"Fossies" - the Fresh Open Source Software Archive  

Source code changes of the file "test/ssl.c" between
neon-0.31.1.tar.gz and neon-0.31.2.tar.gz

About: neon is an HTTP and WebDAV client library, with a C interface.

ssl.c  (neon-0.31.1):ssl.c  (neon-0.31.2)
skipping to change at line 894 skipping to change at line 894
char *key = SRCDIR("nulsrv.key"), *ca = SRCDIR("nulca.pem"); char *key = SRCDIR("nulsrv.key"), *ca = SRCDIR("nulca.pem");
CALL(fail_ssl_request_with_error2(nul_cn_fn, key, ca, CALL(fail_ssl_request_with_error2(nul_cn_fn, key, ca,
"www.bank.com", "localhost", "www.bank.com", "localhost",
"certificate with incorrect CN was accepte d", "certificate with incorrect CN was accepte d",
NE_SSL_IDMISMATCH|NE_SSL_EXPIRED|NE_SSL_BA DCHAIN, NE_SSL_IDMISMATCH|NE_SSL_EXPIRED|NE_SSL_BA DCHAIN,
"certificate issued for a different hostna me")); "certificate issued for a different hostna me"));
ne_free(key); ne_free(key);
ne_free(ca); ne_free(ca);
return OK; return OK;
} }
#endif
static int fail_nul_san(void) static int fail_nul_san(void)
{ {
char *cert = SRCDIR("nulsan.pem"), *key = SRCDIR("nulsrv.key"), char *cert = SRCDIR("nulsan.pem"), *key = SRCDIR("nulsrv.key"),
*ca = SRCDIR("nulca.pem"); *ca = SRCDIR("nulca.pem");
CALL(fail_ssl_request_with_error2(cert, key, ca, CALL(fail_ssl_request_with_error2(cert, key, ca,
"www.bank.com", "localhost", "www.bank.com", "localhost",
"certificate with incorrect CN was accepte d", "certificate with incorrect CN was accepte d",
NE_SSL_IDMISMATCH|NE_SSL_EXPIRED|NE_SSL_BA DCHAIN, NE_SSL_IDMISMATCH|NE_SSL_EXPIRED|NE_SSL_BA DCHAIN,
"certificate issued for a different hostna me")); "certificate issued for a different hostna me"));
ne_free(cert); ne_free(cert);
ne_free(key); ne_free(key);
ne_free(ca); ne_free(ca);
return OK; return OK;
} }
#endif
/* Check that an expired certificate is flagged as such. */ /* Check that an expired certificate is flagged as such. */
static int fail_expired(void) static int fail_expired(void)
{ {
return fail_ssl_request_with_error("expired.cert", CA_CERT, "localhost", return fail_ssl_request_with_error("expired.cert", CA_CERT, "localhost",
"expired certificate was accepted", "expired certificate was accepted",
NE_SSL_EXPIRED, NE_SSL_EXPIRED,
"certificate has expired"); "certificate has expired");
} }
skipping to change at line 1932 skipping to change at line 1932
T(fail_host_ipaltname), T(fail_host_ipaltname),
T(fail_bad_ipaltname), T(fail_bad_ipaltname),
T(fail_bad_urialtname), T(fail_bad_urialtname),
T(fail_wildcard), T(fail_wildcard),
T(fail_wildcard_ip), T(fail_wildcard_ip),
T(fail_ca_notyetvalid), T(fail_ca_notyetvalid),
T(fail_ca_expired), T(fail_ca_expired),
T(nulcn_identity), T(nulcn_identity),
#ifndef HAVE_GNUTLS #ifndef HAVE_GNUTLS
/* test failing with GnuTLS since GnuTLS fails handshake? /* These certs were created with a SHA#1 digest so are rejected by GnuTLS. *
* fail_nul_cn (no error in verification callback; request rv 1 error string /
: Server certificate was missing commonName attribute in subject name)
*/
T(fail_nul_cn), T(fail_nul_cn),
#endif
T(fail_nul_san), T(fail_nul_san),
#endif
#if 0 #if 0
T(session_cache), T(session_cache),
#endif #endif
T(fail_tunnel), T(fail_tunnel),
T(proxy_tunnel), T(proxy_tunnel),
T(auth_proxy_tunnel), T(auth_proxy_tunnel),
T(auth_tunnel_creds), T(auth_tunnel_creds),
T(auth_tunnel_fail), T(auth_tunnel_fail),
 End of changes. 5 change blocks. 
6 lines changed or deleted 4 lines changed or added

Home  |  About  |  Features  |  All  |  Newest  |  Dox  |  Diffs  |  RSS Feeds  |  Screenshots  |  Comments  |  Imprint  |  Privacy  |  HTTP(S)