aboutsummaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorBenoit Daloze <eregontp@gmail.com>2020-08-29 12:43:00 +0200
committerBenoit Daloze <eregontp@gmail.com>2020-08-29 12:43:00 +0200
commit86f113c9a67fb5d60d2b8847765f960abd94335f (patch)
tree7d8b7ec34b3b4ebad28668d5d20b49f078170982
parente0634311ff3bfbe69d253afd0e46746d5de64059 (diff)
downloadruby-openssl-86f113c9a67fb5d60d2b8847765f960abd94335f.tar.gz
Import ruby/ruby@3beecafc2cae86290a191c1e841be13f5b08795d
-rw-r--r--test/openssl/test_x509store.rb48
1 files changed, 25 insertions, 23 deletions
diff --git a/test/openssl/test_x509store.rb b/test/openssl/test_x509store.rb
index 7bbbc662..8fa52e5e 100644
--- a/test/openssl/test_x509store.rb
+++ b/test/openssl/test_x509store.rb
@@ -24,33 +24,35 @@ class OpenSSL::TestX509Store < OpenSSL::TestCase
cert2 = issue_cert(cert2_subj, cert2_key, 1, ca_exts, nil, nil)
# X509::Store#add_file reads concatenated PEM file
- tmpfile = Tempfile.open { |f| f << cert1.to_pem << cert2.to_pem; f }
- store = OpenSSL::X509::Store.new
- assert_equal false, store.verify(cert1)
- assert_equal false, store.verify(cert2)
- store.add_file(tmpfile.path)
- assert_equal true, store.verify(cert1)
- assert_equal true, store.verify(cert2)
-
- # X509::Store#add_path
- Dir.mktmpdir do |dir|
- hash1 = "%08x.%d" % [cert1_subj.hash, 0]
- File.write(File.join(dir, hash1), cert1.to_pem)
- store = OpenSSL::X509::Store.new
- store.add_path(dir)
+ Tempfile.open { |tmpfile|
+ tmpfile << cert1.to_pem << cert2.to_pem
+ tmpfile.close
- assert_equal true, store.verify(cert1)
+ store = OpenSSL::X509::Store.new
+ assert_equal false, store.verify(cert1)
assert_equal false, store.verify(cert2)
- end
+ store.add_file(tmpfile.path)
+ assert_equal true, store.verify(cert1)
+ assert_equal true, store.verify(cert2)
+
+ # X509::Store#add_path
+ Dir.mktmpdir do |dir|
+ hash1 = "%08x.%d" % [cert1_subj.hash, 0]
+ File.write(File.join(dir, hash1), cert1.to_pem)
+ store = OpenSSL::X509::Store.new
+ store.add_path(dir)
- # OpenSSL < 1.1.1 leaks an error on a duplicate certificate
- assert_nothing_raised { store.add_file(tmpfile.path) }
- assert_equal [], OpenSSL.errors
+ assert_equal true, store.verify(cert1)
+ assert_equal false, store.verify(cert2)
+ end
- # Non-String is given
- assert_raise(TypeError) { store.add_file(nil) }
- ensure
- tmpfile and tmpfile.close!
+ # OpenSSL < 1.1.1 leaks an error on a duplicate certificate
+ assert_nothing_raised { store.add_file(tmpfile.path) }
+ assert_equal [], OpenSSL.errors
+
+ # Non-String is given
+ assert_raise(TypeError) { store.add_file(nil) }
+ }
end
def test_verify_simple