Changeset 6dab61d in mod_gnutls
- Timestamp:
- Jul 15, 2019, 1:02:42 PM (4 years ago)
- Branches:
- asyncio, master, proxy-ticket
- Children:
- fbef621
- Parents:
- b712429
- Location:
- test
- Files:
-
- 3 edited
- 1 moved
Legend:
- Unmodified
- Added
- Removed
-
test/Makefile.am
rb712429 r6dab61d 58 58 shared_identities = authority authority/client 59 59 pgp_identities = $(shared_identities) 60 x509_only_identities = authority/server authority/imposter rogueca rogueclient 60 x509_only_identities = authority/server authority/imposter rogueca \ 61 rogueca/rogueclient 61 62 if ENABLE_OCSP_TEST 62 63 x509_only_identities += authority/ocsp-responder … … 99 100 cert_templates = authority/template.in authority/client/template.in \ 100 101 authority/imposter/template.in authority/ocsp-responder/template \ 101 rogueca/template rogueclient/template.in authority/server/template.in 102 authority/server/template.in \ 103 rogueca/template rogueca/rogueclient/template.in 102 104 generated_templates = authority/template authority/client/template \ 103 authority/imposter/template roguec lient/template \105 authority/imposter/template rogueca/rogueclient/template \ 104 106 authority/server/template 105 107 -
test/test_ca.mk
rb712429 r6dab61d 56 56 GNUPGHOME=authority/ $(GPG_FLOCK) gpg --output $@ --armor --export "$$(GNUPGHOME=$(dir $@) gpg --with-colons --list-secret-keys --fingerprint | grep ^fpr: | cut -f 10 -d :)" 57 57 58 # special cases for the authorities' root certs:58 # special rule for root CAs 59 59 root_cert_rule = certtool --outfile $@ --generate-self-signed --load-privkey $(dir $@)secret.key --template $< 60 60 authority/x509.pem rogueca/x509.pem: %/x509.pem: %/template %/secret.key 61 61 $(root_cert_rule) 62 62 63 # normal case: certificates signed by test CA 63 # generic rule for building non-root certificates, with the CA in the 64 # parent directory 64 65 cert_rule = certtool --outfile $@ --generate-certificate --load-ca-certificate $(dir $@)../x509.pem --load-ca-privkey $(dir $@)../secret.key --load-privkey $(dir $@)secret.key --template $< 65 66 67 # certificates signed by the test root CA 66 68 %/x509.pem: %/template %/secret.key authority/secret.key authority/x509.pem 67 69 $(cert_rule) 68 70 69 # error case: certificates signed by rogue CA70 rogue %/x509.pem: rogue%/template rogue%/secret.key rogueca/x509.pem71 certtool --outfile $@ --generate-certificate --load-ca-certificate rogueca/x509.pem --load-ca-privkey rogueca/secret.key --load-privkey $(dir $@)secret.key --template $<71 # certificates signed by rogue CA (for error cases) 72 rogueca/%/x509.pem: rogueca/%/template rogueca/%/secret.key rogueca/x509.pem 73 $(cert_rule) 72 74 73 75 %/softhsm.conf: %/secret.key -
test/tests/18_client_verification_wrong_cert/gnutls-cli.args
rb712429 r6dab61d 1 --x509certfile=roguec lient/x509.pem2 --x509keyfile=roguec lient/secret.key1 --x509certfile=rogueca/rogueclient/x509.pem 2 --x509keyfile=rogueca/rogueclient/secret.key 3 3 --x509cafile=authority/x509.pem 4 4 --priority=NORMAL
Note: See TracChangeset
for help on using the changeset viewer.