Path to this page:
./
security/py-cryptodome,
Cryptographic and hash functions for Python
Branch: CURRENT,
Version: 3.14.1,
Package name: py39-cryptodome-3.14.1,
Maintainer: pkgsrc-usersPyCryptodome is a self-contained Python package of low-level cryptographic
primitives.
Required to run:[
devel/gmp] [
devel/py-setuptools] [
lang/python37]
Required to build:[
pkgtools/cwrappers]
Master sites:
Filesize: 3293.384 KB
Version history: (Expand)
- (2022-02-08) Updated to version: py39-cryptodome-3.14.1
- (2022-01-31) Updated to version: py39-cryptodome-3.14.0
- (2022-01-24) Updated to version: py39-cryptodome-3.13.0
- (2022-01-05) Updated to version: py39-cryptodome-3.12.0nb1
- (2021-12-06) Updated to version: py39-cryptodome-3.12.0
- (2021-10-09) Updated to version: py39-cryptodome-3.11.0
CVS history: (Expand)
2022-02-07 22:00:11 by Adam Ciarcinski | Files touched by this commit (2) |  |
Log message:
py-cryptodome: updated to 3.14.1
3.14.1
Resolved issues
* Fixed memory leak for GMP integers.
|
2022-01-31 12:26:31 by Adam Ciarcinski | Files touched by this commit (2) |  |
Log message:
py-cryptodome: updated to 3.14.0
3.14.0
New features
------------
* Add support for curve NIST P-192.
|
2022-01-24 13:39:25 by Adam Ciarcinski | Files touched by this commit (2) |  |
Log message:
py-cryptodome: updated to 3.13.0
3.13.0
New features
------------
* Add support for curve NIST P-224.
Resolved issues
---------------
* Fixed typing info for ``Crypto.PublicKey.ECC``.
Other changes
-------------
* Relaxed ECDSA requirements for FIPS 186 signatures and accept any SHA-2 or \
SHA-3 hash.
``sign()`` and ``verify()`` will be performed even if the hash is stronger \
than the ECC key.
|
2022-01-04 21:55:40 by Thomas Klausner | Files touched by this commit (1595) |
Log message:
*: bump PKGREVISION for egg.mk users
They now have a tool dependency on py-setuptools instead of a DEPENDS
|
2021-12-06 20:20:37 by Adam Ciarcinski | Files touched by this commit (3) |  |
Log message:
py-cryptodome: updated to 3.12.0
3.12.0
New features
ECC keys in the SEC1 format can be exported and imported.
Add support for KMAC128, KMAC256, TupleHash128, and TupleHash256 (NIST SP-800 185).
Add support for KangarooTwelve.
Resolved issues
An asymmetric key could not be imported as a memoryview.
cSHAKE128/256 generated a wrong output for customization strings longer than 255 \
bytes.
CBC decryption generated the wrong plaintext when the input and the output were \
the same buffer.
|
2021-10-26 13:18:07 by Nia Alarie | Files touched by this commit (605) |
Log message:
security: Replace RMD160 checksums with BLAKE2s checksums
All checksums have been double-checked against existing RMD160 and
SHA512 hashes
Unfetchable distfiles (fetched conditionally?):
./security/cyrus-sasl/distinfo \
cyrus-sasl-dedad73e5e7a75d01a5f3d5a6702ab8ccd2ff40d.patch.v2
|
2021-10-09 10:40:21 by Adam Ciarcinski | Files touched by this commit (3) |  |
Log message:
py-cryptodome: updated to 3.11.0
3.11.0
Resolved issues
Especially for very small bit sizes, Crypto.Util.number.getPrime() was \
occasionally generating primes larger than given the bit size.
Correct typing annotations for PKCS115_Cipher.decrypt().
decrypt() method of a PKCS#1v1.5 cipher returned a bytearray instead of bytes.
External DSA domain parameters were accepted even when the modulus (p) was not \
prime. This affected Crypto.PublicKey.DSA.generate() and \
Crypto.PublicKey.DSA.construct().
|
2021-10-07 16:54:50 by Nia Alarie | Files touched by this commit (606) |
Log message:
security: Remove SHA1 hashes for distfiles
|