From mboxrd@z Thu Jan 1 00:00:00 1970 From: Adolf Belka To: development@lists.ipfire.org Subject: Re: [PATCH 01/23] python3-cryptography: Update to version 36.0.2 Date: Sat, 18 Jun 2022 18:20:03 +0200 Message-ID: <9b265890-8cef-7491-5d7d-0158636a2ca8@ipfire.org> In-Reply-To: MIME-Version: 1.0 Content-Type: multipart/mixed; boundary="===============5100822333864576891==" List-Id: --===============5100822333864576891== Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: quoted-printable Hi Peter, On 18/06/2022 16:51, Peter M=C3=BCller wrote: > Hello Adolf, >=20 > I can only concur with Michael, and thank you for all your work. >=20 > For size reasons, I would abstain from cramping these patches into Core Upd= ate 169 (which > is currently at 98 MByte on x86_64), and defer them to Core Update 170. Wou= ld that be > fine to you? Absolutely fine for me. I was expecting that it would wait till CU170. Adolf. >=20 > Thanks, and best regards, > Peter M=C3=BCller >=20 >=20 >> >> >> On 17/06/2022 12:14, Michael Tremer wrote: >>> Oh wow. 23 patches. >> and would have been 26 patches without your help on removing the windows r= equirements. >>> >>> That looks like a lot of work! >>> >>> Thank you for this. I will not tag them all individually if that is okay = :) >> That is fine by me :-) >>> >>> -Michael >>> >>>> On 17 Jun 2022, at 11:00, Adolf Belka wrote: >>>> >>>> Dear All, >>>> >>>> For information this patch series can wait till CU170. It is not an urge= nt need to update in CU169. >>>> >>>> Regards, >>>> Adolf. >>>> >>>> On 17/06/2022 11:42, Adolf Belka wrote: >>>>> - Update from version 3.4.7 to 36.0.2 >>>>> =C2=A0=C2=A0=C2=A0 After version 3.4.8 the numbering scheme changed to= 35.0.0 in Sept 2021 >>>>> =C2=A0=C2=A0=C2=A0 See Chanelog section 35.0.0 below >>>>> - New release requires a lot of rust packages - see Changelog sections = 35.0.0 & 36.0.0 >>>>> =C2=A0=C2=A0=C2=A0 below. The required rust packages are installed in = separate patches in this series >>>>> - Update of rootfile >>>>> - Changelog >>>>> =C2=A0=C2=A0=C2=A0=C2=A036.0.2 - 2022-03-15=C2=B6 >>>>> =C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 Updated Windows, macOS, and= Linux wheels to be compiled with OpenSSL 1.1.1n. >>>>> =C2=A0=C2=A0=C2=A0=C2=A036.0.1 - 2021-12-14=C2=B6 >>>>> =C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 Updated Windows, macOS, and= Linux wheels to be compiled with OpenSSL 1.1.1m. >>>>> =C2=A0=C2=A0=C2=A0=C2=A036.0.0 - 2021-11-21=C2=B6 >>>>> =C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 FINAL DEPRECATION Support f= or verifier and signer on our asymmetric key >>>>> =C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2= =A0=C2=A0 classes was deprecated in version 2.0. These functions had an exten= ded >>>>> =C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2= =A0=C2=A0 deprecation due to usage, however the next version of cryptography = will drop >>>>> =C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2= =A0=C2=A0 support. Users should migrate to sign and verify. >>>>> =C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 The entire X.509 layer is n= ow written in Rust. This allows alternate >>>>> =C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2= =A0=C2=A0 asymmetric key implementations that can support cloud key management >>>>> =C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2= =A0=C2=A0 services or hardware security modules provided they implement the n= ecessary >>>>> =C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2= =A0=C2=A0 interface (for example: EllipticCurvePrivateKey). >>>>> =C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 Deprecated the backend argu= ment for all functions. >>>>> =C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 Added support for AESOCB3. >>>>> =C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 Added support for iterating= over arbitrary request attributes. >>>>> =C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 Deprecated the get_attribut= e_for_oid method on CertificateSigningRequest in >>>>> =C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2= =A0=C2=A0 favor of get_attribute_for_oid() on the new Attributes object. >>>>> =C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 Fixed handling of PEM files= to allow loading when certificate and key are in >>>>> =C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2= =A0=C2=A0 the same file. >>>>> =C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 Fixed parsing of Certificat= ePolicies extensions containing legacy BMPString >>>>> =C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2= =A0=C2=A0 values in their explicitText. >>>>> =C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 Allow parsing of negative s= erial numbers in certificates. Negative serial >>>>> =C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2= =A0=C2=A0 numbers are prohibited by RFC 5280 so a deprecation warning will be= raised >>>>> =C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2= =A0=C2=A0 whenever they are encountered. A future version of cryptography wil= l drop >>>>> =C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2= =A0=C2=A0 support for parsing them. >>>>> =C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 Added support for parsing P= KCS12 files with friendly names for all >>>>> =C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2= =A0=C2=A0 certificates with load_pkcs12(), which will return an object of type >>>>> =C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2= =A0=C2=A0 PKCS12KeyAndCertificates. >>>>> =C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 rfc4514_string() and relate= d methods now have an optional attr_name_overrides >>>>> =C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2= =A0=C2=A0 parameter to supply custom OID to name mappings, which can be used = to match >>>>> =C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2= =A0=C2=A0 vendor-specific extensions. >>>>> =C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 BACKWARDS INCOMPATIBLE: Rev= erted the nonstandard formatting of email address >>>>> =C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2= =A0=C2=A0 fields as E in rfc4514_string() methods from version 35.0. >>>>> =C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 The previous behavior can b= e restored with: >>>>> =C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2= =A0=C2=A0 name.rfc4514_string({NameOID.EMAIL_ADDRESS: "E"}) >>>>> =C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 Allow X25519PublicKey and X= 448PublicKey to be used as public keys when >>>>> =C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2= =A0=C2=A0 parsing certificates or creating them with CertificateBuilder. Thes= e key >>>>> =C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2= =A0=C2=A0 types must be signed with a different signing algorithm as X25519 a= nd X448 >>>>> =C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2= =A0=C2=A0 do not support signing. >>>>> =C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 Extension values can now be= serialized to a DER byte string by calling >>>>> =C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2= =A0=C2=A0 public_bytes(). >>>>> =C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 Added experimental support = for compiling against BoringSSL. As BoringSSL >>>>> =C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2= =A0=C2=A0 does not commit to a stable API, cryptography tests against the lat= est >>>>> =C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2= =A0=C2=A0 commit only. Please note that several features are not available wh= en >>>>> =C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2= =A0=C2=A0 building against BoringSSL. >>>>> =C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 Parsing CertificateSigningR= equest from DER and PEM now, for a limited time >>>>> =C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2= =A0=C2=A0 period, allows the Extension critical field to be incorrectly encod= ed. See >>>>> =C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2= =A0=C2=A0 the issue for complete details. This will be reverted in a future >>>>> =C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2= =A0=C2=A0 cryptography release. >>>>> =C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 When OCSPNonce are parsed a= nd generated their value is now correctly wrapped >>>>> =C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2= =A0=C2=A0 in an ASN.1 OCTET STRING. This conforms to RFC 6960 but conflicts w= ith the >>>>> =C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2= =A0=C2=A0 original behavior specified in RFC 2560. For a temporary period for >>>>> =C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2= =A0=C2=A0 backwards compatibility, we will also parse values that are encoded= as >>>>> =C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2= =A0=C2=A0 specified in RFC 2560 but this behavior will be removed in a future= release. >>>>> =C2=A0=C2=A0=C2=A0=C2=A035.0.0 - 2021-09-29=C2=B6 >>>>> =C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 Changed the version scheme.= This will result in us incrementing the major >>>>> =C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2= =A0=C2=A0 version more frequently, but does not change our existing backwards >>>>> =C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2= =A0=C2=A0 compatibility policy. >>>>> =C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 BACKWARDS INCOMPATIBLE: The= X.509 PEM parsers now require that the PEM >>>>> =C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2= =A0=C2=A0 string passed have PEM delimiters of the correct type. For example,= parsing >>>>> =C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2= =A0=C2=A0 a private key PEM concatenated with a certificate PEM will no longe= r be >>>>> =C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2= =A0=C2=A0 accepted by the PEM certificate parser. >>>>> =C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 BACKWARDS INCOMPATIBLE: The= X.509 certificate parser no longer allows >>>>> =C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2= =A0=C2=A0 negative serial numbers. RFC 5280 has always prohibited these. >>>>> =C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 BACKWARDS INCOMPATIBLE: Add= itional forms of invalid ASN.1 found during X.509 >>>>> =C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2= =A0=C2=A0 parsing will raise an error on initial parse rather than when the m= alformed >>>>> =C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2= =A0=C2=A0 field is accessed. >>>>> =C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 Rust is now required for bu= ilding cryptography, the >>>>> =C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2= =A0=C2=A0 CRYPTOGRAPHY_DONT_BUILD_RUST environment variable is no longer resp= ected. >>>>> =C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 Parsers for X.509 no longer= use OpenSSL and have been rewritten in Rust. >>>>> =C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2= =A0=C2=A0 This should be backwards compatible (modulo the items listed above)= and >>>>> =C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2= =A0=C2=A0 improve both security and performance. >>>>> =C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 Added support for OpenSSL 3= .0.0 as a compilation target. >>>>> =C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 Added support for SM3 and S= M4, when using OpenSSL 1.1.1. These algorithms >>>>> =C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2= =A0=C2=A0 are provided for compatibility in regions where they may be require= d, and >>>>> =C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2= =A0=C2=A0 are not generally recommended. >>>>> =C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 We now ship manylinux_2_24 = and musllinux_1_1 wheels, in addition to our >>>>> =C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2= =A0=C2=A0 manylinux2010 and manylinux2014 wheels. Users on distributions like= Alpine >>>>> =C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2= =A0=C2=A0 Linux should ensure they upgrade to the latest pip to correctly rec= eive >>>>> =C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2= =A0=C2=A0 wheels. >>>>> =C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 Added rfc4514_attribute_nam= e attribute to x509.NameAttribute. >>>>> =C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 Added KBKDFCMAC. >>>>> =C2=A0=C2=A0=C2=A0=C2=A03.4.8 - 2021-08-24=C2=B6 >>>>> =C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 Updated Windows, macOS, and= manylinux wheels to be compiled with >>>>> =C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2= =A0=C2=A0 OpenSSL 1.1.1l. >>>>> Signed-off-by: Adolf Belka >>>>> --- >>>>> =C2=A0 .../rootfiles/packages/python3-cryptography=C2=A0=C2=A0 | 25 ++= ++++++++--------- >>>>> =C2=A0 lfs/python3-cryptography=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2= =A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0= =C2=A0=C2=A0 |=C2=A0 6 ++--- >>>>> =C2=A0 2 files changed, 16 insertions(+), 15 deletions(-) >>>>> diff --git a/config/rootfiles/packages/python3-cryptography b/config/ro= otfiles/packages/python3-cryptography >>>>> index 9f63606fb..a9ee32faf 100644 >>>>> --- a/config/rootfiles/packages/python3-cryptography >>>>> +++ b/config/rootfiles/packages/python3-cryptography >>>>> @@ -1,20 +1,18 @@ >>>>> =C2=A0 usr/lib/python3.10/site-packages/cryptography >>>>> -#usr/lib/python3.10/site-packages/cryptography-3.4.7-py3.10.egg-info >>>>> -#usr/lib/python3.10/site-packages/cryptography-3.4.7-py3.10.egg-info/P= KG-INFO >>>>> -#usr/lib/python3.10/site-packages/cryptography-3.4.7-py3.10.egg-info/S= OURCES.txt >>>>> -#usr/lib/python3.10/site-packages/cryptography-3.4.7-py3.10.egg-info/d= ependency_links.txt >>>>> -#usr/lib/python3.10/site-packages/cryptography-3.4.7-py3.10.egg-info/n= ot-zip-safe >>>>> -#usr/lib/python3.10/site-packages/cryptography-3.4.7-py3.10.egg-info/r= equires.txt >>>>> -#usr/lib/python3.10/site-packages/cryptography-3.4.7-py3.10.egg-info/t= op_level.txt >>>>> +#usr/lib/python3.10/site-packages/cryptography-36.0.2-py3.10.egg-info >>>>> +#usr/lib/python3.10/site-packages/cryptography-36.0.2-py3.10.egg-info/= PKG-INFO >>>>> +#usr/lib/python3.10/site-packages/cryptography-36.0.2-py3.10.egg-info/= SOURCES.txt >>>>> +#usr/lib/python3.10/site-packages/cryptography-36.0.2-py3.10.egg-info/= dependency_links.txt >>>>> +#usr/lib/python3.10/site-packages/cryptography-36.0.2-py3.10.egg-info/= not-zip-safe >>>>> +#usr/lib/python3.10/site-packages/cryptography-36.0.2-py3.10.egg-info/= requires.txt >>>>> +#usr/lib/python3.10/site-packages/cryptography-36.0.2-py3.10.egg-info/= top_level.txt >>>>> =C2=A0 usr/lib/python3.10/site-packages/cryptography/__about__.py >>>>> =C2=A0 usr/lib/python3.10/site-packages/cryptography/__init__.py >>>>> =C2=A0 usr/lib/python3.10/site-packages/cryptography/exceptions.py >>>>> =C2=A0 usr/lib/python3.10/site-packages/cryptography/fernet.py >>>>> =C2=A0 usr/lib/python3.10/site-packages/cryptography/hazmat >>>>> =C2=A0 usr/lib/python3.10/site-packages/cryptography/hazmat/__init__.py >>>>> -usr/lib/python3.10/site-packages/cryptography/hazmat/_der.py >>>>> =C2=A0 usr/lib/python3.10/site-packages/cryptography/hazmat/_oid.py >>>>> -usr/lib/python3.10/site-packages/cryptography/hazmat/_types.py >>>>> =C2=A0 usr/lib/python3.10/site-packages/cryptography/hazmat/backends >>>>> =C2=A0 usr/lib/python3.10/site-packages/cryptography/hazmat/backends/_= _init__.py >>>>> =C2=A0 usr/lib/python3.10/site-packages/cryptography/hazmat/backends/i= nterfaces.py >>>>> @@ -33,7 +31,6 @@ usr/lib/python3.10/site-packages/cryptography/hazmat/= backends/openssl/ed448.py >>>>> =C2=A0 usr/lib/python3.10/site-packages/cryptography/hazmat/backends/o= penssl/encode_asn1.py >>>>> =C2=A0 usr/lib/python3.10/site-packages/cryptography/hazmat/backends/o= penssl/hashes.py >>>>> =C2=A0 usr/lib/python3.10/site-packages/cryptography/hazmat/backends/o= penssl/hmac.py >>>>> -usr/lib/python3.10/site-packages/cryptography/hazmat/backends/openssl/= ocsp.py >>>>> =C2=A0 usr/lib/python3.10/site-packages/cryptography/hazmat/backends/o= penssl/poly1305.py >>>>> =C2=A0 usr/lib/python3.10/site-packages/cryptography/hazmat/backends/o= penssl/rsa.py >>>>> =C2=A0 usr/lib/python3.10/site-packages/cryptography/hazmat/backends/o= penssl/utils.py >>>>> @@ -43,8 +40,12 @@ usr/lib/python3.10/site-packages/cryptography/hazmat= /backends/openssl/x509.py >>>>> =C2=A0 usr/lib/python3.10/site-packages/cryptography/hazmat/bindings >>>>> =C2=A0 usr/lib/python3.10/site-packages/cryptography/hazmat/bindings/_= _init__.py >>>>> =C2=A0 usr/lib/python3.10/site-packages/cryptography/hazmat/bindings/_= openssl.abi3.so >>>>> -usr/lib/python3.10/site-packages/cryptography/hazmat/bindings/_padding= .abi3.so >>>>> +usr/lib/python3.10/site-packages/cryptography/hazmat/bindings/_rust >>>>> =C2=A0 usr/lib/python3.10/site-packages/cryptography/hazmat/bindings/_= rust.abi3.so >>>>> +usr/lib/python3.10/site-packages/cryptography/hazmat/bindings/_rust/__= init__.pyi >>>>> +usr/lib/python3.10/site-packages/cryptography/hazmat/bindings/_rust/as= n1.pyi >>>>> +usr/lib/python3.10/site-packages/cryptography/hazmat/bindings/_rust/oc= sp.pyi >>>>> +usr/lib/python3.10/site-packages/cryptography/hazmat/bindings/_rust/x5= 09.pyi >>>>> =C2=A0 usr/lib/python3.10/site-packages/cryptography/hazmat/bindings/o= penssl >>>>> =C2=A0 usr/lib/python3.10/site-packages/cryptography/hazmat/bindings/o= penssl/__init__.py >>>>> =C2=A0 usr/lib/python3.10/site-packages/cryptography/hazmat/bindings/o= penssl/_conditional.py >>>>> @@ -63,6 +64,7 @@ usr/lib/python3.10/site-packages/cryptography/hazmat/= primitives/asymmetric/ed255 >>>>> =C2=A0 usr/lib/python3.10/site-packages/cryptography/hazmat/primitives= /asymmetric/ed448.py >>>>> =C2=A0 usr/lib/python3.10/site-packages/cryptography/hazmat/primitives= /asymmetric/padding.py >>>>> =C2=A0 usr/lib/python3.10/site-packages/cryptography/hazmat/primitives= /asymmetric/rsa.py >>>>> +usr/lib/python3.10/site-packages/cryptography/hazmat/primitives/asymme= tric/types.py >>>>> =C2=A0 usr/lib/python3.10/site-packages/cryptography/hazmat/primitives= /asymmetric/utils.py >>>>> =C2=A0 usr/lib/python3.10/site-packages/cryptography/hazmat/primitives= /asymmetric/x25519.py >>>>> =C2=A0 usr/lib/python3.10/site-packages/cryptography/hazmat/primitives= /asymmetric/x448.py >>>>> @@ -97,7 +99,6 @@ usr/lib/python3.10/site-packages/cryptography/hazmat/= primitives/twofactor >>>>> =C2=A0 usr/lib/python3.10/site-packages/cryptography/hazmat/primitives= /twofactor/__init__.py >>>>> =C2=A0 usr/lib/python3.10/site-packages/cryptography/hazmat/primitives= /twofactor/hotp.py >>>>> =C2=A0 usr/lib/python3.10/site-packages/cryptography/hazmat/primitives= /twofactor/totp.py >>>>> -usr/lib/python3.10/site-packages/cryptography/hazmat/primitives/twofac= tor/utils.py >>>>> =C2=A0 usr/lib/python3.10/site-packages/cryptography/py.typed >>>>> =C2=A0 usr/lib/python3.10/site-packages/cryptography/utils.py >>>>> =C2=A0 usr/lib/python3.10/site-packages/cryptography/x509 >>>>> diff --git a/lfs/python3-cryptography b/lfs/python3-cryptography >>>>> index f3090bc6a..77e5f06b0 100644 >>>>> --- a/lfs/python3-cryptography >>>>> +++ b/lfs/python3-cryptography >>>>> @@ -24,7 +24,7 @@ >>>>> =C2=A0=C2=A0=C2=A0 include Config >>>>> =C2=A0 -VER=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 =3D 3.4.7 >>>>> +VER=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 =3D 36.0.2 >>>>> =C2=A0=C2=A0=C2=A0 THISAPP=C2=A0=C2=A0=C2=A0 =3D cryptography-$(VER) >>>>> =C2=A0 DL_FILE=C2=A0=C2=A0=C2=A0 =3D $(THISAPP).tar.gz >>>>> @@ -32,7 +32,7 @@ DL_FROM=C2=A0=C2=A0=C2=A0 =3D $(URL_IPFIRE) >>>>> =C2=A0 DIR_APP=C2=A0=C2=A0=C2=A0 =3D $(DIR_SRC)/$(THISAPP) >>>>> =C2=A0 TARGET=C2=A0=C2=A0=C2=A0=C2=A0 =3D $(DIR_INFO)/$(THISAPP) >>>>> =C2=A0 PROG=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 =3D python3-cryptograp= hy >>>>> -PAK_VER=C2=A0=C2=A0=C2=A0 =3D 1 >>>>> +PAK_VER=C2=A0=C2=A0=C2=A0 =3D 2 >>>>> =C2=A0=C2=A0=C2=A0 DEPS=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 =3D python= 3-cffi >>>>> =C2=A0 @@ -46,7 +46,7 @@ objects =3D $(DL_FILE) >>>>> =C2=A0=C2=A0=C2=A0 $(DL_FILE) =3D $(DL_FROM)/$(DL_FILE) >>>>> =C2=A0 -$(DL_FILE)_BLAKE2 =3D 49bc1e098ed1ba0181059b645f6668cda6332d19= 6eaca55270ebce6e07e5bb6ab6724c5050fde20e89b7025773960d74ec782bb875badbbd5dc9a= 04db0a536f1 >>>>> +$(DL_FILE)_BLAKE2 =3D b34b994e44b1ccd099a56fba4a167d563a29652f86ab0f00= 00ef78b4093a15cbfb82a9cebecdcaf6bca782a5fdd20f6c7d2206d68a219626a9fe8ae13e9ae= c5e >>>>> =C2=A0=C2=A0=C2=A0 install : $(TARGET) >>>>> =20 >>> --===============5100822333864576891==--