@@ -477,7 +477,6 @@ def test_parse_cert_CVE_2019_5010(self):
477477 }
478478 )
479479
480- @unittest .expectedFailure # TODO: RUSTPYTHON
481480 def test_parse_cert_CVE_2013_4238 (self ):
482481 p = ssl ._ssl ._test_decode_cert (NULLBYTECERT )
483482 if support .verbose :
@@ -1167,7 +1166,6 @@ def test_security_level(self):
11671166 }
11681167 self .assertIn (ctx .security_level , security_level_range )
11691168
1170- @unittest .expectedFailure # TODO: RUSTPYTHON
11711169 def test_verify_flags (self ):
11721170 ctx = ssl .SSLContext (ssl .PROTOCOL_TLS_SERVER )
11731171 # default value
@@ -1427,7 +1425,6 @@ def test_set_default_verify_paths(self):
14271425 ctx .set_default_verify_paths ()
14281426
14291427 @unittest .skipUnless (ssl .HAS_ECDH , "ECDH disabled on this OpenSSL build" )
1430- @unittest .expectedFailure # TODO: RUSTPYTHON
14311428 def test_set_ecdh_curve (self ):
14321429 ctx = ssl .SSLContext (ssl .PROTOCOL_TLS_SERVER )
14331430 ctx .set_ecdh_curve ("prime256v1" )
@@ -1714,7 +1711,6 @@ def test_num_tickest(self):
17141711
17151712class SSLErrorTests (unittest .TestCase ):
17161713
1717- @unittest .expectedFailure # TODO: RUSTPYTHON
17181714 def test_str (self ):
17191715 # The str() of a SSLError doesn't include the errno
17201716 e = ssl .SSLError (1 , "foo" )
@@ -2010,7 +2006,6 @@ def test_connect_with_context_fail(self):
20102006 self .assertRaisesRegex (ssl .SSLError , regex ,
20112007 s .connect , self .server_addr )
20122008
2013- @unittest .expectedFailure # TODO: RUSTPYTHON
20142009 def test_connect_capath (self ):
20152010 # Verify server certificates using the `capath` argument
20162011 # NOTE: the subject hashing algorithm has been changed between
@@ -3268,7 +3263,6 @@ def test_check_hostname_idn(self, warnings_filters=True):
32683263 server_hostname = b'k\xf6 nig.idn.pythontest.net' ,
32693264 )
32703265
3271- @unittest .expectedFailure # TODO: RUSTPYTHON
32723266 def test_wrong_cert_tls12 (self ):
32733267 """Connecting when the server rejects the client's certificate
32743268
@@ -4047,7 +4041,6 @@ def test_min_max_version_sslv3(self):
40474041 s .connect ((HOST , server .port ))
40484042 self .assertEqual (s .version (), 'SSLv3' )
40494043
4050- @unittest .expectedFailure # TODO: RUSTPYTHON
40514044 def test_default_ecdh_curve (self ):
40524045 # Issue #21015: elliptic curve-based Diffie Hellman key exchange
40534046 # should be enabled by default on SSL contexts.
@@ -4911,7 +4904,6 @@ def test_internal_chain_client(self):
49114904 ssl .PEM_cert_to_DER_cert (pem ), der
49124905 )
49134906
4914- @unittest .expectedFailure # TODO: RUSTPYTHON
49154907 def test_certificate_chain (self ):
49164908 client_context , server_context , hostname = testing_context (
49174909 server_chain = False
@@ -5232,7 +5224,6 @@ def non_linux_skip_if_other_okay_error(self, err):
52325224 # just turn this into an unconditional skip anything but Linux.
52335225 # The important thing is that our CI has the logic covered.
52345226
5235- @unittest .expectedFailure # TODO: RUSTPYTHON
52365227 def test_preauth_data_to_tls_server (self ):
52375228 server_accept_called = threading .Event ()
52385229 ready_for_server_wrap_socket = threading .Event ()
@@ -5277,7 +5268,6 @@ def call_after_accept(unused):
52775268 wrap_error = None
52785269 server = None
52795270
5280- @unittest .expectedFailure # TODO: RUSTPYTHON
52815271 def test_preauth_data_to_tls_client (self ):
52825272 server_can_continue_with_wrap_socket = threading .Event ()
52835273 client_can_continue_with_wrap_socket = threading .Event ()
0 commit comments