wolfSSL: Use LIBWOLFSSL_VERSION_HEX to decide whether or not to use WOLFSSL_X509_V_OK
[privoxy.git] / tests / cts / client-body-tagger / data / test7
1 <testcase>
2 <info>
3 <keywords>
4 HTTP
5 HTTP POST
6 client-body-tagger
7 </keywords>
8 </info>
9
10 <reply>
11 <data>
12 HTTP/1.1 200 OK
13 Connection: close
14 Content-Type: text/html
15 X-Connection: swsclose
16
17 Received your input.
18 </data>
19 </reply>
20
21 <client>
22 <server>
23 http
24 </server>
25 <name>
26 Two requests to the same URL. The second one is a POST request with an offending word but it's too large to buffer and tag so it gets to pass. (XXX: Privoxy could execute the tagger based on the data that fits into the buffer)
27 </name>
28 <features>
29 proxy
30 </features>
31 <command>
32 -s --write-out '%{stderr}%{response_code}\n' http://%HOSTIP:%HTTPPORT/%TESTNUMBER --next -d @log/post-data-%TESTNUMBER -s --write-out '%{stderr}%{response_code}\n' http://%HOSTIP:%HTTPPORT/%TESTNUMBER
33 </command>
34 <file name="log/post-data-%TESTNUMBER">
35 blafasel%repeat[20000 x padding]%
36 </file>
37 </client>
38
39 <verify>
40 <protocol nonewline="yes">
41 GET /%TESTNUMBER HTTP/1.1\r
42 Host: %HOSTIP:%HTTPPORT\r
43 User-Agent: curl/%VERSION\r
44 Accept: */*\r
45 Connection: close\r
46 \r
47 POST /%TESTNUMBER HTTP/1.1\r
48 Host: %HOSTIP:%HTTPPORT\r
49 User-Agent: curl/%VERSION\r
50 Accept: */*\r
51 Content-Length: 140008\r
52 Content-Type: application/x-www-form-urlencoded\r
53 Connection: close\r
54 \r
55 blafasel%repeat[20000 x padding]%
56 </protocol>
57 <stderr>
58 200
59 200
60 </stderr>
61
62 </verify>
63 </testcase>