ChangeLog 30 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828
  1. 2011-09-02 Hynek Schlawack <hs@ox.cx>
  2. * Release 0.15.1
  3. 2015-04-14 Glyph Lefkowitz <glyph@twistedmatrix.com>
  4. * OpenSSL/SSL.py, OpenSSL/test/test_ssl.py: Fix a regression
  5. present in 0.15, where when an error occurs and no errno() is set,
  6. a KeyError is raised. This happens, for example, if
  7. Connection.shutdown() is called when the underlying transport has
  8. gone away.
  9. 2011-09-02 Hynek Schlawack <hs@ox.cx>
  10. * Release 0.15
  11. 2015-04-12 Jean-Paul Calderone <exarkun@twistedmatrix.com>
  12. * OpenSSL/rand.py, OpenSSL/SSL.py: APIs which previously accepted
  13. filenames only as bytes now accept them as either bytes or
  14. unicode (and respect sys.getfilesystemencoding()).
  15. 2015-03-23 Jean-Paul Calderone <exarkun@twistedmatrix.com>
  16. * OpenSSL/SSL.py: Add Cory Benfield's next-protocol-negotiation
  17. (NPN) bindings.
  18. 2015-03-15 Jean-Paul Calderone <exarkun@twistedmatrix.com>
  19. * OpenSSL/SSL.py: Add ``Connection.recv_into``, mirroring the
  20. builtin ``socket.recv_into``. Based on work from Cory Benfield.
  21. * OpenSSL/test/test_ssl.py: Add tests for ``recv_into``.
  22. 2015-01-30 Stephen Holsapple <sholsapp@gmail.com>
  23. * OpenSSL/crypto.py: Expose ``X509StoreContext`` for verifying certificates.
  24. * OpenSSL/test/test_crypto.py: Add intermediate certificates for
  25. 2015-01-08 Paul Aurich <paul@darkrain42.org>
  26. * OpenSSL/SSL.py: ``Connection.shutdown`` now propagates errors from the
  27. underlying socket.
  28. 2014-12-11 Jean-Paul Calderone <exarkun@twistedmatrix.com>
  29. * OpenSSL/SSL.py: Fixed a regression ``Context.check_privatekey``
  30. causing it to always succeed - even if it should fail.
  31. 2014-08-21 Alex Gaynor <alex.gaynor@gmail.com>
  32. * OpenSSL/crypto.py: Fixed a regression where calling ``load_pkcs7_data``
  33. with ``FILETYPE_ASN1`` would fail with a ``NameError``.
  34. 2014-05-05 Jean-Paul Calderone <exarkun@twistedmatrix.com>
  35. * OpenSSL/SSL.py: Fix a regression in which the first argument of
  36. the "verify" callback was incorrectly passed a ``Context`` instance
  37. instead of the ``Connection`` instance.
  38. * OpenSSL/test/test_ssl.py: Add a test for the value passed as the
  39. first argument of the "verify" callback.
  40. 2014-04-19 Jean-Paul Calderone <exarkun@twistedmatrix.com>
  41. * OpenSSL/crypto.py: Based on work from Alex Gaynor, Andrew
  42. Lutomirski, Tobias Oberstein, Laurens Van Houtven, and Hynek
  43. Schlawack, add ``get_elliptic_curve`` and ``get_elliptic_curves``
  44. to support TLS ECDHE modes.
  45. * OpenSSL/SSL.py: Add ``Context.set_tmp_ecdh`` to configure a TLS
  46. context with a particular elliptic curve for ECDHE modes.
  47. 2014-04-19 Markus Unterwaditzer <markus@unterwaditzer.net>
  48. * OpenSSL/SSL.py: ``Connection.send`` and ``Connection.sendall``
  49. now also accept the ``buffer`` type as data.
  50. 2014-04-05 Stephen Holsapple <sholsapp@gmail.com>
  51. * OpenSSL/crypto.py: Make ``load_pkcs12`` backwards compatible with
  52. pyOpenSSL 0.13 by making passphrase optional.
  53. 2014-03-30 Fedor Brunner <fedor.brunner@azet.sk>
  54. * OpenSSL/SSL.py: Add ``get_finished``, ``get_peer_finished``
  55. methods to ``Connection``. If you use these methods to
  56. implement TLS channel binding (RFC 5929) disable session
  57. resumption because triple handshake attacks against TLS.
  58. <https://www.ietf.org/mail-archive/web/tls/current/msg11337.html>
  59. <https://secure-resumption.com/tlsauth.pdf>
  60. 2014-03-29 Fedor Brunner <fedor.brunner@azet.sk>
  61. * OpenSSL/SSL.py: Add ``get_cipher_name``, ``get_cipher_bits``,
  62. and ``get_cipher_version`` to ``Connection``.
  63. 2014-03-28 Jean-Paul Calderone <exarkun@twistedmatrix.com>
  64. * OpenSSL/tsafe.py: Replace the use of ``apply`` (which has been
  65. removed in Python 3) with the equivalent syntax.
  66. 2014-03-28 Jonathan Giannuzzi <jonathan@giannuzzi.be>
  67. * OpenSSL/crypto.py: Fix memory leak in _X509_REVOKED_dup.
  68. * leakcheck/crypto.py: Add checks for _X509_REVOKED_dup, CRL.add_revoked
  69. and CRL.get_revoked.
  70. * setup.py: Require cryptography 0.3 to have the ASN1_TIME_free binding.
  71. 2014-03-02 Stephen Holsapple <sholsapp@gmail.com>
  72. * OpenSSL/crypto.py: Add ``get_extensions`` method to ``X509Req``.
  73. 2014-02-23 Jean-Paul Calderone <exarkun@twistedmatrix.com>
  74. * Release 0.14
  75. 2014-01-09 Jean-Paul Calderone <exarkun@twistedmatrix.com>
  76. * OpenSSL: Port to the cffi-based OpenSSL bindings provided by
  77. <https://github.com/pyca/cryptography>
  78. 2013-10-06 Jean-Paul Calderone <exarkun@twistedmatrix.com>
  79. * OpenSSL/ssl/context.c: Add support for negotiating TLS v1.1 or
  80. v1.2.
  81. 2013-10-03 Christian Heimes <christian@python.org>
  82. * OpenSSL/crypto/x509.c: Fix an inconsistency in memory management
  83. in X509.get_serial_number which leads to crashes on some runtimes
  84. (certain Windows/Python 3.3 environments, at least).
  85. 2013-08-11 Christian Heimes <christian@python.org>
  86. * OpenSSL/crypto/x509ext.c: Fix handling of NULL bytes inside
  87. subjectAltName general names when formatting an X509 extension
  88. as a string.
  89. * OpenSSL/crypto/x509.c: Fix memory leak in get_extension().
  90. 2012-04-03 Jean-Paul Calderone <exarkun@twistedmatrix.com>
  91. * OpenSSL/crypto/pkey.c: Release the GIL around RSA and DSA key
  92. generation, based on code from INADA Naoki.
  93. 2012-02-13 Jean-Paul Calderone <exarkun@twistedmatrix.com>
  94. * OpenSSL/ssl/ssl.c: Add session cache related constants for use
  95. with the new Context.set_session_cache_mode method.
  96. * OpenSSL/ssl/context.c: Add new Context methods
  97. set_session_cache_mode and get_session_cache_mode.
  98. 2011-11-01 Jean-Paul Calderone <exarkun@twistedmatrix.com>
  99. * OpenSSL/crypto/pkey.c: Raise TypeError when trying to check a
  100. PKey instance which has no private component, instead of crashing.
  101. Based on fix by <lp:~dataway>.
  102. 2011-09-14 Žiga Seilnacht <lp:ziga-seilnacht>
  103. * OpenSSL/crypto/crypto.c: Allow exceptions from passphrase
  104. callbacks to propagate up out of load_privatekey
  105. * OpenSSL/crypto/crypto.c: Raise an exception when a too-long
  106. passphrase is returned from a passphrase callback, instead of
  107. silently truncating it.
  108. * OpenSSL/crypto/crypto.c: Fix a memory leak when a passphrase
  109. callback returns the wrong type.
  110. 2011-09-13 Jean-Paul Calderone <exarkun@twistedmatrix.com>
  111. * OpenSSL/crypto/crl.c: Add error handling for the use of
  112. X509_CRL_sign.
  113. 2011-09-11 Jonathan Ballet <lp:multani>
  114. * doc/: Convert the LaTeX documentation to Sphinx-using ReST.
  115. * OpenSSL/: Convert the epytext API documentation to Sphinx-using ReST.
  116. 2011-09-08 Guillermo Gonzalez <guillermo.gonzalez@canonical.com>
  117. * OpenSSL/ssl/context.c: Add Context.set_mode method.
  118. * OpenSSL/ssl/ssl.c: Add MODE_RELEASE_BUFFERS and OP_NO_COMPRESSION
  119. constants.
  120. 2011-09-02 Jean-Paul Calderone <exarkun@twistedmatrix.com>
  121. * Release 0.13
  122. 2011-06-12 Jean-Paul Calderone <exarkun@twistedmatrix.com>
  123. * OpenSSL/crypto/pkey.c: Add the PKey.check method, mostly
  124. implemented by Rick Dean, to verify the internal consistency of a
  125. PKey instance.
  126. 2011-06-12 Jean-Paul Calderone <exarkun@twistedmatrix.com>
  127. * OpenSSL/crypto/crypto.c: Fix the sign and verify functions so
  128. they handle data with embedded NULs. Fix by David Brodsky
  129. <lp:~lihalla>.
  130. 2011-05-20 Jean-Paul Calderone <exarkun@twistedmatrix.com>
  131. * OpenSSL/ssl/connection.c, OpenSSL/test/test_ssl.py: Add a new
  132. method to the Connection type, get_peer_cert_chain, for retrieving
  133. the peer's certificate chain.
  134. 2011-05-19 Jean-Paul Calderone <exarkun@twistedmatrix.com>
  135. * OpenSSL/crypto/x509.c, OpenSSL/test/test_crypto.py: Add a new
  136. method to the X509 type, get_signature_algorithm, for inspecting
  137. the signature algorithm field of the certificate. Based on a
  138. patch from <lp:~okuda>.
  139. 2011-05-10 Jean-Paul Calderone <exarkun@twistedmatrix.com>
  140. * OpenSSL/crypto/crypto.h: Work around a Windows/OpenSSL 1.0 issue
  141. explicitly including a Windows header before any OpenSSL headers.
  142. * OpenSSL/crypto/pkcs12.c: Work around an OpenSSL 1.0 issue by
  143. explicitly flushing errors known to be uninteresting after calling
  144. PKCS12_parse.
  145. * OpenSSL/ssl/context.c: Remove SSLv2 support if the underlying
  146. OpenSSL library does not provide it.
  147. * OpenSSL/test/test_crypto.py: Support an OpenSSL 1.0 change from
  148. MD5 to SHA1 by allowing either hash algorithm's result as the
  149. return value of X509.subject_name_hash.
  150. * OpenSSL/test/test_ssl.py: Support an OpenSSL 1.0 change from MD5
  151. to SHA1 by constructing certificate files named using both hash
  152. algorithms' results when testing Context.load_verify_locations.
  153. * Support OpenSSL 1.0.0a.
  154. 2011-04-15 Jean-Paul Calderone <exarkun@twistedmatrix.com>
  155. * OpenSSL/ssl/ssl.c: Add OPENSSL_VERSION_NUMBER, SSLeay_version
  156. and related constants for retrieving version information about the
  157. underlying OpenSSL library.
  158. 2011-04-07 Jean-Paul Calderone <exarkun@twistedmatrix.com>
  159. * Release 0.12
  160. 2011-04-06 Jean-Paul Calderone <exarkun@twistedmatrix.com>
  161. * OpenSSL/crypto/x509.c: Add get_extension_count and get_extension
  162. to the X509 type, allowing read access to certificate extensions.
  163. * OpenSSL/crypto/x509ext.c: Add get_short_name and get_data to the
  164. X509Extension type, allowing read access to the contents of an
  165. extension.
  166. 2011-03-21 Olivier Hervieu <lp:~ohe>
  167. * OpenSSL/ssl/ssl.c: Expose a number of symbolic constants for
  168. values passed to the connection "info" callback.
  169. 2011-01-22 Jean-Paul Calderone <exarkun@twistedmatrix.com>
  170. * OpenSSL/ssl/connection.py: Add support for new-style
  171. buffers (primarily memoryviews) to Connection.send and
  172. Connection.sendall.
  173. 2010-11-01 Jean-Paul Calderone <exarkun@twistedmatrix.com>
  174. * Release 0.11
  175. 2010-10-07 Jean-Paul Calderone <exarkun@twistedmatrix.com>
  176. * Initial support for Python 3.x throughout the codebase.
  177. 2010-09-14 Jean-Paul Calderone <exarkun@twistedmatrix.com>
  178. * OpenSSL/crypto/netscape_spki.c: Fix an off-by-one mistake in the
  179. error handling for NetscapeSPKI.verify. Add additional error
  180. checking to NetscapeSPKI.sign to handle the case where there is no
  181. private key.
  182. * OpenSSL/crypto/x509.c: Fix an overflow bug in the subject_name_hash
  183. method of the X509 type which would cause it to return negative
  184. values on 32 bit systems.
  185. * OpenSSL/crypto/x509req.c: Fix an off-by-one mistake in the error
  186. handling for X509Req.verify.
  187. * OpenSSL/ssl/context.c: Fix the error handling in the load_tmp_dh
  188. method of the Context type which would cause it to always raise
  189. MemoryError, regardless of the actual error (such as a bad file
  190. name).
  191. * OpenSSL/test/: Numerous unit tests added, both for above fixes
  192. and for other previously untested code paths.
  193. 2010-07-27 Jean-Paul Calderone <exarkun@twistedmatrix.com>
  194. * Re-arrange the repository so that the package can be built and
  195. used in-place without requiring installation.
  196. 2010-02-27 James Yonan <james@openvpn.net>
  197. * src/crypto/crypto.c: Added crypto.sign and crypto.verify methods
  198. that wrap EVP_Sign and EVP_Verify function families, using code
  199. derived from Dave Cridland's PyOpenSSL branch.
  200. * test/test_crypto.py: Added unit tests for crypto.sign and
  201. crypto.verify.
  202. 2010-01-27 Jean-Paul Calderone <exarkun@twistedmatrix.com>
  203. * src/ssl/connection.c, src/util.h: Apply patch from Sandro Tosi to
  204. fix misspellings of "compatibility".
  205. 2009-11-13 Jean-Paul Calderone <exarkun@twistedmatrix.com>
  206. * Release 0.10
  207. 2009-11-07 Žiga Seilnacht, Jean-Paul Calderone <exarkun@twistedmatrix.com>
  208. * src/ssl/connection.c, src/ssl/context.c: Add set_client_ca_list,
  209. add_client_ca, and get_client_ca_list to Context for manipulating
  210. the list of certificate authority names which are sent by servers
  211. with the certificate request message.
  212. * src/util.h: Add ssize-related defines if the version of Python
  213. being used does not have them.
  214. * setup.py: Significant changes to the way Windows builds are done,
  215. particularly the way OpenSSL headers and libraries are found (with
  216. the new --with-openssl argument to build_ext).
  217. 2009-08-27 Rick Dean <rick@fdd.com>, Jean-Paul Calderone <exarkun@twistedmatrix.com>
  218. * src/crypto/pkcs12.c: Add setters to the PKCS12 type for the
  219. certificate, private key, ca certificate list, and friendly
  220. name, and add a getter for the friendly name. Also add a method
  221. for exporting a PKCS12 object as a string.
  222. * test/test_crypto.py: Add lots of additional tests for the PKCS12
  223. type.
  224. * doc/pyOpenSSL.tex: Documentation for the new PKCS12 methods.
  225. 2009-07-17 Rick Dean <rick@fdd.com>, Jean-Paul Calderone <exarkun@twistedmatrix.com>
  226. * src/crypto/x509ext.c: Add subject and issuer parameters to
  227. X509Extension, allowing creation of extensions which require that
  228. information. Fixes LP#322813.
  229. 2009-07-16 Jean-Paul Calderone <exarkun@twistedmatrix.com>
  230. * test/util.py: Changed the base TestCase's tearDown to assert that
  231. no errors were left in the OpenSSL error queue by the test.
  232. * src/crypto/crypto.c: Add a private helper in support of the
  233. TestCase.tearDown change.
  234. * src/crypto/x509name.c: Changed X509Name's getattr implementation
  235. to clean up the error queue. Fixes LP#314814.
  236. * test/util.c: Changed flush_error_queue to avoid a reference
  237. counting bug caused by macro expansion.
  238. 2009-07-16 Rick Dean <rick@fdd.com>
  239. * src/rand.c: Added OpenSSL.rand.bytes to get random bytes directly.
  240. * src/util.c: Added generic exceptions_from_error_queue to replace
  241. the various other implementations of this function. Also updated
  242. the rest of the codebase to use this version instead.
  243. 2009-07-05 Jean-Paul Calderone <exarkun@twistedmatrix.com>
  244. * test/util.py, test/test_ssl.py, test/test_crypto.py: Fold the
  245. Python 2.3 compatibility TestCase mixin into the TestCase defined
  246. in util.py.
  247. 2009-07-05 Jean-Paul Calderone <exarkun@twistedmatrix.com>
  248. * test/util.py, test/test_ssl.py, test/test_crypto.py: Stop trying
  249. to use Twisted's TestCase even when it's available. Instead,
  250. always use the stdlib TestCase with a few enhancements.
  251. 2009-07-04 Jean-Paul Calderone <exarkun@twistedmatrix.com>
  252. * Changed most extension types so that they can be instantiated
  253. using the type object rather than a factory function. The old
  254. factory functions are now aliases for the type objects.
  255. Fixes LP#312786.
  256. 2009-05-27 Jean-Paul Calderone <exarkun@twistedmatrix.com>
  257. * Changed all docstrings in extension modules to be friendlier
  258. towards Python programmers. Fixes LP#312787.
  259. 2009-05-27 Jean-Paul Calderone <exarkun@twistedmatrix.com>
  260. * src/crypto/x509ext.c: Correctly deallocate the new Extension
  261. instance when there is an error initializing it and it is not
  262. going to be returned. Resolves LP#368043.
  263. 2009-05-11 Jean-Paul Calderone <exarkun@twistedmatrix.com>
  264. * test/test_crypto.py: Use binary mode for the pipe to talk to the
  265. external openssl binary. The data being transported over this
  266. pipe is indeed binary, so previously it would often be truncated
  267. or otherwise mangled.
  268. * src/ssl/connection.h, src/ssl/connection.c, test/test_ssl.py:
  269. Extend the Connection class with support for in-memory BIOs. This
  270. allows SSL to be run without a real socket, useful for
  271. implementing EAP-TLS or using SSL with Windows IO completion
  272. ports, for example. Based heavily on contributions from Rick
  273. Dean.
  274. 2009-04-25 Jean-Paul Calderone <exarkun@twistedmatrix.com>
  275. * Release 0.9
  276. 2009-04-01 Jean-Paul Calderone <exarkun@twistedmatrix.com>
  277. Samuele Pedroni <pedronis@openend.se>
  278. * src/util.h: Delete the TLS key before trying to set a new value
  279. for it in case the current thread identifier is a recycled one (if
  280. it is recycled, the key won't be set because there is already a
  281. value from the previous thread to have this identifier and to use
  282. the pyOpenSSL API).
  283. 2009-04-01 Jean-Paul Calderone <exarkun@twistedmatrix.com>
  284. * src/crypto/crypto.c: Add FILETYPE_TEXT for dumping keys and
  285. certificates and certificate signature requests to a text format.
  286. 2008-12-31 Jean-Paul Calderone <exarkun@twistedmatrix.com>
  287. * src/crypto/x509ext.c, test/test_crypto.py: Add the get_short_name
  288. method to X509Extension based on patch from Alex Stapleton.
  289. 2008-12-31 Jean-Paul Calderone <exarkun@twistedmatrix.com>
  290. * src/crypto/x509ext.c, test/test_crypto.py: Fix X509Extension so
  291. that it is possible to instantiate extensions which use s2i or r2i
  292. instead of v2i (an extremely obscure extension implementation
  293. detail).
  294. 2008-12-30 Jean-Paul Calderone <exarkun@twistedmatrix.com>
  295. * MANIFEST.in, src/crypto/crypto.c, src/crypto/x509.c,
  296. src/crypto/x509name.c, src/rand/rand.c, src/ssl/context.c: Changes
  297. which eliminate compiler warnings but should not change any
  298. behavior.
  299. 2008-12-28 Jean-Paul Calderone <exarkun@twistedmatrix.com>
  300. * test/test_ssl.py, src/ssl/ssl.c: Expose DTLS-related constants,
  301. OP_NO_QUERY_MTU, OP_COOKIE_EXCHANGE, and OP_NO_TICKET.
  302. 2008-12-28 Jean-Paul Calderone <exarkun@twistedmatrix.com>
  303. * src/ssl/context.c: Add a capath parameter to
  304. Context.load_verify_locations to allow Python code to specify
  305. either or both arguments to the underlying
  306. SSL_CTX_load_verify_locations API.
  307. * src/ssl/context.c: Add Context.set_default_verify_paths, a wrapper
  308. around SSL_CTX_set_default_verify_paths.
  309. 2008-12-28 Jean-Paul Calderone <exarkun@twistedmatrix.com>
  310. * test/test_crypto.py, src/crypto/x509req.c: Added get_version and
  311. set_version_methods to X509ReqType based on patch from Wouter van
  312. Bommel. Resolves LP#274418.
  313. 2008-09-22 Jean-Paul Calderone <exarkun@twistedmatrix.com>
  314. * Release 0.8
  315. 2008-10-19 Jean-Paul Calderone <exarkun@twistedmatrix.com>
  316. * tsafe.py: Revert the deprecation of the thread-safe Connection
  317. wrapper. The Connection class should not segfault if used from
  318. multiple threads now, but it generally cannot be relied on to
  319. produce correct results if used without the thread-safe wrapper.
  320. * doc/pyOpenSSL.tex: Correct the documentation for the set_passwd_cb
  321. callback parameter so that it accurately describes the required
  322. signature.
  323. 2008-09-22 Jean-Paul Calderone <exarkun@twistedmatrix.com>
  324. * Release 0.8a1
  325. 2008-09-21 Jean-Paul Calderone <exarkun@twistedmatrix.com>
  326. * src/ssl/ssl.h, src/ssl/ssl.c: Add a thread-local storage key
  327. which will be used to store and retrieve PyThreadState pointers
  328. whenever it is necessary to release or re-acquire the GIL.
  329. * src/ssl/context.c: Change global_verify_callback so that it
  330. unconditionally manipulates the Python threadstate, rather than
  331. checking the tstate field which is now always NULL.
  332. 2008-04-26 Jean-Paul Calderone <exarkun@twistedmatrix.com>
  333. * src/ssl/context.c: Change global_passphrase_callback and
  334. global_info_callback so that they acquire the GIL before
  335. invoking any CPython APIs and do not release it until after they
  336. are finished invoking all of them (based heavily on on patch
  337. from Dan Williams).
  338. * src/ssl/crypto.c: Initialize OpenSSL thread support so that it
  339. is valid to use OpenSSL APIs from more than one thread (based on
  340. patch from Dan Williams).
  341. * test/test_crypto.py: Add tests for load_privatekey and
  342. dump_privatekey when a passphrase or a passphrase callback is
  343. supplied.
  344. * test/test_ssl.py: Add tests for Context.set_passwd_cb and
  345. Context.set_info_callback.
  346. 2008-04-11 Jean-Paul Calderone <exarkun@twistedmatrix.com>
  347. * Release 0.7
  348. 2008-03-26 Jean-Paul Calderone <exarkun@twistedmatrix.com>
  349. * src/crypto/x509name.c: Add X509Name.get_components
  350. 2008-03-25 Jean-Paul Calderone <exarkun@twistedmatrix.com>
  351. * src/crypto/x509name.c: Add hash and der methods to X509Name.
  352. * src/crypto/x509.c: Fix a bug in X509.get_notBefore and
  353. X509.get_notAfter preventing UTCTIME format timestamps from
  354. working.
  355. 2008-03-12 Jean-Paul Calderone <exarkun@twistedmatrix.com>
  356. * Fix coding problems in examples/. Remove keys and certificates
  357. and add a note about how to generate new ones.
  358. 2008-03-09 Jean-Paul Calderone <exarkun@twistedmatrix.com>
  359. * src/crypto/x509.c: Add getters and setters for the notBefore and
  360. notAfter attributes of X509s.
  361. * src/crypto/pkey.h, src/crypto/pkey.c, src/crypto/x509req.c,
  362. src/crypto/x509.c: Track the initialized and public/private state
  363. of EVP_PKEY structures underlying the crypto_PKeyObj type and
  364. reject X509Req signature operations on keys not suitable for the
  365. task.
  366. 2008-03-06 Jean-Paul Calderone <exarkun@twistedmatrix.com>
  367. * src/crypto/x509name.c: Fix tp_compare so it only returns -1, 0, or
  368. 1. This eliminates a RuntimeWarning emitted by Python.
  369. * src/crypto/x509req.c: Fix reference counting for X509Name returned
  370. by X509Req.get_subject. This removes a segfault when the subject
  371. name outlives the request object.
  372. * src/crypto/x509.c: Change get_serial_number and set_serial_number
  373. to accept Python longs.
  374. * doc/pyOpenSSL.tex: A number of minor corrections.
  375. 2008-03-03 Jean-Paul Calderone <exarkun@twistedmatrix.com>
  376. * src/crypto/crypto.c: Expose X509_verify_cert_error_string. (patch
  377. from Victor Stinner)
  378. 2008-02-22 Jean-Paul Calderone <exarkun@twistedmatrix.com>
  379. * src/ssl/connection.c src/ssl/context.c src/ssl/ssl.c: Fix
  380. compilation on Windows. (patch from Michael Schneider)
  381. 2008-02-21 Jean-Paul Calderone <exarkun@twistedmatrix.com>
  382. * src/ssl/connection.c: Expose SSL_get_shutdown and
  383. SSL_set_shutdown. (patch from James Knight)
  384. * src/ssl/ssl.c: Expose SSL_SENT_SHUTDOWN and SSL_RECEIVED_SHUTDOWN.
  385. (patch from James Knight)
  386. 2008-02-19 Jean-Paul Calderone <exarkun@twistedmatrix.com>
  387. * src/ssl/context.c: Expose SSL_CTX_add_extra_chain_cert.
  388. * src/crypto/x509name.c: Fix memory leaks in __getattr__ and
  389. __setattr_ implementations.
  390. * src/crypto/x509.c: Fix memory leak in X509.get_pubkey().
  391. * leakcheck/: An attempt at a systematic approach to leak
  392. elimination.
  393. 2004-08-13 Martin Sjögren <msjogren@gmail.com>
  394. * Released version 0.6.
  395. 2004-08-11 Martin Sjögren <msjogren@gmail.com>
  396. * doc/pyOpenSSL.tex: Updates to the docs.
  397. 2004-08-10 Martin Sjögren <msjogren@gmail.com>
  398. * src/crypto/x509.c: Add X509.add_extensions based on a patch
  399. from Han S. Lee.
  400. * src/ssl/ssl.c: Add more SSL_OP_ constants. Patch from Mihai
  401. Ibanescu.
  402. 2004-08-09 Martin Sjögren <msjogren@gmail.com>
  403. * setup.py src/crypto/: Add support for Netscape SPKI extensions
  404. based on a patch from Tollef Fog Heen.
  405. * src/crypto/crypto.c: Add support for python passphrase callbacks
  406. based on a patch from Robert Olson.
  407. 2004-08-03 Martin Sjögren <msjogren@gmail.com>
  408. * src/ssl/context.c: Applied patch from Frederic Peters to add
  409. Context.use_certificate_chain_file.
  410. * src/crypto/x509.c: Applid patch from Tollef Fog Heen to add
  411. X509.subject_name_hash and X509.digest.
  412. 2004-08-02 Martin Sjögren <msjogren@gmail.com>
  413. * src/crypto/crypto.c src/ssl/ssl.c: Applied patch from Bastian
  414. Kleineidam to fix full names of exceptions.
  415. 2004-07-19 Martin Sjögren <msjogren@gmail.com>
  416. * doc/pyOpenSSL.tex: Fix the errors regarding X509Name's field names.
  417. 2004-07-18 Martin Sjögren <msjogren@gmail.com>
  418. * examples/certgen.py: Fixed wrong attributes in doc string, thanks
  419. Remy. (SFbug#913315)
  420. * __init__.py, setup.py, version.py: Add __version__, as suggested by
  421. Ronald Oussoren in SFbug#888729.
  422. * examples/proxy.py: Fix typos, thanks Mihai Ibanescu. (SFpatch#895820)
  423. 2003-01-09 Martin Sjögren <martin@strakt.com>
  424. * Use cyclic GC protocol in SSL.Connection, SSL.Context, crypto.PKCS12
  425. and crypto.X509Name.
  426. 2002-12-02 Martin Sjögren <martin@strakt.com>
  427. * tsafe.py: Add some missing methods.
  428. 2002-10-06 Martin Sjögren <martin@strakt.com>
  429. * __init__.py: Import tsafe too!
  430. 2002-10-05 Martin Sjögren <martin@strakt.com>
  431. * src/crypto/x509name.c: Use unicode strings instead of ordinary
  432. strings in getattr/setattr. Note that plain ascii strings should
  433. still work.
  434. 2002-09-17 Martin Sjögren <martin@strakt.com>
  435. * Released version 0.5.1.
  436. 2002-09-09 Martin Sjögren <martin@strakt.com>
  437. * setup.cfg: Fixed build requirements for rpms.
  438. 2002-09-07 Martin Sjögren <martin@strakt.com>
  439. * src/ssl/connection.c: Fix sendall() method. It segfaulted because
  440. it was too generous about giving away the GIL.
  441. * Added SecureXMLRPCServer example, contributed by Michal Wallace.
  442. 2002-09-06 Martin Sjögren <martin@strakt.com>
  443. * setup.cfg: Updated the build requirements.
  444. * src/ssl/connection.c: Fix includes for AIX.
  445. 2002-09-04 Anders Hammarquist <iko@strakt.com>
  446. * Added type checks in all the other places where we expect
  447. specific types of objects passed.
  448. 2002-09-04 Martin Sjögren <martin@strakt.com>
  449. * src/crypto/crypto.c: Added an explicit type check in the dump_*
  450. functions, so that they won't die when e.g. None is passed in.
  451. 2002-08-25 Martin Sjögren <martin@strakt.com>
  452. * doc/pyOpenSSL.tex: Docs for PKCS12.
  453. 2002-08-24 Martin Sjögren <martin@strakt.com>
  454. * src/crypto: Added basic PKCS12 support, thanks to Mark Welch
  455. <mark@collab.net>
  456. 2002-08-16 Martin Sjögren <martin@strakt.com>
  457. * D'oh! Fixes for python 1.5 and python 2.1.
  458. 2002-08-15 Martin Sjögren <martin@strakt.com>
  459. * Version 0.5. Yay!
  460. 2002-07-25 Martin Sjögren <martin@strakt.com>
  461. * src/ssl/context.c: Added set_options method.
  462. * src/ssl/ssl.c: Added constants for Context.set_options method.
  463. 2002-07-23 Martin Sjögren <martin@strakt.com>
  464. * Updated docs
  465. * src/ssl/connection.c: Changed the get_cipher_list method to actually
  466. return a list! WARNING: This change makes the API incompatible with
  467. earlier versions!
  468. 2002-07-15 Martin Sjögren <martin@strakt.com>
  469. * src/ssl/connection.[ch]: Removed the fileno method, it uses the
  470. transport object's fileno instead.
  471. 2002-07-09 Martin Sjögren <martin@strakt.com>
  472. * src/crypto/x509.c src/crypto/x509name.c: Fixed segfault bug where
  473. you used an X509Name after its X509 had been destroyed.
  474. * src/crypto/crypto.[ch] src/crypto/x509req.c src/crypto/x509ext.[ch]:
  475. Added X509 Extension support. Thanks to maas-Maarten Zeeman
  476. <maas@awanim.com>
  477. * src/crypto/pkey.c: Added bits() and type() methods.
  478. 2002-07-08 Martin Sjögren <martin@strakt.com>
  479. * src/ssl/connection.c: Moved the contents of setup_ssl into the
  480. constructor, thereby fixing some segfault bugs :)
  481. * src/ssl/connection.c: Added connect_ex and sendall methods.
  482. * src/crypto/x509name.c: Cleaned up comparisons and NID lookup.
  483. Thank you Maas-Maarten Zeeman <maas@awanim.com>
  484. * src/rand/rand.c: Fix RAND_screen import.
  485. * src/crypto/crypto.c src/crypto/pkcs7.[ch]: Added PKCS7 management,
  486. courtesy of Maas-Maarten Zeeman <maas@awanim.com>
  487. * src/crypto/x509req.c: Added verify method.
  488. 2002-06-17 Martin Sjögren <martin@strakt.com>
  489. * rpm/, setup.cfg: Added improved RPM-building stuff, thanks to
  490. Mihai Ibanescu <misa@redhat.com>
  491. 2002-06-14 Martin Sjögren <martin@strakt.com>
  492. * examples/proxy.py: Example code for using OpenSSL through a proxy
  493. contributed by Mihai Ibanescu <misa@redhat.com>
  494. * Updated installation instruction and added them to the TeX manual.
  495. 2002-06-13 Martin Sjögren <martin@strakt.com>
  496. * src/ssl/context.c: Changed global_verify_callback so that it uses
  497. PyObject_IsTrue instead of requring ints.
  498. * Added pymemcompat.h to make the memory management uniform and
  499. backwards-compatible.
  500. * src/util.h: Added conditional definition of PyModule_AddObject and
  501. PyModule_AddIntConstant
  502. * src/ssl/connection.c: Socket methods are no longer explicitly
  503. wrapped. fileno() is the only method the transport layer object HAS
  504. to support, but if you want to use connect, accept or sock_shutdown,
  505. then the transport layer object has to supply connect, accept
  506. and shutdown respectively.
  507. 2002-06-12 Martin Sjögren <martin@strakt.com>
  508. * Changed comments to docstrings that are visible in Python.
  509. * src/ssl/connection.c: Added set_connect_state and set_accept_state
  510. methods. Thanks to Mark Welch <mark@collab.net> for this.
  511. 2002-06-11 Martin Sjögren <martin@strakt.com>
  512. * src/ssl/connection.c: accept and connect now use SSL_set_accept_state
  513. and SSL_set_connect_state respectively, instead of SSL_accept and
  514. SSL_connect.
  515. * src/ssl/connection.c: Added want_read and want_write methods.
  516. 2002-06-05 Martin Sjögren <martin@strakt.com>
  517. * src/ssl/connection.c: Added error messages for windows. The code is
  518. copied from Python's socketmodule.c. Ick.
  519. * src/ssl/connection.c: Changed the parameters to the SysCallError. It
  520. always has a tuple (number, string) now, even though the number
  521. might not always be useful.
  522. 2002-04-05 Martin Sjögren <md9ms@mdstud.chalmers.se>
  523. * Worked more on the Debian packaging, hopefully the packages
  524. are getting into the main Debian archive soon.
  525. 2002-01-10 Martin Sjögren <martin@strakt.com>
  526. * Worked some more on the Debian packaging, it's turning out real
  527. nice.
  528. * Changed format on this file, I'm going to try to be a bit more
  529. verbose about my changes, and this format makes it easier.
  530. 2002-01-08 Martin Sjögren <martin@strakt.com>
  531. * Version 0.4.1
  532. * Added some example code
  533. * Added the thread safe Connection object in the 'tsafe' submodule
  534. * New Debian packaging
  535. 2001-08-09 Martin Sjögren <martin@strakt.com>
  536. * Version 0.4
  537. * Added a compare function for X509Name structures.
  538. * Moved the submodules to separate .so files, with tiny C APIs so they
  539. can communicate
  540. * Skeletal OpenSSL/__init__.py
  541. * Removed the err submodule, use crypto.Error and SSL.Error instead
  542. 2001-08-06 Martin Sjögren <martin@strakt.com>
  543. * Version 0.3
  544. * Added more types for dealing with certificates (X509Store, X509Req,
  545. PKey)
  546. * Functionality to load private keys, certificates and certificate
  547. requests from memory buffers, and store them too
  548. * X509 and X509Name objects can now be modified as well, very neat when
  549. creating certificates ;)
  550. * Added SSL_MODE_AUTO_RETRY to smooth things for blocking sockets
  551. * Added a sock_shutdown() method to the Connection type
  552. * I don't understand why, but I can't use Py_InitModule() to create
  553. submodules in Python 2.0, the interpreter segfaults on the cleanup
  554. process when I do. I added a conditional compile on the version
  555. number, falling back to my own routine. It would of course be nice to
  556. investigate what is happening, but I don't have the time to do so
  557. * Do INCREF on the type objects before inserting them in the
  558. dictionary, so they will never reach refcount 0 (they are, after all,
  559. statically allocated)
  560. 2001-07-30 Martin Sjögren <martin@strakt.com>
  561. * Version 0.2
  562. * Lots of tweaking and comments in the code
  563. * Now uses distutils instead of the stupid Setup file
  564. * Hacked doc/tools/mkhowto, html generation should now work
  565. 2001-07-16 Martin Sjögren <martin@strakt.com>
  566. * Initial release (0.1, don't expect much from this one :-)