-
- 0:03:39 load avg: 4.50 [363/398/1] test_ssl
- Resource 'sha256.tbs-internet.com' is not available
- test test_ssl failed -- Traceback (most recent call last):
- File "/home/m/Python-3.5.6/Lib/test/test_ssl.py", line 3183, in test_alpn_protocols
- self.assertIsInstance(stats, ssl.SSLError)
- AssertionError: {'client_npn_protocol': None, 'client_alpn_protocol': None, 'cipher': ('ECDHE-RSA-AES256-GCM-SHA384', 'TLSv1.2', 256), 'peercert': {}, 'server_alpn_protocols': [None], 'version': 'TLSv1.2', 'server_npn_protocols': [None], 'server_shared_ciphers': [[('ECDHE-ECDSA-AES256-GCM-SHA384', 'TLSv1.2', 256), ('ECDHE-RSA-AES256-GCM-SHA384', 'TLSv1.2', 256), ('ECDHE-ECDSA-AES128-GCM-SHA256', 'TLSv1.2', 128), ('ECDHE-RSA-AES128-GCM-SHA256', 'TLSv1.2', 128), ('ECDHE-ECDSA-CHACHA20-POLY1305', 'TLSv1.2', 256), ('ECDHE-RSA-CHACHA20-POLY1305', 'TLSv1.2', 256), ('DHE-DSS-AES256-GCM-SHA384', 'TLSv1.2', 256), ('DHE-RSA-AES256-GCM-SHA384', 'TLSv1.2', 256), ('DHE-DSS-AES128-GCM-SHA256', 'TLSv1.2', 128), ('DHE-RSA-AES128-GCM-SHA256', 'TLSv1.2', 128), ('DHE-RSA-CHACHA20-POLY1305', 'TLSv1.2', 256), ('ECDHE-ECDSA-AES256-CCM8', 'TLSv1.2', 256), ('ECDHE-ECDSA-AES256-CCM', 'TLSv1.2', 256), ('ECDHE-ECDSA-AES256-SHA384', 'TLSv1.2', 256), ('ECDHE-RSA-AES256-SHA384', 'TLSv1.2', 256), ('ECDHE-ECDSA-AES256-SHA', 'TLSv1.0', 256), ('ECDHE-RSA-AES256-SHA', 'TLSv1.0', 256), ('DHE-RSA-AES256-CCM8', 'TLSv1.2', 256), ('DHE-RSA-AES256-CCM', 'TLSv1.2', 256), ('DHE-RSA-AES256-SHA256', 'TLSv1.2', 256), ('DHE-DSS-AES256-SHA256', 'TLSv1.2', 256), ('DHE-RSA-AES256-SHA', 'SSLv3', 256), ('DHE-DSS-AES256-SHA', 'SSLv3', 256), ('ECDHE-ECDSA-AES128-CCM8', 'TLSv1.2', 128), ('ECDHE-ECDSA-AES128-CCM', 'TLSv1.2', 128), ('ECDHE-ECDSA-AES128-SHA256', 'TLSv1.2', 128), ('ECDHE-RSA-AES128-SHA256', 'TLSv1.2', 128), ('ECDHE-ECDSA-AES128-SHA', 'TLSv1.0', 128), ('ECDHE-RSA-AES128-SHA', 'TLSv1.0', 128), ('DHE-RSA-AES128-CCM8', 'TLSv1.2', 128), ('DHE-RSA-AES128-CCM', 'TLSv1.2', 128), ('DHE-RSA-AES128-SHA256', 'TLSv1.2', 128), ('DHE-DSS-AES128-SHA256', 'TLSv1.2', 128), ('DHE-RSA-AES128-SHA', 'SSLv3', 128), ('DHE-DSS-AES128-SHA', 'SSLv3', 128), ('ECDHE-ECDSA-CAMELLIA256-SHA384', 'TLSv1.2', 256), ('ECDHE-RSA-CAMELLIA256-SHA384', 'TLSv1.2', 256), ('ECDHE-ECDSA-CAMELLIA128-SHA256', 'TLSv1.2', 128), ('ECDHE-RSA-CAMELLIA128-SHA256', 'TLSv1.2', 128), ('DHE-RSA-CAMELLIA256-SHA256', 'TLSv1.2', 256), ('DHE-DSS-CAMELLIA256-SHA256', 'TLSv1.2', 256), ('DHE-RSA-CAMELLIA128-SHA256', 'TLSv1.2', 128), ('DHE-DSS-CAMELLIA128-SHA256', 'TLSv1.2', 128), ('DHE-RSA-CAMELLIA256-SHA', 'SSLv3', 256), ('DHE-DSS-CAMELLIA256-SHA', 'SSLv3', 256), ('DHE-RSA-CAMELLIA128-SHA', 'SSLv3', 128), ('DHE-DSS-CAMELLIA128-SHA', 'SSLv3', 128), ('AES256-GCM-SHA384', 'TLSv1.2', 256), ('AES128-GCM-SHA256', 'TLSv1.2', 128), ('AES256-CCM8', 'TLSv1.2', 256), ('AES256-CCM', 'TLSv1.2', 256), ('AES128-CCM8', 'TLSv1.2', 128), ('AES128-CCM', 'TLSv1.2', 128), ('AES256-SHA256', 'TLSv1.2', 256), ('AES128-SHA256', 'TLSv1.2', 128), ('AES256-SHA', 'SSLv3', 256), ('AES128-SHA', 'SSLv3', 128), ('CAMELLIA256-SHA256', 'TLSv1.2', 256), ('CAMELLIA128-SHA256', 'TLSv1.2', 128), ('CAMELLIA256-SHA', 'SSLv3', 256), ('CAMELLIA128-SHA', 'SSLv3', 128)]], 'compression': None} is not an instance of <class 'ssl.SSLError'>
-
- Re-running failed tests in verbose mode
- Re-running test 'test_ssl' in verbose mode
- test_ssl: testing with 'OpenSSL 1.1.0g 2 Nov 2017' (1, 1, 0, 7, 15)
- under Linux ('debian', 'buster/sid', '')
- HAS_SNI = True
- OP_ALL = 0x80000054
- OP_NO_TLSv1_1 = 0x10000000
- test__create_stdlib_context (test.test_ssl.ContextTests) ... ok
- test_cert_store_stats (test.test_ssl.ContextTests) ... ok
- test_check_hostname (test.test_ssl.ContextTests) ... ok
- test_ciphers (test.test_ssl.ContextTests) ... ok
- test_constructor (test.test_ssl.ContextTests) ... ok
- test_create_default_context (test.test_ssl.ContextTests) ... ok
- test_get_ca_certs (test.test_ssl.ContextTests) ... ok
- test_load_cert_chain (test.test_ssl.ContextTests) ... ok
- test_load_default_certs (test.test_ssl.ContextTests) ... ok
- test_load_default_certs_env (test.test_ssl.ContextTests) ... ok
- test_load_default_certs_env_windows (test.test_ssl.ContextTests) ... skipped 'Windows specific'
- test_load_dh_params (test.test_ssl.ContextTests) ... ok
- test_load_verify_cadata (test.test_ssl.ContextTests) ... ok
- test_load_verify_locations (test.test_ssl.ContextTests) ... ok
- test_options (test.test_ssl.ContextTests) ... ok
- test_protocol (test.test_ssl.ContextTests) ... ok
- test_session_stats (test.test_ssl.ContextTests) ... ok
- test_set_default_verify_paths (test.test_ssl.ContextTests) ... ok
- test_set_ecdh_curve (test.test_ssl.ContextTests) ... ok
- test_sni_callback (test.test_ssl.ContextTests) ... ok
- test_sni_callback_refcycle (test.test_ssl.ContextTests) ... ok
- test_verify_flags (test.test_ssl.ContextTests) ... ok
- test_verify_mode (test.test_ssl.ContextTests) ... ok
- test_DER_to_PEM (test.test_ssl.BasicSocketTests) ... ok
- test_asn1object (test.test_ssl.BasicSocketTests) ... ok
- test_cert_time_to_seconds (test.test_ssl.BasicSocketTests) ... ok
- test_cert_time_to_seconds_locale (test.test_ssl.BasicSocketTests) ... skipped 'locale-specific month name needs to be different from C locale'
- test_cert_time_to_seconds_timezone (test.test_ssl.BasicSocketTests) ... ok
- test_constants (test.test_ssl.BasicSocketTests) ... ok
- test_dealloc_warn (test.test_ssl.BasicSocketTests) ... ok
- test_empty_cert (test.test_ssl.BasicSocketTests)
- Wrapping with an empty cert file ... ok
- test_enum_certificates (test.test_ssl.BasicSocketTests) ... skipped 'Windows specific'
- test_enum_crls (test.test_ssl.BasicSocketTests) ... skipped 'Windows specific'
- test_errors (test.test_ssl.BasicSocketTests) ... ok
- test_get_default_verify_paths (test.test_ssl.BasicSocketTests) ... ok
- test_malformed_cert (test.test_ssl.BasicSocketTests)
- Wrapping with a badly formatted certificate (syntax error) ... ok
- test_malformed_key (test.test_ssl.BasicSocketTests)
- Wrapping with a badly formatted key (syntax error) ... ok
- test_match_hostname (test.test_ssl.BasicSocketTests) ... ok
- test_openssl_version (test.test_ssl.BasicSocketTests) ... ok
- test_parse_all_sans (test.test_ssl.BasicSocketTests) ... ok
- test_parse_cert (test.test_ssl.BasicSocketTests) ...
- {'issuer': ((('countryName', 'XY'),),
- (('localityName', 'Castle Anthrax'),),
- (('organizationName', 'Python Software Foundation'),),
- (('commonName', 'localhost'),)),
- 'notAfter': 'Oct 5 23:01:56 2020 GMT',
- 'notBefore': 'Oct 8 23:01:56 2010 GMT',
- 'serialNumber': 'D7C7381919AFC24E',
- 'subject': ((('countryName', 'XY'),),
- (('localityName', 'Castle Anthrax'),),
- (('organizationName', 'Python Software Foundation'),),
- (('commonName', 'localhost'),)),
- 'subjectAltName': (('DNS', 'localhost'),),
- 'version': 3}
-
- {'OCSP': ('http://ocsp.verisign.com',),
- 'caIssuers': ('http://SVRIntl-G3-aia.verisign.com/SVRIntlG3.cer',),
- 'crlDistributionPoints': ('http://SVRIntl-G3-crl.verisign.com/SVRIntlG3.crl',),
- 'issuer': ((('countryName', 'US'),),
- (('organizationName', 'VeriSign, Inc.'),),
- (('organizationalUnitName', 'VeriSign Trust Network'),),
- (('organizationalUnitName',
- 'Terms of use at https://www.verisign.com/rpa (c)10'),),
- (('commonName', 'VeriSign Class 3 International Server CA - G3'),)),
- 'notAfter': 'Sep 20 23:59:59 2012 GMT',
- 'notBefore': 'Sep 21 00:00:00 2011 GMT',
- 'serialNumber': '2EE6EA7640A075CEE5005F4D7C79549A',
- 'subject': ((('countryName', 'FI'),),
- (('stateOrProvinceName', 'Espoo'),),
- (('localityName', 'Espoo'),),
- (('organizationName', 'Nokia'),),
- (('organizationalUnitName', 'BI'),),
- (('commonName', 'projects.developer.nokia.com'),)),
- 'subjectAltName': (('DNS', 'projects.developer.nokia.com'),
- ('DNS', 'projects.forum.nokia.com')),
- 'version': 3}
- ok
- test_parse_cert_CVE_2013_4238 (test.test_ssl.BasicSocketTests) ...
- {'issuer': ((('countryName', 'US'),),
- (('stateOrProvinceName', 'Oregon'),),
- (('localityName', 'Beaverton'),),
- (('organizationName', 'Python Software Foundation'),),
- (('organizationalUnitName', 'Python Core Development'),),
- (('commonName', 'null.python.org\x00example.org'),),
- (('emailAddress', 'python-dev@python.org'),)),
- 'notAfter': 'Aug 7 13:12:52 2013 GMT',
- 'notBefore': 'Aug 7 13:11:52 2013 GMT',
- 'serialNumber': '00',
- 'subject': ((('countryName', 'US'),),
- (('stateOrProvinceName', 'Oregon'),),
- (('localityName', 'Beaverton'),),
- (('organizationName', 'Python Software Foundation'),),
- (('organizationalUnitName', 'Python Core Development'),),
- (('commonName', 'null.python.org\x00example.org'),),
- (('emailAddress', 'python-dev@python.org'),)),
- 'subjectAltName': (('DNS', 'altnull.python.org\x00example.com'),
- ('email', 'null@python.org\x00user@example.org'),
- ('URI', 'http://null.python.org\x00http://example.org'),
- ('IP Address', '192.0.2.1'),
- ('IP Address', '2001:DB8:0:0:0:0:0:1\n')),
- 'version': 3}
- ok
- test_purpose_enum (test.test_ssl.BasicSocketTests) ... ok
- test_random (test.test_ssl.BasicSocketTests) ...
- RAND_status is 1 (sufficient randomness)
- ok
- test_random_fork (test.test_ssl.BasicSocketTests) ... ok
- test_refcycle (test.test_ssl.BasicSocketTests) ... ok
- test_server_side (test.test_ssl.BasicSocketTests) ... ok
- test_str_for_enums (test.test_ssl.BasicSocketTests) ... ok
- test_timeout (test.test_ssl.BasicSocketTests) ... ok
- test_tls_unique_channel_binding (test.test_ssl.BasicSocketTests) ... ok
- test_unknown_channel_binding (test.test_ssl.BasicSocketTests) ... ok
- test_unsupported_dtls (test.test_ssl.BasicSocketTests) ... ok
- test_wrapped_unconnected (test.test_ssl.BasicSocketTests) ... ok
- test_lib_reason (test.test_ssl.SSLErrorTests) ... ok
- test_str (test.test_ssl.SSLErrorTests) ... ok
- test_subclass (test.test_ssl.SSLErrorTests) ... ok
- test_buffer_types (test.test_ssl.MemoryBIOTests) ... ok
- test_eof (test.test_ssl.MemoryBIOTests) ... ok
- test_error_types (test.test_ssl.MemoryBIOTests) ... ok
- test_pending (test.test_ssl.MemoryBIOTests) ... ok
- test_read_write (test.test_ssl.MemoryBIOTests) ... ok
- test_algorithms (test.test_ssl.NetworkedTests) ... skipped "Resource 'sha256.tbs-internet.com' is not available"
- test_ciphers (test.test_ssl.NetworkedTests) ... ok
- test_connect (test.test_ssl.NetworkedTests) ... ok
- test_connect_cadata (test.test_ssl.NetworkedTests) ... ok
- test_connect_capath (test.test_ssl.NetworkedTests) ... ok
- test_connect_ex (test.test_ssl.NetworkedTests) ... ok
- test_connect_ex_error (test.test_ssl.NetworkedTests) ... ok
- test_connect_with_context (test.test_ssl.NetworkedTests) ... ok
- test_context_setget (test.test_ssl.NetworkedTests) ... ok
- test_get_ca_certs_capath (test.test_ssl.NetworkedTests) ... ok
- test_get_server_certificate (test.test_ssl.NetworkedTests) ... [SSL: CERTIFICATE_VERIFY_FAILED] certificate verify failed (_ssl.c:719)
-
- Verified certificate for self-signed.pythontest.net:443 is
- -----BEGIN CERTIFICATE-----
- MIIClTCCAf6gAwIBAgIJAKGU95wKR8pTMA0GCSqGSIb3DQEBBQUAMHAxCzAJBgNV
- BAYTAlhZMRcwFQYDVQQHDA5DYXN0bGUgQW50aHJheDEjMCEGA1UECgwaUHl0aG9u
- IFNvZnR3YXJlIEZvdW5kYXRpb24xIzAhBgNVBAMMGnNlbGYtc2lnbmVkLnB5dGhv
- bnRlc3QubmV0MB4XDTE0MTEwMjE4MDkyOVoXDTI0MTAzMDE4MDkyOVowcDELMAkG
- A1UEBhMCWFkxFzAVBgNVBAcMDkNhc3RsZSBBbnRocmF4MSMwIQYDVQQKDBpQeXRo
- b24gU29mdHdhcmUgRm91bmRhdGlvbjEjMCEGA1UEAwwac2VsZi1zaWduZWQucHl0
- aG9udGVzdC5uZXQwgZ8wDQYJKoZIhvcNAQEBBQADgY0AMIGJAoGBANDXQXW9tjyZ
- Xt0Iv2tLL1+jinr4wGg36ioLDLFkMf+2Y1GL0v0BnKYG4N1OKlAU15LXGeGer8vm
- Sv/yIvmdrELvhAbbo3w4a9TMYQA4XkIVLdvu3mvNOAet+8PMJxn26dbDhG809ALv
- EHY57lQsBS3G59RZyBPVqAqmImWNJnVzAgMBAAGjNzA1MCUGA1UdEQQeMByCGnNl
- bGYtc2lnbmVkLnB5dGhvbnRlc3QubmV0MAwGA1UdEwQFMAMBAf8wDQYJKoZIhvcN
- AQEFBQADgYEAIuzAhgMouJpNdf3URCHIineyoSt6WK/9+eyUcjlKOrDoXNZaD72h
- TXMeKYoWvJyVcSLKL8ckPtDobgP2OTt0UkyAaj0n+ZHaqq1lH2yVfGUA1ILJv515
- C8BqbvVZuqm3i7ygmw3bqE/lYMgOrYtXXnqOrz6nvsE6Yc9V9rFflOM=
- -----END CERTIFICATE-----
-
- [SSL: CERTIFICATE_VERIFY_FAILED] certificate verify failed (_ssl.c:719)
-
- Verified certificate for ipv6.google.com:443 is
- -----BEGIN CERTIFICATE-----
- MIIIgjCCB2qgAwIBAgIIO25QodIIAGIwDQYJKoZIhvcNAQELBQAwVDELMAkGA1UE
- BhMCVVMxHjAcBgNVBAoTFUdvb2dsZSBUcnVzdCBTZXJ2aWNlczElMCMGA1UEAxMc
- R29vZ2xlIEludGVybmV0IEF1dGhvcml0eSBHMzAeFw0xOTAxMjkxNDU4MDBaFw0x
- OTA0MjMxNDU4MDBaMGYxCzAJBgNVBAYTAlVTMRMwEQYDVQQIDApDYWxpZm9ybmlh
- MRYwFAYDVQQHDA1Nb3VudGFpbiBWaWV3MRMwEQYDVQQKDApHb29nbGUgTExDMRUw
- EwYDVQQDDAwqLmdvb2dsZS5jb20wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEK
- AoIBAQC+JIMFPqLN0oMK8YpH1Mzvb/8J/iRcuapF5qnT0WulDuWn1wL9V4qxQFLy
- ERRgDRZw16Dj0rwvR2i0idAMgr/0eJSl3WPG0zFgACYRP/FzhrYnr6t6VvFImuDe
- Wg8ZSZwkoYIMHLBIeZB9FUWqep67PTvhP7hAXSLmo2izoB5cGSwfAe9QGRr1oGHG
- sniZF1z8vx4NFudQBrR7zyGOULaKRZrskm4CFfXcqbquzHEJWVyvNJduJraoIEk0
- 7+0GggB2Xc1puaFk1X5K5kgmnk5spZFWlppJLh3Gg0GOER8LRodfdMrcJzSC1W9B
- hBf2pEgMHHQ4mmcFat4J/gXnC3BDAgMBAAGjggVEMIIFQDATBgNVHSUEDDAKBggr
- BgEFBQcDATCCBBkGA1UdEQSCBBAwggQMggwqLmdvb2dsZS5jb22CDSouYW5kcm9p
- ZC5jb22CFiouYXBwZW5naW5lLmdvb2dsZS5jb22CEiouY2xvdWQuZ29vZ2xlLmNv
- bYIGKi5nLmNvgg4qLmdjcC5ndnQyLmNvbYIKKi5nZ3BodC5jboIWKi5nb29nbGUt
- YW5hbHl0aWNzLmNvbYILKi5nb29nbGUuY2GCCyouZ29vZ2xlLmNsgg4qLmdvb2ds
- ZS5jby5pboIOKi5nb29nbGUuY28uanCCDiouZ29vZ2xlLmNvLnVrgg8qLmdvb2ds
- ZS5jb20uYXKCDyouZ29vZ2xlLmNvbS5hdYIPKi5nb29nbGUuY29tLmJygg8qLmdv
- b2dsZS5jb20uY2+CDyouZ29vZ2xlLmNvbS5teIIPKi5nb29nbGUuY29tLnRygg8q
- Lmdvb2dsZS5jb20udm6CCyouZ29vZ2xlLmRlggsqLmdvb2dsZS5lc4ILKi5nb29n
- bGUuZnKCCyouZ29vZ2xlLmh1ggsqLmdvb2dsZS5pdIILKi5nb29nbGUubmyCCyou
- Z29vZ2xlLnBsggsqLmdvb2dsZS5wdIISKi5nb29nbGVhZGFwaXMuY29tgg8qLmdv
- b2dsZWFwaXMuY26CFCouZ29vZ2xlY29tbWVyY2UuY29tghEqLmdvb2dsZXZpZGVv
- LmNvbYIMKi5nc3RhdGljLmNugg0qLmdzdGF0aWMuY29tghIqLmdzdGF0aWNjbmFw
- cHMuY26CCiouZ3Z0MS5jb22CCiouZ3Z0Mi5jb22CFCoubWV0cmljLmdzdGF0aWMu
- Y29tggwqLnVyY2hpbi5jb22CECoudXJsLmdvb2dsZS5jb22CFioueW91dHViZS1u
- b2Nvb2tpZS5jb22CDSoueW91dHViZS5jb22CFioueW91dHViZWVkdWNhdGlvbi5j
- b22CESoueW91dHViZWtpZHMuY29tggcqLnl0LmJlggsqLnl0aW1nLmNvbYIaYW5k
- cm9pZC5jbGllbnRzLmdvb2dsZS5jb22CC2FuZHJvaWQuY29tghtkZXZlbG9wZXIu
- YW5kcm9pZC5nb29nbGUuY26CHGRldmVsb3BlcnMuYW5kcm9pZC5nb29nbGUuY26C
- BGcuY2+CCGdncGh0LmNuggZnb28uZ2yCFGdvb2dsZS1hbmFseXRpY3MuY29tggpn
- b29nbGUuY29tghJnb29nbGVjb21tZXJjZS5jb22CGHNvdXJjZS5hbmRyb2lkLmdv
- b2dsZS5jboIKdXJjaGluLmNvbYIKd3d3Lmdvby5nbIIIeW91dHUuYmWCC3lvdXR1
- YmUuY29tghR5b3V0dWJlZWR1Y2F0aW9uLmNvbYIPeW91dHViZWtpZHMuY29tggV5
- dC5iZTBoBggrBgEFBQcBAQRcMFowLQYIKwYBBQUHMAKGIWh0dHA6Ly9wa2kuZ29v
- Zy9nc3IyL0dUU0dJQUczLmNydDApBggrBgEFBQcwAYYdaHR0cDovL29jc3AucGtp
- Lmdvb2cvR1RTR0lBRzMwHQYDVR0OBBYEFLv0FYDs8E72WFqxSUyCEkj5+347MAwG
- A1UdEwEB/wQCMAAwHwYDVR0jBBgwFoAUd8K4UJpndnaxLcKG0IOgfqZ+ukswIQYD
- VR0gBBowGDAMBgorBgEEAdZ5AgUDMAgGBmeBDAECAjAxBgNVHR8EKjAoMCagJKAi
- hiBodHRwOi8vY3JsLnBraS5nb29nL0dUU0dJQUczLmNybDANBgkqhkiG9w0BAQsF
- AAOCAQEAKTqBe66Omg0lSU5I7CZmihbGJLQ7Ur6RMGKMPjrHuvnxIYJpiF+UeR92
- o8UFUSIKzT2JhsMKnYXqfKJF+lWbqpPGl3hup7O9Z7wHVg+F1YiLXXUpKxpdZaqB
- iqDlDMcrxsC37ILZa+u4+5oeAZCqNsutYh6jsvPyp/EyJa+Bo2Q7QdOOT6r1HJsr
- 6aJOc1PnriMfVWl5v+exEe5fx5m+1uNORWrNBepyUyp6oBRZIJtuqdLxHU52nYc5
- Ey6mQbQa5kFBZGSdAY7q3rb3+lvmhCdRSEqQmjJkxIHAcf46XN98gxf+2mp/rwXV
- W8yNRCttwlen3ZJeChHRpoigd1IeAQ==
- -----END CERTIFICATE-----
-
- ok
- test_makefile_close (test.test_ssl.NetworkedTests) ... ok
- test_non_blocking_connect_ex (test.test_ssl.NetworkedTests) ... ok
- test_non_blocking_handshake (test.test_ssl.NetworkedTests) ...
- Needed 3 calls to do_handshake() to establish session.
- ok
- test_timeout_connect_ex (test.test_ssl.NetworkedTests) ... ok
- test_handshake (test.test_ssl.NetworkedBIOTests) ... Needed 3 calls to complete do_handshake().
- ok
- test_read_write_data (test.test_ssl.NetworkedBIOTests) ... Needed 3 calls to complete do_handshake().
- Needed 1 calls to complete write().
- Needed 2 calls to complete read().
- Needed 1 calls to complete unwrap().
- ok
- test_alpn_protocols (test.test_ssl.ThreadedTests) ... server: new connection from ('127.0.0.1', 48358)
- server: connection cipher is now ('ECDHE-RSA-AES256-GCM-SHA384', 'TLSv1.2', 256)
- server: selected protocol is now None
- client: sending b'FOO\n'...
- client: read b'foo\n'
- client: sending b'FOO\n'...
- client: read b'foo\n'
- client: sending b'FOO\n'...
- client: read b'foo\n'
- client: closing connection.
- server: new connection from ('127.0.0.1', 60834)
- server: connection cipher is now ('ECDHE-RSA-AES256-GCM-SHA384', 'TLSv1.2', 256)
- server: selected protocol is now None
- client: sending b'FOO\n'...
- client: read b'foo\n'
- client: sending b'FOO\n'...
- client: read b'foo\n'
- client: sending b'FOO\n'...
- client: read b'foo\n'
- client: closing connection.
- server: new connection from ('127.0.0.1', 33030)
- server: connection cipher is now ('ECDHE-RSA-AES256-GCM-SHA384', 'TLSv1.2', 256)
- client: sending b'FOO\n'...
- server: selected protocol is now None
- client: read b'foo\n'
- client: sending b'FOO\n'...
- client: read b'foo\n'
- client: sending b'FOO\n'...
- client: read b'foo\n'
- client: closing connection.
- server: new connection from ('127.0.0.1', 37454)
- server: connection cipher is now ('ECDHE-RSA-AES256-GCM-SHA384', 'TLSv1.2', 256)
- client: sending b'FOO\n'...
- server: selected protocol is now None
- client: read b'foo\n'
- client: sending b'FOO\n'...
- client: read b'foo\n'
- client: sending b'FOO\n'...
- client: read b'foo\n'
- client: closing connection.
- FAIL
- test_asyncore_server (test.test_ssl.ThreadedTests)
- Check the example asyncore integration. ...
- server: new connection from 127.0.0.1:56782
- client: sending b'FOO\n'...
- server: read b'FOO\n' from client
- client: read b'foo\n'
- client: closing connection.
- server: read b'over\n' from client
- client: connection closed.
- cleanup: stopping server.
- cleanup: joining server thread.
- server: closed connection <ssl.SSLSocket [closed] fd=-1, family=AddressFamily.AF_INET, type=2049, proto=0>
- server: read b'' from client
- cleanup: successfully joined.
- ok
- test_check_hostname (test.test_ssl.ThreadedTests) ...
- server: new connection from ('127.0.0.1', 35364)
- server: connection cipher is now ('ECDHE-RSA-AES256-SHA', 'TLSv1.0', 256)
- server: selected protocol is now None
- server: new connection from ('127.0.0.1', 42970)
- server: connection cipher is now ('ECDHE-RSA-AES256-SHA', 'TLSv1.0', 256)
- server: selected protocol is now None
- ok
- test_compression (test.test_ssl.ThreadedTests) ... server: new connection from ('127.0.0.1', 53170)
- server: connection cipher is now ('ECDHE-RSA-AES256-SHA', 'TLSv1.0', 256)
- client: sending b'FOO\n'...
- server: selected protocol is now None
- client: read b'foo\n'
- client: sending b'FOO\n'...
- client: read b'foo\n'
- client: sending b'FOO\n'...
- client: read b'foo\n'
- client: closing connection.
- got compression: None
- ok
- test_compression_disabled (test.test_ssl.ThreadedTests) ... server: new connection from ('127.0.0.1', 55910)
- server: connection cipher is now ('ECDHE-RSA-AES256-SHA', 'TLSv1.0', 256)
- client: sending b'FOO\n'...
- server: selected protocol is now None
- client: read b'foo\n'
- client: sending b'FOO\n'...
- client: read b'foo\n'
- client: sending b'FOO\n'...
- client: read b'foo\n'
- client: closing connection.
- ok
- test_crl_check (test.test_ssl.ThreadedTests) ...
- server: new connection from ('127.0.0.1', 45362)
- server: connection cipher is now ('ECDHE-RSA-AES256-SHA', 'TLSv1.0', 256)
- server: selected protocol is now None
- server: new connection from ('127.0.0.1', 53570)
-
- server: bad connection attempt from ('127.0.0.1', 53570):
- Traceback (most recent call last):
- File "/home/m/Python-3.5.6/Lib/test/test_ssl.py", line 1849, in wrap_conn
- self.sock, server_side=True)
- File "/home/m/Python-3.5.6/Lib/ssl.py", line 385, in wrap_socket
- _context=self)
- File "/home/m/Python-3.5.6/Lib/ssl.py", line 760, in __init__
- self.do_handshake()
- File "/home/m/Python-3.5.6/Lib/ssl.py", line 996, in do_handshake
- self._sslobj.do_handshake()
- File "/home/m/Python-3.5.6/Lib/ssl.py", line 641, in do_handshake
- self._sslobj.do_handshake()
- ssl.SSLError: [SSL: TLSV1_ALERT_UNKNOWN_CA] tlsv1 alert unknown ca (_ssl.c:719)
- server: new connection from ('127.0.0.1', 37466)
- server: connection cipher is now ('ECDHE-RSA-AES256-SHA', 'TLSv1.0', 256)
- server: selected protocol is now None
- ok
- test_default_ciphers (test.test_ssl.ThreadedTests) ... skipped 'no DES cipher available'
- test_default_ecdh_curve (test.test_ssl.ThreadedTests) ... server: new connection from ('127.0.0.1', 41616)
- server: connection cipher is now ('ECDHE-RSA-AES256-GCM-SHA384', 'TLSv1.2', 256)
- server: selected protocol is now None
- ok
- test_dh_params (test.test_ssl.ThreadedTests) ... server: new connection from ('127.0.0.1', 33296)
- server: connection cipher is now ('DHE-RSA-AES256-SHA', 'SSLv3', 256)
- server: selected protocol is now None
- client: sending b'FOO\n'...
- client: read b'foo\n'
- client: sending b'FOO\n'...
- client: read b'foo\n'
- client: sending b'FOO\n'...
- client: read b'foo\n'
- client: closing connection.
- ok
- test_do_handshake_enotconn (test.test_ssl.ThreadedTests) ... ok
- test_echo (test.test_ssl.ThreadedTests)
- Basic test of an SSL client connecting to a server ...
- server: new connection from ('127.0.0.1', 55542)
- server: connection cipher is now ('ECDHE-RSA-AES256-GCM-SHA384', 'TLSv1.2', 256)
- server: selected protocol is now None
- client: sending b'FOO\n'...
- client: read b'foo\n'
- client: sending b'FOO\n'...
- client: read b'foo\n'
- client: sending b'FOO\n'...
- client: read b'foo\n'
- client: closing connection.
- server: new connection from ('127.0.0.1', 51056)
- server: connection cipher is now ('ECDHE-RSA-AES256-SHA', 'TLSv1.0', 256)
- client: sending b'FOO\n'...
- server: selected protocol is now None
- client: read b'foo\n'
- client: sending b'FOO\n'...
- client: read b'foo\n'
- client: sending b'FOO\n'...
- client: read b'foo\n'
- client: closing connection.
- server: new connection from ('127.0.0.1', 39080)
- server: connection cipher is now ('ECDHE-RSA-AES256-SHA', 'TLSv1.0', 256)
- server: selected protocol is now None
- client: sending b'FOO\n'...
- client: read b'foo\n'
- client: sending b'FOO\n'...
- client: read b'foo\n'
- client: sending b'FOO\n'...
- client: read b'foo\n'
- client: closing connection.
- server: new connection from ('127.0.0.1', 34970)
- server: connection cipher is now ('ECDHE-RSA-AES256-GCM-SHA384', 'TLSv1.2', 256)
- client: sending b'FOO\n'...
- server: selected protocol is now None
- client: read b'foo\n'
- client: sending b'FOO\n'...
- client: read b'foo\n'
- client: sending b'FOO\n'...
- client: read b'foo\n'
- client: closing connection.
- ok
- test_getpeercert (test.test_ssl.ThreadedTests) ...
- {'issuer': ((('countryName', 'XY'),),
- (('localityName', 'Castle Anthrax'),),
- (('organizationName', 'Python Software Foundation'),),
- (('commonName', 'localhost'),)),
- 'notAfter': 'Oct 5 23:01:56 2020 GMT',
- 'notBefore': 'Oct 8 23:01:56 2010 GMT',
- 'serialNumber': 'D7C7381919AFC24E',
- 'subject': ((('countryName', 'XY'),),
- (('localityName', 'Castle Anthrax'),),
- (('organizationName', 'Python Software Foundation'),),
- (('commonName', 'localhost'),)),
- 'subjectAltName': (('DNS', 'localhost'),),
- 'version': 3}
- Connection cipher is ('ECDHE-RSA-AES256-GCM-SHA384', 'TLSv1.2', 256).
- ok
- test_getpeercert_enotconn (test.test_ssl.ThreadedTests) ... ok
- test_handshake_timeout (test.test_ssl.ThreadedTests) ... ok
- test_nonblocking_send (test.test_ssl.ThreadedTests) ... server: new connection from ('127.0.0.1', 35406)
- server: connection cipher is now ('ECDHE-RSA-AES256-SHA', 'TLSv1.0', 256)
- server: selected protocol is now None
- Test server failure:
- Traceback (most recent call last):
- File "/home/m/Python-3.5.6/Lib/test/test_ssl.py", line 1946, in run
- self.write(msg.lower())
- File "/home/m/Python-3.5.6/Lib/test/test_ssl.py", line 1891, in write
- return self.sslconn.write(bytes)
- File "/home/m/Python-3.5.6/Lib/ssl.py", line 816, in write
- return self._sslobj.write(data)
- File "/home/m/Python-3.5.6/Lib/ssl.py", line 594, in write
- return self._sslobj.write(data)
- ConnectionResetError: [Errno 104] Connection reset by peer
- ok
- test_npn_protocols (test.test_ssl.ThreadedTests) ... server: new connection from ('127.0.0.1', 57872)
- server: connection cipher is now ('ECDHE-RSA-AES256-SHA', 'TLSv1.0', 256)
- client: sending b'FOO\n'...
- server: selected protocol is now http/1.1
- client: read b'foo\n'
- client: sending b'FOO\n'...
- client: read b'foo\n'
- client: sending b'FOO\n'...
- client: read b'foo\n'
- client: closing connection.
- server: new connection from ('127.0.0.1', 49394)
- server: connection cipher is now ('ECDHE-RSA-AES256-SHA', 'TLSv1.0', 256)
- client: sending b'FOO\n'...
- server: selected protocol is now http/1.1
- client: read b'foo\n'
- client: sending b'FOO\n'...
- client: read b'foo\n'
- client: sending b'FOO\n'...
- client: read b'foo\n'
- client: closing connection.
- server: new connection from ('127.0.0.1', 56892)
- server: connection cipher is now ('ECDHE-RSA-AES256-SHA', 'TLSv1.0', 256)
- client: sending b'FOO\n'...
- server: selected protocol is now spdy/2
- client: read b'foo\n'
- client: sending b'FOO\n'...
- client: read b'foo\n'
- client: sending b'FOO\n'...
- client: read b'foo\n'
- client: closing connection.
- server: new connection from ('127.0.0.1', 54536)
- server: connection cipher is now ('ECDHE-RSA-AES256-SHA', 'TLSv1.0', 256)
- client: sending b'FOO\n'...
- server: selected protocol is now abc
- client: read b'foo\n'
- client: sending b'FOO\n'...
- client: read b'foo\n'
- client: sending b'FOO\n'...
- client: read b'foo\n'
- client: closing connection.
- ok
- test_protocol_sslv2 (test.test_ssl.ThreadedTests)
- Connecting to an SSLv2 server with various client options ... skipped 'OpenSSL is compiled without SSLv2 support'
- test_protocol_sslv23 (test.test_ssl.ThreadedTests)
- Connecting to an SSLv23 server with various client options ...
- PROTOCOL_TLS->PROTOCOL_TLS CERT_NONE
- PROTOCOL_TLSv1->PROTOCOL_TLS CERT_NONE
- PROTOCOL_TLS->PROTOCOL_TLS CERT_OPTIONAL
- PROTOCOL_TLSv1->PROTOCOL_TLS CERT_OPTIONAL
- PROTOCOL_TLS->PROTOCOL_TLS CERT_REQUIRED
- PROTOCOL_TLSv1->PROTOCOL_TLS CERT_REQUIRED
- PROTOCOL_TLS->PROTOCOL_TLS CERT_NONE
- {PROTOCOL_TLSv1->PROTOCOL_TLS} CERT_NONE
- ok
- test_protocol_sslv3 (test.test_ssl.ThreadedTests)
- Connecting to an SSLv3 server with various client options ... skipped 'OpenSSL is compiled without SSLv3 support'
- test_protocol_tlsv1 (test.test_ssl.ThreadedTests)
- Connecting to a TLSv1 server with various client options ...
- PROTOCOL_TLSv1->PROTOCOL_TLSv1 CERT_NONE
- PROTOCOL_TLSv1->PROTOCOL_TLSv1 CERT_OPTIONAL
- PROTOCOL_TLSv1->PROTOCOL_TLSv1 CERT_REQUIRED
- {PROTOCOL_TLS->PROTOCOL_TLSv1} CERT_NONE
- ok
- test_protocol_tlsv1_1 (test.test_ssl.ThreadedTests)
- Connecting to a TLSv1.1 server with various client options. ...
- PROTOCOL_TLSv1_1->PROTOCOL_TLSv1_1 CERT_NONE
- {PROTOCOL_TLS->PROTOCOL_TLSv1_1} CERT_NONE
- PROTOCOL_TLSv1_1->PROTOCOL_TLS CERT_NONE
- {PROTOCOL_TLSv1->PROTOCOL_TLSv1_1} CERT_NONE
- {PROTOCOL_TLSv1_1->PROTOCOL_TLSv1} CERT_NONE
- ok
- test_protocol_tlsv1_2 (test.test_ssl.ThreadedTests)
- Connecting to a TLSv1.2 server with various client options. ...
- PROTOCOL_TLSv1_2->PROTOCOL_TLSv1_2 CERT_NONE
- {PROTOCOL_TLS->PROTOCOL_TLSv1_2} CERT_NONE
- PROTOCOL_TLSv1_2->PROTOCOL_TLS CERT_NONE
- {PROTOCOL_TLSv1->PROTOCOL_TLSv1_2} CERT_NONE
- {PROTOCOL_TLSv1_2->PROTOCOL_TLSv1} CERT_NONE
- {PROTOCOL_TLSv1_1->PROTOCOL_TLSv1_2} CERT_NONE
- {PROTOCOL_TLSv1_2->PROTOCOL_TLSv1_1} CERT_NONE
- ok
- test_read_write_after_close_raises_valuerror (test.test_ssl.ThreadedTests) ... ok
- test_recv_send (test.test_ssl.ThreadedTests)
- Test recv(), send() and friends. ...
- server: new connection from ('127.0.0.1', 33352)
- server: connection cipher is now ('ECDHE-RSA-AES256-SHA', 'TLSv1.0', 256)
- server: selected protocol is now None
- ok
- test_recv_zero (test.test_ssl.ThreadedTests) ... server: new connection from ('127.0.0.1', 46514)
- server: connection cipher is now ('ECDHE-RSA-AES256-SHA', 'TLSv1.0', 256)
- server: selected protocol is now None
- ok
- test_rude_shutdown (test.test_ssl.ThreadedTests)
- A brutal shutdown of an SSL server should raise an OSError ... ok
- test_selected_alpn_protocol (test.test_ssl.ThreadedTests) ... server: new connection from ('127.0.0.1', 52016)
- server: connection cipher is now ('ECDHE-RSA-AES256-SHA', 'TLSv1.0', 256)
- server: selected protocol is now None
- client: sending b'FOO\n'...
- client: read b'foo\n'
- client: sending b'FOO\n'...
- client: read b'foo\n'
- client: sending b'FOO\n'...
- client: read b'foo\n'
- client: closing connection.
- ok
- test_selected_alpn_protocol_if_server_uses_alpn (test.test_ssl.ThreadedTests) ... server: new connection from ('127.0.0.1', 47860)
- server: connection cipher is now ('ECDHE-RSA-AES256-SHA', 'TLSv1.0', 256)
- server: selected protocol is now None
- client: sending b'FOO\n'...
- client: read b'foo\n'
- client: sending b'FOO\n'...
- client: read b'foo\n'
- client: sending b'FOO\n'...
- client: read b'foo\n'
- client: closing connection.
- ok
- test_selected_npn_protocol (test.test_ssl.ThreadedTests) ... server: new connection from ('127.0.0.1', 50884)
- server: connection cipher is now ('ECDHE-RSA-AES256-SHA', 'TLSv1.0', 256)
- client: sending b'FOO\n'...
- server: selected protocol is now None
- client: read b'foo\n'
- client: sending b'FOO\n'...
- client: read b'foo\n'
- client: sending b'FOO\n'...
- client: read b'foo\n'
- client: closing connection.
- ok
- test_sendfile (test.test_ssl.ThreadedTests) ... ok
- test_server_accept (test.test_ssl.ThreadedTests) ... ok
- test_shared_ciphers (test.test_ssl.ThreadedTests) ... server: new connection from ('127.0.0.1', 38624)
- server: connection cipher is now ('ECDHE-RSA-AES256-SHA', 'TLSv1.0', 256)
- server: selected protocol is now None
- ok
- test_sni_callback (test.test_ssl.ThreadedTests) ... server: new connection from ('127.0.0.1', 59416)
- server: connection cipher is now ('ECDHE-RSA-AES256-SHA', 'TLSv1.0', 256)
- server: selected protocol is now None
- server: new connection from ('127.0.0.1', 41122)
- server: connection cipher is now ('ECDHE-RSA-AES256-SHA', 'TLSv1.0', 256)
- server: selected protocol is now None
- server: new connection from ('127.0.0.1', 45224)
- server: connection cipher is now ('ECDHE-RSA-AES256-SHA', 'TLSv1.0', 256)
- server: selected protocol is now None
- ok
- test_sni_callback_alert (test.test_ssl.ThreadedTests) ... ok
- test_sni_callback_raising (test.test_ssl.ThreadedTests) ... ok
- test_sni_callback_wrong_return_type (test.test_ssl.ThreadedTests) ... ok
- test_socketserver (test.test_ssl.ThreadedTests)
- Using socketserver to create and manage SSL connections. ...
- server (('127.0.0.1', 43571):43571 ('ECDHE-RSA-AES256-GCM-SHA384', 'TLSv1.2', 256)):
- [17/Feb/2019 22:48:50] "GET /keycert.pem HTTP/1.1" 200 -
- client: read 1783 bytes from remote server '<HTTPSServerThread <HTTPSServer localhost:43571>>'
- stopping HTTPS server
- joining HTTPS thread
- ok
- test_starttls (test.test_ssl.ThreadedTests)
- Switching from clear text to encrypted and back again. ...
- client: sending b'msg 1'...
- server: new connection from ('127.0.0.1', 57534)
- server: read b'msg 1' (unencrypted), sending back b'msg 1' (unencrypted)...
- client: read b'msg 1' from server
- client: sending b'MSG 2'...
- server: read b'MSG 2' (unencrypted), sending back b'msg 2' (unencrypted)...
- client: read b'msg 2' from server
- client: sending b'STARTTLS'...
- server: read STARTTLS from client, sending OK...
- client: read b'ok' from server, starting TLS...
- server: connection cipher is now ('ECDHE-RSA-AES256-SHA', 'TLSv1.0', 256)
- client: sending b'MSG 3'...
- server: selected protocol is now None
- server: read b'MSG 3' (encrypted), sending back b'msg 3' (encrypted)...
- client: read b'msg 3' from server
- client: sending b'msg 4'...
- server: read b'msg 4' (encrypted), sending back b'msg 4' (encrypted)...
- client: read b'msg 4' from server
- client: sending b'ENDTLS'...
- server: read ENDTLS from client, sending OK...
- client: read b'ok' from server, ending TLS...
- server: connection is now unencrypted...
- client: sending b'msg 5'...
- server: read b'msg 5' (unencrypted), sending back b'msg 5' (unencrypted)...
- client: read b'msg 5' from server
- client: sending b'msg 6'...
- server: read b'msg 6' (unencrypted), sending back b'msg 6' (unencrypted)...
- client: read b'msg 6' from server
- client: closing connection.
- server: client closed connection
- ok
- test_tls_unique_channel_binding (test.test_ssl.ThreadedTests)
- Test tls-unique channel binding. ...
- server: new connection from ('127.0.0.1', 45814)
- server: connection cipher is now ('ECDHE-RSA-AES256-SHA', 'TLSv1.0', 256)
- got channel binding data: b'\xb5\x11\x15%\x86o\x10\xa1\xcbr\x8c\x07'
- server: selected protocol is now None
- server: new connection from ('127.0.0.1', 45816)
- server: connection cipher is now ('ECDHE-RSA-AES256-SHA', 'TLSv1.0', 256)
- server: selected protocol is now None
- got another channel binding data: b'?5\x92Q4n5i\x1fvFd'
- ok
- test_version_basic (test.test_ssl.ThreadedTests) ... ok
- test_wrong_cert (test.test_ssl.ThreadedTests)
- Connecting when the server rejects the client's certificate ...
- SSLError is SSLError(1, '[SSL: TLSV1_ALERT_UNKNOWN_CA] tlsv1 alert unknown ca (_ssl.c:719)')
- ok
-
- ======================================================================
- FAIL: test_alpn_protocols (test.test_ssl.ThreadedTests)
- ----------------------------------------------------------------------
- Traceback (most recent call last):
- File "/home/m/Python-3.5.6/Lib/test/test_ssl.py", line 3183, in test_alpn_protocols
- self.assertIsInstance(stats, ssl.SSLError)
- AssertionError: {'server_shared_ciphers': [[('ECDHE-ECDSA-AES256-GCM-SHA384', 'TLSv1.2', 256), ('ECDHE-RSA-AES256-GCM-SHA384', 'TLSv1.2', 256), ('ECDHE-ECDSA-AES128-GCM-SHA256', 'TLSv1.2', 128), ('ECDHE-RSA-AES128-GCM-SHA256', 'TLSv1.2', 128), ('ECDHE-ECDSA-CHACHA20-POLY1305', 'TLSv1.2', 256), ('ECDHE-RSA-CHACHA20-POLY1305', 'TLSv1.2', 256), ('DHE-DSS-AES256-GCM-SHA384', 'TLSv1.2', 256), ('DHE-RSA-AES256-GCM-SHA384', 'TLSv1.2', 256), ('DHE-DSS-AES128-GCM-SHA256', 'TLSv1.2', 128), ('DHE-RSA-AES128-GCM-SHA256', 'TLSv1.2', 128), ('DHE-RSA-CHACHA20-POLY1305', 'TLSv1.2', 256), ('ECDHE-ECDSA-AES256-CCM8', 'TLSv1.2', 256), ('ECDHE-ECDSA-AES256-CCM', 'TLSv1.2', 256), ('ECDHE-ECDSA-AES256-SHA384', 'TLSv1.2', 256), ('ECDHE-RSA-AES256-SHA384', 'TLSv1.2', 256), ('ECDHE-ECDSA-AES256-SHA', 'TLSv1.0', 256), ('ECDHE-RSA-AES256-SHA', 'TLSv1.0', 256), ('DHE-RSA-AES256-CCM8', 'TLSv1.2', 256), ('DHE-RSA-AES256-CCM', 'TLSv1.2', 256), ('DHE-RSA-AES256-SHA256', 'TLSv1.2', 256), ('DHE-DSS-AES256-SHA256', 'TLSv1.2', 256), ('DHE-RSA-AES256-SHA', 'SSLv3', 256), ('DHE-DSS-AES256-SHA', 'SSLv3', 256), ('ECDHE-ECDSA-AES128-CCM8', 'TLSv1.2', 128), ('ECDHE-ECDSA-AES128-CCM', 'TLSv1.2', 128), ('ECDHE-ECDSA-AES128-SHA256', 'TLSv1.2', 128), ('ECDHE-RSA-AES128-SHA256', 'TLSv1.2', 128), ('ECDHE-ECDSA-AES128-SHA', 'TLSv1.0', 128), ('ECDHE-RSA-AES128-SHA', 'TLSv1.0', 128), ('DHE-RSA-AES128-CCM8', 'TLSv1.2', 128), ('DHE-RSA-AES128-CCM', 'TLSv1.2', 128), ('DHE-RSA-AES128-SHA256', 'TLSv1.2', 128), ('DHE-DSS-AES128-SHA256', 'TLSv1.2', 128), ('DHE-RSA-AES128-SHA', 'SSLv3', 128), ('DHE-DSS-AES128-SHA', 'SSLv3', 128), ('ECDHE-ECDSA-CAMELLIA256-SHA384', 'TLSv1.2', 256), ('ECDHE-RSA-CAMELLIA256-SHA384', 'TLSv1.2', 256), ('ECDHE-ECDSA-CAMELLIA128-SHA256', 'TLSv1.2', 128), ('ECDHE-RSA-CAMELLIA128-SHA256', 'TLSv1.2', 128), ('DHE-RSA-CAMELLIA256-SHA256', 'TLSv1.2', 256), ('DHE-DSS-CAMELLIA256-SHA256', 'TLSv1.2', 256), ('DHE-RSA-CAMELLIA128-SHA256', 'TLSv1.2', 128), ('DHE-DSS-CAMELLIA128-SHA256', 'TLSv1.2', 128), ('DHE-RSA-CAMELLIA256-SHA', 'SSLv3', 256), ('DHE-DSS-CAMELLIA256-SHA', 'SSLv3', 256), ('DHE-RSA-CAMELLIA128-SHA', 'SSLv3', 128), ('DHE-DSS-CAMELLIA128-SHA', 'SSLv3', 128), ('AES256-GCM-SHA384', 'TLSv1.2', 256), ('AES128-GCM-SHA256', 'TLSv1.2', 128), ('AES256-CCM8', 'TLSv1.2', 256), ('AES256-CCM', 'TLSv1.2', 256), ('AES128-CCM8', 'TLSv1.2', 128), ('AES128-CCM', 'TLSv1.2', 128), ('AES256-SHA256', 'TLSv1.2', 256), ('AES128-SHA256', 'TLSv1.2', 128), ('AES256-SHA', 'SSLv3', 256), ('AES128-SHA', 'SSLv3', 128), ('CAMELLIA256-SHA256', 'TLSv1.2', 256), ('CAMELLIA128-SHA256', 'TLSv1.2', 128), ('CAMELLIA256-SHA', 'SSLv3', 256), ('CAMELLIA128-SHA', 'SSLv3', 128)]], 'server_npn_protocols': [None], 'version': 'TLSv1.2', 'client_alpn_protocol': None, 'peercert': {}, 'server_alpn_protocols': [None], 'client_npn_protocol': None, 'compression': None, 'cipher': ('ECDHE-RSA-AES256-GCM-SHA384', 'TLSv1.2', 256)} is not an instance of <class 'ssl.SSLError'>
-