summaryrefslogtreecommitdiffstats
path: root/tests
Commit message (Collapse)AuthorAgeFilesLines
* Revert "tests/ocsp-stapling.sh: New test script"Patrick McDermott2019-07-302-39/+1
| | | | | | | | This reverts commit 990942046a013e4eab23499cd32218bf046791aa. Apparently, even with OCSP stapling, wolfSSL still performs CRL and OCSP lookups. Is there a way to disable CRL and OCSP when a stapled OCSP response is found in the handshake?
* tests/ocsp-stapling.sh: New test scriptPatrick McDermott2019-07-302-1/+39
|
* s_client: Verify hostPatrick McDermott2019-07-301-1/+1
| | | | wolfSSL doesn't do this automatically?!
* tests/badssl.sh: Drop Certificate Transparency testPatrick McDermott2019-07-301-3/+1
| | | | | | CT seems to be unsupported in wolfSSL, but the certificate for invalid-expected-sct.badssl.com is expired, so this is likely a false pass.
* tests/badssl.sh: Deprecate DH with 1024-bit groupPatrick McDermott2019-07-301-1/+1
|
* tests/badssl.sh: Deprecate AES-CBCPatrick McDermott2019-07-301-1/+1
|
* tests/badssl.sh: Mark expected failuresPatrick McDermott2019-07-301-45/+46
|
* tests/badssl.sh: Upgrade to HTTP/1.1Patrick McDermott2019-07-301-1/+3
|
* tests/badssl.sh: Print newline before TAP directivesPatrick McDermott2019-07-301-2/+9
|
* s_client: Disable SSLv3, TLSv1.0, and TLSv1.1Patrick McDermott2019-07-301-2/+2
| | | | And update tests/badssl.sh results.
* tests/badssl.sh: Fix Mozilla recommendation resultsPatrick McDermott2019-07-291-2/+2
|
* tests/badssl.sh: Update resultsPatrick McDermott2019-07-291-7/+6
| | | | | | HPKP is unimplemented, certificates without CN/subject are accepted, wolfSSL falls over with too many SANs, and 8192-bit RSA keys are unsupported by wolfSSL (which is probably a good thing anyway).
* tests/badssl.sh: Add "not " to test descriptionsPatrick McDermott2019-07-291-18/+19
|
* tests/badssl.sh: New test scriptPatrick McDermott2019-07-292-1/+108
|
* build: Add test frameworkPatrick McDermott2019-07-293-0/+242