Go to:
Gentoo Home
Documentation
Forums
Lists
Bugs
Planet
Store
Wiki
Get Gentoo!
Gentoo's Bugzilla – Attachment 648650 Details for
Bug 731954
dev-python/pyopenssl-19.1.0 : [TEST] E ValueError: Invalid string
Home
|
New
–
[Ex]
|
Browse
|
Search
|
Privacy Policy
|
[?]
|
Reports
|
Requests
|
Help
|
New Account
|
Log In
[x]
|
Forgot Password
Login:
[x]
dev-python:pyopenssl-19.1.0:20200709-071346.log
dev-python:pyopenssl-19.1.0:20200709-071346.log (text/plain), 75.93 KB, created by
Toralf Förster
on 2020-07-09 15:20:50 UTC
(
hide
)
Description:
dev-python:pyopenssl-19.1.0:20200709-071346.log
Filename:
MIME Type:
Creator:
Toralf Förster
Created:
2020-07-09 15:20:50 UTC
Size:
75.93 KB
patch
obsolete
> * Package: dev-python/pyopenssl-19.1.0 > * Repository: gentoo > * Maintainer: python@gentoo.org > * USE: abi_x86_64 amd64 elibc_glibc kernel_linux python_targets_python2_7 python_targets_python3_7 test userland_GNU > * FEATURES: network-sandbox preserve-libs sandbox test userpriv usersandbox >>>> Unpacking source... >>>> Unpacking pyOpenSSL-19.1.0.tar.gz to /var/tmp/portage/dev-python/pyopenssl-19.1.0/work >>>> Source unpacked in /var/tmp/portage/dev-python/pyopenssl-19.1.0/work >>>> Preparing source in /var/tmp/portage/dev-python/pyopenssl-19.1.0/work/pyOpenSSL-19.1.0 ... >>>> Source prepared. >>>> Configuring source in /var/tmp/portage/dev-python/pyopenssl-19.1.0/work/pyOpenSSL-19.1.0 ... >>>> Source configured. >>>> Compiling source in /var/tmp/portage/dev-python/pyopenssl-19.1.0/work/pyOpenSSL-19.1.0 ... > * python2_7: running distutils-r1_run_phase distutils-r1_python_compile >python2.7 setup.py build >running build >running build_py >creating /var/tmp/portage/dev-python/pyopenssl-19.1.0/work/pyOpenSSL-19.1.0-python2_7/lib/OpenSSL >copying src/OpenSSL/version.py -> /var/tmp/portage/dev-python/pyopenssl-19.1.0/work/pyOpenSSL-19.1.0-python2_7/lib/OpenSSL >copying src/OpenSSL/tsafe.py -> /var/tmp/portage/dev-python/pyopenssl-19.1.0/work/pyOpenSSL-19.1.0-python2_7/lib/OpenSSL >copying src/OpenSSL/rand.py -> /var/tmp/portage/dev-python/pyopenssl-19.1.0/work/pyOpenSSL-19.1.0-python2_7/lib/OpenSSL >copying src/OpenSSL/debug.py -> /var/tmp/portage/dev-python/pyopenssl-19.1.0/work/pyOpenSSL-19.1.0-python2_7/lib/OpenSSL >copying src/OpenSSL/crypto.py -> /var/tmp/portage/dev-python/pyopenssl-19.1.0/work/pyOpenSSL-19.1.0-python2_7/lib/OpenSSL >copying src/OpenSSL/_util.py -> /var/tmp/portage/dev-python/pyopenssl-19.1.0/work/pyOpenSSL-19.1.0-python2_7/lib/OpenSSL >copying src/OpenSSL/__init__.py -> /var/tmp/portage/dev-python/pyopenssl-19.1.0/work/pyOpenSSL-19.1.0-python2_7/lib/OpenSSL >copying src/OpenSSL/SSL.py -> /var/tmp/portage/dev-python/pyopenssl-19.1.0/work/pyOpenSSL-19.1.0-python2_7/lib/OpenSSL >warning: build_py: byte-compiling is disabled, skipping. > > * python3_7: running distutils-r1_run_phase distutils-r1_python_compile >python3.7 setup.py build -j 1 >running build >running build_py >creating /var/tmp/portage/dev-python/pyopenssl-19.1.0/work/pyOpenSSL-19.1.0-python3_7/lib/OpenSSL >copying src/OpenSSL/version.py -> /var/tmp/portage/dev-python/pyopenssl-19.1.0/work/pyOpenSSL-19.1.0-python3_7/lib/OpenSSL >copying src/OpenSSL/tsafe.py -> /var/tmp/portage/dev-python/pyopenssl-19.1.0/work/pyOpenSSL-19.1.0-python3_7/lib/OpenSSL >copying src/OpenSSL/rand.py -> /var/tmp/portage/dev-python/pyopenssl-19.1.0/work/pyOpenSSL-19.1.0-python3_7/lib/OpenSSL >copying src/OpenSSL/debug.py -> /var/tmp/portage/dev-python/pyopenssl-19.1.0/work/pyOpenSSL-19.1.0-python3_7/lib/OpenSSL >copying src/OpenSSL/crypto.py -> /var/tmp/portage/dev-python/pyopenssl-19.1.0/work/pyOpenSSL-19.1.0-python3_7/lib/OpenSSL >copying src/OpenSSL/_util.py -> /var/tmp/portage/dev-python/pyopenssl-19.1.0/work/pyOpenSSL-19.1.0-python3_7/lib/OpenSSL >copying src/OpenSSL/__init__.py -> /var/tmp/portage/dev-python/pyopenssl-19.1.0/work/pyOpenSSL-19.1.0-python3_7/lib/OpenSSL >copying src/OpenSSL/SSL.py -> /var/tmp/portage/dev-python/pyopenssl-19.1.0/work/pyOpenSSL-19.1.0-python3_7/lib/OpenSSL >warning: build_py: byte-compiling is disabled, skipping. > > * Using python3.8 in global scope > * python3_8: running distutils-r1_run_phase python_compile_all >>>> Source compiled. >>>> Test phase: dev-python/pyopenssl-19.1.0 > * python2_7: running distutils-r1_run_phase python_test >============================= test session starts ============================== >platform linux2 -- Python 2.7.18, pytest-4.6.11, py-1.8.0, pluggy-0.13.1 -- /usr/bin/python2.7 >cachedir: .pytest_cache >hypothesis profile 'default' -> database=DirectoryBasedExampleDatabase('/var/tmp/portage/dev-python/pyopenssl-19.1.0/work/pyOpenSSL-19.1.0/.hypothesis/examples') >OpenSSL: LibreSSL 3.1.3 >cryptography: 2.9 >rootdir: /var/tmp/portage/dev-python/pyopenssl-19.1.0/work/pyOpenSSL-19.1.0, inifile: setup.cfg, testpaths: tests >plugins: flaky-3.6.1, hypothesis-4.57.1 >collecting ... collected 494 items > >tests/test_crypto.py::TestX509Ext::test_str PASSED [ 0%] >tests/test_crypto.py::TestX509Ext::test_type PASSED [ 0%] >tests/test_crypto.py::TestX509Ext::test_construction PASSED [ 0%] >tests/test_crypto.py::TestX509Ext::test_invalid_extension[thisIsMadeUp-False-hi] PASSED [ 0%] >tests/test_crypto.py::TestX509Ext::test_invalid_extension[basicConstraints-False-blah blah] PASSED [ 1%] >tests/test_crypto.py::TestX509Ext::test_invalid_extension[proxyCertInfo-True-language:id-ppl-anyLanguage,pathlen:1,policy:text:AB] PASSED [ 1%] >tests/test_crypto.py::TestX509Ext::test_get_critical[True] PASSED [ 1%] >tests/test_crypto.py::TestX509Ext::test_get_critical[False] PASSED [ 1%] >tests/test_crypto.py::TestX509Ext::test_get_short_name[basicConstraints-CA:true] PASSED [ 1%] >tests/test_crypto.py::TestX509Ext::test_get_short_name[nsComment-foo bar] PASSED [ 2%] >tests/test_crypto.py::TestX509Ext::test_get_data PASSED [ 2%] >tests/test_crypto.py::TestX509Ext::test_unused_subject PASSED [ 2%] >tests/test_crypto.py::TestX509Ext::test_subject PASSED [ 2%] >tests/test_crypto.py::TestX509Ext::test_missing_subject PASSED [ 2%] >tests/test_crypto.py::TestX509Ext::test_invalid_subject[True] PASSED [ 3%] >tests/test_crypto.py::TestX509Ext::test_invalid_subject[bad_obj1] PASSED [ 3%] >tests/test_crypto.py::TestX509Ext::test_invalid_subject[hello] PASSED [ 3%] >tests/test_crypto.py::TestX509Ext::test_invalid_subject[bad_obj3] PASSED [ 3%] >tests/test_crypto.py::TestX509Ext::test_unused_issuer PASSED [ 3%] >tests/test_crypto.py::TestX509Ext::test_issuer PASSED [ 4%] >tests/test_crypto.py::TestX509Ext::test_missing_issuer PASSED [ 4%] >tests/test_crypto.py::TestX509Ext::test_invalid_issuer[True] PASSED [ 4%] >tests/test_crypto.py::TestX509Ext::test_invalid_issuer[bad_obj1] PASSED [ 4%] >tests/test_crypto.py::TestX509Ext::test_invalid_issuer[hello] PASSED [ 4%] >tests/test_crypto.py::TestX509Ext::test_invalid_issuer[bad_obj3] PASSED [ 5%] >tests/test_crypto.py::TestPKey::test_convert_from_cryptography_private_key PASSED [ 5%] >tests/test_crypto.py::TestPKey::test_convert_from_cryptography_public_key PASSED [ 5%] >tests/test_crypto.py::TestPKey::test_convert_from_cryptography_unsupported_type PASSED [ 5%] >tests/test_crypto.py::TestPKey::test_convert_public_pkey_to_cryptography_key PASSED [ 5%] >tests/test_crypto.py::TestPKey::test_convert_private_pkey_to_cryptography_key PASSED [ 6%] >tests/test_crypto.py::TestPKey::test_type PASSED [ 6%] >tests/test_crypto.py::TestPKey::test_construction PASSED [ 6%] >tests/test_crypto.py::TestPKey::test_pregeneration PASSED [ 6%] >tests/test_crypto.py::TestPKey::test_failed_generation PASSED [ 6%] >tests/test_crypto.py::TestPKey::test_rsa_generation PASSED [ 7%] >tests/test_crypto.py::TestPKey::test_dsa_generation PASSED [ 7%] >tests/test_crypto.py::TestPKey::test_regeneration PASSED [ 7%] >tests/test_crypto.py::TestPKey::test_inconsistent_key PASSED [ 7%] >tests/test_crypto.py::TestPKey::test_check_public_key PASSED [ 7%] >tests/test_crypto.py::TestX509Name::test_type PASSED [ 8%] >tests/test_crypto.py::TestX509Name::test_only_string_attributes PASSED [ 8%] >tests/test_crypto.py::TestX509Name::test_set_invalid_attribute PASSED [ 8%] >tests/test_crypto.py::TestX509Name::test_attributes PASSED [ 8%] >tests/test_crypto.py::TestX509Name::test_copy PASSED [ 8%] >tests/test_crypto.py::TestX509Name::test_repr PASSED [ 9%] >tests/test_crypto.py::TestX509Name::test_comparison PASSED [ 9%] >tests/test_crypto.py::TestX509Name::test_hash PASSED [ 9%] >tests/test_crypto.py::TestX509Name::test_der PASSED [ 9%] >tests/test_crypto.py::TestX509Name::test_get_components PASSED [ 9%] >tests/test_crypto.py::TestX509Name::test_load_nul_byte_attribute PASSED [ 10%] >tests/test_crypto.py::TestX509Name::test_load_nul_byte_components PASSED [ 10%] >tests/test_crypto.py::TestX509Name::test_set_attribute_failure PASSED [ 10%] >tests/test_crypto.py::TestX509Req::test_sign_with_ungenerated PASSED [ 10%] >tests/test_crypto.py::TestX509Req::test_sign_with_public_key PASSED [ 10%] >tests/test_crypto.py::TestX509Req::test_sign_with_unknown_digest PASSED [ 11%] >tests/test_crypto.py::TestX509Req::test_sign PASSED [ 11%] >tests/test_crypto.py::TestX509Req::test_type PASSED [ 11%] >tests/test_crypto.py::TestX509Req::test_construction PASSED [ 11%] >tests/test_crypto.py::TestX509Req::test_version PASSED [ 11%] >tests/test_crypto.py::TestX509Req::test_version_wrong_args PASSED [ 12%] >tests/test_crypto.py::TestX509Req::test_get_subject PASSED [ 12%] >tests/test_crypto.py::TestX509Req::test_add_extensions PASSED [ 12%] >tests/test_crypto.py::TestX509Req::test_get_extensions PASSED [ 12%] >tests/test_crypto.py::TestX509Req::test_add_extensions_wrong_args PASSED [ 12%] >tests/test_crypto.py::TestX509Req::test_verify_wrong_args PASSED [ 13%] >tests/test_crypto.py::TestX509Req::test_verify_uninitialized_key PASSED [ 13%] >tests/test_crypto.py::TestX509Req::test_verify_wrong_key PASSED [ 13%] >tests/test_crypto.py::TestX509Req::test_verify_success PASSED [ 13%] >tests/test_crypto.py::TestX509Req::test_convert_from_cryptography PASSED [ 13%] >tests/test_crypto.py::TestX509Req::test_convert_from_cryptography_unsupported_type PASSED [ 14%] >tests/test_crypto.py::TestX509Req::test_convert_to_cryptography_key PASSED [ 14%] >tests/test_crypto.py::TestX509::test_sign_with_ungenerated PASSED [ 14%] >tests/test_crypto.py::TestX509::test_sign_with_public_key PASSED [ 14%] >tests/test_crypto.py::TestX509::test_sign_with_unknown_digest PASSED [ 14%] >tests/test_crypto.py::TestX509::test_sign PASSED [ 15%] >tests/test_crypto.py::TestX509::test_type PASSED [ 15%] >tests/test_crypto.py::TestX509::test_construction PASSED [ 15%] >tests/test_crypto.py::TestX509::test_set_version_wrong_args PASSED [ 15%] >tests/test_crypto.py::TestX509::test_version PASSED [ 15%] >tests/test_crypto.py::TestX509::test_serial_number PASSED [ 16%] >tests/test_crypto.py::TestX509::test_set_notBefore FAILED [ 16%] >tests/test_crypto.py::TestX509::test_set_notAfter FAILED [ 16%] >tests/test_crypto.py::TestX509::test_get_notBefore PASSED [ 16%] >tests/test_crypto.py::TestX509::test_get_notAfter PASSED [ 17%] >tests/test_crypto.py::TestX509::test_gmtime_adj_notBefore_wrong_args PASSED [ 17%] >tests/test_crypto.py::TestX509::test_gmtime_adj_notBefore PASSED [ 17%] >tests/test_crypto.py::TestX509::test_gmtime_adj_notAfter_wrong_args PASSED [ 17%] >tests/test_crypto.py::TestX509::test_gmtime_adj_notAfter PASSED [ 17%] >tests/test_crypto.py::TestX509::test_has_expired PASSED [ 18%] >tests/test_crypto.py::TestX509::test_has_not_expired PASSED [ 18%] >tests/test_crypto.py::TestX509::test_root_has_not_expired PASSED [ 18%] >tests/test_crypto.py::TestX509::test_digest PASSED [ 18%] >tests/test_crypto.py::TestX509::test_extension_count PASSED [ 18%] >tests/test_crypto.py::TestX509::test_get_extension PASSED [ 19%] >tests/test_crypto.py::TestX509::test_nullbyte_subjectAltName PASSED [ 19%] >tests/test_crypto.py::TestX509::test_invalid_digest_algorithm PASSED [ 19%] >tests/test_crypto.py::TestX509::test_get_subject PASSED [ 19%] >tests/test_crypto.py::TestX509::test_set_subject_wrong_args PASSED [ 19%] >tests/test_crypto.py::TestX509::test_set_subject PASSED [ 20%] >tests/test_crypto.py::TestX509::test_get_issuer PASSED [ 20%] >tests/test_crypto.py::TestX509::test_set_issuer_wrong_args PASSED [ 20%] >tests/test_crypto.py::TestX509::test_set_issuer PASSED [ 20%] >tests/test_crypto.py::TestX509::test_get_pubkey_uninitialized PASSED [ 20%] >tests/test_crypto.py::TestX509::test_set_pubkey_wrong_type PASSED [ 21%] >tests/test_crypto.py::TestX509::test_subject_name_hash PASSED [ 21%] >tests/test_crypto.py::TestX509::test_get_signature_algorithm PASSED [ 21%] >tests/test_crypto.py::TestX509::test_get_undefined_signature_algorithm PASSED [ 21%] >tests/test_crypto.py::TestX509::test_sign_bad_pubkey_type PASSED [ 21%] >tests/test_crypto.py::TestX509::test_convert_from_cryptography PASSED [ 22%] >tests/test_crypto.py::TestX509::test_convert_from_cryptography_unsupported_type PASSED [ 22%] >tests/test_crypto.py::TestX509::test_convert_to_cryptography_key PASSED [ 22%] >tests/test_crypto.py::TestX509Store::test_type PASSED [ 22%] >tests/test_crypto.py::TestX509Store::test_add_cert PASSED [ 22%] >tests/test_crypto.py::TestX509Store::test_add_cert_wrong_args[None] PASSED [ 23%] >tests/test_crypto.py::TestX509Store::test_add_cert_wrong_args[1.0] PASSED [ 23%] >tests/test_crypto.py::TestX509Store::test_add_cert_wrong_args[cert] PASSED [ 23%] >tests/test_crypto.py::TestX509Store::test_add_cert_wrong_args[cert3] PASSED [ 23%] >tests/test_crypto.py::TestX509Store::test_add_cert_accepts_duplicate PASSED [ 23%] >tests/test_crypto.py::TestPKCS12::test_type PASSED [ 24%] >tests/test_crypto.py::TestPKCS12::test_empty_construction PASSED [ 24%] >tests/test_crypto.py::TestPKCS12::test_type_errors PASSED [ 24%] >tests/test_crypto.py::TestPKCS12::test_key_only PASSED [ 24%] >tests/test_crypto.py::TestPKCS12::test_cert_only PASSED [ 24%] >tests/test_crypto.py::TestPKCS12::test_load_pkcs12 PASSED [ 25%] >tests/test_crypto.py::TestPKCS12::test_load_pkcs12_text_passphrase PASSED [ 25%] >tests/test_crypto.py::TestPKCS12::test_load_pkcs12_no_passphrase PASSED [ 25%] >tests/test_crypto.py::TestPKCS12::test_load_pkcs12_null_passphrase_load_empty PASSED [ 25%] >tests/test_crypto.py::TestPKCS12::test_load_pkcs12_null_passphrase_load_null PASSED [ 25%] >tests/test_crypto.py::TestPKCS12::test_load_pkcs12_empty_passphrase_load_empty PASSED [ 26%] >tests/test_crypto.py::TestPKCS12::test_load_pkcs12_empty_passphrase_load_null PASSED [ 26%] >tests/test_crypto.py::TestPKCS12::test_load_pkcs12_garbage PASSED [ 26%] >tests/test_crypto.py::TestPKCS12::test_replace PASSED [ 26%] >tests/test_crypto.py::TestPKCS12::test_friendly_name PASSED [ 26%] >tests/test_crypto.py::TestPKCS12::test_various_empty_passphrases PASSED [ 27%] >tests/test_crypto.py::TestPKCS12::test_removing_ca_cert PASSED [ 27%] >tests/test_crypto.py::TestPKCS12::test_export_without_mac PASSED [ 27%] >tests/test_crypto.py::TestPKCS12::test_load_without_mac PASSED [ 27%] >tests/test_crypto.py::TestPKCS12::test_zero_len_list_for_ca PASSED [ 27%] >tests/test_crypto.py::TestPKCS12::test_export_without_args PASSED [ 28%] >tests/test_crypto.py::TestPKCS12::test_export_without_bytes PASSED [ 28%] >tests/test_crypto.py::TestPKCS12::test_key_cert_mismatch PASSED [ 28%] >tests/test_crypto.py::TestLoadPublicKey::test_loading_works PASSED [ 28%] >tests/test_crypto.py::TestLoadPublicKey::test_invalid_type PASSED [ 28%] >tests/test_crypto.py::TestLoadPublicKey::test_invalid_key_format PASSED [ 29%] >tests/test_crypto.py::TestLoadPublicKey::test_tolerates_unicode_strings PASSED [ 29%] >tests/test_crypto.py::TestFunction::test_load_privatekey_invalid_format PASSED [ 29%] >tests/test_crypto.py::TestFunction::test_load_privatekey_invalid_passphrase_type PASSED [ 29%] >tests/test_crypto.py::TestFunction::test_load_privatekey_wrongPassphrase PASSED [ 29%] >tests/test_crypto.py::TestFunction::test_load_privatekey_passphraseWrongType PASSED [ 30%] >tests/test_crypto.py::TestFunction::test_load_privatekey_passphrase PASSED [ 30%] >tests/test_crypto.py::TestFunction::test_load_privatekey_passphrase_exception PASSED [ 30%] >tests/test_crypto.py::TestFunction::test_load_privatekey_wrongPassphraseCallback PASSED [ 30%] >tests/test_crypto.py::TestFunction::test_load_privatekey_passphraseCallback PASSED [ 30%] >tests/test_crypto.py::TestFunction::test_load_privatekey_passphrase_wrong_return_type PASSED [ 31%] >tests/test_crypto.py::TestFunction::test_dump_privatekey_wrong_args PASSED [ 31%] >tests/test_crypto.py::TestFunction::test_dump_privatekey_not_rsa_key PASSED [ 31%] >tests/test_crypto.py::TestFunction::test_dump_privatekey_invalid_pkey PASSED [ 31%] >tests/test_crypto.py::TestFunction::test_dump_privatekey_unknown_cipher PASSED [ 31%] >tests/test_crypto.py::TestFunction::test_dump_privatekey_invalid_passphrase_type PASSED [ 32%] >tests/test_crypto.py::TestFunction::test_dump_privatekey_invalid_filetype PASSED [ 32%] >tests/test_crypto.py::TestFunction::test_load_privatekey_passphrase_callback_length PASSED [ 32%] >tests/test_crypto.py::TestFunction::test_dump_privatekey_passphrase PASSED [ 32%] >tests/test_crypto.py::TestFunction::test_dump_privatekey_passphrase_wrong_type PASSED [ 32%] >tests/test_crypto.py::TestFunction::test_dump_certificate PASSED [ 33%] >tests/test_crypto.py::TestFunction::test_dump_certificate_bad_type PASSED [ 33%] >tests/test_crypto.py::TestFunction::test_dump_privatekey_pem PASSED [ 33%] >tests/test_crypto.py::TestFunction::test_dump_privatekey_asn1 PASSED [ 33%] >tests/test_crypto.py::TestFunction::test_dump_privatekey_text PASSED [ 34%] >tests/test_crypto.py::TestFunction::test_dump_publickey_pem PASSED [ 34%] >tests/test_crypto.py::TestFunction::test_dump_publickey_asn1 PASSED [ 34%] >tests/test_crypto.py::TestFunction::test_dump_publickey_invalid_type PASSED [ 34%] >tests/test_crypto.py::TestFunction::test_dump_certificate_request PASSED [ 34%] >tests/test_crypto.py::TestFunction::test_dump_privatekey_passphrase_callback PASSED [ 35%] >tests/test_crypto.py::TestFunction::test_dump_privatekey_passphrase_exception PASSED [ 35%] >tests/test_crypto.py::TestFunction::test_dump_privatekey_passphraseCallbackLength PASSED [ 35%] >tests/test_crypto.py::TestFunction::test_load_pkcs7_data_pem PASSED [ 35%] >tests/test_crypto.py::TestFunction::test_load_pkcs7_data_asn1 PASSED [ 35%] >tests/test_crypto.py::TestFunction::test_load_pkcs7_data_invalid PASSED [ 36%] >tests/test_crypto.py::TestFunction::test_load_pkcs7_type_invalid PASSED [ 36%] >tests/test_crypto.py::TestLoadCertificate::test_bad_file_type PASSED [ 36%] >tests/test_crypto.py::TestLoadCertificate::test_bad_certificate PASSED [ 36%] >tests/test_crypto.py::TestPKCS7::test_type_is_signed PASSED [ 36%] >tests/test_crypto.py::TestPKCS7::test_type_is_enveloped PASSED [ 37%] >tests/test_crypto.py::TestPKCS7::test_type_is_signed_and_enveloped PASSED [ 37%] >tests/test_crypto.py::TestPKCS7::test_type_is_data PASSED [ 37%] >tests/test_crypto.py::TestPKCS7::test_get_type_name PASSED [ 37%] >tests/test_crypto.py::TestPKCS7::test_attribute PASSED [ 37%] >tests/test_crypto.py::TestNetscapeSPKI::test_sign_with_ungenerated PASSED [ 38%] >tests/test_crypto.py::TestNetscapeSPKI::test_sign_with_public_key PASSED [ 38%] >tests/test_crypto.py::TestNetscapeSPKI::test_sign_with_unknown_digest PASSED [ 38%] >tests/test_crypto.py::TestNetscapeSPKI::test_sign PASSED [ 38%] >tests/test_crypto.py::TestNetscapeSPKI::test_type PASSED [ 38%] >tests/test_crypto.py::TestNetscapeSPKI::test_construction PASSED [ 39%] >tests/test_crypto.py::TestNetscapeSPKI::test_invalid_attribute PASSED [ 39%] >tests/test_crypto.py::TestNetscapeSPKI::test_b64_encode PASSED [ 39%] >tests/test_crypto.py::TestRevoked::test_ignores_unsupported_revoked_cert_extension_get_reason PASSED [ 39%] >tests/test_crypto.py::TestRevoked::test_ignores_unsupported_revoked_cert_extension_set_new_reason PASSED [ 39%] >tests/test_crypto.py::TestRevoked::test_construction PASSED [ 40%] >tests/test_crypto.py::TestRevoked::test_serial PASSED [ 40%] >tests/test_crypto.py::TestRevoked::test_date PASSED [ 40%] >tests/test_crypto.py::TestRevoked::test_reason PASSED [ 40%] >tests/test_crypto.py::TestRevoked::test_set_reason_wrong_args[reason0] PASSED [ 40%] >tests/test_crypto.py::TestRevoked::test_set_reason_wrong_args[1.0] PASSED [ 41%] >tests/test_crypto.py::TestRevoked::test_set_reason_wrong_args[foo] PASSED [ 41%] >tests/test_crypto.py::TestRevoked::test_set_reason_invalid_reason PASSED [ 41%] >tests/test_crypto.py::TestCRL::test_construction PASSED [ 41%] >tests/test_crypto.py::TestCRL::test_export_pem PASSED [ 41%] >tests/test_crypto.py::TestCRL::test_export_der PASSED [ 42%] >tests/test_crypto.py::TestCRL::test_export_text PASSED [ 42%] >tests/test_crypto.py::TestCRL::test_export_custom_digest PASSED [ 42%] >tests/test_crypto.py::TestCRL::test_export_md5_digest PASSED [ 42%] >tests/test_crypto.py::TestCRL::test_export_default_digest PASSED [ 42%] >tests/test_crypto.py::TestCRL::test_export_invalid PASSED [ 43%] >tests/test_crypto.py::TestCRL::test_add_revoked_keyword PASSED [ 43%] >tests/test_crypto.py::TestCRL::test_export_wrong_args PASSED [ 43%] >tests/test_crypto.py::TestCRL::test_export_unknown_filetype PASSED [ 43%] >tests/test_crypto.py::TestCRL::test_export_unknown_digest PASSED [ 43%] >tests/test_crypto.py::TestCRL::test_get_revoked PASSED [ 44%] >tests/test_crypto.py::TestCRL::test_load_crl PASSED [ 44%] >tests/test_crypto.py::TestCRL::test_load_crl_bad_filetype PASSED [ 44%] >tests/test_crypto.py::TestCRL::test_load_crl_bad_data PASSED [ 44%] >tests/test_crypto.py::TestCRL::test_get_issuer PASSED [ 44%] >tests/test_crypto.py::TestCRL::test_dump_crl PASSED [ 45%] >tests/test_crypto.py::TestCRL::test_verify_with_revoked FAILED [ 45%] >tests/test_crypto.py::TestCRL::test_verify_with_missing_crl PASSED [ 45%] >tests/test_crypto.py::TestCRL::test_convert_from_cryptography PASSED [ 45%] >tests/test_crypto.py::TestCRL::test_convert_from_cryptography_unsupported_type PASSED [ 45%] >tests/test_crypto.py::TestCRL::test_convert_to_cryptography_key PASSED [ 46%] >tests/test_crypto.py::TestX509StoreContext::test_valid PASSED [ 46%] >tests/test_crypto.py::TestX509StoreContext::test_reuse PASSED [ 46%] >tests/test_crypto.py::TestX509StoreContext::test_trusted_self_signed PASSED [ 46%] >tests/test_crypto.py::TestX509StoreContext::test_untrusted_self_signed PASSED [ 46%] >tests/test_crypto.py::TestX509StoreContext::test_invalid_chain_no_root PASSED [ 47%] >tests/test_crypto.py::TestX509StoreContext::test_invalid_chain_no_intermediate PASSED [ 47%] >tests/test_crypto.py::TestX509StoreContext::test_modification_pre_verify PASSED [ 47%] >tests/test_crypto.py::TestX509StoreContext::test_verify_with_time PASSED [ 47%] >tests/test_crypto.py::TestSignVerify::test_sign_verify PASSED [ 47%] >tests/test_crypto.py::TestSignVerify::test_sign_verify_with_text PASSED [ 48%] >tests/test_crypto.py::TestSignVerify::test_sign_verify_ecdsa PASSED [ 48%] >tests/test_crypto.py::TestSignVerify::test_sign_nulls PASSED [ 48%] >tests/test_crypto.py::TestSignVerify::test_sign_with_large_key PASSED [ 48%] >tests/test_crypto.py::TestEllipticCurve::test_set PASSED [ 48%] >tests/test_crypto.py::TestEllipticCurve::test_a_curve PASSED [ 49%] >tests/test_crypto.py::TestEllipticCurve::test_not_a_curve PASSED [ 49%] >tests/test_crypto.py::TestEllipticCurve::test_repr PASSED [ 49%] >tests/test_crypto.py::TestEllipticCurve::test_to_EC_KEY PASSED [ 49%] >tests/test_crypto.py::TestEllipticCurveEquality::test_identicalEq <- tests/util.py PASSED [ 50%] >tests/test_crypto.py::TestEllipticCurveEquality::test_identicalNe <- tests/util.py PASSED [ 50%] >tests/test_crypto.py::TestEllipticCurveEquality::test_sameEq <- tests/util.py PASSED [ 50%] >tests/test_crypto.py::TestEllipticCurveEquality::test_sameNe <- tests/util.py PASSED [ 50%] >tests/test_crypto.py::TestEllipticCurveEquality::test_differentEq <- tests/util.py PASSED [ 50%] >tests/test_crypto.py::TestEllipticCurveEquality::test_differentNe <- tests/util.py PASSED [ 51%] >tests/test_crypto.py::TestEllipticCurveEquality::test_anotherTypeEq <- tests/util.py PASSED [ 51%] >tests/test_crypto.py::TestEllipticCurveEquality::test_anotherTypeNe <- tests/util.py PASSED [ 51%] >tests/test_crypto.py::TestEllipticCurveEquality::test_delegatedEq <- tests/util.py PASSED [ 51%] >tests/test_crypto.py::TestEllipticCurveEquality::test_delegateNe <- tests/util.py PASSED [ 51%] >tests/test_crypto.py::TestEllipticCurveHash::test_contains PASSED [ 52%] >tests/test_crypto.py::TestEllipticCurveHash::test_does_not_contain PASSED [ 52%] >tests/test_debug.py::test_debug_info PASSED [ 52%] >tests/test_rand.py::TestRand::test_add_wrong_args[args0] PASSED [ 52%] >tests/test_rand.py::TestRand::test_add_wrong_args[args1] PASSED [ 52%] >tests/test_rand.py::TestRand::test_add PASSED [ 53%] >tests/test_rand.py::TestRand::test_status PASSED [ 53%] >tests/test_ssl.py::TestVersion::test_OPENSSL_VERSION_NUMBER PASSED [ 53%] >tests/test_ssl.py::TestVersion::test_SSLeay_version PASSED [ 53%] >tests/test_ssl.py::TestContext::test_set_cipher_list[hello world:AES128-SHA0] PASSED [ 53%] >tests/test_ssl.py::TestContext::test_set_cipher_list[hello world:AES128-SHA1] PASSED [ 54%] >tests/test_ssl.py::TestContext::test_set_cipher_list_wrong_type PASSED [ 54%] >tests/test_ssl.py::TestContext::test_set_cipher_list_no_cipher_match FAILED [ 54%] >tests/test_ssl.py::TestContext::test_load_client_ca PASSED [ 54%] >tests/test_ssl.py::TestContext::test_load_client_ca_invalid PASSED [ 54%] >tests/test_ssl.py::TestContext::test_load_client_ca_unicode PASSED [ 55%] >tests/test_ssl.py::TestContext::test_set_session_id PASSED [ 55%] >tests/test_ssl.py::TestContext::test_set_session_id_fail FAILED [ 55%] >tests/test_ssl.py::TestContext::test_set_session_id_unicode PASSED [ 55%] >tests/test_ssl.py::TestContext::test_method PASSED [ 55%] >tests/test_ssl.py::TestContext::test_type PASSED [ 56%] >tests/test_ssl.py::TestContext::test_use_privatekey PASSED [ 56%] >tests/test_ssl.py::TestContext::test_use_privatekey_file_missing PASSED [ 56%] >tests/test_ssl.py::TestContext::test_wrong_privatekey_file_wrong_args[filetype0] PASSED [ 56%] >tests/test_ssl.py::TestContext::test_wrong_privatekey_file_wrong_args[] PASSED [ 56%] >tests/test_ssl.py::TestContext::test_wrong_privatekey_file_wrong_args[None] PASSED [ 57%] >tests/test_ssl.py::TestContext::test_wrong_privatekey_file_wrong_args[1.0] PASSED [ 57%] >tests/test_ssl.py::TestContext::test_use_privatekey_file_bytes PASSED [ 57%] >tests/test_ssl.py::TestContext::test_use_privatekey_file_unicode PASSED [ 57%] >tests/test_ssl.py::TestContext::test_use_certificate_wrong_args PASSED [ 57%] >tests/test_ssl.py::TestContext::test_use_certificate_uninitialized PASSED [ 58%] >tests/test_ssl.py::TestContext::test_use_certificate PASSED [ 58%] >tests/test_ssl.py::TestContext::test_use_certificate_file_wrong_args PASSED [ 58%] >tests/test_ssl.py::TestContext::test_use_certificate_file_missing PASSED [ 58%] >tests/test_ssl.py::TestContext::test_use_certificate_file_bytes PASSED [ 58%] >tests/test_ssl.py::TestContext::test_use_certificate_file_unicode PASSED [ 59%] >tests/test_ssl.py::TestContext::test_check_privatekey_valid PASSED [ 59%] >tests/test_ssl.py::TestContext::test_check_privatekey_invalid PASSED [ 59%] >tests/test_ssl.py::TestContext::test_app_data PASSED [ 59%] >tests/test_ssl.py::TestContext::test_set_options_wrong_args PASSED [ 59%] >tests/test_ssl.py::TestContext::test_set_options PASSED [ 60%] >tests/test_ssl.py::TestContext::test_set_mode_wrong_args PASSED [ 60%] >tests/test_ssl.py::TestContext::test_set_mode PASSED [ 60%] >tests/test_ssl.py::TestContext::test_set_timeout_wrong_args PASSED [ 60%] >tests/test_ssl.py::TestContext::test_timeout PASSED [ 60%] >tests/test_ssl.py::TestContext::test_set_verify_depth_wrong_args PASSED [ 61%] >tests/test_ssl.py::TestContext::test_verify_depth PASSED [ 61%] >tests/test_ssl.py::TestContext::test_set_passwd_cb_wrong_args PASSED [ 61%] >tests/test_ssl.py::TestContext::test_set_passwd_cb PASSED [ 61%] >tests/test_ssl.py::TestContext::test_passwd_callback_exception PASSED [ 61%] >tests/test_ssl.py::TestContext::test_passwd_callback_false PASSED [ 62%] >tests/test_ssl.py::TestContext::test_passwd_callback_non_string PASSED [ 62%] >tests/test_ssl.py::TestContext::test_passwd_callback_too_long PASSED [ 62%] >tests/test_ssl.py::TestContext::test_set_info_callback PASSED [ 62%] >tests/test_ssl.py::TestContext::test_load_verify_bytes_cafile PASSED [ 62%] >tests/test_ssl.py::TestContext::test_load_verify_unicode_cafile PASSED [ 63%] >tests/test_ssl.py::TestContext::test_load_verify_invalid_file PASSED [ 63%] >tests/test_ssl.py::TestContext::test_load_verify_directory_bytes_capath PASSED [ 63%] >tests/test_ssl.py::TestContext::test_load_verify_directory_unicode_capath PASSED [ 63%] >tests/test_ssl.py::TestContext::test_load_verify_locations_wrong_args PASSED [ 63%] >tests/test_ssl.py::TestContext::test_fallback_default_verify_paths PASSED [ 64%] >tests/test_ssl.py::TestContext::test_check_env_vars PASSED [ 64%] >tests/test_ssl.py::TestContext::test_verify_no_fallback_if_env_vars_set PASSED [ 64%] >tests/test_ssl.py::TestContext::test_fallback_path_is_not_file_or_dir PASSED [ 64%] >tests/test_ssl.py::TestContext::test_add_extra_chain_cert_invalid_cert PASSED [ 64%] >tests/test_ssl.py::TestContext::test_set_verify_callback_connection_argument PASSED [ 65%] >tests/test_ssl.py::TestContext::test_x509_in_verify_works PASSED [ 65%] >tests/test_ssl.py::TestContext::test_set_verify_callback_exception PASSED [ 65%] >tests/test_ssl.py::TestContext::test_add_extra_chain_cert FAILED [ 65%] >tests/test_ssl.py::TestContext::test_use_certificate_chain_file_bytes FAILED [ 65%] >tests/test_ssl.py::TestContext::test_use_certificate_chain_file_unicode FAILED [ 66%] >tests/test_ssl.py::TestContext::test_use_certificate_chain_file_wrong_args PASSED [ 66%] >tests/test_ssl.py::TestContext::test_use_certificate_chain_file_missing_file PASSED [ 66%] >tests/test_ssl.py::TestContext::test_set_verify_mode PASSED [ 66%] >tests/test_ssl.py::TestContext::test_set_verify_wrong_mode_arg[None] PASSED [ 67%] >tests/test_ssl.py::TestContext::test_set_verify_wrong_mode_arg[1.0] PASSED [ 67%] >tests/test_ssl.py::TestContext::test_set_verify_wrong_mode_arg[mode2] PASSED [ 67%] >tests/test_ssl.py::TestContext::test_set_verify_wrong_mode_arg[mode] PASSED [ 67%] >tests/test_ssl.py::TestContext::test_set_verify_wrong_callable_arg[None] PASSED [ 67%] >tests/test_ssl.py::TestContext::test_set_verify_wrong_callable_arg[1.0] PASSED [ 68%] >tests/test_ssl.py::TestContext::test_set_verify_wrong_callable_arg[mode] PASSED [ 68%] >tests/test_ssl.py::TestContext::test_set_verify_wrong_callable_arg[callback3] PASSED [ 68%] >tests/test_ssl.py::TestContext::test_load_tmp_dh_wrong_args PASSED [ 68%] >tests/test_ssl.py::TestContext::test_load_tmp_dh_missing_file PASSED [ 68%] >tests/test_ssl.py::TestContext::test_load_tmp_dh_bytes PASSED [ 69%] >tests/test_ssl.py::TestContext::test_load_tmp_dh_unicode PASSED [ 69%] >tests/test_ssl.py::TestContext::test_set_tmp_ecdh PASSED [ 69%] >tests/test_ssl.py::TestContext::test_set_session_cache_mode_wrong_args PASSED [ 69%] >tests/test_ssl.py::TestContext::test_session_cache_mode PASSED [ 69%] >tests/test_ssl.py::TestContext::test_get_cert_store PASSED [ 70%] >tests/test_ssl.py::TestContext::test_set_tlsext_use_srtp_not_bytes PASSED [ 70%] >tests/test_ssl.py::TestContext::test_set_tlsext_use_srtp_invalid_profile PASSED [ 70%] >tests/test_ssl.py::TestContext::test_set_tlsext_use_srtp_valid PASSED [ 70%] >tests/test_ssl.py::TestServerNameCallback::test_old_callback_forgotten PASSED [ 70%] >tests/test_ssl.py::TestServerNameCallback::test_no_servername PASSED [ 71%] >tests/test_ssl.py::TestServerNameCallback::test_servername PASSED [ 71%] >tests/test_ssl.py::TestNextProtoNegotiation::test_npn_success FAILED [ 71%] >tests/test_ssl.py::TestNextProtoNegotiation::test_npn_client_fail FAILED [ 71%] >tests/test_ssl.py::TestNextProtoNegotiation::test_npn_select_error FAILED [ 71%] >tests/test_ssl.py::TestNextProtoNegotiation::test_npn_advertise_error FAILED [ 72%] >tests/test_ssl.py::TestApplicationLayerProtoNegotiation::test_alpn_success PASSED [ 72%] >tests/test_ssl.py::TestApplicationLayerProtoNegotiation::test_alpn_set_on_connection PASSED [ 72%] >tests/test_ssl.py::TestApplicationLayerProtoNegotiation::test_alpn_server_fail PASSED [ 72%] >tests/test_ssl.py::TestApplicationLayerProtoNegotiation::test_alpn_no_server_overlap PASSED [ 72%] >tests/test_ssl.py::TestApplicationLayerProtoNegotiation::test_alpn_select_cb_returns_invalid_value PASSED [ 73%] >tests/test_ssl.py::TestApplicationLayerProtoNegotiation::test_alpn_no_server PASSED [ 73%] >tests/test_ssl.py::TestApplicationLayerProtoNegotiation::test_alpn_callback_exception PASSED [ 73%] >tests/test_ssl.py::TestSession::test_construction PASSED [ 73%] >tests/test_ssl.py::TestConnection::test_type PASSED [ 73%] >tests/test_ssl.py::TestConnection::test_wrong_args[bad_context0] PASSED [ 74%] >tests/test_ssl.py::TestConnection::test_wrong_args[context] PASSED [ 74%] >tests/test_ssl.py::TestConnection::test_wrong_args[None] PASSED [ 74%] >tests/test_ssl.py::TestConnection::test_wrong_args[1] PASSED [ 74%] >tests/test_ssl.py::TestConnection::test_bio_write_wrong_args[bad_bio0] PASSED [ 74%] >tests/test_ssl.py::TestConnection::test_bio_write_wrong_args[None] PASSED [ 75%] >tests/test_ssl.py::TestConnection::test_bio_write_wrong_args[1] PASSED [ 75%] >tests/test_ssl.py::TestConnection::test_bio_write_wrong_args[bad_bio3] PASSED [ 75%] >tests/test_ssl.py::TestConnection::test_bio_write PASSED [ 75%] >tests/test_ssl.py::TestConnection::test_get_context PASSED [ 75%] >tests/test_ssl.py::TestConnection::test_set_context_wrong_args PASSED [ 76%] >tests/test_ssl.py::TestConnection::test_set_context PASSED [ 76%] >tests/test_ssl.py::TestConnection::test_set_tlsext_host_name_wrong_args PASSED [ 76%] >tests/test_ssl.py::TestConnection::test_pending PASSED [ 76%] >tests/test_ssl.py::TestConnection::test_peek PASSED [ 76%] >tests/test_ssl.py::TestConnection::test_connect_wrong_args PASSED [ 77%] >tests/test_ssl.py::TestConnection::test_connect_refused PASSED [ 77%] >tests/test_ssl.py::TestConnection::test_connect PASSED [ 77%] >tests/test_ssl.py::TestConnection::test_connect_ex PASSED [ 77%] >tests/test_ssl.py::TestConnection::test_accept PASSED [ 77%] >tests/test_ssl.py::TestConnection::test_shutdown_wrong_args PASSED [ 78%] >tests/test_ssl.py::TestConnection::test_shutdown PASSED [ 78%] >tests/test_ssl.py::TestConnection::test_shutdown_closed PASSED [ 78%] >tests/test_ssl.py::TestConnection::test_shutdown_truncated PASSED [ 78%] >tests/test_ssl.py::TestConnection::test_set_shutdown PASSED [ 78%] >tests/test_ssl.py::TestConnection::test_state_string PASSED [ 79%] >tests/test_ssl.py::TestConnection::test_app_data PASSED [ 79%] >tests/test_ssl.py::TestConnection::test_makefile PASSED [ 79%] >tests/test_ssl.py::TestConnection::test_get_certificate PASSED [ 79%] >tests/test_ssl.py::TestConnection::test_get_certificate_none PASSED [ 79%] >tests/test_ssl.py::TestConnection::test_get_peer_cert_chain PASSED [ 80%] >tests/test_ssl.py::TestConnection::test_get_peer_cert_chain_none PASSED [ 80%] >tests/test_ssl.py::TestConnection::test_get_session_unconnected PASSED [ 80%] >tests/test_ssl.py::TestConnection::test_server_get_session PASSED [ 80%] >tests/test_ssl.py::TestConnection::test_client_get_session PASSED [ 80%] >tests/test_ssl.py::TestConnection::test_set_session_wrong_args PASSED [ 81%] >tests/test_ssl.py::TestConnection::test_client_set_session PASSED [ 81%] >tests/test_ssl.py::TestConnection::test_set_session_wrong_method SKIPPED [ 81%] >tests/test_ssl.py::TestConnection::test_wantWriteError PASSED [ 81%] >tests/test_ssl.py::TestConnection::test_get_finished_before_connect PASSED [ 81%] >tests/test_ssl.py::TestConnection::test_get_peer_finished_before_connect PASSED [ 82%] >tests/test_ssl.py::TestConnection::test_get_finished PASSED [ 82%] >tests/test_ssl.py::TestConnection::test_get_peer_finished PASSED [ 82%] >tests/test_ssl.py::TestConnection::test_tls_finished_message_symmetry PASSED [ 82%] >tests/test_ssl.py::TestConnection::test_get_cipher_name_before_connect PASSED [ 82%] >tests/test_ssl.py::TestConnection::test_get_cipher_name PASSED [ 83%] >tests/test_ssl.py::TestConnection::test_get_cipher_version_before_connect PASSED [ 83%] >tests/test_ssl.py::TestConnection::test_get_cipher_version PASSED [ 83%] >tests/test_ssl.py::TestConnection::test_get_cipher_bits_before_connect PASSED [ 83%] >tests/test_ssl.py::TestConnection::test_get_cipher_bits PASSED [ 84%] >tests/test_ssl.py::TestConnection::test_get_protocol_version_name PASSED [ 84%] >tests/test_ssl.py::TestConnection::test_get_protocol_version PASSED [ 84%] >tests/test_ssl.py::TestConnection::test_wantReadError PASSED [ 84%] >tests/test_ssl.py::TestConnection::test_bio_read_wrong_args[1.0] PASSED [ 84%] >tests/test_ssl.py::TestConnection::test_bio_read_wrong_args[None] PASSED [ 85%] >tests/test_ssl.py::TestConnection::test_bio_read_wrong_args[bufsize2] PASSED [ 85%] >tests/test_ssl.py::TestConnection::test_bio_read_wrong_args[bufsize] PASSED [ 85%] >tests/test_ssl.py::TestConnection::test_buffer_size PASSED [ 85%] >tests/test_ssl.py::TestConnectionGetCipherList::test_result PASSED [ 85%] >tests/test_ssl.py::TestConnectionSend::test_wrong_args PASSED [ 86%] >tests/test_ssl.py::TestConnectionSend::test_short_bytes PASSED [ 86%] >tests/test_ssl.py::TestConnectionSend::test_text PASSED [ 86%] >tests/test_ssl.py::TestConnectionSend::test_short_memoryview PASSED [ 86%] >tests/test_ssl.py::TestConnectionSend::test_short_bytearray PASSED [ 86%] >tests/test_ssl.py::TestConnectionSend::test_short_buffer PASSED [ 87%] >tests/test_ssl.py::TestConnectionSend::test_buf_too_large PASSED [ 87%] >tests/test_ssl.py::TestConnectionRecvInto::test_bytearray_no_length PASSED [ 87%] >tests/test_ssl.py::TestConnectionRecvInto::test_bytearray_respects_length PASSED [ 87%] >tests/test_ssl.py::TestConnectionRecvInto::test_bytearray_doesnt_overfill PASSED [ 87%] >tests/test_ssl.py::TestConnectionRecvInto::test_bytearray_really_doesnt_overfill PASSED [ 88%] >tests/test_ssl.py::TestConnectionRecvInto::test_peek PASSED [ 88%] >tests/test_ssl.py::TestConnectionRecvInto::test_memoryview_no_length PASSED [ 88%] >tests/test_ssl.py::TestConnectionRecvInto::test_memoryview_respects_length PASSED [ 88%] >tests/test_ssl.py::TestConnectionRecvInto::test_memoryview_doesnt_overfill PASSED [ 88%] >tests/test_ssl.py::TestConnectionRecvInto::test_memoryview_really_doesnt_overfill PASSED [ 89%] >tests/test_ssl.py::TestConnectionSendall::test_wrong_args PASSED [ 89%] >tests/test_ssl.py::TestConnectionSendall::test_short PASSED [ 89%] >tests/test_ssl.py::TestConnectionSendall::test_text PASSED [ 89%] >tests/test_ssl.py::TestConnectionSendall::test_short_memoryview PASSED [ 89%] >tests/test_ssl.py::TestConnectionSendall::test_short_buffers PASSED [ 90%] >tests/test_ssl.py::TestConnectionSendall::test_long PASSED [ 90%] >tests/test_ssl.py::TestConnectionSendall::test_closed PASSED [ 90%] >tests/test_ssl.py::TestConnectionRenegotiate::test_total_renegotiations PASSED [ 90%] >tests/test_ssl.py::TestConnectionRenegotiate::test_renegotiate FAILED [ 90%] >tests/test_ssl.py::TestError::test_type PASSED [ 91%] >tests/test_ssl.py::TestConstants::test_op_no_query_mtu PASSED [ 91%] >tests/test_ssl.py::TestConstants::test_op_cookie_exchange PASSED [ 91%] >tests/test_ssl.py::TestConstants::test_op_no_ticket PASSED [ 91%] >tests/test_ssl.py::TestConstants::test_op_no_compression FAILED [ 91%] >tests/test_ssl.py::TestConstants::test_sess_cache_off PASSED [ 92%] >tests/test_ssl.py::TestConstants::test_sess_cache_client PASSED [ 92%] >tests/test_ssl.py::TestConstants::test_sess_cache_server PASSED [ 92%] >tests/test_ssl.py::TestConstants::test_sess_cache_both PASSED [ 92%] >tests/test_ssl.py::TestConstants::test_sess_cache_no_auto_clear PASSED [ 92%] >tests/test_ssl.py::TestConstants::test_sess_cache_no_internal_lookup PASSED [ 93%] >tests/test_ssl.py::TestConstants::test_sess_cache_no_internal_store PASSED [ 93%] >tests/test_ssl.py::TestConstants::test_sess_cache_no_internal PASSED [ 93%] >tests/test_ssl.py::TestMemoryBIO::test_memory_connect PASSED [ 93%] >tests/test_ssl.py::TestMemoryBIO::test_socket_connect PASSED [ 93%] >tests/test_ssl.py::TestMemoryBIO::test_socket_overrides_memory PASSED [ 94%] >tests/test_ssl.py::TestMemoryBIO::test_outgoing_overflow PASSED [ 94%] >tests/test_ssl.py::TestMemoryBIO::test_shutdown PASSED [ 94%] >tests/test_ssl.py::TestMemoryBIO::test_unexpected_EOF PASSED [ 94%] >tests/test_ssl.py::TestMemoryBIO::test_set_client_ca_list_errors PASSED [ 94%] >tests/test_ssl.py::TestMemoryBIO::test_set_empty_ca_list PASSED [ 95%] >tests/test_ssl.py::TestMemoryBIO::test_set_one_ca_list PASSED [ 95%] >tests/test_ssl.py::TestMemoryBIO::test_set_multiple_ca_list PASSED [ 95%] >tests/test_ssl.py::TestMemoryBIO::test_reset_ca_list PASSED [ 95%] >tests/test_ssl.py::TestMemoryBIO::test_mutated_ca_list PASSED [ 95%] >tests/test_ssl.py::TestMemoryBIO::test_add_client_ca_wrong_args PASSED [ 96%] >tests/test_ssl.py::TestMemoryBIO::test_one_add_client_ca PASSED [ 96%] >tests/test_ssl.py::TestMemoryBIO::test_multiple_add_client_ca PASSED [ 96%] >tests/test_ssl.py::TestMemoryBIO::test_set_and_add_client_ca PASSED [ 96%] >tests/test_ssl.py::TestMemoryBIO::test_set_after_add_client_ca PASSED [ 96%] >tests/test_ssl.py::TestInfoConstants::test_integers PASSED [ 97%] >tests/test_ssl.py::TestRequires::test_available PASSED [ 97%] >tests/test_ssl.py::TestRequires::test_unavailable PASSED [ 97%] >tests/test_ssl.py::TestOCSP::test_callbacks_arent_called_by_default PASSED [ 97%] >tests/test_ssl.py::TestOCSP::test_client_negotiates_without_server PASSED [ 97%] >tests/test_ssl.py::TestOCSP::test_client_receives_servers_data PASSED [ 98%] >tests/test_ssl.py::TestOCSP::test_callbacks_are_invoked_with_connections PASSED [ 98%] >tests/test_ssl.py::TestOCSP::test_opaque_data_is_passed_through PASSED [ 98%] >tests/test_ssl.py::TestOCSP::test_server_returns_empty_string PASSED [ 98%] >tests/test_ssl.py::TestOCSP::test_client_returns_false_terminates_handshake PASSED [ 98%] >tests/test_ssl.py::TestOCSP::test_exceptions_in_client_bubble_up PASSED [ 99%] >tests/test_ssl.py::TestOCSP::test_exceptions_in_server_bubble_up PASSED [ 99%] >tests/test_ssl.py::TestOCSP::test_server_must_return_bytes PASSED [ 99%] >tests/test_tsafe.py::TestConnection::test_instantiation PASSED [ 99%] >tests/test_util.py::TestErrors::test_exception_from_error_queue_nonexistent_reason PASSED [100%] > >=================================== FAILURES =================================== >_________________________ TestX509.test_set_notBefore __________________________ > >self = <tests.test_crypto.TestX509 instance at 0x7ffff59d10a0> > > def test_set_notBefore(self): > """ > `X509.set_notBefore` takes a string in the format of an > ASN1 GENERALIZEDTIME and sets the beginning of the certificate's > validity period to it. > """ >> self._setBoundTest("Before") > >tests/test_crypto.py:1597: >_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ >tests/test_crypto.py:1569: in _setBoundTest > set(when) >../pyOpenSSL-19.1.0-python2_7/lib/OpenSSL/crypto.py:1365: in set_notBefore > return self._set_boundary_time(_lib.X509_get_notBefore, when) >../pyOpenSSL-19.1.0-python2_7/lib/OpenSSL/crypto.py:1352: in _set_boundary_time > return _set_asn1_time(which(self._x509), when) >_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ > >boundary = <cdata 'struct asn1_string_st *' 0x555555e42d30> >when = '20040203040506+0530' > > def _set_asn1_time(boundary, when): > """ > The the time value of an ASN1 time object. > > @param boundary: An ASN1_TIME pointer (or an object safely > castable to that type) which will have its value set. > @param when: A string representation of the desired time value. > > @raise TypeError: If C{when} is not a L{bytes} string. > @raise ValueError: If C{when} does not represent a time in the required > format. > @raise RuntimeError: If the time value cannot be set for some other > (unspecified) reason. > """ > if not isinstance(when, bytes): > raise TypeError("when must be a byte string") > > set_result = _lib.ASN1_TIME_set_string(boundary, when) > if set_result == 0: >> raise ValueError("Invalid string") >E ValueError: Invalid string > >../pyOpenSSL-19.1.0-python2_7/lib/OpenSSL/crypto.py:162: ValueError >__________________________ TestX509.test_set_notAfter __________________________ > >self = <tests.test_crypto.TestX509 instance at 0x7ffff57fa410> > > def test_set_notAfter(self): > """ > `X509.set_notAfter` takes a string in the format of an ASN1 > GENERALIZEDTIME and sets the end of the certificate's validity period > to it. > """ >> self._setBoundTest("After") > >tests/test_crypto.py:1605: >_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ >tests/test_crypto.py:1569: in _setBoundTest > set(when) >../pyOpenSSL-19.1.0-python2_7/lib/OpenSSL/crypto.py:1391: in set_notAfter > return self._set_boundary_time(_lib.X509_get_notAfter, when) >../pyOpenSSL-19.1.0-python2_7/lib/OpenSSL/crypto.py:1352: in _set_boundary_time > return _set_asn1_time(which(self._x509), when) >_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ > >boundary = <cdata 'struct asn1_string_st *' 0x555555b98ea0> >when = '20040203040506+0530' > > def _set_asn1_time(boundary, when): > """ > The the time value of an ASN1 time object. > > @param boundary: An ASN1_TIME pointer (or an object safely > castable to that type) which will have its value set. > @param when: A string representation of the desired time value. > > @raise TypeError: If C{when} is not a L{bytes} string. > @raise ValueError: If C{when} does not represent a time in the required > format. > @raise RuntimeError: If the time value cannot be set for some other > (unspecified) reason. > """ > if not isinstance(when, bytes): > raise TypeError("when must be a byte string") > > set_result = _lib.ASN1_TIME_set_string(boundary, when) > if set_result == 0: >> raise ValueError("Invalid string") >E ValueError: Invalid string > >../pyOpenSSL-19.1.0-python2_7/lib/OpenSSL/crypto.py:162: ValueError >_______________________ TestCRL.test_verify_with_revoked _______________________ > >self = <tests.test_crypto.TestCRL object at 0x7ffff5860750> > > def test_verify_with_revoked(self): > """ > `verify_certificate` raises error when an intermediate certificate is > revoked. > """ > store = X509Store() > store.add_cert(self.root_cert) > store.add_cert(self.intermediate_cert) > root_crl = self._make_test_crl( > self.root_cert, self.root_key, certs=[self.intermediate_cert]) > intermediate_crl = self._make_test_crl( > self.intermediate_cert, self.intermediate_key, certs=[]) > store.add_crl(root_crl) > store.add_crl(intermediate_crl) > store.set_flags( > X509StoreFlags.CRL_CHECK | X509StoreFlags.CRL_CHECK_ALL) > store_ctx = X509StoreContext(store, self.intermediate_server_cert) > with pytest.raises(X509StoreContextError) as err: > store_ctx.verify_certificate() >> assert err.value.args[0][2] == 'certificate revoked' >E AssertionError: assert 'format error...tUpdate field' == 'certificate revoked' >E - format error in CRL's lastUpdate field >E + certificate revoked > >tests/test_crypto.py:3416: AssertionError >_______________ TestContext.test_set_cipher_list_no_cipher_match _______________ > >self = <tests.test_ssl.TestContext object at 0x7ffff5913790> >context = <OpenSSL.SSL.Context object at 0x7ffff5913150> > > @flaky.flaky > def test_set_cipher_list_no_cipher_match(self, context): > """ > `Context.set_cipher_list` raises `OpenSSL.SSL.Error` with a > `"no cipher match"` reason string regardless of the TLS > version. > """ > with pytest.raises(Error) as excinfo: > context.set_cipher_list(b"imaginary-cipher") >> assert excinfo.value.args == ( > [ > ( > 'SSL routines', > 'SSL_CTX_set_cipher_list', > 'no cipher match', > ), > ], > ) >E AssertionError: assert ([('SSL routi...her match')],) == ([('SSL routin...her match')],) >E At index 0 diff: [('SSL routines', '(UNKNOWN)SSL_internal', 'no cipher match')] != [('SSL routines', 'SSL_CTX_set_cipher_list', 'no cipher match')] >E Full diff: >E - ([('SSL routines', '(UNKNOWN)SSL_internal', 'no cipher match')],) >E + ([('SSL routines', 'SSL_CTX_set_cipher_list', 'no cipher match')],) > >tests/test_ssl.py:450: AssertionError >_____________________ TestContext.test_set_session_id_fail _____________________ > >self = <tests.test_ssl.TestContext object at 0x7ffff59e77d0> >context = <OpenSSL.SSL.Context object at 0x7ffff59e7f50> > > def test_set_session_id_fail(self, context): > """ > `Context.set_session_id` errors are propagated. > """ > with pytest.raises(Error) as e: > context.set_session_id(b"abc" * 1000) > >> assert [ > ("SSL routines", > "SSL_CTX_set_session_id_context", > "ssl session id context too long") > ] == e.value.args[0] >E AssertionError: assert [('SSL routin...xt too long')] == [('SSL routine...xt too long')] >E At index 0 diff: ('SSL routines', 'SSL_CTX_set_session_id_context', 'ssl session id context too long') != ('SSL routines', '(UNKNOWN)SSL_internal', 'ssl session id context too long') >E Full diff: >E + [('SSL routines', '(UNKNOWN)SSL_internal', 'ssl session id context too long')] >E - [('SSL routines', >E - 'SSL_CTX_set_session_id_context', >E - 'ssl session id context too long')] > >tests/test_ssl.py:499: AssertionError >____________________ TestContext.test_add_extra_chain_cert _____________________ > >self = <tests.test_ssl.TestContext object at 0x7ffff5a5d5d0> >tmpdir = local('/var/tmp/portage/dev-python/pyopenssl-19.1.0/temp/pytest-of-portage/pytest-0/test_add_extra_chain_cert0') > > def test_add_extra_chain_cert(self, tmpdir): > """ > `Context.add_extra_chain_cert` accepts an `X509` > instance to add to the certificate chain. > > See `_create_certificate_chain` for the details of the > certificate chain tested. > > The chain is tested by starting a server with scert and connecting > to it with a client which trusts cacert and requires verification to > succeed. > """ > chain = _create_certificate_chain() > [(cakey, cacert), (ikey, icert), (skey, scert)] = chain > > # Dump the CA certificate to a file because that's the only way to load > # it as a trusted CA in the client context. > for cert, name in [(cacert, 'ca.pem'), > (icert, 'i.pem'), > (scert, 's.pem')]: > with tmpdir.join(name).open('w') as f: > f.write(dump_certificate(FILETYPE_PEM, cert).decode('ascii')) > > for key, name in [(cakey, 'ca.key'), > (ikey, 'i.key'), > (skey, 's.key')]: > with tmpdir.join(name).open('w') as f: > f.write(dump_privatekey(FILETYPE_PEM, key).decode('ascii')) > > # Create the server context > serverContext = Context(TLSv1_METHOD) > serverContext.use_privatekey(skey) > serverContext.use_certificate(scert) > # The client already has cacert, we only need to give them icert. > serverContext.add_extra_chain_cert(icert) > > # Create the client > clientContext = Context(TLSv1_METHOD) > clientContext.set_verify( > VERIFY_PEER | VERIFY_FAIL_IF_NO_PEER_CERT, verify_cb) > clientContext.load_verify_locations(str(tmpdir.join("ca.pem"))) > > # Try it out. >> self._handshake_test(serverContext, clientContext) > >tests/test_ssl.py:1334: >_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ >tests/test_ssl.py:1212: in _handshake_test > s.do_handshake() >../pyOpenSSL-19.1.0-python2_7/lib/OpenSSL/SSL.py:1934: in do_handshake > self._raise_ssl_error(self._ssl, result) >../pyOpenSSL-19.1.0-python2_7/lib/OpenSSL/SSL.py:1671: in _raise_ssl_error > _raise_current_error() >_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ > >exception_type = <class 'OpenSSL.SSL.Error'> > > def exception_from_error_queue(exception_type): > """ > Convert an OpenSSL library failure into a Python exception. > > When a call to the native OpenSSL library fails, this is usually signalled > by the return value, and an error code is stored in an error queue > associated with the current thread. The err library provides functions to > obtain these error codes and textual error messages. > """ > errors = [] > > while True: > error = lib.ERR_get_error() > if error == 0: > break > errors.append(( > text(lib.ERR_lib_error_string(error)), > text(lib.ERR_func_error_string(error)), > text(lib.ERR_reason_error_string(error)))) > >> raise exception_type(errors) >E Error: [('SSL routines', 'CONNECT_CR_CERT', 'certificate verify failed')] > >../pyOpenSSL-19.1.0-python2_7/lib/OpenSSL/_util.py:54: Error >______________ TestContext.test_use_certificate_chain_file_bytes _______________ > >self = <tests.test_ssl.TestContext object at 0x7ffff5f5e710> >tmpfile = '/var/tmp/portage/dev-python/pyopenssl-19.1.0/temp/pytest-of-portage/pytest-0/tmpmwKVCi' > > def test_use_certificate_chain_file_bytes(self, tmpfile): > """ > ``Context.use_certificate_chain_file`` accepts the name of a file (as > an instance of ``bytes``) to specify additional certificates to use to > construct and verify a trust chain. > """ > self._use_certificate_chain_file_test( >> tmpfile + NON_ASCII.encode(getfilesystemencoding()) > ) > >tests/test_ssl.py:1381: >_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ >tests/test_ssl.py:1372: in _use_certificate_chain_file_test > self._handshake_test(serverContext, clientContext) >tests/test_ssl.py:1212: in _handshake_test > s.do_handshake() >../pyOpenSSL-19.1.0-python2_7/lib/OpenSSL/SSL.py:1934: in do_handshake > self._raise_ssl_error(self._ssl, result) >../pyOpenSSL-19.1.0-python2_7/lib/OpenSSL/SSL.py:1671: in _raise_ssl_error > _raise_current_error() >_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ > >exception_type = <class 'OpenSSL.SSL.Error'> > > def exception_from_error_queue(exception_type): > """ > Convert an OpenSSL library failure into a Python exception. > > When a call to the native OpenSSL library fails, this is usually signalled > by the return value, and an error code is stored in an error queue > associated with the current thread. The err library provides functions to > obtain these error codes and textual error messages. > """ > errors = [] > > while True: > error = lib.ERR_get_error() > if error == 0: > break > errors.append(( > text(lib.ERR_lib_error_string(error)), > text(lib.ERR_func_error_string(error)), > text(lib.ERR_reason_error_string(error)))) > >> raise exception_type(errors) >E Error: [('SSL routines', 'CONNECT_CR_CERT', 'certificate verify failed')] > >../pyOpenSSL-19.1.0-python2_7/lib/OpenSSL/_util.py:54: Error >_____________ TestContext.test_use_certificate_chain_file_unicode ______________ > >self = <tests.test_ssl.TestContext object at 0x7ffff58cf7d0> >tmpfile = '/var/tmp/portage/dev-python/pyopenssl-19.1.0/temp/pytest-of-portage/pytest-0/tmpMtRbVQ' > > def test_use_certificate_chain_file_unicode(self, tmpfile): > """ > ``Context.use_certificate_chain_file`` accepts the name of a file (as > an instance of ``unicode``) to specify additional certificates to use > to construct and verify a trust chain. > """ > self._use_certificate_chain_file_test( >> tmpfile.decode(getfilesystemencoding()) + NON_ASCII > ) > >tests/test_ssl.py:1391: >_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ >tests/test_ssl.py:1372: in _use_certificate_chain_file_test > self._handshake_test(serverContext, clientContext) >tests/test_ssl.py:1212: in _handshake_test > s.do_handshake() >../pyOpenSSL-19.1.0-python2_7/lib/OpenSSL/SSL.py:1934: in do_handshake > self._raise_ssl_error(self._ssl, result) >../pyOpenSSL-19.1.0-python2_7/lib/OpenSSL/SSL.py:1671: in _raise_ssl_error > _raise_current_error() >_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ > >exception_type = <class 'OpenSSL.SSL.Error'> > > def exception_from_error_queue(exception_type): > """ > Convert an OpenSSL library failure into a Python exception. > > When a call to the native OpenSSL library fails, this is usually signalled > by the return value, and an error code is stored in an error queue > associated with the current thread. The err library provides functions to > obtain these error codes and textual error messages. > """ > errors = [] > > while True: > error = lib.ERR_get_error() > if error == 0: > break > errors.append(( > text(lib.ERR_lib_error_string(error)), > text(lib.ERR_func_error_string(error)), > text(lib.ERR_reason_error_string(error)))) > >> raise exception_type(errors) >E Error: [('SSL routines', 'CONNECT_CR_CERT', 'certificate verify failed')] > >../pyOpenSSL-19.1.0-python2_7/lib/OpenSSL/_util.py:54: Error >__________________ TestNextProtoNegotiation.test_npn_success ___________________ > >self = <tests.test_ssl.TestNextProtoNegotiation object at 0x7ffff54a73d0> > > def test_npn_success(self): > """ > Tests that clients and servers that agree on the negotiated next > protocol can correct establish a connection, and that the agreed > protocol is reported by the connections. > """ > advertise_args = [] > select_args = [] > > def advertise(conn): > advertise_args.append((conn,)) > return [b'http/1.1', b'spdy/2'] > > def select(conn, options): > select_args.append((conn, options)) > return b'spdy/2' > > server_context = Context(TLSv1_METHOD) > server_context.set_npn_advertise_callback(advertise) > > client_context = Context(TLSv1_METHOD) > client_context.set_npn_select_callback(select) > > # Necessary to actually accept the connection > server_context.use_privatekey( > load_privatekey(FILETYPE_PEM, server_key_pem)) > server_context.use_certificate( > load_certificate(FILETYPE_PEM, server_cert_pem)) > > # Do a little connection to trigger the logic > server = Connection(server_context, None) > server.set_accept_state() > > client = Connection(client_context, None) > client.set_connect_state() > > interact_in_memory(server, client) > >> assert advertise_args == [(server,)] >E assert [] == [(<OpenSSL.SSL.Connection object at 0x7ffff54a7a10>,)] >E Right contains one more item: (<OpenSSL.SSL.Connection object at 0x7ffff54a7a10>,) >E Full diff: >E - [] >E + [(<OpenSSL.SSL.Connection object at 0x7ffff54a7a10>,)] > >tests/test_ssl.py:1715: AssertionError >________________ TestNextProtoNegotiation.test_npn_client_fail _________________ > >self = <tests.test_ssl.TestNextProtoNegotiation object at 0x7ffff4e52ed0> > > def test_npn_client_fail(self): > """ > Tests that when clients and servers cannot agree on what protocol > to use next that the TLS connection does not get established. > """ > advertise_args = [] > select_args = [] > > def advertise(conn): > advertise_args.append((conn,)) > return [b'http/1.1', b'spdy/2'] > > def select(conn, options): > select_args.append((conn, options)) > return b'' > > server_context = Context(TLSv1_METHOD) > server_context.set_npn_advertise_callback(advertise) > > client_context = Context(TLSv1_METHOD) > client_context.set_npn_select_callback(select) > > # Necessary to actually accept the connection > server_context.use_privatekey( > load_privatekey(FILETYPE_PEM, server_key_pem)) > server_context.use_certificate( > load_certificate(FILETYPE_PEM, server_cert_pem)) > > # Do a little connection to trigger the logic > server = Connection(server_context, None) > server.set_accept_state() > > client = Connection(client_context, None) > client.set_connect_state() > > # If the client doesn't return anything, the connection will fail. > with pytest.raises(Error): >> interact_in_memory(server, client) >E Failed: DID NOT RAISE <class 'OpenSSL.SSL.Error'> > >tests/test_ssl.py:1758: Failed >________________ TestNextProtoNegotiation.test_npn_select_error ________________ > >self = <tests.test_ssl.TestNextProtoNegotiation object at 0x7ffff53aea90> > > def test_npn_select_error(self): > """ > Test that we can handle exceptions in the select callback. If > select fails it should be fatal to the connection. > """ > advertise_args = [] > > def advertise(conn): > advertise_args.append((conn,)) > return [b'http/1.1', b'spdy/2'] > > def select(conn, options): > raise TypeError > > server_context = Context(TLSv1_METHOD) > server_context.set_npn_advertise_callback(advertise) > > client_context = Context(TLSv1_METHOD) > client_context.set_npn_select_callback(select) > > # Necessary to actually accept the connection > server_context.use_privatekey( > load_privatekey(FILETYPE_PEM, server_key_pem)) > server_context.use_certificate( > load_certificate(FILETYPE_PEM, server_cert_pem)) > > # Do a little connection to trigger the logic > server = Connection(server_context, None) > server.set_accept_state() > > client = Connection(client_context, None) > client.set_connect_state() > > # If the callback throws an exception it should be raised here. > with pytest.raises(TypeError): >> interact_in_memory(server, client) >E Failed: DID NOT RAISE <type 'exceptions.TypeError'> > >tests/test_ssl.py:1798: Failed >______________ TestNextProtoNegotiation.test_npn_advertise_error _______________ > >self = <tests.test_ssl.TestNextProtoNegotiation object at 0x7ffff53ece50> > > def test_npn_advertise_error(self): > """ > Test that we can handle exceptions in the advertise callback. If > advertise fails no NPN is advertised to the client. > """ > select_args = [] > > def advertise(conn): > raise TypeError > > def select(conn, options): # pragma: nocover > """ > Assert later that no args are actually appended. > """ > select_args.append((conn, options)) > return b'' > > server_context = Context(TLSv1_METHOD) > server_context.set_npn_advertise_callback(advertise) > > client_context = Context(TLSv1_METHOD) > client_context.set_npn_select_callback(select) > > # Necessary to actually accept the connection > server_context.use_privatekey( > load_privatekey(FILETYPE_PEM, server_key_pem)) > server_context.use_certificate( > load_certificate(FILETYPE_PEM, server_cert_pem)) > > # Do a little connection to trigger the logic > server = Connection(server_context, None) > server.set_accept_state() > > client = Connection(client_context, None) > client.set_connect_state() > > # If the client doesn't return anything, the connection will fail. > with pytest.raises(TypeError): >> interact_in_memory(server, client) >E Failed: DID NOT RAISE <type 'exceptions.TypeError'> > >tests/test_ssl.py:1839: Failed >__________________ TestConnectionRenegotiate.test_renegotiate __________________ > >self = <tests.test_ssl.TestConnectionRenegotiate object at 0x7ffff506c350> > > def test_renegotiate(self): > """ > Go through a complete renegotiation cycle. > """ > server, client = loopback( > lambda s: loopback_server_factory(s, TLSv1_2_METHOD), > lambda s: loopback_client_factory(s, TLSv1_2_METHOD), > ) > > server.send(b"hello world") > > assert b"hello world" == client.recv(len(b"hello world")) > > assert 0 == server.total_renegotiations() > assert False is server.renegotiate_pending() > > assert True is server.renegotiate() > > assert True is server.renegotiate_pending() > > server.setblocking(False) > client.setblocking(False) > > client.do_handshake() >> server.do_handshake() > >tests/test_ssl.py:3247: >_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ >../pyOpenSSL-19.1.0-python2_7/lib/OpenSSL/SSL.py:1934: in do_handshake > self._raise_ssl_error(self._ssl, result) >../pyOpenSSL-19.1.0-python2_7/lib/OpenSSL/SSL.py:1671: in _raise_ssl_error > _raise_current_error() >_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ > >exception_type = <class 'OpenSSL.SSL.Error'> > > def exception_from_error_queue(exception_type): > """ > Convert an OpenSSL library failure into a Python exception. > > When a call to the native OpenSSL library fails, this is usually signalled > by the return value, and an error code is stored in an error queue > associated with the current thread. The err library provides functions to > obtain these error codes and textual error messages. > """ > errors = [] > > while True: > error = lib.ERR_get_error() > if error == 0: > break > errors.append(( > text(lib.ERR_lib_error_string(error)), > text(lib.ERR_func_error_string(error)), > text(lib.ERR_reason_error_string(error)))) > >> raise exception_type(errors) >E Error: [('SSL routines', 'ST_OK', 'internal error')] > >../pyOpenSSL-19.1.0-python2_7/lib/OpenSSL/_util.py:54: Error >_____________________ TestConstants.test_op_no_compression _____________________ > >self = <tests.test_ssl.TestConstants object at 0x7ffff56911d0> > > @pytest.mark.skipif( > OP_NO_COMPRESSION is None, > reason="OP_NO_COMPRESSION unavailable - OpenSSL version may be too old" > ) > def test_op_no_compression(self): > """ > The value of `OpenSSL.SSL.OP_NO_COMPRESSION` is 0x20000, the > value of `SSL_OP_NO_COMPRESSION` defined by `openssl/ssl.h`. > """ >> assert OP_NO_COMPRESSION == 0x20000 >E assert 0 == 131072 >E -0 >E +131072 > >tests/test_ssl.py:3317: AssertionError >=============================== warnings summary =============================== >/usr/lib64/python2.7/site-packages/_pytest/assertion/rewrite.py:304 > /usr/lib64/python2.7/site-packages/_pytest/assertion/rewrite.py:304: DeprecationWarning: OpenSSL.tsafe is deprecated and will be removed > exec(co, mod.__dict__) > >tests/test_crypto.py::TestSignVerify::test_sign_verify_ecdsa > /var/tmp/portage/dev-python/pyopenssl-19.1.0/work/pyOpenSSL-19.1.0/tests/test_crypto.py:3674: DeprecationWarning: unicode for data is no longer accepted, use bytes > sig = sign(priv_key, content, "sha1") > >tests/test_crypto.py::TestSignVerify::test_sign_verify_ecdsa > /var/tmp/portage/dev-python/pyopenssl-19.1.0/work/pyOpenSSL-19.1.0/tests/test_crypto.py:3675: DeprecationWarning: unicode for data is no longer accepted, use bytes > verify(cert, sig, content, "sha1") > >tests/test_ssl.py::TestContext::test_set_cipher_list[hello world:AES128-SHA1] > /var/tmp/portage/dev-python/pyopenssl-19.1.0/work/pyOpenSSL-19.1.0/tests/test_ssl.py:428: DeprecationWarning: unicode for cipher_list is no longer accepted, use bytes > context.set_cipher_list(cipher_string) > >tests/test_ssl.py::TestContext::test_verify_no_fallback_if_env_vars_set > /usr/lib64/python2.7/site-packages/_pytest/monkeypatch.py:230: PytestWarning: Environment variable name u'SSL_CERT_DIR' should be str > "Environment variable name {!r} should be str".format(name) > >tests/test_ssl.py::TestContext::test_verify_no_fallback_if_env_vars_set > /usr/lib64/python2.7/site-packages/_pytest/monkeypatch.py:230: PytestWarning: Environment variable name u'SSL_CERT_FILE' should be str > "Environment variable name {!r} should be str".format(name) > >tests/test_ssl.py::TestNextProtoNegotiation::test_npn_success > /var/tmp/portage/dev-python/pyopenssl-19.1.0/work/pyOpenSSL-19.1.0/tests/test_ssl.py:1695: DeprecationWarning: NPN is deprecated. Protocols should switch to using ALPN. > server_context.set_npn_advertise_callback(advertise) > >tests/test_ssl.py::TestNextProtoNegotiation::test_npn_success > /var/tmp/portage/dev-python/pyopenssl-19.1.0/work/pyOpenSSL-19.1.0/tests/test_ssl.py:1698: DeprecationWarning: NPN is deprecated. Protocols should switch to using ALPN. > client_context.set_npn_select_callback(select) > >tests/test_ssl.py::TestNextProtoNegotiation::test_npn_client_fail > /var/tmp/portage/dev-python/pyopenssl-19.1.0/work/pyOpenSSL-19.1.0/tests/test_ssl.py:1738: DeprecationWarning: NPN is deprecated. Protocols should switch to using ALPN. > server_context.set_npn_advertise_callback(advertise) > >tests/test_ssl.py::TestNextProtoNegotiation::test_npn_client_fail > /var/tmp/portage/dev-python/pyopenssl-19.1.0/work/pyOpenSSL-19.1.0/tests/test_ssl.py:1741: DeprecationWarning: NPN is deprecated. Protocols should switch to using ALPN. > client_context.set_npn_select_callback(select) > >tests/test_ssl.py::TestNextProtoNegotiation::test_npn_select_error > /var/tmp/portage/dev-python/pyopenssl-19.1.0/work/pyOpenSSL-19.1.0/tests/test_ssl.py:1778: DeprecationWarning: NPN is deprecated. Protocols should switch to using ALPN. > server_context.set_npn_advertise_callback(advertise) > >tests/test_ssl.py::TestNextProtoNegotiation::test_npn_select_error > /var/tmp/portage/dev-python/pyopenssl-19.1.0/work/pyOpenSSL-19.1.0/tests/test_ssl.py:1781: DeprecationWarning: NPN is deprecated. Protocols should switch to using ALPN. > client_context.set_npn_select_callback(select) > >tests/test_ssl.py::TestNextProtoNegotiation::test_npn_advertise_error > /var/tmp/portage/dev-python/pyopenssl-19.1.0/work/pyOpenSSL-19.1.0/tests/test_ssl.py:1819: DeprecationWarning: NPN is deprecated. Protocols should switch to using ALPN. > server_context.set_npn_advertise_callback(advertise) > >tests/test_ssl.py::TestNextProtoNegotiation::test_npn_advertise_error > /var/tmp/portage/dev-python/pyopenssl-19.1.0/work/pyOpenSSL-19.1.0/tests/test_ssl.py:1822: DeprecationWarning: NPN is deprecated. Protocols should switch to using ALPN. > client_context.set_npn_select_callback(select) > >-- Docs: https://docs.pytest.org/en/latest/warnings.html >===Flaky Test Report=== > >test_gmtime_adj_notBefore passed 1 out of the required 1 times. Success! >test_gmtime_adj_notAfter passed 1 out of the required 1 times. Success! >test_export_text passed 1 out of the required 1 times. Success! >test_set_cipher_list_no_cipher_match failed (1 runs remaining out of 2). > <type 'exceptions.AssertionError'> > assert ([('SSL routi...her match')],) == ([('SSL routin...her match')],) > At index 0 diff: [('SSL routines', '(UNKNOWN)SSL_internal', 'no cipher match')] != [('SSL routines', 'SSL_CTX_set_cipher_list', 'no cipher match')] > Full diff: > - ([('SSL routines', '(UNKNOWN)SSL_internal', 'no cipher match')],) > + ([('SSL routines', 'SSL_CTX_set_cipher_list', 'no cipher match')],) > [<TracebackEntry /var/tmp/portage/dev-python/pyopenssl-19.1.0/work/pyOpenSSL-19.1.0/tests/test_ssl.py:450>] >test_set_cipher_list_no_cipher_match failed; it passed 0 out of the required 1 times. > <type 'exceptions.AssertionError'> > assert ([('SSL routi...her match')],) == ([('SSL routin...her match')],) > At index 0 diff: [('SSL routines', '(UNKNOWN)SSL_internal', 'no cipher match')] != [('SSL routines', 'SSL_CTX_set_cipher_list', 'no cipher match')] > Full diff: > - ([('SSL routines', '(UNKNOWN)SSL_internal', 'no cipher match')],) > + ([('SSL routines', 'SSL_CTX_set_cipher_list', 'no cipher match')],) > [<TracebackEntry /var/tmp/portage/dev-python/pyopenssl-19.1.0/work/pyOpenSSL-19.1.0/tests/test_ssl.py:450>] > >===End Flaky Test Report=== >======== 14 failed, 479 passed, 1 skipped, 14 warnings in 11.57 seconds ======== > * ERROR: dev-python/pyopenssl-19.1.0::gentoo failed (test phase): > * Testing failed with python2.7 > * > * Call stack: > * ebuild.sh, line 125: Called src_test > * environment, line 3392: Called distutils-r1_src_test > * environment, line 1418: Called _distutils-r1_run_foreach_impl 'python_test' > * environment, line 474: Called python_foreach_impl 'distutils-r1_run_phase' 'python_test' > * environment, line 2902: Called multibuild_foreach_variant '_python_multibuild_wrapper' 'distutils-r1_run_phase' 'python_test' > * environment, line 2341: Called _multibuild_run '_python_multibuild_wrapper' 'distutils-r1_run_phase' 'python_test' > * environment, line 2339: Called _python_multibuild_wrapper 'distutils-r1_run_phase' 'python_test' > * environment, line 920: Called distutils-r1_run_phase 'python_test' > * environment, line 1355: Called python_test > * environment, line 3252: Called die > * The specific snippet of code: > * TZ=UTC pytest -vv || die "Testing failed with ${EPYTHON}" > * > * If you need support, post the output of `emerge --info '=dev-python/pyopenssl-19.1.0::gentoo'`, > * the complete build log and the output of `emerge -pqv '=dev-python/pyopenssl-19.1.0::gentoo'`. > * The complete build log is located at '/var/log/portage/dev-python:pyopenssl-19.1.0:20200709-071346.log'. > * For convenience, a symlink to the build log is located at '/var/tmp/portage/dev-python/pyopenssl-19.1.0/temp/build.log'. > * The ebuild environment file is located at '/var/tmp/portage/dev-python/pyopenssl-19.1.0/temp/environment'. > * Working directory: '/var/tmp/portage/dev-python/pyopenssl-19.1.0/work/pyOpenSSL-19.1.0' > * S: '/var/tmp/portage/dev-python/pyopenssl-19.1.0/work/pyOpenSSL-19.1.0'
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 731954
:
648648
| 648650 |
648652
|
648654
|
648656
|
648658
|
648660