diff options
| author | Fedor Brunner <fedor.brunner@azet.sk> | 2014-03-28 13:18:38 +0100 |
|---|---|---|
| committer | Fedor Brunner <fedor.brunner@azet.sk> | 2014-03-28 13:18:38 +0100 |
| commit | 416f4a1d5cfd3c76736ebd68f33c4f76af27568b (patch) | |
| tree | 40322a66f62148cc6d1f5cea8ed46db73390d202 /doc/api/ssl.rst | |
| parent | 5747b93d4c6eee7551fcff5e879c3e281f052036 (diff) | |
| download | pyopenssl-416f4a1d5cfd3c76736ebd68f33c4f76af27568b.tar.gz | |
Added dependency for cryptography>=0.3.
Test split into multiple methods.
Added changelog entry.
If you use these methods to
implement TLS channel binding (RFC 5929) disable session
resumption because triple handshake attacks against TLS.
https://www.ietf.org/mail-archive/web/tls/current/msg11337.html
https://secure-resumption.com/tlsauth.pdf
Diffstat (limited to 'doc/api/ssl.rst')
| -rw-r--r-- | doc/api/ssl.rst | 13 |
1 files changed, 13 insertions, 0 deletions
diff --git a/doc/api/ssl.rst b/doc/api/ssl.rst index b506757..df21a1d 100644 --- a/doc/api/ssl.rst +++ b/doc/api/ssl.rst @@ -765,6 +765,19 @@ Connection objects have the following methods: .. versionadded:: 0.14 +.. py:method:: Connection.get_finished() + + Obtain latest TLS Finished message that we sent, or :py:obj:`None` if + handshake is not completed. + + .. versionadded:: 0.15 + +.. py:method:: Connection.get_peer_finished() + + Obtain latest TLS Finished message that we expected from peer, or + :py:obj:`None` if handshake is not completed. + + .. versionadded:: 0.15 .. Rubric:: Footnotes |
