[Python-modules-commits] r32351 - in packages/pyopenssl/trunk/debian (2 files)
morph at users.alioth.debian.org
morph at users.alioth.debian.org
Tue Apr 14 18:17:36 UTC 2015
Date: Tuesday, April 14, 2015 @ 18:17:35
Author: morph
Revision: 32351
* debian/patches/disable_test_set_default_verify_paths.patch
- refreshed
Modified:
packages/pyopenssl/trunk/debian/changelog
packages/pyopenssl/trunk/debian/patches/disable_test_set_default_verify_paths.patch
Modified: packages/pyopenssl/trunk/debian/changelog
===================================================================
--- packages/pyopenssl/trunk/debian/changelog 2015-04-14 17:58:09 UTC (rev 32350)
+++ packages/pyopenssl/trunk/debian/changelog 2015-04-14 18:17:35 UTC (rev 32351)
@@ -6,8 +6,10 @@
* debian/copyright
- extend packaging copyright years
- extend upstream copyright years
+ * debian/patches/disable_test_set_default_verify_paths.patch
+ - refreshed
- -- Sandro Tosi <morph at debian.org> Tue, 14 Apr 2015 18:58:01 +0100
+ -- Sandro Tosi <morph at debian.org> Tue, 14 Apr 2015 19:17:29 +0100
pyopenssl (0.14-1) unstable; urgency=medium
Modified: packages/pyopenssl/trunk/debian/patches/disable_test_set_default_verify_paths.patch
===================================================================
--- packages/pyopenssl/trunk/debian/patches/disable_test_set_default_verify_paths.patch 2015-04-14 17:58:09 UTC (rev 32350)
+++ packages/pyopenssl/trunk/debian/patches/disable_test_set_default_verify_paths.patch 2015-04-14 18:17:35 UTC (rev 32351)
@@ -2,19 +2,24 @@
--- a/OpenSSL/test/test_ssl.py
+++ b/OpenSSL/test/test_ssl.py
-@@ -918,21 +918,22 @@ class ContextTests(TestCase, _LoopbackMi
+@@ -1084,21 +1084,22 @@ class ContextTests(TestCase, _LoopbackMi
# internet which has such a certificate. Connecting to the network
# in a unit test is bad, but it's the only way I can think of to
# really test this. -exarkun
+ pass
- # Arg, verisign.com doesn't speak TLSv1
-- context = Context(SSLv3_METHOD)
+ # Arg, verisign.com doesn't speak anything newer than TLS 1.0
+- context = Context(TLSv1_METHOD)
- context.set_default_verify_paths()
- context.set_verify(
- VERIFY_PEER,
- lambda conn, cert, errno, depth, preverify_ok: preverify_ok)
--
++ #context = Context(TLSv1_METHOD)
++ #context.set_default_verify_paths()
++ #context.set_verify(
++ # VERIFY_PEER,
++ # lambda conn, cert, errno, depth, preverify_ok: preverify_ok)
+
- client = socket()
- client.connect(('verisign.com', 443))
- clientSSL = Connection(context, client)
@@ -22,12 +27,6 @@
- clientSSL.do_handshake()
- clientSSL.send(b"GET / HTTP/1.0\r\n\r\n")
- self.assertTrue(clientSSL.recv(1024))
-+ #context = Context(SSLv3_METHOD)
-+ #context.set_default_verify_paths()
-+ #context.set_verify(
-+ # VERIFY_PEER,
-+ # lambda conn, cert, errno, depth, preverify_ok: preverify_ok)
-+ #
+ #client = socket()
+ #client.connect(('verisign.com', 443))
+ #clientSSL = Connection(context, client)
More information about the Python-modules-commits
mailing list