summaryrefslogtreecommitdiffstats
path: root/test/recipes
diff options
context:
space:
mode:
authorPaul Yang <paulyang.inf@gmail.com>2017-06-05 03:16:40 +0800
committerMatt Caswell <matt@openssl.org>2017-06-06 17:50:06 +0100
commit6d2523e0378edabad236bf052d465448dc387c9d (patch)
treeda3b17ce0b75018d655c516dcad7ac1de8da47b2 /test/recipes
parent7b9863392bff83e7822384a07a11a91feb4e003f (diff)
Add test cases for X509_check_private_key
To test X509_check_private_key and relatives. Add a CSR and corresponding RSA private key to test X509_REQ_check_private_key function. Signed-off-by: Paul Yang <paulyang.inf@gmail.com> Reviewed-by: Rich Salz <rsalz@openssl.org> Reviewed-by: Matt Caswell <matt@openssl.org> (Merged from https://github.com/openssl/openssl/pull/3614)
Diffstat (limited to 'test/recipes')
-rw-r--r--test/recipes/60-test_x509_check_cert_pkey.t39
1 files changed, 39 insertions, 0 deletions
diff --git a/test/recipes/60-test_x509_check_cert_pkey.t b/test/recipes/60-test_x509_check_cert_pkey.t
new file mode 100644
index 0000000000..794e71959f
--- /dev/null
+++ b/test/recipes/60-test_x509_check_cert_pkey.t
@@ -0,0 +1,39 @@
+#! /usr/bin/env perl
+# Copyright 2017 The OpenSSL Project Authors. All Rights Reserved.
+#
+# Licensed under the OpenSSL license (the "License"). You may not use
+# this file except in compliance with the License. You can obtain a copy
+# in the file LICENSE in the source distribution or at
+# https://www.openssl.org/source/license.html
+
+
+use OpenSSL::Test qw/:DEFAULT srctop_file/;
+
+setup("test_x509_check_cert_pkey");
+
+plan tests => 6;
+
+# rsa
+ok(run(test(["x509_check_cert_pkey_test",
+ srctop_file("test", "certs", "servercert.pem"),
+ srctop_file("test", "certs", "serverkey.pem"), "cert", "ok"])));
+# mismatched rsa
+ok(run(test(["x509_check_cert_pkey_test",
+ srctop_file("test", "certs", "servercert.pem"),
+ srctop_file("test", "certs", "wrongkey.pem"), "cert", "failed"])));
+# dsa
+ok(run(test(["x509_check_cert_pkey_test",
+ srctop_file("test", "certs", "server-dsa-cert.pem"),
+ srctop_file("test", "certs", "server-dsa-key.pem"), "cert", "ok"])));
+# ecc
+ok(run(test(["x509_check_cert_pkey_test",
+ srctop_file("test", "certs", "server-ecdsa-cert.pem"),
+ srctop_file("test", "certs", "server-ecdsa-key.pem"), "cert", "ok"])));
+# certificate request (rsa)
+ok(run(test(["x509_check_cert_pkey_test",
+ srctop_file("test", "certs", "x509-check.csr"),
+ srctop_file("test", "certs", "x509-check-key.pem"), "req", "ok"])));
+# mismatched certificate request (rsa)
+ok(run(test(["x509_check_cert_pkey_test",
+ srctop_file("test", "certs", "x509-check.csr"),
+ srctop_file("test", "certs", "wrongkey.pem"), "req", "failed"])));