• Home
  • Raw
  • Download

Lines Matching +full:build +full:- +full:pristine

114             (('commonName', 'our-ca-server'),)),
129 SIGNED_CERTFILE_ECC_HOSTNAME = 'localhost-ecc'
139 REMOTE_HOST = "self-signed.pythontest.net"
147 TALOS_INVALID_CRLDP = data_file("talos-2019-0758.pem")
164 # Assume that any references of "ubuntu" implies Ubuntu-like distro
166 with open("/etc/os-release", encoding="utf-8") as f:
200 # auto-negotiate protocols are always available
225 # bpo43791: 3.0.0-alpha14 fails with TLSV1_ALERT_INTERNAL_ERROR
273 return -time.altzone # seconds
274 return -time.timezone
372 # Make sure that the PROTOCOL_* constants have enum-like string
397 self.assertRaises(ValueError, ssl.RAND_bytes, -5)
399 self.assertRaises(ValueError, ssl.RAND_pseudo_bytes, -5)
430 ('http://SVRIntl-G3-aia.verisign.com/SVRIntlG3.cer',))
432 ('http://SVRIntl-G3-crl.verisign.com/SVRIntlG3.crl',))
442 (('countryName', 'UK'),), (('commonName', 'cody-ca'),)),
448 'codenomicon-vm-2.test.lal.cisco.com'),)),
450 ('DNS', 'codenomicon-vm-2.test.lal.cisco.com'),),
465 (('emailAddress', 'python-dev@python.org'),))
513 self.fail("DER-to-PEM didn't include correct header:\n%r\n" % p2)
515 self.fail("DER-to-PEM didn't include correct footer:\n%r\n" % p2)
645 "certfile must be specified for server-side operations",
648 "certfile must be specified for server-side operations",
651 self.assertRaisesRegex(ValueError, "can't connect in server-side mode",
698 # -- Hostname matching --
716 # in left-most segment
724 # NULL bytes are bad, CVE-2013-4073
743 # wildcard doesn't match IDNA prefix 'xn--'
749 cert = {'subject': ((('commonName', 'xn--p*.python.org'),),)}
752 # wildcard in first fragment and IDNA A-labels in sequent fragments
761 # Slightly fake real-world example
774 # A pristine real-world example
786 # -- IPv4 matching --
801 # -- IPv6 matching --
815 # -- Miscellaneous --
903 ss.get_channel_binding("unknown-type")
906 @unittest.skipUnless("tls-unique" in ssl.CHANNEL_BINDING_TYPES,
907 "'tls-unique' channel binding not available")
912 self.assertIsNone(ss.get_channel_binding("tls-unique"))
913 # the same for server-side
916 self.assertIsNone(ss.get_channel_binding("tls-unique"))
994 self.assertRaises(ValueError, ssl._ASN1Object.fromnid, -1)
1068 # case-insensitive
1103 self.skipTest("locale-specific month name needs to be "
1106 # locale-independent
1127 # empty reads and writes now work, bpo-42854, bpo-31711
1148 self.assertRaises(ValueError, ssl.SSLContext, -1)
1175 self.assertIn('AES256-GCM-SHA384', names)
1176 self.assertIn('AES128-GCM-SHA256', names)
1321 # The default security callback allows for levels between 0-5
1556 @unittest.skipUnless(ssl.HAS_ECDH, "ECDH disabled on this OpenSSL build")
1649 @unittest.skipIf(sys.platform == "win32", "not-Windows specific")
1659 …@unittest.skipIf(hasattr(sys, "gettotalrefcount"), "Debug build does not share environment between…
1819 ctx.num_tickets = -1
1922 self.assertEqual(bio.pending, 3-i-1)
1979 # Now if we unwrap one side unilaterally, it should send close-notify
1985 # close-notify:
1989 # And now that the client gets the server's close-notify, it doesn't
2040 # Issue #11326: non-blocking connect_ex() should allow handshake
2053 # Non-blocking handshake
2144 # Issue #5238: creating a file-like object with makefile() shouldn't
2315 if 'tls-unique' in ssl.CHANNEL_BINDING_TYPES:
2316 self.assertIsNone(sslobj.get_channel_binding('tls-unique'))
2322 if 'tls-unique' in ssl.CHANNEL_BINDING_TYPES:
2323 self.assertTrue(sslobj.get_channel_binding('tls-unique'))
2355 # errno (mimicking the behaviour of non-SSL sockets).
2425 # SSLError - OpenSSL on Ubuntu abruptly closes the
2446 # or a low-level bug. This should be made more discriminating.
2448 # bpo-31323: Store the exception as string to prevent
2449 # a reference leak: server -> conn_errors -> exception
2450 # -> traceback -> self (ConnectionHandler) -> server
2455 # bpo-44229, bpo-43855, bpo-44237, and bpo-33450:
2457 …ee also http://erickt.github.io/blog/2014/11/19/adventures-in-debugging-a-potential-osx-kernel-bug/
2541 elif stripped == b'CB tls-unique':
2543 … sys.stdout.write(" server: read CB tls-unique from client, sending our CB data...\n")
2544 data = self.sslconn.get_channel_binding("tls-unique")
2545 self.write(repr(data).encode("us-ascii") + b"\n")
2552 self.write(repr(e).encode("us-ascii") + b"\n")
2562 self.write(repr(cert).encode("us-ascii") + b"\n")
2851 Try to SSL-connect using *client_protocol* to *server_protocol*.
2865 formatstr = (expect_success and " %s->%s %s\n") or " {%s->%s} %s\n"
3123 cipher = s.cipher()[0].split('-')
3149 cipher = s.cipher()[0].split('-')
3168 'xn--knig-5qa.idn.pythontest.net'),
3169 ('xn--knig-5qa.idn.pythontest.net',
3170 'xn--knig-5qa.idn.pythontest.net'),
3171 (b'xn--knig-5qa.idn.pythontest.net',
3172 'xn--knig-5qa.idn.pythontest.net'),
3175 'xn--knigsgsschen-lcb0w.idna2003.pythontest.net'),
3176 ('xn--knigsgsschen-lcb0w.idna2003.pythontest.net',
3177 'xn--knigsgsschen-lcb0w.idna2003.pythontest.net'),
3178 (b'xn--knigsgsschen-lcb0w.idna2003.pythontest.net',
3179 'xn--knigsgsschen-lcb0w.idna2003.pythontest.net'),
3182 # 'xn--knigsgchen-b4a3dun.idna2008.pythontest.net'),
3183 ('xn--knigsgchen-b4a3dun.idna2008.pythontest.net',
3184 'xn--knigsgchen-b4a3dun.idna2008.pythontest.net'),
3185 (b'xn--knigsgchen-b4a3dun.idna2008.pythontest.net',
3186 'xn--knigsgchen-b4a3dun.idna2008.pythontest.net'),
3231 # the connection, or a low-level connection reset (which
3544 dlen = f.info().get("content-length")
3691 # read(-1, buffer) is supported, even though read(-1) is not
3695 self.assertEqual(s.read(-1, buffer), len(data))
3698 # sendall accepts bytes-like objects
3715 self.assertRaises(ValueError, s.recv, -1)
3716 self.assertRaises(ValueError, s.read, -1)
3991 # Issue #21015: elliptic curve-based Diffie Hellman key exchange
3999 # our default cipher list should prefer ECDH-based ciphers
4007 @unittest.skipUnless("tls-unique" in ssl.CHANNEL_BINDING_TYPES,
4008 "'tls-unique' channel binding not available")
4010 """Test tls-unique channel binding."""
4026 cb_data = s.get_channel_binding("tls-unique")
4039 s.write(b"CB tls-unique\n")
4042 repr(cb_data).encode("us-ascii"))
4049 new_cb_data = s.get_channel_binding("tls-unique")
4062 s.write(b"CB tls-unique\n")
4065 repr(new_cb_data).encode("us-ascii"))
4089 # Check we can get a connection with ephemeral Diffie-Hellman
4100 parts = cipher.split("-")
4102 self.fail("Non-DH cipher: " + cipher[0])
4181 server_result = stats['server_alpn_protocols'][-1] \
4297 "AES256", "AES-256",
4438 # cannot re-use session with a different SSLContext
4494 cert_text = s.recv(4096).decode('us-ascii')
4690 self.assertIn("CN=our-ca-server", repr(ca))
4695 self.assertIn("-----BEGIN CERTIFICATE-----", pem)