diff options
author | Evgeny Grin (Karlson2k) <k2k@narod.ru> | 2022-10-04 18:49:35 +0300 |
---|---|---|
committer | Evgeny Grin (Karlson2k) <k2k@narod.ru> | 2022-10-05 18:42:20 +0300 |
commit | f069ee365d4cedb9854924ab2f6b96476b64319f (patch) | |
tree | 0efa1a26e7848d6ee3a97fc697e2b0b492828e37 /src/testcurl/https/test_tls_options.c | |
parent | 0be4e8c2a74bc70683aff1f8af9f225d2090d0c2 (diff) | |
download | libmicrohttpd-f069ee365d4cedb9854924ab2f6b96476b64319f.tar.gz libmicrohttpd-f069ee365d4cedb9854924ab2f6b96476b64319f.zip |
testcurl/https: removed explicit cipher setting
Explicit ciphers are not required and not future-proof.
Diffstat (limited to 'src/testcurl/https/test_tls_options.c')
-rw-r--r-- | src/testcurl/https/test_tls_options.c | 10 |
1 files changed, 4 insertions, 6 deletions
diff --git a/src/testcurl/https/test_tls_options.c b/src/testcurl/https/test_tls_options.c index b0f969a8..7390b89a 100644 --- a/src/testcurl/https/test_tls_options.c +++ b/src/testcurl/https/test_tls_options.c | |||
@@ -89,8 +89,6 @@ main (int argc, char *const *argv) | |||
89 | MHD_USE_THREAD_PER_CONNECTION | MHD_USE_INTERNAL_POLLING_THREAD | 89 | MHD_USE_THREAD_PER_CONNECTION | MHD_USE_INTERNAL_POLLING_THREAD |
90 | | MHD_USE_TLS | MHD_USE_ERROR_LOG; | 90 | | MHD_USE_TLS | MHD_USE_ERROR_LOG; |
91 | uint16_t port; | 91 | uint16_t port; |
92 | const char *aes128_sha = "AES128-SHA"; | ||
93 | const char *aes256_sha = "AES256-SHA"; | ||
94 | (void) argc; (void) argv; /* Unused. Silent compiler warning. */ | 92 | (void) argc; (void) argv; /* Unused. Silent compiler warning. */ |
95 | 93 | ||
96 | if (MHD_NO != MHD_is_feature_supported (MHD_FEATURE_AUTODETECT_BIND_PORT)) | 94 | if (MHD_NO != MHD_is_feature_supported (MHD_FEATURE_AUTODETECT_BIND_PORT)) |
@@ -139,9 +137,9 @@ main (int argc, char *const *argv) | |||
139 | } | 137 | } |
140 | 138 | ||
141 | if (0 != | 139 | if (0 != |
142 | test_wrap ("TLS1.0-AES-SHA1", | 140 | test_wrap ("TLS1.0", |
143 | &test_https_transfer, NULL, port, daemon_flags, | 141 | &test_https_transfer, NULL, port, daemon_flags, |
144 | aes128_sha, | 142 | NULL, |
145 | CURL_SSLVERSION_TLSv1, | 143 | CURL_SSLVERSION_TLSv1, |
146 | MHD_OPTION_HTTPS_MEM_KEY, srv_key_pem, | 144 | MHD_OPTION_HTTPS_MEM_KEY, srv_key_pem, |
147 | MHD_OPTION_HTTPS_MEM_CERT, srv_self_signed_cert_pem, | 145 | MHD_OPTION_HTTPS_MEM_CERT, srv_self_signed_cert_pem, |
@@ -149,7 +147,7 @@ main (int argc, char *const *argv) | |||
149 | "NONE:+VERS-TLS1.0:+AES-128-CBC:+SHA1:+RSA:+COMP-NULL", | 147 | "NONE:+VERS-TLS1.0:+AES-128-CBC:+SHA1:+RSA:+COMP-NULL", |
150 | MHD_OPTION_END)) | 148 | MHD_OPTION_END)) |
151 | { | 149 | { |
152 | fprintf (stderr, "TLS1.0-AES-SHA1 test failed\n"); | 150 | fprintf (stderr, "TLS1.0 test failed\n"); |
153 | errorCount++; | 151 | errorCount++; |
154 | } | 152 | } |
155 | fprintf (stderr, | 153 | fprintf (stderr, |
@@ -157,7 +155,7 @@ main (int argc, char *const *argv) | |||
157 | if (0 != | 155 | if (0 != |
158 | test_wrap ("TLS1.1 vs TLS1.0", | 156 | test_wrap ("TLS1.1 vs TLS1.0", |
159 | &test_unmatching_ssl_version, NULL, port, daemon_flags, | 157 | &test_unmatching_ssl_version, NULL, port, daemon_flags, |
160 | aes256_sha, | 158 | NULL, |
161 | CURL_SSLVERSION_TLSv1_1, | 159 | CURL_SSLVERSION_TLSv1_1, |
162 | MHD_OPTION_HTTPS_MEM_KEY, srv_key_pem, | 160 | MHD_OPTION_HTTPS_MEM_KEY, srv_key_pem, |
163 | MHD_OPTION_HTTPS_MEM_CERT, srv_self_signed_cert_pem, | 161 | MHD_OPTION_HTTPS_MEM_CERT, srv_self_signed_cert_pem, |