1. 2894073 test_ssl: use a bytestring here by Antoine Pitrou · 11 years ago
  2. 60a26e0 Issue #9177: Calling read() or write() now raises ValueError, not AttributeError, on a closed SSL socket. by Antoine Pitrou · 11 years ago
  3. 9a5395a Issue #18147: Add diagnostic functions to ssl.SSLContext(). by Christian Heimes · 11 years ago
  4. 9424bb4 Issue #18207: Fix test_ssl for some versions of OpenSSL that ignore seconds by Christian Heimes · 11 years ago
  5. 46bebee Issue #17134: Add ssl.enum_cert_store() as interface to Windows' cert store. by Christian Heimes · 11 years ago
  6. 6d7ad13 Issue #18143: Implement ssl.get_default_verify_paths() in order to debug by Christian Heimes · 11 years ago
  7. 31fb419 Issue #17980: Fix possible abuse of ssl.match_hostname() for denial of service using certificates with many wildcards (CVE-2013-2099). by Antoine Pitrou · 11 years ago
  8. 636f93c Issue #17980: Fix possible abuse of ssl.match_hostname() for denial of service using certificates with many wildcards (CVE-2013-2099). by Antoine Pitrou · 11 years ago
  9. 242db72 Issue #13721: SSLSocket.getpeercert() and SSLSocket.do_handshake() now raise an OSError with ENOTCONN, instead of an AttributeError, when the SSLSocket is not connected. by Antoine Pitrou · 12 years ago
  10. 50b24d0 Fix a crash when setting a servername callback on a SSL server socket and the client doesn't send a server name. by Antoine Pitrou · 12 years ago
  11. 609ef01 In search of TLS 1.1 bug: add debugging output in verbose mode by Antoine Pitrou · 12 years ago
  12. 972d5bb Use a subtest in test_ssl.test_echo by Antoine Pitrou · 12 years ago
  13. 2463e5f Issue #16692: The ssl module now supports TLS 1.1 and TLS 1.2. Initial patch by Michele Orrù. by Antoine Pitrou · 12 years ago
  14. 6386e17 Issue #13898: test_ssl no longer prints a spurious stack trace on Ubuntu. by Nadeem Vawda · 12 years ago
  15. ad246bf Issue #13898: test_ssl no longer prints a spurious stack trace on Ubuntu. by Nadeem Vawda · 12 years ago
  16. 7b39b9b Issue #13898: test_ssl no longer prints a spurious stack trace on Ubuntu. by Nadeem Vawda · 12 years ago
  17. da23259 Issue #17107: Test client-side SNI support in urllib.request thanks to the new server-side SNI support in the ssl module. by Antoine Pitrou · 12 years ago
  18. 6b4e2a9 In test_ssl, threaded tests shouldn't need the network resource to be enabled by Antoine Pitrou · 12 years ago
  19. db5012a In test_ssl, threaded tests shouldn't need the "network" resource to be enabled by Antoine Pitrou · 12 years ago
  20. e9bb473 Issue #16923: Fix ResourceWarnings in test_ssl. by Antoine Pitrou · 12 years ago
  21. e1ceb50 Issue #16923: Fix ResourceWarnings in test_ssl. by Antoine Pitrou · 12 years ago
  22. f86b3c3 merge 3.3 (#16900) by Benjamin Peterson · 12 years ago
  23. 36f7b97 remove __del__ because it's evil and also prevents the ResourceWarning on the socket from happening (closes #16900) by Benjamin Peterson · 12 years ago
  24. 58ddc9d Issue #8109: The ssl module now has support for server-side SNI, thanks to a :meth:`SSLContext.set_servername_callback` method. by Antoine Pitrou · 12 years ago
  25. 49f7e58 Forward port new test for SSLSocket.connect_ex() by Antoine Pitrou · 12 years ago
  26. 6464b84 Forward port new test for SSLSocket.connect_ex() by Antoine Pitrou · 12 years ago
  27. ddb87ab Forward port new test for SSLSocket.connect_ex() by Antoine Pitrou · 12 years ago
  28. 40f12ab Backport Python 3.2 fix for issue #12065, and add another test for SSLSocket.connect_ex(). by Antoine Pitrou · 12 years ago
  29. f7a17b4 Replace IOError with OSError (#16715) by Andrew Svetlov · 12 years ago
  30. 0832af6 Issue #16717: get rid of socket.error, replace with OSError by Andrew Svetlov · 12 years ago
  31. 73e9bd4 Issue #16357: fix calling accept() on a SSLSocket created through SSLContext.wrap_socket(). by Antoine Pitrou · 12 years ago
  32. 5c89b4e Issue #16357: fix calling accept() on a SSLSocket created through SSLContext.wrap_socket(). by Antoine Pitrou · 12 years ago
  33. b7a2800 MERGE: Closes #15793: Stack corruption in ssl.RAND_egd() by Jesus Cea · 12 years ago
  34. c8754a1 Closes #15793: Stack corruption in ssl.RAND_egd() by Jesus Cea · 12 years ago
  35. a8a5b39 Closes #15793: Stack corruption in ssl.RAND_egd(). Python 2.7 hasn't any issue about this, but add a test just to be sure by Jesus Cea · 12 years ago
  36. 3b36fb1 Issue #14837: SSL errors now have `library` and `reason` attributes describing precisely what happened and in which OpenSSL submodule. by Antoine Pitrou · 12 years ago
  37. c642f67 Skip test_algorithms (known remote hosts need SNI, which is only available on 3.2+) by Antoine Pitrou · 13 years ago
  38. f340c21 Fix test connecting to sha256.tbs-internet.com. by Antoine Pitrou · 13 years ago
  39. 16f6f83 Fix test connecting to sha256.tbs-internet.com. by Antoine Pitrou · 13 years ago
  40. d5d17eb Issue #14204: The ssl module now has support for the Next Protocol Negotiation extension, if available in the underlying OpenSSL library. by Antoine Pitrou · 13 years ago
  41. c135fa4 Fix last remaining build issues of _ssl under old OpenSSLs. Patch by Vinay. by Antoine Pitrou · 13 years ago
  42. ce816a5 Issue #13895: fix test_ssl hanging under Ubuntu by Antoine Pitrou · 13 years ago
  43. eba63c4 Issue #13895: fix test_ssl hanging under Ubuntu by Antoine Pitrou · 13 years ago
  44. 6636887 Fix intermittent test_ssl failure. by Antoine Pitrou · 13 years ago
  45. eced82e Fix intermittent test_ssl failure. by Antoine Pitrou · 13 years ago
  46. 7a55684 Fix intermittent test_ssl failure. by Antoine Pitrou · 13 years ago
  47. d76088d Issue #13636: Weak ciphers are now disabled by default in the ssl module by Antoine Pitrou · 13 years ago
  48. 8f85f90 Issue #13636: Weak ciphers are now disabled by default in the ssl module by Antoine Pitrou · 13 years ago
  49. 65a3f4b Use context managers in test_ssl to simplify test writing. by Antoine Pitrou · 13 years ago
  50. 5b95eb9 Use context managers in test_ssl to simplify test writing. by Antoine Pitrou · 13 years ago
  51. 72aeec3 Issue #13636: Weak ciphers are now disabled by default in the ssl module by Antoine Pitrou · 13 years ago
  52. 0e576f1 Issue #13626: Add support for SSL Diffie-Hellman key exchange, through the by Antoine Pitrou · 13 years ago
  53. 6b15c90 Use context managers in test_ssl to simplify test writing. by Antoine Pitrou · 13 years ago
  54. 501da61 Fix ssl module compilation if ECDH support was disabled in the OpenSSL build. by Antoine Pitrou · 13 years ago
  55. 8691bff Fix for buggy test by Antoine Pitrou · 13 years ago
  56. 8abdb8a Issue #13634: Add support for querying and disabling SSL compression. by Antoine Pitrou · 13 years ago
  57. 923df6f Issue #13627: Add support for SSL Elliptic Curve-based Diffie-Hellman by Antoine Pitrou · 13 years ago
  58. 6db4944 Issue #13635: Add ssl.OP_CIPHER_SERVER_PREFERENCE, so that SSL servers by Antoine Pitrou · 13 years ago
  59. cf9943d Backout redundant changeset 1de4d92cd6a4 by Antoine Pitrou · 13 years ago
  60. 39aec01 test_protocol_sslv2(): Skip this test if ssl.PROTOCOL_SSLv2 is not by Barry Warsaw · 13 years ago
  61. 6361ea2 Remove unstable SSL tests in the absence of ssl.OP_NO_{SSLv2,SSLv3,TLSv1} by Antoine Pitrou · 13 years ago
  62. be83698 - Issue #13218: Fix test_ssl failures on Debian/Ubuntu. by Barry Warsaw · 13 years ago
  63. c21a81b - Issue #13218: Fix test_ssl failures on Debian/Ubuntu. by Barry Warsaw · 13 years ago
  64. 46ae0ef - Issue #13218: Fix test_ssl failures on Debian/Ubuntu. by Barry Warsaw · 13 years ago
  65. 41032a6 Issue #11183: Add finer-grained exceptions to the ssl module, so that by Antoine Pitrou · 13 years ago
  66. f06eb46 Issue #13034: When decoding some SSL certificates, the subjectAltName extension could be unreported. by Antoine Pitrou · 13 years ago
  67. a02a12c Issue #13034: When decoding some SSL certificates, the subjectAltName extension could be unreported. by Antoine Pitrou · 13 years ago
  68. d8c347a Issue #13034: When decoding some SSL certificates, the subjectAltName extension could be unreported. by Antoine Pitrou · 13 years ago
  69. 513886a Fix #12835: prevent use of the unencrypted sendmsg/recvmsg APIs on SSL wrapped sockets (Patch by David Watson) by Nick Coghlan · 13 years ago
  70. 4fd1e6a Issue #12803: SSLContext.load_cert_chain() now accepts a password argument by Antoine Pitrou · 13 years ago
  71. 5fab03f Remove the SSLSocket versions of sendmsg/recvmsg due to lack of proper tests and documentation in conjunction with lack of any known use cases (see issue #6560 for details) by Nick Coghlan · 13 years ago
  72. 96fe56a Add support for the send/recvmsg API to the socket module. Patch by David Watson and Heiko Wundram. (Closes #6560) by Nick Coghlan · 13 years ago
  73. d649480 Issue #12551: Provide a get_channel_binding() method on SSL sockets so as by Antoine Pitrou · 13 years ago
  74. 7128f95 Issue #12440: When testing whether some bits in SSLContext.options can be by Antoine Pitrou · 13 years ago
  75. b9ac25d Issue #12440: When testing whether some bits in SSLContext.options can be by Antoine Pitrou · 13 years ago
  76. 2e2baa9 Issue #12049: test_ssl now checks also that RAND_bytes() raises an error if by Victor Stinner · 13 years ago
  77. 99c8b16 Issue #12049: Add RAND_bytes() and RAND_pseudo_bytes() functions to the ssl by Victor Stinner · 13 years ago
  78. 2e7f39e Issue #12012: test_ssl uses test_support.import_module() by Victor Stinner · 13 years ago
  79. 7a616f2 Issue #12065: connect_ex() on an SSL socket now returns the original errno by Antoine Pitrou · 14 years ago
  80. b4410db Issue #12065: connect_ex() on an SSL socket now returns the original errno by Antoine Pitrou · 14 years ago
  81. b1241f9 (Merge 3.1) Issue #12012: ssl.PROTOCOL_SSLv2 becomes optional by Victor Stinner · 14 years ago
  82. 17ca323 (Merge 3.1) Issue #12012: ssl.PROTOCOL_SSLv2 becomes optional by Victor Stinner · 14 years ago
  83. ee18b6f Issue #12012: ssl.PROTOCOL_SSLv2 becomes optional by Victor Stinner · 14 years ago
  84. 3de4919 Issue #12012: ssl.PROTOCOL_SSLv2 becomes optional by Victor Stinner · 14 years ago
  85. ff9bfca Issue #12000: When a SSL certificate has a subjectAltName without any by Antoine Pitrou · 14 years ago
  86. 1c86b44 Issue #12000: When a SSL certificate has a subjectAltName without any by Antoine Pitrou · 14 years ago
  87. 5aefa66 Fix whitespace by Antoine Pitrou · 14 years ago
  88. 15399c3 Issue #11811: ssl.get_server_certificate() is now IPv6-compatible. Patch by Antoine Pitrou · 14 years ago
  89. 8ef3907 Merged revisions 88671 via svnmerge from by Antoine Pitrou · 14 years ago
  90. d1c9845 Merged revisions 88671 via svnmerge from by Antoine Pitrou · 14 years ago
  91. 8a14a0c Follow up to r88664: non-blocking connect-ex() can return EWOULDBLOCK under Windows by Antoine Pitrou · 14 years ago
  92. d3f6ea1 Merged revisions 88664 via svnmerge from by Antoine Pitrou · 14 years ago
  93. 86cbfec Merged revisions 88664 via svnmerge from by Antoine Pitrou · 14 years ago
  94. e93bf7a Issue #11326: Add the missing connect_ex() implementation for SSL sockets, by Antoine Pitrou · 14 years ago
  95. 80f75e6 Issue #10989: Fix a crash on SSLContext.load_verify_locations(None, True). by Victor Stinner · 14 years ago
  96. d43245a Merged revisions 87861,87863 via svnmerge from by Antoine Pitrou · 14 years ago
  97. 50778ab Merged revisions 87861,87863 via svnmerge from by Antoine Pitrou · 14 years ago
  98. 160fd93 Fix test_ssl after r87849 by Antoine Pitrou · 14 years ago
  99. f332abb test_ssl: test SHA256 using sha256.tbs-internet.com instead of sha2.hboeck.de by Victor Stinner · 14 years ago
  100. c4df784 Issue #10272: The ssl module now raises socket.timeout instead of a generic by Antoine Pitrou · 14 years ago