Script 'mail_helper' called by obssrc
Hello community,

here is the log from the commit of package python-cryptography for 
openSUSE:Factory checked in at 2025-09-15 19:50:26
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Factory/python-cryptography (Old)
 and      /work/SRC/openSUSE:Factory/.python-cryptography.new.1977 (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Package is "python-cryptography"

Mon Sep 15 19:50:26 2025 rev:104 rq:1304683 version:45.0.7

Changes:
--------
--- /work/SRC/openSUSE:Factory/python-cryptography/python-cryptography.changes  
2025-09-03 21:07:25.828634395 +0200
+++ 
/work/SRC/openSUSE:Factory/.python-cryptography.new.1977/python-cryptography.changes
        2025-09-15 19:54:27.034995827 +0200
@@ -1,0 +2,6 @@
+Sun Sep 14 20:45:39 UTC 2025 - Dirk Müller <[email protected]>
+
+- update to 45.0.7:
+  * Added a function to support an upcoming pyOpenSSL release.
+
+-------------------------------------------------------------------

Old:
----
  cryptography-45.0.5.tar.gz

New:
----
  cryptography-45.0.7.tar.gz

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Other differences:
------------------
++++++ python-cryptography.spec ++++++
--- /var/tmp/diff_new_pack.6KXXW4/_old  2025-09-15 19:54:27.727024842 +0200
+++ /var/tmp/diff_new_pack.6KXXW4/_new  2025-09-15 19:54:27.727024842 +0200
@@ -28,7 +28,7 @@
 %{?sle15_python_module_pythons}
 Name:           python-cryptography%{psuffix}
 # ALWAYS KEEP IN SYNC WITH python-cryptography-vectors!
-Version:        45.0.5
+Version:        45.0.7
 Release:        0
 Summary:        Python library which exposes cryptographic recipes and 
primitives
 License:        Apache-2.0 OR BSD-3-Clause

++++++ Make-unsafe-subinterpreter-support-available-via-cfg.patch ++++++
--- /var/tmp/diff_new_pack.6KXXW4/_old  2025-09-15 19:54:27.763026352 +0200
+++ /var/tmp/diff_new_pack.6KXXW4/_new  2025-09-15 19:54:27.767026520 +0200
@@ -7,8 +7,10 @@
  src/impl_/pymodule.rs | 2 +-
  1 file changed, 1 insertion(+), 1 deletion(-)
 
---- a/vendor/pyo3-0.25.1/src/impl_/pymodule.rs
-+++ b/vendor/pyo3-0.25.1/src/impl_/pymodule.rs
+Index: cryptography-45.0.7/vendor/pyo3-0.25.1/src/impl_/pymodule.rs
+===================================================================
+--- cryptography-45.0.7.orig/vendor/pyo3-0.25.1/src/impl_/pymodule.rs
++++ cryptography-45.0.7/vendor/pyo3-0.25.1/src/impl_/pymodule.rs
 @@ -100,7 +100,7 @@ impl ModuleDef {
          // that static data is not reused across interpreters.
          //
@@ -18,8 +20,10 @@
          {
              // PyInterpreterState_Get is only available on 3.9 and later, but 
is missing
              // from python3.dll for Windows stable API on 3.9
---- a/Cargo.toml
-+++ b/Cargo.toml
+Index: cryptography-45.0.7/Cargo.toml
+===================================================================
+--- cryptography-45.0.7.orig/Cargo.toml
++++ cryptography-45.0.7/Cargo.toml
 @@ -29,3 +29,6 @@ openssl-sys = "0.9.108"
  
  [profile.release]
@@ -27,9 +31,11 @@
 +
 +[patch.crates-io]
 +pyo3 = { path="vendor/pyo3-0.25.1" }
---- a/Cargo.lock
-+++ b/Cargo.lock
-@@ -269,8 +269,6 @@ dependencies = [
+Index: cryptography-45.0.7/Cargo.lock
+===================================================================
+--- cryptography-45.0.7.orig/Cargo.lock
++++ cryptography-45.0.7/Cargo.lock
+@@ -276,8 +276,6 @@ dependencies = [
  [[package]]
  name = "pyo3"
  version = "0.25.1"

++++++ cryptography-45.0.5.tar.gz -> cryptography-45.0.7.tar.gz ++++++
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/cryptography-45.0.5/CHANGELOG.rst 
new/cryptography-45.0.7/CHANGELOG.rst
--- old/cryptography-45.0.5/CHANGELOG.rst       2025-07-02 15:00:14.000000000 
+0200
+++ new/cryptography-45.0.7/CHANGELOG.rst       2025-09-01 13:05:40.000000000 
+0200
@@ -1,6 +1,20 @@
 Changelog
 =========
 
+.. _v45-0-7:
+
+45.0.7 - 2025-09-01
+~~~~~~~~~~~~~~~~~~~
+
+* Added a function to support an upcoming ``pyOpenSSL`` release.
+
+.. _v45-0-6:
+
+45.0.6 - 2025-08-05
+~~~~~~~~~~~~~~~~~~~
+
+* Updated Windows, macOS, and Linux wheels to be compiled with OpenSSL 3.5.2.
+
 .. _v45-0-5:
 
 45.0.5 - 2025-07-02
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/cryptography-45.0.5/PKG-INFO 
new/cryptography-45.0.7/PKG-INFO
--- old/cryptography-45.0.5/PKG-INFO    1970-01-01 01:00:00.000000000 +0100
+++ new/cryptography-45.0.7/PKG-INFO    1970-01-01 01:00:00.000000000 +0100
@@ -1,6 +1,6 @@
 Metadata-Version: 2.4
 Name: cryptography
-Version: 45.0.5
+Version: 45.0.7
 Classifier: Development Status :: 5 - Production/Stable
 Classifier: Intended Audience :: Developers
 Classifier: Natural Language :: English
@@ -26,7 +26,7 @@
 Requires-Dist: bcrypt>=3.1.5 ; extra == 'ssh'
 Requires-Dist: nox>=2024.4.15 ; extra == 'nox'
 Requires-Dist: nox[uv]>=2024.3.2 ; python_full_version >= '3.8' and extra == 
'nox'
-Requires-Dist: cryptography-vectors==45.0.5 ; extra == 'test'
+Requires-Dist: cryptography-vectors==45.0.7 ; extra == 'test'
 Requires-Dist: pytest>=7.4.0 ; extra == 'test'
 Requires-Dist: pytest-benchmark>=4.0 ; extra == 'test'
 Requires-Dist: pytest-cov>=2.10.1 ; extra == 'test'
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/cryptography-45.0.5/pyproject.toml 
new/cryptography-45.0.7/pyproject.toml
--- old/cryptography-45.0.5/pyproject.toml      2025-07-02 15:00:14.000000000 
+0200
+++ new/cryptography-45.0.7/pyproject.toml      2025-09-01 13:05:40.000000000 
+0200
@@ -15,7 +15,7 @@
 
 [project]
 name = "cryptography"
-version = "45.0.5"
+version = "45.0.7"
 authors = [
     { name = "The Python Cryptographic Authority and individual contributors", 
email = "[email protected]" },
 ]
@@ -65,7 +65,7 @@
 # All the following are used for our own testing.
 nox = ["nox >=2024.04.15", "nox[uv] >=2024.03.02; python_version >= '3.8'"]
 test = [
-    "cryptography_vectors==45.0.5",
+    "cryptography_vectors==45.0.7",
     "pytest >=7.4.0",
     "pytest-benchmark >=4.0",
     "pytest-cov >=2.10.1",
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/cryptography-45.0.5/src/_cffi_src/openssl/ssl.py 
new/cryptography-45.0.7/src/_cffi_src/openssl/ssl.py
--- old/cryptography-45.0.5/src/_cffi_src/openssl/ssl.py        2025-07-02 
15:00:14.000000000 +0200
+++ new/cryptography-45.0.7/src/_cffi_src/openssl/ssl.py        2025-09-01 
13:05:40.000000000 +0200
@@ -263,6 +263,7 @@
 void SSL_CTX_set_client_CA_list(SSL_CTX *, Cryptography_STACK_OF_X509_NAME *);
 
 void SSL_CTX_set_info_callback(SSL_CTX *, void (*)(const SSL *, int, int));
+void SSL_set_info_callback(SSL *, void (*) (const SSL *, int, int));
 
 void SSL_CTX_set_msg_callback(SSL_CTX *,
                               void (*)(
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/cryptography-45.0.5/src/cryptography/__about__.py 
new/cryptography-45.0.7/src/cryptography/__about__.py
--- old/cryptography-45.0.5/src/cryptography/__about__.py       2025-07-02 
15:00:14.000000000 +0200
+++ new/cryptography-45.0.7/src/cryptography/__about__.py       2025-09-01 
13:05:40.000000000 +0200
@@ -10,7 +10,7 @@
     "__version__",
 ]
 
-__version__ = "45.0.5"
+__version__ = "45.0.7"
 
 
 __author__ = "The Python Cryptographic Authority and individual contributors"
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/cryptography-45.0.5/src/rust/cryptography-openssl/src/aead.rs 
new/cryptography-45.0.7/src/rust/cryptography-openssl/src/aead.rs
--- old/cryptography-45.0.5/src/rust/cryptography-openssl/src/aead.rs   
2025-07-02 15:00:14.000000000 +0200
+++ new/cryptography-45.0.7/src/rust/cryptography-openssl/src/aead.rs   
2025-09-01 13:05:40.000000000 +0200
@@ -37,14 +37,11 @@
             AeadType::Aes256GcmSiv => unsafe { ffi::EVP_aead_aes_256_gcm_siv() 
},
         };
 
+        let key_ptr = key.as_ptr();
+        let tag_len = ffi::EVP_AEAD_DEFAULT_TAG_LENGTH as usize;
         // SAFETY: We're passing a valid key and aead.
         unsafe {
-            let ctx = cvt_p(ffi::EVP_AEAD_CTX_new(
-                aead,
-                key.as_ptr(),
-                key.len(),
-                ffi::EVP_AEAD_DEFAULT_TAG_LENGTH as usize,
-            ))?;
+            let ctx = cvt_p(ffi::EVP_AEAD_CTX_new(aead, key_ptr, key.len(), 
tag_len))?;
             Ok(AeadCtx::from_ptr(ctx))
         }
     }
@@ -61,7 +58,7 @@
         let mut out_len = out.len();
         // SAFETY: All the lengths and pointers are known valid.
         unsafe {
-            cvt(ffi::EVP_AEAD_CTX_seal(
+            let res = ffi::EVP_AEAD_CTX_seal(
                 self.as_ptr(),
                 out.as_mut_ptr(),
                 &mut out_len,
@@ -72,7 +69,8 @@
                 data.len(),
                 ad.as_ptr(),
                 ad.len(),
-            ))?;
+            );
+            cvt(res)?;
         }
         Ok(())
     }
@@ -87,7 +85,7 @@
         let mut out_len = out.len();
         // SAFETY: All the lengths and pointers are known valid.
         unsafe {
-            cvt(ffi::EVP_AEAD_CTX_open(
+            let res = ffi::EVP_AEAD_CTX_open(
                 self.as_ptr(),
                 out.as_mut_ptr(),
                 &mut out_len,
@@ -98,7 +96,8 @@
                 data.len(),
                 ad.as_ptr(),
                 ad.len(),
-            ))?;
+            );
+            cvt(res)?;
         }
         Ok(())
     }
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/cryptography-45.0.5/src/rust/src/backend/aead.rs 
new/cryptography-45.0.7/src/rust/src/backend/aead.rs
--- old/cryptography-45.0.5/src/rust/src/backend/aead.rs        2025-07-02 
15:00:14.000000000 +0200
+++ new/cryptography-45.0.7/src/rust/src/backend/aead.rs        2025-09-01 
13:05:40.000000000 +0200
@@ -400,16 +400,13 @@
             assert!(aad.is_none());
             b""
         };
-        Ok(pyo3::types::PyBytes::new_with(
-            py,
-            plaintext.len() + self.tag_len,
-            |b| {
-                self.ctx
-                    .encrypt(plaintext, nonce.unwrap_or(b""), ad, b)
-                    .map_err(CryptographyError::from)?;
-                Ok(())
-            },
-        )?)
+        let out_len = plaintext.len() + self.tag_len;
+        Ok(pyo3::types::PyBytes::new_with(py, out_len, |b| {
+            self.ctx
+                .encrypt(plaintext, nonce.unwrap_or(b""), ad, b)
+                .map_err(CryptographyError::from)?;
+            Ok(())
+        })?)
     }
 
     fn decrypt<'p>(
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/cryptography-45.0.5/src/rust/src/buf.rs 
new/cryptography-45.0.7/src/rust/src/buf.rs
--- old/cryptography-45.0.5/src/rust/src/buf.rs 2025-07-02 15:00:14.000000000 
+0200
+++ new/cryptography-45.0.7/src/rust/src/buf.rs 2025-09-01 13:05:40.000000000 
+0200
@@ -48,10 +48,8 @@
 ) -> pyo3::PyResult<(pyo3::Bound<'p, pyo3::PyAny>, usize, usize)> {
     let py = pyobj.py();
     let bufobj = if mutable {
-        let kwargs = pyo3::types::IntoPyDict::into_py_dict(
-            [(pyo3::intern!(py, "require_writable"), true)],
-            py,
-        )?;
+        let kwargs = [(pyo3::intern!(py, "require_writable"), true)];
+        let kwargs = pyo3::types::IntoPyDict::into_py_dict(kwargs, py)?;
         types::FFI_FROM_BUFFER
             .get(py)?
             .call((pyobj,), Some(&kwargs))

++++++ no-pytest_benchmark.patch ++++++
--- /var/tmp/diff_new_pack.6KXXW4/_old  2025-09-15 19:54:28.071039266 +0200
+++ /var/tmp/diff_new_pack.6KXXW4/_new  2025-09-15 19:54:28.075039434 +0200
@@ -1,10 +1,10 @@
-Index: cryptography-45.0.5/pyproject.toml
+Index: cryptography-45.0.7/pyproject.toml
 ===================================================================
---- cryptography-45.0.5.orig/pyproject.toml
-+++ cryptography-45.0.5/pyproject.toml
+--- cryptography-45.0.7.orig/pyproject.toml
++++ cryptography-45.0.7/pyproject.toml
 @@ -67,8 +67,6 @@ nox = ["nox >=2024.04.15", "nox[uv] >=20
  test = [
-     "cryptography_vectors==45.0.5",
+     "cryptography_vectors==45.0.7",
      "pytest >=7.4.0",
 -    "pytest-benchmark >=4.0",
 -    "pytest-cov >=2.10.1",
@@ -51,10 +51,10 @@
  [tool.ruff]
  line-length = 79
  
-Index: cryptography-45.0.5/tests/bench/test_aead.py
+Index: cryptography-45.0.7/tests/bench/test_aead.py
 ===================================================================
---- cryptography-45.0.5.orig/tests/bench/test_aead.py
-+++ cryptography-45.0.5/tests/bench/test_aead.py
+--- cryptography-45.0.7.orig/tests/bench/test_aead.py
++++ cryptography-45.0.7/tests/bench/test_aead.py
 @@ -26,84 +26,84 @@ def _aead_supported(cls):
      not _aead_supported(ChaCha20Poly1305),
      reason="Requires OpenSSL with ChaCha20Poly1305 support",
@@ -160,10 +160,10 @@
      ct = aes.encrypt(b"\x00" * 12, b"hello world plaintext", None)
 -    benchmark(aes.decrypt, b"\x00" * 12, ct, None)
 +    aes.decrypt(b"\x00" * 12, ct, None)
-Index: cryptography-45.0.5/tests/bench/test_ec_load.py
+Index: cryptography-45.0.7/tests/bench/test_ec_load.py
 ===================================================================
---- cryptography-45.0.5.orig/tests/bench/test_ec_load.py
-+++ cryptography-45.0.5/tests/bench/test_ec_load.py
+--- cryptography-45.0.7.orig/tests/bench/test_ec_load.py
++++ cryptography-45.0.7/tests/bench/test_ec_load.py
 @@ -5,9 +5,9 @@
  from ..hazmat.primitives.fixtures_ec import EC_KEY_SECP256R1
  
@@ -178,10 +178,10 @@
 -    benchmark(EC_KEY_SECP256R1.private_key)
 +def test_load_ec_private_numbers():
 +    EC_KEY_SECP256R1.private_key()
-Index: cryptography-45.0.5/tests/bench/test_hashes.py
+Index: cryptography-45.0.7/tests/bench/test_hashes.py
 ===================================================================
---- cryptography-45.0.5.orig/tests/bench/test_hashes.py
-+++ cryptography-45.0.5/tests/bench/test_hashes.py
+--- cryptography-45.0.7.orig/tests/bench/test_hashes.py
++++ cryptography-45.0.7/tests/bench/test_hashes.py
 @@ -5,10 +5,10 @@
  from cryptography.hazmat.primitives import hashes
  
@@ -195,10 +195,10 @@
  
 -    benchmark(bench)
 +    bench()
-Index: cryptography-45.0.5/tests/bench/test_hmac.py
+Index: cryptography-45.0.7/tests/bench/test_hmac.py
 ===================================================================
---- cryptography-45.0.5.orig/tests/bench/test_hmac.py
-+++ cryptography-45.0.5/tests/bench/test_hmac.py
+--- cryptography-45.0.7.orig/tests/bench/test_hmac.py
++++ cryptography-45.0.7/tests/bench/test_hmac.py
 @@ -5,10 +5,10 @@
  from cryptography.hazmat.primitives import hashes, hmac
  
@@ -212,10 +212,10 @@
  
 -    benchmark(bench)
 +    bench()
-Index: cryptography-45.0.5/tests/bench/test_x509.py
+Index: cryptography-45.0.7/tests/bench/test_x509.py
 ===================================================================
---- cryptography-45.0.5.orig/tests/bench/test_x509.py
-+++ cryptography-45.0.5/tests/bench/test_x509.py
+--- cryptography-45.0.7.orig/tests/bench/test_x509.py
++++ cryptography-45.0.7/tests/bench/test_x509.py
 @@ -13,40 +13,40 @@ from cryptography import x509
  from ..utils import load_vectors_from_file
  

++++++ vendor.tar.zst ++++++
++++ 54808 lines of diff (skipped)

Reply via email to