diff options
author | Andreas Steffen <andreas.steffen@strongswan.org> | 2006-07-03 06:27:45 +0000 |
---|---|---|
committer | Andreas Steffen <andreas.steffen@strongswan.org> | 2006-07-03 06:27:45 +0000 |
commit | 971218c3ae71713e4bcff6113331c98d6a05f898 (patch) | |
tree | e038fea582349b5160209b92b3314811b6140771 /src/charon/testing/parser_test.c | |
parent | 1d390631d7f6e8ec61b8daeafa5d3256b35feec1 (diff) | |
download | strongswan-971218c3ae71713e4bcff6113331c98d6a05f898.tar.bz2 strongswan-971218c3ae71713e4bcff6113331c98d6a05f898.tar.xz |
support of cert payloads
Diffstat (limited to 'src/charon/testing/parser_test.c')
-rw-r--r-- | src/charon/testing/parser_test.c | 6 |
1 files changed, 3 insertions, 3 deletions
diff --git a/src/charon/testing/parser_test.c b/src/charon/testing/parser_test.c index 87069cda0..66e65479b 100644 --- a/src/charon/testing/parser_test.c +++ b/src/charon/testing/parser_test.c @@ -727,7 +727,7 @@ void test_parser_with_cert_payload(protected_tester_t *tester) return; } result = cert_payload->get_data_clone(cert_payload); - tester->assert_true(tester,(cert_payload->get_cert_encoding(cert_payload) == DNS_SIGNED_KEY), "is DNS_SIGNED_KEY encoding"); + tester->assert_true(tester,(cert_payload->get_cert_encoding(cert_payload) == CERT_DNS_SIGNED_KEY), "is DNS_SIGNED_KEY encoding"); tester->assert_true(tester,(result.len == 12), "parsed data lenght"); tester->assert_false(tester,(memcmp(cert_bytes + 5, result.ptr, result.len)), "parsed data"); cert_payload->destroy(cert_payload); @@ -766,8 +766,8 @@ void test_parser_with_certreq_payload(protected_tester_t *tester) return; } result = certreq_payload->get_data_clone(certreq_payload); - tester->assert_true(tester,(certreq_payload->get_cert_encoding(certreq_payload) == DNS_SIGNED_KEY), "is DNS_SIGNED_KEY encoding"); - tester->assert_true(tester,(result.len == 12), "parsed data lenght"); + tester->assert_true(tester,(certreq_payload->get_cert_encoding(certreq_payload) == CERT_DNS_SIGNED_KEY), "is DNS_SIGNED_KEY encoding"); + tester->assert_true(tester,(result.len == 12), "parsed data length"); tester->assert_false(tester,(memcmp(certreq_bytes + 5, result.ptr, result.len)), "parsed data"); certreq_payload->destroy(certreq_payload); chunk_free(&result); |