|
25 | 25 | HOST = support.HOST
|
26 | 26 | IS_LIBRESSL = ssl.OPENSSL_VERSION.startswith('LibreSSL')
|
27 | 27 | IS_OPENSSL_1_1 = not IS_LIBRESSL and ssl.OPENSSL_VERSION_INFO >= (1, 1, 0)
|
| 28 | +IS_OPENSSL_1_1_1 = not IS_LIBRESSL and ssl.OPENSSL_VERSION_INFO >= (1, 1, 1) |
28 | 29 |
|
29 | 30 |
|
30 | 31 | def data_file(*name):
|
@@ -857,6 +858,7 @@ def test_ciphers(self):
|
857 | 858 | ctx.set_ciphers("^$:,;?*'dorothyx")
|
858 | 859 |
|
859 | 860 | @skip_if_broken_ubuntu_ssl
|
| 861 | + @unittest.skipIf(IS_OPENSSL_1_1_1, "bpo-36576: fail on OpenSSL 1.1.1") |
860 | 862 | def test_options(self):
|
861 | 863 | ctx = ssl.SSLContext(ssl.PROTOCOL_TLSv1)
|
862 | 864 | # OP_ALL | OP_NO_SSLv2 | OP_NO_SSLv3 is the default value
|
@@ -3047,6 +3049,7 @@ def test_version_basic(self):
|
3047 | 3049 | self.assertIs(s.version(), None)
|
3048 | 3050 |
|
3049 | 3051 | @unittest.skipUnless(ssl.HAS_ECDH, "test requires ECDH-enabled OpenSSL")
|
| 3052 | + @unittest.skipIf(IS_OPENSSL_1_1_1, "bpo-36576: fail on OpenSSL 1.1.1") |
3050 | 3053 | def test_default_ecdh_curve(self):
|
3051 | 3054 | # Issue #21015: elliptic curve-based Diffie Hellman key exchange
|
3052 | 3055 | # should be enabled by default on SSL contexts.
|
@@ -3176,6 +3179,7 @@ def test_selected_alpn_protocol_if_server_uses_alpn(self):
|
3176 | 3179 | self.assertIs(stats['client_alpn_protocol'], None)
|
3177 | 3180 |
|
3178 | 3181 | @unittest.skipUnless(ssl.HAS_ALPN, "ALPN support needed for this test")
|
| 3182 | + @unittest.skipIf(IS_OPENSSL_1_1_1, "bpo-36576: fail on OpenSSL 1.1.1") |
3179 | 3183 | def test_alpn_protocols(self):
|
3180 | 3184 | server_protocols = ['foo', 'bar', 'milkshake']
|
3181 | 3185 | protocol_tests = [
|
@@ -3356,6 +3360,7 @@ def cb_wrong_return_type(ssl_sock, server_name, initial_context):
|
3356 | 3360 | self.assertEqual(cm.exception.reason, 'TLSV1_ALERT_INTERNAL_ERROR')
|
3357 | 3361 | self.assertIn("TypeError", stderr.getvalue())
|
3358 | 3362 |
|
| 3363 | + @unittest.skipIf(IS_OPENSSL_1_1_1, "bpo-36576: fail on OpenSSL 1.1.1") |
3359 | 3364 | def test_shared_ciphers(self):
|
3360 | 3365 | server_context = ssl.SSLContext(ssl.PROTOCOL_TLSv1)
|
3361 | 3366 | server_context.load_cert_chain(SIGNED_CERTFILE)
|
|
0 commit comments