5
- Reported memory leak due to cyclical definitions of
6
_write_bio/_write_nbio and _read_bio/_read_nbio in SSL.Connection.
8
- evp_ciph_demo.py, which uses the EVP.Cipher API, dumps core when
9
the AES ciphers are tested. bio_ciph_test.py, which uses BIO.CipherStream,
12
- SSL.Connection.makefile() returns an instance of BIO.IOBuffer,
13
which is a file-like object. If you close the SSL.Connection, then
14
try to read()/write() the BIO.IOBuffer, you'll get unpredictable
17
- If you pass in bogus callbacks, the interpreter might crash. This
18
has been fixed for RSA, DSA, DH callbacks, but not for SSL callbacks,
21
- Python 2.[23]: FTP/TLS passive mode client doesn't work against the
22
Medusa-based ftps_server. (Works using Python 2.1.)
24
- Possible concurrency bugs in the SSL functionality as reported by Brent
27
- demo/ssl/echod-forking.py no longer works. (Tested with Python 2.2.2.)
28
I won't bother try fixing this, since forking servers are passe.
31
---------------------------------------------------------------------------
32
$Id: BUGS,v 1.8 2004/03/25 08:55:04 ngps Exp $