Go to:
Gentoo Home
Documentation
Forums
Lists
Bugs
Planet
Store
Wiki
Get Gentoo!
Gentoo's Bugzilla – Attachment 644042 Details for
Bug 720804
dev-python/ndg-httpsclient-0.5.1: fails tests with libfaketime sandbox interaction (segfault)
Home
|
New
–
[Ex]
|
Browse
|
Search
|
Privacy Policy
|
[?]
|
Reports
|
Requests
|
Help
|
New Account
|
Log In
[x]
|
Forgot Password
Login:
[x]
build.log
file_720804.txt (text/plain), 42.66 KB, created by
Sam James
on 2020-06-09 03:16:00 UTC
(
hide
)
Description:
build.log
Filename:
MIME Type:
Creator:
Sam James
Created:
2020-06-09 03:16:00 UTC
Size:
42.66 KB
patch
obsolete
>[32;01m * [39;49;00mPackage: dev-python/ndg-httpsclient-0.5.1 >[32;01m * [39;49;00mRepository: gentoo >[32;01m * [39;49;00mMaintainer: python@gentoo.org >[32;01m * [39;49;00mUSE: arm64 elibc_glibc kernel_linux python_targets_python3_7 test userland_GNU >[32;01m * [39;49;00mFEATURES: network-sandbox preserve-libs sandbox test userpriv usersandbox >>>> Unpacking source... >>>> Unpacking ndg_httpsclient-0.5.1.tar.gz to /var/tmp/portage/dev-python/ndg-httpsclient-0.5.1/work >>>> Source unpacked in /var/tmp/portage/dev-python/ndg-httpsclient-0.5.1/work >>>> Preparing source in /var/tmp/portage/dev-python/ndg-httpsclient-0.5.1/work/ndg_httpsclient-0.5.1 ... >>>> Source prepared. >>>> Configuring source in /var/tmp/portage/dev-python/ndg-httpsclient-0.5.1/work/ndg_httpsclient-0.5.1 ... >>>> Source configured. >>>> Compiling source in /var/tmp/portage/dev-python/ndg-httpsclient-0.5.1/work/ndg_httpsclient-0.5.1 ... > [32;01m*[0m python3_7: running distutils-r1_run_phase distutils-r1_python_compile >python3.7 setup.py build -j 40 >running build >running build_py >creating /var/tmp/portage/dev-python/ndg-httpsclient-0.5.1/work/ndg_httpsclient-0.5.1-python3_7/lib/ndg >copying ndg/__init__.py -> /var/tmp/portage/dev-python/ndg-httpsclient-0.5.1/work/ndg_httpsclient-0.5.1-python3_7/lib/ndg >creating /var/tmp/portage/dev-python/ndg-httpsclient-0.5.1/work/ndg_httpsclient-0.5.1-python3_7/lib/ndg/httpsclient >copying ndg/httpsclient/ssl_socket.py -> /var/tmp/portage/dev-python/ndg-httpsclient-0.5.1/work/ndg_httpsclient-0.5.1-python3_7/lib/ndg/httpsclient >copying ndg/httpsclient/utils.py -> /var/tmp/portage/dev-python/ndg-httpsclient-0.5.1/work/ndg_httpsclient-0.5.1-python3_7/lib/ndg/httpsclient >copying ndg/httpsclient/__init__.py -> /var/tmp/portage/dev-python/ndg-httpsclient-0.5.1/work/ndg_httpsclient-0.5.1-python3_7/lib/ndg/httpsclient >copying ndg/httpsclient/subj_alt_name.py -> /var/tmp/portage/dev-python/ndg-httpsclient-0.5.1/work/ndg_httpsclient-0.5.1-python3_7/lib/ndg/httpsclient >copying ndg/httpsclient/https.py -> /var/tmp/portage/dev-python/ndg-httpsclient-0.5.1/work/ndg_httpsclient-0.5.1-python3_7/lib/ndg/httpsclient >copying ndg/httpsclient/ssl_context_util.py -> /var/tmp/portage/dev-python/ndg-httpsclient-0.5.1/work/ndg_httpsclient-0.5.1-python3_7/lib/ndg/httpsclient >copying ndg/httpsclient/urllib2_build_opener.py -> /var/tmp/portage/dev-python/ndg-httpsclient-0.5.1/work/ndg_httpsclient-0.5.1-python3_7/lib/ndg/httpsclient >copying ndg/httpsclient/ssl_peer_verification.py -> /var/tmp/portage/dev-python/ndg-httpsclient-0.5.1/work/ndg_httpsclient-0.5.1-python3_7/lib/ndg/httpsclient >creating /var/tmp/portage/dev-python/ndg-httpsclient-0.5.1/work/ndg_httpsclient-0.5.1-python3_7/lib/ndg/httpsclient/test >copying ndg/httpsclient/test/test_https.py -> /var/tmp/portage/dev-python/ndg-httpsclient-0.5.1/work/ndg_httpsclient-0.5.1-python3_7/lib/ndg/httpsclient/test >copying ndg/httpsclient/test/__init__.py -> /var/tmp/portage/dev-python/ndg-httpsclient-0.5.1/work/ndg_httpsclient-0.5.1-python3_7/lib/ndg/httpsclient/test >copying ndg/httpsclient/test/test_urllib2.py -> /var/tmp/portage/dev-python/ndg-httpsclient-0.5.1/work/ndg_httpsclient-0.5.1-python3_7/lib/ndg/httpsclient/test >copying ndg/httpsclient/test/test_utils.py -> /var/tmp/portage/dev-python/ndg-httpsclient-0.5.1/work/ndg_httpsclient-0.5.1-python3_7/lib/ndg/httpsclient/test >copying ndg/httpsclient/LICENSE -> /var/tmp/portage/dev-python/ndg-httpsclient-0.5.1/work/ndg_httpsclient-0.5.1-python3_7/lib/ndg/httpsclient >copying ndg/httpsclient/test/README -> /var/tmp/portage/dev-python/ndg-httpsclient-0.5.1/work/ndg_httpsclient-0.5.1-python3_7/lib/ndg/httpsclient/test >creating /var/tmp/portage/dev-python/ndg-httpsclient-0.5.1/work/ndg_httpsclient-0.5.1-python3_7/lib/ndg/httpsclient/test/scripts >copying ndg/httpsclient/test/scripts/openssl_https_server.sh -> /var/tmp/portage/dev-python/ndg-httpsclient-0.5.1/work/ndg_httpsclient-0.5.1-python3_7/lib/ndg/httpsclient/test/scripts >creating /var/tmp/portage/dev-python/ndg-httpsclient-0.5.1/work/ndg_httpsclient-0.5.1-python3_7/lib/ndg/httpsclient/test/pki >copying ndg/httpsclient/test/pki/localhost.key -> /var/tmp/portage/dev-python/ndg-httpsclient-0.5.1/work/ndg_httpsclient-0.5.1-python3_7/lib/ndg/httpsclient/test/pki >copying ndg/httpsclient/test/pki/localhost.crt -> /var/tmp/portage/dev-python/ndg-httpsclient-0.5.1/work/ndg_httpsclient-0.5.1-python3_7/lib/ndg/httpsclient/test/pki >creating /var/tmp/portage/dev-python/ndg-httpsclient-0.5.1/work/ndg_httpsclient-0.5.1-python3_7/lib/ndg/httpsclient/test/pki/ca >copying ndg/httpsclient/test/pki/ca/7e15277f.0 -> /var/tmp/portage/dev-python/ndg-httpsclient-0.5.1/work/ndg_httpsclient-0.5.1-python3_7/lib/ndg/httpsclient/test/pki/ca >warning: build_py: byte-compiling is disabled, skipping. > >>>> Source compiled. >>>> Test phase: dev-python/ndg-httpsclient-0.5.1 >Using default temp DH parameters >ACCEPT >/usr/lib/portage/python3.7/ebuild.sh: line 208: 27 Segmentation fault chmod g+w "${T}/eclass-debug.log" > [32;01m*[0m python3_7: running distutils-r1_run_phase python_test >test01_open (ndg.httpsclient.test.test_https.TestHTTPSConnection) ... DEBUG:ndg.httpsclient.ssl_socket:Socket.makefile 1 recv calls completed in 0:00:00.000230 >/usr/lib/python3.7/unittest/case.py:628: ResourceWarning: unclosed <socket.socket fd=5, family=AddressFamily.AF_INET6, type=SocketKind.SOCK_STREAM, proto=6, laddr=('::1', 38102, 0, 0), raddr=('::1', 4443, 0, 0)> > testMethod() >ResourceWarning: Enable tracemalloc to get the object allocation traceback >ok >test02_open_fails (ndg.httpsclient.test.test_https.TestHTTPSConnection) ... ok >test03_ssl_verification_of_peer_fails (ndg.httpsclient.test.test_https.TestHTTPSConnection) ... DEBUG:ndg.httpsclient.test.test_https:SSL peer certificate verification failed for <X509Name object '/O=NDG/OU=Security/CN=localhost'> >281473299469360:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1543:SSL alert number 48 >/usr/lib/python3.7/unittest/case.py:628: ResourceWarning: unclosed <socket.socket fd=5, family=AddressFamily.AF_INET6, type=SocketKind.SOCK_STREAM, proto=6, laddr=('::1', 38108, 0, 0), raddr=('::1', 4443, 0, 0)> > testMethod() >ResourceWarning: Enable tracemalloc to get the object allocation traceback >ok >test03_ssl_verification_of_peer_succeeds (ndg.httpsclient.test.test_https.TestHTTPSConnection) ... DEBUG:ndg.httpsclient.ssl_socket:Socket.makefile 1 recv calls completed in 0:00:00.000173 >Response = b'<HTML><BODY BGCOLOR="#ffffff">\n<pre>\n\ns_server -www -cert pki/localhost.crt -key pki/localhost.key -accept 4443 \nSecure Renegotiation IS supported\nCiphers supported in s_server binary\nTLSv1.3 :TLS_AES_256_GCM_SHA384 TLSv1.3 :TLS_CHACHA20_POLY1305_SHA256 \nTLSv1.3 :TLS_AES_128_GCM_SHA256 TLSv1.2 :ECDHE-ECDSA-AES256-GCM-SHA384 \nTLSv1.2 :ECDHE-RSA-AES256-GCM-SHA384 TLSv1.2 :DHE-RSA-AES256-GCM-SHA384 \nTLSv1.2 :ECDHE-ECDSA-CHACHA20-POLY1305 TLSv1.2 :ECDHE-RSA-CHACHA20-POLY1305 \nTLSv1.2 :DHE-RSA-CHACHA20-POLY1305 TLSv1.2 :ECDHE-ECDSA-AES128-GCM-SHA256 \nTLSv1.2 :ECDHE-RSA-AES128-GCM-SHA256 TLSv1.2 :DHE-RSA-AES128-GCM-SHA256 \nTLSv1.2 :ECDHE-ECDSA-AES256-SHA384 TLSv1.2 :ECDHE-RSA-AES256-SHA384 \nTLSv1.2 :DHE-RSA-AES256-SHA256 TLSv1.2 :ECDHE-ECDSA-AES128-SHA256 \nTLSv1.2 :ECDHE-RSA-AES128-SHA256 TLSv1.2 :DHE-RSA-AES128-SHA256 \nTLSv1.0 :ECDHE-ECDSA-AES256-SHA TLSv1.0 :ECDHE-RSA-AES256-SHA \nSSLv3 :DHE-RSA-AES256-SHA TLSv1.0 :ECDHE-ECDSA-AES128-SHA \nTLSv1.0 :ECDHE-RSA-AES128-SHA SSLv3 :DHE-RSA-AES128-SHA \nTLSv1.2 :RSA-PSK-AES256-GCM-SHA384 TLSv1.2 :DHE-PSK-AES256-GCM-SHA384 \nTLSv1.2 :RSA-PSK-CHACHA20-POLY1305 TLSv1.2 :DHE-PSK-CHACHA20-POLY1305 \nTLSv1.2 :ECDHE-PSK-CHACHA20-POLY1305 TLSv1.2 :AES256-GCM-SHA384 \nTLSv1.2 :PSK-AES256-GCM-SHA384 TLSv1.2 :PSK-CHACHA20-POLY1305 \nTLSv1.2 :RSA-PSK-AES128-GCM-SHA256 TLSv1.2 :DHE-PSK-AES128-GCM-SHA256 \nTLSv1.2 :AES128-GCM-SHA256 TLSv1.2 :PSK-AES128-GCM-SHA256 \nTLSv1.2 :AES256-SHA256 TLSv1.2 :AES128-SHA256 \nTLSv1.0 :ECDHE-PSK-AES256-CBC-SHA384 TLSv1.0 :ECDHE-PSK-AES256-CBC-SHA \nSSLv3 :SRP-RSA-AES-256-CBC-SHA SSLv3 :SRP-AES-256-CBC-SHA \nTLSv1.0 :RSA-PSK-AES256-CBC-SHA384 TLSv1.0 :DHE-PSK-AES256-CBC-SHA384 \nSSLv3 :RSA-PSK-AES256-CBC-SHA SSLv3 :DHE-PSK-AES256-CBC-SHA \nSSLv3 :AES256-SHA TLSv1.0 :PSK-AES256-CBC-SHA384 \nSSLv3 :PSK-AES256-CBC-SHA TLSv1.0 :ECDHE-PSK-AES128-CBC-SHA256 \nTLSv1.0 :ECDHE-PSK-AES128-CBC-SHA SSLv3 :SRP-RSA-AES-128-CBC-SHA \nSSLv3 :SRP-AES-128-CBC-SHA TLSv1.0 :RSA-PSK-AES128-CBC-SHA256 \nTLSv1.0 :DHE-PSK-AES128-CBC-SHA256 SSLv3 :RSA-PSK-AES128-CBC-SHA \nSSLv3 :DHE-PSK-AES128-CBC-SHA SSLv3 :AES128-SHA \nTLSv1.0 :PSK-AES128-CBC-SHA256 SSLv3 :PSK-AES128-CBC-SHA \n---\nCiphers common between both SSL end points:\nECDHE-ECDSA-AES256-GCM-SHA384 ECDHE-RSA-AES256-GCM-SHA384 DHE-RSA-AES256-GCM-SHA384 \nECDHE-ECDSA-CHACHA20-POLY1305 ECDHE-RSA-CHACHA20-POLY1305 DHE-RSA-CHACHA20-POLY1305 \nECDHE-ECDSA-AES128-GCM-SHA256 ECDHE-RSA-AES128-GCM-SHA256 DHE-RSA-AES128-GCM-SHA256 \nECDHE-ECDSA-AES256-SHA384 ECDHE-RSA-AES256-SHA384 DHE-RSA-AES256-SHA256 \nECDHE-ECDSA-AES128-SHA256 ECDHE-RSA-AES128-SHA256 DHE-RSA-AES128-SHA256 \nECDHE-ECDSA-AES256-SHA ECDHE-RSA-AES256-SHA DHE-RSA-AES256-SHA \nECDHE-ECDSA-AES128-SHA ECDHE-RSA-AES128-SHA DHE-RSA-AES128-SHA \nAES256-GCM-SHA384 AES128-GCM-SHA256 AES256-SHA256 \nAES128-SHA256 AES256-SHA AES128-SHA\nSignature Algorithms: ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:Ed25519:Ed448:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA+SHA256:RSA+SHA384:RSA+SHA512:ECDSA+SHA224:ECDSA+SHA1:RSA+SHA224:RSA+SHA1:DSA+SHA224:DSA+SHA1:DSA+SHA256:DSA+SHA384:DSA+SHA512\nShared Signature Algorithms: ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:Ed25519:Ed448:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA+SHA256:RSA+SHA384:RSA+SHA512:ECDSA+SHA224:ECDSA+SHA1:RSA+SHA224:RSA+SHA1:DSA+SHA224:DSA+SHA1:DSA+SHA256:DSA+SHA384:DSA+SHA512\nSupported Elliptic Groups: X25519:P-256:X448:P-521:P-384\nShared Elliptic groups: X25519:P-256:X448:P-521:P-384\n---\nNew, TLSv1.2, Cipher is ECDHE-RSA-AES256-GCM-SHA384\nSSL-Session:\n Protocol : TLSv1.2\n Cipher : ECDHE-RSA-AES256-GCM-SHA384\n Session-ID: \n Session-ID-ctx: 01000000\n Master-Key: F22BCC6816AF20288D2C54A51C6A31102C8F1FB8262F390A2A05FF242DE35C47D006B842A7F7EB95AFD42A525796FC53\n PSK identity: None\n PSK identity hint: None\n SRP username: None\n Start Time: 1575201602\n Timeout : 7200 (sec)\n Verify return code: 0 (ok)\n Extended master secret: yes\n---\n 0 items in the session cache\n 0 client connects (SSL_connect())\n 0 client renegotiates (SSL_connect())\n 0 client connects that finished\n 1 server accepts (SSL_accept())\n 0 server renegotiates (SSL_accept())\n 1 server accepts that finished\n 0 session cache hits\n 0 session cache misses\n 0 session cache timeouts\n 0 callback cache hits\n 0 cache full overflows (128 allowed)\n---\nno client certificate available\n</pre></BODY></HTML>\r\n\r\n' >Response = b'<HTML><BODY BGCOLOR="#ffffff">\n<pre>\n\ns_server -www -cert pki/localhost.crt -key pki/localhost.key -accept 4443 \nSecure Renegotiation IS supported\nCiphers supported in s_server binary\nTLSv1.3 :TLS_AES_256_GCM_SHA384 TLSv1.3 :TLS_CHACHA20_POLY1305_SHA256 \nTLSv1.3 :TLS_AES_128_GCM_SHA256 TLSv1.2 :ECDHE-ECDSA-AES256-GCM-SHA384 \nTLSv1.2 :ECDHE-RSA-AES256-GCM-SHA384 TLSv1.2 :DHE-RSA-AES256-GCM-SHA384 \nTLSv1.2 :ECDHE-ECDSA-CHACHA20-POLY1305 TLSv1.2 :ECDHE-RSA-CHACHA20-POLY1305 \nTLSv1.2 :DHE-RSA-CHACHA20-POLY1305 TLSv1.2 :ECDHE-ECDSA-AES128-GCM-SHA256 \nTLSv1.2 :ECDHE-RSA-AES128-GCM-SHA256 TLSv1.2 :DHE-RSA-AES128-GCM-SHA256 \nTLSv1.2 :ECDHE-ECDSA-AES256-SHA384 TLSv1.2 :ECDHE-RSA-AES256-SHA384 \nTLSv1.2 :DHE-RSA-AES256-SHA256 TLSv1.2 :ECDHE-ECDSA-AES128-SHA256 \nTLSv1.2 :ECDHE-RSA-AES128-SHA256 TLSv1.2 :DHE-RSA-AES128-SHA256 \nTLSv1.0 :ECDHE-ECDSA-AES256-SHA TLSv1.0 :ECDHE-RSA-AES256-SHA \nSSLv3 :DHE-RSA-AES256-SHA TLSv1.0 :ECDHE-ECDSA-AES128-SHA \nTLSv1.0 :ECDHE-RSA-AES128-SHA SSLv3 :DHE-RSA-AES128-SHA \nTLSv1.2 :RSA-PSK-AES256-GCM-SHA384 TLSv1.2 :DHE-PSK-AES256-GCM-SHA384 \nTLSv1.2 :RSA-PSK-CHACHA20-POLY1305 TLSv1.2 :DHE-PSK-CHACHA20-POLY1305 \nTLSv1.2 :ECDHE-PSK-CHACHA20-POLY1305 TLSv1.2 :AES256-GCM-SHA384 \nTLSv1.2 :PSK-AES256-GCM-SHA384 TLSv1.2 :PSK-CHACHA20-POLY1305 \nTLSv1.2 :RSA-PSK-AES128-GCM-SHA256 TLSv1.2 :DHE-PSK-AES128-GCM-SHA256 \nTLSv1.2 :AES128-GCM-SHA256 TLSv1.2 :PSK-AES128-GCM-SHA256 \nTLSv1.2 :AES256-SHA256 TLSv1.2 :AES128-SHA256 \nTLSv1.0 :ECDHE-PSK-AES256-CBC-SHA384 TLSv1.0 :ECDHE-PSK-AES256-CBC-SHA \nSSLv3 :SRP-RSA-AES-256-CBC-SHA SSLv3 :SRP-AES-256-CBC-SHA \nTLSv1.0 :RSA-PSK-AES256-CBC-SHA384 TLSv1.0 :DHE-PSK-AES256-CBC-SHA384 \nSSLv3 :RSA-PSK-AES256-CBC-SHA SSLv3 :DHE-PSK-AES256-CBC-SHA \nSSLv3 :AES256-SHA TLSv1.0 :PSK-AES256-CBC-SHA384 \nSSLv3 :PSK-AES256-CBC-SHA TLSv1.0 :ECDHE-PSK-AES128-CBC-SHA256 \nTLSv1.0 :ECDHE-PSK-AES128-CBC-SHA SSLv3 :SRP-RSA-AES-128-CBC-SHA \nSSLv3 :SRP-AES-128-CBC-SHA TLSv1.0 :RSA-PSK-AES128-CBC-SHA256 \nTLSv1.0 :DHE-PSK-AES128-CBC-SHA256 SSLv3 :RSA-PSK-AES128-CBC-SHA \nSSLv3 :DHE-PSK-AES128-CBC-SHA SSLv3 :AES128-SHA \nTLSv1.0 :PSK-AES128-CBC-SHA256 SSLv3 :PSK-AES128-CBC-SHA \n---\nCiphers common between both SSL end points:\nECDHE-ECDSA-AES256-GCM-SHA384 ECDHE-RSA-AES256-GCM-SHA384 DHE-RSA-AES256-GCM-SHA384 \nECDHE-ECDSA-CHACHA20-POLY1305 ECDHE-RSA-CHACHA20-POLY1305 DHE-RSA-CHACHA20-POLY1305 \nECDHE-ECDSA-AES128-GCM-SHA256 ECDHE-RSA-AES128-GCM-SHA256 DHE-RSA-AES128-GCM-SHA256 \nECDHE-ECDSA-AES256-SHA384 ECDHE-RSA-AES256-SHA384 DHE-RSA-AES256-SHA256 \nECDHE-ECDSA-AES128-SHA256 ECDHE-RSA-AES128-SHA256 DHE-RSA-AES128-SHA256 \nECDHE-ECDSA-AES256-SHA ECDHE-RSA-AES256-SHA DHE-RSA-AES256-SHA \nECDHE-ECDSA-AES128-SHA ECDHE-RSA-AES128-SHA DHE-RSA-AES128-SHA \nAES256-GCM-SHA384 AES128-GCM-SHA256 AES256-SHA256 \nAES128-SHA256 AES256-SHA AES128-SHA\nSignature Algorithms: ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:Ed25519:Ed448:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA+SHA256:RSA+SHA384:RSA+SHA512:ECDSA+SHA224:ECDSA+SHA1:RSA+SHA224:RSA+SHA1:DSA+SHA224:DSA+SHA1:DSA+SHA256:DSA+SHA384:DSA+SHA512\nShared Signature Algorithms: ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:Ed25519:Ed448:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA+SHA256:RSA+SHA384:RSA+SHA512:ECDSA+SHA224:ECDSA+SHA1:RSA+SHA224:RSA+SHA1:DSA+SHA224:DSA+SHA1:DSA+SHA256:DSA+SHA384:DSA+SHA512\nSupported Elliptic Groups: X25519:P-256:X448:P-521:P-384\nShared Elliptic groups: X25519:P-256:X448:P-521:P-384\n---\nNew, TLSv1.2, Cipher is ECDHE-RSA-AES256-GCM-SHA384\nSSL-Session:\n Protocol : TLSv1.2\n Cipher : ECDHE-RSA-AES256-GCM-SHA384\n Session-ID: \n Session-ID-ctx: 01000000\n Master-Key: 9B675201FDB4F5692CF30FABF6831CE44074D76DE328D356A2A09B1E54DA9858D444E4F55E065116A3D76F651AAFDEDB\n PSK identity: None\n PSK identity hint: None\n SRP username: None\n Start Time: 1575201602\n Timeout : 7200 (sec)\n Verify return code: 0 (ok)\n Extended master secret: yes\n---\n 0 items in the session cache\n 0 client connects (SSL_connect())\n 0 client renegotiates (SSL_connect())\n 0 client connects that finished\n 3 server accepts (SSL_accept())\n 0 server renegotiates (SSL_accept())\n 2 server accepts that finished\n 0 session cache hits\n 0 session cache misses\n 0 session cache timeouts\n 0 callback cache hits\n 0 cache full overflows (128 allowed)\n---\nno client certificate available\n</pre></BODY></HTML>\r\n\r\n'/usr/lib/python3.7/unittest/case.py:628: ResourceWarning: unclosed <socket.socket fd=5, family=AddressFamily.AF_INET6, type=SocketKind.SOCK_STREAM, proto=6, laddr=('::1', 38110, 0, 0), raddr=('::1', 4443, 0, 0)> > testMethod() >ResourceWarning: Enable tracemalloc to get the object allocation traceback >ok >test04_ssl_verification_with_subj_alt_name (ndg.httpsclient.test.test_https.TestHTTPSConnection) ... DEBUG:ndg.httpsclient.ssl_socket:Socket.makefile 1 recv calls completed in 0:00:00.000174 >/usr/lib/python3.7/unittest/case.py:628: ResourceWarning: unclosed <socket.socket fd=5, family=AddressFamily.AF_INET6, type=SocketKind.SOCK_STREAM, proto=6, laddr=('::1', 38112, 0, 0), raddr=('::1', 4443, 0, 0)> > testMethod() >ResourceWarning: Enable tracemalloc to get the object allocation traceback >ok >test04_ssl_verification_with_subj_common_name (ndg.httpsclient.test.test_https.TestHTTPSConnection) ... DEBUG:ndg.httpsclient.ssl_peer_verification:Disabling peer verification with subject subjectAltNames! >DEBUG:ndg.httpsclient.ssl_socket:Socket.makefile 1 recv calls completed in 0:00:00.000176 > >Response = b'<HTML><BODY BGCOLOR="#ffffff">\n<pre>\n\ns_server -www -cert pki/localhost.crt -key pki/localhost.key -accept 4443 \nSecure Renegotiation IS supported\nCiphers supported in s_server binary\nTLSv1.3 :TLS_AES_256_GCM_SHA384 TLSv1.3 :TLS_CHACHA20_POLY1305_SHA256 \nTLSv1.3 :TLS_AES_128_GCM_SHA256 TLSv1.2 :ECDHE-ECDSA-AES256-GCM-SHA384 \nTLSv1.2 :ECDHE-RSA-AES256-GCM-SHA384 TLSv1.2 :DHE-RSA-AES256-GCM-SHA384 \nTLSv1.2 :ECDHE-ECDSA-CHACHA20-POLY1305 TLSv1.2 :ECDHE-RSA-CHACHA20-POLY1305 \nTLSv1.2 :DHE-RSA-CHACHA20-POLY1305 TLSv1.2 :ECDHE-ECDSA-AES128-GCM-SHA256 \nTLSv1.2 :ECDHE-RSA-AES128-GCM-SHA256 TLSv1.2 :DHE-RSA-AES128-GCM-SHA256 \nTLSv1.2 :ECDHE-ECDSA-AES256-SHA384 TLSv1.2 :ECDHE-RSA-AES256-SHA384 \nTLSv1.2 :DHE-RSA-AES256-SHA256 TLSv1.2 :ECDHE-ECDSA-AES128-SHA256 \nTLSv1.2 :ECDHE-RSA-AES128-SHA256 TLSv1.2 :DHE-RSA-AES128-SHA256 \nTLSv1.0 :ECDHE-ECDSA-AES256-SHA TLSv1.0 :ECDHE-RSA-AES256-SHA \nSSLv3 :DHE-RSA-AES256-SHA TLSv1.0 :ECDHE-ECDSA-AES128-SHA \nTLSv1.0 :ECDHE-RSA-AES128-SHA SSLv3 :DHE-RSA-AES128-SHA \nTLSv1.2 :RSA-PSK-AES256-GCM-SHA384 TLSv1.2 :DHE-PSK-AES256-GCM-SHA384 \nTLSv1.2 :RSA-PSK-CHACHA20-POLY1305 TLSv1.2 :DHE-PSK-CHACHA20-POLY1305 \nTLSv1.2 :ECDHE-PSK-CHACHA20-POLY1305 TLSv1.2 :AES256-GCM-SHA384 \nTLSv1.2 :PSK-AES256-GCM-SHA384 TLSv1.2 :PSK-CHACHA20-POLY1305 \nTLSv1.2 :RSA-PSK-AES128-GCM-SHA256 TLSv1.2 :DHE-PSK-AES128-GCM-SHA256 \nTLSv1.2 :AES128-GCM-SHA256 TLSv1.2 :PSK-AES128-GCM-SHA256 \nTLSv1.2 :AES256-SHA256 TLSv1.2 :AES128-SHA256 \nTLSv1.0 :ECDHE-PSK-AES256-CBC-SHA384 TLSv1.0 :ECDHE-PSK-AES256-CBC-SHA \nSSLv3 :SRP-RSA-AES-256-CBC-SHA SSLv3 :SRP-AES-256-CBC-SHA \nTLSv1.0 :RSA-PSK-AES256-CBC-SHA384 TLSv1.0 :DHE-PSK-AES256-CBC-SHA384 \nSSLv3 :RSA-PSK-AES256-CBC-SHA SSLv3 :DHE-PSK-AES256-CBC-SHA \nSSLv3 :AES256-SHA TLSv1.0 :PSK-AES256-CBC-SHA384 \nSSLv3 :PSK-AES256-CBC-SHA TLSv1.0 :ECDHE-PSK-AES128-CBC-SHA256 \nTLSv1.0 :ECDHE-PSK-AES128-CBC-SHA SSLv3 :SRP-RSA-AES-128-CBC-SHA \nSSLv3 :SRP-AES-128-CBC-SHA TLSv1.0 :RSA-PSK-AES128-CBC-SHA256 \nTLSv1.0 :DHE-PSK-AES128-CBC-SHA256 SSLv3 :RSA-PSK-AES128-CBC-SHA \nSSLv3 :DHE-PSK-AES128-CBC-SHA SSLv3 :AES128-SHA \nTLSv1.0 :PSK-AES128-CBC-SHA256 SSLv3 :PSK-AES128-CBC-SHA \n---\nCiphers common between both SSL end points:\nECDHE-ECDSA-AES256-GCM-SHA384 ECDHE-RSA-AES256-GCM-SHA384 DHE-RSA-AES256-GCM-SHA384 \nECDHE-ECDSA-CHACHA20-POLY1305 ECDHE-RSA-CHACHA20-POLY1305 DHE-RSA-CHACHA20-POLY1305 \nECDHE-ECDSA-AES128-GCM-SHA256 ECDHE-RSA-AES128-GCM-SHA256 DHE-RSA-AES128-GCM-SHA256 \nECDHE-ECDSA-AES256-SHA384 ECDHE-RSA-AES256-SHA384 DHE-RSA-AES256-SHA256 \nECDHE-ECDSA-AES128-SHA256 ECDHE-RSA-AES128-SHA256 DHE-RSA-AES128-SHA256 \nECDHE-ECDSA-AES256-SHA ECDHE-RSA-AES256-SHA DHE-RSA-AES256-SHA \nECDHE-ECDSA-AES128-SHA ECDHE-RSA-AES128-SHA DHE-RSA-AES128-SHA \nAES256-GCM-SHA384 AES128-GCM-SHA256 AES256-SHA256 \nAES128-SHA256 AES256-SHA AES128-SHA\nSignature Algorithms: ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:Ed25519:Ed448:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA+SHA256:RSA+SHA384:RSA+SHA512:ECDSA+SHA224:ECDSA+SHA1:RSA+SHA224:RSA+SHA1:DSA+SHA224:DSA+SHA1:DSA+SHA256:DSA+SHA384:DSA+SHA512\nShared Signature Algorithms: ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:Ed25519:Ed448:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA+SHA256:RSA+SHA384:RSA+SHA512:ECDSA+SHA224:ECDSA+SHA1:RSA+SHA224:RSA+SHA1:DSA+SHA224:DSA+SHA1:DSA+SHA256:DSA+SHA384:DSA+SHA512\nSupported Elliptic Groups: X25519:P-256:X448:P-521:P-384\nShared Elliptic groups: X25519:P-256:X448:P-521:P-384\n---\nNew, TLSv1.2, Cipher is ECDHE-RSA-AES256-GCM-SHA384\nSSL-Session:\n Protocol : TLSv1.2\n Cipher : ECDHE-RSA-AES256-GCM-SHA384\n Session-ID: \n Session-ID-ctx: 01000000\n Master-Key: 19A8581CC7AB6DD8653400BB4EE3C9AF4F9D4E10CBA536D78DF38685CA8611C6180877BD4D4A4E9A4ACA07D4411580BC\n PSK identity: None\n PSK identity hint: None\n SRP username: None\n Start Time: 1575201602\n Timeout : 7200 (sec)\n Verify return code: 0 (ok)\n Extended master secret: yes\n---\n 0 items in the session cache\n 0 client connects (SSL_connect())\n 0 client renegotiates (SSL_connect())\n 0 client connects that finished\n 4 server accepts (SSL_accept())\n 0 server renegotiates (SSL_accept())\n 3 server accepts that finished\n 0 session cache hits\n 0 session cache misses\n 0 session cache timeouts\n 0 callback cache hits\n 0 cache full overflows (128 allowed)\n---\nno client certificate available\n</pre></BODY></HTML>\r\n\r\n' >Response = b'<HTML><BODY BGCOLOR="#ffffff">\n<pre>\n\ns_server -www -cert pki/localhost.crt -key pki/localhost.key -accept 4443 \nSecure Renegotiation IS supported\nCiphers supported in s_server binary\nTLSv1.3 :TLS_AES_256_GCM_SHA384 TLSv1.3 :TLS_CHACHA20_POLY1305_SHA256 \nTLSv1.3 :TLS_AES_128_GCM_SHA256 TLSv1.2 :ECDHE-ECDSA-AES256-GCM-SHA384 \nTLSv1.2 :ECDHE-RSA-AES256-GCM-SHA384 TLSv1.2 :DHE-RSA-AES256-GCM-SHA384 \nTLSv1.2 :ECDHE-ECDSA-CHACHA20-POLY1305 TLSv1.2 :ECDHE-RSA-CHACHA20-POLY1305 \nTLSv1.2 :DHE-RSA-CHACHA20-POLY1305 TLSv1.2 :ECDHE-ECDSA-AES128-GCM-SHA256 \nTLSv1.2 :ECDHE-RSA-AES128-GCM-SHA256 TLSv1.2 :DHE-RSA-AES128-GCM-SHA256 \nTLSv1.2 :ECDHE-ECDSA-AES256-SHA384 TLSv1.2 :ECDHE-RSA-AES256-SHA384 \nTLSv1.2 :DHE-RSA-AES256-SHA256 TLSv1.2 :ECDHE-ECDSA-AES128-SHA256 \nTLSv1.2 :ECDHE-RSA-AES128-SHA256 TLSv1.2 :DHE-RSA-AES128-SHA256 \nTLSv1.0 :ECDHE-ECDSA-AES256-SHA TLSv1.0 :ECDHE-RSA-AES256-SHA \nSSLv3 :DHE-RSA-AES256-SHA TLSv1.0 :ECDHE-ECDSA-AES128-SHA \nTLSv1.0 :ECDHE-RSA-AES128-SHA SSLv3 :DHE-RSA-AES128-SHA \nTLSv1.2 :RSA-PSK-AES256-GCM-SHA384 TLSv1.2 :DHE-PSK-AES256-GCM-SHA384 \nTLSv1.2 :RSA-PSK-CHACHA20-POLY1305 TLSv1.2 :DHE-PSK-CHACHA20-POLY1305 \nTLSv1.2 :ECDHE-PSK-CHACHA20-POLY1305 TLSv1.2 :AES256-GCM-SHA384 \nTLSv1.2 :PSK-AES256-GCM-SHA384 TLSv1.2 :PSK-CHACHA20-POLY1305 \nTLSv1.2 :RSA-PSK-AES128-GCM-SHA256 TLSv1.2 :DHE-PSK-AES128-GCM-SHA256 \nTLSv1.2 :AES128-GCM-SHA256 TLSv1.2 :PSK-AES128-GCM-SHA256 \nTLSv1.2 :AES256-SHA256 TLSv1.2 :AES128-SHA256 \nTLSv1.0 :ECDHE-PSK-AES256-CBC-SHA384 TLSv1.0 :ECDHE-PSK-AES256-CBC-SHA \nSSLv3 :SRP-RSA-AES-256-CBC-SHA SSLv3 :SRP-AES-256-CBC-SHA \nTLSv1.0 :RSA-PSK-AES256-CBC-SHA384 TLSv1.0 :DHE-PSK-AES256-CBC-SHA384 \nSSLv3 :RSA-PSK-AES256-CBC-SHA SSLv3 :DHE-PSK-AES256-CBC-SHA \nSSLv3 :AES256-SHA TLSv1.0 :PSK-AES256-CBC-SHA384 \nSSLv3 :PSK-AES256-CBC-SHA TLSv1.0 :ECDHE-PSK-AES128-CBC-SHA256 \nTLSv1.0 :ECDHE-PSK-AES128-CBC-SHA SSLv3 :SRP-RSA-AES-128-CBC-SHA \nSSLv3 :SRP-AES-128-CBC-SHA TLSv1.0 :RSA-PSK-AES128-CBC-SHA256 \nTLSv1.0 :DHE-PSK-AES128-CBC-SHA256 SSLv3 :RSA-PSK-AES128-CBC-SHA \nSSLv3 :DHE-PSK-AES128-CBC-SHA SSLv3 :AES128-SHA \nTLSv1.0 :PSK-AES128-CBC-SHA256 SSLv3 :PSK-AES128-CBC-SHA \n---\nCiphers common between both SSL end points:\nECDHE-ECDSA-AES256-GCM-SHA384 ECDHE-RSA-AES256-GCM-SHA384 DHE-RSA-AES256-GCM-SHA384 \nECDHE-ECDSA-CHACHA20-POLY1305 ECDHE-RSA-CHACHA20-POLY1305 DHE-RSA-CHACHA20-POLY1305 \nECDHE-ECDSA-AES128-GCM-SHA256 ECDHE-RSA-AES128-GCM-SHA256 DHE-RSA-AES128-GCM-SHA256 \nECDHE-ECDSA-AES256-SHA384 ECDHE-RSA-AES256-SHA384 DHE-RSA-AES256-SHA256 \nECDHE-ECDSA-AES128-SHA256 ECDHE-RSA-AES128-SHA256 DHE-RSA-AES128-SHA256 \nECDHE-ECDSA-AES256-SHA ECDHE-RSA-AES256-SHA DHE-RSA-AES256-SHA \nECDHE-ECDSA-AES128-SHA ECDHE-RSA-AES128-SHA DHE-RSA-AES128-SHA \nAES256-GCM-SHA384 AES128-GCM-SHA256 AES256-SHA256 \nAES128-SHA256 AES256-SHA AES128-SHA\nSignature Algorithms: ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:Ed25519:Ed448:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA+SHA256:RSA+SHA384:RSA+SHA512:ECDSA+SHA224:ECDSA+SHA1:RSA+SHA224:RSA+SHA1:DSA+SHA224:DSA+SHA1:DSA+SHA256:DSA+SHA384:DSA+SHA512\nShared Signature Algorithms: ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:Ed25519:Ed448:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA+SHA256:RSA+SHA384:RSA+SHA512:ECDSA+SHA224:ECDSA+SHA1:RSA+SHA224:RSA+SHA1:DSA+SHA224:DSA+SHA1:DSA+SHA256:DSA+SHA384:DSA+SHA512\nSupported Elliptic Groups: X25519:P-256:X448:P-521:P-384\nShared Elliptic groups: X25519:P-256:X448:P-521:P-384\n---\nNew, TLSv1.2, Cipher is ECDHE-RSA-AES256-GCM-SHA384\nSSL-Session:\n Protocol : TLSv1.2\n Cipher : ECDHE-RSA-AES256-GCM-SHA384\n Session-ID: \n Session-ID-ctx: 01000000\n Master-Key: 90128A257C353AAC2B3167E5813A486CBA8618E58DFEFE6338C1E2F88044A606E405FBA7842908A59B02B8B7C1EAF04D\n PSK identity: None\n PSK identity hint: None\n SRP username: None\n Start Time: 1575201602\n Timeout : 7200 (sec)\n Verify return code: 0 (ok)\n Extended master secret: yes\n---\n 0 items in the session cache\n 0 client connects (SSL_connect())\n 0 client renegotiates (SSL_connect())\n 0 client connects that finished\n 5 server accepts (SSL_accept())\n 0 server renegotiates (SSL_accept())\n 4 server accepts that finished\n 0 session cache hits\n 0 session cache misses\n 0 session cache timeouts\n 0 callback cache hits\n 0 cache full overflows (128 allowed)\n---\nno client certificate available\n</pre></BODY></HTML>\r\n\r\n'/usr/lib/python3.7/unittest/case.py:628: ResourceWarning: unclosed <socket.socket fd=5, family=AddressFamily.AF_INET6, type=SocketKind.SOCK_STREAM, proto=6, laddr=('::1', 38114, 0, 0), raddr=('::1', 4443, 0, 0)> > testMethod() >ResourceWarning: Enable tracemalloc to get the object allocation traceback >ok >test01_urllib2_build_opener (ndg.httpsclient.test.test_urllib2.Urllib2TestCase) ... ok >test02_open (ndg.httpsclient.test.test_urllib2.Urllib2TestCase) ... DEBUG:ndg.httpsclient.ssl_socket:Socket.makefile 1 recv calls completed in 0:00:00.000498 >/usr/lib/python3.7/urllib/request.py:1363: ResourceWarning: unclosed <socket.socket fd=5, family=AddressFamily.AF_INET6, type=SocketKind.SOCK_STREAM, proto=6, laddr=('::1', 38116, 0, 0), raddr=('::1', 4443, 0, 0)> > h.sock = None >ResourceWarning: Enable tracemalloc to get the object allocation traceback >ok >test03_open_fails_unknown_loc (ndg.httpsclient.test.test_urllib2.Urllib2TestCase) ... ok >test04_open_peer_cert_verification_fails (ndg.httpsclient.test.test_urllib2.Urllib2TestCase) ... 281473299469360:error:14094418:SSL routines:ssl3_read_bytes:tlsv1 alert unknown ca:ssl/record/rec_layer_s3.c:1543:SSL alert number 48 >/usr/lib/python3.7/traceback.py:220: ResourceWarning: unclosed <socket.socket fd=5, family=AddressFamily.AF_INET6, type=SocketKind.SOCK_STREAM, proto=6, laddr=('::1', 38122, 0, 0), raddr=('::1', 4443, 0, 0)> > tb.tb_frame.clear() >ResourceWarning: Enable tracemalloc to get the object allocation traceback >ok >test05_open_with_subj_alt_names_verification (ndg.httpsclient.test.test_urllib2.Urllib2TestCase) ... DEBUG:ndg.httpsclient.ssl_socket:Socket.makefile 1 recv calls completed in 0:00:00.000492 > >res = b'<HTML><BODY BGCOLOR="#ffffff">\n<pre>\n\ns_server -www -cert pki/localhost.crt -key pki/localhost.key -accept 4443 \nSecure Renegotiation IS supported\nCiphers supported in s_server binary\nTLSv1.3 :TLS_AES_256_GCM_SHA384 TLSv1.3 :TLS_CHACHA20_POLY1305_SHA256 \nTLSv1.3 :TLS_AES_128_GCM_SHA256 TLSv1.2 :ECDHE-ECDSA-AES256-GCM-SHA384 \nTLSv1.2 :ECDHE-RSA-AES256-GCM-SHA384 TLSv1.2 :DHE-RSA-AES256-GCM-SHA384 \nTLSv1.2 :ECDHE-ECDSA-CHACHA20-POLY1305 TLSv1.2 :ECDHE-RSA-CHACHA20-POLY1305 \nTLSv1.2 :DHE-RSA-CHACHA20-POLY1305 TLSv1.2 :ECDHE-ECDSA-AES128-GCM-SHA256 \nTLSv1.2 :ECDHE-RSA-AES128-GCM-SHA256 TLSv1.2 :DHE-RSA-AES128-GCM-SHA256 \nTLSv1.2 :ECDHE-ECDSA-AES256-SHA384 TLSv1.2 :ECDHE-RSA-AES256-SHA384 \nTLSv1.2 :DHE-RSA-AES256-SHA256 TLSv1.2 :ECDHE-ECDSA-AES128-SHA256 \nTLSv1.2 :ECDHE-RSA-AES128-SHA256 TLSv1.2 :DHE-RSA-AES128-SHA256 \nTLSv1.0 :ECDHE-ECDSA-AES256-SHA TLSv1.0 :ECDHE-RSA-AES256-SHA \nSSLv3 :DHE-RSA-AES256-SHA TLSv1.0 :ECDHE-ECDSA-AES128-SHA \nTLSv1.0 :ECDHE-RSA-AES128-SHA SSLv3 :DHE-RSA-AES128-SHA \nTLSv1.2 :RSA-PSK-AES256-GCM-SHA384 TLSv1.2 :DHE-PSK-AES256-GCM-SHA384 \nTLSv1.2 :RSA-PSK-CHACHA20-POLY1305 TLSv1.2 :DHE-PSK-CHACHA20-POLY1305 \nTLSv1.2 :ECDHE-PSK-CHACHA20-POLY1305 TLSv1.2 :AES256-GCM-SHA384 \nTLSv1.2 :PSK-AES256-GCM-SHA384 TLSv1.2 :PSK-CHACHA20-POLY1305 \nTLSv1.2 :RSA-PSK-AES128-GCM-SHA256 TLSv1.2 :DHE-PSK-AES128-GCM-SHA256 \nTLSv1.2 :AES128-GCM-SHA256 TLSv1.2 :PSK-AES128-GCM-SHA256 \nTLSv1.2 :AES256-SHA256 TLSv1.2 :AES128-SHA256 \nTLSv1.0 :ECDHE-PSK-AES256-CBC-SHA384 TLSv1.0 :ECDHE-PSK-AES256-CBC-SHA \nSSLv3 :SRP-RSA-AES-256-CBC-SHA SSLv3 :SRP-AES-256-CBC-SHA \nTLSv1.0 :RSA-PSK-AES256-CBC-SHA384 TLSv1.0 :DHE-PSK-AES256-CBC-SHA384 \nSSLv3 :RSA-PSK-AES256-CBC-SHA SSLv3 :DHE-PSK-AES256-CBC-SHA \nSSLv3 :AES256-SHA TLSv1.0 :PSK-AES256-CBC-SHA384 \nSSLv3 :PSK-AES256-CBC-SHA TLSv1.0 :ECDHE-PSK-AES128-CBC-SHA256 \nTLSv1.0 :ECDHE-PSK-AES128-CBC-SHA SSLv3 :SRP-RSA-AES-128-CBC-SHA \nSSLv3 :SRP-AES-128-CBC-SHA TLSv1.0 :RSA-PSK-AES128-CBC-SHA256 \nTLSv1.0 :DHE-PSK-AES128-CBC-SHA256 SSLv3 :RSA-PSK-AES128-CBC-SHA \nSSLv3 :DHE-PSK-AES128-CBC-SHA SSLv3 :AES128-SHA \nTLSv1.0 :PSK-AES128-CBC-SHA256 SSLv3 :PSK-AES128-CBC-SHA \n---\nCiphers common between both SSL end points:\nECDHE-ECDSA-AES256-GCM-SHA384 ECDHE-RSA-AES256-GCM-SHA384 DHE-RSA-AES256-GCM-SHA384 \nECDHE-ECDSA-CHACHA20-POLY1305 ECDHE-RSA-CHACHA20-POLY1305 DHE-RSA-CHACHA20-POLY1305 \nECDHE-ECDSA-AES128-GCM-SHA256 ECDHE-RSA-AES128-GCM-SHA256 DHE-RSA-AES128-GCM-SHA256 \nECDHE-ECDSA-AES256-SHA384 ECDHE-RSA-AES256-SHA384 DHE-RSA-AES256-SHA256 \nECDHE-ECDSA-AES128-SHA256 ECDHE-RSA-AES128-SHA256 DHE-RSA-AES128-SHA256 \nECDHE-ECDSA-AES256-SHA ECDHE-RSA-AES256-SHA DHE-RSA-AES256-SHA \nECDHE-ECDSA-AES128-SHA ECDHE-RSA-AES128-SHA DHE-RSA-AES128-SHA \nAES256-GCM-SHA384 AES128-GCM-SHA256 AES256-SHA256 \nAES128-SHA256 AES256-SHA AES128-SHA\nSignature Algorithms: ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:Ed25519:Ed448:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA+SHA256:RSA+SHA384:RSA+SHA512:ECDSA+SHA224:ECDSA+SHA1:RSA+SHA224:RSA+SHA1:DSA+SHA224:DSA+SHA1:DSA+SHA256:DSA+SHA384:DSA+SHA512\nShared Signature Algorithms: ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:Ed25519:Ed448:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA+SHA256:RSA+SHA384:RSA+SHA512:ECDSA+SHA224:ECDSA+SHA1:RSA+SHA224:RSA+SHA1:DSA+SHA224:DSA+SHA1:DSA+SHA256:DSA+SHA384:DSA+SHA512\nSupported Elliptic Groups: X25519:P-256:X448:P-521:P-384\nShared Elliptic groups: X25519:P-256:X448:P-521:P-384\n---\nNew, TLSv1.2, Cipher is ECDHE-RSA-AES256-GCM-SHA384\nSSL-Session:\n Protocol : TLSv1.2\n Cipher : ECDHE-RSA-AES256-GCM-SHA384\n Session-ID: \n Session-ID-ctx: 01000000\n Master-Key: F8A4228882E58E728B63D398B2A6D68C922799E1CAC8EC6257E48C47C98E8CBF360B2415F9429F3BD88EF86C6A2B4825\n PSK identity: None\n PSK identity hint: None\n SRP username: None\n Start Time: 1575201602\n Timeout : 7200 (sec)\n Verify return code: 0 (ok)\n Extended master secret: yes\n---\n 0 items in the session cache\n 0 client connects (SSL_connect())\n 0 client renegotiates (SSL_connect())\n 0 client connects that finished\n 6 server accepts (SSL_accept())\n 0 server renegotiates (SSL_accept())\n 5 server accepts that finished\n 0 session cache hits\n 0 session cache misses\n 0 session cache timeouts\n 0 callback cache hits\n 0 cache full overflows (128 allowed)\n---\nno client certificate available\n</pre></BODY></HTML>\r\n\r\n' >res = b'<HTML><BODY BGCOLOR="#ffffff">\n<pre>\n\ns_server -www -cert pki/localhost.crt -key pki/localhost.key -accept 4443 \nSecure Renegotiation IS supported\nCiphers supported in s_server binary\nTLSv1.3 :TLS_AES_256_GCM_SHA384 TLSv1.3 :TLS_CHACHA20_POLY1305_SHA256 \nTLSv1.3 :TLS_AES_128_GCM_SHA256 TLSv1.2 :ECDHE-ECDSA-AES256-GCM-SHA384 \nTLSv1.2 :ECDHE-RSA-AES256-GCM-SHA384 TLSv1.2 :DHE-RSA-AES256-GCM-SHA384 \nTLSv1.2 :ECDHE-ECDSA-CHACHA20-POLY1305 TLSv1.2 :ECDHE-RSA-CHACHA20-POLY1305 \nTLSv1.2 :DHE-RSA-CHACHA20-POLY1305 TLSv1.2 :ECDHE-ECDSA-AES128-GCM-SHA256 \nTLSv1.2 :ECDHE-RSA-AES128-GCM-SHA256 TLSv1.2 :DHE-RSA-AES128-GCM-SHA256 \nTLSv1.2 :ECDHE-ECDSA-AES256-SHA384 TLSv1.2 :ECDHE-RSA-AES256-SHA384 \nTLSv1.2 :DHE-RSA-AES256-SHA256 TLSv1.2 :ECDHE-ECDSA-AES128-SHA256 \nTLSv1.2 :ECDHE-RSA-AES128-SHA256 TLSv1.2 :DHE-RSA-AES128-SHA256 \nTLSv1.0 :ECDHE-ECDSA-AES256-SHA TLSv1.0 :ECDHE-RSA-AES256-SHA \nSSLv3 :DHE-RSA-AES256-SHA TLSv1.0 :ECDHE-ECDSA-AES128-SHA \nTLSv1.0 :ECDHE-RSA-AES128-SHA SSLv3 :DHE-RSA-AES128-SHA \nTLSv1.2 :RSA-PSK-AES256-GCM-SHA384 TLSv1.2 :DHE-PSK-AES256-GCM-SHA384 \nTLSv1.2 :RSA-PSK-CHACHA20-POLY1305 TLSv1.2 :DHE-PSK-CHACHA20-POLY1305 \nTLSv1.2 :ECDHE-PSK-CHACHA20-POLY1305 TLSv1.2 :AES256-GCM-SHA384 \nTLSv1.2 :PSK-AES256-GCM-SHA384 TLSv1.2 :PSK-CHACHA20-POLY1305 \nTLSv1.2 :RSA-PSK-AES128-GCM-SHA256 TLSv1.2 :DHE-PSK-AES128-GCM-SHA256 \nTLSv1.2 :AES128-GCM-SHA256 TLSv1.2 :PSK-AES128-GCM-SHA256 \nTLSv1.2 :AES256-SHA256 TLSv1.2 :AES128-SHA256 \nTLSv1.0 :ECDHE-PSK-AES256-CBC-SHA384 TLSv1.0 :ECDHE-PSK-AES256-CBC-SHA \nSSLv3 :SRP-RSA-AES-256-CBC-SHA SSLv3 :SRP-AES-256-CBC-SHA \nTLSv1.0 :RSA-PSK-AES256-CBC-SHA384 TLSv1.0 :DHE-PSK-AES256-CBC-SHA384 \nSSLv3 :RSA-PSK-AES256-CBC-SHA SSLv3 :DHE-PSK-AES256-CBC-SHA \nSSLv3 :AES256-SHA TLSv1.0 :PSK-AES256-CBC-SHA384 \nSSLv3 :PSK-AES256-CBC-SHA TLSv1.0 :ECDHE-PSK-AES128-CBC-SHA256 \nTLSv1.0 :ECDHE-PSK-AES128-CBC-SHA SSLv3 :SRP-RSA-AES-128-CBC-SHA \nSSLv3 :SRP-AES-128-CBC-SHA TLSv1.0 :RSA-PSK-AES128-CBC-SHA256 \nTLSv1.0 :DHE-PSK-AES128-CBC-SHA256 SSLv3 :RSA-PSK-AES128-CBC-SHA \nSSLv3 :DHE-PSK-AES128-CBC-SHA SSLv3 :AES128-SHA \nTLSv1.0 :PSK-AES128-CBC-SHA256 SSLv3 :PSK-AES128-CBC-SHA \n---\nCiphers common between both SSL end points:\nECDHE-ECDSA-AES256-GCM-SHA384 ECDHE-RSA-AES256-GCM-SHA384 DHE-RSA-AES256-GCM-SHA384 \nECDHE-ECDSA-CHACHA20-POLY1305 ECDHE-RSA-CHACHA20-POLY1305 DHE-RSA-CHACHA20-POLY1305 \nECDHE-ECDSA-AES128-GCM-SHA256 ECDHE-RSA-AES128-GCM-SHA256 DHE-RSA-AES128-GCM-SHA256 \nECDHE-ECDSA-AES256-SHA384 ECDHE-RSA-AES256-SHA384 DHE-RSA-AES256-SHA256 \nECDHE-ECDSA-AES128-SHA256 ECDHE-RSA-AES128-SHA256 DHE-RSA-AES128-SHA256 \nECDHE-ECDSA-AES256-SHA ECDHE-RSA-AES256-SHA DHE-RSA-AES256-SHA \nECDHE-ECDSA-AES128-SHA ECDHE-RSA-AES128-SHA DHE-RSA-AES128-SHA \nAES256-GCM-SHA384 AES128-GCM-SHA256 AES256-SHA256 \nAES128-SHA256 AES256-SHA AES128-SHA\nSignature Algorithms: ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:Ed25519:Ed448:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA+SHA256:RSA+SHA384:RSA+SHA512:ECDSA+SHA224:ECDSA+SHA1:RSA+SHA224:RSA+SHA1:DSA+SHA224:DSA+SHA1:DSA+SHA256:DSA+SHA384:DSA+SHA512\nShared Signature Algorithms: ECDSA+SHA256:ECDSA+SHA384:ECDSA+SHA512:Ed25519:Ed448:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA-PSS+SHA256:RSA-PSS+SHA384:RSA-PSS+SHA512:RSA+SHA256:RSA+SHA384:RSA+SHA512:ECDSA+SHA224:ECDSA+SHA1:RSA+SHA224:RSA+SHA1:DSA+SHA224:DSA+SHA1:DSA+SHA256:DSA+SHA384:DSA+SHA512\nSupported Elliptic Groups: X25519:P-256:X448:P-521:P-384\nShared Elliptic groups: X25519:P-256:X448:P-521:P-384\n---\nNew, TLSv1.2, Cipher is ECDHE-RSA-AES256-GCM-SHA384\nSSL-Session:\n Protocol : TLSv1.2\n Cipher : ECDHE-RSA-AES256-GCM-SHA384\n Session-ID: \n Session-ID-ctx: 01000000\n Master-Key: CA70CE3371CA2FFDE56009E9C3E408C8BC8FB3A70346DD3D6D9972097DD88945E39DE994BC1AA498504E1ACA4DDFFFB7\n PSK identity: None\n PSK identity hint: None\n SRP username: None\n Start Time: 1575201602\n Timeout : 7200 (sec)\n Verify return code: 0 (ok)\n Extended master secret: yes\n---\n 0 items in the session cache\n 0 client connects (SSL_connect())\n 0 client renegotiates (SSL_connect())\n 0 client connects that finished\n 8 server accepts (SSL_accept())\n 0 server renegotiates (SSL_accept())\n 6 server accepts that finished\n 0 session cache hits\n 0 session cache misses\n 0 session cache timeouts\n 0 callback cache hits\n 0 cache full overflows (128 allowed)\n---\nno client certificate available\n</pre></BODY></HTML>\r\n\r\n'/usr/lib/python3.7/urllib/request.py:1363: ResourceWarning: unclosed <socket.socket fd=5, family=AddressFamily.AF_INET6, type=SocketKind.SOCK_STREAM, proto=6, laddr=('::1', 38124, 0, 0), raddr=('::1', 4443, 0, 0)> > h.sock = None >ResourceWarning: Enable tracemalloc to get the object allocation traceback >ok >test01_configuration (ndg.httpsclient.test.test_utils.TestUtilsModule) ... ok >test02_fetch_from_url (ndg.httpsclient.test.test_utils.TestUtilsModule) ... DEBUG:ndg.httpsclient.ssl_socket:Socket.makefile 1 recv calls completed in 0:00:00.000504 >/usr/lib/python3.7/urllib/request.py:1363: ResourceWarning: unclosed <socket.socket fd=5, family=AddressFamily.AF_INET6, type=SocketKind.SOCK_STREAM, proto=6, laddr=('::1', 38126, 0, 0), raddr=('::1', 4443, 0, 0)> > h.sock = None >ResourceWarning: Enable tracemalloc to get the object allocation traceback >ok >test03_open_url (ndg.httpsclient.test.test_utils.TestUtilsModule) ... DEBUG:ndg.httpsclient.ssl_socket:Socket.makefile 1 recv calls completed in 0:00:00.000486 >/usr/lib/python3.7/urllib/request.py:1363: ResourceWarning: unclosed <socket.socket fd=5, family=AddressFamily.AF_INET6, type=SocketKind.SOCK_STREAM, proto=6, laddr=('::1', 38128, 0, 0), raddr=('::1', 4443, 0, 0)> > h.sock = None >ResourceWarning: Enable tracemalloc to get the object allocation traceback >ok >test04__should_use_proxy (ndg.httpsclient.test.test_utils.TestUtilsModule) ... ok > >---------------------------------------------------------------------- >Ran 15 tests in 0.296s > >OK > >send: b'GET / HTTP/1.1\r\nAccept-Encoding: identity\r\nHost: localhost:4443\r\nUser-Agent: Python-urllib/3.7\r\nConnection: close\r\n\r\n' >reply: 'HTTP/1.0 200 ok\r\n' >header: Content-type: text/html >send: b'GET / HTTP/1.1\r\nAccept-Encoding: identity\r\nHost: localhost:4443\r\nUser-Agent: Python-urllib/3.7\r\nConnection: close\r\n\r\n' >reply: 'HTTP/1.0 200 ok\r\n' >header: Content-type: text/html >/var/tmp/portage/dev-python/ndg-httpsclient-0.5.1/temp/environment: line 2859: 67 Segmentation fault "${EPYTHON}" -m unittest discover -v > [31;01m*[0m ERROR: dev-python/ndg-httpsclient-0.5.1::gentoo failed (test phase): > [31;01m*[0m Tests fail with python3.7 > [31;01m*[0m > [31;01m*[0m Call stack: > [31;01m*[0m ebuild.sh, line 125: Called src_test > [31;01m*[0m environment, line 2903: Called distutils-r1_src_test > [31;01m*[0m environment, line 1239: Called _distutils-r1_run_foreach_impl 'python_test' > [31;01m*[0m environment, line 435: Called python_foreach_impl 'distutils-r1_run_phase' 'python_test' > [31;01m*[0m environment, line 2515: Called multibuild_foreach_variant '_python_multibuild_wrapper' 'distutils-r1_run_phase' 'python_test' > [31;01m*[0m environment, line 2021: Called _multibuild_run '_python_multibuild_wrapper' 'distutils-r1_run_phase' 'python_test' > [31;01m*[0m environment, line 2019: Called _python_multibuild_wrapper 'distutils-r1_run_phase' 'python_test' > [31;01m*[0m environment, line 827: Called distutils-r1_run_phase 'python_test' > [31;01m*[0m environment, line 1176: Called python_test > [31;01m*[0m environment, line 2860: Called die > [31;01m*[0m The specific snippet of code: > [31;01m*[0m "${EPYTHON}" -m unittest discover -v || die "Tests fail with ${EPYTHON}" > [31;01m*[0m > [31;01m*[0m If you need support, post the output of `emerge --info '=dev-python/ndg-httpsclient-0.5.1::gentoo'`, > [31;01m*[0m the complete build log and the output of `emerge -pqv '=dev-python/ndg-httpsclient-0.5.1::gentoo'`. > [31;01m*[0m The complete build log is located at '/var/tmp/portage/dev-python/ndg-httpsclient-0.5.1/temp/build.log'. > [31;01m*[0m The ebuild environment file is located at '/var/tmp/portage/dev-python/ndg-httpsclient-0.5.1/temp/environment'. > [31;01m*[0m Working directory: '/var/tmp/portage/dev-python/ndg-httpsclient-0.5.1/work/ndg_httpsclient-0.5.1' > [31;01m*[0m S: '/var/tmp/portage/dev-python/ndg-httpsclient-0.5.1/work/ndg_httpsclient-0.5.1'
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 720804
:
635834
| 644042