aboutsummaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorPaul Kehrer <paul.l.kehrer@gmail.com>2014-05-15 17:22:08 -0400
committerPaul Kehrer <paul.l.kehrer@gmail.com>2014-05-15 17:22:08 -0400
commit2a947c4a5b59e3abe0fc092a6d5f5b3e3ad00314 (patch)
treeec3fc2972a2c9797a25a977614415081dfe75fd2
parente2876f2051e9f6e7c535e8c3aca4bbd51caa3545 (diff)
downloadcryptography-2a947c4a5b59e3abe0fc092a6d5f5b3e3ad00314.tar.gz
cryptography-2a947c4a5b59e3abe0fc092a6d5f5b3e3ad00314.tar.bz2
cryptography-2a947c4a5b59e3abe0fc092a6d5f5b3e3ad00314.zip
add some docs and changelog
-rw-r--r--CHANGELOG.rst4
-rw-r--r--docs/hazmat/primitives/symmetric-encryption.rst13
2 files changed, 17 insertions, 0 deletions
diff --git a/CHANGELOG.rst b/CHANGELOG.rst
index 8a2635ed..1801f33f 100644
--- a/CHANGELOG.rst
+++ b/CHANGELOG.rst
@@ -7,6 +7,10 @@ Changelog
.. note:: This version is not yet released and is under active development.
* Added :class:`~cryptography.hazmat.primitives.HKDFExpand`.
+* Added :class:`~cryptography.hazmat.primitives.ciphers.modes.CFB8` support
+ for :class:`~cryptography.hazmat.primitives.ciphers.algorithms.AES` and
+ :class:`~cryptography.hazmat.primitives.ciphers.algorithms.TripleDES` on
+ :doc:`/hazmat/backends/commoncrypto` and :doc:`/hazmat/backends/openssl`.
0.4 - 2014-05-03
~~~~~~~~~~~~~~~~
diff --git a/docs/hazmat/primitives/symmetric-encryption.rst b/docs/hazmat/primitives/symmetric-encryption.rst
index e5d8c65b..0e3a451c 100644
--- a/docs/hazmat/primitives/symmetric-encryption.rst
+++ b/docs/hazmat/primitives/symmetric-encryption.rst
@@ -275,6 +275,19 @@ Modes
Must be the same number of bytes as the ``block_size`` of the cipher.
Do not reuse an ``initialization_vector`` with a given ``key``.
+.. class:: CFB8(initialization_vector)
+
+ CFB (Cipher Feedback) is a mode of operation for block ciphers. It
+ transforms a block cipher into a stream cipher. The CFB8 variant uses an
+ 8-bit shift register.
+
+ **This mode does not require padding.**
+
+ :param bytes initialization_vector: Must be random bytes. They do not need
+ to be kept secret and they can be included in a transmitted message.
+ Must be the same number of bytes as the ``block_size`` of the cipher.
+ Do not reuse an ``initialization_vector`` with a given ``key``.
+
.. class:: GCM(initialization_vector, tag=None)
.. danger::