pike.git / lib / modules / Standards.pmod / testsuite.in

version» Context lines:

pike.git/lib/modules/Standards.pmod/testsuite.in:260:   ]])   test_any_equal([[    object rsa = Crypto.RSA();    rsa->set_public_key(Gmp.mpz(10091719133288484609038014264477683817475840711323254929480453433408142690559279434827127011542800608968367637399409601909209406663819557863705925738798431), 65537);       array attrs = ({    ([ "organizationName" : Standards.ASN1.Types.PrintableString("Test") ]),    ([ "commonName" : Standards.ASN1.Types.PrintableString("*") ]),    });    -  string c = Standards.X509.make_selfsigned_certificate(rsa, 3600*24*365, attrs, 0, 5); +  string c = Standards.X509.make_selfsigned_certificate(rsa, 3600*24*365, attrs, 0, 0, 5);       object t = Standards.X509.decode_certificate(c);    return ([ "version" : t->version, "serial":t->serial->digits(16), "algorithm":sprintf("%O",t->algorithm[0]), "issuer":t->issuer[0][0][1]->value, "subject":t->subject[0][0][1]->value, "extensions":t->extensions, "public_key":(int)t->public_key->rsa->public_key_equal(rsa) ])   ]],[[ ([    "version" : 1,    "serial" : "5", -  "algorithm": "Standards.ASN1.Types.Identifier(1.2.840.113549.1.1.5)", +  "algorithm": "Standards.ASN1.Types.Identifier(1.2.840.113549.1.1.11)",    "issuer" : "Test",    "subject" : "Test",    "extensions" : 0,    "public_key": 1,   ]) ]])      test_any([[    Crypto.DSA dsa = Crypto.DSA();    dsa->generate_parameters(1024);    dsa->generate_key();    -  string s=Standards.X509.make_selfsigned_certificate(dsa, 3600, ([ "commonName":"*" ])); -  return Standards.X509.verify_certificate(s, ([])) && 1; +  foreach( ({ 0, Crypto.SHA1, + #if constant(Crypto.SHA224) +  Crypto.SHA224, + #endif +  Crypto.SHA256 }), object h) +  { +  string s=Standards.X509.make_selfsigned_certificate(dsa, 3600, ([ "commonName":"*" ]), 0, h); +  if( !Standards.X509.verify_certificate(s, ([])) ) +  return h; +  } +  return 1;   ]], 1)      test_any([[    Crypto.RSA rsa = Crypto.RSA(); -  rsa->generate_key(512); +  rsa->generate_key(1024);    -  string s=Standards.X509.make_selfsigned_certificate(rsa, 3600, ([ "commonName":"*" ])); -  return Standards.X509.verify_certificate(s, ([])) && 1; +  foreach( ({ 0, + #if constant(Crypto.MD2) +  Crypto.MD2, + #endif +  Crypto.MD5, +  Crypto.SHA1, +  Crypto.SHA256, + #if constant(Crypto.SHA384) +  Crypto.SHA384, + #endif + #if constant(Crypto.SHA512) +  Crypto.SHA512, + #endif +  }), object h) +  { +  string s=Standards.X509.make_selfsigned_certificate(rsa, 3600, ([ "commonName":"*" ]), 0, h); +  if( !Standards.X509.verify_certificate(s, ([])) ) +  return h; +  } +  return 1;   ]], 1)         define(test_cert, ([[    test_true(Standards.X509.verify_certificate(Standards.PEM.Messages(#"$1")->parts->CERTIFICATE->body, ([])))   ]]))      dnl openssl req -x509 -nodes -days 365 -subj "/CN=PikeCert" -md5 -newkey rsa:2048 -out certfile.cer   test_cert(-----BEGIN CERTIFICATE-----   MIIC+TCCAeGgAwIBAgIJAK9S+nXAkU+DMA0GCSqGSIb3DQEBBAUAMBMxETAPBgNV