Group
Extension

Matches 2

Crypt-PKCS10 ( M/MR/MRSCOTTY/Crypt-PKCS10-2.005.tar.gz, MRSCOTTY, 2023; MetaCPAN )
Crypt-PKCS10/t/02_base.t ( view source; MetaCPAN )
10->error );

    $decoded = Crypt::PKCS10->new( $csr, PEMonly => 1, verifySignature => 0 );

    isnt( $decoded, undef, 'load PEM from variable' ) or BAIL_OUT( Crypt::PKCS10->error );

    isa_ok( $d
1), $extcsr, 'extracted PEM' );

    ok( $decoded->csrRequest eq $extder, 'extracted DER' );

    isnt( $decoded, undef, 'load PEM from variable' ) or BAIL_OUT( Crypt::PKCS10->error );

    #is( $deco
r1.pem' );

    $decoded = Crypt::PKCS10->new( $file, readFile => 1, verifySignature => 0 );

    isnt( $decoded, undef, 'load PEM from filename' ) or BAIL_OUT( Crypt::PKCS10->error );

    my $der = 
Crypt-PKCS10 ( M/MR/MRSCOTTY/Crypt-PKCS10-2.005.tar.gz, MRSCOTTY, 2023; MetaCPAN )
Crypt-PKCS10/t/03_ecc.t ( view source; MetaCPAN )
 'csr4.pem' ),
                               readFile => 1, escapeStrings => 1, PEMonly => 1 );

isnt( $decoded, undef, 'load PEM from file' ) or BAIL_OUT( Crypt::PKCS10->error );

is( scalar $decode
b30f79bd15d2172',
    'ECDSA signature components' );


my $key = $decoded->subjectPublicKey(1);

isnt( $key = Crypt::PK::ECC->new( \$key ), undef, 'parse EC key' );
# Seems curve_name can be reported
 'csr6.pem' ),
                               readFile => 1, PEMonly => 1, escapeStrings => 1 );

isnt( $decoded, undef, 'load PEM from file' ) or BAIL_OUT( Crypt::PKCS10->error );

is( $decoded->pkAl

Powered by Groonga
Maintained by Kenichi Ishigaki <ishigaki@cpan.org>. If you find anything, submit it on GitHub.