1
0

Accepting request 394332 from home:frispete:python

- update to 16.0.0
  Backward-incompatible changes:
  * Python 3.2 support has been dropped. It never had significant real world
    usage and has been dropped by our main dependency cryptography. Affected
    users should upgrade to Python 3.3 or later.
  Deprecations:
  * The support for EGD has been removed. The only affected function
    OpenSSL.rand.egd() now uses os.urandom() to seed the internal PRNG instead.
    Please see pyca/cryptography#1636 for more background information on this
    decision. In accordance with our backward compatibility policy
    OpenSSL.rand.egd() will be removed no sooner than a year from the release of
    16.0.0.
  * Please note that you should use urandom for all your secure random number
    needs.
  * Python 2.6 support has been deprecated. Our main dependency cryptography
    deprecated 2.6 in version 0.9 (2015-05-14) with no time table for actually
    dropping it. pyOpenSSL will drop Python 2.6 support once cryptography does.
  Changes:
  * Fixed OpenSSL.SSL.Context.set_session_id, OpenSSL.SSL.Connection.renegotiate,
    OpenSSL.SSL.Connection.renegotiate_pending, and
    OpenSSL.SSL.Context.load_client_ca. They were lacking an implementation since
    0.14. #422
  * Fixed segmentation fault when using keys larger than 4096-bit to sign data.
    #428
  * Fixed AttributeError when OpenSSL.SSL.Connection.get_app_data() was called
    before setting any app data. #304
  * Added OpenSSL.crypto.dump_publickey() to dump OpenSSL.crypto.PKey objects
    that represent public keys, and OpenSSL.crypto.load_publickey() to load such
    objects from serialized representations. #382
  * Added OpenSSL.crypto.dump_crl() to dump a certificate revocation list out to

OBS-URL: https://build.opensuse.org/request/show/394332
OBS-URL: https://build.opensuse.org/package/show/devel:languages:python/python-pyOpenSSL?expand=0&rev=33
This commit is contained in:
Jan Matejek
2016-05-16 15:28:11 +00:00
committed by Git OBS Bridge
parent c8f4792dc0
commit 74f5a4af4c
5 changed files with 62 additions and 11 deletions

View File

@@ -1,3 +1,54 @@
-------------------------------------------------------------------
Mon May 9 09:54:12 UTC 2016 - hpj@urpla.net
- update to 16.0.0
Backward-incompatible changes:
* Python 3.2 support has been dropped. It never had significant real world
usage and has been dropped by our main dependency cryptography. Affected
users should upgrade to Python 3.3 or later.
Deprecations:
* The support for EGD has been removed. The only affected function
OpenSSL.rand.egd() now uses os.urandom() to seed the internal PRNG instead.
Please see pyca/cryptography#1636 for more background information on this
decision. In accordance with our backward compatibility policy
OpenSSL.rand.egd() will be removed no sooner than a year from the release of
16.0.0.
* Please note that you should use urandom for all your secure random number
needs.
* Python 2.6 support has been deprecated. Our main dependency cryptography
deprecated 2.6 in version 0.9 (2015-05-14) with no time table for actually
dropping it. pyOpenSSL will drop Python 2.6 support once cryptography does.
Changes:
* Fixed OpenSSL.SSL.Context.set_session_id, OpenSSL.SSL.Connection.renegotiate,
OpenSSL.SSL.Connection.renegotiate_pending, and
OpenSSL.SSL.Context.load_client_ca. They were lacking an implementation since
0.14. #422
* Fixed segmentation fault when using keys larger than 4096-bit to sign data.
#428
* Fixed AttributeError when OpenSSL.SSL.Connection.get_app_data() was called
before setting any app data. #304
* Added OpenSSL.crypto.dump_publickey() to dump OpenSSL.crypto.PKey objects
that represent public keys, and OpenSSL.crypto.load_publickey() to load such
objects from serialized representations. #382
* Added OpenSSL.crypto.dump_crl() to dump a certificate revocation list out to
a string buffer. #368
* Added OpenSSL.SSL.Connection.get_state_string() using the OpenSSL binding
state_string_long. #358
* Added support for the socket.MSG_PEEK flag to OpenSSL.SSL.Connection.recv()
and OpenSSL.SSL.Connection.recv_into(). #294
* Added OpenSSL.SSL.Connection.get_protocol_version() and
OpenSSL.SSL.Connection.get_protocol_version_name(). #244
* Switched to utf8string mask by default. OpenSSL formerly defaulted to a
T61String if there were UTF-8 characters present. This was changed to
default to UTF8String in the config around 2005, but the actual code didnt
change it until late last year. This will default us to the setting that
actually works. To revert this you can call
OpenSSL.crypto._lib.ASN1_STRING_set_default_mask_asc(b"default"). #234
- fixed paths in bug-lp-1265482.diff
- fixed doc generation
- spec clean up
-------------------------------------------------------------------
Tue Jul 14 13:07:00 UTC 2015 - toddrme2178@gmail.com