summaryrefslogtreecommitdiffstats
path: root/tests/badssl.sh
Commit message (Collapse)AuthorAgeFilesLines
* s_client: Verify hostPatrick McDermott2019-07-301-1/+1
| | | | wolfSSL doesn't do this automatically?!
* tests/badssl.sh: Drop Certificate Transparency testPatrick McDermott2019-07-301-3/+1
| | | | | | CT seems to be unsupported in wolfSSL, but the certificate for invalid-expected-sct.badssl.com is expired, so this is likely a false pass.
* tests/badssl.sh: Deprecate DH with 1024-bit groupPatrick McDermott2019-07-301-1/+1
|
* tests/badssl.sh: Deprecate AES-CBCPatrick McDermott2019-07-301-1/+1
|
* tests/badssl.sh: Mark expected failuresPatrick McDermott2019-07-301-45/+46
|
* tests/badssl.sh: Upgrade to HTTP/1.1Patrick McDermott2019-07-301-1/+3
|
* tests/badssl.sh: Print newline before TAP directivesPatrick McDermott2019-07-301-2/+9
|
* s_client: Disable SSLv3, TLSv1.0, and TLSv1.1Patrick McDermott2019-07-301-2/+2
| | | | And update tests/badssl.sh results.
* tests/badssl.sh: Fix Mozilla recommendation resultsPatrick McDermott2019-07-291-2/+2
|
* tests/badssl.sh: Update resultsPatrick McDermott2019-07-291-7/+6
| | | | | | HPKP is unimplemented, certificates without CN/subject are accepted, wolfSSL falls over with too many SANs, and 8192-bit RSA keys are unsupported by wolfSSL (which is probably a good thing anyway).
* tests/badssl.sh: Add "not " to test descriptionsPatrick McDermott2019-07-291-18/+19
|
* tests/badssl.sh: New test scriptPatrick McDermott2019-07-291-0/+106