[issue32882] SSLContext.set_ecdh_curve() not accepting x25519

2021-04-21 Thread sruester
sruester added the comment: PEP 543 was withdrawn in the meantime. Any suggestion how to proceed with this? -- versions: +Python 3.10, Python 3.11, Python 3.9 ___ Python tracker <https://bugs.python.org/issue32

[issue32883] Key agreement parameters not accessible

2018-02-20 Thread sruester
sruester <stefan.rues...@rub.de> added the comment: How about a new method crypto_information() and making cipher() a wrapper around that one? The former could return a named tupple with handshake information together with all other relevant crypto information about the current s

[issue32882] SSLContext.set_ecdh_curve() not accepting x25519

2018-02-20 Thread sruester
Change by sruester <stefan.rues...@rub.de>: -- pull_requests: +5550 ___ Python tracker <rep...@bugs.python.org> <https://bugs.python.org/issue32882> ___ _

[issue32882] SSLContext.set_ecdh_curve() not accepting x25519

2018-02-20 Thread sruester
Change by sruester <stefan.rues...@rub.de>: -- keywords: +patch pull_requests: +5549 stage: needs patch -> patch review ___ Python tracker <rep...@bugs.python.org> <https://bugs.pyt

[issue32858] Improve OpenSSL ECDH support

2018-02-20 Thread sruester
sruester <stefan.rues...@rub.de> added the comment: I agree, we shouldn't support that confusion. I opened two separate issues https://bugs.python.org/issue32882 and https://bugs.python.org/issue32883 and will close this one now. -- resolution: -> wont fix stage: pat

[issue32883] Key agreement parameters not accessible

2018-02-20 Thread sruester
New submission from sruester <stefan.rues...@rub.de>: Using python it is not possible to retrieve information about the key exchange/agreement method that was used during session setup. A method should be added to a suitable SSL* object that allows to retrieve information such as whethe

[issue32882] SSLContext.set_ecdh_curve() not accepting x25519

2018-02-20 Thread sruester
New submission from sruester <stefan.rues...@rub.de>: Using SSLContext.set_ecdh_curve() it is neither possible to choose X25519, nor to choose a list of curves to be used for key agreement. -- assignee: christian.heimes components: SSL messages: 312405 nosy: christian.heimes, sr

[issue32858] Improve OpenSSL ECDH support

2018-02-19 Thread sruester
sruester <stefan.rues...@rub.de> added the comment: AppVeyor build failed for pull request 5707. It looks like there was a problem with the build environment. -- ___ Python tracker <rep...@bugs.python.org> <https://bugs.python

[issue32858] Improve OpenSSL ECDH support

2018-02-16 Thread sruester
Change by sruester <stefan.rues...@rub.de>: -- pull_requests: +5495 ___ Python tracker <rep...@bugs.python.org> <https://bugs.python.org/issue32858> ___ _

[issue32858] Improve OpenSSL ECDH support

2018-02-16 Thread sruester
sruester <stefan.rues...@rub.de> added the comment: I'd really love to see kxinfo() or a similar method in the standard. I chose to implement it similar to cipher() which seemed to be a good idea then. If there are any objections, please let's discuss how that information can b

[issue32858] Improve OpenSSL ECDH support

2018-02-16 Thread sruester
sruester <stefan.rues...@rub.de> added the comment: Attached script shows usage -- Added file: https://bugs.python.org/file47449/ssl-host-check.py ___ Python tracker <rep...@bugs.python.org> <https://bugs.python

[issue32858] Improve OpenSSL ECDH support

2018-02-16 Thread sruester
sruester <stefan.rues...@rub.de> added the comment: With OpenSSL 1.1.0g, the Code int nid = OBJ_sn2nid("X25519"); EC_KEY *key = EC_KEY_new_by_curve_name(nid); printf("id:%i key:%p\n", nid, key); gives id:1034 key:(nil) EC_KEY_new_by_curve_name is IMHO not

[issue32858] Improve OpenSSL ECDH support

2018-02-16 Thread sruester
Change by sruester <stefan.rues...@rub.de>: -- keywords: +patch pull_requests: +5489 stage: needs patch -> patch review ___ Python tracker <rep...@bugs.python.org> <https://bugs.pyt