| Commit message (Collapse) | Author | Age | Files | Lines | |
|---|---|---|---|---|---|
| * | Check return value of PyLong_FromLong(X509_get_version()). It might be NULL if | Christian Heimes | 2013-07-26 | 1 | -0/+2 |
| |\ | | | | | | | | | X509_get_version() grows beyond our small int cache. CID 1058279 | ||||
| | * | Check return value of PyLong_FromLong(X509_get_version()). It might be NULL if | Christian Heimes | 2013-07-26 | 1 | -0/+2 |
| | | | | | | | | | | | X509_get_version() grows beyond our small int cache. CID 1058279 | ||||
| * | | Issue #18203: Replace malloc() with PyMem_Malloc() in _ssl for the password | Victor Stinner | 2013-07-07 | 1 | -4/+4 |
| | | | |||||
| * | | Issue #18203: Replace malloc() with PyMem_Malloc() in Python modules | Victor Stinner | 2013-07-07 | 1 | -2/+2 |
| | | | | | | | | | | | Replace malloc() with PyMem_Malloc() when the GIL is held, or with PyMem_RawMalloc() otherwise. | ||||
| * | | _ssl.c: strip trailing spaces | Victor Stinner | 2013-06-24 | 1 | -3/+3 |
| | | | |||||
| * | | (Merge 3.3) Issue #18135: ssl.SSLSocket.write() now raises an OverflowError if | Victor Stinner | 2013-06-24 | 1 | -2/+7 |
| |\ \ | |/ | | | | | | | | | the input string in longer than 2 gigabytes, and ssl.SSLContext.load_cert_chain() raises a ValueError if the password is longer than 2 gigabytes. The ssl module does not support partial write. | ||||
| | * | Issue #18135: ssl.SSLSocket.write() now raises an OverflowError if the input | Victor Stinner | 2013-06-24 | 1 | -2/+7 |
| | | | | | | | | | | | | | string in longer than 2 gigabytes, and ssl.SSLContext.load_cert_chain() raises a ValueError if the password is longer than 2 gigabytes. The ssl module does not support partial write. | ||||
| * | | (Merge 3.3) Issue #18135: Fix a possible integer overflow in | Victor Stinner | 2013-06-23 | 1 | -10/+16 |
| |\ \ | |/ | | | | | | | ssl.SSLSocket.write() and in ssl.SSLContext.load_cert_chain() for strings and passwords longer than 2 gigabytes. | ||||
| | * | Issue #18135: Fix a possible integer overflow in ssl.SSLSocket.write() | Victor Stinner | 2013-06-23 | 1 | -5/+11 |
| | | | | | | | | | | | and in ssl.SSLContext.load_cert_chain() for strings and passwords longer than 2 gigabytes. | ||||
| | * | _ssl.c: strip trailing spaces | Victor Stinner | 2013-06-23 | 1 | -5/+5 |
| | | | |||||
| * | | Issue #18147: Add diagnostic functions to ssl.SSLContext(). | Christian Heimes | 2013-06-17 | 1 | -17/+127 |
| | | | | | | | | | | | get_ca_list() lists all loaded CA certificates and cert_store_stats() returns amount of loaded X.509 certs, X.509 CA certs and CRLs. | ||||
| * | | Simplify return value of ssl.get_default_verify_paths | Christian Heimes | 2013-06-14 | 1 | -11/+3 |
| | | | | | | | | | prefix function with PySSL_, too. Other module level functions have a prefix, too. | ||||
| * | | fixd refleak | Christian Heimes | 2013-06-10 | 1 | -1/+9 |
| | | | |||||
| * | | Issue #17134: Add ssl.enum_cert_store() as interface to Windows' cert store. | Christian Heimes | 2013-06-09 | 1 | -0/+132 |
| | | | |||||
| * | | get_default_verify_paths doesn't belong inside the ifdef block | Christian Heimes | 2013-06-09 | 1 | -1/+1 |
| | | | |||||
| * | | Issue #18143: Implement ssl.get_default_verify_paths() in order to debug | Christian Heimes | 2013-06-09 | 1 | -0/+42 |
| | | | | | | | | | the default locations for cafile and capath. | ||||
| * | | Fix compilation under MSVC: ssl_set_mode() is a macro, and the MSVC ↵ | Antoine Pitrou | 2013-05-25 | 1 | -3/+4 |
| | | | | | | | | | | | | | preprocessor doesn't process #ifdef's inside a macro argument list. (found explanation at http://www.tech-archive.net/Archive/VC/microsoft.public.vc.language/2007-05/msg00385.html) | ||||
| * | | Issue #8240: Set the SSL_MODE_ACCEPT_MOVING_WRITE_BUFFER flag on SSL sockets. | Antoine Pitrou | 2013-05-25 | 1 | -1/+3 |
| | | | |||||
| * | | Fix a crash when setting a servername callback on a SSL server socket and ↵ | Antoine Pitrou | 2013-04-11 | 1 | -12/+18 |
| | | | | | | | | | | | | | | | the client doesn't send a server name. Patch by Kazuhiro Yoshida. (originally issue #8109) | ||||
| * | | Fix comment about the OpenSSL version in which SNI version was introduced. | Antoine Pitrou | 2013-03-30 | 1 | -1/+1 |
| | | | |||||
| * | | Improve set_servername_callback docstring. | Antoine Pitrou | 2013-03-30 | 1 | -3/+3 |
| | | | |||||
| * | | Fix previous fix (the cause was actually a misplaced #endif, or so it seems) | Antoine Pitrou | 2013-03-30 | 1 | -3/+1 |
| | | | |||||
| * | | Further compiling fixes (issue #17581) | Antoine Pitrou | 2013-03-30 | 1 | -1/+4 |
| | | | |||||
| * | | Issue #17581: try to fix building on old OpenSSL versions | Antoine Pitrou | 2013-03-30 | 1 | -7/+27 |
| | | | |||||
| * | | Issue #16692: The ssl module now supports TLS 1.1 and TLS 1.2. Initial ↵ | Antoine Pitrou | 2013-03-28 | 1 | -47/+77 |
| | | | | | | | | | patch by Michele Orrù. | ||||
| * | | Issue #16982: Fix --without-threads build failure. | Stefan Krah | 2013-01-17 | 1 | -3/+9 |
| | | | |||||
| * | | SSLContext.load_dh_params() now properly closes the input file. | Antoine Pitrou | 2013-01-12 | 1 | -0/+1 |
| |\ \ | |/ | |||||
| | * | SSLContext.load_dh_params() now properly closes the input file. | Antoine Pitrou | 2013-01-12 | 1 | -0/+1 |
| | | | |||||
| * | | Fix returning uninitialized variable (issue #8109). | Antoine Pitrou | 2013-01-06 | 1 | -1/+1 |
| | | | | | | | | | Found by Christian with Coverity. | ||||
| * | | Issue #8109: The ssl module now has support for server-side SNI, thanks to a ↵ | Antoine Pitrou | 2013-01-05 | 1 | -5/+248 |
| |/ | | | | | | :meth:`SSLContext.set_servername_callback` method. Patch by Daniel Black. | ||||
| * | Issue #15977: Fix memory leak in Modules/_ssl.c when the function ↵ | Christian Heimes | 2012-09-20 | 1 | -0/+7 |
| | | | | | _set_npn_protocols() is called multiple times | ||||
| * | MERGE: Closes #15793: Stack corruption in ssl.RAND_egd() | Jesus Cea | 2012-09-11 | 1 | -1/+1 |
| |\ | |||||
| | * | Closes #15793: Stack corruption in ssl.RAND_egd() | Jesus Cea | 2012-09-11 | 1 | -1/+1 |
| | | | |||||
| * | | Issue #15604: Update uses of PyObject_IsTrue() to check for and handle ↵ | Antoine Pitrou | 2012-08-15 | 1 | -3/+3 |
| |\ \ | |/ | | | | | | | | | errors correctly. Patch by Serhiy Storchaka. | ||||
| | * | Issue #15604: Update uses of PyObject_IsTrue() to check for and handle ↵ | Antoine Pitrou | 2012-08-15 | 1 | -1/+5 |
| | | | | | | | | | | | | | errors correctly. Patch by Serhiy Storchaka. | ||||
| * | | Issue #14837: SSL errors now have `library` and `reason` attributes ↵ | Antoine Pitrou | 2012-06-22 | 1 | -63/+199 |
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | describing precisely what happened and in which OpenSSL submodule. The str() of a SSLError is also enhanced accordingly. NOTE: this commit creates a reference leak. The leak seems tied to the use of PyType_FromSpec() to create the SSLError type. The leak is on the type object when it is instantiated: >>> e = ssl.SSLError() >>> sys.getrefcount(ssl.SSLError) 35 >>> e = ssl.SSLError() >>> sys.getrefcount(ssl.SSLError) 36 >>> e = ssl.SSLError() >>> sys.getrefcount(ssl.SSLError) 37 | ||||
| * | | Issue #14204: The ssl module now has support for the Next Protocol ↵ | Antoine Pitrou | 2012-03-21 | 1 | -0/+115 |
| | | | | | | | | | | | | | Negotiation extension, if available in the underlying OpenSSL library. Patch by Colin Marc. | ||||
| * | | Fix last remaining build issues of _ssl under old OpenSSLs. Patch by Vinay. | Antoine Pitrou | 2012-02-19 | 1 | -0/+5 |
| | | | |||||
| * | | Try to really fix compilation failures of the _ssl module under very old ↵ | Antoine Pitrou | 2012-02-17 | 1 | -0/+6 |
| | | | | | | | | | OpenSSLs. | ||||
| * | | Fix compilation when SSL_OP_SINGLE_ECDH_USE isn't defined | Antoine Pitrou | 2012-02-17 | 1 | -0/+2 |
| | | | |||||
| * | | Issue #13014: Fix a possible reference leak in SSLSocket.getpeercert(). | Antoine Pitrou | 2012-02-15 | 1 | -9/+14 |
| |\ \ | |/ | |||||
| | * | Issue #13014: Fix a possible reference leak in SSLSocket.getpeercert(). | Antoine Pitrou | 2012-02-15 | 1 | -9/+14 |
| | | | |||||
| * | | Issue #13885: CVE-2011-3389: the _ssl module would always disable the CBC IV ↵ | Antoine Pitrou | 2012-01-27 | 1 | -2/+4 |
| |\ \ | |/ | | | | | attack countermeasure. | ||||
| | * | Issue #13885: CVE-2011-3389: the _ssl module would always disable the CBC IV ↵ | Antoine Pitrou | 2012-01-27 | 1 | -2/+4 |
| | |\ | | | | | | | | | | attack countermeasure. | ||||
| | | * | Issue #13885: CVE-2011-3389: the _ssl module would always disable the CBC IV ↵ | Antoine Pitrou | 2012-01-27 | 1 | -1/+2 |
| | | | | | | | | | | | | | attack countermeasure. | ||||
| * | | | Issue #13626: Add support for SSL Diffie-Hellman key exchange, through the | Antoine Pitrou | 2011-12-22 | 1 | -0/+35 |
| | | | | | | | | | | | | | SSLContext.load_dh_params() method and the ssl.OP_SINGLE_DH_USE option. | ||||
| * | | | Fix ssl module compilation if ECDH support was disabled in the OpenSSL build. | Antoine Pitrou | 2011-12-21 | 1 | -0/+12 |
| | | | | | | | | | | | | | (followup to issue #13627) | ||||
| * | | | Issue #13634: Add support for querying and disabling SSL compression. | Antoine Pitrou | 2011-12-20 | 1 | -0/+24 |
| | | | | |||||
| * | | | Issue #13627: Add support for SSL Elliptic Curve-based Diffie-Hellman | Antoine Pitrou | 2011-12-19 | 1 | -0/+30 |
| | | | | | | | | | | | | | | | | key exchange, through the SSLContext.set_ecdh_curve() method and the ssl.OP_SINGLE_ECDH_USE option. | ||||
| * | | | Issue #13635: Add ssl.OP_CIPHER_SERVER_PREFERENCE, so that SSL servers | Antoine Pitrou | 2011-12-19 | 1 | -0/+2 |
| | | | | | | | | | | | | | | | | choose the cipher based on their own preferences, rather than on the client's. | ||||
