- 24 Mar, 2014 3 kayıt (commit)
-
-
Victor Stinner yazdı
_PY_HASHTABLE_ENTRY_DATA => _Py_HASHTABLE_ENTRY_DATA
-
Georg Brandl yazdı
-
Zachary Ware yazdı
-
- 23 Mar, 2014 10 kayıt (commit)
-
-
Donald Stufft yazdı
Closes #21013 by modfying ssl.create_default_context() to: * Move the restricted ciphers to only apply when using ssl.Purpose.CLIENT_AUTH. The major difference between restricted and not is the lack of RC4 in the restricted. However there are servers that exist that only expose RC4 still. * Switches the default protocol to ssl.PROTOCOL_SSLv23 so that the context will select TLS1.1 or TLS1.2 if it is available. * Add ssl.OP_NO_SSLv3 by default to continue to block SSL3.0 sockets * Add ssl.OP_SINGLE_DH_USE and ssl.OP_SINGLE_ECDG_USE to improve the security of the perfect forward secrecy * Add ssl.OP_CIPHER_SERVER_PREFERENCE so that when used for a server side socket the context will prioritize our ciphers which have been carefully selected to maximize security and performance. * Documents the failure conditions when a SSL3.0 connection is required so that end users can more easily determine if they need to unset ssl.OP_NO_SSLv3.
-
Georg Brandl yazdı
-
Antoine Pitrou yazdı
-
Richard Oudkerk yazdı
-
R David Murray yazdı
-
Antoine Pitrou yazdı
-
Richard Oudkerk yazdı
-
Richard Oudkerk yazdı
-
Richard Oudkerk yazdı
-
Richard Oudkerk yazdı
-
- 22 Mar, 2014 4 kayıt (commit)
-
-
Georg Brandl yazdı
-
Antoine Pitrou yazdı
Issue #20913: improve the SSL security considerations to first advocate using create_default_context().
-
Antoine Pitrou yazdı
Issue #21015: SSL contexts will now automatically select an elliptic curve for ECDH key exchange on OpenSSL 1.0.2 and later, and otherwise default to "prime256v1". (should also fix a buildbot failure introduced by #20995)
-
Donald Stufft yazdı
Closes #20995 by Enabling better security by prioritizing ciphers such that: * Prefer cipher suites that offer perfect forward secrecy (DHE/ECDHE) * Prefer ECDHE over DHE for better performance * Prefer any AES-GCM over any AES-CBC for better performance and security * Then Use HIGH cipher suites as a fallback * Then Use 3DES as fallback which is secure but slow * Finally use RC4 as a fallback which is problematic but needed for compatibility some times. * Disable NULL authentication, NULL encryption, and MD5 MACs for security reasons
-
- 21 Mar, 2014 6 kayıt (commit)
-
-
Victor Stinner yazdı
-
Victor Stinner yazdı
-
Victor Stinner yazdı
-
Brett Cannon yazdı
-
Brett Cannon yazdı
defined.
-
Vinay Sajip yazdı
-
- 20 Mar, 2014 14 kayıt (commit)
-
-
Benjamin Peterson yazdı
-
Zachary Ware yazdı
-
Zachary Ware yazdı
"equivalant" was caught by Tobias Käs on docs@, "seperated" and "chartruese" were discovered by a spell-checker.
-
Zachary Ware yazdı
-
Zachary Ware yazdı
Pointed out by Colin Davis on docs@.
-
Raymond Hettinger yazdı
-
Vinay Sajip yazdı
-
Vinay Sajip yazdı
-
Vinay Sajip yazdı
Issue #10141: updated new usages of AF_CAN to be in #ifdef AF_CAN rather than #ifdef HAVE_LINUX_CAN_H to allow compilation on older Linuxes.
-
Victor Stinner yazdı
multiprocessing.connection
-
Victor Stinner yazdı
-
Victor Stinner yazdı
-
Victor Stinner yazdı
-
Benjamin Peterson yazdı
-
- 19 Mar, 2014 3 kayıt (commit)
-
-
Zachary Ware yazdı
-
Victor Stinner yazdı
-
Zachary Ware yazdı
-