Changelog for
python38-pycryptodome-3.15.0-qubes.2.1.x86_64.rpm :
* Tue Jun 28 2022 Torsten Gruner
- update to 3.15.0:
* Add support for curves Ed25519 and Ed448, including export and import of keys.
* Add support for EdDSA signatures.
* Add support for Asymmetric Key Packages (RFC5958) to import private keys.
* GH#620: for Crypto.Util.number.getPrime , do not sequentially scan numbers searching for a prime.
* Wed Mar 09 2022 pgajdosAATTsuse.com- do not use setup.py test construct https://trello.com/c/me9Z4sIv/121-setuppy-test-leftovers
* Tue Feb 15 2022 Dirk Müller - update to 3.14.1:
* GH#595: Fixed memory leak for GMP integers.
* Add support for curve NIST P-192.
* Add support for curve NIST P-224.
* GH#590: Fixed typing info for ``Crypto.PublicKey.ECC``.
* Relaxed ECDSA requirements for FIPS 186 signatures and accept any SHA-2 or
* SHA-3 hash. ``sign()`` and ``verify()`` will be performed even if the hash is stronger than the ECC key.
* Sat Dec 11 2021 Dirk Müller - update to 3.12.0:
* ECC keys in the SEC1 format can be exported and imported.
* Add support for KMAC128, KMAC256, TupleHash128, and TupleHash256 (NIST SP-800 185).
* Add support for KangarooTwelve.
* GH#563: An asymmetric key could not be imported as a ``memoryview``.
* GH#566: cSHAKE128/256 generated a wrong output for customization strings
* GH#582: CBC decryption generated the wrong plaintext when the input and the output were the same buffer.
* Sat Oct 16 2021 Dirk Müller - update to 3.11.0:
* GH#512: Especially for very small bit sizes, ``Crypto.Util.number.getPrime()`` was occasionally generating primes larger than given the bit size.
* GH#552: Correct typing annotations for ``PKCS115_Cipher.decrypt()``.
* GH#555: ``decrypt()`` method of a PKCS#1v1.5 cipher returned a ``bytearray`` instead of ``bytes``.
* GH#557: External DSA domain parameters were accepted even when the modulus (``p``) was not prime. This affected ``Crypto.PublicKey.DSA.generate()`` and ``Crypto.PublicKey.DSA.construct()``.
* Added cSHAKE128 and cSHAKE256 (of SHA-3 family).
* GH#558: The flag RTLD_DEEPBIND passed to ``dlopen()`` is not well supported by `address sanitizers `_. It is now possible to set the environment variable ``PYCRYPTDOME_DISABLE_DEEPBIND`` to drop that flag and allow security testing.
* Thu Mar 04 2021 Dirk Müller - update to 3.10.1:
* Fixed a potential memory leak when initializing block ciphers.
* GH#466: ``Crypto.Math.miller_rabin_test()`` was still using the system random source and not the one provided as parameter.
* GH#469: RSA objects have the method ``public_key()`` like ECC objects. The old method ``publickey()`` is still available for backward compatibility.
* GH#476: ``Crypto.Util.Padding.unpad()`` was raising an incorrect exception in case of zero-length inputs. Thanks to Captainowie.
* GH#491: better exception message when ``Counter.new()`` is called with an integer ``initial_value`` than doesn\'t fit into ``nbits`` bits.
* GH#496: added missing ``block_size`` member for ECB cipher objects. Thanks to willem.
* GH#500: ``nonce`` member of an XChaCha20 cipher object was not matching the original nonce.
* Tue Dec 01 2020 Hans-Peter Jansen - update to 3.9.9:
* GH#435: Fixed Crypto.Util.number.size for negative numbers
* Tue Aug 04 2020 Dirk Mueller - update to 3.9.8:
* GH#426: The Shamir\'s secret sharing implementation is not actually compatible with ``ssss``. Added an optional parameter to enable interoperability.
* GH#427: Skip altogether loading of ``gmp.dll`` on Windows.
* GH#420: Fix incorrect CFB decryption when the input and the output are the same buffer.
* Speed up Shamir\'s secret sharing routines. Thanks to ncarve.
* Thu Mar 19 2020 Marketa Calabkova - Update to 3.9.7
* Align stack of functions using SSE2 intrinsics to avoid crashes, when compiled with gcc on 32-bit x86 platforms.
* Prevent key_to_english from creating invalid data when fed with keys of length not multiple of 8.
* Fix blocking RSA signing/decryption when key has very small factor.
* fixed memory leak for operations that use memoryviews when cffi is not installed.
* RSA OAEP decryption was not verifying that all PS bytes are zero.
* Fixed wrong ASN.1 OID for HMAC-SHA512 in PBE2.
* Sun Nov 10 2019 Hans-Peter Jansen - Update to 3.9.2 (10 November 2019): + New features
* Add Python 3.8 wheels for Mac. + Resolved issues
* GH#308: Avoid allocating arrays of __m128i on the stack, to cope with buggy compilers.
* GH#322: Remove blanket -O3 optimization for gcc and clang, to cope with buggy compilers.
* GH#337: Fix typing stubs for signatures.
* GH#338: Deal with gcc installations that don\'t have x86intrin.h.- Update to version 3.9.1 (1 November 2019): + New features
* Add Python 3.8 wheels for Linux and Windows. + Resolved issues
* GH#328: minor speed-up when importing RSA.- Add export LC_ALL=en_US.UTF-8 to %build, %install and %check to fix the build on older distros (as done from Thomas Bechtold in python-pycryptodomex)
* Tue Sep 10 2019 Tomáš Chvátal - Update to 3.9.0:
* Add support for loading PEM files encrypted with AES256-CBC.
* Add support for XChaCha20 and XChaCha20-Poly1305 ciphers.
* Add support for bcrypt key derivation function (Crypto.Protocol.KDF.bcrypt).
* Add support for left multiplication of an EC point by a scalar.
* Add support for importing ECC and RSA keys in the new OpenSSH format.
* Thu May 30 2019 Martin Liška - Update Source to point to github.
* Thu May 30 2019 Martin Liška - Update to 3.8.2
* GH#291: fix strict aliasing problem, emerged with GCC 9.1.
* Fri May 24 2019 Martin Liška - Use -fno-strict-aliasing in order to bypass: https://github.com/Legrandin/pycryptodome/issues/291.
* Tue May 14 2019 Marketa Calabkova - Update to 3.8.1
* Add support for loading PEM files encrypted with AES192-CBC, AES256-CBC, and AES256-GCM.
* When importing ECC keys, ignore EC PARAMS section that was included by some openssl commands.
* repr() did not work for ECC.EccKey.
* Minimal length for Blowfish cipher is 32 bits, not 40 bits. 3.8.0
* Speed-up ECC performance. ECDSA is 33 times faster on the NIST P-256 curve.
* Added support for NIST P-384 and P-521 curves.
* EccKey has new methods size_in_bits() and size_in_bytes().
* Support HMAC-SHA224, HMAC-SHA256, HMAC-SHA384, and HMAC-SHA512 in PBE2/PBKDF2.
* DER objects were not rejected if their length field had a leading zero.
* Allow legacy RC2 ciphers to have 40-bit keys.
* point_at_infinity() becomes an instance method for Crypto.PublicKey.ECC.EccKey, from a static one. 3.7.3
* GH#258: False positive on PSS signatures when externally provided salt is too long.
* Wed Jan 09 2019 Jonathan Brownell - Protect older platforms from encountering \"Suggests:\" keyword
* Sun Jan 06 2019 Hans-Peter Jansen - fix tarball: use the one from PyPI...