Changelog for
python3-pyOpenSSL-doc-16.2.0-36.10.noarch.rpm :
Sat Oct 29 14:00:00 2016 arunAATTgmx.de
- update to version 16.2.0:
* Fixed compatibility errors with OpenSSL 1.1.0.
* Fixed an issue that caused failures with subinterpreters and
embedded Pythons. #552
Sun Sep 18 14:00:00 2016 arunAATTgmx.de
- update to version 16.1.0:
* Fix memory leak in \"OpenSSL.crypto.dump_privatekey()\" with
\"FILETYPE_TEXT\". `#496
`_
* Enable use of CRL (and more) in verify context. `#483
`_
* \"OpenSSL.crypto.PKey\" can now be constructed from \"cryptography\"
objects and also exported as such. `#439
`_
* Support newer versions of \"cryptography\" which use opaque structs
for OpenSSL 1.1.0 compatibility.
Sun May 8 14:00:00 2016 arunAATTgmx.de
- specfile:
* updated source url to files.pythonhosted.org
Sat Mar 19 13:00:00 2016 arunAATTgmx.de
- specfile:
* update copyright year
- update to version 16.0.0:
* This is the first release under full stewardship of PyCA. We have
made
*many
* changes to make local development more pleasing. The
test suite now passes both on Linux and OS X with OpenSSL 0.9.8,
1.0.1, and 1.0.2. It has been moved to `py.test
`_, all CI test runs are part of `tox
`_ and the source code has been made
fully `flake8 `_ compliant. We
hope to have lowered the barrier for contributions significantly
but are open to hear about any remaining frustrations.
* Backward-incompatible changes:
+ Python 3.2 support has been dropped. It never had significant
real world usage and has been dropped by our main dependency
\"cryptography\". Affected users should upgrade to Python 3.3 or
later.
* Deprecations:
+ The support for EGD has been removed. The only affected
function \"OpenSSL.rand.egd()\" now uses \"os.urandom()\" to seed
the internal PRNG instead. Please see `pyca/cryptography#1636
`_ for more
background information on this decision. In accordance with our
backward compatibility policy \"OpenSSL.rand.egd()\" will be
* removed
* no sooner than a year from the release of 16.0.0.
Please note that you should `use urandom
`_
for all your secure random number needs.
+ Python 2.6 support has been deprecated. Our main dependency
\"cryptography\" deprecated 2.6 in version 0.9 (2015-05-14) with
no time table for actually dropping it. pyOpenSSL will drop
Python 2.6 support once \"cryptography\" does.
* Changes:
+ Fixed \"OpenSSL.SSL.Context.set_session_id\",
\"OpenSSL.SSL.Connection.renegotiate\",
\"OpenSSL.SSL.Connection.renegotiate_pending\", and
\"OpenSSL.SSL.Context.load_client_ca\". They were lacking an
implementation since 0.14. `#422
`_
+ Fixed segmentation fault when using keys larger than 4096-bit to
sign data. `#428 `_
+ Fixed \"AttributeError\" when
\"OpenSSL.SSL.Connection.get_app_data()\" was called before
setting any app data. `#304
`_
+ Added \"OpenSSL.crypto.dump_publickey()\" to dump
\"OpenSSL.crypto.PKey\" objects that represent public keys, and
\"OpenSSL.crypto.load_publickey()\" to load such objects from
serialized representations. `#382
`_
+ Added \"OpenSSL.crypto.dump_crl()\" to dump a certificate
revocation list out to a string buffer. `#368
`_
+ Added \"OpenSSL.SSL.Connection.get_state_string()\" using the
OpenSSL binding \"state_string_long\". `#358
`_
+ Added support for the \"socket.MSG_PEEK\" flag to
\"OpenSSL.SSL.Connection.recv()\" and
\"OpenSSL.SSL.Connection.recv_into()\". `#294
`_
+ Added \"OpenSSL.SSL.Connection.get_protocol_version()\" and
\"OpenSSL.SSL.Connection.get_protocol_version_name()\". `#244
`_
+ Switched to \"utf8string\" mask by default. OpenSSL formerly
defaulted to a \"T61String\" if there were UTF-8 characters
present. This was changed to default to \"UTF8String\" in the
config around 2005, but the actual code didn\'t change it until
late last year. This will default us to the setting that
actually works. To revert this you can call
\"OpenSSL.crypto._lib.ASN1_STRING_set_default_mask_asc(b\"default\")\".
`#234 `_
Wed Apr 15 14:00:00 2015 arunAATTgmx.de
- specfile: updated README->README.rst
- update to version 0.15.1:
* OpenSSL/SSL.py, OpenSSL/test/test_ssl.py: Fix a regression present
in 0.15, where when an error occurs and no errno() is set, a
KeyError is raised. This happens, for example, if
Connection.shutdown() is called when the underlying transport has
gone away.
- changes from version 0.15:
* OpenSSL/rand.py, OpenSSL/SSL.py: APIs which previously accepted
filenames only as bytes now accept them as either bytes or unicode
(and respect sys.getfilesystemencoding()).
* OpenSSL/SSL.py: Add Cory Benfield\'s next-protocol-negotiation
(NPN) bindings.
* OpenSSL/SSL.py: Add \"Connection.recv_into\", mirroring the
builtin \"socket.recv_into\". Based on work from Cory Benfield.
* OpenSSL/test/test_ssl.py: Add tests for \"recv_into\".
* OpenSSL/crypto.py: Expose \"X509StoreContext\" for verifying
certificates.
* OpenSSL/test/test_crypto.py: Add intermediate certificates for
* OpenSSL/SSL.py: \"Connection.shutdown\" now propagates errors from
the underlying socket.
* OpenSSL/SSL.py: Fixed a regression \"Context.check_privatekey\"
causing it to always succeed - even if it should fail.
* OpenSSL/crypto.py: Fixed a regression where calling
\"load_pkcs7_data\" with \"FILETYPE_ASN1\" would fail with a
\"NameError\".
* OpenSSL/SSL.py: Fix a regression in which the first argument of
the \"verify\" callback was incorrectly passed a \"Context\"
instance instead of the \"Connection\" instance.
*
OpenSSL/test/test_ssl.py: Add a test for the value passed as the
first argument of the \"verify\" callback.
* OpenSSL/crypto.py: Based on work from Alex Gaynor, Andrew
Lutomirski, Tobias Oberstein, Laurens Van Houtven, and Hynek
Schlawack, add \"get_elliptic_curve\" and \"get_elliptic_curves\"
to support TLS ECDHE modes.
* OpenSSL/SSL.py: Add \"Context.set_tmp_ecdh\" to configure a TLS
context with a particular elliptic curve for ECDHE modes.
* OpenSSL/SSL.py: \"Connection.send\" and \"Connection.sendall\" now
also accept the \"buffer\" type as data.
* OpenSSL/crypto.py: Make \"load_pkcs12\" backwards compatible with
pyOpenSSL 0.13 by making passphrase optional.
* OpenSSL/SSL.py: Add \"get_finished\", \"get_peer_finished\"
methods to \"Connection\". If you use these methods to implement
TLS channel binding (RFC 5929) disable session resumption because
triple handshake attacks against TLS.
* OpenSSL/SSL.py: Add \"get_cipher_name\", \"get_cipher_bits\", and
\"get_cipher_version\" to \"Connection\".
* OpenSSL/tsafe.py: Replace the use of \"apply\" (which has been
removed in Python 3) with the equivalent syntax.
* OpenSSL/crypto.py: Fix memory leak in _X509_REVOKED_dup.
* leakcheck/crypto.py: Add checks for _X509_REVOKED_dup,
CRL.add_revoked and CRL.get_revoked.
* setup.py: Require cryptography 0.3 to have the ASN1_TIME_free
binding.
* OpenSSL/crypto.py: Add \"get_extensions\" method to \"X509Req\".
Fri Jan 2 13:00:00 2015 arunAATTgmx.de
- specfile:
* update copyright year
* updated url (project moved to github)
* project uses Sphinx for documentation now
* require setuptools
- update to version 0.14.0:
* Support for TLSv1.1 and TLSv1.2
* First-class support for PyPy
* New flags, such as MODE_RELEASE_BUFFERS and OP_NO_COMPRESSION
* Some APIs to access to the SSL session cache
* A variety of bug fixes for error handling cases
Sun Oct 6 14:00:00 2013 tchvatalAATTsuse.com
- Fix previous commit to really require right package.
Tue Oct 1 14:00:00 2013 speilickeAATTsuse.com
- BuildRequire texlive-babel to get access to english.tpl
Thu Aug 15 14:00:00 2013 speilickeAATTsuse.com
- Use upstream URL
Wed Jun 19 14:00:00 2013 speilickeAATTsuse.com
- Initial version