Commit message (Collapse) | Author | Age | Files | Lines | |
---|---|---|---|---|---|
* | s_client: Verify host | Patrick McDermott | 2019-07-30 | 1 | -1/+1 |
| | | | | wolfSSL doesn't do this automatically?! | ||||
* | tests/badssl.sh: Drop Certificate Transparency test | Patrick McDermott | 2019-07-30 | 1 | -3/+1 |
| | | | | | | CT seems to be unsupported in wolfSSL, but the certificate for invalid-expected-sct.badssl.com is expired, so this is likely a false pass. | ||||
* | tests/badssl.sh: Deprecate DH with 1024-bit group | Patrick McDermott | 2019-07-30 | 1 | -1/+1 |
| | |||||
* | tests/badssl.sh: Deprecate AES-CBC | Patrick McDermott | 2019-07-30 | 1 | -1/+1 |
| | |||||
* | tests/badssl.sh: Mark expected failures | Patrick McDermott | 2019-07-30 | 1 | -45/+46 |
| | |||||
* | tests/badssl.sh: Upgrade to HTTP/1.1 | Patrick McDermott | 2019-07-30 | 1 | -1/+3 |
| | |||||
* | tests/badssl.sh: Print newline before TAP directives | Patrick McDermott | 2019-07-30 | 1 | -2/+9 |
| | |||||
* | s_client: Disable SSLv3, TLSv1.0, and TLSv1.1 | Patrick McDermott | 2019-07-30 | 1 | -2/+2 |
| | | | | And update tests/badssl.sh results. | ||||
* | tests/badssl.sh: Fix Mozilla recommendation results | Patrick McDermott | 2019-07-29 | 1 | -2/+2 |
| | |||||
* | tests/badssl.sh: Update results | Patrick McDermott | 2019-07-29 | 1 | -7/+6 |
| | | | | | | HPKP is unimplemented, certificates without CN/subject are accepted, wolfSSL falls over with too many SANs, and 8192-bit RSA keys are unsupported by wolfSSL (which is probably a good thing anyway). | ||||
* | tests/badssl.sh: Add "not " to test descriptions | Patrick McDermott | 2019-07-29 | 1 | -18/+19 |
| | |||||
* | tests/badssl.sh: New test script | Patrick McDermott | 2019-07-29 | 1 | -0/+106 |