@@ -824,13 +824,13 @@ def test_ssl_connect_accepted_socket(self):
824824 'SSL not supported with proactor event loops before Python 3.5'
825825 )
826826
827- server_context = ssl .SSLContext (ssl .PROTOCOL_SSLv23 )
827+ server_context = ssl .SSLContext (ssl .PROTOCOL_TLS_SERVER )
828828 server_context .load_cert_chain (ONLYCERT , ONLYKEY )
829829 if hasattr (server_context , 'check_hostname' ):
830830 server_context .check_hostname = False
831831 server_context .verify_mode = ssl .CERT_NONE
832832
833- client_context = ssl .SSLContext (ssl .PROTOCOL_SSLv23 )
833+ client_context = ssl .SSLContext (ssl .PROTOCOL_TLS_CLIENT )
834834 if hasattr (server_context , 'check_hostname' ):
835835 client_context .check_hostname = False
836836 client_context .verify_mode = ssl .CERT_NONE
@@ -985,7 +985,7 @@ def test_create_unix_server_path_socket_error(self):
985985 self .loop .run_until_complete (f )
986986
987987 def _create_ssl_context (self , certfile , keyfile = None ):
988- sslcontext = ssl .SSLContext (ssl .PROTOCOL_SSLv23 )
988+ sslcontext = ssl .SSLContext (ssl .PROTOCOL_TLS_SERVER )
989989 sslcontext .options |= ssl .OP_NO_SSLv2
990990 sslcontext .load_cert_chain (certfile , keyfile )
991991 return sslcontext
@@ -1082,7 +1082,7 @@ def test_create_server_ssl_verify_failed(self):
10821082 server , host , port = self ._make_ssl_server (
10831083 lambda : proto , SIGNED_CERTFILE )
10841084
1085- sslcontext_client = ssl .SSLContext (ssl .PROTOCOL_SSLv23 )
1085+ sslcontext_client = ssl .SSLContext (ssl .PROTOCOL_TLS_CLIENT )
10861086 sslcontext_client .options |= ssl .OP_NO_SSLv2
10871087 sslcontext_client .verify_mode = ssl .CERT_REQUIRED
10881088 if hasattr (sslcontext_client , 'check_hostname' ):
@@ -1116,7 +1116,7 @@ def test_create_unix_server_ssl_verify_failed(self):
11161116 server , path = self ._make_ssl_unix_server (
11171117 lambda : proto , SIGNED_CERTFILE )
11181118
1119- sslcontext_client = ssl .SSLContext (ssl .PROTOCOL_SSLv23 )
1119+ sslcontext_client = ssl .SSLContext (ssl .PROTOCOL_TLS_CLIENT )
11201120 sslcontext_client .options |= ssl .OP_NO_SSLv2
11211121 sslcontext_client .verify_mode = ssl .CERT_REQUIRED
11221122 if hasattr (sslcontext_client , 'check_hostname' ):
@@ -1150,7 +1150,7 @@ def test_create_server_ssl_match_failed(self):
11501150 server , host , port = self ._make_ssl_server (
11511151 lambda : proto , SIGNED_CERTFILE )
11521152
1153- sslcontext_client = ssl .SSLContext (ssl .PROTOCOL_SSLv23 )
1153+ sslcontext_client = ssl .SSLContext (ssl .PROTOCOL_TLS_CLIENT )
11541154 sslcontext_client .options |= ssl .OP_NO_SSLv2
11551155 sslcontext_client .verify_mode = ssl .CERT_REQUIRED
11561156 sslcontext_client .load_verify_locations (
@@ -1183,7 +1183,7 @@ def test_create_unix_server_ssl_verified(self):
11831183 server , path = self ._make_ssl_unix_server (
11841184 lambda : proto , SIGNED_CERTFILE )
11851185
1186- sslcontext_client = ssl .SSLContext (ssl .PROTOCOL_SSLv23 )
1186+ sslcontext_client = ssl .SSLContext (ssl .PROTOCOL_TLS_CLIENT )
11871187 sslcontext_client .options |= ssl .OP_NO_SSLv2
11881188 sslcontext_client .verify_mode = ssl .CERT_REQUIRED
11891189 sslcontext_client .load_verify_locations (cafile = SIGNING_CA )
@@ -1212,7 +1212,7 @@ def test_create_server_ssl_verified(self):
12121212 server , host , port = self ._make_ssl_server (
12131213 lambda : proto , SIGNED_CERTFILE )
12141214
1215- sslcontext_client = ssl .SSLContext (ssl .PROTOCOL_SSLv23 )
1215+ sslcontext_client = ssl .SSLContext (ssl .PROTOCOL_TLS_CLIENT )
12161216 sslcontext_client .options |= ssl .OP_NO_SSLv2
12171217 sslcontext_client .verify_mode = ssl .CERT_REQUIRED
12181218 sslcontext_client .load_verify_locations (cafile = SIGNING_CA )
0 commit comments