aboutsummaryrefslogtreecommitdiff
path: root/src/testcurl/https/mhds_get_test.c
diff options
context:
space:
mode:
Diffstat (limited to 'src/testcurl/https/mhds_get_test.c')
-rw-r--r--src/testcurl/https/mhds_get_test.c97
1 files changed, 21 insertions, 76 deletions
diff --git a/src/testcurl/https/mhds_get_test.c b/src/testcurl/https/mhds_get_test.c
index ee1ba633..fcbb8706 100644
--- a/src/testcurl/https/mhds_get_test.c
+++ b/src/testcurl/https/mhds_get_test.c
@@ -46,53 +46,7 @@
46#define MHD_E_CERT_FILE_CREAT "Error: failed to setup test certificate\n" 46#define MHD_E_CERT_FILE_CREAT "Error: failed to setup test certificate\n"
47#define MHD_E_KEY_FILE_CREAT "Error: failed to setup test certificate\n" 47#define MHD_E_KEY_FILE_CREAT "Error: failed to setup test certificate\n"
48 48
49/* Test Certificate */ 49#include "tls_test_keys.h"
50const char cert_pem[] =
51 "-----BEGIN CERTIFICATE-----\n"
52 "MIICpjCCAZCgAwIBAgIESEPtjjALBgkqhkiG9w0BAQUwADAeFw0wODA2MDIxMjU0\n"
53 "MzhaFw0wOTA2MDIxMjU0NDZaMAAwggEfMAsGCSqGSIb3DQEBAQOCAQ4AMIIBCQKC\n"
54 "AQC03TyUvK5HmUAirRp067taIEO4bibh5nqolUoUdo/LeblMQV+qnrv/RNAMTx5X\n"
55 "fNLZ45/kbM9geF8qY0vsPyQvP4jumzK0LOJYuIwmHaUm9vbXnYieILiwCuTgjaud\n"
56 "3VkZDoQ9fteIo+6we9UTpVqZpxpbLulBMh/VsvX0cPJ1VFC7rT59o9hAUlFf9jX/\n"
57 "GmKdYI79MtgVx0OPBjmmSD6kicBBfmfgkO7bIGwlRtsIyMznxbHu6VuoX/eVxrTv\n"
58 "rmCwgEXLWRZ6ru8MQl5YfqeGXXRVwMeXU961KefbuvmEPccgCxm8FZ1C1cnDHFXh\n"
59 "siSgAzMBjC/b6KVhNQ4KnUdZAgMBAAGjLzAtMAwGA1UdEwEB/wQCMAAwHQYDVR0O\n"
60 "BBYEFJcUvpjvE5fF/yzUshkWDpdYiQh/MAsGCSqGSIb3DQEBBQOCAQEARP7eKSB2\n"
61 "RNd6XjEjK0SrxtoTnxS3nw9sfcS7/qD1+XHdObtDFqGNSjGYFB3Gpx8fpQhCXdoN\n"
62 "8QUs3/5ZVa5yjZMQewWBgz8kNbnbH40F2y81MHITxxCe1Y+qqHWwVaYLsiOTqj2/\n"
63 "0S3QjEJ9tvklmg7JX09HC4m5QRYfWBeQLD1u8ZjA1Sf1xJriomFVyRLI2VPO2bNe\n"
64 "JDMXWuP+8kMC7gEvUnJ7A92Y2yrhu3QI3bjPk8uSpHea19Q77tul1UVBJ5g+zpH3\n"
65 "OsF5p0MyaVf09GTzcLds5nE/osTdXGUyHJapWReVmPm3Zn6gqYlnzD99z+DPIgIV\n"
66 "RhZvQx74NQnS6g==\n" "-----END CERTIFICATE-----\n";
67
68const char key_pem[] =
69 "-----BEGIN RSA PRIVATE KEY-----\n"
70 "MIIEowIBAAKCAQEAtN08lLyuR5lAIq0adOu7WiBDuG4m4eZ6qJVKFHaPy3m5TEFf\n"
71 "qp67/0TQDE8eV3zS2eOf5GzPYHhfKmNL7D8kLz+I7psytCziWLiMJh2lJvb2152I\n"
72 "niC4sArk4I2rnd1ZGQ6EPX7XiKPusHvVE6VamacaWy7pQTIf1bL19HDydVRQu60+\n"
73 "faPYQFJRX/Y1/xpinWCO/TLYFcdDjwY5pkg+pInAQX5n4JDu2yBsJUbbCMjM58Wx\n"
74 "7ulbqF/3lca0765gsIBFy1kWeq7vDEJeWH6nhl10VcDHl1PetSnn27r5hD3HIAsZ\n"
75 "vBWdQtXJwxxV4bIkoAMzAYwv2+ilYTUOCp1HWQIDAQABAoIBAArOQv3R7gmqDspj\n"
76 "lDaTFOz0C4e70QfjGMX0sWnakYnDGn6DU19iv3GnX1S072ejtgc9kcJ4e8VUO79R\n"
77 "EmqpdRR7k8dJr3RTUCyjzf/C+qiCzcmhCFYGN3KRHA6MeEnkvRuBogX4i5EG1k5l\n"
78 "/5t+YBTZBnqXKWlzQLKoUAiMLPg0eRWh+6q7H4N7kdWWBmTpako7TEqpIwuEnPGx\n"
79 "u3EPuTR+LN6lF55WBePbCHccUHUQaXuav18NuDkcJmCiMArK9SKb+h0RqLD6oMI/\n"
80 "dKD6n8cZXeMBkK+C8U/K0sN2hFHACsu30b9XfdnljgP9v+BP8GhnB0nCB6tNBCPo\n"
81 "32srOwECgYEAxWh3iBT4lWqL6bZavVbnhmvtif4nHv2t2/hOs/CAq8iLAw0oWGZc\n"
82 "+JEZTUDMvFRlulr0kcaWra+4fN3OmJnjeuFXZq52lfMgXBIKBmoSaZpIh2aDY1Rd\n"
83 "RbEse7nQl9hTEPmYspiXLGtnAXW7HuWqVfFFP3ya8rUS3t4d07Hig8ECgYEA6ou6\n"
84 "OHiBRTbtDqLIv8NghARc/AqwNWgEc9PelCPe5bdCOLBEyFjqKiT2MttnSSUc2Zob\n"
85 "XhYkHC6zN1Mlq30N0e3Q61YK9LxMdU1vsluXxNq2rfK1Scb1oOlOOtlbV3zA3VRF\n"
86 "hV3t1nOA9tFmUrwZi0CUMWJE/zbPAyhwWotKyZkCgYEAh0kFicPdbABdrCglXVae\n"
87 "SnfSjVwYkVuGd5Ze0WADvjYsVkYBHTvhgRNnRJMg+/vWz3Sf4Ps4rgUbqK8Vc20b\n"
88 "AU5G6H6tlCvPRGm0ZxrwTWDHTcuKRVs+pJE8C/qWoklE/AAhjluWVoGwUMbPGuiH\n"
89 "6Gf1bgHF6oj/Sq7rv/VLZ8ECgYBeq7ml05YyLuJutuwa4yzQ/MXfghzv4aVyb0F3\n"
90 "QCdXR6o2IYgR6jnSewrZKlA9aPqFJrwHNR6sNXlnSmt5Fcf/RWO/qgJQGLUv3+rG\n"
91 "7kuLTNDR05azSdiZc7J89ID3Bkb+z2YkV+6JUiPq/Ei1+nDBEXb/m+/HqALU/nyj\n"
92 "P3gXeQKBgBusb8Rbd+KgxSA0hwY6aoRTPRt8LNvXdsB9vRcKKHUFQvxUWiUSS+L9\n"
93 "/Qu1sJbrUquKOHqksV5wCnWnAKyJNJlhHuBToqQTgKXjuNmVdYSe631saiI7PHyC\n"
94 "eRJ6DxULPxABytJrYCRrNqmXi5TCiqR2mtfalEMOPxz8rUU8dYyx\n"
95 "-----END RSA PRIVATE KEY-----\n";
96 50
97const char *test_file_name = "https_test_file"; 51const char *test_file_name = "https_test_file";
98const char test_file_data[] = "Hello World\n"; 52const char test_file_data[] = "Hello World\n";
@@ -280,8 +234,8 @@ test_secure_get (FILE * test_fd, char *cipher_suite, int proto_version)
280 d = MHD_start_daemon (MHD_USE_THREAD_PER_CONNECTION | MHD_USE_SSL | 234 d = MHD_start_daemon (MHD_USE_THREAD_PER_CONNECTION | MHD_USE_SSL |
281 MHD_USE_DEBUG, 42433, 235 MHD_USE_DEBUG, 42433,
282 NULL, NULL, &http_ahc, NULL, 236 NULL, NULL, &http_ahc, NULL,
283 MHD_OPTION_HTTPS_MEM_KEY, key_pem, 237 MHD_OPTION_HTTPS_MEM_KEY, srv_key_pem,
284 MHD_OPTION_HTTPS_MEM_CERT, cert_pem, MHD_OPTION_END); 238 MHD_OPTION_HTTPS_MEM_CERT, srv_self_signed_cert_pem, MHD_OPTION_END);
285 239
286 if (d == NULL) 240 if (d == NULL)
287 { 241 {
@@ -317,8 +271,8 @@ test_file_certificates (FILE * test_fd, char *cipher_suite, int proto_version)
317 return -1; 271 return -1;
318 } 272 }
319 273
320 fwrite (key_pem, strlen (key_pem), sizeof (char), key_fd); 274 fwrite (srv_key_pem, strlen (srv_key_pem), sizeof (char), key_fd);
321 fwrite (cert_pem, strlen (cert_pem), sizeof (char), cert_fd); 275 fwrite (srv_self_signed_cert_pem, strlen (srv_self_signed_cert_pem), sizeof (char), cert_fd);
322 fclose (key_fd); 276 fclose (key_fd);
323 fclose (cert_fd); 277 fclose (cert_fd);
324 278
@@ -353,8 +307,8 @@ test_cipher_option (FILE * test_fd, char *cipher_suite, int proto_version)
353 d = MHD_start_daemon (MHD_USE_THREAD_PER_CONNECTION | MHD_USE_SSL | 307 d = MHD_start_daemon (MHD_USE_THREAD_PER_CONNECTION | MHD_USE_SSL |
354 MHD_USE_DEBUG, 42433, 308 MHD_USE_DEBUG, 42433,
355 NULL, NULL, &http_ahc, NULL, 309 NULL, NULL, &http_ahc, NULL,
356 MHD_OPTION_HTTPS_MEM_KEY, key_pem, 310 MHD_OPTION_HTTPS_MEM_KEY, srv_key_pem,
357 MHD_OPTION_HTTPS_MEM_CERT, cert_pem, 311 MHD_OPTION_HTTPS_MEM_CERT, srv_self_signed_cert_pem,
358 MHD_OPTION_CIPHER_ALGORITHM, ciper, MHD_OPTION_END); 312 MHD_OPTION_CIPHER_ALGORITHM, ciper, MHD_OPTION_END);
359 313
360 if (d == NULL) 314 if (d == NULL)
@@ -380,8 +334,8 @@ test_kx_option (FILE * test_fd, char *cipher_suite, int proto_version)
380 d = MHD_start_daemon (MHD_USE_THREAD_PER_CONNECTION | MHD_USE_SSL | 334 d = MHD_start_daemon (MHD_USE_THREAD_PER_CONNECTION | MHD_USE_SSL |
381 MHD_USE_DEBUG, 42433, 335 MHD_USE_DEBUG, 42433,
382 NULL, NULL, &http_ahc, NULL, 336 NULL, NULL, &http_ahc, NULL,
383 MHD_OPTION_HTTPS_MEM_KEY, key_pem, 337 MHD_OPTION_HTTPS_MEM_KEY, srv_key_pem,
384 MHD_OPTION_HTTPS_MEM_CERT, cert_pem, 338 MHD_OPTION_HTTPS_MEM_CERT, srv_self_signed_cert_pem,
385 MHD_OPTION_KX_PRIORITY, kx, MHD_OPTION_END); 339 MHD_OPTION_KX_PRIORITY, kx, MHD_OPTION_END);
386 340
387 if (d == NULL) 341 if (d == NULL)
@@ -407,8 +361,8 @@ test_mac_option (FILE * test_fd, char *cipher_suite, int proto_version)
407 d = MHD_start_daemon (MHD_USE_THREAD_PER_CONNECTION | MHD_USE_SSL | 361 d = MHD_start_daemon (MHD_USE_THREAD_PER_CONNECTION | MHD_USE_SSL |
408 MHD_USE_DEBUG, 42433, 362 MHD_USE_DEBUG, 42433,
409 NULL, NULL, &http_ahc, NULL, 363 NULL, NULL, &http_ahc, NULL,
410 MHD_OPTION_HTTPS_MEM_KEY, key_pem, 364 MHD_OPTION_HTTPS_MEM_KEY, srv_key_pem,
411 MHD_OPTION_HTTPS_MEM_CERT, cert_pem, 365 MHD_OPTION_HTTPS_MEM_CERT, srv_self_signed_cert_pem,
412 MHD_OPTION_MAC_ALGO, mac, MHD_OPTION_END); 366 MHD_OPTION_MAC_ALGO, mac, MHD_OPTION_END);
413 367
414 if (d == NULL) 368 if (d == NULL)
@@ -470,28 +424,19 @@ main (int argc, char *const *argv)
470 return -1; 424 return -1;
471 } 425 }
472 426
473 //gnutls_global_set_log_level(11);
474// errorCount +=
475// test_secure_get (test_fd, "AES256-SHA", CURL_SSLVERSION_TLSv1);
476//
477// errorCount +=
478// test_secure_get (test_fd, "AES256-SHA", CURL_SSLVERSION_TLSv1);
479//
480// sleep(1);
481
482 errorCount += 427 errorCount +=
483 test_secure_get (test_fd, "AES256-SHA", CURL_SSLVERSION_TLSv1); 428 test_secure_get (test_fd, "AES256-SHA", CURL_SSLVERSION_TLSv1);
484 429
485// errorCount += 430 errorCount +=
486// test_secure_get (test_fd, "AES256-SHA", CURL_SSLVERSION_SSLv3); 431 test_secure_get (test_fd, "AES256-SHA", CURL_SSLVERSION_SSLv3);
487// errorCount += 432 errorCount +=
488// test_file_certificates (test_fd, "AES256-SHA", CURL_SSLVERSION_TLSv1); 433 test_file_certificates (test_fd, "AES256-SHA", CURL_SSLVERSION_TLSv1);
489// 434
490// /* TODO resolve cipher setting issue when compiling against GNU TLS */ 435 /* TODO resolve cipher setting issue when compiling against GNU TLS */
491// errorCount += 436 errorCount +=
492// test_cipher_option (test_fd, "DES-CBC3-SHA", CURL_SSLVERSION_SSLv3); 437 test_cipher_option (test_fd, "DES-CBC3-SHA", CURL_SSLVERSION_SSLv3);
493// errorCount += 438 errorCount +=
494// test_kx_option (test_fd, "EDH-RSA-DES-CBC3-SHA", CURL_SSLVERSION_SSLv3); 439 test_kx_option (test_fd, "EDH-RSA-DES-CBC3-SHA", CURL_SSLVERSION_SSLv3);
495 440
496 441
497 if (errorCount != 0) 442 if (errorCount != 0)