New submission from gchauvel <guillaume.chau...@gmail.com>:
A simple test in test_ssl.py [1][2] with following context: - client connects and listens to data without sending any first - traces to make sure no data is written at test level from server or client - TLSv1.3 is allowed or not using "context.options |= ssl.OP_NO_TLSv1_3" produces this result: TLSv1.2: - no event on FD, no issue TLSv1.3: - event on FD without any write at test level - recv() blocks, even with setblocking(False) [1] master: https://github.com/g-chauvel/cpython/commit/8c95c4f67367ea43c508ea62a0cdbe120a3fed9b [2] 3.6: https://github.com/g-chauvel/cpython/commit/7cd4b4ac22efea7c61a9f8f57b6f2315567f5742 ---------- assignee: christian.heimes components: SSL messages: 389496 nosy: christian.heimes, gchauvel priority: normal severity: normal status: open title: TLS 1.3, client polling returns event without data type: behavior versions: Python 3.10, Python 3.6, Python 3.7, Python 3.8, Python 3.9 _______________________________________ Python tracker <rep...@bugs.python.org> <https://bugs.python.org/issue43622> _______________________________________ _______________________________________________ Python-bugs-list mailing list Unsubscribe: https://mail.python.org/mailman/options/python-bugs-list/archive%40mail-archive.com