python-pycryptodome
No description set
- Developed at devel:languages:python
- Sources inherited from project openSUSE:Factory
-
8
derived packages
- Download package
-
Checkout Package
osc -A https://api.opensuse.org checkout home:seife:Factory/python-pycryptodome && cd $_
- Create Badge
Refresh
Refresh
Source Files
Filename | Size | Changed |
---|---|---|
pycryptodome-3.19.0.tar.gz | 0017153954 16.4 MB | |
python-pycryptodome.changes | 0000023165 22.6 KB | |
python-pycryptodome.spec | 0000003679 3.59 KB |
Revision 27 (latest revision is 30)
Ana Guerrero (anag+factory)
accepted
request 1129188
from
Dirk Mueller (dirkmueller)
(revision 27)
- update to 3.19.0: * The ``update()`` methods of TupleHash128 and TupleHash256 objects can now hash multiple items (byte strings) at once. * Added support for ECDH, with ``Crypto.Protocol.DH``. * GH#754: due to a bug in ``cffi``, do not use it on Windows with Python 3.12+. - Update to version 3.16.0 * Align stack of functions using SSE2 intrinsics to avoid crashes, * fixed memory leak for operations that use memoryviews when cffi fix the build on older distros * Add support for loading PEM files encrypted with AES192-CBC, * When importing ECC keys, ignore EC PARAMS section that was * Speed-up ECC performance. ECDSA is 33 times faster on the * Support HMAC-SHA224, HMAC-SHA256, HMAC-SHA384, and HMAC-SHA512 * DER objects were not rejected if their length field had * point_at_infinity() becomes an instance method for * GH#258: False positive on PSS signatures when externally * New parameter output for Crypto.Util.strxor.strxor, Crypto.Util.strxor.strxor_c, encrypt and decrypt methods in symmetric ciphers (Crypto.Cipher package). output is a pre-allocated buffer (a bytearray or a writeable memoryview) where the result must be stored. This requires less memory for very large payloads; it is also more efficient when encrypting * Fix vulnerability on AESNI ECB with payloads smaller than * Fixed incorrect AES encryption/decryption with AES acceleration on x86 due to gcc’s optimization and strict * More prime number candidates than necessary where discarded as composite due to the limited way D values were searched * More meaningful exceptions in case of mismatch in IV length
Comments 0