view ui/tests/downloadertest.h @ 359:f6ce186cebc2

If DO_RELEASE_BUILD is set use pubkey-release and test with it This currently fails because polarssl rejects keys with a public exponent larger then 64 bit. With the following patch all tests pass. But this currently awaits upstream comment. https://polarssl.org/discussions/bug-report-issues/rsa-keys-with-large-public-exponents-are-rejected --- rsa.c.orig 2014-04-10 17:22:32.727290031 +0200 +++ rsa.c 2014-04-10 17:22:38.847410225 +0200 @@ -154,7 +154,7 @@ return( POLARSSL_ERR_RSA_KEY_CHECK_FAILED ); if( mpi_msb( &ctx->E ) < 2 || - mpi_msb( &ctx->E ) > 64 ) + mpi_msb( &ctx->E ) > POLARSSL_MPI_MAX_BITS ) return( POLARSSL_ERR_RSA_KEY_CHECK_FAILED ); return( 0 );
author Andre Heinecke <andre.heinecke@intevation.de>
date Thu, 10 Apr 2014 17:50:44 +0200
parents c05e126b0b9e
children 17e1c8f37d72
line wrap: on
line source
#ifndef DOWNLOADERTEST_H
#define DOWNLOADERTEST_H

#include <QObject>
#include <QtTest>
#include <QProcess>
#include <QTemporaryDir>
#include <QSignalSpy>
#include "downloader.h"

class DownloaderTest: public QObject
{
    Q_OBJECT

    void startServer(QString additionalOptions = QString());

private:
    QProcess serverProc;
    QTemporaryDir serverConfigDir;
    QFileInfo garbageInfo;

public Q_SLOTS:
    void downloaderError(const QString &message, SSLConnection::ErrorCode error);

private Q_SLOTS:
    void initTestCase();
    void cleanupTestCase();
    void testNewList();
    void testNoConnection();
    void testOtherCertificate();
    void testNewSoftware();
};
#endif

http://wald.intevation.org/projects/trustbridge/