summaryrefslogtreecommitdiffstats
path: root/Modules/_ssl.c
Commit message (Collapse)AuthorAgeFilesLines
* Check return value of PyLong_FromLong(X509_get_version()). It might be NULL ifChristian Heimes2013-07-261-0/+2
|\ | | | | | | | | X509_get_version() grows beyond our small int cache. CID 1058279
| * Check return value of PyLong_FromLong(X509_get_version()). It might be NULL ifChristian Heimes2013-07-261-0/+2
| | | | | | | | | | X509_get_version() grows beyond our small int cache. CID 1058279
* | Issue #18203: Replace malloc() with PyMem_Malloc() in _ssl for the passwordVictor Stinner2013-07-071-4/+4
| |
* | Issue #18203: Replace malloc() with PyMem_Malloc() in Python modulesVictor Stinner2013-07-071-2/+2
| | | | | | | | | | Replace malloc() with PyMem_Malloc() when the GIL is held, or with PyMem_RawMalloc() otherwise.
* | _ssl.c: strip trailing spacesVictor Stinner2013-06-241-3/+3
| |
* | (Merge 3.3) Issue #18135: ssl.SSLSocket.write() now raises an OverflowError ifVictor Stinner2013-06-241-2/+7
|\ \ | |/ | | | | | | | | the input string in longer than 2 gigabytes, and ssl.SSLContext.load_cert_chain() raises a ValueError if the password is longer than 2 gigabytes. The ssl module does not support partial write.
| * Issue #18135: ssl.SSLSocket.write() now raises an OverflowError if the inputVictor Stinner2013-06-241-2/+7
| | | | | | | | | | | | string in longer than 2 gigabytes, and ssl.SSLContext.load_cert_chain() raises a ValueError if the password is longer than 2 gigabytes. The ssl module does not support partial write.
* | (Merge 3.3) Issue #18135: Fix a possible integer overflow inVictor Stinner2013-06-231-10/+16
|\ \ | |/ | | | | | | ssl.SSLSocket.write() and in ssl.SSLContext.load_cert_chain() for strings and passwords longer than 2 gigabytes.
| * Issue #18135: Fix a possible integer overflow in ssl.SSLSocket.write()Victor Stinner2013-06-231-5/+11
| | | | | | | | | | and in ssl.SSLContext.load_cert_chain() for strings and passwords longer than 2 gigabytes.
| * _ssl.c: strip trailing spacesVictor Stinner2013-06-231-5/+5
| |
* | Issue #18147: Add diagnostic functions to ssl.SSLContext().Christian Heimes2013-06-171-17/+127
| | | | | | | | | | get_ca_list() lists all loaded CA certificates and cert_store_stats() returns amount of loaded X.509 certs, X.509 CA certs and CRLs.
* | Simplify return value of ssl.get_default_verify_pathsChristian Heimes2013-06-141-11/+3
| | | | | | | | prefix function with PySSL_, too. Other module level functions have a prefix, too.
* | fixd refleakChristian Heimes2013-06-101-1/+9
| |
* | Issue #17134: Add ssl.enum_cert_store() as interface to Windows' cert store.Christian Heimes2013-06-091-0/+132
| |
* | get_default_verify_paths doesn't belong inside the ifdef blockChristian Heimes2013-06-091-1/+1
| |
* | Issue #18143: Implement ssl.get_default_verify_paths() in order to debugChristian Heimes2013-06-091-0/+42
| | | | | | | | the default locations for cafile and capath.
* | Fix compilation under MSVC: ssl_set_mode() is a macro, and the MSVC ↵Antoine Pitrou2013-05-251-3/+4
| | | | | | | | | | | | preprocessor doesn't process #ifdef's inside a macro argument list. (found explanation at http://www.tech-archive.net/Archive/VC/microsoft.public.vc.language/2007-05/msg00385.html)
* | Issue #8240: Set the SSL_MODE_ACCEPT_MOVING_WRITE_BUFFER flag on SSL sockets.Antoine Pitrou2013-05-251-1/+3
| |
* | Fix a crash when setting a servername callback on a SSL server socket and ↵Antoine Pitrou2013-04-111-12/+18
| | | | | | | | | | | | | | the client doesn't send a server name. Patch by Kazuhiro Yoshida. (originally issue #8109)
* | Fix comment about the OpenSSL version in which SNI version was introduced.Antoine Pitrou2013-03-301-1/+1
| |
* | Improve set_servername_callback docstring.Antoine Pitrou2013-03-301-3/+3
| |
* | Fix previous fix (the cause was actually a misplaced #endif, or so it seems)Antoine Pitrou2013-03-301-3/+1
| |
* | Further compiling fixes (issue #17581)Antoine Pitrou2013-03-301-1/+4
| |
* | Issue #17581: try to fix building on old OpenSSL versionsAntoine Pitrou2013-03-301-7/+27
| |
* | Issue #16692: The ssl module now supports TLS 1.1 and TLS 1.2. Initial ↵Antoine Pitrou2013-03-281-47/+77
| | | | | | | | patch by Michele Orrù.
* | Issue #16982: Fix --without-threads build failure.Stefan Krah2013-01-171-3/+9
| |
* | SSLContext.load_dh_params() now properly closes the input file.Antoine Pitrou2013-01-121-0/+1
|\ \ | |/
| * SSLContext.load_dh_params() now properly closes the input file.Antoine Pitrou2013-01-121-0/+1
| |
* | Fix returning uninitialized variable (issue #8109).Antoine Pitrou2013-01-061-1/+1
| | | | | | | | Found by Christian with Coverity.
* | Issue #8109: The ssl module now has support for server-side SNI, thanks to a ↵Antoine Pitrou2013-01-051-5/+248
|/ | | | | | :meth:`SSLContext.set_servername_callback` method. Patch by Daniel Black.
* Issue #15977: Fix memory leak in Modules/_ssl.c when the function ↵Christian Heimes2012-09-201-0/+7
| | | | _set_npn_protocols() is called multiple times
* MERGE: Closes #15793: Stack corruption in ssl.RAND_egd()Jesus Cea2012-09-111-1/+1
|\
| * Closes #15793: Stack corruption in ssl.RAND_egd()Jesus Cea2012-09-111-1/+1
| |
* | Issue #15604: Update uses of PyObject_IsTrue() to check for and handle ↵Antoine Pitrou2012-08-151-3/+3
|\ \ | |/ | | | | | | | | errors correctly. Patch by Serhiy Storchaka.
| * Issue #15604: Update uses of PyObject_IsTrue() to check for and handle ↵Antoine Pitrou2012-08-151-1/+5
| | | | | | | | | | | | errors correctly. Patch by Serhiy Storchaka.
* | Issue #14837: SSL errors now have `library` and `reason` attributes ↵Antoine Pitrou2012-06-221-63/+199
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | describing precisely what happened and in which OpenSSL submodule. The str() of a SSLError is also enhanced accordingly. NOTE: this commit creates a reference leak. The leak seems tied to the use of PyType_FromSpec() to create the SSLError type. The leak is on the type object when it is instantiated: >>> e = ssl.SSLError() >>> sys.getrefcount(ssl.SSLError) 35 >>> e = ssl.SSLError() >>> sys.getrefcount(ssl.SSLError) 36 >>> e = ssl.SSLError() >>> sys.getrefcount(ssl.SSLError) 37
* | Issue #14204: The ssl module now has support for the Next Protocol ↵Antoine Pitrou2012-03-211-0/+115
| | | | | | | | | | | | Negotiation extension, if available in the underlying OpenSSL library. Patch by Colin Marc.
* | Fix last remaining build issues of _ssl under old OpenSSLs. Patch by Vinay.Antoine Pitrou2012-02-191-0/+5
| |
* | Try to really fix compilation failures of the _ssl module under very old ↵Antoine Pitrou2012-02-171-0/+6
| | | | | | | | OpenSSLs.
* | Fix compilation when SSL_OP_SINGLE_ECDH_USE isn't definedAntoine Pitrou2012-02-171-0/+2
| |
* | Issue #13014: Fix a possible reference leak in SSLSocket.getpeercert().Antoine Pitrou2012-02-151-9/+14
|\ \ | |/
| * Issue #13014: Fix a possible reference leak in SSLSocket.getpeercert().Antoine Pitrou2012-02-151-9/+14
| |
* | Issue #13885: CVE-2011-3389: the _ssl module would always disable the CBC IV ↵Antoine Pitrou2012-01-271-2/+4
|\ \ | |/ | | | | attack countermeasure.
| * Issue #13885: CVE-2011-3389: the _ssl module would always disable the CBC IV ↵Antoine Pitrou2012-01-271-2/+4
| |\ | | | | | | | | | attack countermeasure.
| | * Issue #13885: CVE-2011-3389: the _ssl module would always disable the CBC IV ↵Antoine Pitrou2012-01-271-1/+2
| | | | | | | | | | | | attack countermeasure.
* | | Issue #13626: Add support for SSL Diffie-Hellman key exchange, through theAntoine Pitrou2011-12-221-0/+35
| | | | | | | | | | | | SSLContext.load_dh_params() method and the ssl.OP_SINGLE_DH_USE option.
* | | Fix ssl module compilation if ECDH support was disabled in the OpenSSL build.Antoine Pitrou2011-12-211-0/+12
| | | | | | | | | | | | (followup to issue #13627)
* | | Issue #13634: Add support for querying and disabling SSL compression.Antoine Pitrou2011-12-201-0/+24
| | |
* | | Issue #13627: Add support for SSL Elliptic Curve-based Diffie-HellmanAntoine Pitrou2011-12-191-0/+30
| | | | | | | | | | | | | | | key exchange, through the SSLContext.set_ecdh_curve() method and the ssl.OP_SINGLE_ECDH_USE option.
* | | Issue #13635: Add ssl.OP_CIPHER_SERVER_PREFERENCE, so that SSL serversAntoine Pitrou2011-12-191-0/+2
| | | | | | | | | | | | | | | choose the cipher based on their own preferences, rather than on the client's.