Carlos Martín Nieto
2ac57aa89b
https: don't test that RC4 is invalid
...
None of our crypto backends actually reject RC4 as a cipher so don't
test for it and instead keep it as something we'd like to do.
2017-01-09 18:32:11 +00:00
Carlos Martín Nieto
3829ba2e71
http: correct the expected error for RC4
...
We must make sure that we're getting a certificate error from the
library so we know that we're testing the right thing.
2017-01-09 17:58:58 +00:00
Carlos Martín Nieto
98d66240ec
http: perform 'badssl' check also via certificate callback
...
Make sure that the callbacks do also get a 'valid' value of zero when
the certificate we're looking at is in valid and assert that within the
test.
2017-01-06 17:09:52 +00:00
Dirkjan Bussink
c577efbbb5
Use general cl_git_fail because the error is generic
2016-03-14 12:41:41 +00:00
Dirkjan Bussink
fa72d6daf8
Setup better defaults for OpenSSL ciphers
...
This ensures that when using OpenSSL a safe default set of ciphers
is selected. This is done so that the client communicates securely
and we don't accidentally enable unsafe ciphers like RC4, or even
worse some old export ciphers.
Implements the first part of https://github.com/libgit2/libgit2/issues/3682
2016-03-14 12:07:13 +00:00
Leo Yang
505e4531b7
Fix build for unit test
...
If none of GIT_OPENSSL, GIT_WINHTTP or GIT_SECURE_TRANSPORT
is defined we should also be able to build the unit test.
2015-11-02 16:19:25 -05:00
Carlos Martín Nieto
53a2870514
net: add tests against badssl.com
...
These provide bad X.509 certificates, which we should refuse to connect
to by default.
2015-09-27 22:56:25 +02:00