diff options
author | Paul Kehrer <paul.l.kehrer@gmail.com> | 2014-05-15 17:22:08 -0400 |
---|---|---|
committer | Paul Kehrer <paul.l.kehrer@gmail.com> | 2014-05-15 17:22:08 -0400 |
commit | 2a947c4a5b59e3abe0fc092a6d5f5b3e3ad00314 (patch) | |
tree | ec3fc2972a2c9797a25a977614415081dfe75fd2 | |
parent | e2876f2051e9f6e7c535e8c3aca4bbd51caa3545 (diff) | |
download | cryptography-2a947c4a5b59e3abe0fc092a6d5f5b3e3ad00314.tar.gz cryptography-2a947c4a5b59e3abe0fc092a6d5f5b3e3ad00314.tar.bz2 cryptography-2a947c4a5b59e3abe0fc092a6d5f5b3e3ad00314.zip |
add some docs and changelog
-rw-r--r-- | CHANGELOG.rst | 4 | ||||
-rw-r--r-- | docs/hazmat/primitives/symmetric-encryption.rst | 13 |
2 files changed, 17 insertions, 0 deletions
diff --git a/CHANGELOG.rst b/CHANGELOG.rst index 8a2635ed..1801f33f 100644 --- a/CHANGELOG.rst +++ b/CHANGELOG.rst @@ -7,6 +7,10 @@ Changelog .. note:: This version is not yet released and is under active development. * Added :class:`~cryptography.hazmat.primitives.HKDFExpand`. +* Added :class:`~cryptography.hazmat.primitives.ciphers.modes.CFB8` support + for :class:`~cryptography.hazmat.primitives.ciphers.algorithms.AES` and + :class:`~cryptography.hazmat.primitives.ciphers.algorithms.TripleDES` on + :doc:`/hazmat/backends/commoncrypto` and :doc:`/hazmat/backends/openssl`. 0.4 - 2014-05-03 ~~~~~~~~~~~~~~~~ diff --git a/docs/hazmat/primitives/symmetric-encryption.rst b/docs/hazmat/primitives/symmetric-encryption.rst index e5d8c65b..0e3a451c 100644 --- a/docs/hazmat/primitives/symmetric-encryption.rst +++ b/docs/hazmat/primitives/symmetric-encryption.rst @@ -275,6 +275,19 @@ Modes Must be the same number of bytes as the ``block_size`` of the cipher. Do not reuse an ``initialization_vector`` with a given ``key``. +.. class:: CFB8(initialization_vector) + + CFB (Cipher Feedback) is a mode of operation for block ciphers. It + transforms a block cipher into a stream cipher. The CFB8 variant uses an + 8-bit shift register. + + **This mode does not require padding.** + + :param bytes initialization_vector: Must be random bytes. They do not need + to be kept secret and they can be included in a transmitted message. + Must be the same number of bytes as the ``block_size`` of the cipher. + Do not reuse an ``initialization_vector`` with a given ``key``. + .. class:: GCM(initialization_vector, tag=None) .. danger:: |