summaryrefslogtreecommitdiffstats
path: root/Doc/library/ssl.rst
diff options
context:
space:
mode:
Diffstat (limited to 'Doc/library/ssl.rst')
-rw-r--r--Doc/library/ssl.rst51
1 files changed, 49 insertions, 2 deletions
diff --git a/Doc/library/ssl.rst b/Doc/library/ssl.rst
index 9d8d080..61d40bf 100644
--- a/Doc/library/ssl.rst
+++ b/Doc/library/ssl.rst
@@ -322,6 +322,16 @@ purposes.
Random generation
^^^^^^^^^^^^^^^^^
+ .. deprecated::
+
+ 2.7.13 OpenSSL has deprecated :func:`ssl.RAND_pseudo_bytes`, use
+ :func:`ssl.RAND_bytes` instead.
+
+ .. deprecated::
+
+ 2.7.13 OpenSSL has deprecated :func:`ssl.RAND_pseudo_bytes`, use
+ :func:`ssl.RAND_bytes` instead.
+
.. function:: RAND_status()
Return ``True`` if the SSL pseudo-random number generator has been seeded
@@ -340,7 +350,7 @@ Random generation
See http://egd.sourceforge.net/ or http://prngd.sourceforge.net/ for sources
of entropy-gathering daemons.
- Availability: not available with LibreSSL.
+ Availability: not available with LibreSSL and OpenSSL > 1.1.0
.. function:: RAND_add(bytes, entropy)
@@ -444,6 +454,9 @@ Certificate handling
* :attr:`openssl_capath_env` - OpenSSL's environment key that points to a capath,
* :attr:`openssl_capath` - hard coded path to a capath directory
+ Availability: LibreSSL ignores the environment vars
+ :attr:`openssl_cafile_env` and :attr:`openssl_capath_env`
+
.. versionadded:: 2.7.9
.. function:: enum_certificates(store_name)
@@ -561,11 +574,19 @@ Constants
.. versionadded:: 2.7.10
-.. data:: PROTOCOL_SSLv23
+.. data:: PROTOCOL_TLS
Selects the highest protocol version that both the client and server support.
Despite the name, this option can select "TLS" protocols as well as "SSL".
+ .. versionadded:: 2.7.13
+
+.. data:: PROTOCOL_SSLv23
+
+ Alias for ``PROTOCOL_TLS``.
+
+ .. deprecated:: 2.7.13 Use ``PROTOCOL_TLS`` instead.
+
.. data:: PROTOCOL_SSLv2
Selects SSL version 2 as the channel encryption protocol.
@@ -577,6 +598,8 @@ Constants
SSL version 2 is insecure. Its use is highly discouraged.
+ .. deprecated:: 2.7.13 OpenSSL has removed support for SSLv2.
+
.. data:: PROTOCOL_SSLv3
Selects SSL version 3 as the channel encryption protocol.
@@ -588,10 +611,20 @@ Constants
SSL version 3 is insecure. Its use is highly discouraged.
+ .. deprecated:: 2.7.13
+
+ OpenSSL has deprecated all version specific protocols. Use the default
+ protocol with flags like ``OP_NO_SSLv3`` instead.
+
.. data:: PROTOCOL_TLSv1
Selects TLS version 1.0 as the channel encryption protocol.
+ .. deprecated:: 2.7.13
+
+ OpenSSL has deprecated all version specific protocols. Use the default
+ protocol with flags like ``OP_NO_SSLv3`` instead.
+
.. data:: PROTOCOL_TLSv1_1
Selects TLS version 1.1 as the channel encryption protocol.
@@ -599,6 +632,11 @@ Constants
.. versionadded:: 2.7.9
+ .. deprecated:: 2.7.13
+
+ OpenSSL has deprecated all version specific protocols. Use the default
+ protocol with flags like ``OP_NO_SSLv3`` instead.
+
.. data:: PROTOCOL_TLSv1_2
Selects TLS version 1.2 as the channel encryption protocol. This is the
@@ -607,6 +645,12 @@ Constants
.. versionadded:: 2.7.9
+ .. deprecated:: 2.7.13
+
+ OpenSSL has deprecated all version specific protocols. Use the default
+ protocol with flags like ``OP_NO_SSLv3`` instead.
+
+
.. data:: OP_ALL
Enables workarounds for various bugs present in other SSL implementations.
@@ -1112,6 +1156,9 @@ to speed up repeated connections from the same clients.
This method will raise :exc:`NotImplementedError` if :data:`HAS_ALPN` is
False.
+ OpenSSL 1.1.0+ will abort the handshake and raise :exc:`SSLError` when
+ both sides support ALPN but cannot agree on a protocol.
+
.. versionadded:: 2.7.10
.. method:: SSLContext.set_npn_protocols(protocols)