This issue tracker has been migrated to GitHub, and is currently read-only.
For more information, see the GitHub FAQs in the Python's Developer Guide.

Author trent
Recipients janssen, paul.moore, trent, vila
Date 2008-04-08.14:00:52
SpamBayes Score 0.075992465
Marked as misclassified No
Message-id <1207663254.42.0.534103380569.issue1489@psf.upfronthosting.co.za>
In-reply-to
Content
Re-assigned this to myself (hope you don't mind janssen ;-) as I'm 
actively looking into it.  We build openssl.exe as part of our Windows 
build so we should make an effort to use this where possible.  Note 
that there is definitely a problem with 'openssl s_server' on Windows, 
I'm not sure if it's to do with buffering though as I can step through 
the same actions the test is performing in the console and I 
get 'ERROR\n' immediately back from the server.  This sort of falls 
into my existing work with issue 2550 (and patches) to improve network-
oriented tests such that they can be ran in parallel.  Note that patch 
trunk.2550-2.patch attached to issue2550 goes as far as converting 
openssl to use the -accept [port] option such that we don't bind on 
4443 by default (thus impeding other test_ssl_socket tests that may be 
running).

Also, openssl.exe in the s_server mode is using SO_REUSEADDR when it 
should be using SO_EXCLUSIVEADDRUSE.  That's not our problem per se, 
but given that we maintain our own openssl-0.9.8g sources, I'm 
considering fixing it if it improves the reliability of the test.  
(I'll feed back any changes to the OpenSSL project, of course.)
History
Date User Action Args
2008-04-08 14:00:54trentsetspambayes_score: 0.0759925 -> 0.075992465
recipients: + trent, paul.moore, janssen, vila
2008-04-08 14:00:54trentsetspambayes_score: 0.0759925 -> 0.0759925
messageid: <1207663254.42.0.534103380569.issue1489@psf.upfronthosting.co.za>
2008-04-08 14:00:53trentlinkissue1489 messages
2008-04-08 14:00:52trentcreate