[issue36489] add filename_extension_map and/or content-types_map dict(s) to mimetypes

2019-04-03 Thread Daniel Black
Daniel Black added the comment: Thanks Karthikeyan. That is a bit cumbersome but gets it done. Any value seen in adding as proposed? -- ___ Python tracker <https://bugs.python.org/issue36

[issue36489] add filename_extension_map and/or content-types_map dict(s) to mimetypes

2019-03-30 Thread Daniel Black
New submission from Daniel Black : In https://bugs.python.org/issue36460 (which should be probably be disregarded until AMP is in RFC) I discovered that the types_map dictionary within the mimetypes module is a key: str to key: str (1:1) relationship. The reality is that many filename

[issue36460] Add AMP MIME type support

2019-03-28 Thread Daniel Black
Daniel Black added the comment: That's exactly what I meant: use, but in a way that cares how that data is structured. Thanks for the pointer, I'll take a look. -- ___ Python tracker <https://bugs.python.org/issue36

[issue36460] Add AMP MIME type support

2019-03-28 Thread Daniel Black
Daniel Black added the comment: I see! Okay... I'll consider a solution to the filetype portion of the mimetypes map. Do you happen to know which other modules may depend on that structure? Yes... the lightning is silly. Dan Black http://dan.black 917-873-3970 On Thu, Mar 28, 2019 at 10:55

[issue36460] Add AMP MIME type support

2019-03-28 Thread Daniel Black
Daniel Black added the comment: I'm not sure there's an RFC. I searched ietf but found none related to AMP in MIME and AMP along search results were many (not accurate). I actually doubt there's an RFC specific to AMP. What I meant is that AMP is itself RFC compliant with RFC 2045-2050

[issue21207] urandom persistent fd - not re-openned after fd close

2014-04-22 Thread Daniel Black
Daniel Black added the comment: maybe you've thought and dismissed this already but os.close could call dev_urandom_close for the urandom_fd. Then there's no fstat calls in every random access. As a sweeping close all isn't going to occur that often and extra open probably isn't that much

[issue21207] urandom persistent fd - not re-openned after fd close

2014-04-22 Thread Daniel Black
Daniel Black added the comment: fine by me. was just a thought -- ___ Python tracker rep...@bugs.python.org http://bugs.python.org/issue21207 ___ ___ Python-bugs-list

[issue21207] urandom persistent fd - not re-openned after fd close

2014-04-16 Thread Daniel Black
Changes by Daniel Black daniel.s...@internode.on.net: -- nosy: +grooverdan ___ Python tracker rep...@bugs.python.org http://bugs.python.org/issue21207 ___ ___ Python-bugs

[issue8109] Server-side support for TLS Server Name Indication extension

2013-04-10 Thread Daniel Black
Daniel Black added the comment: nice patch. Thanks for finding the bug. I like the solution with test case. Just needs a small enhancement of documention to ensure other users expect this behaviour. -- ___ Python tracker rep...@bugs.python.org http

[issue17510] assertEquals deprecated in test_program.py (unittest)

2013-03-21 Thread Daniel Black
New submission from Daniel Black: Following #9424 here's a patch that changes assertEquals - assertEqual for Lib/unittest/test/test_program.py against hg tip as of now -- components: Tests files: unittest.patch keywords: patch messages: 184906 nosy: grooverdan priority: normal

[issue17181] SSLContext.set_servername_callback should be able to set argument

2013-02-11 Thread Daniel Black
New submission from Daniel Black: I think my original implementation of the SNI callback to see a original sslcontext was wrong. It would be much more useful for the SSLContext.set_servername_callback to take a callable and an object as an argument. This would allow constructs like

[issue10852] SSL/TLS sni use in smtp, pop, imap, nntp, ftp client libs by default

2013-02-11 Thread Daniel Black
Daniel Black added the comment: Ack. Have fix. Simple if self.certfile or self.keyfile: test added before load_cert_chain. part way through developing test. Thinking #17181 would help. -- ___ Python tracker rep...@bugs.python.org http

[issue17107] test_sni in test_urllib2net could be enabled

2013-02-03 Thread Daniel Black
Daniel Black added the comment: ask and you shall receive :-) -- keywords: +patch nosy: +grooverdan versions: +Python 3.5 Added file: http://bugs.python.org/file28948/https_sni_test.patch ___ Python tracker rep...@bugs.python.org http

[issue10852] SSL/TLS sni use in smtp, pop, imap, nntp, ftp client libs by default

2011-01-24 Thread Daniel Black
Daniel Black daniel.s...@internode.on.net added the comment: ok. should library/ssl.rst be updated to use a SSLContext example? -- ___ Python tracker rep...@bugs.python.org http://bugs.python.org/issue10852

[issue10852] SSL/TLS sni use in smtp, pop, imap, nntp, ftp client libs by default

2011-01-24 Thread Daniel Black
Daniel Black daniel.s...@internode.on.net added the comment: I thought previous comments you wanted SSLContext to become the primary api rather than wrap_socket? Coding this into the examples is probably a good way of making this happen

[issue10851] further extend ssl SNI and ciphers API

2011-01-07 Thread Daniel Black
Daniel Black daniel.s...@internode.on.net added the comment: acknowledged. Makes sense. -- resolution: - rejected status: open - closed ___ Python tracker rep...@bugs.python.org http://bugs.python.org/issue10851

[issue2973] _ssl compiler warnings

2011-01-06 Thread Daniel Black
Daniel Black dan...@cacert.org added the comment: out of date? still occurs on: AMD64 Leopard 2.7: http://www.python.org/dev/buildbot/all/builders/AMD64 Leopard 2.7/builds/308/steps/compile/logs/warnings (57) PPC Leopard 2.7: http://www.python.org/dev/buildbot/all/builders/PPC Leopard 2.7

[issue10851] further extend ssl SNI and ciphers API

2011-01-06 Thread Daniel Black
New submission from Daniel Black daniel.s...@internode.on.net: as a further extension to issue #5639 (sni) and issue #8322 this patch provides the ability to set ciphers in the SSLContext.wrap_socket and server_hostname in ssl.wrap_socket. This just makes all the ssl apis look the same

[issue8109] Support for TLS Server Name Indication extension

2011-01-06 Thread Daniel Black
Daniel Black daniel.s...@internode.on.net added the comment: issue #5639 only has functionality for client side SNI. Server side SNI is still missing. For server side SNI to be supported a server program should be able to retrieve the server name provided by the client call and alter

[issue10852] SSL/TLS sni use in smtp, pop, imap, nntp, ftp client libs by default

2011-01-06 Thread Daniel Black
New submission from Daniel Black daniel.s...@internode.on.net: Like r85793, sni is enabled by default for url and https classes. This continues the consistency throughout the python libraries by adding it to other places where wrap_socket is used to instigate a SSL/TLS connection

[issue10853] SSL/TLS sni use in smtp, pop, imap, nntp, ftp client libs by default

2011-01-06 Thread Daniel Black
New submission from Daniel Black daniel.s...@internode.on.net: Like r85793, sni is enabled by default for url and https classes. This continues the consistency throughout the python libraries by adding it to other places where wrap_socket is used to instigate a SSL/TLS connection

[issue10852] SSL/TLS sni use in smtp, pop, imap, nntp, ftp client libs by default

2011-01-06 Thread Daniel Black
Daniel Black daniel.s...@internode.on.net added the comment: dup #10853 -- nosy: -pitrou resolution: - duplicate status: open - closed ___ Python tracker rep...@bugs.python.org http://bugs.python.org/issue10852

[issue5639] Support TLS SNI extension in ssl module

2010-05-23 Thread Daniel Black
Daniel Black dan...@cacert.org added the comment: msg106323 - Author: Antoine Pitrou (pitrou) Date: 2010-05-22 20:17 I quite like your proposed alternative here. Not sure when/if I'll get to implement this. msg106324 - Author: Jean-Paul Calderone (exarkun) Date: 2010-05-22 22:17 Sorry I

[issue5639] Support TLS SNI extension in ssl module

2009-09-04 Thread Daniel Black
Daniel Black dan...@cacert.org added the comment: Hey Phil, (Sorry for dropping this, lost available time) know the feeling :-( use of SNI needs to be something that can be disabled maybe. See small rational below: and people need to be able to connect to host A while supplying host B

[issue6814] xrange removal from documentation

2009-09-01 Thread Daniel Black
New submission from Daniel Black dan...@cacert.org: xrange still exists in bits of documentation here and there. patch fixes it. -- assignee: georg.brandl components: Documentation files: xrange-doco.patch keywords: patch messages: 92120 nosy: georg.brandl, grooverdan severity: normal

[issue5885] uuid.uuid1() is too slow

2009-09-01 Thread Daniel Black
Daniel Black dan...@cacert.org added the comment: This is a slightly crude module version. The speedups were only 10% Python 3.2a0 (py3k:74612M, Sep 1 2009, 18:11:58) [GCC 4.3.2] on linux2 Using the same test from Wang Chun: before: uuid1(100) 101.759 microseconds

[issue5885] uuid.uuid1() is too slow

2009-09-01 Thread Daniel Black
Daniel Black dan...@cacert.org added the comment: to prove it a bit more - ctype benchmark import ctypes, ctypes.util def uu1(n): ... t = time.time() ... _buffer = ctypes.create_string_buffer(16) ... for x in range(n): ... uuid._uuid_generate_time(_buffer) ... print

[issue5639] Support TLS SNI extension in ssl module

2009-08-31 Thread Daniel Black
Daniel Black dan...@cacert.org added the comment: The small deficiency with these patches is that the specified server_hostname is almost always the hostname that is used in the socket pair of connect. Is it appropriate to grab the hostname value and use it in the SNI extension header

[issue2973] _ssl compiler warnings

2009-08-31 Thread Daniel Black
Daniel Black dan...@cacert.org added the comment: The changeset that changed the definitions is here: http://cvs.openssl.org/chngview?cn=12024 (2004-Mar-14 23:15:13 (UTC)) As you can see there is no easy identifier in the changeset (i'm not sure how portable an ifdef on a typedef is (possible

[issue3212] ssl module - should test for a wrong cert

2009-08-31 Thread Daniel Black
Daniel Black dan...@cacert.org added the comment: Is fixed in p3k Mon Sep 8 16:45:19 2008 UTC http://svn.python.org/view/python/branches/py3k/Lib/test/test_ssl.py?r1=65837r2=66311 -- nosy: +grooverdan versions: +Python 3.1, Python 3.2 ___ Python

[issue6813] update format() documentation and tutorial

2009-08-31 Thread Daniel Black
New submission from Daniel Black dan...@cacert.org: Release notes show the use of '{}'.format('this') and the attached patch updates this to be the default example in the tutorial. Library references are updated to show field_name as optional and a few examples are added. Relates

[issue5639] Support TLS SNI extension in ssl module

2009-08-30 Thread Daniel Black
Daniel Black dan...@cacert.org added the comment: patch against TRUNK (2.7) with self tests and doco. Essentially the same code as pdp with a SSLv2 check before using the SNI extension. Contains some spacing cleanups that where highlighted by vim. -- nosy: +grooverdan Added file: http

[issue5639] Support TLS SNI extension in ssl module

2009-08-30 Thread Daniel Black
Daniel Black dan...@cacert.org added the comment: py3k version -- Added file: http://bugs.python.org/file14809/python-3K-74602-ssl_client_sni.path ___ Python tracker rep...@bugs.python.org http://bugs.python.org/issue5639

[issue5639] Support TLS SNI extension in ssl module

2009-08-30 Thread Daniel Black
Changes by Daniel Black dan...@cacert.org: -- versions: +Python 2.7, Python 3.2 -Python 2.6 ___ Python tracker rep...@bugs.python.org http://bugs.python.org/issue5639

[issue5639] Support TLS SNI extension in ssl module

2009-08-30 Thread Daniel Black
Daniel Black dan...@cacert.org added the comment: current self tests cannot fully test the existence of the SNI extension as there is no server side support. This client script run with argument sni.velox.ch will show the Great! Your client its ClientHello: sni.velox.ch on the output