blob: 074d30ca2cf7115ca9f7329eff22dfa5dd384e28 [file] [log] [blame]
Jim Shaverd382d6d2015-05-27 17:43:40 -040012015-05-27 Jim Shaver <dcypherd@gmail.com>
Paul Kehrerfdca95d2015-04-15 12:59:13 -04002
Jim Shaverabff1882015-05-27 09:15:55 -04003 * OpenSSL/SSL.py, : Add ``get_protocol_version()`` and
4 ``get_protocol_version_name()`` to Connection
Jim Shaver380507e2015-04-27 00:18:24 -04005 Based on work from Rich Moore
Jim Shaverabff1882015-05-27 09:15:55 -04006 * OpenSSL/test/test_crypto.py: tests for ``get_protocol_version()``
7 and ``get_protocol_version_name()``
Jim Shaver380507e2015-04-27 00:18:24 -04008
Jim Shaverd382d6d2015-05-27 17:43:40 -040092015-05-02 Jim Shaver <dcypherd@gmail.com>
10
11 * .travis.yml, setup.py, tox.ini: Removed support for Python 3.2.
12 This version is rarely used and is now deprecated by a major
13 dependency of pyOpenSSL (cryptography). Affected users should upgrade
14 to Python 3.3+.
15
Jim Shaver380507e2015-04-27 00:18:24 -0400162015-04-15 Paul Kehrer <paul.l.kehrer@gmail.com>
17
Paul Kehrerfdca95d2015-04-15 12:59:13 -040018 * OpenSSL/crypto.py, OpenSSL/test/test_crypto.py: Switch to utf8string
19 mask by default. OpenSSL formerly defaulted to a T61String if there
20 were UTF-8 characters present. This was changed to default to
21 UTF8String in the config around 2005, but the actual code didn't
22 change it until late last year. This will default us to the setting
23 that actually works. To revert this you can call
24 crypto._lib.ASN1_STRING_set_default_mask_asc(b"default")
25
262015-04-14 Hynek Schlawack <hs@ox.cx>
Hynek Schlawack197bda92015-04-14 18:51:01 -040027
28 * Release 0.15.1
29
Glyph1287a3b2015-04-14 18:33:09 -0400302015-04-14 Glyph Lefkowitz <glyph@twistedmatrix.com>
31
32 * OpenSSL/SSL.py, OpenSSL/test/test_ssl.py: Fix a regression
Glyph5457bad2015-04-14 18:35:44 -040033 present in 0.15, where when an error occurs and no errno() is set,
34 a KeyError is raised. This happens, for example, if
35 Connection.shutdown() is called when the underlying transport has
36 gone away.
Glyph1287a3b2015-04-14 18:33:09 -040037
Hynek Schlawack197bda92015-04-14 18:51:01 -0400382011-09-02 Hynek Schlawack <hs@ox.cx>
39
40 * Release 0.15
41
Jean-Paul Calderonea38700a2015-04-13 07:26:39 -0400422015-04-12 Jean-Paul Calderone <exarkun@twistedmatrix.com>
43
44 * OpenSSL/rand.py, OpenSSL/SSL.py: APIs which previously accepted
45 filenames only as bytes now accept them as either bytes or
46 unicode (and respect sys.getfilesystemencoding()).
47
Jean-Paul Calderone452c65b2015-03-23 09:16:28 -0400482015-03-23 Jean-Paul Calderone <exarkun@twistedmatrix.com>
49
50 * OpenSSL/SSL.py: Add Cory Benfield's next-protocol-negotiation
51 (NPN) bindings.
52
Jean-Paul Calderonedfe9e492015-03-15 18:30:46 -0400532015-03-15 Jean-Paul Calderone <exarkun@twistedmatrix.com>
54
55 * OpenSSL/SSL.py: Add ``Connection.recv_into``, mirroring the
56 builtin ``socket.recv_into``. Based on work from Cory Benfield.
57 * OpenSSL/test/test_ssl.py: Add tests for ``recv_into``.
58
Jean-Paul Calderonebf1f81c2014-12-11 14:05:24 -0500592015-01-30 Stephen Holsapple <sholsapp@gmail.com>
Jean-Paul Calderone5ab37af2014-12-11 14:05:24 -050060
Jean-Paul Calderonebf1f81c2014-12-11 14:05:24 -050061 * OpenSSL/crypto.py: Expose ``X509StoreContext`` for verifying certificates.
62 * OpenSSL/test/test_crypto.py: Add intermediate certificates for
Jean-Paul Calderone5ab37af2014-12-11 14:05:24 -050063
Paul Aurich306b75a2015-01-08 18:35:03 -0800642015-01-08 Paul Aurich <paul@darkrain42.org>
65
66 * OpenSSL/SSL.py: ``Connection.shutdown`` now propagates errors from the
67 underlying socket.
68
Jean-Paul Calderonebf1f81c2014-12-11 14:05:24 -0500692014-12-11 Jean-Paul Calderone <exarkun@twistedmatrix.com>
70
71 * OpenSSL/SSL.py: Fixed a regression ``Context.check_privatekey``
72 causing it to always succeed - even if it should fail.
73
Alex Gaynorcf823d02014-08-21 10:50:18 -0700742014-08-21 Alex Gaynor <alex.gaynor@gmail.com>
75
76 * OpenSSL/crypto.py: Fixed a regression where calling ``load_pkcs7_data``
Stephen Holsapple0d9815f2014-08-27 19:36:53 -070077 with ``FILETYPE_ASN1`` would fail with a ``NameError``.
Alex Gaynorcf823d02014-08-21 10:50:18 -070078
Jean-Paul Calderone780967e2014-05-05 13:01:16 -0400792014-05-05 Jean-Paul Calderone <exarkun@twistedmatrix.com>
Jean-Paul Calderone4ca24ee2014-04-02 21:10:57 -040080
81 * OpenSSL/SSL.py: Fix a regression in which the first argument of
Jean-Paul Calderone774230a2014-05-06 08:59:49 -040082 the "verify" callback was incorrectly passed a ``Context`` instance
Jean-Paul Calderone4ca24ee2014-04-02 21:10:57 -040083 instead of the ``Connection`` instance.
84 * OpenSSL/test/test_ssl.py: Add a test for the value passed as the
85 first argument of the "verify" callback.
86
Jean-Paul Calderone3611b4e2014-04-19 18:34:06 -0400872014-04-19 Jean-Paul Calderone <exarkun@twistedmatrix.com>
88
89 * OpenSSL/crypto.py: Based on work from Alex Gaynor, Andrew
90 Lutomirski, Tobias Oberstein, Laurens Van Houtven, and Hynek
91 Schlawack, add ``get_elliptic_curve`` and ``get_elliptic_curves``
92 to support TLS ECDHE modes.
93 * OpenSSL/SSL.py: Add ``Context.set_tmp_ecdh`` to configure a TLS
94 context with a particular elliptic curve for ECDHE modes.
95
Markus Unterwaditzer8e41d022014-04-19 12:27:11 +0200962014-04-19 Markus Unterwaditzer <markus@unterwaditzer.net>
97
98 * OpenSSL/SSL.py: ``Connection.send`` and ``Connection.sendall``
99 now also accept the ``buffer`` type as data.
100
Stephen Holsapple38482622014-04-05 20:29:34 -07001012014-04-05 Stephen Holsapple <sholsapp@gmail.com>
102
103 * OpenSSL/crypto.py: Make ``load_pkcs12`` backwards compatible with
104 pyOpenSSL 0.13 by making passphrase optional.
105
Jean-Paul Calderone7c556ef2014-03-30 10:45:00 -04001062014-03-30 Fedor Brunner <fedor.brunner@azet.sk>
Fedor Brunner416f4a12014-03-28 13:18:38 +0100107
Jean-Paul Calderone76f84152014-03-30 11:27:25 -0400108 * OpenSSL/SSL.py: Add ``get_finished``, ``get_peer_finished``
Fedor Brunner416f4a12014-03-28 13:18:38 +0100109 methods to ``Connection``. If you use these methods to
110 implement TLS channel binding (RFC 5929) disable session
111 resumption because triple handshake attacks against TLS.
112 <https://www.ietf.org/mail-archive/web/tls/current/msg11337.html>
113 <https://secure-resumption.com/tlsauth.pdf>
114
Jean-Paul Calderone7c556ef2014-03-30 10:45:00 -04001152014-03-29 Fedor Brunner <fedor.brunner@azet.sk>
Jean-Paul Calderoneab04bdc2014-03-29 18:16:34 -0400116
117 * OpenSSL/SSL.py: Add ``get_cipher_name``, ``get_cipher_bits``,
118 and ``get_cipher_version`` to ``Connection``.
119
Jean-Paul Calderoned735ae82014-03-25 21:03:42 -04001202014-03-28 Jean-Paul Calderone <exarkun@twistedmatrix.com>
121
122 * OpenSSL/tsafe.py: Replace the use of ``apply`` (which has been
123 removed in Python 3) with the equivalent syntax.
124
Jonathan Giannuzzi070c3562014-03-28 15:58:54 +01001252014-03-28 Jonathan Giannuzzi <jonathan@giannuzzi.be>
Jonathan Giannuzzi1ad14af2014-03-20 16:03:30 +0100126
127 * OpenSSL/crypto.py: Fix memory leak in _X509_REVOKED_dup.
Jonathan Giannuzzi070c3562014-03-28 15:58:54 +0100128 * leakcheck/crypto.py: Add checks for _X509_REVOKED_dup, CRL.add_revoked
129 and CRL.get_revoked.
130 * setup.py: Require cryptography 0.3 to have the ASN1_TIME_free binding.
Jean-Paul Calderonefd193a22014-01-09 15:15:45 -0500131
Jean-Paul Calderonefd193a22014-01-09 15:15:45 -05001322014-03-02 Stephen Holsapple <sholsapp@gmail.com>
133
134 * OpenSSL/crypto.py: Add ``get_extensions`` method to ``X509Req``.
135
Hynek Schlawack197bda92015-04-14 18:51:01 -04001362014-02-23 Jean-Paul Calderone <exarkun@twistedmatrix.com>
137
138 * Release 0.14
139
Jean-Paul Calderonefd193a22014-01-09 15:15:45 -05001402014-01-09 Jean-Paul Calderone <exarkun@twistedmatrix.com>
141
142 * OpenSSL: Port to the cffi-based OpenSSL bindings provided by
143 <https://github.com/pyca/cryptography>
144
Jean-Paul Calderone5c0fd552013-10-06 08:58:04 -04001452013-10-06 Jean-Paul Calderone <exarkun@twistedmatrix.com>
146
147 * OpenSSL/ssl/context.c: Add support for negotiating TLS v1.1 or
148 v1.2.
149
Jean-Paul Calderonef7e37e62013-10-03 15:24:23 -04001502013-10-03 Christian Heimes <christian@python.org>
151
152 * OpenSSL/crypto/x509.c: Fix an inconsistency in memory management
153 in X509.get_serial_number which leads to crashes on some runtimes
154 (certain Windows/Python 3.3 environments, at least).
155
Jean-Paul Calderoneff83cdd2013-08-12 18:05:51 -04001562013-08-11 Christian Heimes <christian@python.org>
157
158 * OpenSSL/crypto/x509ext.c: Fix handling of NULL bytes inside
Jean-Paul Calderonede1a6822013-08-23 15:21:30 -0400159 subjectAltName general names when formatting an X509 extension
160 as a string.
Jean-Paul Calderoneff83cdd2013-08-12 18:05:51 -0400161 * OpenSSL/crypto/x509.c: Fix memory leak in get_extension().
162
Jean-Paul Calderoneffe420a2012-04-03 15:25:07 -04001632012-04-03 Jean-Paul Calderone <exarkun@twistedmatrix.com>
164
165 * OpenSSL/crypto/pkey.c: Release the GIL around RSA and DSA key
166 generation, based on code from INADA Naoki.
167
Jean-Paul Calderone593a06d2012-02-13 08:15:07 -05001682012-02-13 Jean-Paul Calderone <exarkun@twistedmatrix.com>
169
170 * OpenSSL/ssl/ssl.c: Add session cache related constants for use
171 with the new Context.set_session_cache_mode method.
172
173 * OpenSSL/ssl/context.c: Add new Context methods
174 set_session_cache_mode and get_session_cache_mode.
175
1762011-11-01 Jean-Paul Calderone <exarkun@twistedmatrix.com>
Jean-Paul Calderone22d915f2011-11-01 10:17:25 -0400177
178 * OpenSSL/crypto/pkey.c: Raise TypeError when trying to check a
179 PKey instance which has no private component, instead of crashing.
180 Based on fix by <lp:~dataway>.
181
Jean-Paul Calderone56b2fb82011-09-14 11:23:38 -04001822011-09-14 Žiga Seilnacht <lp:ziga-seilnacht>
183
184 * OpenSSL/crypto/crypto.c: Allow exceptions from passphrase
185 callbacks to propagate up out of load_privatekey
186 * OpenSSL/crypto/crypto.c: Raise an exception when a too-long
187 passphrase is returned from a passphrase callback, instead of
188 silently truncating it.
189 * OpenSSL/crypto/crypto.c: Fix a memory leak when a passphrase
190 callback returns the wrong type.
191
Jean-Paul Calderonec7293bc2011-09-13 15:24:38 -04001922011-09-13 Jean-Paul Calderone <exarkun@twistedmatrix.com>
193
194 * OpenSSL/crypto/crl.c: Add error handling for the use of
195 X509_CRL_sign.
196
Jean-Paul Calderone54d99bc2011-09-11 15:49:43 -04001972011-09-11 Jonathan Ballet <lp:multani>
198
199 * doc/: Convert the LaTeX documentation to Sphinx-using ReST.
200 * OpenSSL/: Convert the epytext API documentation to Sphinx-using ReST.
201
Jean-Paul Calderone8afc7fc2011-09-08 18:42:51 -04002022011-09-08 Guillermo Gonzalez <guillermo.gonzalez@canonical.com>
Guillermo Gonzalez74a2c292011-08-29 16:16:58 -0300203
204 * OpenSSL/ssl/context.c: Add Context.set_mode method.
205 * OpenSSL/ssl/ssl.c: Add MODE_RELEASE_BUFFERS and OP_NO_COMPRESSION
206 constants.
207
Jean-Paul Calderonebb960a62011-09-02 11:43:50 -04002082011-09-02 Jean-Paul Calderone <exarkun@twistedmatrix.com>
Jean-Paul Calderone9695e8a2011-08-14 18:10:06 -0400209
210 * Release 0.13
211
Jean-Paul Calderoneeecb1982011-06-12 17:34:44 -04002122011-06-12 Jean-Paul Calderone <exarkun@twistedmatrix.com>
213
Jean-Paul Calderone042b66d2011-06-12 21:56:13 -0400214 * OpenSSL/crypto/pkey.c: Add the PKey.check method, mostly
215 implemented by Rick Dean, to verify the internal consistency of a
216 PKey instance.
217
2182011-06-12 Jean-Paul Calderone <exarkun@twistedmatrix.com>
219
Jean-Paul Calderoneeecb1982011-06-12 17:34:44 -0400220 * OpenSSL/crypto/crypto.c: Fix the sign and verify functions so
221 they handle data with embedded NULs. Fix by David Brodsky
222 <lp:~lihalla>.
223
Jean-Paul Calderoneee6532d2011-05-20 20:10:39 -04002242011-05-20 Jean-Paul Calderone <exarkun@twistedmatrix.com>
225
226 * OpenSSL/ssl/connection.c, OpenSSL/test/test_ssl.py: Add a new
227 method to the Connection type, get_peer_cert_chain, for retrieving
228 the peer's certificate chain.
229
Jean-Paul Calderone9c771672011-05-19 17:54:07 -04002302011-05-19 Jean-Paul Calderone <exarkun@twistedmatrix.com>
231
232 * OpenSSL/crypto/x509.c, OpenSSL/test/test_crypto.py: Add a new
233 method to the X509 type, get_signature_algorithm, for inspecting
234 the signature algorithm field of the certificate. Based on a
235 patch from <lp:~okuda>.
236
Jean-Paul Calderone9eff5692011-05-10 20:24:34 -04002372011-05-10 Jean-Paul Calderone <exarkun@twistedmatrix.com>
238
239 * OpenSSL/crypto/crypto.h: Work around a Windows/OpenSSL 1.0 issue
240 explicitly including a Windows header before any OpenSSL headers.
241
242 * OpenSSL/crypto/pkcs12.c: Work around an OpenSSL 1.0 issue by
243 explicitly flushing errors known to be uninteresting after calling
244 PKCS12_parse.
245
246 * OpenSSL/ssl/context.c: Remove SSLv2 support if the underlying
247 OpenSSL library does not provide it.
248
249 * OpenSSL/test/test_crypto.py: Support an OpenSSL 1.0 change from
250 MD5 to SHA1 by allowing either hash algorithm's result as the
251 return value of X509.subject_name_hash.
252
253 * OpenSSL/test/test_ssl.py: Support an OpenSSL 1.0 change from MD5
254 to SHA1 by constructing certificate files named using both hash
255 algorithms' results when testing Context.load_verify_locations.
256
257 * Support OpenSSL 1.0.0a.
258
2592011-04-15 Jean-Paul Calderone <exarkun@twistedmatrix.com>
Jean-Paul Calderone2309cd62011-04-15 12:17:53 -0400260
261 * OpenSSL/ssl/ssl.c: Add OPENSSL_VERSION_NUMBER, SSLeay_version
262 and related constants for retrieving version information about the
263 underlying OpenSSL library.
264
Jean-Paul Calderonefc572cf2011-04-07 15:48:16 -04002652011-04-07 Jean-Paul Calderone <exarkun@twistedmatrix.com>
266
267 * Release 0.12
268
Jean-Paul Calderonec2d2bdb2011-04-06 22:19:52 -04002692011-04-06 Jean-Paul Calderone <exarkun@twistedmatrix.com>
270
271 * OpenSSL/crypto/x509.c: Add get_extension_count and get_extension
272 to the X509 type, allowing read access to certificate extensions.
273
274 * OpenSSL/crypto/x509ext.c: Add get_short_name and get_data to the
275 X509Extension type, allowing read access to the contents of an
276 extension.
277
Jean-Paul Calderonef65fe482011-03-21 19:16:40 -04002782011-03-21 Olivier Hervieu <lp:~ohe>
279
280 * OpenSSL/ssl/ssl.c: Expose a number of symbolic constants for
281 values passed to the connection "info" callback.
282
Jean-Paul Calderonef6a4a7c2011-01-22 10:04:48 -05002832011-01-22 Jean-Paul Calderone <exarkun@twistedmatrix.com>
284
285 * OpenSSL/ssl/connection.py: Add support for new-style
286 buffers (primarily memoryviews) to Connection.send and
287 Connection.sendall.
288
Jean-Paul Calderone8e1716f2010-11-01 17:43:15 -04002892010-11-01 Jean-Paul Calderone <exarkun@twistedmatrix.com>
Jean-Paul Calderone7cb3f6d2010-10-31 10:36:23 -0400290
291 * Release 0.11
292
Jean-Paul Calderoned16a3642010-10-07 22:19:58 -04002932010-10-07 Jean-Paul Calderone <exarkun@twistedmatrix.com>
294
295 * Initial support for Python 3.x throughout the codebase.
296
Jean-Paul Calderone84fd3742010-09-14 18:05:45 -04002972010-09-14 Jean-Paul Calderone <exarkun@twistedmatrix.com>
298
299 * OpenSSL/crypto/netscape_spki.c: Fix an off-by-one mistake in the
300 error handling for NetscapeSPKI.verify. Add additional error
301 checking to NetscapeSPKI.sign to handle the case where there is no
302 private key.
303
304 * OpenSSL/crypto/x509.c: Fix an overflow bug in the subject_name_hash
305 method of the X509 type which would cause it to return negative
306 values on 32 bit systems.
307
308 * OpenSSL/crypto/x509req.c: Fix an off-by-one mistake in the error
309 handling for X509Req.verify.
310
311 * OpenSSL/ssl/context.c: Fix the error handling in the load_tmp_dh
312 method of the Context type which would cause it to always raise
313 MemoryError, regardless of the actual error (such as a bad file
314 name).
315
316 * OpenSSL/test/: Numerous unit tests added, both for above fixes
317 and for other previously untested code paths.
318
Jean-Paul Calderone6d78fed2010-07-27 21:47:22 -04003192010-07-27 Jean-Paul Calderone <exarkun@twistedmatrix.com>
320
321 * Re-arrange the repository so that the package can be built and
322 used in-place without requiring installation.
323
James Yonan7c2e5d32010-02-27 05:45:50 -07003242010-02-27 James Yonan <james@openvpn.net>
325
326 * src/crypto/crypto.c: Added crypto.sign and crypto.verify methods
327 that wrap EVP_Sign and EVP_Verify function families, using code
328 derived from Dave Cridland's PyOpenSSL branch.
329
330 * test/test_crypto.py: Added unit tests for crypto.sign and
331 crypto.verify.
332
Jean-Paul Calderone40b32a22010-01-27 16:56:44 -05003332010-01-27 Jean-Paul Calderone <exarkun@twistedmatrix.com>
334
335 * src/ssl/connection.c, src/util.h: Apply patch from Sandro Tosi to
336 fix misspellings of "compatibility".
337
Jean-Paul Calderone5cc61972009-11-13 09:16:32 -05003382009-11-13 Jean-Paul Calderone <exarkun@twistedmatrix.com>
339
340 * Release 0.10
341
Jean-Paul Calderone76751912009-11-12 07:51:04 -05003422009-11-07 Žiga Seilnacht, Jean-Paul Calderone <exarkun@twistedmatrix.com>
343
344 * src/ssl/connection.c, src/ssl/context.c: Add set_client_ca_list,
345 add_client_ca, and get_client_ca_list to Context for manipulating
346 the list of certificate authority names which are sent by servers
347 with the certificate request message.
348 * src/util.h: Add ssize-related defines if the version of Python
349 being used does not have them.
350 * setup.py: Significant changes to the way Windows builds are done,
351 particularly the way OpenSSL headers and libraries are found (with
352 the new --with-openssl argument to build_ext).
353
Jean-Paul Calderone2953db82009-08-27 13:20:38 -04003542009-08-27 Rick Dean <rick@fdd.com>, Jean-Paul Calderone <exarkun@twistedmatrix.com>
355
356 * src/crypto/pkcs12.c: Add setters to the PKCS12 type for the
357 certificate, private key, ca certificate list, and friendly
358 name, and add a getter for the friendly name. Also add a method
359 for exporting a PKCS12 object as a string.
Jean-Paul Calderone2953db82009-08-27 13:20:38 -0400360 * test/test_crypto.py: Add lots of additional tests for the PKCS12
361 type.
Jean-Paul Calderone2953db82009-08-27 13:20:38 -0400362 * doc/pyOpenSSL.tex: Documentation for the new PKCS12 methods.
363
3642009-07-17 Rick Dean <rick@fdd.com>, Jean-Paul Calderone <exarkun@twistedmatrix.com>
Jean-Paul Calderone9ac425c2009-07-17 16:06:12 -0400365
366 * src/crypto/x509ext.c: Add subject and issuer parameters to
367 X509Extension, allowing creation of extensions which require that
368 information. Fixes LP#322813.
369
Jean-Paul Calderone8b327992009-07-16 18:52:14 -04003702009-07-16 Jean-Paul Calderone <exarkun@twistedmatrix.com>
371
372 * test/util.py: Changed the base TestCase's tearDown to assert that
373 no errors were left in the OpenSSL error queue by the test.
374 * src/crypto/crypto.c: Add a private helper in support of the
375 TestCase.tearDown change.
376 * src/crypto/x509name.c: Changed X509Name's getattr implementation
377 to clean up the error queue. Fixes LP#314814.
378 * test/util.c: Changed flush_error_queue to avoid a reference
379 counting bug caused by macro expansion.
380
Jean-Paul Calderoneb3b94e02009-07-16 14:07:28 -04003812009-07-16 Rick Dean <rick@fdd.com>
382
383 * src/rand.c: Added OpenSSL.rand.bytes to get random bytes directly.
384 * src/util.c: Added generic exceptions_from_error_queue to replace
385 the various other implementations of this function. Also updated
386 the rest of the codebase to use this version instead.
387
Jean-Paul Calderone0b88b6a2009-07-05 12:44:41 -04003882009-07-05 Jean-Paul Calderone <exarkun@twistedmatrix.com>
389
Jean-Paul Calderone18808652009-07-05 12:54:05 -0400390 * test/util.py, test/test_ssl.py, test/test_crypto.py: Fold the
391 Python 2.3 compatibility TestCase mixin into the TestCase defined
392 in util.py.
393
3942009-07-05 Jean-Paul Calderone <exarkun@twistedmatrix.com>
395
Jean-Paul Calderone0b88b6a2009-07-05 12:44:41 -0400396 * test/util.py, test/test_ssl.py, test/test_crypto.py: Stop trying
397 to use Twisted's TestCase even when it's available. Instead,
398 always use the stdlib TestCase with a few enhancements.
399
Jean-Paul Calderonefdc5a0a2009-07-04 15:48:42 -04004002009-07-04 Jean-Paul Calderone <exarkun@twistedmatrix.com>
401
402 * Changed most extension types so that they can be instantiated
403 using the type object rather than a factory function. The old
404 factory functions are now aliases for the type objects.
405 Fixes LP#312786.
406
Jean-Paul Calderonea96bfed2009-05-27 08:47:34 -04004072009-05-27 Jean-Paul Calderone <exarkun@twistedmatrix.com>
408
Jean-Paul Calderone54bcc832009-05-27 14:06:48 -0400409 * Changed all docstrings in extension modules to be friendlier
410 towards Python programmers. Fixes LP#312787.
411
4122009-05-27 Jean-Paul Calderone <exarkun@twistedmatrix.com>
413
Jean-Paul Calderonea96bfed2009-05-27 08:47:34 -0400414 * src/crypto/x509ext.c: Correctly deallocate the new Extension
415 instance when there is an error initializing it and it is not
416 going to be returned. Resolves LP#368043.
417
Jean-Paul Calderoned683f2d2009-05-11 10:47:42 -04004182009-05-11 Jean-Paul Calderone <exarkun@twistedmatrix.com>
419
420 * test/test_crypto.py: Use binary mode for the pipe to talk to the
421 external openssl binary. The data being transported over this
422 pipe is indeed binary, so previously it would often be truncated
423 or otherwise mangled.
424
425 * src/ssl/connection.h, src/ssl/connection.c, test/test_ssl.py:
426 Extend the Connection class with support for in-memory BIOs. This
427 allows SSL to be run without a real socket, useful for
428 implementing EAP-TLS or using SSL with Windows IO completion
Jean-Paul Calderoneb0921592009-05-11 10:48:41 -0400429 ports, for example. Based heavily on contributions from Rick
430 Dean.
Jean-Paul Calderoned683f2d2009-05-11 10:47:42 -0400431
Jean-Paul Calderone71ff3682009-04-25 08:30:11 -04004322009-04-25 Jean-Paul Calderone <exarkun@twistedmatrix.com>
433
434 * Release 0.9
435
Jean-Paul Calderoneb8a70732009-04-01 14:49:13 -04004362009-04-01 Jean-Paul Calderone <exarkun@twistedmatrix.com>
Jean-Paul Calderoneec48cd52009-04-01 19:01:41 -0400437 Samuele Pedroni <pedronis@openend.se>
438
439 * src/util.h: Delete the TLS key before trying to set a new value
440 for it in case the current thread identifier is a recycled one (if
441 it is recycled, the key won't be set because there is already a
442 value from the previous thread to have this identifier and to use
443 the pyOpenSSL API).
444
4452009-04-01 Jean-Paul Calderone <exarkun@twistedmatrix.com>
Jean-Paul Calderoneb8a70732009-04-01 14:49:13 -0400446
447 * src/crypto/crypto.c: Add FILETYPE_TEXT for dumping keys and
448 certificates and certificate signature requests to a text format.
449
Jean-Paul Calderonee7db4b42008-12-31 13:39:24 -05004502008-12-31 Jean-Paul Calderone <exarkun@twistedmatrix.com>
451
Jean-Paul Calderonef8c5fab2008-12-31 15:53:48 -0500452 * src/crypto/x509ext.c, test/test_crypto.py: Add the get_short_name
453 method to X509Extension based on patch from Alex Stapleton.
Jean-Paul Calderone2953db82009-08-27 13:20:38 -0400454
Jean-Paul Calderonef8c5fab2008-12-31 15:53:48 -05004552008-12-31 Jean-Paul Calderone <exarkun@twistedmatrix.com>
456
Jean-Paul Calderonee7db4b42008-12-31 13:39:24 -0500457 * src/crypto/x509ext.c, test/test_crypto.py: Fix X509Extension so
458 that it is possible to instantiate extensions which use s2i or r2i
459 instead of v2i (an extremely obscure extension implementation
460 detail).
461
Jean-Paul Calderone24e2b0b2008-12-30 15:12:11 -05004622008-12-30 Jean-Paul Calderone <exarkun@twistedmatrix.com>
463
464 * MANIFEST.in, src/crypto/crypto.c, src/crypto/x509.c,
465 src/crypto/x509name.c, src/rand/rand.c, src/ssl/context.c: Changes
466 which eliminate compiler warnings but should not change any
467 behavior.
468
Jean-Paul Calderone8dd19b82008-12-28 20:41:16 -05004692008-12-28 Jean-Paul Calderone <exarkun@twistedmatrix.com>
470
Jean-Paul Calderone327d8f92008-12-28 21:55:56 -0500471 * test/test_ssl.py, src/ssl/ssl.c: Expose DTLS-related constants,
472 OP_NO_QUERY_MTU, OP_COOKIE_EXCHANGE, and OP_NO_TICKET.
473
4742008-12-28 Jean-Paul Calderone <exarkun@twistedmatrix.com>
475
Jean-Paul Calderoneaa9c7972008-09-07 21:27:49 -0400476 * src/ssl/context.c: Add a capath parameter to
477 Context.load_verify_locations to allow Python code to specify
478 either or both arguments to the underlying
479 SSL_CTX_load_verify_locations API.
480 * src/ssl/context.c: Add Context.set_default_verify_paths, a wrapper
481 around SSL_CTX_set_default_verify_paths.
482
Jean-Paul Calderone5b000d72008-12-28 21:09:53 -05004832008-12-28 Jean-Paul Calderone <exarkun@twistedmatrix.com>
484
Jean-Paul Calderone8dd19b82008-12-28 20:41:16 -0500485 * test/test_crypto.py, src/crypto/x509req.c: Added get_version and
486 set_version_methods to X509ReqType based on patch from Wouter van
487 Bommel. Resolves LP#274418.
488
Jean-Paul Calderonef7f0fb42008-10-19 11:55:13 -04004892008-09-22 Jean-Paul Calderone <exarkun@twistedmatrix.com>
490
491 * Release 0.8
492
Jean-Paul Calderone002bf462008-10-19 11:35:40 -04004932008-10-19 Jean-Paul Calderone <exarkun@twistedmatrix.com>
494
495 * tsafe.py: Revert the deprecation of the thread-safe Connection
496 wrapper. The Connection class should not segfault if used from
497 multiple threads now, but it generally cannot be relied on to
498 produce correct results if used without the thread-safe wrapper.
Jean-Paul Calderone1eeb29e2008-10-19 11:50:53 -0400499 * doc/pyOpenSSL.tex: Correct the documentation for the set_passwd_cb
500 callback parameter so that it accurately describes the required
501 signature.
Jean-Paul Calderone002bf462008-10-19 11:35:40 -0400502
Jean-Paul Calderonea319ca92008-09-22 08:45:40 -04005032008-09-22 Jean-Paul Calderone <exarkun@twistedmatrix.com>
504
Jean-Paul Calderoneb5fdbbf2008-09-22 09:04:09 -0400505 * Release 0.8a1
506
Jean-Paul Calderoneb7d6db22008-09-21 18:57:56 -04005072008-09-21 Jean-Paul Calderone <exarkun@twistedmatrix.com>
508
509 * src/ssl/ssl.h, src/ssl/ssl.c: Add a thread-local storage key
Jean-Paul Calderone002bf462008-10-19 11:35:40 -0400510 which will be used to store and retrieve PyThreadState pointers
511 whenever it is necessary to release or re-acquire the GIL.
Jean-Paul Calderoneb7d6db22008-09-21 18:57:56 -0400512
513 * src/ssl/context.c: Change global_verify_callback so that it
Jean-Paul Calderone002bf462008-10-19 11:35:40 -0400514 unconditionally manipulates the Python threadstate, rather than
515 checking the tstate field which is now always NULL.
Jean-Paul Calderoneb7d6db22008-09-21 18:57:56 -0400516
Jean-Paul Calderone828c9cb2008-04-26 18:06:54 -04005172008-04-26 Jean-Paul Calderone <exarkun@twistedmatrix.com>
518
Jean-Paul Calderone5ef86512008-04-26 19:06:28 -0400519 * src/ssl/context.c: Change global_passphrase_callback and
520 global_info_callback so that they acquire the GIL before
521 invoking any CPython APIs and do not release it until after they
522 are finished invoking all of them (based heavily on on patch
523 from Dan Williams).
Jean-Paul Calderoneaea5d902008-04-26 19:53:39 -0400524 * src/ssl/crypto.c: Initialize OpenSSL thread support so that it
525 is valid to use OpenSSL APIs from more than one thread (based on
526 patch from Dan Williams).
Jean-Paul Calderone828c9cb2008-04-26 18:06:54 -0400527 * test/test_crypto.py: Add tests for load_privatekey and
528 dump_privatekey when a passphrase or a passphrase callback is
529 supplied.
Jean-Paul Calderone5ef86512008-04-26 19:06:28 -0400530 * test/test_ssl.py: Add tests for Context.set_passwd_cb and
531 Context.set_info_callback.
Jean-Paul Calderone828c9cb2008-04-26 18:06:54 -0400532
Jean-Paul Calderonee53ccf72008-04-11 11:40:39 -04005332008-04-11 Jean-Paul Calderone <exarkun@twistedmatrix.com>
534
535 * Release 0.7
536
Jean-Paul Calderonec54cc182008-03-26 21:11:07 -04005372008-03-26 Jean-Paul Calderone <exarkun@twistedmatrix.com>
538
539 * src/crypto/x509name.c: Add X509Name.get_components
540
Jean-Paul Calderone9ab16c02008-03-25 15:22:47 -04005412008-03-25 Jean-Paul Calderone <exarkun@twistedmatrix.com>
542
543 * src/crypto/x509name.c: Add hash and der methods to X509Name.
Jean-Paul Calderonec8215432008-03-25 15:34:21 -0400544 * src/crypto/x509.c: Fix a bug in X509.get_notBefore and
545 X509.get_notAfter preventing UTCTIME format timestamps from
546 working.
Jean-Paul Calderone9ab16c02008-03-25 15:22:47 -0400547
Jean-Paul Calderone3de9f622008-03-12 14:12:19 -04005482008-03-12 Jean-Paul Calderone <exarkun@twistedmatrix.com>
549
550 * Fix coding problems in examples/. Remove keys and certificates
551 and add a note about how to generate new ones.
552
Jean-Paul Calderone525ef802008-03-09 20:39:42 -04005532008-03-09 Jean-Paul Calderone <exarkun@twistedmatrix.com>
554
555 * src/crypto/x509.c: Add getters and setters for the notBefore and
556 notAfter attributes of X509s.
Jean-Paul Calderoneac0d95f2008-03-10 00:00:42 -0400557 * src/crypto/pkey.h, src/crypto/pkey.c, src/crypto/x509req.c,
558 src/crypto/x509.c: Track the initialized and public/private state
559 of EVP_PKEY structures underlying the crypto_PKeyObj type and
560 reject X509Req signature operations on keys not suitable for the
561 task.
Jean-Paul Calderone525ef802008-03-09 20:39:42 -0400562
Jean-Paul Calderoneda92ccc2008-03-06 23:48:12 -05005632008-03-06 Jean-Paul Calderone <exarkun@twistedmatrix.com>
564
565 * src/crypto/x509name.c: Fix tp_compare so it only returns -1, 0, or
566 1. This eliminates a RuntimeWarning emitted by Python.
567 * src/crypto/x509req.c: Fix reference counting for X509Name returned
568 by X509Req.get_subject. This removes a segfault when the subject
569 name outlives the request object.
570 * src/crypto/x509.c: Change get_serial_number and set_serial_number
571 to accept Python longs.
572 * doc/pyOpenSSL.tex: A number of minor corrections.
573
Jean-Paul Calderone7df40db2008-03-03 15:12:42 -05005742008-03-03 Jean-Paul Calderone <exarkun@twistedmatrix.com>
575
576 * src/crypto/crypto.c: Expose X509_verify_cert_error_string. (patch
577 from Victor Stinner)
578
Jean-Paul Calderone12ea9a02008-02-22 12:24:39 -05005792008-02-22 Jean-Paul Calderone <exarkun@twistedmatrix.com>
580
581 * src/ssl/connection.c src/ssl/context.c src/ssl/ssl.c: Fix
582 compilation on Windows. (patch from Michael Schneider)
583
Jean-Paul Calderone72b8f0f2008-02-21 23:57:40 -05005842008-02-21 Jean-Paul Calderone <exarkun@twistedmatrix.com>
585
586 * src/ssl/connection.c: Expose SSL_get_shutdown and
587 SSL_set_shutdown. (patch from James Knight)
588 * src/ssl/ssl.c: Expose SSL_SENT_SHUTDOWN and SSL_RECEIVED_SHUTDOWN.
589 (patch from James Knight)
590
Jean-Paul Calderone779db6b2008-02-19 21:00:37 -05005912008-02-19 Jean-Paul Calderone <exarkun@twistedmatrix.com>
592
593 * src/ssl/context.c: Expose SSL_CTX_add_extra_chain_cert.
594 * src/crypto/x509name.c: Fix memory leaks in __getattr__ and
595 __setattr_ implementations.
Jean-Paul Calderone19555b92008-02-19 22:29:57 -0500596 * src/crypto/x509.c: Fix memory leak in X509.get_pubkey().
597 * leakcheck/: An attempt at a systematic approach to leak
598 elimination.
Jean-Paul Calderone779db6b2008-02-19 21:00:37 -0500599
Jean-Paul Calderone897bc252008-02-18 20:50:23 -05006002004-08-13 Martin Sjögren <msjogren@gmail.com>
601
602 * Released version 0.6.
603
6042004-08-11 Martin Sjögren <msjogren@gmail.com>
605
606 * doc/pyOpenSSL.tex: Updates to the docs.
607
6082004-08-10 Martin Sjögren <msjogren@gmail.com>
609
610 * src/crypto/x509.c: Add X509.add_extensions based on a patch
611 from Han S. Lee.
612 * src/ssl/ssl.c: Add more SSL_OP_ constants. Patch from Mihai
613 Ibanescu.
614
6152004-08-09 Martin Sjögren <msjogren@gmail.com>
616
617 * setup.py src/crypto/: Add support for Netscape SPKI extensions
618 based on a patch from Tollef Fog Heen.
619 * src/crypto/crypto.c: Add support for python passphrase callbacks
620 based on a patch from Robert Olson.
621
6222004-08-03 Martin Sjögren <msjogren@gmail.com>
623
624 * src/ssl/context.c: Applied patch from Frederic Peters to add
625 Context.use_certificate_chain_file.
626 * src/crypto/x509.c: Applid patch from Tollef Fog Heen to add
627 X509.subject_name_hash and X509.digest.
628
6292004-08-02 Martin Sjögren <msjogren@gmail.com>
630
631 * src/crypto/crypto.c src/ssl/ssl.c: Applied patch from Bastian
632 Kleineidam to fix full names of exceptions.
633
6342004-07-19 Martin Sjögren <msjogren@gmail.com>
635
636 * doc/pyOpenSSL.tex: Fix the errors regarding X509Name's field names.
Jean-Paul Calderone828c9cb2008-04-26 18:06:54 -0400637
Jean-Paul Calderone897bc252008-02-18 20:50:23 -05006382004-07-18 Martin Sjögren <msjogren@gmail.com>
639
640 * examples/certgen.py: Fixed wrong attributes in doc string, thanks
641 Remy. (SFbug#913315)
642 * __init__.py, setup.py, version.py: Add __version__, as suggested by
643 Ronald Oussoren in SFbug#888729.
644 * examples/proxy.py: Fix typos, thanks Mihai Ibanescu. (SFpatch#895820)
645
6462003-01-09 Martin Sjögren <martin@strakt.com>
647
648 * Use cyclic GC protocol in SSL.Connection, SSL.Context, crypto.PKCS12
649 and crypto.X509Name.
650
6512002-12-02 Martin Sjögren <martin@strakt.com>
652
653 * tsafe.py: Add some missing methods.
654
6552002-10-06 Martin Sjögren <martin@strakt.com>
656
657 * __init__.py: Import tsafe too!
658
6592002-10-05 Martin Sjögren <martin@strakt.com>
660
661 * src/crypto/x509name.c: Use unicode strings instead of ordinary
662 strings in getattr/setattr. Note that plain ascii strings should
663 still work.
664
6652002-09-17 Martin Sjögren <martin@strakt.com>
666
667 * Released version 0.5.1.
668
6692002-09-09 Martin Sjögren <martin@strakt.com>
670
671 * setup.cfg: Fixed build requirements for rpms.
672
6732002-09-07 Martin Sjögren <martin@strakt.com>
674
675 * src/ssl/connection.c: Fix sendall() method. It segfaulted because
676 it was too generous about giving away the GIL.
677 * Added SecureXMLRPCServer example, contributed by Michal Wallace.
678
6792002-09-06 Martin Sjögren <martin@strakt.com>
680
681 * setup.cfg: Updated the build requirements.
682 * src/ssl/connection.c: Fix includes for AIX.
683
6842002-09-04 Anders Hammarquist <iko@strakt.com>
685
686 * Added type checks in all the other places where we expect
687 specific types of objects passed.
688
6892002-09-04 Martin Sjögren <martin@strakt.com>
690
691 * src/crypto/crypto.c: Added an explicit type check in the dump_*
692 functions, so that they won't die when e.g. None is passed in.
693
6942002-08-25 Martin Sjögren <martin@strakt.com>
695
696 * doc/pyOpenSSL.tex: Docs for PKCS12.
697
6982002-08-24 Martin Sjögren <martin@strakt.com>
699
700 * src/crypto: Added basic PKCS12 support, thanks to Mark Welch
701 <mark@collab.net>
702
7032002-08-16 Martin Sjögren <martin@strakt.com>
704
705 * D'oh! Fixes for python 1.5 and python 2.1.
706
7072002-08-15 Martin Sjögren <martin@strakt.com>
708
709 * Version 0.5. Yay!
710
7112002-07-25 Martin Sjögren <martin@strakt.com>
712
713 * src/ssl/context.c: Added set_options method.
714 * src/ssl/ssl.c: Added constants for Context.set_options method.
715
7162002-07-23 Martin Sjögren <martin@strakt.com>
717
718 * Updated docs
719 * src/ssl/connection.c: Changed the get_cipher_list method to actually
720 return a list! WARNING: This change makes the API incompatible with
721 earlier versions!
722
7232002-07-15 Martin Sjögren <martin@strakt.com>
724
725 * src/ssl/connection.[ch]: Removed the fileno method, it uses the
726 transport object's fileno instead.
727
7282002-07-09 Martin Sjögren <martin@strakt.com>
729
730 * src/crypto/x509.c src/crypto/x509name.c: Fixed segfault bug where
731 you used an X509Name after its X509 had been destroyed.
732 * src/crypto/crypto.[ch] src/crypto/x509req.c src/crypto/x509ext.[ch]:
733 Added X509 Extension support. Thanks to maas-Maarten Zeeman
734 <maas@awanim.com>
735 * src/crypto/pkey.c: Added bits() and type() methods.
736
7372002-07-08 Martin Sjögren <martin@strakt.com>
738
739 * src/ssl/connection.c: Moved the contents of setup_ssl into the
740 constructor, thereby fixing some segfault bugs :)
741 * src/ssl/connection.c: Added connect_ex and sendall methods.
742 * src/crypto/x509name.c: Cleaned up comparisons and NID lookup.
743 Thank you Maas-Maarten Zeeman <maas@awanim.com>
744 * src/rand/rand.c: Fix RAND_screen import.
745 * src/crypto/crypto.c src/crypto/pkcs7.[ch]: Added PKCS7 management,
746 courtesy of Maas-Maarten Zeeman <maas@awanim.com>
747 * src/crypto/x509req.c: Added verify method.
748
7492002-06-17 Martin Sjögren <martin@strakt.com>
750
751 * rpm/, setup.cfg: Added improved RPM-building stuff, thanks to
752 Mihai Ibanescu <misa@redhat.com>
753
7542002-06-14 Martin Sjögren <martin@strakt.com>
755
756 * examples/proxy.py: Example code for using OpenSSL through a proxy
757 contributed by Mihai Ibanescu <misa@redhat.com>
758 * Updated installation instruction and added them to the TeX manual.
759
7602002-06-13 Martin Sjögren <martin@strakt.com>
761
762 * src/ssl/context.c: Changed global_verify_callback so that it uses
763 PyObject_IsTrue instead of requring ints.
764 * Added pymemcompat.h to make the memory management uniform and
765 backwards-compatible.
766 * src/util.h: Added conditional definition of PyModule_AddObject and
767 PyModule_AddIntConstant
768 * src/ssl/connection.c: Socket methods are no longer explicitly
769 wrapped. fileno() is the only method the transport layer object HAS
770 to support, but if you want to use connect, accept or sock_shutdown,
771 then the transport layer object has to supply connect, accept
772 and shutdown respectively.
773
7742002-06-12 Martin Sjögren <martin@strakt.com>
775
776 * Changed comments to docstrings that are visible in Python.
777 * src/ssl/connection.c: Added set_connect_state and set_accept_state
778 methods. Thanks to Mark Welch <mark@collab.net> for this.
779
7802002-06-11 Martin Sjögren <martin@strakt.com>
781
782 * src/ssl/connection.c: accept and connect now use SSL_set_accept_state
783 and SSL_set_connect_state respectively, instead of SSL_accept and
784 SSL_connect.
785 * src/ssl/connection.c: Added want_read and want_write methods.
786
7872002-06-05 Martin Sjögren <martin@strakt.com>
788
789 * src/ssl/connection.c: Added error messages for windows. The code is
790 copied from Python's socketmodule.c. Ick.
791 * src/ssl/connection.c: Changed the parameters to the SysCallError. It
792 always has a tuple (number, string) now, even though the number
793 might not always be useful.
794
7952002-04-05 Martin Sjögren <md9ms@mdstud.chalmers.se>
796
797 * Worked more on the Debian packaging, hopefully the packages
798 are getting into the main Debian archive soon.
799
8002002-01-10 Martin Sjögren <martin@strakt.com>
801
802 * Worked some more on the Debian packaging, it's turning out real
803 nice.
804 * Changed format on this file, I'm going to try to be a bit more
805 verbose about my changes, and this format makes it easier.
806
8072002-01-08 Martin Sjögren <martin@strakt.com>
808
809 * Version 0.4.1
810 * Added some example code
811 * Added the thread safe Connection object in the 'tsafe' submodule
812 * New Debian packaging
813
8142001-08-09 Martin Sjögren <martin@strakt.com>
815
816 * Version 0.4
817 * Added a compare function for X509Name structures.
818 * Moved the submodules to separate .so files, with tiny C APIs so they
819 can communicate
820 * Skeletal OpenSSL/__init__.py
821 * Removed the err submodule, use crypto.Error and SSL.Error instead
822
8232001-08-06 Martin Sjögren <martin@strakt.com>
824
825 * Version 0.3
826 * Added more types for dealing with certificates (X509Store, X509Req,
827 PKey)
828 * Functionality to load private keys, certificates and certificate
829 requests from memory buffers, and store them too
830 * X509 and X509Name objects can now be modified as well, very neat when
831 creating certificates ;)
832 * Added SSL_MODE_AUTO_RETRY to smooth things for blocking sockets
833 * Added a sock_shutdown() method to the Connection type
834 * I don't understand why, but I can't use Py_InitModule() to create
835 submodules in Python 2.0, the interpreter segfaults on the cleanup
836 process when I do. I added a conditional compile on the version
837 number, falling back to my own routine. It would of course be nice to
838 investigate what is happening, but I don't have the time to do so
839 * Do INCREF on the type objects before inserting them in the
840 dictionary, so they will never reach refcount 0 (they are, after all,
841 statically allocated)
842
8432001-07-30 Martin Sjögren <martin@strakt.com>
844
845 * Version 0.2
846 * Lots of tweaking and comments in the code
847 * Now uses distutils instead of the stupid Setup file
848 * Hacked doc/tools/mkhowto, html generation should now work
849
8502001-07-16 Martin Sjögren <martin@strakt.com>
851
852 * Initial release (0.1, don't expect much from this one :-)
853