| OLD | NEW |
| 1 Name: tlslite | 1 Name: tlslite |
| 2 URL: http://trevp.net/tlslite/ | 2 URL: http://trevp.net/tlslite/ |
| 3 Version: 0.4.8 | 3 Version: 0.4.8 |
| 4 Security Critical: No | 4 Security Critical: No |
| 5 License: Public domain and BSD | 5 License: Public domain and BSD |
| 6 | 6 |
| 7 Description: Python TLS implementation for use with test server. | 7 Description: Python TLS implementation for use with test server. |
| 8 | 8 |
| 9 Source: https://pypi.python.org/packages/source/t/tlslite/tlslite-0.4.8.tar.gz | 9 Source: https://pypi.python.org/packages/source/t/tlslite/tlslite-0.4.8.tar.gz |
| 10 MD5: 36c13858ea63f262c4e4291c2f9ae38f | 10 MD5: 36c13858ea63f262c4e4291c2f9ae38f |
| 11 SHA-512: bdb42d005b7444667badc6febd38f5b74878c09218b418844c255920f0e6272f | 11 SHA-512: bdb42d005b7444667badc6febd38f5b74878c09218b418844c255920f0e6272f |
| 12 55f62b4ea21953953935f73e02657fce9874b44f73499267cf713ddbcd3d6a44 | 12 55f62b4ea21953953935f73e02657fce9874b44f73499267cf713ddbcd3d6a44 |
| 13 | 13 |
| 14 Local Modifications: | 14 Local Modifications: |
| 15 - Drop docs/ directory. | 15 - Drop docs/ directory. |
| 16 - patches/tls_intolerant.patch: allow TLSLite to simulate a TLS-intolerant serve
r. | 16 - patches/tls_intolerant.patch: allow TLSLite to simulate a TLS-intolerant serve
r. |
| 17 - patches/channel_id.patch: add basic ChannelID support. (Signatures are not | 17 - patches/channel_id.patch: add basic ChannelID support. (Signatures are not |
| 18 checked.) | 18 checked.) |
| 19 - patches/signed_certificate_timestamps.patch: add support for sending Signed | 19 - patches/signed_certificate_timestamps.patch: add support for sending Signed |
| 20 Certificate Timestamps over a TLS extension. | 20 Certificate Timestamps over a TLS extension. |
| 21 - patches/fallback_scsv.patch: add support for TLS_FALLBACK_SCSV. See | 21 - patches/fallback_scsv.patch: add support for TLS_FALLBACK_SCSV. See |
| 22 https://tools.ietf.org/html/draft-bmoeller-tls-downgrade-scsv-01 | 22 https://tools.ietf.org/html/draft-bmoeller-tls-downgrade-scsv-01 |
| 23 - patches/status_request.patch: add support for sending stapled OCSP responses. | 23 - patches/status_request.patch: add support for sending stapled OCSP responses. |
| 24 - patches/ssl3_padding.patch: SSL3 requires minimal padding in CBC mode. | 24 - patches/ssl3_padding.patch: SSL3 requires minimal padding in CBC mode. |
| 25 - patches/fix_test_file.patch: Fix #! line in random test file to appease our | 25 - patches/fix_test_file.patch: Fix #! line in random test file to appease our |
| 26 presubmit checks. | 26 presubmit checks. |
| 27 - patches/dhe_rsa.patch: Implement DHE_RSA-based cipher suites. | 27 - patches/dhe_rsa.patch: Implement DHE_RSA-based cipher suites on the server. |
| 28 - patches/req_cert_types.patch: Add a reqCertTypes parameter to populate the | 28 - patches/req_cert_types.patch: Add a reqCertTypes parameter to populate the |
| 29 certificate_types field of CertificateRequest. Also fixes type errors. | 29 certificate_types field of CertificateRequest. Also fixes type errors. |
| 30 - patches/ignore_write_failure.patch: Don't invalidate sessions on write | 30 - patches/ignore_write_failure.patch: Don't invalidate sessions on write |
| 31 failures. | 31 failures. |
| 32 - patches/intolerance_options.patch: Add an option to further control | 32 - patches/intolerance_options.patch: Add an option to further control |
| 33 simulated TLS version intolerance. | 33 simulated TLS version intolerance. |
| 34 - patches/save_client_hello.patch: Save the parsed ClientHello on TLSConnection | 34 - patches/save_client_hello.patch: Save the parsed ClientHello on TLSConnection |
| 35 so tests can query it. | 35 so tests can query it. |
| 36 - patches/certificate_request.patch: Fix client auth for TLS 1.2. | 36 - patches/certificate_request.patch: Fix client auth for TLS 1.2. |
| 37 - patches/aes_gcm.patch: Implement AES-GCM and never select TLS 1.2 ciphers | 37 - patches/aes_gcm.patch: Implement AES-GCM and never select TLS 1.2 ciphers |
| 38 unless >= TLS 1.2 is negotiated. | 38 unless >= TLS 1.2 is negotiated. |
| 39 - patches/alert_after_handshake.patch: Add an option to send a fatal alert | 39 - patches/alert_after_handshake.patch: Add an option to send a fatal alert |
| 40 immediately after the handshake completes. | 40 immediately after the handshake completes. |
| 41 - patches/ecdhe_rsa.patch: Implement ECDHE_RSA-based ciper suites on the server. |
| OLD | NEW |