summaryrefslogtreecommitdiff
path: root/src/tests/eet
diff options
context:
space:
mode:
authorCarsten Haitzler (Rasterman) <raster@rasterman.com>2014-11-28 17:54:39 +0900
committerCarsten Haitzler (Rasterman) <raster@rasterman.com>2014-11-28 17:56:27 +0900
commit8669ab8a98ac36db6c228bcc1bb4688c25d1dccc (patch)
tree72945d25d9cc69b094750107d0b1f3332619eea5 /src/tests/eet
parent151eeacec8c21f203e9d17718ac132d7f56e5155 (diff)
eet - add new api to verify eet file against stored cert
this api makes it far more obvious as to how to verify an eet file via the eet identify mechanisms that use x509 certificates to sign files. this is consistent with the api used to generate the key for sigining thus you can use the same certificate file to compare against for identify. @feature
Diffstat (limited to 'src/tests/eet')
-rw-r--r--src/tests/eet/eet_suite.c3
1 files changed, 3 insertions, 0 deletions
diff --git a/src/tests/eet/eet_suite.c b/src/tests/eet/eet_suite.c
index 7baabe653a..a028d64b90 100644
--- a/src/tests/eet/eet_suite.c
+++ b/src/tests/eet/eet_suite.c
@@ -1752,6 +1752,9 @@ START_TEST(eet_identity_simple)
1752 ef = eet_open(file, EET_FILE_MODE_READ); 1752 ef = eet_open(file, EET_FILE_MODE_READ);
1753 fail_if(!ef); 1753 fail_if(!ef);
1754 1754
1755 /* check that the certificates match */
1756 fail_if(!eet_identity_verify(ef, _cert_pem));
1757
1755 test = eet_read(ef, "keys/tests", &size); 1758 test = eet_read(ef, "keys/tests", &size);
1756 fail_if(!test); 1759 fail_if(!test);
1757 fail_if(size != (int)strlen(buffer) + 1); 1760 fail_if(size != (int)strlen(buffer) + 1);