From: Dr. David von Oheimb Date: Mon, 7 Jun 2021 10:16:25 +0000 (+0200) Subject: 25-test_verify.t: Prevent expiration of test case 'Name constraints bad othername... X-Git-Tag: openssl-3.0.0-beta1~122 X-Git-Url: http://git.ipfire.org/cgi-bin/gitweb.cgi?a=commitdiff_plain;h=65a97b2c38c224f47e313868e01f58138d934478;p=thirdparty%2Fopenssl.git 25-test_verify.t: Prevent expiration of test case 'Name constraints bad othername name constraint' Reviewed-by: Tomas Mraz (Merged from https://github.com/openssl/openssl/pull/15656) --- diff --git a/test/recipes/25-test_verify.t b/test/recipes/25-test_verify.t index 3ed408b7950..d42e685259a 100644 --- a/test/recipes/25-test_verify.t +++ b/test/recipes/25-test_verify.t @@ -371,10 +371,11 @@ ok(!verify("badalt10-cert", "", ["root-cert"], ["ncca1-cert", "ncca3-cert"], ), #Check that we get the expected failure return code with({ exit_checker => sub { return shift == 2; } }, - sub { - ok(verify("bad-othername-namec", "", ["bad-othername-namec-inter"], [], "-partial_chain"), - "Name constraints bad othername name constraint"); - }); + sub { + ok(verify("bad-othername-namec", "", ["bad-othername-namec-inter"], [], + "-partial_chain", "-attime", "1623060000"), + "Name constraints bad othername name constraint"); + }); ok(verify("ee-pss-sha1-cert", "", ["root-cert"], ["ca-cert"], "-auth_level", "0"), "Accept PSS signature using SHA1 at auth level 0");