summaryrefslogtreecommitdiffstats
path: root/Modules/unicodename_db.h
diff options
context:
space:
mode:
authorChristian Heimes <christian@python.org>2017-09-08 01:07:00 (GMT)
committerGitHub <noreply@github.com>2017-09-08 01:07:00 (GMT)
commitcb5b68abdeb1b1d56c581d5b4d647018703d61e3 (patch)
tree1b40e75145b45a2e43a1e2077b5b0729b365c685 /Modules/unicodename_db.h
parent9020ac7cce97dddad51b285fffc31fe4ddf60898 (diff)
downloadcpython-cb5b68abdeb1b1d56c581d5b4d647018703d61e3.zip
cpython-cb5b68abdeb1b1d56c581d5b4d647018703d61e3.tar.gz
cpython-cb5b68abdeb1b1d56c581d5b4d647018703d61e3.tar.bz2
bpo-29136: Add TLS 1.3 cipher suites and OP_NO_TLSv1_3 (#1363)
* bpo-29136: Add TLS 1.3 support TLS 1.3 introduces a new, distinct set of cipher suites. The TLS 1.3 cipher suites don't overlap with cipher suites from TLS 1.2 and earlier. Since Python sets its own set of permitted ciphers, TLS 1.3 handshake will fail as soon as OpenSSL 1.1.1 is released. Let's enable the common AES-GCM and ChaCha20 suites. Additionally the flag OP_NO_TLSv1_3 is added. It defaults to 0 (no op) with OpenSSL prior to 1.1.1. This allows applications to opt-out from TLS 1.3 now. Signed-off-by: Christian Heimes <christian@python.org>
Diffstat (limited to 'Modules/unicodename_db.h')
0 files changed, 0 insertions, 0 deletions