Blame SOURCES/00215-pep466-reflect-openssl-settings-ssltests.patch

f63228
diff -up Python-2.7.5/Lib/test/test_ssl.py.ssl2 Python-2.7.5/Lib/test/test_ssl.py
f63228
--- Python-2.7.5/Lib/test/test_ssl.py.ssl2	2015-03-04 12:19:26.345387741 +0100
f63228
+++ Python-2.7.5/Lib/test/test_ssl.py	2015-03-04 12:32:43.485702679 +0100
f63228
@@ -689,7 +689,8 @@ class ContextTests(unittest.TestCase):
f63228
     @skip_if_broken_ubuntu_ssl
f63228
     def test_options(self):
f63228
         ctx = ssl.SSLContext(ssl.PROTOCOL_TLSv1)
f63228
-        # OP_ALL | OP_NO_SSLv2 is the default value
f63228
+        self.assertEqual(ssl.OP_ALL, ctx.options)
f63228
+        ctx.options |= ssl.OP_NO_SSLv2
f63228
         self.assertEqual(ssl.OP_ALL | ssl.OP_NO_SSLv2,
f63228
                          ctx.options)
f63228
         ctx.options |= ssl.OP_NO_SSLv3
f63228
@@ -2142,9 +2143,9 @@ else:
f63228
                 # No SSLv2 => client will use an SSLv3 hello on recent OpenSSLs
f63228
                 try_protocol_combo(ssl.PROTOCOL_SSLv2, ssl.PROTOCOL_SSLv23, False,
f63228
                                    client_options=ssl.OP_NO_SSLv2)
f63228
-            try_protocol_combo(ssl.PROTOCOL_SSLv2, ssl.PROTOCOL_SSLv23, False,
f63228
+            try_protocol_combo(ssl.PROTOCOL_SSLv2, ssl.PROTOCOL_SSLv23, True,
f63228
                                client_options=ssl.OP_NO_SSLv3)
f63228
-            try_protocol_combo(ssl.PROTOCOL_SSLv2, ssl.PROTOCOL_SSLv23, False,
f63228
+            try_protocol_combo(ssl.PROTOCOL_SSLv2, ssl.PROTOCOL_SSLv23, True,
f63228
                                client_options=ssl.OP_NO_TLSv1)
f63228
f63228
         @skip_if_broken_ubuntu_ssl
f63228