From caee75d2c66221a5c519f881ba216af9bd240c35 Mon Sep 17 00:00:00 2001 From: Rob Percival Date: Thu, 10 Mar 2016 20:26:34 +0000 Subject: [PATCH] Basic test for "openssl req -precert" via apps/CA.pl TODO(robpercival): Should actually test that the output certificate contains the poison extension. Reviewed-by: Tim Hudson Reviewed-by: Rich Salz (Merged from https://github.com/openssl/openssl/pull/843) --- test/recipes/80-test_ca.t | 6 +++++- 1 file changed, 5 insertions(+), 1 deletion(-) diff --git a/test/recipes/80-test_ca.t b/test/recipes/80-test_ca.t index 28a090ea7d..4766b8280d 100644 --- a/test/recipes/80-test_ca.t +++ b/test/recipes/80-test_ca.t @@ -22,7 +22,7 @@ my $std_openssl_cnf = rmtree("demoCA", { safe => 0 }); -plan tests => 4; +plan tests => 5; SKIP: { $ENV{OPENSSL_CONFIG} = '-config "'.srctop_file("test", "CAss.cnf").'"'; skip "failed creating CA structure", 3 @@ -41,6 +41,10 @@ plan tests => 4; ok(run(perlapp(["CA.pl", "-verify", "newcert.pem"])), 'verifying new certificate'); + + $ENV{OPENSSL_CONFIG} = "-config ".srctop_file("test", "Uss.cnf"); + ok(run(perlapp(["CA.pl", "-newprecert"], stderr => undef)), + 'creating new pre-certificate'); } -- 2.25.1