]> www.wagner.pp.ru Git - openssl-gost/engine.git/blobdiff - tcl_tests/ca.try
tcl_tests: ca.try: Ignore openssl crl exit status for 'corrupted CRL' test
[openssl-gost/engine.git] / tcl_tests / ca.try
index 3c7b61e317b88854868782caf5620c40501759ed..7da25de2eae2691dcc10e72f944d38a65301d4d2 100644 (file)
@@ -61,9 +61,9 @@ test -skip {![file exists $userdir/broken.pem]} "Registering broken request at c
 test  "Revoking certificate" {
        set revoking_cert $::test::ca/newcerts/[string trim [getFile $::test::ca/serial.old]].pem
        append serial_list [regsub "serial=" [openssl "x509 -in $revoking_cert -noout -serial"] "    Serial Number: "]
-       grep "Data Base" [openssl "ca -crl_reason keyCompromize -crl_compromise [clock\
-       format [clock seconds]  -format %Y%m%d%H%M%SZ] -revoke $revoking_cert -config $::test::ca/ca.conf"]
-} 0 "Data Base Updated
+       string map {"Data Base" Database Updated updated} [ grep "Data" [openssl "ca -crl_reason keyCompromize -crl_compromise [clock\
+       format [clock seconds]  -format %Y%m%d%H%M%SZ] -revoke $revoking_cert -config $::test::ca/ca.conf"] ]
+} 0 "Database updated
 "
 test -createsfiles test.crl "Generating CRL" {
        openssl "ca -gencrl -config $::test::ca/ca.conf -out test.crl"
@@ -88,8 +88,7 @@ test -skip {![file exists test.crl]} "Verifying CRL OK" {
 test -skip {![file exists test.crl]} "Verifying corrupted CRL" {
        makeFile "badcrl.pem" [hackPem "\01\x1E" [getFile test.crl] "\01\0"]
        grep verify [openssl "crl -in badcrl.pem -noout -CAfile $::test::ca/cacert.pem"]
-} 0 "verify failure
-"
+} -1 "verify failure"
 
 test "Verifying CA certificate" {
        grep "(cacert.pem|error|OK)" [openssl "verify -CAfile $::test::ca/cacert.pem $::test::ca/cacert.pem"]