Benjamin Peterson
3707dfaf45
[2.7] closes bpo-34050: Fix link in SSL docs (GH-8173). (GH-8179)
...
(cherry picked from commit 9c5ba09748
)
Co-authored-by: Marcin Niemira <marcin@niemira.net>
2018-07-07 15:48:07 -07:00
Andrés Delfino
60c888d0eb
bpo-33892: Doc: Use gender neutral words (GH-7770)
...
(cherry picked from commit 5092439c2c
)
Co-authored-by: Andrés Delfino <adelfino@gmail.com>
2018-06-19 00:33:58 +09:00
Mayank Singhal
458ed1b237
[2.7] Add version change for OpenSSL 1.1.0 compatibility (GH-7541)
2018-06-09 11:26:13 +10:00
Stéphane Wirtel
ad65d09fd0
[2.7] bpo-33503: Fix the broken pypi link in the source and the documentation (GH-6814). (GH-6905)
...
(cherry picked from commit 19177fbd5d
)
Co-authored-by: Stéphane Wirtel <stephane@wirtel.be>
2018-05-16 10:57:36 -04:00
Christian Heimes
3d87f4cf9c
[2.7] bpo-30622: Improve NPN support detection (GH-5859) ( #5863 )
...
The ssl module now detects missing NPN support in LibreSSL.
Co-Authored-By: Bernard Spil <brnrd@FreeBSD.org>
Signed-off-by: Christian Heimes <christian@python.org>.
(cherry picked from commit 6cdb7954b0
)
Co-authored-by: Christian Heimes <christian@python.org>
2018-02-25 10:21:03 +01:00
Benjamin Peterson
6c7edba166
[2.7] closes bpo-32008: don't use PROTOCOL_TLSv1 in example (GH-5789) ( #5792 )
...
It's bad form to pin to an old version of TLS. ssl.SSLContext has the right
protocol default, so let's not pass anyway..
(cherry picked from commit e9edee0b65
)
2018-02-20 22:17:10 -08:00
Miss Islington (bot)
3ff488c082
trivial: link updates in documentation (GH-2765) ( #4836 )
...
(cherry picked from commit 4f29f3c84b
)
2017-12-13 14:45:13 +02:00
Christian Heimes
5b6452d412
bpo-31533: fix broken link to OpenSSL docs (GH-3674) (GH-3676)
...
(cherry picked from commit 19e4d93
)
2017-09-20 13:23:09 -07:00
Christian Heimes
b9a860f3bf
[2.7] bpo-29136: Add TLS 1.3 cipher suites and OP_NO_TLSv1_3 (GH-1363) ( #3446 )
...
* bpo-29136: Add TLS 1.3 support
TLS 1.3 introduces a new, distinct set of cipher suites. The TLS 1.3
cipher suites don't overlap with cipher suites from TLS 1.2 and earlier.
Since Python sets its own set of permitted ciphers, TLS 1.3 handshake
will fail as soon as OpenSSL 1.1.1 is released. Let's enable the common
AES-GCM and ChaCha20 suites.
Additionally the flag OP_NO_TLSv1_3 is added. It defaults to 0 (no op) with
OpenSSL prior to 1.1.1. This allows applications to opt-out from TLS 1.3
now.
Signed-off-by: Christian Heimes <christian@python.org>.
(cherry picked from commit cb5b68abde
)
2017-09-07 22:31:17 -07:00
Miss Islington (bot)
ab4894bba6
[2.7] bpo-21649: Add RFC 7525 and Mozilla server side TLS (GH-3387) (GH-3400)
...
Signed-off-by: Christian Heimes <christian@python.org>
(cherry picked from commit ad0ffa033e
)
2017-09-06 17:31:48 -07:00
Christian Heimes
05b7d9c667
[2.7] bpo-30714: ALPN changes for OpenSSL 1.1.0f ( #3094 )
...
OpenSSL 1.1.0 to 1.1.0e aborted the handshake when server and client
could not agree on a protocol using ALPN. OpenSSL 1.1.0f changed that.
The most recent version now behaves like OpenSSL 1.0.2 again. The ALPN
callback can pretend to not been set.
See https://github.com/openssl/openssl/pull/3158 for more details
Signed-off-by: Christian Heimes <christian@python.org>
(cherry picked from commit a5c1bab352
)
2017-08-15 10:55:03 +02:00
Xiang Zhang
c4f91baa35
Issue #29038 : Fix duplicate get_ca_certs() doc entry.
2016-12-23 11:10:19 +08:00
Serhiy Storchaka
dc0e3a8907
Issue #19795 : Improved more markups of True/False.
2016-10-19 18:30:16 +03:00
Serhiy Storchaka
ad13f338ce
Issue #19795 : Mark up None as literal text.
2016-10-19 16:29:10 +03:00
Christian Heimes
4e64c2c838
Fix ssl documentation and remove merge accident
2016-09-06 23:41:37 +02:00
Christian Heimes
d988f429fe
Issues #27850 and #27766 : Remove 3DES from ssl default cipher list and add ChaCha20 Poly1305.
2016-09-06 20:06:47 +02:00
Christian Heimes
c2fc7c4f53
Issue #26470 : Port ssl and hashlib module to OpenSSL 1.1.0.
2016-09-05 23:37:13 +02:00
Serhiy Storchaka
12d547a80d
Issue #23921 : Standardized documentation whitespace formatting.
...
Original patch by James Edwards.
2016-05-10 13:45:32 +03:00
Serhiy Storchaka
b4905efe23
Issue #26736 : Used HTTPS for external links in the documentation if possible.
2016-05-07 10:50:12 +03:00
Georg Brandl
6e0b44ef9e
Closes #25910 : fix dead and permanently redirected links in the docs. Thanks to SilentGhost for the patch.
2016-02-26 19:37:12 +01:00
Nick Coghlan
dbcd457624
Issue #23857 : Implement PEP 493
...
Adds a Python-2-only ssl module API and environment variable to
configure the default handling of SSL/TLS certificates for
HTTPS connections.
2016-03-20 22:39:15 +10:00
Benjamin Peterson
721c86ef36
use imperative
2015-04-11 07:42:42 -04:00
Benjamin Peterson
ce29e87e6f
actually ssl3 is just completely broken
2015-04-08 11:11:00 -04:00
Benjamin Peterson
5151838132
versionchanged for rc4 removal ( closes #23679 )
2015-03-16 12:43:38 -05:00
Benjamin Peterson
72ef961059
expose X509_V_FLAG_TRUSTED_FIRST
2015-03-04 22:49:41 -05:00
Benjamin Peterson
aa7075845c
prefer server alpn ordering over the client's
2015-01-23 17:30:26 -05:00
Benjamin Peterson
65aa261eba
fix versionchanged
2015-01-23 16:47:52 -05:00
Benjamin Peterson
b10bfbe036
pep 466 backport of alpn ( #20188 )
2015-01-23 16:35:37 -05:00
Victor Stinner
7c90667f74
Issue #21356 : Make ssl.RAND_egd() optional to support LibreSSL. The
...
availability of the function is checked during the compilation. Patch written
by Bernard Spil.
2015-01-06 13:53:37 +01:00
Benjamin Peterson
542125e614
merge 2.7.9 release branch
2014-12-06 11:36:48 -05:00
Benjamin Peterson
fd0c92fe07
note that sslv3 may not be available
2014-12-06 11:36:32 -05:00
Antoine Pitrou
bf9eb35f96
Fix #22987 : update the compatibility matrix for a SSLv23 client.
2014-12-03 20:00:56 +01:00
Benjamin Peterson
6fa40c496e
fix versionchanged version
2014-11-23 20:13:55 -06:00
Benjamin Peterson
31aa69ead5
allow hostname to be passed to SSLContext even if OpenSSL doesn't support SNI ( closes #22921 )
...
Patch from Donald Stufft.
2014-11-23 20:13:31 -06:00
Georg Brandl
0f5d6c00b4
Fixing broken links in doc, part 4: some more breaks and redirects
2014-10-29 10:57:37 +01:00
Antoine Pitrou
9e4a9339e1
Issue #22660 : update various mentions in the ssl module documentation.
2014-10-21 00:14:39 +02:00
Alex Gaynor
162126d567
Fixed the versionadded in the docs for the backport in 16c86a6bdbe2
2014-09-04 13:37:07 -07:00
Alex Gaynor
e98205d798
Issue #20421 : Add a .version() method to SSL sockets exposing the actual protocol version in use.
...
Backport from default.
2014-09-04 13:33:22 -07:00
Benjamin Peterson
daeb925cc8
backport many ssl features from Python 3 ( closes #21308 )
...
A contribution of Alex Gaynor and David Reid with the generous support of
Rackspace. May God have mercy on their souls.
2014-08-20 14:14:50 -05:00
Donald Stufft
74a4ebaed0
Issue #21043 - Remove CACert.org from the recommendations
2014-03-24 19:49:42 -04:00
Antoine Pitrou
63cc99d9a6
Issue #19422 : Explicitly disallow non-SOCK_STREAM sockets in the ssl module, rather than silently let them emit clear text data.
2013-12-28 17:26:33 +01:00
Serhiy Storchaka
26d936a71e
Issue #19795 : Improved markup of True/False constants.
2013-11-29 12:16:53 +02:00
Antoine Pitrou
f7a52475a5
Issue #19508 : warn that ssl doesn't validate certificates by default
2013-11-17 15:42:58 +01:00
Christian Heimes
db78e4365b
fix language
2013-10-29 22:19:39 +01:00
Christian Heimes
88b2220859
Issue #18747 : document issue with OpenSSL's CPRNG state and fork
2013-10-29 21:08:56 +01:00
Georg Brandl
4e8534e2ae
Closes #19177 : replace dead link to SSL/TLS introduction with the version from Apache.
2013-10-06 18:20:31 +02:00
Antoine Pitrou
f12f3916aa
Issue #17739 : fix the description of SSLSocket.getpeercert(binary_form=True) for server sockets.
...
Thanks to David D Lowe for reporting.
2013-04-16 20:27:17 +02:00
Giampaolo Rodola'
76794131de
#17641 : 2.X / 3.X ssl doc unification
2013-04-06 03:46:47 +02:00
Andrew Svetlov
1625d88709
Issue #16341 : convert examples to use except ... as ... syntax.
2012-10-30 21:56:43 +02:00
Antoine Pitrou
df4c986f9e
Issue #13747 : fix SSL compatibility table.
2012-01-09 21:43:18 +01:00