1
- * Relase 0.17.0 (27 May 2021)
1
+ * Release 0.17.0 (27 May 2021)
2
2
3
3
New API:
4
4
* Keys that use explicit curve parameters can now be read and written.
@@ -38,13 +38,13 @@ Bug fix:
38
38
`PointJacobi`, `VerifyingKey`, and `SigningKey` so that it behaves
39
39
consistently and in the expected way both in Python 2 and Python 3.
40
40
* Implement lock-less algorithm inside PointJacobi for keeping shared state
41
- so that when calculation is aborted with KeyboardInterrupt, the state doesn't
42
- become corrupted (this fixes the occasional breakage of ecdsa in interactive
43
- shells).
41
+ so that when a calculation is aborted with KeyboardInterrupt, the state
42
+ doesn't become corrupted (this fixes the occasional breakage of ecdsa in
43
+ interactive shells).
44
44
45
45
New features:
46
46
* The `speed.py` script now provides performance for signature verification
47
- without use of precomputation.
47
+ without the use of precomputation.
48
48
* New curves supported: secp112r1, secp112r2, secp128r1, secp160r1.
49
49
50
50
Performance:
@@ -89,11 +89,11 @@ Support for reading and writing private keys in PKCS#8 format.
89
89
90
90
New API:
91
91
`to_pem` and `to_der` now accept new parameter, `format`, to specify
92
- the format of the encoded files, either the dafault , legacy " ssleay" , or
92
+ the format of the encoded files, either the default , legacy ` ssleay` , or
93
93
the new `pkcs8` to use PKCS#8. Note that only unencrypted PKCS#8 files are
94
94
supported.
95
95
Add `allow_truncate` to `verify` in `VerifyingKey`, it defaults to True,
96
- when specified as False, use of large hashes smaller than curves will be
96
+ when specified as False, the use of large hashes smaller than curves will be
97
97
disallowed (as it was in 0.14.1 and earlier).
98
98
99
99
Bug fix:
@@ -108,7 +108,7 @@ as such.
108
108
Maintenance:
109
109
Ensure that version checks will work with Python 4.
110
110
Format the source with black.
111
- Fix uses of `assert_` in test suite.
111
+ Fix uses of `assert_` in the test suite.
112
112
Use newer Ubuntu in Travis to test against OpenSSL 1.1.1 (and thus
113
113
test the interoperability of ECDH code in Travis).
114
114
@@ -131,24 +131,24 @@ New API:
131
131
`ecdsa.ecdh` module and `ECDH` class.
132
132
`PointJacobi` added.
133
133
`VerifyingKey.verify_digest`, `SigningKey.sign_digest` and
134
- `SigningKey.sign_digest_deterministic` methods now accept `allow_truncate`
135
- argument to enable use of hashes larger than the curve order.
134
+ `SigningKey.sign_digest_deterministic` methods now accept the `allow_truncate`
135
+ argument to enable the use of hashes larger than the curve order.
136
136
`VerifyingKey` `from_pem` and `from_der` now accept `hashfunc` parameter
137
137
like other `from*` methods.
138
- `VerifyingKey` has `precompute` method now.
138
+ `VerifyingKey` has the `precompute` method now.
139
139
`VerifyingKey.from_public_point` may now not perform validation of public
140
- point when `validate_point=False` argument is passed to method.
140
+ point when `validate_point=False` argument is passed to the method.
141
141
`CurveFp` constructor now accepts the `h` parameter - the cofactor of the
142
- elliptic curve, it's used for selection of algorithm of public point
142
+ elliptic curve, it's used for the selection of algorithm of public point
143
143
verification.
144
144
145
145
Performance:
146
- `randrange` now will now perform much fewer calls to system random number
146
+ `randrange` now will perform much fewer calls to the system random number
147
147
generator.
148
148
`PointJacobi` introduced and used as the underlying implementation; speeds up
149
149
the library by a factor of about 20.
150
- Library has now optional dependencies on `gmpy` and `gmpy2`. When they are
151
- availbale , the elliptic curve calculations will be about 3 times faster.
150
+ The library has now optional dependencies on `gmpy` and `gmpy2`. When they are
151
+ available , the elliptic curve calculations will be about 3 times faster.
152
152
153
153
Maintenance:
154
154
expected minimum version of `six` module (1.9.0) is now specified explicitly
@@ -173,13 +173,13 @@ Make `SigningKey.sign_digest_deterministic` use default object hashfunc when
173
173
none was provided.
174
174
`encode_integer` now works for large integers.
175
175
Make `encode_oid` and `remove_object` correctly handle OBJECT IDENTIFIERs
176
- with large second subidentifier and padding in encoded subidentifiers .
176
+ with large second sub-identifier and padding in encoded sub-identifiers .
177
177
178
178
New features:
179
- Deterministic signature methods now accept `extra_entropy` parameter to further
180
- randomise the selection of `k` (the nonce) for signature, as specified in
181
- RFC6979.
182
- Recovery of public key from signature is now supported.
179
+ Deterministic signature methods now accept the `extra_entropy` parameter to
180
+ further randomise the selection of `k` (the nonce) for signature, as specified
181
+ in RFC6979.
182
+ Recovery of the public key from signature is now supported.
183
183
Support for SEC1/X9.62 formatted keys, all three encodings are supported:
184
184
"uncompressed", "compressed" and "hybrid". Both string, and PEM/DER will
185
185
automatically accept them, if the size of the key matches the curve.
@@ -204,7 +204,7 @@ added.
204
204
`VerifyingKey`: `__repr__` is now supported
205
205
206
206
Deprecations:
207
- Python 2.5 is not supported any more - dead code removal.
207
+ Python 2.5 is not supported anymore - dead code removal.
208
208
`from ecdsa.keys import *` will now import only objects defined in that module.
209
209
Trying to decode a malformed point using `VerifyingKey.from_string`
210
210
will rise now the `MalformedPointError` exception (that inherits from
@@ -223,10 +223,10 @@ modular_exp: will emit `DeprecationWarning`
223
223
224
224
Hardening:
225
225
Deterministic signatures now verify that the signature won't leak private
226
- key through very unlikely selection of `k` value (the nonce).
226
+ key through a very unlikely selection of `k` value (the nonce).
227
227
Nonce bit size hiding was added (hardening against Minerva attack). Please
228
- note that it DOES NOT make library secure against side channel attacks (timing
229
- attacks).
228
+ note that it DOES NOT make the library secure against side- channel attacks
229
+ (timing attacks).
230
230
231
231
Performance:
232
232
The public key in key generation is not verified twice now, making key
@@ -311,14 +311,15 @@ hashfunc=sha256 in each time they call sign() or verify().
311
311
312
312
Fix test failure against OpenSSL-1.0.0 (previous versions only worked against
313
313
openssl-0.9.8 or earlier). Increase python requirement to py2.5 or later
314
- (still no py3 compatibility, but work is underway). Replace use of obsolete
314
+ (still no py3 compatibility, but work is underway). Replace the use of obsolete
315
315
'sha' library with modern 'hashlib'. Clean up unit test runner (stop using
316
316
subprocesses).
317
317
318
318
* Release 0.6 (15 Oct 2010)
319
319
320
- Small packaging changes: extract version number from git, add 'setup.py test'
321
- command, set exit code correctly on test failure. Fix pyflakes warnings.
320
+ Small packaging changes: extract the version number from git, add
321
+ 'setup.py test' command, set exit code correctly on test failure. Fix pyflakes
322
+ warnings.
322
323
323
324
* Release 0.5 (27 Apr 2010)
324
325
0 commit comments