libmicrohttpd

HTTP/1.x server C library (MHD 1.x, stable)
Log | Files | Refs | Submodules | README | LICENSE

commit f069ee365d4cedb9854924ab2f6b96476b64319f
parent 0be4e8c2a74bc70683aff1f8af9f225d2090d0c2
Author: Evgeny Grin (Karlson2k) <k2k@narod.ru>
Date:   Tue,  4 Oct 2022 18:49:35 +0300

testcurl/https: removed explicit cipher setting

Explicit ciphers are not required and not future-proof.

Diffstat:
Msrc/testcurl/https/test_empty_response.c | 6------
Msrc/testcurl/https/test_https_get.c | 8+-------
Msrc/testcurl/https/test_https_get_iovec.c | 7+------
Msrc/testcurl/https/test_https_get_parallel.c | 11++++-------
Msrc/testcurl/https/test_https_get_parallel_threads.c | 10++--------
Msrc/testcurl/https/test_https_get_select.c | 5-----
Msrc/testcurl/https/test_https_multi_daemon.c | 8+-------
Msrc/testcurl/https/test_https_session_info.c | 7-------
Msrc/testcurl/https/test_tls_authentication.c | 8+-------
Msrc/testcurl/https/test_tls_extensions.c | 2+-
Msrc/testcurl/https/test_tls_options.c | 10++++------
Msrc/testcurl/https/tls_test_common.c | 10++++++----
12 files changed, 21 insertions(+), 71 deletions(-)

diff --git a/src/testcurl/https/test_empty_response.c b/src/testcurl/https/test_empty_response.c @@ -75,7 +75,6 @@ testInternalSelectGet (void) time_t start; struct timeval tv; uint16_t port; - const char *aes256_sha = "AES256-SHA"; if (MHD_NO != MHD_is_feature_supported (MHD_FEATURE_AUTODETECT_BIND_PORT)) port = 0; @@ -105,10 +104,6 @@ testInternalSelectGet (void) } port = dinfo->port; } - if (curl_tls_is_nss ()) - { - aes256_sha = "rsa_aes_256_sha"; - } c = curl_easy_init (); curl_easy_setopt (c, CURLOPT_URL, "https://127.0.0.1/hello_world"); @@ -117,7 +112,6 @@ testInternalSelectGet (void) curl_easy_setopt (c, CURLOPT_WRITEDATA, &cbc); /* TLS options */ curl_easy_setopt (c, CURLOPT_SSLVERSION, CURL_SSLVERSION_TLSv1); - curl_easy_setopt (c, CURLOPT_SSL_CIPHER_LIST, aes256_sha); curl_easy_setopt (c, CURLOPT_SSL_VERIFYPEER, 0L); curl_easy_setopt (c, CURLOPT_SSL_VERIFYHOST, 0L); curl_easy_setopt (c, CURLOPT_FAILONERROR, 1L); diff --git a/src/testcurl/https/test_https_get.c b/src/testcurl/https/test_https_get.c @@ -232,7 +232,6 @@ int main (int argc, char *const *argv) { unsigned int errorCount = 0; - const char *aes256_sha_tlsv1 = "AES256-SHA"; (void) argc; (void) argv; /* Unused. Silent compiler warning. */ #ifdef MHD_HTTPS_REQUIRE_GCRYPT @@ -249,13 +248,8 @@ main (int argc, char *const *argv) curl_global_cleanup (); return 77; } - - if (curl_tls_is_nss ()) - { - aes256_sha_tlsv1 = "rsa_aes_256_sha"; - } errorCount += - test_secure_get (NULL, aes256_sha_tlsv1, CURL_SSLVERSION_TLSv1); + test_secure_get (NULL, NULL, CURL_SSLVERSION_TLSv1); errorCount += testEmptyGet (0); curl_global_cleanup (); diff --git a/src/testcurl/https/test_https_get_iovec.c b/src/testcurl/https/test_https_get_iovec.c @@ -390,7 +390,6 @@ int main (int argc, char *const *argv) { unsigned int errorCount = 0; - const char *aes256_sha_tlsv1 = "AES256-SHA"; (void) argc; (void) argv; /* Unused. Silent compiler warning. */ #ifdef MHD_HTTPS_REQUIRE_GCRYPT @@ -408,12 +407,8 @@ main (int argc, char *const *argv) return 77; } - if (curl_tls_is_nss ()) - { - aes256_sha_tlsv1 = "rsa_aes_256_sha"; - } errorCount += - test_secure_get (NULL, aes256_sha_tlsv1, CURL_SSLVERSION_TLSv1); + test_secure_get (NULL, NULL, CURL_SSLVERSION_TLSv1); errorCount += testEmptyGet (0); curl_global_cleanup (); diff --git a/src/testcurl/https/test_https_get_parallel.c b/src/testcurl/https/test_https_get_parallel.c @@ -134,7 +134,6 @@ int main (int argc, char *const *argv) { unsigned int errorCount = 0; - const char *aes256_sha = "AES256-SHA"; uint16_t port; unsigned int iseed; (void) argc; /* Unused. Silent compiler warning. */ @@ -155,8 +154,6 @@ main (int argc, char *const *argv) fprintf (stderr, "Curl does not support SSL. Cannot run the test.\n"); return 77; } - if (curl_tls_is_nss ()) - aes256_sha = "rsa_aes_256_sha"; #ifdef EPOLL_SUPPORT errorCount += test_wrap ("single threaded daemon, single client, epoll", @@ -164,7 +161,7 @@ main (int argc, char *const *argv) NULL, port, MHD_USE_INTERNAL_POLLING_THREAD | MHD_USE_TLS | MHD_USE_ERROR_LOG | MHD_USE_EPOLL, - aes256_sha, CURL_SSLVERSION_TLSv1, MHD_OPTION_HTTPS_MEM_KEY, + NULL, CURL_SSLVERSION_TLSv1, MHD_OPTION_HTTPS_MEM_KEY, srv_key_pem, MHD_OPTION_HTTPS_MEM_CERT, srv_self_signed_cert_pem, MHD_OPTION_END); #endif @@ -173,7 +170,7 @@ main (int argc, char *const *argv) NULL, port, MHD_USE_INTERNAL_POLLING_THREAD | MHD_USE_TLS | MHD_USE_ERROR_LOG, - aes256_sha, CURL_SSLVERSION_TLSv1, MHD_OPTION_HTTPS_MEM_KEY, + NULL, CURL_SSLVERSION_TLSv1, MHD_OPTION_HTTPS_MEM_KEY, srv_key_pem, MHD_OPTION_HTTPS_MEM_CERT, srv_self_signed_cert_pem, MHD_OPTION_END); #ifdef EPOLL_SUPPORT @@ -182,7 +179,7 @@ main (int argc, char *const *argv) &test_parallel_clients, NULL, port, MHD_USE_INTERNAL_POLLING_THREAD | MHD_USE_TLS | MHD_USE_ERROR_LOG | MHD_USE_EPOLL, - aes256_sha, CURL_SSLVERSION_TLSv1, MHD_OPTION_HTTPS_MEM_KEY, + NULL, CURL_SSLVERSION_TLSv1, MHD_OPTION_HTTPS_MEM_KEY, srv_key_pem, MHD_OPTION_HTTPS_MEM_CERT, srv_self_signed_cert_pem, MHD_OPTION_END); #endif @@ -191,7 +188,7 @@ main (int argc, char *const *argv) &test_parallel_clients, NULL, port, MHD_USE_INTERNAL_POLLING_THREAD | MHD_USE_TLS | MHD_USE_ERROR_LOG, - aes256_sha, CURL_SSLVERSION_TLSv1, MHD_OPTION_HTTPS_MEM_KEY, + NULL, CURL_SSLVERSION_TLSv1, MHD_OPTION_HTTPS_MEM_KEY, srv_key_pem, MHD_OPTION_HTTPS_MEM_CERT, srv_self_signed_cert_pem, MHD_OPTION_END); diff --git a/src/testcurl/https/test_https_get_parallel_threads.c b/src/testcurl/https/test_https_get_parallel_threads.c @@ -139,7 +139,6 @@ main (int argc, char *const *argv) const char *ssl_version; uint16_t port; unsigned int iseed; - const char *aes256_sha = "AES256-SHA"; (void) argc; /* Unused. Silent compiler warning. */ if (MHD_NO != MHD_is_feature_supported (MHD_FEATURE_AUTODETECT_BIND_PORT)) @@ -172,17 +171,12 @@ main (int argc, char *const *argv) return 77; } - if (curl_tls_is_nss ()) - { - aes256_sha = "rsa_aes_256_sha"; - } - errorCount += test_wrap ("multi threaded daemon, single client", &test_single_client, NULL, port, MHD_USE_TLS | MHD_USE_ERROR_LOG | MHD_USE_THREAD_PER_CONNECTION | MHD_USE_INTERNAL_POLLING_THREAD, - aes256_sha, CURL_SSLVERSION_TLSv1, MHD_OPTION_HTTPS_MEM_KEY, + NULL, CURL_SSLVERSION_TLSv1, MHD_OPTION_HTTPS_MEM_KEY, srv_key_pem, MHD_OPTION_HTTPS_MEM_CERT, srv_self_signed_cert_pem, MHD_OPTION_END); @@ -191,7 +185,7 @@ main (int argc, char *const *argv) &test_parallel_clients, NULL, port, MHD_USE_TLS | MHD_USE_ERROR_LOG | MHD_USE_THREAD_PER_CONNECTION | MHD_USE_INTERNAL_POLLING_THREAD, - aes256_sha, CURL_SSLVERSION_TLSv1, MHD_OPTION_HTTPS_MEM_KEY, + NULL, CURL_SSLVERSION_TLSv1, MHD_OPTION_HTTPS_MEM_KEY, srv_key_pem, MHD_OPTION_HTTPS_MEM_CERT, srv_self_signed_cert_pem, MHD_OPTION_END); diff --git a/src/testcurl/https/test_https_get_select.c b/src/testcurl/https/test_https_get_select.c @@ -92,7 +92,6 @@ testExternalGet (unsigned int flags) struct CURLMsg *msg; time_t start; struct timeval tv; - const char *aes256_sha = "AES256-SHA"; uint16_t port; if (MHD_NO != MHD_is_feature_supported (MHD_FEATURE_AUTODETECT_BIND_PORT)) @@ -122,9 +121,6 @@ testExternalGet (unsigned int flags) port = dinfo->port; } - if (curl_tls_is_nss ()) - aes256_sha = "rsa_aes_256_sha"; - c = curl_easy_init (); curl_easy_setopt (c, CURLOPT_URL, "https://127.0.0.1/hello_world"); curl_easy_setopt (c, CURLOPT_PORT, (long) port); @@ -132,7 +128,6 @@ testExternalGet (unsigned int flags) curl_easy_setopt (c, CURLOPT_WRITEDATA, &cbc); /* TLS options */ curl_easy_setopt (c, CURLOPT_SSLVERSION, CURL_SSLVERSION_TLSv1); - curl_easy_setopt (c, CURLOPT_SSL_CIPHER_LIST, aes256_sha); curl_easy_setopt (c, CURLOPT_SSL_VERIFYPEER, 0L); curl_easy_setopt (c, CURLOPT_SSL_VERIFYHOST, 0L); curl_easy_setopt (c, CURLOPT_FAILONERROR, 1L); diff --git a/src/testcurl/https/test_https_multi_daemon.c b/src/testcurl/https/test_https_multi_daemon.c @@ -131,7 +131,6 @@ int main (int argc, char *const *argv) { unsigned int errorCount = 0; - const char *aes256_sha = "AES256-SHA"; (void) argc; (void) argv; /* Unused. Silent compiler warning. */ #ifdef MHD_HTTPS_REQUIRE_GCRYPT @@ -149,13 +148,8 @@ main (int argc, char *const *argv) return 77; } - if (curl_tls_is_nss ()) - { - aes256_sha = "rsa_aes_256_sha"; - } - errorCount += - test_concurent_daemon_pair (NULL, aes256_sha, CURL_SSLVERSION_TLSv1); + test_concurent_daemon_pair (NULL, NULL, CURL_SSLVERSION_TLSv1); print_test_result (errorCount, "concurent_daemon_pair"); diff --git a/src/testcurl/https/test_https_session_info.c b/src/testcurl/https/test_https_session_info.c @@ -102,7 +102,6 @@ test_query_session (void) CURLcode errornum; char url[256]; uint16_t port; - const char *aes256_sha = "AES256-SHA"; if (MHD_NO != MHD_is_feature_supported (MHD_FEATURE_AUTODETECT_BIND_PORT)) port = 0; @@ -142,11 +141,6 @@ test_query_session (void) port = dinfo->port; } - if (curl_tls_is_nss ()) - { - aes256_sha = "rsa_aes_256_sha"; - } - gen_test_file_url (url, sizeof (url), port); @@ -162,7 +156,6 @@ test_query_session (void) curl_easy_setopt (c, CURLOPT_FILE, &cbc); /* TLS options */ curl_easy_setopt (c, CURLOPT_SSLVERSION, CURL_SSLVERSION_TLSv1_1); - curl_easy_setopt (c, CURLOPT_SSL_CIPHER_LIST, aes256_sha); /* currently skip any peer authentication */ curl_easy_setopt (c, CURLOPT_SSL_VERIFYPEER, 0L); curl_easy_setopt (c, CURLOPT_SSL_VERIFYHOST, 0L); diff --git a/src/testcurl/https/test_tls_authentication.c b/src/testcurl/https/test_tls_authentication.c @@ -86,7 +86,6 @@ int main (int argc, char *const *argv) { unsigned int errorCount = 0; - const char *aes256_sha = "AES256-SHA"; (void) argc; (void) argv; /* Unused. Silent compiler warning. */ @@ -105,13 +104,8 @@ main (int argc, char *const *argv) return 77; } - if (curl_tls_is_nss ()) - { - aes256_sha = "rsa_aes_256_sha"; - } - errorCount += - test_secure_get (NULL, aes256_sha, CURL_SSLVERSION_TLSv1); + test_secure_get (NULL, NULL, CURL_SSLVERSION_TLSv1); print_test_result (errorCount, argv[0]); diff --git a/src/testcurl/https/test_tls_extensions.c b/src/testcurl/https/test_tls_extensions.c @@ -187,7 +187,7 @@ test_hello_extension (gnutls_session_t session, uint16_t port, gnutls_free (data); /* make sure daemon is still functioning */ - if (CURLE_OK != send_curl_req (url, &cbc, "AES128-SHA", + if (CURLE_OK != send_curl_req (url, &cbc, NULL, MHD_GNUTLS_PROTOCOL_TLS1_2)) { ret = -1; diff --git a/src/testcurl/https/test_tls_options.c b/src/testcurl/https/test_tls_options.c @@ -89,8 +89,6 @@ main (int argc, char *const *argv) MHD_USE_THREAD_PER_CONNECTION | MHD_USE_INTERNAL_POLLING_THREAD | MHD_USE_TLS | MHD_USE_ERROR_LOG; uint16_t port; - const char *aes128_sha = "AES128-SHA"; - const char *aes256_sha = "AES256-SHA"; (void) argc; (void) argv; /* Unused. Silent compiler warning. */ if (MHD_NO != MHD_is_feature_supported (MHD_FEATURE_AUTODETECT_BIND_PORT)) @@ -139,9 +137,9 @@ main (int argc, char *const *argv) } if (0 != - test_wrap ("TLS1.0-AES-SHA1", + test_wrap ("TLS1.0", &test_https_transfer, NULL, port, daemon_flags, - aes128_sha, + NULL, CURL_SSLVERSION_TLSv1, MHD_OPTION_HTTPS_MEM_KEY, srv_key_pem, MHD_OPTION_HTTPS_MEM_CERT, srv_self_signed_cert_pem, @@ -149,7 +147,7 @@ main (int argc, char *const *argv) "NONE:+VERS-TLS1.0:+AES-128-CBC:+SHA1:+RSA:+COMP-NULL", MHD_OPTION_END)) { - fprintf (stderr, "TLS1.0-AES-SHA1 test failed\n"); + fprintf (stderr, "TLS1.0 test failed\n"); errorCount++; } fprintf (stderr, @@ -157,7 +155,7 @@ main (int argc, char *const *argv) if (0 != test_wrap ("TLS1.1 vs TLS1.0", &test_unmatching_ssl_version, NULL, port, daemon_flags, - aes256_sha, + NULL, CURL_SSLVERSION_TLSv1_1, MHD_OPTION_HTTPS_MEM_KEY, srv_key_pem, MHD_OPTION_HTTPS_MEM_CERT, srv_self_signed_cert_pem, diff --git a/src/testcurl/https/tls_test_common.c b/src/testcurl/https/tls_test_common.c @@ -84,8 +84,9 @@ test_daemon_get (void *cls, /* TLS options */ if ((CURLE_OK != (e = curl_easy_setopt (c, CURLOPT_SSLVERSION, proto_version))) || - (CURLE_OK != (e = curl_easy_setopt (c, CURLOPT_SSL_CIPHER_LIST, - cipher_suite))) || + ((NULL != cipher_suite) && + (CURLE_OK != (e = curl_easy_setopt (c, CURLOPT_SSL_CIPHER_LIST, + cipher_suite)))) || /* perform peer authentication */ /* TODO merge into send_curl_req */ @@ -280,8 +281,9 @@ send_curl_req (char *url, /* TLS options */ if ((CURLE_OK != (e = curl_easy_setopt (c, CURLOPT_SSLVERSION, proto_version))) || - (CURLE_OK != (e = curl_easy_setopt (c, CURLOPT_SSL_CIPHER_LIST, - cipher_suite))) || + ((NULL != cipher_suite) && + (CURLE_OK != (e = curl_easy_setopt (c, CURLOPT_SSL_CIPHER_LIST, + cipher_suite)))) || /* currently skip any peer authentication */ (CURLE_OK != (e = curl_easy_setopt (c, CURLOPT_SSL_VERIFYPEER, 0L))) || (CURLE_OK != (e = curl_easy_setopt (c, CURLOPT_SSL_VERIFYHOST, 0L))))