1
1
Changelog
2
2
=========
3
3
4
- 3.17.0 (under development )
4
+ 3.17.0 (29 January 2023 )
5
5
++++++++++++++++++++++++++
6
6
7
7
New features
8
8
---------------
9
9
* Added support for the Counter Mode KDF defined in SP 800-108 Rev 1.
10
10
* Reduce the minimum tag length for the EAX cipher to 2 bytes.
11
- * An RSA object has 4 new properties ``dp ``, ``dq ``, ``invq `` and ``invq ``
12
- for the CRT coefficients (``invp `` is the same as the old ``u ``).
11
+ * An RSA object has 4 new properties for the CRT coefficients:
12
+ ``dp ``, ``dq ``, ``invq `` and ``invq `` (``invp `` is the same value
13
+ as the existing ``u ``).
13
14
14
15
Resolved issues
15
16
---------------
16
- * GH#526: improved typing for ``RSA.contruct ``.
17
- * GH#534: reduce memory consumption when using a large number
17
+ * GH#526: improved typing for ``RSA.construct ``.
18
+ * GH#534: reduced memory consumption when using a large number
18
19
of cipher objects.
19
- * GH#598: fix missing error handling for ``Util.number.inverse ``.
20
+ * GH#598: fixed missing error handling for ``Util.number.inverse ``.
20
21
* GH#629: improved typing for ``AES.new `` and the various
21
22
mode-specific types it returns. Thanks to Greg Werbin.
22
23
* GH#653: added workaround for an alleged GCC compiler bug
@@ -32,6 +33,8 @@ Resolved issues
32
33
After this fix, data that was encrypted in past using the
33
34
(default) nonce length of 15 bytes can still be decrypted
34
35
by reducing the nonce to its first 14 bytes.
36
+ * GH#705: improved typing for ``nonce ``, ``iv ``, and ``IV `` parameters
37
+ of cipher objects.
35
38
36
39
Other changes
37
40
-------------
0 commit comments