summaryrefslogtreecommitdiff
path: root/Lib/test/test_ssl.py
diff options
context:
space:
mode:
authorChristian Heimes <christian@python.org>2016-09-24 10:48:05 +0200
committerChristian Heimes <christian@python.org>2016-09-24 10:48:05 +0200
commita5d076599051f2ee06d71cc03613e9ca54f6fe76 (patch)
tree2ba047e6d12b68d3e83bff397dc5a2d095fab92b /Lib/test/test_ssl.py
parent22ecc4b36d47d786cac37dba4661abceb8c35f1d (diff)
downloadcpython-git-a5d076599051f2ee06d71cc03613e9ca54f6fe76.tar.gz
Finish GC code for SSLSession and increase test coverage
Diffstat (limited to 'Lib/test/test_ssl.py')
-rw-r--r--Lib/test/test_ssl.py3
1 files changed, 3 insertions, 0 deletions
diff --git a/Lib/test/test_ssl.py b/Lib/test/test_ssl.py
index 631c8c187d..ad30105b0f 100644
--- a/Lib/test/test_ssl.py
+++ b/Lib/test/test_ssl.py
@@ -1474,6 +1474,7 @@ class SimpleBackgroundTests(unittest.TestCase):
cert_reqs=ssl.CERT_NONE) as s:
s.connect(self.server_addr)
self.assertEqual({}, s.getpeercert())
+ self.assertFalse(s.server_side)
# this should succeed because we specify the root cert
with test_wrap_socket(socket.socket(socket.AF_INET),
@@ -1481,6 +1482,7 @@ class SimpleBackgroundTests(unittest.TestCase):
ca_certs=SIGNING_CA) as s:
s.connect(self.server_addr)
self.assertTrue(s.getpeercert())
+ self.assertFalse(s.server_side)
def test_connect_fail(self):
# This should fail because we have no verification certs. Connection
@@ -3028,6 +3030,7 @@ if _have_threads:
host = "127.0.0.1"
port = support.bind_port(server)
server = context.wrap_socket(server, server_side=True)
+ self.assertTrue(server.server_side)
evt = threading.Event()
remote = None