summaryrefslogtreecommitdiff
path: root/tests/online/badssl.c
Commit message (Collapse)AuthorAgeFilesLines
* badssl: RC4 should not fail with ECERTIFICATEcmn/rc4Edward Thomson2020-12-141-4/+2
| | | | | | Using RC4 is not a _certificate_ problem, it's a cipher problem. The SSL implementation should and will fail with an unrecoverable error (-1). There's no opportunity to accept/continue.
* badssl: re-enable RC4 testCarlos Martín Nieto2020-12-131-3/+0
| | | | | | This used to fail with an error indicating a mis-use of OpenSSL on platforms using it due to poor error handling. Re-enable it even if this isn't the right error code to use for now.
* cmake: define GIT_HTTPS when HTTPS is supportedPatrick Steinhardt2017-04-251-1/+1
|
* https: don't test that RC4 is invalidcmn/sec-update-25Carlos Martín Nieto2017-01-091-0/+3
| | | | | None of our crypto backends actually reject RC4 as a cipher so don't test for it and instead keep it as something we'd like to do.
* http: correct the expected error for RC4Carlos Martín Nieto2017-01-091-2/+4
| | | | | We must make sure that we're getting a certificate error from the library so we know that we're testing the right thing.
* http: perform 'badssl' check also via certificate callbackCarlos Martín Nieto2017-01-061-0/+29
| | | | | | Make sure that the callbacks do also get a 'valid' value of zero when the certificate we're looking at is in valid and assert that within the test.
* Use general cl_git_fail because the error is genericDirkjan Bussink2016-03-141-2/+1
|
* Setup better defaults for OpenSSL ciphersDirkjan Bussink2016-03-141-0/+9
| | | | | | | | | This ensures that when using OpenSSL a safe default set of ciphers is selected. This is done so that the client communicates securely and we don't accidentally enable unsafe ciphers like RC4, or even worse some old export ciphers. Implements the first part of https://github.com/libgit2/libgit2/issues/3682
* Fix build for unit testLeo Yang2015-11-021-2/+13
| | | | | If none of GIT_OPENSSL, GIT_WINHTTP or GIT_SECURE_TRANSPORT is defined we should also be able to build the unit test.
* net: add tests against badssl.comcmn/badsslCarlos Martín Nieto2015-09-271-0/+27
These provide bad X.509 certificates, which we should refuse to connect to by default.