the test_ssl
rrose@intern:~/temp/Python-3.5.1$ ./python -m test -v test_ssl
== CPython 3.5.1 (default, Jun 23 2016, 15:03:20) [GCC 4.8.4]
== Linux-3.13.0-88-generic-x86_64-with-debian-jessie-sid little-endian
== hash algorithm: siphash24 64bit
== /home/rrose/temp/Python-3.5.1/build/test_python_28902
Testing with flags: sys.flags(debug=0, inspect=0, interactive=0, optimize=0, dont_write_bytecode=0, no_user_site=0, no_site=0, ignore_environment=0, verbose=0, bytes_warning=0, quiet=0, hash_randomization=1, isolated=0)
[1/1] test_ssl
test_ssl: testing with 'OpenSSL 1.0.1f 6 Jan 2014' (1, 0, 1, 6, 15)
under Linux ('debian', 'jessie/sid', '')
HAS_SNI = True
OP_ALL = 0x800003ff
OP_NO_TLSv1_1 = 0x10000000
test__create_stdlib_context (test.test_ssl.ContextTests) ... ok
test_cert_store_stats (test.test_ssl.ContextTests) ... ok
test_check_hostname (test.test_ssl.ContextTests) ... ok
test_ciphers (test.test_ssl.ContextTests) ... ok
test_constructor (test.test_ssl.ContextTests) ... ok
test_create_default_context (test.test_ssl.ContextTests) ... ok
test_get_ca_certs (test.test_ssl.ContextTests) ... ok
test_load_cert_chain (test.test_ssl.ContextTests) ... ok
test_load_default_certs (test.test_ssl.ContextTests) ... ok
test_load_default_certs_env (test.test_ssl.ContextTests) ... ok
test_load_default_certs_env_windows (test.test_ssl.ContextTests) ... skipped 'Windows specific'
test_load_dh_params (test.test_ssl.ContextTests) ... ok
test_load_verify_cadata (test.test_ssl.ContextTests) ... ok
test_load_verify_locations (test.test_ssl.ContextTests) ... ok
test_options (test.test_ssl.ContextTests) ... ok
test_protocol (test.test_ssl.ContextTests) ... ok
test_session_stats (test.test_ssl.ContextTests) ... ok
test_set_default_verify_paths (test.test_ssl.ContextTests) ... ok
test_set_ecdh_curve (test.test_ssl.ContextTests) ... ok
test_sni_callback (test.test_ssl.ContextTests) ... ok
test_sni_callback_refcycle (test.test_ssl.ContextTests) ... ok
test_verify_flags (test.test_ssl.ContextTests) ... ok
test_verify_mode (test.test_ssl.ContextTests) ... ok
test_DER_to_PEM (test.test_ssl.BasicSocketTests) ... ok
test_asn1object (test.test_ssl.BasicSocketTests) ... ok
test_cert_time_to_seconds (test.test_ssl.BasicSocketTests) ... ok
test_cert_time_to_seconds_locale (test.test_ssl.BasicSocketTests) ... skipped 'locale-specific month name needs to be different from C locale'
test_cert_time_to_seconds_timezone (test.test_ssl.BasicSocketTests) ... ok
test_constants (test.test_ssl.BasicSocketTests) ... ok
test_dealloc_warn (test.test_ssl.BasicSocketTests) ... ok
test_enum_certificates (test.test_ssl.BasicSocketTests) ... skipped 'Windows specific'
test_enum_crls (test.test_ssl.BasicSocketTests) ... skipped 'Windows specific'
test_errors (test.test_ssl.BasicSocketTests) ... ok
test_get_default_verify_paths (test.test_ssl.BasicSocketTests) ... ok
test_match_hostname (test.test_ssl.BasicSocketTests) ... ok
test_openssl_version (test.test_ssl.BasicSocketTests) ... ok
test_parse_cert (test.test_ssl.BasicSocketTests) ...
{'issuer': ((('countryName', 'XY'),),
(('localityName', 'Castle Anthrax'),),
(('organizationName', 'Python Software Foundation'),),
(('commonName', 'localhost'),)),
'notAfter': 'Oct 5 23:01:56 2020 GMT',
'notBefore': 'Oct 8 23:01:56 2010 GMT',
'serialNumber': 'D7C7381919AFC24E',
'subject': ((('countryName', 'XY'),),
(('localityName', 'Castle Anthrax'),),
(('organizationName', 'Python Software Foundation'),),
(('commonName', 'localhost'),)),
'subjectAltName': (('DNS', 'localhost'),),
'version': 3}
{'OCSP': ('http://ocsp.verisign.com',),
'caIssuers': ('http://SVRIntl-G3-aia.verisign.com/SVRIntlG3.cer',),
'crlDistributionPoints': ('http://SVRIntl-G3-crl.verisign.com/SVRIntlG3.crl',),
'issuer': ((('countryName', 'US'),),
(('organizationName', 'VeriSign, Inc.'),),
(('organizationalUnitName', 'VeriSign Trust Network'),),
(('organizationalUnitName',
'Terms of use at https://www.verisign.com/rpa (c)10'),),
(('commonName', 'VeriSign Class 3 International Server CA - G3'),)),
'notAfter': 'Sep 20 23:59:59 2012 GMT',
'notBefore': 'Sep 21 00:00:00 2011 GMT',
'serialNumber': '2EE6EA7640A075CEE5005F4D7C79549A',
'subject': ((('countryName', 'FI'),),
(('stateOrProvinceName', 'Espoo'),),
(('localityName', 'Espoo'),),
(('organizationName', 'Nokia'),),
(('organizationalUnitName', 'BI'),),
(('commonName', 'projects.developer.nokia.com'),)),
'subjectAltName': (('DNS', 'projects.developer.nokia.com'),
('DNS', 'projects.forum.nokia.com')),
'version': 3}
ok
test_parse_cert_CVE_2013_4238 (test.test_ssl.BasicSocketTests) ...
{'issuer': ((('countryName', 'US'),),
(('stateOrProvinceName', 'Oregon'),),
(('localityName', 'Beaverton'),),
(('organizationName', 'Python Software Foundation'),),
(('organizationalUnitName', 'Python Core Development'),),
(('commonName', 'null.python.org\x00example.org'),),
(('emailAddress', 'python-dev@python.org'),)),
'notAfter': 'Aug 7 13:12:52 2013 GMT',
'notBefore': 'Aug 7 13:11:52 2013 GMT',
'serialNumber': '00',
'subject': ((('countryName', 'US'),),
(('stateOrProvinceName', 'Oregon'),),
(('localityName', 'Beaverton'),),
(('organizationName', 'Python Software Foundation'),),
(('organizationalUnitName', 'Python Core Development'),),
(('commonName', 'null.python.org\x00example.org'),),
(('emailAddress', 'python-dev@python.org'),)),
'subjectAltName': (('DNS', 'altnull.python.org\x00example.com'),
('email', 'null@python.org\x00user@example.org'),
('URI', 'http://null.python.org\x00http://example.org'),
('IP Address', '192.0.2.1'),
('IP Address', '2001:DB8:0:0:0:0:0:1\n')),
'version': 3}
ok
test_purpose_enum (test.test_ssl.BasicSocketTests) ... ok
test_random (test.test_ssl.BasicSocketTests) ...
RAND_status is 1 (sufficient randomness)
ok
test_random_fork (test.test_ssl.BasicSocketTests) ... ok
test_refcycle (test.test_ssl.BasicSocketTests) ... ok
test_server_side (test.test_ssl.BasicSocketTests) ... ok
test_str_for_enums (test.test_ssl.BasicSocketTests) ... ok
test_timeout (test.test_ssl.BasicSocketTests) ... ok
test_tls_unique_channel_binding (test.test_ssl.BasicSocketTests) ... ok
test_unknown_channel_binding (test.test_ssl.BasicSocketTests) ... ok
test_unsupported_dtls (test.test_ssl.BasicSocketTests) ... ok
test_wrapped_unconnected (test.test_ssl.BasicSocketTests) ... ok
test_lib_reason (test.test_ssl.SSLErrorTests) ... ok
test_str (test.test_ssl.SSLErrorTests) ... ok
test_subclass (test.test_ssl.SSLErrorTests) ... ok
test_buffer_types (test.test_ssl.MemoryBIOTests) ... ok
test_eof (test.test_ssl.MemoryBIOTests) ... ok
test_error_types (test.test_ssl.MemoryBIOTests) ... ok
test_pending (test.test_ssl.MemoryBIOTests) ... ok
test_read_write (test.test_ssl.MemoryBIOTests) ... ok
test_alpn_protocols (test.test_ssl.ThreadedTests) ... skipped 'ALPN support needed for this test'
test_asyncore_server (test.test_ssl.ThreadedTests)
Check the example asyncore integration. ...
server: new connection from 127.0.0.1:33233
client: sending b'FOO\n'...
server: read b'FOO\n' from client
client: read b'foo\n'
client: closing connection.
client: connection closed.
cleanup: stopping server.
cleanup: joining server thread.
server: read b'over\n' from client
server: closed connection <ssl.SSLSocket [closed] fd=-1, family=AddressFamily.AF_INET, type=2049, proto=0>
server: read b'' from client
cleanup: successfully joined.
ok
test_check_hostname (test.test_ssl.ThreadedTests) ...
server: new connection from ('127.0.0.1', 41287)
server: connection cipher is now ('ECDHE-RSA-AES256-SHA', 'TLSv1/SSLv3', 256)
server: selected protocol is now None
server: new connection from ('127.0.0.1', 40438)
server: connection cipher is now ('ECDHE-RSA-AES256-SHA', 'TLSv1/SSLv3', 256)
server: selected protocol is now None
ok
test_compression (test.test_ssl.ThreadedTests) ... server: new connection from ('127.0.0.1', 40540)
server: connection cipher is now ('ECDHE-RSA-AES256-SHA', 'TLSv1/SSLv3', 256)
server: selected protocol is now None
client: sending b'FOO\n'...
client: read b'foo\n'
client: sending b'FOO\n'...
client: read b'foo\n'
client: sending b'FOO\n'...
client: read b'foo\n'
client: closing connection.
got compression: None
ok
test_compression_disabled (test.test_ssl.ThreadedTests) ... server: new connection from ('127.0.0.1', 39154)
server: connection cipher is now ('ECDHE-RSA-AES256-SHA', 'TLSv1/SSLv3', 256)
client: sending b'FOO\n'...
server: selected protocol is now None
client: read b'foo\n'
client: sending b'FOO\n'...
client: read b'foo\n'
client: sending b'FOO\n'...
client: read b'foo\n'
client: closing connection.
ok
test_crl_check (test.test_ssl.ThreadedTests) ...
server: new connection from ('127.0.0.1', 54316)
server: connection cipher is now ('ECDHE-RSA-AES256-SHA', 'TLSv1/SSLv3', 256)
server: selected protocol is now None
server: new connection from ('127.0.0.1', 58773)
server: bad connection attempt from ('127.0.0.1', 58773):
Traceback (most recent call last):
File "/home/rrose/temp/Python-3.5.1/Lib/test/test_ssl.py", line 1789, in wrap_conn
self.sock, server_side=True)
File "/home/rrose/temp/Python-3.5.1/Lib/ssl.py", line 376, in wrap_socket
_context=self)
File "/home/rrose/temp/Python-3.5.1/Lib/ssl.py", line 747, in __init__
self.do_handshake()
File "/home/rrose/temp/Python-3.5.1/Lib/ssl.py", line 983, in do_handshake
self._sslobj.do_handshake()
File "/home/rrose/temp/Python-3.5.1/Lib/ssl.py", line 628, in do_handshake
self._sslobj.do_handshake()
ssl.SSLError: [SSL: TLSV1_ALERT_UNKNOWN_CA] tlsv1 alert unknown ca (_ssl.c:645)
server: new connection from ('127.0.0.1', 34821)
server: connection cipher is now ('ECDHE-RSA-AES256-SHA', 'TLSv1/SSLv3', 256)
server: selected protocol is now None
ok
test_default_ciphers (test.test_ssl.ThreadedTests) ... ok
test_default_ecdh_curve (test.test_ssl.ThreadedTests) ... server: new connection from ('127.0.0.1', 47715)
server: connection cipher is now ('ECDHE-RSA-AES256-GCM-SHA384', 'TLSv1/SSLv3', 256)
server: selected protocol is now None
ok
test_dh_params (test.test_ssl.ThreadedTests) ... server: new connection from ('127.0.0.1', 48140)
server: connection cipher is now ('DHE-RSA-AES256-SHA', 'TLSv1/SSLv3', 256)
client: sending b'FOO\n'...
server: selected protocol is now None
client: read b'foo\n'
client: sending b'FOO\n'...
client: read b'foo\n'
client: sending b'FOO\n'...
client: read b'foo\n'
client: closing connection.
ok
test_do_handshake_enotconn (test.test_ssl.ThreadedTests) ... ok
test_echo (test.test_ssl.ThreadedTests)
Basic test of an SSL client connecting to a server ...
server: new connection from ('127.0.0.1', 47352)
server: connection cipher is now ('ECDHE-RSA-AES256-SHA', 'TLSv1/SSLv3', 256)
server: selected protocol is now None
client: sending b'FOO\n'...
client: read b'foo\n'
client: sending b'FOO\n'...
client: read b'foo\n'
client: sending b'FOO\n'...
client: read b'foo\n'
client: closing connection.
server: new connection from ('127.0.0.1', 52027)
server: connection cipher is now ('ECDHE-RSA-AES256-GCM-SHA384', 'TLSv1/SSLv3', 256)
server: selected protocol is now None
client: sending b'FOO\n'...
client: read b'foo\n'
client: sending b'FOO\n'...
client: read b'foo\n'
client: sending b'FOO\n'...
client: read b'foo\n'
client: closing connection.
server: new connection from ('127.0.0.1', 35909)
server: connection cipher is now ('ECDHE-RSA-AES256-SHA', 'TLSv1/SSLv3', 256)
client: sending b'FOO\n'...
server: selected protocol is now None
client: read b'foo\n'
client: sending b'FOO\n'...
client: read b'foo\n'
client: sending b'FOO\n'...
client: read b'foo\n'
client: closing connection.
server: new connection from ('127.0.0.1', 53560)
server: connection cipher is now ('ECDHE-RSA-AES256-SHA', 'TLSv1/SSLv3', 256)
client: sending b'FOO\n'...
server: selected protocol is now None
client: read b'foo\n'
client: sending b'FOO\n'...
client: read b'foo\n'
client: sending b'FOO\n'...
client: read b'foo\n'
client: closing connection.
server: new connection from ('127.0.0.1', 52272)
server: connection cipher is now ('ECDHE-RSA-AES256-GCM-SHA384', 'TLSv1/SSLv3', 256)
server: selected protocol is now None
client: sending b'FOO\n'...
client: read b'foo\n'
client: sending b'FOO\n'...
client: read b'foo\n'
client: sending b'FOO\n'...
client: read b'foo\n'
client: closing connection.
ok
test_empty_cert (test.test_ssl.ThreadedTests)
Connecting with an empty cert file ...
SSLError is [SSL] PEM lib (_ssl.c:2803)
ok
test_getpeercert (test.test_ssl.ThreadedTests) ...
{'issuer': ((('countryName', 'XY'),),
(('localityName', 'Castle Anthrax'),),
(('organizationName', 'Python Software Foundation'),),
(('commonName', 'localhost'),)),
'notAfter': 'Oct 5 23:01:56 2020 GMT',
'notBefore': 'Oct 8 23:01:56 2010 GMT',
'serialNumber': 'D7C7381919AFC24E',
'subject': ((('countryName', 'XY'),),
(('localityName', 'Castle Anthrax'),),
(('organizationName', 'Python Software Foundation'),),
(('commonName', 'localhost'),)),
'subjectAltName': (('DNS', 'localhost'),),
'version': 3}
Connection cipher is ('ECDHE-RSA-AES256-GCM-SHA384', 'TLSv1/SSLv3', 256).
ok
test_getpeercert_enotconn (test.test_ssl.ThreadedTests) ... ok
test_handshake_timeout (test.test_ssl.ThreadedTests) ... ok
test_malformed_cert (test.test_ssl.ThreadedTests)
Connecting with a badly formatted certificate (syntax error) ...
SSLError is [SSL] PEM lib (_ssl.c:2803)
ok
test_malformed_key (test.test_ssl.ThreadedTests)
Connecting with a badly formatted key (syntax error) ...
SSLError is [SSL] PEM lib (_ssl.c:2803)
ok
test_nonblocking_send (test.test_ssl.ThreadedTests) ... server: new connection from ('127.0.0.1', 33178)
server: connection cipher is now ('ECDHE-RSA-AES256-SHA', 'TLSv1/SSLv3', 256)
server: selected protocol is now None
Test server failure:
Traceback (most recent call last):
File "/home/rrose/temp/Python-3.5.1/Lib/test/test_ssl.py", line 1886, in run
self.write(msg.lower())
File "/home/rrose/temp/Python-3.5.1/Lib/test/test_ssl.py", line 1831, in write
return self.sslconn.write(bytes)
File "/home/rrose/temp/Python-3.5.1/Lib/ssl.py", line 803, in write
return self._sslobj.write(data)
File "/home/rrose/temp/Python-3.5.1/Lib/ssl.py", line 581, in write
return self._sslobj.write(data)
ConnectionResetError: [Errno 104] Connection reset by peer
ok
test_nonexisting_cert (test.test_ssl.ThreadedTests)
Connecting with a non-existing cert file ...
OSError is No such file or directory
ok
test_npn_protocols (test.test_ssl.ThreadedTests) ... server: new connection from ('127.0.0.1', 45702)
server: connection cipher is now ('ECDHE-RSA-AES256-SHA', 'TLSv1/SSLv3', 256)
client: sending b'FOO\n'...
server: selected protocol is now http/1.1
client: read b'foo\n'
client: sending b'FOO\n'...
client: read b'foo\n'
client: sending b'FOO\n'...
client: read b'foo\n'
client: closing connection.
server: new connection from ('127.0.0.1', 56144)
client: sending b'FOO\n'...
server: connection cipher is now ('ECDHE-RSA-AES256-SHA', 'TLSv1/SSLv3', 256)
server: selected protocol is now http/1.1
client: read b'foo\n'
client: sending b'FOO\n'...
client: read b'foo\n'
client: sending b'FOO\n'...
client: read b'foo\n'
client: closing connection.
server: new connection from ('127.0.0.1', 50837)
server: connection cipher is now ('ECDHE-RSA-AES256-SHA', 'TLSv1/SSLv3', 256)
server: selected protocol is now spdy/2
client: sending b'FOO\n'...
client: read b'foo\n'
client: sending b'FOO\n'...
client: read b'foo\n'
client: sending b'FOO\n'...
client: read b'foo\n'
client: closing connection.
server: new connection from ('127.0.0.1', 49364)
server: connection cipher is now ('ECDHE-RSA-AES256-SHA', 'TLSv1/SSLv3', 256)
client: sending b'FOO\n'...
server: selected protocol is now abc
client: read b'foo\n'
client: sending b'FOO\n'...
client: read b'foo\n'
client: sending b'FOO\n'...
client: read b'foo\n'
client: closing connection.
ok
test_protocol_sslv2 (test.test_ssl.ThreadedTests)
Connecting to an SSLv2 server with various client options ... skipped 'OpenSSL is compiled without SSLv2 support'
test_protocol_sslv23 (test.test_ssl.ThreadedTests)
Connecting to an SSLv23 server with various client options ...
{PROTOCOL_SSLv3->PROTOCOL_SSLv23} CERT_NONE
PROTOCOL_SSLv23->PROTOCOL_SSLv23 CERT_NONE
PROTOCOL_TLSv1->PROTOCOL_SSLv23 CERT_NONE
{PROTOCOL_SSLv3->PROTOCOL_SSLv23} CERT_OPTIONAL
PROTOCOL_SSLv23->PROTOCOL_SSLv23 CERT_OPTIONAL
PROTOCOL_TLSv1->PROTOCOL_SSLv23 CERT_OPTIONAL
{PROTOCOL_SSLv3->PROTOCOL_SSLv23} CERT_REQUIRED
PROTOCOL_SSLv23->PROTOCOL_SSLv23 CERT_REQUIRED
PROTOCOL_TLSv1->PROTOCOL_SSLv23 CERT_REQUIRED
{PROTOCOL_SSLv3->PROTOCOL_SSLv23} CERT_NONE
PROTOCOL_SSLv23->PROTOCOL_SSLv23 CERT_NONE
{PROTOCOL_TLSv1->PROTOCOL_SSLv23} CERT_NONE
ok
test_protocol_sslv3 (test.test_ssl.ThreadedTests)
Connecting to an SSLv3 server with various client options ...
PROTOCOL_SSLv3->PROTOCOL_SSLv3 CERT_NONE
PROTOCOL_SSLv3->PROTOCOL_SSLv3 CERT_OPTIONAL
PROTOCOL_SSLv3->PROTOCOL_SSLv3 CERT_REQUIRED
{PROTOCOL_SSLv23->PROTOCOL_SSLv3} CERT_NONE
{PROTOCOL_TLSv1->PROTOCOL_SSLv3} CERT_NONE
{PROTOCOL_SSLv23->PROTOCOL_SSLv3} CERT_NONE
ok
test_protocol_tlsv1 (test.test_ssl.ThreadedTests)
Connecting to a TLSv1 server with various client options ...
PROTOCOL_TLSv1->PROTOCOL_TLSv1 CERT_NONE
PROTOCOL_TLSv1->PROTOCOL_TLSv1 CERT_OPTIONAL
PROTOCOL_TLSv1->PROTOCOL_TLSv1 CERT_REQUIRED
{PROTOCOL_SSLv3->PROTOCOL_TLSv1} CERT_NONE
{PROTOCOL_SSLv23->PROTOCOL_TLSv1} CERT_NONE
ok
test_protocol_tlsv1_1 (test.test_ssl.ThreadedTests)
Connecting to a TLSv1.1 server with various client options. ...
PROTOCOL_TLSv1_1->PROTOCOL_TLSv1_1 CERT_NONE
{PROTOCOL_SSLv3->PROTOCOL_TLSv1_1} CERT_NONE
{PROTOCOL_SSLv23->PROTOCOL_TLSv1_1} CERT_NONE
PROTOCOL_TLSv1_1->PROTOCOL_SSLv23 CERT_NONE
{PROTOCOL_TLSv1->PROTOCOL_TLSv1_1} CERT_NONE
{PROTOCOL_TLSv1_1->PROTOCOL_TLSv1} CERT_NONE
ok
test_protocol_tlsv1_2 (test.test_ssl.ThreadedTests)
Connecting to a TLSv1.2 server with various client options. ...
PROTOCOL_TLSv1_2->PROTOCOL_TLSv1_2 CERT_NONE
{PROTOCOL_SSLv3->PROTOCOL_TLSv1_2} CERT_NONE
{PROTOCOL_SSLv23->PROTOCOL_TLSv1_2} CERT_NONE
PROTOCOL_TLSv1_2->PROTOCOL_SSLv23 CERT_NONE
{PROTOCOL_TLSv1->PROTOCOL_TLSv1_2} CERT_NONE
{PROTOCOL_TLSv1_2->PROTOCOL_TLSv1} CERT_NONE
{PROTOCOL_TLSv1_1->PROTOCOL_TLSv1_2} CERT_NONE
{PROTOCOL_TLSv1_2->PROTOCOL_TLSv1_1} CERT_NONE
ok
test_read_write_after_close_raises_valuerror (test.test_ssl.ThreadedTests) ... ok
test_recv_send (test.test_ssl.ThreadedTests)
Test recv(), send() and friends. ...
server: new connection from ('127.0.0.1', 37197)
server: connection cipher is now ('ECDHE-RSA-AES256-SHA', 'TLSv1/SSLv3', 256)
server: selected protocol is now None
ok
test_rude_shutdown (test.test_ssl.ThreadedTests)
A brutal shutdown of an SSL server should raise an OSError ... ok
test_selected_alpn_protocol (test.test_ssl.ThreadedTests) ... server: new connection from ('127.0.0.1', 55355)
server: connection cipher is now ('ECDHE-RSA-AES256-SHA', 'TLSv1/SSLv3', 256)
client: sending b'FOO\n'...
server: selected protocol is now None
client: read b'foo\n'
client: sending b'FOO\n'...
client: read b'foo\n'
client: sending b'FOO\n'...
client: read b'foo\n'
client: closing connection.
ok
test_selected_alpn_protocol_if_server_uses_alpn (test.test_ssl.ThreadedTests) ... skipped 'ALPN support required'
test_selected_npn_protocol (test.test_ssl.ThreadedTests) ... server: new connection from ('127.0.0.1', 57433)
server: connection cipher is now ('ECDHE-RSA-AES256-SHA', 'TLSv1/SSLv3', 256)
client: sending b'FOO\n'...
server: selected protocol is now None
client: read b'foo\n'
client: sending b'FOO\n'...
client: read b'foo\n'
client: sending b'FOO\n'...
client: read b'foo\n'
client: closing connection.
ok
test_sendfile (test.test_ssl.ThreadedTests) ... ok
test_server_accept (test.test_ssl.ThreadedTests) ... ok
test_shared_ciphers (test.test_ssl.ThreadedTests) ... server: new connection from ('127.0.0.1', 44231)
server: connection cipher is now ('ECDHE-RSA-RC4-SHA', 'TLSv1/SSLv3', 128)
server: selected protocol is now None
ok
test_sni_callback (test.test_ssl.ThreadedTests) ... server: new connection from ('127.0.0.1', 37285)
server: connection cipher is now ('ECDHE-RSA-AES256-SHA', 'TLSv1/SSLv3', 256)
server: selected protocol is now None
server: new connection from ('127.0.0.1', 56968)
server: connection cipher is now ('ECDHE-RSA-AES256-SHA', 'TLSv1/SSLv3', 256)
server: selected protocol is now None
server: new connection from ('127.0.0.1', 34528)
server: connection cipher is now ('ECDHE-RSA-AES256-SHA', 'TLSv1/SSLv3', 256)
server: selected protocol is now None
ok
test_sni_callback_alert (test.test_ssl.ThreadedTests) ... ok
test_sni_callback_raising (test.test_ssl.ThreadedTests) ... ok
test_sni_callback_wrong_return_type (test.test_ssl.ThreadedTests) ... ok
test_socketserver (test.test_ssl.ThreadedTests)
Using a SocketServer to create and manage SSL connections. ...
server (('127.0.0.1', 36048):36048 ('ECDHE-RSA-AES256-GCM-SHA384', 'TLSv1/SSLv3', 256)):
[23/Jun/2016 15:20:36] "GET /keycert.pem HTTP/1.1" 200 -
client: read 1783 bytes from remote server '<HTTPSServerThread <HTTPSServer localhost:36048>>'
stopping HTTPS server
joining HTTPS thread
ok
test_starttls (test.test_ssl.ThreadedTests)
Switching from clear text to encrypted and back again. ...
client: sending b'msg 1'...
server: new connection from ('127.0.0.1', 33860)
server: read b'msg 1' (unencrypted), sending back b'msg 1' (unencrypted)...
client: read b'msg 1' from server
client: sending b'MSG 2'...
server: read b'MSG 2' (unencrypted), sending back b'msg 2' (unencrypted)...
client: read b'msg 2' from server
client: sending b'STARTTLS'...
server: read STARTTLS from client, sending OK...
client: read b'ok' from server, starting TLS...
server: connection cipher is now ('ECDHE-RSA-AES256-SHA', 'TLSv1/SSLv3', 256)
server: selected protocol is now None
client: sending b'MSG 3'...
server: read b'MSG 3' (encrypted), sending back b'msg 3' (encrypted)...
client: read b'msg 3' from server
client: sending b'msg 4'...
server: read b'msg 4' (encrypted), sending back b'msg 4' (encrypted)...
client: read b'msg 4' from server
client: sending b'ENDTLS'...
server: read ENDTLS from client, sending OK...
client: read b'ok' from server, ending TLS...
server: connection is now unencrypted...
client: sending b'msg 5'...
server: read b'msg 5' (unencrypted), sending back b'msg 5' (unencrypted)...
client: read b'msg 5' from server
client: sending b'msg 6'...
server: read b'msg 6' (unencrypted), sending back b'msg 6' (unencrypted)...
client: read b'msg 6' from server
client: closing connection.
server: client closed connection
ok
test_tls_unique_channel_binding (test.test_ssl.ThreadedTests)
Test tls-unique channel binding. ...
server: new connection from ('127.0.0.1', 43512)
server: connection cipher is now ('ECDHE-RSA-AES256-SHA', 'TLSv1/SSLv3', 256)
got channel binding data: b'\xdf\xfa\xed\x05gGz0\xe5\xa5fP'
server: selected protocol is now None
server: new connection from ('127.0.0.1', 43513)
got another channel binding data: b'\xe4\xc1\xfb\xbaW\xe32\x85\xea:$T'
server: connection cipher is now ('ECDHE-RSA-AES256-SHA', 'TLSv1/SSLv3', 256)
server: selected protocol is now None
ok
test_version_basic (test.test_ssl.ThreadedTests) ... ok
----------------------------------------------------------------------
Ran 100 tests in 1.347s
OK (skipped=7)
1 test OK. |