| 
									
										
											  
											
												- update to 3.19.0:
  * The ``update()`` methods of TupleHash128 and TupleHash256
    objects can now hash multiple items (byte strings) at once.
  * Added support for ECDH, with ``Crypto.Protocol.DH``.
  * GH#754: due to a bug in ``cffi``, do not use it on Windows
    with Python 3.12+.
- Update to version 3.16.0
  * Align stack of functions using SSE2 intrinsics to avoid crashes,
  * fixed memory leak for operations that use memoryviews when cffi
  fix the build on older distros
  * Add support for loading PEM files encrypted with AES192-CBC,
  * When importing ECC keys, ignore EC PARAMS section that was
  * Speed-up ECC performance. ECDSA is 33 times faster on the
  * Support HMAC-SHA224, HMAC-SHA256, HMAC-SHA384, and HMAC-SHA512
  * DER objects were not rejected if their length field had
  * point_at_infinity() becomes an instance method for
  * GH#258: False positive on PSS signatures when externally
    * New parameter output for Crypto.Util.strxor.strxor,
      Crypto.Util.strxor.strxor_c, encrypt and decrypt methods in
      symmetric ciphers (Crypto.Cipher package). output is a
      pre-allocated buffer (a bytearray or a writeable memoryview)
      where the result must be stored. This requires less memory for
      very large payloads; it is also more efficient when encrypting
    * Fix vulnerability on AESNI ECB with payloads smaller than
    * Fixed incorrect AES encryption/decryption with AES
      acceleration on x86 due to gcc’s optimization and strict
    * More prime number candidates than necessary where discarded
      as composite due to the limited way D values were searched
    * More meaningful exceptions in case of mismatch in IV length
OBS-URL: https://build.opensuse.org/package/show/devel:languages:python/python-pycryptodome?expand=0&rev=59
											
										 
											2023-11-27 15:57:36 +00:00
										 |  |  |  | ------------------------------------------------------------------- | 
					
						
							|  |  |  |  | Mon Nov 27 15:55:12 UTC 2023 - Dirk Müller <dmueller@suse.com> | 
					
						
							|  |  |  |  | 
 | 
					
						
							|  |  |  |  | - update to 3.19.0: | 
					
						
							|  |  |  |  |   * The ``update()`` methods of TupleHash128 and TupleHash256 | 
					
						
							|  |  |  |  |     objects can now hash multiple items (byte strings) at once. | 
					
						
							|  |  |  |  |   * Added support for ECDH, with ``Crypto.Protocol.DH``. | 
					
						
							|  |  |  |  |   * GH#754: due to a bug in ``cffi``, do not use it on Windows | 
					
						
							|  |  |  |  |     with Python 3.12+. | 
					
						
							|  |  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2023-06-29 16:30:14 +00:00
										 |  |  |  | ------------------------------------------------------------------- | 
					
						
							|  |  |  |  | Wed Jun 28 13:36:37 UTC 2023 - ecsos <ecsos@opensuse.org> | 
					
						
							|  |  |  |  | 
 | 
					
						
							|  |  |  |  | - Add %{?sle15_python_module_pythons} | 
					
						
							|  |  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2023-06-01 10:12:55 +00:00
										 |  |  |  | ------------------------------------------------------------------- | 
					
						
							|  |  |  |  | Thu Jun  1 10:12:06 UTC 2023 - Dirk Müller <dmueller@suse.com> | 
					
						
							|  |  |  |  | 
 | 
					
						
							|  |  |  |  | - update to 3.18.0: | 
					
						
							|  |  |  |  |   * Added support for DER BOOLEAN encodings. | 
					
						
							|  |  |  |  |   * The library now compiles on Windows ARM64. Thanks to Niyas | 
					
						
							|  |  |  |  |     Sait. | 
					
						
							|  |  |  |  |   * GH#722: ``nonce`` attribute was not correctly set for | 
					
						
							|  |  |  |  |     XChaCha20_Poly1305 ciphers. Thanks to Liam Haber. | 
					
						
							|  |  |  |  |   * GH#728: Workaround for a possible x86 emulator bug in Windows | 
					
						
							|  |  |  |  |     for ARM64. | 
					
						
							|  |  |  |  |   * GH#739: OID encoding for arc 2 didn't accept children larger | 
					
						
							|  |  |  |  |     than 39. Thanks to James. | 
					
						
							|  |  |  |  |   * Correctly check that the scalar matches the point when | 
					
						
							|  |  |  |  |     importing an ECC private key. | 
					
						
							|  |  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2023-05-05 17:13:34 +00:00
										 |  |  |  | ------------------------------------------------------------------- | 
					
						
							|  |  |  |  | Fri May  5 17:09:46 UTC 2023 - Matej Cepl <mcepl@suse.com> | 
					
						
							|  |  |  |  | 
 | 
					
						
							|  |  |  |  | - Fix %%files to work with %pyproject_ style building. | 
					
						
							|  |  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2023-03-27 09:19:27 +00:00
										 |  |  |  | ------------------------------------------------------------------- | 
					
						
							|  |  |  |  | Mon Mar 27 09:18:25 UTC 2023 - Dirk Müller <dmueller@suse.com> | 
					
						
							|  |  |  |  | 
 | 
					
						
							|  |  |  |  | - update to 3.17.0: | 
					
						
							|  |  |  |  |   * Added support for the Counter Mode KDF defined in SP 800-108 | 
					
						
							|  |  |  |  |     Rev 1. | 
					
						
							|  |  |  |  |   * Reduce the minimum tag length for the EAX cipher to 2 bytes. | 
					
						
							|  |  |  |  |   * An RSA object has 4 new properties for the CRT coefficients: | 
					
						
							|  |  |  |  |     ``dp``, ``dq``, ``invq`` and ``invq`` (``invp`` is the same | 
					
						
							|  |  |  |  |     value  as the existing ``u``). | 
					
						
							|  |  |  |  |   * GH#526: improved typing for ``RSA.construct``. | 
					
						
							|  |  |  |  |   * GH#534: reduced memory consumption when using a large number | 
					
						
							|  |  |  |  |     of cipher objects. | 
					
						
							|  |  |  |  |   * GH#598: fixed missing error handling for | 
					
						
							|  |  |  |  |     ``Util.number.inverse``. | 
					
						
							|  |  |  |  |   * GH#629: improved typing for ``AES.new`` and the various | 
					
						
							|  |  |  |  |     mode-specific types it returns. Thanks to Greg Werbin. | 
					
						
							|  |  |  |  |   * GH#653: added workaround for an alleged GCC compiler bug | 
					
						
							|  |  |  |  |     that affected Ed25519 code compiled for AVX2. | 
					
						
							|  |  |  |  |   * GH#658: attribute ``curve`` of an ECC key was not always | 
					
						
							|  |  |  |  |     the preferred curve name, as it used to be in v3.15.0 | 
					
						
							|  |  |  |  |     (independently of the curve name specified when generating | 
					
						
							|  |  |  |  |     the key). | 
					
						
							|  |  |  |  |   * GH#637: fixed typing for legacy modules ``PKCS1_v1_5`` and | 
					
						
							|  |  |  |  |     ``PKCS1_PSS``, as their ``verify()`` returned a boolean. | 
					
						
							|  |  |  |  |   * GH#664: with OCB mode, nonces of maximum length (15 bytes) | 
					
						
							|  |  |  |  |     were actually used as 14 bytes nonces. | 
					
						
							|  |  |  |  |     After this fix, data that was encrypted in past using the | 
					
						
							|  |  |  |  |     (default) nonce length of 15 bytes can still be decrypted | 
					
						
							|  |  |  |  |     by reducing the nonce to its first 14 bytes. | 
					
						
							|  |  |  |  |   * GH#705: improved typing for ``nonce``, ``iv``, and ``IV`` | 
					
						
							|  |  |  |  |     parameters of cipher objects. | 
					
						
							|  |  |  |  | 
 | 
					
						
							|  |  |  |  | ------------------------------------------------------------------- | 
					
						
							|  |  |  |  | Mon Mar 27 09:16:44 UTC 2023 - Dirk Müller <dmueller@suse.com> | 
					
						
							|  |  |  |  | 
 | 
					
						
							|  |  |  |  | - update to 3.17.0: | 
					
						
							|  |  |  |  |   * ++++++++++++++++++++++++++ | 
					
						
							|  |  |  |  |   * New features | 
					
						
							|  |  |  |  |   * Added support for the Counter Mode KDF defined in SP 800-108 | 
					
						
							|  |  |  |  |     Rev 1. | 
					
						
							|  |  |  |  |   * Reduce the minimum tag length for the EAX cipher to 2 bytes. | 
					
						
							|  |  |  |  |   * An RSA object has 4 new properties for the CRT coefficients | 
					
						
							|  |  |  |  |   * ``dp``, ``dq``, ``invq`` and ``invq`` (``invp`` is the same | 
					
						
							|  |  |  |  |     value | 
					
						
							|  |  |  |  |   * as the existing ``u``). | 
					
						
							|  |  |  |  |   * Resolved issues | 
					
						
							|  |  |  |  |   * GH#526: improved typing for ``RSA.construct``. | 
					
						
							|  |  |  |  |   * GH#534: reduced memory consumption when using a large number | 
					
						
							|  |  |  |  |   * of cipher objects. | 
					
						
							|  |  |  |  |   * GH#598: fixed missing error handling for | 
					
						
							|  |  |  |  |     ``Util.number.inverse``. | 
					
						
							|  |  |  |  |   * GH#629: improved typing for ``AES.new`` and the various | 
					
						
							|  |  |  |  |   * mode-specific types it returns. Thanks to Greg Werbin. | 
					
						
							|  |  |  |  |   * GH#653: added workaround for an alleged GCC compiler bug | 
					
						
							|  |  |  |  |   * hat affected Ed25519 code compiled for AVX2. | 
					
						
							|  |  |  |  |   * GH#658: attribute ``curve`` of an ECC key was not always | 
					
						
							|  |  |  |  |   * he preferred curve name, as it used to be in v3.15.0 | 
					
						
							|  |  |  |  |   * independently of the curve name specified when generating | 
					
						
							|  |  |  |  |   * he key). | 
					
						
							|  |  |  |  |   * GH#637: fixed typing for legacy modules ``PKCS1_v1_5`` and | 
					
						
							|  |  |  |  |     ``PKCS1_PSS``, | 
					
						
							|  |  |  |  |   * as their ``verify()`` returned a boolean. | 
					
						
							|  |  |  |  |   * GH#664: with OCB mode, nonces of maximum length (15 bytes | 
					
						
							|  |  |  |  |   * were actually used as 14 bytes nonces. | 
					
						
							|  |  |  |  |   * After this fix, data that was encrypted in past using the | 
					
						
							|  |  |  |  |   * default) nonce length of 15 bytes can still be decrypted | 
					
						
							|  |  |  |  |   * by reducing the nonce to its first 14 bytes. | 
					
						
							|  |  |  |  |   * GH#705: improved typing for ``nonce``, ``iv``, and ``IV`` | 
					
						
							|  |  |  |  |     parameters | 
					
						
							|  |  |  |  |   * of cipher objects. | 
					
						
							|  |  |  |  |   * Other changes | 
					
						
							|  |  |  |  |   * Build PyPy wheels only for versions 3.8 and 3.9, and not for | 
					
						
							|  |  |  |  |     3.7 anymore. | 
					
						
							|  |  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2022-12-06 16:01:14 +00:00
										 |  |  |  | ------------------------------------------------------------------- | 
					
						
							|  |  |  |  | Tue Dec  6 13:06:39 UTC 2022 - Yogalakshmi Arunachalam <yarunachalam@suse.com> | 
					
						
							|  |  |  |  | 
 | 
					
						
							| 
									
										
											  
											
												- update to 3.19.0:
  * The ``update()`` methods of TupleHash128 and TupleHash256
    objects can now hash multiple items (byte strings) at once.
  * Added support for ECDH, with ``Crypto.Protocol.DH``.
  * GH#754: due to a bug in ``cffi``, do not use it on Windows
    with Python 3.12+.
- Update to version 3.16.0
  * Align stack of functions using SSE2 intrinsics to avoid crashes,
  * fixed memory leak for operations that use memoryviews when cffi
  fix the build on older distros
  * Add support for loading PEM files encrypted with AES192-CBC,
  * When importing ECC keys, ignore EC PARAMS section that was
  * Speed-up ECC performance. ECDSA is 33 times faster on the
  * Support HMAC-SHA224, HMAC-SHA256, HMAC-SHA384, and HMAC-SHA512
  * DER objects were not rejected if their length field had
  * point_at_infinity() becomes an instance method for
  * GH#258: False positive on PSS signatures when externally
    * New parameter output for Crypto.Util.strxor.strxor,
      Crypto.Util.strxor.strxor_c, encrypt and decrypt methods in
      symmetric ciphers (Crypto.Cipher package). output is a
      pre-allocated buffer (a bytearray or a writeable memoryview)
      where the result must be stored. This requires less memory for
      very large payloads; it is also more efficient when encrypting
    * Fix vulnerability on AESNI ECB with payloads smaller than
    * Fixed incorrect AES encryption/decryption with AES
      acceleration on x86 due to gcc’s optimization and strict
    * More prime number candidates than necessary where discarded
      as composite due to the limited way D values were searched
    * More meaningful exceptions in case of mismatch in IV length
OBS-URL: https://build.opensuse.org/package/show/devel:languages:python/python-pycryptodome?expand=0&rev=59
											
										 
											2023-11-27 15:57:36 +00:00
										 |  |  |  | - Update to version 3.16.0 | 
					
						
							| 
									
										
										
										
											2022-12-06 16:01:14 +00:00
										 |  |  |  |   * New features | 
					
						
							|  |  |  |  |     Build wheels for musl Linux. Thanks to Ben Raz. | 
					
						
							|  |  |  |  |   * Resolved issues | 
					
						
							|  |  |  |  |     GH#639: ARC4 now also works with 'keys' as short as 8 bits. | 
					
						
							|  |  |  |  |     GH#669: fix segfaults when running in a manylinux2010 i686 image. | 
					
						
							|  |  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2022-06-29 07:16:17 +00:00
										 |  |  |  | ------------------------------------------------------------------- | 
					
						
							|  |  |  |  | Tue Jun 28 20:38:31 UTC 2022 - Torsten Gruner <simmphonie@opensuse.org> | 
					
						
							|  |  |  |  | 
 | 
					
						
							|  |  |  |  | - update to 3.15.0: | 
					
						
							|  |  |  |  |   * Add support for curves Ed25519 and Ed448, including export and import of keys. | 
					
						
							|  |  |  |  |   * Add support for EdDSA signatures. | 
					
						
							|  |  |  |  |   * Add support for Asymmetric Key Packages (RFC5958) to import private keys. | 
					
						
							|  |  |  |  |   * GH#620: for Crypto.Util.number.getPrime , do not sequentially scan numbers searching for a prime. | 
					
						
							|  |  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2022-03-11 09:26:09 +00:00
										 |  |  |  | ------------------------------------------------------------------- | 
					
						
							|  |  |  |  | Wed Mar  9 13:31:35 UTC 2022 - pgajdos@suse.com | 
					
						
							|  |  |  |  | 
 | 
					
						
							|  |  |  |  | - do not use setup.py test construct | 
					
						
							|  |  |  |  |   https://trello.com/c/me9Z4sIv/121-setuppy-test-leftovers | 
					
						
							|  |  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2022-02-15 08:53:31 +00:00
										 |  |  |  | ------------------------------------------------------------------- | 
					
						
							|  |  |  |  | Tue Feb 15 08:52:41 UTC 2022 - Dirk Müller <dmueller@suse.com> | 
					
						
							|  |  |  |  | 
 | 
					
						
							|  |  |  |  | - update to 3.14.1: | 
					
						
							|  |  |  |  |   * GH#595: Fixed memory leak for GMP integers. | 
					
						
							|  |  |  |  |   * Add support for curve NIST P-192. | 
					
						
							|  |  |  |  |   * Add support for curve NIST P-224. | 
					
						
							|  |  |  |  |   * GH#590: Fixed typing info for ``Crypto.PublicKey.ECC``. | 
					
						
							|  |  |  |  |   * Relaxed ECDSA requirements for FIPS 186 signatures and accept any SHA-2 or | 
					
						
							|  |  |  |  |   * SHA-3 hash.  ``sign()`` and ``verify()`` will be performed even if the hash is stronger | 
					
						
							|  |  |  |  |     than the ECC key. | 
					
						
							| 
									
										
											  
											
												- update to 3.19.0:
  * The ``update()`` methods of TupleHash128 and TupleHash256
    objects can now hash multiple items (byte strings) at once.
  * Added support for ECDH, with ``Crypto.Protocol.DH``.
  * GH#754: due to a bug in ``cffi``, do not use it on Windows
    with Python 3.12+.
- Update to version 3.16.0
  * Align stack of functions using SSE2 intrinsics to avoid crashes,
  * fixed memory leak for operations that use memoryviews when cffi
  fix the build on older distros
  * Add support for loading PEM files encrypted with AES192-CBC,
  * When importing ECC keys, ignore EC PARAMS section that was
  * Speed-up ECC performance. ECDSA is 33 times faster on the
  * Support HMAC-SHA224, HMAC-SHA256, HMAC-SHA384, and HMAC-SHA512
  * DER objects were not rejected if their length field had
  * point_at_infinity() becomes an instance method for
  * GH#258: False positive on PSS signatures when externally
    * New parameter output for Crypto.Util.strxor.strxor,
      Crypto.Util.strxor.strxor_c, encrypt and decrypt methods in
      symmetric ciphers (Crypto.Cipher package). output is a
      pre-allocated buffer (a bytearray or a writeable memoryview)
      where the result must be stored. This requires less memory for
      very large payloads; it is also more efficient when encrypting
    * Fix vulnerability on AESNI ECB with payloads smaller than
    * Fixed incorrect AES encryption/decryption with AES
      acceleration on x86 due to gcc’s optimization and strict
    * More prime number candidates than necessary where discarded
      as composite due to the limited way D values were searched
    * More meaningful exceptions in case of mismatch in IV length
OBS-URL: https://build.opensuse.org/package/show/devel:languages:python/python-pycryptodome?expand=0&rev=59
											
										 
											2023-11-27 15:57:36 +00:00
										 |  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2021-12-11 13:50:27 +00:00
										 |  |  |  | ------------------------------------------------------------------- | 
					
						
							|  |  |  |  | Sat Dec 11 13:19:30 UTC 2021 - Dirk Müller <dmueller@suse.com> | 
					
						
							|  |  |  |  | 
 | 
					
						
							|  |  |  |  | - update to 3.12.0: | 
					
						
							|  |  |  |  |   * ECC keys in the SEC1 format can be exported and imported. | 
					
						
							|  |  |  |  |   * Add support for KMAC128, KMAC256, TupleHash128, and TupleHash256 (NIST SP-800 185). | 
					
						
							|  |  |  |  |   * Add support for KangarooTwelve. | 
					
						
							|  |  |  |  |   * GH#563: An asymmetric key could not be imported as a ``memoryview``. | 
					
						
							|  |  |  |  |   * GH#566: cSHAKE128/256 generated a wrong output for customization strings | 
					
						
							|  |  |  |  |   * GH#582: CBC decryption generated the wrong plaintext when the input and the output were the same buffer. | 
					
						
							|  |  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2021-10-16 22:51:19 +00:00
										 |  |  |  | ------------------------------------------------------------------- | 
					
						
							|  |  |  |  | Sat Oct 16 22:36:27 UTC 2021 - Dirk Müller <dmueller@suse.com> | 
					
						
							|  |  |  |  | 
 | 
					
						
							|  |  |  |  | - update to 3.11.0: | 
					
						
							|  |  |  |  |   * GH#512: Especially for very small bit sizes, ``Crypto.Util.number.getPrime()`` was | 
					
						
							|  |  |  |  |     occasionally generating primes larger than given the bit size. | 
					
						
							|  |  |  |  |   * GH#552: Correct typing annotations for ``PKCS115_Cipher.decrypt()``. | 
					
						
							|  |  |  |  |   * GH#555: ``decrypt()`` method of a PKCS#1v1.5 cipher returned a ``bytearray`` instead of ``bytes``. | 
					
						
							|  |  |  |  |   * GH#557: External DSA domain parameters were accepted even when the modulus (``p``) was not prime. | 
					
						
							|  |  |  |  |     This affected ``Crypto.PublicKey.DSA.generate()`` and ``Crypto.PublicKey.DSA.construct()``. | 
					
						
							|  |  |  |  |   * Added cSHAKE128 and cSHAKE256 (of SHA-3 family). | 
					
						
							|  |  |  |  |   * GH#558: The flag RTLD_DEEPBIND passed to ``dlopen()`` is not well supported by | 
					
						
							|  |  |  |  |     `address sanitizers <https://github.com/google/sanitizers/issues/611>`_. | 
					
						
							|  |  |  |  |     It is now possible to set the environment variable ``PYCRYPTDOME_DISABLE_DEEPBIND`` | 
					
						
							|  |  |  |  |     to drop that flag and allow security testing. | 
					
						
							|  |  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2021-03-04 21:02:59 +00:00
										 |  |  |  | ------------------------------------------------------------------- | 
					
						
							|  |  |  |  | Thu Mar  4 21:00:08 UTC 2021 - Dirk Müller <dmueller@suse.com> | 
					
						
							|  |  |  |  | 
 | 
					
						
							|  |  |  |  | - update to 3.10.1: | 
					
						
							|  |  |  |  |   * Fixed a potential memory leak when initializing block ciphers. | 
					
						
							|  |  |  |  |   * GH#466: ``Crypto.Math.miller_rabin_test()`` was still using the system random | 
					
						
							|  |  |  |  |     source and not the one provided as parameter. | 
					
						
							|  |  |  |  |   * GH#469: RSA objects have the method ``public_key()`` like ECC objects. | 
					
						
							|  |  |  |  |     The old method ``publickey()`` is still available for backward compatibility. | 
					
						
							|  |  |  |  |   * GH#476: ``Crypto.Util.Padding.unpad()`` was raising an incorrect exception | 
					
						
							|  |  |  |  |     in case of zero-length inputs. Thanks to Captainowie. | 
					
						
							|  |  |  |  |   * GH#491: better exception message when ``Counter.new()`` is called with an integer | 
					
						
							|  |  |  |  |     ``initial_value`` than doesn't fit into ``nbits`` bits. | 
					
						
							|  |  |  |  |   * GH#496: added missing ``block_size`` member for ECB cipher objects. Thanks to willem. | 
					
						
							|  |  |  |  |   * GH#500: ``nonce`` member of an XChaCha20 cipher object was not matching the original nonce. | 
					
						
							|  |  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2020-12-01 14:07:45 +00:00
										 |  |  |  | ------------------------------------------------------------------- | 
					
						
							|  |  |  |  | Tue Dec  1 09:48:51 UTC 2020 - Hans-Peter Jansen <hpj@urpla.net> | 
					
						
							|  |  |  |  | 
 | 
					
						
							|  |  |  |  | - update to 3.9.9: | 
					
						
							|  |  |  |  |   * GH#435: Fixed Crypto.Util.number.size for negative numbers | 
					
						
							|  |  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2020-08-04 14:44:53 +00:00
										 |  |  |  | ------------------------------------------------------------------- | 
					
						
							|  |  |  |  | Tue Aug  4 14:36:10 UTC 2020 - Dirk Mueller <dmueller@suse.com> | 
					
						
							|  |  |  |  | 
 | 
					
						
							|  |  |  |  | - update to 3.9.8: | 
					
						
							|  |  |  |  |   * GH#426: The Shamir's secret sharing implementation is not actually compatible with ``ssss``. | 
					
						
							|  |  |  |  |   Added an optional parameter to enable interoperability. | 
					
						
							|  |  |  |  |   * GH#427: Skip altogether loading of ``gmp.dll`` on Windows. | 
					
						
							|  |  |  |  |   * GH#420: Fix incorrect CFB decryption when the input and the output are the same buffer. | 
					
						
							|  |  |  |  |   * Speed up Shamir's secret sharing routines. Thanks to ncarve. | 
					
						
							|  |  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2020-03-19 13:22:59 +00:00
										 |  |  |  | ------------------------------------------------------------------- | 
					
						
							|  |  |  |  | Thu Mar 19 13:12:39 UTC 2020 - Marketa Calabkova <mcalabkova@suse.com> | 
					
						
							|  |  |  |  | 
 | 
					
						
							|  |  |  |  | - Update to 3.9.7 | 
					
						
							| 
									
										
											  
											
												- update to 3.19.0:
  * The ``update()`` methods of TupleHash128 and TupleHash256
    objects can now hash multiple items (byte strings) at once.
  * Added support for ECDH, with ``Crypto.Protocol.DH``.
  * GH#754: due to a bug in ``cffi``, do not use it on Windows
    with Python 3.12+.
- Update to version 3.16.0
  * Align stack of functions using SSE2 intrinsics to avoid crashes,
  * fixed memory leak for operations that use memoryviews when cffi
  fix the build on older distros
  * Add support for loading PEM files encrypted with AES192-CBC,
  * When importing ECC keys, ignore EC PARAMS section that was
  * Speed-up ECC performance. ECDSA is 33 times faster on the
  * Support HMAC-SHA224, HMAC-SHA256, HMAC-SHA384, and HMAC-SHA512
  * DER objects were not rejected if their length field had
  * point_at_infinity() becomes an instance method for
  * GH#258: False positive on PSS signatures when externally
    * New parameter output for Crypto.Util.strxor.strxor,
      Crypto.Util.strxor.strxor_c, encrypt and decrypt methods in
      symmetric ciphers (Crypto.Cipher package). output is a
      pre-allocated buffer (a bytearray or a writeable memoryview)
      where the result must be stored. This requires less memory for
      very large payloads; it is also more efficient when encrypting
    * Fix vulnerability on AESNI ECB with payloads smaller than
    * Fixed incorrect AES encryption/decryption with AES
      acceleration on x86 due to gcc’s optimization and strict
    * More prime number candidates than necessary where discarded
      as composite due to the limited way D values were searched
    * More meaningful exceptions in case of mismatch in IV length
OBS-URL: https://build.opensuse.org/package/show/devel:languages:python/python-pycryptodome?expand=0&rev=59
											
										 
											2023-11-27 15:57:36 +00:00
										 |  |  |  |   * Align stack of functions using SSE2 intrinsics to avoid crashes, | 
					
						
							| 
									
										
										
										
											2020-03-19 13:22:59 +00:00
										 |  |  |  |     when compiled with gcc on 32-bit x86 platforms. | 
					
						
							|  |  |  |  |   * Prevent key_to_english from creating invalid data when fed with | 
					
						
							|  |  |  |  |     keys of length not multiple of 8. | 
					
						
							|  |  |  |  |   * Fix blocking RSA signing/decryption when key has very small factor. | 
					
						
							| 
									
										
											  
											
												- update to 3.19.0:
  * The ``update()`` methods of TupleHash128 and TupleHash256
    objects can now hash multiple items (byte strings) at once.
  * Added support for ECDH, with ``Crypto.Protocol.DH``.
  * GH#754: due to a bug in ``cffi``, do not use it on Windows
    with Python 3.12+.
- Update to version 3.16.0
  * Align stack of functions using SSE2 intrinsics to avoid crashes,
  * fixed memory leak for operations that use memoryviews when cffi
  fix the build on older distros
  * Add support for loading PEM files encrypted with AES192-CBC,
  * When importing ECC keys, ignore EC PARAMS section that was
  * Speed-up ECC performance. ECDSA is 33 times faster on the
  * Support HMAC-SHA224, HMAC-SHA256, HMAC-SHA384, and HMAC-SHA512
  * DER objects were not rejected if their length field had
  * point_at_infinity() becomes an instance method for
  * GH#258: False positive on PSS signatures when externally
    * New parameter output for Crypto.Util.strxor.strxor,
      Crypto.Util.strxor.strxor_c, encrypt and decrypt methods in
      symmetric ciphers (Crypto.Cipher package). output is a
      pre-allocated buffer (a bytearray or a writeable memoryview)
      where the result must be stored. This requires less memory for
      very large payloads; it is also more efficient when encrypting
    * Fix vulnerability on AESNI ECB with payloads smaller than
    * Fixed incorrect AES encryption/decryption with AES
      acceleration on x86 due to gcc’s optimization and strict
    * More prime number candidates than necessary where discarded
      as composite due to the limited way D values were searched
    * More meaningful exceptions in case of mismatch in IV length
OBS-URL: https://build.opensuse.org/package/show/devel:languages:python/python-pycryptodome?expand=0&rev=59
											
										 
											2023-11-27 15:57:36 +00:00
										 |  |  |  |   * fixed memory leak for operations that use memoryviews when cffi | 
					
						
							| 
									
										
										
										
											2020-03-19 13:22:59 +00:00
										 |  |  |  |     is not installed. | 
					
						
							|  |  |  |  |   * RSA OAEP decryption was not verifying that all PS bytes are zero. | 
					
						
							|  |  |  |  |   * Fixed wrong ASN.1 OID for HMAC-SHA512 in PBE2. | 
					
						
							|  |  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2019-11-11 12:42:17 +00:00
										 |  |  |  | ------------------------------------------------------------------- | 
					
						
							|  |  |  |  | Sun Nov 10 16:54:21 UTC 2019 - Hans-Peter Jansen <hpj@urpla.net> | 
					
						
							|  |  |  |  | 
 | 
					
						
							|  |  |  |  | - Update to 3.9.2 (10 November 2019): | 
					
						
							|  |  |  |  |   + New features | 
					
						
							|  |  |  |  |     * Add Python 3.8 wheels for Mac. | 
					
						
							|  |  |  |  |   + Resolved issues | 
					
						
							|  |  |  |  |     * GH#308: Avoid allocating arrays of __m128i on the stack, to | 
					
						
							|  |  |  |  |       cope with buggy compilers. | 
					
						
							|  |  |  |  |     * GH#322: Remove blanket -O3 optimization for gcc and clang, to | 
					
						
							|  |  |  |  |       cope with buggy compilers. | 
					
						
							|  |  |  |  |     * GH#337: Fix typing stubs for signatures. | 
					
						
							|  |  |  |  |     * GH#338: Deal with gcc installations that don't have | 
					
						
							|  |  |  |  |       x86intrin.h. | 
					
						
							|  |  |  |  | 
 | 
					
						
							|  |  |  |  | - Update to version 3.9.1 (1 November 2019): | 
					
						
							|  |  |  |  |   + New features | 
					
						
							|  |  |  |  |     * Add Python 3.8 wheels for Linux and Windows. | 
					
						
							|  |  |  |  |   + Resolved issues | 
					
						
							|  |  |  |  |     * GH#328: minor speed-up when importing RSA. | 
					
						
							|  |  |  |  | 
 | 
					
						
							|  |  |  |  | - Add export LC_ALL=en_US.UTF-8 to %build, %install and %check to | 
					
						
							| 
									
										
											  
											
												- update to 3.19.0:
  * The ``update()`` methods of TupleHash128 and TupleHash256
    objects can now hash multiple items (byte strings) at once.
  * Added support for ECDH, with ``Crypto.Protocol.DH``.
  * GH#754: due to a bug in ``cffi``, do not use it on Windows
    with Python 3.12+.
- Update to version 3.16.0
  * Align stack of functions using SSE2 intrinsics to avoid crashes,
  * fixed memory leak for operations that use memoryviews when cffi
  fix the build on older distros
  * Add support for loading PEM files encrypted with AES192-CBC,
  * When importing ECC keys, ignore EC PARAMS section that was
  * Speed-up ECC performance. ECDSA is 33 times faster on the
  * Support HMAC-SHA224, HMAC-SHA256, HMAC-SHA384, and HMAC-SHA512
  * DER objects were not rejected if their length field had
  * point_at_infinity() becomes an instance method for
  * GH#258: False positive on PSS signatures when externally
    * New parameter output for Crypto.Util.strxor.strxor,
      Crypto.Util.strxor.strxor_c, encrypt and decrypt methods in
      symmetric ciphers (Crypto.Cipher package). output is a
      pre-allocated buffer (a bytearray or a writeable memoryview)
      where the result must be stored. This requires less memory for
      very large payloads; it is also more efficient when encrypting
    * Fix vulnerability on AESNI ECB with payloads smaller than
    * Fixed incorrect AES encryption/decryption with AES
      acceleration on x86 due to gcc’s optimization and strict
    * More prime number candidates than necessary where discarded
      as composite due to the limited way D values were searched
    * More meaningful exceptions in case of mismatch in IV length
OBS-URL: https://build.opensuse.org/package/show/devel:languages:python/python-pycryptodome?expand=0&rev=59
											
										 
											2023-11-27 15:57:36 +00:00
										 |  |  |  |   fix the build on older distros | 
					
						
							| 
									
										
										
										
											2019-11-11 12:42:17 +00:00
										 |  |  |  |   (as done from Thomas Bechtold in python-pycryptodomex) | 
					
						
							|  |  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2019-09-10 12:34:39 +00:00
										 |  |  |  | ------------------------------------------------------------------- | 
					
						
							|  |  |  |  | Tue Sep 10 12:29:30 UTC 2019 - Tomáš Chvátal <tchvatal@suse.com> | 
					
						
							|  |  |  |  | 
 | 
					
						
							|  |  |  |  | - Update to 3.9.0: | 
					
						
							|  |  |  |  |   * Add support for loading PEM files encrypted with AES256-CBC. | 
					
						
							|  |  |  |  |   * Add support for XChaCha20 and XChaCha20-Poly1305 ciphers. | 
					
						
							|  |  |  |  |   * Add support for bcrypt key derivation function (Crypto.Protocol.KDF.bcrypt). | 
					
						
							|  |  |  |  |   * Add support for left multiplication of an EC point by a scalar. | 
					
						
							|  |  |  |  |   * Add support for importing ECC and RSA keys in the new OpenSSH format. | 
					
						
							|  |  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2019-05-30 15:38:36 +00:00
										 |  |  |  | ------------------------------------------------------------------- | 
					
						
							|  |  |  |  | Thu May 30 15:03:25 UTC 2019 - Martin Liška <mliska@suse.cz> | 
					
						
							|  |  |  |  | 
 | 
					
						
							|  |  |  |  | - Update Source to point to github. | 
					
						
							|  |  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2019-05-30 12:08:54 +00:00
										 |  |  |  | ------------------------------------------------------------------- | 
					
						
							|  |  |  |  | Thu May 30 11:47:57 UTC 2019 - Martin Liška <mliska@suse.cz> | 
					
						
							|  |  |  |  | 
 | 
					
						
							|  |  |  |  |   - Update to 3.8.2 | 
					
						
							|  |  |  |  |     * GH#291: fix strict aliasing problem, emerged with GCC 9.1. | 
					
						
							|  |  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2019-05-24 11:41:05 +00:00
										 |  |  |  | ------------------------------------------------------------------- | 
					
						
							|  |  |  |  | Fri May 24 11:36:30 UTC 2019 - Martin Liška <mliska@suse.cz> | 
					
						
							|  |  |  |  | 
 | 
					
						
							|  |  |  |  | -  Use -fno-strict-aliasing in order to bypass: | 
					
						
							|  |  |  |  |    https://github.com/Legrandin/pycryptodome/issues/291. | 
					
						
							|  |  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2019-05-14 15:45:18 +00:00
										 |  |  |  | ------------------------------------------------------------------- | 
					
						
							|  |  |  |  | Tue May 14 13:03:34 UTC 2019 - Marketa Calabkova <mcalabkova@suse.com> | 
					
						
							|  |  |  |  | 
 | 
					
						
							|  |  |  |  | - Update to 3.8.1 | 
					
						
							| 
									
										
											  
											
												- update to 3.19.0:
  * The ``update()`` methods of TupleHash128 and TupleHash256
    objects can now hash multiple items (byte strings) at once.
  * Added support for ECDH, with ``Crypto.Protocol.DH``.
  * GH#754: due to a bug in ``cffi``, do not use it on Windows
    with Python 3.12+.
- Update to version 3.16.0
  * Align stack of functions using SSE2 intrinsics to avoid crashes,
  * fixed memory leak for operations that use memoryviews when cffi
  fix the build on older distros
  * Add support for loading PEM files encrypted with AES192-CBC,
  * When importing ECC keys, ignore EC PARAMS section that was
  * Speed-up ECC performance. ECDSA is 33 times faster on the
  * Support HMAC-SHA224, HMAC-SHA256, HMAC-SHA384, and HMAC-SHA512
  * DER objects were not rejected if their length field had
  * point_at_infinity() becomes an instance method for
  * GH#258: False positive on PSS signatures when externally
    * New parameter output for Crypto.Util.strxor.strxor,
      Crypto.Util.strxor.strxor_c, encrypt and decrypt methods in
      symmetric ciphers (Crypto.Cipher package). output is a
      pre-allocated buffer (a bytearray or a writeable memoryview)
      where the result must be stored. This requires less memory for
      very large payloads; it is also more efficient when encrypting
    * Fix vulnerability on AESNI ECB with payloads smaller than
    * Fixed incorrect AES encryption/decryption with AES
      acceleration on x86 due to gcc’s optimization and strict
    * More prime number candidates than necessary where discarded
      as composite due to the limited way D values were searched
    * More meaningful exceptions in case of mismatch in IV length
OBS-URL: https://build.opensuse.org/package/show/devel:languages:python/python-pycryptodome?expand=0&rev=59
											
										 
											2023-11-27 15:57:36 +00:00
										 |  |  |  |   * Add support for loading PEM files encrypted with AES192-CBC, | 
					
						
							| 
									
										
										
										
											2019-05-14 15:45:18 +00:00
										 |  |  |  |     AES256-CBC, and AES256-GCM. | 
					
						
							| 
									
										
											  
											
												- update to 3.19.0:
  * The ``update()`` methods of TupleHash128 and TupleHash256
    objects can now hash multiple items (byte strings) at once.
  * Added support for ECDH, with ``Crypto.Protocol.DH``.
  * GH#754: due to a bug in ``cffi``, do not use it on Windows
    with Python 3.12+.
- Update to version 3.16.0
  * Align stack of functions using SSE2 intrinsics to avoid crashes,
  * fixed memory leak for operations that use memoryviews when cffi
  fix the build on older distros
  * Add support for loading PEM files encrypted with AES192-CBC,
  * When importing ECC keys, ignore EC PARAMS section that was
  * Speed-up ECC performance. ECDSA is 33 times faster on the
  * Support HMAC-SHA224, HMAC-SHA256, HMAC-SHA384, and HMAC-SHA512
  * DER objects were not rejected if their length field had
  * point_at_infinity() becomes an instance method for
  * GH#258: False positive on PSS signatures when externally
    * New parameter output for Crypto.Util.strxor.strxor,
      Crypto.Util.strxor.strxor_c, encrypt and decrypt methods in
      symmetric ciphers (Crypto.Cipher package). output is a
      pre-allocated buffer (a bytearray or a writeable memoryview)
      where the result must be stored. This requires less memory for
      very large payloads; it is also more efficient when encrypting
    * Fix vulnerability on AESNI ECB with payloads smaller than
    * Fixed incorrect AES encryption/decryption with AES
      acceleration on x86 due to gcc’s optimization and strict
    * More prime number candidates than necessary where discarded
      as composite due to the limited way D values were searched
    * More meaningful exceptions in case of mismatch in IV length
OBS-URL: https://build.opensuse.org/package/show/devel:languages:python/python-pycryptodome?expand=0&rev=59
											
										 
											2023-11-27 15:57:36 +00:00
										 |  |  |  |   * When importing ECC keys, ignore EC PARAMS section that was | 
					
						
							| 
									
										
										
										
											2019-05-14 15:45:18 +00:00
										 |  |  |  |     included by some openssl commands. | 
					
						
							|  |  |  |  |   * repr() did not work for ECC.EccKey. | 
					
						
							|  |  |  |  |   * Minimal length for Blowfish cipher is 32 bits, not 40 bits. | 
					
						
							|  |  |  |  |   3.8.0 | 
					
						
							| 
									
										
											  
											
												- update to 3.19.0:
  * The ``update()`` methods of TupleHash128 and TupleHash256
    objects can now hash multiple items (byte strings) at once.
  * Added support for ECDH, with ``Crypto.Protocol.DH``.
  * GH#754: due to a bug in ``cffi``, do not use it on Windows
    with Python 3.12+.
- Update to version 3.16.0
  * Align stack of functions using SSE2 intrinsics to avoid crashes,
  * fixed memory leak for operations that use memoryviews when cffi
  fix the build on older distros
  * Add support for loading PEM files encrypted with AES192-CBC,
  * When importing ECC keys, ignore EC PARAMS section that was
  * Speed-up ECC performance. ECDSA is 33 times faster on the
  * Support HMAC-SHA224, HMAC-SHA256, HMAC-SHA384, and HMAC-SHA512
  * DER objects were not rejected if their length field had
  * point_at_infinity() becomes an instance method for
  * GH#258: False positive on PSS signatures when externally
    * New parameter output for Crypto.Util.strxor.strxor,
      Crypto.Util.strxor.strxor_c, encrypt and decrypt methods in
      symmetric ciphers (Crypto.Cipher package). output is a
      pre-allocated buffer (a bytearray or a writeable memoryview)
      where the result must be stored. This requires less memory for
      very large payloads; it is also more efficient when encrypting
    * Fix vulnerability on AESNI ECB with payloads smaller than
    * Fixed incorrect AES encryption/decryption with AES
      acceleration on x86 due to gcc’s optimization and strict
    * More prime number candidates than necessary where discarded
      as composite due to the limited way D values were searched
    * More meaningful exceptions in case of mismatch in IV length
OBS-URL: https://build.opensuse.org/package/show/devel:languages:python/python-pycryptodome?expand=0&rev=59
											
										 
											2023-11-27 15:57:36 +00:00
										 |  |  |  |   * Speed-up ECC performance. ECDSA is 33 times faster on the | 
					
						
							| 
									
										
										
										
											2019-05-14 15:45:18 +00:00
										 |  |  |  |     NIST P-256 curve. | 
					
						
							|  |  |  |  |   * Added support for NIST P-384 and P-521 curves. | 
					
						
							|  |  |  |  |   * EccKey has new methods size_in_bits() and size_in_bytes(). | 
					
						
							| 
									
										
											  
											
												- update to 3.19.0:
  * The ``update()`` methods of TupleHash128 and TupleHash256
    objects can now hash multiple items (byte strings) at once.
  * Added support for ECDH, with ``Crypto.Protocol.DH``.
  * GH#754: due to a bug in ``cffi``, do not use it on Windows
    with Python 3.12+.
- Update to version 3.16.0
  * Align stack of functions using SSE2 intrinsics to avoid crashes,
  * fixed memory leak for operations that use memoryviews when cffi
  fix the build on older distros
  * Add support for loading PEM files encrypted with AES192-CBC,
  * When importing ECC keys, ignore EC PARAMS section that was
  * Speed-up ECC performance. ECDSA is 33 times faster on the
  * Support HMAC-SHA224, HMAC-SHA256, HMAC-SHA384, and HMAC-SHA512
  * DER objects were not rejected if their length field had
  * point_at_infinity() becomes an instance method for
  * GH#258: False positive on PSS signatures when externally
    * New parameter output for Crypto.Util.strxor.strxor,
      Crypto.Util.strxor.strxor_c, encrypt and decrypt methods in
      symmetric ciphers (Crypto.Cipher package). output is a
      pre-allocated buffer (a bytearray or a writeable memoryview)
      where the result must be stored. This requires less memory for
      very large payloads; it is also more efficient when encrypting
    * Fix vulnerability on AESNI ECB with payloads smaller than
    * Fixed incorrect AES encryption/decryption with AES
      acceleration on x86 due to gcc’s optimization and strict
    * More prime number candidates than necessary where discarded
      as composite due to the limited way D values were searched
    * More meaningful exceptions in case of mismatch in IV length
OBS-URL: https://build.opensuse.org/package/show/devel:languages:python/python-pycryptodome?expand=0&rev=59
											
										 
											2023-11-27 15:57:36 +00:00
										 |  |  |  |   * Support HMAC-SHA224, HMAC-SHA256, HMAC-SHA384, and HMAC-SHA512 | 
					
						
							| 
									
										
										
										
											2019-05-14 15:45:18 +00:00
										 |  |  |  |     in PBE2/PBKDF2. | 
					
						
							| 
									
										
											  
											
												- update to 3.19.0:
  * The ``update()`` methods of TupleHash128 and TupleHash256
    objects can now hash multiple items (byte strings) at once.
  * Added support for ECDH, with ``Crypto.Protocol.DH``.
  * GH#754: due to a bug in ``cffi``, do not use it on Windows
    with Python 3.12+.
- Update to version 3.16.0
  * Align stack of functions using SSE2 intrinsics to avoid crashes,
  * fixed memory leak for operations that use memoryviews when cffi
  fix the build on older distros
  * Add support for loading PEM files encrypted with AES192-CBC,
  * When importing ECC keys, ignore EC PARAMS section that was
  * Speed-up ECC performance. ECDSA is 33 times faster on the
  * Support HMAC-SHA224, HMAC-SHA256, HMAC-SHA384, and HMAC-SHA512
  * DER objects were not rejected if their length field had
  * point_at_infinity() becomes an instance method for
  * GH#258: False positive on PSS signatures when externally
    * New parameter output for Crypto.Util.strxor.strxor,
      Crypto.Util.strxor.strxor_c, encrypt and decrypt methods in
      symmetric ciphers (Crypto.Cipher package). output is a
      pre-allocated buffer (a bytearray or a writeable memoryview)
      where the result must be stored. This requires less memory for
      very large payloads; it is also more efficient when encrypting
    * Fix vulnerability on AESNI ECB with payloads smaller than
    * Fixed incorrect AES encryption/decryption with AES
      acceleration on x86 due to gcc’s optimization and strict
    * More prime number candidates than necessary where discarded
      as composite due to the limited way D values were searched
    * More meaningful exceptions in case of mismatch in IV length
OBS-URL: https://build.opensuse.org/package/show/devel:languages:python/python-pycryptodome?expand=0&rev=59
											
										 
											2023-11-27 15:57:36 +00:00
										 |  |  |  |   * DER objects were not rejected if their length field had | 
					
						
							| 
									
										
										
										
											2019-05-14 15:45:18 +00:00
										 |  |  |  |     a leading zero. | 
					
						
							|  |  |  |  |   * Allow legacy RC2 ciphers to have 40-bit keys. | 
					
						
							| 
									
										
											  
											
												- update to 3.19.0:
  * The ``update()`` methods of TupleHash128 and TupleHash256
    objects can now hash multiple items (byte strings) at once.
  * Added support for ECDH, with ``Crypto.Protocol.DH``.
  * GH#754: due to a bug in ``cffi``, do not use it on Windows
    with Python 3.12+.
- Update to version 3.16.0
  * Align stack of functions using SSE2 intrinsics to avoid crashes,
  * fixed memory leak for operations that use memoryviews when cffi
  fix the build on older distros
  * Add support for loading PEM files encrypted with AES192-CBC,
  * When importing ECC keys, ignore EC PARAMS section that was
  * Speed-up ECC performance. ECDSA is 33 times faster on the
  * Support HMAC-SHA224, HMAC-SHA256, HMAC-SHA384, and HMAC-SHA512
  * DER objects were not rejected if their length field had
  * point_at_infinity() becomes an instance method for
  * GH#258: False positive on PSS signatures when externally
    * New parameter output for Crypto.Util.strxor.strxor,
      Crypto.Util.strxor.strxor_c, encrypt and decrypt methods in
      symmetric ciphers (Crypto.Cipher package). output is a
      pre-allocated buffer (a bytearray or a writeable memoryview)
      where the result must be stored. This requires less memory for
      very large payloads; it is also more efficient when encrypting
    * Fix vulnerability on AESNI ECB with payloads smaller than
    * Fixed incorrect AES encryption/decryption with AES
      acceleration on x86 due to gcc’s optimization and strict
    * More prime number candidates than necessary where discarded
      as composite due to the limited way D values were searched
    * More meaningful exceptions in case of mismatch in IV length
OBS-URL: https://build.opensuse.org/package/show/devel:languages:python/python-pycryptodome?expand=0&rev=59
											
										 
											2023-11-27 15:57:36 +00:00
										 |  |  |  |   * point_at_infinity() becomes an instance method for | 
					
						
							| 
									
										
										
										
											2019-05-14 15:45:18 +00:00
										 |  |  |  |     Crypto.PublicKey.ECC.EccKey, from a static one. | 
					
						
							|  |  |  |  |   3.7.3 | 
					
						
							| 
									
										
											  
											
												- update to 3.19.0:
  * The ``update()`` methods of TupleHash128 and TupleHash256
    objects can now hash multiple items (byte strings) at once.
  * Added support for ECDH, with ``Crypto.Protocol.DH``.
  * GH#754: due to a bug in ``cffi``, do not use it on Windows
    with Python 3.12+.
- Update to version 3.16.0
  * Align stack of functions using SSE2 intrinsics to avoid crashes,
  * fixed memory leak for operations that use memoryviews when cffi
  fix the build on older distros
  * Add support for loading PEM files encrypted with AES192-CBC,
  * When importing ECC keys, ignore EC PARAMS section that was
  * Speed-up ECC performance. ECDSA is 33 times faster on the
  * Support HMAC-SHA224, HMAC-SHA256, HMAC-SHA384, and HMAC-SHA512
  * DER objects were not rejected if their length field had
  * point_at_infinity() becomes an instance method for
  * GH#258: False positive on PSS signatures when externally
    * New parameter output for Crypto.Util.strxor.strxor,
      Crypto.Util.strxor.strxor_c, encrypt and decrypt methods in
      symmetric ciphers (Crypto.Cipher package). output is a
      pre-allocated buffer (a bytearray or a writeable memoryview)
      where the result must be stored. This requires less memory for
      very large payloads; it is also more efficient when encrypting
    * Fix vulnerability on AESNI ECB with payloads smaller than
    * Fixed incorrect AES encryption/decryption with AES
      acceleration on x86 due to gcc’s optimization and strict
    * More prime number candidates than necessary where discarded
      as composite due to the limited way D values were searched
    * More meaningful exceptions in case of mismatch in IV length
OBS-URL: https://build.opensuse.org/package/show/devel:languages:python/python-pycryptodome?expand=0&rev=59
											
										 
											2023-11-27 15:57:36 +00:00
										 |  |  |  |   * GH#258: False positive on PSS signatures when externally | 
					
						
							| 
									
										
										
										
											2019-05-14 15:45:18 +00:00
										 |  |  |  |     provided salt is too long. | 
					
						
							|  |  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2018-10-19 13:02:45 +00:00
										 |  |  |  | ------------------------------------------------------------------- | 
					
						
							| 
									
										
										
										
											2019-01-12 15:42:29 +00:00
										 |  |  |  | Wed Jan  9 21:55:51 UTC 2019 - Jonathan Brownell <jbrownell@suse.com> | 
					
						
							|  |  |  |  | 
 | 
					
						
							|  |  |  |  | - Protect older platforms from encountering "Suggests:" keyword | 
					
						
							|  |  |  |  | 
 | 
					
						
							|  |  |  |  | ------------------------------------------------------------------- | 
					
						
							| 
									
										
										
										
											2019-11-11 12:42:17 +00:00
										 |  |  |  | Sun Jan  6 14:30:43 UTC 2019 - Hans-Peter Jansen <hpj@urpla.net> | 
					
						
							|  |  |  |  | 
 | 
					
						
							|  |  |  |  | - fix tarball: use the one from PyPI... | 
					
						
							|  |  |  |  | 
 | 
					
						
							|  |  |  |  | ------------------------------------------------------------------- | 
					
						
							| 
									
										
										
										
											2018-11-30 14:48:36 +00:00
										 |  |  |  | Thu Nov 29 16:41:53 UTC 2018 - Hans-Peter Jansen <hpj@urpla.net> | 
					
						
							|  |  |  |  | 
 | 
					
						
							|  |  |  |  | - Update to 3.7.2 | 
					
						
							|  |  |  |  |   - Resolved issues | 
					
						
							|  |  |  |  |     * GH#242: Fixed compilation problem on ARM platforms. | 
					
						
							|  |  |  |  | 
 | 
					
						
							|  |  |  |  | - Update to 3.7.1 | 
					
						
							|  |  |  |  |   - New features | 
					
						
							|  |  |  |  |     * Added type stubs to enable static type checking with mypy. | 
					
						
							|  |  |  |  |       Thanks to Michael Nix. | 
					
						
							|  |  |  |  |     * New ``update_after_digest`` flag for CMAC. | 
					
						
							|  |  |  |  | 
 | 
					
						
							|  |  |  |  |   - Resolved issues | 
					
						
							|  |  |  |  |     * GH#232: Fixed problem with gcc 4.x when compiling | 
					
						
							|  |  |  |  |       ``ghash_clmul.c``. | 
					
						
							|  |  |  |  |     * GH#238: Incorrect digest value produced by CMAC after cloning | 
					
						
							|  |  |  |  |       the object. | 
					
						
							|  |  |  |  |     * Method ``update()`` of an EAX cipher object was returning the | 
					
						
							|  |  |  |  |       underlying CMAC object, instead of the EAX object itself. | 
					
						
							|  |  |  |  |     * Method ``update()`` of a CMAC object was not throwing an | 
					
						
							|  |  |  |  |       exception after the digest was computed (with ``digest()`` or | 
					
						
							|  |  |  |  |       ``verify()``). | 
					
						
							|  |  |  |  | 
 | 
					
						
							|  |  |  |  | ------------------------------------------------------------------- | 
					
						
							|  |  |  |  | Thu Nov 29 16:34:47 UTC 2018 - Hans-Peter Jansen <hpj@urpla.net> | 
					
						
							|  |  |  |  | 
 | 
					
						
							|  |  |  |  | - checked in python-pycrytodomex as separate package on request of | 
					
						
							|  |  |  |  |   Dirk Müller | 
					
						
							|  |  |  |  | 
 | 
					
						
							|  |  |  |  | ------------------------------------------------------------------- | 
					
						
							|  |  |  |  | Sun Nov 25 10:54:15 UTC 2018 - Hans-Peter Jansen <hpj@urpla.net> | 
					
						
							|  |  |  |  | 
 | 
					
						
							|  |  |  |  | - fixed source url | 
					
						
							|  |  |  |  | 
 | 
					
						
							|  |  |  |  | ------------------------------------------------------------------- | 
					
						
							|  |  |  |  | Thu Nov  1 10:42:04 UTC 2018 - Hans-Peter Jansen <hpj@urpla.net> | 
					
						
							|  |  |  |  | 
 | 
					
						
							|  |  |  |  | - Update to 3.7.0 | 
					
						
							|  |  |  |  |   - New features | 
					
						
							|  |  |  |  |     * Added support for Poly1305 MAC (with AES and ChaCha20 ciphers | 
					
						
							|  |  |  |  |       for key derivation). | 
					
						
							|  |  |  |  |     * Added support for ChaCha20-Poly1305 AEAD cipher. | 
					
						
							| 
									
										
											  
											
												- update to 3.19.0:
  * The ``update()`` methods of TupleHash128 and TupleHash256
    objects can now hash multiple items (byte strings) at once.
  * Added support for ECDH, with ``Crypto.Protocol.DH``.
  * GH#754: due to a bug in ``cffi``, do not use it on Windows
    with Python 3.12+.
- Update to version 3.16.0
  * Align stack of functions using SSE2 intrinsics to avoid crashes,
  * fixed memory leak for operations that use memoryviews when cffi
  fix the build on older distros
  * Add support for loading PEM files encrypted with AES192-CBC,
  * When importing ECC keys, ignore EC PARAMS section that was
  * Speed-up ECC performance. ECDSA is 33 times faster on the
  * Support HMAC-SHA224, HMAC-SHA256, HMAC-SHA384, and HMAC-SHA512
  * DER objects were not rejected if their length field had
  * point_at_infinity() becomes an instance method for
  * GH#258: False positive on PSS signatures when externally
    * New parameter output for Crypto.Util.strxor.strxor,
      Crypto.Util.strxor.strxor_c, encrypt and decrypt methods in
      symmetric ciphers (Crypto.Cipher package). output is a
      pre-allocated buffer (a bytearray or a writeable memoryview)
      where the result must be stored. This requires less memory for
      very large payloads; it is also more efficient when encrypting
    * Fix vulnerability on AESNI ECB with payloads smaller than
    * Fixed incorrect AES encryption/decryption with AES
      acceleration on x86 due to gcc’s optimization and strict
    * More prime number candidates than necessary where discarded
      as composite due to the limited way D values were searched
    * More meaningful exceptions in case of mismatch in IV length
OBS-URL: https://build.opensuse.org/package/show/devel:languages:python/python-pycryptodome?expand=0&rev=59
											
										 
											2023-11-27 15:57:36 +00:00
										 |  |  |  |     * New parameter output for Crypto.Util.strxor.strxor, | 
					
						
							|  |  |  |  |       Crypto.Util.strxor.strxor_c, encrypt and decrypt methods in | 
					
						
							|  |  |  |  |       symmetric ciphers (Crypto.Cipher package). output is a | 
					
						
							|  |  |  |  |       pre-allocated buffer (a bytearray or a writeable memoryview) | 
					
						
							|  |  |  |  |       where the result must be stored. This requires less memory for | 
					
						
							|  |  |  |  |       very large payloads; it is also more efficient when encrypting | 
					
						
							| 
									
										
										
										
											2018-11-30 14:48:36 +00:00
										 |  |  |  |       (or decrypting) several small payloads. | 
					
						
							|  |  |  |  | 
 | 
					
						
							|  |  |  |  |   - Resolved issues | 
					
						
							|  |  |  |  |     * GH#266: AES-GCM hangs when processing more than 4GB at a time | 
					
						
							|  |  |  |  |       on x86 with PCLMULQDQ instruction. | 
					
						
							|  |  |  |  | 
 | 
					
						
							|  |  |  |  |   - Breaks in compatibility | 
					
						
							|  |  |  |  |     * Drop support for Python 3.3. | 
					
						
							|  |  |  |  |     * Remove Crypto.Util.py3compat.unhexlify and | 
					
						
							|  |  |  |  |       Crypto.Util.py3compat.hexlify. | 
					
						
							|  |  |  |  |     * With the old Python 2.6, use only ctypes (and not cffi) to | 
					
						
							|  |  |  |  |       interface to native code. | 
					
						
							|  |  |  |  | 
 | 
					
						
							|  |  |  |  | - Clean up spec | 
					
						
							|  |  |  |  | - pycryptodomex package spec added | 
					
						
							|  |  |  |  | ------------------------------------------------------------------- | 
					
						
							| 
									
										
										
										
											2018-10-19 13:02:45 +00:00
										 |  |  |  | Fri Oct 19 13:02:22 UTC 2018 - Dirk Mueller <dmueller@suse.com> | 
					
						
							|  |  |  |  | 
 | 
					
						
							|  |  |  |  | - remove pycryptodomex copy in this package container | 
					
						
							|  |  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2018-09-05 21:01:53 +00:00
										 |  |  |  | ------------------------------------------------------------------- | 
					
						
							|  |  |  |  | Mon Sep  3 14:21:25 UTC 2018 - Marketa Calabkova <mcalabkova@suse.com> | 
					
						
							|  |  |  |  | 
 | 
					
						
							|  |  |  |  | - Update to 3.6.6 | 
					
						
							|  |  |  |  |   - Resolved issues: | 
					
						
							| 
									
										
											  
											
												- update to 3.19.0:
  * The ``update()`` methods of TupleHash128 and TupleHash256
    objects can now hash multiple items (byte strings) at once.
  * Added support for ECDH, with ``Crypto.Protocol.DH``.
  * GH#754: due to a bug in ``cffi``, do not use it on Windows
    with Python 3.12+.
- Update to version 3.16.0
  * Align stack of functions using SSE2 intrinsics to avoid crashes,
  * fixed memory leak for operations that use memoryviews when cffi
  fix the build on older distros
  * Add support for loading PEM files encrypted with AES192-CBC,
  * When importing ECC keys, ignore EC PARAMS section that was
  * Speed-up ECC performance. ECDSA is 33 times faster on the
  * Support HMAC-SHA224, HMAC-SHA256, HMAC-SHA384, and HMAC-SHA512
  * DER objects were not rejected if their length field had
  * point_at_infinity() becomes an instance method for
  * GH#258: False positive on PSS signatures when externally
    * New parameter output for Crypto.Util.strxor.strxor,
      Crypto.Util.strxor.strxor_c, encrypt and decrypt methods in
      symmetric ciphers (Crypto.Cipher package). output is a
      pre-allocated buffer (a bytearray or a writeable memoryview)
      where the result must be stored. This requires less memory for
      very large payloads; it is also more efficient when encrypting
    * Fix vulnerability on AESNI ECB with payloads smaller than
    * Fixed incorrect AES encryption/decryption with AES
      acceleration on x86 due to gcc’s optimization and strict
    * More prime number candidates than necessary where discarded
      as composite due to the limited way D values were searched
    * More meaningful exceptions in case of mismatch in IV length
OBS-URL: https://build.opensuse.org/package/show/devel:languages:python/python-pycryptodome?expand=0&rev=59
											
										 
											2023-11-27 15:57:36 +00:00
										 |  |  |  |     * Fix vulnerability on AESNI ECB with payloads smaller than | 
					
						
							| 
									
										
										
										
											2018-09-05 21:01:53 +00:00
										 |  |  |  |       16 bytes. | 
					
						
							|  |  |  |  | 
 | 
					
						
							|  |  |  |  | - Update to 3.5.5 | 
					
						
							|  |  |  |  |   - Resolved issues | 
					
						
							|  |  |  |  | 
 | 
					
						
							| 
									
										
											  
											
												- update to 3.19.0:
  * The ``update()`` methods of TupleHash128 and TupleHash256
    objects can now hash multiple items (byte strings) at once.
  * Added support for ECDH, with ``Crypto.Protocol.DH``.
  * GH#754: due to a bug in ``cffi``, do not use it on Windows
    with Python 3.12+.
- Update to version 3.16.0
  * Align stack of functions using SSE2 intrinsics to avoid crashes,
  * fixed memory leak for operations that use memoryviews when cffi
  fix the build on older distros
  * Add support for loading PEM files encrypted with AES192-CBC,
  * When importing ECC keys, ignore EC PARAMS section that was
  * Speed-up ECC performance. ECDSA is 33 times faster on the
  * Support HMAC-SHA224, HMAC-SHA256, HMAC-SHA384, and HMAC-SHA512
  * DER objects were not rejected if their length field had
  * point_at_infinity() becomes an instance method for
  * GH#258: False positive on PSS signatures when externally
    * New parameter output for Crypto.Util.strxor.strxor,
      Crypto.Util.strxor.strxor_c, encrypt and decrypt methods in
      symmetric ciphers (Crypto.Cipher package). output is a
      pre-allocated buffer (a bytearray or a writeable memoryview)
      where the result must be stored. This requires less memory for
      very large payloads; it is also more efficient when encrypting
    * Fix vulnerability on AESNI ECB with payloads smaller than
    * Fixed incorrect AES encryption/decryption with AES
      acceleration on x86 due to gcc’s optimization and strict
    * More prime number candidates than necessary where discarded
      as composite due to the limited way D values were searched
    * More meaningful exceptions in case of mismatch in IV length
OBS-URL: https://build.opensuse.org/package/show/devel:languages:python/python-pycryptodome?expand=0&rev=59
											
										 
											2023-11-27 15:57:36 +00:00
										 |  |  |  |     * Fixed incorrect AES encryption/decryption with AES | 
					
						
							|  |  |  |  |       acceleration on x86 due to gcc’s optimization and strict | 
					
						
							| 
									
										
										
										
											2018-09-05 21:01:53 +00:00
										 |  |  |  |       aliasing rules. | 
					
						
							| 
									
										
											  
											
												- update to 3.19.0:
  * The ``update()`` methods of TupleHash128 and TupleHash256
    objects can now hash multiple items (byte strings) at once.
  * Added support for ECDH, with ``Crypto.Protocol.DH``.
  * GH#754: due to a bug in ``cffi``, do not use it on Windows
    with Python 3.12+.
- Update to version 3.16.0
  * Align stack of functions using SSE2 intrinsics to avoid crashes,
  * fixed memory leak for operations that use memoryviews when cffi
  fix the build on older distros
  * Add support for loading PEM files encrypted with AES192-CBC,
  * When importing ECC keys, ignore EC PARAMS section that was
  * Speed-up ECC performance. ECDSA is 33 times faster on the
  * Support HMAC-SHA224, HMAC-SHA256, HMAC-SHA384, and HMAC-SHA512
  * DER objects were not rejected if their length field had
  * point_at_infinity() becomes an instance method for
  * GH#258: False positive on PSS signatures when externally
    * New parameter output for Crypto.Util.strxor.strxor,
      Crypto.Util.strxor.strxor_c, encrypt and decrypt methods in
      symmetric ciphers (Crypto.Cipher package). output is a
      pre-allocated buffer (a bytearray or a writeable memoryview)
      where the result must be stored. This requires less memory for
      very large payloads; it is also more efficient when encrypting
    * Fix vulnerability on AESNI ECB with payloads smaller than
    * Fixed incorrect AES encryption/decryption with AES
      acceleration on x86 due to gcc’s optimization and strict
    * More prime number candidates than necessary where discarded
      as composite due to the limited way D values were searched
    * More meaningful exceptions in case of mismatch in IV length
OBS-URL: https://build.opensuse.org/package/show/devel:languages:python/python-pycryptodome?expand=0&rev=59
											
										 
											2023-11-27 15:57:36 +00:00
										 |  |  |  |     * More prime number candidates than necessary where discarded | 
					
						
							|  |  |  |  |       as composite due to the limited way D values were searched | 
					
						
							| 
									
										
										
										
											2018-09-05 21:01:53 +00:00
										 |  |  |  |       in the Lucas test. | 
					
						
							|  |  |  |  |     * Fixed ResouceWarnings and DeprecationWarnings. | 
					
						
							|  |  |  |  | 
 | 
					
						
							|  |  |  |  | - Update to 3.5.4 | 
					
						
							|  |  |  |  |   - New features: | 
					
						
							|  |  |  |  |     * Build Python 3.7 wheels on Linux, Windows and Mac. | 
					
						
							|  |  |  |  |   - Resolved issues: | 
					
						
							| 
									
										
											  
											
												- update to 3.19.0:
  * The ``update()`` methods of TupleHash128 and TupleHash256
    objects can now hash multiple items (byte strings) at once.
  * Added support for ECDH, with ``Crypto.Protocol.DH``.
  * GH#754: due to a bug in ``cffi``, do not use it on Windows
    with Python 3.12+.
- Update to version 3.16.0
  * Align stack of functions using SSE2 intrinsics to avoid crashes,
  * fixed memory leak for operations that use memoryviews when cffi
  fix the build on older distros
  * Add support for loading PEM files encrypted with AES192-CBC,
  * When importing ECC keys, ignore EC PARAMS section that was
  * Speed-up ECC performance. ECDSA is 33 times faster on the
  * Support HMAC-SHA224, HMAC-SHA256, HMAC-SHA384, and HMAC-SHA512
  * DER objects were not rejected if their length field had
  * point_at_infinity() becomes an instance method for
  * GH#258: False positive on PSS signatures when externally
    * New parameter output for Crypto.Util.strxor.strxor,
      Crypto.Util.strxor.strxor_c, encrypt and decrypt methods in
      symmetric ciphers (Crypto.Cipher package). output is a
      pre-allocated buffer (a bytearray or a writeable memoryview)
      where the result must be stored. This requires less memory for
      very large payloads; it is also more efficient when encrypting
    * Fix vulnerability on AESNI ECB with payloads smaller than
    * Fixed incorrect AES encryption/decryption with AES
      acceleration on x86 due to gcc’s optimization and strict
    * More prime number candidates than necessary where discarded
      as composite due to the limited way D values were searched
    * More meaningful exceptions in case of mismatch in IV length
OBS-URL: https://build.opensuse.org/package/show/devel:languages:python/python-pycryptodome?expand=0&rev=59
											
										 
											2023-11-27 15:57:36 +00:00
										 |  |  |  |     * More meaningful exceptions in case of mismatch in IV length | 
					
						
							| 
									
										
										
										
											2018-09-05 21:01:53 +00:00
										 |  |  |  |       (CBC/OFB/CFB modes). | 
					
						
							|  |  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2018-07-03 13:27:33 +00:00
										 |  |  |  | ------------------------------------------------------------------- | 
					
						
							|  |  |  |  | Tue Jul  3 10:17:10 UTC 2018 - hpj@urpla.net | 
					
						
							|  |  |  |  | 
 | 
					
						
							|  |  |  |  | - Update to 3.6.3 (21 June 2018) | 
					
						
							|  |  |  |  |   - Resolved issues | 
					
						
							|  |  |  |  |     * GH#175: Fixed incorrect results for CTR encryption/decryption | 
					
						
							|  |  |  |  |       with more than 8 blocks. | 
					
						
							|  |  |  |  | 
 | 
					
						
							|  |  |  |  | - Update to 3.6.2 (19 June 2018) | 
					
						
							|  |  |  |  |   - New features | 
					
						
							|  |  |  |  |     * ChaCha20 accepts 96 bit nonces (in addition to 64 bit nonces) | 
					
						
							|  |  |  |  |       as defined in RFC7539. | 
					
						
							|  |  |  |  |     * Accelerate AES-GCM on x86 using PCLMULQDQ instruction. | 
					
						
							|  |  |  |  |     * Accelerate AES-ECB and AES-CTR on x86 by pipelining AESNI | 
					
						
							|  |  |  |  |       instructions. | 
					
						
							|  |  |  |  |     * As result of the two improvements above, on x86 (Broadwell): | 
					
						
							|  |  |  |  |       - AES-ECB and AES-CTR are 3x faster | 
					
						
							|  |  |  |  |       - AES-GCM is 9x faster | 
					
						
							|  |  |  |  | 
 | 
					
						
							|  |  |  |  |   - Resolved issues | 
					
						
							|  |  |  |  |     * On Windows, MPIR library was stilled pulled in if renamed to | 
					
						
							|  |  |  |  |       ``gmp.dll``. | 
					
						
							|  |  |  |  | 
 | 
					
						
							|  |  |  |  |   - Breaks in compatibility | 
					
						
							|  |  |  |  |     * In ``Crypto.Util.number``, functions ``floor_div`` and | 
					
						
							|  |  |  |  |       ``exact_div`` have been removed. Also, ``ceil_div`` is limited | 
					
						
							|  |  |  |  |       to non-negative terms only. | 
					
						
							|  |  |  |  | 
 | 
					
						
							|  |  |  |  | - suggesting libgmp10 and python-cffi | 
					
						
							|  |  |  |  | - add license file tag | 
					
						
							|  |  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2018-05-16 12:26:47 +00:00
										 |  |  |  | ------------------------------------------------------------------- | 
					
						
							|  |  |  |  | Wed May 16 12:26:23 UTC 2018 - tchvatal@suse.com | 
					
						
							|  |  |  |  | 
 | 
					
						
							|  |  |  |  | - Provide/obsolete also python-crypto for py2 package | 
					
						
							|  |  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2018-05-08 06:25:27 +00:00
										 |  |  |  | ------------------------------------------------------------------- | 
					
						
							|  |  |  |  | Mon May  7 20:17:35 UTC 2018 - hpj@urpla.net | 
					
						
							|  |  |  |  | 
 | 
					
						
							|  |  |  |  | - fix condition to act as drop in replacement for python-pycrypto | 
					
						
							|  |  |  |  | 
 | 
					
						
							|  |  |  |  | ------------------------------------------------------------------- | 
					
						
							|  |  |  |  | Fri May  4 18:29:29 UTC 2018 - hpj@urpla.net | 
					
						
							|  |  |  |  | 
 | 
					
						
							|  |  |  |  | - Update to 3.6.1 (15 April 2018) | 
					
						
							|  |  |  |  |   - New features | 
					
						
							|  |  |  |  |     * Added Google Wycheproof tests (https://github.com/google/wycheproof) | 
					
						
							|  |  |  |  |       for RSA, DSA, ECDSA, GCM, SIV, EAX, CMAC. | 
					
						
							|  |  |  |  |     * New parameter ``mac_len`` (length of MAC tag) for CMAC. | 
					
						
							|  |  |  |  |   - Resolved issues | 
					
						
							|  |  |  |  |     * In certain circumstances (at counter wrapping, which happens on average after | 
					
						
							|  |  |  |  |       32 GBi) AES GCM produced wrong ciphertexts. | 
					
						
							|  |  |  |  |     * Method ``encrypt()`` of AES SIV cipher could be still called, | 
					
						
							|  |  |  |  |       whereas only ``encrypt_and_digest()`` should be allowed. | 
					
						
							|  |  |  |  | 
 | 
					
						
							|  |  |  |  | - Update to 3.6.0 (8 April 2018) | 
					
						
							|  |  |  |  |   - New features | 
					
						
							|  |  |  |  |     * Introduced ``export_key`` and deprecated ``exportKey`` for DSA and RSA key | 
					
						
							|  |  |  |  |       objects. | 
					
						
							|  |  |  |  |     * Ciphers and hash functions accept ``memoryview`` objects in input. | 
					
						
							|  |  |  |  |     * Added support for SHA-512/224 and SHA-512/256. | 
					
						
							|  |  |  |  |   - Resolved issues | 
					
						
							|  |  |  |  |     * Reintroduced `Crypto.__version__` variable as in PyCrypto. | 
					
						
							|  |  |  |  |     * Fixed compilation problem with MinGW. | 
					
						
							|  |  |  |  | 
 | 
					
						
							|  |  |  |  | - Update to 3.5.1 (8 March 2018) | 
					
						
							|  |  |  |  |   - Resolved issues | 
					
						
							|  |  |  |  |     * GH#142. Fix mismatch with declaration and definition of addmul128. | 
					
						
							|  |  |  |  | 
 | 
					
						
							|  |  |  |  | - Update to 3.5.0 (7 March 2018) | 
					
						
							|  |  |  |  |   - New features | 
					
						
							|  |  |  |  |     * Import and export of ECC curves in compressed form. | 
					
						
							|  |  |  |  |     * The initial counter for a cipher in CTR mode can be a byte string | 
					
						
							|  |  |  |  |       (in addition to an integer). | 
					
						
							|  |  |  |  |     * Faster PBKDF2 for HMAC-based PRFs (at least 20x for short passwords, | 
					
						
							|  |  |  |  |       more for longer passwords). Thanks to Christian Heimes for pointing | 
					
						
							|  |  |  |  |       out the implementation was under-optimized. | 
					
						
							|  |  |  |  |     * The salt for PBKDF2 can be either a string or bytes (GH#67). | 
					
						
							|  |  |  |  |     * Ciphers and hash functions accept data as `bytearray`, not just | 
					
						
							|  |  |  |  |       binary strings. | 
					
						
							|  |  |  |  |     * The old SHA-1 and MD5 hash functions are available even when Python's | 
					
						
							|  |  |  |  |       own `hashlib` does not include them. | 
					
						
							|  |  |  |  |   - Resolved issues | 
					
						
							|  |  |  |  |     * Without libgmp, modular exponentiation (since v3.4.8) crashed | 
					
						
							|  |  |  |  |       on 32-bit big-endian systems. | 
					
						
							|  |  |  |  |   - Breaks in compatibility | 
					
						
							|  |  |  |  |     * Removed support for Python < 2.6. | 
					
						
							|  |  |  |  | 
 | 
					
						
							|  |  |  |  | - Update to 3.4.12 (5 February 2018) | 
					
						
							|  |  |  |  |   - Resolved issues | 
					
						
							|  |  |  |  |     * GH#129. pycryptodomex could only be installed via wheels. | 
					
						
							|  |  |  |  | 
 | 
					
						
							|  |  |  |  | - Update to 3.4.11 (5 February 2018) | 
					
						
							|  |  |  |  |   - Resolved issues | 
					
						
							|  |  |  |  |     * GH#121. the record list was still not correct due to PEP3147 | 
					
						
							|  |  |  |  |       and __pycache__ directories. Thanks again to John O'Brien. | 
					
						
							|  |  |  |  | 
 | 
					
						
							|  |  |  |  | - Update to 3.4.10 (2 February 2018) | 
					
						
							|  |  |  |  |   - Resolved issues | 
					
						
							|  |  |  |  |     * When creating ElGamal keys, the generator wasn't a square residue: | 
					
						
							|  |  |  |  |       ElGamal encryption done with those keys cannot be secure under | 
					
						
							|  |  |  |  |       the DDH assumption. Thanks to Weikeng Chen. | 
					
						
							|  |  |  |  | 
 | 
					
						
							|  |  |  |  | - Update to 3.4.9 (1 February 2018) | 
					
						
							|  |  |  |  |   - New features | 
					
						
							|  |  |  |  |     * More meaningful error messages while importing an ECC key. | 
					
						
							|  |  |  |  |   - Resolved issues | 
					
						
							|  |  |  |  |     * GH#123 and #125. The SSE2 command line switch was not always passed on | 
					
						
							|  |  |  |  |       32-bit x86 platforms. | 
					
						
							|  |  |  |  |     * GH#121. The record list (--record) was not always correctly filled for | 
					
						
							|  |  |  |  |       the pycryptodomex package. Thanks to John W. O'Brien. | 
					
						
							|  |  |  |  | 
 | 
					
						
							|  |  |  |  | - Update to 3.4.8 (27 January 2018) | 
					
						
							|  |  |  |  |   - New features | 
					
						
							|  |  |  |  |     * Added a native extension in pure C for modular exponentiation, optimized | 
					
						
							|  |  |  |  |       for SSE2 on x86. | 
					
						
							|  |  |  |  |       In the process, we drop support for the arbitrary arithmetic library MPIR | 
					
						
							|  |  |  |  |       on Windows, which is painful to compile and deploy. | 
					
						
							|  |  |  |  |       The custom  modular exponentiation is 130% (160%) slower on an Intel CPU | 
					
						
							|  |  |  |  |       in 32-bit (64-bit) mode, compared to MPIR. Still, that is much faster | 
					
						
							|  |  |  |  |       that CPython's own `pow()` function which is 900% (855%) slower than MPIR. | 
					
						
							|  |  |  |  |       Support for the GMP library on Unix remains. | 
					
						
							|  |  |  |  |     * Added support for *manylinux* wheels. | 
					
						
							|  |  |  |  |     * Support for Python 3.7. | 
					
						
							|  |  |  |  |   - Resolved issues | 
					
						
							|  |  |  |  |     * The DSA parameter 'p' prime was created with 255 bits cleared | 
					
						
							|  |  |  |  |       (but still with the correct strength). | 
					
						
							|  |  |  |  |     * GH#106. Not all docs were included in the tar ball. | 
					
						
							|  |  |  |  |       Thanks to Christopher Hoskin. | 
					
						
							|  |  |  |  |     * GH#109. ECDSA verification failed for DER encoded signatures. | 
					
						
							|  |  |  |  |       Thanks to Alastair Houghton. | 
					
						
							|  |  |  |  |     * Human-friendly messages for padding errors with ECB and CBC. | 
					
						
							|  |  |  |  | 
 | 
					
						
							|  |  |  |  | ------------------------------------------------------------------- | 
					
						
							|  |  |  |  | Mon Sep 18 15:29:37 UTC 2017 - hpj@urpla.net | 
					
						
							|  |  |  |  | 
 | 
					
						
							|  |  |  |  | - provide python-crypto 2.6.1 | 
					
						
							|  |  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2017-09-06 15:58:32 +00:00
										 |  |  |  | ------------------------------------------------------------------- | 
					
						
							|  |  |  |  | Wed Sep  6 15:22:27 UTC 2017 - toddrme2178@gmail.com | 
					
						
							|  |  |  |  | 
 | 
					
						
							|  |  |  |  | - Initial version |