a0fc15c631Accepting request 1208841 from devel:languages:python
factory
Ana Guerrero
2024-10-20 08:13:39 +0000
345a8791f1- update to 3.21.0: * By setting the PYCRYPTODOME_DISABLE_GMP environment variable, the GMP library will not be used even if detected. * Add support for Curve25519 / X25519. * Add support for Curve448 / X448. * Add attribute curve to EccPoint and EccXPoint classes, with the canonical name of the curve. * GH#781: the label for the SP800_108_Counter KDF may now contain zero bytes. Thanks to Julien Rische. * GH#814: RSA keys for PSS can be imported. * GH#810: fixed negation of Ed25519 points. * GH#819: accept an RFC5916 ECPrivateKey even if it doesn't contain any of the optional elements (parameters [0] and publicKey[1]). * Remove support for Python 3.5.
devel
Dirk Mueller2024-10-18 08:53:38 +0000
f36bdb2a6cAccepting request 1141807 from devel:languages:python
Ana Guerrero
2024-01-29 21:25:54 +0000
a06c4f74a6- update to 3.20.0: * Added support for TurboSHAKE128 and TurboSHAKE256. * Added method Crypto.Hash.new() to generate a hash object given a hash name. * Added support for AES-GCM encryption of PBES2 and PKCS#8 containers. * Added support for SHA-2 and SHA-3 algorithms in PBKDF2 when creating PBES2 and PKCS#8 containers. * Export of RSA keys accepts the prot_params dictionary as parameter to control the number of iterations for PBKDF2 and scrypt. * C unit tests also run on non-x86 architectures. * GH#787: Fixed autodetect logic for GCC 14 in combination with LTO.Dirk Mueller2024-01-26 21:15:16 +0000
fe53b1a623Accepting request 1137745 from devel:languages:python
Ana Guerrero
2024-01-09 19:49:26 +0000
073b8f89ce- update to 3.19.1 (bsc#1218564, CVE-2023-52323):Dirk Mueller2024-01-09 15:05:05 +0000
5e47d16e10Accepting request 1136275 from devel:languages:python
Dominique Leuenberger
2024-01-05 21:58:59 +0000
30a09a5d3b- update to 3.19.1: * Fixed a side-channel leakage with OAEP decryption that could be exploited to carry out a Manger attackDirk Mueller2023-12-30 17:03:15 +0000
25e4e86334Accepting request 1129188 from devel:languages:python
Ana Guerrero
2023-11-28 21:18:39 +0000
23f4e6f52d- update to 3.19.0: * The `update() methods of TupleHash128 and TupleHash256 objects can now hash multiple items (byte strings) at once. * Added support for ECDH, with Crypto.Protocol.DH. * GH#754: due to a bug in cffi`, do not use it on Windows with Python 3.12+. - Update to version 3.16.0 * Align stack of functions using SSE2 intrinsics to avoid crashes, * fixed memory leak for operations that use memoryviews when cffi fix the build on older distros * Add support for loading PEM files encrypted with AES192-CBC, * When importing ECC keys, ignore EC PARAMS section that was * Speed-up ECC performance. ECDSA is 33 times faster on the * Support HMAC-SHA224, HMAC-SHA256, HMAC-SHA384, and HMAC-SHA512 * DER objects were not rejected if their length field had * point_at_infinity() becomes an instance method for * GH#258: False positive on PSS signatures when externally * New parameter output for Crypto.Util.strxor.strxor, Crypto.Util.strxor.strxor_c, encrypt and decrypt methods in symmetric ciphers (Crypto.Cipher package). output is a pre-allocated buffer (a bytearray or a writeable memoryview) where the result must be stored. This requires less memory for very large payloads; it is also more efficient when encrypting * Fix vulnerability on AESNI ECB with payloads smaller than * Fixed incorrect AES encryption/decryption with AES acceleration on x86 due to gcc’s optimization and strict * More prime number candidates than necessary where discarded as composite due to the limited way D values were searched * More meaningful exceptions in case of mismatch in IV lengthDirk Mueller2023-11-27 15:57:36 +0000
7de6d32869Accepting request 1096020 from devel:languages:python
Dominique Leuenberger
2023-06-30 17:58:10 +0000
cfac5b8963Accepting request 1095815 from home:ecsos:pythonMatej Cepl2023-06-29 16:30:14 +0000
a2023f1da2Accepting request 1090246 from devel:languages:python
Dominique Leuenberger
2023-06-03 22:11:38 +0000
136c467c2a- update to 3.18.0: * Added support for DER BOOLEAN encodings. * The library now compiles on Windows ARM64. Thanks to Niyas Sait. * GH#722: `nonce` attribute was not correctly set for XChaCha20_Poly1305 ciphers. Thanks to Liam Haber. * GH#728: Workaround for a possible x86 emulator bug in Windows for ARM64. * GH#739: OID encoding for arc 2 didn't accept children larger than 39. Thanks to James. * Correctly check that the scalar matches the point when importing an ECC private key.Dirk Mueller2023-06-01 10:12:55 +0000
00190e5ba5Accepting request 1085158 from devel:languages:python
Dominique Leuenberger
2023-05-09 11:06:59 +0000
16cf62749e- Fix %%files to work with %pyproject_ style building.Matej Cepl2023-05-05 17:13:34 +0000
e465b68b7d- update to 3.17.0: * Added support for the Counter Mode KDF defined in SP 800-108 Rev 1. * Reduce the minimum tag length for the EAX cipher to 2 bytes. * An RSA object has 4 new properties for the CRT coefficients: `dp, dq, invq and invq (invp is the same value as the existing u). * GH#526: improved typing for RSA.construct. * GH#534: reduced memory consumption when using a large number of cipher objects. * GH#598: fixed missing error handling for Util.number.inverse. * GH#629: improved typing for AES.new and the various mode-specific types it returns. Thanks to Greg Werbin. * GH#653: added workaround for an alleged GCC compiler bug that affected Ed25519 code compiled for AVX2. * GH#658: attribute curve of an ECC key was not always the preferred curve name, as it used to be in v3.15.0 (independently of the curve name specified when generating the key). * GH#637: fixed typing for legacy modules PKCS1_v1_5 and PKCS1_PSS, as their verify() returned a boolean. * GH#664: with OCB mode, nonces of maximum length (15 bytes) were actually used as 14 bytes nonces. After this fix, data that was encrypted in past using the (default) nonce length of 15 bytes can still be decrypted by reducing the nonce to its first 14 bytes. * GH#705: improved typing for nonce, iv, and IV` parameters of cipher objects.Dirk Mueller2023-03-27 09:19:27 +0000
546af51295Accepting request 1040742 from devel:languages:python
Dominique Leuenberger
2022-12-07 16:34:42 +0000
9085619893Accepting request 1040658 from home:yarunachalam:branches:devel:languages:pythonDirk Mueller2022-12-06 16:01:14 +0000
bf03e9b3ccAccepting request 985709 from devel:languages:python
Dominique Leuenberger
2022-06-30 11:17:51 +0000
cdbeb9012cAccepting request 985676 from home:Simmphonie:pythonDirk Mueller2022-06-29 07:16:17 +0000
aaaac1968dAccepting request 961035 from devel:languages:python
Dominique Leuenberger
2022-03-12 16:14:33 +0000
b90c3a8dd3Accepting request 960739 from home:pgajdos:pythonMatej Cepl2022-03-11 09:26:09 +0000
03b643e110Accepting request 954656 from devel:languages:python
Dominique Leuenberger
2022-02-16 23:29:58 +0000
454ba805e4- update to 3.14.1: * GH#595: Fixed memory leak for GMP integers. * Add support for curve NIST P-192. * Add support for curve NIST P-224. * GH#590: Fixed typing info for `Crypto.PublicKey.ECC. * Relaxed ECDSA requirements for FIPS 186 signatures and accept any SHA-2 or * SHA-3 hash. sign() and verify()` will be performed even if the hash is stronger than the ECC key.Dirk Mueller2022-02-15 08:53:31 +0000
6e80223b48Accepting request 939588 from devel:languages:python
Dominique Leuenberger
2021-12-13 19:41:41 +0000
2f5bf9c4dd- update to 3.12.0: * ECC keys in the SEC1 format can be exported and imported. * Add support for KMAC128, KMAC256, TupleHash128, and TupleHash256 (NIST SP-800 185). * Add support for KangarooTwelve. * GH#563: An asymmetric key could not be imported as a `memoryview`. * GH#566: cSHAKE128/256 generated a wrong output for customization strings * GH#582: CBC decryption generated the wrong plaintext when the input and the output were the same buffer.Dirk Mueller2021-12-11 13:50:27 +0000
9361ab8555Accepting request 925769 from devel:languages:python
Dominique Leuenberger
2021-10-20 18:23:38 +0000
f5861bd780- update to 3.11.0: * GH#512: Especially for very small bit sizes, `Crypto.Util.number.getPrime() was occasionally generating primes larger than given the bit size. * GH#552: Correct typing annotations for PKCS115_Cipher.decrypt(). * GH#555: decrypt() method of a PKCS#1v1.5 cipher returned a bytearray instead of bytes. * GH#557: External DSA domain parameters were accepted even when the modulus (p) was not prime. This affected Crypto.PublicKey.DSA.generate() and Crypto.PublicKey.DSA.construct(). * Added cSHAKE128 and cSHAKE256 (of SHA-3 family). * GH#558: The flag RTLD_DEEPBIND passed to dlopen() is not well supported by address sanitizers <https://github.com/google/sanitizers/issues/611>_. It is now possible to set the environment variable PYCRYPTDOME_DISABLE_DEEPBIND` to drop that flag and allow security testing.Dirk Mueller2021-10-16 22:51:19 +0000
a67db0c5dfAccepting request 878405 from devel:languages:python
Richard Brown
2021-03-16 14:43:26 +0000
9ae1dc08a0- update to 3.10.1: * Fixed a potential memory leak when initializing block ciphers. * GH#466: `Crypto.Math.miller_rabin_test() was still using the system random source and not the one provided as parameter. * GH#469: RSA objects have the method public_key() like ECC objects. The old method publickey() is still available for backward compatibility. * GH#476: Crypto.Util.Padding.unpad() was raising an incorrect exception in case of zero-length inputs. Thanks to Captainowie. * GH#491: better exception message when Counter.new() is called with an integer initial_value than doesn't fit into nbits bits. * GH#496: added missing block_size member for ECB cipher objects. Thanks to willem. * GH#500: nonce` member of an XChaCha20 cipher object was not matching the original nonce.Dirk Mueller2021-03-04 21:02:59 +0000
b922436b76Accepting request 852357 from devel:languages:python
Dominique Leuenberger
2020-12-03 17:41:23 +0000
a59cf88247Accepting request 852105 from home:frispete:pythonDirk Mueller2020-12-01 14:07:45 +0000
99da699b0dAccepting request 824348 from devel:languages:python
Dominique Leuenberger
2020-08-06 15:31:50 +0000
7313a0da72- update to 3.9.8: * GH#426: The Shamir's secret sharing implementation is not actually compatible with `ssss. Added an optional parameter to enable interoperability. * GH#427: Skip altogether loading of gmp.dll` on Windows. * GH#420: Fix incorrect CFB decryption when the input and the output are the same buffer. * Speed up Shamir's secret sharing routines. Thanks to ncarve.Dirk Mueller2020-08-04 14:44:53 +0000
205f586266Accepting request 786476 from devel:languages:python
Dominique Leuenberger
2020-03-26 23:27:34 +0000
ed95c510c7Accepting request 786474 from home:mcalabkova:branches:devel:languages:python
Tomáš Chvátal
2020-03-19 13:22:59 +0000
6eb971897aAccepting request 747336 from devel:languages:python
Dominique Leuenberger
2019-11-22 09:21:55 +0000
25d54c227eAccepting request 747244 from home:frispete:python
Tomáš Chvátal
2019-11-11 12:42:17 +0000
83d6d0b487Accepting request 729873 from devel:languages:python
Dominique Leuenberger
2019-09-23 10:05:22 +0000
6f5d805e43- Update to 3.9.0: * Add support for loading PEM files encrypted with AES256-CBC. * Add support for XChaCha20 and XChaCha20-Poly1305 ciphers. * Add support for bcrypt key derivation function (Crypto.Protocol.KDF.bcrypt). * Add support for left multiplication of an EC point by a scalar. * Add support for importing ECC and RSA keys in the new OpenSSH format.
Tomáš Chvátal
2019-09-10 12:34:39 +0000
c8d972c426Accepting request 706523 from devel:languages:python
Dominique Leuenberger
2019-06-18 12:44:39 +0000
33c9b81227Accepting request 706521 from home:marxin:branches:devel:languages:python
Tomáš Chvátal
2019-05-30 15:38:36 +0000
3a87381347Accepting request 706499 from home:marxin:branches:devel:languages:python
Tomáš Chvátal
2019-05-30 12:08:54 +0000
21a132ce9bAccepting request 705218 from devel:languages:python
Dominique Leuenberger
2019-05-25 11:17:05 +0000
e7f8e07731Accepting request 705217 from home:marxin:branches:devel:languages:python
Tomáš Chvátal
2019-05-24 11:41:05 +0000
7e5244f703Accepting request 702874 from devel:languages:python
Dominique Leuenberger
2019-05-20 08:24:53 +0000
284c16bbb6Accepting request 702852 from home:mcalabkova:branches:devel:languages:python
Tomáš Chvátal
2019-05-14 15:45:18 +0000
c092d7a0ddAccepting request 664990 from devel:languages:python
Dominique Leuenberger
2019-01-28 19:45:49 +0000
ce27972597Accepting request 664952 from home:jbrownell:branches:devel:languages:pythonDirk Mueller2019-01-12 15:42:29 +0000
8e0acef9feAccepting request 660002 from devel:languages:python
Dominique Leuenberger
2018-12-26 23:29:37 +0000