mirror of
https://github.com/openssl/openssl.git
synced 2024-12-21 06:09:35 +08:00
909f1a2e51
Reviewed-by: Matt Caswell <matt@openssl.org> (Merged from https://github.com/openssl/openssl/pull/7767)
54 lines
1.8 KiB
Perl
54 lines
1.8 KiB
Perl
#! /usr/bin/env perl
|
|
# Copyright 2015-2016 The OpenSSL Project Authors. All Rights Reserved.
|
|
#
|
|
# Licensed under the Apache License 2.0 (the "License"). You may not use
|
|
# this file except in compliance with the License. You can obtain a copy
|
|
# in the file LICENSE in the source distribution or at
|
|
# https://www.openssl.org/source/license.html
|
|
|
|
|
|
use strict;
|
|
use warnings;
|
|
|
|
use File::Copy;
|
|
use File::Spec::Functions qw/:DEFAULT canonpath/;
|
|
use OpenSSL::Test qw/:DEFAULT srctop_file/;
|
|
|
|
setup("test_x509_store");
|
|
|
|
#If "openssl rehash -help" fails it's most likely because we're on a platform
|
|
#that doesn't support the rehash command (e.g. Windows)
|
|
plan skip_all => "test_rehash is not available on this platform"
|
|
unless run(app(["openssl", "rehash", "-help"]));
|
|
|
|
# We use 'openssl verify' for these tests, as it contains everything
|
|
# we need to conduct these tests. The tests here are a subset of the
|
|
# ones found in 25-test_verify.t
|
|
|
|
sub verify {
|
|
my ($cert, $purpose, $trustedpath, $untrusted, @opts) = @_;
|
|
my @args = qw(openssl verify -auth_level 1 -purpose);
|
|
my @path = qw(test certs);
|
|
push(@args, "$purpose", @opts);
|
|
push(@args, "-CApath", $trustedpath);
|
|
for (@$untrusted) { push(@args, "-untrusted", srctop_file(@path, "$_.pem")) }
|
|
push(@args, srctop_file(@path, "$cert.pem"));
|
|
run(app([@args]));
|
|
}
|
|
|
|
plan tests => 3;
|
|
|
|
indir "60-test_x509_store" => sub {
|
|
for (("root-cert")) {
|
|
copy(srctop_file("test", "certs", "$_.pem"), curdir());
|
|
}
|
|
ok(run(app([qw(openssl rehash), curdir()])), "Rehashing");
|
|
|
|
# Canonical success
|
|
ok(verify("ee-cert", "sslserver", curdir(), ["ca-cert"], "-show_chain"),
|
|
"verify ee-cert");
|
|
|
|
# Failure because root cert not present in CApath
|
|
ok(!verify("ca-root2", "any", curdir(), [], "-show_chain"));
|
|
}, create => 1, cleanup => 1;
|