794e71959f4c07fda2aec46360ea580b80528245
[openssl.git] / test / recipes / 60-test_x509_check_cert_pkey.t
1 #! /usr/bin/env perl
2 # Copyright 2017 The OpenSSL Project Authors. All Rights Reserved.
3 #
4 # Licensed under the OpenSSL license (the "License").  You may not use
5 # this file except in compliance with the License.  You can obtain a copy
6 # in the file LICENSE in the source distribution or at
7 # https://www.openssl.org/source/license.html
8
9
10 use OpenSSL::Test qw/:DEFAULT srctop_file/;
11
12 setup("test_x509_check_cert_pkey");
13
14 plan tests => 6;
15
16 # rsa
17 ok(run(test(["x509_check_cert_pkey_test",
18              srctop_file("test", "certs", "servercert.pem"),
19              srctop_file("test", "certs", "serverkey.pem"), "cert", "ok"])));
20 # mismatched rsa
21 ok(run(test(["x509_check_cert_pkey_test",
22              srctop_file("test", "certs", "servercert.pem"),
23              srctop_file("test", "certs", "wrongkey.pem"), "cert", "failed"])));
24 # dsa
25 ok(run(test(["x509_check_cert_pkey_test",
26              srctop_file("test", "certs", "server-dsa-cert.pem"),
27              srctop_file("test", "certs", "server-dsa-key.pem"), "cert", "ok"])));
28 # ecc
29 ok(run(test(["x509_check_cert_pkey_test",
30              srctop_file("test", "certs", "server-ecdsa-cert.pem"),
31              srctop_file("test", "certs", "server-ecdsa-key.pem"), "cert", "ok"])));
32 # certificate request (rsa)
33 ok(run(test(["x509_check_cert_pkey_test",
34              srctop_file("test", "certs", "x509-check.csr"),
35              srctop_file("test", "certs", "x509-check-key.pem"), "req", "ok"])));
36 # mismatched certificate request (rsa)
37 ok(run(test(["x509_check_cert_pkey_test",
38              srctop_file("test", "certs", "x509-check.csr"),
39              srctop_file("test", "certs", "wrongkey.pem"), "req", "failed"])));