summaryrefslogtreecommitdiff
path: root/Modules/_ssl.c
Commit message (Collapse)AuthorAgeFilesLines
...
* | merge 3.4 (#23476)Benjamin Peterson2015-03-041-0/+9
|\ \ | |/
| * enable X509_V_FLAG_TRUSTED_FIRST when possible (closes #23476)Benjamin Peterson2015-03-041-0/+9
| |
* | Issue #23576: Avoid stalling in SSL reads when EOF has been reached in the ↵Antoine Pitrou2015-03-041-20/+0
|\ \ | |/ | | | | SSL layer but the underlying connection hasn't been closed.
| * Issue #23576: Avoid stalling in SSL reads when EOF has been reached in the ↵Antoine Pitrou2015-03-041-20/+0
| | | | | | | | SSL layer but the underlying connection hasn't been closed.
* | Issue #23446: Use PyMem_New instead of PyMem_Malloc to avoid possible integerSerhiy Storchaka2015-02-161-3/+4
|\ \ | |/ | | | | overflows. Added few missed PyErr_NoMemory().
| * Issue #23446: Use PyMem_New instead of PyMem_Malloc to avoid possible integerSerhiy Storchaka2015-02-161-3/+4
| | | | | | | | overflows. Added few missed PyErr_NoMemory().
| * Issue #21356: Make ssl.RAND_egd() optional to support LibreSSL. TheVictor Stinner2015-01-061-0/+4
| | | | | | | | | | availability of the function is checked during the compilation. Patch written by Bernard Spil.
* | ifdef our way to compatibility with old openssl (closes #23335)Benjamin Peterson2015-01-281-1/+1
| |
* | disable ALPN on LibreSSL, which has a large version number, but not ALPN ↵Benjamin Peterson2015-01-271-1/+1
| | | | | | | | support (closes #23329)
* | prefer server alpn ordering over the client'sBenjamin Peterson2015-01-231-13/+20
| |
* | add support for ALPN (closes #20188)Benjamin Peterson2015-01-231-22/+110
| |
* | use SSL_get_sessionBenjamin Peterson2015-01-071-2/+3
| |
* | expose the client's cipher suites from the handshake (closes #23186)Benjamin Peterson2015-01-071-21/+51
| |
* | Issue #23143: Remove compatibility with OpenSSLs older than 0.9.8.Antoine Pitrou2015-01-031-53/+0
| | | | | | | | (the last 0.9.7 release was in 2007)
* | merge 3.4 (#22935)Benjamin Peterson2014-12-051-0/+4
|\ \ | |/
| * allow ssl module to compile if openssl doesn't support SSL 3 (closes #22935)Benjamin Peterson2014-12-051-0/+4
| | | | | | | | Patch by Kurt Roeckx.
* | Issue #21356: Make ssl.RAND_egd() optional to support LibreSSL. TheVictor Stinner2014-11-281-0/+4
| | | | | | | | | | | | availability of the function is checked during the compilation. Patch written by Bernard Spil.
* | merge 3.4 (#22921)Benjamin Peterson2014-11-231-12/+0
|\ \ | |/
| * don't require OpenSSL SNI to pass hostname to ssl functions (#22921)Benjamin Peterson2014-11-231-6/+0
| | | | | | | | Patch by Donald Stufft.
* | Issue #21965: Add support for in-memory SSL to the ssl module.Antoine Pitrou2014-10-051-76/+456
| | | | | | | | Patch by Geert Jansen.
* | Issue #20421: Add a .version() method to SSL sockets exposing the actual ↵Antoine Pitrou2014-09-041-0/+13
| | | | | | | | protocol version in use.
* | (Merge 3.4) Issue #21781, _ssl: Fix asn1obj2py() on Windows 64-bit, "s#" formatVictor Stinner2014-07-071-1/+1
|\ \ | |/ | | | | requires size to be a Py_ssize_t, not an int. _ssl.c is now "Py_ssize_t clean".
| * Issue #21781, _ssl: Fix asn1obj2py() on Windows 64-bit, "s#" format requiresVictor Stinner2014-07-071-1/+1
| | | | | | | | size to be a Py_ssize_t, not an int. _ssl.c is now "Py_ssize_t clean".
* | (Merge 3.4) Issue #21781: Make the ssl module "ssize_t clean" for parsingVictor Stinner2014-07-011-2/+9
|\ \ | |/ | | | | parameters. ssl.RAND_add() now supports strings longer than 2 GB.
| * Issue #21781: Make the ssl module "ssize_t clean" for parsing parameters.Victor Stinner2014-07-011-2/+9
| | | | | | | | ssl.RAND_add() now supports strings longer than 2 GB.
* | Issue #21490: Add new C macros: Py_ABS() and Py_STRINGIFY()Victor Stinner2014-05-141-3/+1
|/ | | | | Keep _Py_STRINGIZE() in PC/pyconfig.h to not introduce a dependency between pyconfig.h and pymacros.h.
* Issue #21015: SSL contexts will now automatically select an elliptic curve ↵Antoine Pitrou2014-03-221-0/+15
| | | | | | for ECDH key exchange on OpenSSL 1.0.2 and later, and otherwise default to "prime256v1". (should also fix a buildbot failure introduced by #20995)
* avoid a compiler warning about assigning const char * to char *.Gregory P. Smith2014-01-171-1/+1
|\
| * avoid a compiler warning about assigning const char * to char *.Gregory P. Smith2014-01-171-1/+1
| |
* | Issue #20207: Always disable SSLv2 except when PROTOCOL_SSLv2 is explicitly ↵Antoine Pitrou2014-01-091-4/+5
|\ \ | |/ | | | | asked for.
| * Remove conditional: it is useless at this point (OpenSSL headers are not yet ↵Antoine Pitrou2014-01-091-2/+0
| | | | | | | | included)
| * Issue #20207: Always disable SSLv2 except when PROTOCOL_SSLv2 is explicitly ↵Antoine Pitrou2014-01-091-2/+5
| | | | | | | | asked for.
* | (Merge 3.3) Issue #20025: ssl.RAND_bytes() and ssl.RAND_pseudo_bytes() nowVictor Stinner2013-12-191-0/+5
|\ \ | |/ | | | | raise a ValueError if num is negative (instead of raising a SystemError).
| * Issue #20025: ssl.RAND_bytes() and ssl.RAND_pseudo_bytes() now raise aVictor Stinner2013-12-191-0/+5
| | | | | | | | ValueError if num is negative (instead of raising a SystemError).
* | Issue #19509: Add SSLContext.check_hostname to match the peer's certificateChristian Heimes2013-12-021-0/+35
| | | | | | | | with server_hostname on handshake.
* | SNI was added in OpenSSL 0.9.8f [11 Oct 2007], tooChristian Heimes2013-11-281-1/+1
| |
* | Issue #8813: X509_VERIFY_PARAM is only available on OpenSSL 0.9.8+Christian Heimes2013-11-231-0/+9
| | | | | | | | The patch removes the verify_flags feature on Mac OS X 10.4 with OpenSSL 0.9.7l 28 Sep 2006.
* | Issue #19448: report name / NID in exception message of ASN1ObjectChristian Heimes2013-11-221-3/+3
| |
* | Issue #18147: Add missing documentation for SSLContext.get_ca_certs().Christian Heimes2013-11-221-4/+6
| | | | | | | | Also change the argument name to the same name as getpeercert()
* | Issue #17134: Finalize interface to Windows' certificate store. Cert andChristian Heimes2013-11-221-95/+219
| | | | | | | | | | CRL enumeration are now two functions. enum_certificates() also returns purpose flags as set of OIDs.
* | downcast len to int. The code has already checked that len < INT_MAXChristian Heimes2013-11-221-1/+1
| |
* | lst might be NULL hereChristian Heimes2013-11-211-1/+1
| | | | | | | | CID 1130752: Dereference after null check (FORWARD_NULL)
* | Issue #8813: Add SSLContext.verify_flags to change the verification flagsChristian Heimes2013-11-211-0/+49
| | | | | | | | | | of the context in order to enable certification revocation list (CRL) checks or strict X509 rules.
* | Issue #19682: Fix compatibility issue with old version of OpenSSL thatChristian Heimes2013-11-211-0/+6
| | | | | | | | was introduced by Issue #18379.
* | Issue #18379: SSLSocket.getpeercert() returns CA issuer AIA fields, OCSPChristian Heimes2013-11-211-1/+151
| | | | | | | | and CRL distribution points.
* | Issue #18138: Implement cadata argument of SSLContext.load_verify_location()Christian Heimes2013-11-211-27/+167
| | | | | | | | | | to load CA certificates and CRL from memory. It supports PEM and DER encoded strings.
* | Safely downcast SOCKET_T to int in _ssl moduleChristian Heimes2013-11-181-3/+5
| |
* | Issue #19448: Add private API to SSL module to lookup ASN.1 objects by OID, ↵Christian Heimes2013-11-171-0/+91
| | | | | | | | NID, short name and long name.
* | Issue #19437: Fix newPySSLSocket(), handle PyWeakref_NewRef() failureVictor Stinner2013-10-311-0/+4
| |
* | Issue #19437: Fix fill_and_set_sslerror() of _ssl, handle Py_BuildValue()Victor Stinner2013-10-311-1/+5
| | | | | | | | | | | | failure Don't call PyObject_CallObject() with NULL parameters and an exception set.