From 23f4e6f52d24952b53ea44fdc258f58104953fedf123eac71cc75383e58adee6 Mon Sep 17 00:00:00 2001 From: Dirk Mueller Date: Mon, 27 Nov 2023 15:57:36 +0000 Subject: [PATCH] =?UTF-8?q?-=20update=20to=203.19.0:=20=20=20*=20The=20``u?= =?UTF-8?q?pdate()``=20methods=20of=20TupleHash128=20and=20TupleHash256=20?= =?UTF-8?q?=20=20=20=20objects=20can=20now=20hash=20multiple=20items=20(by?= =?UTF-8?q?te=20strings)=20at=20once.=20=20=20*=20Added=20support=20for=20?= =?UTF-8?q?ECDH,=20with=20``Crypto.Protocol.DH``.=20=20=20*=20GH#754:=20du?= =?UTF-8?q?e=20to=20a=20bug=20in=20``cffi``,=20do=20not=20use=20it=20on=20?= =?UTF-8?q?Windows=20=20=20=20=20with=20Python=203.12+.=20-=20Update=20to?= =?UTF-8?q?=20version=203.16.0=20=20=20*=20Align=20stack=20of=20functions?= =?UTF-8?q?=20using=20SSE2=20intrinsics=20to=20avoid=20crashes,=20=20=20*?= =?UTF-8?q?=20fixed=20memory=20leak=20for=20operations=20that=20use=20memo?= =?UTF-8?q?ryviews=20when=20cffi=20=20=20fix=20the=20build=20on=20older=20?= =?UTF-8?q?distros=20=20=20*=20Add=20support=20for=20loading=20PEM=20files?= =?UTF-8?q?=20encrypted=20with=20AES192-CBC,=20=20=20*=20When=20importing?= =?UTF-8?q?=20ECC=20keys,=20ignore=20EC=20PARAMS=20section=20that=20was=20?= =?UTF-8?q?=20=20*=20Speed-up=20ECC=20performance.=20ECDSA=20is=2033=20tim?= =?UTF-8?q?es=20faster=20on=20the=20=20=20*=20Support=20HMAC-SHA224,=20HMA?= =?UTF-8?q?C-SHA256,=20HMAC-SHA384,=20and=20HMAC-SHA512=20=20=20*=20DER=20?= =?UTF-8?q?objects=20were=20not=20rejected=20if=20their=20length=20field?= =?UTF-8?q?=20had=20=20=20*=20point=5Fat=5Finfinity()=20becomes=20an=20ins?= =?UTF-8?q?tance=20method=20for=20=20=20*=20GH#258:=20False=20positive=20o?= =?UTF-8?q?n=20PSS=20signatures=20when=20externally=20=20=20=20=20*=20New?= =?UTF-8?q?=20parameter=20output=20for=20Crypto.Util.strxor.strxor,=20=20?= =?UTF-8?q?=20=20=20=20=20Crypto.Util.strxor.strxor=5Fc,=20encrypt=20and?= =?UTF-8?q?=20decrypt=20methods=20in=20=20=20=20=20=20=20symmetric=20ciphe?= =?UTF-8?q?rs=20(Crypto.Cipher=20package).=20output=20is=20a=20=20=20=20?= =?UTF-8?q?=20=20=20pre-allocated=20buffer=20(a=20bytearray=20or=20a=20wri?= =?UTF-8?q?teable=20memoryview)=20=20=20=20=20=20=20where=20the=20result?= =?UTF-8?q?=20must=20be=20stored.=20This=20requires=20less=20memory=20for?= =?UTF-8?q?=20=20=20=20=20=20=20very=20large=20payloads;=20it=20is=20also?= =?UTF-8?q?=20more=20efficient=20when=20encrypting=20=20=20=20=20*=20Fix?= =?UTF-8?q?=20vulnerability=20on=20AESNI=20ECB=20with=20payloads=20smaller?= =?UTF-8?q?=20than=20=20=20=20=20*=20Fixed=20incorrect=20AES=20encryption/?= =?UTF-8?q?decryption=20with=20AES=20=20=20=20=20=20=20acceleration=20on?= =?UTF-8?q?=20x86=20due=20to=20gcc=E2=80=99s=20optimization=20and=20strict?= =?UTF-8?q?=20=20=20=20=20*=20More=20prime=20number=20candidates=20than=20?= =?UTF-8?q?necessary=20where=20discarded=20=20=20=20=20=20=20as=20composit?= =?UTF-8?q?e=20due=20to=20the=20limited=20way=20D=20values=20were=20search?= =?UTF-8?q?ed=20=20=20=20=20*=20More=20meaningful=20exceptions=20in=20case?= =?UTF-8?q?=20of=20mismatch=20in=20IV=20length?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit OBS-URL: https://build.opensuse.org/package/show/devel:languages:python/python-pycryptodome?expand=0&rev=59 --- pycryptodome-3.18.0.tar.gz | 3 -- pycryptodome-3.19.0.tar.gz | 3 ++ python-pycryptodome.changes | 58 ++++++++++++++++++++++--------------- python-pycryptodome.spec | 14 ++++----- 4 files changed, 42 insertions(+), 36 deletions(-) delete mode 100644 pycryptodome-3.18.0.tar.gz create mode 100644 pycryptodome-3.19.0.tar.gz diff --git a/pycryptodome-3.18.0.tar.gz b/pycryptodome-3.18.0.tar.gz deleted file mode 100644 index 1d4b05b..0000000 --- a/pycryptodome-3.18.0.tar.gz +++ /dev/null @@ -1,3 +0,0 @@ -version https://git-lfs.github.com/spec/v1 -oid sha256:60f58349c3d62a99bb87665b2a16afda87dc2d537a14aa45aaad1a3748b781ba -size 16720227 diff --git a/pycryptodome-3.19.0.tar.gz b/pycryptodome-3.19.0.tar.gz new file mode 100644 index 0000000..bdb4a9a --- /dev/null +++ b/pycryptodome-3.19.0.tar.gz @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:30354c769a508f644cf5c9647ef1f3a346b6fb3e64034fc3a8a364f6986beeb1 +size 17153954 diff --git a/python-pycryptodome.changes b/python-pycryptodome.changes index b917c5c..19a248d 100644 --- a/python-pycryptodome.changes +++ b/python-pycryptodome.changes @@ -1,3 +1,13 @@ +------------------------------------------------------------------- +Mon Nov 27 15:55:12 UTC 2023 - Dirk Müller + +- update to 3.19.0: + * The ``update()`` methods of TupleHash128 and TupleHash256 + objects can now hash multiple items (byte strings) at once. + * Added support for ECDH, with ``Crypto.Protocol.DH``. + * GH#754: due to a bug in ``cffi``, do not use it on Windows + with Python 3.12+. + ------------------------------------------------------------------- Wed Jun 28 13:36:37 UTC 2023 - ecsos @@ -102,7 +112,7 @@ Mon Mar 27 09:16:44 UTC 2023 - Dirk Müller ------------------------------------------------------------------- Tue Dec 6 13:06:39 UTC 2022 - Yogalakshmi Arunachalam -- Update to version 3.16.0 +- Update to version 3.16.0 * New features Build wheels for musl Linux. Thanks to Ben Raz. * Resolved issues @@ -135,7 +145,7 @@ Tue Feb 15 08:52:41 UTC 2022 - Dirk Müller * Relaxed ECDSA requirements for FIPS 186 signatures and accept any SHA-2 or * SHA-3 hash. ``sign()`` and ``verify()`` will be performed even if the hash is stronger than the ECC key. - + ------------------------------------------------------------------- Sat Dec 11 13:19:30 UTC 2021 - Dirk Müller @@ -199,12 +209,12 @@ Tue Aug 4 14:36:10 UTC 2020 - Dirk Mueller Thu Mar 19 13:12:39 UTC 2020 - Marketa Calabkova - Update to 3.9.7 - * Align stack of functions using SSE2 intrinsics to avoid crashes, + * Align stack of functions using SSE2 intrinsics to avoid crashes, when compiled with gcc on 32-bit x86 platforms. * Prevent key_to_english from creating invalid data when fed with keys of length not multiple of 8. * Fix blocking RSA signing/decryption when key has very small factor. - * fixed memory leak for operations that use memoryviews when cffi + * fixed memory leak for operations that use memoryviews when cffi is not installed. * RSA OAEP decryption was not verifying that all PS bytes are zero. * Fixed wrong ASN.1 OID for HMAC-SHA512 in PBE2. @@ -231,7 +241,7 @@ Sun Nov 10 16:54:21 UTC 2019 - Hans-Peter Jansen * GH#328: minor speed-up when importing RSA. - Add export LC_ALL=en_US.UTF-8 to %build, %install and %check to - fix the build on older distros + fix the build on older distros (as done from Thomas Bechtold in python-pycryptodomex) ------------------------------------------------------------------- @@ -265,26 +275,26 @@ Fri May 24 11:36:30 UTC 2019 - Martin Liška Tue May 14 13:03:34 UTC 2019 - Marketa Calabkova - Update to 3.8.1 - * Add support for loading PEM files encrypted with AES192-CBC, + * Add support for loading PEM files encrypted with AES192-CBC, AES256-CBC, and AES256-GCM. - * When importing ECC keys, ignore EC PARAMS section that was + * When importing ECC keys, ignore EC PARAMS section that was included by some openssl commands. * repr() did not work for ECC.EccKey. * Minimal length for Blowfish cipher is 32 bits, not 40 bits. 3.8.0 - * Speed-up ECC performance. ECDSA is 33 times faster on the + * Speed-up ECC performance. ECDSA is 33 times faster on the NIST P-256 curve. * Added support for NIST P-384 and P-521 curves. * EccKey has new methods size_in_bits() and size_in_bytes(). - * Support HMAC-SHA224, HMAC-SHA256, HMAC-SHA384, and HMAC-SHA512 + * Support HMAC-SHA224, HMAC-SHA256, HMAC-SHA384, and HMAC-SHA512 in PBE2/PBKDF2. - * DER objects were not rejected if their length field had + * DER objects were not rejected if their length field had a leading zero. * Allow legacy RC2 ciphers to have 40-bit keys. - * point_at_infinity() becomes an instance method for + * point_at_infinity() becomes an instance method for Crypto.PublicKey.ECC.EccKey, from a static one. 3.7.3 - * GH#258: False positive on PSS signatures when externally + * GH#258: False positive on PSS signatures when externally provided salt is too long. ------------------------------------------------------------------- @@ -340,12 +350,12 @@ Thu Nov 1 10:42:04 UTC 2018 - Hans-Peter Jansen * Added support for Poly1305 MAC (with AES and ChaCha20 ciphers for key derivation). * Added support for ChaCha20-Poly1305 AEAD cipher. - * New parameter output for Crypto.Util.strxor.strxor, - Crypto.Util.strxor.strxor_c, encrypt and decrypt methods in - symmetric ciphers (Crypto.Cipher package). output is a - pre-allocated buffer (a bytearray or a writeable memoryview) - where the result must be stored. This requires less memory for - very large payloads; it is also more efficient when encrypting + * New parameter output for Crypto.Util.strxor.strxor, + Crypto.Util.strxor.strxor_c, encrypt and decrypt methods in + symmetric ciphers (Crypto.Cipher package). output is a + pre-allocated buffer (a bytearray or a writeable memoryview) + where the result must be stored. This requires less memory for + very large payloads; it is also more efficient when encrypting (or decrypting) several small payloads. - Resolved issues @@ -371,17 +381,17 @@ Mon Sep 3 14:21:25 UTC 2018 - Marketa Calabkova - Update to 3.6.6 - Resolved issues: - * Fix vulnerability on AESNI ECB with payloads smaller than + * Fix vulnerability on AESNI ECB with payloads smaller than 16 bytes. - Update to 3.5.5 - Resolved issues - * Fixed incorrect AES encryption/decryption with AES - acceleration on x86 due to gcc’s optimization and strict + * Fixed incorrect AES encryption/decryption with AES + acceleration on x86 due to gcc’s optimization and strict aliasing rules. - * More prime number candidates than necessary where discarded - as composite due to the limited way D values were searched + * More prime number candidates than necessary where discarded + as composite due to the limited way D values were searched in the Lucas test. * Fixed ResouceWarnings and DeprecationWarnings. @@ -389,7 +399,7 @@ Mon Sep 3 14:21:25 UTC 2018 - Marketa Calabkova - New features: * Build Python 3.7 wheels on Linux, Windows and Mac. - Resolved issues: - * More meaningful exceptions in case of mismatch in IV length + * More meaningful exceptions in case of mismatch in IV length (CBC/OFB/CFB modes). ------------------------------------------------------------------- diff --git a/python-pycryptodome.spec b/python-pycryptodome.spec index 7c0f473..d47e39a 100644 --- a/python-pycryptodome.spec +++ b/python-pycryptodome.spec @@ -16,18 +16,18 @@ # -%define oldpython python %define min_version %{lua:rpm.expand("%{version}"):gsub("^(%d+%.%d+).*", "%1")} %{?sle15_python_module_pythons} Name: python-pycryptodome -Version: 3.18.0 +Version: 3.19.0 Release: 0 Summary: Cryptographic library for Python License: BSD-2-Clause URL: https://www.pycryptodome.org Source: https://github.com/Legrandin/pycryptodome/archive/v%{version}.tar.gz#/pycryptodome-%{version}.tar.gz BuildRequires: %{python_module devel} -BuildRequires: %{python_module setuptools} +BuildRequires: %{python_module pip} +BuildRequires: %{python_module wheel} BuildRequires: fdupes BuildRequires: python-rpm-macros Provides: python-pycrypto = %{version} @@ -38,10 +38,6 @@ Obsoletes: python-pycrypto < %{version} Suggests: libgmp10 Suggests: python-cffi %endif -%ifpython2 -Provides: %{oldpython}-pycrypto = %{version} -Obsoletes: %{oldpython}-pycrypto < %{version} -%endif %python_subpackages %description @@ -85,11 +81,11 @@ Python. Only the pieces that are extremely critical to performance %build export LC_ALL=en_US.UTF-8 export CFLAGS="%{optflags}" -%python_build +%pyproject_wheel %install export LC_ALL=en_US.UTF-8 -%python_install +%pyproject_install %python_expand %fdupes %{buildroot}%{$python_sitearch} %check