summaryrefslogtreecommitdiffstats
path: root/Lib/test/test_asyncio/utils.py
diff options
context:
space:
mode:
authorChristian Heimes <christian@python.org>2018-02-27 07:55:39 (GMT)
committerGitHub <noreply@github.com>2018-02-27 07:55:39 (GMT)
commit05d9fe32a1245b9a798e49e0c1eb91f110935b69 (patch)
tree91689b53a92b61a2a2d7441a5d51c118cf140538 /Lib/test/test_asyncio/utils.py
parent2fa6b9eae07e2385e2acbf2e40093a21fb3a10c4 (diff)
downloadcpython-05d9fe32a1245b9a798e49e0c1eb91f110935b69.zip
cpython-05d9fe32a1245b9a798e49e0c1eb91f110935b69.tar.gz
cpython-05d9fe32a1245b9a798e49e0c1eb91f110935b69.tar.bz2
bpo-32947: OpenSSL 1.1.1-pre1 / TLS 1.3 fixes (#5663)
* bpo-32947: OpenSSL 1.1.1-pre1 / TLS 1.3 fixes Misc fixes and workarounds for compatibility with OpenSSL 1.1.1-pre1 and TLS 1.3 support. With OpenSSL 1.1.1, Python negotiates TLS 1.3 by default. Some test cases only apply to TLS 1.2. Other tests currently fail because the threaded or async test servers stop after failure. I'm going to address these issues when OpenSSL 1.1.1 reaches beta. OpenSSL 1.1.1 has added a new option OP_ENABLE_MIDDLEBOX_COMPAT for TLS 1.3. The feature is enabled by default for maximum compatibility with broken middle boxes. Users should be able to disable the hack and CPython's test suite needs it to verify default options. Signed-off-by: Christian Heimes <christian@python.org>
Diffstat (limited to 'Lib/test/test_asyncio/utils.py')
-rw-r--r--Lib/test/test_asyncio/utils.py2
1 files changed, 2 insertions, 0 deletions
diff --git a/Lib/test/test_asyncio/utils.py b/Lib/test/test_asyncio/utils.py
index 96dfe2f..711085f 100644
--- a/Lib/test/test_asyncio/utils.py
+++ b/Lib/test/test_asyncio/utils.py
@@ -74,6 +74,8 @@ def simple_server_sslcontext():
server_context.load_cert_chain(ONLYCERT, ONLYKEY)
server_context.check_hostname = False
server_context.verify_mode = ssl.CERT_NONE
+ # TODO: fix TLSv1.3 support
+ server_context.options |= ssl.OP_NO_TLSv1_3
return server_context