Package: python-cryptography / 2.6.1-3+deb10u2
Metadata
Package | Version | Patches format |
---|---|---|
python-cryptography | 2.6.1-3+deb10u2 | 3.0 (quilt) |
Patch series
view the series filePatch | File delta | Description |
---|---|---|
update our test to be more robust wrt some changes f.patch | (download) |
tests/hazmat/primitives/test_dh.py |
11 9 + 2 - 0 ! |
[patch] update our test to be more robust wrt some changes from upstream (#4993) |
use a random key for these tests 4887.patch | (download) |
tests/hazmat/primitives/test_aes.py |
2 1 + 1 - 0 ! |
[patch] use a random key for these tests (#4887) Using an all 0 key causes failures in OpenSSL master (and Fedora has cherry-picked the commit that causes it). The change requires that the key/tweak for XTS mode not be the same value, so let's just use a random key. |
tests Skip test_load_ecdsa_no_named_curve.patch | (download) |
tests/x509/test_x509.py |
1 1 + 0 - 0 ! |
[patch] tests: skip test_load_ecdsa_no_named_curve The test_load_ecdsa_no_named_curve breaks with OpenSSL 1.1.1d which is due to to commit 9a43a733801bd ("[ec] Match built-in curves on EC_GROUP_new_from_ecparameters"). Upstream is aware of the issue and it is tracked at https://github.com/pyca/cryptography/issues/4998 Signed-off-by: Sebastian Andrzej Siewior <sebastian@breakpoint.cc> |
aia memleak 1.patch | (download) |
src/_cffi_src/openssl/x509v3.py |
3 3 + 0 - 0 ! |
[patch] fix a memory leak in aia parsing (#4836) * fix a memory leak in AIA parsing * oops can't remove that |
aia memleak 2.patch | (download) |
src/cryptography/hazmat/backends/openssl/encode_asn1.py |
27 15 + 12 - 0 ! |
[patch] fix aia encoding memory leak (#4889) * fix aia encoding memory leak * don't return anything from the prealloc func |