X-Git-Url: https://code.wpia.club/?a=blobdiff_plain;f=tests%2Fclub%2Fwpia%2Fgigi%2Fpages%2Fmain%2FKeyCompromiseTest.java;h=89180e866daaba388ac1967f707c35361d5c5188;hb=87bf6551ebd440eeb363437f0a71345cd9d81192;hp=cf78945f700719915f196c2f5df68909686fbe35;hpb=7fa55e578ad55705309a1f91b168ab1282c99679;p=gigi.git diff --git a/tests/club/wpia/gigi/pages/main/KeyCompromiseTest.java b/tests/club/wpia/gigi/pages/main/KeyCompromiseTest.java index cf78945f..89180e86 100644 --- a/tests/club/wpia/gigi/pages/main/KeyCompromiseTest.java +++ b/tests/club/wpia/gigi/pages/main/KeyCompromiseTest.java @@ -79,7 +79,7 @@ public class KeyCompromiseTest extends ClientTest { KeyPair kp = generateKeypair(); priv = kp.getPrivate(); String csr = generatePEMCSR(kp, "CN=test"); - CertificateRequest cr = new CertificateRequest(new AuthorizationContext(u, u), csr); + CertificateRequest cr = new CertificateRequest(new AuthorizationContext(u, u, false), csr); cr.update(CertificateRequest.DEFAULT_CN, Digest.SHA512.toString(), "client", null, null, "email:" + email + "\n"); cert = cr.draft(); Job j = cert.issue(null, "2y", u); @@ -96,8 +96,8 @@ public class KeyCompromiseTest extends ClientTest { params("cert=%cert&priv=%priv", null),// cert+key params("serial=%serial&signature=%signature", null), // Zero serial - params("serial=0000&priv=%priv", NOT_FOUND), - params("serial=0lkd&priv=%priv", NOT_FOUND), + params("serial=0000&priv=%priv", "Malformed serial"), + params("serial=0lkd&priv=%priv", "Malformed serial"), // tampered cert params("cert=%tamperedCert&priv=%priv", "not be parsed"), params("cert=%cert&priv=%tamperedPriv", "Private Key is malformed"),