diff options
author | emboss <emboss@b2dd03c8-39d4-4d8f-98ff-823fe69b080e> | 2011-06-22 08:41:08 +0000 |
---|---|---|
committer | emboss <emboss@b2dd03c8-39d4-4d8f-98ff-823fe69b080e> | 2011-06-22 08:41:08 +0000 |
commit | 26cb830df918614b4d734d187b7b65aba39f4d8e (patch) | |
tree | b3a8f857d6b6b7d0f00773c1520bbd615f056655 /test/openssl/test_pkey_rsa.rb | |
parent | 41c517d13230dd3edd302a87231ac467babf2f3c (diff) |
* ext/openssl/ossl.h: Introduced OSSL_BIO_reset macro for PEM/DER
fallback scenarios.
* ext/openssl/ossl_pkey_dsa.c
* ext/openssl/ossl_x509req.c
* ext/openssl/ossl_pkey_rsa.c
* ext/openssl/ossl_pkey_ec.c
* ext/openssl/ossl_ssl_session.c
* ext/openssl/ossl_x509crl.c
* ext/openssl/ossl_pkey.c
* ext/openssl/ossl_pkey_dh.c
* ext/openssl/ossl_x509cert.c
* ext/openssl/ossl_pkcs7.c: Use OSSL_BIO_reset.
* ext/openssl/ossl_ssl.c
* ext/openssl/ossl_cipher.c
* ext/openssl/ossl_pkey_ec.c
* ext/openssl/ossl_pkcs12.c
* ext/openssl/ossl_ssl_session.c: Replace rb_raise occurences by
ossl_raise. This automatically flushes OpenSSL's error queue.
* ext/openssl/ossl_pkcs7.c: Raise error if DER fallback for parsing
fails.
* test/openssl/test_pkey_ec.rb
* test/openssl/test_pkey_dsa.rb
* test/openssl/test_pkey_rsa.rb: Add assertions that OpenSSL.errors is
empty.
* test/openssl/test_pkey_rsa.rb: Remove initial OpenSSL.errors call in
test_new.
[ Ruby 1.9 - Bug #4885 ] [ruby-core:37134]
git-svn-id: svn+ssh://ci.ruby-lang.org/ruby/trunk@32199 b2dd03c8-39d4-4d8f-98ff-823fe69b080e
Diffstat (limited to 'test/openssl/test_pkey_rsa.rb')
-rw-r--r-- | test/openssl/test_pkey_rsa.rb | 11 |
1 files changed, 10 insertions, 1 deletions
diff --git a/test/openssl/test_pkey_rsa.rb b/test/openssl/test_pkey_rsa.rb index 3dfb08e7a0..5ba14229af 100644 --- a/test/openssl/test_pkey_rsa.rb +++ b/test/openssl/test_pkey_rsa.rb @@ -42,7 +42,6 @@ class OpenSSL::TestPKeyRSA < Test::Unit::TestCase end def test_new - OpenSSL.errors key = OpenSSL::PKey::RSA.new 512 pem = key.public_key.to_pem OpenSSL::PKey::RSA.new pem @@ -92,6 +91,7 @@ class OpenSSL::TestPKeyRSA < Test::Unit::TestCase assert_equal(nil, key.d) assert_equal(nil, key.p) assert_equal(nil, key.q) + assert_equal([], OpenSSL.errors) end def test_read_RSA_PUBKEY @@ -110,6 +110,7 @@ class OpenSSL::TestPKeyRSA < Test::Unit::TestCase assert_equal(nil, key.d) assert_equal(nil, key.p) assert_equal(nil, key.q) + assert_equal([], OpenSSL.errors) end def test_read_RSAPublicKey_pem @@ -129,6 +130,7 @@ AudJR1JobbIbDJrQu6AXnWh5k/YtAgMBAAE= assert_equal(nil, key.d) assert_equal(nil, key.p) assert_equal(nil, key.q) + assert_equal([], OpenSSL.errors) end def test_read_RSA_PUBKEY_pem @@ -149,6 +151,7 @@ AwEAAQ== assert_equal(nil, key.d) assert_equal(nil, key.p) assert_equal(nil, key.q) + assert_equal([], OpenSSL.errors) end def test_export_format_is_RSA_PUBKEY @@ -170,6 +173,7 @@ AwEAAQ== key = OpenSSL::PKey.read(der) assert(key.private?) assert_equal(der, key.to_der) + assert_equal([], OpenSSL.errors) end def test_read_private_key_pem @@ -177,6 +181,7 @@ AwEAAQ== key = OpenSSL::PKey.read(pem) assert(key.private?) assert_equal(pem, key.to_pem) + assert_equal([], OpenSSL.errors) end def test_read_public_key_der @@ -184,6 +189,7 @@ AwEAAQ== key = OpenSSL::PKey.read(der) assert(!key.private?) assert_equal(der, key.to_der) + assert_equal([], OpenSSL.errors) end def test_read_public_key_pem @@ -191,6 +197,7 @@ AwEAAQ== key = OpenSSL::PKey.read(pem) assert(!key.private?) assert_equal(pem, key.to_pem) + assert_equal([], OpenSSL.errors) end def test_read_private_key_pem_pw @@ -204,6 +211,7 @@ AwEAAQ== key = OpenSSL::PKey.read(pem, 'secret') assert(key.private?) #omit pem equality check, will be different due to cipher iv + assert_equal([], OpenSSL.errors) end private @@ -228,6 +236,7 @@ AwEAAQ== assert_equal(key.n, pub_key.value[0].value) assert_equal(OpenSSL::ASN1::INTEGER, pub_key.value[1].tag) assert_equal(key.e, pub_key.value[1].value) + assert_equal([], OpenSSL.errors) end end |