diff options
| author | Benjamin Fry <[email protected]> | 2017-02-14 23:17:55 -0800 |
|---|---|---|
| committer | Benjamin Fry <[email protected]> | 2017-02-16 19:49:14 -0800 |
| commit | f8298882a41e0ca1f43d0fa7b475f302f4f20fca (patch) | |
| tree | 52b1554c5e9154b6bf841632eb4ec28a54acde64 /openssl/src/ssl/tests | |
| parent | Update 1.1.0 version (diff) | |
| download | rust-openssl-f8298882a41e0ca1f43d0fa7b475f302f4f20fca.tar.xz rust-openssl-f8298882a41e0ca1f43d0fa7b475f302f4f20fca.zip | |
add set_verify_cert_store() to ssl ctx
Diffstat (limited to 'openssl/src/ssl/tests')
| -rw-r--r-- | openssl/src/ssl/tests/mod.rs | 25 |
1 files changed, 25 insertions, 0 deletions
diff --git a/openssl/src/ssl/tests/mod.rs b/openssl/src/ssl/tests/mod.rs index 9c00e3ed..5b52a524 100644 --- a/openssl/src/ssl/tests/mod.rs +++ b/openssl/src/ssl/tests/mod.rs @@ -173,9 +173,15 @@ macro_rules! run_test( use ssl::SSL_VERIFY_PEER; use hash::MessageDigest; use x509::X509StoreContext; + #[cfg(any(all(feature = "v102", ossl102), all(feature = "v110", ossl110)))] + use x509::X509; + #[cfg(any(all(feature = "v102", ossl102), all(feature = "v110", ossl110)))] + use x509::store::X509StoreBuilder; use hex::FromHex; use foreign_types::ForeignTypeRef; use super::Server; + #[cfg(any(all(feature = "v102", ossl102), all(feature = "v110", ossl110)))] + use super::ROOT_CERT; #[test] fn sslv23() { @@ -221,6 +227,25 @@ run_test!(verify_trusted, |method, stream| { } }); +#[cfg(any(all(feature = "v102", ossl102), all(feature = "v110", ossl110)))] +run_test!(verify_trusted_with_set_cert, |method, stream| { + let x509 = X509::from_pem(ROOT_CERT).unwrap(); + let mut store = X509StoreBuilder::new().unwrap(); + store.add_cert(x509).unwrap(); + + let mut ctx = SslContext::builder(method).unwrap(); + ctx.set_verify(SSL_VERIFY_PEER); + + match ctx.set_verify_cert_store(store.build()) { + Ok(_) => {} + Err(err) => panic!("Unexpected error {:?}", err), + } + match Ssl::new(&ctx.build()).unwrap().connect(stream) { + Ok(_) => (), + Err(err) => panic!("Expected success, got {:?}", err), + } +}); + run_test!(verify_untrusted_callback_override_ok, |method, stream| { let mut ctx = SslContext::builder(method).unwrap(); ctx.set_verify_callback(SSL_VERIFY_PEER, |_, _| true); |