summaryrefslogtreecommitdiff
path: root/tests/online/badssl.c
Commit message (Collapse)AuthorAgeFilesLines
* cmake: define GIT_HTTPS when HTTPS is supportedPatrick Steinhardt2017-04-251-1/+1
|
* https: don't test that RC4 is invalidcmn/sec-update-25Carlos Martín Nieto2017-01-091-0/+3
| | | | | None of our crypto backends actually reject RC4 as a cipher so don't test for it and instead keep it as something we'd like to do.
* http: correct the expected error for RC4Carlos Martín Nieto2017-01-091-2/+4
| | | | | We must make sure that we're getting a certificate error from the library so we know that we're testing the right thing.
* http: perform 'badssl' check also via certificate callbackCarlos Martín Nieto2017-01-061-0/+29
| | | | | | Make sure that the callbacks do also get a 'valid' value of zero when the certificate we're looking at is in valid and assert that within the test.
* Use general cl_git_fail because the error is genericDirkjan Bussink2016-03-141-2/+1
|
* Setup better defaults for OpenSSL ciphersDirkjan Bussink2016-03-141-0/+9
| | | | | | | | | This ensures that when using OpenSSL a safe default set of ciphers is selected. This is done so that the client communicates securely and we don't accidentally enable unsafe ciphers like RC4, or even worse some old export ciphers. Implements the first part of https://github.com/libgit2/libgit2/issues/3682
* Fix build for unit testLeo Yang2015-11-021-2/+13
| | | | | If none of GIT_OPENSSL, GIT_WINHTTP or GIT_SECURE_TRANSPORT is defined we should also be able to build the unit test.
* net: add tests against badssl.comcmn/badsslCarlos Martín Nieto2015-09-271-0/+27
These provide bad X.509 certificates, which we should refuse to connect to by default.