@@ -1588,34 +1588,6 @@ def test_ciphers(self):
1588
1588
cert_reqs = ssl .CERT_NONE , ciphers = "^$:,;?*'dorothyx" )
1589
1589
s .connect (remote )
1590
1590
1591
- def test_algorithms (self ):
1592
- # Issue #8484: all algorithms should be available when verifying a
1593
- # certificate.
1594
- # SHA256 was added in OpenSSL 0.9.8
1595
- if ssl .OPENSSL_VERSION_INFO < (0 , 9 , 8 , 0 , 15 ):
1596
- self .skipTest ("SHA256 not available on %r" % ssl .OPENSSL_VERSION )
1597
- # sha256.tbs-internet.com needs SNI to use the correct certificate
1598
- if not ssl .HAS_SNI :
1599
- self .skipTest ("SNI needed for this test" )
1600
- # https://sha2.hboeck.de/ was used until 2011-01-08 (no route to host)
1601
- remote = ("sha256.tbs-internet.com" , 443 )
1602
- sha256_cert = os .path .join (os .path .dirname (__file__ ), "sha256.pem" )
1603
- with support .transient_internet ("sha256.tbs-internet.com" ):
1604
- ctx = ssl .SSLContext (ssl .PROTOCOL_TLSv1 )
1605
- ctx .verify_mode = ssl .CERT_REQUIRED
1606
- ctx .load_verify_locations (sha256_cert )
1607
- s = ctx .wrap_socket (socket .socket (socket .AF_INET ),
1608
- server_hostname = "sha256.tbs-internet.com" )
1609
- try :
1610
- s .connect (remote )
1611
- if support .verbose :
1612
- sys .stdout .write ("\n Cipher with %r is %r\n " %
1613
- (remote , s .cipher ()))
1614
- sys .stdout .write ("Certificate is:\n %s\n " %
1615
- pprint .pformat (s .getpeercert ()))
1616
- finally :
1617
- s .close ()
1618
-
1619
1591
def test_get_ca_certs_capath (self ):
1620
1592
# capath certs are loaded on request
1621
1593
with support .transient_internet (REMOTE_HOST ):
0 commit comments