CINXE.COM

PEP 748 – A Unified TLS API for Python | peps.python.org

<!DOCTYPE html> <html lang="en"> <head> <meta charset="utf-8"> <meta name="viewport" content="width=device-width, initial-scale=1.0"> <meta name="color-scheme" content="light dark"> <title>PEP 748 – A Unified TLS API for Python | peps.python.org</title> <link rel="shortcut icon" href="../_static/py.png"> <link rel="canonical" href="https://peps.python.org/pep-0748/"> <link rel="stylesheet" href="../_static/style.css" type="text/css"> <link rel="stylesheet" href="../_static/mq.css" type="text/css"> <link rel="stylesheet" href="../_static/pygments.css" type="text/css" media="(prefers-color-scheme: light)" id="pyg-light"> <link rel="stylesheet" href="../_static/pygments_dark.css" type="text/css" media="(prefers-color-scheme: dark)" id="pyg-dark"> <link rel="alternate" type="application/rss+xml" title="Latest PEPs" href="https://peps.python.org/peps.rss"> <meta property="og:title" content='PEP 748 – A Unified TLS API for Python | peps.python.org'> <meta property="og:description" content="This PEP defines a standard TLS interface in the form of a collection of protocol classes. This interface will allow Python implementations and third-party libraries to provide bindings to TLS libraries other than OpenSSL."> <meta property="og:type" content="website"> <meta property="og:url" content="https://peps.python.org/pep-0748/"> <meta property="og:site_name" content="Python Enhancement Proposals (PEPs)"> <meta property="og:image" content="https://peps.python.org/_static/og-image.png"> <meta property="og:image:alt" content="Python PEPs"> <meta property="og:image:width" content="200"> <meta property="og:image:height" content="200"> <meta name="description" content="This PEP defines a standard TLS interface in the form of a collection of protocol classes. This interface will allow Python implementations and third-party libraries to provide bindings to TLS libraries other than OpenSSL."> <meta name="theme-color" content="#3776ab"> </head> <body> <svg xmlns="http://www.w3.org/2000/svg" style="display: none;"> <symbol id="svg-sun-half" viewBox="0 0 24 24" pointer-events="all"> <title>Following system colour scheme</title> <svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round"> <circle cx="12" cy="12" r="9"></circle> <path d="M12 3v18m0-12l4.65-4.65M12 14.3l7.37-7.37M12 19.6l8.85-8.85"></path> </svg> </symbol> <symbol id="svg-moon" viewBox="0 0 24 24" pointer-events="all"> <title>Selected dark colour scheme</title> <svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round"> <path stroke="none" d="M0 0h24v24H0z" fill="none"></path> <path d="M12 3c.132 0 .263 0 .393 0a7.5 7.5 0 0 0 7.92 12.446a9 9 0 1 1 -8.313 -12.454z"></path> </svg> </symbol> <symbol id="svg-sun" viewBox="0 0 24 24" pointer-events="all"> <title>Selected light colour scheme</title> <svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round"> <circle cx="12" cy="12" r="5"></circle> <line x1="12" y1="1" x2="12" y2="3"></line> <line x1="12" y1="21" x2="12" y2="23"></line> <line x1="4.22" y1="4.22" x2="5.64" y2="5.64"></line> <line x1="18.36" y1="18.36" x2="19.78" y2="19.78"></line> <line x1="1" y1="12" x2="3" y2="12"></line> <line x1="21" y1="12" x2="23" y2="12"></line> <line x1="4.22" y1="19.78" x2="5.64" y2="18.36"></line> <line x1="18.36" y1="5.64" x2="19.78" y2="4.22"></line> </svg> </symbol> </svg> <script> document.documentElement.dataset.colour_scheme = localStorage.getItem("colour_scheme") || "auto" </script> <section id="pep-page-section"> <header> <h1>Python Enhancement Proposals</h1> <ul class="breadcrumbs"> <li><a href="https://www.python.org/" title="The Python Programming Language">Python</a> &raquo; </li> <li><a href="../pep-0000/">PEP Index</a> &raquo; </li> <li>PEP 748</li> </ul> <button id="colour-scheme-cycler" onClick="setColourScheme(nextColourScheme())"> <svg aria-hidden="true" class="colour-scheme-icon-when-auto"><use href="#svg-sun-half"></use></svg> <svg aria-hidden="true" class="colour-scheme-icon-when-dark"><use href="#svg-moon"></use></svg> <svg aria-hidden="true" class="colour-scheme-icon-when-light"><use href="#svg-sun"></use></svg> <span class="visually-hidden">Toggle light / dark / auto colour theme</span> </button> </header> <article> <section id="pep-content"> <h1 class="page-title">PEP 748 – A Unified TLS API for Python</h1> <dl class="rfc2822 field-list simple"> <dt class="field-odd">Author<span class="colon">:</span></dt> <dd class="field-odd">Joop van de Pol &lt;joop.vandepol&#32;&#97;t&#32;trailofbits.com&gt;, William Woodruff &lt;william&#32;&#97;t&#32;yossarian.net&gt;</dd> <dt class="field-even">Sponsor<span class="colon">:</span></dt> <dd class="field-even">Alyssa Coghlan &lt;ncoghlan&#32;&#97;t&#32;gmail.com&gt;</dd> <dt class="field-odd">Discussions-To<span class="colon">:</span></dt> <dd class="field-odd"><a class="reference external" href="https://discuss.python.org/t/pre-pep-discussion-revival-of-pep-543/51263">Discourse thread</a></dd> <dt class="field-even">Status<span class="colon">:</span></dt> <dd class="field-even"><abbr title="Proposal under active discussion and revision">Draft</abbr></dd> <dt class="field-odd">Type<span class="colon">:</span></dt> <dd class="field-odd"><abbr title="Normative PEP with a new feature for Python, implementation change for CPython or interoperability standard for the ecosystem">Standards Track</abbr></dd> <dt class="field-even">Created<span class="colon">:</span></dt> <dd class="field-even">27-Jun-2024</dd> <dt class="field-odd">Python-Version<span class="colon">:</span></dt> <dd class="field-odd">3.14</dd> <dt class="field-even">Post-History<span class="colon">:</span></dt> <dd class="field-even"><a class="reference external" href="https://discuss.python.org/t/pre-pep-discussion-revival-of-pep-543/51263" title="Discourse thread">17-Apr-2024</a></dd> <dt class="field-odd">Replaces<span class="colon">:</span></dt> <dd class="field-odd"><a class="reference external" href="../pep-0543/">543</a></dd> </dl> <hr class="docutils" /> <section id="contents"> <details><summary>Table of Contents</summary><ul class="simple"> <li><a class="reference internal" href="#abstract">Abstract</a></li> <li><a class="reference internal" href="#rationale">Rationale</a><ul> <li><a class="reference internal" href="#problems">Problems</a></li> </ul> </li> <li><a class="reference internal" href="#proposal">Proposal</a><ul> <li><a class="reference internal" href="#interfaces">Interfaces</a><ul> <li><a class="reference internal" href="#configuration">Configuration</a></li> <li><a class="reference internal" href="#context">Context</a></li> <li><a class="reference internal" href="#socket">Socket</a></li> <li><a class="reference internal" href="#buffer">Buffer</a></li> <li><a class="reference internal" href="#cipher-suites">Cipher Suites</a><ul> <li><a class="reference internal" href="#openssl">OpenSSL</a></li> <li><a class="reference internal" href="#network-framework">Network Framework</a></li> <li><a class="reference internal" href="#schannel">SChannel</a></li> <li><a class="reference internal" href="#network-security-services-nss">Network Security Services (NSS)</a></li> <li><a class="reference internal" href="#proposed-interface">Proposed Interface</a></li> </ul> </li> <li><a class="reference internal" href="#protocol-negotiation">Protocol Negotiation</a></li> <li><a class="reference internal" href="#tls-versions">TLS Versions</a></li> <li><a class="reference internal" href="#errors">Errors</a></li> <li><a class="reference internal" href="#certificates">Certificates</a></li> <li><a class="reference internal" href="#private-keys">Private Keys</a></li> <li><a class="reference internal" href="#signing-chain">Signing Chain</a></li> <li><a class="reference internal" href="#trust-store">Trust Store</a></li> <li><a class="reference internal" href="#runtime-access">Runtime Access</a></li> </ul> </li> <li><a class="reference internal" href="#insecure-usage">Insecure Usage</a></li> </ul> </li> <li><a class="reference internal" href="#changes-to-the-standard-library">Changes to the Standard Library</a><ul> <li><a class="reference internal" href="#migration-of-the-ssl-module">Migration of the ssl module</a></li> </ul> </li> <li><a class="reference internal" href="#future">Future</a></li> <li><a class="reference internal" href="#credits">Credits</a></li> <li><a class="reference internal" href="#copyright">Copyright</a></li> </ul> </details></section> <section id="abstract"> <h2><a class="toc-backref" href="#abstract" role="doc-backlink">Abstract</a></h2> <p>This PEP defines a standard TLS interface in the form of a collection of protocol classes. This interface will allow Python implementations and third-party libraries to provide bindings to TLS libraries other than OpenSSL.</p> <p>These bindings can be used by tools that expect the interface provided by the Python standard library, with the goal of reducing the dependence of the Python ecosystem on OpenSSL.</p> </section> <section id="rationale"> <h2><a class="toc-backref" href="#rationale" role="doc-backlink">Rationale</a></h2> <p>It has become increasingly clear that robust and user-friendly TLS support is an extremely important part of the ecosystem of any popular programming language. For most of its lifetime, this role in the Python ecosystem has primarily been served by the <a class="reference external" href="https://docs.python.org/3/library/ssl.html#module-ssl" title="(in Python v3.13)"><code class="xref py py-mod docutils literal notranslate"><span class="pre">ssl</span></code></a> module, which provides a Python API to the <a class="reference external" href="https://www.openssl.org/">OpenSSL library</a>.</p> <p>Because the <a class="reference external" href="https://docs.python.org/3/library/ssl.html#module-ssl" title="(in Python v3.13)"><code class="xref py py-mod docutils literal notranslate"><span class="pre">ssl</span></code></a> module is distributed with the Python standard library, it has become the overwhelmingly most popular method for handling TLS in Python. A majority of Python libraries, both in the standard library and on the Python Package Index, rely on the <a class="reference external" href="https://docs.python.org/3/library/ssl.html#module-ssl" title="(in Python v3.13)"><code class="xref py py-mod docutils literal notranslate"><span class="pre">ssl</span></code></a> module for their TLS connectivity.</p> <p>Unfortunately, the preeminence of the <a class="reference external" href="https://docs.python.org/3/library/ssl.html#module-ssl" title="(in Python v3.13)"><code class="xref py py-mod docutils literal notranslate"><span class="pre">ssl</span></code></a> module has had a number of tied the entire Python ecosystem tightly to OpenSSL. This has forced Python users to use OpenSSL even in situations where it may provide a worse user experience than alternative TLS implementations, which imposes a cognitive burden and makes it hard to provide “platform-native” experiences.</p> <section id="problems"> <h3><a class="toc-backref" href="#problems" role="doc-backlink">Problems</a></h3> <p>The fact that the <a class="reference external" href="https://docs.python.org/3/library/ssl.html#module-ssl" title="(in Python v3.13)"><code class="xref py py-mod docutils literal notranslate"><span class="pre">ssl</span></code></a> module is built into the standard library has meant that all standard-library Python networking libraries are entirely reliant on the OpenSSL that the Python implementation has been linked against. This leads to the following issues:</p> <ul class="simple"> <li>It is difficult to take advantage of new, higher-security TLS without recompiling Python to get a new OpenSSL. While there are third-party bindings to OpenSSL (e.g. <a class="reference external" href="https://pypi.org/project/pyOpenSSL/">pyOpenSSL</a>), these need to be shimmed into a format that the standard library understands, forcing projects that want to use them to maintain substantial compatibility layers.</li> <li>Windows distributions of Python need to be shipped with a copy of OpenSSL. This puts the CPython development team in the position of being OpenSSL redistributors, potentially needing to ship security updates to the Windows Python distributions when OpenSSL vulnerabilities are released.</li> <li>macOS distributions of Python need either to be shipped with a copy of OpenSSL or linked against the system OpenSSL library. Apple has formally deprecated linking against the system OpenSSL library, and even if they had not, that library version has been unsupported by upstream for nearly one year as of the time of writing. The CPython development team has started shipping newer OpenSSLs with the Python available from python.org, but this has the same problem as with Windows.</li> <li>Users may wish to integrate with TLS libraries other than OpenSSL for other reasons, such as maintenance burden versus a system-provided implementation, or because OpenSSL is simply too large and unwieldy for their platform (e.g. for embedded Python). Those users are left with the requirement to use third-party networking libraries that can interact with their preferred TLS library or to shim their preferred library into the OpenSSL-specific <a class="reference external" href="https://docs.python.org/3/library/ssl.html#module-ssl" title="(in Python v3.13)"><code class="xref py py-mod docutils literal notranslate"><span class="pre">ssl</span></code></a> module API.</li> </ul> <p>Additionally, the <a class="reference external" href="https://docs.python.org/3/library/ssl.html#module-ssl" title="(in Python v3.13)"><code class="xref py py-mod docutils literal notranslate"><span class="pre">ssl</span></code></a> module as implemented today limits the ability of CPython itself to add support for alternative TLS implementations, or remove OpenSSL support entirely, should either of these become necessary or useful. The <a class="reference external" href="https://docs.python.org/3/library/ssl.html#module-ssl" title="(in Python v3.13)"><code class="xref py py-mod docutils literal notranslate"><span class="pre">ssl</span></code></a> module exposes too many OpenSSL-specific function calls and features to easily map to an alternative TLS implementation.</p> </section> </section> <section id="proposal"> <h2><a class="toc-backref" href="#proposal" role="doc-backlink">Proposal</a></h2> <p>This PEP proposes to introduce a few new Protocol Classes in Python 3.14 to provide TLS functionality that is not so strongly tied to OpenSSL. It also proposes to update standard library modules to use only the interface exposed by these protocol classes wherever possible. There are three goals here:</p> <ol class="arabic simple"> <li>To provide a common API surface for both core and third-party developers to target their TLS implementations to. This allows TLS developers to provide interfaces that can be used by most Python code, and allows network developers to have an interface that they can target that will work with a wide range of TLS implementations.</li> <li>To provide an API that has few or no OpenSSL-specific concepts leak through. The <a class="reference external" href="https://docs.python.org/3/library/ssl.html#module-ssl" title="(in Python v3.13)"><code class="xref py py-mod docutils literal notranslate"><span class="pre">ssl</span></code></a> module today has a number of warts caused by leaking OpenSSL concepts through to the API: the new protocol classes would remove those specific concepts.</li> <li>To provide a path for the core development team to make OpenSSL one of many possible TLS implementations, rather than requiring that it be present on a system in order for Python to have TLS support.</li> </ol> <p>The proposed interface is laid out below.</p> <section id="interfaces"> <h3><a class="toc-backref" href="#interfaces" role="doc-backlink">Interfaces</a></h3> <p>There are several interfaces that require standardization. Those interfaces are:</p> <ol class="arabic simple"> <li>Configuring TLS, currently implemented by the <a class="reference external" href="https://docs.python.org/3/library/ssl.html#ssl.SSLContext" title="(in Python v3.13)"><code class="xref py py-class docutils literal notranslate"><span class="pre">SSLContext</span></code></a> class in the <a class="reference external" href="https://docs.python.org/3/library/ssl.html#module-ssl" title="(in Python v3.13)"><code class="xref py py-mod docutils literal notranslate"><span class="pre">ssl</span></code></a> module.</li> <li>Providing an in-memory buffer for doing in-memory encryption or decryption with no actual I/O (necessary for asynchronous I/O models), currently implemented by the <a class="reference external" href="https://docs.python.org/3/library/ssl.html#ssl.SSLObject" title="(in Python v3.13)"><code class="xref py py-class docutils literal notranslate"><span class="pre">SSLObject</span></code></a> class in the <a class="reference external" href="https://docs.python.org/3/library/ssl.html#module-ssl" title="(in Python v3.13)"><code class="xref py py-mod docutils literal notranslate"><span class="pre">ssl</span></code></a> module.</li> <li>Wrapping a socket object, currently implemented by the <a class="reference external" href="https://docs.python.org/3/library/ssl.html#ssl.SSLSocket" title="(in Python v3.13)"><code class="xref py py-class docutils literal notranslate"><span class="pre">SSLSocket</span></code></a> class in the <a class="reference external" href="https://docs.python.org/3/library/ssl.html#module-ssl" title="(in Python v3.13)"><code class="xref py py-mod docutils literal notranslate"><span class="pre">ssl</span></code></a> module.</li> <li>Applying TLS configuration to the wrapping objects in (2) and (3). Currently this is also implemented by the SSLContext class in the <a class="reference external" href="https://docs.python.org/3/library/ssl.html#module-ssl" title="(in Python v3.13)"><code class="xref py py-mod docutils literal notranslate"><span class="pre">ssl</span></code></a> module.</li> <li>Specifying TLS cipher suites. There is currently no code for doing this in the standard library: instead, the standard library uses OpenSSL cipher suite strings.</li> <li>Specifying application-layer protocols that can be negotiated during the TLS handshake.</li> <li>Specifying TLS versions.</li> <li>Reporting errors to the caller, currently implemented by the <a class="reference external" href="https://docs.python.org/3/library/ssl.html#ssl.SSLError" title="(in Python v3.13)"><code class="xref py py-class docutils literal notranslate"><span class="pre">SSLError</span></code></a> class in the <a class="reference external" href="https://docs.python.org/3/library/ssl.html#module-ssl" title="(in Python v3.13)"><code class="xref py py-mod docutils literal notranslate"><span class="pre">ssl</span></code></a> module.</li> <li>Specifying certificates to load, either as client or server certificates.</li> <li>Specifying which trust database should be used to validate certificates presented by a remote peer.</li> <li>Finding a way to get hold of these interfaces at run time.</li> </ol> <p>For the sake of simplicity, this PEP proposes to remove interfaces (3) and (4), and replace them by a simpler interface that returns a socket which ensures that all communication through the socket is protected by TLS. In other words, this interface treats concepts such as socket initialization, the TLS handshake, Server Name Indication (SNI), etc., as an atomic part of creating a client or server connection. However, in-memory buffers are still supported, as they are useful for asynchronous communication.</p> <p>Obviously, (5) doesn’t require a protocol class: instead, it requires a richer API for configuring supported cipher suites that can be easily updated with supported cipher suites for different implementations.</p> <p>(9) is a thorny problem, because in an ideal world the private keys associated with these certificates would never end up in-memory in the Python process (that is, the TLS library would collaborate with a Hardware Security Module (HSM) to provide the private key in such a way that it cannot be extracted from process memory). Thus, we need to provide an extensible model of providing certificates that allows concrete implementations the ability to provide this higher level of security, while also allowing a lower bar for those implementations that cannot. This lower bar would be the same as the status quo: that is, the certificate may be loaded from an in-memory buffer, from a file on disk, or additionally referenced by some arbitrary ID corresponding to a system certificate store.</p> <p>(10) also represents an issue because different TLS implementations vary wildly in how they allow users to select trust stores. Some implementations have specific trust store formats that only they can use (such as the OpenSSL CA directory format that is created by c_rehash), and others may not allow you to specify a trust store that does not include their default trust store. On the other hand, most implementations will support some form of loading custom DER- or PEM-encoded certificates.</p> <p>For this reason, we need to provide a model that assumes very little about the form that trust stores take, while maintaining type-compatibility with other implementations. The sections “Certificate”, “Private Keys”, and “Trust Store” below go into more detail about how this is achieved.</p> <p>Finally, this API will split the responsibilities currently assumed by the <a class="reference external" href="https://docs.python.org/3/library/ssl.html#ssl.SSLContext" title="(in Python v3.13)"><code class="xref py py-class docutils literal notranslate"><span class="pre">SSLContext</span></code></a> object: specifically, the responsibility for holding and managing configuration and the responsibility for using that configuration to build buffers or sockets.</p> <p>This is necessary primarily for supporting functionality like Server Name Indication (SNI). In OpenSSL (and thus in the <a class="reference external" href="https://docs.python.org/3/library/ssl.html#module-ssl" title="(in Python v3.13)"><code class="xref py py-mod docutils literal notranslate"><span class="pre">ssl</span></code></a> module), the server has the ability to modify the TLS configuration in response to the client telling the server what hostname it is trying to reach. This is mostly used to change the certificate chain so as to present the correct TLS certificate chain for the given hostname. The specific mechanism by which this is done is by returning a new <a class="reference external" href="https://docs.python.org/3/library/ssl.html#ssl.SSLContext" title="(in Python v3.13)"><code class="xref py py-class docutils literal notranslate"><span class="pre">SSLContext</span></code></a> object with the appropriate configuration as part of a user-provided SNI callback function.</p> <p>This is not a model that maps well to other TLS implementations, and puts a burden on users to write callback functions. Instead, we propose that the concrete implementations handle SNI transparently for every user after receiving the relevant certificates.</p> <p>For this reason, we split the responsibility of <a class="reference external" href="https://docs.python.org/3/library/ssl.html#ssl.SSLContext" title="(in Python v3.13)"><code class="xref py py-class docutils literal notranslate"><span class="pre">SSLContext</span></code></a> into two separate objects, which are each split into server and client versions. The <code class="docutils literal notranslate"><span class="pre">TLSServerConfiguration</span></code> and <code class="docutils literal notranslate"><span class="pre">TLSClientConfiguration</span></code> objects act as containers for a TLS configuration: the ClientContext and ServerContext objects are instantiated with a <code class="docutils literal notranslate"><span class="pre">TLSClientConfiguration</span></code> and <code class="docutils literal notranslate"><span class="pre">TLSServerConfiguration</span></code> object, respectively, and are used to create buffers or sockets. All four objects would be immutable.</p> <div class="admonition note"> <p class="admonition-title">Note</p> <p>The following API declarations uniformly use type hints to aid reading.</p> </div> <section id="configuration"> <h4><a class="toc-backref" href="#configuration" role="doc-backlink">Configuration</a></h4> <p>The <code class="docutils literal notranslate"><span class="pre">TLSServerConfiguration</span></code> and <code class="docutils literal notranslate"><span class="pre">TLSClientConfiguration</span></code> concrete classes define objects that can hold and manage TLS configuration. The goals of these classes are as follows:</p> <ol class="arabic simple"> <li>To provide a method of specifying TLS configuration that avoids the risk of errors in typing (this excludes the use of a simple dictionary).</li> <li>To provide an object that can be safely compared to other configuration objects to detect changes in TLS configuration, for use with the SNI callback.</li> </ol> <p>These classes are not protocol classes, primarily because they are not expected to have implementation-specific behavior. The responsibility for transforming a <code class="docutils literal notranslate"><span class="pre">TLSServerConfiguration</span></code> or <code class="docutils literal notranslate"><span class="pre">TLSClientConfiguration</span></code> object into a useful set of configurations for a given TLS implementation belongs to the Context objects discussed below.</p> <p>These classes have one other notable property: they are immutable. This is a desirable trait for a few reasons. The most important one is that immutability by default is a good engineering practice. As a side benefit, it allows these objects to be used as dictionary keys, which is potentially useful for specific TLS implementations and their SNI configuration. On top of this, it frees implementations from needing to worry about their configuration objects being changed under their feet, which allows them to avoid needing to carefully synchronize changes between their concrete data structures and the configuration object.</p> <p>These objects are extendable: that is, future releases of Python may add configuration fields to these objects as they become useful. For backwards-compatibility purposes, new fields are only appended to these objects. Existing fields will never be removed, renamed, or reordered. They are split between client and server to minimize API confusion.</p> <p>The <code class="docutils literal notranslate"><span class="pre">TLSClientConfiguration</span></code> class would be defined by the following code:</p> <div class="highlight-python notranslate"><div class="highlight"><pre><span></span><span class="k">class</span><span class="w"> </span><span class="nc">TLSClientConfiguration</span><span class="p">:</span> <span class="vm">__slots__</span> <span class="o">=</span> <span class="p">(</span> <span class="s2">&quot;_certificate_chain&quot;</span><span class="p">,</span> <span class="s2">&quot;_ciphers&quot;</span><span class="p">,</span> <span class="s2">&quot;_inner_protocols&quot;</span><span class="p">,</span> <span class="s2">&quot;_lowest_supported_version&quot;</span><span class="p">,</span> <span class="s2">&quot;_highest_supported_version&quot;</span><span class="p">,</span> <span class="s2">&quot;_trust_store&quot;</span><span class="p">,</span> <span class="p">)</span> <span class="k">def</span><span class="w"> </span><span class="fm">__init__</span><span class="p">(</span> <span class="bp">self</span><span class="p">,</span> <span class="n">certificate_chain</span><span class="p">:</span> <span class="n">SigningChain</span> <span class="o">|</span> <span class="kc">None</span> <span class="o">=</span> <span class="kc">None</span><span class="p">,</span> <span class="n">ciphers</span><span class="p">:</span> <span class="n">Sequence</span><span class="p">[</span><span class="n">CipherSuite</span><span class="p">]</span> <span class="o">|</span> <span class="kc">None</span> <span class="o">=</span> <span class="kc">None</span><span class="p">,</span> <span class="n">inner_protocols</span><span class="p">:</span> <span class="n">Sequence</span><span class="p">[</span><span class="n">NextProtocol</span> <span class="o">|</span> <span class="nb">bytes</span><span class="p">]</span> <span class="o">|</span> <span class="kc">None</span> <span class="o">=</span> <span class="kc">None</span><span class="p">,</span> <span class="n">lowest_supported_version</span><span class="p">:</span> <span class="n">TLSVersion</span> <span class="o">|</span> <span class="kc">None</span> <span class="o">=</span> <span class="kc">None</span><span class="p">,</span> <span class="n">highest_supported_version</span><span class="p">:</span> <span class="n">TLSVersion</span> <span class="o">|</span> <span class="kc">None</span> <span class="o">=</span> <span class="kc">None</span><span class="p">,</span> <span class="n">trust_store</span><span class="p">:</span> <span class="n">TrustStore</span> <span class="o">|</span> <span class="kc">None</span> <span class="o">=</span> <span class="kc">None</span><span class="p">,</span> <span class="p">)</span> <span class="o">-&gt;</span> <span class="kc">None</span><span class="p">:</span> <span class="k">if</span> <span class="n">inner_protocols</span> <span class="ow">is</span> <span class="kc">None</span><span class="p">:</span> <span class="n">inner_protocols</span> <span class="o">=</span> <span class="p">[]</span> <span class="bp">self</span><span class="o">.</span><span class="n">_certificate_chain</span> <span class="o">=</span> <span class="n">certificate_chain</span> <span class="bp">self</span><span class="o">.</span><span class="n">_ciphers</span> <span class="o">=</span> <span class="n">ciphers</span> <span class="bp">self</span><span class="o">.</span><span class="n">_inner_protocols</span> <span class="o">=</span> <span class="n">inner_protocols</span> <span class="bp">self</span><span class="o">.</span><span class="n">_lowest_supported_version</span> <span class="o">=</span> <span class="n">lowest_supported_version</span> <span class="bp">self</span><span class="o">.</span><span class="n">_highest_supported_version</span> <span class="o">=</span> <span class="n">highest_supported_version</span> <span class="bp">self</span><span class="o">.</span><span class="n">_trust_store</span> <span class="o">=</span> <span class="n">trust_store</span> <span class="nd">@property</span> <span class="k">def</span><span class="w"> </span><span class="nf">certificate_chain</span><span class="p">(</span><span class="bp">self</span><span class="p">)</span> <span class="o">-&gt;</span> <span class="n">SigningChain</span> <span class="o">|</span> <span class="kc">None</span><span class="p">:</span> <span class="k">return</span> <span class="bp">self</span><span class="o">.</span><span class="n">_certificate_chain</span> <span class="nd">@property</span> <span class="k">def</span><span class="w"> </span><span class="nf">ciphers</span><span class="p">(</span><span class="bp">self</span><span class="p">)</span> <span class="o">-&gt;</span> <span class="n">Sequence</span><span class="p">[</span><span class="n">CipherSuite</span> <span class="o">|</span> <span class="nb">int</span><span class="p">]</span> <span class="o">|</span> <span class="kc">None</span><span class="p">:</span> <span class="k">return</span> <span class="bp">self</span><span class="o">.</span><span class="n">_ciphers</span> <span class="nd">@property</span> <span class="k">def</span><span class="w"> </span><span class="nf">inner_protocols</span><span class="p">(</span><span class="bp">self</span><span class="p">)</span> <span class="o">-&gt;</span> <span class="n">Sequence</span><span class="p">[</span><span class="n">NextProtocol</span> <span class="o">|</span> <span class="nb">bytes</span><span class="p">]:</span> <span class="k">return</span> <span class="bp">self</span><span class="o">.</span><span class="n">_inner_protocols</span> <span class="nd">@property</span> <span class="k">def</span><span class="w"> </span><span class="nf">lowest_supported_version</span><span class="p">(</span><span class="bp">self</span><span class="p">)</span> <span class="o">-&gt;</span> <span class="n">TLSVersion</span> <span class="o">|</span> <span class="kc">None</span><span class="p">:</span> <span class="k">return</span> <span class="bp">self</span><span class="o">.</span><span class="n">_lowest_supported_version</span> <span class="nd">@property</span> <span class="k">def</span><span class="w"> </span><span class="nf">highest_supported_version</span><span class="p">(</span><span class="bp">self</span><span class="p">)</span> <span class="o">-&gt;</span> <span class="n">TLSVersion</span> <span class="o">|</span> <span class="kc">None</span><span class="p">:</span> <span class="k">return</span> <span class="bp">self</span><span class="o">.</span><span class="n">_highest_supported_version</span> <span class="nd">@property</span> <span class="k">def</span><span class="w"> </span><span class="nf">trust_store</span><span class="p">(</span><span class="bp">self</span><span class="p">)</span> <span class="o">-&gt;</span> <span class="n">TrustStore</span> <span class="o">|</span> <span class="kc">None</span><span class="p">:</span> <span class="k">return</span> <span class="bp">self</span><span class="o">.</span><span class="n">_trust_store</span> </pre></div> </div> <p>The <code class="docutils literal notranslate"><span class="pre">TLSServerConfiguration</span></code> object is similar to the client one, except that it takes a <code class="docutils literal notranslate"><span class="pre">Sequence[SigningChain]</span></code> as the <code class="docutils literal notranslate"><span class="pre">certificate_chain</span></code> parameter.</p> </section> <section id="context"> <h4><a class="toc-backref" href="#context" role="doc-backlink">Context</a></h4> <p>We define two Context protocol classes. These protocol classes define objects that allow configuration of TLS to be applied to specific connections. They can be thought of as factories for <code class="docutils literal notranslate"><span class="pre">TLSSocket</span></code> and <code class="docutils literal notranslate"><span class="pre">TLSBuffer</span></code> objects.</p> <p>Unlike the current <a class="reference external" href="https://docs.python.org/3/library/ssl.html#module-ssl" title="(in Python v3.13)"><code class="xref py py-mod docutils literal notranslate"><span class="pre">ssl</span></code></a> module, we provide two context classes instead of one. Specifically, we provide the <code class="docutils literal notranslate"><span class="pre">ClientContext</span></code> and <code class="docutils literal notranslate"><span class="pre">ServerContext</span></code> classes. This simplifies the APIs (for example, there is no sense in the server providing the <code class="docutils literal notranslate"><span class="pre">server_hostname</span></code> parameter to <a class="reference external" href="https://docs.python.org/3/library/ssl.html#ssl.SSLContext.wrap_socket" title="(in Python v3.13)"><code class="xref py py-meth docutils literal notranslate"><span class="pre">wrap_socket()</span></code></a>, but because there is only one context class that parameter is still available), and ensures that implementations know as early as possible which side of a TLS connection they will serve. Additionally, it allows implementations to opt-out of one or either side of the connection.</p> <p>As much as possible implementers should aim to make these classes immutable: that is, they should prefer not to allow users to mutate their internal state directly, instead preferring to create new contexts from new TLSConfiguration objects. Obviously, the protocol classes cannot enforce this constraint, and so they do not attempt to.</p> <p>The <code class="docutils literal notranslate"><span class="pre">ClientContext</span></code> protocol class has the following class definition:</p> <div class="highlight-python notranslate"><div class="highlight"><pre><span></span><span class="k">class</span><span class="w"> </span><span class="nc">ClientContext</span><span class="p">(</span><span class="n">Protocol</span><span class="p">):</span> <span class="nd">@abstractmethod</span> <span class="k">def</span><span class="w"> </span><span class="fm">__init__</span><span class="p">(</span><span class="bp">self</span><span class="p">,</span> <span class="n">configuration</span><span class="p">:</span> <span class="n">TLSClientConfiguration</span><span class="p">)</span> <span class="o">-&gt;</span> <span class="kc">None</span><span class="p">:</span> <span class="w"> </span><span class="sd">&quot;&quot;&quot;Create a new client context object from a given TLS client configuration.&quot;&quot;&quot;</span> <span class="o">...</span> <span class="nd">@property</span> <span class="nd">@abstractmethod</span> <span class="k">def</span><span class="w"> </span><span class="nf">configuration</span><span class="p">(</span><span class="bp">self</span><span class="p">)</span> <span class="o">-&gt;</span> <span class="n">TLSClientConfiguration</span><span class="p">:</span> <span class="w"> </span><span class="sd">&quot;&quot;&quot;Returns the TLS client configuration that was used to create the client context.&quot;&quot;&quot;</span> <span class="o">...</span> <span class="nd">@abstractmethod</span> <span class="k">def</span><span class="w"> </span><span class="nf">connect</span><span class="p">(</span><span class="bp">self</span><span class="p">,</span> <span class="n">address</span><span class="p">:</span> <span class="nb">tuple</span><span class="p">[</span><span class="nb">str</span> <span class="o">|</span> <span class="kc">None</span><span class="p">,</span> <span class="nb">int</span><span class="p">])</span> <span class="o">-&gt;</span> <span class="n">TLSSocket</span><span class="p">:</span> <span class="w"> </span><span class="sd">&quot;&quot;&quot;Creates a TLSSocket that behaves like a socket.socket, and</span> <span class="sd"> contains information about the TLS exchange</span> <span class="sd"> (cipher, negotiated_protocol, negotiated_tls_version, etc.).</span> <span class="sd"> &quot;&quot;&quot;</span> <span class="o">...</span> <span class="nd">@abstractmethod</span> <span class="k">def</span><span class="w"> </span><span class="nf">create_buffer</span><span class="p">(</span><span class="bp">self</span><span class="p">,</span> <span class="n">server_hostname</span><span class="p">:</span> <span class="nb">str</span><span class="p">)</span> <span class="o">-&gt;</span> <span class="n">TLSBuffer</span><span class="p">:</span> <span class="w"> </span><span class="sd">&quot;&quot;&quot;Creates a TLSBuffer that acts as an in-memory channel,</span> <span class="sd"> and contains information about the TLS exchange</span> <span class="sd"> (cipher, negotiated_protocol, negotiated_tls_version, etc.).&quot;&quot;&quot;</span> <span class="o">...</span> </pre></div> </div> <p>The <code class="docutils literal notranslate"><span class="pre">ServerContext</span></code> is similar, taking a <code class="docutils literal notranslate"><span class="pre">TLSServerConfiguration</span></code> instead.</p> </section> <section id="socket"> <h4><a class="toc-backref" href="#socket" role="doc-backlink">Socket</a></h4> <p>The context can be used to create sockets, which have to follow the specification of the <code class="docutils literal notranslate"><span class="pre">TLSSocket</span></code> protocol class. Specifically, implementations need to implement the following:</p> <ul class="simple"> <li><code class="docutils literal notranslate"><span class="pre">recv</span></code> and <code class="docutils literal notranslate"><span class="pre">send</span></code></li> <li><code class="docutils literal notranslate"><span class="pre">listen</span></code> and <code class="docutils literal notranslate"><span class="pre">accept</span></code></li> <li><code class="docutils literal notranslate"><span class="pre">close</span></code></li> <li><code class="docutils literal notranslate"><span class="pre">getsockname</span></code></li> <li><code class="docutils literal notranslate"><span class="pre">getpeername</span></code></li> </ul> <p>They also need to implement some interfaces that give information about the TLS connection, such as:</p> <ul class="simple"> <li>The underlying context object that was used to create this socket</li> <li>The negotiated cipher</li> <li>The negotiated “next” protocol</li> <li>The negotiated TLS version</li> </ul> <p>The following code describes these functions in more detail:</p> <div class="highlight-python notranslate"><div class="highlight"><pre><span></span><span class="k">class</span><span class="w"> </span><span class="nc">TLSSocket</span><span class="p">(</span><span class="n">Protocol</span><span class="p">):</span> <span class="w"> </span><span class="sd">&quot;&quot;&quot;This class implements a socket.socket-like object that creates an OS</span> <span class="sd"> socket, wraps it in an SSL context, and provides read and write methods</span> <span class="sd"> over that channel.&quot;&quot;&quot;</span> <span class="nd">@abstractmethod</span> <span class="k">def</span><span class="w"> </span><span class="fm">__init__</span><span class="p">(</span><span class="bp">self</span><span class="p">,</span> <span class="o">*</span><span class="n">args</span><span class="p">:</span> <span class="nb">tuple</span><span class="p">,</span> <span class="o">**</span><span class="n">kwargs</span><span class="p">:</span> <span class="nb">tuple</span><span class="p">)</span> <span class="o">-&gt;</span> <span class="kc">None</span><span class="p">:</span> <span class="w"> </span><span class="sd">&quot;&quot;&quot;TLSSockets should not be constructed by the user.</span> <span class="sd"> The implementation should implement a method to construct a TLSSocket</span> <span class="sd"> object and call it in ClientContext.connect() and</span> <span class="sd"> ServerContext.connect().&quot;&quot;&quot;</span> <span class="o">...</span> <span class="nd">@abstractmethod</span> <span class="k">def</span><span class="w"> </span><span class="nf">recv</span><span class="p">(</span><span class="bp">self</span><span class="p">,</span> <span class="n">bufsize</span><span class="p">:</span> <span class="nb">int</span><span class="p">)</span> <span class="o">-&gt;</span> <span class="nb">bytes</span><span class="p">:</span> <span class="w"> </span><span class="sd">&quot;&quot;&quot;Receive data from the socket. The return value is a bytes object</span> <span class="sd"> representing the data received. Should not work before the handshake</span> <span class="sd"> is completed.&quot;&quot;&quot;</span> <span class="o">...</span> <span class="nd">@abstractmethod</span> <span class="k">def</span><span class="w"> </span><span class="nf">send</span><span class="p">(</span><span class="bp">self</span><span class="p">,</span> <span class="nb">bytes</span><span class="p">:</span> <span class="nb">bytes</span><span class="p">)</span> <span class="o">-&gt;</span> <span class="nb">int</span><span class="p">:</span> <span class="w"> </span><span class="sd">&quot;&quot;&quot;Send data to the socket. The socket must be connected to a remote socket.&quot;&quot;&quot;</span> <span class="o">...</span> <span class="nd">@abstractmethod</span> <span class="k">def</span><span class="w"> </span><span class="nf">close</span><span class="p">(</span><span class="bp">self</span><span class="p">,</span> <span class="n">force</span><span class="p">:</span> <span class="nb">bool</span> <span class="o">=</span> <span class="kc">False</span><span class="p">)</span> <span class="o">-&gt;</span> <span class="kc">None</span><span class="p">:</span> <span class="w"> </span><span class="sd">&quot;&quot;&quot;Shuts down the connection and mark the socket closed.</span> <span class="sd"> If force is True, this method should send the close_notify alert and shut down</span> <span class="sd"> the socket without waiting for the other side.</span> <span class="sd"> If force is False, this method should send the close_notify alert and raise</span> <span class="sd"> the WantReadError exception until a corresponding close_notify alert has been</span> <span class="sd"> received from the other side.</span> <span class="sd"> In either case, this method should return WantWriteError if sending the</span> <span class="sd"> close_notify alert currently fails.&quot;&quot;&quot;</span> <span class="o">...</span> <span class="nd">@abstractmethod</span> <span class="k">def</span><span class="w"> </span><span class="nf">listen</span><span class="p">(</span><span class="bp">self</span><span class="p">,</span> <span class="n">backlog</span><span class="p">:</span> <span class="nb">int</span><span class="p">)</span> <span class="o">-&gt;</span> <span class="kc">None</span><span class="p">:</span> <span class="w"> </span><span class="sd">&quot;&quot;&quot;Enable a server to accept connections. If backlog is specified, it</span> <span class="sd"> specifies the number of unaccepted connections that the system will allow</span> <span class="sd"> before refusing new connections.&quot;&quot;&quot;</span> <span class="o">...</span> <span class="nd">@abstractmethod</span> <span class="k">def</span><span class="w"> </span><span class="nf">accept</span><span class="p">(</span><span class="bp">self</span><span class="p">)</span> <span class="o">-&gt;</span> <span class="nb">tuple</span><span class="p">[</span><span class="n">TLSSocket</span><span class="p">,</span> <span class="nb">tuple</span><span class="p">[</span><span class="nb">str</span> <span class="o">|</span> <span class="kc">None</span><span class="p">,</span> <span class="nb">int</span><span class="p">]]:</span> <span class="w"> </span><span class="sd">&quot;&quot;&quot;Accept a connection. The socket must be bound to an address and listening</span> <span class="sd"> for connections. The return value is a pair (conn, address) where conn is a</span> <span class="sd"> new TLSSocket object usable to send and receive data on the connection, and</span> <span class="sd"> address is the address bound to the socket on the other end of the connection.&quot;&quot;&quot;</span> <span class="o">...</span> <span class="nd">@abstractmethod</span> <span class="k">def</span><span class="w"> </span><span class="nf">getsockname</span><span class="p">(</span><span class="bp">self</span><span class="p">)</span> <span class="o">-&gt;</span> <span class="nb">tuple</span><span class="p">[</span><span class="nb">str</span> <span class="o">|</span> <span class="kc">None</span><span class="p">,</span> <span class="nb">int</span><span class="p">]:</span> <span class="w"> </span><span class="sd">&quot;&quot;&quot;Return the local address to which the socket is connected.&quot;&quot;&quot;</span> <span class="o">...</span> <span class="nd">@abstractmethod</span> <span class="k">def</span><span class="w"> </span><span class="nf">getpeercert</span><span class="p">(</span><span class="bp">self</span><span class="p">)</span> <span class="o">-&gt;</span> <span class="nb">bytes</span> <span class="o">|</span> <span class="kc">None</span><span class="p">:</span> <span class="w"> </span><span class="sd">&quot;&quot;&quot;</span> <span class="sd"> Return the raw DER bytes of the certificate provided by the peer</span> <span class="sd"> during the handshake, if applicable.</span> <span class="sd"> &quot;&quot;&quot;</span> <span class="o">...</span> <span class="nd">@abstractmethod</span> <span class="k">def</span><span class="w"> </span><span class="nf">getpeername</span><span class="p">(</span><span class="bp">self</span><span class="p">)</span> <span class="o">-&gt;</span> <span class="nb">tuple</span><span class="p">[</span><span class="nb">str</span> <span class="o">|</span> <span class="kc">None</span><span class="p">,</span> <span class="nb">int</span><span class="p">]:</span> <span class="w"> </span><span class="sd">&quot;&quot;&quot;Return the remote address to which the socket is connected.&quot;&quot;&quot;</span> <span class="o">...</span> <span class="nd">@property</span> <span class="nd">@abstractmethod</span> <span class="k">def</span><span class="w"> </span><span class="nf">context</span><span class="p">(</span><span class="bp">self</span><span class="p">)</span> <span class="o">-&gt;</span> <span class="n">ClientContext</span> <span class="o">|</span> <span class="n">ServerContext</span><span class="p">:</span> <span class="w"> </span><span class="sd">&quot;&quot;&quot;The ``Context`` object this socket is tied to.&quot;&quot;&quot;</span> <span class="o">...</span> <span class="nd">@abstractmethod</span> <span class="k">def</span><span class="w"> </span><span class="nf">cipher</span><span class="p">(</span><span class="bp">self</span><span class="p">)</span> <span class="o">-&gt;</span> <span class="n">CipherSuite</span> <span class="o">|</span> <span class="nb">int</span> <span class="o">|</span> <span class="kc">None</span><span class="p">:</span> <span class="w"> </span><span class="sd">&quot;&quot;&quot;</span> <span class="sd"> Returns the CipherSuite entry for the cipher that has been negotiated on the connection.</span> <span class="sd"> If no connection has been negotiated, returns ``None``. If the cipher negotiated is not</span> <span class="sd"> defined in CipherSuite, returns the 16-bit integer representing that cipher directly.</span> <span class="sd"> &quot;&quot;&quot;</span> <span class="o">...</span> <span class="nd">@abstractmethod</span> <span class="k">def</span><span class="w"> </span><span class="nf">negotiated_protocol</span><span class="p">(</span><span class="bp">self</span><span class="p">)</span> <span class="o">-&gt;</span> <span class="n">NextProtocol</span> <span class="o">|</span> <span class="nb">bytes</span> <span class="o">|</span> <span class="kc">None</span><span class="p">:</span> <span class="w"> </span><span class="sd">&quot;&quot;&quot;</span> <span class="sd"> Returns the protocol that was selected during the TLS handshake.</span> <span class="sd"> This selection may have been made using ALPN or some future</span> <span class="sd"> negotiation mechanism.</span> <span class="sd"> If the negotiated protocol is one of the protocols defined in the</span> <span class="sd"> ``NextProtocol`` enum, the value from that enum will be returned.</span> <span class="sd"> Otherwise, the raw bytestring of the negotiated protocol will be</span> <span class="sd"> returned.</span> <span class="sd"> If ``Context.set_inner_protocols()`` was not called, if the other</span> <span class="sd"> party does not support protocol negotiation, if this socket does</span> <span class="sd"> not support any of the peer&#39;s proposed protocols, or if the</span> <span class="sd"> handshake has not happened yet, ``None`` is returned.</span> <span class="sd"> &quot;&quot;&quot;</span> <span class="o">...</span> <span class="nd">@property</span> <span class="nd">@abstractmethod</span> <span class="k">def</span><span class="w"> </span><span class="nf">negotiated_tls_version</span><span class="p">(</span><span class="bp">self</span><span class="p">)</span> <span class="o">-&gt;</span> <span class="n">TLSVersion</span> <span class="o">|</span> <span class="kc">None</span><span class="p">:</span> <span class="w"> </span><span class="sd">&quot;&quot;&quot;The version of TLS that has been negotiated on this connection.&quot;&quot;&quot;</span> <span class="o">...</span> </pre></div> </div> </section> <section id="buffer"> <h4><a class="toc-backref" href="#buffer" role="doc-backlink">Buffer</a></h4> <p>The context can also be used to create buffers, which have to follow the specification of the <code class="docutils literal notranslate"><span class="pre">TLSBuffer</span></code> protocol class. Specifically, implementations need to implement the following:</p> <ul class="simple"> <li><code class="docutils literal notranslate"><span class="pre">read</span></code> and <code class="docutils literal notranslate"><span class="pre">write</span></code></li> <li><code class="docutils literal notranslate"><span class="pre">do_handshake</span></code></li> <li><code class="docutils literal notranslate"><span class="pre">shutdown</span></code></li> <li><code class="docutils literal notranslate"><span class="pre">process_incoming</span></code> and <code class="docutils literal notranslate"><span class="pre">process_outgoing</span></code></li> <li><code class="docutils literal notranslate"><span class="pre">incoming_bytes_buffered</span></code> and <code class="docutils literal notranslate"><span class="pre">outgoing_bytes_buffered</span></code></li> <li><code class="docutils literal notranslate"><span class="pre">getpeercert</span></code></li> </ul> <p>Similarly to the socket case, they also need to implement some interfaces that give information about the TLS connection, such as:</p> <ul class="simple"> <li>The underlying context object that was used to create this buffer</li> <li>The negotiated cipher</li> <li>The negotiated “next” protocol</li> <li>The negotiated TLS version</li> </ul> <p>The following code describes these functions in more detail:</p> <div class="highlight-python notranslate"><div class="highlight"><pre><span></span><span class="k">class</span><span class="w"> </span><span class="nc">TLSBuffer</span><span class="p">(</span><span class="n">Protocol</span><span class="p">):</span> <span class="w"> </span><span class="sd">&quot;&quot;&quot;This class implements an in memory-channel that creates two buffers,</span> <span class="sd"> wraps them in an SSL context, and provides read and write methods over</span> <span class="sd"> that channel.&quot;&quot;&quot;</span> <span class="nd">@abstractmethod</span> <span class="k">def</span><span class="w"> </span><span class="nf">read</span><span class="p">(</span><span class="bp">self</span><span class="p">,</span> <span class="n">amt</span><span class="p">:</span> <span class="nb">int</span><span class="p">,</span> <span class="n">buffer</span><span class="p">:</span> <span class="n">Buffer</span> <span class="o">|</span> <span class="kc">None</span><span class="p">)</span> <span class="o">-&gt;</span> <span class="nb">bytes</span> <span class="o">|</span> <span class="nb">int</span><span class="p">:</span> <span class="w"> </span><span class="sd">&quot;&quot;&quot;</span> <span class="sd"> Read up to ``amt`` bytes of data from the input buffer and return</span> <span class="sd"> the result as a ``bytes`` instance. If an optional buffer is</span> <span class="sd"> provided, the result is written into the buffer and the number of</span> <span class="sd"> bytes is returned instead.</span> <span class="sd"> Once EOF is reached, all further calls to this method return the</span> <span class="sd"> empty byte string ``b&#39;&#39;``.</span> <span class="sd"> May read &quot;short&quot;: that is, fewer bytes may be returned than were</span> <span class="sd"> requested.</span> <span class="sd"> Raise ``WantReadError`` or ``WantWriteError`` if there is</span> <span class="sd"> insufficient data in either the input or output buffer and the</span> <span class="sd"> operation would have caused data to be written or read.</span> <span class="sd"> May raise ``RaggedEOF`` if the connection has been closed without a</span> <span class="sd"> graceful TLS shutdown. Whether this is an exception that should be</span> <span class="sd"> ignored or not is up to the specific application.</span> <span class="sd"> As at any time a re-negotiation is possible, a call to ``read()``</span> <span class="sd"> can also cause write operations.</span> <span class="sd"> &quot;&quot;&quot;</span> <span class="o">...</span> <span class="nd">@abstractmethod</span> <span class="k">def</span><span class="w"> </span><span class="nf">write</span><span class="p">(</span><span class="bp">self</span><span class="p">,</span> <span class="n">buf</span><span class="p">:</span> <span class="n">Buffer</span><span class="p">)</span> <span class="o">-&gt;</span> <span class="nb">int</span><span class="p">:</span> <span class="w"> </span><span class="sd">&quot;&quot;&quot;</span> <span class="sd"> Write ``buf`` in encrypted form to the output buffer and return the</span> <span class="sd"> number of bytes written. The ``buf`` argument must be an object</span> <span class="sd"> supporting the buffer interface.</span> <span class="sd"> Raise ``WantReadError`` or ``WantWriteError`` if there is</span> <span class="sd"> insufficient data in either the input or output buffer and the</span> <span class="sd"> operation would have caused data to be written or read. In either</span> <span class="sd"> case, users should endeavour to resolve that situation and then</span> <span class="sd"> re-call this method. When re-calling this method users *should*</span> <span class="sd"> re-use the exact same ``buf`` object, as some implementations require that</span> <span class="sd"> the exact same buffer be used.</span> <span class="sd"> This operation may write &quot;short&quot;: that is, fewer bytes may be</span> <span class="sd"> written than were in the buffer.</span> <span class="sd"> As at any time a re-negotiation is possible, a call to ``write()``</span> <span class="sd"> can also cause read operations.</span> <span class="sd"> &quot;&quot;&quot;</span> <span class="o">...</span> <span class="nd">@abstractmethod</span> <span class="k">def</span><span class="w"> </span><span class="nf">do_handshake</span><span class="p">(</span><span class="bp">self</span><span class="p">)</span> <span class="o">-&gt;</span> <span class="kc">None</span><span class="p">:</span> <span class="w"> </span><span class="sd">&quot;&quot;&quot;</span> <span class="sd"> Performs the TLS handshake. Also performs certificate validation</span> <span class="sd"> and hostname verification.</span> <span class="sd"> &quot;&quot;&quot;</span> <span class="o">...</span> <span class="nd">@abstractmethod</span> <span class="k">def</span><span class="w"> </span><span class="nf">cipher</span><span class="p">(</span><span class="bp">self</span><span class="p">)</span> <span class="o">-&gt;</span> <span class="n">CipherSuite</span> <span class="o">|</span> <span class="nb">int</span> <span class="o">|</span> <span class="kc">None</span><span class="p">:</span> <span class="w"> </span><span class="sd">&quot;&quot;&quot;</span> <span class="sd"> Returns the CipherSuite entry for the cipher that has been</span> <span class="sd"> negotiated on the connection. If no connection has been negotiated,</span> <span class="sd"> returns ``None``. If the cipher negotiated is not defined in</span> <span class="sd"> CipherSuite, returns the 16-bit integer representing that cipher</span> <span class="sd"> directly.</span> <span class="sd"> &quot;&quot;&quot;</span> <span class="o">...</span> <span class="nd">@abstractmethod</span> <span class="k">def</span><span class="w"> </span><span class="nf">negotiated_protocol</span><span class="p">(</span><span class="bp">self</span><span class="p">)</span> <span class="o">-&gt;</span> <span class="n">NextProtocol</span> <span class="o">|</span> <span class="nb">bytes</span> <span class="o">|</span> <span class="kc">None</span><span class="p">:</span> <span class="w"> </span><span class="sd">&quot;&quot;&quot;</span> <span class="sd"> Returns the protocol that was selected during the TLS handshake.</span> <span class="sd"> This selection may have been made using ALPN, NPN, or some future</span> <span class="sd"> negotiation mechanism.</span> <span class="sd"> If the negotiated protocol is one of the protocols defined in the</span> <span class="sd"> ``NextProtocol`` enum, the value from that enum will be returned.</span> <span class="sd"> Otherwise, the raw bytestring of the negotiated protocol will be</span> <span class="sd"> returned.</span> <span class="sd"> If ``Context.set_inner_protocols()`` was not called, if the other</span> <span class="sd"> party does not support protocol negotiation, if this socket does</span> <span class="sd"> not support any of the peer&#39;s proposed protocols, or if the</span> <span class="sd"> handshake has not happened yet, ``None`` is returned.</span> <span class="sd"> &quot;&quot;&quot;</span> <span class="o">...</span> <span class="nd">@property</span> <span class="nd">@abstractmethod</span> <span class="k">def</span><span class="w"> </span><span class="nf">context</span><span class="p">(</span><span class="bp">self</span><span class="p">)</span> <span class="o">-&gt;</span> <span class="n">ClientContext</span> <span class="o">|</span> <span class="n">ServerContext</span><span class="p">:</span> <span class="w"> </span><span class="sd">&quot;&quot;&quot;</span> <span class="sd"> The ``Context`` object this buffer is tied to.</span> <span class="sd"> &quot;&quot;&quot;</span> <span class="o">...</span> <span class="nd">@property</span> <span class="nd">@abstractmethod</span> <span class="k">def</span><span class="w"> </span><span class="nf">negotiated_tls_version</span><span class="p">(</span><span class="bp">self</span><span class="p">)</span> <span class="o">-&gt;</span> <span class="n">TLSVersion</span> <span class="o">|</span> <span class="kc">None</span><span class="p">:</span> <span class="w"> </span><span class="sd">&quot;&quot;&quot;</span> <span class="sd"> The version of TLS that has been negotiated on this connection.</span> <span class="sd"> &quot;&quot;&quot;</span> <span class="o">...</span> <span class="nd">@abstractmethod</span> <span class="k">def</span><span class="w"> </span><span class="nf">shutdown</span><span class="p">(</span><span class="bp">self</span><span class="p">)</span> <span class="o">-&gt;</span> <span class="kc">None</span><span class="p">:</span> <span class="w"> </span><span class="sd">&quot;&quot;&quot;</span> <span class="sd"> Performs a clean TLS shut down. This should generally be used</span> <span class="sd"> whenever possible to signal to the remote peer that the content is</span> <span class="sd"> finished.</span> <span class="sd"> &quot;&quot;&quot;</span> <span class="o">...</span> <span class="nd">@abstractmethod</span> <span class="k">def</span><span class="w"> </span><span class="nf">process_incoming</span><span class="p">(</span><span class="bp">self</span><span class="p">,</span> <span class="n">data_from_network</span><span class="p">:</span> <span class="nb">bytes</span><span class="p">)</span> <span class="o">-&gt;</span> <span class="kc">None</span><span class="p">:</span> <span class="w"> </span><span class="sd">&quot;&quot;&quot;</span> <span class="sd"> Receives some TLS data from the network and stores it in an</span> <span class="sd"> internal buffer.</span> <span class="sd"> If the internal buffer is overfull, this method will raise</span> <span class="sd"> ``WantReadError`` and store no data. At this point, the user must</span> <span class="sd"> call ``read`` to remove some data from the internal buffer</span> <span class="sd"> before repeating this call.</span> <span class="sd"> &quot;&quot;&quot;</span> <span class="o">...</span> <span class="nd">@abstractmethod</span> <span class="k">def</span><span class="w"> </span><span class="nf">incoming_bytes_buffered</span><span class="p">(</span><span class="bp">self</span><span class="p">)</span> <span class="o">-&gt;</span> <span class="nb">int</span><span class="p">:</span> <span class="w"> </span><span class="sd">&quot;&quot;&quot;</span> <span class="sd"> Returns how many bytes are in the incoming buffer waiting to be processed.</span> <span class="sd"> &quot;&quot;&quot;</span> <span class="o">...</span> <span class="nd">@abstractmethod</span> <span class="k">def</span><span class="w"> </span><span class="nf">process_outgoing</span><span class="p">(</span><span class="bp">self</span><span class="p">,</span> <span class="n">amount_bytes_for_network</span><span class="p">:</span> <span class="nb">int</span><span class="p">)</span> <span class="o">-&gt;</span> <span class="nb">bytes</span><span class="p">:</span> <span class="w"> </span><span class="sd">&quot;&quot;&quot;</span> <span class="sd"> Returns the next ``amt`` bytes of data that should be written to</span> <span class="sd"> the network from the outgoing data buffer, removing it from the</span> <span class="sd"> internal buffer.</span> <span class="sd"> &quot;&quot;&quot;</span> <span class="o">...</span> <span class="nd">@abstractmethod</span> <span class="k">def</span><span class="w"> </span><span class="nf">outgoing_bytes_buffered</span><span class="p">(</span><span class="bp">self</span><span class="p">)</span> <span class="o">-&gt;</span> <span class="nb">int</span><span class="p">:</span> <span class="w"> </span><span class="sd">&quot;&quot;&quot;</span> <span class="sd"> Returns how many bytes are in the outgoing buffer waiting to be sent.</span> <span class="sd"> &quot;&quot;&quot;</span> <span class="o">...</span> <span class="nd">@abstractmethod</span> <span class="k">def</span><span class="w"> </span><span class="nf">getpeercert</span><span class="p">(</span><span class="bp">self</span><span class="p">)</span> <span class="o">-&gt;</span> <span class="nb">bytes</span> <span class="o">|</span> <span class="kc">None</span><span class="p">:</span> <span class="w"> </span><span class="sd">&quot;&quot;&quot;</span> <span class="sd"> Return the raw DER bytes of the certificate provided by the peer</span> <span class="sd"> during the handshake, if applicable.</span> <span class="sd"> &quot;&quot;&quot;</span> <span class="o">...</span> </pre></div> </div> </section> <section id="cipher-suites"> <h4><a class="toc-backref" href="#cipher-suites" role="doc-backlink">Cipher Suites</a></h4> <p>Supporting cipher suites in a truly library-agnostic fashion is a remarkably difficult undertaking. Different TLS implementations often have radically different APIs for specifying cipher suites, but more problematically these APIs frequently differ in capability as well as in style.</p> <p>Below are examples of different cipher suite selection APIs. These examples are not intended to obligate implementation against each API, only to illuminate the constraints imposed by each.</p> <section id="openssl"> <h5><a class="toc-backref" href="#openssl" role="doc-backlink">OpenSSL</a></h5> <p>OpenSSL uses a well-known cipher string format. This format has been adopted as a configuration language by most products that use OpenSSL, including Python. This format is relatively easy to read, but has a number of downsides: it is a string, which makes it easy to provide bad inputs; it lacks much detailed validation, meaning that it is possible to configure OpenSSL in a way that doesn’t allow it to negotiate any cipher at all; and it allows specifying cipher suites in a number of different ways that make it tricky to parse. The biggest problem with this format is that there is no formal specification for it, meaning that the only way to parse a given string the way OpenSSL would is to get OpenSSL to parse it.</p> <p>OpenSSL’s cipher strings can look like this:</p> <div class="highlight-python notranslate"><div class="highlight"><pre><span></span><span class="s2">&quot;ECDH+AESGCM:ECDH+CHACHA20:DH+AESGCM:DH+CHACHA20:ECDH+AES256:DH+AES256:ECDH+AES128:DH+AES:RSA+AESGCM:RSA+AES:!aNULL:!eNULL:!MD5&quot;</span> </pre></div> </div> <p>This string demonstrates some of the complexity of the OpenSSL format. For example, it is possible for one entry to specify multiple cipher suites: the entry <code class="docutils literal notranslate"><span class="pre">ECDH+AESGCM</span></code> means “all ciphers suites that include both elliptic-curve Diffie-Hellman key exchange and AES in Galois Counter Mode”. More explicitly, that will expand to four cipher suites:</p> <div class="highlight-python notranslate"><div class="highlight"><pre><span></span><span class="s2">&quot;ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256&quot;</span> </pre></div> </div> <p>That makes parsing a complete OpenSSL cipher string extremely tricky. Add to the fact that there are other meta-characters, such as “!” (exclude all cipher suites that match this criterion, even if they would otherwise be included: “!MD5” means that no cipher suites using the MD5 hash algorithm should be included), “-” (exclude matching ciphers if they were already included, but allow them to be re-added later if they get included again), and “+” (include the matching ciphers, but place them at the end of the list), and you get an extremely complex format to parse. On top of this complexity it should be noted that the actual result depends on the OpenSSL version, as an OpenSSL cipher string is valid so long as it contains at least one cipher that OpenSSL recognizes.</p> <p>OpenSSL also uses different names for its ciphers than the names used in the relevant specifications. See the manual page for <code class="docutils literal notranslate"><span class="pre">ciphers(1)</span></code> for more details.</p> <p>The actual API inside OpenSSL for the cipher string is simple:</p> <div class="highlight-c notranslate"><div class="highlight"><pre><span></span><span class="kt">char</span><span class="w"> </span><span class="o">*</span><span class="n">cipher_list</span><span class="w"> </span><span class="o">=</span><span class="w"> </span><span class="o">&lt;</span><span class="n">some</span><span class="w"> </span><span class="n">cipher</span><span class="w"> </span><span class="n">list</span><span class="o">&gt;</span><span class="p">;</span> <span class="kt">int</span><span class="w"> </span><span class="n">rc</span><span class="w"> </span><span class="o">=</span><span class="w"> </span><span class="n">SSL_CTX_set_cipher_list</span><span class="p">(</span><span class="n">context</span><span class="p">,</span><span class="w"> </span><span class="n">cipher_list</span><span class="p">);</span> </pre></div> </div> <p>This means that any format that is used by this module must be able to be converted to an OpenSSL cipher string for use with OpenSSL.</p> </section> <section id="network-framework"> <h5><a class="toc-backref" href="#network-framework" role="doc-backlink">Network Framework</a></h5> <p>Network Framework is the macOS (10.15+) system TLS library. This library is substantially more restricted than OpenSSL in many ways, as it has a much more restricted class of users. One of these substantial restrictions is in controlling supported cipher suites.</p> <p>Ciphers in Network Framework are represented by a Objective-C <code class="docutils literal notranslate"><span class="pre">uint16_t</span></code> enum. This enum has one entry per cipher suite, with no aggregate entries, meaning that it is not possible to reproduce the meaning of an OpenSSL cipher string like <code class="docutils literal notranslate"><span class="pre">“ECDH+AESGCM”</span></code> without hand-coding which categories each enum member falls into.</p> <p>However, the names of most of the enum members are in line with the formal names of the cipher suites: that is, the cipher suite that OpenSSL calls <code class="docutils literal notranslate"><span class="pre">“ECDHE-ECDSA-AES256-GCM-SHA384”</span></code> is called <code class="docutils literal notranslate"><span class="pre">“tls_ciphersuite_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384”</span></code> in Network Framework.</p> <p>The API for configuring cipher suites inside Network Framework is simple:</p> <div class="highlight-c notranslate"><div class="highlight"><pre><span></span><span class="kt">void</span><span class="w"> </span><span class="nf">sec_protocol_options_append_tls_ciphersuite</span><span class="p">(</span><span class="n">sec_protocol_options_t</span><span class="w"> </span><span class="n">options</span><span class="p">,</span><span class="w"> </span><span class="n">tls_ciphersuite_t</span><span class="w"> </span><span class="n">ciphersuite</span><span class="p">);</span> </pre></div> </div> </section> <section id="schannel"> <h5><a class="toc-backref" href="#schannel" role="doc-backlink">SChannel</a></h5> <p>SChannel is the Windows system TLS library.</p> <p>SChannel has extremely restrictive support for controlling available TLS cipher suites, and additionally adopts a third method of expressing what TLS cipher suites are supported.</p> <p>Specifically, SChannel defines a set of <code class="docutils literal notranslate"><span class="pre">ALG_ID</span></code> constants (C unsigned ints). Each of these constants does not refer to an entire cipher suite, but instead an individual algorithm. Some examples are <code class="docutils literal notranslate"><span class="pre">CALG_3DES</span></code> and <code class="docutils literal notranslate"><span class="pre">CALG_AES_256</span></code>, which refer to the bulk encryption algorithm used in a cipher suite, <code class="docutils literal notranslate"><span class="pre">CALG_ECDH_EPHEM</span></code> and <code class="docutils literal notranslate"><span class="pre">CALG_RSA_KEYX</span></code> which refer to part of the key exchange algorithm used in a cipher suite, <code class="docutils literal notranslate"><span class="pre">CALG_SHA_256</span></code> and <code class="docutils literal notranslate"><span class="pre">CALG_SHA_384</span></code> which refer to the message authentication code used in a cipher suite, and <code class="docutils literal notranslate"><span class="pre">CALG_ECDSA</span></code> and <code class="docutils literal notranslate"><span class="pre">CALG_RSA_SIGN</span></code> which refer to the signing portions of the key exchange algorithm.</p> <p>In earlier versions of the SChannel API, these constants were used to define the algorithms that could be used. The latest version, however, uses these constants to prohibit which algorithms can be used.</p> <p>This can be thought of as the half of OpenSSL’s functionality that Network Framework doesn’t have: Network Framework only allows specifying exact cipher suites (and a limited number of pre-defined cipher suite groups), whereas SChannel only allows specifying parts of the cipher suite, while OpenSSL allows both.</p> <p>Determining which cipher suites are allowed on a given connection is done by providing a pointer to an array of these <code class="docutils literal notranslate"><span class="pre">ALG_ID</span></code> constants. This means that any suitable API must allow the Python code to determine which <code class="docutils literal notranslate"><span class="pre">ALG_ID</span></code> constants must be provided.</p> </section> <section id="network-security-services-nss"> <h5><a class="toc-backref" href="#network-security-services-nss" role="doc-backlink">Network Security Services (NSS)</a></h5> <p>NSS is Mozilla’s crypto and TLS library. It’s used in Firefox, Thunderbird, and as an alternative to OpenSSL in multiple libraries, e.g. curl.</p> <p>By default, NSS comes with secure configuration of allowed ciphers. On some platforms such as Fedora, the list of enabled ciphers is globally configured in a system policy. Generally, applications should not modify cipher suites unless they have specific reasons to do so.</p> <p>NSS has both process global and per-connection settings for cipher suites. It does not have a concept of <a class="reference external" href="https://docs.python.org/3/library/ssl.html#ssl.SSLContext" title="(in Python v3.13)"><code class="xref py py-class docutils literal notranslate"><span class="pre">SSLContext</span></code></a> like OpenSSL. A <a class="reference external" href="https://docs.python.org/3/library/ssl.html#ssl.SSLContext" title="(in Python v3.13)"><code class="xref py py-class docutils literal notranslate"><span class="pre">SSLContext</span></code></a>-like behavior can be easily emulated. Specifically, ciphers can be enabled or disabled globally with <code class="docutils literal notranslate"><span class="pre">SSL_CipherPrefSetDefault(PRInt32</span> <span class="pre">cipher,</span> <span class="pre">PRBool</span> <span class="pre">enabled)</span></code>, and <code class="docutils literal notranslate"><span class="pre">SSL_CipherPrefSet(PRFileDesc</span> <span class="pre">*fd,</span> <span class="pre">PRInt32</span> <span class="pre">cipher,</span> <span class="pre">PRBool</span> <span class="pre">enabled)</span></code> for a connection. The cipher <code class="docutils literal notranslate"><span class="pre">PRInt32</span></code> number is a signed 32-bit integer that directly corresponds to an registered IANA id, e.g. <code class="docutils literal notranslate"><span class="pre">0x1301</span></code> is <code class="docutils literal notranslate"><span class="pre">TLS_AES_128_GCM_SHA256</span></code>. Contrary to OpenSSL, the preference order of ciphers is fixed and cannot be modified at runtime.</p> <p>Like Network Framework, NSS has no API for aggregated entries. Some consumers of NSS have implemented custom mappings from OpenSSL cipher names and rules to NSS ciphers, e.g. <code class="docutils literal notranslate"><span class="pre">mod_nss</span></code>.</p> </section> <section id="proposed-interface"> <h5><a class="toc-backref" href="#proposed-interface" role="doc-backlink">Proposed Interface</a></h5> <p>The proposed interface for the new module is influenced by the combined set of limitations of the above implementations. Specifically, as every implementation except OpenSSL requires that each individual cipher be provided, there is no option but to provide that lowest common denominator approach.</p> <p>The simplest approach is to provide an enumerated type that includes a large subset of the cipher suites defined for TLS. The values of the enum members will be their two-octet cipher identifier as used in the TLS handshake, stored as a 16 bit integer. The names of the enum members will be their IANA-registered cipher suite names.</p> <p>As of now, the <a class="reference external" href="https://www.iana.org/assignments/tls-parameters/tls-parameters.xhtml#tls-parameters-4">IANA cipher suite registry</a> contains over 320 cipher suites. A large portion of the cipher suites are irrelevant for TLS connections to network services. Other suites specify deprecated and insecure algorithms that are no longer provided by recent versions of implementations. The enum contains the five fixed cipher suites defined for TLS v1.3. For TLS v1.2, it only contains the cipher suites that correspond to the TLS v1.3 cipher suites, with ECDHE key exchange (for perfect forward secrecy) and ECDSA or RSA signatures, which are an additional ten cipher suites.</p> <p>In addition to this enum, the interface defines a default cipher suite list for TLS v1.2, which includes only those defined cipher suites based on AES-GCM or ChaCha20-Poly1305. The default cipher suite list for TLS v1.3 will comprise the five cipher suites defined in the specification.</p> <p>The current enum is quite restricted, including only cipher suites that provide forward secrecy. Because the enum doesn’t contain every defined cipher, and also to allow for forward-looking applications, all parts of this API that accept <code class="docutils literal notranslate"><span class="pre">CipherSuite</span></code> objects will also accept raw 16-bit integers directly.</p> <div class="highlight-python notranslate"><div class="highlight"><pre><span></span><span class="k">class</span><span class="w"> </span><span class="nc">CipherSuite</span><span class="p">(</span><span class="n">IntEnum</span><span class="p">):</span> <span class="w"> </span><span class="sd">&quot;&quot;&quot;</span> <span class="sd"> Known cipher suites.</span> <span class="sd"> See: &lt;https://www.iana.org/assignments/tls-parameters/tls-parameters.xhtml&gt;</span> <span class="sd"> &quot;&quot;&quot;</span> <span class="n">TLS_AES_128_GCM_SHA256</span> <span class="o">=</span> <span class="mh">0x1301</span> <span class="n">TLS_AES_256_GCM_SHA384</span> <span class="o">=</span> <span class="mh">0x1302</span> <span class="n">TLS_CHACHA20_POLY1305_SHA256</span> <span class="o">=</span> <span class="mh">0x1303</span> <span class="n">TLS_AES_128_CCM_SHA256</span> <span class="o">=</span> <span class="mh">0x1304</span> <span class="n">TLS_AES_128_CCM_8_SHA256</span> <span class="o">=</span> <span class="mh">0x1305</span> <span class="n">TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256</span> <span class="o">=</span> <span class="mh">0xC02B</span> <span class="n">TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384</span> <span class="o">=</span> <span class="mh">0xC02C</span> <span class="n">TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256</span> <span class="o">=</span> <span class="mh">0xC02F</span> <span class="n">TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384</span> <span class="o">=</span> <span class="mh">0xC030</span> <span class="n">TLS_ECDHE_ECDSA_WITH_AES_128_CCM</span> <span class="o">=</span> <span class="mh">0xC0AC</span> <span class="n">TLS_ECDHE_ECDSA_WITH_AES_256_CCM</span> <span class="o">=</span> <span class="mh">0xC0AD</span> <span class="n">TLS_ECDHE_ECDSA_WITH_AES_128_CCM_8</span> <span class="o">=</span> <span class="mh">0xC0AE</span> <span class="n">TLS_ECDHE_ECDSA_WITH_AES_256_CCM_8</span> <span class="o">=</span> <span class="mh">0xC0AF</span> <span class="n">TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256</span> <span class="o">=</span> <span class="mh">0xCCA8</span> <span class="n">TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256</span> <span class="o">=</span> <span class="mh">0xCCA9</span> </pre></div> </div> <p>For Network Framework, these enum members directly refer to the values of the cipher suite constants. For example, Network Framework defines the cipher suite enum member <code class="docutils literal notranslate"><span class="pre">tls_ciphersuite_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384</span></code> as having the value <code class="docutils literal notranslate"><span class="pre">0xC02C</span></code>. Not coincidentally, that is identical to its value in the above enum. This makes mapping between Network Framework and the above enum very easy indeed.</p> <p>For SChannel there is no easy direct mapping, due to the fact that SChannel configures ciphers, instead of cipher suites. This represents an ongoing concern with SChannel, which is that it is very difficult to configure in a specific manner compared to other TLS implementations.</p> <p>For the purposes of this PEP, any SChannel implementation will need to determine which ciphers to choose based on the enum members. This may be more open than the actual cipher suite list actually wants to allow, or it may be more restrictive, depending on the choices of the implementation. This PEP recommends that it be more restrictive, but of course this cannot be enforced.</p> <p>Finally, we expect that for most users, secure defaults will be enough. When specifying no list of ciphers, the implementations should use secure defaults (possibly derived from system recommended settings).</p> </section> </section> <section id="protocol-negotiation"> <h4><a class="toc-backref" href="#protocol-negotiation" role="doc-backlink">Protocol Negotiation</a></h4> <p>ALPN allows for protocol negotiation as part of the HTTP/2 handshake. While ALPN is at a fundamental level built on top of bytestrings, string-based APIs are frequently problematic as they allow for errors in typing that can be hard to detect.</p> <p>For this reason, this module will define a type that protocol negotiation implementations can pass and be passed. This type would wrap a bytestring to allow for aliases for well-known protocols. This allows us to avoid the problems inherent in typos for well-known protocols, while allowing the full extensibility of the protocol negotiation layer if needed by letting users pass byte strings directly.</p> <div class="highlight-python notranslate"><div class="highlight"><pre><span></span><span class="k">class</span><span class="w"> </span><span class="nc">NextProtocol</span><span class="p">(</span><span class="n">Enum</span><span class="p">):</span> <span class="w"> </span><span class="sd">&quot;&quot;&quot;The underlying negotiated (&quot;next&quot;) protocol.&quot;&quot;&quot;</span> <span class="n">H2</span> <span class="o">=</span> <span class="sa">b</span><span class="s2">&quot;h2&quot;</span> <span class="n">H2C</span> <span class="o">=</span> <span class="sa">b</span><span class="s2">&quot;h2c&quot;</span> <span class="n">HTTP1</span> <span class="o">=</span> <span class="sa">b</span><span class="s2">&quot;http/1.1&quot;</span> <span class="n">WEBRTC</span> <span class="o">=</span> <span class="sa">b</span><span class="s2">&quot;webrtc&quot;</span> <span class="n">C_WEBRTC</span> <span class="o">=</span> <span class="sa">b</span><span class="s2">&quot;c-webrtc&quot;</span> <span class="n">FTP</span> <span class="o">=</span> <span class="sa">b</span><span class="s2">&quot;ftp&quot;</span> <span class="n">STUN</span> <span class="o">=</span> <span class="sa">b</span><span class="s2">&quot;stun.nat-discovery&quot;</span> <span class="n">TURN</span> <span class="o">=</span> <span class="sa">b</span><span class="s2">&quot;stun.turn&quot;</span> </pre></div> </div> </section> <section id="tls-versions"> <h4><a class="toc-backref" href="#tls-versions" role="doc-backlink">TLS Versions</a></h4> <p>It is often useful to be able to restrict the versions of TLS you’re willing to support. There are many security advantages in refusing to use old versions of TLS, and some misbehaving servers will mishandle TLS clients advertising support for newer versions.</p> <p>The following enumerated type can be used to gate TLS versions. Forward-looking applications should almost never set a maximum TLS version unless they absolutely must, as a TLS implementation that is newer than the Python that uses it may support TLS versions that are not in this enumerated type.</p> <p>Additionally, this enumerated type defines two additional flags that can always be used to request either the lowest or highest TLS version supported by an implementation. As for cipher suites, we expect that for most users, secure defaults will be enough. When specifying no list of TLS versions, the implementations should use secure defaults (possibly derived from system recommended settings).</p> <div class="highlight-python notranslate"><div class="highlight"><pre><span></span><span class="k">class</span><span class="w"> </span><span class="nc">TLSVersion</span><span class="p">(</span><span class="n">Enum</span><span class="p">):</span> <span class="w"> </span><span class="sd">&quot;&quot;&quot;</span> <span class="sd"> TLS versions.</span> <span class="sd"> The `MINIMUM_SUPPORTED` and `MAXIMUM_SUPPORTED` variants are &quot;open ended&quot;,</span> <span class="sd"> and refer to the &quot;lowest mutually supported&quot; and &quot;highest mutually supported&quot;</span> <span class="sd"> TLS versions, respectively.</span> <span class="sd"> &quot;&quot;&quot;</span> <span class="n">MINIMUM_SUPPORTED</span> <span class="o">=</span> <span class="s2">&quot;MINIMUM_SUPPORTED&quot;</span> <span class="n">TLSv1_2</span> <span class="o">=</span> <span class="s2">&quot;TLSv1.2&quot;</span> <span class="n">TLSv1_3</span> <span class="o">=</span> <span class="s2">&quot;TLSv1.3&quot;</span> <span class="n">MAXIMUM_SUPPORTED</span> <span class="o">=</span> <span class="s2">&quot;MAXIMUM_SUPPORTED&quot;</span> </pre></div> </div> </section> <section id="errors"> <h4><a class="toc-backref" href="#errors" role="doc-backlink">Errors</a></h4> <p>This module would define four base classes for use with error handling. Unlike many of the other classes defined here, these classes are not abstract, as they have no behavior. They exist simply to signal certain common behaviors. TLS implementations should subclass these exceptions in their own packages, but needn’t define any behavior for them.</p> <p>In general, concrete implementations should subclass these exceptions rather than throw them directly. This makes it moderately easier to determine which concrete TLS implementation is in use during debugging of unexpected errors. However, this is not mandatory.</p> <p>The definitions of the errors are below:</p> <div class="highlight-python notranslate"><div class="highlight"><pre><span></span><span class="k">class</span><span class="w"> </span><span class="nc">TLSError</span><span class="p">(</span><span class="ne">Exception</span><span class="p">):</span> <span class="w"> </span><span class="sd">&quot;&quot;&quot;</span> <span class="sd"> The base exception for all TLS related errors from any implementation.</span> <span class="sd"> Catching this error should be sufficient to catch *all* TLS errors,</span> <span class="sd"> regardless of what implementation is used.</span> <span class="sd"> &quot;&quot;&quot;</span> <span class="k">class</span><span class="w"> </span><span class="nc">WantWriteError</span><span class="p">(</span><span class="n">TLSError</span><span class="p">):</span> <span class="w"> </span><span class="sd">&quot;&quot;&quot;</span> <span class="sd"> A special signaling exception used only when non-blocking or buffer-only I/O is used.</span> <span class="sd"> This error signals that the requested</span> <span class="sd"> operation cannot complete until more data is written to the network,</span> <span class="sd"> or until the output buffer is drained.</span> <span class="sd"> This error is should only be raised when it is completely impossible</span> <span class="sd"> to write any data. If a partial write is achievable then this should</span> <span class="sd"> not be raised.</span> <span class="sd"> &quot;&quot;&quot;</span> <span class="k">class</span><span class="w"> </span><span class="nc">WantReadError</span><span class="p">(</span><span class="n">TLSError</span><span class="p">):</span> <span class="w"> </span><span class="sd">&quot;&quot;&quot;</span> <span class="sd"> A special signaling exception used only when non-blocking or buffer-only I/O is used.</span> <span class="sd"> This error signals that the requested</span> <span class="sd"> operation cannot complete until more data is read from the network, or</span> <span class="sd"> until more data is available in the input buffer.</span> <span class="sd"> This error should only be raised when it is completely impossible to</span> <span class="sd"> write any data. If a partial write is achievable then this should not</span> <span class="sd"> be raised.</span> <span class="sd"> &quot;&quot;&quot;</span> <span class="k">class</span><span class="w"> </span><span class="nc">RaggedEOF</span><span class="p">(</span><span class="n">TLSError</span><span class="p">):</span> <span class="w"> </span><span class="sd">&quot;&quot;&quot;A special signaling exception used when a TLS connection has been</span> <span class="sd"> closed gracelessly: that is, when a TLS CloseNotify was not received</span> <span class="sd"> from the peer before the underlying TCP socket reached EOF. This is a</span> <span class="sd"> so-called &quot;ragged EOF&quot;.</span> <span class="sd"> This exception is not guaranteed to be raised in the face of a ragged</span> <span class="sd"> EOF: some implementations may not be able to detect or report the</span> <span class="sd"> ragged EOF.</span> <span class="sd"> This exception is not always a problem. Ragged EOFs are a concern only</span> <span class="sd"> when protocols are vulnerable to length truncation attacks. Any</span> <span class="sd"> protocol that can detect length truncation attacks at the application</span> <span class="sd"> layer (e.g. HTTP/1.1 and HTTP/2) is not vulnerable to this kind of</span> <span class="sd"> attack and so can ignore this exception.</span> <span class="sd"> &quot;&quot;&quot;</span> <span class="k">class</span><span class="w"> </span><span class="nc">ConfigurationError</span><span class="p">(</span><span class="n">TLSError</span><span class="p">):</span> <span class="w"> </span><span class="sd">&quot;&quot;&quot;An special exception that implementations can use when the provided</span> <span class="sd"> configuration uses features not supported by that implementation.&quot;&quot;&quot;</span> </pre></div> </div> </section> <section id="certificates"> <h4><a class="toc-backref" href="#certificates" role="doc-backlink">Certificates</a></h4> <p>This module would define a concrete certificate class. This class would have almost no behavior, as the goal of this module is not to provide all possible relevant cryptographic functionality that could be provided by X.509 certificates. Instead, all we need is the ability to signal the source of a certificate to a concrete implementation.</p> <p>For that reason, this certificate class defines three attributes, corresponding to the three envisioned constructors: certificates from files, certificates from memory, or certificates from arbitrary identifiers. It is possible that implementations do not support all of these constructors, and they can communicate this to users as described in the “Runtime” section below. Certificates from arbitrary identifiers, in particular, are expected to be useful primarily to users seeking to build integrations on top of HSMs, TPMs, SSMs, and similar.</p> <p>Specifically, this class does not parse any provided input to validate that it is a correct certificate, and also does not provide any form of introspection into a particular certificate. TLS implementations are not required to provide such introspection either. Peer certificates that are received during the handshake are provided as raw DER bytes.</p> <div class="highlight-python notranslate"><div class="highlight"><pre><span></span><span class="k">class</span><span class="w"> </span><span class="nc">Certificate</span><span class="p">:</span> <span class="w"> </span><span class="sd">&quot;&quot;&quot;Object representing a certificate used in TLS.&quot;&quot;&quot;</span> <span class="vm">__slots__</span> <span class="o">=</span> <span class="p">(</span> <span class="s2">&quot;_buffer&quot;</span><span class="p">,</span> <span class="s2">&quot;_path&quot;</span><span class="p">,</span> <span class="s2">&quot;_id&quot;</span><span class="p">,</span> <span class="p">)</span> <span class="k">def</span><span class="w"> </span><span class="fm">__init__</span><span class="p">(</span> <span class="bp">self</span><span class="p">,</span> <span class="n">buffer</span><span class="p">:</span> <span class="nb">bytes</span> <span class="o">|</span> <span class="kc">None</span> <span class="o">=</span> <span class="kc">None</span><span class="p">,</span> <span class="n">path</span><span class="p">:</span> <span class="n">os</span><span class="o">.</span><span class="n">PathLike</span><span class="p">[</span><span class="nb">str</span><span class="p">]</span> <span class="o">|</span> <span class="kc">None</span> <span class="o">=</span> <span class="kc">None</span><span class="p">,</span> <span class="nb">id</span><span class="p">:</span> <span class="nb">bytes</span> <span class="o">|</span> <span class="kc">None</span> <span class="o">=</span> <span class="kc">None</span> <span class="p">):</span> <span class="w"> </span><span class="sd">&quot;&quot;&quot;</span> <span class="sd"> Creates a Certificate object from a path, buffer, or ID.</span> <span class="sd"> If none of these is given, an exception is raised.</span> <span class="sd"> &quot;&quot;&quot;</span> <span class="k">if</span> <span class="n">buffer</span> <span class="ow">is</span> <span class="kc">None</span> <span class="ow">and</span> <span class="n">path</span> <span class="ow">is</span> <span class="kc">None</span> <span class="ow">and</span> <span class="nb">id</span> <span class="ow">is</span> <span class="kc">None</span><span class="p">:</span> <span class="k">raise</span> <span class="ne">ValueError</span><span class="p">(</span><span class="s2">&quot;Certificate cannot be empty.&quot;</span><span class="p">)</span> <span class="bp">self</span><span class="o">.</span><span class="n">_buffer</span> <span class="o">=</span> <span class="n">buffer</span> <span class="bp">self</span><span class="o">.</span><span class="n">_path</span> <span class="o">=</span> <span class="n">path</span> <span class="bp">self</span><span class="o">.</span><span class="n">_id</span> <span class="o">=</span> <span class="nb">id</span> <span class="nd">@classmethod</span> <span class="k">def</span><span class="w"> </span><span class="nf">from_buffer</span><span class="p">(</span><span class="bp">cls</span><span class="p">,</span> <span class="n">buffer</span><span class="p">:</span> <span class="nb">bytes</span><span class="p">)</span> <span class="o">-&gt;</span> <span class="n">Certificate</span><span class="p">:</span> <span class="w"> </span><span class="sd">&quot;&quot;&quot;</span> <span class="sd"> Creates a Certificate object from a byte buffer. This byte buffer</span> <span class="sd"> may be either PEM-encoded or DER-encoded. If the buffer is PEM</span> <span class="sd"> encoded it *must* begin with the standard PEM preamble (a series of</span> <span class="sd"> dashes followed by the ASCII bytes &quot;BEGIN CERTIFICATE&quot; and another</span> <span class="sd"> series of dashes). In the absence of that preamble, the</span> <span class="sd"> implementation may assume that the certificate is DER-encoded</span> <span class="sd"> instead.</span> <span class="sd"> &quot;&quot;&quot;</span> <span class="k">return</span> <span class="bp">cls</span><span class="p">(</span><span class="n">buffer</span><span class="o">=</span><span class="n">buffer</span><span class="p">)</span> <span class="nd">@classmethod</span> <span class="k">def</span><span class="w"> </span><span class="nf">from_file</span><span class="p">(</span><span class="bp">cls</span><span class="p">,</span> <span class="n">path</span><span class="p">:</span> <span class="n">os</span><span class="o">.</span><span class="n">PathLike</span><span class="p">[</span><span class="nb">str</span><span class="p">])</span> <span class="o">-&gt;</span> <span class="n">Certificate</span><span class="p">:</span> <span class="w"> </span><span class="sd">&quot;&quot;&quot;</span> <span class="sd"> Creates a Certificate object from a file on disk. The file on disk</span> <span class="sd"> should contain a series of bytes corresponding to a certificate that</span> <span class="sd"> may be either PEM-encoded or DER-encoded. If the bytes are PEM encoded</span> <span class="sd"> it *must* begin with the standard PEM preamble (a series of dashes</span> <span class="sd"> followed by the ASCII bytes &quot;BEGIN CERTIFICATE&quot; and another series of</span> <span class="sd"> dashes). In the absence of that preamble, the implementation may</span> <span class="sd"> assume that the certificate is DER-encoded instead.</span> <span class="sd"> &quot;&quot;&quot;</span> <span class="k">return</span> <span class="bp">cls</span><span class="p">(</span><span class="n">path</span><span class="o">=</span><span class="n">path</span><span class="p">)</span> <span class="nd">@classmethod</span> <span class="k">def</span><span class="w"> </span><span class="nf">from_id</span><span class="p">(</span><span class="bp">cls</span><span class="p">,</span> <span class="nb">id</span><span class="p">:</span> <span class="nb">bytes</span><span class="p">)</span> <span class="o">-&gt;</span> <span class="n">Certificate</span><span class="p">:</span> <span class="w"> </span><span class="sd">&quot;&quot;&quot;</span> <span class="sd"> Creates a Certificate object from an arbitrary identifier. This may</span> <span class="sd"> be useful for implementations that rely on system certificate stores.</span> <span class="sd"> &quot;&quot;&quot;</span> <span class="k">return</span> <span class="bp">cls</span><span class="p">(</span><span class="nb">id</span><span class="o">=</span><span class="nb">id</span><span class="p">)</span> </pre></div> </div> </section> <section id="private-keys"> <h4><a class="toc-backref" href="#private-keys" role="doc-backlink">Private Keys</a></h4> <p>This module would define a concrete private key class. Much like the <code class="docutils literal notranslate"><span class="pre">Certificate</span></code> class, this class has three attributes to correspond to the three constructors, and further has all the caveats of the <code class="docutils literal notranslate"><span class="pre">Certificate</span></code> class.</p> <div class="highlight-python notranslate"><div class="highlight"><pre><span></span><span class="k">class</span><span class="w"> </span><span class="nc">PrivateKey</span><span class="p">:</span> <span class="w"> </span><span class="sd">&quot;&quot;&quot;Object representing a private key corresponding to a public key</span> <span class="sd"> for a certificate used in TLS.&quot;&quot;&quot;</span> <span class="vm">__slots__</span> <span class="o">=</span> <span class="p">(</span> <span class="s2">&quot;_buffer&quot;</span><span class="p">,</span> <span class="s2">&quot;_path&quot;</span><span class="p">,</span> <span class="s2">&quot;_id&quot;</span><span class="p">,</span> <span class="p">)</span> <span class="k">def</span><span class="w"> </span><span class="fm">__init__</span><span class="p">(</span> <span class="bp">self</span><span class="p">,</span> <span class="n">buffer</span><span class="p">:</span> <span class="nb">bytes</span> <span class="o">|</span> <span class="kc">None</span> <span class="o">=</span> <span class="kc">None</span><span class="p">,</span> <span class="n">path</span><span class="p">:</span> <span class="n">os</span><span class="o">.</span><span class="n">PathLike</span> <span class="o">|</span> <span class="kc">None</span> <span class="o">=</span> <span class="kc">None</span><span class="p">,</span> <span class="nb">id</span><span class="p">:</span> <span class="nb">bytes</span> <span class="o">|</span> <span class="kc">None</span> <span class="o">=</span> <span class="kc">None</span> <span class="p">):</span> <span class="w"> </span><span class="sd">&quot;&quot;&quot;</span> <span class="sd"> Creates a PrivateKey object from a path, buffer, or ID.</span> <span class="sd"> If none of these is given, an exception is raised.</span> <span class="sd"> &quot;&quot;&quot;</span> <span class="k">if</span> <span class="n">buffer</span> <span class="ow">is</span> <span class="kc">None</span> <span class="ow">and</span> <span class="n">path</span> <span class="ow">is</span> <span class="kc">None</span> <span class="ow">and</span> <span class="nb">id</span> <span class="ow">is</span> <span class="kc">None</span><span class="p">:</span> <span class="k">raise</span> <span class="ne">ValueError</span><span class="p">(</span><span class="s2">&quot;PrivateKey cannot be empty.&quot;</span><span class="p">)</span> <span class="bp">self</span><span class="o">.</span><span class="n">_buffer</span> <span class="o">=</span> <span class="n">buffer</span> <span class="bp">self</span><span class="o">.</span><span class="n">_path</span> <span class="o">=</span> <span class="n">path</span> <span class="bp">self</span><span class="o">.</span><span class="n">_id</span> <span class="o">=</span> <span class="nb">id</span> <span class="nd">@classmethod</span> <span class="k">def</span><span class="w"> </span><span class="nf">from_buffer</span><span class="p">(</span><span class="bp">cls</span><span class="p">,</span> <span class="n">buffer</span><span class="p">:</span> <span class="nb">bytes</span><span class="p">)</span> <span class="o">-&gt;</span> <span class="n">PrivateKey</span><span class="p">:</span> <span class="w"> </span><span class="sd">&quot;&quot;&quot;</span> <span class="sd"> Creates a PrivateKey object from a byte buffer. This byte buffer</span> <span class="sd"> may be either PEM-encoded or DER-encoded. If the buffer is PEM</span> <span class="sd"> encoded it *must* begin with the standard PEM preamble (a series of</span> <span class="sd"> dashes followed by the ASCII bytes &quot;BEGIN&quot;, the key type, and</span> <span class="sd"> another series of dashes). In the absence of that preamble, the</span> <span class="sd"> implementation may assume that the private key is DER-encoded</span> <span class="sd"> instead.</span> <span class="sd"> &quot;&quot;&quot;</span> <span class="k">return</span> <span class="bp">cls</span><span class="p">(</span><span class="n">buffer</span><span class="o">=</span><span class="n">buffer</span><span class="p">)</span> <span class="nd">@classmethod</span> <span class="k">def</span><span class="w"> </span><span class="nf">from_file</span><span class="p">(</span><span class="bp">cls</span><span class="p">,</span> <span class="n">path</span><span class="p">:</span> <span class="n">os</span><span class="o">.</span><span class="n">PathLike</span><span class="p">)</span> <span class="o">-&gt;</span> <span class="n">PrivateKey</span><span class="p">:</span> <span class="w"> </span><span class="sd">&quot;&quot;&quot;</span> <span class="sd"> Creates a PrivateKey object from a file on disk. The file on disk</span> <span class="sd"> should contain a series of bytes corresponding to a certificate that</span> <span class="sd"> may be either PEM-encoded or DER-encoded. If the bytes are PEM encoded</span> <span class="sd"> it *must* begin with the standard PEM preamble (a series of dashes</span> <span class="sd"> followed by the ASCII bytes &quot;BEGIN&quot;, the key type, and another series</span> <span class="sd"> of dashes). In the absence of that preamble, the implementation may</span> <span class="sd"> assume that the certificate is DER-encoded instead.</span> <span class="sd"> &quot;&quot;&quot;</span> <span class="k">return</span> <span class="bp">cls</span><span class="p">(</span><span class="n">path</span><span class="o">=</span><span class="n">path</span><span class="p">)</span> <span class="nd">@classmethod</span> <span class="k">def</span><span class="w"> </span><span class="nf">from_id</span><span class="p">(</span><span class="bp">cls</span><span class="p">,</span> <span class="nb">id</span><span class="p">:</span> <span class="nb">bytes</span><span class="p">)</span> <span class="o">-&gt;</span> <span class="n">PrivateKey</span><span class="p">:</span> <span class="w"> </span><span class="sd">&quot;&quot;&quot;</span> <span class="sd"> Creates a PrivateKey object from an arbitrary identifier. This may</span> <span class="sd"> be useful for implementations that rely on system private key stores.</span> <span class="sd"> &quot;&quot;&quot;</span> <span class="k">return</span> <span class="bp">cls</span><span class="p">(</span><span class="nb">id</span><span class="o">=</span><span class="nb">id</span><span class="p">)</span> </pre></div> </div> </section> <section id="signing-chain"> <h4><a class="toc-backref" href="#signing-chain" role="doc-backlink">Signing Chain</a></h4> <p>In order to authenticate themselves, TLS participants need to provide a leaf certificate with a chain leading up to some root certificate that is trusted by the other side. Servers always need to authenticate themselves to clients, but clients can also authenticate themselves to servers during client authentication. Additionally, the leaf certificate must be accompanied by a private key, which can either be stored in a separate object, or together with the leaf certificate itself. This module defines the collection of these objects as a <code class="docutils literal notranslate"><span class="pre">SigningChain</span></code> as detailed below:</p> <div class="highlight-python notranslate"><div class="highlight"><pre><span></span><span class="k">class</span><span class="w"> </span><span class="nc">SigningChain</span><span class="p">:</span> <span class="w"> </span><span class="sd">&quot;&quot;&quot;Object representing a certificate chain used in TLS.&quot;&quot;&quot;</span> <span class="n">leaf</span><span class="p">:</span> <span class="nb">tuple</span><span class="p">[</span><span class="n">Certificate</span><span class="p">,</span> <span class="n">PrivateKey</span> <span class="o">|</span> <span class="kc">None</span><span class="p">]</span> <span class="n">chain</span><span class="p">:</span> <span class="nb">list</span><span class="p">[</span><span class="n">Certificate</span><span class="p">]</span> <span class="k">def</span><span class="w"> </span><span class="fm">__init__</span><span class="p">(</span> <span class="bp">self</span><span class="p">,</span> <span class="n">leaf</span><span class="p">:</span> <span class="nb">tuple</span><span class="p">[</span><span class="n">Certificate</span><span class="p">,</span> <span class="n">PrivateKey</span> <span class="o">|</span> <span class="kc">None</span><span class="p">],</span> <span class="n">chain</span><span class="p">:</span> <span class="n">Sequence</span><span class="p">[</span><span class="n">Certificate</span><span class="p">]</span> <span class="o">|</span> <span class="kc">None</span> <span class="o">=</span> <span class="kc">None</span><span class="p">,</span> <span class="p">):</span> <span class="w"> </span><span class="sd">&quot;&quot;&quot;Initializes a SigningChain object.&quot;&quot;&quot;</span> <span class="bp">self</span><span class="o">.</span><span class="n">leaf</span> <span class="o">=</span> <span class="n">leaf</span> <span class="k">if</span> <span class="n">chain</span> <span class="ow">is</span> <span class="kc">None</span><span class="p">:</span> <span class="n">chain</span> <span class="o">=</span> <span class="p">[]</span> <span class="bp">self</span><span class="o">.</span><span class="n">chain</span> <span class="o">=</span> <span class="nb">list</span><span class="p">(</span><span class="n">chain</span><span class="p">)</span> </pre></div> </div> <p>As shown in the configuration classes above, a client can have one signing chain in the case of client authentication or none otherwise. A server can have a sequence of signing chains, which is useful when it is responsible for multiple domains.</p> </section> <section id="trust-store"> <h4><a class="toc-backref" href="#trust-store" role="doc-backlink">Trust Store</a></h4> <p>As discussed above, loading a trust store represents an issue because different TLS implementations vary wildly in how they allow users to select trust stores. For this reason, we need to provide a model that assumes very little about the form that trust stores take.</p> <p>This problem is the same as the one that the <code class="docutils literal notranslate"><span class="pre">Certificate</span></code> and <code class="docutils literal notranslate"><span class="pre">PrivateKey</span></code> types need to solve. For this reason, we use the exact same model, by creating a concrete class that captures the various means of how users could define a trust store.</p> <p>A given TLS implementation is not required to handle all possible trust stores. However, it is strongly recommended that a given TLS implementation handles the <code class="docutils literal notranslate"><span class="pre">system</span></code> constructor if at all possible, as this is the most common validation trust store that is used. TLS implementations can communicate unsupported options as described in the “Runtime” section below.</p> <div class="highlight-python notranslate"><div class="highlight"><pre><span></span><span class="k">class</span><span class="w"> </span><span class="nc">TrustStore</span><span class="p">:</span> <span class="w"> </span><span class="sd">&quot;&quot;&quot;</span> <span class="sd"> The trust store that is used to verify certificate validity.</span> <span class="sd"> &quot;&quot;&quot;</span> <span class="vm">__slots__</span> <span class="o">=</span> <span class="p">(</span> <span class="s2">&quot;_buffer&quot;</span><span class="p">,</span> <span class="s2">&quot;_path&quot;</span><span class="p">,</span> <span class="s2">&quot;_id&quot;</span><span class="p">,</span> <span class="p">)</span> <span class="k">def</span><span class="w"> </span><span class="fm">__init__</span><span class="p">(</span> <span class="bp">self</span><span class="p">,</span> <span class="n">buffer</span><span class="p">:</span> <span class="nb">bytes</span> <span class="o">|</span> <span class="kc">None</span> <span class="o">=</span> <span class="kc">None</span><span class="p">,</span> <span class="n">path</span><span class="p">:</span> <span class="n">os</span><span class="o">.</span><span class="n">PathLike</span> <span class="o">|</span> <span class="kc">None</span> <span class="o">=</span> <span class="kc">None</span><span class="p">,</span> <span class="nb">id</span><span class="p">:</span> <span class="nb">bytes</span> <span class="o">|</span> <span class="kc">None</span> <span class="o">=</span> <span class="kc">None</span> <span class="p">):</span> <span class="w"> </span><span class="sd">&quot;&quot;&quot;</span> <span class="sd"> Creates a TrustStore object from a path, buffer, or ID.</span> <span class="sd"> If none of these is given, the default system trust store is used.</span> <span class="sd"> &quot;&quot;&quot;</span> <span class="bp">self</span><span class="o">.</span><span class="n">_buffer</span> <span class="o">=</span> <span class="n">buffer</span> <span class="bp">self</span><span class="o">.</span><span class="n">_path</span> <span class="o">=</span> <span class="n">path</span> <span class="bp">self</span><span class="o">.</span><span class="n">_id</span> <span class="o">=</span> <span class="nb">id</span> <span class="nd">@classmethod</span> <span class="k">def</span><span class="w"> </span><span class="nf">system</span><span class="p">(</span><span class="bp">cls</span><span class="p">)</span> <span class="o">-&gt;</span> <span class="n">TrustStore</span><span class="p">:</span> <span class="w"> </span><span class="sd">&quot;&quot;&quot;</span> <span class="sd"> Returns a TrustStore object that represents the system trust</span> <span class="sd"> database.</span> <span class="sd"> &quot;&quot;&quot;</span> <span class="k">return</span> <span class="bp">cls</span><span class="p">()</span> <span class="nd">@classmethod</span> <span class="k">def</span><span class="w"> </span><span class="nf">from_buffer</span><span class="p">(</span><span class="bp">cls</span><span class="p">,</span> <span class="n">buffer</span><span class="p">:</span> <span class="nb">bytes</span><span class="p">)</span> <span class="o">-&gt;</span> <span class="n">TrustStore</span><span class="p">:</span> <span class="w"> </span><span class="sd">&quot;&quot;&quot;</span> <span class="sd"> Initializes a trust store from a buffer of PEM-encoded certificates.</span> <span class="sd"> &quot;&quot;&quot;</span> <span class="k">return</span> <span class="bp">cls</span><span class="p">(</span><span class="n">buffer</span><span class="o">=</span><span class="n">buffer</span><span class="p">)</span> <span class="nd">@classmethod</span> <span class="k">def</span><span class="w"> </span><span class="nf">from_file</span><span class="p">(</span><span class="bp">cls</span><span class="p">,</span> <span class="n">path</span><span class="p">:</span> <span class="n">os</span><span class="o">.</span><span class="n">PathLike</span><span class="p">)</span> <span class="o">-&gt;</span> <span class="n">TrustStore</span><span class="p">:</span> <span class="w"> </span><span class="sd">&quot;&quot;&quot;</span> <span class="sd"> Initializes a trust store from a single file containing PEMs.</span> <span class="sd"> &quot;&quot;&quot;</span> <span class="k">return</span> <span class="bp">cls</span><span class="p">(</span><span class="n">path</span><span class="o">=</span><span class="n">path</span><span class="p">)</span> <span class="nd">@classmethod</span> <span class="k">def</span><span class="w"> </span><span class="nf">from_id</span><span class="p">(</span><span class="bp">cls</span><span class="p">,</span> <span class="nb">id</span><span class="p">:</span> <span class="nb">bytes</span><span class="p">)</span> <span class="o">-&gt;</span> <span class="n">TrustStore</span><span class="p">:</span> <span class="w"> </span><span class="sd">&quot;&quot;&quot;</span> <span class="sd"> Initializes a trust store from an arbitrary identifier.</span> <span class="sd"> &quot;&quot;&quot;</span> <span class="k">return</span> <span class="bp">cls</span><span class="p">(</span><span class="nb">id</span><span class="o">=</span><span class="nb">id</span><span class="p">)</span> </pre></div> </div> </section> <section id="runtime-access"> <h4><a class="toc-backref" href="#runtime-access" role="doc-backlink">Runtime Access</a></h4> <p>A not-uncommon use case is for library users to want to specify the TLS implementation to use while allowing the library to configure the details of the actual TLS connection. For example, users of <a class="extlink-pypi reference external" href="https://pypi.org/project/requests/">requests</a> may want to be able to select between OpenSSL or a platform-native solution on Windows and macOS, or between OpenSSL and NSS on some Linux platforms. These users, however, may not care about exactly how their TLS configuration is done.</p> <p>This poses two problems: given an arbitrary concrete implementation, how can a library:</p> <ul class="simple"> <li>Work out whether the implementation supports particular constructors for certificates or trust stores (e.g. from arbitrary identifiers)?</li> <li>Get the correct types for the two context classes?</li> </ul> <p>Constructing certificate and trust store objects should be possible outside of the implementation. Therefore, the implementations need to provide a way for users to verify whether the implementation is compatible with user-constructed certificates and trust stores. Therefore, each implementation should implement a <code class="docutils literal notranslate"><span class="pre">validate_config</span></code> method that takes a <code class="docutils literal notranslate"><span class="pre">TLSClientConfiguration</span></code> or <code class="docutils literal notranslate"><span class="pre">TLSServerConfiguration</span></code> object and raises an exception if unsupported constructors were used.</p> <p>For the types, there are two options: either all concrete implementations can be required to fit into a specific naming scheme, or we can provide an API that makes it possible to grab these objects.</p> <p>This PEP proposes that we use the second approach. This grants the greatest freedom to concrete implementations to structure their code as they see fit, requiring only that they provide a single object that has the appropriate properties in place. Users can then pass this implementation object to libraries that support it, and those libraries can take care of configuring and using the concrete implementation.</p> <p>All concrete implementations must provide a method of obtaining a <code class="docutils literal notranslate"><span class="pre">TLSImplementation</span></code> object. The <code class="docutils literal notranslate"><span class="pre">TLSImplementation</span></code> object can be a global singleton or can be created by a callable if there is an advantage in doing that.</p> <p>The <code class="docutils literal notranslate"><span class="pre">TLSImplementation</span></code> object has the following definition:</p> <div class="highlight-python notranslate"><div class="highlight"><pre><span></span><span class="k">class</span><span class="w"> </span><span class="nc">TLSImplementation</span><span class="p">(</span><span class="n">Generic</span><span class="p">[</span><span class="n">_ClientContext</span><span class="p">,</span> <span class="n">_ServerContext</span><span class="p">]):</span> <span class="vm">__slots__</span> <span class="o">=</span> <span class="p">(</span> <span class="s2">&quot;_client_context&quot;</span><span class="p">,</span> <span class="s2">&quot;_server_context&quot;</span><span class="p">,</span> <span class="s2">&quot;_validate_config&quot;</span><span class="p">,</span> <span class="p">)</span> <span class="k">def</span><span class="w"> </span><span class="fm">__init__</span><span class="p">(</span> <span class="bp">self</span><span class="p">,</span> <span class="n">client_context</span><span class="p">:</span> <span class="nb">type</span><span class="p">[</span><span class="n">_ClientContext</span><span class="p">],</span> <span class="n">server_context</span><span class="p">:</span> <span class="nb">type</span><span class="p">[</span><span class="n">_ServerContext</span><span class="p">],</span> <span class="n">validate_config</span><span class="p">:</span> <span class="n">Callable</span><span class="p">[[</span><span class="n">TLSClientConfiguration</span> <span class="o">|</span> <span class="n">TLSServerConfiguration</span><span class="p">],</span> <span class="kc">None</span><span class="p">],</span> <span class="p">)</span> <span class="o">-&gt;</span> <span class="kc">None</span><span class="p">:</span> <span class="bp">self</span><span class="o">.</span><span class="n">_client_context</span> <span class="o">=</span> <span class="n">client_context</span> <span class="bp">self</span><span class="o">.</span><span class="n">_server_context</span> <span class="o">=</span> <span class="n">server_context</span> <span class="bp">self</span><span class="o">.</span><span class="n">_validate_config</span> <span class="o">=</span> <span class="n">validate_config</span> </pre></div> </div> <p>The first two properties must provide the concrete implementation of the relevant Protocol class. For example, for the client context:</p> <div class="highlight-python notranslate"><div class="highlight"><pre><span></span><span class="nd">@property</span> <span class="k">def</span><span class="w"> </span><span class="nf">client_context</span><span class="p">(</span><span class="bp">self</span><span class="p">)</span> <span class="o">-&gt;</span> <span class="nb">type</span><span class="p">[</span><span class="n">_ClientContext</span><span class="p">]:</span> <span class="w"> </span><span class="sd">&quot;&quot;&quot;The concrete implementation of the PEP 543 Client Context object,</span> <span class="sd"> if this TLS implementation supports being the client on a TLS connection.</span> <span class="sd"> &quot;&quot;&quot;</span> <span class="k">return</span> <span class="bp">self</span><span class="o">.</span><span class="n">_client_context</span> </pre></div> </div> <p>This ensures that code like this will work for any implementation:</p> <div class="highlight-python notranslate"><div class="highlight"><pre><span></span><span class="n">client_config</span> <span class="o">=</span> <span class="n">TLSClientConfiguration</span><span class="p">()</span> <span class="n">client_context</span> <span class="o">=</span> <span class="n">implementation</span><span class="o">.</span><span class="n">client_context</span><span class="p">(</span><span class="n">client_config</span><span class="p">)</span> </pre></div> </div> <p>The third property must provide a function that verifies whether a given TLS configuration contains implementation-compatible certificates, private keys, and a trust store:</p> <div class="highlight-python notranslate"><div class="highlight"><pre><span></span><span class="nd">@property</span> <span class="k">def</span><span class="w"> </span><span class="nf">validate_config</span><span class="p">(</span><span class="bp">self</span><span class="p">)</span> <span class="o">-&gt;</span> <span class="n">Callable</span><span class="p">[[</span><span class="n">TLSClientConfiguration</span> <span class="o">|</span> <span class="n">TLSServerConfiguration</span><span class="p">],</span> <span class="kc">None</span><span class="p">]:</span> <span class="w"> </span><span class="sd">&quot;&quot;&quot;A function that reveals whether this TLS implementation supports a</span> <span class="sd"> particular TLS configuration.</span> <span class="sd"> &quot;&quot;&quot;</span> <span class="k">return</span> <span class="bp">self</span><span class="o">.</span><span class="n">_validate_config</span> </pre></div> </div> <p>Note that this function only needs to verify that supported constructors were used for the certificates, private keys, and trust store. It does not need to parse or retrieve the objects to validate them further.</p> </section> </section> <section id="insecure-usage"> <h3><a class="toc-backref" href="#insecure-usage" role="doc-backlink">Insecure Usage</a></h3> <p>All of the above assumes that users want to use the module in a secure way. Sometimes, users want to do imprudent things like disable certificate validation for testing purposes. To this end, we propose a separate <code class="docutils literal notranslate"><span class="pre">insecure</span></code> module that allows users to do this. This module contains insecure variants of the configuration, context, and implementation objects, which allow to disable certificate validation as well as the server hostname check.</p> <p>This functionality is placed in a separate module to make it as hard as possible for legitimate users to accidentally use the insecure functionality. Additionally, it defines a new warning called <code class="docutils literal notranslate"><span class="pre">SecurityWarning</span></code>, and loudly warns at every step of the way when trying to create an insecure connection.</p> <p>This module is only intended for testing purposes. In real-world situations where a user wants to connect to some IoT device which only has a self-signed certificate, it is strongly recommended to add this certificate into a custom trust store, rather than using the insecure module to disable certificate validation.</p> </section> </section> <section id="changes-to-the-standard-library"> <h2><a class="toc-backref" href="#changes-to-the-standard-library" role="doc-backlink">Changes to the Standard Library</a></h2> <p>The portions of the standard library that interact with TLS should be revised to use these Protocol classes. This will allow them to function with other TLS implementations. This includes the following modules:</p> <ul class="simple"> <li><a class="reference external" href="https://docs.python.org/3/library/asyncio.html#module-asyncio" title="(in Python v3.13)"><code class="xref py py-mod docutils literal notranslate"><span class="pre">asyncio</span></code></a></li> <li><a class="reference external" href="https://docs.python.org/3/library/ftplib.html#module-ftplib" title="(in Python v3.13)"><code class="xref py py-mod docutils literal notranslate"><span class="pre">ftplib</span></code></a></li> <li><a class="reference external" href="https://docs.python.org/3/library/http.html#module-http" title="(in Python v3.13)"><code class="xref py py-mod docutils literal notranslate"><span class="pre">http</span></code></a></li> <li><a class="reference external" href="https://docs.python.org/3/library/imaplib.html#module-imaplib" title="(in Python v3.13)"><code class="xref py py-mod docutils literal notranslate"><span class="pre">imaplib</span></code></a></li> <li><a class="reference external" href="https://docs.python.org/3/library/nntplib.html#module-nntplib" title="(in Python v3.13)"><code class="xref py py-mod docutils literal notranslate"><span class="pre">nntplib</span></code></a></li> <li><a class="reference external" href="https://docs.python.org/3/library/poplib.html#module-poplib" title="(in Python v3.13)"><code class="xref py py-mod docutils literal notranslate"><span class="pre">poplib</span></code></a></li> <li><a class="reference external" href="https://docs.python.org/3/library/smtplib.html#module-smtplib" title="(in Python v3.13)"><code class="xref py py-mod docutils literal notranslate"><span class="pre">smtplib</span></code></a></li> <li><a class="reference external" href="https://docs.python.org/3/library/urllib.html#module-urllib" title="(in Python v3.13)"><code class="xref py py-mod docutils literal notranslate"><span class="pre">urllib</span></code></a></li> </ul> <section id="migration-of-the-ssl-module"> <h3><a class="toc-backref" href="#migration-of-the-ssl-module" role="doc-backlink">Migration of the ssl module</a></h3> <p>Naturally, we will need to extend the <a class="reference external" href="https://docs.python.org/3/library/ssl.html#module-ssl" title="(in Python v3.13)"><code class="xref py py-mod docutils literal notranslate"><span class="pre">ssl</span></code></a> module itself to conform to these Protocol classes. This extension will take the form of new classes, potentially in an entirely new module. This will allow applications that take advantage of the current <a class="reference external" href="https://docs.python.org/3/library/ssl.html#module-ssl" title="(in Python v3.13)"><code class="xref py py-mod docutils literal notranslate"><span class="pre">ssl</span></code></a> module to continue to do so, while enabling the new APIs for applications and libraries that want to use them.</p> <p>In general, migrating from the <a class="reference external" href="https://docs.python.org/3/library/ssl.html#module-ssl" title="(in Python v3.13)"><code class="xref py py-mod docutils literal notranslate"><span class="pre">ssl</span></code></a> module to the new Protocol classes is not expected to be one-to-one. This is normally acceptable: most tools that use the <a class="reference external" href="https://docs.python.org/3/library/ssl.html#module-ssl" title="(in Python v3.13)"><code class="xref py py-mod docutils literal notranslate"><span class="pre">ssl</span></code></a> module hide it from the user, and so refactoring to use the new module should be invisible.</p> <p>However, a specific problem comes from libraries or applications that leak exceptions from the <a class="reference external" href="https://docs.python.org/3/library/ssl.html#module-ssl" title="(in Python v3.13)"><code class="xref py py-mod docutils literal notranslate"><span class="pre">ssl</span></code></a> module, either as part of their defined API or by accident (which is easily done). Users of those tools may have written code that tolerates and handles exceptions from the <a class="reference external" href="https://docs.python.org/3/library/ssl.html#module-ssl" title="(in Python v3.13)"><code class="xref py py-mod docutils literal notranslate"><span class="pre">ssl</span></code></a> module being raised: migrating to the protocol classes presented here would potentially cause the exceptions defined above to be thrown instead, and existing <code class="docutils literal notranslate"><span class="pre">except</span></code> blocks will not catch them.</p> <p>For this reason, part of the migration of the <a class="reference external" href="https://docs.python.org/3/library/ssl.html#module-ssl" title="(in Python v3.13)"><code class="xref py py-mod docutils literal notranslate"><span class="pre">ssl</span></code></a> module would require that the exceptions in the <a class="reference external" href="https://docs.python.org/3/library/ssl.html#module-ssl" title="(in Python v3.13)"><code class="xref py py-mod docutils literal notranslate"><span class="pre">ssl</span></code></a> module alias those defined above. That is, they would require the following statements to all succeed:</p> <div class="highlight-python notranslate"><div class="highlight"><pre><span></span><span class="k">assert</span> <span class="n">ssl</span><span class="o">.</span><span class="n">SSLError</span> <span class="ow">is</span> <span class="n">tls</span><span class="o">.</span><span class="n">TLSError</span> <span class="k">assert</span> <span class="n">ssl</span><span class="o">.</span><span class="n">SSLWantReadError</span> <span class="ow">is</span> <span class="n">tls</span><span class="o">.</span><span class="n">WantReadError</span> <span class="k">assert</span> <span class="n">ssl</span><span class="o">.</span><span class="n">SSLWantWriteError</span> <span class="ow">is</span> <span class="n">tls</span><span class="o">.</span><span class="n">WantWriteError</span> </pre></div> </div> <p>The exact mechanics of how this will be done are beyond the scope of this PEP, as they are made more complex due to the fact that the current ssl exceptions are defined in C code, but more details can be found in <a class="reference external" href="https://mail.python.org/pipermail/security-sig/2017-January/000213.html">an email sent to the Security-SIG by Christian Heimes</a>.</p> </section> </section> <section id="future"> <h2><a class="toc-backref" href="#future" role="doc-backlink">Future</a></h2> <p>Major future TLS features may require revisions of these protocol classes. These revisions should be made cautiously: many implementations may not be able to move forward swiftly, and will be invalidated by changes in these protocol classes. This is acceptable, but wherever possible features that are specific to individual implementations should not be added to the protocol classes. The protocol classes should restrict themselves to high-level descriptions of IETF-specified features.</p> <p>However, well-justified extensions to this API absolutely should be made. The focus of this API is to provide a unifying lowest-common-denominator configuration option for the Python community. TLS is not a static target, and as TLS evolves so must this API.</p> </section> <section id="credits"> <h2><a class="toc-backref" href="#credits" role="doc-backlink">Credits</a></h2> <p>This PEP is adapted substantially from <a class="pep reference internal" href="../pep-0543/" title="PEP 543 – A Unified TLS API for Python">PEP 543</a>, which was withdrawn in 2020. <a class="pep reference internal" href="../pep-0543/" title="PEP 543 – A Unified TLS API for Python">PEP 543</a> was authored by Cory Benfield and Christian Heimes, and received extensive review from a number of individuals in the community who have substantially helped shape it. Detailed review for both <a class="pep reference internal" href="../pep-0543/" title="PEP 543 – A Unified TLS API for Python">PEP 543</a> and this PEP was provided by:</p> <ul class="simple"> <li>Alex Chan</li> <li>Alex Gaynor</li> <li>Antoine Pitrou</li> <li>Ashwini Oruganti</li> <li>Donald Stufft</li> <li>Ethan Furman</li> <li>Glyph</li> <li>Hynek Schlawack</li> <li>Jim J Jewett</li> <li>Nathaniel J. Smith</li> <li>Alyssa Coghlan</li> <li>Paul Kehrer</li> <li>Steve Dower</li> <li>Steven Fackler</li> <li>Wes Turner</li> <li>Will Bond</li> <li>Cory Benfield</li> <li>Marc-André Lemburg</li> <li>Seth M. Larson</li> <li>Victor Stinner</li> <li>Ronald Oussoren</li> </ul> <p>Further review of <a class="pep reference internal" href="../pep-0543/" title="PEP 543 – A Unified TLS API for Python">PEP 543</a> was provided by the Security-SIG and python-ideas mailing lists.</p> </section> <section id="copyright"> <h2><a class="toc-backref" href="#copyright" role="doc-backlink">Copyright</a></h2> <p>This document is placed in the public domain or under the CC0-1.0-Universal license, whichever is more permissive.</p> </section> </section> <hr class="docutils" /> <p>Source: <a class="reference external" href="https://github.com/python/peps/blob/main/peps/pep-0748.rst">https://github.com/python/peps/blob/main/peps/pep-0748.rst</a></p> <p>Last modified: <a class="reference external" href="https://github.com/python/peps/commits/main/peps/pep-0748.rst">2025-04-01 14:40:02 GMT</a></p> </article> <nav id="pep-sidebar"> <h2>Contents</h2> <ul> <li><a class="reference internal" href="#abstract">Abstract</a></li> <li><a class="reference internal" href="#rationale">Rationale</a><ul> <li><a class="reference internal" href="#problems">Problems</a></li> </ul> </li> <li><a class="reference internal" href="#proposal">Proposal</a><ul> <li><a class="reference internal" href="#interfaces">Interfaces</a><ul> <li><a class="reference internal" href="#configuration">Configuration</a></li> <li><a class="reference internal" href="#context">Context</a></li> <li><a class="reference internal" href="#socket">Socket</a></li> <li><a class="reference internal" href="#buffer">Buffer</a></li> <li><a class="reference internal" href="#cipher-suites">Cipher Suites</a><ul> <li><a class="reference internal" href="#openssl">OpenSSL</a></li> <li><a class="reference internal" href="#network-framework">Network Framework</a></li> <li><a class="reference internal" href="#schannel">SChannel</a></li> <li><a class="reference internal" href="#network-security-services-nss">Network Security Services (NSS)</a></li> <li><a class="reference internal" href="#proposed-interface">Proposed Interface</a></li> </ul> </li> <li><a class="reference internal" href="#protocol-negotiation">Protocol Negotiation</a></li> <li><a class="reference internal" href="#tls-versions">TLS Versions</a></li> <li><a class="reference internal" href="#errors">Errors</a></li> <li><a class="reference internal" href="#certificates">Certificates</a></li> <li><a class="reference internal" href="#private-keys">Private Keys</a></li> <li><a class="reference internal" href="#signing-chain">Signing Chain</a></li> <li><a class="reference internal" href="#trust-store">Trust Store</a></li> <li><a class="reference internal" href="#runtime-access">Runtime Access</a></li> </ul> </li> <li><a class="reference internal" href="#insecure-usage">Insecure Usage</a></li> </ul> </li> <li><a class="reference internal" href="#changes-to-the-standard-library">Changes to the Standard Library</a><ul> <li><a class="reference internal" href="#migration-of-the-ssl-module">Migration of the ssl module</a></li> </ul> </li> <li><a class="reference internal" href="#future">Future</a></li> <li><a class="reference internal" href="#credits">Credits</a></li> <li><a class="reference internal" href="#copyright">Copyright</a></li> </ul> <br> <a id="source" href="https://github.com/python/peps/blob/main/peps/pep-0748.rst">Page Source (GitHub)</a> </nav> </section> <script src="../_static/colour_scheme.js"></script> <script src="../_static/wrap_tables.js"></script> <script src="../_static/sticky_banner.js"></script> </body> </html>

Pages: 1 2 3 4 5 6 7 8 9 10