Thanks to visit codestin.com
Credit goes to github.com

Skip to content
Merged
Show file tree
Hide file tree
Changes from 1 commit
Commits
Show all changes
19 commits
Select commit Hold shift + click to select a range
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
Prev Previous commit
Next Next commit
Apply suggestions from code review
Co-authored-by: Victor Stinner <[email protected]>
  • Loading branch information
woodruffw and vstinner authored Dec 6, 2023
commit 792383ae37ffcf11fe7144a8431556113eb2d071
2 changes: 1 addition & 1 deletion Doc/library/ssl.rst
Original file line number Diff line number Diff line change
Expand Up @@ -180,7 +180,7 @@ purposes.

.. note::
This context enables :data:`VERIFY_X509_STRICT` by default, which
may reject older (pre-:rfc:`5280`) or malformed certificates that the
may reject pre-:rfc:`5280` or malformed certificates that the
underlying OpenSSL implementation otherwise would accept. While disabling
this is not recommended, you can do so using::

Expand Down
1 change: 1 addition & 0 deletions Lib/ssl.py
Original file line number Diff line number Diff line change
Expand Up @@ -707,6 +707,7 @@ def create_default_context(purpose=Purpose.SERVER_AUTH, *, cafile=None,
# `VERIFY_X509_PARTIAL_CHAIN` makes OpenSSL's chain building behave more
# like RFC 3280 and 5280, which specify that chain building stops with the
# first trust anchor, even if that anchor is not self-signed.
Comment thread
woodruffw marked this conversation as resolved.
#
# `VERIFY_X509_STRICT` makes OpenSSL more conservative about the
# certificates it accepts, including "disabling workarounds for
# some broken certificates."
Expand Down