summaryrefslogtreecommitdiff
path: root/xmlsecurity
diff options
context:
space:
mode:
authorMike Kaganski <mike.kaganski@collabora.com>2022-03-01 11:50:29 +0300
committerMike Kaganski <mike.kaganski@collabora.com>2022-03-01 15:17:55 +0100
commit9888bb3dbb7ca558e0b440314bdb24bc60843bb0 (patch)
treea903a99f3e87084baf8082daa11c46163b21cdb5 /xmlsecurity
parentc8ce8980b35edf394d72848fa777de49c37513e1 (diff)
Fix the test failing when invalid certificate is in cert store
testSigningMultipleTimes_ODT was failing for me locally because of an expired certificate present in my store. Change-Id: Ie3dfb9ee1a110259ba747a03fc28c205df2eea91 Reviewed-on: https://gerrit.libreoffice.org/c/core/+/130743 Tested-by: Jenkins Reviewed-by: Mike Kaganski <mike.kaganski@collabora.com>
Diffstat (limited to 'xmlsecurity')
-rw-r--r--xmlsecurity/qa/unit/signing/signing.cxx2
1 files changed, 1 insertions, 1 deletions
diff --git a/xmlsecurity/qa/unit/signing/signing.cxx b/xmlsecurity/qa/unit/signing/signing.cxx
index 38643a0b3098..90d0edf8973e 100644
--- a/xmlsecurity/qa/unit/signing/signing.cxx
+++ b/xmlsecurity/qa/unit/signing/signing.cxx
@@ -159,7 +159,7 @@ SigningTest::getCertificate(DocumentSignatureManager& rSignatureManager,
{
auto pCertificate = dynamic_cast<xmlsecurity::Certificate*>(xCertificate.get());
CPPUNIT_ASSERT(pCertificate);
- if (pCertificate->getSignatureMethodAlgorithm() == eAlgo)
+ if (pCertificate->getSignatureMethodAlgorithm() == eAlgo && IsValid(xCertificate))
return xCertificate;
}
return uno::Reference<security::XCertificate>();