summaryrefslogtreecommitdiff
path: root/doc/api/ssl.rst
diff options
context:
space:
mode:
authorFedor Brunner <fedor.brunner@azet.sk>2014-03-28 13:18:38 +0100
committerFedor Brunner <fedor.brunner@azet.sk>2014-03-28 13:18:38 +0100
commit416f4a1d5cfd3c76736ebd68f33c4f76af27568b (patch)
tree40322a66f62148cc6d1f5cea8ed46db73390d202 /doc/api/ssl.rst
parent5747b93d4c6eee7551fcff5e879c3e281f052036 (diff)
downloadpyopenssl-416f4a1d5cfd3c76736ebd68f33c4f76af27568b.tar.gz
Added dependency for cryptography>=0.3.
Test split into multiple methods. Added changelog entry. If you use these methods to implement TLS channel binding (RFC 5929) disable session resumption because triple handshake attacks against TLS. https://www.ietf.org/mail-archive/web/tls/current/msg11337.html https://secure-resumption.com/tlsauth.pdf
Diffstat (limited to 'doc/api/ssl.rst')
-rw-r--r--doc/api/ssl.rst13
1 files changed, 13 insertions, 0 deletions
diff --git a/doc/api/ssl.rst b/doc/api/ssl.rst
index b506757..df21a1d 100644
--- a/doc/api/ssl.rst
+++ b/doc/api/ssl.rst
@@ -765,6 +765,19 @@ Connection objects have the following methods:
.. versionadded:: 0.14
+.. py:method:: Connection.get_finished()
+
+ Obtain latest TLS Finished message that we sent, or :py:obj:`None` if
+ handshake is not completed.
+
+ .. versionadded:: 0.15
+
+.. py:method:: Connection.get_peer_finished()
+
+ Obtain latest TLS Finished message that we expected from peer, or
+ :py:obj:`None` if handshake is not completed.
+
+ .. versionadded:: 0.15
.. Rubric:: Footnotes