Version: 3.22.0-bp160.1.2
* Thu Apr 10 2025 Dirk Müller <dmueller@suse.com>
- update to 3.22.0:
* Added support for HPKE (RFC 9180).
* GH#812: CCM ciphers will now fail before encrypting (or decrypting)
data beyond the limit imposed by the nonce length.
* GH#846: fix infinite loop with RC4 for data larger than 4GB.
* GH#852: handle correctly invalid PEM files with less than 3
lines.
* Fri Oct 18 2024 Dirk Müller <dmueller@suse.com>
- update to 3.21.0:
* By setting the PYCRYPTODOME_DISABLE_GMP environment variable,
the GMP library will not be used even if detected.
* Add support for Curve25519 / X25519.
* Add support for Curve448 / X448.
* Add attribute curve to EccPoint and EccXPoint classes, with
the canonical name of the curve.
* GH#781: the label for the SP800_108_Counter KDF may now
contain zero bytes. Thanks to Julien Rische.
* GH#814: RSA keys for PSS can be imported.
* GH#810: fixed negation of Ed25519 points.
* GH#819: accept an RFC5916 ECPrivateKey even if it doesn't
contain any of the optional elements (parameters [0] and
publicKey[1]).
* Remove support for Python 3.5.
* Fri Jan 26 2024 Dirk Müller <dmueller@suse.com>
- update to 3.20.0:
* Added support for TurboSHAKE128 and TurboSHAKE256.
* Added method Crypto.Hash.new() to generate a hash object
given a hash name.
* Added support for AES-GCM encryption of PBES2 and PKCS#8
containers.
* Added support for SHA-2 and SHA-3 algorithms in PBKDF2 when
creating PBES2 and PKCS#8 containers.
* Export of RSA keys accepts the prot_params dictionary as
parameter to control the number of iterations for PBKDF2 and
scrypt.
* C unit tests also run on non-x86 architectures.
* GH#787: Fixed autodetect logic for GCC 14 in combination with
LTO.
* Sat Dec 30 2023 Dirk Müller <dmueller@suse.com>
- update to 3.19.1 (bsc#1218564, CVE-2023-52323)
* Fixed a side-channel leakage with OAEP decryption that could be
exploited to carry out a Manger attack. Thanks to Hubert
Kario.
* Mon Nov 27 2023 Dirk Müller <dmueller@suse.com>
- update to 3.19.0:
* The ``update()`` methods of TupleHash128 and TupleHash256
objects can now hash multiple items (byte strings) at once.
* Added support for ECDH, with ``Crypto.Protocol.DH``.
* GH#754: due to a bug in ``cffi``, do not use it on Windows
with Python 3.12+.
* Tue Jun 27 2023 ecsos <ecsos@opensuse.org>
- Add %{?sle15_python_module_pythons}
* Thu Jun 01 2023 Dirk Müller <dmueller@suse.com>
- update to 3.18.0:
* Added support for DER BOOLEAN encodings.
* The library now compiles on Windows ARM64. Thanks to Niyas
Sait.
* Resolved issues
* GH#722: ``nonce`` attribute was not correctly set for
XChaCha20_Poly1305 ciphers. Thanks to Liam Haber.
* GH#728: Workaround for a possible x86 emulator bug in Windows
for ARM64.
* GH#739: OID encoding for arc 2 didn't accept children larger
than 39. Thanks to James.
* Correctly check that the scalar matches the point when
importing an ECC private key.
* Mon Mar 27 2023 Dirk Müller <dmueller@suse.com>
- update to 3.17.0:
* Added support for the Counter Mode KDF defined in SP 800-108
Rev 1.
* Reduce the minimum tag length for the EAX cipher to 2 bytes.
* An RSA object has 4 new properties for the CRT coefficients:
``dp``, ``dq``, ``invq`` and ``invq`` (``invp`` is the same
value as the existing ``u``).
* GH#526: improved typing for ``RSA.construct``.
* GH#534: reduced memory consumption when using a large number
of cipher objects.
* GH#598: fixed missing error handling for
``Util.number.inverse``.
* GH#629: improved typing for ``AES.new`` and the various
mode-specific types it returns. Thanks to Greg Werbin.
* GH#653: added workaround for an alleged GCC compiler bug
that affected Ed25519 code compiled for AVX2.
* GH#658: attribute ``curve`` of an ECC key was not always
the preferred curve name, as it used to be in v3.15.0
(independently of the curve name specified when generating
the key).
* GH#637: fixed typing for legacy modules ``PKCS1_v1_5`` and
``PKCS1_PSS``, as their ``verify()`` returned a boolean.
* GH#664: with OCB mode, nonces of maximum length (15 bytes)
were actually used as 14 bytes nonces.
After this fix, data that was encrypted in past using the
(default) nonce length of 15 bytes can still be decrypted
by reducing the nonce to its first 14 bytes.
* GH#705: improved typing for ``nonce``, ``iv``, and ``IV``
parameters of cipher objects.
* Tue Dec 06 2022 Yogalakshmi Arunachalam <yarunachalam@suse.com>
- Update to 3.16.0
New features
* Build wheels for musl Linux. Thanks to Ben Raz.
Resolved issues
* GH#639: ARC4 now also works with ‘keys’ as short as 8 bits.
* GH#669: fix segfaults when running in a manylinux2010 i686 image.
* Tue Jun 28 2022 Torsten Gruner <simmphonie@opensuse.org>
- update to 3.15.0:
* Add support for curves Ed25519 and Ed448, including export and import of keys.
* Add support for EdDSA signatures.
* Add support for Asymmetric Key Packages (RFC5958) to import private keys.
* GH#620: for Crypto.Util.number.getPrime , do not sequentially scan numbers searching for a prime.
Version: 3.4.6-bp150.2.4
* Mon Jul 10 2017 okurz@suse.com
- Update to version 3.4.6
* Resolved issues:
* GH#65. Keccak, SHA3, SHAKE and the seek functionality for ChaCha20 were
not working on big endian machines. Fixed. Thanks to Mike Gilbert.
* A few fixes in the documentation.
* Thu Apr 06 2017 michael@stroeder.com
- Upstream update 3.4.5
- HTTPS project URL
* Tue Nov 22 2016 dmueller@suse.com
- Initial package (3.4.3)