Pycryptodome

Latest version: v3.21.0

Safety actively analyzes 675368 Python packages for vulnerabilities to keep your Python projects secure.

Scan your dependencies

Page 2 of 11

3.16.0

Not secure
++++++++++++++++++++++++++

New features
------------
* Build wheels for musl Linux. Thanks to Ben Raz.

Resolved issues
---------------
* GH639: ARC4 now also works with 'keys' as short as 8 bits.
* GH669: fix segfaults when running in a manylinux2010 i686 image.

3.15.0

Not secure
++++++++++++++++++++++++++

New features
------------
* Add support for curves Ed25519 and Ed448, including export and import of keys.
* Add support for EdDSA signatures.
* Add support for Asymmetric Key Packages (RFC5958) to import private keys.

Resolved issues
---------------
* GH620: for ``Crypto.Util.number.getPrime`` , do not sequentially
scan numbers searching for a prime.

3.14.1

Not secure
++++++++++++++++++++++++++

Resolved issues
---------------
* GH595: Fixed memory leak for GMP integers.
Thanks to Witalij Siebert and Pablo Quílez.

3.14.0

Not secure
++++++++++++++++++++++++++

New features
------------
* Add support for curve NIST P-192.

3.13.0

Not secure
++++++++++++++++++++++++++

New features
------------
* Add support for curve NIST P-224.

Resolved issues
---------------
* GH590: Fixed typing info for ``Crypto.PublicKey.ECC``.

Other changes
-------------
* Relaxed ECDSA requirements for FIPS 186 signatures and accept any SHA-2 or SHA-3 hash.
``sign()`` and ``verify()`` will be performed even if the hash is stronger than the ECC key.

3.12.0

Not secure
++++++++++++++++++++++++++

New features
------------
* ECC keys in the SEC1 format can be exported and imported.
* Add support for KMAC128, KMAC256, TupleHash128, and TupleHash256 (NIST SP-800 185).
* Add support for KangarooTwelve.

Resolved issues
---------------
* GH563: An asymmetric key could not be imported as a ``memoryview``.
* GH566: cSHAKE128/256 generated a wrong output for customization strings
longer than 255 bytes.
* GH582: CBC decryption generated the wrong plaintext when the input and the output were the same buffer.
Thanks to Michael K. Ashburn.

Page 2 of 11

© 2024 Safety CLI Cybersecurity Inc. All Rights Reserved.