summaryrefslogtreecommitdiff
path: root/trust/tests/test-data.c
diff options
context:
space:
mode:
authorStef Walter <stefw@gnome.org>2013-01-02 16:06:19 +0100
committerStef Walter <stefw@gnome.org>2013-02-05 14:54:53 +0100
commit18bb2582c32f4373f7ed85894fb490f2733cb03b (patch)
tree3ecdcbc5451beb67e095ebaf0f233cdfd680ad94 /trust/tests/test-data.c
parent3b482acc47ba971406db526ebddf589ad1a8f16e (diff)
Implement stapled certificate extensions internally
* Use stapled certificate extensions to represent loaded trust policy * Build NSS trust objects from stapled certificate extensions * Add further attribute debugging for NSS trust objects * Use a custom certificate extension for the OpenSSL reject purpose data * Use SubjectKeyIdentifier for OpenSSL keyid data * Use ExtendedKeyUsage for OpenSSL trust purpose data * Implement simple way to handle binary DER OIDs, using the DER TLV length. DER OIDs are used in the CKA_OBJECT_ID value, and elsewhere. * Split out the building of NSS trust objects from the main parser
Diffstat (limited to 'trust/tests/test-data.c')
-rw-r--r--trust/tests/test-data.c9
1 files changed, 8 insertions, 1 deletions
diff --git a/trust/tests/test-data.c b/trust/tests/test-data.c
index f95b89a..a3d5373 100644
--- a/trust/tests/test-data.c
+++ b/trust/tests/test-data.c
@@ -70,7 +70,7 @@ void
test_check_cacert3_ca_msg (CuTest *cu,
const char *file,
int line,
- CK_ATTRIBUTE_PTR attrs,
+ CK_ATTRIBUTE *attrs,
const char *label)
{
CK_CERTIFICATE_TYPE x509 = CKC_X_509;
@@ -132,3 +132,10 @@ test_check_attr_msg (CuTest *cu,
CuFail_Line (cu, file, line, "attribute does not match", message);
}
}
+
+void
+test_fail_attrs_match (CuTest *cu,
+ const char *file,
+ const char *line,
+ CK_ATTRIBUTE *expect,
+ CK_ATTRIBUTE *attrs);