Daniel Black added the comment:
Thanks Karthikeyan. That is a bit cumbersome but gets it done. Any value seen
in adding as proposed?
--
___
Python tracker
<https://bugs.python.org/issue36
New submission from Daniel Black :
In https://bugs.python.org/issue36460 (which should be probably be disregarded
until AMP is in RFC) I discovered that the types_map dictionary within the
mimetypes module is a key: str to key: str (1:1) relationship. The reality is
that many filename
Daniel Black added the comment:
That's exactly what I meant: use, but in a way that cares how that data is
structured. Thanks for the pointer, I'll take a look.
--
___
Python tracker
<https://bugs.python.o
Daniel Black added the comment:
I see! Okay... I'll consider a solution to the filetype portion of the
mimetypes map. Do you happen to know which other modules may depend on that
structure?
Yes... the lightning is silly.
Dan Black
http://dan.black
917-873-3970
On Thu, Mar 28, 2019 at
Daniel Black added the comment:
I'm not sure there's an RFC. I searched ietf but found none related to AMP
in MIME and AMP along search results were many (not accurate). I actually
doubt there's an RFC specific to AMP. What I meant is that AMP is itself
RFC compliant with RFC 20
Daniel Black added the comment:
fine by me. was just a thought
--
___
Python tracker
<http://bugs.python.org/issue21207>
___
___
Python-bugs-list mailin
Daniel Black added the comment:
maybe you've thought and dismissed this already but os.close could call
dev_urandom_close for the urandom_fd. Then there's no fstat calls in every
random access. As a sweeping close all isn't going to occur that often and
extra open probably
Changes by Daniel Black :
--
nosy: +grooverdan
___
Python tracker
<http://bugs.python.org/issue21207>
___
___
Python-bugs-list mailing list
Unsubscribe:
Daniel Black added the comment:
nice patch. Thanks for finding the bug. I like the solution with test case.
Just needs a small enhancement of documention to ensure other users expect this
behaviour.
--
___
Python tracker
<http://bugs.python.
New submission from Daniel Black:
Following #9424 here's a patch that changes assertEquals -> assertEqual for
Lib/unittest/test/test_program.py
against hg tip as of now
--
components: Tests
files: unittest.patch
keywords: patch
messages: 184906
nosy: grooverdan
priority
Daniel Black added the comment:
Ack. Have fix. Simple if self.certfile or self.keyfile: test added before
load_cert_chain.
part way through developing test. Thinking #17181 would help.
--
___
Python tracker
<http://bugs.python.org/issue10
New submission from Daniel Black:
I think my original implementation of the SNI callback to see a original
sslcontext was wrong. It would be much more useful for the
SSLContext.set_servername_callback to take a callable and an object as an
argument.
This would allow constructs like the
Daniel Black added the comment:
ask and you shall receive :-)
--
keywords: +patch
nosy: +grooverdan
versions: +Python 3.5
Added file: http://bugs.python.org/file28948/https_sni_test.patch
___
Python tracker
<http://bugs.python.org/issue17
Daniel Black added the comment:
I thought previous comments you wanted SSLContext to become the primary api
rather than wrap_socket? Coding this into the examples is probably a good way
of making this happen.
--
___
Python tracker
<h
Daniel Black added the comment:
ok. should library/ssl.rst be updated to use a SSLContext example?
--
___
Python tracker
<http://bugs.python.org/issue10
Daniel Black added the comment:
acknowledged. Makes sense.
--
resolution: -> rejected
status: open -> closed
___
Python tracker
<http://bugs.python.org/i
Daniel Black added the comment:
dup #10853
--
nosy: -pitrou
resolution: -> duplicate
status: open -> closed
___
Python tracker
<http://bugs.python.org/i
New submission from Daniel Black :
Like r85793, sni is enabled by default for url and https classes. This
continues the consistency throughout the python libraries by adding it to other
places where wrap_socket is used to instigate a SSL/TLS connection.
--
components: Library (Lib
New submission from Daniel Black :
Like r85793, sni is enabled by default for url and https classes. This
continues the consistency throughout the python libraries by adding it to other
places where wrap_socket is used to instigate a SSL/TLS connection.
--
components: Library (Lib
Daniel Black added the comment:
issue #5639 only has functionality for client side SNI. Server side SNI is
still missing.
For server side SNI to be supported a server program should be able to retrieve
the server name provided by the client call and alter the server
certificate/key before
New submission from Daniel Black :
as a further extension to issue #5639 (sni) and issue #8322 this patch provides
the ability to set ciphers in the SSLContext.wrap_socket and server_hostname
in ssl.wrap_socket. This just makes all the ssl apis look the same.
Restructured the documentation
Daniel Black added the comment:
out of date?
still occurs on:
AMD64 Leopard 2.7: http://www.python.org/dev/buildbot/all/builders/AMD64
Leopard 2.7/builds/308/steps/compile/logs/warnings (57)
PPC Leopard 2.7: http://www.python.org/dev/buildbot/all/builders/PPC Leopard
2.7/builds/532/steps
Daniel Black added the comment:
> msg106323 - Author: Antoine Pitrou (pitrou) Date: 2010-05-22 20:17
I quite like your proposed alternative here. Not sure when/if I'll get to
implement this.
> msg106324 - Author: Jean-Paul Calderone (exarkun) Date: 2010-05-22 22:17
Sorry I don&
Daniel Black added the comment:
Hey Phil,
> (Sorry for dropping this, lost available time)
know the feeling :-(
> use of SNI needs to be something that can be disabled
maybe. See small rational below:
> and people need to be able to connect to host A while supplying host B
This seem
Daniel Black added the comment:
to prove it a bit more - ctype benchmark
>>> import ctypes, ctypes.util
>>> def uu1(n):
... t = time.time()
... _buffer = ctypes.create_string_buffer(16)
... for x in range(n):
... uuid._uuid_generate_time(_buffer)
..
Daniel Black added the comment:
This is a slightly crude module version. The speedups were only 10%
Python 3.2a0 (py3k:74612M, Sep 1 2009, 18:11:58)
[GCC 4.3.2] on linux2
Using the same test from Wang Chun:
before:
uuid1(100)
101.759 microseconds
after:
uuid1
New submission from Daniel Black :
xrange still exists in bits of documentation here and there.
patch fixes it.
--
assignee: georg.brandl
components: Documentation
files: xrange-doco.patch
keywords: patch
messages: 92120
nosy: georg.brandl, grooverdan
severity: normal
status: open
New submission from Daniel Black :
Release notes show the use of '{}'.format('this') and the attached patch
updates this to be the default example in the tutorial. Library
references are updated to show field_name as optional and a few examples
are added.
Relates to the imp
Daniel Black added the comment:
Is fixed in p3k Mon Sep 8 16:45:19 2008 UTC
http://svn.python.org/view/python/branches/py3k/Lib/test/test_ssl.py?r1=65837&r2=66311
--
nosy: +grooverdan
versions: +Python 3.1, Python 3.2
___
Python tracker
&
Daniel Black added the comment:
The changeset that changed the definitions is here:
http://cvs.openssl.org/chngview?cn=12024 (2004-Mar-14 23:15:13 (UTC))
As you can see there is no easy identifier in the changeset (i'm not
sure how portable an ifdef on a typedef is (possible
asn1_const_c
Daniel Black added the comment:
The small deficiency with these patches is that the specified
server_hostname is almost always the hostname that is used in the socket
pair of connect. Is it appropriate to grab the hostname value and use it
in the SNI extension header
Daniel Black added the comment:
current self tests cannot fully test the existence of the SNI extension
as there is no server side support.
This client script run with argument sni.velox.ch will show the "Great!
Your client its ClientHello: sni.velox.ch" on the output.
-
Changes by Daniel Black :
--
versions: +Python 2.7, Python 3.2 -Python 2.6
___
Python tracker
<http://bugs.python.org/issue5639>
___
___
Python-bugs-list mailin
Daniel Black added the comment:
py3k version
--
Added file: http://bugs.python.org/file14809/python-3K-74602-ssl_client_sni.path
___
Python tracker
<http://bugs.python.org/issue5
Daniel Black added the comment:
patch against TRUNK (2.7) with self tests and doco. Essentially the same
code as pdp with a SSLv2 check before using the SNI extension.
Contains some spacing cleanups that where highlighted by vim.
--
nosy: +grooverdan
Added file:
http
35 matches
Mail list logo