mirror of
https://github.com/moparisthebest/curl
synced 2024-11-13 21:15:08 -05:00
302d125b42
As has been outlined in the DEPRECATE.md document, the axTLS code has been disabled for 6 months and is hereby removed. Use a better supported TLS library! Assisted-by: Daniel Gustafsson Closes #3194
80 lines
3.0 KiB
C
80 lines
3.0 KiB
C
/***************************************************************************
|
|
* _ _ ____ _
|
|
* Project ___| | | | _ \| |
|
|
* / __| | | | |_) | |
|
|
* | (__| |_| | _ <| |___
|
|
* \___|\___/|_| \_\_____|
|
|
*
|
|
* Copyright (C) 1998 - 2018, Daniel Stenberg, <daniel@haxx.se>, et al.
|
|
*
|
|
* This software is licensed as described in the file COPYING, which
|
|
* you should have received as part of this distribution. The terms
|
|
* are also available at https://curl.haxx.se/docs/copyright.html.
|
|
*
|
|
* You may opt to use, copy, modify, merge, publish, distribute and/or sell
|
|
* copies of the Software, and permit persons to whom the Software is
|
|
* furnished to do so, under the terms of the COPYING file.
|
|
*
|
|
* This software is distributed on an "AS IS" basis, WITHOUT WARRANTY OF ANY
|
|
* KIND, either express or implied.
|
|
*
|
|
***************************************************************************/
|
|
#include "curlcheck.h"
|
|
|
|
#include "hostcheck.h" /* from the lib dir */
|
|
|
|
static CURLcode unit_setup(void)
|
|
{
|
|
return CURLE_OK;
|
|
}
|
|
|
|
static void unit_stop(void)
|
|
{
|
|
/* done before shutting down and exiting */
|
|
}
|
|
|
|
UNITTEST_START
|
|
|
|
/* only these backends define the tested functions */
|
|
#if defined(USE_OPENSSL) || defined(USE_GSKIT)
|
|
|
|
/* here you start doing things and checking that the results are good */
|
|
|
|
fail_unless(Curl_cert_hostcheck("www.example.com", "www.example.com"),
|
|
"good 1");
|
|
fail_unless(Curl_cert_hostcheck("*.example.com", "www.example.com"),
|
|
"good 2");
|
|
fail_unless(Curl_cert_hostcheck("xxx*.example.com", "xxxwww.example.com"),
|
|
"good 3");
|
|
fail_unless(Curl_cert_hostcheck("f*.example.com", "foo.example.com"),
|
|
"good 4");
|
|
fail_unless(Curl_cert_hostcheck("192.168.0.0", "192.168.0.0"),
|
|
"good 5");
|
|
|
|
fail_if(Curl_cert_hostcheck("xxx.example.com", "www.example.com"), "bad 1");
|
|
fail_if(Curl_cert_hostcheck("*", "www.example.com"), "bad 2");
|
|
fail_if(Curl_cert_hostcheck("*.*.com", "www.example.com"), "bad 3");
|
|
fail_if(Curl_cert_hostcheck("*.example.com", "baa.foo.example.com"), "bad 4");
|
|
fail_if(Curl_cert_hostcheck("f*.example.com", "baa.example.com"), "bad 5");
|
|
fail_if(Curl_cert_hostcheck("*.com", "example.com"), "bad 6");
|
|
fail_if(Curl_cert_hostcheck("*fail.com", "example.com"), "bad 7");
|
|
fail_if(Curl_cert_hostcheck("*.example.", "www.example."), "bad 8");
|
|
fail_if(Curl_cert_hostcheck("*.example.", "www.example"), "bad 9");
|
|
fail_if(Curl_cert_hostcheck("", "www"), "bad 10");
|
|
fail_if(Curl_cert_hostcheck("*", "www"), "bad 11");
|
|
fail_if(Curl_cert_hostcheck("*.168.0.0", "192.168.0.0"), "bad 12");
|
|
fail_if(Curl_cert_hostcheck("www.example.com", "192.168.0.0"), "bad 13");
|
|
|
|
#ifdef ENABLE_IPV6
|
|
fail_if(Curl_cert_hostcheck("*::3285:a9ff:fe46:b619",
|
|
"fe80::3285:a9ff:fe46:b619"), "bad 14");
|
|
fail_unless(Curl_cert_hostcheck("fe80::3285:a9ff:fe46:b619",
|
|
"fe80::3285:a9ff:fe46:b619"), "good 6");
|
|
#endif
|
|
|
|
#endif
|
|
|
|
/* you end the test code like this: */
|
|
|
|
UNITTEST_STOP
|