mirror of
https://github.com/ruby/ruby.git
synced 2022-11-09 12:17:21 -05:00
* ext/openssl/extconf.rb: check for X509V3_EXT_nconf_nid.
* ext/openssl/ossl_x509ext.c (MakeX509ExtFactory): should use OPENSSL_malloc to allocate X509V3_CTX. * ext/openssl/ossl_x509ext.c (ossl_x509extfactory_create_ext): use X509V3_EXT_nconf_nid to avoid SEGV (and to build extensions which values are placed in separate section). * test/openssl/test_x509ext.rb: new file. git-svn-id: svn+ssh://ci.ruby-lang.org/ruby/branches/ruby_1_8@9592 b2dd03c8-39d4-4d8f-98ff-823fe69b080e
This commit is contained in:
parent
d927ff1210
commit
b54ab5610b
4 changed files with 108 additions and 4 deletions
74
test/openssl/test_x509ext.rb
Normal file
74
test/openssl/test_x509ext.rb
Normal file
|
|
@ -0,0 +1,74 @@
|
|||
begin
|
||||
require "openssl"
|
||||
require File.join(File.dirname(__FILE__), "utils.rb")
|
||||
rescue LoadError
|
||||
end
|
||||
require "test/unit"
|
||||
|
||||
if defined?(OpenSSL)
|
||||
|
||||
class OpenSSL::TestX509Extension < Test::Unit::TestCase
|
||||
def setup
|
||||
@basic_constraints_value = OpenSSL::ASN1::Sequence([
|
||||
OpenSSL::ASN1::Boolean(true), # CA
|
||||
OpenSSL::ASN1::Integer(2) # pathlen
|
||||
])
|
||||
@basic_constraints = OpenSSL::ASN1::Sequence([
|
||||
OpenSSL::ASN1::ObjectId("basicConstraints"),
|
||||
OpenSSL::ASN1::Boolean(true),
|
||||
OpenSSL::ASN1::OctetString(@basic_constraints_value.to_der),
|
||||
])
|
||||
end
|
||||
|
||||
def teardown
|
||||
end
|
||||
|
||||
def test_new
|
||||
ext = OpenSSL::X509::Extension.new(@basic_constraints.to_der)
|
||||
assert_equal("basicConstraints", ext.oid)
|
||||
assert_equal(true, ext.critical?)
|
||||
assert_equal("CA:TRUE, pathlen:2", ext.value)
|
||||
|
||||
ext = OpenSSL::X509::Extension.new("2.5.29.19",
|
||||
@basic_constraints_value.to_der, true)
|
||||
assert_equal(@basic_constraints.to_der, ext.to_der)
|
||||
end
|
||||
|
||||
def test_create_by_factory
|
||||
ef = OpenSSL::X509::ExtensionFactory.new
|
||||
|
||||
bc = ef.create_extension("basicConstraints", "critical, CA:TRUE, pathlen:2")
|
||||
assert_equal(@basic_constraints.to_der, bc.to_der)
|
||||
|
||||
bc = ef.create_extension("basicConstraints", "CA:TRUE, pathlen:2", true)
|
||||
assert_equal(@basic_constraints.to_der, bc.to_der)
|
||||
|
||||
begin
|
||||
ef.config = OpenSSL::Config.parse(<<-_end_of_cnf_)
|
||||
[crlDistPts]
|
||||
URI.1 = http://www.example.com/crl
|
||||
URI.2 = ldap://ldap.example.com/cn=ca?certificateRevocationList;binary
|
||||
_end_of_cnf_
|
||||
rescue NotImplementedError
|
||||
return
|
||||
end
|
||||
|
||||
cdp = ef.create_extension("crlDistributionPoints", "@crlDistPts")
|
||||
assert_equal(false, cdp.critical?)
|
||||
assert_equal("crlDistributionPoints", cdp.oid)
|
||||
assert_match(%{URI:http://www\.example\.com/crl}, cdp.value)
|
||||
assert_match(
|
||||
%r{URI:ldap://ldap\.example\.com/cn=ca\?certificateRevocationList;binary},
|
||||
cdp.value)
|
||||
|
||||
cdp = ef.create_extension("crlDistributionPoints", "critical, @crlDistPts")
|
||||
assert_equal(true, cdp.critical?)
|
||||
assert_equal("crlDistributionPoints", cdp.oid)
|
||||
assert_match(%{URI:http://www.example.com/crl}, cdp.value)
|
||||
assert_match(
|
||||
%r{URI:ldap://ldap.example.com/cn=ca\?certificateRevocationList;binary},
|
||||
cdp.value)
|
||||
end
|
||||
end
|
||||
|
||||
end
|
||||
Loading…
Add table
Add a link
Reference in a new issue