sruester added the comment:
PEP 543 was withdrawn in the meantime. Any suggestion how to proceed with this?
--
versions: +Python 3.10, Python 3.11, Python 3.9
___
Python tracker
<https://bugs.python.org/issue32
sruester added the comment:
How about a new method crypto_information() and making cipher() a wrapper
around that one? The former could return a named tupple with handshake
information together with all other relevant crypto information about the
current session.
This would eliminate the
Change by sruester :
--
pull_requests: +5550
___
Python tracker
<https://bugs.python.org/issue32882>
___
___
Python-bugs-list mailing list
Unsubscribe:
Change by sruester :
--
keywords: +patch
pull_requests: +5549
stage: needs patch -> patch review
___
Python tracker
<https://bugs.python.org/issue32882>
___
_
sruester added the comment:
I agree, we shouldn't support that confusion. I opened two separate issues
https://bugs.python.org/issue32882 and https://bugs.python.org/issue32883 and
will close this one now.
--
resolution: -> wont fix
stage: patch review -> resolved
s
New submission from sruester :
Using python it is not possible to retrieve information about the key
exchange/agreement method that was used during session setup.
A method should be added to a suitable SSL* object that allows to retrieve
information such as whether ECDH with which curves, or
New submission from sruester :
Using SSLContext.set_ecdh_curve() it is neither possible to choose X25519, nor
to choose a list of curves to be used for key agreement.
--
assignee: christian.heimes
components: SSL
messages: 312405
nosy: christian.heimes, sruester
priority: normal
sruester added the comment:
AppVeyor build failed for pull request 5707. It looks like there was a problem
with the build environment.
--
___
Python tracker
<https://bugs.python.org/issue32
Change by sruester :
--
pull_requests: +5495
___
Python tracker
<https://bugs.python.org/issue32858>
___
___
Python-bugs-list mailing list
Unsubscribe:
sruester added the comment:
I'd really love to see kxinfo() or a similar method in the standard. I chose to
implement it similar to cipher() which seemed to be a good idea then. If there
are any objections, please let's discuss how that information can be made
available otherwise.
sruester added the comment:
Attached script shows usage
--
Added file: https://bugs.python.org/file47449/ssl-host-check.py
___
Python tracker
<https://bugs.python.org/issue32
sruester added the comment:
With OpenSSL 1.1.0g, the Code
int nid = OBJ_sn2nid("X25519");
EC_KEY *key = EC_KEY_new_by_curve_name(nid);
printf("id:%i key:%p\n", nid, key);
gives
id:1034 key:(nil)
EC_KEY_new_by_curve_name is IMHO not the best option to define client
Change by sruester :
--
keywords: +patch
pull_requests: +5489
stage: needs patch -> patch review
___
Python tracker
<https://bugs.python.org/issue32858>
___
_
13 matches
Mail list logo