Skip to content
Permalink

Comparing changes

Choose two branches to see what’s changed or to start a new pull request. If you need to, you can also or learn more about diff comparisons.

Open a pull request

Create a new pull request by comparing changes across two branches. If you need to, you can also . Learn more about diff comparisons here.
base repository: pyca/pyopenssl
Failed to load repositories. Confirm that selected base ref is valid, then try again.
Loading
base: 23.3.0
Choose a base ref
...
head repository: pyca/pyopenssl
Failed to load repositories. Confirm that selected head ref is valid, then try again.
Loading
compare: 24.0.0
Choose a head ref
  • 12 commits
  • 15 files changed
  • 6 contributors

Commits on Oct 27, 2023

  1. Use ruff format (#1265)

    alex authored Oct 27, 2023
    Copy the full SHA
    c8b8c1e View commit details

Commits on Nov 14, 2023

  1. Bump dessant/lock-threads from 4 to 5 (#1269)

    Bumps [dessant/lock-threads](https://github.com/dessant/lock-threads) from 4 to 5.
    - [Release notes](https://github.com/dessant/lock-threads/releases)
    - [Changelog](https://github.com/dessant/lock-threads/blob/main/CHANGELOG.md)
    - [Commits](dessant/lock-threads@v4...v5)
    
    ---
    updated-dependencies:
    - dependency-name: dessant/lock-threads
      dependency-type: direct:production
      update-type: version-update:semver-major
    ...
    
    Signed-off-by: dependabot[bot] <support@github.com>
    Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
    dependabot[bot] authored Nov 14, 2023
    Copy the full SHA
    5b17340 View commit details

Commits on Nov 30, 2023

  1. docs: include test dependencies when developing pyOpenSSL (#1271)

    If someone is running `pip install -e` to develop on pyOpenSSL,
    presumably they want to be able to run the tests too.
    davidben authored Nov 30, 2023
    Copy the full SHA
    bb4a60d View commit details
  2. Fix various issues around X509_STORE_CTX reuse (#1272)

    * Don't try to access X509_STORE_CTX after _cleanup
    
    Although OpenSSL happens to leave the errors in there on
    X509_STORE_CTX_cleanup, in no other OpenSSL API is accessing a cleaned
    up object meaningful. Do it in the other order.
    
    * Internal variables are internal
    
    The underscore-prefixed variables were not intended to be exposed as
    public API, so don't bother exposing it in the first place.
    
    * Don't reuse X509_STORE_CTXs
    
    There's a lot of history with X509_STORE_CTX's somewhat messy transition
    from a stack-allocated type to a heap-allocated type. (This is why a
    double X509_STORE_CTX_init used to leak memory.) We can avoid all this
    mess by just making a new X509_STORE_CTX each time.
    davidben authored Nov 30, 2023
    Copy the full SHA
    acb31fb View commit details

Commits on Dec 5, 2023

  1. Put mypy, coverage.py, pytest in pyproject (#1273)

    * Put mypy, coverage.py, pytest in pyproject
    
    Signed-off-by: William Woodruff <william@trailofbits.com>
    
    * tox: coverage[toml]
    
    Signed-off-by: William Woodruff <william@trailofbits.com>
    
    ---------
    
    Signed-off-by: William Woodruff <william@trailofbits.com>
    woodruffw authored Dec 5, 2023
    Copy the full SHA
    5dc1044 View commit details

Commits on Dec 7, 2023

  1. Bump actions/setup-python from 4 to 5 (#1274)

    Bumps [actions/setup-python](https://github.com/actions/setup-python) from 4 to 5.
    - [Release notes](https://github.com/actions/setup-python/releases)
    - [Commits](actions/setup-python@v4...v5)
    
    ---
    updated-dependencies:
    - dependency-name: actions/setup-python
      dependency-type: direct:production
      update-type: version-update:semver-major
    ...
    
    Signed-off-by: dependabot[bot] <support@github.com>
    Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
    dependabot[bot] authored Dec 7, 2023
    Copy the full SHA
    abf91d7 View commit details

Commits on Jan 10, 2024

  1. Fix a typo in deprecation warnings (#1280)

    The correct spelling is `equivalent`, not `equivilant`.
    jlaine authored Jan 10, 2024
    Copy the full SHA
    8219562 View commit details
  2. Replace RSA-512 test keys with RSA-2048 (#1281)

    RSA-512 was factored in 1999. Since none of these tests are specific to
    the size of the RSA key, best to test inputs that are representative of
    real-world inputs, lest the underlying cryptography library start
    enforcing post-1999 security levels.
    davidben authored Jan 10, 2024
    Copy the full SHA
    920fa96 View commit details
  3. Add Connection.get_selected_srtp_profile (#1278) (#1279)

    If an SRTP profile was negotiated as part of the handshake, make it
    possible to retrieve the name of the profile. This is needed to
    determine which profiles were offered using `Context.set_tlsext_use_srtp`
    was actually selected.
    jlaine authored Jan 10, 2024
    Copy the full SHA
    34b018f View commit details

Commits on Jan 13, 2024

  1. Fix changelog by moving new features to 24.0.0 release (#1282)

    PR #1279 inadvertently appended the change to a past release, so fix
    this.
    jlaine authored Jan 13, 2024
    Copy the full SHA
    df358b3 View commit details
  2. add all-green CI job (#1283)

    mhils authored Jan 13, 2024
    Copy the full SHA
    d9752e4 View commit details

Commits on Jan 23, 2024

  1. Bump for release (#1284)

    alex authored Jan 23, 2024
    Copy the full SHA
    7f3e4f9 View commit details
Loading