From: Richard Levitte Date: Thu, 16 Feb 2017 20:07:33 +0000 (+0100) Subject: Add a test of the X509_STORE / X509_LOOKUP API X-Git-Tag: OpenSSL_1_1_1-pre1~2371 X-Git-Url: https://git.openssl.org/?p=openssl.git;a=commitdiff_plain;h=bb0f7eca75b8da1538c08c1f5be1bb7ea8f40638 Add a test of the X509_STORE / X509_LOOKUP API Fortunately, "openssl verify" makes good use of that API Reviewed-by: Rich Salz (Merged from https://github.com/openssl/openssl/pull/2652) --- diff --git a/test/recipes/60-test_x509_store.t b/test/recipes/60-test_x509_store.t new file mode 100644 index 0000000000..b084ed956f --- /dev/null +++ b/test/recipes/60-test_x509_store.t @@ -0,0 +1,48 @@ +#! /usr/bin/env perl +# Copyright 2015-2016 The OpenSSL Project Authors. All Rights Reserved. +# +# Licensed under the OpenSSL license (the "License"). You may not use +# this file except in compliance with the License. You can obtain a copy +# in the file LICENSE in the source distribution or at +# https://www.openssl.org/source/license.html + + +use strict; +use warnings; + +use File::Copy; +use File::Spec::Functions qw/:DEFAULT canonpath/; +use OpenSSL::Test qw/:DEFAULT srctop_file/; + +setup("test_x509_store"); + +# We use 'openssl verify' for these tests, as it contains everything +# we need to conduct these tests. The tests here are a subset of the +# ones found in 25-test_verify.t + +sub verify { + my ($cert, $purpose, $trustedpath, $untrusted, @opts) = @_; + my @args = qw(openssl verify -auth_level 1 -purpose); + my @path = qw(test certs); + push(@args, "$purpose", @opts); + push(@args, "-CApath", $trustedpath); + for (@$untrusted) { push(@args, "-untrusted", srctop_file(@path, "$_.pem")) } + push(@args, srctop_file(@path, "$cert.pem")); + run(app([@args])); +} + +plan tests => 3; + +indir "60-test_x509_store" => sub { + for (("root-cert")) { + copy(srctop_file("test", "certs", "$_.pem"), curdir()); + } + ok(run(app([qw(openssl rehash), curdir()])), "Rehashing"); + + # Canonical success + ok(verify("ee-cert", "sslserver", curdir(), ["ca-cert"], "-show_chain"), + "verify ee-cert"); + + # Failure because root cert not present in CApath + ok(!verify("ca-root2", "any", curdir(), [], "-show_chain")); +}, create => 1, cleanup => 1;