1. 26 Oct, 2010 13 commits
  2. 25 Oct, 2010 3 commits
  3. 22 Oct, 2010 11 commits
  4. 21 Oct, 2010 3 commits
  5. 20 Oct, 2010 4 commits
  6. 19 Oct, 2010 3 commits
  7. 15 Oct, 2010 3 commits
    • Michael Hanselmann's avatar
      Merge branch 'devel-2.2' · 25c45709
      Michael Hanselmann authored
      
      
      * devel-2.2:
        http.client: Disable SSL session ID cache
        Crude workaround for pylint breakage
      Signed-off-by: default avatarMichael Hanselmann <hansmi@google.com>
      Reviewed-by: default avatarGuido Trotter <ultrotter@google.com>
      25c45709
    • Apollon Oikonomopoulos's avatar
      http.client: Disable SSL session ID cache · 4ba4fe14
      Apollon Oikonomopoulos authored
      
      
      This patch disables the SSL session ID cache for all cURL operations.
      This is needed because http.HttpBase's PyOpenSSL implementation does not
      currently set a context using SSL_set_session_id_context(3SSL), cURL
      tries to re-use the session ID and, according to
      SSL_set_session_id_context(3SSL):
      
       If the session id context is not set on an SSL/TLS server and client
       certificates are used, stored sessions will not be reused but a fatal
       error will be flagged and the handshake will fail.
      
      Ideally, session caching should be either controlled, or disabled in
      HttpBase, however PyOpenSSL does not seem to implement
      SSL_CTX_set_session_cache_mode nor SSL_CTX_set_session_id_context which
      are used for these purposes (it seems that only M2Crypto's SSL module
      supports these).
      Signed-off-by: default avatarApollon Oikonomopoulos <apollon@noc.grnet.gr>
      Signed-off-by: default avatarMichael Hanselmann <hansmi@google.com>
      Reviewed-by: default avatarMichael Hanselmann <hansmi@google.com>
      4ba4fe14
    • Apollon Oikonomopoulos's avatar
      http.client: Disable SSL session ID cache · 7b70d7a8
      Apollon Oikonomopoulos authored
      
      
      This patch disables the SSL session ID cache for all cURL operations.
      This is needed because http.HttpBase's PyOpenSSL implementation does not
      currently set a context using SSL_set_session_id_context(3SSL), cURL
      tries to re-use the session ID and, according to
      SSL_set_session_id_context(3SSL):
      
       If the session id context is not set on an SSL/TLS server and client
       certificates are used, stored sessions will not be reused but a fatal
       error will be flagged and the handshake will fail.
      
      Ideally, session caching should be either controlled, or disabled in
      HttpBase, however PyOpenSSL does not seem to implement
      SSL_CTX_set_session_cache_mode nor SSL_CTX_set_session_id_context which
      are used for these purposes (it seems that only M2Crypto's SSL module
      supports these).
      Signed-off-by: default avatarApollon Oikonomopoulos <apollon@noc.grnet.gr>
      Signed-off-by: default avatarMichael Hanselmann <hansmi@google.com>
      Reviewed-by: default avatarMichael Hanselmann <hansmi@google.com>
      7b70d7a8