diff options
author | Jean-Paul Calderone <exarkun@twistedmatrix.com> | 2014-02-18 16:38:26 -0500 |
---|---|---|
committer | Jean-Paul Calderone <exarkun@twistedmatrix.com> | 2014-02-18 16:38:26 -0500 |
commit | 7d7c9c2889c02757767009082e5b12498cc26344 (patch) | |
tree | 2f234bd4ba84fad11a3cad771cbe593cb06d699c | |
parent | ab984a4c3b64d74ff7056321fdfd4b436cd81d72 (diff) | |
download | pyopenssl-7d7c9c2889c02757767009082e5b12498cc26344.tar.gz |
Fill the send buffer with smaller strings in order to more completely fill it.
This makes the test pass on OS X. Previously it failed with the
wrong exception type probably because there was enough room left
in the send buffer for the handshake to start.
-rw-r--r-- | OpenSSL/test/test_ssl.py | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/OpenSSL/test/test_ssl.py b/OpenSSL/test/test_ssl.py index ecee95f..3f1cb20 100644 --- a/OpenSSL/test/test_ssl.py +++ b/OpenSSL/test/test_ssl.py @@ -1912,7 +1912,7 @@ class ConnectionTests(TestCase, _LoopbackMixin): client_socket, server_socket = socket_pair() # Fill up the client's send buffer so Connection won't be able to write # anything. - msg = b"x" * 1024 + msg = b"x" * 512 for i in range(1024): try: client_socket.send(msg) |