SEARCH
NEW RPMS
DIRECTORIES
ABOUT
FAQ
VARIOUS
BLOG

 
 
Changelog for python39-pycryptodome-3.18.0-64.3.i586.rpm :

* Thu Jun 01 2023 Dirk Müller - update to 3.18.0:
* Added support for DER BOOLEAN encodings.
* The library now compiles on Windows ARM64. Thanks to Niyas Sait.
* GH#722: ``nonce`` attribute was not correctly set for XChaCha20_Poly1305 ciphers. Thanks to Liam Haber.
* GH#728: Workaround for a possible x86 emulator bug in Windows for ARM64.
* GH#739: OID encoding for arc 2 didn\'t accept children larger than 39. Thanks to James.
* Correctly check that the scalar matches the point when importing an ECC private key.
* Fri May 05 2023 Matej Cepl - Fix %%files to work with %pyproject_ style building.
* Mon Mar 27 2023 Dirk Müller - update to 3.17.0:
* Added support for the Counter Mode KDF defined in SP 800-108 Rev 1.
* Reduce the minimum tag length for the EAX cipher to 2 bytes.
* An RSA object has 4 new properties for the CRT coefficients: ``dp``, ``dq``, ``invq`` and ``invq`` (``invp`` is the same value as the existing ``u``).
* GH#526: improved typing for ``RSA.construct``.
* GH#534: reduced memory consumption when using a large number of cipher objects.
* GH#598: fixed missing error handling for ``Util.number.inverse``.
* GH#629: improved typing for ``AES.new`` and the various mode-specific types it returns. Thanks to Greg Werbin.
* GH#653: added workaround for an alleged GCC compiler bug that affected Ed25519 code compiled for AVX2.
* GH#658: attribute ``curve`` of an ECC key was not always the preferred curve name, as it used to be in v3.15.0 (independently of the curve name specified when generating the key).
* GH#637: fixed typing for legacy modules ``PKCS1_v1_5`` and ``PKCS1_PSS``, as their ``verify()`` returned a boolean.
* GH#664: with OCB mode, nonces of maximum length (15 bytes) were actually used as 14 bytes nonces. After this fix, data that was encrypted in past using the (default) nonce length of 15 bytes can still be decrypted by reducing the nonce to its first 14 bytes.
* GH#705: improved typing for ``nonce``, ``iv``, and ``IV`` parameters of cipher objects.
* Mon Mar 27 2023 Dirk Müller - update to 3.17.0:
* ++++++++++++++++++++++++++
* New features
* Added support for the Counter Mode KDF defined in SP 800-108 Rev 1.
* Reduce the minimum tag length for the EAX cipher to 2 bytes.
* An RSA object has 4 new properties for the CRT coefficients
* ``dp``, ``dq``, ``invq`` and ``invq`` (``invp`` is the same value
* as the existing ``u``).
* Resolved issues
* GH#526: improved typing for ``RSA.construct``.
* GH#534: reduced memory consumption when using a large number
* of cipher objects.
* GH#598: fixed missing error handling for ``Util.number.inverse``.
* GH#629: improved typing for ``AES.new`` and the various
* mode-specific types it returns. Thanks to Greg Werbin.
* GH#653: added workaround for an alleged GCC compiler bug
* hat affected Ed25519 code compiled for AVX2.
* GH#658: attribute ``curve`` of an ECC key was not always
* he preferred curve name, as it used to be in v3.15.0
* independently of the curve name specified when generating
* he key).
* GH#637: fixed typing for legacy modules ``PKCS1_v1_5`` and ``PKCS1_PSS``,
* as their ``verify()`` returned a boolean.
* GH#664: with OCB mode, nonces of maximum length (15 bytes
* were actually used as 14 bytes nonces.
* After this fix, data that was encrypted in past using the
* default) nonce length of 15 bytes can still be decrypted
* by reducing the nonce to its first 14 bytes.
* GH#705: improved typing for ``nonce``, ``iv``, and ``IV`` parameters
* of cipher objects.
* Other changes
* Build PyPy wheels only for versions 3.8 and 3.9, and not for 3.7 anymore.
* Tue Dec 06 2022 Yogalakshmi Arunachalam - Update to version 3.16.0
* New features Build wheels for musl Linux. Thanks to Ben Raz.
* Resolved issues GH#639: ARC4 now also works with \'keys\' as short as 8 bits. GH#669: fix segfaults when running in a manylinux2010 i686 image.
* Tue Jun 28 2022 Torsten Gruner - update to 3.15.0:
* Add support for curves Ed25519 and Ed448, including export and import of keys.
* Add support for EdDSA signatures.
* Add support for Asymmetric Key Packages (RFC5958) to import private keys.
* GH#620: for Crypto.Util.number.getPrime , do not sequentially scan numbers searching for a prime.
* Wed Mar 09 2022 pgajdosAATTsuse.com- do not use setup.py test construct https://trello.com/c/me9Z4sIv/121-setuppy-test-leftovers
* Tue Feb 15 2022 Dirk Müller - update to 3.14.1:
* GH#595: Fixed memory leak for GMP integers.
* Add support for curve NIST P-192.
* Add support for curve NIST P-224.
* GH#590: Fixed typing info for ``Crypto.PublicKey.ECC``.
* Relaxed ECDSA requirements for FIPS 186 signatures and accept any SHA-2 or
* SHA-3 hash. ``sign()`` and ``verify()`` will be performed even if the hash is stronger than the ECC key.
* Sat Dec 11 2021 Dirk Müller - update to 3.12.0:
* ECC keys in the SEC1 format can be exported and imported.
* Add support for KMAC128, KMAC256, TupleHash128, and TupleHash256 (NIST SP-800 185).
* Add support for KangarooTwelve.
* GH#563: An asymmetric key could not be imported as a ``memoryview``.
* GH#566: cSHAKE128/256 generated a wrong output for customization strings
* GH#582: CBC decryption generated the wrong plaintext when the input and the output were the same buffer.
* Sat Oct 16 2021 Dirk Müller - update to 3.11.0:
* GH#512: Especially for very small bit sizes, ``Crypto.Util.number.getPrime()`` was occasionally generating primes larger than given the bit size.
* GH#552: Correct typing annotations for ``PKCS115_Cipher.decrypt()``.
* GH#555: ``decrypt()`` method of a PKCS#1v1.5 cipher returned a ``bytearray`` instead of ``bytes``.
* GH#557: External DSA domain parameters were accepted even when the modulus (``p``) was not prime. This affected ``Crypto.PublicKey.DSA.generate()`` and ``Crypto.PublicKey.DSA.construct()``.
* Added cSHAKE128 and cSHAKE256 (of SHA-3 family).
* GH#558: The flag RTLD_DEEPBIND passed to ``dlopen()`` is not well supported by `address sanitizers `_. It is now possible to set the environment variable ``PYCRYPTDOME_DISABLE_DEEPBIND`` to drop that flag and allow security testing.
* Thu Mar 04 2021 Dirk Müller - update to 3.10.1:
* Fixed a potential memory leak when initializing block ciphers.
* GH#466: ``Crypto.Math.miller_rabin_test()`` was still using the system random source and not the one provided as parameter.
* GH#469: RSA objects have the method ``public_key()`` like ECC objects. The old method ``publickey()`` is still available for backward compatibility.
* GH#476: ``Crypto.Util.Padding.unpad()`` was raising an incorrect exception in case of zero-length inputs. Thanks to Captainowie.
* GH#491: better exception message when ``Counter.new()`` is called with an integer ``initial_value`` than doesn\'t fit into ``nbits`` bits.
* GH#496: added missing ``block_size`` member for ECB cipher objects. Thanks to willem.
* GH#500: ``nonce`` member of an XChaCha20 cipher object was not matching the original nonce.
* Tue Dec 01 2020 Hans-Peter Jansen - update to 3.9.9:
* GH#435: Fixed Crypto.Util.number.size for negative numbers
* Tue Aug 04 2020 Dirk Mueller - update to 3.9.8:
* GH#426: The Shamir\'s secret sharing implementation is not actually compatible with ``ssss``. Added an optional parameter to enable interoperability.
* GH#427: Skip altogether loading of ``gmp.dll`` on Windows.
* GH#420: Fix incorrect CFB decryption when the input and the output are the same buffer.
* Speed up Shamir\'s secret sharing routines. Thanks to ncarve.
* Thu Mar 19 2020 Marketa Calabkova - Update to 3.9.7
* Align stack of functions using SSE2 intrinsics to avoid crashes, when compiled with gcc on 32-bit x86 platforms.
* Prevent key_to_english from creating invalid data when fed with keys of length not multiple of 8.
* Fix blocking RSA signing/decryption when key has very small factor.
* fixed memory leak for operations that use memoryviews when cffi is not installed.
* RSA OAEP decryption was not verifying that all PS bytes are zero.
* Fixed wrong ASN.1 OID for HMAC-SHA512 in PBE2.
 
ICM