Issue 4751: Patch for better thread support in hashlib
Created on 2008-12-26 13:39 by ebfe, last changed 2022-04-11 14:56 by admin. This issue is now closed.
Messages (49)
msg78297 - (view)
Author: Lukas Lueg (ebfe)
Date: 2008-12-26 13:39
Date: 2008-12-26 21:42
Date: 2008-12-26 21:57
Date: 2008-12-26 22:01
Date: 2008-12-26 22:32
Date: 2008-12-26 23:18
Date: 2008-12-27 00:44
Date: 2008-12-27 01:04
Date: 2008-12-27 01:27
Date: 2008-12-27 01:45
Date: 2008-12-31 23:29
Date: 2009-01-01 19:02
Date: 2009-01-01 22:46
Date: 2009-01-02 14:44
Date: 2009-01-02 18:55
Date: 2009-01-02 19:02
Date: 2009-01-02 22:45
Date: 2009-01-03 00:53
Date: 2009-01-03 00:59
Date: 2009-01-03 02:55
Date: 2009-01-03 17:08
Date: 2009-01-06 17:42
Date: 2009-01-06 18:07
Date: 2009-01-06 18:31
Date: 2009-01-08 20:55
Date: 2009-01-08 20:59
Date: 2009-01-08 21:03
Date: 2009-01-08 21:18
Date: 2009-02-12 07:42
Date: 2009-02-12 11:34
Date: 2009-02-12 21:53
Date: 2009-05-04 00:24
The hashlib functions provided by _hashopenssl.c hold the GIL all the time although the underlying openssl-library is basically thread-safe. I've attached a patch (svn diff) which basically does four things: * If python is compiled with thread-support, the EVPobject is extended by an additional PyThread_type_lock which protects the objects individually. * The 'update' function releases the GIL if the to-be-hashed object is a Bytes-object and therefor provides trustworthy locking (all other types, including subclasses, are not trustworthy!). This allows multiple threads to do hashing in parallel. * The EVP_hash function removes duplicated code. * The situation regarding unicode objects is now more meaningful. Upon passing a unicode-string to the .update() function, the original hashlib throws a "TypeError: object supporting the buffer API required" which is confusing. I think it's perfectly valid not to accept unicode-strings as input and people should required to call str.encode() upon their strings before hashing, so a well-defined byte-representation of their strings get hashed. Therefor I patched the MY_GET_BUFFER_VIEW_OR_ERROUT-macro to throw "TypeError: Unicode-objects must be encoded before hashing". This also fixes issue #1118 I've tested this patch and did not run into problems. CPU occupancy relies on the buffer-size passed to .update() as releasing the GIL is basically not worth the effort for very small buffers. More testing may be needed...msg78308 - (view) Author: STINNER Victor (vstinner) *
Date: 2008-12-26 21:42
I think that you don't use Py_BEGIN_ALLOW_THREADS / Py_END_ALLOW_THREADS correctly: the GIL can be released when the hashlib lock is acquired (to run hash functions in parallel threads). So the macros should be: #define ENTER_HASHLIB \ PyThread_acquire_lock(self->lock, 1); \ Py_BEGIN_ALLOW_THREADS #define LEAVE_HASHLIB \ Py_END_ALLOW_THREADS \ PyThread_release_lock(self->lock); If I'm right, issue #4738 (zlib) is also affected.msg78309 - (view) Author: Antoine Pitrou (pitrou) *
Date: 2008-12-26 21:57
Hi, Very good idea. However, you don't need to discriminate for the bytes type specifically. When a buffer is taken on the object (with PyObject_GetBuffer()), the object is internally "locked" until the buffer is release with PyBuffer_Release(). Try with a bytearray and you'll see: if you resize the bytearray while hashing it in another thread, you'll get a BufferError exception. All in all, it should make your code and macros much simpler.msg78311 - (view) Author: STINNER Victor (vstinner) *
Date: 2008-12-26 22:01
EVP_copy() and EVP_get_digest_size() should call ENTER_HASHLIB/LEAVE_HASHLIB to protect self->ctx.msg78312 - (view) Author: STINNER Victor (vstinner) *
Date: 2008-12-26 22:32
If view.len is negative, EVP_hash() may read invalid memory :-/ Be
careful of integer overflow in this block:
Py_ssize_t offset = 0, sublen = len;
while (sublen) {
unsigned int process = sublen > MUNCH_SIZE ? MUNCH_SIZE :
sublen;
...
}
You removed Py_SAFE_DOWNCAST(len, Py_ssize_t, unsigned int) which
should be used (eg. on process?).
Note: you might modify len directly instead of using a second variable
(sublen), and cp instead of using an offset.
msg78317 - (view)
Author: STINNER Victor (vstinner) *
Date: 2008-12-26 23:18
New version of ebfe's patch: - ENTER/LEAVE_HASHLIB: * don't touch GIL in ENTER_HASHLIB (it's useless) * add mandatory argument (explicit use of "self") - EVP_hash(): * restore Py_SAFE_DOWNCAST * simplify the code: always use the while() instead of if+while * use "while (0 < len)" to skip zero or negative value (even if pitrou told me that len should not be negative) - EVP_dealloc(): free the lock before the context - release the GIL for all calls to EVP_hash() - use the context lock in EVP_copy() and EVP_get_digest_size() to protect self - don't use the context lock in EVP_repr() (useless because we don't read OpenSSL context) - fix the indentation of the code (replace tab by spaces) Some rules for ENTER/LEAVE_HASHLIB: * it is only needed to protect the context attribute (eg. name doesn't need to be protected by the lock) * it doesn't touch the GIL: use an explicit call to Py_BEGIN_ALLOW_THREADS/Py_END_ALLOW_THREADS About the GIL: * EVP_DigestInit() and EVP_MD_CTX_copy() are consired fast enough to no release the GIL * The GIL is released for the slowest function: EVP_DigestUpdate() (called in our EVP_hash() function)msg78322 - (view) Author: Lukas Lueg (ebfe) Date: 2008-12-27 00:20
Thanks for the advices. Antoine, maybe you could clarify the situation regarding buffer-locks for me. In older versions of PEP 3118 the PyBUF_LOCK flag was still present but it doesn't seem to have made it's way into the final draft. Is it save to assume that a buffer-view will not change until release() is called - for all types supporting the buffer protocol in py3k ?? I've done some testing and the overhead of releasing and re-locking the GIL is definitely a performance problem when trying to hash many small strings (doubled runtime for 100.000 times b'abc'). I've taken on haypo's patch to release the GIL only when the buffer is larger than 10kb.msg78323 - (view) Author: Antoine Pitrou (pitrou) *
Date: 2008-12-27 00:44
> Is it save to assume that a buffer-view will not change until release() > is called - for all types supporting the buffer protocol in py3k ?? Yes, it is!msg78325 - (view) Author: STINNER Victor (vstinner) *
Date: 2008-12-27 01:04
> I've taken on haypo's patch to release the GIL only > when the buffer is larger than 10kb You can factorize the code by moving Py_BEGIN_ALLOW_THREADS / Py_END_ALLOW_THREADS *into* EVP_hash ;-) 10 KB is a random value or the fast value for your computer? I wrote a small benchmark: md5sum.py, my Python multithreaded version of md5sum. Results on 129 files (between 7 and 10 MB) on an Intel Quad Core @ 2.5 GHz: - without the patch: best=10.6 sec / average ~= 11.5 sec - with the patch (version 3): best=7.7 sec / average ~= 8.5 sec My program creates N threads for N files, which is maybe stupid (eg. limit to C+1 thread for C cores).msg78327 - (view) Author: STINNER Victor (vstinner) *
Date: 2008-12-27 01:27
New version of my md5sum.py program limited to 10 threads. New benchmark with 160 files (size in 7..10 MB): - Python unpatched: best=4.8 sec - C version (/usr/bin/md5sum): best=3.6 sec - Python patched: best=2.1 sec As everybody knows, Python is faster than the C language ;-) And the patch is really useful (the program is more than twice faster with 4 cores).msg78328 - (view) Author: Lukas Lueg (ebfe) Date: 2008-12-27 01:36
Here is another simple benchmarker. For me it shows almost perfect scaling (2 cores = 196% performance) if the buffer put into .update() is large enough. I deliberately did not move Py_BEGIN_ALLOW_THREADS into EVP_hash as we might call this function without having some lock on the input buffer. The 10kb limit was based on my own computer (MacBook Pro 2x2.5GHz) and is somewhat more-safe-than-sorry. Hashing is *very* fast on modern CPUs and working on many small strings becomes very inefficient when releasing the GIL all the time. Just try to hash 10240 bytes vs. 10241 bytes.msg78330 - (view) Author: STINNER Victor (vstinner) *
Date: 2008-12-27 01:45
hashlibtest.py results on my Quad Core with 4 threads: - unpatched: best=13.0 sec - patched: best=3.25 sec Some maths: 13.0 / 4 = 3.25 \o/msg78665 - (view) Author: Antoine Pitrou (pitrou) *
Date: 2008-12-31 23:29
Based on quick testing on my computer, we could probably put the limit as low as 1KB. But it may be that locks are cheap under Linux. In any case, the patch looks good, but I'm no OpenSSL expert.msg78719 - (view) Author: STINNER Victor (vstinner) *
Date: 2009-01-01 19:02
Ooooh, I suggested to ebfe to remove the GIL unlock/lock, but I was wrong :-( I hate locks! What is the right fix? Replace ENTER_HASHLIB(self) Py_BEGIN_ALLOW_THREADS ... Py_END_ALLOW_THREADS LEAVE_HASHLIB(self) by Py_BEGIN_ALLOW_THREADS ENTER_HASHLIB(self) ... LEAVE_HASHLIB(self) Py_END_ALLOW_THREADS ?msg78734 - (view) Author: Antoine Pitrou (pitrou) *
Date: 2009-01-01 22:46
The right fix would probably be to define ENTER_HASHLIB(self) as Py_BEGIN_ALLOW_THREADS PyThread_acquire_lock(self->lock) Py_END_ALLOW_THREADSmsg78773 - (view) Author: Lukas Lueg (ebfe) Date: 2009-01-02 10:44
Releasing the GIL is somewhat expensive and should be avoided if possible. I've moved LEAVE_HASHLIB in EVP_update so the object gets unlocked before we call Py_END_ALLOW_THREADS. This is *only* possible because EVP_update does not use the object beyond those lines. Here is a new patch and a small test-script.msg78774 - (view) Author: Lukas Lueg (ebfe) Date: 2009-01-02 10:45
test-scriptmsg78775 - (view) Author: Lukas Lueg (ebfe) Date: 2009-01-02 10:46
gnarf, actually it should be 'threads.append(Hasher(md))' in the script :-\msg78801 - (view) Author: STINNER Victor (vstinner) *
Date: 2009-01-02 14:44
> Releasing the GIL is somewhat expensive and should be avoided > if possible. Another possible solution is to create a lockless object by default, and create a lock if the data size is bigger than N (eg. 8 KB). When the lock is created, update will always use the lock (and so the GIL). In general, you have two classes of hashlib usages: - hash a big files by chunk of k KB (eg. 256 KB) - hash a very small string (eg. 8 bytes) When you have a small string, you don't need to release the GIL nor to use locks. Whereas for a file, you can always release the GIL (and so you need a lock to protect the context).msg78820 - (view) Author: Lukas Lueg (ebfe) Date: 2009-01-02 15:43
I don't think this is actually worth the trouble. You run into situation where one thread might decide that it needs a lock now with other threads being in the to-be-locked-area at that time.msg78857 - (view) Author: STINNER Victor (vstinner) *
Date: 2009-01-02 18:55
New implementation of finer lock grain in _hashlibopenssl: only create the lock at the first update with more than 8 KB bytes. Object creation/deallocation is faster if we hash less than 8 KB. Changes between hashopenssl_threads-4.diff and my new patch: fix the deadlock in ENTER_HASHLIB() (for the GIL) without speed change (because we don't change the GIL state if we don't use a lock). Changes between py3k trunk and my new patch: - release the GIL with large byte string => faster with multiple CPUs - fix EVP_get_block_size() and EVP_get_digest_size(): the context was not protected by the lock!msg78858 - (view) Author: STINNER Victor (vstinner) *
Date: 2009-01-02 19:02
Update small lock patch: replace all tabs by spaces! I forget a change
between Python trunk and my patch: there is also the error message for
Unicode object. Before:
>>> import hashlib; hashlib.md5("abc")
TypeError: object supporting the buffer API required
after:
>>> import hashlib; hashlib.md5("abc")
TypeError: Unicode-objects must be encoded before hashing
msg78896 - (view)
Author: Gregory P. Smith (gregory.p.smith) *
Date: 2009-01-02 22:45
First: thanks for doing this. I've had a patch sitting in my own sandbox to release the GIL while hashing for a while but I hadn't finished testing it. It looks pretty similar to what you've done so lets go with the patch being developed in this issue. Rather than making HASHLIB_GIL_MINSIZE a constant I suggest making it a property of the hash object so that it can be set by the user. Most users will be fine with the default but depending upon the application, platform and hash algorithm being used other values may make more sense.msg78905 - (view) Author: Lukas Lueg (ebfe) Date: 2009-01-02 23:50
I don't think so. The interface should stay simple - python has very few such magic knobs. People will optimize for their own box as you said - and that code will run worse on all the others... Besides, we've lived so long with single-threaded openssl. Let's make HASHLIB_GIL_MINSIZE such that there is no risk of additional overhead introduced by this patch and refer to it's current value in the hashlib-module's documentation.msg78909 - (view) Author: Lukas Lueg (ebfe) Date: 2009-01-03 00:32
haypo, the patch will not compile when WITH_THREADS is not defined. The 'lock'-member in the object structure is not present without WITH_THREADS however the line 'if (self->lock == NULL && view.len >= HASHLIB_GIL_MINSIZE)' will always refer to it.msg78913 - (view) Author: STINNER Victor (vstinner) *
Date: 2009-01-03 00:53
About HASHLIB_GIL_MINSIZE, I'm unable to mesure the overhead. I tried timeit with 8190 and 8200 but the results are *very* close. I'm running Linux, it's maybe different on other OS.msg78916 - (view) Author: STINNER Victor (vstinner) *
Date: 2009-01-03 00:59
> haypo, the patch will not compile when WITH_THREADS is not defined. Ooops, fixed (patch version 3).msg78924 - (view) Author: Lukas Lueg (ebfe) Date: 2009-01-03 02:19
Here is another patch, this time for the fallback-md5-module. I know that situations are rare where openssl is not present but threading is. However they might occur out there and the md5module needed some love anyway: - The MD5 class from the fallback module can now also use threads with 'small locks' - The behaviour regarding unicode data input is now consistent as to what the openssl-driven classes do. - Some code cleanup. I might act on the sha modules as way the next days. sha256.c still accepts 's#'... I might amsg78927 - (view) Author: STINNER Victor (vstinner) *
Date: 2009-01-03 02:55
ebfe> Here is another patch, this time for the fallback-md5-module Please open a separated issue for each module, this issue is already too long and complex ;-) And it would be easier to fix other modules when patches for hashlib will be accepted ;-)msg78952 - (view) Author: Lukas Lueg (ebfe) Date: 2009-01-03 12:28
Haypo, we can probably reduce overhead by defining ENTER_HASHLIB like this:
#define ENTER_HASHLIB(obj) \
if ((obj)->lock) { \
if (!PyThread_acquire_lock((obj)->lock, 0)) { \
Py_BEGIN_ALLOW_THREADS \
PyThread_acquire_lock((obj)->lock, 1); \
Py_END_ALLOW_THREADS \
} \
}
msg78976 - (view)
Author: Antoine Pitrou (pitrou) *
Date: 2009-01-03 17:08
I'm not sure about the approach of dynamically allocating self->lock. Imagine you allocate this lock while another thread is between ENTER_HASHLIB and LEAVE_HASHLIB. What happens on LEAVE_HASHLIB? The thread tries to release a lock it hadn't acquired (because the lock was NULL at the time). Is it simply ignored?msg78979 - (view) Author: Lukas Lueg (ebfe) Date: 2009-01-03 17:17
The lock is created while having the GIL in EVP_update. No other function releases the GIL (besides the creator-function which does not need the local lock). Thereby no other thread can be in between ENTER and LEAVE while the lock is allocated.msg79087 - (view) Author: Lukas Lueg (ebfe) Date: 2009-01-04 22:25
I've modified haypo's patch as commented. The object's lock should be free 99.9% of the time so we try non-blocking first and can thereby skip releasing and re-locking the gil (to avoid a deadlock).msg79274 - (view) Author: Antoine Pitrou (pitrou) *
Date: 2009-01-06 17:42
The patch looks fine to me, apart from one point: the return value of PyThread_allocate_lock() should be checked for NULL, and the error either propagated or cleared. (I'd also suggest lowering HASHLIB_GIL_MINSIZE to 2048 or 4196) Gregory, what's your take?msg79275 - (view) Author: Gregory P. Smith (gregory.p.smith) *
Date: 2009-01-06 18:07
hashlibopenssl_small_lock-4.diff looks good to me. I also agree that HASHLIB_GIL_MINSIZE should be lowered to 2048. Commit it, and please backport it to trunk before closing this bug.msg79276 - (view) Author: STINNER Victor (vstinner) *
Date: 2009-01-06 18:31
Updated patch: - change HASHLIB_GIL_MINSIZE to 2048 bytes - update hashlib documentation: add a note about the 2048 GIL limit - write a small test just for more sure that the GIL cases are tested (GIL released during object creation or on update)msg79280 - (view) Author: Lukas Lueg (ebfe) Date: 2009-01-06 19:25
PyThread_allocate_lock can fail without interference. object->lock will stay NULL and the GIL is simply not released.msg79438 - (view) Author: Antoine Pitrou (pitrou) *
Date: 2009-01-08 20:55
There is still a potential problem.
Figure the following:
- thread A executes ENTER_HASHLIB while lock is NULL; therefore, thread
A has released the GIL and doesn't hold any lock
- thread B enters EVP_update with a large buffer (it can be there, since
A doens't hold the GIL)
- thread B allocates the lock, releases the GIL, and allocates the lock
- thread A continues running and arrives at LEAVE_HASHLIB; there,
self->lock is not NULL anymore, so it tries to release it; since it
hasn't acquired it before, this may block forever (depending on the
platform I assume)
To remove this possibility, the macros should probably look like:
#define ENTER_HASHLIB(obj) \
{ \
int __lock_exists = ((obj)->lock) != NULL; \
if (__lock_exists) { \
if (!PyThread_acquire_lock((obj)->lock, 0)) { \
Py_BEGIN_ALLOW_THREADS \
PyThread_acquire_lock((obj)->lock, 1); \
Py_END_ALLOW_THREADS \
} \
}
#define LEAVE_HASHLIB(obj) \
if (__lock_exists) { \
PyThread_release_lock((obj)->lock); \
} \
}
msg79439 - (view)
Author: Antoine Pitrou (pitrou) *
Date: 2009-01-08 20:59
Oops, nevermind what I said. The GIL isn't released if obj->lock isn't there.msg79440 - (view) Author: Antoine Pitrou (pitrou) *
Date: 2009-01-08 21:03
Haypo's last patch is ok. If you want it to be in 2.7 too, however, you'll have to provide another patch (I won't do it myself).msg79441 - (view) Author: Antoine Pitrou (pitrou) *
Date: 2009-01-08 21:18
Committed to py3k in r68411. Please tell me if you intend to do a patch for 2.7. Otherwise, you/I can close the issue.msg79446 - (view) Author: Lukas Lueg (ebfe) Date: 2009-01-08 22:04
I'll do a patch for 2.7msg81729 - (view) Author: Gregory P. Smith (gregory.p.smith) *
Date: 2009-02-12 07:42
assigning to me so i don't lose track of making sure this happens for trunk.msg81742 - (view) Author: STINNER Victor (vstinner) *
Date: 2009-02-12 11:34
@ebfe: Did you wrote the patch (for python 2.7)? Are you still interrested to write the patch?msg81765 - (view) Author: Lukas Lueg (ebfe) Date: 2009-02-12 14:06
yes, I got lost on that one. I'll create a patch for 2.7 tonight.msg81809 - (view) Author: Lukas Lueg (ebfe) Date: 2009-02-12 19:55
Patch for 2.7msg81825 - (view) Author: STINNER Victor (vstinner) *
Date: 2009-02-12 21:53
@ebfe: Your patch is very close to r68411 (patch for py3k), and so it looks correct (I didn't test it).msg85713 - (view) Author: Lukas Lueg (ebfe) Date: 2009-04-07 15:11
bump hashlibopenssl_gil_py27.diff has not yet been applied to py27 and does not apply cleanly any more. Here is an updated version.msg87091 - (view) Author: Gregory P. Smith (gregory.p.smith) *
Date: 2009-05-04 00:24
Committed with a couple refactorings in trunk r72267. I also added a test (basically checking for corruption that would occur if the locks weren't working). (I'll sort out any py3k vs trunk differences to make future change merges easier).
History
Date
User
Action
Args
2022-04-11 14:56:43adminsetgithub: 49001
2009-05-04 00:24:51gregory.p.smithsetstatus: open -> closed
status: pending -> open
messages: + msg85713
2009-02-12 23:03:54collinwintersetnosy: + collinwinter, jyasskin 2009-02-12 21:53:25vstinnersetmessages: + msg81825 2009-02-12 19:55:48ebfesetfiles: + hashlibopenssl_gil_py27.diff
messages: + msg81809 2009-02-12 14:06:22ebfesetmessages: + msg81765 2009-02-12 11:34:58vstinnersetmessages: + msg81742 2009-02-12 07:42:25gregory.p.smithsetassignee: gregory.p.smith
messages: + msg81729
components: + Extension Modules, - Library (Lib) 2009-01-08 22:04:15ebfesetmessages: + msg79446
versions: + Python 2.7, - Python 3.1 2009-01-08 21:18:13pitrousetstatus: open -> pending
messages: + msg79441
stage: resolved 2009-01-08 21:03:48pitrousetresolution: accepted
messages: + msg79440
versions: - Python 2.7 2009-01-08 20:59:46pitrousetmessages: + msg79439 2009-01-08 20:55:37pitrousetmessages: + msg79438 2009-01-06 19:25:48ebfesetmessages: + msg79280 2009-01-06 19:24:36ebfesetfiles: - hashlibopenssl_small_lock-4.diff 2009-01-06 18:32:01vstinnersetfiles: + hashlibopenssl_small_lock-5.diff
messages: + msg79276 2009-01-06 18:07:22gregory.p.smithsetnosy: - gps
messages: + msg79275
versions: + Python 3.1, Python 2.7, - Python 3.0 2009-01-06 17:42:27pitrousetmessages: + msg79274 2009-01-04 22:38:01vstinnersetfiles: - hashlibopenssl_small_lock-3.patch 2009-01-04 22:37:57vstinnersetfiles: - hashlibopenssl_small_lock-2.patch 2009-01-04 22:25:04ebfesetfiles: + hashlibopenssl_small_lock-4.diff
messages: + msg79087 2009-01-04 22:15:13ebfesetfiles: - hashopenssl_threads-4.diff 2009-01-03 17:17:52ebfesetmessages: + msg78979 2009-01-03 17:08:38pitrousetmessages: + msg78976 2009-01-03 12:28:52ebfesetmessages: + msg78952 2009-01-03 11:19:25ebfesetfiles: - md5module_small_locks.diff 2009-01-03 02:55:44vstinnersetmessages: + msg78927 2009-01-03 02:19:27ebfesetfiles: + md5module_small_locks.diff
messages: + msg78924 2009-01-03 00:59:54vstinnersetfiles: + hashlibopenssl_small_lock-3.patch
messages: + msg78916 2009-01-03 00:53:26vstinnersetmessages: + msg78913 2009-01-03 00:32:11ebfesetmessages: + msg78909 2009-01-02 23:50:55ebfesetmessages: + msg78905 2009-01-02 22:45:18gregory.p.smithsetnosy: + gregory.p.smith
messages: + msg78896 2009-01-02 19:02:15vstinnersetfiles: - hashlibopenssl_small_lock.patch 2009-01-02 19:02:01vstinnersetfiles: + hashlibopenssl_small_lock-2.patch
messages: + msg78858 2009-01-02 18:55:27vstinnersetfiles: - hashopenssl_threads-2.diff 2009-01-02 18:55:08vstinnersetfiles: + hashlibopenssl_small_lock.patch
messages: + msg78857 2009-01-02 15:43:40ebfesetmessages: + msg78820 2009-01-02 14:44:21vstinnersetmessages: + msg78801 2009-01-02 10:46:33ebfesetmessages: + msg78775 2009-01-02 10:45:22ebfesetfiles: - hashopenssl_threads-3.diff 2009-01-02 10:45:17ebfesetfiles: + hashlibtest2.py
messages: + msg78774 2009-01-02 10:45:00ebfesetfiles: + hashopenssl_threads-4.diff
messages: + msg78773 2009-01-01 22:46:14pitrousetmessages: + msg78734 2009-01-01 19:02:11vstinnersetmessages: + msg78719 2009-01-01 18:59:21vstinnersetmessages: - msg78668 2009-01-01 00:04:29pitrousetmessages: + msg78668 2008-12-31 23:29:45pitrousetmessages: + msg78665 2008-12-31 23:18:16pitrousetnosy: + gps 2008-12-27 01:45:13vstinnersetmessages: + msg78330 2008-12-27 01:36:45ebfesetfiles: + hashlibtest.py
messages: + msg78328 2008-12-27 01:27:19vstinnersetfiles: - md5sum.py 2008-12-27 01:27:14vstinnersetfiles: + md5sum.py
messages: + msg78327 2008-12-27 01:04:04vstinnersetfiles: + md5sum.py
messages: + msg78325 2008-12-27 00:44:14pitrousetmessages: + msg78323 2008-12-27 00:20:47ebfesetfiles: + hashopenssl_threads-3.diff
messages: + msg78322 2008-12-27 00:11:05ebfesetfiles: - hashopenssl_threads.diff 2008-12-26 23:18:29vstinnersetfiles: + hashopenssl_threads-2.diff
messages: + msg78317 2008-12-26 22:32:37vstinnersetmessages: + msg78312 2008-12-26 22:01:22vstinnersetmessages: + msg78311 2008-12-26 21:57:17pitrousetnosy: + pitrou
messages: + msg78309 2008-12-26 21:42:10vstinnersetnosy: + vstinner
messages: + msg78308 2008-12-26 13:39:10ebfecreate
messages: + msg87091
2009-04-07 15:11:47ebfesetfiles: - hashlibopenssl_gil_py27.diff 2009-04-07 15:11:40ebfesetfiles: + hashlibopenssl_gil_py27_2.diffstatus: pending -> open
messages: + msg85713
2009-02-12 23:03:54collinwintersetnosy: + collinwinter, jyasskin 2009-02-12 21:53:25vstinnersetmessages: + msg81825 2009-02-12 19:55:48ebfesetfiles: + hashlibopenssl_gil_py27.diff
messages: + msg81809 2009-02-12 14:06:22ebfesetmessages: + msg81765 2009-02-12 11:34:58vstinnersetmessages: + msg81742 2009-02-12 07:42:25gregory.p.smithsetassignee: gregory.p.smith
messages: + msg81729
components: + Extension Modules, - Library (Lib) 2009-01-08 22:04:15ebfesetmessages: + msg79446
versions: + Python 2.7, - Python 3.1 2009-01-08 21:18:13pitrousetstatus: open -> pending
messages: + msg79441
stage: resolved 2009-01-08 21:03:48pitrousetresolution: accepted
messages: + msg79440
versions: - Python 2.7 2009-01-08 20:59:46pitrousetmessages: + msg79439 2009-01-08 20:55:37pitrousetmessages: + msg79438 2009-01-06 19:25:48ebfesetmessages: + msg79280 2009-01-06 19:24:36ebfesetfiles: - hashlibopenssl_small_lock-4.diff 2009-01-06 18:32:01vstinnersetfiles: + hashlibopenssl_small_lock-5.diff
messages: + msg79276 2009-01-06 18:07:22gregory.p.smithsetnosy: - gps
messages: + msg79275
versions: + Python 3.1, Python 2.7, - Python 3.0 2009-01-06 17:42:27pitrousetmessages: + msg79274 2009-01-04 22:38:01vstinnersetfiles: - hashlibopenssl_small_lock-3.patch 2009-01-04 22:37:57vstinnersetfiles: - hashlibopenssl_small_lock-2.patch 2009-01-04 22:25:04ebfesetfiles: + hashlibopenssl_small_lock-4.diff
messages: + msg79087 2009-01-04 22:15:13ebfesetfiles: - hashopenssl_threads-4.diff 2009-01-03 17:17:52ebfesetmessages: + msg78979 2009-01-03 17:08:38pitrousetmessages: + msg78976 2009-01-03 12:28:52ebfesetmessages: + msg78952 2009-01-03 11:19:25ebfesetfiles: - md5module_small_locks.diff 2009-01-03 02:55:44vstinnersetmessages: + msg78927 2009-01-03 02:19:27ebfesetfiles: + md5module_small_locks.diff
messages: + msg78924 2009-01-03 00:59:54vstinnersetfiles: + hashlibopenssl_small_lock-3.patch
messages: + msg78916 2009-01-03 00:53:26vstinnersetmessages: + msg78913 2009-01-03 00:32:11ebfesetmessages: + msg78909 2009-01-02 23:50:55ebfesetmessages: + msg78905 2009-01-02 22:45:18gregory.p.smithsetnosy: + gregory.p.smith
messages: + msg78896 2009-01-02 19:02:15vstinnersetfiles: - hashlibopenssl_small_lock.patch 2009-01-02 19:02:01vstinnersetfiles: + hashlibopenssl_small_lock-2.patch
messages: + msg78858 2009-01-02 18:55:27vstinnersetfiles: - hashopenssl_threads-2.diff 2009-01-02 18:55:08vstinnersetfiles: + hashlibopenssl_small_lock.patch
messages: + msg78857 2009-01-02 15:43:40ebfesetmessages: + msg78820 2009-01-02 14:44:21vstinnersetmessages: + msg78801 2009-01-02 10:46:33ebfesetmessages: + msg78775 2009-01-02 10:45:22ebfesetfiles: - hashopenssl_threads-3.diff 2009-01-02 10:45:17ebfesetfiles: + hashlibtest2.py
messages: + msg78774 2009-01-02 10:45:00ebfesetfiles: + hashopenssl_threads-4.diff
messages: + msg78773 2009-01-01 22:46:14pitrousetmessages: + msg78734 2009-01-01 19:02:11vstinnersetmessages: + msg78719 2009-01-01 18:59:21vstinnersetmessages: - msg78668 2009-01-01 00:04:29pitrousetmessages: + msg78668 2008-12-31 23:29:45pitrousetmessages: + msg78665 2008-12-31 23:18:16pitrousetnosy: + gps 2008-12-27 01:45:13vstinnersetmessages: + msg78330 2008-12-27 01:36:45ebfesetfiles: + hashlibtest.py
messages: + msg78328 2008-12-27 01:27:19vstinnersetfiles: - md5sum.py 2008-12-27 01:27:14vstinnersetfiles: + md5sum.py
messages: + msg78327 2008-12-27 01:04:04vstinnersetfiles: + md5sum.py
messages: + msg78325 2008-12-27 00:44:14pitrousetmessages: + msg78323 2008-12-27 00:20:47ebfesetfiles: + hashopenssl_threads-3.diff
messages: + msg78322 2008-12-27 00:11:05ebfesetfiles: - hashopenssl_threads.diff 2008-12-26 23:18:29vstinnersetfiles: + hashopenssl_threads-2.diff
messages: + msg78317 2008-12-26 22:32:37vstinnersetmessages: + msg78312 2008-12-26 22:01:22vstinnersetmessages: + msg78311 2008-12-26 21:57:17pitrousetnosy: + pitrou
messages: + msg78309 2008-12-26 21:42:10vstinnersetnosy: + vstinner
messages: + msg78308 2008-12-26 13:39:10ebfecreate