commit | e1d8db536024311eeef4b3557bcf54747711d9cb | [log] [tgz] |
---|---|---|
author | Alex Gaynor <alex.gaynor@gmail.com> | Thu Jun 29 22:22:19 2017 -0700 |
committer | Cory Benfield <lukasaoz@gmail.com> | Fri Jun 30 06:22:19 2017 +0100 |
tree | bd87a6fe0476b210c12d6fcb5f99386d7faec4ec | |
parent | 336d80238465cb3426e2705091709a6292457043 [diff] |
remove gibberish comment (#648)
diff --git a/tests/test_ssl.py b/tests/test_ssl.py index 5bb4451..e154811 100644 --- a/tests/test_ssl.py +++ b/tests/test_ssl.py
@@ -1196,8 +1196,6 @@ # internet which has such a certificate. Connecting to the network # in a unit test is bad, but it's the only way I can think of to # really test this. -exarkun - - # Arg, verisign.com doesn't speak anything newer than TLS 1.0 context = Context(SSLv23_METHOD) context.set_default_verify_paths() context.set_verify(