Changelog for
python310-pyOpenSSL-23.0.0-1.1.noarch.rpm :
* Mon Jan 02 2023 Dirk Müller
- update to 23.0.0:
* Add ``OpenSSL.SSL.X509StoreFlags.PARTIAL_CHAIN`` constant to allow for users to perform certificate verification on partial certificate chains.
* ``cryptography`` maximum version has been increased to 39.0.x.- drop pyOpenSSL-pr1158-conditional-__all__.patch (upstream)
* Fri Oct 21 2022 Ben Greiner - Upstream post-release doc fix (gh#pyca/pyopenssl#1150)
* The minimum cryptography version is now 38.0.x (and we now pin releases against cryptography major versions to prevent future breakage)- Add pyOpenSSL-pr1158-conditional-__all__.patch gh#pyca/pyopenssl#1158
* Thu Sep 29 2022 Dirk Müller - update to 22.1.0:
* Remove support for SSLv2 and SSLv3.
* The minimum ``cryptography`` version is now 37.0.2.
* The ``OpenSSL.crypto.X509StoreContextError`` exception has been refactored, changing its internal attributes.
* Add ``OpenSSL.SSL.Connection.set_verify`` and ``OpenSSL.SSL.Connection.get_verify_mode`` to override the context object\'s verification flags.
* Add ``OpenSSL.SSL.Connection.use_certificate`` and ``OpenSSL.SSL.Connection.use_privatekey`` to set a certificate per connection (and not just per context)
* Wed Jun 01 2022 Steve Kowalik - Shift BuildRequires on openssl, it\'s only required for tests.
* Fri Feb 04 2022 Dirk Müller - update to 22.0.0: - Drop support for Python 2.7. - The minimum ``cryptography`` version is now 35.0. - Expose wrappers for some `DTLS `_ primitives.- drop check_inv_ALPN_lists.patch: upstream
* Thu Dec 09 2021 Steve Kowalik - Inject multibuild to avoid a build loop.
* Sat Oct 30 2021 Matej Cepl - Add check_inv_ALPN_lists.patch checks for invalid ALPN lists before calling OpenSSL (gh#pyca/pyopenssl#1056).
* Tue Oct 26 2021 Dirk Müller - update to 21.0.0 (bsc#1200771, jsc#SLE-24519): - The minimum ``cryptography`` version is now 3.3. - Drop support for Python 3.5 - Raise an error when an invalid ALPN value is set. - Added ``OpenSSL.SSL.Context.set_min_proto_version`` and ``OpenSSL.SSL.Context.set_max_proto_version`` - Updated ``to_cryptography`` and ``from_cryptography`` methods to support an upcoming release of ``cryptography`` without raising deprecation warnings.
* Mon Feb 01 2021 Dirk Müller - update to 20.0.1: - Fixed compatibility with OpenSSL 1.1.0.
* Tue Dec 22 2020 Matej Cepl - Adjust metadata for skip-networked-test.patch and refer to the proper upstream ticket gh#pyca/pyopenssl#68.
* Fri Dec 11 2020 Matej Cepl - According to gh#pyca/pyopenssl#684 tests must run with TZ=UTC, also skip test_verify_with_time on %ix86.
* Wed Dec 09 2020 Marcus Rueckert - Update to v20.0.0 - Backward-incompatible changes: - The minimum cryptography version is now 3.2. - Remove deprecated OpenSSL.tsafe module. - Removed deprecated OpenSSL.SSL.Context.set_npn_advertise_callback, OpenSSL.SSL.Context.set_npn_select_callback, and OpenSSL.SSL.Connection.get_next_proto_negotiated. - Drop support for Python 3.4 - Drop support for OpenSSL 1.0.1 and 1.0.2 - Deprecations: - Deprecated OpenSSL.crypto.loads_pkcs7 and OpenSSL.crypto.loads_pkcs12. - Changes: - Added a new optional chain parameter to OpenSSL.crypto.X509StoreContext() where additional untrusted certificates can be specified to help chain building. #948 - Added OpenSSL.crypto.X509Store.load_locations to set trusted certificate file bundles and/or directories for verification. [#943] - Added Context.set_keylog_callback to log key material. #910 - Added OpenSSL.SSL.Connection.get_verified_chain to retrieve the verified certificate chain of the peer. #894. - Make verification callback optional in Context.set_verify. If omitted, OpenSSL’s default verification is used. #933 - Fixed a bug that could truncate or cause a zero-length key error due to a null byte in private key passphrase in OpenSSL.crypto.load_privatekey and OpenSSL.crypto.dump_privatekey. #947- drop patch fix-compilation-2020.patch: no longer needed- refreshed patch skip-networked-test.patch
* Tue Feb 18 2020 John Vandenberg - Update to v19.1
* Removed deprecated aliases ContextType, ConnectionType, PKeyType, X509NameType, X509ReqType, X509Type, X509StoreType, CRLType, PKCS7Type, PKCS12Type, and NetscapeSPKIType. Use the classes without the ``Type`` suffix instead.
* The minimum ``cryptography`` version is now 2.8
* Deprecated ``OpenSSL.SSL.Context.set_npn_advertise_callback, OpenSSL.SSL.Context.set_npn_select_callback, and OpenSSL.SSL.Connection.get_next_proto_negotiated ALPN should be used instead.
* Support bytearray in SSL.Connection.send() by using cffi\'s from_buffer
* The OpenSSL.SSL.Context.set_alpn_select_callback can return a new NO_OVERLAPPING_PROTOCOLS sentinel value to allow a TLS handshake to complete without an application protocol.