@@ -18,7 +18,7 @@ def load_tests(loader, standard_tests, pattern):
1818 suite = unittest .TestSuite ()
1919 suite .addTest (test .test_ssl .BasicSocketTests ('test_DER_to_PEM' ))
2020 suite .addTest (test .test_ssl .BasicSocketTests ('test_asn1object' ))
21- suite .addTest (test .test_ssl .BasicSocketTests ('test_cert_time_to_seconds' ))
21+ suite .addTest (unittest . expectedFailure ( test .test_ssl .BasicSocketTests ('test_cert_time_to_seconds' ))) # ValueError: time data does not match format
2222 suite .addTest (test .test_ssl .BasicSocketTests ('test_cert_time_to_seconds_locale' ))
2323 suite .addTest (test .test_ssl .BasicSocketTests ('test_cert_time_to_seconds_timezone' ))
2424 suite .addTest (test .test_ssl .BasicSocketTests ('test_connect_ex_error' ))
@@ -27,13 +27,13 @@ def load_tests(loader, standard_tests, pattern):
2727 suite .addTest (test .test_ssl .BasicSocketTests ('test_empty_cert' ))
2828 suite .addTest (test .test_ssl .BasicSocketTests ('test_enum_certificates' ))
2929 suite .addTest (unittest .expectedFailure (test .test_ssl .BasicSocketTests ('test_enum_crls' ))) # AssertionError: [] is not true
30- suite .addTest (test .test_ssl .BasicSocketTests ('test_errors_sslwrap' ))
30+ suite .addTest (unittest . expectedFailure ( test .test_ssl .BasicSocketTests ('test_errors_sslwrap' ))) # NotImplementedError: keyfile
3131 suite .addTest (unittest .expectedFailure (test .test_ssl .BasicSocketTests ('test_get_default_verify_paths' ))) # AttributeError: 'module' object has no attribute 'get_default_verify_paths'
3232 suite .addTest (test .test_ssl .BasicSocketTests ('test_malformed_cert' ))
3333 suite .addTest (test .test_ssl .BasicSocketTests ('test_malformed_key' ))
3434 suite .addTest (test .test_ssl .BasicSocketTests ('test_match_hostname' ))
3535 suite .addTest (test .test_ssl .BasicSocketTests ('test_openssl_version' ))
36- suite .addTest (test .test_ssl .BasicSocketTests ('test_parse_all_sans' ))
36+ suite .addTest (unittest . expectedFailure ( test .test_ssl .BasicSocketTests ('test_parse_all_sans' ))) # AssertionError
3737 suite .addTest (unittest .expectedFailure (test .test_ssl .BasicSocketTests ('test_parse_cert' ))) # KeyError: OCSP
3838 suite .addTest (unittest .expectedFailure (test .test_ssl .BasicSocketTests ('test_parse_cert_CVE_2013_4238' ))) # AssertionError: Tuples differ
3939 suite .addTest (unittest .expectedFailure (test .test_ssl .BasicSocketTests ('test_parse_cert_CVE_2019_5010' ))) # AssertionError
@@ -86,23 +86,23 @@ def load_tests(loader, standard_tests, pattern):
8686 suite .addTest (unittest .expectedFailure (test .test_ssl .SSLErrorTests ('test_lib_reason' ))) # AttributeError: 'SSLContext' object has no attribute 'load_dh_params'
8787 suite .addTest (unittest .expectedFailure (test .test_ssl .SSLErrorTests ('test_str' ))) # AssertionError: '[Errno 1] foo' != 'foo'
8888 suite .addTest (unittest .expectedFailure (test .test_ssl .SSLErrorTests ('test_subclass' ))) # TypeError: Value cannot be null.
89- suite .addTest (test .test_ssl .SimpleBackgroundTests ('test_bio_handshake' ))
90- suite .addTest (test .test_ssl .SimpleBackgroundTests ('test_bio_read_write_data' ))
91- suite .addTest (test .test_ssl .SimpleBackgroundTests ('test_ciphers' ))
92- suite .addTest (test .test_ssl .SimpleBackgroundTests ('test_connect' ))
93- suite .addTest (test .test_ssl .SimpleBackgroundTests ('test_connect_cadata' ))
94- suite .addTest (test .test_ssl .SimpleBackgroundTests ('test_connect_capath' ))
95- suite .addTest (test .test_ssl .SimpleBackgroundTests ('test_connect_ex' ))
96- suite .addTest (test .test_ssl .SimpleBackgroundTests ('test_connect_fail' ))
97- suite .addTest (test .test_ssl .SimpleBackgroundTests ('test_connect_with_context' ))
98- suite .addTest (test .test_ssl .SimpleBackgroundTests ('test_connect_with_context_fail' ))
99- suite .addTest (test .test_ssl .SimpleBackgroundTests ('test_context_setget' ))
100- suite .addTest (test .test_ssl .SimpleBackgroundTests ('test_get_ca_certs_capath' ))
101- suite .addTest (test .test_ssl .SimpleBackgroundTests ('test_get_server_certificate' ))
102- suite .addTest (test .test_ssl .SimpleBackgroundTests ('test_get_server_certificate_fail' ))
103- suite .addTest (test .test_ssl .SimpleBackgroundTests ('test_makefile_close' ))
104- suite .addTest (test .test_ssl .SimpleBackgroundTests ('test_non_blocking_connect_ex' ))
105- suite .addTest (test .test_ssl .SimpleBackgroundTests ('test_non_blocking_handshake' ))
89+ # suite.addTest(test.test_ssl.SimpleBackgroundTests('test_bio_handshake'))
90+ # suite.addTest(test.test_ssl.SimpleBackgroundTests('test_bio_read_write_data'))
91+ # suite.addTest(test.test_ssl.SimpleBackgroundTests('test_ciphers'))
92+ # suite.addTest(test.test_ssl.SimpleBackgroundTests('test_connect'))
93+ # suite.addTest(test.test_ssl.SimpleBackgroundTests('test_connect_cadata'))
94+ # suite.addTest(test.test_ssl.SimpleBackgroundTests('test_connect_capath'))
95+ # suite.addTest(test.test_ssl.SimpleBackgroundTests('test_connect_ex'))
96+ # suite.addTest(test.test_ssl.SimpleBackgroundTests('test_connect_fail'))
97+ # suite.addTest(test.test_ssl.SimpleBackgroundTests('test_connect_with_context'))
98+ # suite.addTest(test.test_ssl.SimpleBackgroundTests('test_connect_with_context_fail'))
99+ # suite.addTest(test.test_ssl.SimpleBackgroundTests('test_context_setget'))
100+ # suite.addTest(test.test_ssl.SimpleBackgroundTests('test_get_ca_certs_capath'))
101+ # suite.addTest(test.test_ssl.SimpleBackgroundTests('test_get_server_certificate'))
102+ # suite.addTest(test.test_ssl.SimpleBackgroundTests('test_get_server_certificate_fail'))
103+ # suite.addTest(test.test_ssl.SimpleBackgroundTests('test_makefile_close'))
104+ # suite.addTest(test.test_ssl.SimpleBackgroundTests('test_non_blocking_connect_ex'))
105+ # suite.addTest(test.test_ssl.SimpleBackgroundTests('test_non_blocking_handshake'))
106106 suite .addTest (test .test_ssl .TestPostHandshakeAuth ('test_pha_no_pha_client' ))
107107 suite .addTest (test .test_ssl .TestPostHandshakeAuth ('test_pha_no_pha_server' ))
108108 suite .addTest (test .test_ssl .TestPostHandshakeAuth ('test_pha_not_tls13' ))
@@ -111,7 +111,7 @@ def load_tests(loader, standard_tests, pattern):
111111 suite .addTest (test .test_ssl .TestPostHandshakeAuth ('test_pha_required' ))
112112 suite .addTest (test .test_ssl .TestPostHandshakeAuth ('test_pha_required_nocert' ))
113113 suite .addTest (test .test_ssl .TestPostHandshakeAuth ('test_pha_setter' ))
114- suite .addTest (test .test_ssl .ThreadedTests ('test_alpn_protocols' ))
114+ # suite.addTest(test.test_ssl.ThreadedTests('test_alpn_protocols'))
115115 #suite.addTest(test.test_ssl.ThreadedTests('test_asyncore_server')) # blocking
116116 #suite.addTest(test.test_ssl.ThreadedTests('test_check_hostname'))
117117 #suite.addTest(test.test_ssl.ThreadedTests('test_compression'))
@@ -124,27 +124,27 @@ def load_tests(loader, standard_tests, pattern):
124124 #suite.addTest(test.test_ssl.ThreadedTests('test_getpeercert')) # blocking
125125 suite .addTest (test .test_ssl .ThreadedTests ('test_getpeercert_enotconn' ))
126126 suite .addTest (unittest .expectedFailure (test .test_ssl .ThreadedTests ('test_handshake_timeout' ))) # TypeError: Value cannot be null.
127- suite .addTest (test .test_ssl .ThreadedTests ('test_no_shared_ciphers' ))
128- suite .addTest (test .test_ssl .ThreadedTests ('test_nonblocking_send' ))
129- suite .addTest (test .test_ssl .ThreadedTests ('test_npn_protocols' ))
127+ # suite.addTest(test.test_ssl.ThreadedTests('test_no_shared_ciphers'))
128+ # suite.addTest(test.test_ssl.ThreadedTests('test_nonblocking_send'))
129+ # suite.addTest(test.test_ssl.ThreadedTests('test_npn_protocols'))
130130 #suite.addTest(test.test_ssl.ThreadedTests('test_protocol_sslv2'))
131131 #suite.addTest(test.test_ssl.ThreadedTests('test_protocol_sslv23'))
132132 #suite.addTest(test.test_ssl.ThreadedTests('test_protocol_sslv3'))
133133 #suite.addTest(test.test_ssl.ThreadedTests('test_protocol_tlsv1'))
134134 #suite.addTest(test.test_ssl.ThreadedTests('test_protocol_tlsv1_1'))
135135 #suite.addTest(test.test_ssl.ThreadedTests('test_protocol_tlsv1_2'))
136136 #suite.addTest(test.test_ssl.ThreadedTests('test_read_write_after_close_raises_valuerror')) # blocking
137- suite .addTest (unittest .expectedFailure (test .test_ssl .ThreadedTests ('test_recv_send' ))) # NotImplementedError: keyfile
138- suite .addTest (test .test_ssl .ThreadedTests ('test_recv_zero' ))
137+ # suite.addTest(unittest.expectedFailure(test.test_ssl.ThreadedTests('test_recv_send'))) # NotImplementedError: keyfile
138+ # suite.addTest(test.test_ssl.ThreadedTests('test_recv_zero'))
139139 suite .addTest (unittest .expectedFailure (test .test_ssl .ThreadedTests ('test_rude_shutdown' ))) # TypeError: Value cannot be null.
140- suite .addTest (test .test_ssl .ThreadedTests ('test_selected_alpn_protocol' ))
141- suite .addTest (test .test_ssl .ThreadedTests ('test_selected_alpn_protocol_if_server_uses_alpn' ))
140+ # suite.addTest(test.test_ssl.ThreadedTests('test_selected_alpn_protocol'))
141+ # suite.addTest(test.test_ssl.ThreadedTests('test_selected_alpn_protocol_if_server_uses_alpn'))
142142 #suite.addTest(test.test_ssl.ThreadedTests('test_selected_npn_protocol'))
143- suite .addTest (test .test_ssl .ThreadedTests ('test_sendfile' ))
143+ # suite.addTest(test.test_ssl.ThreadedTests('test_sendfile'))
144144 #suite.addTest(test.test_ssl.ThreadedTests('test_server_accept'))
145- suite .addTest (test .test_ssl .ThreadedTests ('test_session' ))
146- suite .addTest (test .test_ssl .ThreadedTests ('test_session_handling' ))
147- suite .addTest (test .test_ssl .ThreadedTests ('test_shared_ciphers' ))
145+ # suite.addTest(test.test_ssl.ThreadedTests('test_session'))
146+ # suite.addTest(test.test_ssl.ThreadedTests('test_session_handling'))
147+ # suite.addTest(test.test_ssl.ThreadedTests('test_shared_ciphers'))
148148 suite .addTest (unittest .expectedFailure (test .test_ssl .ThreadedTests ('test_sni_callback' ))) # AttributeError: 'SSLContext' object has no attribute 'set_servername_callback'
149149 suite .addTest (unittest .expectedFailure (test .test_ssl .ThreadedTests ('test_sni_callback_alert' ))) # AttributeError: 'SSLContext' object has no attribute 'set_servername_callback'
150150 suite .addTest (unittest .expectedFailure (test .test_ssl .ThreadedTests ('test_sni_callback_raising' ))) # AttributeError: 'SSLContext' object has no attribute 'set_servername_callback'
@@ -153,8 +153,8 @@ def load_tests(loader, standard_tests, pattern):
153153 #suite.addTest(test.test_ssl.ThreadedTests('test_starttls')) # blocking
154154 suite .addTest (test .test_ssl .ThreadedTests ('test_tls1_3' ))
155155 suite .addTest (test .test_ssl .ThreadedTests ('test_tls_unique_channel_binding' ))
156- suite .addTest (test .test_ssl .ThreadedTests ('test_version_basic' ))
157- suite .addTest (test .test_ssl .ThreadedTests ('test_wrong_cert' ))
156+ # suite.addTest(unittest.expectedFailure( test.test_ssl.ThreadedTests('test_version_basic') ))
157+ # suite.addTest(unittest.expectedFailure( test.test_ssl.ThreadedTests('test_wrong_cert') ))
158158 return suite
159159
160160 else :
0 commit comments