summaryrefslogtreecommitdiff
path: root/OpenSSL/test
Commit message (Collapse)AuthorAgeFilesLines
* Try exposing TLSv1.1 and TLSv1.2.Jean-Paul Calderone2013-10-031-11/+24
|
* merge the nul byte fix, port some markup to restructured textJean-Paul Calderone2013-08-231-1/+63
|\
| * in fact, commonName is a native stringJean-Paul Calderone2013-08-231-1/+1
| |
| * Split this big test up into the two important pieces and make a test for eachJean-Paul Calderone2013-08-231-24/+26
| |
| * Ghetto rebase Heimes' changes onto the 0.13 release branchJean-Paul Calderone2013-08-121-0/+59
| |
* | Be more lenient in the testJean-Paul Calderone2012-03-091-1/+1
| |
* | Fix an incorrect exception name in a test method docstring.Jean-Paul Calderone2012-03-091-1/+1
| |
* | Docstrings are niceJean-Paul Calderone2012-02-141-0/+4
| |
* | I don't always read OpenSSL source, but when I do I WISH I WERE DEADJean-Paul Calderone2012-02-141-0/+31
| |
* | Wrap SSL_set_session, allowing pyOpenSSL clients to actually re-use sessions ↵Jean-Paul Calderone2012-02-141-5/+76
| | | | | | | | now.
* | Add Connection.get_session and have the Session object actually wrap an ↵Jean-Paul Calderone2012-02-131-0/+45
| | | | | | | | SSL_SESSION* (though there is actually not yet any way to tell that that is the case)
* | Minimal skeleton of a Python Session typeJean-Paul Calderone2012-02-131-1/+26
| |
* | Grab Context.{set,get}_session_cache_mode from the sessions branch, plus the ↵Jean-Paul Calderone2012-02-081-1/+103
| | | | | | | | unit tests.
* | Add a unit test for checking a public keyJean-Paul Calderone2011-10-311-0/+14
| |
* | Python 3.x compatibilityJean-Paul Calderone2011-09-141-4/+4
| |
* | Avoid being CPython specific - the leakcheck script will catch these issues.Jean-Paul Calderone2011-09-141-31/+0
| |
* | Add a test for a special argument handling check of dump_privatekeyJean-Paul Calderone2011-09-141-0/+3
| |
* | Add a test for returning the wrong type from a passphrase callbackJean-Paul Calderone2011-09-141-0/+11
| |
* | epytext to rstJean-Paul Calderone2011-09-141-7/+7
| |
* | Raise an error if a passphrase is used with a private key format that does ↵Ziga Seilnacht2009-12-221-0/+23
| | | | | | | | | | | | not support encryption. Otherwise users might get an unpleasant surprise once they learn that their private key, which they thought was secure, is in fact readable by everyone.
* | Additional error checks and a refcount fix for global_passphrase_callback.Ziga Seilnacht2009-12-221-1/+57
| | | | | | | | | | | | There were two really big problems in this function: the first one was the silent truncation of passphrases, the second was the refcounting bug, which kept the passphrase in memory until the process exited. See tests for details.
* | Don't overwrite the error raised by the callback.Ziga Seilnacht2009-12-221-16/+25
| |
* | Correctly handle errors from X509_CRL_signJean-Paul Calderone2011-09-131-0/+9
| |
* | Remove terminal mistakeJean-Paul Calderone2011-09-111-1/+1
| |
* | Change some lingering epytextJean-Paul Calderone2011-09-113-22/+22
| |
* | merge trunkJean-Paul Calderone2011-09-111-0/+46
|\ \
| * | Add a constant test for NO_NO_COMPRESSIONJean-Paul Calderone2011-09-081-0/+16
| | |
| * | Add a test for the positive case of Context.set_modeJean-Paul Calderone2011-09-081-0/+19
| | |
| * | - Add Context.set_mode methodGuillermo Gonzalez2011-08-291-0/+11
| |/ | | | | | | - Add MODE_RELEASE_BUFFERS and OP_NO_COMPRESSION constants, only if are defined (openssl >= 1.0.0)
* | Fix markup to be compatible with Sphinx and add rough API docJonathan Ballet2011-07-165-411/+415
| |
* | Convert Epytext markup to RST markupJonathan Ballet2011-07-163-21/+21
|/
* test bad args case of PKey.checkJean-Paul Calderone2011-06-121-0/+10
|
* Switch from returning False to raising an Error if the key doesn't check out ↵Jean-Paul Calderone2009-05-131-1/+1
| | | | - this provides more information
* test the negative path through PKeyType.checkJean-Paul Calderone2009-05-131-0/+25
|
* Apply pyOpenSSL_rsa_check.diffJean-Paul Calderone2009-05-131-0/+3
|
* Catch up to trunkJean-Paul Calderone2011-06-125-90/+664
|\
| * "Parse" "arguments" to get_servernameJean-Paul Calderone2011-05-261-0/+11
| |
| * And SSL_get_servername, SSL_set_tlsext_host_name, and ↵Jean-Paul Calderone2011-05-261-3/+124
| | | | | | | | SSL_CTX_set_tlsext_servername_callback
| * Add SSL_set_SSL_CTX wrapper, Connection.set_context.Jean-Paul Calderone2011-05-251-0/+35
| |
| * Add a Connection method for inspecting the certificate chain.Jean-Paul Calderone2011-05-201-63/+133
| |\
| | * Add a test for the None case of get_peer_cert_chain; also re-order assert ↵Jean-Paul Calderone2011-05-191-3/+19
| | | | | | | | | | | | call args, remember?
| | * Nope, I guessed wrong; these are text.Jean-Paul Calderone2011-05-191-3/+3
| | |
| | * This is probably better for 3.xJean-Paul Calderone2011-05-191-3/+6
| | |
| | * Avoid talking to verisign.com for the get_peer_cert_chain test; put it on ↵Jean-Paul Calderone2011-05-191-94/+114
| | | | | | | | | | | | the right test case, too. Also some other minor cleanups suggested by pyflakes.
| | * Apply the get_peer_cert_chain parts of okuda's patchJean-Paul Calderone2011-05-171-0/+31
| | |
| * | trivial test cleanupsJean-Paul Calderone2011-05-191-1/+8
| | |
| * | Use PyBytes_ for 3.x compatibilityJean-Paul Calderone2011-05-181-1/+1
| | |
| * | Put the get_signature_algorithm test in the right case; add a test for the ↵Jean-Paul Calderone2011-05-181-10/+36
| | | | | | | | | | | | undefined case and change the implementation to raise a ValueError for it instead of returning a stupid string
| * | Apply get_signature_algorithm parts of okuda's patchJean-Paul Calderone2011-05-171-0/+9
| |/
| * Support OpenSSL 1.0Jean-Paul Calderone2011-05-103-14/+44
| |\