curl-curl/tests/http/testenv
Stefan Eissing 692c7f133e
TLS: IP address verification, extend test
Change the test certificate to carry a altname 'dns:127.0.0.1' which
should *not* match in test_17_05_bad_ip_addr.

wolfSSL: since `wolfSSL_check_domain_name()` does not differentiate
between DNS and IP names, use if only for DNS names. For IP addresses,
get the peer certificate after the handshake and check that using
wolfSSL_X509_check_ip_asc().

Unfortunately, this succeeds where it should not, as wolfSSL internally
used the same check code for both cases. So, skip the test case until
wolfSSL fixes that.

Reported-by: Joshua Rogers
Closes #19252
2025-10-27 17:22:17 +01:00
..
mod_curltest mime: fix unpausing of readers 2025-10-21 16:30:47 +02:00
__init__.py pytest: add SOCKS tests and scoring 2025-07-23 18:12:31 +02:00
caddy.py openssl-quic: check results better 2025-09-25 14:07:56 +02:00
certs.py TLS: IP address verification, extend test 2025-10-27 17:22:17 +01:00
client.py tests: merge clients into libtests, drop duplicate code 2025-07-30 02:38:13 +02:00
curl.py scorecard: add perf support on linux 2025-10-14 16:24:35 +02:00
dante.py pytest: use dante-server in CI 2025-07-29 15:02:30 +02:00
env.py TLS: IP address verification, extend test 2025-10-27 17:22:17 +01:00
httpd.py mime: fix unpausing of readers 2025-10-21 16:30:47 +02:00
nghttpx.py ngtcp2: check error code on connect failure 2025-09-11 16:00:58 +02:00
ports.py pytest: bind to localhost 2025-09-10 00:55:07 +02:00
vsftpd.py connectdata: remove primary+secondary ip_quadruple 2025-07-30 10:56:19 +02:00
ws_echo_server.py tests: change Python code style to pass ruff checks 2024-10-04 14:02:05 -07:00