File: ChangeLog

package info (click to toggle)
python-nss 1.0.1-2
  • links: PTS, VCS
  • area: main
  • in suites: sid
  • size: 2,520 kB
  • sloc: ansic: 30,852; python: 3,346; makefile: 7
file content (1066 lines) | stat: -rw-r--r-- 36,796 bytes parent folder | download | duplicates (2)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
640
641
642
643
644
645
646
647
648
649
650
651
652
653
654
655
656
657
658
659
660
661
662
663
664
665
666
667
668
669
670
671
672
673
674
675
676
677
678
679
680
681
682
683
684
685
686
687
688
689
690
691
692
693
694
695
696
697
698
699
700
701
702
703
704
705
706
707
708
709
710
711
712
713
714
715
716
717
718
719
720
721
722
723
724
725
726
727
728
729
730
731
732
733
734
735
736
737
738
739
740
741
742
743
744
745
746
747
748
749
750
751
752
753
754
755
756
757
758
759
760
761
762
763
764
765
766
767
768
769
770
771
772
773
774
775
776
777
778
779
780
781
782
783
784
785
786
787
788
789
790
791
792
793
794
795
796
797
798
799
800
801
802
803
804
805
806
807
808
809
810
811
812
813
814
815
816
817
818
819
820
821
822
823
824
825
826
827
828
829
830
831
832
833
834
835
836
837
838
839
840
841
842
843
844
845
846
847
848
849
850
851
852
853
854
855
856
857
858
859
860
861
862
863
864
865
866
867
868
869
870
871
872
873
874
875
876
877
878
879
880
881
882
883
884
885
886
887
888
889
890
891
892
893
894
895
896
897
898
899
900
901
902
903
904
905
906
907
908
909
910
911
912
913
914
915
916
917
918
919
920
921
922
923
924
925
926
927
928
929
930
931
932
933
934
935
936
937
938
939
940
941
942
943
944
945
946
947
948
949
950
951
952
953
954
955
956
957
958
959
960
961
962
963
964
965
966
967
968
969
970
971
972
973
974
975
976
977
978
979
980
981
982
983
984
985
986
987
988
989
990
991
992
993
994
995
996
997
998
999
1000
1001
1002
1003
1004
1005
1006
1007
1008
1009
1010
1011
1012
1013
1014
1015
1016
1017
1018
1019
1020
1021
1022
1023
1024
1025
1026
1027
1028
1029
1030
1031
1032
1033
1034
1035
1036
1037
1038
1039
1040
1041
1042
1043
1044
1045
1046
1047
1048
1049
1050
1051
1052
1053
1054
1055
1056
1057
1058
1059
1060
1061
1062
1063
1064
1065
1066
2017-02-16  Christian Heimes  <cheimes@redhat.com> 1.0.1

  * Add TLS 1.3 cipher suites.

  * ssl_cipher_info.py now attempts to enable TLS 1.3.

  * Fix build issue in setup.py. python-nss can now be build
    as Python wheel, e.g. `pip wheel -w dist .`

  * The following constants were added:

    - ssl.TLS_AES_128_GCM_SHA256
    - ssl.TLS_AES_256_GCM_SHA384
    - ssl.TLS_CHACHA20_POLY1305_SHA256

2016-09-01  John Dennis  <jdennis@redhat.com> 1.0.0
  * Official 1.0.0 release, only minor tweaks from 1.0.0.beta1

  * Allow custom include root in setup.py as command line arg

  * Add TLS chacha20 poly1305 constants

  * Remove checks for whether a socket is open for reading. It's not
    possible for the binding to know in all cases, especially if the
    socket is created from an external socket passed in.

  * The following module functions were added:

    - nss.get_all_tokens

  * The following constants were added:
	
    - ssl.TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256
    - ssl.TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256
    - ssl.TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256
    - ssl.TLS_ECDHE_PSK_WITH_CHACHA20_POLY1305_SHA256
    - ssl.TLS_DHE_PSK_WITH_CHACHA20_POLY1305_SHA256

	
2015-09-03  John Dennis  <jdennis@redhat.com> 1.0.0beta1
  The primary enhancement in this version is support for Python3
  Single code base supports both Py2 (minimum version 2.7) and Py3
  
      When built for Py2:
       - text will be a Unicode object
       - binary data will be a str object
       - ints will be Python long object
      When built for Py3:
       - text will be a str object
       - binary data will be a bytes object
       - ints will be a Python int object

      All pure Python tests and examples have been ported to Py3
      syntax but should continue to run under Py2.
	
  * The following class methods were added:

    - PK11Slot.check_security_officer_passwd
    - PK11Slot.check_user_passwd
    - PK11Slot.change_passwd
    - PK11Slot.init_pin

2014-11-07  John Dennis  <jdennis@redhat.com> 0.17.0
  The primary enhancement in this version is adding support for PBKDF2

  * The following module functions were added:

    - nss.create_pbev2_algorithm_id

  * The following class methods were added:

    - nss.AlgorithmID.get_pbe_crypto_mechanism
    - nss.AlgorithmID.get_pbe_iv

    - nss.PK11Slot.pbe_key_gen
    - nss.PK11Slot.format_lines
    - nss.PK11Slot.format

    - nss.Pk11SymKey.format_lines
    - nss.Pk11SymKey.format

    - nss.SecItem.to_base64
    - nss.SecItem.format_lines
    - nss.SecItem.format

	* The following files were added:

    - doc/examples/pbkdf2_example.py

  * The SecItem constructor added 'ascii' parameter to permit initialization
    from base64 and/or PEM textual data.

2014-10-21  John Dennis  <jdennis@redhat.com> 0.16.0
  The primary enhancements in this version is adding support for the
  setting trust attributes on a Certificate, the SSL version range API,
  information on the SSL cipher suites and information on the SSL connection.

  * The following module functions were added:

    - ssl.get_ssl_version_from_major_minor
    - ssl.get_default_ssl_version_range
    - ssl.get_supported_ssl_version_range
    - ssl.set_default_ssl_version_range
    - ssl.ssl_library_version_from_name
    - ssl.ssl_library_version_name
    - ssl.get_cipher_suite_info
    - ssl.ssl_cipher_suite_name
    - ssl.ssl_cipher_suite_from_name

  * The following deprecated module functions were removed:

    - ssl.nssinit
    - ssl.nss_ini
    - ssl.nss_shutdown

  * The following classes were added:

    - SSLCipherSuiteInfo
    - SSLChannelInfo

  * The following class methods were added:

    - Certificate.trust_flags
    - Certificate.set_trust_attributes

    - SSLSocket.set_ssl_version_range
    - SSLSocket.get_ssl_version_range
    - SSLSocket.get_ssl_channel_info
    - SSLSocket.get_negotiated_host
    - SSLSocket.connection_info_format_lines
    - SSLSocket.connection_info_format
    - SSLSocket.connection_info_str

    - SSLCipherSuiteInfo.format_lines
    - SSLCipherSuiteInfo.format

    - SSLChannelInfo.format_lines
    - SSLChannelInfo.format

  * The following class properties were added:

    - Certificate.ssl_trust_flags
    - Certificate.email_trust_flags
    - Certificate.signing_trust_flags

    - SSLCipherSuiteInfo.cipher_suite
    - SSLCipherSuiteInfo.cipher_suite_name
    - SSLCipherSuiteInfo.auth_algorithm
    - SSLCipherSuiteInfo.auth_algorithm_name
    - SSLCipherSuiteInfo.kea_type
    - SSLCipherSuiteInfo.kea_type_name
    - SSLCipherSuiteInfo.symmetric_cipher
    - SSLCipherSuiteInfo.symmetric_cipher_name
    - SSLCipherSuiteInfo.symmetric_key_bits
    - SSLCipherSuiteInfo.symmetric_key_space
    - SSLCipherSuiteInfo.effective_key_bits
    - SSLCipherSuiteInfo.mac_algorithm
    - SSLCipherSuiteInfo.mac_algorithm_name
    - SSLCipherSuiteInfo.mac_bits
    - SSLCipherSuiteInfo.is_fips
    - SSLCipherSuiteInfo.is_exportable
    - SSLCipherSuiteInfo.is_nonstandard

    - SSLChannelInfo.protocol_version
    - SSLChannelInfo.protocol_version_str
    - SSLChannelInfo.protocol_version_enum
    - SSLChannelInfo.major_protocol_version
    - SSLChannelInfo.minor_protocol_version
    - SSLChannelInfo.cipher_suite
    - SSLChannelInfo.auth_key_bits
    - SSLChannelInfo.kea_key_bits
    - SSLChannelInfo.creation_time
    - SSLChannelInfo.creation_time_utc
    - SSLChannelInfo.last_access_time
    - SSLChannelInfo.last_access_time_utc
    - SSLChannelInfo.expiration_time
    - SSLChannelInfo.expiration_time_utc
    - SSLChannelInfo.compression_method
    - SSLChannelInfo.compression_method_name
    - SSLChannelInfo.session_id

  * The following files were added:

    - doc/examples/cert_trust.py
    - doc/examples/ssl_version_range.py

  * The following constants were added:
    - nss.CERTDB_TERMINAL_RECORD
    - nss.CERTDB_VALID_PEER
    - nss.CERTDB_TRUSTED
    - nss.CERTDB_SEND_WARN
    - nss.CERTDB_VALID_CA
    - nss.CERTDB_TRUSTED_CA
    - nss.CERTDB_NS_TRUSTED_CA
    - nss.CERTDB_USER
    - nss.CERTDB_TRUSTED_CLIENT_CA
    - nss.CERTDB_GOVT_APPROVED_CA
    - ssl.SRTP_AES128_CM_HMAC_SHA1_32
    - ssl.SRTP_AES128_CM_HMAC_SHA1_80
    - ssl.SRTP_NULL_HMAC_SHA1_32
    - ssl.SRTP_NULL_HMAC_SHA1_80
    - ssl.SSL_CK_DES_192_EDE3_CBC_WITH_MD5
    - ssl.SSL_CK_DES_64_CBC_WITH_MD5
    - ssl.SSL_CK_IDEA_128_CBC_WITH_MD5
    - ssl.SSL_CK_RC2_128_CBC_EXPORT40_WITH_MD5
    - ssl.SSL_CK_RC2_128_CBC_WITH_MD5
    - ssl.SSL_CK_RC4_128_EXPORT40_WITH_MD5
    - ssl.SSL_CK_RC4_128_WITH_MD5
    - ssl.SSL_FORTEZZA_DMS_WITH_FORTEZZA_CBC_SHA
    - ssl.SSL_FORTEZZA_DMS_WITH_NULL_SHA
    - ssl.SSL_FORTEZZA_DMS_WITH_RC4_128_SHA
    - ssl.SSL_RSA_OLDFIPS_WITH_3DES_EDE_CBC_SHA
    - ssl.SSL_RSA_OLDFIPS_WITH_DES_CBC_SHA
    - ssl.TLS_DHE_DSS_EXPORT_WITH_DES40_CBC_SHA
    - ssl.TLS_DHE_DSS_WITH_3DES_EDE_CBC_SHA
    - ssl.TLS_DHE_DSS_WITH_AES_128_GCM_SHA256
    - ssl.TLS_DHE_DSS_WITH_CAMELLIA_128_CBC_SHA
    - ssl.TLS_DHE_DSS_WITH_CAMELLIA_256_CBC_SHA
    - ssl.TLS_DHE_DSS_WITH_DES_CBC_SHA
    - ssl.TLS_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA
    - ssl.TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA
    - ssl.TLS_DHE_RSA_WITH_AES_128_CBC_SHA256
    - ssl.TLS_DHE_RSA_WITH_AES_128_GCM_SHA256
    - ssl.TLS_DHE_RSA_WITH_AES_256_CBC_SHA256
    - ssl.TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA
    - ssl.TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA
    - ssl.TLS_DHE_RSA_WITH_DES_CBC_SHA
    - ssl.TLS_DH_ANON_WITH_CAMELLIA_128_CBC_SHA
    - ssl.TLS_DH_ANON_WITH_CAMELLIA_256_CBC_SHA
    - ssl.TLS_DH_DSS_EXPORT_WITH_DES40_CBC_SHA
    - ssl.TLS_DH_DSS_WITH_3DES_EDE_CBC_SHA
    - ssl.TLS_DH_DSS_WITH_CAMELLIA_128_CBC_SHA
    - ssl.TLS_DH_DSS_WITH_CAMELLIA_256_CBC_SHA
    - ssl.TLS_DH_DSS_WITH_DES_CBC_SHA
    - ssl.TLS_DH_RSA_EXPORT_WITH_DES40_CBC_SHA
    - ssl.TLS_DH_RSA_WITH_3DES_EDE_CBC_SHA
    - ssl.TLS_DH_RSA_WITH_CAMELLIA_128_CBC_SHA
    - ssl.TLS_DH_RSA_WITH_CAMELLIA_256_CBC_SHA
    - ssl.TLS_DH_RSA_WITH_DES_CBC_SHA
    - ssl.TLS_DH_anon_EXPORT_WITH_DES40_CBC_SHA
    - ssl.TLS_DH_anon_EXPORT_WITH_RC4_40_MD5
    - ssl.TLS_DH_anon_WITH_3DES_EDE_CBC_SHA
    - ssl.TLS_DH_anon_WITH_AES_128_CBC_SHA
    - ssl.TLS_DH_anon_WITH_AES_256_CBC_SHA
    - ssl.TLS_DH_anon_WITH_CAMELLIA_128_CBC_SHA
    - ssl.TLS_DH_anon_WITH_CAMELLIA_256_CBC_SHA
    - ssl.TLS_DH_anon_WITH_DES_CBC_SHA
    - ssl.TLS_DH_anon_WITH_RC4_128_MD5
    - ssl.TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256
    - ssl.TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256
    - ssl.TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256
    - ssl.TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
    - ssl.TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256
    - ssl.TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256
    - ssl.TLS_EMPTY_RENEGOTIATION_INFO_SCSV
    - ssl.TLS_FALLBACK_SCSV
    - ssl.TLS_NULL_WITH_NULL_NULL
    - ssl.TLS_RSA_EXPORT_WITH_DES40_CBC_SHA
    - ssl.TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5
    - ssl.TLS_RSA_EXPORT_WITH_RC4_40_MD5
    - ssl.TLS_RSA_WITH_3DES_EDE_CBC_SHA
    - ssl.TLS_RSA_WITH_AES_128_CBC_SHA256
    - ssl.TLS_RSA_WITH_AES_128_GCM_SHA256
    - ssl.TLS_RSA_WITH_AES_256_CBC_SHA256
    - ssl.TLS_RSA_WITH_CAMELLIA_128_CBC_SHA
    - ssl.TLS_RSA_WITH_CAMELLIA_256_CBC_SHA
    - ssl.TLS_RSA_WITH_DES_CBC_SHA
    - ssl.TLS_RSA_WITH_IDEA_CBC_SHA
    - ssl.TLS_RSA_WITH_NULL_MD5
    - ssl.TLS_RSA_WITH_NULL_SHA
    - ssl.TLS_RSA_WITH_NULL_SHA256
    - ssl.TLS_RSA_WITH_RC4_128_MD5
    - ssl.TLS_RSA_WITH_RC4_128_SHA
    - ssl.TLS_RSA_WITH_SEED_CBC_SHA
    - ssl.SSL_VARIANT_DATAGRAM
    - ssl.SSL_VARIANT_STREAM
    - ssl.SSL_LIBRARY_VERSION_2
    - ssl.SSL_LIBRARY_VERSION_3_0
    - ssl.SSL_LIBRARY_VERSION_TLS_1_0
    - ssl.SSL_LIBRARY_VERSION_TLS_1_1
    - ssl.SSL_LIBRARY_VERSION_TLS_1_2
    - ssl.SSL_LIBRARY_VERSION_TLS_1_3
    - ssl.ssl2
    - ssl.ssl3
    - ssl.tls1.0
    - ssl.tls1.1
    - ssl.tls1.2
    - ssl.tls1.3

   * The following methods were missing thread locks, this has been fixed.

     - nss.nss_initialize
     - nss.nss_init_context
     - nss.nss_shutdown_context

2014-01-29  John Dennis  <jdennis@redhat.com> 0.15.0

  External Changes
  ----------------

  The primary enhancements in this version is fixing access to extensions
  in a CertificateRequest and giving access to CertificateRequest attributes.
  There is a bug in NSS which hides the existence of extensions in a
  CSR if the extensions are not contained in the first CSR
  attribute. This was fixable in python-nss without requiring a patch
  to NSS. Formerly python-nss did not provide access to the attributes
  in a CSR only the extensions, with this release all components of a
  CSR can be accessed. See test/test_cert_request.py for examples.

  * Add ability to read PEM data from a string.

  * Add more build instructions to README. Source README into package
    long description.

  * A SecItem now converts almost all DER encoded data to a string
    when it's str method is invoked, formerly it was limited to only a
    few objects.

  * The following classes were added:

    - CERTAttribute

  * The following class methods were added:

    - CertAttribute.format_lines
    - CertAttribute.format
    - nss.SecItem.get_integer

  * The following class properties were added:

    - CertificateRequest.attributes
    - CertAttribute.type_oid
    - CertAttribute.type_tag
    - CertAttribute.type_str
    - CertAttribute.values

  * The following module functions were added:

    - base64_to_binary

  * The following files were added:

    - test_cert_request

2013-10-09  John Dennis  <jdennis@redhat.com> 0.14.1

  Modifications only to tests and examples.

  * Fix bug in ssl_example.py and test_client_server.py where complete
    data was not read from socket. The Beast CVE fix in NSS causes
    only one octet to be sent in the first socket packet and then the
    remaining data is sent normally, this is known as 1/n-1 record
    splitting. The example and test SSL code sent short messages and
    then did a sock.recv(1024). We had always received the entire
    message in one sock.recv() call because it was so short. But
    sock.recv() does not guarantee how much data will be received,
    thus this was a coding mistake. The solution is straight forward,
    use newlines as a record separator and call sock.readline()
    instead of sock.recv(). sock.readline() calls sock.recv()
    internally until a complete line is read or the socket is closed.

  * Rewrite setup_certs.py, it was written like an expect script
    reacting to prompts read from a pseudo terminal but it was fragile
    and would hang on some systems. New version uses temporary
    password file and writes hardcoded responses to the stdin of
    certuil and modutil.

  * setup_certs now creates a new sql sytle NSS database (sql:pki)

  * All tests and examples now load the sql:pki database. Command line
    arg and variable changed from dbdir to db_name to reflect the
    database specification is no longer just a directory.

  * All command line process in test and examples now uses modern
    argparse module instead of deprecated getopt and optparse. Some
    command line args were tweaked.

2013-04-24 John Dennis <jdennis@redhat.com> 0.14.0

  External Changes
  ----------------

  The primary enhancements in this version is support of certifcate
  validation, OCSP support, and support for the certificate "Authority
  Information Access" extension.

  Enhanced certifcate validation including CA certs can be done via
  Certificate.verify() or Certificate.is_ca_cert(). When cert
  validation fails you can now obtain diagnostic information as to why
  the cert failed to validate. This is encapsulated in the
  CertVerifyLog class which is a iterable collection of
  CertVerifyLogNode objects. Most people will probablby just print the
  string representation of the returned CertVerifyLog object. Cert
  validation logging is handled by the Certificate.verify() method.
  Support has also been added for the various key usage and cert type
  entities which feature prominently during cert validation.


  * Certificate() constructor signature changed from

    Certificate(data=None, der_is_signed=True)

    to

    Certificate(data, certdb=cert_get_default_certdb(), perm=False, nickname=None)

    This change was necessary because all certs should be added to the
    NSS temporary database when they are loaded, but earlier code
    failed to to that. It's is not likely that an previous code was
    failing to pass initialization data or the der_is_signed flag so
    this change should be backwards compatible.

  * Fix bug #922247, PKCS12Decoder.database_import() method. Importing into
    a NSS database would sometimes fail or segfault.

  * Error codes and descriptions were updated from upstream NSPR & NSS.

  * The password callback did not allow for breaking out of a password
    prompting loop, now if None is returned from the password callback
    the password prompting is terminated.

  * nss.nss_shutdown_context now called from InitContext destructor,
    this assures the context is shutdown even if the programmer forgot
    to. It's still best to explicitly shut it down, this is just
    failsafe.

  * Support was added for shutdown callbacks.

  * cert_dump.py extended to print NS_CERT_TYPE_EXTENSION

  * cert_usage_flags, nss_init_flags now support optional repr_kind parameter

  * The following classes were added:
    - nss.CertVerifyLogNode
    - nss.CertVerifyLog
    - error.CertVerifyError (exception)
    - nss.AuthorityInfoAccess
    - nss.AuthorityInfoAccesses


  * The following class methods were added:
    - nss.Certificate.is_ca_cert
    - nss.Certificate.verify
    - nss.Certificate.verify_with_log
    - nss.Certificate.get_cert_chain
    - nss.Certificate.check_ocsp_status
    - nss.PK11Slot.list_certs
    - nss.CertVerifyLogNode.format_lines
    - nss.CertVerifyLog.format_lines
    - nss.CRLDistributionPts.format_lines

  * The following class properties were added:
    - nss.CertVerifyLogNode.certificate
    - nss.CertVerifyLogNode.error
    - nss.CertVerifyLogNode.depth
    - nss.CertVerifyLog.count

  * The following module functions were added:
    - nss.x509_cert_type
    - nss.key_usage_flags
    - nss.list_certs
    - nss.find_certs_from_email_addr
    - nss.find_certs_from_nickname
    - nss.nss_get_version
    - nss.nss_version_check
    - nss.set_shutdown_callback
    - nss.get_use_pkix_for_validation
    - nss.set_use_pkix_for_validation
    - nss.enable_ocsp_checking
    - nss.disable_ocsp_checking
    - nss.set_ocsp_cache_settings
    - nss.set_ocsp_failure_mode
    - nss.set_ocsp_timeout
    - nss.clear_ocsp_cache
    - nss.set_ocsp_default_responder
    - nss.enable_ocsp_default_responder
    - nss.disable_ocsp_default_responder

  * The following files were added:
    - src/py_traceback.h
    - doc/examples/verify_cert.py
    - test/test_misc.py

  * The following constants were added:
    - nss.KU_DIGITAL_SIGNATURE
    - nss.KU_NON_REPUDIATION
    - nss.KU_KEY_ENCIPHERMENT
    - nss.KU_DATA_ENCIPHERMENT
    - nss.KU_KEY_AGREEMENT
    - nss.KU_KEY_CERT_SIGN
    - nss.KU_CRL_SIGN
    - nss.KU_ENCIPHER_ONLY
    - nss.KU_ALL
    - nss.KU_DIGITAL_SIGNATURE_OR_NON_REPUDIATION
    - nss.KU_KEY_AGREEMENT_OR_ENCIPHERMENT
    - nss.KU_NS_GOVT_APPROVED
    - nss.PK11CertListUnique
    - nss.PK11CertListUser
    - nss.PK11CertListRootUnique
    - nss.PK11CertListCA
    - nss.PK11CertListCAUnique
    - nss.PK11CertListUserUnique
    - nss.PK11CertListAll
    - nss.certUsageSSLClient
    - nss.certUsageSSLServer
    - nss.certUsageSSLServerWithStepUp
    - nss.certUsageSSLCA
    - nss.certUsageEmailSigner
    - nss.certUsageEmailRecipient
    - nss.certUsageObjectSigner
    - nss.certUsageUserCertImport
    - nss.certUsageVerifyCA
    - nss.certUsageProtectedObjectSigner
    - nss.certUsageStatusResponder
    - nss.certUsageAnyCA
    - nss.ocspMode_FailureIsVerificationFailure
    - nss.ocspMode_FailureIsNotAVerificationFailure

  Internal Changes
  ----------------

  * Reimplement exception handling
    - NSPRError is now derived from StandardException instead of
      EnvironmentError. It was never correct to derive from
      EnvironmentError but was difficult to implement a new subclassed
      exception with it's own attributes, using EnvironmentError had
      been expedient.
    - NSPRError now derived from StandardException, provides:
        + errno (numeric error code)
        + strerror (error description associated with error code)
        + error_message (optional detailed message)
        + error_code (alias for errno)
        + error_desc (alias for strerror)
    - CertVerifyError derived from NSPRError, extends with:
        + usages (bitmask of returned usages)
        + log (CertVerifyLog object)

  * Expose error lookup to sibling modules

  * Use macros for bitmask_to_list functions to reduce code
    duplication and centralize logic.

  * Add repr_kind parameter to cert_trust_flags_str()

  * Add support for repr_kind AsEnumName to bitstring table lookup.

  * Add cert_type_bitstr_to_tuple() lookup function

  * Add PRTimeConvert(), used to convert Python time values
    to PRTime, centralizes conversion logic, reduces duplication

  * Add UTF8OrNoneConvert to better handle unicode parameters which
    are optional.

  * Add Certificate_summary_format_lines() utility to generate
    concise certificate identification info for output.

  * Certificate_new_from_CERTCertificate now takes add_reference parameter
    to properly reference count certs, should fix shutdown busy problems.

  * Add print_traceback(), print_cert() debugging support.

2012-10-05  John Dennis  <jdennis@redhat.com> 0.13
  * Fix NSS SECITEM_CompareItem bug via workaround.

  * Fix incorrect format strings in PyArg_ParseTuple* for:
    - GeneralName
    - BasicConstraints
    - cert_x509_key_usage

  * Fix bug when decoding certificate BasicConstraints extension

  * Fix hang in setup_certs.

  * For NSS >= 3.13 support CERTDB_TERMINAL_RECORD

  * You can now query for a specific certificate extension
    Certficate.get_extension()

  * The following classes were added:
    - RSAGenParams

  * The following class methods were added:
    - nss.nss.Certificate.get_extension
    - nss.nss.PK11Slot.generate_key_pair
    - nss.nss.DSAPublicKey.format
    - nss.nss.DSAPublicKey.format_lines

  * The following module functions were added:
    - nss.nss.pub_wrap_sym_key

  * The following internal utilities were added:
    - PyString_UTF8
    - SecItem_new_alloc()

  * The following class constructors were modified to accept
    intialization parameters

    - KEYPQGParams (DSA generation parameters)

  * The PublicKey formatting (i.e. format_lines) was augmented
    to format DSA keys (formerly it only recognized RSA keys).

  * Allow lables and values to be justified when printing objects

  * The following were deprecated:
    - nss.nss.make_line_pairs (replaced by nss.nss.make_line_fmt_tuples)

    Deprecated Functionality:
    -------------------------
    - make_line_pairs() has been replaced by make_line_fmt_tuples()
      because 2-valued tuples were not sufficently general. It is
      expected very few programs will have used this function, it's mostly
      used internally but provided as a support utility.

2011-04-22  John Dennis  <jdennis@redhat.com> 0.12
  * Major new enhancement is additon of PKCS12 support and
    AlgorithmID's.

  * setup.py build enhancements
    - Now searches for the NSS and NSPR header files rather
      than hardcoding their location. This makes building friendlier
      on other systems (i.e. debian)
    - Now takes optional command line arguments, -d or --debug
      will turn on debug options during the build.

  * Fix reference counting bug in PK11_password_callback() which
    contributed to NSS not being able to shutdown due to
    resources still in use.

  * Add UTF-8 support to ssl.config_server_session_id_cache()

  * Added unit tests for cipher, digest, client_server.

  * All unittests now run, added test/run_tests to invoke
    full test suite.

  * Fix bug in test/setup_certs.py, hardcoded full path to
    libnssckbi.so was causing failures on 64-bit systems,
    just use the libnssckbi.so basename, modutil will find
    it on the standard search path.

  * doc/examples/cert_dump.py uses new AlgorithmID class to
    dump Signature Algorithm

  * doc/examples/ssl_example.py now can cleanly shutdown NSS.

  * Exception error messages now include PR error text if available.

  * The following classes were replaced:
    - SignatureAlgorithm replaced by new class AlgorithmID

  * The following classes were added:
    - AlgorithmID
    - PKCS12DecodeItem
    - PKCS12Decoder

  * The following class methods were added:
    - PK11Slot.authenticate()
    - PK11Slot.get_disabled_reason()
    - PK11Slot.has_protected_authentication_path()
    - PK11Slot.has_root_certs()
    - PK11Slot.is_disabled()
    - PK11Slot.is_friendly()
    - PK11Slot.is_internal()
    - PK11Slot.is_logged_in()
    - PK11Slot.is_removable()
    - PK11Slot.logout()
    - PK11Slot.need_login()
    - PK11Slot.need_user_init()
    - PK11Slot.user_disable()
    - PK11Slot.user_enable()
    - PKCS12DecodeItem.format()
    - PKCS12DecodeItem.format_lines()
    - PKCS12Decoder.database_import()
    - PKCS12Decoder.format()
    - PKCS12Decoder.format_lines()

  * The following class properties were added:
    - AlgorithmID.id_oid
    - AlgorithmID.id_str
    - AlgorithmID.id_tag
    - AlgorithmID.parameters
    - PKCS12DecodeItem.certificate
    - PKCS12DecodeItem.friendly_name
    - PKCS12DecodeItem.has_key
    - PKCS12DecodeItem.shroud_algorithm_id
    - PKCS12DecodeItem.signed_cert_der
    - PKCS12DecodeItem.type
    - SignedData.data
    - SignedData.der

  * The following module functions were added:
    - nss.nss.dump_certificate_cache_info()
    - nss.nss.find_slot_by_name()
    - nss.nss.fingerprint_format_lines()
    - nss.nss.get_internal_slot()
    - nss.nss.is_fips()
    - nss.nss.need_pw_init()
    - nss.nss.nss_init_read_write()
    - nss.nss.pk11_disabled_reason_name()
    - nss.nss.pk11_disabled_reason_str()
    - nss.nss.pk11_logout_all()
    - nss.nss.pkcs12_cipher_from_name()
    - nss.nss.pkcs12_cipher_name()
    - nss.nss.pkcs12_enable_all_ciphers()
    - nss.nss.pkcs12_enable_cipher()
    - nss.nss.pkcs12_export()
    - nss.nss.pkcs12_map_cipher()
    - nss.nss.pkcs12_set_nickname_collision_callback()
    - nss.nss.pkcs12_set_preferred_cipher()
    - nss.nss.token_exists()
    - nss.ssl.config_mp_server_sid_cache()
    - nss.ssl.config_server_session_id_cache_with_opt()
    - nss.ssl.get_max_server_cache_locks()
    - nss.ssl.set_max_server_cache_locks()
    - nss.ssl.shutdown_server_session_id_cache()

  * The following constants were added:
    - nss.nss.int.PK11_DIS_COULD_NOT_INIT_TOKEN
    - nss.nss.int.PK11_DIS_NONE
    - nss.nss.int.PK11_DIS_TOKEN_NOT_PRESENT
    - nss.nss.int.PK11_DIS_TOKEN_VERIFY_FAILED
    - nss.nss.int.PK11_DIS_USER_SELECTED
    - nss.nss.int.PKCS12_DES_56
    - nss.nss.int.PKCS12_DES_EDE3_168
    - nss.nss.int.PKCS12_RC2_CBC_128
    - nss.nss.int.PKCS12_RC2_CBC_40
    - nss.nss.int.PKCS12_RC4_128
    - nss.nss.int.PKCS12_RC4_40

  * The following files were added:
    - test/run_tests
    - test/test_cipher.py (replaces cipher_test.py)
    - test/test_client_server.py
    - test/test_digest.py (replaces digest_test.py)
    - test/test_pkcs12.py

  * The following were deprecated:
    - SignatureAlgorithm


2011-02-21  John Dennis  <jdennis@redhat.com> 0.11

    External Changes:
    -----------------

  * Bump version to 0.11

  * Add AddrInfo class to support IPv6 address resolution. Supports
    iteration over it's set of NetworkAddress objects and provides
    hostname, canonical_name object properties.

  * Add PR_AI_* constants.

  * NetworkAddress constructor and NetworkAddress.set_from_string() added
    optional family parameter. This is necessary for utilizing
    PR_GetAddrInfoByName().

  * NetworkAddress initialized via a string paramter are now initalized via
    PR_GetAddrInfoByName using family.

  * Add NetworkAddress.address property to return the address sans the
    port as a string. NetworkAddress.str() includes the port. For IPv6 the
    a hex string must be enclosed in brackets if a port is appended to it,
    the bracketed hex address with appended with a port is unappropriate
    in some circumstances, hence the new address property to permit either
    the address string with a port or without a port.

  * Fix the implementation of the NetworkAddress.family property, it was
    returning bogus data due to wrong native data size.

  * HostEntry objects now support iteration and indexing of their
    NetworkAddress members.

  * Add io.addr_family_name() function to return string representation of
    PR_AF_* constants.

  * Modify example and test code to utilize AddrInfo instead of deprecated
    NetworkAddress functionality. Add address family command argument to
    ssl_example.

  * Fix pty import statement in test/setup_certs.py

    Deprecated Functionality:
    -------------------------

  * NetworkAddress initialized via a string paramter is now
    deprecated. AddrInfo should be used instead.

  * NetworkAddress.set_from_string is now deprecated. AddrInfo should be
    used instead.

  * NetworkAddress.hostentry is deprecated. It was a bad idea,
    NetworkAddress objects can support both IPv4 and IPv6, but a HostEntry
    object can only support IPv4. Plus the implementation depdended on
    being able to perform a reverse DNS lookup which is not always
    possible.

  * HostEntry.get_network_addresses() and HostEntry.get_network_address()
    are now deprecated. In addition their port parameter is now no longer
    respected. HostEntry objects now support iteration and
    indexing of their NetworkAddress and that should be used to access
    their NetworkAddress objects instead.

    Internal Changes:
    -----------------

  * Utilize PR_NetAddrFamily() access macro instead of explict access.

  * Add PRNetAddr_port() utility to hide host vs. network byte order
    requirements when accessing the port inside a PRNetAddr and simplify
    accessing the IPv4 vs. IPv6 port variants.

  * Replace the use of PR_InitializeNetAddr() with PR_SetNetAddr(), the
    later properly handles IPv6, the former did not.

  * Rename NetworkAddress.addr to NetworkAddress.pr_netaddr for naming
    consistency.

  * Update HostEntry documentation to indicate it's deprecated status.

  * Remove redundant implementation of NetworkAddress_new_from_PRNetAddr
    from py_ssl.c and properly import the implementation from
    py_nspr_io.c.

  * The following other non-IPv6 fixes were also made because they were
    discovered while doing the IPv6 work:

  * Move definition of TYPE_READY to py_nspr_common.h so it can be
    shared. Update all modules to utilize it.

  * Replace incorrect use of free() with PyMem_Free for string data
    returned by Python's utf-8 encoder.

  * Add header dependency information to setup.py so modules will be
    rebuilt when header files change.

  * Add utility tuple_str() to convert a tuple to a string representation
    by calling str() on each object in the tuple. Tuple.str() in CPython
    only calls repr() on each member.

  * HostEntry objects now store their aliases and NetworkAddress's in
    internal tuples.


2010-07-25  John Dennis  <jdennis@redhat.com> 0.10
  * The following classes were added:
      InitParameters
      InitContext

  * The following module functions were added:
      nss.nss.nss_initialize()
      nss.nss.nss_init_context()
      nss.nss.nss_shutdown_context()
      nss.nss.nss_init_flags()

  * The following constants were added:
      NSS_INIT_READONLY
      NSS_INIT_NOCERTDB
      NSS_INIT_NOMODDB
      NSS_INIT_FORCEOPEN
      NSS_INIT_NOROOTINIT
      NSS_INIT_OPTIMIZESPACE
      NSS_INIT_PK11THREADSAFE
      NSS_INIT_PK11RELOAD
      NSS_INIT_NOPK11FINALIZE
      NSS_INIT_RESERVED
      NSS_INIT_COOPERATE

  * The following file was added:
      test/setup_certs.py

2010-05-28  John Dennis  <jdennis@redhat.com> 0.9

  * Correct definciencies in auth_certificate_callback found in several
    of the example files and documentation. If you've copied that code
    you should merge those changes in.

  * Unicode objects now accepted as well as str objects for
    interfaces expecting a string.

  * Sockets were enhanced thusly:
      - Threads will now yield during blocking IO.
      - Socket.makefile() reimplemented
	  file object methods that had been missing (readlines(), sendall(),
	  and iteration) were implemented, makefile now just returns the same
	  Socket object but increments an "open" ref count. Thus a Socket
	  object behaves like a file object and must be closed once for each
	  makefile() call before it's actually closed.
      - Sockets now support the iter protocol
      - Add Socket.readlines(), Socket.sendall()

  * The following classes were added:
      AuthKeyID
      BasicConstraints
      CRLDistributionPoint
      CRLDistributionPts
      CertificateExtension
      GeneralName
      SignedCRL
      DN
      RDN
      AVA
      CertificateRequest

  * The following module functions were added:
      nss.nss.nss_is_initialized()
      nss.nss.cert_crl_reason_from_name()
      nss.nss.cert_crl_reason_name()
      nss.nss.cert_general_name_type_from_name()
      nss.nss.cert_general_name_type_name()
      nss.nss.cert_usage_flags()
      nss.nss.decode_der_crl()
      nss.nss.der_universal_secitem_fmt_lines()
      nss.nss.import_crl()
      nss.nss.make_line_pairs()
      nss.nss.oid_dotted_decimal()
      nss.nss.oid_str()
      nss.nss.oid_tag()
      nss.nss.oid_tag_name()
      nss.nss.read_der_from_file()
      nss.nss.x509_alt_name()
      nss.nss.x509_ext_key_usage()
      nss.nss.x509_key_usage()

  * The following class methods and properties were added:
    Note: it's a method if the name is suffixed with (), a propety otherwise
      Socket.next()
      Socket.readlines()
      Socket.sendall()
      SSLSocket.next()
      SSLSocket.readlines()
      SSLSocket.sendall()
      AuthKeyID.key_id
      AuthKeyID.serial_number
      AuthKeyID.get_general_names()
      CRLDistributionPoint.issuer
      CRLDistributionPoint.get_general_names()
      CRLDistributionPoint.get_reasons()
      CertDB.find_crl_by_cert()
      CertDB.find_crl_by_name()
      Certificate.extensions
      CertificateExtension.critical
      CertificateExtension.name
      CertificateExtension.oid
      CertificateExtension.oid_tag
      CertificateExtension.value
      GeneralName.type_enum
      GeneralName.type_name
      GeneralName.type_string
      SecItem.der_to_hex()
      SecItem.get_oid_sequence()
      SecItem.to_hex()
      SignedCRL.delete_permanently()
      AVA.oid
      AVA.oid_tag
      AVA.value
      AVA.value_str
      DN.cert_uid
      DN.common_name
      DN.country_name
      DN.dc_name
      DN.email_address
      DN.locality_name
      DN.org_name
      DN.org_unit_name
      DN.state_name
      DN.add_rdn()
      DN.has_key()
      RDN.has_key()

  * The following module functions were removed:
    Note: use nss.nss.oid_tag() instead
      nss.nss.sec_oid_tag_from_name()
      nss.nss.sec_oid_tag_name()
      nss.nss.sec_oid_tag_str()

  * The following files were added:
      doc/examples/cert_dump.py
      test/test_cert_components.py

  * Apply patches from  Miloslav Trmač <mitr@redhat.com>
    for ref counting and threading support. Thanks Miloslav!

  * Review all ref counting, numerous ref counting fixes

  * Implement cyclic garbage collection support by
    adding object traversal and clear methods

  * Identify static variables, move to thread local storage

  * Remove python-nss specific httplib.py, no longer needed
    python-nss now compatible with standard library

  * Rewrite httplib_example.py to use standard library and illustrate
    ssl, non-ssl, connection class, http class usage

2009-09-21  John Dennis  <jdennis@redhat.com> 0.8
  * The following methods, properties  and functions were added:
    SecItem.type SecItem.len, SecItem.data
    PK11SymKey.key_data, PK11SymKey.key_length, PK11SymKey.slot
    create_context_by_sym_key
    param_from_iv
    generate_new_param
    get_iv_length
    get_block_size
    get_pad_mechanism
  * SecItem's now support indexing and slicing on their data
  * Clean up parsing and parameter validation of variable arg functions

2009-09-18  John Dennis  <jdennis@redhat.com> 0.7
  * add support for symmetric encryption/decryption
    more support for digests (hashes)

    The following classes were added:
    PK11SymKey PK11Context

    The following methods and functions were added:
    get_best_wrap_mechanism          get_best_key_length
    key_gen                          derive
    get_key_length                   digest_key
    clone_context                    digest_begin
    digest_op                        cipher_op
    finalize                         digest_final
    read_hex                         hash_buf
    sec_oid_tag_str                  sec_oid_tag_name
    sec_oid_tag_from_name            key_mechanism_type_name
    key_mechanism_type_from_name     pk11_attribute_type_name
    pk11_attribute_type_from_name    get_best_slot
    get_internal_key_slot            create_context_by_sym_key
    import_sym_key                   create_digest_context
    param_from_iv                    param_from_algid
    generate_new_param               algtag_to_mechanism
    mechanism_to_algtag

    The following files were added:
    test/cipher_test.py test/digest_test.py

2009-07-08  John Dennis  <jdennis@redhat.com> 0.6
  * fix bug #510343 client_auth_data_callback seg faults if False
    is returned from callback

2009-07-01  John Dennis  <jdennis@redhat.com> 0.5
  * restore ssl.nss_init and ssl.nss_shutdown but make them deprecated
    add __version__ string to nss module

2009-06-30  John Dennis  <jdennis@redhat.com> 0.4
  * add binding for NSS_NoDB_Init(), bug #509002
    move nss_init and nss_shutdown from ssl module to nss module

2009-06-04  John Dennis  <jdennis@redhat.com> 0.3

  * import to Mozilla CVS, tweak directory layout

2009-05-21  John Dennis  <jdennis@redhat.com> 0.2
  * apply patch from bug #472805, (Miloslav Trmač)
    Don't allow closing a socket twice, that causes crashes.
    New function nss.io.Socket.new_socket_pair()
    New function nss.io.Socket.poll()
    New function nss.io.Socket.import_tcp_socket()
    New method nss.nss.Certificate.get_subject_common_name()
    New function nss.nss.generate_random()
    Fix return value creation in SSLSocket.get_security_status
    New function nss.ssl.SSLSocket.import_tcp_socket()
    Convert licensing to MPL tri-license