Oscrypto

Latest version: v1.3.0

Safety actively analyzes 629359 Python packages for vulnerabilities to keep your Python projects secure.

Scan your dependencies

Page 4 of 5

0.14.1

- Fixed a bug where `asymmetric.generate_pair()` would raise an exception on
OS X when the system Python was used to create a virtualenv

0.14.0

- `tls.TLSSocket()` now has a default connect, read and write timeout of `10`
seconds
- Fixed bugs with `manual_validation` keyword param for `tls.TLSSession()` on
all three platforms
- Fixed a bug in `asymmetric.PublicKey.self_signed` that would always force
signature verification
- Improved parsing of TLS records during handshakes to improve error messaging
- `tls.TLSSocket()` on OS X now respects `KeyboardInterrupt` while in a read
or write callback
- TLS connections on Windows will fallback to TLSv1.1 if TLSv1.2 is negotiated
but a trust root with an MD2 or MD5 certificate is part of the certificate
path. Previously the connection would fail.
- TLS connections with optional client authentication no longer fail on Windows
- `trust_list.get_list()` on Windows now returns a de-duplicated list

0.13.1

- Improved handling of signature errors to always raise `errors.SignatureError`
- Fixed a bug with `trust_list.get_list()` on Windows not returning
certificates that were valid for all uses

0.13.0

- Backwards compatibility break: `trust_list.get_list()` now returns a list of
`asn1crypto.x509.Certificate` objects instead of a list of byte strings
- `trust_list.get_list()` now returns a copy of the list to prevent accidental
modification of the list
- Added `tls.TLSSocket.hostname`

0.12.0

- Fixed Python 2.6 support on Windows and Linux
- Fixed handling of some TLS error conditions with Python 2 on Windows
- Corrected handling of incomplete DSA keys on Windows
- Fixed a bug converting a `FILETIME` struct with Python 2 on Windows to a
`datetime` object
- Fixed a cast/free bug with cffi and CPython on Windows that incorrectly
reported some TLS certificates as invalid
- Fixed a bug with exporting the trust list from Windows on Python 2 x64
- Fixed detection of weak DH params in a TLS connection on OS X 10.7-10.9
- OS X 10.7-10.9 no longer use CRL/OCSP to check for revocation, making the
functionality consistent with Linux, Window and OS X 10.10 and newer
- Fixed OS X 10.7 TLS validation when using `extra_trust_roots` in a
`tls.TLSSession`

0.11.1

- Handles specific weak DH keys error code in newer versions of OpenSSL
- Added `__str__()` and `__unicode__()` to TLS exceptions

Page 4 of 5

© 2024 Safety CLI Cybersecurity Inc. All Rights Reserved.