Python ssl.PROTOCOL_SSLv2() Examples
The following are 13
code examples of ssl.PROTOCOL_SSLv2().
You can vote up the ones you like or vote down the ones you don't like,
and go to the original project or source file by following the links above each example.
You may also want to check out all available functions/classes of the module
ssl
, or try the search function
.
Example #1
Source File: miniCurl.py From w9scan with GNU General Public License v2.0 | 6 votes |
def _connect(self, host, port, timeout, isssl=False): conn = None try: if isssl and not _SUPPORT_SSL: raise 'Not SUPPORT SSL' conn = socket.socket(socket.AF_INET, socket.SOCK_STREAM) conn.connect((host, port)) if isssl: try: conn = ssl.wrap_socket(conn, ssl_version=ssl.PROTOCOL_SSLv23) except ssl.SSLError as _: conn.close() conn = socket.socket(socket.AF_INET, socket.SOCK_STREAM) conn.connect((host, port)) conn = ssl.wrap_socket(conn, ssl_version=ssl.PROTOCOL_SSLv2) conn.settimeout(timeout) except Exception as e: raise CurlError(Curl.CURLE_COULDNT_CONNECT) return conn
Example #2
Source File: int_ssl.py From pysslscan with GNU Lesser General Public License v3.0 | 6 votes |
def convert_version2method(protocol_version): """ Convert internal protocol version ID to Python SSL method. :param Integer protocol_version: Version ID :return: OpenSSL method or None if not found :rtype: OpenSSL method or None """ if protocol_version == flextls.registry.version.SSLv2: return ssl.PROTOCOL_SSLv2 if protocol_version == flextls.registry.version.SSLv3: return ssl.PROTOCOL_SSLv3 if protocol_version == flextls.registry.version.TLSv10: return ssl.PROTOCOL_TLSv1 if protocol_version == flextls.registry.version.TLSv11: return ssl.PROTOCOL_TLSv1_1 if protocol_version == flextls.registry.version.TLSv12: return ssl.PROTOCOL_TLSv1_2 return None
Example #3
Source File: httpserver_test.py From honeything with GNU General Public License v3.0 | 6 votes |
def test_sslv2_fail(self): # This is really more of a client test, but run it here since # we've got all the other ssl version tests here. # Clients should have SSLv2 disabled by default. try: # The server simply closes the connection when it gets # an SSLv2 ClientHello packet. # request_timeout is needed here because on some platforms # (cygwin, but not native windows python), the close is not # detected promptly. response = self.fetch('/', request_timeout=1) except ssl.SSLError: # In some python/ssl builds the PROTOCOL_SSLv2 constant # exists but SSLv2 support is still compiled out, which # would result in an SSLError here (details vary depending # on python version). The important thing is that # SSLv2 request's don't succeed, so we can just ignore # the errors here. return self.assertEqual(response.code, 599)
Example #4
Source File: miniCurl.py From PocCollect with MIT License | 6 votes |
def _connect(self, host, port, timeout, isssl = False): conn = None try: if isssl and not _SUPPORT_SSL: raise 'Not SUPPORT SSL' conn = socket.socket(socket.AF_INET, socket.SOCK_STREAM) conn.connect((host, port)) if isssl: try: conn = ssl.wrap_socket(conn, ssl_version=ssl.PROTOCOL_SSLv23) except ssl.SSLError as _: conn.close() conn = socket.socket(socket.AF_INET, socket.SOCK_STREAM) conn.connect((host, port)) conn = ssl.wrap_socket(conn, ssl_version=ssl.PROTOCOL_SSLv2) conn.settimeout(timeout) except Exception as e: raise CurlError(Curl.CURLE_COULDNT_CONNECT) return conn
Example #5
Source File: test_functional_ssl.py From pyftpdlib with MIT License | 6 votes |
def try_protocol_combo(self, server_protocol, client_protocol): self._setup(ssl_protocol=server_protocol) self.client.ssl_version = client_protocol close_client(self.client) self.client.connect(self.server.host, self.server.port) try: self.client.login() except (ssl.SSLError, socket.error): self.client.close() else: self.client.quit() # def test_ssl_version(self): # protos = [ssl.PROTOCOL_SSLv3, ssl.PROTOCOL_SSLv23, # ssl.PROTOCOL_TLSv1] # if hasattr(ssl, "PROTOCOL_SSLv2"): # protos.append(ssl.PROTOCOL_SSLv2) # for proto in protos: # self.try_protocol_combo(ssl.PROTOCOL_SSLv2, proto) # for proto in protos: # self.try_protocol_combo(ssl.PROTOCOL_SSLv3, proto) # for proto in protos: # self.try_protocol_combo(ssl.PROTOCOL_SSLv23, proto) # for proto in protos: # self.try_protocol_combo(ssl.PROTOCOL_TLSv1, proto)
Example #6
Source File: imaplib2.py From sndlatr with Apache License 2.0 | 5 votes |
def ssl_wrap_socket(self): # Allow sending of keep-alive messages - seems to prevent some servers # from closing SSL, leading to deadlocks. self.sock.setsockopt(socket.SOL_SOCKET, socket.SO_KEEPALIVE, 1) try: import ssl if self.ca_certs is not None: cert_reqs = ssl.CERT_REQUIRED else: cert_reqs = ssl.CERT_NONE if self.ssl_version == "tls1": ssl_version = ssl.PROTOCOL_TLSv1 elif self.ssl_version == "ssl2": ssl_version = ssl.PROTOCOL_SSLv2 elif self.ssl_version == "ssl3": ssl_version = ssl.PROTOCOL_SSLv3 elif self.ssl_version == "ssl23" or self.ssl_version is None: ssl_version = ssl.PROTOCOL_SSLv23 else: raise socket.sslerror("Invalid SSL version requested: %s", self.ssl_version) self.sock = ssl.wrap_socket(self.sock, self.keyfile, self.certfile, ca_certs=self.ca_certs, cert_reqs=cert_reqs, ssl_version=ssl_version) ssl_exc = ssl.SSLError self.read_fd = self.sock.fileno() except ImportError: # No ssl module, and socket.ssl has no fileno(), and does not allow certificate verification raise socket.sslerror("imaplib2 SSL mode does not work without ssl module") if self.cert_verify_cb is not None: cert_err = self.cert_verify_cb(self.sock.getpeercert(), self.host) if cert_err: raise ssl_exc(cert_err)
Example #7
Source File: test_functional_ssl.py From oss-ftp with MIT License | 5 votes |
def test_ssl_version(self): protos = [ssl.PROTOCOL_SSLv3, ssl.PROTOCOL_SSLv23, ssl.PROTOCOL_TLSv1] if hasattr(ssl, "PROTOCOL_SSLv2"): protos.append(ssl.PROTOCOL_SSLv2) for proto in protos: self.try_protocol_combo(ssl.PROTOCOL_SSLv2, proto) for proto in protos: self.try_protocol_combo(ssl.PROTOCOL_SSLv3, proto) for proto in protos: self.try_protocol_combo(ssl.PROTOCOL_SSLv23, proto) for proto in protos: self.try_protocol_combo(ssl.PROTOCOL_TLSv1, proto)
Example #8
Source File: test_functional_ssl.py From oss-ftp with MIT License | 5 votes |
def test_sslv2(self): self.client.ssl_version = ssl.PROTOCOL_SSLv2 self.client.close() self.client.connect(self.server.host, self.server.port) self.assertRaises(socket.error, self.client.login) self.client.ssl_version = ssl.PROTOCOL_SSLv2
Example #9
Source File: test_functional_ssl.py From oss-ftp with MIT License | 5 votes |
def test_ssl_version(self): protos = [ssl.PROTOCOL_SSLv3, ssl.PROTOCOL_SSLv23, ssl.PROTOCOL_TLSv1] if hasattr(ssl, "PROTOCOL_SSLv2"): protos.append(ssl.PROTOCOL_SSLv2) for proto in protos: self.try_protocol_combo(ssl.PROTOCOL_SSLv2, proto) for proto in protos: self.try_protocol_combo(ssl.PROTOCOL_SSLv3, proto) for proto in protos: self.try_protocol_combo(ssl.PROTOCOL_SSLv23, proto) for proto in protos: self.try_protocol_combo(ssl.PROTOCOL_TLSv1, proto)
Example #10
Source File: test_functional_ssl.py From oss-ftp with MIT License | 5 votes |
def test_sslv2(self): self.client.ssl_version = ssl.PROTOCOL_SSLv2 self.client.close() self.client.connect(self.server.host, self.server.port) self.assertRaises(socket.error, self.client.login) self.client.ssl_version = ssl.PROTOCOL_SSLv2
Example #11
Source File: ssl-insecure-version.py From bandit with Apache License 2.0 | 5 votes |
def open_ssl_socket(version=ssl.PROTOCOL_SSLv2): pass
Example #12
Source File: ssl-insecure-version.py From flake8-bandit with MIT License | 5 votes |
def open_ssl_socket(version=ssl.PROTOCOL_SSLv2): pass
Example #13
Source File: test_functional_ssl.py From pyftpdlib with MIT License | 5 votes |
def test_sslv2(self): self.client.ssl_version = ssl.PROTOCOL_SSLv2 close_client(self.client) if not OSX: with self.server.lock: self.client.connect(self.server.host, self.server.port) self.assertRaises(socket.error, self.client.login) else: with self.server.lock: with self.assertRaises(socket.error): self.client.connect(self.server.host, self.server.port, timeout=0.1) self.client.ssl_version = ssl.PROTOCOL_SSLv2