summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorPatrick McDermott <patrick.mcdermott@libiquity.com>2019-07-30 21:04:23 (EDT)
committer Patrick McDermott <patrick.mcdermott@libiquity.com>2019-07-30 21:04:23 (EDT)
commit5db167ef486c8d49562f46d73f9eaa03f27a8b76 (patch)
treedb7a0dbec0a6f4b3d71149795321c13604d27181
parent990942046a013e4eab23499cd32218bf046791aa (diff)
Revert "tests/ocsp-stapling.sh: New test script"
This reverts commit 990942046a013e4eab23499cd32218bf046791aa. Apparently, even with OCSP stapling, wolfSSL still performs CRL and OCSP lookups. Is there a way to disable CRL and OCSP when a stapled OCSP response is found in the handshake?
-rw-r--r--tests/local.mk3
-rwxr-xr-xtests/ocsp-stapling.sh37
2 files changed, 1 insertions, 39 deletions
diff --git a/tests/local.mk b/tests/local.mk
index 2049bbe..6d7980c 100644
--- a/tests/local.mk
+++ b/tests/local.mk
@@ -1,6 +1,5 @@
TESTS = \
- %reldir%/badssl.sh \
- %reldir%/ocsp-stapling.sh
+ %reldir%/badssl.sh
TEST_EXTENSIONS = .sh
SH_LOG_DRIVER = \
AM_TAP_AWK='$(AWK)' \
diff --git a/tests/ocsp-stapling.sh b/tests/ocsp-stapling.sh
deleted file mode 100755
index 8ce1fa8..0000000
--- a/tests/ocsp-stapling.sh
+++ /dev/null
@@ -1,37 +0,0 @@
-# OCSP stapling test (requires strace)
-#
-# Copyright (C) 2019 Patrick McDermott
-#
-# This file is part of wolfssl-util.
-#
-# wolfssl-util is free software: you can redistribute it and/or modify
-# it under the terms of the GNU General Public License as published by
-# the Free Software Foundation, either version 2 of the License, or
-# (at your option) any later version.
-#
-# wolfssl-util is distributed in the hope that it will be useful,
-# but WITHOUT ANY WARRANTY; without even the implied warranty of
-# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
-# GNU General Public License for more details.
-#
-# You should have received a copy of the GNU General Public License
-# along with wolfssl-util. If not, see <http://www.gnu.org/licenses/>.
-
-set -eu
-
-. "${TOP_SRCDIR}/tests/aux/tap-functions.sh"
-
-plan_ 1
-
-if printf 'HEAD / HTTP/1.1\r\nHost: letsencrypt.org:443\r\n'$(: \
- )'Connection: close\r\n\r\n' | strace -f -e trace=network \
- "${TOP_BUILDDIR}/wolfssl-util" s_client \
- -connect letsencrypt.org:443 \
- -servername letsencrypt.org 2>&1 | \
- grep -F 'sin_port=htons(80)'; then
- result='not ok'
-else
- result='ok'
-fi
-printf '\n'
-result_ "${result}" -- 'OCSP stapling'