Package: pyopenssl / 16.0.0-1~bpo8+1

0001-disable-test_set_default_verify_paths-since-it-tries.patch Patch series | download
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
From 39fa2cb8cab66da9c6f2f2d425dc61f44aab76ed Mon Sep 17 00:00:00 2001
From: SVN-Git Migration <python-modules-team@lists.alioth.debian.org>
Date: Thu, 8 Oct 2015 10:47:52 -0700
Subject: disable test_set_default_verify_paths since it tries to access the
 web

---
 tests/test_ssl.py | 28 +++++++++++++++-------------
 1 file changed, 15 insertions(+), 13 deletions(-)

diff --git a/tests/test_ssl.py b/tests/test_ssl.py
index ab316fc..3446c6e 100644
--- a/tests/test_ssl.py
+++ b/tests/test_ssl.py
@@ -1197,6 +1197,7 @@ class ContextTests(TestCase, _LoopbackMixin):
         platform == "win32",
         reason="set_default_verify_paths appears not to work on Windows.  "
         "See LP#404343 and LP#404344."
+
     )
     def test_set_default_verify_paths(self):
         """
@@ -1211,21 +1212,22 @@ class ContextTests(TestCase, _LoopbackMixin):
         # internet which has such a certificate.  Connecting to the network
         # in a unit test is bad, but it's the only way I can think of to
         # really test this. -exarkun
+        pass
 
         # Arg, verisign.com doesn't speak anything newer than TLS 1.0
-        context = Context(SSLv23_METHOD)
-        context.set_default_verify_paths()
-        context.set_verify(
-            VERIFY_PEER,
-            lambda conn, cert, errno, depth, preverify_ok: preverify_ok)
-
-        client = socket()
-        client.connect(("encrypted.google.com", 443))
-        clientSSL = Connection(context, client)
-        clientSSL.set_connect_state()
-        clientSSL.do_handshake()
-        clientSSL.send(b"GET / HTTP/1.0\r\n\r\n")
-        self.assertTrue(clientSSL.recv(1024))
+        #context = Context(SSLv23_METHOD)
+        #context.set_default_verify_paths()
+        #context.set_verify(
+        #    VERIFY_PEER,
+        #    lambda conn, cert, errno, depth, preverify_ok: preverify_ok)
+
+        #client = socket()
+        #client.connect(("encrypted.google.com", 443))
+        #clientSSL = Connection(context, client)
+        #clientSSL.set_connect_state()
+        #clientSSL.do_handshake()
+        #clientSSL.send(b"GET / HTTP/1.0\r\n\r\n")
+        #self.assertTrue(clientSSL.recv(1024))
 
     def test_set_default_verify_paths_signature(self):
         """