- 26 May, 2016 1 kayıt (commit)
-
-
Steve Dower yazdı
-
- 03 Nis, 2016 1 kayıt (commit)
-
-
Martin Panter yazdı
-
- 28 Mar, 2016 1 kayıt (commit)
-
-
Martin Panter yazdı
-
- 17 Mar, 2016 1 kayıt (commit)
-
-
Steve Dower yazdı
-
- 19 Mar, 2015 1 kayıt (commit)
-
-
Ethan Furman yazdı
add private method to enum to support replacing global constants with Enum members: - search for candidate constants via supplied filter - create new enum class and members - insert enum class and replace constants with members via supplied module name - replace __reduce_ex__ with function that returns member name, so previous Python versions can unpickle modify IntEnum classes to use new method
-
- 05 Mar, 2015 1 kayıt (commit)
-
-
Benjamin Peterson yazdı
-
- 19 Şub, 2015 1 kayıt (commit)
-
-
Benjamin Peterson yazdı
-
- 15 Şub, 2015 1 kayıt (commit)
-
-
Antoine Pitrou yazdı
-
- 23 Ock, 2015 1 kayıt (commit)
-
-
Benjamin Peterson yazdı
-
- 11 Ock, 2015 1 kayıt (commit)
-
-
Benjamin Peterson yazdı
-
- 07 Ock, 2015 2 kayıt (commit)
-
-
Benjamin Peterson yazdı
-
Benjamin Peterson yazdı
-
- 06 Ock, 2015 2 kayıt (commit)
-
-
Victor Stinner yazdı
availability of the function is checked during the compilation. Patch written by Bernard Spil.
-
Victor Stinner yazdı
ssl.PROTOCOL_SSLv23 protocol by default, not ssl.PROTOCOL_SSLv3, for maximum compatibility and support platforms where ssl.PROTOCOL_SSLv3 support is disabled.
-
- 12 Ara, 2014 1 kayıt (commit)
-
-
Victor Stinner yazdı
-
- 23 Kas, 2014 1 kayıt (commit)
-
-
Benjamin Peterson yazdı
Patch by Donald Stufft.
-
- 28 Kas, 2014 1 kayıt (commit)
-
-
Victor Stinner yazdı
availability of the function is checked during the compilation. Patch written by Bernard Spil.
-
- 03 Kas, 2014 1 kayıt (commit)
-
-
Benjamin Peterson yazdı
Patch by Alex Gaynor with some modifications by me.
-
- 19 Eki, 2014 1 kayıt (commit)
-
-
Berker Peksag yazdı
Patch by Févry Thibault.
-
- 17 Eki, 2014 2 kayıt (commit)
-
-
Antoine Pitrou yazdı
It can still be enabled by instantiating a SSLContext manually.
-
Antoine Pitrou yazdı
It can still be enabled by instantiating a SSLContext manually.
-
- 05 Eki, 2014 2 kayıt (commit)
-
-
Antoine Pitrou yazdı
-
Antoine Pitrou yazdı
Patch by Geert Jansen.
-
- 03 Eki, 2014 1 kayıt (commit)
-
-
Benjamin Peterson yazdı
Patch by Christian Heimes and Alex Gaynor.
-
- 04 Eyl, 2014 1 kayıt (commit)
-
-
Antoine Pitrou yazdı
-
- 11 Haz, 2014 1 kayıt (commit)
-
-
Giampaolo Rodola yazdı
fix issue #17552: add socket.sendfile() method allowing to send a file over a socket by using high-performance os.sendfile() on UNIX. Patch by Giampaolo Rodola'·
-
- 29 Nis, 2014 1 kayıt (commit)
-
-
Antoine Pitrou yazdı
Issue #20951: SSLSocket.send() now raises either SSLWantReadError or SSLWantWriteError on a non-blocking socket if the operation would block. Previously, it would return 0. Patch by Nikolaus Rath.
-
- 28 Nis, 2014 1 kayıt (commit)
-
-
Antoine Pitrou yazdı
Issue #19940: ssl.cert_time_to_seconds() now interprets the given time string in the UTC timezone (as specified in RFC 5280), not the local timezone. Patch by Akira.
-
- 18 Nis, 2014 1 kayıt (commit)
-
-
Antoine Pitrou yazdı
-
- 16 Nis, 2014 1 kayıt (commit)
-
-
Antoine Pitrou yazdı
Issue #20896: ssl.get_server_certificate() now uses PROTOCOL_SSLv23, not PROTOCOL_SSLv3, for maximum compatibility.
-
- 23 Mar, 2014 1 kayıt (commit)
-
-
Donald Stufft yazdı
Closes #21013 by modfying ssl.create_default_context() to: * Move the restricted ciphers to only apply when using ssl.Purpose.CLIENT_AUTH. The major difference between restricted and not is the lack of RC4 in the restricted. However there are servers that exist that only expose RC4 still. * Switches the default protocol to ssl.PROTOCOL_SSLv23 so that the context will select TLS1.1 or TLS1.2 if it is available. * Add ssl.OP_NO_SSLv3 by default to continue to block SSL3.0 sockets * Add ssl.OP_SINGLE_DH_USE and ssl.OP_SINGLE_ECDG_USE to improve the security of the perfect forward secrecy * Add ssl.OP_CIPHER_SERVER_PREFERENCE so that when used for a server side socket the context will prioritize our ciphers which have been carefully selected to maximize security and performance. * Documents the failure conditions when a SSL3.0 connection is required so that end users can more easily determine if they need to unset ssl.OP_NO_SSLv3.
-
- 22 Mar, 2014 1 kayıt (commit)
-
-
Donald Stufft yazdı
Closes #20995 by Enabling better security by prioritizing ciphers such that: * Prefer cipher suites that offer perfect forward secrecy (DHE/ECDHE) * Prefer ECDHE over DHE for better performance * Prefer any AES-GCM over any AES-CBC for better performance and security * Then Use HIGH cipher suites as a fallback * Then Use 3DES as fallback which is secure but slow * Finally use RC4 as a fallback which is problematic but needed for compatibility some times. * Disable NULL authentication, NULL encryption, and MD5 MACs for security reasons
-
- 20 Mar, 2014 1 kayıt (commit)
-
-
Victor Stinner yazdı
-
- 28 Ara, 2013 1 kayıt (commit)
-
-
Antoine Pitrou yazdı
Issue #19422: Explicitly disallow non-SOCK_STREAM sockets in the ssl module, rather than silently let them emit clear text data.
-
- 04 Ara, 2013 1 kayıt (commit)
-
-
Christian Heimes yazdı
-
- 02 Ara, 2013 2 kayıt (commit)
-
-
Christian Heimes yazdı
-
Christian Heimes yazdı
with server_hostname on handshake.
-
- 28 Kas, 2013 1 kayıt (commit)
-
-
Christian Heimes yazdı
-
- 23 Kas, 2013 2 kayıt (commit)
-
-
Christian Heimes yazdı
create SSLContext objects in Python's stdlib module. It provides a single configuration point and makes use of SSLContext.load_default_certs().
-
Christian Heimes yazdı
a new SSLContext object with secure default settings.
-