Author brian
Recipients Andrew.Grover, baikie, brian, exarkun, giampaolo.rodola, jackdied, neologix, pitrou, rosslagerwall, synapse, therve, vstinner, wiml
Date 2011-06-05.23:35:25
SpamBayes Score 7.16432e-09
Marked as misclassified No
Message-id <1307316926.36.0.827874152106.issue6560@psf.upfronthosting.co.za>
In-reply-to
Content
To address some of the comments above:

* Yes, the patch is large. However, most of this is in the tests. Only A relatively small part is in the code that implements the required functionality. I don't care much myself about the test cases, however would have assumed these would help get it into upstream.

(baikie-hwundram-v5-hg.diff)

 Doc/library/socket.rst  |  176 +++
 Lib/ssl.py              |   24 
 Lib/test/test_socket.py | 2120 ++++++++++++++++++++++++++++++++++++++++++++++++
 Lib/test/test_ssl.py    |   13 
 Modules/socketmodule.c  |  809 ++++++++++++++++++
 5 files changed, 3142 insertions(+)

* raw sockets are inappropriate for using UDP TPROXY support. I don't want to bypass the kernel code and have to pass headers etc myself, I just want to get the destination address so I know where the packet was original destined for. recvmsg() is the correct solution.

* Thanks for the 2.x patch. Will try that out now.
History
Date User Action Args
2011-06-05 23:35:26briansetrecipients: + brian, exarkun, pitrou, therve, vstinner, jackdied, baikie, giampaolo.rodola, synapse, Andrew.Grover, wiml, neologix, rosslagerwall
2011-06-05 23:35:26briansetmessageid: <1307316926.36.0.827874152106.issue6560@psf.upfronthosting.co.za>
2011-06-05 23:35:25brianlinkissue6560 messages
2011-06-05 23:35:25briancreate