FreeBSD Bugzilla – Attachment 150005 Details for
Bug 195511
lang/python33: Fix build with LibreSSL
Home
|
New
|
Browse
|
Search
|
[?]
|
Reports
|
Help
|
New Account
|
Log In
Remember
[x]
|
Forgot Password
Login:
[x]
Output of the test_ssl unit test
test_ssl.log (text/x-log), 17.17 KB, created by
Bernard Spil
on 2014-11-29 22:15:11 UTC
(
hide
)
Description:
Output of the test_ssl unit test
Filename:
MIME Type:
Creator:
Bernard Spil
Created:
2014-11-29 22:15:11 UTC
Size:
17.17 KB
patch
obsolete
>test_ssl: testing with 'LibreSSL 2.1' (1, 0, 1, 7, 15) > under 'FreeBSD-10.1-RELEASE-amd64-64bit-ELF' > HAS_SNI = True >test_ciphers (__main__.ContextTests) ... ok >test_constructor (__main__.ContextTests) ... ok >test_load_cert_chain (__main__.ContextTests) ... ok >test_load_dh_params (__main__.ContextTests) ... ok >test_load_verify_locations (__main__.ContextTests) ... ok >test_options (__main__.ContextTests) ... FAIL >test_protocol (__main__.ContextTests) ... ok >test_session_stats (__main__.ContextTests) ... ok >test_set_default_verify_paths (__main__.ContextTests) ... ok >test_set_ecdh_curve (__main__.ContextTests) ... ok >test_verify (__main__.ContextTests) ... ok >test_DER_to_PEM (__main__.BasicSocketTests) ... ok >test_constants (__main__.BasicSocketTests) ... ok >test_dealloc_warn (__main__.BasicSocketTests) ... ok >test_errors (__main__.BasicSocketTests) ... ok >test_match_hostname (__main__.BasicSocketTests) ... ok >test_openssl_version (__main__.BasicSocketTests) ... FAIL >test_parse_cert (__main__.BasicSocketTests) ... >{'issuer': ((('countryName', 'XY'),), > (('localityName', 'Castle Anthrax'),), > (('organizationName', 'Python Software Foundation'),), > (('commonName', 'localhost'),)), > 'notAfter': 'Oct 5 23:01:56 2020 GMT', > 'notBefore': 'Oct 8 23:01:56 2010 GMT', > 'serialNumber': 'D7C7381919AFC24E', > 'subject': ((('countryName', 'XY'),), > (('localityName', 'Castle Anthrax'),), > (('organizationName', 'Python Software Foundation'),), > (('commonName', 'localhost'),)), > 'subjectAltName': (('DNS', 'localhost'),), > 'version': 3} > >{'issuer': ((('countryName', 'US'),), > (('organizationName', 'VeriSign, Inc.'),), > (('organizationalUnitName', 'VeriSign Trust Network'),), > (('organizationalUnitName', > 'Terms of use at https://www.verisign.com/rpa (c)10'),), > (('commonName', 'VeriSign Class 3 International Server CA - G3'),)), > 'notAfter': 'Sep 20 23:59:59 2012 GMT', > 'notBefore': 'Sep 21 00:00:00 2011 GMT', > 'serialNumber': '2EE6EA7640A075CEE5005F4D7C79549A', > 'subject': ((('countryName', 'FI'),), > (('stateOrProvinceName', 'Espoo'),), > (('localityName', 'Espoo'),), > (('organizationName', 'Nokia'),), > (('organizationalUnitName', 'BI'),), > (('commonName', 'projects.developer.nokia.com'),)), > 'subjectAltName': (('DNS', 'projects.developer.nokia.com'), > ('DNS', 'projects.forum.nokia.com')), > 'version': 3} >ok >test_parse_cert_CVE_2013_4238 (__main__.BasicSocketTests) ... >{'issuer': ((('countryName', 'US'),), > (('stateOrProvinceName', 'Oregon'),), > (('localityName', 'Beaverton'),), > (('organizationName', 'Python Software Foundation'),), > (('organizationalUnitName', 'Python Core Development'),), > (('commonName', 'null.python.org\x00example.org'),), > (('emailAddress', 'python-dev@python.org'),)), > 'notAfter': 'Aug 7 13:12:52 2013 GMT', > 'notBefore': 'Aug 7 13:11:52 2013 GMT', > 'serialNumber': '00', > 'subject': ((('countryName', 'US'),), > (('stateOrProvinceName', 'Oregon'),), > (('localityName', 'Beaverton'),), > (('organizationName', 'Python Software Foundation'),), > (('organizationalUnitName', 'Python Core Development'),), > (('commonName', 'null.python.org\x00example.org'),), > (('emailAddress', 'python-dev@python.org'),)), > 'subjectAltName': (('DNS', 'altnull.python.org\x00example.com'), > ('email', 'null@python.org\x00user@example.org'), > ('URI', 'http://null.python.org\x00http://example.org'), > ('IP Address', '192.0.2.1'), > ('IP Address', '2001:DB8:0:0:0:0:0:1\n')), > 'version': 3} >ok >test_random (__main__.BasicSocketTests) ... > RAND_status is 1 (sufficient randomness) >ok >test_random_fork (__main__.BasicSocketTests) ... ok >test_refcycle (__main__.BasicSocketTests) ... ok >test_server_side (__main__.BasicSocketTests) ... ok >test_timeout (__main__.BasicSocketTests) ... ok >test_tls_unique_channel_binding (__main__.BasicSocketTests) ... ok >test_unknown_channel_binding (__main__.BasicSocketTests) ... ok >test_unsupported_dtls (__main__.BasicSocketTests) ... ok >test_wrapped_unconnected (__main__.BasicSocketTests) ... ok >test_lib_reason (__main__.SSLErrorTests) ... ok >test_str (__main__.SSLErrorTests) ... ok >test_subclass (__main__.SSLErrorTests) ... ok >test_asyncore_server (__main__.ThreadedTests) >Check the example asyncore integration. ... > server: new connection from 127.0.0.1:20461 > client: sending b'FOO\n'... > server: read b'FOO\n' from client > client: read b'foo\n' > client: closing connection. > client: connection closed. > cleanup: stopping server. > cleanup: joining server thread. > cleanup: successfully joined. >ok >test_compression (__main__.ThreadedTests) ... server: new connection from ('127.0.0.1', 26927) > server: connection cipher is now ('AES256-SHA', 'TLSv1/SSLv3', 256) > server: selected protocol is now None > client: sending b'FOO\n'... > client: read b'foo\n' > client: sending b'FOO\n'... > client: read b'foo\n' > client: sending b'FOO\n'... > client: read b'foo\n' > client: closing connection. > got compression: None >ok >test_compression_disabled (__main__.ThreadedTests) ... server: new connection from ('127.0.0.1', 43477) > server: connection cipher is now ('AES256-SHA', 'TLSv1/SSLv3', 256) > server: selected protocol is now None > client: sending b'FOO\n'... > client: read b'foo\n' > client: sending b'FOO\n'... > client: read b'foo\n' > client: sending b'FOO\n'... > client: read b'foo\n' > client: closing connection. >ok >test_default_ciphers (__main__.ThreadedTests) ... ok >test_dh_params (__main__.ThreadedTests) ... server: new connection from ('127.0.0.1', 52466) > server: connection cipher is now ('DHE-RSA-AES256-SHA', 'TLSv1/SSLv3', 256) > server: selected protocol is now None > client: sending b'FOO\n'... > client: read b'foo\n' > client: sending b'FOO\n'... > client: read b'foo\n' > client: sending b'FOO\n'... > client: read b'foo\n' > client: closing connection. >ok >test_echo (__main__.ThreadedTests) >Basic test of an SSL client connecting to a server ... > server: new connection from ('127.0.0.1', 33925) > server: connection cipher is now ('AES256-SHA', 'TLSv1/SSLv3', 256) > server: selected protocol is now None > client: sending b'FOO\n'... > client: read b'foo\n' > client: sending b'FOO\n'... > client: read b'foo\n' > client: sending b'FOO\n'... > client: read b'foo\n' > client: closing connection. > server: new connection from ('127.0.0.1', 12187) > server: connection cipher is now ('AES256-GCM-SHA384', 'TLSv1/SSLv3', 256) > server: selected protocol is now None > client: sending b'FOO\n'... > client: read b'foo\n' > client: sending b'FOO\n'... > client: read b'foo\n' > client: sending b'FOO\n'... > client: read b'foo\n' > client: closing connection. > server: new connection from ('127.0.0.1', 19149) > server: connection cipher is now ('AES256-SHA', 'TLSv1/SSLv3', 256) > server: selected protocol is now None > client: sending b'FOO\n'... > client: read b'foo\n' > client: sending b'FOO\n'... > client: read b'foo\n' > client: sending b'FOO\n'... > client: read b'foo\n' > client: closing connection. >ok >test_empty_cert (__main__.ThreadedTests) >Connecting with an empty cert file ... >SSLError is [SSL] PEM lib (_ssl.c:2134) >ok >test_getpeercert (__main__.ThreadedTests) ... >{'issuer': ((('countryName', 'XY'),), > (('localityName', 'Castle Anthrax'),), > (('organizationName', 'Python Software Foundation'),), > (('commonName', 'localhost'),)), > 'notAfter': 'Oct 5 23:01:56 2020 GMT', > 'notBefore': 'Oct 8 23:01:56 2010 GMT', > 'serialNumber': 'D7C7381919AFC24E', > 'subject': ((('countryName', 'XY'),), > (('localityName', 'Castle Anthrax'),), > (('organizationName', 'Python Software Foundation'),), > (('commonName', 'localhost'),)), > 'subjectAltName': (('DNS', 'localhost'),), > 'version': 3} >Connection cipher is ('AES256-GCM-SHA384', 'TLSv1/SSLv3', 256). >ok >test_handshake_timeout (__main__.ThreadedTests) ... ok >test_malformed_cert (__main__.ThreadedTests) >Connecting with a badly formatted certificate (syntax error) ... >SSLError is [SSL] PEM lib (_ssl.c:2134) >ok >test_malformed_key (__main__.ThreadedTests) >Connecting with a badly formatted key (syntax error) ... >SSLError is [SSL] PEM lib (_ssl.c:2134) >ok >test_nonexisting_cert (__main__.ThreadedTests) >Connecting with a non-existing cert file ... >socket.error is No such file or directory >ok >test_npn_protocols (__main__.ThreadedTests) ... server: new connection from ('127.0.0.1', 49882) > server: connection cipher is now ('AES256-SHA', 'TLSv1/SSLv3', 256) > server: selected protocol is now http/1.1 > client: sending b'FOO\n'... > client: read b'foo\n' > client: sending b'FOO\n'... > client: read b'foo\n' > client: sending b'FOO\n'... > client: read b'foo\n' > client: closing connection. > server: new connection from ('127.0.0.1', 49884) > server: connection cipher is now ('AES256-SHA', 'TLSv1/SSLv3', 256) > server: selected protocol is now http/1.1 > client: sending b'FOO\n'... > client: read b'foo\n' > client: sending b'FOO\n'... > client: read b'foo\n' > client: sending b'FOO\n'... > client: read b'foo\n' > client: closing connection. > server: new connection from ('127.0.0.1', 49886) > server: connection cipher is now ('AES256-SHA', 'TLSv1/SSLv3', 256) > server: selected protocol is now spdy/2 > client: sending b'FOO\n'... > client: read b'foo\n' > client: sending b'FOO\n'... > client: read b'foo\n' > client: sending b'FOO\n'... > client: read b'foo\n' > client: closing connection. > server: new connection from ('127.0.0.1', 49888) > server: connection cipher is now ('AES256-SHA', 'TLSv1/SSLv3', 256) > server: selected protocol is now abc > client: sending b'FOO\n'... > client: read b'foo\n' > client: sending b'FOO\n'... > client: read b'foo\n' > client: sending b'FOO\n'... > client: read b'foo\n' > client: closing connection. >ok >test_protocol_sslv2 (__main__.ThreadedTests) >Connecting to an SSLv2 server with various client options ... skipped 'OpenSSL is compiled without SSLv2 support' >test_protocol_sslv23 (__main__.ThreadedTests) >Connecting to an SSLv23 server with various client options ... > SSLv3->SSLv23 CERT_NONE >ERROR >test_protocol_sslv3 (__main__.ThreadedTests) >Connecting to an SSLv3 server with various client options ... > SSLv3->SSLv3 CERT_NONE > SSLv3->SSLv3 CERT_OPTIONAL > SSLv3->SSLv3 CERT_REQUIRED > {SSLv23->SSLv3} CERT_NONE > {TLSv1->SSLv3} CERT_NONE > SSLv23->SSLv3 CERT_NONE >ERROR >test_protocol_tlsv1 (__main__.ThreadedTests) >Connecting to a TLSv1 server with various client options ... > TLSv1->TLSv1 CERT_NONE > TLSv1->TLSv1 CERT_OPTIONAL > TLSv1->TLSv1 CERT_REQUIRED > {SSLv3->TLSv1} CERT_NONE > {SSLv23->TLSv1} CERT_NONE >ok >test_recv_send (__main__.ThreadedTests) >Test recv(), send() and friends. ... > server: new connection from ('127.0.0.1', 49914) > server: connection cipher is now ('AES256-SHA', 'TLSv1/SSLv3', 256) > server: selected protocol is now None >ok >test_rude_shutdown (__main__.ThreadedTests) >A brutal shutdown of an SSL server should raise an IOError ... ok >test_selected_npn_protocol (__main__.ThreadedTests) ... server: new connection from ('127.0.0.1', 49918) > server: connection cipher is now ('AES256-SHA', 'TLSv1/SSLv3', 256) > server: selected protocol is now None > client: sending b'FOO\n'... > client: read b'foo\n' > client: sending b'FOO\n'... > client: read b'foo\n' > client: sending b'FOO\n'... > client: read b'foo\n' > client: closing connection. >ok >test_server_accept (__main__.ThreadedTests) ... ok >test_socketserver (__main__.ThreadedTests) >Using a SocketServer to create and manage SSL connections. ... > server (('127.0.0.1', 49921):49921 ('AES256-GCM-SHA384', 'TLSv1/SSLv3', 256)): > [29/Nov/2014 23:12:08] "GET /keycert.pem HTTP/1.1" 200 - > client: read 1783 bytes from remote server '<HTTPSServerThread <HTTPSServer localhost.my.domain:49921>>' >stopping HTTPS server >joining HTTPS thread >ok >test_starttls (__main__.ThreadedTests) >Switching from clear text to encrypted and back again. ... > client: sending b'msg 1'... > server: new connection from ('127.0.0.1', 49924) > server: read b'msg 1' (unencrypted), sending back b'msg 1' (unencrypted)... > client: read b'msg 1' from server > client: sending b'MSG 2'... > server: read b'MSG 2' (unencrypted), sending back b'msg 2' (unencrypted)... > client: read b'msg 2' from server > client: sending b'STARTTLS'... > server: read STARTTLS from client, sending OK... > client: read b'ok' from server, starting TLS... > server: connection cipher is now ('AES256-SHA', 'TLSv1/SSLv3', 256) > server: selected protocol is now None > client: sending b'MSG 3'... > server: read b'MSG 3' (encrypted), sending back b'msg 3' (encrypted)... > client: read b'msg 3' from server > client: sending b'msg 4'... > server: read b'msg 4' (encrypted), sending back b'msg 4' (encrypted)... > client: read b'msg 4' from server > client: sending b'ENDTLS'... > server: read ENDTLS from client, sending OK... > client: read b'ok' from server, ending TLS... > server: connection is now unencrypted... > client: sending b'msg 5'... > server: read b'msg 5' (unencrypted), sending back b'msg 5' (unencrypted)... > client: read b'msg 5' from server > client: sending b'msg 6'... > server: read b'msg 6' (unencrypted), sending back b'msg 6' (unencrypted)... > client: read b'msg 6' from server > client: closing connection. > server: client closed connection >ok >test_tls_unique_channel_binding (__main__.ThreadedTests) >Test tls-unique channel binding. ... > server: new connection from ('127.0.0.1', 49926) > server: connection cipher is now ('AES256-SHA', 'TLSv1/SSLv3', 256) > server: selected protocol is now None > got channel binding data: b'\x8fBUyn@u\xe4\xeb\xaf\x15\n' > server: new connection from ('127.0.0.1', 49927) > server: connection cipher is now ('AES256-SHA', 'TLSv1/SSLv3', 256) > server: selected protocol is now None > got another channel binding data: b'\xa6\xb9\xb8\xdc\xc2\xbe[i\xe4v\xcdH' >ok > >====================================================================== >ERROR: test_protocol_sslv23 (__main__.ThreadedTests) >Connecting to an SSLv23 server with various client options >---------------------------------------------------------------------- >Traceback (most recent call last): > File "/usr/ports/lang/python33/work/Python-3.3.5/Lib/test/test_ssl.py", line 1617, in test_protocol_sslv23 > try_protocol_combo(ssl.PROTOCOL_SSLv23, ssl.PROTOCOL_SSLv3, True) > File "/usr/ports/lang/python33/work/Python-3.3.5/Lib/test/test_ssl.py", line 1460, in try_protocol_combo > chatty=False, connectionchatty=False) > File "/usr/ports/lang/python33/work/Python-3.3.5/Lib/test/test_ssl.py", line 1402, in server_params_test > s.connect((HOST, server.port)) > File "/usr/ports/lang/python33/work/stage/usr/local/lib/python3.3/ssl.py", line 591, in connect > self._real_connect(addr, False) > File "/usr/ports/lang/python33/work/stage/usr/local/lib/python3.3/ssl.py", line 581, in _real_connect > self.do_handshake() > File "/usr/ports/lang/python33/work/stage/usr/local/lib/python3.3/ssl.py", line 561, in do_handshake > self._sslobj.do_handshake() >ssl.SSLError: [SSL: SSLV3_ALERT_HANDSHAKE_FAILURE] sslv3 alert handshake failure (_ssl.c:548) > >====================================================================== >ERROR: test_protocol_sslv3 (__main__.ThreadedTests) >Connecting to an SSLv3 server with various client options >---------------------------------------------------------------------- >Traceback (most recent call last): > File "/usr/ports/lang/python33/work/Python-3.3.5/Lib/test/test_ssl.py", line 1655, in test_protocol_sslv3 > client_options=ssl.OP_NO_SSLv2) > File "/usr/ports/lang/python33/work/Python-3.3.5/Lib/test/test_ssl.py", line 1460, in try_protocol_combo > chatty=False, connectionchatty=False) > File "/usr/ports/lang/python33/work/Python-3.3.5/Lib/test/test_ssl.py", line 1402, in server_params_test > s.connect((HOST, server.port)) > File "/usr/ports/lang/python33/work/stage/usr/local/lib/python3.3/ssl.py", line 591, in connect > self._real_connect(addr, False) > File "/usr/ports/lang/python33/work/stage/usr/local/lib/python3.3/ssl.py", line 581, in _real_connect > self.do_handshake() > File "/usr/ports/lang/python33/work/stage/usr/local/lib/python3.3/ssl.py", line 561, in do_handshake > self._sslobj.do_handshake() >ssl.SSLError: [SSL: UNSUPPORTED_PROTOCOL] unsupported protocol (_ssl.c:548) > >====================================================================== >FAIL: test_options (__main__.ContextTests) >---------------------------------------------------------------------- >Traceback (most recent call last): > File "/usr/ports/lang/python33/work/Python-3.3.5/Lib/test/test_ssl.py", line 543, in test_options > ctx.options) >AssertionError: 2164261887 != 2197816319 > >====================================================================== >FAIL: test_openssl_version (__main__.BasicSocketTests) >---------------------------------------------------------------------- >Traceback (most recent call last): > File "/usr/ports/lang/python33/work/Python-3.3.5/Lib/test/test_ssl.py", line 272, in test_openssl_version > (s, t)) >AssertionError: False is not true : ('LibreSSL 2.1', (1, 0, 1, 7, 15)) > >---------------------------------------------------------------------- >Ran 55 tests in 1.137s > >FAILED (failures=2, errors=2, skipped=1)
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 195511
:
150002
|
150003
|
150004
| 150005