Releases: Legrandin/pycryptodome
Releases · Legrandin/pycryptodome
v3.23.0 - Dunkerque (pycryptodomex)
New features
- Added cipher modes Key Wrap (KW, RFC3394) and Key Wrap with Padding (KWP, RFC5649).
Both are defined also in NIST SP 800-38F. - Wheels for Windows ARM.
Resolved issues
- GH#862: For HashEdDSA and Ed448, sign() and verify() modified the state of the XOF.
v3.23.0 - Dunkerque
New features
- Added cipher modes Key Wrap (KW, RFC3394) and Key Wrap with Padding (KWP, RFC5649).
Both are defined also in NIST SP 800-38F. - Wheels for Windows ARM.
Resolved issues
- GH#862: For HashEdDSA and Ed448, sign() and verify() modified the state of the XOF.
v3.22.0x - Caen (pycryptodomex)
New features
- Added support for HPKE (RFC 9180).
Resolved issues
- GH#812: CCM ciphers will now fail before encrypting (or decrypting)
data beyond the limit imposed by the nonce length. - GH#846: fix infinite loop with RC4 for data larger than 4GB.
- GH#852: handle correctly invalid PEM files with less than 3 lines.
Other changes
- Remove support for Python 3.6.
v3.22.0 - Caen
New features
- Added support for HPKE (RFC 9180).
Resolved issues
- GH#812: CCM ciphers will now fail before encrypting (or decrypting)
data beyond the limit imposed by the nonce length. - GH#846: fix infinite loop with RC4 for data larger than 4GB.
- GH#852: handle correctly invalid PEM files with less than 3 lines.
Other changes
- Remove support for Python 3.6.
v3.21.0 - Bourdeaux (pycryptodomex)
New features
- By setting the PYCRYPTODOME_DISABLE_GMP environment variable,
the GMP library will not be used even if detected. - Add support for Curve25519 / X25519.
- Add support for Curve448 / X448.
- Add attribute
curve
to EccPoint and EccXPoint classes,
with the canonical name of the curve. - GH#781: the label for the SP800_108_Counter KDF may now
contain zero bytes. Thanks to Julien Rische. - GH#814: RSA keys for PSS can be imported.
Resolved issues
- GH#810: fixed negation of Ed25519 points.
- GH#819: accept an RFC5916 ECPrivateKey even if it doesn't
contain any of the optional elements
(parameters [0] and publicKey[1]).
Other changes
- Remove support for Python 3.5.
v3.21.0 - Bourdeaux
New features
- By setting the PYCRYPTODOME_DISABLE_GMP environment variable,
the GMP library will not be used even if detected. - Add support for Curve25519 / X25519.
- Add support for Curve448 / X448.
- Add attribute
curve
to EccPoint and EccXPoint classes,
with the canonical name of the curve. - GH#781: the label for the SP800_108_Counter KDF may now
contain zero bytes. Thanks to Julien Rische. - GH#814: RSA keys for PSS can be imported.
Resolved issues
- GH#810: fixed negation of Ed25519 points.
- GH#819: accept an RFC5916 ECPrivateKey even if it doesn't
contain any of the optional elements
(parameters [0] and publicKey[1]).
Other changes
- Remove support for Python 3.5.
v3.20.0 - Amiens (pycryptodomex)
New features
- Added support for TurboSHAKE128 and TurboSHAKE256.
- Added method
Crypto.Hash.new()
to generate a hash
object given a hash name. - Added support for AES-GCM encryption of PBES2 and PKCS#8
containers. - Added support for SHA-2 and SHA-3 algorithms in PBKDF2
when creating PBES2 and PKCS#8 containers. - Export of RSA keys accepts the
prot_params
dictionary
as parameter to control the number of iterations for PBKDF2
and scrypt. - C unit tests also run on non-x86 architectures.
Resolved issues
- GH#787: Fixed autodetect logic for GCC 14 in combination with LTO.
v3.20.0 - Amiens
New features
- Added support for TurboSHAKE128 and TurboSHAKE256.
- Added method
Crypto.Hash.new()
to generate a hash
object given a hash name. - Added support for AES-GCM encryption of PBES2 and PKCS#8
containers. - Added support for SHA-2 and SHA-3 algorithms in PBKDF2
when creating PBES2 and PKCS#8 containers. - Export of RSA keys accepts the
prot_params
dictionary
as parameter to control the number of iterations for PBKDF2
and scrypt. - C unit tests also run on non-x86 architectures.
Resolved issues
- GH#787: Fixed autodetect logic for GCC 14 in combination with LTO.
v3.19.1 - Zeil (pycryptodomex)
Resolved issues
- Fixed a side-channel leakage with OAEP decryption that could be
exploited to carry out a Manger attack. Thanks to Hubert Kario.
v3.19.1 - Zeil
Resolved issues
- Fixed a side-channel leakage with OAEP decryption that could be
exploited to carry out a Manger attack. Thanks to Hubert Kario.