1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31
|
// Copyright 2021 Brian Smith.
//
// Permission to use, copy, modify, and/or distribute this software for any
// purpose with or without fee is hereby granted, provided that the above
// copyright notice and this permission notice appear in all copies.
//
// THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHORS DISCLAIM ALL WARRANTIES
// WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
// MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHORS BE LIABLE FOR
// ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
// WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
// ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
// OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
use pki_types::CertificateDer;
#[test]
fn cert_without_extensions_test() {
// Check the certificate is valid with
// `openssl x509 -in cert_without_extensions.der -inform DER -text -noout`
let ca = CertificateDer::from(&include_bytes!("cert_without_extensions.der")[..]);
assert!(webpki::EndEntityCert::try_from(&ca).is_ok());
}
#[test]
fn cert_with_empty_extensions_test() {
// Check the certificate is valid with
// `openssl x509 -in cert_with_empty_extensions.der -inform DER -text -noout`
let ca = CertificateDer::from(&include_bytes!("cert_with_empty_extensions.der")[..]);
assert!(webpki::EndEntityCert::try_from(&ca).is_ok());
}
|