python2-pyOpenSSL-17.5.0-lp151.4.6.1<>,K^ݸ/=„C֛yJZ!;BP-L(r};𚹩P\mS[NY^Rg?3k!U&y7전)?|: |m%4 F6$[s>a:I@hƆDpc&]\+D)͚t^и7 w}>,@!2oW:mKL%4IGq9s]-8 ϾU;dXS#\9OhI-NSh]:|e>AA?Ad ' X ,Ikqx'' b' ' L'  3'  \' ''~'HP(89:"B7F8G8('H8'I9`'X9Y9Z9[9\9']:'^<`b=nc>d>e>f>l>u>'v?lw?'x@'yAzA|AAAACpython2-pyOpenSSL17.5.0lp151.4.6.1Python wrapper module around the OpenSSL librarypyOpenSSL is a set of Python bindings for OpenSSL. It includes some low-level cryptography APIs but is primarily focused on providing an API for using the TLS protocol from Python. pyOpenSSL is now a pure-Python project with a dependency on a new project, cryptography (), which provides (among other things) a cffi-based interface to OpenSSL.^cloud122 KopenSUSE Leap 15.1openSUSEApache-2.0http://bugs.opensuse.orgDevelopment/Languages/Pythonhttps://github.com/pyca/pyopenssllinuxnoarch=99eN}}<WWNrj-c dv,^A큤A큤A큤A큤^Z q^^Z q^^Z q^^^ @^^Z q^^Z q^^Z q^^Z q^^^^^^^^^^Z qZ qZ qZ q^Z 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-pyOpenSSL-17.5.0-lp151.4.6.1.src.rpmpyOpenSSLpython-opensslpython-pyOpenSSLpython2-pyOpenSSL@      python(abi)python2-cryptographypython2-sixrpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PartialHardlinkSets)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)2.72.1.41.5.23.0.4-14.6.0-14.0.4-14.0-15.2-14.14.1^ @]V[R@ZtRYn@YJY?Y i@YX,J@X*X)@W9@W0{UU7@U7@Matej Cepl Matej Cepl Vítězslav Čížek tchvatal@suse.comtbechtold@suse.comro@suse.dedimstar@opensuse.orgtoddrme2178@gmail.comtoddrme2178@gmail.comdmueller@suse.commlin@suse.commlin@suse.comjmatejek@suse.comhpj@urpla.nettoddrme2178@gmail.commcihar@suse.czmcihar@suse.cz- Add fix-compilation-2020.patch (by Bernhard Wiedemann). Fixes bsc#1159989 (and its upstream equivalent gh#pyca/pyopenssl#735).- Add openSSL_111d.patch (bsc#1149792) fixing incompatibility with OpenSSL 1.1.1d.- OpenSSL changed X509_STORE_add_cert in 1.1.0i such that it no longer raises an error if a duplicate cert is added (bsc#1110435) * https://github.com/pyca/pyopenssl/pull/787 * add X509_STORE_add_cert.patch- Update to 17.5.0: * The minimum cryptography version is now 2.1.4. * Fixed various memory leaks * Various fuzz fixes * See CHANGELOG.rst- update to 17.2.0: - Deprecated ``OpenSSL.rand`` - callers should use ``os.urandom()`` instead. - Fixed a bug causing ``Context.set_default_verify_paths()`` to not work with cryptography ``manylinux1`` wheels on Python 3.x. - Fixed a crash with (EC)DSA signatures in some cases. - Removed the deprecated ``OpenSSL.rand.egd()`` function. Applications should prefer ``os.urandom()`` for random number generation. - Removed the deprecated default ``digest`` argument to ``OpenSSL.crypto.CRL.export()``. Callers must now always pass an explicit ``digest``. - Fixed a bug with ``ASN1_TIME`` casting in ``X509.set_notBefore()``, ``X509.set_notAfter()``, ``Revoked.set_rev_date()``, ``Revoked.set_nextUpdate()``, and ``Revoked.set_lastUpdate()``. You must now pass times in the form ``YYYYMMDDhhmmssZ``. ``YYYYMMDDhhmmss+hhmm`` and ``YYYYMMDDhhmmss-hhmm`` will no longer work. `#612 `_ - Deprecated the legacy "Type" aliases: ``ContextType``, ``ConnectionType``, ``PKeyType``, ``X509NameType``, ``X509ExtensionType``, ``X509ReqType``, ``X509Type``, ``X509StoreType``, ``CRLType``, ``PKCS7Type``, ``PKCS12Type``, ``NetscapeSPKIType``. The names without the "Type"-suffix should be used instead. - Added ``OpenSSL.crypto.X509.from_cryptography()`` and ``OpenSSL.crypto.X509.to_cryptography()`` for converting X.509 certificate to and from pyca/cryptography objects. - Added ``OpenSSL.crypto.X509Req.from_cryptography()``, ``OpenSSL.crypto.X509Req.to_cryptography()``, ``OpenSSL.crypto.CRL.from_cryptography()``, and ``OpenSSL.crypto.CRL.to_cryptography()`` for converting X.509 CSRs and CRLs to and from pyca/cryptography objects. - Added ``OpenSSL.debug`` that allows to get an overview of used library versions (including linked OpenSSL) and other useful runtime information using ``python -m OpenSSL.debug``. - Added a fallback path to ``Context.set_default_verify_paths()`` to accommodate the upcoming release of ``cryptography`` ``manylinux1`` wheels. - Drop python-pyOpenSSL=replace-expired-cert.patch . Applied upstream. - Drop python-pyOpenSSL-always-overflow.patch. Applied upstream.- add patch to always trigger overflow in the testsuite (gh#pyca/pyopenssl#657) b3460c6a9a45a016d1ab65c149c606fa3f07096d python-pyOpenSSL-always-overflow.patch- Add python-pyOpenSSL=replace-expired-cert.patch: the root cert expired, mking the test suite fail. Replace the certificate with a new one, valid for 20 years (gh#pyca/pyopenssl#637).- Fix Provides/Obsoletes.- Implement single-spec version - Fix source URL - Update to 17.0.0 * Added ``OpenSSL.X509Store.set_time()`` to set a custom verification time when verifying certificate chains. * Added a collection of functions for working with OCSP stapling. None of these functions make it possible to validate OCSP assertions, only to staple them into the handshake and to retrieve the stapled assertion if provided. Users will need to write their own code to handle OCSP assertions. We specifically added: ``Context.set_ocsp_server_callback``, ``Context.set_ocsp_client_callback``, and ``Connection.request_ocsp``. * Changed the ``SSL`` module's memory allocation policy to avoid zeroing memory it allocates when unnecessary. This reduces CPU usage and memory allocation time by an amount proportional to the size of the allocation. For applications that process a lot of TLS data or that use very lage allocations this can provide considerable performance improvements. * Automatically set ``SSL_CTX_set_ecdh_auto()`` on ``OpenSSL.SSL.Context``. - Fix empty exceptions from ``OpenSSL.crypto.load_privatekey()``. - Rebase bug-lp-1265482.diff - Rebase rsa128-i586.patch - Rebase skip-networked-test.patch- fix source url- Change source url to pypi.io * version 16.2.0 source tarball failed to download from pypi.python.org- Update to 16.2.0 * Deprecations * * Dropped support for OpenSSL 0.9.8. * Changes * * Fix memory leak in OpenSSL.crypto.dump_privatekey() with FILETYPE_TEXT. #496 * * Enable use of CRL (and more) in verify context. #483 * * OpenSSL.crypto.PKey can now be constructed from cryptography objects and also exported as such. #439 * * Support newer versions of cryptography which use opaque structs for OpenSSL 1.1.0 compatibility. * * Fixed compatibility errors with OpenSSL 1.1.0. * * Fixed an issue that caused failures with subinterpreters and embedded Pythons. [#552]- added %check section with testsuite - skip-networked-test.patch - mark a test as networked so that we can specify non-network test run - rsa128-i586.patch - sidestep a crasher bug on 32bit platforms by generating reasonably-sized RSA keys instead of small 128bit ones- update to 16.0.0 Backward-incompatible changes: * Python 3.2 support has been dropped. It never had significant real world usage and has been dropped by our main dependency cryptography. Affected users should upgrade to Python 3.3 or later. Deprecations: * The support for EGD has been removed. The only affected function OpenSSL.rand.egd() now uses os.urandom() to seed the internal PRNG instead. Please see pyca/cryptography#1636 for more background information on this decision. In accordance with our backward compatibility policy OpenSSL.rand.egd() will be removed no sooner than a year from the release of 16.0.0. * Please note that you should use urandom for all your secure random number needs. * Python 2.6 support has been deprecated. Our main dependency cryptography deprecated 2.6 in version 0.9 (2015-05-14) with no time table for actually dropping it. pyOpenSSL will drop Python 2.6 support once cryptography does. Changes: * Fixed OpenSSL.SSL.Context.set_session_id, OpenSSL.SSL.Connection.renegotiate, OpenSSL.SSL.Connection.renegotiate_pending, and OpenSSL.SSL.Context.load_client_ca. They were lacking an implementation since 0.14. #422 * Fixed segmentation fault when using keys larger than 4096-bit to sign data. [#428] * Fixed AttributeError when OpenSSL.SSL.Connection.get_app_data() was called before setting any app data. #304 * Added OpenSSL.crypto.dump_publickey() to dump OpenSSL.crypto.PKey objects that represent public keys, and OpenSSL.crypto.load_publickey() to load such objects from serialized representations. #382 * Added OpenSSL.crypto.dump_crl() to dump a certificate revocation list out to a string buffer. #368 * Added OpenSSL.SSL.Connection.get_state_string() using the OpenSSL binding state_string_long. #358 * Added support for the socket.MSG_PEEK flag to OpenSSL.SSL.Connection.recv() and OpenSSL.SSL.Connection.recv_into(). #294 * Added OpenSSL.SSL.Connection.get_protocol_version() and OpenSSL.SSL.Connection.get_protocol_version_name(). #244 * Switched to utf8string mask by default. OpenSSL formerly defaulted to a T61String if there were UTF-8 characters present. This was changed to default to UTF8String in the config around 2005, but the actual code didn’t change it until late last year. This will default us to the setting that actually works. To revert this you can call OpenSSL.crypto._lib.ASN1_STRING_set_default_mask_asc(b"default"). #234 - fixed paths in bug-lp-1265482.diff - fixed doc generation - spec clean up- Fix building on SLES 11- Do not hardcode version in file list- udapte to 0.15.1 * OpenSSL/SSL.py, OpenSSL/test/test_ssl.py: Fix a regression present in 0.15, where when an error occurs and no errno() is set, a KeyError is raised. This happens, for example, if Connection.shutdown() is called when the underlying transport has gone away. * OpenSSL/rand.py, OpenSSL/SSL.py: APIs which previously accepted filenames only as bytes now accept them as either bytes or unicode (and respect sys.getfilesystemencoding()). * OpenSSL/SSL.py: Add Cory Benfield's next-protocol-negotiation (NPN) bindings. * OpenSSL/SSL.py: Add ``Connection.recv_into``, mirroring the builtin ``socket.recv_into``. Based on work from Cory Benfield. * OpenSSL/test/test_ssl.py: Add tests for ``recv_into``. * OpenSSL/crypto.py: Expose ``X509StoreContext`` for verifying certificates. * OpenSSL/test/test_crypto.py: Add intermediate certificates for * OpenSSL/SSL.py: ``Connection.shutdown`` now propagates errors from the underlying socket. * OpenSSL/SSL.py: Fixed a regression ``Context.check_privatekey`` causing it to always succeed - even if it should fail. * OpenSSL/crypto.py: Fixed a regression where calling ``load_pkcs7_data`` with ``FILETYPE_ASN1`` would fail with a ``NameError``. * OpenSSL/SSL.py: Fix a regression in which the first argument ofpython-opensslpython-pyOpenSSLcloud122 1578481629  !"#$%&'17.5.017.5.017.5.0-lp151.4.6.117.5.0-lp151.4.6.117.5.017.5.0-lp151.4.6.1OpenSSLSSL.pySSL.pycSSL.pyo__init__.py__init__.pyc__init__.pyo_util.py_util.pyc_util.pyocrypto.pycrypto.pyccrypto.pyodebug.pydebug.pycdebug.pyorand.pyrand.pycrand.pyotsafe.pytsafe.pyctsafe.pyoversion.pyversion.pycversion.pyopyOpenSSL-17.5.0-py2.7.egg-infoPKG-INFOSOURCES.txtdependency_links.txtrequires.txttop_level.txtpython2-pyOpenSSLCHANGELOG.rstCODE_OF_CONDUCT.rstCONTRIBUTING.rstINSTALL.rstREADME.rstpython2-pyOpenSSLLICENSE/usr/lib/python2.7/site-packages//usr/lib/python2.7/site-packages/OpenSSL//usr/lib/python2.7/site-packages/pyOpenSSL-17.5.0-py2.7.egg-info//usr/share/doc/packages//usr/share/doc/packages/python2-pyOpenSSL//usr/share/licenses//usr/share/licenses/python2-pyOpenSSL/-fmessage-length=0 -grecord-gcc-switches -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector-strong -funwind-tables -fasynchronous-unwind-tables -fstack-clash-protection -gobs://build.opensuse.org/openSUSE:Maintenance:11753/openSUSE_Leap_15.1_Update/d5fd5ea5063558ef23a83b24f61392c3-python-pyOpenSSL.openSUSE_Leap_15.1_Updatedrpmxz5noarch-suse-linuxdirectoryPython script, ASCII text executablepython 2.7 byte-compiledASCII textASCII text, with very long lines RRRRRRRRRRRRRRRRRRRRRRRRȡAIutf-84a265e8a3d58a56cc95a7d938ee2c85937e700338e81eede60b802ca1152b091?7zXZ !t/9]"k%na kCN_ך#hED"x7kڐ1S+e\e%ldr<꧛sΉi4tMtw*Nw>c "ߦwY;=\z`B֏CE0_8Q8z,yO !mNn{@^ٵjnpQZ"@dI3k.9\-5m~#dNT8O”|ba&.k|<~DBI}yюx\36|fN$~F$z_~i&eO (H''Ȧ9uY_;P&?[A^~x<į 󴺐Z=ƞZpc/x\aGPo]|EQG6ΏI#v; e/UDcjmѦ{K$zɷe}CRi  qJH!GK_ŜO1tI?SJ%ЋG3/gÃ|p4U3RKٛ4x}Gq [9UB3 +MHZW+|rGEcz(&5zQ1;K ZoRogzFrqz;ʸEcdKa5M4|λTq!C͙mܐptC,Ԣ[7`=Cwh?U5FhﭽWf#w{1܄0@ΛԬ釽aH(.ڱ2A-0yb!1Gqq8XGƃPU˫n= k$U.ޘ/_TI'Z;{#WbP }8YG? Q 3# zoCLw\-%OI}pd` L5ęt~.U xIcrNKOŸ OD9C;O&#qNu2H^p)exی|[2nZwQ/jܣ1;AAqk&@7[C@ڰ]Ee~̽dIlOM}j$ɻۚsVkwUUW4|B|;gkY