|
|
f63228 |
diff -up Python-2.7.5/Lib/test/test_ssl.py.ssl2 Python-2.7.5/Lib/test/test_ssl.py
|
|
|
f63228 |
--- Python-2.7.5/Lib/test/test_ssl.py.ssl2 2015-03-04 12:19:26.345387741 +0100
|
|
|
f63228 |
+++ Python-2.7.5/Lib/test/test_ssl.py 2015-03-04 12:32:43.485702679 +0100
|
|
|
f63228 |
@@ -689,7 +689,8 @@ class ContextTests(unittest.TestCase):
|
|
|
f63228 |
@skip_if_broken_ubuntu_ssl
|
|
|
f63228 |
def test_options(self):
|
|
|
f63228 |
ctx = ssl.SSLContext(ssl.PROTOCOL_TLSv1)
|
|
|
f63228 |
- # OP_ALL | OP_NO_SSLv2 is the default value
|
|
|
f63228 |
+ self.assertEqual(ssl.OP_ALL, ctx.options)
|
|
|
f63228 |
+ ctx.options |= ssl.OP_NO_SSLv2
|
|
|
f63228 |
self.assertEqual(ssl.OP_ALL | ssl.OP_NO_SSLv2,
|
|
|
f63228 |
ctx.options)
|
|
|
f63228 |
ctx.options |= ssl.OP_NO_SSLv3
|
|
|
f63228 |
@@ -2142,9 +2143,9 @@ else:
|
|
|
f63228 |
# No SSLv2 => client will use an SSLv3 hello on recent OpenSSLs
|
|
|
f63228 |
try_protocol_combo(ssl.PROTOCOL_SSLv2, ssl.PROTOCOL_SSLv23, False,
|
|
|
f63228 |
client_options=ssl.OP_NO_SSLv2)
|
|
|
f63228 |
- try_protocol_combo(ssl.PROTOCOL_SSLv2, ssl.PROTOCOL_SSLv23, False,
|
|
|
f63228 |
+ try_protocol_combo(ssl.PROTOCOL_SSLv2, ssl.PROTOCOL_SSLv23, True,
|
|
|
f63228 |
client_options=ssl.OP_NO_SSLv3)
|
|
|
f63228 |
- try_protocol_combo(ssl.PROTOCOL_SSLv2, ssl.PROTOCOL_SSLv23, False,
|
|
|
f63228 |
+ try_protocol_combo(ssl.PROTOCOL_SSLv2, ssl.PROTOCOL_SSLv23, True,
|
|
|
f63228 |
client_options=ssl.OP_NO_TLSv1)
|
|
|
f63228 |
|
|
|
f63228 |
@skip_if_broken_ubuntu_ssl
|
|
|
f63228 |
|