- 02 Mar, 2019 6 commits
-
-
Benjamin Peterson authored
-
Benjamin Peterson authored
-
Benjamin Peterson authored
-
Benjamin Peterson authored
-
Benjamin Peterson authored
-
Ned Deily authored
bpo-32129: Avoid blurry IDLE application icon on macOS with Tk 8.6. Original patch by Kevin Walzer. (GH-12034)
-
- 01 Mar, 2019 1 commit
-
-
Ned Deily authored
bpo-32129: Avoid blurry IDLE application icon on macOS with Tk 8.6. Original patch by Kevin Walzer. (GH-12034)
-
- 28 Feb, 2019 1 commit
-
-
Gao, Xiang authored
-
- 27 Feb, 2019 2 commits
-
-
Miss Islington (bot) authored
Did you know an API documented as printing the pending traceback would sometimes exit the process? You do now. (cherry picked from commit 41737720) Co-authored-by: Gregory P. Smith <greg@krypto.org>
-
Ned Deily authored
-
- 26 Feb, 2019 3 commits
-
-
Dima Pasechnik authored
The standard math library (libm) may follow IEEE-754 recommendation to include an implementation of sinPi(), i.e. sinPi(x):=sin(pi*x). And this triggers a name clash, found by FreeBSD developer Steve Kargl, who worked on putting sinpi into libm used on FreeBSD (it has to be named "sinpi", not "sinPi", cf. e.g. https://en.cppreference.com/w/c/experimental/fpext4).
-
Benjamin Peterson authored
-
Miss Islington (bot) authored
Per POSIX, `nice(3)` requires `unistd.h` and `exit(3)` requires `stdlib.h`. Fixing the test will prevent false positives with pedantic compilers like clang. (cherry picked from commit 90c6face) Co-authored-by: ngie-eign <1574099+ngie-eign@users.noreply.github.com>
-
- 24 Feb, 2019 2 commits
- 23 Feb, 2019 1 commit
-
-
Alan Grgic authored
-
- 19 Feb, 2019 3 commits
-
-
Miss Islington (bot) authored
https://bugs.python.org/issue35584 (cherry picked from commit 3bacf612) Co-authored-by: Raymond Hettinger <rhettinger@users.noreply.github.com>
-
-
Tzu-ping Chung authored
[2.7] bpo-1104: msilib.SummaryInfo.GetProperty() truncates the string by one character (GH-4517) (GH-11749) Add one char to MsiSummaryInfoGetProperty() output Based on the patch in [bpo-1104](https://bugs.python.org/issue1104) by Anthony Tuininga (atuining) and Mark McMahon (markm) (cherry picked from commit 2de576e1) Co-authored-by: Tzu-ping Chung <uranusjr@gmail.com> https://bugs.python.org/issue1104
-
- 17 Feb, 2019 2 commits
-
-
Benjamin Peterson authored
-
Steve Dower authored
-
- 16 Feb, 2019 3 commits
-
-
Benjamin Peterson authored
-
Benjamin Peterson authored
-
Ned Deily authored
-
- 15 Feb, 2019 6 commits
-
-
stratakis authored
multissltests: fix _build_src(), add 'cwd' variable.
-
stratakis authored
Backport of TLS 1.3 related fixes from 3.7. Misc fixes and workarounds for compatibility with OpenSSL 1.1.1 from git master and TLS 1.3 support. With OpenSSL 1.1.1, Python negotiates TLS 1.3 by default. Some test cases only apply to TLS 1.2. OpenSSL 1.1.1 has added a new option OP_ENABLE_MIDDLEBOX_COMPAT for TLS 1.3. The feature is enabled by default for maximum compatibility with broken middle boxes. Users should be able to disable the hack and CPython's test suite needs it to verify default options Signed-off-by: Christian Heimes <christian@python.org> (cherry picked from commit 2a4ee8aa01d61b6a9c8e9c65c211e61bdb471826)
-
stratakis authored
Partial backport from cb5b68abCo-authored-by: Christian Heimes <christian@python.org>
-
stratakis authored
The options OP_NO_COMPRESSION, OP_CIPHER_SERVER_PREFERENCE, OP_SINGLE_DH_USE, OP_SINGLE_ECDH_USE, OP_NO_SSLv2 (except for PROTOCOL_SSLv2), and OP_NO_SSLv3 (except for PROTOCOL_SSLv3) are set by default. The initial cipher suite list contains only HIGH ciphers, no NULL ciphers and MD5 ciphers (except for PROTOCOL_SSLv2). (cherry picked from commit 358cfd42)
-
stratakis authored
Change TLS 1.3 cipher suite settings for compatibility with OpenSSL 1.1.1-pre6 and newer. OpenSSL 1.1.1 will have TLS 1.3 cipers enabled by default. Also update multissltests to test with latest OpenSSL. Signed-off-by: Christian Heimes <christian@python.org>. (cherry picked from commit 3e630c541b35c96bfe5619165255e559f577ee71) Co-authored-by: Christian Heimes <christian@python.org>
-
Victor Stinner authored
Add credit for the cert parser vulnerability. Mention also Cisco TALOS-2018-0758 identifier.
-
- 10 Feb, 2019 1 commit
-
-
Miss Islington (bot) authored
(cherry picked from commit 9db56fb8) Co-authored-by: Julien Palard <julien@palard.fr>
-
- 06 Feb, 2019 1 commit
-
-
Mariatta authored
(cherry picked from commit e9bc4172) Co-authored-by: Mariatta <Mariatta@users.noreply.github.com>
-
- 02 Feb, 2019 1 commit
-
-
Miss Islington (bot) authored
(cherry picked from commit 598e15d4) Co-authored-by: jdemeyer <J.Demeyer@UGent.be>
-
- 15 Jan, 2019 2 commits
-
-
Miss Islington (bot) authored
Fix a NULL pointer deref in ssl module. The cert parser did not handle CRL distribution points with empty DP or URI correctly. A malicious or buggy certificate can result into segfault. Signed-off-by: Christian Heimes <christian@python.org> https://bugs.python.org/issue35746 (cherry picked from commit a37f5243) Co-authored-by: Christian Heimes <christian@python.org>
-
Serhiy Storchaka authored
-
- 12 Jan, 2019 3 commits
-
-
Miss Islington (bot) authored
(cherry picked from commit 1cffd0ee) Co-authored-by: Alexey Izbyshev <izbyshev@ispras.ru>
-
Serhiy Storchaka authored
Format character "%s" in PyString_FromFormat() no longer read memory past the limit if precision is specified. (cherry picked from commit d586ccb0)
-
Serhiy Storchaka authored
-
- 10 Jan, 2019 1 commit
-
-
Senthil Kumaran authored
-
- 09 Jan, 2019 1 commit
-
-
Miss Islington (bot) authored
(cherry picked from commit 91c6158d) Co-authored-by: Andre Delfino <adelfino@gmail.com>
-