python-pycryptodomex
No description set
- Developed at devel:languages:python
- Sources inherited from project openSUSE:Factory
-
4
derived packages
- Download package
-
Checkout Package
osc -A https://api.opensuse.org checkout openSUSE:Leap:16.0:FactoryCandidates/python-pycryptodomex && cd $_
- Create Badge
Refresh
Refresh
Source Files
Filename | Size | Changed |
---|---|---|
python-pycryptodomex.changes | 0000016663 16.3 KB | |
python-pycryptodomex.spec | 0000003469 3.39 KB | |
v3.11.0.tar.gz | 0015555515 14.8 MB |
Revision 12 (latest revision is 24)
Dominique Leuenberger (dimstar_suse)
accepted
request 925768
from
Dirk Mueller (dirkmueller)
(revision 12)
- update to 3.11.0: * GH#512: Especially for very small bit sizes, ``Crypto.Util.number.getPrime()`` was occasionally generating primes larger than given the bit size. * GH#552: Correct typing annotations for ``PKCS115_Cipher.decrypt()``. * GH#555: ``decrypt()`` method of a PKCS#1v1.5 cipher returned a ``bytearray`` instead of ``bytes``. * GH#557: External DSA domain parameters were accepted even when the modulus (``p``) was not prime. This affected ``Crypto.PublicKey.DSA.generate()`` and ``Crypto.PublicKey.DSA.construct()``. * Added cSHAKE128 and cSHAKE256 (of SHA-3 family). * GH#558: The flag RTLD_DEEPBIND passed to ``dlopen()`` is not well supported by `address sanitizers <https://github.com/google/sanitizers/issues/611>`_. It is now possible to set the environment variable ``PYCRYPTDOME_DISABLE_DEEPBIND`` to drop that flag and allow security testing.
Comments 0