xref: /aosp_15_r20/external/curl/tests/data/test308 (revision 6236dae45794135f37c4eb022389c904c8b0090d)
1*6236dae4SAndroid Build Coastguard Worker<testcase>
2*6236dae4SAndroid Build Coastguard Worker<info>
3*6236dae4SAndroid Build Coastguard Worker<keywords>
4*6236dae4SAndroid Build Coastguard WorkerHTTPS
5*6236dae4SAndroid Build Coastguard WorkerHTTP GET
6*6236dae4SAndroid Build Coastguard WorkerFAILURE
7*6236dae4SAndroid Build Coastguard Worker</keywords>
8*6236dae4SAndroid Build Coastguard Worker</info>
9*6236dae4SAndroid Build Coastguard Worker
10*6236dae4SAndroid Build Coastguard Worker#
11*6236dae4SAndroid Build Coastguard Worker# Client-side
12*6236dae4SAndroid Build Coastguard Worker<client>
13*6236dae4SAndroid Build Coastguard Worker<features>
14*6236dae4SAndroid Build Coastguard WorkerOpenSSL
15*6236dae4SAndroid Build Coastguard Worker!MultiSSL
16*6236dae4SAndroid Build Coastguard Worker</features>
17*6236dae4SAndroid Build Coastguard Worker<server>
18*6236dae4SAndroid Build Coastguard Workerhttps
19*6236dae4SAndroid Build Coastguard Worker</server>
20*6236dae4SAndroid Build Coastguard Worker<name>
21*6236dae4SAndroid Build Coastguard Workersimple HTTPS GET with invalid crypto engine
22*6236dae4SAndroid Build Coastguard Worker</name>
23*6236dae4SAndroid Build Coastguard Worker<command>
24*6236dae4SAndroid Build Coastguard Worker--engine invalid-crypto-engine-xyzzy -k https://%HOSTIP:%HTTPSPORT/%TESTNUMBER
25*6236dae4SAndroid Build Coastguard Worker</command>
26*6236dae4SAndroid Build Coastguard Worker</client>
27*6236dae4SAndroid Build Coastguard Worker
28*6236dae4SAndroid Build Coastguard Worker#
29*6236dae4SAndroid Build Coastguard Worker# Verify data after the test has been "shot"
30*6236dae4SAndroid Build Coastguard Worker<verify>
31*6236dae4SAndroid Build Coastguard Worker<errorcode>
32*6236dae4SAndroid Build Coastguard Worker53
33*6236dae4SAndroid Build Coastguard Worker</errorcode>
34*6236dae4SAndroid Build Coastguard Worker</verify>
35*6236dae4SAndroid Build Coastguard Worker</testcase>
36