python311-python-gnupg-0.5.2-150600.3.2.1<>,-gp9|_,tYµU A3>6?#%x=L"KT}eM&|grDtؗڬ>h7QĘAkƣY]KM0jӢoElLd{WaqX8 .jVk Ƥ7Vt|%L I'oS,l AH&?ŭm|Cq8Nu*z$)J6ΦPs3-4qv&`.cLM9Λz!3ؼO g>A$,?$d , _"/ Eb       <       N h(89:BfFvG H I XY Z([,\4 ]h ^ Ob!qc"d"e"f"l"u" v"w#H x#| y#z####$Cpython311-python-gnupg0.5.2150600.3.2.1A wrapper for the GNU Privacy Guard (GPG or GnuPG)This module allows access to GnuPG's key management, encryption and signature functionality from Python programs.gh01-ch4dSUSE Linux Enterprise 15SUSE LLC BSD-3-Clausehttps://www.suse.com/Development/Languages/Pythonhttps://pythonhosted.org/python-gnupg/index.htmllinuxnoarch;PgA큤A큤A큤A큤gRgRgRexgRgRgRgRgRgexgb)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-python-gnupg-0.5.2-150600.3.2.1.src.rpmpython311-gnupgpython311-python-gnupg@    gpg2python(abi)rpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)3.113.0.4-14.6.0-14.0-15.2-14.14.3ez@eidTc%bI@aa_*@]w@\@\I\I\l@[!@YzY@dmueller@suse.comdmueller@suse.comkastl@b1-systems.dedmueller@suse.comdmueller@suse.comdmueller@suse.comdmueller@suse.commcalabkova@suse.comtchvatal@suse.commcepl@suse.comtchvatal@suse.comkbabioch@suse.demcepl@suse.comastieger@suse.comjengelh@inai.detoddrme2178@gmail.com- update to 0.5.2: * Fix #228: Clarify documentation for encryption/decryption. * Make I/O buffer size configurable via ``buffer_size`` attribute on a ``GPG`` instance.- update to 0.5.1: * Added ``TRUST_EXPIRED`` to ``trust_keys``. Thanks to Leif Liddy for the patch. * Fix #206: Remove deprecated ``--always-trust`` in favour of ``--trust-model always`` * Fix #208: Add ``status_detail`` attribute to result objects which * is populated when the status is ``'invalid recipient'`` (encryption/decryption) or ``'invalid signer'`` (signing). This attribute will be set when the result object's ``status`` attribute is set to ``invalid recipient`` and will contain more information about the failure in the form of ``reason:ident`` where ``reason`` is a text description of the reason, and ``ident`` identifies the recipient key. * Add ``scan_keys_mem()`` function to scan keys in a string. Thanks to Sky Moore for the patch. * Fix #214: Handle multiple signatures when one of them is invalid or unverified. * A ``problems`` attribute was added which holds problems reported by ``gpg`` during verification. This is a list of dictionaries, one for each reported problem. Each dictionary will have ``status`` and ``keyid`` keys indicating the problem and the corresponding key; other information in the dictionaries will be error specific. * Fix #217: Use machine-readable interface to query the ``gpg`` version. * Added the ability to export keys to a file.- add sle15_python_module_pythons- update to 0.5.0: * Fixed #181: Added the ability to pass file paths to encrypt_file, decrypt_file, sign_file, verify_file, get_recipients_file and added import_keys_file. * Fixed #183: Handle FAILURE and UNEXPECTED conditions correctly. Thanks to sebbASF for the patch. * Fixed #185: Handle VALIDSIG arguments more robustly. * Fixed #188: Remove handling of DECRYPTION_FAILED from Verify code, as not required there. Thanks to sebbASF for the patch. * Fixed #190: Handle KEY_CREATED more robustly. * Fixed #191: Handle NODATA messages during verification. * Fixed #196: Don't log chunk data by default, as it could contain sensitive information (during decryption, for example). * Added the ability to pass an environment to the gpg executable. Thanks to Edvard Rejthar for the patch.- update to 0.4.9: * Added a status attribute to the returned object from gen_key() * Provide the ability to add subkeys. * Add keygrip values to the information collected when keys are listed. * Added extra_args keyword argument to send_keys(), recv_keys() and search_keys() to allow passing options relating to key servers.- update to 0.4.8: * Return gpg's return code in all result instances. * Add check for invalid file objects. * Provide more useful status message when a secret key is absent. * Added a get_recipients() API to find the recipients of an encrypted message without decrypting it.- update to 0.4.7: * Added support for no passphrase during key generation. * Improved permission-denied test. * Updated logging to only show partial results. * Allowed a passphrase to be passed to import_keys().- Update to 0.4.6 * Fixed #128: Added ECC support by changing key generation parameters. (The Key-Length value isn't added if a curve is specified.) * More bugfixes. * Support for Python versions 3.5 and under is discontinued, except for Python 2.7.- Update to 0.4.5: * various bugfixes- Switch to pytest runner, which seems to be a way more stable in providing the results.- Enable tests- Update to 0.4.4: * Changed how any return value from the ``on_data`` callable is processed. In earlier versions, the return value was ignored. In this version, if the return value is ``False``, the data received from ``gpg`` is not buffered. Otherwise (if the value is ``None`` or ``True``, for example), the data is buffered as normal. This functionality can be used to do your own buffering, or to prevent buffering altogether. The ``on_data`` callable is also called once with an empty byte-string to signal the end of data from ``gpg``. * Added an additional attribute ``check_fingerprint_collisions`` to ``GPG`` instances, which defaults to ``False``. It seems that ``gpg`` is happy to have duplicate keys and fingerprints in a keyring, so we can't be too strict. A user can set this attribute of an instance to ``True`` to trigger a check for collisions. * With GnuPG 2.2.7 or later, provide the fingerprint of a signing key for a failed signature verification, if available. * For verification where multiple signatures are involved, a mapping of signature_ids to fingerprint, keyid, username, creation date, creation timestamp and expiry timestamp is provided. * Added a check to disallow certain control characters ('\r', '\n', NUL) in passphrases (CVE-2019-6690 bsc#1123498)- Remove superfluous devel dependency for noarch package- uppate to 0.4.3: * Add --no-verbose to the gpg command line, in case verbose is specified is gpg.conf. * This is mitigation against CVE-2018-12020 boo#1096745 - includes changes from 0.4.2: * Subkey information is now collected and returned in a subkey_info dictionary keyed by the subkey's ID * Add expect_passphrase password for use on GnuPG >= 2.1 when passing passphrase to gpg via pinentry * Provid a trust_keys method to allow setting the trust level for keys * When the gpg executable is not found, note the path used in the exception message * Make error messages nor informational- Ensure description neutrality.- Initial versionpython311-gnupgh01-ch4d 1739788180 0.5.20.5.2-150600.3.2.10.5.2__pycache__gnupg.cpython-311.opt-1.pycgnupg.cpython-311.pycgnupg.pypython_gnupg-0.5.2-py3.11.egg-infoPKG-INFOSOURCES.txtdependency_links.txttop_level.txtpython311-python-gnupgREADME.rstpython311-python-gnupgLICENSE.txt/usr/lib/python3.11/site-packages//usr/lib/python3.11/site-packages/__pycache__//usr/lib/python3.11/site-packages/python_gnupg-0.5.2-py3.11.egg-info//usr/share/doc/packages//usr/share/doc/packages/python311-python-gnupg//usr/share/licenses//usr/share/licenses/python311-python-gnupg/-fmessage-length=0 -grecord-gcc-switches -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector-strong -funwind-tables -fasynchronous-unwind-tables -fstack-clash-protection -gobs://build.suse.de/SUSE:Maintenance:37523/SUSE_SLE-15-SP6_Update/661cf2dafd29d3be2427304b26e1abe9-python-python-gnupg.SUSE_SLE-15-SP6_Updatedrpmxz5noarch-suse-linuxdirectoryPython script, ASCII text executableASCII textUTF-8 Unicode textRRRUh;Bbr?utf-84687d26158169cee1bee63c013a20be11ce2472b8c03e059a27c19d9504d438e?7zXZ !t/ ]"k%a kj{m̎$ɠ鱣WmWRv#Vea瓴`’ZBz,8Fmz-\ٖ+O݆Mi;]~EWm\-kkε, -5C.c,ɳiƠgU8yT[NpI{-vxbZ,tB#pbwyeĮ8𩡵 /'޸@Ģ?@{3:XGiz O5yYtU򋿴Ohb @gg#>tҖM|Z)) G%Ma.hFp yUwt]k<ЃvGš#$ M; 8=Kuh0#ji~YB_iՐdٺ?ED׷g 9pz_Q4p#I*C}؛ io+aH:8ж 3 e=_Ѐ*'\AD4UK<1v7qѨc_m=|'[%'ziiTNPi![ڠ3;2dRDN zDJb5k~j><>.W>Ny+7dC W C<~ P#&_~ǚ!@dllC&Ԁ$=*߀onGu|suz>t*SA()49ܘclD