• Home
  • Raw
  • Download

Lines Matching +full:write +full:- +full:host

46 HOST = socket_helper.HOST  variable
114 (('commonName', 'our-ca-server'),)),
129 SIGNED_CERTFILE_ECC_HOSTNAME = 'localhost-ecc'
139 REMOTE_HOST = "self-signed.pythontest.net"
147 TALOS_INVALID_CRLDP = data_file("talos-2019-0758.pem")
164 # Assume that any references of "ubuntu" implies Ubuntu-like distro
166 with open("/etc/os-release", encoding="utf-8") as f:
200 # auto-negotiate protocols are always available
225 # bpo43791: 3.0.0-alpha14 fails with TLSV1_ALERT_INTERNAL_ERROR
267 sys.stdout.write(prefix + exc_format)
273 return -time.altzone # seconds
274 return -time.timezone
372 # Make sure that the PROTOCOL_* constants have enum-like string
382 sys.stdout.write("\n RAND_status is %d (%s)\n"
397 self.assertRaises(ValueError, ssl.RAND_bytes, -5)
399 self.assertRaises(ValueError, ssl.RAND_pseudo_bytes, -5)
422 sys.stdout.write("\n" + pprint.pformat(p) + "\n")
430 ('http://SVRIntl-G3-aia.verisign.com/SVRIntlG3.cer',))
432 ('http://SVRIntl-G3-crl.verisign.com/SVRIntlG3.crl',))
437 sys.stdout.write("\n" + pprint.pformat(p) + "\n")
442 (('countryName', 'UK'),), (('commonName', 'cody-ca'),)),
448 'codenomicon-vm-2.test.lal.cisco.com'),)),
450 ('DNS', 'codenomicon-vm-2.test.lal.cisco.com'),),
458 sys.stdout.write("\n" + pprint.pformat(p) + "\n")
465 (('emailAddress', 'python-dev@python.org'),))
513 self.fail("DER-to-PEM didn't include correct header:\n%r\n" % p2)
515 self.fail("DER-to-PEM didn't include correct footer:\n%r\n" % p2)
645 "certfile must be specified for server-side operations",
648 "certfile must be specified for server-side operations",
651 self.assertRaisesRegex(ValueError, "can't connect in server-side mode",
652 s.connect, (HOST, 8080))
698 # -- Hostname matching --
716 # in left-most segment
724 # NULL bytes are bad, CVE-2013-4073
743 # wildcard doesn't match IDNA prefix 'xn--'
749 cert = {'subject': ((('commonName', 'xn--p*.python.org'),),)}
752 # wildcard in first fragment and IDNA A-labels in sequent fragments
761 # Slightly fake real-world example
774 # A pristine real-world example
786 # -- IPv4 matching --
801 # -- IPv6 matching --
815 # -- Miscellaneous --
871 ssl.match_hostname(cert, 'host')
903 ss.get_channel_binding("unknown-type")
906 @unittest.skipUnless("tls-unique" in ssl.CHANNEL_BINDING_TYPES,
907 "'tls-unique' channel binding not available")
912 self.assertIsNone(ss.get_channel_binding("tls-unique"))
913 # the same for server-side
916 self.assertIsNone(ss.get_channel_binding("tls-unique"))
994 self.assertRaises(ValueError, ssl._ASN1Object.fromnid, -1)
1068 # case-insensitive
1103 self.skipTest("locale-specific month name needs to be "
1106 # locale-independent
1117 rc = s.connect_ex((HOST, port))
1127 # empty reads and writes now work, bpo-42854, bpo-31711
1133 s.connect((HOST, server.port))
1148 self.assertRaises(ValueError, ssl.SSLContext, -1)
1175 self.assertIn('AES256-GCM-SHA384', names)
1176 self.assertIn('AES128-GCM-SHA256', names)
1321 # The default security callback allows for levels between 0-5
1649 @unittest.skipIf(sys.platform == "win32", "not-Windows specific")
1819 ctx.num_tickets = -1
1887 bio.write(b'foo')
1890 bio.write(b'foo')
1891 bio.write(b'bar')
1894 bio.write(b'baz')
1904 bio.write(b'foo')
1918 bio.write(b'foo')
1922 self.assertEqual(bio.pending, 3-i-1)
1924 bio.write(b'x')
1931 bio.write(b'foo')
1933 bio.write(bytearray(b'bar'))
1935 bio.write(memoryview(b'baz'))
1940 self.assertRaises(TypeError, bio.write, 'foo')
1941 self.assertRaises(TypeError, bio.write, None)
1942 self.assertRaises(TypeError, bio.write, True)
1943 self.assertRaises(TypeError, bio.write, 1)
1968 s_in.write(c_out.read())
1974 c_in.write(s_out.read())
1979 # Now if we unwrap one side unilaterally, it should send close-notify
1985 # close-notify:
1986 s_in.write(c_out.read())
1989 # And now that the client gets the server's close-notify, it doesn't
1991 c_in.write(s_out.read())
2001 self.server_addr = (HOST, server.port)
2040 # Issue #11326: non-blocking connect_ex() should allow handshake
2053 # Non-blocking handshake
2144 # Issue #5238: creating a file-like object with makefile() shouldn't
2180 sys.stdout.write("\nNeeded %d calls to do_handshake() to establish session.\n" % count)
2186 host, port = self.server_addr
2189 # We store servername_cb arguments to make sure they match the host
2194 pem = ssl.get_server_certificate((host, port))
2196 self.fail("No server certificate on %s:%s!" % (host, port))
2198 pem = ssl.get_server_certificate((host, port), ca_certs=SIGNING_CA)
2200 self.fail("No server certificate on %s:%s!" % (host, port))
2202 sys.stdout.write("\nVerified certificate for %s:%s is\n%s\n" % (host, port, pem))
2204 self.assertEqual(server_names, [host, host])
2290 incoming.write(buf)
2294 sys.stdout.write("Needed %d calls to complete %s().\n"
2315 if 'tls-unique' in ssl.CHANNEL_BINDING_TYPES:
2316 self.assertIsNone(sslobj.get_channel_binding('tls-unique'))
2322 if 'tls-unique' in ssl.CHANNEL_BINDING_TYPES:
2323 self.assertTrue(sslobj.get_channel_binding('tls-unique'))
2330 self.assertRaises(ssl.SSLError, sslobj.write, b'foo')
2344 self.ssl_io_loop(sock, incoming, outgoing, sslobj.write, req)
2355 # errno (mimicking the behaviour of non-SSL sockets).
2376 def _test_get_server_certificate(test, host, port, cert=None): argument
2377 pem = ssl.get_server_certificate((host, port))
2379 test.fail("No server certificate on %s:%s!" % (host, port))
2381 pem = ssl.get_server_certificate((host, port), ca_certs=cert)
2383 test.fail("No server certificate on %s:%s!" % (host, port))
2385 sys.stdout.write("\nVerified certificate for %s:%s is\n%s\n" % (host, port ,pem))
2387 def _test_get_server_certificate_fail(test, host, port): argument
2389 pem = ssl.get_server_certificate((host, port), ca_certs=CERTFILE)
2393 sys.stdout.write("%s\n" % x)
2395 test.fail("Got server certificate %s for %s:%s!" % (pem, host, port))
2425 # SSLError - OpenSSL on Ubuntu abruptly closes the
2446 # or a low-level bug. This should be made more discriminating.
2448 # bpo-31323: Store the exception as string to prevent
2449 # a reference leak: server -> conn_errors -> exception
2450 # -> traceback -> self (ConnectionHandler) -> server
2455 # bpo-44229, bpo-43855, bpo-44237, and bpo-33450:
2456 # Ignore spurious EPROTOTYPE returned by write() on macOS.
2457 …ee also http://erickt.github.io/blog/2014/11/19/adventures-in-debugging-a-potential-osx-kernel-bug/
2468 sys.stdout.write(" client cert is " + pprint.pformat(cert) + "\n")
2472 sys.stdout.write(" client did not provide a cert\n")
2474 sys.stdout.write(f" cert binary is {len(cert_binary)}b\n")
2477 sys.stdout.write(" server: connection cipher is now " + str(cipher) + "\n")
2486 def write(self, bytes): member in ThreadedEchoServer.ConnectionHandler
2488 return self.sslconn.write(bytes)
2522 sys.stdout.write(" server: client closed connection\n")
2528 sys.stdout.write(" server: read STARTTLS from client, sending OK...\n")
2529 self.write(b"OK\n")
2535 sys.stdout.write(" server: read ENDTLS from client, sending OK...\n")
2536 self.write(b"OK\n")
2540 sys.stdout.write(" server: connection is now unencrypted...\n")
2541 elif stripped == b'CB tls-unique':
2543 … sys.stdout.write(" server: read CB tls-unique from client, sending our CB data...\n")
2544 data = self.sslconn.get_channel_binding("tls-unique")
2545 self.write(repr(data).encode("us-ascii") + b"\n")
2548 sys.stdout.write(" server: initiating post handshake auth\n")
2552 self.write(repr(e).encode("us-ascii") + b"\n")
2554 self.write(b"OK\n")
2557 self.write(b'TRUE\n')
2559 self.write(b'FALSE\n')
2562 self.write(repr(cert).encode("us-ascii") + b"\n")
2565 self.write(len(certs).to_bytes(1, "big") + b"\n")
2568 self.write(len(certs).to_bytes(1, "big") + b"\n")
2573 sys.stdout.write(" server: read %r (%s), sending back %r (%s)...\n"
2575 self.write(msg.lower())
2589 self.write(b"ERROR\n")
2657 sys.stdout.write(' server: new connection from '
2664 sys.stdout.write(f' connection timeout {e!r}\n')
2669 sys.stdout.write(
2725 sys.stdout.write(" server: read %s from client\n" % repr(data))
2734 sys.stdout.write(" server: closed connection %s\n" % self.socket)
2748 sys.stdout.write(" server: new connection from %s:%s\n" %addr)
2772 sys.stdout.write(" cleanup: stopping server.\n")
2775 sys.stdout.write(" cleanup: joining server thread.\n")
2778 sys.stdout.write(" cleanup: successfully joined.\n")
2814 s.connect((HOST, server.port))
2818 sys.stdout.write(
2820 s.write(arg)
2824 sys.stdout.write(" client: read %r\n" % outdata)
2830 s.write(b"over\n")
2833 sys.stdout.write(" client: closing connection.\n")
2851 Try to SSL-connect using *client_protocol* to *server_protocol*.
2865 formatstr = (expect_success and " %s->%s %s\n") or " {%s->%s} %s\n"
2866 sys.stdout.write(formatstr %
2931 sys.stdout.write("\n")
2974 sys.stdout.write("\n")
2982 s.connect((HOST, server.port))
2992 sys.stdout.write(pprint.pformat(cert) + '\n')
2993 sys.stdout.write("Connection cipher is " + str(cipher) + '.\n')
3010 sys.stdout.write("\n")
3022 s.connect((HOST, server.port))
3035 s.connect((HOST, server.port))
3044 s.connect((HOST, server.port))
3050 sys.stdout.write("\n")
3059 s.connect((HOST, server.port))
3071 s.connect((HOST, server.port))
3094 s.connect((HOST, server.port))
3103 s.connect((HOST, server.port))
3120 s.connect((HOST, server.port))
3123 cipher = s.cipher()[0].split('-')
3146 s.connect((HOST, server.port))
3149 cipher = s.cipher()[0].split('-')
3154 sys.stdout.write("\n")
3168 'xn--knig-5qa.idn.pythontest.net'),
3169 ('xn--knig-5qa.idn.pythontest.net',
3170 'xn--knig-5qa.idn.pythontest.net'),
3171 (b'xn--knig-5qa.idn.pythontest.net',
3172 'xn--knig-5qa.idn.pythontest.net'),
3175 'xn--knigsgsschen-lcb0w.idna2003.pythontest.net'),
3176 ('xn--knigsgsschen-lcb0w.idna2003.pythontest.net',
3177 'xn--knigsgsschen-lcb0w.idna2003.pythontest.net'),
3178 (b'xn--knigsgsschen-lcb0w.idna2003.pythontest.net',
3179 'xn--knigsgsschen-lcb0w.idna2003.pythontest.net'),
3182 # 'xn--knigsgchen-b4a3dun.idna2008.pythontest.net'),
3183 ('xn--knigsgchen-b4a3dun.idna2008.pythontest.net',
3184 'xn--knigsgchen-b4a3dun.idna2008.pythontest.net'),
3185 (b'xn--knigsgchen-b4a3dun.idna2008.pythontest.net',
3186 'xn--knigsgchen-b4a3dun.idna2008.pythontest.net'),
3195 s.connect((HOST, server.port))
3206 s.connect((HOST, server.port))
3231 # the connection, or a low-level connection reset (which
3233 s.connect((HOST, server.port))
3236 sys.stdout.write("\nSSLError is %r\n" % e)
3241 sys.stdout.write("\nsocket.error is %r\n" % e)
3262 s.connect((HOST, server.port))
3264 s.write(b'data')
3266 s.write(b'should have failed already')
3270 sys.stdout.write("\nSSLError is %r\n" % e)
3275 sys.stdout.write("\nsocket.error is %r\n" % e)
3287 port = socket_helper.bind_port(s, HOST)
3304 c.connect((HOST, port))
3322 sys.stdout.write("\n")
3334 s.connect((HOST, server.port))
3347 sys.stdout.write("\n")
3364 sys.stdout.write("\n")
3371 sys.stdout.write(
3407 sys.stdout.write("\n")
3421 sys.stdout.write("\n")
3437 sys.stdout.write("\n")
3455 sys.stdout.write("\n")
3484 s.connect((HOST, server.port))
3486 sys.stdout.write("\n")
3489 sys.stdout.write(
3492 conn.write(indata)
3501 sys.stdout.write(
3509 sys.stdout.write(
3516 sys.stdout.write(
3519 sys.stdout.write(" client: closing connection.\n")
3521 conn.write(b"over\n")
3534 sys.stdout.write('\n')
3544 dlen = f.info().get("content-length")
3548 sys.stdout.write(
3558 sys.stdout.write("\n")
3566 sys.stdout.write(
3568 s.write(indata)
3571 sys.stdout.write(" client: read %r\n" % outdata)
3577 s.write(b"over\n")
3579 sys.stdout.write(" client: closing connection.\n")
3582 sys.stdout.write(" client: connection closed.\n")
3587 sys.stdout.write("\n")
3601 s.connect((HOST, server.port))
3691 # read(-1, buffer) is supported, even though read(-1) is not
3695 self.assertEqual(s.read(-1, buffer), len(data))
3698 # sendall accepts bytes-like objects
3713 s.write(b"over\n")
3715 self.assertRaises(ValueError, s.recv, -1)
3716 self.assertRaises(ValueError, s.read, -1)
3724 s = socket.create_connection((HOST, server.port))
3753 s.connect((HOST, server.port))
3772 host = "127.0.0.1"
3798 c.connect((host, port))
3810 c.connect, (host, port))
3823 host = "127.0.0.1"
3885 s.connect((HOST, server.port))
3902 s.connect((HOST, server.port))
3914 s.connect((HOST, server.port))
3937 s.connect((HOST, server.port))
3954 s.connect((HOST, server.port))
3973 s.connect((HOST, server.port))
3987 s.connect((HOST, server.port))
3991 # Issue #21015: elliptic curve-based Diffie Hellman key exchange
3999 # our default cipher list should prefer ECDH-based ciphers
4004 s.connect((HOST, server.port))
4007 @unittest.skipUnless("tls-unique" in ssl.CHANNEL_BINDING_TYPES,
4008 "'tls-unique' channel binding not available")
4010 """Test tls-unique channel binding."""
4012 sys.stdout.write("\n")
4024 s.connect((HOST, server.port))
4026 cb_data = s.get_channel_binding("tls-unique")
4028 sys.stdout.write(
4039 s.write(b"CB tls-unique\n")
4042 repr(cb_data).encode("us-ascii"))
4048 s.connect((HOST, server.port))
4049 new_cb_data = s.get_channel_binding("tls-unique")
4051 sys.stdout.write(
4062 s.write(b"CB tls-unique\n")
4065 repr(new_cb_data).encode("us-ascii"))
4073 sys.stdout.write(" got compression: {!r}\n".format(stats['compression']))
4089 # Check we can get a connection with ephemeral Diffie-Hellman
4100 parts = cipher.split("-")
4102 self.fail("Non-DH cipher: " + cipher[0])
4181 server_result = stats['server_alpn_protocols'][-1] \
4297 "AES256", "AES-256",
4317 s.connect((HOST, server.port))
4321 self.assertRaises(ValueError, s.write, b'hello')
4326 f.write(TEST_DATA)
4333 s.connect((HOST, server.port))
4410 s.connect((HOST, server.port))
4419 s.connect((HOST, server.port))
4431 s.connect((HOST, server.port))
4438 # cannot re-use session with a different SSLContext
4441 s.connect((HOST, server.port))
4483 s.connect((HOST, server.port))
4484 s.write(b'HASCERT')
4486 s.write(b'PHA')
4488 s.write(b'HASCERT')
4491 s.write(b'PHA')
4493 s.write(b'GETCERT')
4494 cert_text = s.recv(4096).decode('us-ascii')
4506 sys.stdout.write(f"TLS: {info!r}\n")
4516 s.connect((HOST, server.port))
4517 s.write(b'PHA')
4529 s.write(b'HASCERT')
4536 sys.stdout.write("\n")
4550 s.connect((HOST, server.port))
4551 s.write(b'HASCERT')
4553 s.write(b'PHA')
4555 s.write(b'HASCERT')
4560 sys.stdout.write("\n")
4571 s.connect((HOST, server.port))
4572 s.write(b'HASCERT')
4574 s.write(b'PHA')
4577 s.write(b'HASCERT')
4590 s.connect((HOST, server.port))
4593 s.write(b'PHA')
4607 s.connect((HOST, server.port))
4608 s.write(b'HASCERT')
4611 s.write(b'PHA')
4613 s.write(b'HASCERT')
4628 s.connect((HOST, server.port))
4630 s.write(b'PHA')
4654 s.connect((HOST, server.port))
4655 s.write(b'HASCERT')
4657 s.write(b'PHA')
4659 s.write(b'HASCERT')
4674 s.connect((HOST, server.port))
4690 self.assertIn("CN=our-ca-server", repr(ca))
4695 self.assertIn("-----BEGIN CERTIFICATE-----", pem)
4713 s.connect((HOST, server.port))
4714 s.write(b'VERIFIEDCHAIN\n')
4717 s.write(b'UNVERIFIEDCHAIN\n')
4767 s.connect((HOST, server.port))
4777 s.connect((HOST, server.port))
4786 s.connect((HOST, server.port))
4832 self.assertIn(direction, {'read', 'write'})
4841 s.connect((HOST, server.port))
4849 ("write", TLSVersion.TLSv1_2, _TLSContentType.CHANGE_CIPHER_SPEC,
4871 s.connect((HOST, server.port))
4874 s.connect((HOST, server.port))