Message190709
The patch adds two methods to SSLContext which return information about loaded x509 certs, CRL and CAs.
Example:
>>> ctx = ssl.SSLContext(ssl.PROTOCOL_TLSv1)
>>> ctx.load_verify_locations(SVN_PYTHON_ORG_ROOT_CERT)
>>> ctx.cert_store_stats()
{'crl': 0, 'x509': 1}
>>> ctx.get_ca_list()
[{'issuer': ((('organizationName', 'Root CA'),),
(('organizationalUnitName', 'http://www.cacert.org'),),
(('commonName', 'CA Cert Signing Authority'),),
(('emailAddress', 'support@cacert.org'),)),
'notAfter': 'Mar 29 12:29:49 2033 GMT',
'notBefore': 'Mar 30 12:29:49 2003 GMT',
'serialNumber': '00',
'subject': ((('organizationName', 'Root CA'),),
(('organizationalUnitName', 'http://www.cacert.org'),),
(('commonName', 'CA Cert Signing Authority'),),
(('emailAddress', 'support@cacert.org'),)),
'version': 3}] |
|
Date |
User |
Action |
Args |
2013-06-06 10:19:29 | christian.heimes | set | recipients:
+ christian.heimes, brett.cannon, pitrou |
2013-06-06 10:19:29 | christian.heimes | set | messageid: <1370513969.26.0.776855011912.issue18147@psf.upfronthosting.co.za> |
2013-06-06 10:19:29 | christian.heimes | link | issue18147 messages |
2013-06-06 10:19:29 | christian.heimes | create | |
|