17
0

Commit Graph

  • 0edd9e0a87 Accepting request 1304658 from devel:languages:python factory Ana Guerrero 2025-09-15 17:52:11 +00:00
  • 71f4cd84df - update to 3.23.0: * Added cipher modes Key Wrap (KW, RFC3394) and Key Wrap with Padding (KWP, RFC5649). Both are defined also in NIST SP 800-38F. * GH#862: For HashEdDSA and Ed448, sign() and verify() modified the state of the XOF. Dirk Mueller 2025-09-14 18:33:41 +00:00
  • 776a5b254c Accepting request 1269470 from devel:languages:python leap-16.1 leap-16.0 Ana Guerrero 2025-04-15 14:47:19 +00:00
  • c30b89a050 - update to 3.22.0: * Added support for HPKE (RFC 9180). * GH#812: CCM ciphers will now fail before encrypting (or decrypting) data beyond the limit imposed by the nonce length. * GH#846: fix infinite loop with RC4 for data larger than 4GB. * GH#852: handle correctly invalid PEM files with less than 3 lines. Dirk Mueller 2025-04-10 17:38:22 +00:00
  • ae4dfb349d Accepting request 1208824 from devel:languages:python Ana Guerrero 2024-10-18 13:58:16 +00:00
  • 422d0e73b7 - update to 3.21.0: * By setting the PYCRYPTODOME_DISABLE_GMP environment variable, the GMP library will not be used even if detected. * Add support for Curve25519 / X25519. * Add support for Curve448 / X448. * Add attribute curve to EccPoint and EccXPoint classes, with the canonical name of the curve. * GH#781: the label for the SP800_108_Counter KDF may now contain zero bytes. Thanks to Julien Rische. * GH#814: RSA keys for PSS can be imported. * GH#810: fixed negation of Ed25519 points. * GH#819: accept an RFC5916 ECPrivateKey even if it doesn't contain any of the optional elements (parameters [0] and publicKey[1]). * Remove support for Python 3.5. Dirk Mueller 2024-10-18 08:53:08 +00:00
  • 05360aaeee Accepting request 1141810 from devel:languages:python Ana Guerrero 2024-01-28 18:39:51 +00:00
  • 2f9eed33c8 - update to 3.20.0: * Added support for TurboSHAKE128 and TurboSHAKE256. * Added method Crypto.Hash.new() to generate a hash object given a hash name. * Added support for AES-GCM encryption of PBES2 and PKCS#8 containers. * Added support for SHA-2 and SHA-3 algorithms in PBKDF2 when creating PBES2 and PKCS#8 containers. * Export of RSA keys accepts the prot_params dictionary as parameter to control the number of iterations for PBKDF2 and scrypt. * C unit tests also run on non-x86 architectures. * GH#787: Fixed autodetect logic for GCC 14 in combination with LTO. Dirk Mueller 2024-01-26 21:17:59 +00:00
  • 4f443f16bb Accepting request 1137746 from devel:languages:python Ana Guerrero 2024-01-09 19:51:35 +00:00
  • c1f3fc5b99 - update to 3.19.1 (bsc#1218564, CVE-2023-52323) Dirk Mueller 2024-01-09 15:05:35 +00:00
  • 8cb579c243 Accepting request 1136276 from devel:languages:python Dominique Leuenberger 2024-01-03 11:25:44 +00:00
  • 0090e515fa OBS-URL: https://build.opensuse.org/package/show/devel:languages:python/python-pycryptodomex?expand=0&rev=40 Dirk Mueller 2024-01-02 20:57:01 +00:00
  • ac612e811b - update to 3.19.1: * Fixed a side-channel leakage with OAEP decryption that could be exploited to carry out a Manger attack. Thanks to Hubert Kario. Dirk Mueller 2023-12-30 16:58:06 +00:00
  • d064db119d Accepting request 1129189 from devel:languages:python Ana Guerrero 2023-11-27 21:44:40 +00:00
  • 3dab46945a - update to 3.19.0: * The `update() methods of TupleHash128 and TupleHash256 objects can now hash multiple items (byte strings) at once. * Added support for ECDH, with Crypto.Protocol.DH. * GH#754: due to a bug in cffi`, do not use it on Windows with Python 3.12+. - Update to 3.16.0 * New parameter output for Crypto.Util.strxor.strxor, Crypto.Util.strxor.strxor_c, encrypt and decrypt methods in symmetric ciphers (Crypto.Cipher package). output is a pre-allocated buffer (a bytearray or a writeable memoryview) where the result must be stored. This requires less memory for very large payloads; it is also more efficient when encrypting * Fix vulnerability on AESNI ECB with payloads smaller than * Fixed incorrect AES encryption/decryption with AES acceleration on x86 due to gcc’s optimization and strict * More prime number candidates than necessary where discarded as composite due to the limited way D values were searched * More meaningful exceptions in case of mismatch in IV length Dirk Mueller 2023-11-27 15:58:33 +00:00
  • 697bef52bf Accepting request 1095663 from devel:languages:python Dominique Leuenberger 2023-06-27 21:18:04 +00:00
  • 266652cd29 Accepting request 1095614 from home:ecsos:python Markéta Machová 2023-06-27 15:40:38 +00:00
  • cd6dc51e76 Accepting request 1090382 from devel:languages:python Dominique Leuenberger 2023-06-02 22:07:20 +00:00
  • c0f6c4cba6 - update to 3.18.0: * Added support for DER BOOLEAN encodings. * The library now compiles on Windows ARM64. Thanks to Niyas Sait. * Resolved issues * GH#722: `nonce` attribute was not correctly set for XChaCha20_Poly1305 ciphers. Thanks to Liam Haber. * GH#728: Workaround for a possible x86 emulator bug in Windows for ARM64. * GH#739: OID encoding for arc 2 didn't accept children larger than 39. Thanks to James. * Correctly check that the scalar matches the point when importing an ECC private key. Dirk Mueller 2023-06-01 20:03:55 +00:00
  • f5a61f0f28 Accepting request 1040741 from devel:languages:python Dominique Leuenberger 2022-12-07 16:34:54 +00:00
  • 11f261982f Accepting request 1040662 from home:yarunachalam:branches:devel:languages:python Dirk Mueller 2022-12-06 16:01:03 +00:00
  • ee56754839 Accepting request 985713 from devel:languages:python Dominique Leuenberger 2022-06-29 14:01:49 +00:00
  • ab85310cdc - update to 3.15.0: * Add support for curves Ed25519 and Ed448, including export and import of keys. * Add support for EdDSA signatures. * Add support for Asymmetric Key Packages (RFC5958) to import private keys. * GH#620: for Crypto.Util.number.getPrime , do not sequentially scan numbers searching for a prime. Dirk Mueller 2022-06-29 07:21:45 +00:00
  • 56b96d4cb6 Accepting request 961034 from devel:languages:python Dominique Leuenberger 2022-03-11 20:41:24 +00:00
  • 12997f2c46 Accepting request 960735 from home:pgajdos:python Matej Cepl 2022-03-11 09:25:43 +00:00
  • c00094410a Accepting request 954657 from devel:languages:python Dominique Leuenberger 2022-02-15 22:57:22 +00:00
  • 00f680e5ef - update to 3.14.1: * GH#595: Fixed memory leak for GMP integers. * Add support for curve NIST P-192. * Add support for curve NIST P-224. * GH#590: Fixed typing info for `Crypto.PublicKey.ECC. * Relaxed ECDSA requirements for FIPS 186 signatures and accept any SHA-2 or * SHA-3 hash. sign() and verify()` will be performed even if the hash is stronger than the ECC key. Dirk Mueller 2022-02-15 08:57:37 +00:00
  • 18e170560c Accepting request 939978 from devel:languages:python Dominique Leuenberger 2021-12-11 23:57:52 +00:00
  • 533cf5395a - update to 3.12.0: * ECC keys in the SEC1 format can be exported and imported. * Add support for KMAC128, KMAC256, TupleHash128, and TupleHash256 (NIST SP-800 185). * Add support for KangarooTwelve. * GH#563: An asymmetric key could not be imported as a `memoryview`. * GH#566: cSHAKE128/256 generated a wrong output for customization strings * GH#582: CBC decryption generated the wrong plaintext when the input and the output were the same buffer. Dirk Mueller 2021-12-11 20:45:03 +00:00
  • e6fc02fa44 Accepting request 925768 from devel:languages:python Dominique Leuenberger 2021-10-18 19:59:09 +00:00
  • ea7c863b6f - update to 3.11.0: * GH#512: Especially for very small bit sizes, `Crypto.Util.number.getPrime() was occasionally generating primes larger than given the bit size. * GH#552: Correct typing annotations for PKCS115_Cipher.decrypt(). * GH#555: decrypt() method of a PKCS#1v1.5 cipher returned a bytearray instead of bytes. * GH#557: External DSA domain parameters were accepted even when the modulus (p) was not prime. This affected Crypto.PublicKey.DSA.generate() and Crypto.PublicKey.DSA.construct(). * Added cSHAKE128 and cSHAKE256 (of SHA-3 family). * GH#558: The flag RTLD_DEEPBIND passed to dlopen() is not well supported by address sanitizers <https://github.com/google/sanitizers/issues/611>_. It is now possible to set the environment variable PYCRYPTDOME_DISABLE_DEEPBIND` to drop that flag and allow security testing. Dirk Mueller 2021-10-16 22:40:47 +00:00
  • bb3db791df Accepting request 887878 from devel:languages:python Dominique Leuenberger 2021-04-23 15:50:36 +00:00
  • 02569b19dc - update to 3.10.1: * Python 3 wheels use `abi3` ABI tag. * Remove Appveyor CI. Dirk Mueller 2021-04-22 20:01:59 +00:00
  • 845079c9f6 Accepting request 852356 from devel:languages:python Dominique Leuenberger 2020-12-02 12:58:16 +00:00
  • 07c9dbd264 Accepting request 852110 from home:frispete:python Dirk Mueller 2020-12-01 14:07:25 +00:00
  • 660c71c920 Accepting request 824345 from devel:languages:python Dominique Leuenberger 2020-08-04 18:25:44 +00:00
  • 1e3b370b31 - update to 3.9.8: * GH#426: The Shamir's secret sharing implementation is not actually compatible with `ssss. Added an optional parameter to enable interoperability. * GH#427: Skip altogether loading of gmp.dll` on Windows. * GH#420: Fix incorrect CFB decryption when the input and the output are the same buffer. * Speed up Shamir's secret sharing routines. Thanks to ncarve. Dirk Mueller 2020-08-04 14:40:58 +00:00
  • fc6d78b088 Accepting request 780395 from devel:languages:python Dominique Leuenberger 2020-03-03 09:15:24 +00:00
  • 588722651c - update to 3.9.7: * GH#381: Make notarization possible again on OS X when using wheels. Thanks to Colin Atkinson. * RSA OAEP decryption was not verifying that all `PS bytes are zero. * GH#372: fixed memory leak for operations that use memoryviews when cffi is not installed. * Fixed wrong ASN.1 OID for HMAC-SHA512 in PBE2. * GH#341: Prevent key_to_english` from creating invalid data when fed with keys of length not multiple of 8. Thanks to vstoykovbg. * GH#347: Fix blocking RSA signing/decryption when key has very small factor. Thanks to Martijn Pieters. * GH#308: Align stack of functions using SSE2 intrinsics to avoid crashes, when compiled with gcc on 32-bit x86 platforms. Dirk Mueller 2020-02-28 21:57:19 +00:00
  • d1b117607d Accepting request 747355 from devel:languages:python Dominique Leuenberger 2019-11-11 20:33:12 +00:00
  • f96daa2d87 Accepting request 747332 from home:frispete:python Matej Cepl 2019-11-11 13:47:25 +00:00
  • 2738bb4140 Accepting request 747324 from devel:languages:python Dominique Leuenberger 2019-11-11 12:01:45 +00:00
  • ed2276cec3 Accepting request 747245 from home:frispete:python Matej Cepl 2019-11-11 10:27:04 +00:00
  • fdc017d986 Accepting request 730127 from devel:languages:python Ludwig Nussel 2019-09-13 12:58:36 +00:00
  • 7236bbea58 - Add export LC_ALL=en_US.UTF-8 to %build, %install and %check to fix the build on older distros Thomas Bechtold 2019-09-11 12:24:24 +00:00
  • aacb3486bf Accepting request 729868 from devel:languages:python Dominique Leuenberger 2019-09-11 08:37:07 +00:00
  • ae3f344e87 - Update to 3.9.0: * Add support for loading PEM files encrypted with AES256-CBC. * Add support for XChaCha20 and XChaCha20-Poly1305 ciphers. * Add support for bcrypt key derivation function (Crypto.Protocol.KDF.bcrypt). * Add support for left multiplication of an EC point by a scalar. * Add support for importing ECC and RSA keys in the new OpenSSH format. Tomáš Chvátal 2019-09-10 12:28:04 +00:00
  • a5ec811d5e Accepting request 707124 from devel:languages:python Dominique Leuenberger 2019-06-06 16:15:46 +00:00
  • cafd228f5e - Update to 3.8.2: * GH#291: fix strict aliasing problem, emerged with GCC 9.1. Tomáš Chvátal 2019-06-03 10:27:01 +00:00
  • f86de6a819 Accepting request 702873 from devel:languages:python Dominique Leuenberger 2019-05-22 09:11:36 +00:00
  • f734e84f84 Accepting request 702853 from home:mcalabkova:branches:devel:languages:python Tomáš Chvátal 2019-05-14 15:45:04 +00:00
  • dba00deb5f Accepting request 663335 from devel:languages:python Dominique Leuenberger 2019-01-10 14:20:42 +00:00
  • ff2bd1dae7 Accepting request 663320 from home:frispete:python Tomáš Chvátal 2019-01-07 10:36:07 +00:00
  • 6115687ce7 Accepting request 652659 from home:frispete:python Dirk Mueller 2018-11-30 14:49:44 +00:00