[PR #194] [MERGED] Bump pycryptodomex from 3.17 to 3.18.0 #222

Closed
opened 2026-02-27 08:12:22 +03:00 by kerem · 0 comments
Owner

📋 Pull Request Information

Original PR: https://github.com/kokarare1212/librespot-python/pull/194
Author: @dependabot[bot]
Created: 5/19/2023
Status: Merged
Merged: 5/22/2023
Merged by: @kokarare1212

Base: mainHead: dependabot/pip/pycryptodomex-3.18.0


📝 Commits (1)

  • 9102185 Bump pycryptodomex from 3.17 to 3.18.0

📊 Changes

1 file changed (+1 additions, -1 deletions)

View changed files

📝 requirements.txt (+1 -1)

📄 Description

Bumps pycryptodomex from 3.17 to 3.18.0.

Release notes

Sourced from pycryptodomex's releases.

v3.18.0 - Trier

New features

  • Added support for DER BOOLEAN encodings.

  • The library now compiles on Windows ARM64. Thanks to Niyas Sait.

    Resolved issues


  • GH#722: nonce attribute was not correctly set for XChaCha20_Poly1305 ciphers. Thanks to Liam Haber.
  • GH#728: Workaround for a possible x86 emulator bug in Windows for ARM64.
  • GH#739: OID encoding for arc 2 didn't accept children larger than 39. Thanks to James.
  • Correctly check that the scalar matches the point when importing an ECC private key.

v3.18.0 - Trier (pycryptodomex)

New features

  • Added support for DER BOOLEAN encodings.

  • The library now compiles on Windows ARM64. Thanks to Niyas Sait.

    Resolved issues


  • GH#722: nonce attribute was not correctly set for XChaCha20_Poly1305 ciphers. Thanks to Liam Haber.
  • GH#728: Workaround for a possible x86 emulator bug in Windows for ARM64.
  • GH#739: OID encoding for arc 2 didn't accept children larger than 39. Thanks to James.
  • Correctly check that the scalar matches the point when importing an ECC private key.
Changelog

Sourced from pycryptodomex's changelog.

3.18.0 (18 May 2023) ++++++++++++++++++++++++++

New features

  • Added support for DER BOOLEAN encodings.
  • The library now compiles on Windows ARM64. Thanks to Niyas Sait.

Resolved issues

  • GH#722: nonce attribute was not correctly set for XChaCha20_Poly1305 ciphers. Thanks to Liam Haber.
  • GH#728: Workaround for a possible x86 emulator bug in Windows for ARM64.
  • GH#739: OID encoding for arc 2 didn't accept children larger than 39. Thanks to James.
  • Correctly check that the scalar matches the point when importing an ECC private key.

3.17.0 (29 January 2023) ++++++++++++++++++++++++++

New features

  • Added support for the Counter Mode KDF defined in SP 800-108 Rev 1.
  • Reduce the minimum tag length for the EAX cipher to 2 bytes.
  • An RSA object has 4 new properties for the CRT coefficients: dp, dq, invq and invq (invp is the same value as the existing u).

Resolved issues

  • GH#526: improved typing for RSA.construct.
  • GH#534: reduced memory consumption when using a large number of cipher objects.
  • GH#598: fixed missing error handling for Util.number.inverse.
  • GH#629: improved typing for AES.new and the various mode-specific types it returns. Thanks to Greg Werbin.
  • GH#653: added workaround for an alleged GCC compiler bug that affected Ed25519 code compiled for AVX2.
  • GH#658: attribute curve of an ECC key was not always the preferred curve name, as it used to be in v3.15.0 (independently of the curve name specified when generating the key).
  • GH#637: fixed typing for legacy modules PKCS1_v1_5 and PKCS1_PSS, as their verify() returned a boolean.
  • GH#664: with OCB mode, nonces of maximum length (15 bytes) were actually used as 14 bytes nonces. After this fix, data that was encrypted in past using the (default) nonce length of 15 bytes can still be decrypted by reducing the nonce to its first 14 bytes.
  • GH#705: improved typing for nonce, iv, and IV parameters of cipher objects.

... (truncated)

Commits
  • a75c464 Use ilammy/msvc-dev-cmd@v1
  • e8f55cb Bump version
  • fd4df59 Update msvc-dev-cmd
  • 6487836 Update to MacOS 12 for wheels
  • bfb5ce3 Update Changelog
  • 72051ed Add DerSequence(…, explicit=…)
  • 2b11e5b Correctly check that the scalar matches the point when importing an ECC priva...
  • d64618b use assertTrue instead of deprecated failUnless
  • 29b1171 use assertTrue instead of deprecated failUnless
  • d6a35eb Add changelog URL to package metadata
  • Additional commits viewable in compare view

Dependabot compatibility score

Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.


Dependabot commands and options

You can trigger Dependabot actions by commenting on this PR:

  • @dependabot rebase will rebase this PR
  • @dependabot recreate will recreate this PR, overwriting any edits that have been made to it
  • @dependabot merge will merge this PR after your CI passes on it
  • @dependabot squash and merge will squash and merge this PR after your CI passes on it
  • @dependabot cancel merge will cancel a previously requested merge and block automerging
  • @dependabot reopen will reopen this PR if it is closed
  • @dependabot close will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually
  • @dependabot ignore this major version will close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this minor version will close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this dependency will close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself)

🔄 This issue represents a GitHub Pull Request. It cannot be merged through Gitea due to API limitations.

## 📋 Pull Request Information **Original PR:** https://github.com/kokarare1212/librespot-python/pull/194 **Author:** [@dependabot[bot]](https://github.com/apps/dependabot) **Created:** 5/19/2023 **Status:** ✅ Merged **Merged:** 5/22/2023 **Merged by:** [@kokarare1212](https://github.com/kokarare1212) **Base:** `main` ← **Head:** `dependabot/pip/pycryptodomex-3.18.0` --- ### 📝 Commits (1) - [`9102185`](https://github.com/kokarare1212/librespot-python/commit/9102185eadf946bd948445dfb97053f1297e456c) Bump pycryptodomex from 3.17 to 3.18.0 ### 📊 Changes **1 file changed** (+1 additions, -1 deletions) <details> <summary>View changed files</summary> 📝 `requirements.txt` (+1 -1) </details> ### 📄 Description Bumps [pycryptodomex](https://github.com/Legrandin/pycryptodome) from 3.17 to 3.18.0. <details> <summary>Release notes</summary> <p><em>Sourced from <a href="https://github.com/Legrandin/pycryptodome/releases">pycryptodomex's releases</a>.</em></p> <blockquote> <h2>v3.18.0 - Trier</h2> <h2>New features</h2> <ul> <li> <p>Added support for DER BOOLEAN encodings.</p> </li> <li> <p>The library now compiles on Windows ARM64. Thanks to Niyas Sait.</p> <p>Resolved issues</p> </li> </ul> <hr /> <ul> <li>GH#722: <code>nonce</code> attribute was not correctly set for XChaCha20_Poly1305 ciphers. Thanks to Liam Haber.</li> <li>GH#728: Workaround for a possible x86 emulator bug in Windows for ARM64.</li> <li>GH#739: OID encoding for arc 2 didn't accept children larger than 39. Thanks to James.</li> <li>Correctly check that the scalar matches the point when importing an ECC private key.</li> </ul> <h2>v3.18.0 - Trier (pycryptodomex)</h2> <h2>New features</h2> <ul> <li> <p>Added support for DER BOOLEAN encodings.</p> </li> <li> <p>The library now compiles on Windows ARM64. Thanks to Niyas Sait.</p> <p>Resolved issues</p> </li> </ul> <hr /> <ul> <li>GH#722: <code>nonce</code> attribute was not correctly set for XChaCha20_Poly1305 ciphers. Thanks to Liam Haber.</li> <li>GH#728: Workaround for a possible x86 emulator bug in Windows for ARM64.</li> <li>GH#739: OID encoding for arc 2 didn't accept children larger than 39. Thanks to James.</li> <li>Correctly check that the scalar matches the point when importing an ECC private key.</li> </ul> </blockquote> </details> <details> <summary>Changelog</summary> <p><em>Sourced from <a href="https://github.com/Legrandin/pycryptodome/blob/master/Changelog.rst">pycryptodomex's changelog</a>.</em></p> <blockquote> <p>3.18.0 (18 May 2023) ++++++++++++++++++++++++++</p> <h2>New features</h2> <ul> <li>Added support for DER BOOLEAN encodings.</li> <li>The library now compiles on Windows ARM64. Thanks to Niyas Sait.</li> </ul> <h2>Resolved issues</h2> <ul> <li>GH#722: <code>nonce</code> attribute was not correctly set for XChaCha20_Poly1305 ciphers. Thanks to Liam Haber.</li> <li>GH#728: Workaround for a possible x86 emulator bug in Windows for ARM64.</li> <li>GH#739: OID encoding for arc 2 didn't accept children larger than 39. Thanks to James.</li> <li>Correctly check that the scalar matches the point when importing an ECC private key.</li> </ul> <p>3.17.0 (29 January 2023) ++++++++++++++++++++++++++</p> <h2>New features</h2> <ul> <li>Added support for the Counter Mode KDF defined in SP 800-108 Rev 1.</li> <li>Reduce the minimum tag length for the EAX cipher to 2 bytes.</li> <li>An RSA object has 4 new properties for the CRT coefficients: <code>dp</code>, <code>dq</code>, <code>invq</code> and <code>invq</code> (<code>invp</code> is the same value as the existing <code>u</code>).</li> </ul> <h2>Resolved issues</h2> <ul> <li>GH#526: improved typing for <code>RSA.construct</code>.</li> <li>GH#534: reduced memory consumption when using a large number of cipher objects.</li> <li>GH#598: fixed missing error handling for <code>Util.number.inverse</code>.</li> <li>GH#629: improved typing for <code>AES.new</code> and the various mode-specific types it returns. Thanks to Greg Werbin.</li> <li>GH#653: added workaround for an alleged GCC compiler bug that affected Ed25519 code compiled for AVX2.</li> <li>GH#658: attribute <code>curve</code> of an ECC key was not always the preferred curve name, as it used to be in v3.15.0 (independently of the curve name specified when generating the key).</li> <li>GH#637: fixed typing for legacy modules <code>PKCS1_v1_5</code> and <code>PKCS1_PSS</code>, as their <code>verify()</code> returned a boolean.</li> <li>GH#664: with OCB mode, nonces of maximum length (15 bytes) were actually used as 14 bytes nonces. After this fix, data that was encrypted in past using the (default) nonce length of 15 bytes can still be decrypted by reducing the nonce to its first 14 bytes.</li> <li>GH#705: improved typing for <code>nonce</code>, <code>iv</code>, and <code>IV</code> parameters of cipher objects.</li> </ul> <!-- raw HTML omitted --> </blockquote> <p>... (truncated)</p> </details> <details> <summary>Commits</summary> <ul> <li><a href="https://github.com/Legrandin/pycryptodome/commit/a75c4643703625a2a6a8fd9e3ebf7605c6752cbf"><code>a75c464</code></a> Use ilammy/msvc-dev-cmd@v1</li> <li><a href="https://github.com/Legrandin/pycryptodome/commit/e8f55cb40c0982f2dceda77b074974701a3fd107"><code>e8f55cb</code></a> Bump version</li> <li><a href="https://github.com/Legrandin/pycryptodome/commit/fd4df5959bd53b65565173b23e75dabe24e102b2"><code>fd4df59</code></a> Update msvc-dev-cmd</li> <li><a href="https://github.com/Legrandin/pycryptodome/commit/6487836db7c4f0c7eb50dc57a65b6c30952d65db"><code>6487836</code></a> Update to MacOS 12 for wheels</li> <li><a href="https://github.com/Legrandin/pycryptodome/commit/bfb5ce3f67ac4d19101aa1aafb1c3adff2f48566"><code>bfb5ce3</code></a> Update Changelog</li> <li><a href="https://github.com/Legrandin/pycryptodome/commit/72051edac8e386cbcc39baa71af4526c76d5df8a"><code>72051ed</code></a> Add DerSequence(…, explicit=…)</li> <li><a href="https://github.com/Legrandin/pycryptodome/commit/2b11e5b3adb3d09b42df4e639653e5b65cec0469"><code>2b11e5b</code></a> Correctly check that the scalar matches the point when importing an ECC priva...</li> <li><a href="https://github.com/Legrandin/pycryptodome/commit/d64618b16a86912dfa262bbfb0f89bba6f758bbe"><code>d64618b</code></a> use assertTrue instead of deprecated failUnless</li> <li><a href="https://github.com/Legrandin/pycryptodome/commit/29b11716501508a3f14bc83efebf28d647eebae5"><code>29b1171</code></a> use assertTrue instead of deprecated failUnless</li> <li><a href="https://github.com/Legrandin/pycryptodome/commit/d6a35eb714e363b033c84417b3ddd36cf81f7723"><code>d6a35eb</code></a> Add changelog URL to package metadata</li> <li>Additional commits viewable in <a href="https://github.com/Legrandin/pycryptodome/compare/v3.17.0...v3.18.0">compare view</a></li> </ul> </details> <br /> [![Dependabot compatibility score](https://dependabot-badges.githubapp.com/badges/compatibility_score?dependency-name=pycryptodomex&package-manager=pip&previous-version=3.17&new-version=3.18.0)](https://docs.github.com/en/github/managing-security-vulnerabilities/about-dependabot-security-updates#about-compatibility-scores) Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting `@dependabot rebase`. [//]: # (dependabot-automerge-start) [//]: # (dependabot-automerge-end) --- <details> <summary>Dependabot commands and options</summary> <br /> You can trigger Dependabot actions by commenting on this PR: - `@dependabot rebase` will rebase this PR - `@dependabot recreate` will recreate this PR, overwriting any edits that have been made to it - `@dependabot merge` will merge this PR after your CI passes on it - `@dependabot squash and merge` will squash and merge this PR after your CI passes on it - `@dependabot cancel merge` will cancel a previously requested merge and block automerging - `@dependabot reopen` will reopen this PR if it is closed - `@dependabot close` will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually - `@dependabot ignore this major version` will close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself) - `@dependabot ignore this minor version` will close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself) - `@dependabot ignore this dependency` will close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself) </details> --- <sub>🔄 This issue represents a GitHub Pull Request. It cannot be merged through Gitea due to API limitations.</sub>
kerem 2026-02-27 08:12:22 +03:00
Sign in to join this conversation.
No milestone
No project
No assignees
1 participant
Notifications
Due date
The due date is invalid or out of range. Please use the format "yyyy-mm-dd".

No due date set.

Dependencies

No dependencies set.

Reference
starred/librespot-python-kokarare1212#222
No description provided.