diff options
| author | beck <> | 2023-04-27 13:26:57 +0000 |
|---|---|---|
| committer | beck <> | 2023-04-27 13:26:57 +0000 |
| commit | 4e5e98b34b1ce8cb8f681aa2a03006c82f8751fb (patch) | |
| tree | 78f938018c1e47ca95bb350ea8088a5f3cfd21b3 | |
| parent | 7b678b64a90656d9c04739ffc2f8c85b2ea90eb0 (diff) | |
| download | openbsd-4e5e98b34b1ce8cb8f681aa2a03006c82f8751fb.tar.gz openbsd-4e5e98b34b1ce8cb8f681aa2a03006c82f8751fb.tar.bz2 openbsd-4e5e98b34b1ce8cb8f681aa2a03006c82f8751fb.zip | |
correct test cases to add expected errors.
| -rw-r--r-- | src/regress/lib/libcrypto/x509/policy/policy.c | 32 |
1 files changed, 30 insertions, 2 deletions
diff --git a/src/regress/lib/libcrypto/x509/policy/policy.c b/src/regress/lib/libcrypto/x509/policy/policy.c index c2f96599e6..593f43bed1 100644 --- a/src/regress/lib/libcrypto/x509/policy/policy.c +++ b/src/regress/lib/libcrypto/x509/policy/policy.c | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $OpenBSD: policy.c,v 1.1 2023/04/27 12:23:31 beck Exp $ */ | 1 | /* $OpenBSD: policy.c,v 1.2 2023/04/27 13:26:57 beck Exp $ */ |
| 2 | /* | 2 | /* |
| 3 | * Copyright (c) 2020 Joel Sing <jsing@openbsd.org> | 3 | * Copyright (c) 2020 Joel Sing <jsing@openbsd.org> |
| 4 | * Copyright (c) 2020-2021 Bob Beck <beck@openbsd.org> | 4 | * Copyright (c) 2020-2021 Bob Beck <beck@openbsd.org> |
| @@ -309,8 +309,12 @@ struct verify_cert_test verify_cert_tests[] = { | |||
| 309 | .root_file = CERTSDIR "/" "policy_root.pem", | 309 | .root_file = CERTSDIR "/" "policy_root.pem", |
| 310 | .intermediate_file = CERTSDIR "/" "policy_intermediate.pem", | 310 | .intermediate_file = CERTSDIR "/" "policy_intermediate.pem", |
| 311 | .leaf_file = CERTSDIR "/" "policy_leaf.pem", | 311 | .leaf_file = CERTSDIR "/" "policy_leaf.pem", |
| 312 | .policy_oid_to_check = OID2, | 312 | .policy_oid_to_check = OID3, |
| 313 | .want_chains = 0, | 313 | .want_chains = 0, |
| 314 | .want_error = X509_V_ERR_NO_EXPLICIT_POLICY, | ||
| 315 | .want_error_depth = 0, | ||
| 316 | .want_legacy_error = X509_V_ERR_NO_EXPLICIT_POLICY, | ||
| 317 | .want_legacy_error_depth = 0, | ||
| 314 | }, | 318 | }, |
| 315 | { | 319 | { |
| 316 | .id = "1 and 2, in 1 and 2", | 320 | .id = "1 and 2, in 1 and 2", |
| @@ -338,6 +342,10 @@ struct verify_cert_test verify_cert_tests[] = { | |||
| 338 | .leaf_file = CERTSDIR "/" "policy_leaf.pem", | 342 | .leaf_file = CERTSDIR "/" "policy_leaf.pem", |
| 339 | .policy_oid_to_check = OID1, | 343 | .policy_oid_to_check = OID1, |
| 340 | .want_chains = 0, | 344 | .want_chains = 0, |
| 345 | .want_error = X509_V_ERR_INVALID_POLICY_EXTENSION, | ||
| 346 | .want_error_depth = 0, | ||
| 347 | .want_legacy_error = X509_V_ERR_INVALID_POLICY_EXTENSION, | ||
| 348 | .want_legacy_error_depth = 0, | ||
| 341 | }, | 349 | }, |
| 342 | { | 350 | { |
| 343 | .id = "invalid intermediate", | 351 | .id = "invalid intermediate", |
| @@ -345,6 +353,10 @@ struct verify_cert_test verify_cert_tests[] = { | |||
| 345 | .intermediate_file = CERTSDIR "/" "policy_intermediate_invalid.pem", | 353 | .intermediate_file = CERTSDIR "/" "policy_intermediate_invalid.pem", |
| 346 | .leaf_file = CERTSDIR "/" "policy_leaf.pem", | 354 | .leaf_file = CERTSDIR "/" "policy_leaf.pem", |
| 347 | .want_chains = 0, | 355 | .want_chains = 0, |
| 356 | .want_error = X509_V_ERR_INVALID_POLICY_EXTENSION, | ||
| 357 | .want_error_depth = 0, | ||
| 358 | .want_legacy_error = X509_V_ERR_INVALID_POLICY_EXTENSION, | ||
| 359 | .want_legacy_error_depth = 0, | ||
| 348 | }, | 360 | }, |
| 349 | { | 361 | { |
| 350 | .id = "1 in invalid policy in leaf", | 362 | .id = "1 in invalid policy in leaf", |
| @@ -353,6 +365,10 @@ struct verify_cert_test verify_cert_tests[] = { | |||
| 353 | .leaf_file = CERTSDIR "/" "policy_leaf_invalid.pem", | 365 | .leaf_file = CERTSDIR "/" "policy_leaf_invalid.pem", |
| 354 | .policy_oid_to_check = OID1, | 366 | .policy_oid_to_check = OID1, |
| 355 | .want_chains = 0, | 367 | .want_chains = 0, |
| 368 | .want_error = X509_V_ERR_INVALID_POLICY_EXTENSION, | ||
| 369 | .want_error_depth = 0, | ||
| 370 | .want_legacy_error = X509_V_ERR_INVALID_POLICY_EXTENSION, | ||
| 371 | .want_legacy_error_depth = 0, | ||
| 356 | }, | 372 | }, |
| 357 | { | 373 | { |
| 358 | .id = "invalid leaf", | 374 | .id = "invalid leaf", |
| @@ -360,6 +376,10 @@ struct verify_cert_test verify_cert_tests[] = { | |||
| 360 | .intermediate_file = CERTSDIR "/" "policy_intermediate.pem", | 376 | .intermediate_file = CERTSDIR "/" "policy_intermediate.pem", |
| 361 | .leaf_file = CERTSDIR "/" "policy_leaf_invalid.pem", | 377 | .leaf_file = CERTSDIR "/" "policy_leaf_invalid.pem", |
| 362 | .want_chains = 0, | 378 | .want_chains = 0, |
| 379 | .want_error = X509_V_ERR_INVALID_POLICY_EXTENSION, | ||
| 380 | .want_error_depth = 0, | ||
| 381 | .want_legacy_error = X509_V_ERR_INVALID_POLICY_EXTENSION, | ||
| 382 | .want_legacy_error_depth = 0, | ||
| 363 | }, | 383 | }, |
| 364 | // There is a duplicate policy in the leaf policy extension. | 384 | // There is a duplicate policy in the leaf policy extension. |
| 365 | { | 385 | { |
| @@ -369,6 +389,10 @@ struct verify_cert_test verify_cert_tests[] = { | |||
| 369 | .leaf_file = CERTSDIR "/" "policy_leaf_duplicate.pem", | 389 | .leaf_file = CERTSDIR "/" "policy_leaf_duplicate.pem", |
| 370 | .policy_oid_to_check = OID1, | 390 | .policy_oid_to_check = OID1, |
| 371 | .want_chains = 0, | 391 | .want_chains = 0, |
| 392 | .want_error = X509_V_ERR_INVALID_POLICY_EXTENSION, | ||
| 393 | .want_error_depth = 0, | ||
| 394 | .want_legacy_error = X509_V_ERR_INVALID_POLICY_EXTENSION, | ||
| 395 | .want_legacy_error_depth = 0, | ||
| 372 | }, | 396 | }, |
| 373 | // There is a duplicate policy in the intermediate policy extension. | 397 | // There is a duplicate policy in the intermediate policy extension. |
| 374 | { | 398 | { |
| @@ -378,6 +402,10 @@ struct verify_cert_test verify_cert_tests[] = { | |||
| 378 | .leaf_file = CERTSDIR "/" "policy_leaf.pem", | 402 | .leaf_file = CERTSDIR "/" "policy_leaf.pem", |
| 379 | .policy_oid_to_check = OID1, | 403 | .policy_oid_to_check = OID1, |
| 380 | .want_chains = 0, | 404 | .want_chains = 0, |
| 405 | .want_error = X509_V_ERR_INVALID_POLICY_EXTENSION, | ||
| 406 | .want_error_depth = 0, | ||
| 407 | .want_legacy_error = X509_V_ERR_INVALID_POLICY_EXTENSION, | ||
| 408 | .want_legacy_error_depth = 0, | ||
| 381 | }, | 409 | }, |
| 382 | }; | 410 | }; |
| 383 | 411 | ||
