Skip to content

Update dependency pycryptodome to v3.23.0

This MR contains the following updates:

Package Update Change
pycryptodome (source, changelog) minor ==3.9.7 -> ==3.23.0

Release Notes

Legrandin/pycryptodome (pycryptodome)

v3.23.0: - Dunkerque

Compare Source

New features

  • Added cipher modes Key Wrap (KW, RFC3394) and Key Wrap with Padding (KWP, RFC5649). Both are defined also in NIST SP 800-38F.
  • Wheels for Windows ARM.

Resolved issues

  • GH#862: For HashEdDSA and Ed448, sign() and verify() modified the state of the XOF.

v3.22.0: v3.22.0 - Caen

Compare Source

New features

  • Added support for HPKE (RFC 9180).

Resolved issues

  • GH#812: CCM ciphers will now fail before encrypting (or decrypting) data beyond the limit imposed by the nonce length.
  • GH#846: fix infinite loop with RC4 for data larger than 4GB.
  • GH#852: handle correctly invalid PEM files with less than 3 lines.

Other changes

  • Remove support for Python 3.6.

v3.21.0: - Bourdeaux

Compare Source

New features

  • By setting the PYCRYPTODOME_DISABLE_GMP environment variable, the GMP library will not be used even if detected.
  • Add support for Curve25519 / X25519.
  • Add support for Curve448 / X448.
  • Add attribute curve to EccPoint and EccXPoint classes, with the canonical name of the curve.
  • GH#781: the label for the SP800_108_Counter KDF may now contain zero bytes. Thanks to Julien Rische.
  • GH#814: RSA keys for PSS can be imported.

Resolved issues

  • GH#810: fixed negation of Ed25519 points.
  • GH#819: accept an RFC5916 ECPrivateKey even if it doesn't contain any of the optional elements (parameters [0] and publicKey[1]).

Other changes

  • Remove support for Python 3.5.

v3.20.0: v3.20.0 - Amiens

Compare Source

New features

  • Added support for TurboSHAKE128 and TurboSHAKE256.
  • Added method Crypto.Hash.new() to generate a hash object given a hash name.
  • Added support for AES-GCM encryption of PBES2 and PKCS#8 containers.
  • Added support for SHA-2 and SHA-3 algorithms in PBKDF2 when creating PBES2 and PKCS#8 containers.
  • Export of RSA keys accepts the prot_params dictionary as parameter to control the number of iterations for PBKDF2 and scrypt.
  • C unit tests also run on non-x86 architectures.

Resolved issues

  • GH#787: Fixed autodetect logic for GCC 14 in combination with LTO.

v3.19.1: - Zeil

Compare Source

Resolved issues

  • Fixed a side-channel leakage with OAEP decryption that could be exploited to carry out a Manger attack. Thanks to Hubert Kario.

v3.19.0: - Ulm

Compare Source

New features

  • The update() methods of TupleHash128 and TupleHash256 objects can now hash multiple items (byte strings) at once. Thanks to Sylvain Pelissier.
  • Added support for ECDH, with Crypto.Protocol.DH.

Resolved issues

  • GH#754: due to a bug in cffi, do not use it on Windows with Python 3.12+.

v3.18.0: - Trier

Compare Source

New features

  • Added support for DER BOOLEAN encodings.

  • The library now compiles on Windows ARM64. Thanks to Niyas Sait.

    Resolved issues


  • GH#722: nonce attribute was not correctly set for XChaCha20_Poly1305 ciphers. Thanks to Liam Haber.
  • GH#728: Workaround for a possible x86 emulator bug in Windows for ARM64.
  • GH#739: OID encoding for arc 2 didn't accept children larger than 39. Thanks to James.
  • Correctly check that the scalar matches the point when importing an ECC private key.

v3.17

Compare Source

v3.16.0: - Ravensburg

Compare Source

New features

  • Build wheels for musl Linux. Thanks to Ben Raz.

Resolved issues

  • GH#639: ARC4 now also works with 'keys' as short as 8 bits.
  • GH#669: fix segfaults when running in a manylinux2010 i686 image.

v3.15.0

Compare Source

v3.14.1

Compare Source

v3.14.0

Compare Source

v3.13.0

Compare Source

v3.12.0

Compare Source

v3.11.0

Compare Source

v3.10.1

Compare Source

v3.9.9

Compare Source

v3.9.8: - Jena

Compare Source


Configuration

📅 Schedule: Branch creation - At any time (no schedule defined), Automerge - At any time (no schedule defined).

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

♻️ Rebasing: Whenever MR becomes conflicted, or you tick the rebase/retry checkbox.

🔕 Ignore: Close this MR and you won't be reminded about this update again.


  • If you want to rebase/retry this MR, check this box

This MR has been generated by Renovate Bot.

Edited by CoopBot

Merge request reports

Loading