Bug 1525191 part 5 - Fix test_x509.js for updated certificates. a=bustage-fix
authorJan de Mooij <jdemooij@mozilla.com>
Tue, 05 Feb 2019 11:14:32 +0100
changeset 456689 4c6fca8134ce582dca4e5e63737a8ba47a66a2c1
parent 456688 ad8e75714968dc0072801060e4774d8ccba7aa31
child 456690 aae349bf4115e8f5b3fadb6e88b1164a39cb8221
push id111692
push userrmaries@mozilla.com
push dateTue, 05 Feb 2019 10:27:46 +0000
treeherdermozilla-inbound@2c1f0275ef80 [default view] [failures only]
perfherder[talos] [build metrics] [platform microbench] (compared to previous push)
reviewersbustage-fix
bugs1525191
milestone67.0a1
first release with
nightly linux32
nightly linux64
nightly mac
nightly win32
nightly win64
last release without
nightly linux32
nightly linux64
nightly mac
nightly win32
nightly win64
Bug 1525191 part 5 - Fix test_x509.js for updated certificates. a=bustage-fix
security/manager/ssl/tests/unit/test_x509.js
--- a/security/manager/ssl/tests/unit/test_x509.js
+++ b/security/manager/ssl/tests/unit/test_x509.js
@@ -25,18 +25,18 @@ function run_test() {
   let certificate = new X509.Certificate();
   certificate.parse(readPEMToBytes("bad_certs/default-ee.pem"));
 
   equal(certificate.tbsCertificate.version, 3,
         "default-ee.pem should be x509v3");
 
   // serialNumber
   deepEqual(certificate.tbsCertificate.serialNumber,
-            [ 0x59, 0xb5, 0x8b, 0x4f, 0x02, 0xc1, 0xbd, 0xfc, 0x1c, 0xa2, 0x25,
-              0x3b, 0x23, 0xc9, 0x43, 0xcf, 0xdb, 0x27, 0x7d, 0x48 ],
+            [ 0x0d, 0x4a, 0x3f, 0xf4, 0x6d, 0x2b, 0xcf, 0xb7, 0xc9, 0x89, 0x64,
+              0xf0, 0xd2, 0x16, 0x3a, 0x4c, 0x8c, 0x8f, 0x45, 0x22 ],
             "default-ee.pem should have expected serialNumber");
 
   deepEqual(certificate.tbsCertificate.signature.algorithm._values,
             [ 1, 2, 840, 113549, 1, 1, 11 ], // sha256WithRSAEncryption
             "default-ee.pem should have sha256WithRSAEncryption signature");
   deepEqual(certificate.tbsCertificate.signature.parameters._contents, [],
             "default-ee.pem should have NULL parameters for signature");
 
@@ -44,20 +44,20 @@ function run_test() {
         "default-ee.pem should have one RDN in issuer");
   equal(certificate.tbsCertificate.issuer.rdns[0].avas.length, 1,
         "default-ee.pem should have one AVA in RDN in issuer");
   deepEqual(certificate.tbsCertificate.issuer.rdns[0].avas[0].value.value,
             stringToBytes("Test CA"),
             "default-ee.pem should have issuer 'Test CA'");
 
   equal(certificate.tbsCertificate.validity.notBefore.time.getTime(),
-        Date.parse("2016-11-27T00:00:00.000Z"),
+        Date.parse("2017-11-27T00:00:00.000Z"),
         "default-ee.pem should have the correct value for notBefore");
   equal(certificate.tbsCertificate.validity.notAfter.time.getTime(),
-        Date.parse("2019-02-05T00:00:00.000Z"),
+        Date.parse("2020-02-05T00:00:00.000Z"),
         "default-ee.pem should have the correct value for notAfter");
 
   equal(certificate.tbsCertificate.subject.rdns.length, 1,
         "default-ee.pem should have one RDN in subject");
   equal(certificate.tbsCertificate.subject.rdns[0].avas.length, 1,
         "default-ee.pem should have one AVA in RDN in subject");
   deepEqual(certificate.tbsCertificate.subject.rdns[0].avas[0].value.value,
             stringToBytes("Test End-entity"),