1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
|
-------------
25 Mar 2004
-------------
- Reported memory leak due to cyclical definitions of
_write_bio/_write_nbio and _read_bio/_read_nbio in SSL.Connection.
- evp_ciph_demo.py, which uses the EVP.Cipher API, dumps core when
the AES ciphers are tested. bio_ciph_test.py, which uses BIO.CipherStream,
do not.
- SSL.Connection.makefile() returns an instance of BIO.IOBuffer,
which is a file-like object. If you close the SSL.Connection, then
try to read()/write() the BIO.IOBuffer, you'll get unpredictable
results.
- If you pass in bogus callbacks, the interpreter might crash. This
has been fixed for RSA, DSA, DH callbacks, but not for SSL callbacks,
yet.
- Python 2.[23]: FTP/TLS passive mode client doesn't work against the
Medusa-based ftps_server. (Works using Python 2.1.)
- Possible concurrency bugs in the SSL functionality as reported by Brent
Chun.
- demo/ssl/echod-forking.py no longer works. (Tested with Python 2.2.2.)
I won't bother try fixing this, since forking servers are passe.
---------------------------------------------------------------------------
$Id: BUGS,v 1.8 2004/03/25 08:55:04 ngps Exp $
|