]> git.ipfire.org Git - thirdparty/openssl.git/commitdiff
25-test_verify.t: Prevent expiration of test case 'Name constraints bad othername...
authorDr. David von Oheimb <David.von.Oheimb@siemens.com>
Mon, 7 Jun 2021 10:16:25 +0000 (12:16 +0200)
committerDr. David von Oheimb <dev@ddvo.net>
Wed, 9 Jun 2021 14:06:10 +0000 (16:06 +0200)
Reviewed-by: Tomas Mraz <tomas@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/15656)

test/recipes/25-test_verify.t

index 3ed408b7950788a968c2e5b55797e0fabc28d5fd..d42e685259ab8b785771316d9d82ad38c9f84376 100644 (file)
@@ -371,10 +371,11 @@ ok(!verify("badalt10-cert", "", ["root-cert"], ["ncca1-cert", "ncca3-cert"], ),
 
 #Check that we get the expected failure return code
 with({ exit_checker => sub { return shift == 2; } },
-   sub {
-      ok(verify("bad-othername-namec", "", ["bad-othername-namec-inter"], [], "-partial_chain"),
-         "Name constraints bad othername name constraint");
-   });
+     sub {
+         ok(verify("bad-othername-namec", "", ["bad-othername-namec-inter"], [],
+                   "-partial_chain", "-attime", "1623060000"),
+            "Name constraints bad othername name constraint");
+     });
 
 ok(verify("ee-pss-sha1-cert", "", ["root-cert"], ["ca-cert"], "-auth_level", "0"),
     "Accept PSS signature using SHA1 at auth level 0");