cryptography 2.0.1 copy "cryptography: ^2.0.1" to clipboard
cryptography: ^2.0.1 copied to clipboard

outdated

Cryptographic algorithms for encryption, digital signatures, key agreement, authentication, and hashing. AES, Chacha20, ED25519, X25519, and more. Web Crypto support.

2.0.1 #

  • Documentation fixes.

2.0.0 #

  • Finishes null safety migration.

2.0.0-nullsafety.2 #

  • For ease of use and backwards compatibility with 1.x, adds SecretKey(bytes) factory that just redirects to SecretKeyData(bytes).
  • Renames a few identifiers in package:cryptography for consistency. Adds deprecation warnings to the old identifiers.
  • Some small internal fixes.
  • Improves documentation.

2.0.0-nullsafety.1 #

  • Re-introduces package:crypto as dependency now that a null-safe version exists.
  • Better documentation.

2.0.0-nullsafety.0 #

  • BREAKING CHANGES: Many breaking API changes that make the API easier to understand and use.
  • IMPORTANT FIXES: Improves tests and fixes a number of bugs we spotted. We don't plan to support the 1.x API. We highly recommend you migrate to the 2.x API.
  • The first null-safe version.

1.4.1 #

  • Improves Web Cryptography support internally.
    • The implementation is now easier to read.
    • In older browsers, the implementation fall back to pure Dart implementation if attempt to use Web Cryptography fails.
    • HMAC and HKDF are now able to use Web Cryptography.
  • Improves documentation.

1.4.0 #

  • Adds support for cryptography_flutter, which uses operating system implementations.

1.3.0 #

  • Adds PBKDF2 and Blake2b.
  • Some internal refactoring.

1.2.1 #

  • Fixes documentation issues.

1.2.0 #

  • Adds RsaPss and RsaPkcs1v15 (Web Cryptography only).
  • BREAKING CHANGE: Recently added JwkSecretKey is now EcJwkSecretKey.
  • Adds EcJwkSecretKey and EcJwkPublicKey.
  • Adds RsaJwkSecretKey and RsaJwkPublicKey.

1.1.1 #

  • Small fixes to documentation and internal declarations.

1.1.0 #

  • BREAKING CHANGE: Cipher methods encrypt / encryptSync and decrypt / decryptSync now use return type Future<Uint8List> / Uint8List instead of previous Future<List<int>> / List<int>. We return instances of Uint8List anyway and we felt it's good to expose this fact despite despite possibility that the change affects some developers. If you are affected by this, you should see compile-time type warnings.
  • Cipher has new getters nonceLengthMin and nonceLengthMax.
  • AES-GCM is supported in the VM too.
  • AES performance is improved significantly.
  • Adds JwkSecretKey.
  • BREAKING CHANGE: JwkSecretKey (instead of previous unspecified format) becomes the private key storage format for P-256/P-384/P-521. Any attempt to use the previous unspecified format will lead to errors. It's unlikely that anyone is affected by this change so we don't bump the major version.
  • SecretKey and SecretKey now have property Map<Object,Object> cachedValues, which can be used for caching objects needed for cryptographic operations (such as handles to Web Cryptography API objects).
  • Hides utils from developers.
  • Internal refactoring.
  • Better documentation.

1.0.4 #

  • Internal refactoring. Splits a number of large source files (such as Web Cryptography support) into more readable smaller files.
  • Adds VM implementation stubs for algorithms that are only supported in the browser (e.g. ecdhP256). The methods throw UnimplementedError in VM.
  • Improves Poly1305 performance.
  • Adds a few more tests.
  • Improves documentation.

1.0.3 #

  • Improves documentation.

1.0.2 #

  • Implements automatic use of Web Cryptography API when SHA1 or SHA2 is used in browsers. SHA2-512 becomes up to 100 times faster in browsers. ED25519 becomes approximately 30 times faster in browsers with the improved SHA512.
  • Better documentation and benchmarks.

1.0.1 #

  • Implements ed25519.newKeyFromSeed(seed).
  • Significantly improves ED25519 performance.
  • Small fixes in documentation.

1.0.0 #

  • A stable API.

0.3.6 #

  • Documentation fixes.

0.3.5 #

  • Adds Xchacha20 cipher.
  • When authenticated ciphers encounter incorrect MACs, they now throw MacValidationException (instead of returning null, which developers may ignore in some situations).

0.3.4 #

  • Fixes a cipher.name issue and improves documentation.

0.3.3 #

  • Improves documentation.
  • Improves outputs of cipher.name.

0.3.2 #

  • Improves documentation.

0.3.1 #

  • Improves documentation.
  • Eliminates AES-CBC and AES-CTR dependencies.

0.3.0 #

  • Breaking changes: Removes separate key generator classes. Many API changes designed to reduce chances of developers using the API incorrectly.
  • Adds HKDF and ED25519 support.
  • Adds more assertions and tests.
  • Improves documentation.

0.2.6 #

  • Fixed an issue with dependency constraints that conflict with Flutter SDK.
  • SecretKey / SecretKey property bytes is deprecated and replaced with extract() and extractSync() to better support implementations that protect the underlying bytes such as Web Cryptography API.
  • Improves documentation.

0.2.5 #

  • Adds AES for non-browser platforms.
  • Fixes various bugs and improves test coverage.

0.2.4 #

  • Improves documentation.

0.2.3 #

  • Improves documentation, clarity, test coverage.

0.2.2 #

  • Improves documentation.
  • Deprecates ConstantTimeBytesEquality in favor of constantTimeBytesEquality.

0.2.1 #

  • Improves documentation and stops exporting a few declarations.

0.2.0 #

  • Major refactoring and breaking API changes.
  • Improves in documentation.
  • Adds AES, P256/P384/P521, SHA1, Poly1305, and AEAD_Chacha20_Poly1305.

0.1.2 #

  • Improved documentation

0.1.1 #

  • Fixed example

0.1.0 #

  • Initial version
264
likes
0
pub points
97%
popularity

Publisher

verified publisherdint.dev

Cryptographic algorithms for encryption, digital signatures, key agreement, authentication, and hashing. AES, Chacha20, ED25519, X25519, and more. Web Crypto support.

Repository (GitHub)
View/report issues

License

unknown (license)

Dependencies

collection, crypto, fixnum, js, meta, typed_data

More

Packages that depend on cryptography