- Add crypto in topics to pubspec.yaml (PR #237)
- remove unnecessary ! operator from some files (PR #236)
- Update minimum SDK version to 3.2.0 (PR #231)
- Add dart2wasm support (PR #225)
- Support the latest version of
package:js
. (PR #220) - Require Dart v3.0 (PR #220)
- Support parsing of nested objects with indefinite lengths (PR #215)
- PSSSigner requires only salt length to verify signature
- Removed duplicate oids
- Fix linter warnings
- Added new oids
- Added RC2
- Added RC4
- Added 3DES
- Added PKCS5S1ParameterGenerator
- Added PKCS12ParametersGenerator
- Added new OIDs
- Added new ASN1 models
- EAX
- Linting
- Fix to BasePadding
- Added OIDs 2.16.840.1.114412.1.1/digiCertOVCert and
- 2.23.140.1.2.2/organization-validated
- Added OID 2.5.4.26/registeredAddress
- Support ASN1 tag 164
- Added ECDH Basic Agreement
- Added ConcatKDF
- Added secp521r1 OID
- Added ASN1BMPString
- Added emailAddress OID
- RSAES-OAEP with SHA256 or any digest instance.
- Fixed bug in Keccak when updating with single bytes.
- Security update, fixed timing leaking in GCM implementation.
- Fixed bug in GCM counter.
- Added constant time gated xor.
- Removed more references to AESFastEngine.
- Security update, AESFastEngine is open to timing attacks, this has been deprecated and replaced with AESEngine.
- validateMac in BaseAEADBlockCipher is now constant time.
- Security update, fixed timing leaking in GCM implementation.
- Fixed bug in GCM counter.
- Added constant time gated xor.
- Removed more references to AESFastEngine.
- Security update, AESFastEngine is open to timing attacks, this has been deprecated and replaced with AESEngine.
- validateMac in BaseAEADBlockCipher is now constant time.
- New OID
- Performance update to scrypt
- SM3 implementation
- Argon2 in js environments.
- New OIDs
- Update to Register64 mul(...)
- New OID
- ECElGamal Encryptor and Decryptor
- Better ASN1 Dump
- New OIDs
- ASN1 Fixes
-
Extended platform detection to supply entropy source, this works on nodejs.
-
Critical fix to the examples:
Where,
xxx.nextInt(255)
is used.Must be replaced with either
.nextInt(256)
or alternatively use:Platform.instance.platformEntropySource().getBytes(_how many_)
to provide the seed.
- Add Argon2
- Fix to ASN1 parsing, calculation of start position.
- Critical fixed to Blake2b and additional test vectors see #108
- Updated pubspec
- SRP support
- Readme correction
- not published
First non-nullable-by-default release
- Ports this library to non-nullable-by-default, a new feature in the Dart language
- This is a breaking change: client code (libraries and apps) will have to migrate as well to use new releases of this library.
- This library's existing APIs should not have changed functionally from Version 2.0.1; any such change should be reported at https://github.com/bcgit/pc-dart/issues
- The block cipher modes IGE and CCM were also added in this update.
- More info about migration: https://dart.dev/null-safety/migration-guide
- More info about null safety: https://dart.dev/null-safety
- not published
- not published
- Bug fix, ASN1Utils
- Removal of 'dart:io'
- RSAPrivateKey calculates the public exponent from the other values.
The previous BigInt handling functions in the util package now treat encoded BigInts as twos compliment numbers, this may cause sudden unexpected failures if a number is suddenly negative. Users are advised to review their use of decodeBigInt and encodeBigInt.
utils.dart:
- decodeBigInt is twos compliment.
- encodeBigInt is twos compliment and adds padding to preserve sign.
- encodeBigIntAsUnsigned writes the magnitude without any padding.
- decodeBigIntWithSign allows the specification of an arbitrary sign.
- Previous uses of decodeBigInt where the expectation is an unsigned integer have been updated with decodeBigIntWithSign(1, magnitude).
- No changes from 2.0.0-rc2
- Linter Fixes
- Updates to ASN1 API
- Fixed OAEPEncoding and PKCS1Encoding to use provided output offset value.
- Fixed RSA block length and offset checks in RSAEngine.processBlock.
- Fixed RSASigner.verifySignature to return false when signature is bad.
- Add HKDF support (IETF RFC 5869)
- Add Poly1305, ChaCha20, ChaCha7539, AES-GCM, SHA3, Keccak, RSA/PSS
- Add CSHAKE, SHAKE
- Fixed randomly occurring bug with OAEP decoding.
- Added NormalizedECDSASigner that wraps ECDSASigner to guarantee an ecdsa signature in lower-s form. (Enforcement on verification supported).
- Reduce copies in CBC mode.
- Linter issues fixed.
- FixedSecureRandom to use seed only once.
- ASN1 - BOOLEAN, INTEGER, BIT_STRING, OCTET_STRING, NULL, OBJECT_IDENTIFIER, ENUMERATED, UTF8_STRING, SEQUENCE, SET, PRINTABLE_STRING, IA5_STRING & UTC_TIME
- ASN1 Encoding - DER & BER
- RSA Keys - Private Key carries public key exponent, added publicExponent and privateExponent where necessary and deprecated single variable getters in for those values.
At this release the Point Castle Crypto API has been fully handed over to the Legion of the Bouncy Castle Inc. Steven Roose, it is no small thing to single headedly manage a cryptography API and your effort is rightfully respected by the Pointy Castle user base. We would like to thank you for your trust in us to carry the project forward, and we wish you all the best!
- Add non-Keccak SHA3 support
- Add CMAC support ("AES/CMAC")
- Add ISO7816-4 padding support
- Fixes in CBCBlockCipherMac and CMac
- Add Blake2b support
- Support Dart 2 and Strong Mode
- Migrate from
package:bignum.BigInteger
todart:core.BigInt
- Remove Quiver and fixnum dependency
- OAEP encoding for block ciphers
-
First Pointy Castle release.
-
Reorganised file structure.
-
Completely new Registry implementation that dynamically loads imported implementations using reflection. It is explained in this commit.
-
Migrated from unittest to test package.
- [bug 80] PaddedBlockCipher doesn't add padding when data length is a multiple of the block size. This fix introduces a BREAKING CHANGE in PaddedBlockCipher specification. Read its API documentation to know about the changes.
-
[enh 15] Implement stream cipher benchmarks.
-
[enh 64] Benchmark and optimize digests.
-
[enh 74] Make SHA-3 usable in terms of speed.
-
[bug 67] Removed some unused code.
-
[bug 68] Fix process() method of PaddedBlockCipher.
-
[bug 75] Remove a registry dependency in the Scrypt algorithm.