[issue32882] SSLContext.set_ecdh_curve() not accepting x25519

2021-04-21 Thread sruester
sruester added the comment: PEP 543 was withdrawn in the meantime. Any suggestion how to proceed with this? -- versions: +Python 3.10, Python 3.11, Python 3.9 ___ Python tracker <https://bugs.python.org/issue32

[issue32883] Key agreement parameters not accessible

2018-02-20 Thread sruester
sruester added the comment: How about a new method crypto_information() and making cipher() a wrapper around that one? The former could return a named tupple with handshake information together with all other relevant crypto information about the current session. This would eliminate the

[issue32882] SSLContext.set_ecdh_curve() not accepting x25519

2018-02-20 Thread sruester
Change by sruester : -- pull_requests: +5550 ___ Python tracker <https://bugs.python.org/issue32882> ___ ___ Python-bugs-list mailing list Unsubscribe:

[issue32882] SSLContext.set_ecdh_curve() not accepting x25519

2018-02-20 Thread sruester
Change by sruester : -- keywords: +patch pull_requests: +5549 stage: needs patch -> patch review ___ Python tracker <https://bugs.python.org/issue32882> ___ _

[issue32858] Improve OpenSSL ECDH support

2018-02-20 Thread sruester
sruester added the comment: I agree, we shouldn't support that confusion. I opened two separate issues https://bugs.python.org/issue32882 and https://bugs.python.org/issue32883 and will close this one now. -- resolution: -> wont fix stage: patch review -> resolved s

[issue32883] Key agreement parameters not accessible

2018-02-20 Thread sruester
New submission from sruester : Using python it is not possible to retrieve information about the key exchange/agreement method that was used during session setup. A method should be added to a suitable SSL* object that allows to retrieve information such as whether ECDH with which curves, or

[issue32882] SSLContext.set_ecdh_curve() not accepting x25519

2018-02-20 Thread sruester
New submission from sruester : Using SSLContext.set_ecdh_curve() it is neither possible to choose X25519, nor to choose a list of curves to be used for key agreement. -- assignee: christian.heimes components: SSL messages: 312405 nosy: christian.heimes, sruester priority: normal

[issue32858] Improve OpenSSL ECDH support

2018-02-19 Thread sruester
sruester added the comment: AppVeyor build failed for pull request 5707. It looks like there was a problem with the build environment. -- ___ Python tracker <https://bugs.python.org/issue32

[issue32858] Improve OpenSSL ECDH support

2018-02-16 Thread sruester
Change by sruester : -- pull_requests: +5495 ___ Python tracker <https://bugs.python.org/issue32858> ___ ___ Python-bugs-list mailing list Unsubscribe:

[issue32858] Improve OpenSSL ECDH support

2018-02-16 Thread sruester
sruester added the comment: I'd really love to see kxinfo() or a similar method in the standard. I chose to implement it similar to cipher() which seemed to be a good idea then. If there are any objections, please let's discuss how that information can be made available otherwise.

[issue32858] Improve OpenSSL ECDH support

2018-02-16 Thread sruester
sruester added the comment: Attached script shows usage -- Added file: https://bugs.python.org/file47449/ssl-host-check.py ___ Python tracker <https://bugs.python.org/issue32

[issue32858] Improve OpenSSL ECDH support

2018-02-16 Thread sruester
sruester added the comment: With OpenSSL 1.1.0g, the Code int nid = OBJ_sn2nid("X25519"); EC_KEY *key = EC_KEY_new_by_curve_name(nid); printf("id:%i key:%p\n", nid, key); gives id:1034 key:(nil) EC_KEY_new_by_curve_name is IMHO not the best option to define client

[issue32858] Improve OpenSSL ECDH support

2018-02-16 Thread sruester
Change by sruester : -- keywords: +patch pull_requests: +5489 stage: needs patch -> patch review ___ Python tracker <https://bugs.python.org/issue32858> ___ _