X-Git-Url: https://code.wpia.club/?a=blobdiff_plain;f=tests%2Fclub%2Fwpia%2Fgigi%2Fpages%2Fmain%2FKeyCompromiseTest.java;h=89180e866daaba388ac1967f707c35361d5c5188;hb=47459b4c744dc5e3d7eda51e6af98aff09679505;hp=49ffd80128d268e648068dd078bcd4796a3daeac;hpb=a507c4de2568faaf53bb8d6e003ffbe1ced5d539;p=gigi.git diff --git a/tests/club/wpia/gigi/pages/main/KeyCompromiseTest.java b/tests/club/wpia/gigi/pages/main/KeyCompromiseTest.java index 49ffd801..89180e86 100644 --- a/tests/club/wpia/gigi/pages/main/KeyCompromiseTest.java +++ b/tests/club/wpia/gigi/pages/main/KeyCompromiseTest.java @@ -79,7 +79,7 @@ public class KeyCompromiseTest extends ClientTest { KeyPair kp = generateKeypair(); priv = kp.getPrivate(); String csr = generatePEMCSR(kp, "CN=test"); - CertificateRequest cr = new CertificateRequest(new AuthorizationContext(u, u), csr); + CertificateRequest cr = new CertificateRequest(new AuthorizationContext(u, u, false), csr); cr.update(CertificateRequest.DEFAULT_CN, Digest.SHA512.toString(), "client", null, null, "email:" + email + "\n"); cert = cr.draft(); Job j = cert.issue(null, "2y", u); @@ -96,18 +96,18 @@ public class KeyCompromiseTest extends ClientTest { params("cert=%cert&priv=%priv", null),// cert+key params("serial=%serial&signature=%signature", null), // Zero serial - params("serial=0000&priv=%priv", NOT_FOUND), - params("serial=0lkd&priv=%priv", NOT_FOUND), + params("serial=0000&priv=%priv", "Malformed serial"), + params("serial=0lkd&priv=%priv", "Malformed serial"), // tampered cert params("cert=%tamperedCert&priv=%priv", "not be parsed"), params("cert=%cert&priv=%tamperedPriv", "Private Key is malformed"), params("serial=1&priv=%priv", NOT_FOUND), params("serial=1%serial&priv=%priv", NOT_FOUND), // missing certificate identification - params("serial=&cert=&priv=%priv", "identification"), - params("cert=&priv=%priv", "identification"), - params("serial=&priv=%priv", "identification"), - params("priv=%priv", "identification"), + params("serial=&cert=&priv=%priv", "No information to identify"), + params("cert=&priv=%priv", "No information to identify"), + params("serial=&priv=%priv", "No information to identify"), + params("priv=%priv", "No information to identify"), // sign missing params("serial=%serial&priv=&signature=", "No verification"), params("serial=%serial&signature=", "No verification"), @@ -115,7 +115,7 @@ public class KeyCompromiseTest extends ClientTest { params("serial=%serial", "No verification"), params("cert=%cert&signature=%tamperedSignature", "Verification does not match"), - params("cert=-_&signature=%signature", "certificate could not be parsed"), + params("cert=-_&signature=%signature", "Certificate could not be parsed"), params("cert=%cert&signature=-_", "Signature is malformed"), params("cert=%cert&priv=-_", "Private Key is malformed"), };