wolfSSL: Use LIBWOLFSSL_VERSION_HEX to decide whether or not to use WOLFSSL_X509_V_OK
[privoxy.git] / tests / cts / client-body-filter-https / data / test13
1 <testcase>
2 <info>
3 <keywords>
4 HTTPS
5 HTTP POST
6 client-body-filter
7 </keywords>
8 </info>
9
10 <reply>
11 <data>
12 HTTP/1.1 200 OK
13 Connection: keep-alive
14 Content-Type: text/html
15 Content-Length: 21
16
17 Received your input.
18 </data>
19 <data1>
20 HTTP/1.1 200 OK
21 Connection: close
22 Content-Type: text/html
23 X-Connection: swsclose
24
25 Received your input.
26 </data1>
27 </reply>
28
29 <proxy-reply>
30 <data>
31 HTTP/1.1 200 Connection established\r
32 \r
33 HTTP/1.1 200 OK\r
34 Connection: keep-alive\r
35 Content-Type: text/html\r
36 Content-Length: 21\r
37 \r
38 Received your input.
39 </data>
40 <data1>
41 HTTP/1.1 200 OK\r
42 Connection: close\r
43 Content-Type: text/html\r
44 X-Connection: swsclose\r
45 \r
46 Received your input.
47 </data1>
48 </proxy-reply>
49
50 <client>
51 <server>
52 https
53 </server>
54 <name>
55 Modify parts of the client body of a request on a reused connection with client-body-filter{blafasel-to-bumfidel} (based on test 2)
56 </name>
57 <features>
58 proxy
59 </features>
60 <command>
61 --insecure https://%HOSTIP:%HTTPSPORT/%TESTNUMBER --next -d "foo blafasel bar" --insecure https://%HOSTIP:%HTTPSPORT/%TESTNUMBER
62 </command>
63 </client>
64
65 <verify>
66 <protocol nonewline="yes">
67 GET /%TESTNUMBER HTTP/1.1\r
68 Host: %HOSTIP:%HTTPSPORT\r
69 User-Agent: curl/%VERSION\r
70 Accept: */*\r
71 \r
72 POST /%TESTNUMBER HTTP/1.1\r
73 Host: %HOSTIP:%HTTPSPORT\r
74 User-Agent: curl/%VERSION\r
75 Accept: */*\r
76 Content-Length: 16\r
77 Content-Type: application/x-www-form-urlencoded\r
78 \r
79 foo bumfidel bar
80 </protocol>
81 </verify>
82 </testcase>