This issue tracker has been migrated to GitHub, and is currently read-only.
For more information, see the GitHub FAQs in the Python's Developer Guide.

Author adrianv
Recipients Alex Gaynor, adrianv, christian.heimes
Date 2017-09-13.17:07:03
SpamBayes Score -1.0
Marked as misclassified Yes
Message-id <1505322423.74.0.965010925485.issue31453@psf.upfronthosting.co.za>
In-reply-to
Content
I have a workaround for now:

        versions = [ssl.PROTOCOL_TLSv1,
                    ssl.PROTOCOL_TLSv1_1,
                    ssl.PROTOCOL_TLSv1_2,
                   ]
        firstbytes = s.recv(16, socket.MSG_PEEK)
        ss = ssl.wrap_socket(
            s,
            server_side=True,
            certfile="server.pem",
            keyfile="server.pem",
            #  ssl_version=versions[ord(firstbytes[10])-1] # python2
            ssl_version=versions[firstbytes[10]-1]
        )

How much of an ugly hack is this? :)
History
Date User Action Args
2017-09-13 17:07:03adrianvsetrecipients: + adrianv, christian.heimes, Alex Gaynor
2017-09-13 17:07:03adrianvsetmessageid: <1505322423.74.0.965010925485.issue31453@psf.upfronthosting.co.za>
2017-09-13 17:07:03adrianvlinkissue31453 messages
2017-09-13 17:07:03adrianvcreate