spacepaste

  1.  
  2. 0:03:39 load avg: 4.50 [363/398/1] test_ssl
  3. Resource 'sha256.tbs-internet.com' is not available
  4. test test_ssl failed -- Traceback (most recent call last):
  5. File "/home/m/Python-3.5.6/Lib/test/test_ssl.py", line 3183, in test_alpn_protocols
  6. self.assertIsInstance(stats, ssl.SSLError)
  7. AssertionError: {'client_npn_protocol': None, 'client_alpn_protocol': None, 'cipher': ('ECDHE-RSA-AES256-GCM-SHA384', 'TLSv1.2', 256), 'peercert': {}, 'server_alpn_protocols': [None], 'version': 'TLSv1.2', 'server_npn_protocols': [None], 'server_shared_ciphers': [[('ECDHE-ECDSA-AES256-GCM-SHA384', 'TLSv1.2', 256), ('ECDHE-RSA-AES256-GCM-SHA384', 'TLSv1.2', 256), ('ECDHE-ECDSA-AES128-GCM-SHA256', 'TLSv1.2', 128), ('ECDHE-RSA-AES128-GCM-SHA256', 'TLSv1.2', 128), ('ECDHE-ECDSA-CHACHA20-POLY1305', 'TLSv1.2', 256), ('ECDHE-RSA-CHACHA20-POLY1305', 'TLSv1.2', 256), ('DHE-DSS-AES256-GCM-SHA384', 'TLSv1.2', 256), ('DHE-RSA-AES256-GCM-SHA384', 'TLSv1.2', 256), ('DHE-DSS-AES128-GCM-SHA256', 'TLSv1.2', 128), ('DHE-RSA-AES128-GCM-SHA256', 'TLSv1.2', 128), ('DHE-RSA-CHACHA20-POLY1305', 'TLSv1.2', 256), ('ECDHE-ECDSA-AES256-CCM8', 'TLSv1.2', 256), ('ECDHE-ECDSA-AES256-CCM', 'TLSv1.2', 256), ('ECDHE-ECDSA-AES256-SHA384', 'TLSv1.2', 256), ('ECDHE-RSA-AES256-SHA384', 'TLSv1.2', 256), ('ECDHE-ECDSA-AES256-SHA', 'TLSv1.0', 256), ('ECDHE-RSA-AES256-SHA', 'TLSv1.0', 256), ('DHE-RSA-AES256-CCM8', 'TLSv1.2', 256), ('DHE-RSA-AES256-CCM', 'TLSv1.2', 256), ('DHE-RSA-AES256-SHA256', 'TLSv1.2', 256), ('DHE-DSS-AES256-SHA256', 'TLSv1.2', 256), ('DHE-RSA-AES256-SHA', 'SSLv3', 256), ('DHE-DSS-AES256-SHA', 'SSLv3', 256), ('ECDHE-ECDSA-AES128-CCM8', 'TLSv1.2', 128), ('ECDHE-ECDSA-AES128-CCM', 'TLSv1.2', 128), ('ECDHE-ECDSA-AES128-SHA256', 'TLSv1.2', 128), ('ECDHE-RSA-AES128-SHA256', 'TLSv1.2', 128), ('ECDHE-ECDSA-AES128-SHA', 'TLSv1.0', 128), ('ECDHE-RSA-AES128-SHA', 'TLSv1.0', 128), ('DHE-RSA-AES128-CCM8', 'TLSv1.2', 128), ('DHE-RSA-AES128-CCM', 'TLSv1.2', 128), ('DHE-RSA-AES128-SHA256', 'TLSv1.2', 128), ('DHE-DSS-AES128-SHA256', 'TLSv1.2', 128), ('DHE-RSA-AES128-SHA', 'SSLv3', 128), ('DHE-DSS-AES128-SHA', 'SSLv3', 128), ('ECDHE-ECDSA-CAMELLIA256-SHA384', 'TLSv1.2', 256), ('ECDHE-RSA-CAMELLIA256-SHA384', 'TLSv1.2', 256), ('ECDHE-ECDSA-CAMELLIA128-SHA256', 'TLSv1.2', 128), ('ECDHE-RSA-CAMELLIA128-SHA256', 'TLSv1.2', 128), ('DHE-RSA-CAMELLIA256-SHA256', 'TLSv1.2', 256), ('DHE-DSS-CAMELLIA256-SHA256', 'TLSv1.2', 256), ('DHE-RSA-CAMELLIA128-SHA256', 'TLSv1.2', 128), ('DHE-DSS-CAMELLIA128-SHA256', 'TLSv1.2', 128), ('DHE-RSA-CAMELLIA256-SHA', 'SSLv3', 256), ('DHE-DSS-CAMELLIA256-SHA', 'SSLv3', 256), ('DHE-RSA-CAMELLIA128-SHA', 'SSLv3', 128), ('DHE-DSS-CAMELLIA128-SHA', 'SSLv3', 128), ('AES256-GCM-SHA384', 'TLSv1.2', 256), ('AES128-GCM-SHA256', 'TLSv1.2', 128), ('AES256-CCM8', 'TLSv1.2', 256), ('AES256-CCM', 'TLSv1.2', 256), ('AES128-CCM8', 'TLSv1.2', 128), ('AES128-CCM', 'TLSv1.2', 128), ('AES256-SHA256', 'TLSv1.2', 256), ('AES128-SHA256', 'TLSv1.2', 128), ('AES256-SHA', 'SSLv3', 256), ('AES128-SHA', 'SSLv3', 128), ('CAMELLIA256-SHA256', 'TLSv1.2', 256), ('CAMELLIA128-SHA256', 'TLSv1.2', 128), ('CAMELLIA256-SHA', 'SSLv3', 256), ('CAMELLIA128-SHA', 'SSLv3', 128)]], 'compression': None} is not an instance of <class 'ssl.SSLError'>
  8. Re-running failed tests in verbose mode
  9. Re-running test 'test_ssl' in verbose mode
  10. test_ssl: testing with 'OpenSSL 1.1.0g 2 Nov 2017' (1, 1, 0, 7, 15)
  11. under Linux ('debian', 'buster/sid', '')
  12. HAS_SNI = True
  13. OP_ALL = 0x80000054
  14. OP_NO_TLSv1_1 = 0x10000000
  15. test__create_stdlib_context (test.test_ssl.ContextTests) ... ok
  16. test_cert_store_stats (test.test_ssl.ContextTests) ... ok
  17. test_check_hostname (test.test_ssl.ContextTests) ... ok
  18. test_ciphers (test.test_ssl.ContextTests) ... ok
  19. test_constructor (test.test_ssl.ContextTests) ... ok
  20. test_create_default_context (test.test_ssl.ContextTests) ... ok
  21. test_get_ca_certs (test.test_ssl.ContextTests) ... ok
  22. test_load_cert_chain (test.test_ssl.ContextTests) ... ok
  23. test_load_default_certs (test.test_ssl.ContextTests) ... ok
  24. test_load_default_certs_env (test.test_ssl.ContextTests) ... ok
  25. test_load_default_certs_env_windows (test.test_ssl.ContextTests) ... skipped 'Windows specific'
  26. test_load_dh_params (test.test_ssl.ContextTests) ... ok
  27. test_load_verify_cadata (test.test_ssl.ContextTests) ... ok
  28. test_load_verify_locations (test.test_ssl.ContextTests) ... ok
  29. test_options (test.test_ssl.ContextTests) ... ok
  30. test_protocol (test.test_ssl.ContextTests) ... ok
  31. test_session_stats (test.test_ssl.ContextTests) ... ok
  32. test_set_default_verify_paths (test.test_ssl.ContextTests) ... ok
  33. test_set_ecdh_curve (test.test_ssl.ContextTests) ... ok
  34. test_sni_callback (test.test_ssl.ContextTests) ... ok
  35. test_sni_callback_refcycle (test.test_ssl.ContextTests) ... ok
  36. test_verify_flags (test.test_ssl.ContextTests) ... ok
  37. test_verify_mode (test.test_ssl.ContextTests) ... ok
  38. test_DER_to_PEM (test.test_ssl.BasicSocketTests) ... ok
  39. test_asn1object (test.test_ssl.BasicSocketTests) ... ok
  40. test_cert_time_to_seconds (test.test_ssl.BasicSocketTests) ... ok
  41. test_cert_time_to_seconds_locale (test.test_ssl.BasicSocketTests) ... skipped 'locale-specific month name needs to be different from C locale'
  42. test_cert_time_to_seconds_timezone (test.test_ssl.BasicSocketTests) ... ok
  43. test_constants (test.test_ssl.BasicSocketTests) ... ok
  44. test_dealloc_warn (test.test_ssl.BasicSocketTests) ... ok
  45. test_empty_cert (test.test_ssl.BasicSocketTests)
  46. Wrapping with an empty cert file ... ok
  47. test_enum_certificates (test.test_ssl.BasicSocketTests) ... skipped 'Windows specific'
  48. test_enum_crls (test.test_ssl.BasicSocketTests) ... skipped 'Windows specific'
  49. test_errors (test.test_ssl.BasicSocketTests) ... ok
  50. test_get_default_verify_paths (test.test_ssl.BasicSocketTests) ... ok
  51. test_malformed_cert (test.test_ssl.BasicSocketTests)
  52. Wrapping with a badly formatted certificate (syntax error) ... ok
  53. test_malformed_key (test.test_ssl.BasicSocketTests)
  54. Wrapping with a badly formatted key (syntax error) ... ok
  55. test_match_hostname (test.test_ssl.BasicSocketTests) ... ok
  56. test_openssl_version (test.test_ssl.BasicSocketTests) ... ok
  57. test_parse_all_sans (test.test_ssl.BasicSocketTests) ... ok
  58. test_parse_cert (test.test_ssl.BasicSocketTests) ...
  59. {'issuer': ((('countryName', 'XY'),),
  60. (('localityName', 'Castle Anthrax'),),
  61. (('organizationName', 'Python Software Foundation'),),
  62. (('commonName', 'localhost'),)),
  63. 'notAfter': 'Oct 5 23:01:56 2020 GMT',
  64. 'notBefore': 'Oct 8 23:01:56 2010 GMT',
  65. 'serialNumber': 'D7C7381919AFC24E',
  66. 'subject': ((('countryName', 'XY'),),
  67. (('localityName', 'Castle Anthrax'),),
  68. (('organizationName', 'Python Software Foundation'),),
  69. (('commonName', 'localhost'),)),
  70. 'subjectAltName': (('DNS', 'localhost'),),
  71. 'version': 3}
  72. {'OCSP': ('http://ocsp.verisign.com',),
  73. 'caIssuers': ('http://SVRIntl-G3-aia.verisign.com/SVRIntlG3.cer',),
  74. 'crlDistributionPoints': ('http://SVRIntl-G3-crl.verisign.com/SVRIntlG3.crl',),
  75. 'issuer': ((('countryName', 'US'),),
  76. (('organizationName', 'VeriSign, Inc.'),),
  77. (('organizationalUnitName', 'VeriSign Trust Network'),),
  78. (('organizationalUnitName',
  79. 'Terms of use at https://www.verisign.com/rpa (c)10'),),
  80. (('commonName', 'VeriSign Class 3 International Server CA - G3'),)),
  81. 'notAfter': 'Sep 20 23:59:59 2012 GMT',
  82. 'notBefore': 'Sep 21 00:00:00 2011 GMT',
  83. 'serialNumber': '2EE6EA7640A075CEE5005F4D7C79549A',
  84. 'subject': ((('countryName', 'FI'),),
  85. (('stateOrProvinceName', 'Espoo'),),
  86. (('localityName', 'Espoo'),),
  87. (('organizationName', 'Nokia'),),
  88. (('organizationalUnitName', 'BI'),),
  89. (('commonName', 'projects.developer.nokia.com'),)),
  90. 'subjectAltName': (('DNS', 'projects.developer.nokia.com'),
  91. ('DNS', 'projects.forum.nokia.com')),
  92. 'version': 3}
  93. ok
  94. test_parse_cert_CVE_2013_4238 (test.test_ssl.BasicSocketTests) ...
  95. {'issuer': ((('countryName', 'US'),),
  96. (('stateOrProvinceName', 'Oregon'),),
  97. (('localityName', 'Beaverton'),),
  98. (('organizationName', 'Python Software Foundation'),),
  99. (('organizationalUnitName', 'Python Core Development'),),
  100. (('commonName', 'null.python.org\x00example.org'),),
  101. (('emailAddress', 'python-dev@python.org'),)),
  102. 'notAfter': 'Aug 7 13:12:52 2013 GMT',
  103. 'notBefore': 'Aug 7 13:11:52 2013 GMT',
  104. 'serialNumber': '00',
  105. 'subject': ((('countryName', 'US'),),
  106. (('stateOrProvinceName', 'Oregon'),),
  107. (('localityName', 'Beaverton'),),
  108. (('organizationName', 'Python Software Foundation'),),
  109. (('organizationalUnitName', 'Python Core Development'),),
  110. (('commonName', 'null.python.org\x00example.org'),),
  111. (('emailAddress', 'python-dev@python.org'),)),
  112. 'subjectAltName': (('DNS', 'altnull.python.org\x00example.com'),
  113. ('email', 'null@python.org\x00user@example.org'),
  114. ('URI', 'http://null.python.org\x00http://example.org'),
  115. ('IP Address', '192.0.2.1'),
  116. ('IP Address', '2001:DB8:0:0:0:0:0:1\n')),
  117. 'version': 3}
  118. ok
  119. test_purpose_enum (test.test_ssl.BasicSocketTests) ... ok
  120. test_random (test.test_ssl.BasicSocketTests) ...
  121. RAND_status is 1 (sufficient randomness)
  122. ok
  123. test_random_fork (test.test_ssl.BasicSocketTests) ... ok
  124. test_refcycle (test.test_ssl.BasicSocketTests) ... ok
  125. test_server_side (test.test_ssl.BasicSocketTests) ... ok
  126. test_str_for_enums (test.test_ssl.BasicSocketTests) ... ok
  127. test_timeout (test.test_ssl.BasicSocketTests) ... ok
  128. test_tls_unique_channel_binding (test.test_ssl.BasicSocketTests) ... ok
  129. test_unknown_channel_binding (test.test_ssl.BasicSocketTests) ... ok
  130. test_unsupported_dtls (test.test_ssl.BasicSocketTests) ... ok
  131. test_wrapped_unconnected (test.test_ssl.BasicSocketTests) ... ok
  132. test_lib_reason (test.test_ssl.SSLErrorTests) ... ok
  133. test_str (test.test_ssl.SSLErrorTests) ... ok
  134. test_subclass (test.test_ssl.SSLErrorTests) ... ok
  135. test_buffer_types (test.test_ssl.MemoryBIOTests) ... ok
  136. test_eof (test.test_ssl.MemoryBIOTests) ... ok
  137. test_error_types (test.test_ssl.MemoryBIOTests) ... ok
  138. test_pending (test.test_ssl.MemoryBIOTests) ... ok
  139. test_read_write (test.test_ssl.MemoryBIOTests) ... ok
  140. test_algorithms (test.test_ssl.NetworkedTests) ... skipped "Resource 'sha256.tbs-internet.com' is not available"
  141. test_ciphers (test.test_ssl.NetworkedTests) ... ok
  142. test_connect (test.test_ssl.NetworkedTests) ... ok
  143. test_connect_cadata (test.test_ssl.NetworkedTests) ... ok
  144. test_connect_capath (test.test_ssl.NetworkedTests) ... ok
  145. test_connect_ex (test.test_ssl.NetworkedTests) ... ok
  146. test_connect_ex_error (test.test_ssl.NetworkedTests) ... ok
  147. test_connect_with_context (test.test_ssl.NetworkedTests) ... ok
  148. test_context_setget (test.test_ssl.NetworkedTests) ... ok
  149. test_get_ca_certs_capath (test.test_ssl.NetworkedTests) ... ok
  150. test_get_server_certificate (test.test_ssl.NetworkedTests) ... [SSL: CERTIFICATE_VERIFY_FAILED] certificate verify failed (_ssl.c:719)
  151. Verified certificate for self-signed.pythontest.net:443 is
  152. -----BEGIN CERTIFICATE-----
  153. MIIClTCCAf6gAwIBAgIJAKGU95wKR8pTMA0GCSqGSIb3DQEBBQUAMHAxCzAJBgNV
  154. BAYTAlhZMRcwFQYDVQQHDA5DYXN0bGUgQW50aHJheDEjMCEGA1UECgwaUHl0aG9u
  155. IFNvZnR3YXJlIEZvdW5kYXRpb24xIzAhBgNVBAMMGnNlbGYtc2lnbmVkLnB5dGhv
  156. bnRlc3QubmV0MB4XDTE0MTEwMjE4MDkyOVoXDTI0MTAzMDE4MDkyOVowcDELMAkG
  157. A1UEBhMCWFkxFzAVBgNVBAcMDkNhc3RsZSBBbnRocmF4MSMwIQYDVQQKDBpQeXRo
  158. b24gU29mdHdhcmUgRm91bmRhdGlvbjEjMCEGA1UEAwwac2VsZi1zaWduZWQucHl0
  159. aG9udGVzdC5uZXQwgZ8wDQYJKoZIhvcNAQEBBQADgY0AMIGJAoGBANDXQXW9tjyZ
  160. Xt0Iv2tLL1+jinr4wGg36ioLDLFkMf+2Y1GL0v0BnKYG4N1OKlAU15LXGeGer8vm
  161. Sv/yIvmdrELvhAbbo3w4a9TMYQA4XkIVLdvu3mvNOAet+8PMJxn26dbDhG809ALv
  162. EHY57lQsBS3G59RZyBPVqAqmImWNJnVzAgMBAAGjNzA1MCUGA1UdEQQeMByCGnNl
  163. bGYtc2lnbmVkLnB5dGhvbnRlc3QubmV0MAwGA1UdEwQFMAMBAf8wDQYJKoZIhvcN
  164. AQEFBQADgYEAIuzAhgMouJpNdf3URCHIineyoSt6WK/9+eyUcjlKOrDoXNZaD72h
  165. TXMeKYoWvJyVcSLKL8ckPtDobgP2OTt0UkyAaj0n+ZHaqq1lH2yVfGUA1ILJv515
  166. C8BqbvVZuqm3i7ygmw3bqE/lYMgOrYtXXnqOrz6nvsE6Yc9V9rFflOM=
  167. -----END CERTIFICATE-----
  168. [SSL: CERTIFICATE_VERIFY_FAILED] certificate verify failed (_ssl.c:719)
  169. Verified certificate for ipv6.google.com:443 is
  170. -----BEGIN CERTIFICATE-----
  171. MIIIgjCCB2qgAwIBAgIIO25QodIIAGIwDQYJKoZIhvcNAQELBQAwVDELMAkGA1UE
  172. BhMCVVMxHjAcBgNVBAoTFUdvb2dsZSBUcnVzdCBTZXJ2aWNlczElMCMGA1UEAxMc
  173. R29vZ2xlIEludGVybmV0IEF1dGhvcml0eSBHMzAeFw0xOTAxMjkxNDU4MDBaFw0x
  174. OTA0MjMxNDU4MDBaMGYxCzAJBgNVBAYTAlVTMRMwEQYDVQQIDApDYWxpZm9ybmlh
  175. MRYwFAYDVQQHDA1Nb3VudGFpbiBWaWV3MRMwEQYDVQQKDApHb29nbGUgTExDMRUw
  176. EwYDVQQDDAwqLmdvb2dsZS5jb20wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEK
  177. AoIBAQC+JIMFPqLN0oMK8YpH1Mzvb/8J/iRcuapF5qnT0WulDuWn1wL9V4qxQFLy
  178. ERRgDRZw16Dj0rwvR2i0idAMgr/0eJSl3WPG0zFgACYRP/FzhrYnr6t6VvFImuDe
  179. Wg8ZSZwkoYIMHLBIeZB9FUWqep67PTvhP7hAXSLmo2izoB5cGSwfAe9QGRr1oGHG
  180. sniZF1z8vx4NFudQBrR7zyGOULaKRZrskm4CFfXcqbquzHEJWVyvNJduJraoIEk0
  181. 7+0GggB2Xc1puaFk1X5K5kgmnk5spZFWlppJLh3Gg0GOER8LRodfdMrcJzSC1W9B
  182. hBf2pEgMHHQ4mmcFat4J/gXnC3BDAgMBAAGjggVEMIIFQDATBgNVHSUEDDAKBggr
  183. BgEFBQcDATCCBBkGA1UdEQSCBBAwggQMggwqLmdvb2dsZS5jb22CDSouYW5kcm9p
  184. ZC5jb22CFiouYXBwZW5naW5lLmdvb2dsZS5jb22CEiouY2xvdWQuZ29vZ2xlLmNv
  185. bYIGKi5nLmNvgg4qLmdjcC5ndnQyLmNvbYIKKi5nZ3BodC5jboIWKi5nb29nbGUt
  186. YW5hbHl0aWNzLmNvbYILKi5nb29nbGUuY2GCCyouZ29vZ2xlLmNsgg4qLmdvb2ds
  187. ZS5jby5pboIOKi5nb29nbGUuY28uanCCDiouZ29vZ2xlLmNvLnVrgg8qLmdvb2ds
  188. ZS5jb20uYXKCDyouZ29vZ2xlLmNvbS5hdYIPKi5nb29nbGUuY29tLmJygg8qLmdv
  189. b2dsZS5jb20uY2+CDyouZ29vZ2xlLmNvbS5teIIPKi5nb29nbGUuY29tLnRygg8q
  190. Lmdvb2dsZS5jb20udm6CCyouZ29vZ2xlLmRlggsqLmdvb2dsZS5lc4ILKi5nb29n
  191. bGUuZnKCCyouZ29vZ2xlLmh1ggsqLmdvb2dsZS5pdIILKi5nb29nbGUubmyCCyou
  192. Z29vZ2xlLnBsggsqLmdvb2dsZS5wdIISKi5nb29nbGVhZGFwaXMuY29tgg8qLmdv
  193. b2dsZWFwaXMuY26CFCouZ29vZ2xlY29tbWVyY2UuY29tghEqLmdvb2dsZXZpZGVv
  194. LmNvbYIMKi5nc3RhdGljLmNugg0qLmdzdGF0aWMuY29tghIqLmdzdGF0aWNjbmFw
  195. cHMuY26CCiouZ3Z0MS5jb22CCiouZ3Z0Mi5jb22CFCoubWV0cmljLmdzdGF0aWMu
  196. Y29tggwqLnVyY2hpbi5jb22CECoudXJsLmdvb2dsZS5jb22CFioueW91dHViZS1u
  197. b2Nvb2tpZS5jb22CDSoueW91dHViZS5jb22CFioueW91dHViZWVkdWNhdGlvbi5j
  198. b22CESoueW91dHViZWtpZHMuY29tggcqLnl0LmJlggsqLnl0aW1nLmNvbYIaYW5k
  199. cm9pZC5jbGllbnRzLmdvb2dsZS5jb22CC2FuZHJvaWQuY29tghtkZXZlbG9wZXIu
  200. YW5kcm9pZC5nb29nbGUuY26CHGRldmVsb3BlcnMuYW5kcm9pZC5nb29nbGUuY26C
  201. BGcuY2+CCGdncGh0LmNuggZnb28uZ2yCFGdvb2dsZS1hbmFseXRpY3MuY29tggpn
  202. b29nbGUuY29tghJnb29nbGVjb21tZXJjZS5jb22CGHNvdXJjZS5hbmRyb2lkLmdv
  203. b2dsZS5jboIKdXJjaGluLmNvbYIKd3d3Lmdvby5nbIIIeW91dHUuYmWCC3lvdXR1
  204. YmUuY29tghR5b3V0dWJlZWR1Y2F0aW9uLmNvbYIPeW91dHViZWtpZHMuY29tggV5
  205. dC5iZTBoBggrBgEFBQcBAQRcMFowLQYIKwYBBQUHMAKGIWh0dHA6Ly9wa2kuZ29v
  206. Zy9nc3IyL0dUU0dJQUczLmNydDApBggrBgEFBQcwAYYdaHR0cDovL29jc3AucGtp
  207. Lmdvb2cvR1RTR0lBRzMwHQYDVR0OBBYEFLv0FYDs8E72WFqxSUyCEkj5+347MAwG
  208. A1UdEwEB/wQCMAAwHwYDVR0jBBgwFoAUd8K4UJpndnaxLcKG0IOgfqZ+ukswIQYD
  209. VR0gBBowGDAMBgorBgEEAdZ5AgUDMAgGBmeBDAECAjAxBgNVHR8EKjAoMCagJKAi
  210. hiBodHRwOi8vY3JsLnBraS5nb29nL0dUU0dJQUczLmNybDANBgkqhkiG9w0BAQsF
  211. AAOCAQEAKTqBe66Omg0lSU5I7CZmihbGJLQ7Ur6RMGKMPjrHuvnxIYJpiF+UeR92
  212. o8UFUSIKzT2JhsMKnYXqfKJF+lWbqpPGl3hup7O9Z7wHVg+F1YiLXXUpKxpdZaqB
  213. iqDlDMcrxsC37ILZa+u4+5oeAZCqNsutYh6jsvPyp/EyJa+Bo2Q7QdOOT6r1HJsr
  214. 6aJOc1PnriMfVWl5v+exEe5fx5m+1uNORWrNBepyUyp6oBRZIJtuqdLxHU52nYc5
  215. Ey6mQbQa5kFBZGSdAY7q3rb3+lvmhCdRSEqQmjJkxIHAcf46XN98gxf+2mp/rwXV
  216. W8yNRCttwlen3ZJeChHRpoigd1IeAQ==
  217. -----END CERTIFICATE-----
  218. ok
  219. test_makefile_close (test.test_ssl.NetworkedTests) ... ok
  220. test_non_blocking_connect_ex (test.test_ssl.NetworkedTests) ... ok
  221. test_non_blocking_handshake (test.test_ssl.NetworkedTests) ...
  222. Needed 3 calls to do_handshake() to establish session.
  223. ok
  224. test_timeout_connect_ex (test.test_ssl.NetworkedTests) ... ok
  225. test_handshake (test.test_ssl.NetworkedBIOTests) ... Needed 3 calls to complete do_handshake().
  226. ok
  227. test_read_write_data (test.test_ssl.NetworkedBIOTests) ... Needed 3 calls to complete do_handshake().
  228. Needed 1 calls to complete write().
  229. Needed 2 calls to complete read().
  230. Needed 1 calls to complete unwrap().
  231. ok
  232. test_alpn_protocols (test.test_ssl.ThreadedTests) ... server: new connection from ('127.0.0.1', 48358)
  233. server: connection cipher is now ('ECDHE-RSA-AES256-GCM-SHA384', 'TLSv1.2', 256)
  234. server: selected protocol is now None
  235. client: sending b'FOO\n'...
  236. client: read b'foo\n'
  237. client: sending b'FOO\n'...
  238. client: read b'foo\n'
  239. client: sending b'FOO\n'...
  240. client: read b'foo\n'
  241. client: closing connection.
  242. server: new connection from ('127.0.0.1', 60834)
  243. server: connection cipher is now ('ECDHE-RSA-AES256-GCM-SHA384', 'TLSv1.2', 256)
  244. server: selected protocol is now None
  245. client: sending b'FOO\n'...
  246. client: read b'foo\n'
  247. client: sending b'FOO\n'...
  248. client: read b'foo\n'
  249. client: sending b'FOO\n'...
  250. client: read b'foo\n'
  251. client: closing connection.
  252. server: new connection from ('127.0.0.1', 33030)
  253. server: connection cipher is now ('ECDHE-RSA-AES256-GCM-SHA384', 'TLSv1.2', 256)
  254. client: sending b'FOO\n'...
  255. server: selected protocol is now None
  256. client: read b'foo\n'
  257. client: sending b'FOO\n'...
  258. client: read b'foo\n'
  259. client: sending b'FOO\n'...
  260. client: read b'foo\n'
  261. client: closing connection.
  262. server: new connection from ('127.0.0.1', 37454)
  263. server: connection cipher is now ('ECDHE-RSA-AES256-GCM-SHA384', 'TLSv1.2', 256)
  264. client: sending b'FOO\n'...
  265. server: selected protocol is now None
  266. client: read b'foo\n'
  267. client: sending b'FOO\n'...
  268. client: read b'foo\n'
  269. client: sending b'FOO\n'...
  270. client: read b'foo\n'
  271. client: closing connection.
  272. FAIL
  273. test_asyncore_server (test.test_ssl.ThreadedTests)
  274. Check the example asyncore integration. ...
  275. server: new connection from 127.0.0.1:56782
  276. client: sending b'FOO\n'...
  277. server: read b'FOO\n' from client
  278. client: read b'foo\n'
  279. client: closing connection.
  280. server: read b'over\n' from client
  281. client: connection closed.
  282. cleanup: stopping server.
  283. cleanup: joining server thread.
  284. server: closed connection <ssl.SSLSocket [closed] fd=-1, family=AddressFamily.AF_INET, type=2049, proto=0>
  285. server: read b'' from client
  286. cleanup: successfully joined.
  287. ok
  288. test_check_hostname (test.test_ssl.ThreadedTests) ...
  289. server: new connection from ('127.0.0.1', 35364)
  290. server: connection cipher is now ('ECDHE-RSA-AES256-SHA', 'TLSv1.0', 256)
  291. server: selected protocol is now None
  292. server: new connection from ('127.0.0.1', 42970)
  293. server: connection cipher is now ('ECDHE-RSA-AES256-SHA', 'TLSv1.0', 256)
  294. server: selected protocol is now None
  295. ok
  296. test_compression (test.test_ssl.ThreadedTests) ... server: new connection from ('127.0.0.1', 53170)
  297. server: connection cipher is now ('ECDHE-RSA-AES256-SHA', 'TLSv1.0', 256)
  298. client: sending b'FOO\n'...
  299. server: selected protocol is now None
  300. client: read b'foo\n'
  301. client: sending b'FOO\n'...
  302. client: read b'foo\n'
  303. client: sending b'FOO\n'...
  304. client: read b'foo\n'
  305. client: closing connection.
  306. got compression: None
  307. ok
  308. test_compression_disabled (test.test_ssl.ThreadedTests) ... server: new connection from ('127.0.0.1', 55910)
  309. server: connection cipher is now ('ECDHE-RSA-AES256-SHA', 'TLSv1.0', 256)
  310. client: sending b'FOO\n'...
  311. server: selected protocol is now None
  312. client: read b'foo\n'
  313. client: sending b'FOO\n'...
  314. client: read b'foo\n'
  315. client: sending b'FOO\n'...
  316. client: read b'foo\n'
  317. client: closing connection.
  318. ok
  319. test_crl_check (test.test_ssl.ThreadedTests) ...
  320. server: new connection from ('127.0.0.1', 45362)
  321. server: connection cipher is now ('ECDHE-RSA-AES256-SHA', 'TLSv1.0', 256)
  322. server: selected protocol is now None
  323. server: new connection from ('127.0.0.1', 53570)
  324. server: bad connection attempt from ('127.0.0.1', 53570):
  325. Traceback (most recent call last):
  326. File "/home/m/Python-3.5.6/Lib/test/test_ssl.py", line 1849, in wrap_conn
  327. self.sock, server_side=True)
  328. File "/home/m/Python-3.5.6/Lib/ssl.py", line 385, in wrap_socket
  329. _context=self)
  330. File "/home/m/Python-3.5.6/Lib/ssl.py", line 760, in __init__
  331. self.do_handshake()
  332. File "/home/m/Python-3.5.6/Lib/ssl.py", line 996, in do_handshake
  333. self._sslobj.do_handshake()
  334. File "/home/m/Python-3.5.6/Lib/ssl.py", line 641, in do_handshake
  335. self._sslobj.do_handshake()
  336. ssl.SSLError: [SSL: TLSV1_ALERT_UNKNOWN_CA] tlsv1 alert unknown ca (_ssl.c:719)
  337. server: new connection from ('127.0.0.1', 37466)
  338. server: connection cipher is now ('ECDHE-RSA-AES256-SHA', 'TLSv1.0', 256)
  339. server: selected protocol is now None
  340. ok
  341. test_default_ciphers (test.test_ssl.ThreadedTests) ... skipped 'no DES cipher available'
  342. test_default_ecdh_curve (test.test_ssl.ThreadedTests) ... server: new connection from ('127.0.0.1', 41616)
  343. server: connection cipher is now ('ECDHE-RSA-AES256-GCM-SHA384', 'TLSv1.2', 256)
  344. server: selected protocol is now None
  345. ok
  346. test_dh_params (test.test_ssl.ThreadedTests) ... server: new connection from ('127.0.0.1', 33296)
  347. server: connection cipher is now ('DHE-RSA-AES256-SHA', 'SSLv3', 256)
  348. server: selected protocol is now None
  349. client: sending b'FOO\n'...
  350. client: read b'foo\n'
  351. client: sending b'FOO\n'...
  352. client: read b'foo\n'
  353. client: sending b'FOO\n'...
  354. client: read b'foo\n'
  355. client: closing connection.
  356. ok
  357. test_do_handshake_enotconn (test.test_ssl.ThreadedTests) ... ok
  358. test_echo (test.test_ssl.ThreadedTests)
  359. Basic test of an SSL client connecting to a server ...
  360. server: new connection from ('127.0.0.1', 55542)
  361. server: connection cipher is now ('ECDHE-RSA-AES256-GCM-SHA384', 'TLSv1.2', 256)
  362. server: selected protocol is now None
  363. client: sending b'FOO\n'...
  364. client: read b'foo\n'
  365. client: sending b'FOO\n'...
  366. client: read b'foo\n'
  367. client: sending b'FOO\n'...
  368. client: read b'foo\n'
  369. client: closing connection.
  370. server: new connection from ('127.0.0.1', 51056)
  371. server: connection cipher is now ('ECDHE-RSA-AES256-SHA', 'TLSv1.0', 256)
  372. client: sending b'FOO\n'...
  373. server: selected protocol is now None
  374. client: read b'foo\n'
  375. client: sending b'FOO\n'...
  376. client: read b'foo\n'
  377. client: sending b'FOO\n'...
  378. client: read b'foo\n'
  379. client: closing connection.
  380. server: new connection from ('127.0.0.1', 39080)
  381. server: connection cipher is now ('ECDHE-RSA-AES256-SHA', 'TLSv1.0', 256)
  382. server: selected protocol is now None
  383. client: sending b'FOO\n'...
  384. client: read b'foo\n'
  385. client: sending b'FOO\n'...
  386. client: read b'foo\n'
  387. client: sending b'FOO\n'...
  388. client: read b'foo\n'
  389. client: closing connection.
  390. server: new connection from ('127.0.0.1', 34970)
  391. server: connection cipher is now ('ECDHE-RSA-AES256-GCM-SHA384', 'TLSv1.2', 256)
  392. client: sending b'FOO\n'...
  393. server: selected protocol is now None
  394. client: read b'foo\n'
  395. client: sending b'FOO\n'...
  396. client: read b'foo\n'
  397. client: sending b'FOO\n'...
  398. client: read b'foo\n'
  399. client: closing connection.
  400. ok
  401. test_getpeercert (test.test_ssl.ThreadedTests) ...
  402. {'issuer': ((('countryName', 'XY'),),
  403. (('localityName', 'Castle Anthrax'),),
  404. (('organizationName', 'Python Software Foundation'),),
  405. (('commonName', 'localhost'),)),
  406. 'notAfter': 'Oct 5 23:01:56 2020 GMT',
  407. 'notBefore': 'Oct 8 23:01:56 2010 GMT',
  408. 'serialNumber': 'D7C7381919AFC24E',
  409. 'subject': ((('countryName', 'XY'),),
  410. (('localityName', 'Castle Anthrax'),),
  411. (('organizationName', 'Python Software Foundation'),),
  412. (('commonName', 'localhost'),)),
  413. 'subjectAltName': (('DNS', 'localhost'),),
  414. 'version': 3}
  415. Connection cipher is ('ECDHE-RSA-AES256-GCM-SHA384', 'TLSv1.2', 256).
  416. ok
  417. test_getpeercert_enotconn (test.test_ssl.ThreadedTests) ... ok
  418. test_handshake_timeout (test.test_ssl.ThreadedTests) ... ok
  419. test_nonblocking_send (test.test_ssl.ThreadedTests) ... server: new connection from ('127.0.0.1', 35406)
  420. server: connection cipher is now ('ECDHE-RSA-AES256-SHA', 'TLSv1.0', 256)
  421. server: selected protocol is now None
  422. Test server failure:
  423. Traceback (most recent call last):
  424. File "/home/m/Python-3.5.6/Lib/test/test_ssl.py", line 1946, in run
  425. self.write(msg.lower())
  426. File "/home/m/Python-3.5.6/Lib/test/test_ssl.py", line 1891, in write
  427. return self.sslconn.write(bytes)
  428. File "/home/m/Python-3.5.6/Lib/ssl.py", line 816, in write
  429. return self._sslobj.write(data)
  430. File "/home/m/Python-3.5.6/Lib/ssl.py", line 594, in write
  431. return self._sslobj.write(data)
  432. ConnectionResetError: [Errno 104] Connection reset by peer
  433. ok
  434. test_npn_protocols (test.test_ssl.ThreadedTests) ... server: new connection from ('127.0.0.1', 57872)
  435. server: connection cipher is now ('ECDHE-RSA-AES256-SHA', 'TLSv1.0', 256)
  436. client: sending b'FOO\n'...
  437. server: selected protocol is now http/1.1
  438. client: read b'foo\n'
  439. client: sending b'FOO\n'...
  440. client: read b'foo\n'
  441. client: sending b'FOO\n'...
  442. client: read b'foo\n'
  443. client: closing connection.
  444. server: new connection from ('127.0.0.1', 49394)
  445. server: connection cipher is now ('ECDHE-RSA-AES256-SHA', 'TLSv1.0', 256)
  446. client: sending b'FOO\n'...
  447. server: selected protocol is now http/1.1
  448. client: read b'foo\n'
  449. client: sending b'FOO\n'...
  450. client: read b'foo\n'
  451. client: sending b'FOO\n'...
  452. client: read b'foo\n'
  453. client: closing connection.
  454. server: new connection from ('127.0.0.1', 56892)
  455. server: connection cipher is now ('ECDHE-RSA-AES256-SHA', 'TLSv1.0', 256)
  456. client: sending b'FOO\n'...
  457. server: selected protocol is now spdy/2
  458. client: read b'foo\n'
  459. client: sending b'FOO\n'...
  460. client: read b'foo\n'
  461. client: sending b'FOO\n'...
  462. client: read b'foo\n'
  463. client: closing connection.
  464. server: new connection from ('127.0.0.1', 54536)
  465. server: connection cipher is now ('ECDHE-RSA-AES256-SHA', 'TLSv1.0', 256)
  466. client: sending b'FOO\n'...
  467. server: selected protocol is now abc
  468. client: read b'foo\n'
  469. client: sending b'FOO\n'...
  470. client: read b'foo\n'
  471. client: sending b'FOO\n'...
  472. client: read b'foo\n'
  473. client: closing connection.
  474. ok
  475. test_protocol_sslv2 (test.test_ssl.ThreadedTests)
  476. Connecting to an SSLv2 server with various client options ... skipped 'OpenSSL is compiled without SSLv2 support'
  477. test_protocol_sslv23 (test.test_ssl.ThreadedTests)
  478. Connecting to an SSLv23 server with various client options ...
  479. PROTOCOL_TLS->PROTOCOL_TLS CERT_NONE
  480. PROTOCOL_TLSv1->PROTOCOL_TLS CERT_NONE
  481. PROTOCOL_TLS->PROTOCOL_TLS CERT_OPTIONAL
  482. PROTOCOL_TLSv1->PROTOCOL_TLS CERT_OPTIONAL
  483. PROTOCOL_TLS->PROTOCOL_TLS CERT_REQUIRED
  484. PROTOCOL_TLSv1->PROTOCOL_TLS CERT_REQUIRED
  485. PROTOCOL_TLS->PROTOCOL_TLS CERT_NONE
  486. {PROTOCOL_TLSv1->PROTOCOL_TLS} CERT_NONE
  487. ok
  488. test_protocol_sslv3 (test.test_ssl.ThreadedTests)
  489. Connecting to an SSLv3 server with various client options ... skipped 'OpenSSL is compiled without SSLv3 support'
  490. test_protocol_tlsv1 (test.test_ssl.ThreadedTests)
  491. Connecting to a TLSv1 server with various client options ...
  492. PROTOCOL_TLSv1->PROTOCOL_TLSv1 CERT_NONE
  493. PROTOCOL_TLSv1->PROTOCOL_TLSv1 CERT_OPTIONAL
  494. PROTOCOL_TLSv1->PROTOCOL_TLSv1 CERT_REQUIRED
  495. {PROTOCOL_TLS->PROTOCOL_TLSv1} CERT_NONE
  496. ok
  497. test_protocol_tlsv1_1 (test.test_ssl.ThreadedTests)
  498. Connecting to a TLSv1.1 server with various client options. ...
  499. PROTOCOL_TLSv1_1->PROTOCOL_TLSv1_1 CERT_NONE
  500. {PROTOCOL_TLS->PROTOCOL_TLSv1_1} CERT_NONE
  501. PROTOCOL_TLSv1_1->PROTOCOL_TLS CERT_NONE
  502. {PROTOCOL_TLSv1->PROTOCOL_TLSv1_1} CERT_NONE
  503. {PROTOCOL_TLSv1_1->PROTOCOL_TLSv1} CERT_NONE
  504. ok
  505. test_protocol_tlsv1_2 (test.test_ssl.ThreadedTests)
  506. Connecting to a TLSv1.2 server with various client options. ...
  507. PROTOCOL_TLSv1_2->PROTOCOL_TLSv1_2 CERT_NONE
  508. {PROTOCOL_TLS->PROTOCOL_TLSv1_2} CERT_NONE
  509. PROTOCOL_TLSv1_2->PROTOCOL_TLS CERT_NONE
  510. {PROTOCOL_TLSv1->PROTOCOL_TLSv1_2} CERT_NONE
  511. {PROTOCOL_TLSv1_2->PROTOCOL_TLSv1} CERT_NONE
  512. {PROTOCOL_TLSv1_1->PROTOCOL_TLSv1_2} CERT_NONE
  513. {PROTOCOL_TLSv1_2->PROTOCOL_TLSv1_1} CERT_NONE
  514. ok
  515. test_read_write_after_close_raises_valuerror (test.test_ssl.ThreadedTests) ... ok
  516. test_recv_send (test.test_ssl.ThreadedTests)
  517. Test recv(), send() and friends. ...
  518. server: new connection from ('127.0.0.1', 33352)
  519. server: connection cipher is now ('ECDHE-RSA-AES256-SHA', 'TLSv1.0', 256)
  520. server: selected protocol is now None
  521. ok
  522. test_recv_zero (test.test_ssl.ThreadedTests) ... server: new connection from ('127.0.0.1', 46514)
  523. server: connection cipher is now ('ECDHE-RSA-AES256-SHA', 'TLSv1.0', 256)
  524. server: selected protocol is now None
  525. ok
  526. test_rude_shutdown (test.test_ssl.ThreadedTests)
  527. A brutal shutdown of an SSL server should raise an OSError ... ok
  528. test_selected_alpn_protocol (test.test_ssl.ThreadedTests) ... server: new connection from ('127.0.0.1', 52016)
  529. server: connection cipher is now ('ECDHE-RSA-AES256-SHA', 'TLSv1.0', 256)
  530. server: selected protocol is now None
  531. client: sending b'FOO\n'...
  532. client: read b'foo\n'
  533. client: sending b'FOO\n'...
  534. client: read b'foo\n'
  535. client: sending b'FOO\n'...
  536. client: read b'foo\n'
  537. client: closing connection.
  538. ok
  539. test_selected_alpn_protocol_if_server_uses_alpn (test.test_ssl.ThreadedTests) ... server: new connection from ('127.0.0.1', 47860)
  540. server: connection cipher is now ('ECDHE-RSA-AES256-SHA', 'TLSv1.0', 256)
  541. server: selected protocol is now None
  542. client: sending b'FOO\n'...
  543. client: read b'foo\n'
  544. client: sending b'FOO\n'...
  545. client: read b'foo\n'
  546. client: sending b'FOO\n'...
  547. client: read b'foo\n'
  548. client: closing connection.
  549. ok
  550. test_selected_npn_protocol (test.test_ssl.ThreadedTests) ... server: new connection from ('127.0.0.1', 50884)
  551. server: connection cipher is now ('ECDHE-RSA-AES256-SHA', 'TLSv1.0', 256)
  552. client: sending b'FOO\n'...
  553. server: selected protocol is now None
  554. client: read b'foo\n'
  555. client: sending b'FOO\n'...
  556. client: read b'foo\n'
  557. client: sending b'FOO\n'...
  558. client: read b'foo\n'
  559. client: closing connection.
  560. ok
  561. test_sendfile (test.test_ssl.ThreadedTests) ... ok
  562. test_server_accept (test.test_ssl.ThreadedTests) ... ok
  563. test_shared_ciphers (test.test_ssl.ThreadedTests) ... server: new connection from ('127.0.0.1', 38624)
  564. server: connection cipher is now ('ECDHE-RSA-AES256-SHA', 'TLSv1.0', 256)
  565. server: selected protocol is now None
  566. ok
  567. test_sni_callback (test.test_ssl.ThreadedTests) ... server: new connection from ('127.0.0.1', 59416)
  568. server: connection cipher is now ('ECDHE-RSA-AES256-SHA', 'TLSv1.0', 256)
  569. server: selected protocol is now None
  570. server: new connection from ('127.0.0.1', 41122)
  571. server: connection cipher is now ('ECDHE-RSA-AES256-SHA', 'TLSv1.0', 256)
  572. server: selected protocol is now None
  573. server: new connection from ('127.0.0.1', 45224)
  574. server: connection cipher is now ('ECDHE-RSA-AES256-SHA', 'TLSv1.0', 256)
  575. server: selected protocol is now None
  576. ok
  577. test_sni_callback_alert (test.test_ssl.ThreadedTests) ... ok
  578. test_sni_callback_raising (test.test_ssl.ThreadedTests) ... ok
  579. test_sni_callback_wrong_return_type (test.test_ssl.ThreadedTests) ... ok
  580. test_socketserver (test.test_ssl.ThreadedTests)
  581. Using socketserver to create and manage SSL connections. ...
  582. server (('127.0.0.1', 43571):43571 ('ECDHE-RSA-AES256-GCM-SHA384', 'TLSv1.2', 256)):
  583. [17/Feb/2019 22:48:50] "GET /keycert.pem HTTP/1.1" 200 -
  584. client: read 1783 bytes from remote server '<HTTPSServerThread <HTTPSServer localhost:43571>>'
  585. stopping HTTPS server
  586. joining HTTPS thread
  587. ok
  588. test_starttls (test.test_ssl.ThreadedTests)
  589. Switching from clear text to encrypted and back again. ...
  590. client: sending b'msg 1'...
  591. server: new connection from ('127.0.0.1', 57534)
  592. server: read b'msg 1' (unencrypted), sending back b'msg 1' (unencrypted)...
  593. client: read b'msg 1' from server
  594. client: sending b'MSG 2'...
  595. server: read b'MSG 2' (unencrypted), sending back b'msg 2' (unencrypted)...
  596. client: read b'msg 2' from server
  597. client: sending b'STARTTLS'...
  598. server: read STARTTLS from client, sending OK...
  599. client: read b'ok' from server, starting TLS...
  600. server: connection cipher is now ('ECDHE-RSA-AES256-SHA', 'TLSv1.0', 256)
  601. client: sending b'MSG 3'...
  602. server: selected protocol is now None
  603. server: read b'MSG 3' (encrypted), sending back b'msg 3' (encrypted)...
  604. client: read b'msg 3' from server
  605. client: sending b'msg 4'...
  606. server: read b'msg 4' (encrypted), sending back b'msg 4' (encrypted)...
  607. client: read b'msg 4' from server
  608. client: sending b'ENDTLS'...
  609. server: read ENDTLS from client, sending OK...
  610. client: read b'ok' from server, ending TLS...
  611. server: connection is now unencrypted...
  612. client: sending b'msg 5'...
  613. server: read b'msg 5' (unencrypted), sending back b'msg 5' (unencrypted)...
  614. client: read b'msg 5' from server
  615. client: sending b'msg 6'...
  616. server: read b'msg 6' (unencrypted), sending back b'msg 6' (unencrypted)...
  617. client: read b'msg 6' from server
  618. client: closing connection.
  619. server: client closed connection
  620. ok
  621. test_tls_unique_channel_binding (test.test_ssl.ThreadedTests)
  622. Test tls-unique channel binding. ...
  623. server: new connection from ('127.0.0.1', 45814)
  624. server: connection cipher is now ('ECDHE-RSA-AES256-SHA', 'TLSv1.0', 256)
  625. got channel binding data: b'\xb5\x11\x15%\x86o\x10\xa1\xcbr\x8c\x07'
  626. server: selected protocol is now None
  627. server: new connection from ('127.0.0.1', 45816)
  628. server: connection cipher is now ('ECDHE-RSA-AES256-SHA', 'TLSv1.0', 256)
  629. server: selected protocol is now None
  630. got another channel binding data: b'?5\x92Q4n5i\x1fvFd'
  631. ok
  632. test_version_basic (test.test_ssl.ThreadedTests) ... ok
  633. test_wrong_cert (test.test_ssl.ThreadedTests)
  634. Connecting when the server rejects the client's certificate ...
  635. SSLError is SSLError(1, '[SSL: TLSV1_ALERT_UNKNOWN_CA] tlsv1 alert unknown ca (_ssl.c:719)')
  636. ok
  637. ======================================================================
  638. FAIL: test_alpn_protocols (test.test_ssl.ThreadedTests)
  639. ----------------------------------------------------------------------
  640. Traceback (most recent call last):
  641. File "/home/m/Python-3.5.6/Lib/test/test_ssl.py", line 3183, in test_alpn_protocols
  642. self.assertIsInstance(stats, ssl.SSLError)
  643. AssertionError: {'server_shared_ciphers': [[('ECDHE-ECDSA-AES256-GCM-SHA384', 'TLSv1.2', 256), ('ECDHE-RSA-AES256-GCM-SHA384', 'TLSv1.2', 256), ('ECDHE-ECDSA-AES128-GCM-SHA256', 'TLSv1.2', 128), ('ECDHE-RSA-AES128-GCM-SHA256', 'TLSv1.2', 128), ('ECDHE-ECDSA-CHACHA20-POLY1305', 'TLSv1.2', 256), ('ECDHE-RSA-CHACHA20-POLY1305', 'TLSv1.2', 256), ('DHE-DSS-AES256-GCM-SHA384', 'TLSv1.2', 256), ('DHE-RSA-AES256-GCM-SHA384', 'TLSv1.2', 256), ('DHE-DSS-AES128-GCM-SHA256', 'TLSv1.2', 128), ('DHE-RSA-AES128-GCM-SHA256', 'TLSv1.2', 128), ('DHE-RSA-CHACHA20-POLY1305', 'TLSv1.2', 256), ('ECDHE-ECDSA-AES256-CCM8', 'TLSv1.2', 256), ('ECDHE-ECDSA-AES256-CCM', 'TLSv1.2', 256), ('ECDHE-ECDSA-AES256-SHA384', 'TLSv1.2', 256), ('ECDHE-RSA-AES256-SHA384', 'TLSv1.2', 256), ('ECDHE-ECDSA-AES256-SHA', 'TLSv1.0', 256), ('ECDHE-RSA-AES256-SHA', 'TLSv1.0', 256), ('DHE-RSA-AES256-CCM8', 'TLSv1.2', 256), ('DHE-RSA-AES256-CCM', 'TLSv1.2', 256), ('DHE-RSA-AES256-SHA256', 'TLSv1.2', 256), ('DHE-DSS-AES256-SHA256', 'TLSv1.2', 256), ('DHE-RSA-AES256-SHA', 'SSLv3', 256), ('DHE-DSS-AES256-SHA', 'SSLv3', 256), ('ECDHE-ECDSA-AES128-CCM8', 'TLSv1.2', 128), ('ECDHE-ECDSA-AES128-CCM', 'TLSv1.2', 128), ('ECDHE-ECDSA-AES128-SHA256', 'TLSv1.2', 128), ('ECDHE-RSA-AES128-SHA256', 'TLSv1.2', 128), ('ECDHE-ECDSA-AES128-SHA', 'TLSv1.0', 128), ('ECDHE-RSA-AES128-SHA', 'TLSv1.0', 128), ('DHE-RSA-AES128-CCM8', 'TLSv1.2', 128), ('DHE-RSA-AES128-CCM', 'TLSv1.2', 128), ('DHE-RSA-AES128-SHA256', 'TLSv1.2', 128), ('DHE-DSS-AES128-SHA256', 'TLSv1.2', 128), ('DHE-RSA-AES128-SHA', 'SSLv3', 128), ('DHE-DSS-AES128-SHA', 'SSLv3', 128), ('ECDHE-ECDSA-CAMELLIA256-SHA384', 'TLSv1.2', 256), ('ECDHE-RSA-CAMELLIA256-SHA384', 'TLSv1.2', 256), ('ECDHE-ECDSA-CAMELLIA128-SHA256', 'TLSv1.2', 128), ('ECDHE-RSA-CAMELLIA128-SHA256', 'TLSv1.2', 128), ('DHE-RSA-CAMELLIA256-SHA256', 'TLSv1.2', 256), ('DHE-DSS-CAMELLIA256-SHA256', 'TLSv1.2', 256), ('DHE-RSA-CAMELLIA128-SHA256', 'TLSv1.2', 128), ('DHE-DSS-CAMELLIA128-SHA256', 'TLSv1.2', 128), ('DHE-RSA-CAMELLIA256-SHA', 'SSLv3', 256), ('DHE-DSS-CAMELLIA256-SHA', 'SSLv3', 256), ('DHE-RSA-CAMELLIA128-SHA', 'SSLv3', 128), ('DHE-DSS-CAMELLIA128-SHA', 'SSLv3', 128), ('AES256-GCM-SHA384', 'TLSv1.2', 256), ('AES128-GCM-SHA256', 'TLSv1.2', 128), ('AES256-CCM8', 'TLSv1.2', 256), ('AES256-CCM', 'TLSv1.2', 256), ('AES128-CCM8', 'TLSv1.2', 128), ('AES128-CCM', 'TLSv1.2', 128), ('AES256-SHA256', 'TLSv1.2', 256), ('AES128-SHA256', 'TLSv1.2', 128), ('AES256-SHA', 'SSLv3', 256), ('AES128-SHA', 'SSLv3', 128), ('CAMELLIA256-SHA256', 'TLSv1.2', 256), ('CAMELLIA128-SHA256', 'TLSv1.2', 128), ('CAMELLIA256-SHA', 'SSLv3', 256), ('CAMELLIA128-SHA', 'SSLv3', 128)]], 'server_npn_protocols': [None], 'version': 'TLSv1.2', 'client_alpn_protocol': None, 'peercert': {}, 'server_alpn_protocols': [None], 'client_npn_protocol': None, 'compression': None, 'cipher': ('ECDHE-RSA-AES256-GCM-SHA384', 'TLSv1.2', 256)} is not an instance of <class 'ssl.SSLError'>
  644.