aboutsummaryrefslogtreecommitdiff
path: root/openssl/src
diff options
context:
space:
mode:
authorSteven Fackler <[email protected]>2016-08-07 22:40:51 -0700
committerSteven Fackler <[email protected]>2016-08-07 22:40:51 -0700
commit19689565360cc4bf54a1a083321d46871be0b1f5 (patch)
treed0afd40d1d9f9f780848775e2a70d7cdde9e71a4 /openssl/src
parentAdd RSA::generate (diff)
downloadrust-openssl-19689565360cc4bf54a1a083321d46871be0b1f5.tar.xz
rust-openssl-19689565360cc4bf54a1a083321d46871be0b1f5.zip
Restore disabled tests
Diffstat (limited to 'openssl/src')
-rw-r--r--openssl/src/x509/tests.rs27
1 files changed, 16 insertions, 11 deletions
diff --git a/openssl/src/x509/tests.rs b/openssl/src/x509/tests.rs
index aedcaf55..ba747c83 100644
--- a/openssl/src/x509/tests.rs
+++ b/openssl/src/x509/tests.rs
@@ -25,17 +25,23 @@ fn get_generator() -> X509Generator {
.add_extension(OtherStr("2.999.2".to_owned(), "ASN1:UTF8:example value".to_owned()))
}
-/*
+fn pkey() -> PKey {
+ let rsa = RSA::generate(512).unwrap();
+ let mut pkey = PKey::new().unwrap();
+ pkey.set_rsa(&rsa).unwrap();
+ pkey
+}
+
#[test]
fn test_cert_gen() {
- let (cert, pkey) = get_generator().generate().unwrap();
- cert.write_pem().unwrap();
- pkey.write_pem().unwrap();
+ let pkey = pkey();
+ let cert = get_generator().sign(&pkey).unwrap();
// FIXME: check data in result to be correct, needs implementation
// of X509 getters
- assert_eq!(pkey.save_pub(), cert.public_key().save_pub());
+ assert_eq!(pkey.public_key_to_pem().unwrap(),
+ cert.public_key().unwrap().public_key_to_pem().unwrap());
}
/// SubjectKeyIdentifier must be added before AuthorityKeyIdentifier or OpenSSL
@@ -43,10 +49,11 @@ fn test_cert_gen() {
/// for extensions is preserved when the cert is signed.
#[test]
fn test_cert_gen_extension_ordering() {
+ let pkey = pkey();
get_generator()
.add_extension(OtherNid(Nid::SubjectKeyIdentifier, "hash".to_owned()))
.add_extension(OtherNid(Nid::AuthorityKeyIdentifier, "keyid:always".to_owned()))
- .generate()
+ .sign(&pkey)
.expect("Failed to generate cert with order-dependent extensions");
}
@@ -54,21 +61,19 @@ fn test_cert_gen_extension_ordering() {
/// deterministic by reversing the order of extensions and asserting failure.
#[test]
fn test_cert_gen_extension_bad_ordering() {
+ let pkey = pkey();
let result = get_generator()
.add_extension(OtherNid(Nid::AuthorityKeyIdentifier,
"keyid:always".to_owned()))
.add_extension(OtherNid(Nid::SubjectKeyIdentifier, "hash".to_owned()))
- .generate();
+ .sign(&pkey);
assert!(result.is_err());
}
-*/
#[test]
fn test_req_gen() {
- let rsa = RSA::generate(512).unwrap();
- let mut pkey = PKey::new().unwrap();
- pkey.set_rsa(&rsa).unwrap();
+ let pkey = pkey();
let req = get_generator().request(&pkey).unwrap();
req.to_pem().unwrap();