2018-11-27 07:59:34 by Adam Ciarcinski | Files touched by this commit (2) | |
Log message: py-cryptodome: updated to 3.7.2 3.7.2: Fixed compilation problem on ARM platforms. |
2018-11-25 16:05:56 by Adam Ciarcinski | Files touched by this commit (3) | |
Log message: py-cryptodome: updated to 3.7.1 3.7.1: New features Added type stubs to enable static type checking with mypy. New update_after_digest flag for CMAC. Resolved issues Fixed problem with gcc 4.x when compiling ghash_clmul.c. Incorrect digest value produced by CMAC after cloning the object. Method update() of an EAX cipher object was returning the underlying CMAC \ object, instead of the EAX object itself. Method update() of a CMAC object was not throwing an exception after the digest \ was computed (with digest() or verify()). |
2018-10-29 12:07:21 by Adam Ciarcinski | Files touched by this commit (3) | |
Log message: py-cryptodome: updated to 3.7.0 3.7.0: New features * Added support for Poly1305 MAC (with AES and ChaCha20 ciphers for key derivation). * Added support for ChaCha20-Poly1305 AEAD cipher. * New parameter output for Crypto.Util.strxor.strxor, Crypto.Util.strxor.strxor_c, encrypt and decrypt methods in symmetric ciphers (Crypto.Cipher package). output is a pre-allocated buffer (a bytearray or a writeable memoryview) where the result must be stored. This requires less memory for very large payloads; it is also more efficient when encrypting (or decrypting) several small payloads. Resolved issues * AES-GCM hangs when processing more than 4GB at a time on x86 with PCLMULQDQ \ instruction. Breaks in compatibility * Drop support for Python 3.3. * Remove Crypto.Util.py3compat.unhexlify and Crypto.Util.py3compat.hexlify. * With the old Python 2.6, use only ctypes (and not cffi) to interface to native \ code. |
2018-08-18 22:57:30 by Adam Ciarcinski | Files touched by this commit (2) | |
Log message: py-cryptodome: updated to 3.6.6 3.6.6: Resolved issues Fix vulnerability on AESNI ECB with payloads smaller than 16 bytes. |
2018-08-13 09:20:11 by Adam Ciarcinski | Files touched by this commit (2) | |
Log message: py-cryptodome: updated to 3.6.5 3.6.5: Fixed incorrect AES encryption/decryption with AES acceleration on x86 due to \ gcc’s optimization and strict aliasing rules. More prime number candidates than necessary where discarded as composite due to \ the limited way D values were searched in the Lucas test. Fixed ResouceWarnings and DeprecationWarnings. Workaround for Python 3.7.0 bug on Windows |
2018-07-11 09:59:33 by Adam Ciarcinski | Files touched by this commit (3) | |
Log message: py-cryptodome: updated to 3.6.4 3.6.4: New features * Build Python 3.7 wheels on Linux, Windows and Mac. Resolved issues * Rename _cpuid module to make upgrades more robust. * More meaningful exceptions in case of mismatch in IV length (CBC/OFB/CFB modes). * Fix compilation issues on Solaris 10/11. |
2018-06-24 13:39:32 by Adam Ciarcinski | Files touched by this commit (3) | |
Log message: py-cryptodome: updated to 3.6.3 3.6.3: Resolved issues GH175: Fixed incorrect results for CTR encryption/decryption with more than 8 blocks. 3.6.2: New features ChaCha20 accepts 96 bit nonces (in addition to 64 bit nonces) as defined in RFC7539. Accelerate AES-GCM on x86 using PCLMULQDQ instruction. Accelerate AES-ECB and AES-CTR on x86 by pipelining AESNI instructions. As result of the two improvements above, on x86 (Broadwell): AES-ECB and AES-CTR are 3x faster AES-GCM is 9x faster Resolved issues On Windows, MPIR library was stilled pulled in if renamed to gmp.dll. Breaks in compatibility In Crypto.Util.number, functions floor_div and exact_div have been removed. \ Also, ceil_div is limited to non-negative terms only. |
2018-04-18 06:34:13 by Adam Ciarcinski | Files touched by this commit (3) | |
Log message: py-cryptodome: updated to 3.6.1 3.6.1: New features Added Google Wycheproof tests (https://github.com/google/wycheproof) for RSA, \ DSA, ECDSA, GCM, SIV, EAX, CMAC. New parameter mac_len (length of MAC tag) for CMAC. Resolved issues In certain circumstances (at counter wrapping, which happens on average after 32 \ GBi) AES GCM produced wrong ciphertexts. Method encrypt() of AES SIV cipher could be still called, whereas only \ encrypt_and_digest() should be allowed. |
2018-04-13 09:28:39 by Adam Ciarcinski | Files touched by this commit (3) | |
Log message: py-cryptodome: updated to 3.6.0 3.6.0: New features Introduced export_key and deprecated exportKey for DSA and RSA key objects. Ciphers and hash functions accept memoryview objects in input. Added support for SHA-512/224 and SHA-512/256. Resolved issues Reintroduced Crypto.__version__ variable as in PyCrypto. Fixed compilation problem with MinGW. |
2018-03-09 09:07:44 by Adam Ciarcinski | Files touched by this commit (3) | |
Log message: py-cryptodome: updated to 3.5.1 3.5.1: Fix mismatch with declaration and definition of addmul128. |