pike.git
/
lib
/
modules
/
Standards.pmod
/
testsuite.in
version
»
Context lines:
10
20
40
80
file
none
3
pike.git/lib/modules/Standards.pmod/testsuite.in:260:
]]) test_any_equal([[ object rsa = Crypto.RSA(); rsa->set_public_key(Gmp.mpz(10091719133288484609038014264477683817475840711323254929480453433408142690559279434827127011542800608968367637399409601909209406663819557863705925738798431), 65537); array attrs = ({ ([ "organizationName" : Standards.ASN1.Types.PrintableString("Test") ]), ([ "commonName" : Standards.ASN1.Types.PrintableString("*") ]), });
-
string c = Standards.X509.make_selfsigned_certificate(rsa, 3600*24*365, attrs, 0, 5);
+
string c = Standards.X509.make_selfsigned_certificate(rsa, 3600*24*365, attrs, 0,
0,
5);
object t = Standards.X509.decode_certificate(c); return ([ "version" : t->version, "serial":t->serial->digits(16), "algorithm":sprintf("%O",t->algorithm[0]), "issuer":t->issuer[0][0][1]->value, "subject":t->subject[0][0][1]->value, "extensions":t->extensions, "public_key":(int)t->public_key->rsa->public_key_equal(rsa) ]) ]],[[ ([ "version" : 1, "serial" : "5",
-
"algorithm": "Standards.ASN1.Types.Identifier(1.2.840.113549.1.1.
5
)",
+
"algorithm": "Standards.ASN1.Types.Identifier(1.2.840.113549.1.1.
11
)",
"issuer" : "Test", "subject" : "Test", "extensions" : 0, "public_key": 1, ]) ]]) test_any([[ Crypto.DSA dsa = Crypto.DSA(); dsa->generate_parameters(1024); dsa->generate_key();
-
string s=Standards.X509.make_selfsigned_certificate(dsa, 3600, ([ "commonName":"*" ]));
-
return
Standards.X509.verify_certificate(s, ([]))
&&
1;
+
foreach( ({ 0, Crypto.SHA1,
+
#if constant(Crypto.SHA224)
+
Crypto.SHA224,
+
#endif
+
Crypto.SHA256 }), object h)
+
{
+
string s=Standards.X509.make_selfsigned_certificate(dsa, 3600, ([ "commonName":"*" ])
, 0, h
);
+
if( !
Standards.X509.verify_certificate(s, ([]))
)
+
return h;
+
}
+
return
1;
]], 1) test_any([[ Crypto.RSA rsa = Crypto.RSA();
-
rsa->generate_key(
512
);
+
rsa->generate_key(
1024
);
-
string s=Standards.X509.make_selfsigned_certificate(rsa, 3600, ([ "commonName":"*" ]));
-
return
Standards.X509.verify_certificate(s, ([]))
&&
1;
+
foreach( ({ 0,
+
#if constant(Crypto.MD2)
+
Crypto.MD2,
+
#endif
+
Crypto.MD5,
+
Crypto.SHA1,
+
Crypto.SHA256,
+
#if constant(Crypto.SHA384)
+
Crypto.SHA384,
+
#endif
+
#if constant(Crypto.SHA512)
+
Crypto.SHA512,
+
#endif
+
}), object h)
+
{
+
string s=Standards.X509.make_selfsigned_certificate(rsa, 3600, ([ "commonName":"*" ])
, 0, h
);
+
if( !
Standards.X509.verify_certificate(s, ([]))
)
+
return h;
+
}
+
return
1;
]], 1) define(test_cert, ([[ test_true(Standards.X509.verify_certificate(Standards.PEM.Messages(#"$1")->parts->CERTIFICATE->body, ([]))) ]])) dnl openssl req -x509 -nodes -days 365 -subj "/CN=PikeCert" -md5 -newkey rsa:2048 -out certfile.cer test_cert(-----BEGIN CERTIFICATE----- MIIC+TCCAeGgAwIBAgIJAK9S+nXAkU+DMA0GCSqGSIb3DQEBBAUAMBMxETAPBgNV