forked from pool/python-pyOpenSSL
Accepting request 394332 from home:frispete:python
- update to 16.0.0 Backward-incompatible changes: * Python 3.2 support has been dropped. It never had significant real world usage and has been dropped by our main dependency cryptography. Affected users should upgrade to Python 3.3 or later. Deprecations: * The support for EGD has been removed. The only affected function OpenSSL.rand.egd() now uses os.urandom() to seed the internal PRNG instead. Please see pyca/cryptography#1636 for more background information on this decision. In accordance with our backward compatibility policy OpenSSL.rand.egd() will be removed no sooner than a year from the release of 16.0.0. * Please note that you should use urandom for all your secure random number needs. * Python 2.6 support has been deprecated. Our main dependency cryptography deprecated 2.6 in version 0.9 (2015-05-14) with no time table for actually dropping it. pyOpenSSL will drop Python 2.6 support once cryptography does. Changes: * Fixed OpenSSL.SSL.Context.set_session_id, OpenSSL.SSL.Connection.renegotiate, OpenSSL.SSL.Connection.renegotiate_pending, and OpenSSL.SSL.Context.load_client_ca. They were lacking an implementation since 0.14. #422 * Fixed segmentation fault when using keys larger than 4096-bit to sign data. #428 * Fixed AttributeError when OpenSSL.SSL.Connection.get_app_data() was called before setting any app data. #304 * Added OpenSSL.crypto.dump_publickey() to dump OpenSSL.crypto.PKey objects that represent public keys, and OpenSSL.crypto.load_publickey() to load such objects from serialized representations. #382 * Added OpenSSL.crypto.dump_crl() to dump a certificate revocation list out to OBS-URL: https://build.opensuse.org/request/show/394332 OBS-URL: https://build.opensuse.org/package/show/devel:languages:python/python-pyOpenSSL?expand=0&rev=33
This commit is contained in:
committed by
Git OBS Bridge
parent
c8f4792dc0
commit
74f5a4af4c
@@ -1,3 +1,54 @@
|
||||
-------------------------------------------------------------------
|
||||
Mon May 9 09:54:12 UTC 2016 - hpj@urpla.net
|
||||
|
||||
- update to 16.0.0
|
||||
Backward-incompatible changes:
|
||||
* Python 3.2 support has been dropped. It never had significant real world
|
||||
usage and has been dropped by our main dependency cryptography. Affected
|
||||
users should upgrade to Python 3.3 or later.
|
||||
Deprecations:
|
||||
* The support for EGD has been removed. The only affected function
|
||||
OpenSSL.rand.egd() now uses os.urandom() to seed the internal PRNG instead.
|
||||
Please see pyca/cryptography#1636 for more background information on this
|
||||
decision. In accordance with our backward compatibility policy
|
||||
OpenSSL.rand.egd() will be removed no sooner than a year from the release of
|
||||
16.0.0.
|
||||
* Please note that you should use urandom for all your secure random number
|
||||
needs.
|
||||
* Python 2.6 support has been deprecated. Our main dependency cryptography
|
||||
deprecated 2.6 in version 0.9 (2015-05-14) with no time table for actually
|
||||
dropping it. pyOpenSSL will drop Python 2.6 support once cryptography does.
|
||||
Changes:
|
||||
* Fixed OpenSSL.SSL.Context.set_session_id, OpenSSL.SSL.Connection.renegotiate,
|
||||
OpenSSL.SSL.Connection.renegotiate_pending, and
|
||||
OpenSSL.SSL.Context.load_client_ca. They were lacking an implementation since
|
||||
0.14. #422
|
||||
* Fixed segmentation fault when using keys larger than 4096-bit to sign data.
|
||||
#428
|
||||
* Fixed AttributeError when OpenSSL.SSL.Connection.get_app_data() was called
|
||||
before setting any app data. #304
|
||||
* Added OpenSSL.crypto.dump_publickey() to dump OpenSSL.crypto.PKey objects
|
||||
that represent public keys, and OpenSSL.crypto.load_publickey() to load such
|
||||
objects from serialized representations. #382
|
||||
* Added OpenSSL.crypto.dump_crl() to dump a certificate revocation list out to
|
||||
a string buffer. #368
|
||||
* Added OpenSSL.SSL.Connection.get_state_string() using the OpenSSL binding
|
||||
state_string_long. #358
|
||||
* Added support for the socket.MSG_PEEK flag to OpenSSL.SSL.Connection.recv()
|
||||
and OpenSSL.SSL.Connection.recv_into(). #294
|
||||
* Added OpenSSL.SSL.Connection.get_protocol_version() and
|
||||
OpenSSL.SSL.Connection.get_protocol_version_name(). #244
|
||||
* Switched to utf8string mask by default. OpenSSL formerly defaulted to a
|
||||
T61String if there were UTF-8 characters present. This was changed to
|
||||
default to UTF8String in the config around 2005, but the actual code didn’t
|
||||
change it until late last year. This will default us to the setting that
|
||||
actually works. To revert this you can call
|
||||
OpenSSL.crypto._lib.ASN1_STRING_set_default_mask_asc(b"default"). #234
|
||||
|
||||
- fixed paths in bug-lp-1265482.diff
|
||||
- fixed doc generation
|
||||
- spec clean up
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Tue Jul 14 13:07:00 UTC 2015 - toddrme2178@gmail.com
|
||||
|
||||
|
Reference in New Issue
Block a user