From 18bb2582c32f4373f7ed85894fb490f2733cb03b Mon Sep 17 00:00:00 2001 From: Stef Walter Date: Wed, 2 Jan 2013 16:06:19 +0100 Subject: Implement stapled certificate extensions internally * Use stapled certificate extensions to represent loaded trust policy * Build NSS trust objects from stapled certificate extensions * Add further attribute debugging for NSS trust objects * Use a custom certificate extension for the OpenSSL reject purpose data * Use SubjectKeyIdentifier for OpenSSL keyid data * Use ExtendedKeyUsage for OpenSSL trust purpose data * Implement simple way to handle binary DER OIDs, using the DER TLV length. DER OIDs are used in the CKA_OBJECT_ID value, and elsewhere. * Split out the building of NSS trust objects from the main parser --- trust/tests/test-data.c | 9 ++++++++- 1 file changed, 8 insertions(+), 1 deletion(-) (limited to 'trust/tests/test-data.c') diff --git a/trust/tests/test-data.c b/trust/tests/test-data.c index f95b89a..a3d5373 100644 --- a/trust/tests/test-data.c +++ b/trust/tests/test-data.c @@ -70,7 +70,7 @@ void test_check_cacert3_ca_msg (CuTest *cu, const char *file, int line, - CK_ATTRIBUTE_PTR attrs, + CK_ATTRIBUTE *attrs, const char *label) { CK_CERTIFICATE_TYPE x509 = CKC_X_509; @@ -132,3 +132,10 @@ test_check_attr_msg (CuTest *cu, CuFail_Line (cu, file, line, "attribute does not match", message); } } + +void +test_fail_attrs_match (CuTest *cu, + const char *file, + const char *line, + CK_ATTRIBUTE *expect, + CK_ATTRIBUTE *attrs); -- cgit v1.1