aboutsummaryrefslogtreecommitdiffstats
path: root/checks/ecdsa.cpp
diff options
context:
space:
mode:
authorlloyd <[email protected]>2010-03-02 20:48:10 +0000
committerlloyd <[email protected]>2010-03-02 20:48:10 +0000
commite04cd85725b712c747ef5dbed2e94b7a7207ef22 (patch)
treea729ef8cac3392a681897c01332801280b765063 /checks/ecdsa.cpp
parenta4578ff53ffa39b71032765cd02ebdd5ea6cb6eb (diff)
Modify the ECDSA signature OIDs. Previously the ones using the BSI
scheme, which is supposed to use the IEEE 1363-style concatenation format, was identified with the X9.62 OIDs, which are documented to use the DER sequence format. Switch the BSI ones to use the OIDs allocated for this purpose by BSI, and add the X9.62 ECDSA/SHA-1 OID since that was missing. Correct an ECDSA test that assumed the cert was identified with the BSI OID, even though in fact the cert in question uses an X9.62-style format.
Diffstat (limited to 'checks/ecdsa.cpp')
-rw-r--r--checks/ecdsa.cpp2
1 files changed, 1 insertions, 1 deletions
diff --git a/checks/ecdsa.cpp b/checks/ecdsa.cpp
index 10c16c162..40f19ad1b 100644
--- a/checks/ecdsa.cpp
+++ b/checks/ecdsa.cpp
@@ -150,7 +150,7 @@ void test_decode_ecdsa_X509()
std::cout << "." << std::flush;
X509_Certificate cert(TEST_DATA_DIR "/CSCA.CSCA.csca-germany.1.crt");
- CHECK_MESSAGE(OIDS::lookup(cert.signature_algorithm().oid) == "ECDSA/EMSA1_BSI(SHA-224)", "error reading signature algorithm from x509 ecdsa certificate");
+ CHECK_MESSAGE(OIDS::lookup(cert.signature_algorithm().oid) == "ECDSA/EMSA1(SHA-224)", "error reading signature algorithm from x509 ecdsa certificate");
CHECK_MESSAGE(to_hex(cert.serial_number()) == "01", "error reading serial from x509 ecdsa certificate");
CHECK_MESSAGE(to_hex(cert.authority_key_id()) == "0096452DE588F966C4CCDF161DD1F3F5341B71E7", "error reading authority key id from x509 ecdsa certificate");