NetworkManager/libnm-core/tests/Makefile.am
Dan Winship 7c74e71e91 libnm-core: tweak crypto.c APIs
Update crypto_verify_private_key() and
crypto_verify_private_key_data() to indicate whether the key was
encrypted or not.

Rename crypto_decrypt_private_key() and
crypto_decrypt_private_key_data() to
crypto_decrypt_openssl_private_key*, since that's the only private key
format they deal with, and the old names made them sound more generic
than they were. Also, update the openssl private key parsing code to
recognize unencrypted private keys as well. (Previously we accepted
unencrypted PKCS#8 keys, but not unencrypted openssl-style keys.)
2014-11-21 08:46:07 -05:00

56 lines
1.3 KiB
Makefile

if ENABLE_TESTS
certsdir = $(srcdir)/certs
AM_CPPFLAGS = \
-I${top_srcdir}/include \
-I$(top_srcdir)/libnm-core \
-I$(top_builddir)/libnm-core \
-DNETWORKMANAGER_COMPILATION \
-DNM_VERSION_MAX_ALLOWED=NM_VERSION_NEXT_STABLE \
$(GLIB_CFLAGS) \
-DTEST_CERT_DIR=\"$(certsdir)\"
noinst_PROGRAMS = \
test-compare \
test-crypto \
test-general \
test-secrets \
test-setting-8021x \
test-setting-dcb \
test-settings-defaults
LDADD = \
$(top_builddir)/libnm-core/libnm-core.la \
$(GLIB_LIBS)
TESTS = $(noinst_PROGRAMS)
endif
# test-cert.p12 created with:
#
# openssl pkcs12 -export \
# -in test_key_and_cert.pem \
# -inkey test_key_and_cert.pem \
# -certfile test_ca_cert.pem \
# -name "test-pkcs12" \
# -out test-cert.p12
EXTRA_DIST = \
certs/test_ca_cert.pem \
certs/test_ca_cert.der \
certs/test_key_and_cert.pem \
certs/test-cert.p12 \
certs/test2_ca_cert.pem \
certs/test2_key_and_cert.pem \
certs/test2-cert.p12 \
certs/ca-no-ending-newline.pem \
certs/test-key-only.pem \
certs/test-key-only-decrypted.der \
certs/test-key-only-decrypted.pem \
certs/pkcs8-enc-key.pem \
certs/pkcs8-noenc-key.pem \
certs/pkcs8-decrypted.der \
certs/test-aes-key.pem