| #! /usr/bin/env perl |
| # Copyright 2015-2016 The OpenSSL Project Authors. All Rights Reserved. |
| # |
| # Licensed under the Apache License 2.0 (the "License"). You may not use |
| # this file except in compliance with the License. You can obtain a copy |
| # in the file LICENSE in the source distribution or at |
| # https://www.openssl.org/source/license.html |
| |
| |
| use strict; |
| use warnings; |
| |
| use File::Copy; |
| use File::Spec::Functions qw/:DEFAULT canonpath/; |
| use OpenSSL::Test qw/:DEFAULT srctop_file/; |
| |
| setup("test_x509_store"); |
| |
| #If "openssl rehash -help" fails it's most likely because we're on a platform |
| #that doesn't support the rehash command (e.g. Windows) |
| plan skip_all => "test_rehash is not available on this platform" |
| unless run(app(["openssl", "rehash", "-help"])); |
| |
| # We use 'openssl verify' for these tests, as it contains everything |
| # we need to conduct these tests. The tests here are a subset of the |
| # ones found in 25-test_verify.t |
| |
| sub verify { |
| my ($cert, $purpose, $trustedpath, $untrusted, @opts) = @_; |
| my @args = qw(openssl verify -auth_level 1 -purpose); |
| my @path = qw(test certs); |
| push(@args, "$purpose", @opts); |
| push(@args, "-CApath", $trustedpath); |
| for (@$untrusted) { push(@args, "-untrusted", srctop_file(@path, "$_.pem")) } |
| push(@args, srctop_file(@path, "$cert.pem")); |
| run(app([@args])); |
| } |
| |
| plan tests => 3; |
| |
| indir "60-test_x509_store" => sub { |
| for (("root-cert")) { |
| copy(srctop_file("test", "certs", "$_.pem"), curdir()); |
| } |
| ok(run(app([qw(openssl rehash), curdir()])), "Rehashing"); |
| |
| # Canonical success |
| ok(verify("ee-cert", "sslserver", curdir(), ["ca-cert"], "-show_chain"), |
| "verify ee-cert"); |
| |
| # Failure because root cert not present in CApath |
| ok(!verify("ca-root2", "any", curdir(), [], "-show_chain")); |
| }, create => 1, cleanup => 1; |