[PR #261] [MERGED] Bump pycryptodomex from 3.19.0 to 3.20.0 #280

Closed
opened 2026-02-27 08:12:34 +03:00 by kerem · 0 comments
Owner

📋 Pull Request Information

Original PR: https://github.com/kokarare1212/librespot-python/pull/261
Author: @dependabot[bot]
Created: 1/10/2024
Status: Merged
Merged: 2/5/2024
Merged by: @kokarare1212

Base: mainHead: dependabot/pip/pycryptodomex-3.20.0


📝 Commits (1)

  • c591619 Bump pycryptodomex from 3.19.0 to 3.20.0

📊 Changes

1 file changed (+1 additions, -1 deletions)

View changed files

📝 requirements.txt (+1 -1)

📄 Description

Bumps pycryptodomex from 3.19.0 to 3.20.0.

Release notes

Sourced from pycryptodomex's releases.

v3.20.0 - Amiens

New features

  • Added support for TurboSHAKE128 and TurboSHAKE256.
  • Added method Crypto.Hash.new() to generate a hash object given a hash name.
  • Added support for AES-GCM encryption of PBES2 and PKCS#8 containers.
  • Added support for SHA-2 and SHA-3 algorithms in PBKDF2 when creating PBES2 and PKCS#8 containers.
  • Export of RSA keys accepts the prot_params dictionary as parameter to control the number of iterations for PBKDF2 and scrypt.
  • C unit tests also run on non-x86 architectures.

Resolved issues

  • GH#787: Fixed autodetect logic for GCC 14 in combination with LTO.

v3.20.0 - Amiens (pycryptodomex)

New features

  • Added support for TurboSHAKE128 and TurboSHAKE256.
  • Added method Crypto.Hash.new() to generate a hash object given a hash name.
  • Added support for AES-GCM encryption of PBES2 and PKCS#8 containers.
  • Added support for SHA-2 and SHA-3 algorithms in PBKDF2 when creating PBES2 and PKCS#8 containers.
  • Export of RSA keys accepts the prot_params dictionary as parameter to control the number of iterations for PBKDF2 and scrypt.
  • C unit tests also run on non-x86 architectures.

Resolved issues

  • GH#787: Fixed autodetect logic for GCC 14 in combination with LTO.

v3.19.1 - Zeil

Resolved issues

  • Fixed a side-channel leakage with OAEP decryption that could be exploited to carry out a Manger attack. Thanks to Hubert Kario.

v3.19.1 - Zeil (pycryptodomex)

Resolved issues

  • Fixed a side-channel leakage with OAEP decryption that could be exploited to carry out a Manger attack. Thanks to Hubert Kario.
Changelog

Sourced from pycryptodomex's changelog.

3.20.0 (9 January 2024) ++++++++++++++++++++++++++

New features

  • Added support for TurboSHAKE128 and TurboSHAKE256.
  • Added method Crypto.Hash.new() to generate a hash object given a hash name.
  • Added support for AES-GCM encryption of PBES2 and PKCS#8 containers.
  • Added support for SHA-2 and SHA-3 algorithms in PBKDF2 when creating PBES2 and PKCS#8 containers.
  • Export of RSA keys accepts the prot_params dictionary as parameter to control the number of iterations for PBKDF2 and scrypt.
  • C unit tests also run on non-x86 architectures.

Resolved issues

  • GH#787: Fixed autodetect logic for GCC 14 in combination with LTO.

3.19.1 (28 December 2023) ++++++++++++++++++++++++++

Resolved issues

  • Fixed a side-channel leakage with OAEP decryption that could be exploited to carry out a Manger attack (CVE-2023-52323). Thanks to Hubert Kario.
Commits
  • b6ab946 Bump version and update changelog
  • ebfef94 Update examples
  • 03a66b2 Merge branch 'rsa_pkcs8_params'
  • df3d9a5 Update requirements-test.txt
  • 6f51811 Update Changelog
  • a05e61b Update typing for RSA and ECC
  • dcb92e2 Update RSA and ECC documentation
  • 22b854b Fix typing for PBES and PKCS8
  • a14a222 Update the PKCS#8 documentation
  • 8677775 Add AES-GCM as PBES2/PKCS8 mode
  • Additional commits viewable in compare view

Dependabot compatibility score

Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.


Dependabot commands and options

You can trigger Dependabot actions by commenting on this PR:

  • @dependabot rebase will rebase this PR
  • @dependabot recreate will recreate this PR, overwriting any edits that have been made to it
  • @dependabot merge will merge this PR after your CI passes on it
  • @dependabot squash and merge will squash and merge this PR after your CI passes on it
  • @dependabot cancel merge will cancel a previously requested merge and block automerging
  • @dependabot reopen will reopen this PR if it is closed
  • @dependabot close will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually
  • @dependabot show <dependency name> ignore conditions will show all of the ignore conditions of the specified dependency
  • @dependabot ignore this major version will close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this minor version will close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this dependency will close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself)

🔄 This issue represents a GitHub Pull Request. It cannot be merged through Gitea due to API limitations.

## 📋 Pull Request Information **Original PR:** https://github.com/kokarare1212/librespot-python/pull/261 **Author:** [@dependabot[bot]](https://github.com/apps/dependabot) **Created:** 1/10/2024 **Status:** ✅ Merged **Merged:** 2/5/2024 **Merged by:** [@kokarare1212](https://github.com/kokarare1212) **Base:** `main` ← **Head:** `dependabot/pip/pycryptodomex-3.20.0` --- ### 📝 Commits (1) - [`c591619`](https://github.com/kokarare1212/librespot-python/commit/c591619980f782e8abc3b73dd05176e704a5e7bc) Bump pycryptodomex from 3.19.0 to 3.20.0 ### 📊 Changes **1 file changed** (+1 additions, -1 deletions) <details> <summary>View changed files</summary> 📝 `requirements.txt` (+1 -1) </details> ### 📄 Description Bumps [pycryptodomex](https://github.com/Legrandin/pycryptodome) from 3.19.0 to 3.20.0. <details> <summary>Release notes</summary> <p><em>Sourced from <a href="https://github.com/Legrandin/pycryptodome/releases">pycryptodomex's releases</a>.</em></p> <blockquote> <h2>v3.20.0 - Amiens</h2> <h2>New features</h2> <ul> <li>Added support for TurboSHAKE128 and TurboSHAKE256.</li> <li>Added method <code>Crypto.Hash.new()</code> to generate a hash object given a hash name.</li> <li>Added support for AES-GCM encryption of PBES2 and PKCS#8 containers.</li> <li>Added support for SHA-2 and SHA-3 algorithms in PBKDF2 when creating PBES2 and PKCS#8 containers.</li> <li>Export of RSA keys accepts the <code>prot_params</code> dictionary as parameter to control the number of iterations for PBKDF2 and scrypt.</li> <li>C unit tests also run on non-x86 architectures.</li> </ul> <h2>Resolved issues</h2> <ul> <li>GH#787: Fixed autodetect logic for GCC 14 in combination with LTO.</li> </ul> <h2>v3.20.0 - Amiens (pycryptodomex)</h2> <h2>New features</h2> <ul> <li>Added support for TurboSHAKE128 and TurboSHAKE256.</li> <li>Added method <code>Crypto.Hash.new()</code> to generate a hash object given a hash name.</li> <li>Added support for AES-GCM encryption of PBES2 and PKCS#8 containers.</li> <li>Added support for SHA-2 and SHA-3 algorithms in PBKDF2 when creating PBES2 and PKCS#8 containers.</li> <li>Export of RSA keys accepts the <code>prot_params</code> dictionary as parameter to control the number of iterations for PBKDF2 and scrypt.</li> <li>C unit tests also run on non-x86 architectures.</li> </ul> <h2>Resolved issues</h2> <ul> <li>GH#787: Fixed autodetect logic for GCC 14 in combination with LTO.</li> </ul> <h2>v3.19.1 - Zeil</h2> <h2>Resolved issues</h2> <ul> <li>Fixed a side-channel leakage with OAEP decryption that could be exploited to carry out a Manger attack. Thanks to Hubert Kario.</li> </ul> <h2>v3.19.1 - Zeil (pycryptodomex)</h2> <h2>Resolved issues</h2> <ul> <li>Fixed a side-channel leakage with OAEP decryption that could be exploited to carry out a Manger attack. Thanks to Hubert Kario.</li> </ul> </blockquote> </details> <details> <summary>Changelog</summary> <p><em>Sourced from <a href="https://github.com/Legrandin/pycryptodome/blob/master/Changelog.rst">pycryptodomex's changelog</a>.</em></p> <blockquote> <p>3.20.0 (9 January 2024) ++++++++++++++++++++++++++</p> <h2>New features</h2> <ul> <li>Added support for TurboSHAKE128 and TurboSHAKE256.</li> <li>Added method <code>Crypto.Hash.new()</code> to generate a hash object given a hash name.</li> <li>Added support for AES-GCM encryption of PBES2 and PKCS#8 containers.</li> <li>Added support for SHA-2 and SHA-3 algorithms in PBKDF2 when creating PBES2 and PKCS#8 containers.</li> <li>Export of RSA keys accepts the <code>prot_params</code> dictionary as parameter to control the number of iterations for PBKDF2 and scrypt.</li> <li>C unit tests also run on non-x86 architectures.</li> </ul> <h2>Resolved issues</h2> <ul> <li>GH#787: Fixed autodetect logic for GCC 14 in combination with LTO.</li> </ul> <p>3.19.1 (28 December 2023) ++++++++++++++++++++++++++</p> <h2>Resolved issues</h2> <ul> <li>Fixed a side-channel leakage with OAEP decryption that could be exploited to carry out a Manger attack (CVE-2023-52323). Thanks to Hubert Kario.</li> </ul> </blockquote> </details> <details> <summary>Commits</summary> <ul> <li><a href="https://github.com/Legrandin/pycryptodome/commit/b6ab9462d647f12c64d7950b4b81c2b9df3e6bc7"><code>b6ab946</code></a> Bump version and update changelog</li> <li><a href="https://github.com/Legrandin/pycryptodome/commit/ebfef948b0ca6760885fb19f9e1393886ad2ea48"><code>ebfef94</code></a> Update examples</li> <li><a href="https://github.com/Legrandin/pycryptodome/commit/03a66b2ce7cd3ee6ba82a70d7d9e000b02a464bc"><code>03a66b2</code></a> Merge branch 'rsa_pkcs8_params'</li> <li><a href="https://github.com/Legrandin/pycryptodome/commit/df3d9a5d1c5742bd73b2aeee95ef8bd3e09338c4"><code>df3d9a5</code></a> Update requirements-test.txt</li> <li><a href="https://github.com/Legrandin/pycryptodome/commit/6f51811e36a7e03639b280f4cf3f81cc9396b9d3"><code>6f51811</code></a> Update Changelog</li> <li><a href="https://github.com/Legrandin/pycryptodome/commit/a05e61b2a28d56fe6b01c8a8bae73928c28f3a02"><code>a05e61b</code></a> Update typing for RSA and ECC</li> <li><a href="https://github.com/Legrandin/pycryptodome/commit/dcb92e29691faae0cee74759c9f692d85e412837"><code>dcb92e2</code></a> Update RSA and ECC documentation</li> <li><a href="https://github.com/Legrandin/pycryptodome/commit/22b854befc6013d4011ed38ef8faddead479e5fe"><code>22b854b</code></a> Fix typing for PBES and PKCS8</li> <li><a href="https://github.com/Legrandin/pycryptodome/commit/a14a22203fdf6f4b25c45d2ef94db0acba14ba51"><code>a14a222</code></a> Update the PKCS#8 documentation</li> <li><a href="https://github.com/Legrandin/pycryptodome/commit/86777756985a34dc62509703bf095c7aa7a117c0"><code>8677775</code></a> Add AES-GCM as PBES2/PKCS8 mode</li> <li>Additional commits viewable in <a href="https://github.com/Legrandin/pycryptodome/compare/v3.19.0...v3.20.0">compare view</a></li> </ul> </details> <br /> [![Dependabot compatibility score](https://dependabot-badges.githubapp.com/badges/compatibility_score?dependency-name=pycryptodomex&package-manager=pip&previous-version=3.19.0&new-version=3.20.0)](https://docs.github.com/en/github/managing-security-vulnerabilities/about-dependabot-security-updates#about-compatibility-scores) Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting `@dependabot rebase`. [//]: # (dependabot-automerge-start) [//]: # (dependabot-automerge-end) --- <details> <summary>Dependabot commands and options</summary> <br /> You can trigger Dependabot actions by commenting on this PR: - `@dependabot rebase` will rebase this PR - `@dependabot recreate` will recreate this PR, overwriting any edits that have been made to it - `@dependabot merge` will merge this PR after your CI passes on it - `@dependabot squash and merge` will squash and merge this PR after your CI passes on it - `@dependabot cancel merge` will cancel a previously requested merge and block automerging - `@dependabot reopen` will reopen this PR if it is closed - `@dependabot close` will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually - `@dependabot show <dependency name> ignore conditions` will show all of the ignore conditions of the specified dependency - `@dependabot ignore this major version` will close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself) - `@dependabot ignore this minor version` will close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself) - `@dependabot ignore this dependency` will close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself) </details> --- <sub>🔄 This issue represents a GitHub Pull Request. It cannot be merged through Gitea due to API limitations.</sub>
kerem 2026-02-27 08:12:34 +03:00
Sign in to join this conversation.
No milestone
No project
No assignees
1 participant
Notifications
Due date
The due date is invalid or out of range. Please use the format "yyyy-mm-dd".

No due date set.

Dependencies

No dependencies set.

Reference
starred/librespot-python-kokarare1212#280
No description provided.