• Home
  • Raw
  • Download

Lines Matching +full:fail +full:- +full:on +full:- +full:alert

8   SSLSocket -- subtype of socket.socket which does SSL over the socket
12 SSLError -- exception raised for I/O errors
16 cert_time_to_seconds -- convert time string used for certificate
21 get_server_certificate (addr, ssl_version, ca_certs, timeout) -- Retrieve the
23 address and return it as a PEM-encoded string
42 CERT_NONE - no certificates from the other side are required (or will
44 CERT_OPTIONAL - certificates are not required, but if provided will be
46 also fail
47 CERT_REQUIRED - certificates are required, and will be validated, and
48 if validation fails, the connection will also fail
62 The following constants identify various SSL alert message descriptions as per
63 http://www.iana.org/assignments/tls-parameters/tls-parameters.xml#tls-parameters-6
177 ALERT = 21 variable in _TLSContentType
187 """Alert types for TLSContentType.ALERT messages
263 import base64 # for DER-to-PEM translation
270 CHANNEL_BINDING_TYPES = ['tls-unique']
283 - Hostnames are compared lower-case.
284 - For IDNA, both dn and hostname must be encoded as IDN A-label (ACE).
285 - Partial wildcards like 'www*.example.org', multiple wildcards, sole
286 wildcard or wildcards in labels other then the left-most label are not
288 - A wildcard must match at least one character.
332 Supports IPv4 addresses on all platforms and IPv6 on platforms with IPv6
349 "{!r} is not a quad-dotted IPv4 address.".format(ipname)
368 (section 1.7.2 - "Out of Scope").
382 valid ipaddress string. IPv4 addresses are supported on all platforms.
383 IPv6 addresses are supported on platforms with IPv6 support (AF_INET6
386 CertificateError is raised on failure. On success, the function
485 """An SSLContext holds various SSL-related configuration options and
649 (header, handshake, alert, and more), but not for application data.
670 message, a :class:`_TLSAlertType` enum member for an alert
704 elif content_type == _TLSContentType.ALERT:
774 # root CA certificates for the given purpose. This may fail silently.
828 # root CA certificates for the given purpose. This may fail silently.
846 """This class implements an interface on top of a low-level SSL object as
903 """Whether this is a server-side socket."""
958 """Return the currently selected cipher as a 3-tuple ``(name,
985 def get_channel_binding(self, cb_type="tls-unique"):
1073 # non-blocking
1074 … raise ValueError("do_handshake_on_connect should not be specified for non-blocking sockets")
1127 Return zero-length string on EOF."""
1131 raise ValueError("Read on closed or unwrapped SSL socket.")
1152 raise ValueError("Write on closed or unwrapped SSL socket.")
1208 "non-zero flags not allowed in calls to send() on %s" %
1217 raise ValueError("sendto not allowed on instances of %s" %
1227 raise NotImplementedError("sendmsg not allowed on instances of %s" %
1235 "non-zero flags not allowed in calls to sendall() on %s" %
1248 clear-text socket. Return the total number of bytes sent.
1261 "non-zero flags not allowed in calls to recv() on %s" %
1276 "non-zero flags not allowed in calls to recv_into() on %s" %
1285 raise ValueError("recvfrom not allowed on instances of %s" %
1293 raise ValueError("recvfrom_into not allowed on instances of %s" %
1299 raise NotImplementedError("recvmsg not allowed on instances of %s" %
1303 raise NotImplementedError("recvmsg_into not allowed on instances of "
1352 raise ValueError("can't connect in server-side mode")
1353 # Here we assume that the socket is client-side, and not
1356 raise ValueError("attempt to connect already-connected SSLSocket!")
1388 a tuple containing that new connection wrapped with a server-side
1399 def get_channel_binding(self, cb_type="tls-unique"):
1434 raise ValueError("certfile must be specified for server-side "
1480 # return an integer, the previous mktime()-based implementation
1484 PEM_HEADER = "-----BEGIN CERTIFICATE-----"
1485 PEM_FOOTER = "-----END CERTIFICATE-----"
1499 DER-encoded version of it as a byte sequence"""
1507 d = pem_cert_string.strip()[len(PEM_HEADER):-len(PEM_FOOTER)]
1513 and return it as a PEM-encoded string.