提交 caee75d2 编写于 作者: R Rob Percival 提交者: Rich Salz

Basic test for "openssl req -precert" via apps/CA.pl

TODO(robpercival): Should actually test that the output certificate
contains the poison extension.
Reviewed-by: NTim Hudson <tjh@openssl.org>
Reviewed-by: NRich Salz <rsalz@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/843)
上级 b6486bf7
......@@ -22,7 +22,7 @@ my $std_openssl_cnf =
rmtree("demoCA", { safe => 0 });
plan tests => 4;
plan tests => 5;
SKIP: {
$ENV{OPENSSL_CONFIG} = '-config "'.srctop_file("test", "CAss.cnf").'"';
skip "failed creating CA structure", 3
......@@ -41,6 +41,10 @@ plan tests => 4;
ok(run(perlapp(["CA.pl", "-verify", "newcert.pem"])),
'verifying new certificate');
$ENV{OPENSSL_CONFIG} = "-config ".srctop_file("test", "Uss.cnf");
ok(run(perlapp(["CA.pl", "-newprecert"], stderr => undef)),
'creating new pre-certificate');
}
......
Markdown is supported
0% .
You are about to add 0 people to the discussion. Proceed with caution.
先完成此消息的编辑!
想要评论请 注册