CHANGELOG 9.5 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371
  1. 1.8.1
  2. - Update publicKeyDER to support exponent of any byte length
  3. - Add SHA3 variants for RSA signature verification
  4. - Throw error on unsupported calls, rather than call fatalError
  5. - Update PKCS7 padding logic
  6. - Add SDK Privacy Manifest - PrivacyInfo.xcprivacy
  7. 1.8.0
  8. - Add XChaCha20 and XChaCha20-Poly1305 (@zssz)
  9. 1.7.2
  10. - Validate RSA input values
  11. - Minor updates
  12. 1.7.1
  13. - Address Swift 5.8 warnings
  14. 1.7.0
  15. - Fix compilation warnings
  16. - Ignore unknown character for base64 decoding
  17. - Bump minimum targets (for Xcode)
  18. - Xcode project disable bitcode (Building with bitcode is deprecated)
  19. 1.6.0
  20. - Improve & extend RSA support with DER (see README for details)
  21. - Fix Blowfish memory leaks
  22. - Fix PCBC mode
  23. - SwiftWasm compatibility
  24. 1.5.1
  25. - Resolve type name clash by renaming BigInt -> BigInteger
  26. 1.5.0
  27. - RSA (@NathanFallet)
  28. - Workaround for Xcode 13.3.1
  29. 1.4.3
  30. - Fix PCBC mode.
  31. 1.4.2
  32. - Update Xcode project to Xcode 13
  33. - Add SHA3 support for HMAC
  34. - Update HMAC.Variant API (deprecate current cases)
  35. 1.4.1
  36. - Introduce ISO 10126 padding
  37. - fix various compiler warnings
  38. - Revert Xcode project deployment target
  39. 1.4.0
  40. - Customize CFB segment size (cfb8, cfb128).
  41. - Adapt Swift @inlineable for better code optimization
  42. 1.3.8
  43. - Revert xcframework revolution. Back to build from sources. (I'm sorry)
  44. 1.3.7
  45. - Re-release to workaround Swift Package Manager release
  46. 1.3.6
  47. - Fix macOS binary
  48. - Windows support
  49. 1.3.5
  50. - Re-release binary framework due to codesign issue
  51. 1.3.4
  52. - Distribute optimized binary (xcframework) via SPM for apple platforms
  53. 1.3.3
  54. - Adds OCB Authenticated-Encryption Algorithm (RFC7253)
  55. - build-framework.sh output CryptoSwift.xcframework
  56. - Xcode 12.2 maintenance updates
  57. - Removed CryptoSwift.playground (couldn't make it work since Xcode 12 update)
  58. 1.3.2
  59. - Swift 5.3 update (Xcode 12)
  60. - Bump target platform (iOS 9, macOS 10.12)
  61. - Allow CMAC with any Cipher
  62. - Remove CMAC key limit
  63. 1.3.1
  64. - Fix tests
  65. - Swift 5.2 update
  66. - Address possible timing issue
  67. 1.3.0
  68. - Adds ISO-78164 padding
  69. - Performance improvements
  70. - Swift 5.1 update
  71. 1.2.0
  72. - Performance improvements
  73. - Workaround Xcode test builds with Xcode 11
  74. 1.1.3
  75. - Fix build crash: https://bugs.swift.org/browse/SR-11630
  76. - Fixes Xcode project tests build
  77. - SwiftFormat all the things
  78. - Increase/fix SHA2 data length for big input by use Int64 for calculation
  79. 1.1.2
  80. - Fix Swift 5.0 build (for real this time)
  81. 1.1.1
  82. - Fix Swift 5.0 build
  83. 1.1.0
  84. - Replace RandomBytesSequence with Swift.RandomNumberGenerator
  85. - Fix CBC-MAC
  86. - Update SPM support
  87. - Update for Xcode 11 and Swift 5.1
  88. - Xcode: BUILD_LIBRARY_FOR_DISTRIBUTION = YES
  89. 1.0.0
  90. - Swift 5
  91. - Let's
  92. - Celebrate
  93. - This
  94. - Event
  95. - With
  96. - 1.0.0 release
  97. - After
  98. - 4 years
  99. - Thank you
  100. 0.15.0
  101. - Adds The scrypt Password-Based Key Derivation Function (https://tools.ietf.org/html/rfc7914)
  102. - Minor improvements
  103. 0.14.0
  104. - Fixed decryption of AES-GCM ciphertexts with custom tag length
  105. 0.13.1
  106. - Adds AES-GCM tag length configuration.
  107. - Fixes count check for initializing UInt64 from Data.
  108. 0.13.0
  109. - Adds CBC-MAC authenticator.
  110. - Adds AES-CCM operation mode.
  111. 0.12.0
  112. - Swift 4.2 maintenance update.
  113. 0.11.0
  114. - API: Cryptor.seek() is throwable
  115. - Adds proper stream support for CTR encryption with Updaptable interface.
  116. - Refactor internals for the stream cipher modes.
  117. - Set minimum deployment target to 8.0 (again).
  118. 0.10.0
  119. - API: BlockMode is no longer an enum. Please migrate to eg. CBC() etc...
  120. - Adds AES-GCM support. #97 - Feature sponsored by GesundheitsCloud (http://www.gesundheitscloud.de/)
  121. - Adds CRC32c support.
  122. - Improves AES variant validation.
  123. - Fixes empty password in PBKDF2.
  124. 0.9.0
  125. - Swift 4.1 compatibility
  126. - Added CMAC message authenticator https://tools.ietf.org/html/rfc4493
  127. - Added AEADChaCha20Poly1305 (AEAD_CHACHA20_POLY1305) https://tools.ietf.org/html/rfc7539#section-2.8.1
  128. 0.8.3
  129. - Fixes SHA3 padding.
  130. - Fixes Carthage builds.
  131. 0.8.2
  132. - Fixes SHA3 partial updates calculations.
  133. - Makes ChaCha20 processing faster again.
  134. 0.8.1
  135. - Adds Data(hex:) helper.
  136. - Adds HKDF (HMAC-based Extract-and-Expand Key Derivation Function)
  137. - Prevent ChaCha overflow error
  138. 0.8.0
  139. - Adds SHA3 Keccak variants
  140. - Adds String.bytes helper to convert String to array of bytes
  141. - Improves AES performance
  142. - Speeds up compilation times with Swift 4
  143. - Fixes: Blowfish minimum key size is 5
  144. - Removes Ciphers "iv" parameter (value moved to BlockMode)
  145. - BlockMode uses associated value for IV value where apply e.g. .CBC(iv: ivbytes)
  146. - Refactors internal hacks no longer needed with Swift 4
  147. 0.7.2
  148. - Adds Padding enum (.pkcs5, .pkcs7, .noPadding, .zeroPadding)
  149. - Removes Generics from the public API.
  150. - Slightly improves SHA1, SHA2, SHA3 performance.
  151. - Update SPM configuration for Swift 4
  152. 0.7.1
  153. - Swift 4.0 compatibility release
  154. 0.7.0
  155. - Swift 3.2 compatibility release
  156. 0.6.9
  157. - Fixed padding issue where padding was not properly added in CTR mode.
  158. - Fixed thrown error on decrypting empty string,
  159. - Fixed CI build script.
  160. - Added String.encryptToBase64()
  161. 0.6.8
  162. - Speed up MD5()
  163. - Faster Array(hex:)
  164. - Improve AES performance
  165. - Fix tvOS bitcode
  166. - Fix Blowfish CFB, OFB, CTR block modes.
  167. - Fix Blowfish for 32-bit arch.
  168. - Fix ChaCha20 preconditions
  169. 0.6.7
  170. - Release for Xcode 8.2
  171. - Fix playground example
  172. 0.6.6
  173. - Rework ChaCha20
  174. - Fix Poly1305
  175. 0.6.5
  176. - Significant performance improvement when processing lange amount of data.
  177. - Degeneric functions and change Sequence -> Collection in generic constraints.
  178. 0.6.4
  179. - More performance improvements
  180. - Add convenient Digest.sha2(bytes:variant)
  181. - New: Blowfish cipher
  182. 0.6.3
  183. - Hotfix release
  184. - Fixes bitPadding() that breaks Digests calculations, introduced in 0.6.2
  185. 0.6.2
  186. - SHA performance improvements by using less Swift in Swift
  187. - Fix public access to all digests classes
  188. 0.6.1
  189. - Update tests.
  190. - New: RandomBytesSequence urandom values on Linux.
  191. - Throw appropriate error for AES with invalid input where padding is needed.
  192. - Improve performance, especially to SHA-1, SHA-2, PBKDF and related.
  193. - Set deployment targets for all platform. Fixes Carthage builds.
  194. - New: SHA-3 implementation (request #291)
  195. - SHA-1 conforms to Updatable protocol and may be calculated incrementally.
  196. - SHA-2 conforms to Updatable protocol and may be calculated incrementally.
  197. 0.6.0
  198. - Remove bridge() workaround for Linux (not needed)
  199. - make MD5() public
  200. - Update README
  201. - Convenience HMAC initializer for String input
  202. 0.6.0-beta2
  203. - SHA-2 fix #319
  204. - HashProtocol -> Digest and refactor
  205. - MD5 conforms to Updatable protocol and may be calculated incrementally
  206. - Cipher protocol accepts Collection input now
  207. 0.6.0-beta1
  208. - Swift 3 compatibility
  209. - Multiplatform, Single-scheme Xcode Project
  210. - Swift Package Manager fully supported (build and tests)
  211. - Improved Linux support
  212. - Travis configuration added
  213. - Public interface tests added
  214. - enum Authenticator -> protocol Authenticator
  215. - CRC -> Checksum
  216. - String.encrypt() returns hex string instead of Array<UInt8>
  217. - removed String.decrypt()
  218. - enum Hash -> struct Hash
  219. - Convenience initializer of Array of bytes with Hex string. Array<UInt8>(hex: "0xb1b1b2b2")
  220. - Fix reusability of ChaCha20 instance
  221. - Replace optional initializers with throwable initializers
  222. - Allow to set initial counter explicitly (AES block modes). RandomAccessCryptor.seek()
  223. 0.5.2
  224. - Fix AES-CTR incremental updates. #287
  225. - Fixed PBKDF2 tests. #295
  226. - Fixed assertion check in PKCS7. #288
  227. - Updatable protocol accept SequenceType in place of Array
  228. 0.5.1
  229. - Fixed PBKDF2 not taking key length parameter into account
  230. - Switch to Array<> in code
  231. 0.5
  232. - Added PBKDF1 https://tools.ietf.org/html/rfc2898#section-5.1
  233. - Added PBKDF2 https://tools.ietf.org/html/rfc2898#section-5.2
  234. - UpdatableCryptor protocol allows incremental encryption stream of data
  235. - CryptoSwift.playground
  236. - Docs update
  237. - Added reflection control to CRC-32 (Luís Silva)
  238. - Fix AES.init() (Pascal Pfiffner)
  239. 0.4.1
  240. - fix NoPadding()
  241. 0.4
  242. - Padding setup is now part of cipher constructor
  243. - Added PBKDF2 http://tools.ietf.org/html/rfc2898#section-5.2
  244. - Add BlockCipher protocol
  245. - Rename Cipher -> CipherProtocol
  246. - Remove build-frameworks.sh script
  247. - Keep sensitive data in memory with SecureBytes
  248. - Allows direct use of HMAC and Poly1305
  249. - README update
  250. - Fix missing Foundation import on Linux
  251. 0.3.1
  252. - replace deprecated Bit with new enum.
  253. 0.3
  254. - Swift 2.2 support
  255. - use generators for cipher block modes should reduce memory overload.
  256. - add OFB block mode
  257. - add PCBC block mode
  258. - String.decryptBase64ToString to decrypt Base64 encoded strings
  259. - broke up complicated expressions which were taking ages to compile
  260. 0.2.3
  261. - enable bitcode setting for Debug on an Apple TV
  262. - faster compilation times
  263. - improve padding functions
  264. 0.2.2
  265. - Fix ChaCha20 cipher
  266. - Replace for(;;) with for-in
  267. - Workaround for "NSString are not yet implicitly convertible to String" on Linux
  268. 0.2.1
  269. - Fix linux build
  270. - re-add umbrella header
  271. 0.2
  272. - Rabbit cipher (RFC4503)
  273. - Linux Swift support
  274. - Swift Package Manager support
  275. - tvOS support
  276. - Add optional seed to CRC
  277. - Add umbrella header (CryptoSwift.h)
  278. - Fix AES in CTR mode
  279. - Fix no padding support for CTR and CFB block modes
  280. - Fix access to AES.Error and ChaCha20.Error
  281. 0.1.1
  282. - Fix Cococapods package (missing Foundation integration)
  283. 0.1.0
  284. - Major performance improvements.
  285. - Transition from Optionals to throw error.
  286. - Replace enum Cipher with protocol for ciphers.
  287. - Added CRC16
  288. - Fixed AES CFB decryption
  289. - Drop internal "Foundation" dependency, nonetheless it is supported as usual.
  290. 0.0.16
  291. - Critical fix for private "md5" selector issue (#135)
  292. 0.0.15
  293. - Fix 32-bit CTR block mode
  294. - Carthage support update
  295. - Mark as App-Extension-Safe API
  296. 0.0.14
  297. - hexString -> toHextString() #105
  298. - CTR (Counter mode)
  299. - Hex string is lowercase now
  300. - Carthage support
  301. - Tests update
  302. - Swift 2.0 support - overall update