X-Git-Url: https://git.saurik.com/apple/security.git/blobdiff_plain/6b200bc335dc93c5516ccb52f14bd896d8c7fad7..07691282a056c4efea71e1e505527601e8cc166b:/OSX/libsecurity_smime/regressions/cms-01-basic.c?ds=sidebyside diff --git a/OSX/libsecurity_smime/regressions/cms-01-basic.c b/OSX/libsecurity_smime/regressions/cms-01-basic.c index c1323698..da6677f2 100644 --- a/OSX/libsecurity_smime/regressions/cms-01-basic.c +++ b/OSX/libsecurity_smime/regressions/cms-01-basic.c @@ -46,6 +46,8 @@ #include #include +#include + #define TMP_KEYCHAIN_PATH "/tmp/cms_01_test.keychain" #pragma clang diagnostic push @@ -391,7 +393,7 @@ static void sign_tests(SecIdentityRef identity, bool isRSA) { /* Verifying with attributes goes through a different code path than verifying without, * so we need to test both. */ -#define kNumberVerifyTests 12 +#define kNumberVerifyTests 13 static void verify_tests(SecKeychainRef kc, bool isRsa) { /* no attributes */ is(verify_please(kc, (isRsa) ? rsa_md5 : ec_md5, @@ -419,6 +421,9 @@ static void verify_tests(SecKeychainRef kc, bool isRsa) { /***** Once more, with validation errors *****/ /* no attributes */ + is(verify_please(kc, (isRsa) ? rsa_sinfo_unknown_digest : ec_sinfo_unknown_digest, + (isRsa) ? sizeof(rsa_sinfo_unknown_digest) : sizeof(ec_sinfo_unknown_digest)), + errSecInvalidDigestAlgorithm, "Verify unknown digest OID in signer info"); is(invalidate_and_verify(kc, (isRsa) ? rsa_md5 : ec_md5, (isRsa) ? sizeof(rsa_md5) : sizeof(ec_md5)), SECFailure, "Verify invalid MD5, no attributes");