You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: Doc/library/hashlib.rst
-2Lines changed: 0 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -280,8 +280,6 @@ include a `salt <https://en.wikipedia.org/wiki/Salt_%28cryptography%29>`_.
280
280
factor and *maxmem* limits memory (OpenSSL 1.1.0 defaults to 32 MiB).
@@ -58,6 +58,11 @@ by SSL sockets created through the :meth:`SSLContext.wrap_socket` method.
58
58
In the future the ssl module will require at least OpenSSL 1.0.2 or
59
59
1.1.0.
60
60
61
+
.. versionchanged:: 3.10
62
+
63
+
:pep:`644` has been implemented. The ssl module requires OpenSSL 1.1.1
64
+
or newer.
65
+
61
66
62
67
Functions, Constants, and Exceptions
63
68
------------------------------------
@@ -325,19 +330,6 @@ Random generation
325
330
:func:`ssl.RAND_egd` and :func:`ssl.RAND_add` to increase the randomness of
326
331
the pseudo-random number generator.
327
332
328
-
.. function:: RAND_egd(path)
329
-
330
-
If you are running an entropy-gathering daemon (EGD) somewhere, and *path*
331
-
is the pathname of a socket connection open to it, this will read 256 bytes
332
-
of randomness from the socket, and add it to the SSL pseudo-random number
333
-
generator to increase the security of generated secret keys. This is
334
-
typically only necessary on systems without better sources of randomness.
335
-
336
-
See http://egd.sourceforge.net/ or http://prngd.sourceforge.net/ for sources
337
-
of entropy-gathering daemons.
338
-
339
-
.. availability:: not available with LibreSSL and OpenSSL > 1.1.0.
340
-
341
333
.. function:: RAND_add(bytes, entropy)
342
334
343
335
Mix the given *bytes* into the SSL pseudo-random number generator. The
@@ -879,8 +871,6 @@ Constants
879
871
Disable compression on the SSL channel. This is useful if the application
880
872
protocol supports its own compression scheme.
881
873
882
-
This option is only available with OpenSSL 1.0.0 and later.
883
-
884
874
.. versionadded:: 3.3
885
875
886
876
.. class:: Options
@@ -1593,25 +1583,7 @@ to speed up repeated connections from the same clients.
@@ -1883,7 +1849,7 @@ to speed up repeated connections from the same clients.
1883
1849
.. method:: SSLContext.session_stats()
1884
1850
1885
1851
Get statistics about the SSL sessions created or managed by this context.
1886
-
A dictionary is returned which maps the names of each `piece of information <https://www.openssl.org/docs/man1.1.0/ssl/SSL_CTX_sess_number.html>`_ to their
1852
+
A dictionary is returned which maps the names of each `piece of information <https://www.openssl.org/docs/man1.1.1/ssl/SSL_CTX_sess_number.html>`_ to their
1887
1853
numeric values. For example, here is the total number of hits and misses
1888
1854
in the session cache since the context was created::
1889
1855
@@ -1926,10 +1892,6 @@ to speed up repeated connections from the same clients.
1926
1892
:attr:`~SSLContext.verify_mode` is :data:`CERT_NONE`. Previously
1927
1893
the same operation would have failed with a :exc:`ValueError`.
1928
1894
1929
-
.. note::
1930
-
1931
-
This features requires OpenSSL 0.9.8f or newer.
1932
-
1933
1895
.. attribute:: SSLContext.keylog_filename
1934
1896
1935
1897
Write TLS keys to a keylog file, whenever key material is generated or
@@ -1940,10 +1902,6 @@ to speed up repeated connections from the same clients.
1940
1902
1941
1903
.. versionadded:: 3.8
1942
1904
1943
-
.. note::
1944
-
1945
-
This features requires OpenSSL 1.1.1 or newer.
1946
-
1947
1905
.. attribute:: SSLContext.maximum_version
1948
1906
1949
1907
A :class:`TLSVersion` enum member representing the highest supported
@@ -1960,23 +1918,13 @@ to speed up repeated connections from the same clients.
1960
1918
:attr:`~SSLContext.maximum_version` set to :attr:`TLSVersion.TLSv1_2`
1961
1919
will not be able to establish a TLS 1.2 connection.
1962
1920
1963
-
.. note::
1964
-
1965
-
This attribute is not available unless the ssl module is compiled
1966
-
with OpenSSL 1.1.0g or newer.
1967
-
1968
1921
.. versionadded:: 3.7
1969
1922
1970
1923
.. attribute:: SSLContext.minimum_version
1971
1924
1972
1925
Like :attr:`SSLContext.maximum_version` except it is the lowest
1973
1926
supported version or :attr:`TLSVersion.MINIMUM_SUPPORTED`.
1974
1927
1975
-
.. note::
1976
-
1977
-
This attribute is not available unless the ssl module is compiled
1978
-
with OpenSSL 1.1.0g or newer.
1979
-
1980
1928
.. versionadded:: 3.7
1981
1929
1982
1930
.. attribute:: SSLContext.num_tickets
@@ -1985,11 +1933,6 @@ to speed up repeated connections from the same clients.
1985
1933
:attr:`TLS_PROTOCOL_SERVER` context. The setting has no impact on TLS
1986
1934
1.0 to 1.2 connections.
1987
1935
1988
-
.. note::
1989
-
1990
-
This attribute is not available unless the ssl module is compiled
1991
-
with OpenSSL 1.1.1 or newer.
1992
-
1993
1936
.. versionadded:: 3.8
1994
1937
1995
1938
.. attribute:: SSLContext.options
@@ -1998,11 +1941,6 @@ to speed up repeated connections from the same clients.
1998
1941
The default value is :data:`OP_ALL`, but you can specify other options
1999
1942
such as :data:`OP_NO_SSLv2` by ORing them together.
2000
1943
2001
-
.. note::
2002
-
With versions of OpenSSL older than 0.9.8m, it is only possible
2003
-
to set options, not to clear them. Attempting to clear an option
2004
-
(by resetting the corresponding bits) will raise a :exc:`ValueError`.
0 commit comments