diff options
author | lloyd <[email protected]> | 2010-03-02 20:48:10 +0000 |
---|---|---|
committer | lloyd <[email protected]> | 2010-03-02 20:48:10 +0000 |
commit | e04cd85725b712c747ef5dbed2e94b7a7207ef22 (patch) | |
tree | a729ef8cac3392a681897c01332801280b765063 /checks | |
parent | a4578ff53ffa39b71032765cd02ebdd5ea6cb6eb (diff) |
Modify the ECDSA signature OIDs. Previously the ones using the BSI
scheme, which is supposed to use the IEEE 1363-style concatenation
format, was identified with the X9.62 OIDs, which are documented to
use the DER sequence format. Switch the BSI ones to use the OIDs
allocated for this purpose by BSI, and add the X9.62 ECDSA/SHA-1 OID
since that was missing.
Correct an ECDSA test that assumed the cert was identified with the BSI
OID, even though in fact the cert in question uses an X9.62-style format.
Diffstat (limited to 'checks')
-rw-r--r-- | checks/ecdsa.cpp | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/checks/ecdsa.cpp b/checks/ecdsa.cpp index 10c16c162..40f19ad1b 100644 --- a/checks/ecdsa.cpp +++ b/checks/ecdsa.cpp @@ -150,7 +150,7 @@ void test_decode_ecdsa_X509() std::cout << "." << std::flush; X509_Certificate cert(TEST_DATA_DIR "/CSCA.CSCA.csca-germany.1.crt"); - CHECK_MESSAGE(OIDS::lookup(cert.signature_algorithm().oid) == "ECDSA/EMSA1_BSI(SHA-224)", "error reading signature algorithm from x509 ecdsa certificate"); + CHECK_MESSAGE(OIDS::lookup(cert.signature_algorithm().oid) == "ECDSA/EMSA1(SHA-224)", "error reading signature algorithm from x509 ecdsa certificate"); CHECK_MESSAGE(to_hex(cert.serial_number()) == "01", "error reading serial from x509 ecdsa certificate"); CHECK_MESSAGE(to_hex(cert.authority_key_id()) == "0096452DE588F966C4CCDF161DD1F3F5341B71E7", "error reading authority key id from x509 ecdsa certificate"); |