aboutsummaryrefslogtreecommitdiffstatshomepage
path: root/Lib/ssl.py
Commit message (Collapse)AuthorAge
...
* | Issue #19292: Add SSLContext.load_default_certs() to load default root CAChristian Heimes2013-11-23
| | | | | | | | | | certificates from default stores or system stores. By default the method loads CA certs for authentication of server certs.
* | Issue #17134: Finalize interface to Windows' certificate store. Cert andChristian Heimes2013-11-22
| | | | | | | | | | CRL enumeration are now two functions. enum_certificates() also returns purpose flags as set of OIDs.
* | Issue #8813: Add SSLContext.verify_flags to change the verification flagsChristian Heimes2013-11-21
| | | | | | | | | | of the context in order to enable certification revocation list (CRL) checks or strict X509 rules.
* | Issue #19448: Add private API to SSL module to lookup ASN.1 objects by OID, ↵Christian Heimes2013-11-17
| | | | | | | | NID, short name and long name.
* | merge with 3.3Georg Brandl2013-10-27
|\|
| * Issue #17997: Change behavior of ``ssl.match_hostname()`` to follow RFC 6125,Georg Brandl2013-10-27
| | | | | | | | | | for security reasons. It now doesn't match multiple wildcards nor wildcards inside IDN fragments.
* | #18705: merge with 3.3.Ezio Melotti2013-08-17
|\|
| * #18705: fix a number of typos. Patch by Févry Thibault.Ezio Melotti2013-08-17
| |
* | Issue #9177: Calling read() or write() now raises ValueError, not ↵Antoine Pitrou2013-07-20
| | | | | | | | | | | | AttributeError, on a closed SSL socket. Patch by Senko Rasic.
* | Issue #18200: Back out usage of ModuleNotFoundError (8d28d44f3a9a)Brett Cannon2013-07-04
| |
* | Issue #18200: Update the stdlib (except tests) to useBrett Cannon2013-06-13
| | | | | | | | ModuleNotFoundError.
* | Issue #17134: Add ssl.enum_cert_store() as interface to Windows' cert store.Christian Heimes2013-06-09
| |
* | Issue #18143: Implement ssl.get_default_verify_paths() in order to debugChristian Heimes2013-06-09
| | | | | | | | the default locations for cafile and capath.
* | Issue #17980: Fix possible abuse of ssl.match_hostname() for denial of ↵Antoine Pitrou2013-05-18
|\| | | | | | | service using certificates with many wildcards (CVE-2013-2099).
| * Issue #17980: Fix possible abuse of ssl.match_hostname() for denial of ↵Antoine Pitrou2013-05-18
| | | | | | | | service using certificates with many wildcards (CVE-2013-2099).
* | Issue #13721: SSLSocket.getpeercert() and SSLSocket.do_handshake() now raise ↵Antoine Pitrou2013-05-01
| | | | | | | | an OSError with ENOTCONN, instead of an AttributeError, when the SSLSocket is not connected.
* | remove uneffective 'while True' clauseGiampaolo Rodola'2013-04-03
| |
* | Issue #16692: The ssl module now supports TLS 1.1 and TLS 1.2. Initial ↵Antoine Pitrou2013-03-28
| | | | | | | | patch by Michele Orrù.
* | merge 3.3 (#16900)Benjamin Peterson2013-01-10
|\|
| * remove __del__ because it's evil and also prevents the ResourceWarning on ↵Benjamin Peterson2013-01-10
| | | | | | | | the socket from happening (closes #16900)
* | Issue #8109: The ssl module now has support for server-side SNI, thanks to a ↵Antoine Pitrou2013-01-05
| | | | | | | | | | | | :meth:`SSLContext.set_servername_callback` method. Patch by Daniel Black.
* | Issue #16717: get rid of socket.error, replace with OSErrorAndrew Svetlov2012-12-18
|/
* Issue #16357: fix calling accept() on a SSLSocket created through ↵Antoine Pitrou2012-11-11
|\ | | | | | | | | | | SSLContext.wrap_socket(). Original patch by Jeff McNeil.
| * Issue #16357: fix calling accept() on a SSLSocket created through ↵Antoine Pitrou2012-11-11
| | | | | | | | | | | | SSLContext.wrap_socket(). Original patch by Jeff McNeil.
* | Issue #14204: The ssl module now has support for the Next Protocol ↵Antoine Pitrou2012-03-22
| | | | | | | | | | | | Negotiation extension, if available in the underlying OpenSSL library. Patch by Colin Marc.
* | Try to really fix compilation failures of the _ssl module under very old ↵Antoine Pitrou2012-02-17
| | | | | | | | OpenSSLs.
* | Issue #13636: Weak ciphers are now disabled by default in the ssl moduleAntoine Pitrou2012-01-03
|\| | | | | | | (except when SSLv2 is explicitly asked for).
| * Issue #13636: Weak ciphers are now disabled by default in the ssl moduleAntoine Pitrou2012-01-03
| | | | | | | | (except when SSLv2 is explicitly asked for).
* | Issue #13626: Add support for SSL Diffie-Hellman key exchange, through theAntoine Pitrou2011-12-22
| | | | | | | | SSLContext.load_dh_params() method and the ssl.OP_SINGLE_DH_USE option.
* | Fix ssl module compilation if ECDH support was disabled in the OpenSSL build.Antoine Pitrou2011-12-21
| | | | | | | | (followup to issue #13627)
* | Issue #13634: Add support for querying and disabling SSL compression.Antoine Pitrou2011-12-20
| |
* | Issue #13627: Add support for SSL Elliptic Curve-based Diffie-HellmanAntoine Pitrou2011-12-19
| | | | | | | | | | key exchange, through the SSLContext.set_ecdh_curve() method and the ssl.OP_SINGLE_ECDH_USE option.
* | Issue #13635: Add ssl.OP_CIPHER_SERVER_PREFERENCE, so that SSL serversAntoine Pitrou2011-12-19
| | | | | | | | | | choose the cipher based on their own preferences, rather than on the client's.
* | Issue #11183: Add finer-grained exceptions to the ssl module, so thatAntoine Pitrou2011-10-27
| | | | | | | | you don't have to inspect the exception's attributes in the common case.
* | Fix #12835: prevent use of the unencrypted sendmsg/recvmsg APIs on SSL ↵Nick Coghlan2011-08-28
| | | | | | | | wrapped sockets (Patch by David Watson)
* | Remove the SSLSocket versions of sendmsg/recvmsg due to lack of proper tests ↵Nick Coghlan2011-08-23
| | | | | | | | and documentation in conjunction with lack of any known use cases (see issue #6560 for details)
* | Add support for the send/recvmsg API to the socket module. Patch by David ↵Nick Coghlan2011-08-22
| | | | | | | | Watson and Heiko Wundram. (Closes #6560)
* | Issue #12551: Provide a get_channel_binding() method on SSL sockets so asAntoine Pitrou2011-07-21
| | | | | | | | | | | | | | | | to get channel binding data for the current SSL session (only the "tls-unique" channel binding is implemented). This allows the implementation of certain authentication mechanisms such as SCRAM-SHA-1-PLUS. Patch by Jacek Konieczny.
* | Issue #12440: When testing whether some bits in SSLContext.options can beAntoine Pitrou2011-07-08
|\| | | | | | | | | reset, check the version of the OpenSSL headers Python was compiled against, rather than the runtime version of the OpenSSL library.
| * Issue #12440: When testing whether some bits in SSLContext.options can beAntoine Pitrou2011-07-08
| | | | | | | | | | reset, check the version of the OpenSSL headers Python was compiled against, rather than the runtime version of the OpenSSL library.
* | Issue #12049: Add RAND_bytes() and RAND_pseudo_bytes() functions to the sslVictor Stinner2011-05-24
| | | | | | | | module.
* | Issue #12065: connect_ex() on an SSL socket now returns the original errnoAntoine Pitrou2011-05-18
|\| | | | | | | when the socket's timeout expires (it used to return None).
| * Issue #12065: connect_ex() on an SSL socket now returns the original errnoAntoine Pitrou2011-05-18
| | | | | | | | when the socket's timeout expires (it used to return None).
| * (Merge 3.1) Issue #12012: ssl.PROTOCOL_SSLv2 becomes optionalVictor Stinner2011-05-10
| |\ | | | | | | | | | | | | | | | | | | OpenSSL is now compiled with OPENSSL_NO_SSL2 defined (without the SSLv2 protocol) on Debian: fix the ssl module on Debian Testing and Debian Sid. Optimize also ssl.get_protocol_name(): speed does matter!
| | * Issue #12012: ssl.PROTOCOL_SSLv2 becomes optionalVictor Stinner2011-05-10
| | | | | | | | | | | | | | | | | | | | | OpenSSL is now compiled with OPENSSL_NO_SSL2 defined (without the SSLv2 protocol) on Debian: fix the ssl module on Debian Testing and Debian Sid. Optimize also ssl.get_protocol_name(): speed does matter!
| | * Merged revisions 84807 via svnmerge fromAntoine Pitrou2010-09-14
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | svn+ssh://pythondev@svn.python.org/python/branches/py3k ........ r84807 | antoine.pitrou | 2010-09-14 16:43:44 +0200 (mar., 14 sept. 2010) | 4 lines Issue #9853: Fix the signature of SSLSocket.recvfrom() and SSLSocket.sendto() to match the corresponding socket methods. ........
| | * Merged revisions 84464 via svnmerge fromAntoine Pitrou2010-09-03
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | svn+ssh://pythondev@svn.python.org/python/branches/py3k ........ r84464 | antoine.pitrou | 2010-09-03 20:38:17 +0200 (ven., 03 sept. 2010) | 3 lines Issue #3805: clean up implementation of the _read method in _ssl.c. ........
| | * Merged revisions 80517 via svnmerge fromAntoine Pitrou2010-04-26
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | svn+ssh://pythondev@svn.python.org/python/branches/py3k ........ r80517 | antoine.pitrou | 2010-04-27 01:06:26 +0200 (mar., 27 avril 2010) | 3 lines Remove unused import ........
| | * Merged revisions 80515 via svnmerge fromAntoine Pitrou2010-04-26
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | svn+ssh://pythondev@svn.python.org/python/branches/py3k ........ r80515 | antoine.pitrou | 2010-04-27 00:17:47 +0200 (mar., 27 avril 2010) | 4 lines Hopefully fix sporadic Windows issue by avoiding calling getpeername() on a freshly dup'ed socket. ........
| | * Merged revisions 80509 via svnmerge fromAntoine Pitrou2010-04-26
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | svn+ssh://pythondev@svn.python.org/python/branches/py3k ................ r80509 | antoine.pitrou | 2010-04-26 19:29:05 +0200 (lun., 26 avril 2010) | 10 lines Merged revisions 80507 via svnmerge from svn+ssh://pythondev@svn.python.org/python/trunk ........ r80507 | antoine.pitrou | 2010-04-26 19:23:33 +0200 (lun., 26 avril 2010) | 4 lines When calling getpeername() in SSLSocket.__init__, only silence exceptions caused by the "socket not connected" condition. ........ ................