 3 (the latter for legacy purposes).
    * X.509 certificate parsing now enforces that the version field contains
      a valid value, rather than deferring this check until version is accessed.
    * Deprecated support for Python 2
    * Added support for OpenSSH serialization format for ec, ed25519, rsa and dsa
      private keys: load_ssh_private_key() for loading and OpenSSH for writing.
    * Added support for OpenSSH certificates to load_ssh_public_key().
    * Added encrypt_at_time() and decrypt_at_time() to Fernet.
    * Added support for the SubjectInformationAccess X.509 extension.
    * Added support for parsing SignedCertificateTimestamps in OCSP responses.
    * Added support for parsing attributes in certificate signing requests via get_attribute_for_oid().
    * Added support for encoding attributes in certificate signing requests via add_attribute().
    * On OpenSSL 1.1.1d and higher cryptography now uses OpenSSL’s built-in CSPRNG
      instead of its own OS random engine because these versions of OpenSSL properly reseed on fork.
    * Added initial support for creating PKCS12 files with serialize_key_and_certificates().
* Fri May 15 2020 michael@stroeder.com
  - update to 2.9.2
    * 2.9.2 - 2020-04-22
    - Updated the macOS wheel to fix an issue where it would not run on macOS versions older than 10.15.
    * 2.9.1 - 2020-04-21
    - Updated Windows, macOS, and manylinux wheels to be compiled with OpenSSL 1.1.1g.
    * 2.9 - 2020-04-02
    - BACKWARDS INCOMPATIBLE: Support for Python 3.4 has been removed due to
      low usage and maintenance burden.
    - BACKWARDS INCOMPATIBLE: Support for OpenSSL 1.0.1 has been removed.
      Users on older version of OpenSSL will need to upgrade.
    - BACKWARDS INCOMPATIBLE: Support for LibreSSL 2.6.x has been removed.
    - Removed support for calling public_bytes() with no arguments, as per
      our deprecation policy. You must now pass encoding and format.
    - BACKWARDS INCOMPATIBLE: Reversed the order in which rfc4514_string()
      returns the RDNs as required by RFC 4514.
    - Updated Windows, macOS, and manylinux wheels to be compiled with OpenSSL 1.1.1f.
    - Added support for parsing single_extensions in an OCSP response.
    - NameAttribute values can now be empty strings.
* Thu Oct 17 2019 michael@stroeder.com
  - update to 2.8
    * Added support for Python 3.8.
    * Added class methods Poly1305.generate_tag and Poly1305.verify_tag for Poly1305 sign and verify operations.
    * Deprecated support for OpenSSL 1.0.1. Support will be removed in cryptography 2.9.
    * We now ship manylinux2010 wheels in addition to our manylinux1 wheels.
    * Added support for ed25519 and ed448 keys in the CertificateBuilder, CertificateSigningRequestBuilder, CertificateRevocationListBuilder and OCSPResponseBuilder.
    * cryptography no longer depends on asn1crypto.
    * FreshestCRL is now allowed as a CertificateRevocationList extension.
* Mon Jun 03 2019 mimi.vx@gmail.com
  - update to 2.7
    * BACKWARDS INCOMPATIBLE: Removed the cryptography.hazmat.primitives.mac.MACContext interface.
    The CMAC and HMAC APIs have not changed, but they are no longer registered
    as MACContext instances.
    * Removed support for running our tests with setup.py test.
    * Add support for :class:`~cryptography.hazmat.primitives.poly1305.Poly1305`
    when using OpenSSL 1.1.1 or newer.
    * Support serialization with Encoding.OpenSSH and PublicFormat.OpenSSH
    in :meth:`Ed25519PublicKey.public_bytes <cryptography.hazmat.primitives.asymmetric.ed25519.Ed25519PublicKey.public_bytes>` .
    * Correctly allow passing a SubjectKeyIdentifier to :meth:`~cryptography.x509.AuthorityKeyIdentifier.from_issuer_subject_key_identifier`
    and deprecate passing an Extension object.
* Wed May 29 2019 tchvatal@suse.com
  - Simplify the test execution to be more understandable
* Thu Feb 28 2019 michael@stroeder.com
  - update to 2.6.1:
    * BACKWARDS INCOMPATIBLE:
      Removedcryptography.hazmat.primitives.asymmetric.utils.encode_rfc6979_signature
      andcryptography.hazmat.primitives.asymmetric.utils.decode_rfc6979_signature,
      which had been deprecated for nearly 4 years. Use encode_dss_signature()
      and decode_dss_signature()instead.
    * BACKWARDS INCOMPATIBLE: Removed cryptography.x509.Certificate.serial, which
      had been deprecated for nearly 3 years. Use serial_number instead.
    * Updated Windows, macOS, and manylinux1 wheels to be compiled with
      OpenSSL 1.1.1b.
    * Added support for Ed448 signing when using OpenSSL 1.1.1b or newer.
    * Added support for Ed25519 signing when using OpenSSL 1.1.1b or newer.
    * load_ssh_public_key() can now load ed25519 public keys.
    * Add support for easily mapping an object identifier to its elliptic curve
      class viaget_curve_for_oid().
    * Add support for OpenSSL when compiled with the no-engine
      (OPENSSL_NO_ENGINE) flag.
* Fri Jan 25 2019 michael@stroeder.com
  - Dependency on python-idna changed to "Recommends" aligned with
    change in upstream source (see below)
  - update to 2.5:
    * BACKWARDS INCOMPATIBLE: U-label strings were deprecated in version 2.1,
      but this version removes the default idna dependency as well. If you still
      need this deprecated path please install cryptography with the idna extra:
      pip install cryptography[idna].
    * BACKWARDS INCOMPATIBLE: The minimum supported PyPy version is now 5.4.
    * Numerous classes and functions have been updated to allow bytes-like
      types for keying material and passwords, including symmetric algorithms,
      AEAD ciphers, KDFs, loading asymmetric keys, and one time password classes.
    * Updated Windows, macOS, and manylinux1 wheels to be compiled with OpenSSL 1.1.1a.
    * Added support for SHA512_224 and SHA512_256 when using OpenSSL 1.1.1.
    * Added support for SHA3_224, SHA3_256, SHA3_384, and SHA3_512 when using OpenSSL 1.1.1.
    * Added support for X448 key exchange when using OpenSSL 1.1.1.
    * Added support for SHAKE128 and SHAKE256 when using OpenSSL 1.1.1.
    * Added initial support for parsing PKCS12 files with load_key_and_certificates().
    * Added support for IssuingDistributionPoint.
    * Added rfc4514_string() method to x509.Name,
      x509.RelativeDistinguishedName, and x509.NameAttribute to format the name
      or component an RFC 4514 Distinguished Name string.
    * Added from_encoded_point(), which immediately checks if the point is on
      the curve and supports compressed points. Deprecated the previous method
      from_encoded_point().
    * Added signature_hash_algorithm to OCSPResponse.
    * Updated X25519 key exchange support to allow additional serialization
      methods. Calling public_bytes() with no arguments has been deprecated.
    * Added support for encoding compressed and uncompressed points via
      public_bytes(). Deprecated the previous method encode_point().
* Thu Jan 03 2019 mpluskal@suse.com
  - Update to version 2.4.2:
    * Updated Windows, macOS, and manylinux1 wheels to be compiled
      with OpenSSL 1.1.0j.
* Thu Dec 06 2018 mcepl@suse.com
  - Update to 2.4.1:
    * Dropped support for LibreSSL 2.4.x.
    * Deprecated OpenSSL 1.0.1 support. OpenSSL 1.0.1 is no
      longer supported by the OpenSSL project. At this time there
      is no time table for dropping support, however we strongly
      encourage all users to upgrade or install cryptography from
      a wheel.
    * Added initial :doc:`OCSP </x509/ocsp>` support.
    * Added support for cryptography.x509.PrecertPoison.
* Thu Dec 06 2018 tchvatal@suse.com
  - Fix fdupes call
* Tue Aug 21 2018 tchvatal@suse.com
  - Update to 2.3.1:
    * updated tests for upstream wycheproof changes
    * many other tiny test tweaks
* Wed Jul 18 2018 michael@stroeder.com
  - update to 2.3:
    * SECURITY ISSUE: finalize_with_tag() allowed tag truncation by default
      which can allow tag forgery in some cases. The method now enforces the
      min_tag_length provided to the GCM constructor.
    * Added support for Python 3.7.
    * Added extract_timestamp() to get the authenticated timestamp of a Fernet token.
    * Support for Python 2.7.x without hmac.compare_digest has been deprecated.
      We will require Python 2.7.7 or higher (or 2.7.6 on Ubuntu) in the next
      cryptography release.
    * Fixed multiple issues preventing cryptography from compiling
      against LibreSSL 2.7.x.
    * Added get_revoked_certificate_by_serial_number for quick
      serial number searches in CRLs.
    * The RelativeDistinguishedName class now preserves the order of attributes.
      Duplicate attributes now raise an error instead of silently discarding duplicates.
    * aes_key_unwrap() and aes_key_unwrap_with_padding() now raise InvalidUnwrap
      if the wrapped key is an invalid length, instead of ValueError.
* Tue Jun 12 2018 mimi.vx@gmail.com
  - update to 2.2.2
    * fix build on some systems with openssl 1.1.0h
* Mon Mar 26 2018 tchvatal@suse.com
  - Cleanup with spec-cleaner
  - Use %setup to unpack all archives do not rely on tar calls
* Sun Mar 25 2018 michael@stroeder.com
  - Update to upstream release 2.2.1:
    * Reverted a change to GeneralNames which prohibited having zero elements,
      due to breakages.
    * Fixed a bug in
      :func:`~cryptography.hazmat.primitives.keywrap.aes_key_unwrap_with_padding`
      that caused it to raise InvalidUnwrap when key length modulo 8 was zero.
    * BACKWARDS INCOMPATIBLE: Support for Python 2.6 has been dropped.
    * Resolved a bug in HKDF that incorrectly constrained output size.
    * Added
      :class:`~cryptography.hazmat.primitives.asymmetric.ec.BrainpoolP256R1`,
      :class:`~cryptography.hazmat.primitives.asymmetric.ec.BrainpoolP384R1`, and
      :class:`~cryptography.hazmat.primitives.asymmetric.ec.BrainpoolP512R1` to
      support inter-operating with systems like German smart meters.
    * Added token rotation support to :doc:`Fernet </fernet>` with
      :meth:`~cryptography.fernet.MultiFernet.rotate`.
    * Fixed a memory leak in
      :func:`~cryptography.hazmat.primitives.asymmetric.ec.derive_private_key`.
    * Added support for AES key wrapping with padding via
      :func:`~cryptography.hazmat.primitives.keywrap.aes_key_wrap_with_padding` and
      :func:`~cryptography.hazmat.primitives.keywrap.aes_key_unwrap_with_padding` .
    * Allow loading DSA keys with 224 bit q.
* Fri Mar 02 2018 chris@computersalat.de
  - fix deps for hypothesis, pytest
* Thu Feb 08 2018 tbechtold@suse.com
  - Fix previous change and explicitly require python2 instead of
    python because python itself is also provided by python3.
    This fixes:
    ImportError: No module named _ssl
    when using python-cryptography in a python2 build environment
* Sat Feb 03 2018 tchvatal@suse.com
  - Fix the previous change to not pull in py2 on py3 enviroment
* Sat Jan 27 2018 dmueller@suse.com
  - fix requires on python ssl once more after the last change
* Thu Jan 18 2018 tchvatal@suse.com
  - Add proper conditional for the python2, the ifpython works only
    for the requires/etc
* Tue Jan 16 2018 dmueller@suse.com
  - add missing dependency on python ssl
* Fri Dec 08 2017 arun@gmx.de
  - update to version 2.1.4:
    * Added X509_up_ref for an upcoming pyOpenSSL release.
* Thu Nov 09 2017 arun@gmx.de
  - update to version 2.1.3:
    * Updated Windows, macOS, and manylinux1 wheels to be compiled with
      OpenSSL 1.1.0g.
* Fri Nov 03 2017 arun@gmx.de
  - update to version 2.1.2:
    * Corrected a bug with the manylinux1 wheels where OpenSSL’s stack
      was marked executable.
* Thu Nov 02 2017 mimi.vx@gmail.com
  - fix BuildRequires conditions for python3
* Thu Oct 12 2017 michael@stroeder.com
  - update to 2.1.1
* Thu Sep 28 2017 sean.marlow@suse.com
  - Fix cffi version requirement.
* Thu Sep 07 2017 vcizek@suse.com
  - Disable memleak tests to fix build with OpenSSL 1.1 (bsc#1055478)
    * add skip_openssl_memleak_test.patch
* Thu Aug 03 2017 michael@stroeder.com
  - update to 2.0.3
* Thu Jul 27 2017 michael@stroeder.com
  - update to 2.0.2
* Mon Jul 17 2017 michael@stroeder.com
  - update to 2.0
* Wed May 31 2017 michael@stroeder.com
  - update to 1.9
* Tue May 02 2017 jmatejek@suse.com
  - add python-packaging to requirements explicitly instead of relying
    on setuptools to pull it in
* Mon Mar 20 2017 tbechtold@suse.com
  - Switch to singlespec approach
* Thu Mar 16 2017 tbechtold@suse.com
  - update to 1.8.1
  - Adust Requires and BuildRequires
* Sun Jan 29 2017 michael@stroeder.com
  - update to 1.7.2
* Wed Dec 14 2016 michael@stroeder.com
  - update to 1.7.1 which contains regression fix for 1.7
* Tue Dec 13 2016 mimi.vx@gmail.com
  - update to 1.7
    * support for OpenSSL 1.0.0 has been removed.
    * Added support for Diffie-Hellman key exchange
    * The OS random engine for OpenSSL has been rewritten
* Wed Nov 23 2016 michael@stroeder.com
  - update to 1.6
* Fri Nov 11 2016 michael@stroeder.com
  - update to 1.5.3
  - python-cryptography-enable-gost.patch is obsolete
* Mon Sep 26 2016 meissner@suse.com
  - python-cryptography-enable-gost.patch: temporary patch
    to run tests against 1.0.2i, GOST cert extraction now works.
* Sun Jul 17 2016 matwey.kornilov@gmail.com
  - Introduce requirement setuptools >= 11.3
    to follow egg-info/requires.txt content
* Mon Jun 06 2016 dmueller@suse.com
  - fix download urls
* Fri Jun 03 2016 michael@stroeder.com
  - update to upstream release 1.3.4
    * Added new OpenSSL functions to the bindings to support an upcoming
      ``pyOpenSSL`` release.
* Fri May 06 2016 dmueller@suse.com
  - correct source urls
* Thu May 05 2016 michael@stroeder.com
  - update to upstream release 1.3.2
    * Updated Windows and OS X wheels to be compiled against OpenSSL 1.0.2h.
    * Fixed an issue preventing ``cryptography`` from compiling against
      LibreSSL 2.3.x.
* Fri Mar 18 2016 michael@stroeder.com
  - removed obsolete cryptography-new-bio-new-type.patch
  - update to upstream release 1.3.1
    * Fixed a bug that caused an AttributeError when using mock to patch
      some cryptography modules.
    * Added support for padding ANSI X.923 with ANSIX923.
    * Deprecated support for OpenSSL 0.9.8. Support will be removed in
      cryptography 1.4.
    * Added support for the PolicyConstraints X.509 extension including both
      parsing and generation using CertificateBuilder and
      CertificateSigningRequestBuilder.
    * Added is_signature_valid to CertificateSigningRequest.
    * Fixed an intermittent AssertionError when performing an RSA decryption
      on an invalid ciphertext, ValueError is now correctly raised in all
      cases.
    * Added from_issuer_subject_key_identifier().
* Sun Mar 13 2016 dmueller@suse.com
  - fix license
* Wed Mar 02 2016 dimstar@opensuse.org
  - Add pkg-config BuildRequires: in order for the last introduced
    condition to apply the patch to work, pkg-config has to be
    present.
* Wed Mar 02 2016 meissner@suse.com
  - cryptography-new-bio-new-type.patch: openssl 1.0.2g changed
    the type of BIO_new_mem_buf() (added a const).
* Sat Jan 09 2016 michael@stroeder.com
  - update to upstream release 1.2.1
    1.2.1 - 2016-01-08
    * Reverts a change to an OpenSSL EVP_PKEY object that caused
      errors with pyOpenSSL.
    1.2 - 2016-01-08
    * BACKWARDS INCOMPATIBLE: RevokedCertificate extensions now
      uses extension classes rather than returning raw values
      inside the Extension value. The new classes are:
      o CertificateIssuer
      o CRLReason
      o InvalidityDate
    * Deprecated support for OpenSSL 0.9.8 and 1.0.0. At this time
      there is no time table for actually dropping support,
      however we strongly encourage all users to upgrade, as those
      versions no longer receive support from the OpenSSL project.
    * The Certificate class now has signature and
      tbs_certificate_bytes attributes.
    * The CertificateSigningRequest class now has signature and
      tbs_certrequest_bytes attributes.
    * The CertificateRevocationList class now has signature and
      tbs_certlist_bytes attributes.
    * NameConstraints are now supported in the CertificateBuilder
      and CertificateSigningRequestBuilder.
    * Support serialization of certificate revocation lists using
      the public_bytes() method of CertificateRevocationList.
    * Add support for parsing CertificateRevocationList extensions
      () in the OpenSSL backend. The following extensions are
      currently supported:
      o AuthorityInformationAccess
      o AuthorityKeyIdentifier
      o CRLNumber
      o IssuerAlternativeName
    * Added CertificateRevocationListBuilder and
      RevokedCertificateBuilder to allow creation of CRLs.
    * Unrecognized non-critical X.509 extensions are now parsed
      into an UnrecognizedExtension object.
* Wed Dec 30 2015 michael@stroeder.com
  - update to 1.1.2:
    * Fixed a SIGBUS crash with the OS X wheels caused by redefinition of a
      method.
    * Fixed a runtime error ``undefined symbol EC_GFp_nistp224_method`` that
      occurred with some OpenSSL installations.
    * Updated Windows and OS X wheels to be compiled against OpenSSL 1.0.2e.
* Wed Dec 09 2015 dmueller@suse.com
  - update to 1.1.1:
    * Fixed several small bugs related to compiling the OpenSSL bindings with
      unusual OpenSSL configurations.
    * Resolved an issue where, depending on the method of installation and
      which Python interpreter they were using, users on El Capitan (OS X 10.11)
      may have seen an ``InternalError`` on import.
* Wed Dec 09 2015 dmueller@suse.com
  - fix build for sle11 (disable testsuite as it depends on python-hypothesis
    which is not available for sle11 anymore)
* Tue Nov 10 2015 tbechtold@suse.com
  - update to 1.1:
    * Added support for Elliptic Curve Diffie-Hellman with
      :class:`~cryptography.hazmat.primitives.asymmetric.ec.ECDH`.
    * Added :class:`~cryptography.hazmat.primitives.kdf.x963kdf.X963KDF`.
    * Added support for parsing certificate revocation lists (CRLs) using
      :func:`~cryptography.x509.load_pem_x509_crl` and
      :func:`~cryptography.x509.load_der_x509_crl`.
    * Add support for AES key wrapping with
      :func:`~cryptography.hazmat.primitives.keywrap.aes_key_wrap` and
      :func:`~cryptography.hazmat.primitives.keywrap.aes_key_unwrap`.
    * Added a ``__hash__`` method to :class:`~cryptography.x509.Name`.
    * Add support for encoding and decoding elliptic curve points to a byte string
      form using
      :meth:`~cryptography.hazmat.primitives.asymmetric.ec.EllipticCurvePublicNumbers.encode_point`
      and
      :meth:`~cryptography.hazmat.primitives.asymmetric.ec.EllipticCurvePublicNumbers.from_encoded_point`.
    * Added :meth:`~cryptography.x509.Extensions.get_extension_for_class`.
    * :class:`~cryptography.x509.CertificatePolicies` are now supported in the
      :class:`~cryptography.x509.CertificateBuilder`.
    * ``countryName`` is now encoded as a ``PrintableString`` when creating subject
      and issuer distinguished names with the Certificate and CSR builder classes.
    * **SECURITY ISSUE**: The OpenSSL backend prior to 1.0.2 made extensive use
      of assertions to check response codes where our tests could not trigger a
      failure.  However, when Python is run with ``-O`` these asserts are optimized
      away.  If a user ran Python with this flag and got an invalid response code
      this could result in undefined behavior or worse. Accordingly, all response
      checks from the OpenSSL backend have been converted from ``assert``
      to a true function call. Credit **Emilia Käsper (Google Security Team)**
      for the report.
    * We now ship OS X wheels that statically link OpenSSL by default. When
      installing a wheel on OS X 10.10+ (and using a Python compiled against the
      10.10 SDK) users will no longer need to compile. See :doc:`/installation` for
      alternate installation methods if required.
    * Set the default string mask to UTF-8 in the OpenSSL backend to resolve
      character encoding issues with older versions of OpenSSL.
    * Several new OpenSSL bindings have been added to support a future pyOpenSSL
      release.
    * Raise an error during install on PyPy < 2.6. 1.0+ requires PyPy 2.6+.
  - Remove 2293.patch . Applied in a different way upstream.
  - Add BuildRequires for python-hypothesis and python-pyasn1-modules for running
    unittests
* Wed Sep 30 2015 dmueller@suse.com
  - require the cffi version it was built against to avoid (bsc#948198)
* Tue Sep 29 2015 tbechtold@suse.com
  - Add 2293.patch for "osrandom engine already registered" (bnc#947679)
* Thu Sep 17 2015 tbechtold@suse.com
  - Add disable-uneven-sizes-tests.patch (bnc#944204)
    openssl in SLE12SP1 doesn't allow uneven bit sizes for rsa keys
* Sat Aug 22 2015 tbechtold@suse.com
  - update to 1.0 (fate#318838):
    * Switched to the new `cffi`_ ``set_source`` out-of-line API mode for
      compilation. This results in significantly faster imports and lowered
      memory consumption. Due to this change we no longer support PyPy releases
      older than 2.6 nor do we support any released version of PyPy3 (until a
      version supporting cffi 1.0 comes out).
    * Fix parsing of OpenSSH public keys that have spaces in comments.
    * Support serialization of certificate signing requests using the
      ``public_bytes`` method of
      :class:`~cryptography.x509.CertificateSigningRequest`.
    * Support serialization of certificates using the ``public_bytes`` method of
      :class:`~cryptography.x509.Certificate`.
    * Add ``get_provisioning_uri`` method to
      :class:`~cryptography.hazmat.primitives.twofactor.hotp.HOTP` and
      :class:`~cryptography.hazmat.primitives.twofactor.totp.TOTP` for generating
      provisioning URIs.
    * Add :class:`~cryptography.hazmat.primitives.kdf.concatkdf.ConcatKDFHash`
      and :class:`~cryptography.hazmat.primitives.kdf.concatkdf.ConcatKDFHMAC`.
    * Raise a ``TypeError`` when passing objects that are not text as the value to
      :class:`~cryptography.x509.NameAttribute`.
    * Add support for :class:`~cryptography.x509.OtherName` as a general name
      type.
    * Added new X.509 extension support in :class:`~cryptography.x509.Certificate`
      The following new extensions are now supported:
    * :class:`~cryptography.x509.OCSPNoCheck`
    * :class:`~cryptography.x509.InhibitAnyPolicy`
    * :class:`~cryptography.x509.IssuerAlternativeName`
    * :class:`~cryptography.x509.NameConstraints`
    * Extension support was added to
      :class:`~cryptography.x509.CertificateSigningRequest`.
    * Add support for creating signed certificates with
      :class:`~cryptography.x509.CertificateBuilder`. This includes support for
      the following extensions:
    * :class:`~cryptography.x509.BasicConstraints`
    * :class:`~cryptography.x509.SubjectAlternativeName`
    * :class:`~cryptography.x509.KeyUsage`
    * :class:`~cryptography.x509.ExtendedKeyUsage`
    * :class:`~cryptography.x509.SubjectKeyIdentifier`
    * :class:`~cryptography.x509.AuthorityKeyIdentifier`
    * :class:`~cryptography.x509.AuthorityInformationAccess`
    * :class:`~cryptography.x509.CRLDistributionPoints`
    * :class:`~cryptography.x509.InhibitAnyPolicy`
    * :class:`~cryptography.x509.IssuerAlternativeName`
    * :class:`~cryptography.x509.OCSPNoCheck`
    * Add support for creating certificate signing requests with
      :class:`~cryptography.x509.CertificateSigningRequestBuilder`. This includes
      support for the same extensions supported in the ``CertificateBuilder``.
    * Deprecate ``encode_rfc6979_signature`` and ``decode_rfc6979_signature`` in
      favor of
      :func:`~cryptography.hazmat.primitives.asymmetric.utils.encode_dss_signature`
      and
      :func:`~cryptography.hazmat.primitives.asymmetric.utils.decode_dss_signature`.
  - Adjust Requires according to requires.txt
* Wed Jul 29 2015 tbechtold@suse.com
  - update to 0.9.3:
    * Updated Windows wheels to be compiled against OpenSSL 1.0.2d.
    * Updated Windows wheels to be compiled against OpenSSL 1.0.2c.
    * **SECURITY ISSUE**: Fixed a double free in the OpenSSL backend when using DSA
    to verify signatures. Note that this only affects PyPy 2.6.0 and (presently
    unreleased) CFFI versions greater than 1.1.0.
    * Removed support for Python 3.2. This version of Python is rarely used
      and caused support headaches. Users affected by this should upgrade to 3.3+.
    * Deprecated support for Python 2.6. At the time there is no time table for
      actually dropping support, however we strongly encourage all users to upgrade
      their Python, as Python 2.6 no longer receives support from the Python core
      team.
    * Add support for the
      :class:`~cryptography.hazmat.primitives.asymmetric.ec.SECP256K1` elliptic
      curve.
    * Fixed compilation when using an OpenSSL which was compiled with the
      ``no-comp`` (``OPENSSL_NO_COMP``) option.
    * Support :attr:`~cryptography.hazmat.primitives.serialization.Encoding.DER`
      serialization of public keys using the ``public_bytes`` method of
      :class:`~cryptography.hazmat.primitives.asymmetric.rsa.RSAPublicKeyWithSerialization`,
      :class:`~cryptography.hazmat.primitives.asymmetric.dsa.DSAPublicKeyWithSerialization`,
      and
      :class:`~cryptography.hazmat.primitives.asymmetric.ec.EllipticCurvePublicKeyWithSerialization`.
    * Support :attr:`~cryptography.hazmat.primitives.serialization.Encoding.DER`
      serialization of private keys using the ``private_bytes`` method of
      :class:`~cryptography.hazmat.primitives.asymmetric.rsa.RSAPrivateKeyWithSerialization`,
      :class:`~cryptography.hazmat.primitives.asymmetric.dsa.DSAPrivateKeyWithSerialization`,
      and
      :class:`~cryptography.hazmat.primitives.asymmetric.ec.EllipticCurvePrivateKeyWithSerialization`.
    * Add support for parsing X.509 certificate signing requests (CSRs) with
      :func:`~cryptography.x509.load_pem_x509_csr` and
      :func:`~cryptography.x509.load_der_x509_csr`.
    * Moved ``cryptography.exceptions.InvalidToken`` to
      :class:`cryptography.hazmat.primitives.twofactor.InvalidToken` and deprecated
      the old location. This was moved to minimize confusion between this exception
      and :class:`cryptography.fernet.InvalidToken`.
    * Added support for X.509 extensions in :class:`~cryptography.x509.Certificate`
      objects. The following extensions are supported as of this release:
    * :class:`~cryptography.x509.BasicConstraints`
    * :class:`~cryptography.x509.AuthorityKeyIdentifier`
    * :class:`~cryptography.x509.SubjectKeyIdentifier`
    * :class:`~cryptography.x509.KeyUsage`
    * :class:`~cryptography.x509.SubjectAlternativeName`
    * :class:`~cryptography.x509.ExtendedKeyUsage`
    * :class:`~cryptography.x509.CRLDistributionPoints`
    * :class:`~cryptography.x509.AuthorityInformationAccess`
    * :class:`~cryptography.x509.CertificatePolicies`
      Note that unsupported extensions with the critical flag raise
      :class:`~cryptography.x509.UnsupportedExtension` while unsupported extensions
      set to non-critical are silently ignored. Read the
      :doc:`X.509 documentation</x509>` for more information.
  - add python-pyasn1, python-ipaddress and python-idna as Requires/BuildRequires
* Thu Apr 23 2015 mcihar@suse.cz
  - Update to 0.8.2:
    * Fixed a race condition when initializing the OpenSSL or CommonCrypto backends
      in a multi-threaded scenario.
* Tue Apr 07 2015 tbechtold@suse.com
  - update to 0.8.1:
    * Updated Windows wheels to be compiled against OpenSSL 1.0.2a.
    * func:`~cryptography.hazmat.primitives.serialization.load_ssh_public_key` can
      now load elliptic curve public keys.
    * Added
      :attr:`~cryptography.x509.Certificate.signature_hash_algorithm` support to
      :class:`~cryptography.x509.Certificate`.
    * Added
      :func:`~cryptography.hazmat.primitives.asymmetric.rsa.rsa_recover_prime_factor  s`
    * :class:`~cryptography.hazmat.primitives.kdf.KeyDerivationFunction` was moved
      from :mod:`~cryptography.hazmat.primitives.interfaces` to
      :mod:`~cryptography.hazmat.primitives.kdf`.
    * Added support for parsing X.509 names. See the
      :doc:`X.509 documentation</x509>` for more information.
    * Added
      :func:`~cryptography.hazmat.primitives.serialization.load_der_private_key` to
      support loading of DER encoded private keys and
      :func:`~cryptography.hazmat.primitives.serialization.load_der_public_key` to
      support loading DER encoded public keys.
    * Fixed building against LibreSSL, a compile-time substitute for OpenSSL.
    * FreeBSD 9.2 was removed from the continuous integration system.
    * Updated Windows wheels to be compiled against OpenSSL 1.0.2.
    * :func:`~cryptography.hazmat.primitives.serialization.load_pem_public_key`
      and :func:`~cryptography.hazmat.primitives.serialization.load_der_public_key`
      now support PKCS1 RSA public keys (in addition to the previous support for
      SubjectPublicKeyInfo format for RSA, EC, and DSA).
    * Added
      :class:`~cryptography.hazmat.primitives.asymmetric.ec.EllipticCurvePrivateKeyWithSerialization`
      and deprecated
      :class:`~cryptography.hazmat.primitives.asymmetric.ec.EllipticCurvePrivateKeyWithNumbers`.
    * Added
      :meth:`~cryptography.hazmat.primitives.asymmetric.ec.EllipticCurvePrivateKeyWithSerialization.private_bytes`
      to
      :class:`~cryptography.hazmat.primitives.asymmetric.ec.EllipticCurvePrivateKeyWithSerialization`.
    * Added
      :class:`~cryptography.hazmat.primitives.asymmetric.rsa.RSAPrivateKeyWithSerialization`
      and deprecated
      :class:`~cryptography.hazmat.primitives.asymmetric.rsa.RSAPrivateKeyWithNumbers`.
    * Added
      :meth:`~cryptography.hazmat.primitives.asymmetric.rsa.RSAPrivateKeyWithSerialization.private_bytes`
      to
      :class:`~cryptography.hazmat.primitives.asymmetric.rsa.RSAPrivateKeyWithSerialization`.
    * Added
      :class:`~cryptography.hazmat.primitives.asymmetric.dsa.DSAPrivateKeyWithSerialization`
      and deprecated
      :class:`~cryptography.hazmat.primitives.asymmetric.dsa.DSAPrivateKeyWithNumbers`.
    * Added
      :meth:`~cryptography.hazmat.primitives.asymmetric.dsa.DSAPrivateKeyWithSerialization.private_bytes`
      to
      :class:`~cryptography.hazmat.primitives.asymmetric.dsa.DSAPrivateKeyWithSerialization`.
    * Added
      :class:`~cryptography.hazmat.primitives.asymmetric.rsa.RSAPublicKeyWithSerialization`
      and deprecated
      :class:`~cryptography.hazmat.primitives.asymmetric.rsa.RSAPublicKeyWithNumbers`.
    * Added
      :meth:`~cryptography.hazmat.primitives.asymmetric.rsa.RSAPublicKeyWithSerialization.public_bytes`
      to
      :class:`~cryptography.hazmat.primitives.asymmetric.rsa.RSAPublicKeyWithSerialization`.
    * Added
      :class:`~cryptography.hazmat.primitives.asymmetric.ec.EllipticCurvePublicKeyWithSerialization`
      and deprecated
      :class:`~cryptography.hazmat.primitives.asymmetric.ec.EllipticCurvePublicKeyWithNumbers`.
    * Added
      :meth:`~cryptography.hazmat.primitives.asymmetric.ec.EllipticCurvePublicKeyWithSerialization.public_bytes`
      to
      :class:`~cryptography.hazmat.primitives.asymmetric.ec.EllipticCurvePublicKeyWithSerialization`.
    * Added
      :class:`~cryptography.hazmat.primitives.asymmetric.dsa.DSAPublicKeyWithSerialization`
      and deprecated
      :class:`~cryptography.hazmat.primitives.asymmetric.dsa.DSAPublicKeyWithNumbers`.
    * Added
      :meth:`~cryptography.hazmat.primitives.asymmetric.dsa.DSAPublicKeyWithSerialization.public_bytes`
      to
      :class:`~cryptography.hazmat.primitives.asymmetric.dsa.DSAPublicKeyWithSerialization`.
    * :class:`~cryptography.hazmat.primitives.hashes.HashAlgorithm` and
      :class:`~cryptography.hazmat.primitives.hashes.HashContext` were moved from
      :mod:`~cryptography.hazmat.primitives.interfaces` to
      :mod:`~cryptography.hazmat.primitives.hashes`.
    * :class:`~cryptography.hazmat.primitives.ciphers.CipherContext`,
      :class:`~cryptography.hazmat.primitives.ciphers.AEADCipherContext`,
      :class:`~cryptography.hazmat.primitives.ciphers.AEADEncryptionContext`,
      :class:`~cryptography.hazmat.primitives.ciphers.CipherAlgorithm`, and
      :class:`~cryptography.hazmat.primitives.ciphers.BlockCipherAlgorithm`
      were moved from :mod:`~cryptography.hazmat.primitives.interfaces` to
      :mod:`~cryptography.hazmat.primitives.ciphers`.
    * :class:`~cryptography.hazmat.primitives.ciphers.modes.Mode`,
      :class:`~cryptography.hazmat.primitives.ciphers.modes.ModeWithInitializationVector`,
      :class:`~cryptography.hazmat.primitives.ciphers.modes.ModeWithNonce`, and
      :class:`~cryptography.hazmat.primitives.ciphers.modes.ModeWithAuthenticationTag`
      were moved from :mod:`~cryptography.hazmat.primitives.interfaces` to
      :mod:`~cryptography.hazmat.primitives.ciphers.modes`.
    * :class:`~cryptography.hazmat.primitives.padding.PaddingContext` was moved
      from :mod:`~cryptography.hazmat.primitives.interfaces` to
      :mod:`~cryptography.hazmat.primitives.padding`.
    * 
      :class:`~cryptography.hazmat.primitives.asymmetric.padding.AsymmetricPadding`
      was moved from :mod:`~cryptography.hazmat.primitives.interfaces` to
      :mod:`~cryptography.hazmat.primitives.asymmetric.padding`.
    * 
      :class:`~cryptography.hazmat.primitives.asymmetric.AsymmetricSignatureContext`
      and
      :class:`~cryptography.hazmat.primitives.asymmetric.AsymmetricVerificationContext`
      were moved from :mod:`~cryptography.hazmat.primitives.interfaces` to
      :mod:`~cryptography.hazmat.primitives.asymmetric`.
    * :class:`~cryptography.hazmat.primitives.asymmetric.dsa.DSAParameters`,
      :class:`~cryptography.hazmat.primitives.asymmetric.dsa.DSAParametersWithNumbers`,
      :class:`~cryptography.hazmat.primitives.asymmetric.dsa.DSAPrivateKey`,
      :class:`~cryptography.hazmat.primitives.asymmetric.dsa.DSAPrivateKeyWithNumbers`,
      :class:`~cryptography.hazmat.primitives.asymmetric.dsa.DSAPublicKey` and
      :class:`~cryptography.hazmat.primitives.asymmetric.dsa.DSAPublicKeyWithNumbers`
      were moved from :mod:`~cryptography.hazmat.primitives.interfaces` to
      :mod:`~cryptography.hazmat.primitives.asymmetric.dsa`
    * :class:`~cryptography.hazmat.primitives.asymmetric.ec.EllipticCurve`,
      :class:`~cryptography.hazmat.primitives.asymmetric.ec.EllipticCurveSignatureAlgorithm`,
      :class:`~cryptography.hazmat.primitives.asymmetric.ec.EllipticCurvePrivateKey`,
      :class:`~cryptography.hazmat.primitives.asymmetric.ec.EllipticCurvePrivateKeyWithNumbers`,
      :class:`~cryptography.hazmat.primitives.asymmetric.ec.EllipticCurvePublicKey`,
      and
      :class:`~cryptography.hazmat.primitives.asymmetric.ec.EllipticCurvePublicKeyWithNumbers`
      were moved from :mod:`~cryptography.hazmat.primitives.interfaces` to
      :mod:`~cryptography.hazmat.primitives.asymmetric.ec`.
    * :class:`~cryptography.hazmat.primitives.asymmetric.rsa.RSAPrivateKey`,
      :class:`~cryptography.hazmat.primitives.asymmetric.rsa.RSAPrivateKeyWithNumbers`,
      :class:`~cryptography.hazmat.primitives.asymmetric.rsa.RSAPublicKey` and
      :class:`~cryptography.hazmat.primitives.asymmetric.rsa.RSAPublicKeyWithNumbers`
      were moved from :mod:`~cryptography.hazmat.primitives.interfaces` to
      :mod:`~cryptography.hazmat.primitives.asymmetric.rsa`.
    * Updated Windows wheels to be compiled against OpenSSL 1.0.1l.
    * ``enum34`` is no longer installed on Python 3.4, where it is included in
      the standard library.
    * Added a new function to the OpenSSL bindings to support additional
      functionality in pyOpenSSL.
* Mon Dec 29 2014 jmatejek@suse.com
  - update to 0.7.1
    * backwards-incompatible change: GCM module doesn't truncate tags
      by default anymore
    * removed deprecated arguments to MFG1 constructor
    * ECC support
    * added PEM and openssh key loading convenience methods
    * support for many new ciphers and new features of existing ones
      see CHANGELOG.rst for details
  - spec cleanup
  - reworked %check section
  - added changelog to docs
* Mon May 19 2014 jmatejek@suse.com
  - update to 0.4
    * added IDEA algorithm
    * added HOTP, TOTP and CMAC primitives
    * improved support for RSA and DSA public key cryptography
  - include cryptography_vectors as a source, in order to run the full
    test suite (cryptography_vectors seems only useful for testing
    this module, so it's probably not worth making a separate installable
    package for it)
  - drop upstreamed cryptography-custom-install-cmd.patch
* Mon Mar 31 2014 speilicke@suse.com
  - Add cryptography-custom-install-cmd.patch: Fix installation to plat_lib
  - Properly invoke testsuite, therefore add dependencies on iso8601 and pretend
  - Only use pkg-config for libffi on newer distros, stay with old-style
    devel package requires to fix SLE build
* Mon Feb 24 2014 mvyskocil@suse.com
  - Initial packaging of python-cryptography for openSUSE

Files

/usr/lib64/python3.11/site-packages/cryptography
/usr/lib64/python3.11/site-packages/cryptography-42.0.4.dist-info
/usr/lib64/python3.11/site-packages/cryptography-42.0.4.dist-info/INSTALLER
/usr/lib64/python3.11/site-packages/cryptography-42.0.4.dist-info/LICENSE
/usr/lib64/python3.11/site-packages/cryptography-42.0.4.dist-info/LICENSE.APACHE
/usr/lib64/python3.11/site-packages/cryptography-42.0.4.dist-info/LICENSE.BSD
/usr/lib64/python3.11/site-packages/cryptography-42.0.4.dist-info/METADATA
/usr/lib64/python3.11/site-packages/cryptography-42.0.4.dist-info/RECORD
/usr/lib64/python3.11/site-packages/cryptography-42.0.4.dist-info/REQUESTED
/usr/lib64/python3.11/site-packages/cryptography-42.0.4.dist-info/WHEEL
/usr/lib64/python3.11/site-packages/cryptography-42.0.4.dist-info/top_level.txt
/usr/lib64/python3.11/site-packages/cryptography/__about__.py
/usr/lib64/python3.11/site-packages/cryptography/__init__.py
/usr/lib64/python3.11/site-packages/cryptography/__pycache__
/usr/lib64/python3.11/site-packages/cryptography/__pycache__/__about__.cpython-311.opt-1.pyc
/usr/lib64/python3.11/site-packages/cryptography/__pycache__/__about__.cpython-311.pyc
/usr/lib64/python3.11/site-packages/cryptography/__pycache__/__init__.cpython-311.opt-1.pyc
/usr/lib64/python3.11/site-packages/cryptography/__pycache__/__init__.cpython-311.pyc
/usr/lib64/python3.11/site-packages/cryptography/__pycache__/exceptions.cpython-311.opt-1.pyc
/usr/lib64/python3.11/site-packages/cryptography/__pycache__/exceptions.cpython-311.pyc
/usr/lib64/python3.11/site-packages/cryptography/__pycache__/fernet.cpython-311.opt-1.pyc
/usr/lib64/python3.11/site-packages/cryptography/__pycache__/fernet.cpython-311.pyc
/usr/lib64/python3.11/site-packages/cryptography/__pycache__/utils.cpython-311.opt-1.pyc
/usr/lib64/python3.11/site-packages/cryptography/__pycache__/utils.cpython-311.pyc
/usr/lib64/python3.11/site-packages/cryptography/exceptions.py
/usr/lib64/python3.11/site-packages/cryptography/fernet.py
/usr/lib64/python3.11/site-packages/cryptography/hazmat
/usr/lib64/python3.11/site-packages/cryptography/hazmat/__init__.py
/usr/lib64/python3.11/site-packages/cryptography/hazmat/__pycache__
/usr/lib64/python3.11/site-packages/cryptography/hazmat/__pycache__/__init__.cpython-311.opt-1.pyc
/usr/lib64/python3.11/site-packages/cryptography/hazmat/__pycache__/__init__.cpython-311.pyc
/usr/lib64/python3.11/site-packages/cryptography/hazmat/__pycache__/_oid.cpython-311.opt-1.pyc
/usr/lib64/python3.11/site-packages/cryptography/hazmat/__pycache__/_oid.cpython-311.pyc
/usr/lib64/python3.11/site-packages/cryptography/hazmat/_oid.py
/usr/lib64/python3.11/site-packages/cryptography/hazmat/backends
/usr/lib64/python3.11/site-packages/cryptography/hazmat/backends/__init__.py
/usr/lib64/python3.11/site-packages/cryptography/hazmat/backends/__pycache__
/usr/lib64/python3.11/site-packages/cryptography/hazmat/backends/__pycache__/__init__.cpython-311.opt-1.pyc
/usr/lib64/python3.11/site-packages/cryptography/hazmat/backends/__pycache__/__init__.cpython-311.pyc
/usr/lib64/python3.11/site-packages/cryptography/hazmat/backends/openssl
/usr/lib64/python3.11/site-packages/cryptography/hazmat/backends/openssl/__init__.py
/usr/lib64/python3.11/site-packages/cryptography/hazmat/backends/openssl/__pycache__
/usr/lib64/python3.11/site-packages/cryptography/hazmat/backends/openssl/__pycache__/__init__.cpython-311.opt-1.pyc
/usr/lib64/python3.11/site-packages/cryptography/hazmat/backends/openssl/__pycache__/__init__.cpython-311.pyc
/usr/lib64/python3.11/site-packages/cryptography/hazmat/backends/openssl/__pycache__/aead.cpython-311.opt-1.pyc
/usr/lib64/python3.11/site-packages/cryptography/hazmat/backends/openssl/__pycache__/aead.cpython-311.pyc
/usr/lib64/python3.11/site-packages/cryptography/hazmat/backends/openssl/__pycache__/backend.cpython-311.opt-1.pyc
/usr/lib64/python3.11/site-packages/cryptography/hazmat/backends/openssl/__pycache__/backend.cpython-311.pyc
/usr/lib64/python3.11/site-packages/cryptography/hazmat/backends/openssl/__pycache__/ciphers.cpython-311.opt-1.pyc
/usr/lib64/python3.11/site-packages/cryptography/hazmat/backends/openssl/__pycache__/ciphers.cpython-311.pyc
/usr/lib64/python3.11/site-packages/cryptography/hazmat/backends/openssl/__pycache__/decode_asn1.cpython-311.opt-1.pyc
/usr/lib64/python3.11/site-packages/cryptography/hazmat/backends/openssl/__pycache__/decode_asn1.cpython-311.pyc
/usr/lib64/python3.11/site-packages/cryptography/hazmat/backends/openssl/aead.py
/usr/lib64/python3.11/site-packages/cryptography/hazmat/backends/openssl/backend.py
/usr/lib64/python3.11/site-packages/cryptography/hazmat/backends/openssl/ciphers.py
/usr/lib64/python3.11/site-packages/cryptography/hazmat/backends/openssl/decode_asn1.py
/usr/lib64/python3.11/site-packages/cryptography/hazmat/bindings
/usr/lib64/python3.11/site-packages/cryptography/hazmat/bindings/__init__.py
/usr/lib64/python3.11/site-packages/cryptography/hazmat/bindings/__pycache__
/usr/lib64/python3.11/site-packages/cryptography/hazmat/bindings/__pycache__/__init__.cpython-311.opt-1.pyc
/usr/lib64/python3.11/site-packages/cryptography/hazmat/bindings/__pycache__/__init__.cpython-311.pyc
/usr/lib64/python3.11/site-packages/cryptography/hazmat/bindings/_rust
/usr/lib64/python3.11/site-packages/cryptography/hazmat/bindings/_rust.cpython-311-s390x-linux-gnu.so
/usr/lib64/python3.11/site-packages/cryptography/hazmat/bindings/_rust/__init__.pyi
/usr/lib64/python3.11/site-packages/cryptography/hazmat/bindings/_rust/_openssl.pyi
/usr/lib64/python3.11/site-packages/cryptography/hazmat/bindings/_rust/asn1.pyi
/usr/lib64/python3.11/site-packages/cryptography/hazmat/bindings/_rust/exceptions.pyi
/usr/lib64/python3.11/site-packages/cryptography/hazmat/bindings/_rust/ocsp.pyi
/usr/lib64/python3.11/site-packages/cryptography/hazmat/bindings/_rust/openssl
/usr/lib64/python3.11/site-packages/cryptography/hazmat/bindings/_rust/openssl/__init__.pyi
/usr/lib64/python3.11/site-packages/cryptography/hazmat/bindings/_rust/openssl/aead.pyi
/usr/lib64/python3.11/site-packages/cryptography/hazmat/bindings/_rust/openssl/cmac.pyi
/usr/lib64/python3.11/site-packages/cryptography/hazmat/bindings/_rust/openssl/dh.pyi
/usr/lib64/python3.11/site-packages/cryptography/hazmat/bindings/_rust/openssl/dsa.pyi
/usr/lib64/python3.11/site-packages/cryptography/hazmat/bindings/_rust/openssl/ec.pyi
/usr/lib64/python3.11/site-packages/cryptography/hazmat/bindings/_rust/openssl/ed25519.pyi
/usr/lib64/python3.11/site-packages/cryptography/hazmat/bindings/_rust/openssl/ed448.pyi
/usr/lib64/python3.11/site-packages/cryptography/hazmat/bindings/_rust/openssl/hashes.pyi
/usr/lib64/python3.11/site-packages/cryptography/hazmat/bindings/_rust/openssl/hmac.pyi
/usr/lib64/python3.11/site-packages/cryptography/hazmat/bindings/_rust/openssl/kdf.pyi
/usr/lib64/python3.11/site-packages/cryptography/hazmat/bindings/_rust/openssl/keys.pyi
/usr/lib64/python3.11/site-packages/cryptography/hazmat/bindings/_rust/openssl/poly1305.pyi
/usr/lib64/python3.11/site-packages/cryptography/hazmat/bindings/_rust/openssl/rsa.pyi
/usr/lib64/python3.11/site-packages/cryptography/hazmat/bindings/_rust/openssl/x25519.pyi
/usr/lib64/python3.11/site-packages/cryptography/hazmat/bindings/_rust/openssl/x448.pyi
/usr/lib64/python3.11/site-packages/cryptography/hazmat/bindings/_rust/pkcs7.pyi
/usr/lib64/python3.11/site-packages/cryptography/hazmat/bindings/_rust/x509.pyi
/usr/lib64/python3.11/site-packages/cryptography/hazmat/bindings/openssl
/usr/lib64/python3.11/site-packages/cryptography/hazmat/bindings/openssl/__init__.py
/usr/lib64/python3.11/site-packages/cryptography/hazmat/bindings/openssl/__pycache__
/usr/lib64/python3.11/site-packages/cryptography/hazmat/bindings/openssl/__pycache__/__init__.cpython-311.opt-1.pyc
/usr/lib64/python3.11/site-packages/cryptography/hazmat/bindings/openssl/__pycache__/__init__.cpython-311.pyc
/usr/lib64/python3.11/site-packages/cryptography/hazmat/bindings/openssl/__pycache__/_conditional.cpython-311.opt-1.pyc
/usr/lib64/python3.11/site-packages/cryptography/hazmat/bindings/openssl/__pycache__/_conditional.cpython-311.pyc
/usr/lib64/python3.11/site-packages/cryptography/hazmat/bindings/openssl/__pycache__/binding.cpython-311.opt-1.pyc
/usr/lib64/python3.11/site-packages/cryptography/hazmat/bindings/openssl/__pycache__/binding.cpython-311.pyc
/usr/lib64/python3.11/site-packages/cryptography/hazmat/bindings/openssl/_conditional.py
/usr/lib64/python3.11/site-packages/cryptography/hazmat/bindings/openssl/binding.py
/usr/lib64/python3.11/site-packages/cryptography/hazmat/primitives
/usr/lib64/python3.11/site-packages/cryptography/hazmat/primitives/__init__.py
/usr/lib64/python3.11/site-packages/cryptography/hazmat/primitives/__pycache__
/usr/lib64/python3.11/site-packages/cryptography/hazmat/primitives/__pycache__/__init__.cpython-311.opt-1.pyc
/usr/lib64/python3.11/site-packages/cryptography/hazmat/primitives/__pycache__/__init__.cpython-311.pyc
/usr/lib64/python3.11/site-packages/cryptography/hazmat/primitives/__pycache__/_asymmetric.cpython-311.opt-1.pyc
/usr/lib64/python3.11/site-packages/cryptography/hazmat/primitives/__pycache__/_asymmetric.cpython-311.pyc
/usr/lib64/python3.11/site-packages/cryptography/hazmat/primitives/__pycache__/_cipheralgorithm.cpython-311.opt-1.pyc
/usr/lib64/python3.11/site-packages/cryptography/hazmat/primitives/__pycache__/_cipheralgorithm.cpython-311.pyc
/usr/lib64/python3.11/site-packages/cryptography/hazmat/primitives/__pycache__/_serialization.cpython-311.opt-1.pyc
/usr/lib64/python3.11/site-packages/cryptography/hazmat/primitives/__pycache__/_serialization.cpython-311.pyc
/usr/lib64/python3.11/site-packages/cryptography/hazmat/primitives/__pycache__/cmac.cpython-311.opt-1.pyc
/usr/lib64/python3.11/site-packages/cryptography/hazmat/primitives/__pycache__/cmac.cpython-311.pyc
/usr/lib64/python3.11/site-packages/cryptography/hazmat/primitives/__pycache__/constant_time.cpython-311.opt-1.pyc
/usr/lib64/python3.11/site-packages/cryptography/hazmat/primitives/__pycache__/constant_time.cpython-311.pyc
/usr/lib64/python3.11/site-packages/cryptography/hazmat/primitives/__pycache__/hashes.cpython-311.opt-1.pyc
/usr/lib64/python3.11/site-packages/cryptography/hazmat/primitives/__pycache__/hashes.cpython-311.pyc
/usr/lib64/python3.11/site-packages/cryptography/hazmat/primitives/__pycache__/hmac.cpython-311.opt-1.pyc
/usr/lib64/python3.11/site-packages/cryptography/hazmat/primitives/__pycache__/hmac.cpython-311.pyc
/usr/lib64/python3.11/site-packages/cryptography/hazmat/primitives/__pycache__/keywrap.cpython-311.opt-1.pyc
/usr/lib64/python3.11/site-packages/cryptography/hazmat/primitives/__pycache__/keywrap.cpython-311.pyc
/usr/lib64/python3.11/site-packages/cryptography/hazmat/primitives/__pycache__/padding.cpython-311.opt-1.pyc
/usr/lib64/python3.11/site-packages/cryptography/hazmat/primitives/__pycache__/padding.cpython-311.pyc
/usr/lib64/python3.11/site-packages/cryptography/hazmat/primitives/__pycache__/poly1305.cpython-311.opt-1.pyc
/usr/lib64/python3.11/site-packages/cryptography/hazmat/primitives/__pycache__/poly1305.cpython-311.pyc
/usr/lib64/python3.11/site-packages/cryptography/hazmat/primitives/_asymmetric.py
/usr/lib64/python3.11/site-packages/cryptography/hazmat/primitives/_cipheralgorithm.py
/usr/lib64/python3.11/site-packages/cryptography/hazmat/primitives/_serialization.py
/usr/lib64/python3.11/site-packages/cryptography/hazmat/primitives/asymmetric
/usr/lib64/python3.11/site-packages/cryptography/hazmat/primitives/asymmetric/__init__.py
/usr/lib64/python3.11/site-packages/cryptography/hazmat/primitives/asymmetric/__pycache__
/usr/lib64/python3.11/site-packages/cryptography/hazmat/primitives/asymmetric/__pycache__/__init__.cpython-311.opt-1.pyc
/usr/lib64/python3.11/site-packages/cryptography/hazmat/primitives/asymmetric/__pycache__/__init__.cpython-311.pyc
/usr/lib64/python3.11/site-packages/cryptography/hazmat/primitives/asymmetric/__pycache__/dh.cpython-311.opt-1.pyc
/usr/lib64/python3.11/site-packages/cryptography/hazmat/primitives/asymmetric/__pycache__/dh.cpython-311.pyc
/usr/lib64/python3.11/site-packages/cryptography/hazmat/primitives/asymmetric/__pycache__/dsa.cpython-311.opt-1.pyc
/usr/lib64/python3.11/site-packages/cryptography/hazmat/primitives/asymmetric/__pycache__/dsa.cpython-311.pyc
/usr/lib64/python3.11/site-packages/cryptography/hazmat/primitives/asymmetric/__pycache__/ec.cpython-311.opt-1.pyc
/usr/lib64/python3.11/site-packages/cryptography/hazmat/primitives/asymmetric/__pycache__/ec.cpython-311.pyc
/usr/lib64/python3.11/site-packages/cryptography/hazmat/primitives/asymmetric/__pycache__/ed25519.cpython-311.opt-1.pyc
/usr/lib64/python3.11/site-packages/cryptography/hazmat/primitives/asymmetric/__pycache__/ed25519.cpython-311.pyc
/usr/lib64/python3.11/site-packages/cryptography/hazmat/primitives/asymmetric/__pycache__/ed448.cpython-311.opt-1.pyc
/usr/lib64/python3.11/site-packages/cryptography/hazmat/primitives/asymmetric/__pycache__/ed448.cpython-311.pyc
/usr/lib64/python3.11/site-packages/cryptography/hazmat/primitives/asymmetric/__pycache__/padding.cpython-311.opt-1.pyc
/usr/lib64/python3.11/site-packages/cryptography/hazmat/primitives/asymmetric/__pycache__/padding.cpython-311.pyc
/usr/lib64/python3.11/site-packages/cryptography/hazmat/primitives/asymmetric/__pycache__/rsa.cpython-311.opt-1.pyc
/usr/lib64/python3.11/site-packages/cryptography/hazmat/primitives/asymmetric/__pycache__/rsa.cpython-311.pyc
/usr/lib64/python3.11/site-packages/cryptography/hazmat/primitives/asymmetric/__pycache__/types.cpython-311.opt-1.pyc
/usr/lib64/python3.11/site-packages/cryptography/hazmat/primitives/asymmetric/__pycache__/types.cpython-311.pyc
/usr/lib64/python3.11/site-packages/cryptography/hazmat/primitives/asymmetric/__pycache__/utils.cpython-311.opt-1.pyc
/usr/lib64/python3.11/site-packages/cryptography/hazmat/primitives/asymmetric/__pycache__/utils.cpython-311.pyc
/usr/lib64/python3.11/site-packages/cryptography/hazmat/primitives/asymmetric/__pycache__/x25519.cpython-311.opt-1.pyc
/usr/lib64/python3.11/site-packages/cryptography/hazmat/primitives/asymmetric/__pycache__/x25519.cpython-311.pyc
/usr/lib64/python3.11/site-packages/cryptography/hazmat/primitives/asymmetric/__pycache__/x448.cpython-311.opt-1.pyc
/usr/lib64/python3.11/site-packages/cryptography/hazmat/primitives/asymmetric/__pycache__/x448.cpython-311.pyc
/usr/lib64/python3.11/site-packages/cryptography/hazmat/primitives/asymmetric/dh.py
/usr/lib64/python3.11/site-packages/cryptography/hazmat/primitives/asymmetric/dsa.py
/usr/lib64/python3.11/site-packages/cryptography/hazmat/primitives/asymmetric/ec.py
/usr/lib64/python3.11/site-packages/cryptography/hazmat/primitives/asymmetric/ed25519.py
/usr/lib64/python3.11/site-packages/cryptography/hazmat/primitives/asymmetric/ed448.py
/usr/lib64/python3.11/site-packages/cryptography/hazmat/primitives/asymmetric/padding.py
/usr/lib64/python3.11/site-packages/cryptography/hazmat/primitives/asymmetric/rsa.py
/usr/lib64/python3.11/site-packages/cryptography/hazmat/primitives/asymmetric/types.py
/usr/lib64/python3.11/site-packages/cryptography/hazmat/primitives/asymmetric/utils.py
/usr/lib64/python3.11/site-packages/cryptography/hazmat/primitives/asymmetric/x25519.py
/usr/lib64/python3.11/site-packages/cryptography/hazmat/primitives/asymmetric/x448.py
/usr/lib64/python3.11/site-packages/cryptography/hazmat/primitives/ciphers
/usr/lib64/python3.11/site-packages/cryptography/hazmat/primitives/ciphers/__init__.py
/usr/lib64/python3.11/site-packages/cryptography/hazmat/primitives/ciphers/__pycache__
/usr/lib64/python3.11/site-packages/cryptography/hazmat/primitives/ciphers/__pycache__/__init__.cpython-311.opt-1.pyc
/usr/lib64/python3.11/site-packages/cryptography/hazmat/primitives/ciphers/__pycache__/__init__.cpython-311.pyc
/usr/lib64/python3.11/site-packages/cryptography/hazmat/primitives/ciphers/__pycache__/aead.cpython-311.opt-1.pyc
/usr/lib64/python3.11/site-packages/cryptography/hazmat/primitives/ciphers/__pycache__/aead.cpython-311.pyc
/usr/lib64/python3.11/site-packages/cryptography/hazmat/primitives/ciphers/__pycache__/algorithms.cpython-311.opt-1.pyc
/usr/lib64/python3.11/site-packages/cryptography/hazmat/primitives/ciphers/__pycache__/algorithms.cpython-311.pyc
/usr/lib64/python3.11/site-packages/cryptography/hazmat/primitives/ciphers/__pycache__/base.cpython-311.opt-1.pyc
/usr/lib64/python3.11/site-packages/cryptography/hazmat/primitives/ciphers/__pycache__/base.cpython-311.pyc
/usr/lib64/python3.11/site-packages/cryptography/hazmat/primitives/ciphers/__pycache__/modes.cpython-311.opt-1.pyc
/usr/lib64/python3.11/site-packages/cryptography/hazmat/primitives/ciphers/__pycache__/modes.cpython-311.pyc
/usr/lib64/python3.11/site-packages/cryptography/hazmat/primitives/ciphers/aead.py
/usr/lib64/python3.11/site-packages/cryptography/hazmat/primitives/ciphers/algorithms.py
/usr/lib64/python3.11/site-packages/cryptography/hazmat/primitives/ciphers/base.py
/usr/lib64/python3.11/site-packages/cryptography/hazmat/primitives/ciphers/modes.py
/usr/lib64/python3.11/site-packages/cryptography/hazmat/primitives/cmac.py
/usr/lib64/python3.11/site-packages/cryptography/hazmat/primitives/constant_time.py
/usr/lib64/python3.11/site-packages/cryptography/hazmat/primitives/hashes.py
/usr/lib64/python3.11/site-packages/cryptography/hazmat/primitives/hmac.py
/usr/lib64/python3.11/site-packages/cryptography/hazmat/primitives/kdf
/usr/lib64/python3.11/site-packages/cryptography/hazmat/primitives/kdf/__init__.py
/usr/lib64/python3.11/site-packages/cryptography/hazmat/primitives/kdf/__pycache__
/usr/lib64/python3.11/site-packages/cryptography/hazmat/primitives/kdf/__pycache__/__init__.cpython-311.opt-1.pyc
/usr/lib64/python3.11/site-packages/cryptography/hazmat/primitives/kdf/__pycache__/__init__.cpython-311.pyc
/usr/lib64/python3.11/site-packages/cryptography/hazmat/primitives/kdf/__pycache__/concatkdf.cpython-311.opt-1.pyc
/usr/lib64/python3.11/site-packages/cryptography/hazmat/primitives/kdf/__pycache__/concatkdf.cpython-311.pyc
/usr/lib64/python3.11/site-packages/cryptography/hazmat/primitives/kdf/__pycache__/hkdf.cpython-311.opt-1.pyc
/usr/lib64/python3.11/site-packages/cryptography/hazmat/primitives/kdf/__pycache__/hkdf.cpython-311.pyc
/usr/lib64/python3.11/site-packages/cryptography/hazmat/primitives/kdf/__pycache__/kbkdf.cpython-311.opt-1.pyc
/usr/lib64/python3.11/site-packages/cryptography/hazmat/primitives/kdf/__pycache__/kbkdf.cpython-311.pyc
/usr/lib64/python3.11/site-packages/cryptography/hazmat/primitives/kdf/__pycache__/pbkdf2.cpython-311.opt-1.pyc
/usr/lib64/python3.11/site-packages/cryptography/hazmat/primitives/kdf/__pycache__/pbkdf2.cpython-311.pyc
/usr/lib64/python3.11/site-packages/cryptography/hazmat/primitives/kdf/__pycache__/scrypt.cpython-311.opt-1.pyc
/usr/lib64/python3.11/site-packages/cryptography/hazmat/primitives/kdf/__pycache__/scrypt.cpython-311.pyc
/usr/lib64/python3.11/site-packages/cryptography/hazmat/primitives/kdf/__pycache__/x963kdf.cpython-311.opt-1.pyc
/usr/lib64/python3.11/site-packages/cryptography/hazmat/primitives/kdf/__pycache__/x963kdf.cpython-311.pyc
/usr/lib64/python3.11/site-packages/cryptography/hazmat/primitives/kdf/concatkdf.py
/usr/lib64/python3.11/site-packages/cryptography/hazmat/primitives/kdf/hkdf.py
/usr/lib64/python3.11/site-packages/cryptography/hazmat/primitives/kdf/kbkdf.py
/usr/lib64/python3.11/site-packages/cryptography/hazmat/primitives/kdf/pbkdf2.py
/usr/lib64/python3.11/site-packages/cryptography/hazmat/primitives/kdf/scrypt.py
/usr/lib64/python3.11/site-packages/cryptography/hazmat/primitives/kdf/x963kdf.py
/usr/lib64/python3.11/site-packages/cryptography/hazmat/primitives/keywrap.py
/usr/lib64/python3.11/site-packages/cryptography/hazmat/primitives/padding.py
/usr/lib64/python3.11/site-packages/cryptography/hazmat/primitives/poly1305.py
/usr/lib64/python3.11/site-packages/cryptography/hazmat/primitives/serialization
/usr/lib64/python3.11/site-packages/cryptography/hazmat/primitives/serialization/__init__.py
/usr/lib64/python3.11/site-packages/cryptography/hazmat/primitives/serialization/__pycache__
/usr/lib64/python3.11/site-packages/cryptography/hazmat/primitives/serialization/__pycache__/__init__.cpython-311.opt-1.pyc
/usr/lib64/python3.11/site-packages/cryptography/hazmat/primitives/serialization/__pycache__/__init__.cpython-311.pyc
/usr/lib64/python3.11/site-packages/cryptography/hazmat/primitives/serialization/__pycache__/base.cpython-311.opt-1.pyc
/usr/lib64/python3.11/site-packages/cryptography/hazmat/primitives/serialization/__pycache__/base.cpython-311.pyc
/usr/lib64/python3.11/site-packages/cryptography/hazmat/primitives/serialization/__pycache__/pkcs12.cpython-311.opt-1.pyc
/usr/lib64/python3.11/site-packages/cryptography/hazmat/primitives/serialization/__pycache__/pkcs12.cpython-311.pyc
/usr/lib64/python3.11/site-packages/cryptography/hazmat/primitives/serialization/__pycache__/pkcs7.cpython-311.opt-1.pyc
/usr/lib64/python3.11/site-packages/cryptography/hazmat/primitives/serialization/__pycache__/pkcs7.cpython-311.pyc
/usr/lib64/python3.11/site-packages/cryptography/hazmat/primitives/serialization/__pycache__/ssh.cpython-311.opt-1.pyc
/usr/lib64/python3.11/site-packages/cryptography/hazmat/primitives/serialization/__pycache__/ssh.cpython-311.pyc
/usr/lib64/python3.11/site-packages/cryptography/hazmat/primitives/serialization/base.py
/usr/lib64/python3.11/site-packages/cryptography/hazmat/primitives/serialization/pkcs12.py
/usr/lib64/python3.11/site-packages/cryptography/hazmat/primitives/serialization/pkcs7.py
/usr/lib64/python3.11/site-packages/cryptography/hazmat/primitives/serialization/ssh.py
/usr/lib64/python3.11/site-packages/cryptography/hazmat/primitives/twofactor
/usr/lib64/python3.11/site-packages/cryptography/hazmat/primitives/twofactor/__init__.py
/usr/lib64/python3.11/site-packages/cryptography/hazmat/primitives/twofactor/__pycache__
/usr/lib64/python3.11/site-packages/cryptography/hazmat/primitives/twofactor/__pycache__/__init__.cpython-311.opt-1.pyc
/usr/lib64/python3.11/site-packages/cryptography/hazmat/primitives/twofactor/__pycache__/__init__.cpython-311.pyc
/usr/lib64/python3.11/site-packages/cryptography/hazmat/primitives/twofactor/__pycache__/hotp.cpython-311.opt-1.pyc
/usr/lib64/python3.11/site-packages/cryptography/hazmat/primitives/twofactor/__pycache__/hotp.cpython-311.pyc
/usr/lib64/python3.11/site-packages/cryptography/hazmat/primitives/twofactor/__pycache__/totp.cpython-311.opt-1.pyc
/usr/lib64/python3.11/site-packages/cryptography/hazmat/primitives/twofactor/__pycache__/totp.cpython-311.pyc
/usr/lib64/python3.11/site-packages/cryptography/hazmat/primitives/twofactor/hotp.py
/usr/lib64/python3.11/site-packages/cryptography/hazmat/primitives/twofactor/totp.py
/usr/lib64/python3.11/site-packages/cryptography/py.typed
/usr/lib64/python3.11/site-packages/cryptography/utils.py
/usr/lib64/python3.11/site-packages/cryptography/x509
/usr/lib64/python3.11/site-packages/cryptography/x509/__init__.py
/usr/lib64/python3.11/site-packages/cryptography/x509/__pycache__
/usr/lib64/python3.11/site-packages/cryptography/x509/__pycache__/__init__.cpython-311.opt-1.pyc
/usr/lib64/python3.11/site-packages/cryptography/x509/__pycache__/__init__.cpython-311.pyc
/usr/lib64/python3.11/site-packages/cryptography/x509/__pycache__/base.cpython-311.opt-1.pyc
/usr/lib64/python3.11/site-packages/cryptography/x509/__pycache__/base.cpython-311.pyc
/usr/lib64/python3.11/site-packages/cryptography/x509/__pycache__/certificate_transparency.cpython-311.opt-1.pyc
/usr/lib64/python3.11/site-packages/cryptography/x509/__pycache__/certificate_transparency.cpython-311.pyc
/usr/lib64/python3.11/site-packages/cryptography/x509/__pycache__/extensions.cpython-311.opt-1.pyc
/usr/lib64/python3.11/site-packages/cryptography/x509/__pycache__/extensions.cpython-311.pyc
/usr/lib64/python3.11/site-packages/cryptography/x509/__pycache__/general_name.cpython-311.opt-1.pyc
/usr/lib64/python3.11/site-packages/cryptography/x509/__pycache__/general_name.cpython-311.pyc
/usr/lib64/python3.11/site-packages/cryptography/x509/__pycache__/name.cpython-311.opt-1.pyc
/usr/lib64/python3.11/site-packages/cryptography/x509/__pycache__/name.cpython-311.pyc
/usr/lib64/python3.11/site-packages/cryptography/x509/__pycache__/ocsp.cpython-311.opt-1.pyc
/usr/lib64/python3.11/site-packages/cryptography/x509/__pycache__/ocsp.cpython-311.pyc
/usr/lib64/python3.11/site-packages/cryptography/x509/__pycache__/oid.cpython-311.opt-1.pyc
/usr/lib64/python3.11/site-packages/cryptography/x509/__pycache__/oid.cpython-311.pyc
/usr/lib64/python3.11/site-packages/cryptography/x509/__pycache__/verification.cpython-311.opt-1.pyc
/usr/lib64/python3.11/site-packages/cryptography/x509/__pycache__/verification.cpython-311.pyc
/usr/lib64/python3.11/site-packages/cryptography/x509/base.py
/usr/lib64/python3.11/site-packages/cryptography/x509/certificate_transparency.py
/usr/lib64/python3.11/site-packages/cryptography/x509/extensions.py
/usr/lib64/python3.11/site-packages/cryptography/x509/general_name.py
/usr/lib64/python3.11/site-packages/cryptography/x509/name.py
/usr/lib64/python3.11/site-packages/cryptography/x509/ocsp.py
/usr/lib64/python3.11/site-packages/cryptography/x509/oid.py
/usr/lib64/python3.11/site-packages/cryptography/x509/verification.py
/usr/share/doc/packages/python311-cryptography
/usr/share/doc/packages/python311-cryptography/CHANGELOG.rst
/usr/share/doc/packages/python311-cryptography/CONTRIBUTING.rst
/usr/share/doc/packages/python311-cryptography/README.rst
/usr/share/licenses/python311-cryptography
/usr/share/licenses/python311-cryptography/LICENSE
/usr/share/licenses/python311-cryptography/LICENSE.APACHE
/usr/share/licenses/python311-cryptography/LICENSE.BSD


Generated by rpm2html 1.8.1

Fabrice Bellet, Sat Nov 9 00:36:49 2024