Commit message (Collapse) | Author | Age | Files | Lines | ||
---|---|---|---|---|---|---|
... | ||||||
* | Issue #20976: pyflakes: Remove unused imports | Victor Stinner | 2014-03-20 | 1 | -3/+0 | |
| | ||||||
* | Issue #19422: Explicitly disallow non-SOCK_STREAM sockets in the ssl module, ↵ | Antoine Pitrou | 2013-12-28 | 1 | -0/+5 | |
|\ | | | | | | | rather than silently let them emit clear text data. | |||||
| * | Issue #19422: Explicitly disallow non-SOCK_STREAM sockets in the ssl module, ↵ | Antoine Pitrou | 2013-12-28 | 1 | -0/+5 | |
| | | | | | | | | rather than silently let them emit clear text data. | |||||
* | | Issue #19509: Don't close the socket in do_handshake() when hostname ↵ | Christian Heimes | 2013-12-04 | 1 | -9/+4 | |
| | | | | | | | | verification fails. | |||||
* | | add check_hostname arg to ssl._create_stdlib_context() | Christian Heimes | 2013-12-02 | 1 | -1/+2 | |
| | | ||||||
* | | Issue #19509: Add SSLContext.check_hostname to match the peer's certificate | Christian Heimes | 2013-12-02 | 1 | -5/+27 | |
| | | | | | | | | with server_hostname on handshake. | |||||
* | | ssl.create_default_context() sets OP_NO_COMPRESSION to prevent CRIME | Christian Heimes | 2013-11-28 | 1 | -0/+2 | |
| | | ||||||
* | | Issue #19735: Implement private function ssl._create_stdlib_context() to | Christian Heimes | 2013-11-23 | 1 | -6/+44 | |
| | | | | | | | | | | create SSLContext objects in Python's stdlib module. It provides a single configuration point and makes use of SSLContext.load_default_certs(). | |||||
* | | Issue #19689: Add ssl.create_default_context() factory function. It creates | Christian Heimes | 2013-11-23 | 1 | -0/+35 | |
| | | | | | | | | a new SSLContext object with secure default settings. | |||||
* | | Issue #19292: Add SSLContext.load_default_certs() to load default root CA | Christian Heimes | 2013-11-23 | 1 | -0/+28 | |
| | | | | | | | | | | certificates from default stores or system stores. By default the method loads CA certs for authentication of server certs. | |||||
* | | Issue #17134: Finalize interface to Windows' certificate store. Cert and | Christian Heimes | 2013-11-22 | 1 | -1/+1 | |
| | | | | | | | | | | CRL enumeration are now two functions. enum_certificates() also returns purpose flags as set of OIDs. | |||||
* | | Issue #8813: Add SSLContext.verify_flags to change the verification flags | Christian Heimes | 2013-11-21 | 1 | -0/+2 | |
| | | | | | | | | | | of the context in order to enable certification revocation list (CRL) checks or strict X509 rules. | |||||
* | | Issue #19448: Add private API to SSL module to lookup ASN.1 objects by OID, ↵ | Christian Heimes | 2013-11-17 | 1 | -2/+24 | |
| | | | | | | | | NID, short name and long name. | |||||
* | | merge with 3.3 | Georg Brandl | 2013-10-27 | 1 | -22/+50 | |
|\ \ | |/ | ||||||
| * | Issue #17997: Change behavior of ``ssl.match_hostname()`` to follow RFC 6125, | Georg Brandl | 2013-10-27 | 1 | -22/+50 | |
| | | | | | | | | | | for security reasons. It now doesn't match multiple wildcards nor wildcards inside IDN fragments. | |||||
* | | #18705: merge with 3.3. | Ezio Melotti | 2013-08-17 | 1 | -1/+1 | |
|\ \ | |/ | ||||||
| * | #18705: fix a number of typos. Patch by Févry Thibault. | Ezio Melotti | 2013-08-17 | 1 | -1/+1 | |
| | | ||||||
* | | Issue #9177: Calling read() or write() now raises ValueError, not ↵ | Antoine Pitrou | 2013-07-20 | 1 | -0/+4 | |
| | | | | | | | | | | | | AttributeError, on a closed SSL socket. Patch by Senko Rasic. | |||||
* | | Issue #18200: Back out usage of ModuleNotFoundError (8d28d44f3a9a) | Brett Cannon | 2013-07-04 | 1 | -2/+2 | |
| | | ||||||
* | | Issue #18200: Update the stdlib (except tests) to use | Brett Cannon | 2013-06-14 | 1 | -2/+2 | |
| | | | | | | | | ModuleNotFoundError. | |||||
* | | Issue #17134: Add ssl.enum_cert_store() as interface to Windows' cert store. | Christian Heimes | 2013-06-09 | 1 | -0/+4 | |
| | | ||||||
* | | Issue #18143: Implement ssl.get_default_verify_paths() in order to debug | Christian Heimes | 2013-06-09 | 1 | -0/+20 | |
| | | | | | | | | the default locations for cafile and capath. | |||||
* | | Issue #17980: Fix possible abuse of ssl.match_hostname() for denial of ↵ | Antoine Pitrou | 2013-05-18 | 1 | -1/+8 | |
|\ \ | |/ | | | | | service using certificates with many wildcards (CVE-2013-2099). | |||||
| * | Issue #17980: Fix possible abuse of ssl.match_hostname() for denial of ↵ | Antoine Pitrou | 2013-05-18 | 1 | -1/+8 | |
| | | | | | | | | service using certificates with many wildcards (CVE-2013-2099). | |||||
* | | Issue #13721: SSLSocket.getpeercert() and SSLSocket.do_handshake() now raise ↵ | Antoine Pitrou | 2013-05-01 | 1 | -12/+22 | |
| | | | | | | | | an OSError with ENOTCONN, instead of an AttributeError, when the SSLSocket is not connected. | |||||
* | | remove uneffective 'while True' clause | Giampaolo Rodola' | 2013-04-03 | 1 | -11/+10 | |
| | | ||||||
* | | Issue #16692: The ssl module now supports TLS 1.1 and TLS 1.2. Initial ↵ | Antoine Pitrou | 2013-03-28 | 1 | -2/+11 | |
| | | | | | | | | patch by Michele Orrù. | |||||
* | | merge 3.3 (#16900) | Benjamin Peterson | 2013-01-10 | 1 | -4/+0 | |
|\ \ | |/ | ||||||
| * | remove __del__ because it's evil and also prevents the ResourceWarning on ↵ | Benjamin Peterson | 2013-01-10 | 1 | -4/+0 | |
| | | | | | | | | the socket from happening (closes #16900) | |||||
* | | Issue #8109: The ssl module now has support for server-side SNI, thanks to a ↵ | Antoine Pitrou | 2013-01-05 | 1 | -32/+60 | |
| | | | | | | | | | | | | :meth:`SSLContext.set_servername_callback` method. Patch by Daniel Black. | |||||
* | | Issue #16717: get rid of socket.error, replace with OSError | Andrew Svetlov | 2012-12-18 | 1 | -4/+6 | |
|/ | ||||||
* | Issue #16357: fix calling accept() on a SSLSocket created through ↵ | Antoine Pitrou | 2012-11-11 | 1 | -10/+5 | |
|\ | | | | | | | | | | | SSLContext.wrap_socket(). Original patch by Jeff McNeil. | |||||
| * | Issue #16357: fix calling accept() on a SSLSocket created through ↵ | Antoine Pitrou | 2012-11-11 | 1 | -10/+5 | |
| | | | | | | | | | | | | SSLContext.wrap_socket(). Original patch by Jeff McNeil. | |||||
* | | Issue #14204: The ssl module now has support for the Next Protocol ↵ | Antoine Pitrou | 2012-03-21 | 1 | -3/+24 | |
| | | | | | | | | | | | | Negotiation extension, if available in the underlying OpenSSL library. Patch by Colin Marc. | |||||
* | | Try to really fix compilation failures of the _ssl module under very old ↵ | Antoine Pitrou | 2012-02-17 | 1 | -1/+5 | |
| | | | | | | | | OpenSSLs. | |||||
* | | Issue #13636: Weak ciphers are now disabled by default in the ssl module | Antoine Pitrou | 2012-01-03 | 1 | -2/+11 | |
|\ \ | |/ | | | | | (except when SSLv2 is explicitly asked for). | |||||
| * | Issue #13636: Weak ciphers are now disabled by default in the ssl module | Antoine Pitrou | 2012-01-03 | 1 | -2/+10 | |
| | | | | | | | | (except when SSLv2 is explicitly asked for). | |||||
* | | Issue #13626: Add support for SSL Diffie-Hellman key exchange, through the | Antoine Pitrou | 2011-12-22 | 1 | -1/+1 | |
| | | | | | | | | SSLContext.load_dh_params() method and the ssl.OP_SINGLE_DH_USE option. | |||||
* | | Fix ssl module compilation if ECDH support was disabled in the OpenSSL build. | Antoine Pitrou | 2011-12-21 | 1 | -1/+1 | |
| | | | | | | | | (followup to issue #13627) | |||||
* | | Issue #13634: Add support for querying and disabling SSL compression. | Antoine Pitrou | 2011-12-20 | 1 | -0/+11 | |
| | | ||||||
* | | Issue #13627: Add support for SSL Elliptic Curve-based Diffie-Hellman | Antoine Pitrou | 2011-12-19 | 1 | -1/+1 | |
| | | | | | | | | | | key exchange, through the SSLContext.set_ecdh_curve() method and the ssl.OP_SINGLE_ECDH_USE option. | |||||
* | | Issue #13635: Add ssl.OP_CIPHER_SERVER_PREFERENCE, so that SSL servers | Antoine Pitrou | 2011-12-19 | 1 | -1/+4 | |
| | | | | | | | | | | choose the cipher based on their own preferences, rather than on the client's. | |||||
* | | Issue #11183: Add finer-grained exceptions to the ssl module, so that | Antoine Pitrou | 2011-10-27 | 1 | -1/+5 | |
| | | | | | | | | you don't have to inspect the exception's attributes in the common case. | |||||
* | | Fix #12835: prevent use of the unencrypted sendmsg/recvmsg APIs on SSL ↵ | Nick Coghlan | 2011-08-27 | 1 | -0/+14 | |
| | | | | | | | | wrapped sockets (Patch by David Watson) | |||||
* | | Remove the SSLSocket versions of sendmsg/recvmsg due to lack of proper tests ↵ | Nick Coghlan | 2011-08-23 | 1 | -24/+0 | |
| | | | | | | | | and documentation in conjunction with lack of any known use cases (see issue #6560 for details) | |||||
* | | Add support for the send/recvmsg API to the socket module. Patch by David ↵ | Nick Coghlan | 2011-08-22 | 1 | -0/+24 | |
| | | | | | | | | Watson and Heiko Wundram. (Closes #6560) | |||||
* | | Issue #12551: Provide a get_channel_binding() method on SSL sockets so as | Antoine Pitrou | 2011-07-20 | 1 | -0/+19 | |
| | | | | | | | | | | | | | | | | to get channel binding data for the current SSL session (only the "tls-unique" channel binding is implemented). This allows the implementation of certain authentication mechanisms such as SCRAM-SHA-1-PLUS. Patch by Jacek Konieczny. | |||||
* | | Issue #12440: When testing whether some bits in SSLContext.options can be | Antoine Pitrou | 2011-07-08 | 1 | -0/+2 | |
|\ \ | |/ | | | | | | | reset, check the version of the OpenSSL headers Python was compiled against, rather than the runtime version of the OpenSSL library. | |||||
| * | Issue #12440: When testing whether some bits in SSLContext.options can be | Antoine Pitrou | 2011-07-08 | 1 | -0/+2 | |
| | | | | | | | | | | reset, check the version of the OpenSSL headers Python was compiled against, rather than the runtime version of the OpenSSL library. | |||||
* | | Issue #12049: Add RAND_bytes() and RAND_pseudo_bytes() functions to the ssl | Victor Stinner | 2011-05-24 | 1 | -1/+1 | |
| | | | | | | | | module. |