diff --git a/pycryptodome-3.18.0.tar.gz b/pycryptodome-3.18.0.tar.gz deleted file mode 100644 index 1d4b05b..0000000 --- a/pycryptodome-3.18.0.tar.gz +++ /dev/null @@ -1,3 +0,0 @@ -version https://git-lfs.github.com/spec/v1 -oid sha256:60f58349c3d62a99bb87665b2a16afda87dc2d537a14aa45aaad1a3748b781ba -size 16720227 diff --git a/pycryptodome-3.21.0.tar.gz b/pycryptodome-3.21.0.tar.gz new file mode 100644 index 0000000..91329a7 --- /dev/null +++ b/pycryptodome-3.21.0.tar.gz @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:195e5cdfbb550b03f83f2af2aa4652c14b64783574d835fe61bb06c8fc06ba21 +size 17464067 diff --git a/python-pycryptodome.changes b/python-pycryptodome.changes index b917c5c..8019ee3 100644 --- a/python-pycryptodome.changes +++ b/python-pycryptodome.changes @@ -1,3 +1,57 @@ +------------------------------------------------------------------- +Fri Oct 18 08:53:31 UTC 2024 - Dirk Müller + +- update to 3.21.0: + * By setting the PYCRYPTODOME_DISABLE_GMP environment variable, + the GMP library will not be used even if detected. + * Add support for Curve25519 / X25519. + * Add support for Curve448 / X448. + * Add attribute curve to EccPoint and EccXPoint classes, with + the canonical name of the curve. + * GH#781: the label for the SP800_108_Counter KDF may now + contain zero bytes. Thanks to Julien Rische. + * GH#814: RSA keys for PSS can be imported. + * GH#810: fixed negation of Ed25519 points. + * GH#819: accept an RFC5916 ECPrivateKey even if it doesn't + contain any of the optional elements (parameters [0] and + publicKey[1]). + * Remove support for Python 3.5. + +------------------------------------------------------------------- +Fri Jan 26 21:11:37 UTC 2024 - Dirk Müller + +- update to 3.20.0: + * Added support for TurboSHAKE128 and TurboSHAKE256. + * Added method Crypto.Hash.new() to generate a hash object + given a hash name. + * Added support for AES-GCM encryption of PBES2 and PKCS#8 + containers. + * Added support for SHA-2 and SHA-3 algorithms in PBKDF2 when + creating PBES2 and PKCS#8 containers. + * Export of RSA keys accepts the prot_params dictionary as + parameter to control the number of iterations for PBKDF2 and + scrypt. + * C unit tests also run on non-x86 architectures. + * GH#787: Fixed autodetect logic for GCC 14 in combination with + LTO. + +------------------------------------------------------------------- +Sat Dec 30 16:53:24 UTC 2023 - Dirk Müller + +- update to 3.19.1 (bsc#1218564, CVE-2023-52323): + * Fixed a side-channel leakage with OAEP decryption that could be + exploited to carry out a Manger attack + +------------------------------------------------------------------- +Mon Nov 27 15:55:12 UTC 2023 - Dirk Müller + +- update to 3.19.0: + * The ``update()`` methods of TupleHash128 and TupleHash256 + objects can now hash multiple items (byte strings) at once. + * Added support for ECDH, with ``Crypto.Protocol.DH``. + * GH#754: due to a bug in ``cffi``, do not use it on Windows + with Python 3.12+. + ------------------------------------------------------------------- Wed Jun 28 13:36:37 UTC 2023 - ecsos @@ -102,7 +156,7 @@ Mon Mar 27 09:16:44 UTC 2023 - Dirk Müller ------------------------------------------------------------------- Tue Dec 6 13:06:39 UTC 2022 - Yogalakshmi Arunachalam -- Update to version 3.16.0 +- Update to version 3.16.0 * New features Build wheels for musl Linux. Thanks to Ben Raz. * Resolved issues @@ -135,7 +189,7 @@ Tue Feb 15 08:52:41 UTC 2022 - Dirk Müller * Relaxed ECDSA requirements for FIPS 186 signatures and accept any SHA-2 or * SHA-3 hash. ``sign()`` and ``verify()`` will be performed even if the hash is stronger than the ECC key. - + ------------------------------------------------------------------- Sat Dec 11 13:19:30 UTC 2021 - Dirk Müller @@ -199,12 +253,12 @@ Tue Aug 4 14:36:10 UTC 2020 - Dirk Mueller Thu Mar 19 13:12:39 UTC 2020 - Marketa Calabkova - Update to 3.9.7 - * Align stack of functions using SSE2 intrinsics to avoid crashes, + * Align stack of functions using SSE2 intrinsics to avoid crashes, when compiled with gcc on 32-bit x86 platforms. * Prevent key_to_english from creating invalid data when fed with keys of length not multiple of 8. * Fix blocking RSA signing/decryption when key has very small factor. - * fixed memory leak for operations that use memoryviews when cffi + * fixed memory leak for operations that use memoryviews when cffi is not installed. * RSA OAEP decryption was not verifying that all PS bytes are zero. * Fixed wrong ASN.1 OID for HMAC-SHA512 in PBE2. @@ -231,7 +285,7 @@ Sun Nov 10 16:54:21 UTC 2019 - Hans-Peter Jansen * GH#328: minor speed-up when importing RSA. - Add export LC_ALL=en_US.UTF-8 to %build, %install and %check to - fix the build on older distros + fix the build on older distros (as done from Thomas Bechtold in python-pycryptodomex) ------------------------------------------------------------------- @@ -265,26 +319,26 @@ Fri May 24 11:36:30 UTC 2019 - Martin Liška Tue May 14 13:03:34 UTC 2019 - Marketa Calabkova - Update to 3.8.1 - * Add support for loading PEM files encrypted with AES192-CBC, + * Add support for loading PEM files encrypted with AES192-CBC, AES256-CBC, and AES256-GCM. - * When importing ECC keys, ignore EC PARAMS section that was + * When importing ECC keys, ignore EC PARAMS section that was included by some openssl commands. * repr() did not work for ECC.EccKey. * Minimal length for Blowfish cipher is 32 bits, not 40 bits. 3.8.0 - * Speed-up ECC performance. ECDSA is 33 times faster on the + * Speed-up ECC performance. ECDSA is 33 times faster on the NIST P-256 curve. * Added support for NIST P-384 and P-521 curves. * EccKey has new methods size_in_bits() and size_in_bytes(). - * Support HMAC-SHA224, HMAC-SHA256, HMAC-SHA384, and HMAC-SHA512 + * Support HMAC-SHA224, HMAC-SHA256, HMAC-SHA384, and HMAC-SHA512 in PBE2/PBKDF2. - * DER objects were not rejected if their length field had + * DER objects were not rejected if their length field had a leading zero. * Allow legacy RC2 ciphers to have 40-bit keys. - * point_at_infinity() becomes an instance method for + * point_at_infinity() becomes an instance method for Crypto.PublicKey.ECC.EccKey, from a static one. 3.7.3 - * GH#258: False positive on PSS signatures when externally + * GH#258: False positive on PSS signatures when externally provided salt is too long. ------------------------------------------------------------------- @@ -340,12 +394,12 @@ Thu Nov 1 10:42:04 UTC 2018 - Hans-Peter Jansen * Added support for Poly1305 MAC (with AES and ChaCha20 ciphers for key derivation). * Added support for ChaCha20-Poly1305 AEAD cipher. - * New parameter output for Crypto.Util.strxor.strxor, - Crypto.Util.strxor.strxor_c, encrypt and decrypt methods in - symmetric ciphers (Crypto.Cipher package). output is a - pre-allocated buffer (a bytearray or a writeable memoryview) - where the result must be stored. This requires less memory for - very large payloads; it is also more efficient when encrypting + * New parameter output for Crypto.Util.strxor.strxor, + Crypto.Util.strxor.strxor_c, encrypt and decrypt methods in + symmetric ciphers (Crypto.Cipher package). output is a + pre-allocated buffer (a bytearray or a writeable memoryview) + where the result must be stored. This requires less memory for + very large payloads; it is also more efficient when encrypting (or decrypting) several small payloads. - Resolved issues @@ -371,17 +425,17 @@ Mon Sep 3 14:21:25 UTC 2018 - Marketa Calabkova - Update to 3.6.6 - Resolved issues: - * Fix vulnerability on AESNI ECB with payloads smaller than + * Fix vulnerability on AESNI ECB with payloads smaller than 16 bytes. - Update to 3.5.5 - Resolved issues - * Fixed incorrect AES encryption/decryption with AES - acceleration on x86 due to gcc’s optimization and strict + * Fixed incorrect AES encryption/decryption with AES + acceleration on x86 due to gcc’s optimization and strict aliasing rules. - * More prime number candidates than necessary where discarded - as composite due to the limited way D values were searched + * More prime number candidates than necessary where discarded + as composite due to the limited way D values were searched in the Lucas test. * Fixed ResouceWarnings and DeprecationWarnings. @@ -389,7 +443,7 @@ Mon Sep 3 14:21:25 UTC 2018 - Marketa Calabkova - New features: * Build Python 3.7 wheels on Linux, Windows and Mac. - Resolved issues: - * More meaningful exceptions in case of mismatch in IV length + * More meaningful exceptions in case of mismatch in IV length (CBC/OFB/CFB modes). ------------------------------------------------------------------- diff --git a/python-pycryptodome.spec b/python-pycryptodome.spec index 7c0f473..1e7d61a 100644 --- a/python-pycryptodome.spec +++ b/python-pycryptodome.spec @@ -1,7 +1,7 @@ # # spec file for package python-pycryptodome # -# Copyright (c) 2023 SUSE LLC +# Copyright (c) 2024 SUSE LLC # # All modifications and additions to the file contributed by third parties # remain the property of their copyright owners, unless otherwise agreed @@ -16,18 +16,19 @@ # -%define oldpython python %define min_version %{lua:rpm.expand("%{version}"):gsub("^(%d+%.%d+).*", "%1")} %{?sle15_python_module_pythons} Name: python-pycryptodome -Version: 3.18.0 +Version: 3.21.0 Release: 0 Summary: Cryptographic library for Python License: BSD-2-Clause URL: https://www.pycryptodome.org Source: https://github.com/Legrandin/pycryptodome/archive/v%{version}.tar.gz#/pycryptodome-%{version}.tar.gz BuildRequires: %{python_module devel} +BuildRequires: %{python_module pip} BuildRequires: %{python_module setuptools} +BuildRequires: %{python_module wheel} BuildRequires: fdupes BuildRequires: python-rpm-macros Provides: python-pycrypto = %{version} @@ -38,10 +39,6 @@ Obsoletes: python-pycrypto < %{version} Suggests: libgmp10 Suggests: python-cffi %endif -%ifpython2 -Provides: %{oldpython}-pycrypto = %{version} -Obsoletes: %{oldpython}-pycrypto < %{version} -%endif %python_subpackages %description @@ -85,11 +82,11 @@ Python. Only the pieces that are extremely critical to performance %build export LC_ALL=en_US.UTF-8 export CFLAGS="%{optflags}" -%python_build +%pyproject_wheel %install export LC_ALL=en_US.UTF-8 -%python_install +%pyproject_install %python_expand %fdupes %{buildroot}%{$python_sitearch} %check