10->error );
$decoded = Crypt::PKCS10->new( $csr, PEMonly => 1, verifySignature => 0 );
isnt( $decoded, undef, 'load PEM from variable' ) or BAIL_OUT( Crypt::PKCS10->error );
isa_ok( $d
1), $extcsr, 'extracted PEM' );
ok( $decoded->csrRequest eq $extder, 'extracted DER' );
isnt( $decoded, undef, 'load PEM from variable' ) or BAIL_OUT( Crypt::PKCS10->error );
#is( $deco
r1.pem' );
$decoded = Crypt::PKCS10->new( $file, readFile => 1, verifySignature => 0 );
isnt( $decoded, undef, 'load PEM from filename' ) or BAIL_OUT( Crypt::PKCS10->error );
my $der =
'csr4.pem' ),
readFile => 1, escapeStrings => 1, PEMonly => 1 );
isnt( $decoded, undef, 'load PEM from file' ) or BAIL_OUT( Crypt::PKCS10->error );
is( scalar $decode
b30f79bd15d2172',
'ECDSA signature components' );
my $key = $decoded->subjectPublicKey(1);
isnt( $key = Crypt::PK::ECC->new( \$key ), undef, 'parse EC key' );
# Seems curve_name can be reported
'csr6.pem' ),
readFile => 1, PEMonly => 1, escapeStrings => 1 );
isnt( $decoded, undef, 'load PEM from file' ) or BAIL_OUT( Crypt::PKCS10->error );
is( $decoded->pkAl