wolfSSL: Use LIBWOLFSSL_VERSION_HEX to decide whether or not to use WOLFSSL_X509_V_OK
[privoxy.git] / tests / cts / client-body-tagger-https / data / test8
1 <testcase>
2 <info>
3 <keywords>
4 HTTPS
5 HTTP POST
6 client-body-tagger
7 </keywords>
8 </info>
9
10 <reply>
11 <data>
12 HTTP/1.1 200 OK
13 Connection: close
14 Content-Type: text/html
15 X-Connection: swsclose
16
17 Received your input.
18 </data>
19 </reply>
20
21 <proxy-reply>
22 <data>
23 HTTP/1.1 200 Connection established\r
24 \r
25 HTTP/1.1 200 OK\r
26 Connection: close\r
27 Content-Type: text/html\r
28 X-Connection: swsclose\r
29 \r
30 Received your input.
31 </data>
32 </proxyreply>
33
34 <client>
35 <server>
36 https
37 </server>
38 <name>
39 Two requests to the same URL. The second one is a POST request with an offending word but it's chunk-encoded so it gets to pass.
40 </name>
41 <features>
42 proxy
43 </features>
44 <command>
45 -s --write-out '%{stderr}%{response_code}\n' --insecure https://%HOSTIP:%HTTPSPORT/%TESTNUMBER --next -H "Transfer-Encoding: chunked" -d "blafasel" -s --write-out '%{stderr}%{response_code}\n' --insecure https://%HOSTIP:%HTTPSPORT/%TESTNUMBER
46 </command>
47 </client>
48
49 <verify>
50 <protocol>
51 GET /%TESTNUMBER HTTP/1.1\r
52 Host: %HOSTIP:%HTTPSPORT\r
53 User-Agent: curl/%VERSION\r
54 Accept: */*\r
55 \r
56 POST /%TESTNUMBER HTTP/1.1\r
57 Host: %HOSTIP:%HTTPSPORT\r
58 User-Agent: curl/%VERSION\r
59 Accept: */*\r
60 Transfer-Encoding: chunked\r
61 Content-Type: application/x-www-form-urlencoded\r
62 \r
63 8\r
64 blafasel\r
65 0\r
66 \r
67 </protocol>
68 <stderr>
69 200
70 200
71 </stderr>
72
73 </verify>
74 </testcase>