forked from pool/python-pycryptodomex
- update to 3.18.0:
* Added support for DER BOOLEAN encodings. * The library now compiles on Windows ARM64. Thanks to Niyas Sait. * Resolved issues * GH#722: ``nonce`` attribute was not correctly set for XChaCha20_Poly1305 ciphers. Thanks to Liam Haber. * GH#728: Workaround for a possible x86 emulator bug in Windows for ARM64. * GH#739: OID encoding for arc 2 didn't accept children larger than 39. Thanks to James. * Correctly check that the scalar matches the point when importing an ECC private key. - update to 3.17.0: * Added support for the Counter Mode KDF defined in SP 800-108 Rev 1. * Reduce the minimum tag length for the EAX cipher to 2 bytes. * An RSA object has 4 new properties for the CRT coefficients: ``dp``, ``dq``, ``invq`` and ``invq`` (``invp`` is the same value as the existing ``u``). * GH#526: improved typing for ``RSA.construct``. * GH#534: reduced memory consumption when using a large number of cipher objects. * GH#598: fixed missing error handling for ``Util.number.inverse``. * GH#629: improved typing for ``AES.new`` and the various mode-specific types it returns. Thanks to Greg Werbin. * GH#653: added workaround for an alleged GCC compiler bug that affected Ed25519 code compiled for AVX2. OBS-URL: https://build.opensuse.org/package/show/devel:languages:python/python-pycryptodomex?expand=0&rev=33
This commit is contained in:
@@ -1,3 +1,53 @@
|
||||
-------------------------------------------------------------------
|
||||
Thu Jun 1 10:13:08 UTC 2023 - Dirk Müller <dmueller@suse.com>
|
||||
|
||||
- update to 3.18.0:
|
||||
* Added support for DER BOOLEAN encodings.
|
||||
* The library now compiles on Windows ARM64. Thanks to Niyas
|
||||
Sait.
|
||||
* Resolved issues
|
||||
* GH#722: ``nonce`` attribute was not correctly set for
|
||||
XChaCha20_Poly1305 ciphers. Thanks to Liam Haber.
|
||||
* GH#728: Workaround for a possible x86 emulator bug in Windows
|
||||
for ARM64.
|
||||
* GH#739: OID encoding for arc 2 didn't accept children larger
|
||||
than 39. Thanks to James.
|
||||
* Correctly check that the scalar matches the point when
|
||||
importing an ECC private key.
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Mon Mar 27 09:18:25 UTC 2023 - Dirk Müller <dmueller@suse.com>
|
||||
|
||||
- update to 3.17.0:
|
||||
* Added support for the Counter Mode KDF defined in SP 800-108
|
||||
Rev 1.
|
||||
* Reduce the minimum tag length for the EAX cipher to 2 bytes.
|
||||
* An RSA object has 4 new properties for the CRT coefficients:
|
||||
``dp``, ``dq``, ``invq`` and ``invq`` (``invp`` is the same
|
||||
value as the existing ``u``).
|
||||
* GH#526: improved typing for ``RSA.construct``.
|
||||
* GH#534: reduced memory consumption when using a large number
|
||||
of cipher objects.
|
||||
* GH#598: fixed missing error handling for
|
||||
``Util.number.inverse``.
|
||||
* GH#629: improved typing for ``AES.new`` and the various
|
||||
mode-specific types it returns. Thanks to Greg Werbin.
|
||||
* GH#653: added workaround for an alleged GCC compiler bug
|
||||
that affected Ed25519 code compiled for AVX2.
|
||||
* GH#658: attribute ``curve`` of an ECC key was not always
|
||||
the preferred curve name, as it used to be in v3.15.0
|
||||
(independently of the curve name specified when generating
|
||||
the key).
|
||||
* GH#637: fixed typing for legacy modules ``PKCS1_v1_5`` and
|
||||
``PKCS1_PSS``, as their ``verify()`` returned a boolean.
|
||||
* GH#664: with OCB mode, nonces of maximum length (15 bytes)
|
||||
were actually used as 14 bytes nonces.
|
||||
After this fix, data that was encrypted in past using the
|
||||
(default) nonce length of 15 bytes can still be decrypted
|
||||
by reducing the nonce to its first 14 bytes.
|
||||
* GH#705: improved typing for ``nonce``, ``iv``, and ``IV``
|
||||
parameters of cipher objects.
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Tue Dec 6 13:19:32 UTC 2022 - Yogalakshmi Arunachalam <yarunachalam@suse.com>
|
||||
|
||||
|
Reference in New Issue
Block a user