This issue tracker has been migrated to GitHub, and is currently read-only.
For more information, see the GitHub FAQs in the Python's Developer Guide.

Author exarkun
Recipients exarkun, giampaolo.rodola, grooverdan, janssen, jcea, pdp, pitrou
Date 2010-05-22.22:17:46
SpamBayes Score 0.017070867
Marked as misclassified No
Message-id <1274566668.38.0.500008928076.issue5639@psf.upfronthosting.co.za>
In-reply-to
Content
Here's another possible approach:

ctx = ssl.SSLContext(ssl.PROTOCOL_TLSv1)
ctx.set_tlsext_host_name("foo.bar")
skt = ctx.wrap_socket(socket.socket())
skt.connect("bar.baz")

This makes it obvious what the SNI hostname is and what the TCP address to connect to is, and they can easily be different.
History
Date User Action Args
2010-05-22 22:17:48exarkunsetrecipients: + exarkun, jcea, janssen, pitrou, giampaolo.rodola, pdp, grooverdan
2010-05-22 22:17:48exarkunsetmessageid: <1274566668.38.0.500008928076.issue5639@psf.upfronthosting.co.za>
2010-05-22 22:17:46exarkunlinkissue5639 messages
2010-05-22 22:17:46exarkuncreate