| Commit message (Collapse) | Author | Age |
... | |
| |
| |
| |
| |
| | |
certificates from default stores or system stores. By default the method
loads CA certs for authentication of server certs.
|
| |
| |
| |
| |
| | |
CRL enumeration are now two functions. enum_certificates() also returns
purpose flags as set of OIDs.
|
| |
| |
| |
| |
| | |
of the context in order to enable certification revocation list (CRL)
checks or strict X509 rules.
|
| |
| |
| |
| | |
NID, short name and long name.
|
|\| |
|
| |
| |
| |
| |
| | |
for security reasons. It now doesn't match multiple wildcards nor wildcards
inside IDN fragments.
|
|\| |
|
| | |
|
| |
| |
| |
| |
| |
| | |
AttributeError, on a closed SSL socket.
Patch by Senko Rasic.
|
| | |
|
| |
| |
| |
| | |
ModuleNotFoundError.
|
| | |
|
| |
| |
| |
| | |
the default locations for cafile and capath.
|
|\|
| |
| |
| | |
service using certificates with many wildcards (CVE-2013-2099).
|
| |
| |
| |
| | |
service using certificates with many wildcards (CVE-2013-2099).
|
| |
| |
| |
| | |
an OSError with ENOTCONN, instead of an AttributeError, when the SSLSocket is not connected.
|
| | |
|
| |
| |
| |
| | |
patch by Michele Orrù.
|
|\| |
|
| |
| |
| |
| | |
the socket from happening (closes #16900)
|
| |
| |
| |
| |
| |
| | |
:meth:`SSLContext.set_servername_callback` method.
Patch by Daniel Black.
|
|/ |
|
|\
| |
| |
| |
| |
| | |
SSLContext.wrap_socket().
Original patch by Jeff McNeil.
|
| |
| |
| |
| |
| |
| | |
SSLContext.wrap_socket().
Original patch by Jeff McNeil.
|
| |
| |
| |
| |
| |
| | |
Negotiation extension, if available in the underlying OpenSSL library.
Patch by Colin Marc.
|
| |
| |
| |
| | |
OpenSSLs.
|
|\|
| |
| |
| | |
(except when SSLv2 is explicitly asked for).
|
| |
| |
| |
| | |
(except when SSLv2 is explicitly asked for).
|
| |
| |
| |
| | |
SSLContext.load_dh_params() method and the ssl.OP_SINGLE_DH_USE option.
|
| |
| |
| |
| | |
(followup to issue #13627)
|
| | |
|
| |
| |
| |
| |
| | |
key exchange, through the SSLContext.set_ecdh_curve() method and the
ssl.OP_SINGLE_ECDH_USE option.
|
| |
| |
| |
| |
| | |
choose the cipher based on their own preferences, rather than on the
client's.
|
| |
| |
| |
| | |
you don't have to inspect the exception's attributes in the common case.
|
| |
| |
| |
| | |
wrapped sockets (Patch by David Watson)
|
| |
| |
| |
| | |
and documentation in conjunction with lack of any known use cases (see issue #6560 for details)
|
| |
| |
| |
| | |
Watson and Heiko Wundram. (Closes #6560)
|
| |
| |
| |
| |
| |
| |
| |
| | |
to get channel binding data for the current SSL session (only the
"tls-unique" channel binding is implemented). This allows the
implementation of certain authentication mechanisms such as SCRAM-SHA-1-PLUS.
Patch by Jacek Konieczny.
|
|\|
| |
| |
| |
| | |
reset, check the version of the OpenSSL headers Python was compiled against,
rather than the runtime version of the OpenSSL library.
|
| |
| |
| |
| |
| | |
reset, check the version of the OpenSSL headers Python was compiled against,
rather than the runtime version of the OpenSSL library.
|
| |
| |
| |
| | |
module.
|
|\|
| |
| |
| | |
when the socket's timeout expires (it used to return None).
|
| |
| |
| |
| | |
when the socket's timeout expires (it used to return None).
|
| |\
| | |
| | |
| | |
| | |
| | |
| | | |
OpenSSL is now compiled with OPENSSL_NO_SSL2 defined (without the SSLv2
protocol) on Debian: fix the ssl module on Debian Testing and Debian Sid.
Optimize also ssl.get_protocol_name(): speed does matter!
|
| | |
| | |
| | |
| | |
| | |
| | |
| | | |
OpenSSL is now compiled with OPENSSL_NO_SSL2 defined (without the SSLv2
protocol) on Debian: fix the ssl module on Debian Testing and Debian Sid.
Optimize also ssl.get_protocol_name(): speed does matter!
|
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | | |
svn+ssh://pythondev@svn.python.org/python/branches/py3k
........
r84807 | antoine.pitrou | 2010-09-14 16:43:44 +0200 (mar., 14 sept. 2010) | 4 lines
Issue #9853: Fix the signature of SSLSocket.recvfrom() and
SSLSocket.sendto() to match the corresponding socket methods.
........
|
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | | |
svn+ssh://pythondev@svn.python.org/python/branches/py3k
........
r84464 | antoine.pitrou | 2010-09-03 20:38:17 +0200 (ven., 03 sept. 2010) | 3 lines
Issue #3805: clean up implementation of the _read method in _ssl.c.
........
|
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | | |
svn+ssh://pythondev@svn.python.org/python/branches/py3k
........
r80517 | antoine.pitrou | 2010-04-27 01:06:26 +0200 (mar., 27 avril 2010) | 3 lines
Remove unused import
........
|
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | | |
svn+ssh://pythondev@svn.python.org/python/branches/py3k
........
r80515 | antoine.pitrou | 2010-04-27 00:17:47 +0200 (mar., 27 avril 2010) | 4 lines
Hopefully fix sporadic Windows issue by avoiding calling getpeername()
on a freshly dup'ed socket.
........
|
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | | |
svn+ssh://pythondev@svn.python.org/python/branches/py3k
................
r80509 | antoine.pitrou | 2010-04-26 19:29:05 +0200 (lun., 26 avril 2010) | 10 lines
Merged revisions 80507 via svnmerge from
svn+ssh://pythondev@svn.python.org/python/trunk
........
r80507 | antoine.pitrou | 2010-04-26 19:23:33 +0200 (lun., 26 avril 2010) | 4 lines
When calling getpeername() in SSLSocket.__init__, only silence exceptions
caused by the "socket not connected" condition.
........
................
|