Sync from SUSE:SLFO:Main python-pycryptodome revision eeb979f677101ff235a07ae0729ec857

This commit is contained in:
Adrian Schröter 2024-12-13 12:02:18 +01:00
parent df6e563a5b
commit b0fb546195
4 changed files with 87 additions and 36 deletions

BIN
pycryptodome-3.18.0.tar.gz (Stored with Git LFS)

Binary file not shown.

BIN
pycryptodome-3.21.0.tar.gz (Stored with Git LFS) Normal file

Binary file not shown.

View File

@ -1,3 +1,57 @@
-------------------------------------------------------------------
Fri Oct 18 08:53:31 UTC 2024 - Dirk Müller <dmueller@suse.com>
- update to 3.21.0:
* By setting the PYCRYPTODOME_DISABLE_GMP environment variable,
the GMP library will not be used even if detected.
* Add support for Curve25519 / X25519.
* Add support for Curve448 / X448.
* Add attribute curve to EccPoint and EccXPoint classes, with
the canonical name of the curve.
* GH#781: the label for the SP800_108_Counter KDF may now
contain zero bytes. Thanks to Julien Rische.
* GH#814: RSA keys for PSS can be imported.
* GH#810: fixed negation of Ed25519 points.
* GH#819: accept an RFC5916 ECPrivateKey even if it doesn't
contain any of the optional elements (parameters [0] and
publicKey[1]).
* Remove support for Python 3.5.
-------------------------------------------------------------------
Fri Jan 26 21:11:37 UTC 2024 - Dirk Müller <dmueller@suse.com>
- update to 3.20.0:
* Added support for TurboSHAKE128 and TurboSHAKE256.
* Added method Crypto.Hash.new() to generate a hash object
given a hash name.
* Added support for AES-GCM encryption of PBES2 and PKCS#8
containers.
* Added support for SHA-2 and SHA-3 algorithms in PBKDF2 when
creating PBES2 and PKCS#8 containers.
* Export of RSA keys accepts the prot_params dictionary as
parameter to control the number of iterations for PBKDF2 and
scrypt.
* C unit tests also run on non-x86 architectures.
* GH#787: Fixed autodetect logic for GCC 14 in combination with
LTO.
-------------------------------------------------------------------
Sat Dec 30 16:53:24 UTC 2023 - Dirk Müller <dmueller@suse.com>
- update to 3.19.1 (bsc#1218564, CVE-2023-52323):
* Fixed a side-channel leakage with OAEP decryption that could be
exploited to carry out a Manger attack
-------------------------------------------------------------------
Mon Nov 27 15:55:12 UTC 2023 - Dirk Müller <dmueller@suse.com>
- update to 3.19.0:
* The ``update()`` methods of TupleHash128 and TupleHash256
objects can now hash multiple items (byte strings) at once.
* Added support for ECDH, with ``Crypto.Protocol.DH``.
* GH#754: due to a bug in ``cffi``, do not use it on Windows
with Python 3.12+.
------------------------------------------------------------------- -------------------------------------------------------------------
Wed Jun 28 13:36:37 UTC 2023 - ecsos <ecsos@opensuse.org> Wed Jun 28 13:36:37 UTC 2023 - ecsos <ecsos@opensuse.org>
@ -102,7 +156,7 @@ Mon Mar 27 09:16:44 UTC 2023 - Dirk Müller <dmueller@suse.com>
------------------------------------------------------------------- -------------------------------------------------------------------
Tue Dec 6 13:06:39 UTC 2022 - Yogalakshmi Arunachalam <yarunachalam@suse.com> Tue Dec 6 13:06:39 UTC 2022 - Yogalakshmi Arunachalam <yarunachalam@suse.com>
- Update to version 3.16.0 - Update to version 3.16.0
* New features * New features
Build wheels for musl Linux. Thanks to Ben Raz. Build wheels for musl Linux. Thanks to Ben Raz.
* Resolved issues * Resolved issues
@ -135,7 +189,7 @@ Tue Feb 15 08:52:41 UTC 2022 - Dirk Müller <dmueller@suse.com>
* Relaxed ECDSA requirements for FIPS 186 signatures and accept any SHA-2 or * Relaxed ECDSA requirements for FIPS 186 signatures and accept any SHA-2 or
* SHA-3 hash. ``sign()`` and ``verify()`` will be performed even if the hash is stronger * SHA-3 hash. ``sign()`` and ``verify()`` will be performed even if the hash is stronger
than the ECC key. than the ECC key.
------------------------------------------------------------------- -------------------------------------------------------------------
Sat Dec 11 13:19:30 UTC 2021 - Dirk Müller <dmueller@suse.com> Sat Dec 11 13:19:30 UTC 2021 - Dirk Müller <dmueller@suse.com>
@ -199,12 +253,12 @@ Tue Aug 4 14:36:10 UTC 2020 - Dirk Mueller <dmueller@suse.com>
Thu Mar 19 13:12:39 UTC 2020 - Marketa Calabkova <mcalabkova@suse.com> Thu Mar 19 13:12:39 UTC 2020 - Marketa Calabkova <mcalabkova@suse.com>
- Update to 3.9.7 - Update to 3.9.7
* Align stack of functions using SSE2 intrinsics to avoid crashes, * Align stack of functions using SSE2 intrinsics to avoid crashes,
when compiled with gcc on 32-bit x86 platforms. when compiled with gcc on 32-bit x86 platforms.
* Prevent key_to_english from creating invalid data when fed with * Prevent key_to_english from creating invalid data when fed with
keys of length not multiple of 8. keys of length not multiple of 8.
* Fix blocking RSA signing/decryption when key has very small factor. * Fix blocking RSA signing/decryption when key has very small factor.
* fixed memory leak for operations that use memoryviews when cffi * fixed memory leak for operations that use memoryviews when cffi
is not installed. is not installed.
* RSA OAEP decryption was not verifying that all PS bytes are zero. * RSA OAEP decryption was not verifying that all PS bytes are zero.
* Fixed wrong ASN.1 OID for HMAC-SHA512 in PBE2. * Fixed wrong ASN.1 OID for HMAC-SHA512 in PBE2.
@ -231,7 +285,7 @@ Sun Nov 10 16:54:21 UTC 2019 - Hans-Peter Jansen <hpj@urpla.net>
* GH#328: minor speed-up when importing RSA. * GH#328: minor speed-up when importing RSA.
- Add export LC_ALL=en_US.UTF-8 to %build, %install and %check to - Add export LC_ALL=en_US.UTF-8 to %build, %install and %check to
fix the build on older distros fix the build on older distros
(as done from Thomas Bechtold in python-pycryptodomex) (as done from Thomas Bechtold in python-pycryptodomex)
------------------------------------------------------------------- -------------------------------------------------------------------
@ -265,26 +319,26 @@ Fri May 24 11:36:30 UTC 2019 - Martin Liška <mliska@suse.cz>
Tue May 14 13:03:34 UTC 2019 - Marketa Calabkova <mcalabkova@suse.com> Tue May 14 13:03:34 UTC 2019 - Marketa Calabkova <mcalabkova@suse.com>
- Update to 3.8.1 - Update to 3.8.1
* Add support for loading PEM files encrypted with AES192-CBC, * Add support for loading PEM files encrypted with AES192-CBC,
AES256-CBC, and AES256-GCM. AES256-CBC, and AES256-GCM.
* When importing ECC keys, ignore EC PARAMS section that was * When importing ECC keys, ignore EC PARAMS section that was
included by some openssl commands. included by some openssl commands.
* repr() did not work for ECC.EccKey. * repr() did not work for ECC.EccKey.
* Minimal length for Blowfish cipher is 32 bits, not 40 bits. * Minimal length for Blowfish cipher is 32 bits, not 40 bits.
3.8.0 3.8.0
* Speed-up ECC performance. ECDSA is 33 times faster on the * Speed-up ECC performance. ECDSA is 33 times faster on the
NIST P-256 curve. NIST P-256 curve.
* Added support for NIST P-384 and P-521 curves. * Added support for NIST P-384 and P-521 curves.
* EccKey has new methods size_in_bits() and size_in_bytes(). * EccKey has new methods size_in_bits() and size_in_bytes().
* Support HMAC-SHA224, HMAC-SHA256, HMAC-SHA384, and HMAC-SHA512 * Support HMAC-SHA224, HMAC-SHA256, HMAC-SHA384, and HMAC-SHA512
in PBE2/PBKDF2. in PBE2/PBKDF2.
* DER objects were not rejected if their length field had * DER objects were not rejected if their length field had
a leading zero. a leading zero.
* Allow legacy RC2 ciphers to have 40-bit keys. * Allow legacy RC2 ciphers to have 40-bit keys.
* point_at_infinity() becomes an instance method for * point_at_infinity() becomes an instance method for
Crypto.PublicKey.ECC.EccKey, from a static one. Crypto.PublicKey.ECC.EccKey, from a static one.
3.7.3 3.7.3
* GH#258: False positive on PSS signatures when externally * GH#258: False positive on PSS signatures when externally
provided salt is too long. provided salt is too long.
------------------------------------------------------------------- -------------------------------------------------------------------
@ -340,12 +394,12 @@ Thu Nov 1 10:42:04 UTC 2018 - Hans-Peter Jansen <hpj@urpla.net>
* Added support for Poly1305 MAC (with AES and ChaCha20 ciphers * Added support for Poly1305 MAC (with AES and ChaCha20 ciphers
for key derivation). for key derivation).
* Added support for ChaCha20-Poly1305 AEAD cipher. * Added support for ChaCha20-Poly1305 AEAD cipher.
* New parameter output for Crypto.Util.strxor.strxor, * New parameter output for Crypto.Util.strxor.strxor,
Crypto.Util.strxor.strxor_c, encrypt and decrypt methods in Crypto.Util.strxor.strxor_c, encrypt and decrypt methods in
symmetric ciphers (Crypto.Cipher package). output is a symmetric ciphers (Crypto.Cipher package). output is a
pre-allocated buffer (a bytearray or a writeable memoryview) pre-allocated buffer (a bytearray or a writeable memoryview)
where the result must be stored. This requires less memory for where the result must be stored. This requires less memory for
very large payloads; it is also more efficient when encrypting very large payloads; it is also more efficient when encrypting
(or decrypting) several small payloads. (or decrypting) several small payloads.
- Resolved issues - Resolved issues
@ -371,17 +425,17 @@ Mon Sep 3 14:21:25 UTC 2018 - Marketa Calabkova <mcalabkova@suse.com>
- Update to 3.6.6 - Update to 3.6.6
- Resolved issues: - Resolved issues:
* Fix vulnerability on AESNI ECB with payloads smaller than * Fix vulnerability on AESNI ECB with payloads smaller than
16 bytes. 16 bytes.
- Update to 3.5.5 - Update to 3.5.5
- Resolved issues - Resolved issues
* Fixed incorrect AES encryption/decryption with AES * Fixed incorrect AES encryption/decryption with AES
acceleration on x86 due to gccs optimization and strict acceleration on x86 due to gccs optimization and strict
aliasing rules. aliasing rules.
* More prime number candidates than necessary where discarded * More prime number candidates than necessary where discarded
as composite due to the limited way D values were searched as composite due to the limited way D values were searched
in the Lucas test. in the Lucas test.
* Fixed ResouceWarnings and DeprecationWarnings. * Fixed ResouceWarnings and DeprecationWarnings.
@ -389,7 +443,7 @@ Mon Sep 3 14:21:25 UTC 2018 - Marketa Calabkova <mcalabkova@suse.com>
- New features: - New features:
* Build Python 3.7 wheels on Linux, Windows and Mac. * Build Python 3.7 wheels on Linux, Windows and Mac.
- Resolved issues: - Resolved issues:
* More meaningful exceptions in case of mismatch in IV length * More meaningful exceptions in case of mismatch in IV length
(CBC/OFB/CFB modes). (CBC/OFB/CFB modes).
------------------------------------------------------------------- -------------------------------------------------------------------

View File

@ -1,7 +1,7 @@
# #
# spec file for package python-pycryptodome # spec file for package python-pycryptodome
# #
# Copyright (c) 2023 SUSE LLC # Copyright (c) 2024 SUSE LLC
# #
# All modifications and additions to the file contributed by third parties # All modifications and additions to the file contributed by third parties
# remain the property of their copyright owners, unless otherwise agreed # remain the property of their copyright owners, unless otherwise agreed
@ -16,18 +16,19 @@
# #
%define oldpython python
%define min_version %{lua:rpm.expand("%{version}"):gsub("^(%d+%.%d+).*", "%1")} %define min_version %{lua:rpm.expand("%{version}"):gsub("^(%d+%.%d+).*", "%1")}
%{?sle15_python_module_pythons} %{?sle15_python_module_pythons}
Name: python-pycryptodome Name: python-pycryptodome
Version: 3.18.0 Version: 3.21.0
Release: 0 Release: 0
Summary: Cryptographic library for Python Summary: Cryptographic library for Python
License: BSD-2-Clause License: BSD-2-Clause
URL: https://www.pycryptodome.org URL: https://www.pycryptodome.org
Source: https://github.com/Legrandin/pycryptodome/archive/v%{version}.tar.gz#/pycryptodome-%{version}.tar.gz Source: https://github.com/Legrandin/pycryptodome/archive/v%{version}.tar.gz#/pycryptodome-%{version}.tar.gz
BuildRequires: %{python_module devel} BuildRequires: %{python_module devel}
BuildRequires: %{python_module pip}
BuildRequires: %{python_module setuptools} BuildRequires: %{python_module setuptools}
BuildRequires: %{python_module wheel}
BuildRequires: fdupes BuildRequires: fdupes
BuildRequires: python-rpm-macros BuildRequires: python-rpm-macros
Provides: python-pycrypto = %{version} Provides: python-pycrypto = %{version}
@ -38,10 +39,6 @@ Obsoletes: python-pycrypto < %{version}
Suggests: libgmp10 Suggests: libgmp10
Suggests: python-cffi Suggests: python-cffi
%endif %endif
%ifpython2
Provides: %{oldpython}-pycrypto = %{version}
Obsoletes: %{oldpython}-pycrypto < %{version}
%endif
%python_subpackages %python_subpackages
%description %description
@ -85,11 +82,11 @@ Python. Only the pieces that are extremely critical to performance
%build %build
export LC_ALL=en_US.UTF-8 export LC_ALL=en_US.UTF-8
export CFLAGS="%{optflags}" export CFLAGS="%{optflags}"
%python_build %pyproject_wheel
%install %install
export LC_ALL=en_US.UTF-8 export LC_ALL=en_US.UTF-8
%python_install %pyproject_install
%python_expand %fdupes %{buildroot}%{$python_sitearch} %python_expand %fdupes %{buildroot}%{$python_sitearch}
%check %check