- 27 Mar, 2014 8 kayıt (commit)
-
-
Ned Deily yazdı
to parse more than one XML document per pyexpat xmlparser instance. (Original patches by Hirokazu Yamamoto and Amaury Forgeot d'Arc, with suggested wording by David Gutteridge)
-
Yury Selivanov yazdı
Patch by Jeremiah Lowin. Closes #20817.
-
Yury Selivanov yazdı
... for missing keyword-only arguments. Patch by Jeremiah Lowin. Closes #20816.
-
Yury Selivanov yazdı
-
Ned Deily yazdı
test_urllibnet.test_fileno intermittent failures with www.example.com.
-
Ned Deily yazdı
-
Ned Deily yazdı
failures when ssl is not present.
-
Ned Deily yazdı
68335b8afb1f 3.4 ad0c75b7bd7d default
-
- 25 Mar, 2014 10 kayıt (commit)
-
-
R David Murray yazdı
Previously a non-string, non-regex second argument and missing callable argument could cause the test to appear to always pass. Initial patch by Kamilla Holanda.
-
Victor Stinner yazdı
-
Victor Stinner yazdı
-
Victor Stinner yazdı
Remove useless test and unused variables. Initial patch by Andreas Schwab.
-
Victor Stinner yazdı
-
Vinay Sajip yazdı
-
Georg Brandl yazdı
-
Victor Stinner yazdı
-
Georg Brandl yazdı
Closes #18456: Doc fix: PyDict_Update only works with dict-like objects, not key-value sequences. Patch by priyapappachan.
-
Victor Stinner yazdı
close the file descriptor if io.open() fails
-
- 21 Mar, 2014 1 kayıt (commit)
-
-
Victor Stinner yazdı
loop in debug mode. Raise a RuntimeError if the event loop of the current thread is different. The check should help to debug thread-safetly issue. Patch written by David Foster.
-
- 24 Mar, 2014 4 kayıt (commit)
-
-
Donald Stufft yazdı
Closes #21043 by updating the documentation to remove specific CA organizations and update the text to no longer need to tell you to download root certificates, but instead use the OS certificates avaialble through SSLContext.load_default_certs.
-
Victor Stinner yazdı
_PY_HASHTABLE_ENTRY_DATA => _Py_HASHTABLE_ENTRY_DATA
-
Georg Brandl yazdı
-
Zachary Ware yazdı
-
- 23 Mar, 2014 10 kayıt (commit)
-
-
Donald Stufft yazdı
Closes #21013 by modfying ssl.create_default_context() to: * Move the restricted ciphers to only apply when using ssl.Purpose.CLIENT_AUTH. The major difference between restricted and not is the lack of RC4 in the restricted. However there are servers that exist that only expose RC4 still. * Switches the default protocol to ssl.PROTOCOL_SSLv23 so that the context will select TLS1.1 or TLS1.2 if it is available. * Add ssl.OP_NO_SSLv3 by default to continue to block SSL3.0 sockets * Add ssl.OP_SINGLE_DH_USE and ssl.OP_SINGLE_ECDG_USE to improve the security of the perfect forward secrecy * Add ssl.OP_CIPHER_SERVER_PREFERENCE so that when used for a server side socket the context will prioritize our ciphers which have been carefully selected to maximize security and performance. * Documents the failure conditions when a SSL3.0 connection is required so that end users can more easily determine if they need to unset ssl.OP_NO_SSLv3.
-
Georg Brandl yazdı
-
Antoine Pitrou yazdı
-
Richard Oudkerk yazdı
-
R David Murray yazdı
-
Antoine Pitrou yazdı
-
Richard Oudkerk yazdı
-
Richard Oudkerk yazdı
-
Richard Oudkerk yazdı
-
Richard Oudkerk yazdı
-
- 22 Mar, 2014 4 kayıt (commit)
-
-
Georg Brandl yazdı
-
Antoine Pitrou yazdı
Issue #20913: improve the SSL security considerations to first advocate using create_default_context().
-
Antoine Pitrou yazdı
Issue #21015: SSL contexts will now automatically select an elliptic curve for ECDH key exchange on OpenSSL 1.0.2 and later, and otherwise default to "prime256v1". (should also fix a buildbot failure introduced by #20995)
-
Donald Stufft yazdı
Closes #20995 by Enabling better security by prioritizing ciphers such that: * Prefer cipher suites that offer perfect forward secrecy (DHE/ECDHE) * Prefer ECDHE over DHE for better performance * Prefer any AES-GCM over any AES-CBC for better performance and security * Then Use HIGH cipher suites as a fallback * Then Use 3DES as fallback which is secure but slow * Finally use RC4 as a fallback which is problematic but needed for compatibility some times. * Disable NULL authentication, NULL encryption, and MD5 MACs for security reasons
-
- 21 Mar, 2014 3 kayıt (commit)
-
-
Victor Stinner yazdı
-
Victor Stinner yazdı
-
Victor Stinner yazdı
-