[Python-modules-commits] r32351 - in packages/pyopenssl/trunk/debian (2 files)

morph at users.alioth.debian.org morph at users.alioth.debian.org
Tue Apr 14 18:17:36 UTC 2015


    Date: Tuesday, April 14, 2015 @ 18:17:35
  Author: morph
Revision: 32351

* debian/patches/disable_test_set_default_verify_paths.patch
  - refreshed

Modified:
  packages/pyopenssl/trunk/debian/changelog
  packages/pyopenssl/trunk/debian/patches/disable_test_set_default_verify_paths.patch

Modified: packages/pyopenssl/trunk/debian/changelog
===================================================================
--- packages/pyopenssl/trunk/debian/changelog	2015-04-14 17:58:09 UTC (rev 32350)
+++ packages/pyopenssl/trunk/debian/changelog	2015-04-14 18:17:35 UTC (rev 32351)
@@ -6,8 +6,10 @@
   * debian/copyright
     - extend packaging copyright years
     - extend upstream copyright years
+  * debian/patches/disable_test_set_default_verify_paths.patch
+    - refreshed
 
- -- Sandro Tosi <morph at debian.org>  Tue, 14 Apr 2015 18:58:01 +0100
+ -- Sandro Tosi <morph at debian.org>  Tue, 14 Apr 2015 19:17:29 +0100
 
 pyopenssl (0.14-1) unstable; urgency=medium
 

Modified: packages/pyopenssl/trunk/debian/patches/disable_test_set_default_verify_paths.patch
===================================================================
--- packages/pyopenssl/trunk/debian/patches/disable_test_set_default_verify_paths.patch	2015-04-14 17:58:09 UTC (rev 32350)
+++ packages/pyopenssl/trunk/debian/patches/disable_test_set_default_verify_paths.patch	2015-04-14 18:17:35 UTC (rev 32351)
@@ -2,19 +2,24 @@
 
 --- a/OpenSSL/test/test_ssl.py
 +++ b/OpenSSL/test/test_ssl.py
-@@ -918,21 +918,22 @@ class ContextTests(TestCase, _LoopbackMi
+@@ -1084,21 +1084,22 @@ class ContextTests(TestCase, _LoopbackMi
              # internet which has such a certificate.  Connecting to the network
              # in a unit test is bad, but it's the only way I can think of to
              # really test this. -exarkun
 +            pass
  
-             # Arg, verisign.com doesn't speak TLSv1
--            context = Context(SSLv3_METHOD)
+             # Arg, verisign.com doesn't speak anything newer than TLS 1.0
+-            context = Context(TLSv1_METHOD)
 -            context.set_default_verify_paths()
 -            context.set_verify(
 -                VERIFY_PEER,
 -                lambda conn, cert, errno, depth, preverify_ok: preverify_ok)
--
++            #context = Context(TLSv1_METHOD)
++            #context.set_default_verify_paths()
++            #context.set_verify(
++            #    VERIFY_PEER,
++            #    lambda conn, cert, errno, depth, preverify_ok: preverify_ok)
+ 
 -            client = socket()
 -            client.connect(('verisign.com', 443))
 -            clientSSL = Connection(context, client)
@@ -22,12 +27,6 @@
 -            clientSSL.do_handshake()
 -            clientSSL.send(b"GET / HTTP/1.0\r\n\r\n")
 -            self.assertTrue(clientSSL.recv(1024))
-+            #context = Context(SSLv3_METHOD)
-+            #context.set_default_verify_paths()
-+            #context.set_verify(
-+            #    VERIFY_PEER,
-+            #    lambda conn, cert, errno, depth, preverify_ok: preverify_ok)
-+            #
 +            #client = socket()
 +            #client.connect(('verisign.com', 443))
 +            #clientSSL = Connection(context, client)




More information about the Python-modules-commits mailing list