summaryrefslogtreecommitdiffstats
path: root/meta/recipes-devtools/python/python/0004-bpo-34836-fix-test_default_ecdh_curve-needs-no-tlsv1.patch
diff options
context:
space:
mode:
Diffstat (limited to 'meta/recipes-devtools/python/python/0004-bpo-34836-fix-test_default_ecdh_curve-needs-no-tlsv1.patch')
-rw-r--r--meta/recipes-devtools/python/python/0004-bpo-34836-fix-test_default_ecdh_curve-needs-no-tlsv1.patch34
1 files changed, 34 insertions, 0 deletions
diff --git a/meta/recipes-devtools/python/python/0004-bpo-34836-fix-test_default_ecdh_curve-needs-no-tlsv1.patch b/meta/recipes-devtools/python/python/0004-bpo-34836-fix-test_default_ecdh_curve-needs-no-tlsv1.patch
new file mode 100644
index 0000000000..39e1bcfc86
--- /dev/null
+++ b/meta/recipes-devtools/python/python/0004-bpo-34836-fix-test_default_ecdh_curve-needs-no-tlsv1.patch
@@ -0,0 +1,34 @@
1From 946a7969345c6697697effd226ec396d3fea05b7 Mon Sep 17 00:00:00 2001
2From: Dimitri John Ledkov <xnox@ubuntu.com>
3Date: Fri, 28 Sep 2018 17:30:19 +0100
4Subject: [PATCH 4/4] bpo-34836: fix test_default_ecdh_curve, needs no tlsv1.3.
5
6Signed-off-by: Dimitri John Ledkov <xnox@ubuntu.com>
7
8https://bugs.python.org/issue34836
9
10Patch taken from Ubuntu.
11Upstream-Status: Submitted [https://github.com/python/cpython/pull/9626]
12
13Signed-off-by: Anuj Mittal <anuj.mittal@intel.com>
14---
15 Lib/test/test_ssl.py | 3 +++
16 1 file changed, 3 insertions(+)
17
18diff --git a/Lib/test/test_ssl.py b/Lib/test/test_ssl.py
19index efc906a5ba..4a3286cd5f 100644
20--- a/Lib/test/test_ssl.py
21+++ b/Lib/test/test_ssl.py
22@@ -2836,6 +2836,9 @@ else:
23 # should be enabled by default on SSL contexts.
24 context = ssl.SSLContext(ssl.PROTOCOL_SSLv23)
25 context.load_cert_chain(CERTFILE)
26+ # TLSv1.3 defaults to PFS key agreement and no longer has KEA in
27+ # cipher name.
28+ context.options |= ssl.OP_NO_TLSv1_3
29 # Prior to OpenSSL 1.0.0, ECDH ciphers have to be enabled
30 # explicitly using the 'ECCdraft' cipher alias. Otherwise,
31 # our default cipher list should prefer ECDH-based ciphers
32--
332.17.1
34