From da1f88bf53f1bb03cc9f198cfe71ef6157549eff Mon Sep 17 00:00:00 2001 From: "Dr. David von Oheimb" Date: Mon, 23 Dec 2019 20:23:24 +0100 Subject: [PATCH] Add four more verify test cases on the self-signed Ed25519 and self-issed X25519 certs Reviewed-by: Viktor Dukhovni (Merged from https://github.com/openssl/openssl/pull/10587) --- test/recipes/25-test_verify.t | 16 ++++++++++++++-- 1 file changed, 14 insertions(+), 2 deletions(-) diff --git a/test/recipes/25-test_verify.t b/test/recipes/25-test_verify.t index 39b95e1ca4..2997503355 100644 --- a/test/recipes/25-test_verify.t +++ b/test/recipes/25-test_verify.t @@ -27,7 +27,7 @@ sub verify { run(app([@args])); } -plan tests => 139; +plan tests => 143; # Canonical success ok(verify("ee-cert", "sslserver", ["root-cert"], ["ca-cert"]), @@ -369,13 +369,25 @@ ok(verify("root-cert-rsa2", "sslserver", ["root-cert-rsa2"], [], "-check_ss_sig" "Public Key Algorithm rsa instead of rsaEncryption"); SKIP: { - skip "Ed25519 is not supported by this OpenSSL build", 1 + skip "Ed25519 is not supported by this OpenSSL build", 5 if disabled("ec"); # ED25519 certificate from draft-ietf-curdle-pkix-04 ok(verify("ee-ed25519", "sslserver", ["root-ed25519"], []), "accept X25519 EE cert issued by trusted Ed25519 self-signed CA cert"); + ok(!verify("root-ed25519", "sslserver", ["ee-ed25519"], []), + "fail Ed25519 CA and EE certs swapped"); + + ok(verify("root-ed25519", "sslserver", ["root-ed25519"], []), + "accept trusted Ed25519 self-signed CA cert"); + + ok(!verify("ee-ed25519", "sslserver", ["ee-ed25519"], []), + "fail trusted Ed25519-signed self-issued X25519 cert"); + + ok(verify("ee-ed25519", "sslserver", ["ee-ed25519"], [], "-partial_chain"), + "accept last-resort direct leaf match Ed25519-signed self-issued cert"); + } SKIP: { -- 2.34.1