From 084d6a872ecf1830f9bdcca2768e140de6d90386 Mon Sep 17 00:00:00 2001 From: Akos Frohner Date: Thu, 28 Oct 2004 02:52:14 +0000 Subject: [PATCH] "ant stage" should work --- test/big-ca/big.cert | 30 +++++++++++++++++ test/big-ca/big.p12 | Bin 0 -> 4085 bytes test/big-ca/big.priv | 51 +++++++++++++++++++++++++++++ test/big-ca/ca_conf.cnf | 53 +++++++++++++++++++++++++++++++ test/big-ca/index.txt | 0 test/big-ca/req_conf.cnf | 31 ++++++++++++++++++ test/big-ca/req_proxy_conf.cnf | 33 +++++++++++++++++++ test/big-ca/req_proxy_proxy_conf.cnf | 35 ++++++++++++++++++++ test/big-ca/serial.txt | 1 + test/expired-ca/ca_conf.cnf | 53 +++++++++++++++++++++++++++++++ test/expired-ca/expired.cert | 14 ++++++++ test/expired-ca/expired.p12 | Bin 0 -> 1573 bytes test/expired-ca/expired.priv | 15 +++++++++ test/expired-ca/index.txt | 0 test/expired-ca/req_conf.cnf | 31 ++++++++++++++++++ test/expired-ca/req_proxy_conf.cnf | 33 +++++++++++++++++++ test/expired-ca/req_proxy_proxy_conf.cnf | 35 ++++++++++++++++++++ test/expired-ca/serial.txt | 1 + test/fake-ca/ca_conf.cnf | 53 +++++++++++++++++++++++++++++++ test/fake-ca/fake.cert | 14 ++++++++ test/fake-ca/fake.p12 | Bin 0 -> 1565 bytes test/fake-ca/fake.priv | 15 +++++++++ test/fake-ca/index.txt | 0 test/fake-ca/req_conf.cnf | 31 ++++++++++++++++++ test/fake-ca/req_proxy_conf.cnf | 33 +++++++++++++++++++ test/fake-ca/req_proxy_proxy_conf.cnf | 35 ++++++++++++++++++++ test/fake-ca/serial.txt | 1 + test/trusted-ca/ca_conf.cnf | 53 +++++++++++++++++++++++++++++++ test/trusted-ca/index.txt | 0 test/trusted-ca/req_conf.cnf | 31 ++++++++++++++++++ test/trusted-ca/req_proxy_conf.cnf | 33 +++++++++++++++++++ test/trusted-ca/req_proxy_proxy_conf.cnf | 35 ++++++++++++++++++++ test/trusted-ca/serial.txt | 1 + test/trusted-ca/trusted.cert | 14 ++++++++ test/trusted-ca/trusted.p12 | Bin 0 -> 1573 bytes test/trusted-ca/trusted.priv | 15 +++++++++ 36 files changed, 780 insertions(+) create mode 100644 test/big-ca/big.cert create mode 100644 test/big-ca/big.p12 create mode 100644 test/big-ca/big.priv create mode 100644 test/big-ca/ca_conf.cnf create mode 100644 test/big-ca/index.txt create mode 100644 test/big-ca/req_conf.cnf create mode 100644 test/big-ca/req_proxy_conf.cnf create mode 100644 test/big-ca/req_proxy_proxy_conf.cnf create mode 100644 test/big-ca/serial.txt create mode 100644 test/expired-ca/ca_conf.cnf create mode 100644 test/expired-ca/expired.cert create mode 100644 test/expired-ca/expired.p12 create mode 100644 test/expired-ca/expired.priv create mode 100644 test/expired-ca/index.txt create mode 100644 test/expired-ca/req_conf.cnf create mode 100644 test/expired-ca/req_proxy_conf.cnf create mode 100644 test/expired-ca/req_proxy_proxy_conf.cnf create mode 100644 test/expired-ca/serial.txt create mode 100644 test/fake-ca/ca_conf.cnf create mode 100644 test/fake-ca/fake.cert create mode 100644 test/fake-ca/fake.p12 create mode 100644 test/fake-ca/fake.priv create mode 100644 test/fake-ca/index.txt create mode 100644 test/fake-ca/req_conf.cnf create mode 100644 test/fake-ca/req_proxy_conf.cnf create mode 100644 test/fake-ca/req_proxy_proxy_conf.cnf create mode 100644 test/fake-ca/serial.txt create mode 100644 test/trusted-ca/ca_conf.cnf create mode 100644 test/trusted-ca/index.txt create mode 100644 test/trusted-ca/req_conf.cnf create mode 100644 test/trusted-ca/req_proxy_conf.cnf create mode 100644 test/trusted-ca/req_proxy_proxy_conf.cnf create mode 100644 test/trusted-ca/serial.txt create mode 100644 test/trusted-ca/trusted.cert create mode 100644 test/trusted-ca/trusted.p12 create mode 100644 test/trusted-ca/trusted.priv diff --git a/test/big-ca/big.cert b/test/big-ca/big.cert new file mode 100644 index 0000000..fd6966f --- /dev/null +++ b/test/big-ca/big.cert @@ -0,0 +1,30 @@ +-----BEGIN CERTIFICATE----- +MIIFJjCCAw4CAQAwDQYJKoZIhvcNAQEEBQAwWTELMAkGA1UEBhMCVUcxDzANBgNV +BAcTBlRyb3BpYzEPMA0GA1UEChMGVXRvcGlhMRMwEQYDVQQLEwpSZWxheGF0aW9u +MRMwEQYDVQQDEwp0aGUgYmlnIENBMB4XDTA0MTAyODAyNDkzM1oXDTMyMDMxNTAy +NDkzM1owWTELMAkGA1UEBhMCVUcxDzANBgNVBAcTBlRyb3BpYzEPMA0GA1UEChMG +VXRvcGlhMRMwEQYDVQQLEwpSZWxheGF0aW9uMRMwEQYDVQQDEwp0aGUgYmlnIENB +MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA0at2yBttsEeI260DTGQb +89KzAUaCBTlPTqlR586cDb7QwgSrKbf/1h43/c2DJv2YQ15dbnOEhom6ejWKNhBv +GHZArbj5Cq/x6U7VzJ9Pgzd8QbaZn0Q5evx78jzy2z5GpoG4/JMe1AN9aWqMh0hZ +lkrHYF94lauf2hshLz4XHzvn72VZxJAzUntQy+XI8tcEZp1A2j7+J7hhzaBncc7y +wu+vbN+7xhMdiina3IRuMBd5hoJJAnV9z8wh1oCtWcMFPSSHL0yMv6cNlt/Af7f4 +rSEHHvUDAUXhuVsVLFg1rOBoeiEhpECtXtS1jralkefPXdjPg1XP/TgFXeAlcANn +TdHVLLiFNh9Vw1RfU4OHEyvsIBAGltSAD5IEUZc7yr+M8CwX3jGDIGYgAhKZJ9qS +FaQV+S8qbf+mSvzyi9CeEKxFKyc3iS2rZ0UuuzhD6jo/Ql0wJ16abKJuYewhPYNG +/A43u719D9a1l2zNE+yLq+5OJgAOHauZQf57AFq0wImUi3l/tHhpLWZJk0pgthHg +6SpSyMYJ+tI3lk/NTy9BaSndTt334FtWIo9obLk8SNfzOxnkw2ehSixUSH1RpN9C +5VhpaWrxaoT2FUwsGWL94RWXpHQFfDaYEkYOFS+PYAOWsmEPFCdcqoUiGUAVnGNu +MpcZqGUKxTyiX7WjPU5woEkCAwEAATANBgkqhkiG9w0BAQQFAAOCAgEAD94Cf9Pi +HTCY/S+UBcNZCS4KYxhpnjPzSpG2E5HVysCOqJ+iEqQ3gW7avcvsya1tm9jTkBNN +RqpadY0WxIDV0ga+6768y17a34UnX9XGtq+Md5SkGiDA131pljO6dM1yECK/sngb +ilpWGrTFfWIzW8zme3y2zZtQHpXWdKc7qZrr4MTIPygScs87brOYMJT7lmGWnPPC +Pcqxwew3RijmYsIO/i2vzOs9xNMEBEpLbC46IE5F9xcG9IK/m+0MCXawZLVm/weh +G9o0QYcJFKZuCqgDhwncuq1fM1PGDB0Jkrz/uaQuVJMc2PCCdmi96svLtME2nbQZ +Rsal0AQ0EwJ5vj8rJOFeWnwOQ4MhIj+OODFoWA/oUh3po61MJeSyrRtgDCv1LMUR +VgD+uGsbLnWbtOMakSMzTRT4aH+KiV77vu/rYX3WClng7KdJzoygG9IXQWhSBV82 +RMAOjdWv2IYB0jVic8bT1FCIsoozEfsUu6bo9TH82sKOjkxGK3on/L32sRwyiFS9 +K33s76FbeNi54Rky1W935xTQD/PmkcmiKPQ4Sfz8rsd9SfxBPcWbyTbD72Uf7dU3 +VceUhLaE5SYdgHlVHUDWvF85Fe6MNXksLS2HWamcZX0I/nrTT2WFosKXbD7DCx53 +/owoCRg1v6ejCn2amEw3rKBywrOk7QRyTiY= +-----END CERTIFICATE----- diff --git a/test/big-ca/big.p12 b/test/big-ca/big.p12 new file mode 100644 index 0000000000000000000000000000000000000000..2c62e0c5b9888d79f6f031411653c36d3290952a GIT binary patch literal 4085 zcmVIhPz#@z=!{-A46pshti-S&H{MiC@)sVH?w_Gs`~ zt%FUq?>objGzBn%CvGesr}$QJxvG^TVDbo_%rV#R`Ej4{_A%(A`TPr#>?SX#boo#m|L1*}qO5f%T4O`LPkXw?5q$ zuKg5GfgaJigtplCQb&RJYx}j@C2NH4@gxwJh5rPaCVlO#7hOK|Itv@gVx&& zC&(Rww{ouyVak+Tz+_?t3m;Dt&Uo{@QUVl)i1f!G$?jl7V8@h6p6$V&wwEna?DXTi zm{s;g%3fad+#TN5O0*lqc+Q8mCZ9{64w{>N&l0_n%XR<1)#cXw?M**g0%2#q8rDyO zq57nNJ3SX%9@fBgfvPu7Z*rH@R|Y1Vaw(*aM=})0>Eim#0VNE!X_HC)Gef7fP(U$U z>Y|JB;!&50i3FQZtK%gocJ8u_AOlM!Oxeki2N)BSC_+>pgK_ldqOQ0!dW2@^V@~hL z;wQ{qG|lb9(%^d7QkP~lIgmp)WM;LUL!tET<&{IBc+Z?hy7HHpNeW`>8rKkHeZHNw z1q$vYDQXV7%I9A@j_PN7Io5|Ya^&+N$qNDCI&`dRBXNz1#>1csnX%GEv8iF&-q0U4 z30fIL9h{X{l7~}JmF8qx`lWIX5+~ipoLpP^I24{E5yoi;>gFF6CROmC`uN7Lq%66C z5O4}Bg4|^cznt5zE&3+`pVmXQF-YXAjWu-=%KEHXS+E+07)eviJPfZlCK&Q++rR!9 zMkXmFb`|t5SM5jHAhBvOO*)QWywx}-^Ek}8CLtVQr0cn zbE6kFuEwmJKp>+eFD>LVlD(Ms(TKZpRkv~ZQN(#Hn;hZ|y7Nfl(C_eB_I1cikY7_3 zZAKSDmKl8I6xjSp?0h?yom@CAo?^Rm;#1dk2OXR-ei-}2k1U8yF%iiz%7S=<=kv-5U`nG!PRo!W8Ubb}GGaZpTeKOu(fJ@iePbh=LZFT>+P;Xya> z<`q3;TUclBoZ1Kib1nL_GSq17t{R0Zb9-k~9S>W(mLj?DhBax&2(rtJb6Df5paB*X z2^x){j<*s_Xr=_$3qQZJlU2`yyZE`lB7VRKBi%o4e!LyS z34G^RCaHdzkEtU&!#&$8`n`UDtq25hX)b>XbZxhIFDQuFX zt?4G&A{@aISMWhmTFK?PSi_BW~kYbG3c{Gc+ocl{K z_EAY%3B2ooCt8+0v@8P)43v-lEOsOQAxP+k|FMNgUo73t#>B7Z9VEy>f?bg}h!q&LNQU7VDunB@Wj z2ml0v2~b+t^4rDnOjC$(%FF1IkjO*a*Fun;>vpfmz|uk&qkS3dl-wTBgb(5ct@%U8 zX+P@%&dlQa%E?gC=@UJ`BuM6wV-9mA!yaz z)d4=wcqIX7^0=`j>uGZUm_L6Zkh*EJxT8O|^$0CmE4mwW{`SU_)^Rjd-(TMn37W{6 zod+o`|FKk%!KObYC~ETKcb6s6Hg&MX7I&WA$juSK0Oy#_5c|lH?)p66?#vfC7&zd8 zR_tKRP#3XvS_oC7YtZgoJg(>g@fAm-veO-3=k3~d%XgsC+%inf{|rk?lV20%IWcHo zT5ns9gxVy-Sc^|%Hx&lpsY51G;KLyzbAQQJ02+-#lL@!&0==FL#{3^pa>ALblF6zT zi05rD}bduNX*!l9f~}nh~qyDq}Ya_t#6)zYGh=F=n?K*_Ub2DH%>?3 z?8M>kg{E>s>xh4COmTC&?zpX=hcB^LA?N9BsX5)4R5!N-FTBRF)p9`Eo!mOM9l*j2 z2xE)(36M0Osav|jzxId8D zXnUHg$F+c_uEzuIOrEMl6i+~j-744UNrZwv!*X#z*)#Du#4i^moe&40s@51*7(T#f zWc##cPX&J_bvqpsdl}|+XfM-<^~KpcEFF!)7zuY|5&|e{!`l7T)tD5dCYPNDnw-s5wunbWNrHt?K{Ju z#)hs1r=(@N)eC*MU6tKZ59CfeW1nX(6cXc)l%{n*} zO>8;D7OK+}5*Qj6ic*Kya#)8amNRnC=7nBM*;@O49DQ2#damqlazk}};O%%kO1|Id zo*{kguCujO;8V!0ku@M}VSih1*9$S06k2u7gi=O>y=k#}Np^ z9_`AK@54cPYv;pD4_l(WIKH$xf?zu971^jXdFi6TzL9s25yP)2nZ^T!>%`|{w-xbX zmWHOOb6y~w=UTwEWNuZfBAsTnp!QQ`Y***!hYh&kxDC@>O$Cn4IcFsBzh^f?%5&I; z?)yosfEhJ;y9fnjMw@iKFUz{UMu{ib`mCL`$QmcgR(#7T!{Y>Z?&h;fsX(&h6&45a zm9LAGegEVYj0~bqf zdhVq*1Vh#oT8Oa^b~{oV(2tq40?7kn4rz5Mj7 z)(mOX0tZV_wCf;u_Hl9Rl*(~nyf`I59&P>CoWS@)vba?c;G?1@C22E7c!QsPsp3X! zVoL&Cb!di=i!&Rj7v3yPUea(L$nkOehBo726dtW|IC)cF>OL#&rzN*8sqaRotw6F= zeLe}&5r3{d?0t=942c_V5~Am8+z{Ltq=1f?obM&W2Ho7z>9SKwk3CAVC!t0e638M4 zxAw`)HgnWdz6g!Sdn|URzo!>Ecw~B~T2IMv7^0#$GLiV^?)x2bx@Q}az}~r&yKvfD z;VrNeffIs%_`s8Gg!wiGR@0)abqYW-wCTroLo{>TLPa82ILQ3F$a#%-?;HC)6Km-H ziY!lid#kiwBH;2<7GE8x*H8u_YO*UU&TPwzq@1xKH`Rt&AYAvDZtfE|p3DWIQLJ|2 z6{;NdNz?*wZd@X^t#QjP%GFjD`9of6{MKKQL%If4$)Qmpxf<>l5__G+%3-<;&ED}4 zPKa)Qq#I-n^%FBm97GI?lT+e)qH(u;Z}SRb2!3Wh;|mR0n;?Z;Ek`a~bgKIiPvbql ztGJ?Hj8)6HG`izL=&i>ZO7N)4lgvuEl6_%&5{GXrpZW`$-X)cL0Agir8=Vu>R!zAO z^o92W2m)$gWj+?Az9z=NRd*^#a^47?HMrzm2fw9k4M@8`s@Xx;DI7bB~HEtkcYSDmN@3Qj& z63IJGxpwcM?pW4$Jcel!NU z`LlQ9QC{}ToFJ)srp0Yq`GdlCNgr&j5)Dur4{U24Qn*-)Kp`p~ix5pPB&iwVPy&R) z1&Uz-Sx~I?QMYy#dzZ%8#Q_aC(69>Rzp z>cv*h-p~sgWXaFZEsb?%N{nW3*5;L)NPScH;bb*-6pHNn!IL6;2(V91VfvE<}8XeoUDZLJS*_=G8r-^4CK zJ-4p@#g3#p01S5+_%rJ$t;!sI`nlM_k&2_4|BLh65P|nQb0rO$oo4hVxqdD$_T{R_ zR@!JlOp6~*gN=EH|Eor>lt@o`&I9f7HIIZu#ETe!F3_Ge4%>?FWil)5r2-%oU)V7v zFe3&DDuzgg_YDCF6)_eB6w$EDPEL5;;>YsH#65O`eSIf%-7qmQAutIB1uG5%0vZJX n1Qd;@8)%BAuQ7bea>l1%h;3y3rZWTxdDFW+lCjBg0s;sC#k{)^ literal 0 HcmV?d00001 diff --git a/test/big-ca/big.priv b/test/big-ca/big.priv new file mode 100644 index 0000000..93e9cbb --- /dev/null +++ b/test/big-ca/big.priv @@ -0,0 +1,51 @@ +-----BEGIN RSA PRIVATE KEY----- +MIIJKgIBAAKCAgEA0at2yBttsEeI260DTGQb89KzAUaCBTlPTqlR586cDb7QwgSr +Kbf/1h43/c2DJv2YQ15dbnOEhom6ejWKNhBvGHZArbj5Cq/x6U7VzJ9Pgzd8QbaZ +n0Q5evx78jzy2z5GpoG4/JMe1AN9aWqMh0hZlkrHYF94lauf2hshLz4XHzvn72VZ +xJAzUntQy+XI8tcEZp1A2j7+J7hhzaBncc7ywu+vbN+7xhMdiina3IRuMBd5hoJJ +AnV9z8wh1oCtWcMFPSSHL0yMv6cNlt/Af7f4rSEHHvUDAUXhuVsVLFg1rOBoeiEh +pECtXtS1jralkefPXdjPg1XP/TgFXeAlcANnTdHVLLiFNh9Vw1RfU4OHEyvsIBAG +ltSAD5IEUZc7yr+M8CwX3jGDIGYgAhKZJ9qSFaQV+S8qbf+mSvzyi9CeEKxFKyc3 +iS2rZ0UuuzhD6jo/Ql0wJ16abKJuYewhPYNG/A43u719D9a1l2zNE+yLq+5OJgAO +HauZQf57AFq0wImUi3l/tHhpLWZJk0pgthHg6SpSyMYJ+tI3lk/NTy9BaSndTt33 +4FtWIo9obLk8SNfzOxnkw2ehSixUSH1RpN9C5VhpaWrxaoT2FUwsGWL94RWXpHQF +fDaYEkYOFS+PYAOWsmEPFCdcqoUiGUAVnGNuMpcZqGUKxTyiX7WjPU5woEkCAwEA +AQKCAgB7Y5S7nqimnPKFlQPj6OYqT0zY602JFXj+qdZxvL1JuYnRJD42hvogYBhD +XLZaM9NvkhEZ9xF+u37qfKehuXonwy+9DKZDC9gpnSNlEDwS1Ixjf7pYaCYLopqu +q/+f1r5tLtpWiZ4S1xru9q1Mz98o+0jqBkVIj3+7M0wMKVYiI3cTA2oYq2QInlmm +JMxlXPRSDykjRv77ER89i7BU4Z0r6zIpuGEg6A7ySD9sluLhmm8CIZolwE8SAufG +/GMH+CUVHnIP+9S41O7CY1s9zl6iRFWUekwSa7WzB08mkaLE4iuZ8/WAXC+rJzLR +kdtOSkVWzUkR2WZVdqpx3H8rtFUN/gcX/Eb/rWosaKJxZBEWQUbfkG36m3faYMB3 +IsioZUtCgTuz60hx7ko2tRPiNLOJv4uiyP/uNJVrIG5eAMs/tZTK8Vgy8anUXqwu +VwiUGFG0OrnWNz5g4Mqxnz8v1PuI/WjlB87ZZjMqaBbHsGRGVOHhyv7imdcfokHp +Zfg9uwYyuzXzHJfMNVr3avkE0xwNRrJFGEtBPL8iyhKLqsw5CNi64kbAgA81Zjy0 +w9gpqNCrknn+M1Hmd3CtQdOmOjXiVmDGaKTuLsfIbgKWq0NxfrXqVmycEoJxF0so +92UcSaB/w2BbZK2/nxlQiFXyM2qATSm8lGplFLL0Rhk7WLdVIQKCAQEA8cc89d4T +2y4/34QEjK2VYohQpMUHgiezSTIxRWN/qi+UgyInfIsTkKrLRny+OL8SI+SQjZA0 +smxfjtHbOSk3D/RpHb0t654ym1crQVo1aV03saaGWbbZayicxvrBghvt+AskICev +rzNpARx9gc+t9MQUCERNGwuLPhZp2RYyfQx1Y3haTOFpOrgS/GurgsGTlBAHIbF0 +XjFpDvBCEBFgr+IR5cEmOJpsubBtlgd+YnHJOyf/LHFKVZ34ewu6YsVY5/TVFWMB +14/p77QJ3A3BzTwd9x3nEtjBh6xzI2GqBego3l6610aHcbCvQc0stJVpLpnucBo+ +5nFYs0HGmyVzjwKCAQEA3gC6Q+hQznhfzpriK4/78GKVVMHwHX5J9elHbv+sUzP+ +YoG09hhNCpWgJ4ijIvsdf/HiagpuepqDJ3C5MxZTrzCFrGyTKTjC+Ii6KJHNqUjD +D3yPVEwu6eFyPdZBP0YmZo5+i9ZnLumQosz/gmQeTjvqDoLVqFTVOOwGO01/h9vy +mu+gkKsgUcDjgsowqH+1yapiajKnbc8PnW+tnFjy1KqNjpXCbWUsKS33l/FQ53+B +CTv9+EeQehwTdQS1IkwwA+Vwv0IcSx9kFnY5Yoy9FaZkDLWLeylVkHlQd6rzpkyA +4eXvm79yls8ImFbPTxMRJl/oReznaU7B6vrPUCLipwKCAQEAi94/1NiRUhXSW6LK +4vs0VVkYlglpi5Ed9bU0rbiezTxTRP1ILJNkUSeNCwz1GmzmuJ7sRQjsg1+QdFXQ +5aODOBajjNG5M/pDunvWCSt/hKGpq3rzdAkEhCptb+r2cSdpJjqDvppW1xr9nuf1 +b1hOgS/BivrARGoMNnHO8AgYUyEW8+FXE+y+7Ho6eY5sHOuRTXFsPsCi2i7pYPv6 +q8Lx1S4KPojbbJlhVpbK/qT9J0Q+Lpu30eUEJL2LVtt1Ctix0xZfAs1Q7nxR0Bqu +LYBD4k/p4eCJoeyFINDRluFT87DXm7Tfj9Q8XLfi20UvnJRm0c+5EV8NjlB6CNF/ +bJdg3wKCAQEAjM5LVczgi8Q/iAwmjVi6g+ITMvn68Mnr4SP/ocBaLT+aBiKcg0Yw +fxkdxlVcm1BIiqEBaR6KqgqcSwStAmET3NbawdzvjcKprvcRk6++kLNMvOLVCbN0 +QfUy/1OIeLhmnL+eNdVcBp4vlYKOQMZ9jkNkFaYYG7cKshrJbQ2faK0xd+GqpndT +fWbpJkhVilnOFEWUPCU6mmQtVD7ED5k/E3HFbP1Bnx7/XnMASgfNt7bgQdoiIDpL +wZdTI/JDbKiD/8SjuTsWNPOJCNIdXYtEVpn9dS4kdI5n7cV0KyJrfTuitySez9si +s9JGclEFFfNS+lL0QH2c3OcOCZrgqMQnmwKCAQEAuH+JNOzs30ymqUCNG8BdHW8I +sJYglt1SSNQrp3nFtqfBgk4LaoIwA95WwTD2mbs3o16eFCJ3w6wX38oPt8TdP7ZH +pZRBKFNG7eRjuqhUJG904RI7wk5MLKAH4YEkL7tpsGQZIiYbaadI5S9GzDgyrl7O +lrqMJNx+4Y9vgN5BPBxATIQDVgs78pbUANab91xnm8l0JpUlFsx5mrJQfqc0dipn +U5vwBg4jzg5UuP3CemS8F0KfKrjDqbiYuTeazqWhnTemjeXyzqTmUaY6r4QJJvk9 +DGT6qHCkkPQ+V13YXDZKUkq7yVSblVvOnG+W/R2DJsuECpYQaHdiZEjeuf1EZQ== +-----END RSA PRIVATE KEY----- diff --git a/test/big-ca/ca_conf.cnf b/test/big-ca/ca_conf.cnf new file mode 100644 index 0000000..6bafc6c --- /dev/null +++ b/test/big-ca/ca_conf.cnf @@ -0,0 +1,53 @@ +[ca] +default_ca = CA_default + +[CA_default] +dir = $ENV::CA_DIR +database = $dir/index.txt +serial = $dir/serial.txt + +certificate = $dir/$ENV::CATYPE.cert +private_key = $dir/$ENV::CATYPE.priv + +policy = policy_any + +[policy_any] +countryName = supplied +stateOrProvinceName = optional +localityName = optional +organizationName = optional +organizationalUnitName = optional +commonName = supplied +emailAddress = optional + +[ ca_cert ] +basicConstraints=CA:TRUE + + +[ ca_server ] +# This is OK for an SSL server. +nsCertType = server +nsComment = "OpenSSL Generated Server Certificate" + +# For an object signing certificate this would be used. +# nsCertType = objsign + +[ ca_client ] +# For normal client use this is typical +nsCertType = client, email +nsComment = "OpenSSL Generated Client Certificate" + +[ ca_clientserver ] +# For normal client use this is typical +nsCertType = server, client, email +nsComment = "OpenSSL Generated Client Server Certificate" + +# and for everything including object signing: +# nsCertType = client, email, objsign + +[ ca_client_flags ] +# This is typical in keyUsage for a client certificate. +keyUsage = nonRepudiation, digitalSignature, keyEncipherment + +# This will be displayed in Netscape's comment listbox. +nsComment = "OpenSSL Generated Client Certificate with Flags" diff --git a/test/big-ca/index.txt b/test/big-ca/index.txt new file mode 100644 index 0000000..e69de29 diff --git a/test/big-ca/req_conf.cnf b/test/big-ca/req_conf.cnf new file mode 100644 index 0000000..28ea218 --- /dev/null +++ b/test/big-ca/req_conf.cnf @@ -0,0 +1,31 @@ +[ req ] +default_bits = $ENV::BITS +default_keyfile = keyfile.pem +distinguished_name = req_distinguished_name +attributes = req_attributes +prompt = no +output_password = $ENV::PASSWORD +ca_cert = CA_cert + +[ req_distinguished_name ] +countryName = UG + +#stateOrProvinceName = South area + +localityName = Tropic + +organizationName = Utopia + +organizationalUnitName = Relaxation + +commonName = $ENV::CN + +#emailAddress = Email Address + +[ req_attributes ] +#challengePassword = $ENV::PASSWORD + +[ CA_cert] +basicConstraints = CA:true +subjectKeyIdentifier=hash +authorityKeyIdentifier=keyid:always,issuer:always diff --git a/test/big-ca/req_proxy_conf.cnf b/test/big-ca/req_proxy_conf.cnf new file mode 100644 index 0000000..54d9e4d --- /dev/null +++ b/test/big-ca/req_proxy_conf.cnf @@ -0,0 +1,33 @@ +[ req ] +default_bits = 1024 +default_keyfile = keyfile.pem +distinguished_name = req_distinguished_name +attributes = req_attributes +prompt = no +output_password = $ENV::PASSWORD +ca_cert = CA_cert + +[ req_distinguished_name ] +countryName = UG + +#stateOrProvinceName = South area + +localityName = Tropic + +organizationName = Utopia + +organizationalUnitName = Relaxation + +0.commonName = $ENV::CN + +1.commonName = $ENV::PROXYNAME + +#emailAddress = Email Address + +[ req_attributes ] +#challengePassword = $ENV::PASSWORD + +[ CA_cert] +basicConstraints = CA:true +subjectKeyIdentifier=hash +authorityKeyIdentifier=keyid:always,issuer:always diff --git a/test/big-ca/req_proxy_proxy_conf.cnf b/test/big-ca/req_proxy_proxy_conf.cnf new file mode 100644 index 0000000..5f2fe0a --- /dev/null +++ b/test/big-ca/req_proxy_proxy_conf.cnf @@ -0,0 +1,35 @@ +[ req ] +default_bits = 1024 +default_keyfile = keyfile.pem +distinguished_name = req_distinguished_name +attributes = req_attributes +prompt = no +output_password = $ENV::PASSWORD +ca_cert = CA_cert + +[ req_distinguished_name ] +countryName = UG + +#stateOrProvinceName = South area + +localityName = Tropic + +organizationName = Utopia + +organizationalUnitName = Relaxation + +0.commonName = $ENV::CN + +1.commonName = $ENV::PROXYNAME + +2.commonName = $ENV::PROXYPROXYNAME + +#emailAddress = Email Address + +[ req_attributes ] +#challengePassword = $ENV::PASSWORD + +[ CA_cert] +basicConstraints = CA:true +subjectKeyIdentifier=hash +authorityKeyIdentifier=keyid:always,issuer:always diff --git a/test/big-ca/serial.txt b/test/big-ca/serial.txt new file mode 100644 index 0000000..3dcc795 --- /dev/null +++ b/test/big-ca/serial.txt @@ -0,0 +1 @@ +0176 diff --git a/test/expired-ca/ca_conf.cnf b/test/expired-ca/ca_conf.cnf new file mode 100644 index 0000000..6bafc6c --- /dev/null +++ b/test/expired-ca/ca_conf.cnf @@ -0,0 +1,53 @@ +[ca] +default_ca = CA_default + +[CA_default] +dir = $ENV::CA_DIR +database = $dir/index.txt +serial = $dir/serial.txt + +certificate = $dir/$ENV::CATYPE.cert +private_key = $dir/$ENV::CATYPE.priv + +policy = policy_any + +[policy_any] +countryName = supplied +stateOrProvinceName = optional +localityName = optional +organizationName = optional +organizationalUnitName = optional +commonName = supplied +emailAddress = optional + +[ ca_cert ] +basicConstraints=CA:TRUE + + +[ ca_server ] +# This is OK for an SSL server. +nsCertType = server +nsComment = "OpenSSL Generated Server Certificate" + +# For an object signing certificate this would be used. +# nsCertType = objsign + +[ ca_client ] +# For normal client use this is typical +nsCertType = client, email +nsComment = "OpenSSL Generated Client Certificate" + +[ ca_clientserver ] +# For normal client use this is typical +nsCertType = server, client, email +nsComment = "OpenSSL Generated Client Server Certificate" + +# and for everything including object signing: +# nsCertType = client, email, objsign + +[ ca_client_flags ] +# This is typical in keyUsage for a client certificate. +keyUsage = nonRepudiation, digitalSignature, keyEncipherment + +# This will be displayed in Netscape's comment listbox. +nsComment = "OpenSSL Generated Client Certificate with Flags" diff --git a/test/expired-ca/expired.cert b/test/expired-ca/expired.cert new file mode 100644 index 0000000..a4c6feb --- /dev/null +++ b/test/expired-ca/expired.cert @@ -0,0 +1,14 @@ +-----BEGIN CERTIFICATE----- +MIICKTCCAZICAQAwDQYJKoZIhvcNAQEEBQAwXTELMAkGA1UEBhMCVUcxDzANBgNV +BAcTBlRyb3BpYzEPMA0GA1UEChMGVXRvcGlhMRMwEQYDVQQLEwpSZWxheGF0aW9u +MRcwFQYDVQQDEw50aGUgZXhwaXJlZCBDQTAeFw0wNDEwMjgwMjQ5MzNaFw0wNDEw +MjcwMjQ5MzNaMF0xCzAJBgNVBAYTAlVHMQ8wDQYDVQQHEwZUcm9waWMxDzANBgNV +BAoTBlV0b3BpYTETMBEGA1UECxMKUmVsYXhhdGlvbjEXMBUGA1UEAxMOdGhlIGV4 +cGlyZWQgQ0EwgZ8wDQYJKoZIhvcNAQEBBQADgY0AMIGJAoGBAKDalz1sD+Ds5CR1 +AvST5CUKoOUoKBfnaqbYhGivGv9QK34ynYYONoBZcZGjIh/9D7n5l/lxq8NZ+4HV +GU6fDOT7mBALiiM3tyKztpD7rBxLCZ3PxsNeHxP3J5obXz44XaSBxgk3FEfX0DJJ +D4Fv7Res5FTRWUTmK+RZ8jSTflnzAgMBAAEwDQYJKoZIhvcNAQEEBQADgYEAOaoU +J+ZWcteYj09ntn58OnjbL4jRW5TYE4+vfrja9cUuKiOdjqWfHdi8fY5C58tUqFnk +iFKPzqEienR4apchZjoqWPVA2coaRAm6wwAvkePrv0hk+cuTNCVAFGo2i3PGbRo/ +BfpZaDcEgwpYn5PzLNwTEB2bK2QRbsNKX1JtR5M= +-----END CERTIFICATE----- diff --git a/test/expired-ca/expired.p12 b/test/expired-ca/expired.p12 new file mode 100644 index 0000000000000000000000000000000000000000..1b67c409ec4dfcca66f160416de9da6db67ffdd6 GIT binary patch literal 1573 zcmY+?c{tPw7zc2_F;|Ysj&Y2fAxXwe6gf)6B1aJoa;GR)2P1EDl2Skx1G1Vqo z_x5-pgj7n~$6bMCij-KPWKdD988xkjT>8;I;;?R8j-I9BxucC;CqhJcXFV-b);%8B z?%6CLpd)2aaTQp7zRcQhXrxSJ?&3VrJ_(7OVOrg5Wq3}b%C}TveI?Gcya8pI%7-`A z7ZB|S;(3vF2R<{gNE-~De>EyNo`7{vR*4{~g-rSSd~Npj$1iEBO^+D~$Nc7E9wrwi z69vCztjo6zR(*}TI&p5s$)w=scgUc()`XnRhqymxt1IcjdI}}En;^rr$@UB93;yg} z(!5wr?BZ|wRgR)KQ=vL*3nQuhBG*FIiiai{iW{}cBc|oWmvG<{vlX82*i8)Sd$xJZ z`jq8+Z(L40kwWzTehvVW@gEqyad3l@sNG_8tc|``U!2-Jp4=5d|~Zi={;sPlLk8p09f~d#KAjj54-c z^q_RL`l<5{W8t?6%_ei>sK5l{b?S8~j{!<%BiC}m5V0WHi+WW2%fiet$MZZABU98n?#t;#am(t)j6w7SF}z& ziD8wjqjBJHs&>=`arFJZou9|l)GzJ~C9FE%?5oj`{540I&p0_!yEHt3sXEB!iJl}8 z)L#H|N)4f0?(3wDrU3Gzs?G%u^j2U{q?C~66B>_nJ@@eIVXv<(y~km+jwxS5tB3P0jjSQiXJrCB`-5F=dG1|Y{Weozl*{BKQj7J3fn!ODbZUsAnWP1QqEIz z2d7Q;G9Jx(l8KXRkTi{-a#!!k$Fw2c zl9*eM`7}2sZOa& z2#6e{lnp)y*dSjT^KfkF)1MWrlnuQnjkr*VjC9rhY#=yYn8M#5lpru15`e$sY|)Df zMV*5};W9~VXp#c`&De;idu9a!RBJE{YK)KsP^)DRyyz5+BikQ^=k=|3)i{u!uTs8J z76yEh2;MQKCJ?cVW!C*98IW6ZR>#_Dow1!|F7t?fJoR(FzHt`UtRK~`MHaZ}+-9Wp zPrEiHxDkhagWtD3XhW+Ui=KJZ+B;744awHA)cM4^DEBdsM@TNUOEE6vy702e33(11 z$tgi=&a`E{@2r~-Ajfwrjt;s9FO=YU=Qjk}oE@|Js+qxM3jj6NUTrxjX5cjC=<#yp z*>tQsjiojLGDX%8I`VDN7RfD^7*6A1Eq|fcDu#DfQWxcj@y;NH9EpQlq*k{SX)w1$ zYDX26R1WDn_f)r6ROVJGH^laB&5~5{pEuj`yhjK-l(&4@T36G+FMC!k{#5pe$2&yW z$p)IR{yN&<;Wt|k*`6!NS!e2?{igabpg-hD(aaf0kBb0y^?TfX5t~Q49HaJ&(0uw8 z7(yzREbP?$IzctD<0FlnM(t2>)BQ9f63?^8>86U#@0%s$7 zRBDG-n*H3HdkWLj=h1@(;Qg_QgWngnwE!NiRM|SWA1@cxSNBwg{F#C$Kfe5jZcXO)$u9)+ls~19xcgjYdHhpeL3`H4CHe8)n;|1r>;&?vAS3f%E8k-o-j<#?K8Ia#_kd&&}rxE z)30;JSEeF`0^cy^j$^=ml#z|3^7uS$~wB$f#>(2E*DY~?NqoBs1 z;tN}R^6HqJoc%z%SBTN}??Y>w^IETdX!WcfCiKP-Jlbg|%;|EL83NkG z#l2<$8EMwO^5V6z^}(}bN9NsYVKGQ$`sVIDlv}D_k1OV_hupr_q*Iqp_o=wTr|rZ! zEi%!R%=6&|DuKdxy5A6RAI*|X0u7zDL0>sstBf0YFrK9nKf17(OcW+SqF0_!m#i40 z^ZdSp`8U=&L{4gIIYvG_ys*Z*;Fc!*B>YwX!FcyU?#^DS4k)L&kxzNcZOE2aptC%v3bZqgt4 zwN+wMhKvMxnBp^Mm==EgWIBnQB%W`Y}NSWEk#+YtHUCX?(_yU3a-DJ}W zBaE8ie6Jf@|3+bhyxqi1B$`<_+K-x#F_c9-R~@;%J^NiR=#PFuT^5xGt4b2~_`fd9 zM0w;~>TczYoorI1ndRl{i_q-iuK2^KSX+q_5qzWca?D~oA%Zxn=b}h@cFTIbD^7Mf zh8OV`wa2|OhFgyq@Za-v?i-_l65W3L-eA z6KkX%9ZH~P=i~4=1DrezG)KxpwLuv`9pTJ5Gaaxq!80*8^bVs7q+t!30JuG3oNv_b I6!b&)Uk_owVgLXD literal 0 HcmV?d00001 diff --git a/test/fake-ca/fake.priv b/test/fake-ca/fake.priv new file mode 100644 index 0000000..fd459d5 --- /dev/null +++ b/test/fake-ca/fake.priv @@ -0,0 +1,15 @@ +-----BEGIN RSA PRIVATE KEY----- +MIICXwIBAAKBgQDdnD3XgTO1STHyPRpusAiumVU1VNjIC5MfklQLdEO4+Ppv4jtl +QBTWuCAFQF/wxu9Q/8qgpr485kJF6252ePFRSRh0MiBKvbsRlUinnx9QD9N/lDnD +udyqMn16EVPQVcVdj8vYR3r1Sffl9+dhOE15ZjuREAheXZY41OIR9Tt01QIDAQAB +AoGBAM/1mqLs/9UTRueHJ5LPZpZSFX/iizvOgNWTv4KwLA0cuAbeSdaN+AA28PV8 +n4uXY2SjZUa0srj7ax2p/RL4E5rw0bwDImfZh1Sbf7jTNviU/sKwqW6MGuCAQhHS +j+wA3oCBda7p1v+FMQccbsM5CDTVYrPbhEouUi1Pg8SW23aBAkEA88Y/Ojj7bCf3 +RYAYgRCkhSV4eljrJDOwnzxX7WIuGf6A30UJ1epXWU2NQA3AmLq+X6gAKFqsyP2/ +/6buGgeXSQJBAOi5b5uEXFbsPXtwfmNfsRpkZqS+AAGhy8pKO4NTqR+cTEObb0nc +xS8vdx2gUXOVzZnVpXWBi9+BGKt3oWw19S0CQQCF8roNWQA2FuPVSaStTqLIEqXX +vIJAWzLC3JqH8rnYSLMxe7MC2whyJp3lw2i/w2UWFK85fVGSA3R7mpMctG0ZAkEA +rAI7Oo/nDBwKCU2JLPvSU7Z3ozYHnS0wCfE58YQJUaLdP28IH2i8mXaUrOIMsci8 +MQKXC7XXYzfwuvNt7SQodQJBANQChuUPRyft5ygT0sXDCujl1YtHKWtCysUetn7J +JPRzuTr82WyF29EKK7V0Z0X2pCCq7vXtjbj8b8WeBEBw7rw= +-----END RSA PRIVATE KEY----- diff --git a/test/fake-ca/index.txt b/test/fake-ca/index.txt new file mode 100644 index 0000000..e69de29 diff --git a/test/fake-ca/req_conf.cnf b/test/fake-ca/req_conf.cnf new file mode 100644 index 0000000..28ea218 --- /dev/null +++ b/test/fake-ca/req_conf.cnf @@ -0,0 +1,31 @@ +[ req ] +default_bits = $ENV::BITS +default_keyfile = keyfile.pem +distinguished_name = req_distinguished_name +attributes = req_attributes +prompt = no +output_password = $ENV::PASSWORD +ca_cert = CA_cert + +[ req_distinguished_name ] +countryName = UG + +#stateOrProvinceName = South area + +localityName = Tropic + +organizationName = Utopia + +organizationalUnitName = Relaxation + +commonName = $ENV::CN + +#emailAddress = Email Address + +[ req_attributes ] +#challengePassword = $ENV::PASSWORD + +[ CA_cert] +basicConstraints = CA:true +subjectKeyIdentifier=hash +authorityKeyIdentifier=keyid:always,issuer:always diff --git a/test/fake-ca/req_proxy_conf.cnf b/test/fake-ca/req_proxy_conf.cnf new file mode 100644 index 0000000..54d9e4d --- /dev/null +++ b/test/fake-ca/req_proxy_conf.cnf @@ -0,0 +1,33 @@ +[ req ] +default_bits = 1024 +default_keyfile = keyfile.pem +distinguished_name = req_distinguished_name +attributes = req_attributes +prompt = no +output_password = $ENV::PASSWORD +ca_cert = CA_cert + +[ req_distinguished_name ] +countryName = UG + +#stateOrProvinceName = South area + +localityName = Tropic + +organizationName = Utopia + +organizationalUnitName = Relaxation + +0.commonName = $ENV::CN + +1.commonName = $ENV::PROXYNAME + +#emailAddress = Email Address + +[ req_attributes ] +#challengePassword = $ENV::PASSWORD + +[ CA_cert] +basicConstraints = CA:true +subjectKeyIdentifier=hash +authorityKeyIdentifier=keyid:always,issuer:always diff --git a/test/fake-ca/req_proxy_proxy_conf.cnf b/test/fake-ca/req_proxy_proxy_conf.cnf new file mode 100644 index 0000000..5f2fe0a --- /dev/null +++ b/test/fake-ca/req_proxy_proxy_conf.cnf @@ -0,0 +1,35 @@ +[ req ] +default_bits = 1024 +default_keyfile = keyfile.pem +distinguished_name = req_distinguished_name +attributes = req_attributes +prompt = no +output_password = $ENV::PASSWORD +ca_cert = CA_cert + +[ req_distinguished_name ] +countryName = UG + +#stateOrProvinceName = South area + +localityName = Tropic + +organizationName = Utopia + +organizationalUnitName = Relaxation + +0.commonName = $ENV::CN + +1.commonName = $ENV::PROXYNAME + +2.commonName = $ENV::PROXYPROXYNAME + +#emailAddress = Email Address + +[ req_attributes ] +#challengePassword = $ENV::PASSWORD + +[ CA_cert] +basicConstraints = CA:true +subjectKeyIdentifier=hash +authorityKeyIdentifier=keyid:always,issuer:always diff --git a/test/fake-ca/serial.txt b/test/fake-ca/serial.txt new file mode 100644 index 0000000..3dcc795 --- /dev/null +++ b/test/fake-ca/serial.txt @@ -0,0 +1 @@ +0176 diff --git a/test/trusted-ca/ca_conf.cnf b/test/trusted-ca/ca_conf.cnf new file mode 100644 index 0000000..6bafc6c --- /dev/null +++ b/test/trusted-ca/ca_conf.cnf @@ -0,0 +1,53 @@ +[ca] +default_ca = CA_default + +[CA_default] +dir = $ENV::CA_DIR +database = $dir/index.txt +serial = $dir/serial.txt + +certificate = $dir/$ENV::CATYPE.cert +private_key = $dir/$ENV::CATYPE.priv + +policy = policy_any + +[policy_any] +countryName = supplied +stateOrProvinceName = optional +localityName = optional +organizationName = optional +organizationalUnitName = optional +commonName = supplied +emailAddress = optional + +[ ca_cert ] +basicConstraints=CA:TRUE + + +[ ca_server ] +# This is OK for an SSL server. +nsCertType = server +nsComment = "OpenSSL Generated Server Certificate" + +# For an object signing certificate this would be used. +# nsCertType = objsign + +[ ca_client ] +# For normal client use this is typical +nsCertType = client, email +nsComment = "OpenSSL Generated Client Certificate" + +[ ca_clientserver ] +# For normal client use this is typical +nsCertType = server, client, email +nsComment = "OpenSSL Generated Client Server Certificate" + +# and for everything including object signing: +# nsCertType = client, email, objsign + +[ ca_client_flags ] +# This is typical in keyUsage for a client certificate. +keyUsage = nonRepudiation, digitalSignature, keyEncipherment + +# This will be displayed in Netscape's comment listbox. +nsComment = "OpenSSL Generated Client Certificate with Flags" diff --git a/test/trusted-ca/index.txt b/test/trusted-ca/index.txt new file mode 100644 index 0000000..e69de29 diff --git a/test/trusted-ca/req_conf.cnf b/test/trusted-ca/req_conf.cnf new file mode 100644 index 0000000..28ea218 --- /dev/null +++ b/test/trusted-ca/req_conf.cnf @@ -0,0 +1,31 @@ +[ req ] +default_bits = $ENV::BITS +default_keyfile = keyfile.pem +distinguished_name = req_distinguished_name +attributes = req_attributes +prompt = no +output_password = $ENV::PASSWORD +ca_cert = CA_cert + +[ req_distinguished_name ] +countryName = UG + +#stateOrProvinceName = South area + +localityName = Tropic + +organizationName = Utopia + +organizationalUnitName = Relaxation + +commonName = $ENV::CN + +#emailAddress = Email Address + +[ req_attributes ] +#challengePassword = $ENV::PASSWORD + +[ CA_cert] +basicConstraints = CA:true +subjectKeyIdentifier=hash +authorityKeyIdentifier=keyid:always,issuer:always diff --git a/test/trusted-ca/req_proxy_conf.cnf b/test/trusted-ca/req_proxy_conf.cnf new file mode 100644 index 0000000..54d9e4d --- /dev/null +++ b/test/trusted-ca/req_proxy_conf.cnf @@ -0,0 +1,33 @@ +[ req ] +default_bits = 1024 +default_keyfile = keyfile.pem +distinguished_name = req_distinguished_name +attributes = req_attributes +prompt = no +output_password = $ENV::PASSWORD +ca_cert = CA_cert + +[ req_distinguished_name ] +countryName = UG + +#stateOrProvinceName = South area + +localityName = Tropic + +organizationName = Utopia + +organizationalUnitName = Relaxation + +0.commonName = $ENV::CN + +1.commonName = $ENV::PROXYNAME + +#emailAddress = Email Address + +[ req_attributes ] +#challengePassword = $ENV::PASSWORD + +[ CA_cert] +basicConstraints = CA:true +subjectKeyIdentifier=hash +authorityKeyIdentifier=keyid:always,issuer:always diff --git a/test/trusted-ca/req_proxy_proxy_conf.cnf b/test/trusted-ca/req_proxy_proxy_conf.cnf new file mode 100644 index 0000000..5f2fe0a --- /dev/null +++ b/test/trusted-ca/req_proxy_proxy_conf.cnf @@ -0,0 +1,35 @@ +[ req ] +default_bits = 1024 +default_keyfile = keyfile.pem +distinguished_name = req_distinguished_name +attributes = req_attributes +prompt = no +output_password = $ENV::PASSWORD +ca_cert = CA_cert + +[ req_distinguished_name ] +countryName = UG + +#stateOrProvinceName = South area + +localityName = Tropic + +organizationName = Utopia + +organizationalUnitName = Relaxation + +0.commonName = $ENV::CN + +1.commonName = $ENV::PROXYNAME + +2.commonName = $ENV::PROXYPROXYNAME + +#emailAddress = Email Address + +[ req_attributes ] +#challengePassword = $ENV::PASSWORD + +[ CA_cert] +basicConstraints = CA:true +subjectKeyIdentifier=hash +authorityKeyIdentifier=keyid:always,issuer:always diff --git a/test/trusted-ca/serial.txt b/test/trusted-ca/serial.txt new file mode 100644 index 0000000..3dcc795 --- /dev/null +++ b/test/trusted-ca/serial.txt @@ -0,0 +1 @@ +0176 diff --git a/test/trusted-ca/trusted.cert b/test/trusted-ca/trusted.cert new file mode 100644 index 0000000..2c47081 --- /dev/null +++ b/test/trusted-ca/trusted.cert @@ -0,0 +1,14 @@ +-----BEGIN CERTIFICATE----- +MIICKTCCAZICAQAwDQYJKoZIhvcNAQEEBQAwXTELMAkGA1UEBhMCVUcxDzANBgNV +BAcTBlRyb3BpYzEPMA0GA1UEChMGVXRvcGlhMRMwEQYDVQQLEwpSZWxheGF0aW9u +MRcwFQYDVQQDEw50aGUgdHJ1c3RlZCBDQTAeFw0wNDEwMjgwMjQ5MjJaFw0zMjAz +MTUwMjQ5MjJaMF0xCzAJBgNVBAYTAlVHMQ8wDQYDVQQHEwZUcm9waWMxDzANBgNV +BAoTBlV0b3BpYTETMBEGA1UECxMKUmVsYXhhdGlvbjEXMBUGA1UEAxMOdGhlIHRy +dXN0ZWQgQ0EwgZ8wDQYJKoZIhvcNAQEBBQADgY0AMIGJAoGBALgEMG9x0czvTKUS +28+4YZhuSnVTCf8+OyfoD+7rLOdK1YzXlbtt2A8wSwbGsRlYv7J/NvogSTIU9tj3 +EL9pVfcIaiYWL12VgJpeAkQ4gqA7WikXLlnD1tShtR1tGGANpr3ZvpKaq/ge/k9E +dhbdyQqikif36o7+c+Msqz0XfmfNAgMBAAEwDQYJKoZIhvcNAQEEBQADgYEAWkKu +hUC4D3SWfg3JBZceMU4TNE7K0Nt6gdFypJA2ikR0lMLy+ai9vtwU+QF1Ch4zDM9a +lWXHw8RmFgUDdvndWQV8JcwhaUSqxrKvNvfzoZAxGZxUOuwETy8MhpNiwD+gBeae +aL4peenUEfIa6mPRbGOoD8kOxjyACwr0r0+DUAY= +-----END CERTIFICATE----- diff --git a/test/trusted-ca/trusted.p12 b/test/trusted-ca/trusted.p12 new file mode 100644 index 0000000000000000000000000000000000000000..0b068efc27b4620d9b0576069f7e3552f3d95043 GIT binary patch literal 1573 zcmY+?dpOez7zglewjXo9<(Ay`` zQgWJ_F7COeG`X!fjhyv7=bX;@<9*)e`F@}G{p*9G0ICo$ABqB-2jF_ij>+pHV16*2 z0vm!-V6S=cOB4k%@T&so6i6p8YJ-45yw&up0izTF!M{HUg8`H%Q~(p=6T5`FmjZzZ zfD$N>6jT-9c>)2kIC3k`@&T=1Uk`oX{5L@`0eZf&5$N_oGSST@gJF)(AywAUY$lCn zTisK?1t)Sw<$PRJuq{78vF7-}mIDR>uV!>@V-2q0jorkWiX6M)lT~VB&6V?G{EV`! z^=M=oS=_7V1^r`7MT8+OSL&Wv+)=fWa>PZHXtelK4 z?l3e=XdAEg-iS7;vvp8Q<&39t7cl;BJqi7#b^Yio;@Pa%O7Y=HKdjK`#B~AeUKKK* zBjT!M3CYX0=c$&`?9_s0PtBs^2mfsiFFiBL#wdf$Bm+WK2%XLsb0Z9s_^gaKTy>)F zedjLgj1AeF-uB8xT0P^4pr!Ihhok9!!Tj60dJpDWFHiKOv26~>$oKH4WkdYJ7anZ0^1ktl-*Fz8o{J5$?cm}vBOS~%uCr1h*1mVQS^p6A|;yt z&f;7RB6t5oc&JsKtZqO^ZE({_Yn6u-xb5D4LAnJEtIcoP!~%E!fY=zJM`$Mor*6N7z)SD&$}fNF=A9?hDiyXx5KXg#ux6WC{vri^0dGiKF5GkO8>=PxebnBt z-)+umo|w%m$of{D;dnf5j3#|F%sMrG?WA7Ojp<9B(-%RaCFOyHZYTA*7pg6JHK$K! zAas_UmSaLd(NAZ+tp#`GZ+oM+Zp6;lwH^AJ)Iq&l-sCYO;QtnDu@MREPi*g6z48OE zBU`(Dm#CH&asD;t5s+Z!26QPfFexUP+R47kY;%*j7y|i#Z-r)kPQ=%@4sL73+Bnpp zoQASBI*h#7{pcWcXn|R{Dc7+koV;`9i|kz-&T3$BXBp`rsBo|_X?u5lA)mb!S3p!u+?FsLf99q{OG=DXx~b8wNKq0retZ zifgkD1JPX6b)Lku+7=lIYiQTe^ zqz?7)R!?mO-F0Iotun(H{$78Nd~Pizu+x0*vsFZ9uuX+l`-1aus3?~2m}183Wg#%? z`>7fc_}&4RORi5H+Xu|{o!Tg^y^TSuppp{O;KR4pGex_kT^cVi(@UEZjqh6-7-^!^|5Xj&VI%{UHfK3Y ze`a%sC8h__lVS~XM0chS$_S;3f&(ypQ9g(Q35S))Qg4fXjt7IG Q0uq6o5COt^+fUtp0ZSpxH~;_u literal 0 HcmV?d00001 diff --git a/test/trusted-ca/trusted.priv b/test/trusted-ca/trusted.priv new file mode 100644 index 0000000..2a1c60d --- /dev/null +++ b/test/trusted-ca/trusted.priv @@ -0,0 +1,15 @@ +-----BEGIN RSA PRIVATE KEY----- +MIICXAIBAAKBgQC4BDBvcdHM70ylEtvPuGGYbkp1Uwn/Pjsn6A/u6yznStWM15W7 +bdgPMEsGxrEZWL+yfzb6IEkyFPbY9xC/aVX3CGomFi9dlYCaXgJEOIKgO1opFy5Z +w9bUobUdbRhgDaa92b6Smqv4Hv5PRHYW3ckKopIn9+qO/nPjLKs9F35nzQIDAQAB +AoGAPRb+8XCK4wsqmb66BKrEk7NButN3hSomv2fWKk4e2SZJ4PkNN20PBnPU5In/ +71c8RMjg+obPZfX5wSu8fp88rzZ7u4kPZp5r2c4nlhV7GqmdlJNj7GUFgGtxVLBC ++qBh9H1v5MwEhEj1ae+uQEwJYrA+JAA+AJTRQymFDx0l4u0CQQDuIuZmoOcxK+Nd +QJvOnrJbUwq+/kgRJXObGERUFF9ZsOI9/smZxoykmUkcciWo8noTo3a3kNbUg3PO +gDQp//tPAkEAxdH8Pl17p0+kEiR6/qxg8PrwKXg2BXVdlDYsa31frTAaSHNoPP6w +uqdyOpqfQCM2ug7YziV9oOMIjmVLVZ00IwJBAMy3zAJmSNoItMkyBb+2xfWkihRv +XV0AKUYnsnXlnaLpYVWSd5VvDvFhpWyC5MU8zp2bZS+hoE3JRAE+TZndqhkCQHZU +T1B21tqT9w6rJ69jKXG8iSAlOhs1w04+wX9itXKBTZd9ASNLLifYtal8iDnzVm8h +JmrZXjZ418tlqBSEPoUCQBW/tY26rUVhjbyUk+hhayuOS3PcEU5TrZogAtD1OWbz +7pDJo48aupE/Svc59smwXQjaZjwlNA76X75ioaSSaSI= +-----END RSA PRIVATE KEY----- -- 1.8.2.3