_sslutil__be_less_strict_about_which_ciphers_are_allowed_when_using___insecure
# HG changeset patch
# User Julien Cristau <jcristau@debian.org>
# Date
1649507032 -7200
# Sat Apr 09 14:23:52 2022 +0200
# Node ID
c871c4fbc94f88e8c78a6bd4ece15d239cbdea10
# Parent
410916fc5935c7855c2cf4876d8311d34aabc29a
sslutil: be less strict about which ciphers are allowed when using --insecure
Python 3.10 restricted which ciphers are enabled by default, leading to
no available ciphers for TLS < 1.2. When using the --insecure flag we
allow old TLS, so also adjust the cipher list to give connections a
chance to work.
On the server side, also loosen the cipher selection in tests (when
using the devel.serverexactprotocol option).
Differential Revision: https://phab.mercurial-scm.org/D12489
Gbp-Pq: Topic py310
Gbp-Pq: Name 4_sslutil__be_less_strict_about_which_ciphers_are_allowed_when_using___insecure.patch