Python OpenSSL.SSL.SSLv23_METHOD() Examples
The following are 30
code examples of OpenSSL.SSL.SSLv23_METHOD().
You can vote up the ones you like or vote down the ones you don't like,
and go to the original project or source file by following the links above each example.
You may also want to check out all available functions/classes of the module
OpenSSL.SSL
, or try the search function
.
Example #1
Source File: test_sslverify.py From learn_python3_spider with MIT License | 6 votes |
def test_doesNotSwallowOtherSSLErrors(self): """ Only no cipher matches get swallowed, every other SSL error gets propagated. """ def raiser(_): # Unfortunately, there seems to be no way to trigger a real SSL # error artificially. raise SSL.Error([['', '', '']]) ctx = FakeContext(SSL.SSLv23_METHOD) ctx.set_cipher_list = raiser self.patch(sslverify.SSL, 'Context', lambda _: ctx) self.assertRaises( SSL.Error, sslverify._expandCipherString, u'ALL', SSL.SSLv23_METHOD, 0 )
Example #2
Source File: test_sslverify.py From learn_python3_spider with MIT License | 6 votes |
def test_openSSL102SetECDHAutoRaises(self): """ An exception raised by C{SSL_CTX_set_ecdh_auto} under OpenSSL 1.0.2 is suppressed because ECDH is best-effort. """ self.libState.setECDHAutoRaises = BaseException context = SSL.Context(SSL.SSLv23_METHOD) chooser = sslverify._ChooseDiffieHellmanEllipticCurve( self.OPENSSL_102, openSSLlib=self.lib, openSSLcrypto=self.crypto, ) chooser.configureECDHCurve(context) self.assertEqual(self.libState.ecdhContexts, [context._context]) self.assertEqual(self.libState.ecdhValues, [True]) self.assertFalse(self.cryptoState.getEllipticCurveCalls)
Example #3
Source File: ssl.py From python-for-android with Apache License 2.0 | 6 votes |
def __init__(self, privateKeyFileName, certificateFileName, sslmethod=SSL.SSLv23_METHOD, _contextFactory=SSL.Context): """ @param privateKeyFileName: Name of a file containing a private key @param certificateFileName: Name of a file containing a certificate @param sslmethod: The SSL method to use """ self.privateKeyFileName = privateKeyFileName self.certificateFileName = certificateFileName self.sslmethod = sslmethod self._contextFactory = _contextFactory # Create a context object right now. This is to force validation of # the given parameters so that errors are detected earlier rather # than later. self.cacheContext()
Example #4
Source File: ssl.py From Safejumper-for-Desktop with GNU General Public License v2.0 | 6 votes |
def __init__(self, privateKeyFileName, certificateFileName, sslmethod=SSL.SSLv23_METHOD, _contextFactory=SSL.Context): """ @param privateKeyFileName: Name of a file containing a private key @param certificateFileName: Name of a file containing a certificate @param sslmethod: The SSL method to use """ self.privateKeyFileName = privateKeyFileName self.certificateFileName = certificateFileName self.sslmethod = sslmethod self._contextFactory = _contextFactory # Create a context object right now. This is to force validation of # the given parameters so that errors are detected earlier rather # than later. self.cacheContext()
Example #5
Source File: test_sslverify.py From learn_python3_spider with MIT License | 6 votes |
def test_tlsProtocolsNoMethodWithMinimum(self): """ Passing C{insecurelyLowerMinimumTo} along with C{method} to L{sslverify.OpenSSLCertificateOptions} will cause it to raise an exception. """ with self.assertRaises(TypeError) as e: sslverify.OpenSSLCertificateOptions( privateKey=self.sKey, certificate=self.sCert, method=SSL.SSLv23_METHOD, insecurelyLowerMinimumTo=sslverify.TLSVersion.TLSv1_2, ) self.assertIn('method', e.exception.args[0]) self.assertIn('insecurelyLowerMinimumTo', e.exception.args[0]) self.assertIn('exclusive', e.exception.args[0])
Example #6
Source File: test_sslverify.py From Safejumper-for-Desktop with GNU General Public License v2.0 | 6 votes |
def test_methodIsDeprecated(self): """ Passing C{method} to L{sslverify.OpenSSLCertificateOptions} is deprecated. """ sslverify.OpenSSLCertificateOptions( privateKey=self.sKey, certificate=self.sCert, method=SSL.SSLv23_METHOD, ) message = ("Passing method to twisted.internet.ssl.CertificateOptions " "was deprecated in Twisted 17.1.0. Please use a " "combination of insecurelyLowerMinimumTo, raiseMinimumTo, " "and lowerMaximumSecurityTo instead, as Twisted will " "correctly configure the method.") warnings = self.flushWarnings([self.test_methodIsDeprecated]) self.assertEqual(1, len(warnings)) self.assertEqual(DeprecationWarning, warnings[0]['category']) self.assertEqual(message, warnings[0]['message'])
Example #7
Source File: test_sslverify.py From Safejumper-for-Desktop with GNU General Public License v2.0 | 6 votes |
def test_tlsProtocolsNoMethodWithAtLeast(self): """ Passing C{raiseMinimumTo} along with C{method} to L{sslverify.OpenSSLCertificateOptions} will cause it to raise an exception. """ with self.assertRaises(TypeError) as e: sslverify.OpenSSLCertificateOptions( privateKey=self.sKey, certificate=self.sCert, method=SSL.SSLv23_METHOD, raiseMinimumTo=sslverify.TLSVersion.TLSv1_2, ) # Best error message self.assertEqual(e.exception.args, ("nope",))
Example #8
Source File: test_sslverify.py From Safejumper-for-Desktop with GNU General Public License v2.0 | 6 votes |
def test_tlsProtocolsNoMethodWithMinimum(self): """ Passing C{insecurelyLowerMinimumTo} along with C{method} to L{sslverify.OpenSSLCertificateOptions} will cause it to raise an exception. """ with self.assertRaises(TypeError) as e: sslverify.OpenSSLCertificateOptions( privateKey=self.sKey, certificate=self.sCert, method=SSL.SSLv23_METHOD, insecurelyLowerMinimumTo=sslverify.TLSVersion.TLSv1_2, ) # Best error message self.assertEqual(e.exception.args, ("nope",))
Example #9
Source File: test_sslverify.py From Safejumper-for-Desktop with GNU General Public License v2.0 | 6 votes |
def test_tlsProtocolsNoMethodWithMaximum(self): """ Passing C{lowerMaximumSecurityTo} along with C{method} to L{sslverify.OpenSSLCertificateOptions} will cause it to raise an exception. """ with self.assertRaises(TypeError) as e: sslverify.OpenSSLCertificateOptions( privateKey=self.sKey, certificate=self.sCert, method=SSL.SSLv23_METHOD, lowerMaximumSecurityTo=sslverify.TLSVersion.TLSv1_2, ) # Best error message self.assertEqual(e.exception.args, ("nope",))
Example #10
Source File: test_sslverify.py From learn_python3_spider with MIT License | 6 votes |
def test_tlsProtocolsNoMethodWithAtLeast(self): """ Passing C{raiseMinimumTo} along with C{method} to L{sslverify.OpenSSLCertificateOptions} will cause it to raise an exception. """ with self.assertRaises(TypeError) as e: sslverify.OpenSSLCertificateOptions( privateKey=self.sKey, certificate=self.sCert, method=SSL.SSLv23_METHOD, raiseMinimumTo=sslverify.TLSVersion.TLSv1_2, ) self.assertIn('method', e.exception.args[0]) self.assertIn('raiseMinimumTo', e.exception.args[0]) self.assertIn('exclusive', e.exception.args[0])
Example #11
Source File: test_sslverify.py From Safejumper-for-Desktop with GNU General Public License v2.0 | 6 votes |
def test_doesNotSwallowOtherSSLErrors(self): """ Only no cipher matches get swallowed, every other SSL error gets propagated. """ def raiser(_): # Unfortunately, there seems to be no way to trigger a real SSL # error artificially. raise SSL.Error([['', '', '']]) ctx = FakeContext(SSL.SSLv23_METHOD) ctx.set_cipher_list = raiser self.patch(sslverify.SSL, 'Context', lambda _: ctx) self.assertRaises( SSL.Error, sslverify._expandCipherString, u'ALL', SSL.SSLv23_METHOD, 0 )
Example #12
Source File: test_sslverify.py From learn_python3_spider with MIT License | 6 votes |
def test_methodIsDeprecated(self): """ Passing C{method} to L{sslverify.OpenSSLCertificateOptions} is deprecated. """ sslverify.OpenSSLCertificateOptions( privateKey=self.sKey, certificate=self.sCert, method=SSL.SSLv23_METHOD, ) message = ("Passing method to twisted.internet.ssl.CertificateOptions " "was deprecated in Twisted 17.1.0. Please use a " "combination of insecurelyLowerMinimumTo, raiseMinimumTo, " "and lowerMaximumSecurityTo instead, as Twisted will " "correctly configure the method.") warnings = self.flushWarnings([self.test_methodIsDeprecated]) self.assertEqual(1, len(warnings)) self.assertEqual(DeprecationWarning, warnings[0]['category']) self.assertEqual(message, warnings[0]['message'])
Example #13
Source File: ssl_pyopenssl.py From opsbro with MIT License | 5 votes |
def get_context(self): """Return an SSL.Context from self attributes.""" # See http://aspn.activestate.com/ASPN/Cookbook/Python/Recipe/442473 c = SSL.Context(SSL.SSLv23_METHOD) c.use_privatekey_file(self.private_key) if self.certificate_chain: c.load_verify_locations(self.certificate_chain) c.use_certificate_file(self.certificate) return c
Example #14
Source File: test_ssl.py From python-for-android with Apache License 2.0 | 5 votes |
def test_method(self): """ L{ssl.ClientContextFactory.getContext} returns a context which can use SSLv3 or TLSv1 but not SSLv2. """ self.assertEqual(self.context._method, SSL.SSLv23_METHOD) self.assertTrue(self.context._options & SSL.OP_NO_SSLv2) self.assertFalse(self.context._options & SSL.OP_NO_SSLv3) self.assertFalse(self.context._options & SSL.OP_NO_TLSv1)
Example #15
Source File: ssl.py From pyrdp with GNU General Public License v3.0 | 5 votes |
def __init__(self, privateKeyFileName, certificateFileName): class TPDUSSLContext(SSL.Context): def __init__(self, method): SSL.Context.__init__(self, method) self.set_options(SSL.OP_DONT_INSERT_EMPTY_FRAGMENTS) self.set_options(SSL.OP_TLS_BLOCK_PADDING_BUG) # See comment in ClientTLSContext self.set_options(SSL.OP_NO_TLSv1_3) # See comment in ClientTLSContext ssl.DefaultOpenSSLContextFactory.__init__(self, privateKeyFileName, certificateFileName, SSL.SSLv23_METHOD, TPDUSSLContext)
Example #16
Source File: ssl.py From pyrdp with GNU General Public License v3.0 | 5 votes |
def getContext(self): # Allow the MITM to connect to an RDP Server with ANY TLS version supported by the installed # OpenSSL version. See https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=784153 # It was removed from OpenSSL, but PyOpenSSL has not changed their constant names yet. context = SSL.Context(SSL.SSLv23_METHOD) context.set_options(SSL.OP_DONT_INSERT_EMPTY_FRAGMENTS) context.set_options(SSL.OP_TLS_BLOCK_PADDING_BUG) # We disable TLS 1.3 because the way to decrypt TLS 1.3 traffic differs from # previous TLS versions and is not yet supported by PyRDP. context.set_options(SSL.OP_NO_TLSv1_3) return context
Example #17
Source File: contextfactory.py From learn_python3_spider with MIT License | 5 votes |
def __init__(self, method=SSL.SSLv23_METHOD): self.method = method
Example #18
Source File: contextfactory.py From learn_python3_spider with MIT License | 5 votes |
def __init__(self, method=SSL.SSLv23_METHOD, *args, **kwargs): super(ScrapyClientContextFactory, self).__init__(*args, **kwargs) self._ssl_method = method
Example #19
Source File: test_sslverify.py From learn_python3_spider with MIT License | 5 votes |
def setUp(self): self.libState = FakeLibState(setECDHAutoRaises=False) self.lib = FakeLib(self.libState) self.cryptoState = FakeCryptoState( getEllipticCurveReturns=None, getEllipticCurveRaises=None ) self.crypto = FakeCrypto(self.cryptoState) self.context = FakeContext(SSL.SSLv23_METHOD)
Example #20
Source File: pyopenssl.py From cheroot with BSD 3-Clause "New" or "Revised" License | 5 votes |
def get_context(self): """Return an ``SSL.Context`` from self attributes. Ref: :py:class:`SSL.Context <pyopenssl:OpenSSL.SSL.Context>` """ # See https://code.activestate.com/recipes/442473/ c = SSL.Context(SSL.SSLv23_METHOD) c.use_privatekey_file(self.private_key) if self.certificate_chain: c.load_verify_locations(self.certificate_chain) c.use_certificate_file(self.certificate) return c
Example #21
Source File: test_ssl.py From python-for-android with Apache License 2.0 | 5 votes |
def test_method(self): """ L{ssl.DefaultOpenSSLContextFactory.getContext} returns an SSL context which can use SSLv3 or TLSv1 but not SSLv2. """ # SSLv23_METHOD allows SSLv2, SSLv3, or TLSv1 self.assertEqual(self.context._method, SSL.SSLv23_METHOD) # And OP_NO_SSLv2 disables the SSLv2 support. self.assertTrue(self.context._options & SSL.OP_NO_SSLv2) # Make sure SSLv3 and TLSv1 aren't disabled though. self.assertFalse(self.context._options & SSL.OP_NO_SSLv3) self.assertFalse(self.context._options & SSL.OP_NO_TLSv1)
Example #22
Source File: ssl_pyopenssl.py From moviegrabber with GNU General Public License v3.0 | 5 votes |
def get_context(self): """Return an SSL.Context from self attributes.""" # See http://aspn.activestate.com/ASPN/Cookbook/Python/Recipe/442473 c = SSL.Context(SSL.SSLv23_METHOD) c.use_privatekey_file(self.private_key) if self.certificate_chain: c.load_verify_locations(self.certificate_chain) c.use_certificate_file(self.certificate) return c
Example #23
Source File: packet_sender.py From darkc0de-old-stuff with GNU General Public License v3.0 | 5 votes |
def connect (self, host, port): if self.state == 1: print "Already has an active connection" elif self.type == 0: # TCP if self.ssl == 1: ctx = SSL.Context (SSL.SSLv23_METHOD) s = SSL.Connection (ctx, socket(AF_INET, SOCK_STREAM)) try: err = s.connect_ex ((host, port)) except: print "Couldn't connect SSL socket" return if err == 0: self.skt = s self.state = 1 else: s = socket (AF_INET, SOCK_STREAM) try: err = s.connect_ex ((host, port)) except: print "Couldn't connect TCP socket" return if err == 0: self.skt = s self.state = 1 elif self.type == 1: # UDP s = socket (AF_INET, SOCK_DGRAM) try: err = s.connect_ex ((host, port)) except: print "Couldn't create UDP socket" return if err == 0: self.skt = s self.state = 1 else: print "RAW sockets not implemented yet" if self.state == 1: return "OK"
Example #24
Source File: ssl.py From BitTorrent with GNU General Public License v3.0 | 5 votes |
def __init__(self, privateKeyFileName, certificateFileName, sslmethod=SSL.SSLv23_METHOD): """ @param privateKeyFileName: Name of a file containing a private key @param certificateFileName: Name of a file containing a certificate @param sslmethod: The SSL method to use """ self.privateKeyFileName = privateKeyFileName self.certificateFileName = certificateFileName self.sslmethod = sslmethod self.cacheContext()
Example #25
Source File: test_txsni.py From txsni with MIT License | 5 votes |
def will_use_tls_1_3(): """ Will OpenSSL negotiate TLS 1.3? """ ctx = Context(SSLv23_METHOD) connection = Connection(ctx, None) return connection.get_protocol_version_name() == u'TLSv1.3'
Example #26
Source File: ssl_pyopenssl.py From bokken with GNU General Public License v2.0 | 5 votes |
def get_context(self): """Return an SSL.Context from self attributes.""" # See http://aspn.activestate.com/ASPN/Cookbook/Python/Recipe/442473 c = SSL.Context(SSL.SSLv23_METHOD) c.use_privatekey_file(self.private_key) if self.certificate_chain: c.load_verify_locations(self.certificate_chain) c.use_certificate_file(self.certificate) return c
Example #27
Source File: ssl_pyopenssl.py From cosa-nostra with GNU General Public License v3.0 | 5 votes |
def get_context(self): """Return an SSL.Context from self attributes.""" # See http://aspn.activestate.com/ASPN/Cookbook/Python/Recipe/442473 c = SSL.Context(SSL.SSLv23_METHOD) c.use_privatekey_file(self.private_key) if self.certificate_chain: c.load_verify_locations(self.certificate_chain) c.use_certificate_file(self.certificate) return c
Example #28
Source File: ssl_pyopenssl.py From bazarr with GNU General Public License v3.0 | 5 votes |
def get_context(self): """Return an SSL.Context from self attributes.""" # See http://aspn.activestate.com/ASPN/Cookbook/Python/Recipe/442473 c = SSL.Context(SSL.SSLv23_METHOD) c.use_privatekey_file(self.private_key) if self.certificate_chain: c.load_verify_locations(self.certificate_chain) c.use_certificate_file(self.certificate) return c
Example #29
Source File: pyopenssl.py From Tautulli with GNU General Public License v3.0 | 5 votes |
def get_context(self): """Return an SSL.Context from self attributes.""" # See https://code.activestate.com/recipes/442473/ c = SSL.Context(SSL.SSLv23_METHOD) c.use_privatekey_file(self.private_key) if self.certificate_chain: c.load_verify_locations(self.certificate_chain) c.use_certificate_file(self.certificate) return c
Example #30
Source File: ssl_pyopenssl.py From SalesforceXyTools with Apache License 2.0 | 5 votes |
def get_context(self): """Return an SSL.Context from self attributes.""" # See http://aspn.activestate.com/ASPN/Cookbook/Python/Recipe/442473 c = SSL.Context(SSL.SSLv23_METHOD) c.use_privatekey_file(self.private_key) if self.certificate_chain: c.load_verify_locations(self.certificate_chain) c.use_certificate_file(self.certificate) return c