Antoine Pitrou added the comment:

The RFC is unhelpfully lousy. It's not enough to process a "522" error, since 
that can be triggered for different reasons. You also somehow have to interpret 
the error text to detect that session reuse is indeed mandated by the server.

Regardless, to progress with this we would first need to implement client-side 
SSL session reuse, which necessitates a bunch of additional APIs (since which 
session is to be reused is a decision made by user code), and a new opaque type 
to carry SSL_SESSION objects...

(see issue #8106)

----------
nosy: +christian.heimes, dstufft, janssen

_______________________________________
Python tracker <rep...@bugs.python.org>
<http://bugs.python.org/issue19500>
_______________________________________
_______________________________________________
Python-bugs-list mailing list
Unsubscribe: 
https://mail.python.org/mailman/options/python-bugs-list/archive%40mail-archive.com

Reply via email to