* The minimum cryptography version is now 2.1.4. * Fixed various memory leaks * Various fuzz fixes * See CHANGELOG.rst OBS-URL: https://build.opensuse.org/package/show/devel:languages:python/python-pyOpenSSL?expand=0&rev=43
283 lines
13 KiB
Plaintext
283 lines
13 KiB
Plaintext
-------------------------------------------------------------------
|
||
Fri Feb 2 11:36:18 UTC 2018 - tchvatal@suse.com
|
||
|
||
- Update to 17.5.0:
|
||
* The minimum cryptography version is now 2.1.4.
|
||
* Fixed various memory leaks
|
||
* Various fuzz fixes
|
||
* See CHANGELOG.rst
|
||
|
||
-------------------------------------------------------------------
|
||
Wed Aug 23 05:26:31 UTC 2017 - tbechtold@suse.com
|
||
|
||
- update to 17.2.0:
|
||
- Deprecated ``OpenSSL.rand`` - callers should use ``os.urandom()`` instead.
|
||
- Fixed a bug causing ``Context.set_default_verify_paths()`` to not work with
|
||
cryptography ``manylinux1`` wheels on Python 3.x.
|
||
- Fixed a crash with (EC)DSA signatures in some cases.
|
||
- Removed the deprecated ``OpenSSL.rand.egd()`` function.
|
||
Applications should prefer ``os.urandom()`` for random number generation.
|
||
- Removed the deprecated default ``digest`` argument to ``OpenSSL.crypto.CRL.export()``.
|
||
Callers must now always pass an explicit ``digest``.
|
||
- Fixed a bug with ``ASN1_TIME`` casting in ``X509.set_notBefore()``,
|
||
``X509.set_notAfter()``, ``Revoked.set_rev_date()``, ``Revoked.set_nextUpdate()``,
|
||
and ``Revoked.set_lastUpdate()``. You must now pass times in the form
|
||
``YYYYMMDDhhmmssZ``. ``YYYYMMDDhhmmss+hhmm`` and ``YYYYMMDDhhmmss-hhmm``
|
||
will no longer work. `#612 <https://github.com/pyca/pyopenssl/pull/612>`_
|
||
- Deprecated the legacy "Type" aliases: ``ContextType``, ``ConnectionType``,
|
||
``PKeyType``, ``X509NameType``, ``X509ExtensionType``, ``X509ReqType``,
|
||
``X509Type``, ``X509StoreType``, ``CRLType``, ``PKCS7Type``, ``PKCS12Type``,
|
||
``NetscapeSPKIType``.
|
||
The names without the "Type"-suffix should be used instead.
|
||
- Added ``OpenSSL.crypto.X509.from_cryptography()`` and ``OpenSSL.crypto.X509.to_cryptography()``
|
||
for converting X.509 certificate to and from pyca/cryptography objects.
|
||
- Added ``OpenSSL.crypto.X509Req.from_cryptography()``, ``OpenSSL.crypto.X509Req.to_cryptography()``,
|
||
``OpenSSL.crypto.CRL.from_cryptography()``, and ``OpenSSL.crypto.CRL.to_cryptography()``
|
||
for converting X.509 CSRs and CRLs to and from pyca/cryptography objects.
|
||
- Added ``OpenSSL.debug`` that allows to get an overview of used library versions
|
||
(including linked OpenSSL) and other useful runtime information using
|
||
``python -m OpenSSL.debug``.
|
||
- Added a fallback path to ``Context.set_default_verify_paths()`` to accommodate
|
||
the upcoming release of ``cryptography`` ``manylinux1`` wheels.
|
||
- Drop python-pyOpenSSL=replace-expired-cert.patch . Applied upstream.
|
||
- Drop python-pyOpenSSL-always-overflow.patch. Applied upstream.
|
||
|
||
-------------------------------------------------------------------
|
||
Thu Aug 10 11:38:17 CEST 2017 - ro@suse.de
|
||
|
||
- add patch to always trigger overflow in the testsuite
|
||
(gh#pyca/pyopenssl#657) b3460c6a9a45a016d1ab65c149c606fa3f07096d
|
||
|
||
python-pyOpenSSL-always-overflow.patch
|
||
|
||
-------------------------------------------------------------------
|
||
Tue Jun 13 07:05:41 UTC 2017 - dimstar@opensuse.org
|
||
|
||
- Add python-pyOpenSSL=replace-expired-cert.patch: the root cert
|
||
expired, mking the test suite fail. Replace the certificate with
|
||
a new one, valid for 20 years (gh#pyca/pyopenssl#637).
|
||
|
||
-------------------------------------------------------------------
|
||
Fri May 5 21:32:55 UTC 2017 - toddrme2178@gmail.com
|
||
|
||
- Fix Provides/Obsoletes.
|
||
|
||
-------------------------------------------------------------------
|
||
Wed Apr 26 14:20:27 UTC 2017 - toddrme2178@gmail.com
|
||
|
||
- Implement single-spec version
|
||
- Fix source URL
|
||
- Update to 17.0.0
|
||
* Added ``OpenSSL.X509Store.set_time()`` to set a custom
|
||
verification time when verifying certificate chains.
|
||
* Added a collection of functions for working with OCSP stapling.
|
||
None of these functions make it possible to validate OCSP
|
||
assertions, only to staple them into the handshake and to
|
||
retrieve the stapled assertion if provided.
|
||
Users will need to write their own code to handle OCSP
|
||
assertions.
|
||
We specifically added: ``Context.set_ocsp_server_callback``,
|
||
``Context.set_ocsp_client_callback``, and
|
||
``Connection.request_ocsp``.
|
||
* Changed the ``SSL`` module's memory allocation policy to
|
||
avoid zeroing memory it allocates when unnecessary.
|
||
This reduces CPU usage and memory allocation time by an amount
|
||
proportional to the size of the allocation.
|
||
For applications that process a lot of TLS data or that use
|
||
very lage allocations this can provide considerable performance
|
||
improvements.
|
||
* Automatically set ``SSL_CTX_set_ecdh_auto()`` on
|
||
``OpenSSL.SSL.Context``.
|
||
- Fix empty exceptions from ``OpenSSL.crypto.load_privatekey()``.
|
||
- Rebase bug-lp-1265482.diff
|
||
- Rebase rsa128-i586.patch
|
||
- Rebase skip-networked-test.patch
|
||
|
||
-------------------------------------------------------------------
|
||
Wed Nov 16 07:46:25 UTC 2016 - dmueller@suse.com
|
||
|
||
- fix source url
|
||
|
||
-------------------------------------------------------------------
|
||
Tue Nov 15 09:39:09 UTC 2016 - mlin@suse.com
|
||
|
||
- Change source url to pypi.io
|
||
* version 16.2.0 source tarball failed to download from pypi.python.org
|
||
|
||
-------------------------------------------------------------------
|
||
Mon Nov 14 08:46:18 UTC 2016 - mlin@suse.com
|
||
|
||
- Update to 16.2.0
|
||
* Deprecations
|
||
** Dropped support for OpenSSL 0.9.8.
|
||
* Changes
|
||
** Fix memory leak in OpenSSL.crypto.dump_privatekey() with FILETYPE_TEXT. #496
|
||
** Enable use of CRL (and more) in verify context. #483
|
||
** OpenSSL.crypto.PKey can now be constructed from cryptography objects and also
|
||
exported as such. #439
|
||
** Support newer versions of cryptography which use opaque structs for OpenSSL
|
||
1.1.0 compatibility.
|
||
** Fixed compatibility errors with OpenSSL 1.1.0.
|
||
** Fixed an issue that caused failures with subinterpreters and embedded Pythons.
|
||
#552
|
||
|
||
-------------------------------------------------------------------
|
||
Mon May 16 15:29:16 UTC 2016 - jmatejek@suse.com
|
||
|
||
- added %check section with testsuite
|
||
- skip-networked-test.patch - mark a test as networked so that we can
|
||
specify non-network test run
|
||
- rsa128-i586.patch - sidestep a crasher bug on 32bit platforms
|
||
by generating reasonably-sized RSA keys instead of small 128bit ones
|
||
|
||
-------------------------------------------------------------------
|
||
Mon May 9 09:54:12 UTC 2016 - hpj@urpla.net
|
||
|
||
- update to 16.0.0
|
||
Backward-incompatible changes:
|
||
* Python 3.2 support has been dropped. It never had significant real world
|
||
usage and has been dropped by our main dependency cryptography. Affected
|
||
users should upgrade to Python 3.3 or later.
|
||
Deprecations:
|
||
* The support for EGD has been removed. The only affected function
|
||
OpenSSL.rand.egd() now uses os.urandom() to seed the internal PRNG instead.
|
||
Please see pyca/cryptography#1636 for more background information on this
|
||
decision. In accordance with our backward compatibility policy
|
||
OpenSSL.rand.egd() will be removed no sooner than a year from the release of
|
||
16.0.0.
|
||
* Please note that you should use urandom for all your secure random number
|
||
needs.
|
||
* Python 2.6 support has been deprecated. Our main dependency cryptography
|
||
deprecated 2.6 in version 0.9 (2015-05-14) with no time table for actually
|
||
dropping it. pyOpenSSL will drop Python 2.6 support once cryptography does.
|
||
Changes:
|
||
* Fixed OpenSSL.SSL.Context.set_session_id, OpenSSL.SSL.Connection.renegotiate,
|
||
OpenSSL.SSL.Connection.renegotiate_pending, and
|
||
OpenSSL.SSL.Context.load_client_ca. They were lacking an implementation since
|
||
0.14. #422
|
||
* Fixed segmentation fault when using keys larger than 4096-bit to sign data.
|
||
#428
|
||
* Fixed AttributeError when OpenSSL.SSL.Connection.get_app_data() was called
|
||
before setting any app data. #304
|
||
* Added OpenSSL.crypto.dump_publickey() to dump OpenSSL.crypto.PKey objects
|
||
that represent public keys, and OpenSSL.crypto.load_publickey() to load such
|
||
objects from serialized representations. #382
|
||
* Added OpenSSL.crypto.dump_crl() to dump a certificate revocation list out to
|
||
a string buffer. #368
|
||
* Added OpenSSL.SSL.Connection.get_state_string() using the OpenSSL binding
|
||
state_string_long. #358
|
||
* Added support for the socket.MSG_PEEK flag to OpenSSL.SSL.Connection.recv()
|
||
and OpenSSL.SSL.Connection.recv_into(). #294
|
||
* Added OpenSSL.SSL.Connection.get_protocol_version() and
|
||
OpenSSL.SSL.Connection.get_protocol_version_name(). #244
|
||
* Switched to utf8string mask by default. OpenSSL formerly defaulted to a
|
||
T61String if there were UTF-8 characters present. This was changed to
|
||
default to UTF8String in the config around 2005, but the actual code didn’t
|
||
change it until late last year. This will default us to the setting that
|
||
actually works. To revert this you can call
|
||
OpenSSL.crypto._lib.ASN1_STRING_set_default_mask_asc(b"default"). #234
|
||
|
||
- fixed paths in bug-lp-1265482.diff
|
||
- fixed doc generation
|
||
- spec clean up
|
||
|
||
-------------------------------------------------------------------
|
||
Tue Jul 14 13:07:00 UTC 2015 - toddrme2178@gmail.com
|
||
|
||
- Fix building on SLES 11
|
||
|
||
-------------------------------------------------------------------
|
||
Wed Apr 22 09:50:09 UTC 2015 - mcihar@suse.cz
|
||
|
||
- Do not hardcode version in file list
|
||
|
||
-------------------------------------------------------------------
|
||
Wed Apr 22 09:42:53 UTC 2015 - mcihar@suse.cz
|
||
|
||
- udapte to 0.15.1
|
||
* OpenSSL/SSL.py, OpenSSL/test/test_ssl.py: Fix a regression
|
||
present in 0.15, where when an error occurs and no errno() is set,
|
||
a KeyError is raised. This happens, for example, if
|
||
Connection.shutdown() is called when the underlying transport has
|
||
gone away.
|
||
* OpenSSL/rand.py, OpenSSL/SSL.py: APIs which previously accepted
|
||
filenames only as bytes now accept them as either bytes or
|
||
unicode (and respect sys.getfilesystemencoding()).
|
||
* OpenSSL/SSL.py: Add Cory Benfield's next-protocol-negotiation
|
||
(NPN) bindings.
|
||
* OpenSSL/SSL.py: Add ``Connection.recv_into``, mirroring the
|
||
builtin ``socket.recv_into``. Based on work from Cory Benfield.
|
||
* OpenSSL/test/test_ssl.py: Add tests for ``recv_into``.
|
||
* OpenSSL/crypto.py: Expose ``X509StoreContext`` for verifying certificates.
|
||
* OpenSSL/test/test_crypto.py: Add intermediate certificates for
|
||
* OpenSSL/SSL.py: ``Connection.shutdown`` now propagates errors from the
|
||
underlying socket.
|
||
* OpenSSL/SSL.py: Fixed a regression ``Context.check_privatekey``
|
||
causing it to always succeed - even if it should fail.
|
||
* OpenSSL/crypto.py: Fixed a regression where calling ``load_pkcs7_data``
|
||
with ``FILETYPE_ASN1`` would fail with a ``NameError``.
|
||
* OpenSSL/SSL.py: Fix a regression in which the first argument of
|
||
|
||
-------------------------------------------------------------------
|
||
Mon Feb 24 12:58:58 UTC 2014 - mvyskocil@suse.com
|
||
|
||
- update to 0.14
|
||
* Support for TLSv1.1 and TLSv1.2
|
||
* First-class support for PyPy
|
||
* New flags, such as MODE_RELEASE_BUFFERS and OP_NO_COMPRESSION
|
||
* Some APIs to access to the SSL session cache
|
||
* A variety of bug fixes for error handling cases
|
||
* Documentation has been converted from LaTeX
|
||
+ python-pyOpenSSL-doc is now build from single spec file
|
||
* pyOpenSSL now depends on cryptography, so it became pure-python
|
||
module
|
||
+ changed to noarch package, add proper dependencies
|
||
* Development moved to github
|
||
+ changed Url tag respectivelly
|
||
- refreshed bug-lp-1265482.diff
|
||
|
||
-------------------------------------------------------------------
|
||
Thu Jan 2 11:17:23 UTC 2014 - dmueller@suse.com
|
||
|
||
-Add bug-lp-1265482.diff; fix testsuite for SLE11 (bnc#855666)
|
||
|
||
-------------------------------------------------------------------
|
||
Fri Sep 13 14:02:43 UTC 2013 - jmatejek@suse.com
|
||
|
||
- update to 0.13.1
|
||
* fixes NUL byte handling in subjectAltName (bnc#839107, CVE-2013-4314)
|
||
|
||
-------------------------------------------------------------------
|
||
Fri Apr 5 07:54:12 UTC 2013 - speilicke@suse.com
|
||
|
||
- Package LICENSE
|
||
|
||
-------------------------------------------------------------------
|
||
Mon Jul 9 18:34:08 PDT 2012 - msuman@opensuse.org
|
||
|
||
- Update to version 0.13
|
||
* Add OPENSSL_VERSION_NUMBER, SSLeay_version and related
|
||
constants for retrieving version information about the
|
||
underlying OpenSSL library.
|
||
* Support OpenSSL 1.0.0a and related changes.
|
||
* Remove SSLv2 support if the underlying OpenSSL library does
|
||
not provide it.
|
||
* Add a new method to the X509 type, get_signature_algorithm.
|
||
* Add a new method to the Connection type, get_peer_cert_chain.
|
||
* Add the PKey.check method to verify the internal consistency
|
||
of a PKey instance.
|
||
* Bug fixes.
|
||
|
||
-------------------------------------------------------------------
|
||
Thu Sep 1 08:48:23 UTC 2011 - saschpe@suse.de
|
||
|
||
- Changed license to Apache-2.0, to fix bnc#715423
|
||
|
||
-------------------------------------------------------------------
|
||
Wed Aug 31 14:21:58 UTC 2011 - saschpe@suse.de
|
||
|
||
- Initial version, obsoletes 'python-openssl':
|
||
* Builds properly on all SUSE version
|
||
* Has real HTML documentation
|
||
|