summaryrefslogtreecommitdiff
path: root/Lib/ssl.py
Commit message (Expand)AuthorAgeFilesLines
* #18705: merge with 3.3.Ezio Melotti2013-08-171-1/+1
|\
| * #18705: fix a number of typos. Patch by F?vry Thibault.Ezio Melotti2013-08-171-1/+1
* | Issue #9177: Calling read() or write() now raises ValueError, not AttributeEr...Antoine Pitrou2013-07-201-0/+4
* | Issue #18200: Back out usage of ModuleNotFoundError (8d28d44f3a9a)Brett Cannon2013-07-041-2/+2
* | Issue #18200: Update the stdlib (except tests) to useBrett Cannon2013-06-131-2/+2
* | Issue #17134: Add ssl.enum_cert_store() as interface to Windows' cert store.Christian Heimes2013-06-091-0/+4
* | Issue #18143: Implement ssl.get_default_verify_paths() in order to debugChristian Heimes2013-06-091-0/+20
* | Issue #17980: Fix possible abuse of ssl.match_hostname() for denial of servic...Antoine Pitrou2013-05-181-60/+108
|\ \ | |/ |/|
| * Issue #13721: SSLSocket.getpeercert() and SSLSocket.do_handshake() now raise ...Antoine Pitrou2013-05-011-12/+22
| * remove uneffective 'while True' clauseGiampaolo Rodola'2013-04-031-11/+10
| * Issue #16692: The ssl module now supports TLS 1.1 and TLS 1.2. Initial patch...Antoine Pitrou2013-03-281-2/+11
| * merge 3.3 (#16900)Benjamin Peterson2013-01-101-36/+66
| |\
| | * Issue #8109: The ssl module now has support for server-side SNI, thanks to a ...Antoine Pitrou2013-01-051-32/+60
| | * Issue #16717: get rid of socket.error, replace with OSErrorAndrew Svetlov2012-12-181-4/+6
* | | Issue #17980: Fix possible abuse of ssl.match_hostname() for denial of servic...Antoine Pitrou2013-05-181-1/+8
|/ /
* | remove __del__ because it's evil and also prevents the ResourceWarning on the...Benjamin Peterson2013-01-101-4/+0
|/
* Issue #16357: fix calling accept() on a SSLSocket created through SSLContext....Antoine Pitrou2012-11-111-10/+88
|\
| * Issue #14204: The ssl module now has support for the Next Protocol Negotiatio...Antoine Pitrou2012-03-221-3/+24
| * Try to really fix compilation failures of the _ssl module under very old Open...Antoine Pitrou2012-02-171-1/+5
| * Issue #13636: Weak ciphers are now disabled by default in the ssl moduleAntoine Pitrou2012-01-031-2/+11
| |\
| * | Issue #13626: Add support for SSL Diffie-Hellman key exchange, through theAntoine Pitrou2011-12-221-1/+1
| * | Fix ssl module compilation if ECDH support was disabled in the OpenSSL build.Antoine Pitrou2011-12-211-1/+1
| * | Issue #13634: Add support for querying and disabling SSL compression.Antoine Pitrou2011-12-201-0/+11
| * | Issue #13627: Add support for SSL Elliptic Curve-based Diffie-HellmanAntoine Pitrou2011-12-191-1/+1
| * | Issue #13635: Add ssl.OP_CIPHER_SERVER_PREFERENCE, so that SSL serversAntoine Pitrou2011-12-191-1/+4
| * | Issue #11183: Add finer-grained exceptions to the ssl module, so thatAntoine Pitrou2011-10-271-1/+5
| * | Fix #12835: prevent use of the unencrypted sendmsg/recvmsg APIs on SSL wrappe...Nick Coghlan2011-08-281-0/+14
| * | Remove the SSLSocket versions of sendmsg/recvmsg due to lack of proper tests ...Nick Coghlan2011-08-231-24/+0
| * | Add support for the send/recvmsg API to the socket module. Patch by David Wat...Nick Coghlan2011-08-221-0/+24
| * | Issue #12551: Provide a get_channel_binding() method on SSL sockets so asAntoine Pitrou2011-07-211-0/+19
| * | Issue #12440: When testing whether some bits in SSLContext.options can beAntoine Pitrou2011-07-081-5/+6
| |\ \
| | * | Issue #12049: Add RAND_bytes() and RAND_pseudo_bytes() functions to the sslVictor Stinner2011-05-241-1/+1
| | * | Issue #12065: connect_ex() on an SSL socket now returns the original errnoAntoine Pitrou2011-05-181-11/+13
| | |\ \
| | * | | Issue #12012: ssl.PROTOCOL_SSLv2 becomes optionalVictor Stinner2011-05-091-12/+14
| | * | | Issue #12000: When a SSL certificate has a subjectAltName without anyAntoine Pitrou2011-05-061-3/+3
| | |\ \ \
| | | * | | Issue #11811: ssl.get_server_certificate() is now IPv6-compatible. PatchAntoine Pitrou2011-04-281-3/+3
* | | | | | Issue #16357: fix calling accept() on a SSLSocket created through SSLContext....Antoine Pitrou2012-11-111-10/+5
| |_|_|_|/ |/| | | |
* | | | | Issue #13636: Weak ciphers are now disabled by default in the ssl moduleAntoine Pitrou2012-01-031-2/+10
|/ / / /
* | | | Issue #12440: When testing whether some bits in SSLContext.options can beAntoine Pitrou2011-07-081-0/+2
| |_|/ |/| |
* | | Issue #12065: connect_ex() on an SSL socket now returns the original errnoAntoine Pitrou2011-05-181-11/+13
* | | (Merge 3.1) Issue #12012: ssl.PROTOCOL_SSLv2 becomes optionalVictor Stinner2011-05-101-34/+159
|\ \ \ | |/ /
| * | Issue #12000: When a SSL certificate has a subjectAltName without anyAntoine Pitrou2011-05-061-2/+3
| |/
| * Merged revisions 88664 via svnmerge fromAntoine Pitrou2011-02-261-8/+22
| * Issue #5639: Add a *server_hostname* argument to `SSLContext.wrap_socket`Antoine Pitrou2010-10-221-3/+12
| * Issue #1589: Add ssl.match_hostname(), to help implement server identityAntoine Pitrou2010-10-081-0/+59
| * Issue #9853: Fix the signature of SSLSocket.recvfrom() andAntoine Pitrou2010-09-141-4/+6
| * Issue #3805: clean up implementation of the _read method in _ssl.c.Antoine Pitrou2010-09-031-3/+3
| * Fix issue #9711: raise ValueError is SSLConnection constructor is invoked wit...Giampaolo Rodolà2010-08-301-0/+2
| * Fix issue issue9706: provides a better error handling for various SSL operationsGiampaolo Rodolà2010-08-291-2/+6
| * Raise ValuError if non-zero flag argument is provided for sendall() method fo...Giampaolo Rodolà2010-08-291-0/+4