CHANGELOG 7.1 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262
  1. 1.1.0
  2. - Replace RandomBytesSequence with Swift.RandomNumberGenerator
  3. - Fix CBC-MAC
  4. - Update SPM support
  5. 1.0.0
  6. - Swift 5
  7. - Let's
  8. - Celebrate
  9. - This
  10. - Event
  11. - With
  12. - 1.0.0 release
  13. - After
  14. - 4 years
  15. - Thank you
  16. 0.15.0
  17. - Adds The scrypt Password-Based Key Derivation Function (https://tools.ietf.org/html/rfc7914)
  18. - Minor improvements
  19. 0.14.0
  20. - Fixed decryption of AES-GCM ciphertexts with custom tag length
  21. 0.13.1
  22. - Adds AES-GCM tag length configuration.
  23. - Fixes count check for initializing UInt64 from Data.
  24. 0.13.0
  25. - Adds CBC-MAC authenticator.
  26. - Adds AES-CCM operation mode.
  27. 0.12.0
  28. - Swift 4.2 maintenance update.
  29. 0.11.0
  30. - API: Cryptor.seek() is throwable
  31. - Adds proper stream support for CTR encryption with Updaptable interface.
  32. - Refactor internals for the stream cipher modes.
  33. - Set minimum deployment target to 8.0 (again).
  34. 0.10.0
  35. - API: BlockMode is no longer an enum. Please migrate to eg. CBC() etc...
  36. - Adds AES-GCM support. #97 - Feature sponsored by GesundheitsCloud (http://www.gesundheitscloud.de/)
  37. - Adds CRC32c support.
  38. - Improves AES variant validation.
  39. - Fixes empty password in PBKDF2.
  40. 0.9.0
  41. - Swift 4.1 compatibility
  42. - Added CMAC message authenticator https://tools.ietf.org/html/rfc4493
  43. - Added AEADChaCha20Poly1305 (AEAD_CHACHA20_POLY1305) https://tools.ietf.org/html/rfc7539#section-2.8.1
  44. 0.8.3
  45. - Fixes SHA3 padding.
  46. - Fixes Carthage builds.
  47. 0.8.2
  48. - Fixes SHA3 partial updates calculations.
  49. - Makes ChaCha20 processing faster again.
  50. 0.8.1
  51. - Adds Data(hex:) helper.
  52. - Adds HKDF (HMAC-based Extract-and-Expand Key Derivation Function)
  53. - Prevent ChaCha overflow error
  54. 0.8.0
  55. - Adds SHA3 Keccak variants
  56. - Adds String.bytes helper to convert String to array of bytes
  57. - Improves AES performance
  58. - Speeds up compilation times with Swift 4
  59. - Fixes: Blowfish minimum key size is 5
  60. - Removes Ciphers "iv" parameter (value moved to BlockMode)
  61. - BlockMode uses associated value for IV value where apply e.g. .CBC(iv: ivbytes)
  62. - Refactors internal hacks no longer needed with Swift 4
  63. 0.7.2
  64. - Adds Padding enum (.pkcs5, .pkcs7, .noPadding, .zeroPadding)
  65. - Removes Generics from the public API.
  66. - Slightly improves SHA1, SHA2, SHA3 performance.
  67. - Update SPM configuration for Swift 4
  68. 0.7.1
  69. - Swift 4.0 compatibility release
  70. 0.7.0
  71. - Swift 3.2 compatibility release
  72. 0.6.9
  73. - Fixed padding issue where padding was not properly added in CTR mode.
  74. - Fixed thrown error on decrypting empty string,
  75. - Fixed CI build script.
  76. - Added String.encryptToBase64()
  77. 0.6.8
  78. - Speed up MD5()
  79. - Faster Array(hex:)
  80. - Improve AES performance
  81. - Fix tvOS bitcode
  82. - Fix Blowfish CFB, OFB, CTR block modes.
  83. - Fix Blowfish for 32-bit arch.
  84. - Fix ChaCha20 preconditions
  85. 0.6.7
  86. - Release for Xcode 8.2
  87. - Fix playground example
  88. 0.6.6
  89. - Rework ChaCha20
  90. - Fix Poly1305
  91. 0.6.5
  92. - Significant performance improvement when processing lange amount of data.
  93. - Degeneric functions and change Sequence -> Collection in generic constraints.
  94. 0.6.4
  95. - More performance improvements
  96. - Add convenient Digest.sha2(bytes:variant)
  97. - New: Blowfish cipher
  98. 0.6.3
  99. - Hotfix release
  100. - Fixes bitPadding() that breaks Digests calculations, introduced in 0.6.2
  101. 0.6.2
  102. - SHA performance improvements by using less Swift in Swift
  103. - Fix public access to all digests classes
  104. 0.6.1
  105. - Update tests.
  106. - New: RandomBytesSequence urandom values on Linux.
  107. - Throw appropriate error for AES with invalid input where padding is needed.
  108. - Improve performance, especially to SHA-1, SHA-2, PBKDF and related.
  109. - Set deployment targets for all platform. Fixes Carthage builds.
  110. - New: SHA-3 implementation (request #291)
  111. - SHA-1 conforms to Updatable protocol and may be calculated incrementally.
  112. - SHA-2 conforms to Updatable protocol and may be calculated incrementally.
  113. 0.6.0
  114. - Remove bridge() workaround for Linux (not needed)
  115. - make MD5() public
  116. - Update README
  117. - Convenience HMAC initializer for String input
  118. 0.6.0-beta2
  119. - SHA-2 fix #319
  120. - HashProtocol -> Digest and refactor
  121. - MD5 conforms to Updatable protocol and may be calculated incrementally
  122. - Cipher protocol accepts Collection input now
  123. 0.6.0-beta1
  124. - Swift 3 compatibility
  125. - Multiplatform, Single-scheme Xcode Project
  126. - Swift Package Manager fully supported (build and tests)
  127. - Improved Linux support
  128. - Travis configuration added
  129. - Public interface tests added
  130. - enum Authenticator -> protocol Authenticator
  131. - CRC -> Checksum
  132. - String.encrypt() returns hex string instead of Array<UInt8>
  133. - removed String.decrypt()
  134. - enum Hash -> struct Hash
  135. - Convenience initializer of Array of bytes with Hex string. Array<UInt8>(hex: "0xb1b1b2b2")
  136. - Fix reusability of ChaCha20 instance
  137. - Replace optional initializers with throwable initializers
  138. - Allow to set initial counter explicitly (AES block modes). RandomAccessCryptor.seek()
  139. 0.5.2
  140. - Fix AES-CTR incremental updates. #287
  141. - Fixed PBKDF2 tests. #295
  142. - Fixed assertion check in PKCS7. #288
  143. - Updatable protocol accept SequenceType in place of Array
  144. 0.5.1
  145. - Fixed PBKDF2 not taking key length parameter into account
  146. - Switch to Array<> in code
  147. 0.5
  148. - Added PBKDF1 https://tools.ietf.org/html/rfc2898#section-5.1
  149. - Added PBKDF2 https://tools.ietf.org/html/rfc2898#section-5.2
  150. - UpdatableCryptor protocol allows incremental encryption stream of data
  151. - CryptoSwift.playground
  152. - Docs update
  153. - Added reflection control to CRC-32 (Luís Silva)
  154. - Fix AES.init() (Pascal Pfiffner)
  155. 0.4.1
  156. - fix NoPadding()
  157. 0.4
  158. - Padding setup is now part of cipher constructor
  159. - Added PBKDF2 http://tools.ietf.org/html/rfc2898#section-5.2
  160. - Add BlockCipher protocol
  161. - Rename Cipher -> CipherProtocol
  162. - Remove build-frameworks.sh script
  163. - Keep sensitive data in memory with SecureBytes
  164. - Allows direct use of HMAC and Poly1305
  165. - README update
  166. - Fix missing Foundation import on Linux
  167. 0.3.1
  168. - replace deprecated Bit with new enum.
  169. 0.3
  170. - Swift 2.2 support
  171. - use generators for cipher block modes should reduce memory overload.
  172. - add OFB block mode
  173. - add PCBC block mode
  174. - String.decryptBase64ToString to decrypt Base64 encoded strings
  175. - broke up complicated expressions which were taking ages to compile
  176. 0.2.3
  177. - enable bitcode setting for Debug on an Apple TV
  178. - faster compilation times
  179. - improve padding functions
  180. 0.2.2
  181. - Fix ChaCha20 cipher
  182. - Replace for(;;) with for-in
  183. - Workaround for "NSString are not yet implicitly convertible to String" on Linux
  184. 0.2.1
  185. - Fix linux build
  186. - re-add umbrella header
  187. 0.2
  188. - Rabbit cipher (RFC4503)
  189. - Linux Swift support
  190. - Swift Package Manager support
  191. - tvOS support
  192. - Add optional seed to CRC
  193. - Add umbrella header (CryptoSwift.h)
  194. - Fix AES in CTR mode
  195. - Fix no padding support for CTR and CFB block modes
  196. - Fix access to AES.Error and ChaCha20.Error
  197. 0.1.1
  198. - Fix Cococapods package (missing Foundation integration)
  199. 0.1.0
  200. - Major performance improvements.
  201. - Transition from Optionals to throw error.
  202. - Replace enum Cipher with protocol for ciphers.
  203. - Added CRC16
  204. - Fixed AES CFB decryption
  205. - Drop internal "Foundation" dependency, nonetheless it is supported as usual.
  206. 0.0.16
  207. - Critical fix for private "md5" selector issue (#135)
  208. 0.0.15
  209. - Fix 32-bit CTR block mode
  210. - Carthage support update
  211. - Mark as App-Extension-Safe API
  212. 0.0.14
  213. - hexString -> toHextString() #105
  214. - CTR (Counter mode)
  215. - Hex string is lowercase now
  216. - Carthage support
  217. - Tests update
  218. - Swift 2.0 support - overall update