]> git.ipfire.org Git - thirdparty/curl.git/commitdiff
runtests: generate certs dynamically, bump to EC-256, tidy up
authorViktor Szakats <commit@vsz.me>
Mon, 24 Mar 2025 21:13:29 +0000 (22:13 +0100)
committerViktor Szakats <commit@vsz.me>
Thu, 27 Mar 2025 09:21:57 +0000 (10:21 +0100)
Before this patch the curl repository and source tarball distribution
contained test certificates as binary blobs. Used by runtests.

Drop these certificates in favor of generating them dynamically as
part of the build process. Both via autotools and CMake.

As part of this, improve certificates, the generator script and process,
file layout, and fix any issue to make it work fast and smooth both in
CI and local builds.

Note, cert generator scripts require OpenSSL >=1.0.2
(or LibreSSL >=3.1.0). Generation requires POSIX shell, also with CMake.
Without a POSIX shell tests relying on TLS (and stunnel) will fail.

Details:

- build: generate certs as part of the test run process.
- build, tests: generate certs in the build directory.
- binarycheck: drop concept of known binary files with hashes.
- binarycheck: move binary check logic into spacecheck and drop this
  separate checker tool.
- build: fix to clean all cert files.
- autotools: fix to not run leaf cert generators in parallel. To avoid
  confusion when updating the revocation database and counter.
- scripts: drop `scripts` subdir, merge two scripts into one,
  auto-generate root cert, allow generating multiple leafs at once.
- scripts: switch to EC-256 keys (was: RSA-2048). For key size and perf.
- scripts: drop `-x` echo, text dumps, most other output. To avoid log
  noise and make it quicker in CI.
- scripts: make it non-RSA-specific.
- scripts: delete unused code.
- scripts: use POSIX shell shebang. Some envs don't have bash (Alpine).
- scripts: pass test pseudo-secrets via the command-line. To avoid:
  ```
  + openssl genrsa -out test-ca.key -passout fd:0 2048
  Invalid password argument, starting with "fd:"
  ```
- cmake: fix to launch generator scripts via the detected POSIX shell.
- cmake: fix `build-certs` rule to not depend on `SRPFILES`
  (`srp-verifier-*`).
- cmake: drop `EXCLUDE_FROM_ALL` for the cert subdir. It makes
  the Visual Studio generator miss to create the `clean-certs`,
  `build-certs` targets. No target depend on them, so they don't execute
  implicitly anyway. Fixes:
  ```
  MSBUILD : error MSB1009: Project file does not exist.
  Switch: clean-certs.vcxproj
  ```
- cmake: add `VERBATIM USES_TERMINAL` to `build-certs` target.
- GHA/linux: install openssl on Alpine, for the cert generator scripts.

Follow-up to 556f722fe32e5e9f4e24f0242100c5e9d57c129b #16593
Follow-up to fa461b4eff52b413f88debf543b5350a6cef4724 #14486

Closes #16824

80 files changed:
.github/scripts/binarycheck.pl [deleted file]
.github/scripts/binarycheck.sums [deleted file]
.github/scripts/spacecheck.pl
.github/workflows/checksrc.yml
.github/workflows/linux.yml
.github/workflows/macos.yml
configure.ac
docs/HTTP3.md
tests/CMakeLists.txt
tests/Makefile.am
tests/certs/.gitignore
tests/certs/CMakeLists.txt
tests/certs/Makefile.am
tests/certs/Makefile.inc
tests/certs/genserv.sh [new file with mode: 0755]
tests/certs/scripts/Makefile.am [deleted file]
tests/certs/scripts/genroot.sh [deleted file]
tests/certs/scripts/genserv.sh [deleted file]
tests/certs/test-ca.cacert [deleted file]
tests/certs/test-ca.crt [deleted file]
tests/certs/test-ca.key [deleted file]
tests/certs/test-localhost-san-first.crl [deleted file]
tests/certs/test-localhost-san-first.crt [deleted file]
tests/certs/test-localhost-san-first.key [deleted file]
tests/certs/test-localhost-san-first.pem [deleted file]
tests/certs/test-localhost-san-first.pub.der [deleted file]
tests/certs/test-localhost-san-first.pub.pem [deleted file]
tests/certs/test-localhost-san-last.crl [deleted file]
tests/certs/test-localhost-san-last.crt [deleted file]
tests/certs/test-localhost-san-last.key [deleted file]
tests/certs/test-localhost-san-last.pem [deleted file]
tests/certs/test-localhost-san-last.pub.der [deleted file]
tests/certs/test-localhost-san-last.pub.pem [deleted file]
tests/certs/test-localhost.crl [deleted file]
tests/certs/test-localhost.crt [deleted file]
tests/certs/test-localhost.key [deleted file]
tests/certs/test-localhost.nn.crl [deleted file]
tests/certs/test-localhost.nn.crt [deleted file]
tests/certs/test-localhost.nn.key [deleted file]
tests/certs/test-localhost.nn.pem [deleted file]
tests/certs/test-localhost.nn.pub.der [deleted file]
tests/certs/test-localhost.nn.pub.pem [deleted file]
tests/certs/test-localhost.pem [deleted file]
tests/certs/test-localhost.pub.der [deleted file]
tests/certs/test-localhost.pub.pem [deleted file]
tests/certs/test-localhost0h.crl [deleted file]
tests/certs/test-localhost0h.crt [deleted file]
tests/certs/test-localhost0h.key [deleted file]
tests/certs/test-localhost0h.pem [deleted file]
tests/certs/test-localhost0h.pub.der [deleted file]
tests/certs/test-localhost0h.pub.pem [deleted file]
tests/data/test2033
tests/data/test2034
tests/data/test2035
tests/data/test2037
tests/data/test2038
tests/data/test2041
tests/data/test2042
tests/data/test2048
tests/data/test2070
tests/data/test2079
tests/data/test2087
tests/data/test2500
tests/data/test2502
tests/data/test2503
tests/data/test3000
tests/data/test3001
tests/data/test3023
tests/data/test3024
tests/data/test310
tests/data/test311
tests/data/test312
tests/data/test313
tests/data/test3207
tests/data/test417
tests/data/test678
tests/http2-server.pl
tests/http3-server.pl
tests/secureserver.pl
tests/servers.pm

diff --git a/.github/scripts/binarycheck.pl b/.github/scripts/binarycheck.pl
deleted file mode 100755 (executable)
index d3a9e7c..0000000
+++ /dev/null
@@ -1,115 +0,0 @@
-#!/usr/bin/env perl
-#***************************************************************************
-#                                  _   _ ____  _
-#  Project                     ___| | | |  _ \| |
-#                             / __| | | | |_) | |
-#                            | (__| |_| |  _ <| |___
-#                             \___|\___/|_| \_\_____|
-#
-# Copyright (C) Daniel Stenberg, <daniel@haxx.se>, et al.
-#
-# This software is licensed as described in the file COPYING, which
-# you should have received as part of this distribution. The terms
-# are also available at https://curl.se/docs/copyright.html.
-#
-# You may opt to use, copy, modify, merge, publish, distribute and/or sell
-# copies of the Software, and permit persons to whom the Software is
-# furnished to do so, under the terms of the COPYING file.
-#
-# This software is distributed on an "AS IS" basis, WITHOUT WARRANTY OF ANY
-# KIND, either express or implied.
-#
-# SPDX-License-Identifier: curl
-#
-###########################################################################
-
-# This scripts scans the entire git repository for binary files.
-#
-# All files in the git repo that contain signs of being binary are then
-# collected and a sha256sum is generated for all of them. That summary is then
-# compared to the list of pre-vetted files so that only the exact copies of
-# already scrutinized files are deemed okay to "appear binary".
-#
-
-use strict;
-use warnings;
-
-my $root = ".";
-my $sumsfile = ".github/scripts/binarycheck.sums";
-if($ARGV[0]) {
-    $root = $ARGV[0];
-}
-
-my @bin;
-my %known;
-my $error = 0;
-
-sub knownbins {
-    open(my $mh, "<", "$sumsfile") ||
-        die "can't read known binaries";
-    while(<$mh>) {
-        my $l = $_;
-        chomp $l;
-        if($l =~ /^([a-f0-9]+)  (.*)/) {
-            my ($sum, $file) = ($1, $2);
-            $known{$file} = 1;
-        }
-        elsif($l =~ /^#/) {
-            # skip comments
-        }
-        else {
-            print STDERR "suspicious line in $sumsfile\n";
-            $error++;
-        }
-    }
-    close($mh);
-}
-
-sub checkfile {
-    my ($file) = @_;
-    open(my $mh, "<", "$file") || die "can't read $file";
-    my $line = 0;
-    while(<$mh>) {
-        my $l = $_;
-        $line++;
-        if($l =~ /([\x00-\x08\x0b\x0c\x0e-\x1f\x7f])/) {
-            push @bin, $file;
-
-            if(!$known{$file}) {
-                printf STDERR "$file:$line has unknown binary contents\n";
-                $error++;
-            }
-            last;
-        }
-    }
-    close($mh);
-}
-
-my @files = `git ls-files -- $root`;
-
-if(scalar(@files) < 3000) {
-    # this means this is not the git source code repository or that git does
-    # not work, error out!
-    print STDERR "too few files in the git repository!\n";
-    exit 1;
-}
-
-knownbins();
-
-if(scalar(keys %known) < 4) {
-    print STDERR "too few known binaries in $sumsfile\n";
-    exit 2;
-}
-
-for my $f (@files) {
-    chomp $f;
-    checkfile("$root/$f");
-}
-
-my $check=system("sha256sum -c $sumsfile");
-if($check) {
-    print STDERR "sha256sum detected a problem\n";
-    $error++;
-}
-
-exit $error;
diff --git a/.github/scripts/binarycheck.sums b/.github/scripts/binarycheck.sums
deleted file mode 100644 (file)
index 58585d1..0000000
+++ /dev/null
@@ -1,7 +0,0 @@
-# Copyright (C) Daniel Stenberg, <daniel@haxx.se>, et al.
-# SPDX-License-Identifier: curl
-c68161dba1c0166e4ab8d8ce00f57326db25d29fdd52c33d9974d0972ec60990  ./tests/certs/test-localhost-san-first.pub.der
-82430be03ec1783e2f9fad6e07a6f42cce62f8a23d87ea81a95977b47110c200  ./tests/certs/test-localhost-san-last.pub.der
-47233a0092db614f53e96a4df83ddeaa7e5242899ede1c1a90c53423a0b13bba  ./tests/certs/test-localhost.nn.pub.der
-63898448aa199675a30fb6722046a665a7c1a5c24453e63d8c37397482a7dc52  ./tests/certs/test-localhost.pub.der
-f78c61bb06a71d1bf9b034ecfcb7fe35ae85b6a3b87bf3a73c085dc062747dc1  ./tests/certs/test-localhost0h.pub.der
index b2473b1544144a14a547549ec48ed57e6b689da3..0c16f9312f0df89433e5c4aed7c67cf7c128a6e1 100755 (executable)
@@ -28,16 +28,13 @@ use warnings;
 
 my @tabs = (
     "^m4/zz40-xc-ovr.m4",
-    "Makefile\\.[a-z]+\$",
+    "Makefile\\.(am|example)\$",
     "/mkfile",
     "\\.(bat|sln|vc)\$",
-    "^tests/certs/.+\\.der\$",
     "^tests/data/test",
 );
 
 my @mixed_eol = (
-    "^tests/certs/.+\\.(crt|der)\$",
-    "^tests/certs/Server-localhost0h-sv.pem",
     "^tests/data/test",
 );
 
@@ -47,14 +44,9 @@ my @need_crlf = (
 );
 
 my @space_at_eol = (
-    "^tests/.+\\.(cacert|crt|pem)\$",
     "^tests/data/test",
 );
 
-my @eol_at_eof = (
-    "^tests/certs/.+\\.der\$",
-);
-
 sub fn_match {
     my ($filename, @masklist) = @_;
 
@@ -129,7 +121,6 @@ while (my $filename = <$git_ls_files>) {
     }
 
     if ($content ne "" &&
-        !fn_match($filename, @eol_at_eof) &&
         $content !~ /\n\z/) {
         push @err, "content: has no EOL at EOF";
     }
@@ -139,6 +130,10 @@ while (my $filename = <$git_ls_files>) {
         push @err, "content: has multiple EOL at EOF";
     }
 
+    if($content =~ /([\x00-\x08\x0b\x0c\x0e-\x1f\x7f])/) {
+        push @err, "content: has binary contents";
+    }
+
     if (@err) {
         $issues++;
         foreach my $err (@err) {
index 83a5f396a432fc1a2cca809ecd9c5005eaa66641..f172e55341c53e834bfa2e06d13788a00f3fd3c1 100644 (file)
@@ -110,9 +110,6 @@ jobs:
       - name: yamlcheck
         run: .github/scripts/yamlcheck.sh
 
-      - name: binarycheck
-        run: .github/scripts/binarycheck.pl
-
       # we allow some extra in source code
       - name: badwords
         run: |
index d9b7322f921bb0be59ffa085beb08079258cb164..7d5a9f23c268d85d7f262c533da893fb32393942 100644 (file)
@@ -327,7 +327,7 @@ jobs:
             libssh2-dev zlib-dev brotli-dev zstd-dev libidn2-dev openldap-dev \
             heimdal-dev libpsl-dev c-ares-dev \
             py3-impacket py3-asn1 py3-six py3-pycryptodomex \
-            perl-time-hires openssh stunnel sudo git
+            perl-time-hires openssh stunnel sudo git openssl
 
       - name: 'cache bearssl'
         if: contains(matrix.build.install_steps, 'bearssl')
index 6285c4af2295a1315cdacc3755ab82ee49151a19..181525487a8145e08defbcaad8b9e7538c16444d 100644 (file)
@@ -277,17 +277,6 @@ jobs:
       - name: 'test configs'
         run: grep -H -v '^#' bld/tests/config bld/tests/http/config.ini || true
 
-      - name: 'build-cert'
-        if: contains(matrix.build.generate, '-DCURL_USE_SECTRANSP=ON') || contains(matrix.build.configure, '--with-secure-transport')
-        run: |
-          if [ -n '${{ matrix.build.generate }}' ]; then
-            cmake --build bld --target clean-certs
-            cmake --build bld --target build-certs --parallel 1
-          else
-            make -C bld/tests/certs clean-certs
-            make -C bld/tests/certs build-certs -j1
-          fi
-
       - name: 'build'
         run: |
           if [ -n '${{ matrix.build.generate }}' ]; then
index 0768b902f115233bb836ef3ac8b8bae37c899010..7f5a2bff59c583f9bf9d6be760015255969be147 100644 (file)
@@ -5406,7 +5406,6 @@ AC_CONFIG_FILES([\
   tests/config \
   tests/configurehelp.pm \
   tests/certs/Makefile \
-  tests/certs/scripts/Makefile \
   tests/data/Makefile \
   tests/server/Makefile \
   tests/libtest/Makefile \
index eee26a65c95cec45e9bc2f7c902103cbd5cd4fed..b80698fb9e3dce1e75d909e478c21c328ae4a0b4 100644 (file)
@@ -413,7 +413,7 @@ Run the local h3 server on port 9443, make it proxy all traffic through to
 HTTP/1 on localhost port 80. For local toying, we can just use the test cert
 that exists in curl's test dir.
 
-     % CERT=$CURLSRC/tests/stunnel.pem
+     % CERT=/path/to/stunnel.pem
      % $HOME/bin/nghttpx $CERT $CERT --backend=localhost,80 \
       --frontend="localhost,9443;quic"
 
index 306aa240a843388b7e46cf998f4489f4a646384e..6d5539d8f5be3d1c37e6ea17c7e74b81b5b09aad 100644 (file)
@@ -35,16 +35,16 @@ add_subdirectory(http/clients)
 add_subdirectory(server)
 add_subdirectory(libtest)
 add_subdirectory(unit)
-add_subdirectory(certs EXCLUDE_FROM_ALL)
+add_subdirectory(certs)
 
 function(curl_add_runtests _targetname _test_flags)
   if(NOT BUILD_LIBCURL_DOCS)
     string(APPEND _test_flags " !documentation")
   endif()
+  set(_depends "build-certs")
   # Skip walking through dependent targets before running tests in CI.
   # This avoids: GNU Make doing a slow re-evaluation of all targets and
   # skipping them, MSBuild doing a re-evaluation, and actually rebuilding them.
-  set(_depends "")
   if(NOT _targetname STREQUAL "test-ci")
     set(_depends "testdeps")
   endif()
index 05012cb44151ca86007846e856300c95ff953055..87138e2dd593e38fd50c0988a9a84a7500fced3b 100644 (file)
@@ -157,28 +157,33 @@ SUFFIXES = .1 .md
 perlcheck:
        @if ! test -x "$(PERL)"; then echo "No perl!"; exit 2; fi
 
-test: perlcheck all
+build-certs:
+       (cd certs && $(MAKE) build-certs)
+
+runtests-pre: perlcheck build-certs
+
+test: runtests-pre all
        $(TEST) $(TFLAGS)
 
-quiet-test: perlcheck all
+quiet-test: runtests-pre all
        $(TEST) $(TEST_Q) $(TFLAGS)
 
-am-test: perlcheck all
+am-test: runtests-pre all
        $(TEST) $(TEST_AM) $(TFLAGS)
 
-ci-test: perlcheck all
+ci-test: runtests-pre all
        $(TEST) $(TEST_CI) $(TFLAGS)
 
-full-test: perlcheck all
+full-test: runtests-pre all
        $(TEST) $(TEST_F) $(TFLAGS)
 
-nonflaky-test: perlcheck all
+nonflaky-test: runtests-pre all
        $(TEST) $(TEST_NF) $(TFLAGS)
 
-torture-test: perlcheck all
+torture-test: runtests-pre all
        $(TEST) $(TEST_T) $(TFLAGS)
 
-event-test: perlcheck all
+event-test: runtests-pre all
        $(TEST) $(TEST_E) $(TFLAGS)
 
 default-pytest: ci-pytest
index 986f438c238436f6a42d67e16761f1c07f196d45..98adccef08b29dfd87f3781bbd46e7827c53b059 100644 (file)
@@ -1,4 +1,14 @@
 # Copyright (C) Daniel Stenberg, <daniel@haxx.se>, et al.
 #
 # SPDX-License-Identifier: curl
-gen
+test-*.crl
+test-*.crt
+test-*.csr
+test-*.der
+test-*.key*
+test-*.pem
+test-ca.cacert
+test-ca.cnt*
+test-ca.db*
+test-ca.raw*
+test-ca.srl
index 314bdece07102429942217309a3b0f4b7c53df56..f2035b132c65f5d4e54bccf680ad3a2f7f7468bc 100644 (file)
 # SPDX-License-Identifier: curl
 #
 ###########################################################################
+# Get 'CERTCONFIG_CA', 'CERTCONFIGS', 'GENERATEDCERTS', 'SRPFILES' variables
+curl_transform_makefile_inc("Makefile.inc" "${CMAKE_CURRENT_BINARY_DIR}/Makefile.inc.cmake")
+include("${CMAKE_CURRENT_BINARY_DIR}/Makefile.inc.cmake")
+
 find_program(SH_EXECUTABLE "sh")
 mark_as_advanced(SH_EXECUTABLE)
 if(SH_EXECUTABLE)
-  # Get 'CERTCONFIGS', 'GENERATEDCERTS', 'SRPFILES' variables
-  curl_transform_makefile_inc("Makefile.inc" "${CMAKE_CURRENT_BINARY_DIR}/Makefile.inc.cmake")
-  include("${CMAKE_CURRENT_BINARY_DIR}/Makefile.inc.cmake")
-
-  add_custom_target(clean-certs
-    COMMAND ${CMAKE_COMMAND} -E remove ${GENERATEDCERTS}
-    WORKING_DIRECTORY ${CMAKE_CURRENT_SOURCE_DIR}
+  string(REPLACE ";" " " _certconfigs "${CERTCONFIGS}")
+  add_custom_command(OUTPUT ${GENERATEDCERTS}
+    COMMAND ${SH_EXECUTABLE} -c "${CMAKE_CURRENT_SOURCE_DIR}/genserv.sh test ${_certconfigs}"
+    DEPENDS "${CMAKE_CURRENT_SOURCE_DIR}/genserv.sh" ${CERTCONFIG_CA} ${CERTCONFIGS}
+    VERBATIM
   )
-
   add_custom_target(build-certs
-    DEPENDS ${CERTCONFIGS} ${SRPFILES}
-    COMMAND "${CMAKE_CURRENT_SOURCE_DIR}/scripts/genroot.sh" test
-    COMMAND "${CMAKE_CURRENT_SOURCE_DIR}/scripts/genserv.sh" test-localhost test
-    COMMAND "${CMAKE_CURRENT_SOURCE_DIR}/scripts/genserv.sh" test-localhost.nn test
-    COMMAND "${CMAKE_CURRENT_SOURCE_DIR}/scripts/genserv.sh" test-localhost0h test
-    COMMAND "${CMAKE_CURRENT_SOURCE_DIR}/scripts/genserv.sh" test-localhost-san-first test
-    COMMAND "${CMAKE_CURRENT_SOURCE_DIR}/scripts/genserv.sh" test-localhost-san-last test
-    WORKING_DIRECTORY ${CMAKE_CURRENT_SOURCE_DIR}
-  )
+    DEPENDS ${GENERATEDCERTS})
 endif()
+
+add_custom_target(clean-certs
+  COMMAND ${CMAKE_COMMAND} -E remove ${GENERATEDCERTS}
+    "test-*.csr"
+    "test-*.der"
+    "test-*.keyenc"
+    "test-ca.cnt*"
+    "test-ca.db*"
+    "test-ca.raw*"
+    "test-ca.srl"
+)
index 7e0b785b1eb9f04df65f06a48feef2c14d639b7b..0e34fd7d063e575fd99c0949da5f77206342c60c 100644 (file)
 ###########################################################################
 AUTOMAKE_OPTIONS = foreign
 
-SUBDIRS = scripts
-
 include Makefile.inc
 
-EXTRA_DIST = $(CERTCONFIGS) $(GENERATEDCERTS) $(SRPFILES) CMakeLists.txt
+EXTRA_DIST = $(CERTCONFIG_CA) $(CERTCONFIGS) $(SRPFILES) CMakeLists.txt \
+  genserv.sh
+
+DISTCLEANFILES = $(GENERATEDCERTS)
 
 # Rebuild the certificates
 
 clean-certs:
-       cd $(srcdir); rm -f $(GENERATEDCERTS)
-
-build-certs: $(srcdir)/test-ca.cacert $(srcdir)/test-localhost.pem \
-       $(srcdir)/test-localhost.nn.pem $(srcdir)/test-localhost0h.pem \
-       $(srcdir)/test-localhost-san-first.pem $(srcdir)/test-localhost-san-last.pem
-
-$(srcdir)/test-ca.cacert:
-       cd $(srcdir); scripts/genroot.sh test
-
-$(srcdir)/test-localhost.pem: $(srcdir)/test-ca.cacert
-       cd $(srcdir); scripts/genserv.sh test-localhost test
-
-$(srcdir)/test-localhost.nn.pem: $(srcdir)/test-ca.cacert
-       cd $(srcdir); scripts/genserv.sh test-localhost.nn test
-
-$(srcdir)/test-localhost0h.pem: $(srcdir)/test-ca.cacert
-       cd $(srcdir); scripts/genserv.sh test-localhost0h test
-
-$(srcdir)/test-localhost-san-first.pem: $(srcdir)/test-ca.cacert
-       cd $(srcdir); scripts/genserv.sh test-localhost-san-first test
-
-$(srcdir)/test-localhost-san-last.pem: $(srcdir)/test-ca.cacert
-       cd $(srcdir); scripts/genserv.sh test-localhost-san-last test
+       rm -f $(GENERATEDCERTS) \
+         test-*.csr \
+         test-*.der \
+         test-*.keyenc \
+         test-ca.cnt* \
+         test-ca.db* \
+         test-ca.raw* \
+         test-ca.srl
+
+build-certs: test-ca.cacert
+
+# Generate all certs in a single shot, but declare just a single target file
+# to support GNU Make <4.3 without "grouped explicit targets" support.
+test-ca.cacert: $(CERTCONFIG_CA) $(CERTCONFIGS) genserv.sh
+       $(srcdir)/genserv.sh test $(CERTCONFIGS)
index 62830464aee9fd9cff1e1ba02e90c0870b4b1033..02e5e99ff79684c87001fea912663ff904ee1d76 100644 (file)
 # SPDX-License-Identifier: curl
 #
 ###########################################################################
-CERTCONFIGS = \
-  test-ca.prm \
+CERTCONFIG_CA = \
   test-ca.cnf \
+  test-ca.prm
+
+CERTCONFIGS = \
   test-localhost.prm \
   test-localhost.nn.prm \
   test-localhost0h.prm \
diff --git a/tests/certs/genserv.sh b/tests/certs/genserv.sh
new file mode 100755 (executable)
index 0000000..1a818f3
--- /dev/null
@@ -0,0 +1,101 @@
+#!/bin/sh
+#***************************************************************************
+#                                  _   _ ____  _
+#  Project                     ___| | | |  _ \| |
+#                             / __| | | | |_) | |
+#                            | (__| |_| |  _ <| |___
+#                             \___|\___/|_| \_\_____|
+#
+# Copyright (C) EdelWeb for EdelKey and OpenEvidence
+#
+# This software is licensed as described in the file COPYING, which
+# you should have received as part of this distribution. The terms
+# are also available at https://curl.se/docs/copyright.html.
+#
+# You may opt to use, copy, modify, merge, publish, distribute and/or sell
+# copies of the Software, and permit persons to whom the Software is
+# furnished to do so, under the terms of the COPYING file.
+#
+# This software is distributed on an "AS IS" basis, WITHOUT WARRANTY OF ANY
+# KIND, either express or implied.
+#
+# SPDX-License-Identifier: curl
+#
+###########################################################################
+
+# exit on first fail
+set -eu
+
+OPENSSL=openssl
+if [ -f /usr/local/ssl/bin/openssl ]; then
+  OPENSSL=/usr/local/ssl/bin/openssl
+fi
+
+USAGE='echo Usage is genserv.sh <caprefix> [<prefix> ...]'
+
+SRCDIR="$(dirname "${0}")"
+
+KEYSIZE=prime256v1
+
+CAPREFIX="${1:-}"
+shift
+if [ -z "$CAPREFIX" ]; then
+  echo 'No CA prefix'
+  $USAGE
+  exit
+elif [ ! -f "$CAPREFIX-ca.cacert" ] || \
+     [ ! -f "$CAPREFIX-ca.key" ]; then
+
+  command -v "$OPENSSL"
+  "$OPENSSL" version
+
+  # Generating CA root
+  PREFIX=$CAPREFIX
+  DURATION=6000
+
+  "$OPENSSL" genpkey -algorithm EC -pkeyopt ec_paramgen_curve:"$KEYSIZE" -pkeyopt ec_param_enc:named_curve \
+    -out "$PREFIX-ca.key" -pass 'pass:secret'
+  "$OPENSSL" req -config "$SRCDIR/$PREFIX-ca.prm" -new -key "$PREFIX-ca.key" -out "$PREFIX-ca.csr" -passin 'pass:secret' 2>/dev/null
+  "$OPENSSL" x509 -sha256 -extfile "$SRCDIR/$PREFIX-ca.prm" -days "$DURATION" \
+    -req -signkey "$PREFIX-ca.key" -in "$PREFIX-ca.csr" -out "$PREFIX-ca.raw-cacert"
+  "$OPENSSL" x509 -in "$PREFIX-ca.raw-cacert" -text -nameopt multiline > "$PREFIX-ca.cacert"
+  "$OPENSSL" x509 -in "$PREFIX-ca.cacert" -outform der -out "$PREFIX-ca.der"
+  "$OPENSSL" x509 -in "$PREFIX-ca.cacert" -text -nameopt multiline > "$PREFIX-ca.crt"
+
+  echo "CA root generated: $PREFIX ${DURATION}days $KEYSIZE"
+fi
+
+DURATION=300
+
+while [ -n "${1:-}" ]; do
+
+  PREFIX="${1%.prm}"
+  shift
+
+  # pseudo-secrets
+  "$OPENSSL" genpkey -algorithm EC -pkeyopt ec_paramgen_curve:"$KEYSIZE" -pkeyopt ec_param_enc:named_curve \
+    -out "$PREFIX.keyenc" -pass 'pass:secret'
+  "$OPENSSL" req -config "$SRCDIR/$PREFIX.prm" -new -key "$PREFIX.keyenc" -out "$PREFIX.csr" -passin 'pass:secret' 2>/dev/null
+  "$OPENSSL" pkey -in "$PREFIX.keyenc" -out "$PREFIX.key" -passin 'pass:secret'
+
+  "$OPENSSL" pkey -in "$PREFIX.key" -pubout -outform DER -out "$PREFIX.pub.der"
+  "$OPENSSL" pkey -in "$PREFIX.key" -pubout -outform PEM -out "$PREFIX.pub.pem"
+  "$OPENSSL" x509 -sha256 -extfile "$SRCDIR/$PREFIX.prm" -days "$DURATION" \
+    -req -CA "$CAPREFIX-ca.cacert" -CAkey "$CAPREFIX-ca.key" -CAcreateserial -in "$PREFIX.csr" > "$PREFIX.crt" 2>/dev/null
+
+  # revoke server cert
+  touch "$CAPREFIX-ca.db"
+  echo 01 > "$CAPREFIX-ca.cnt"
+  "$OPENSSL" ca -config "$SRCDIR/$CAPREFIX-ca.cnf" -revoke "$PREFIX.crt" 2>/dev/null
+
+  # issue CRL
+  "$OPENSSL" ca -config "$SRCDIR/$CAPREFIX-ca.cnf" -gencrl -out "$PREFIX.crl" 2>/dev/null
+
+  "$OPENSSL" x509 -in "$PREFIX.crt" -outform der -out "$PREFIX.der"
+
+  # all together now
+  cat "$SRCDIR/$PREFIX.prm" "$PREFIX.key" "$PREFIX.crt" > "$PREFIX.pem"
+  chmod o-r "$SRCDIR/$PREFIX.prm"
+
+  echo "Certificate generated: CA=$CAPREFIX ${DURATION}days $KEYSIZE $PREFIX"
+done
diff --git a/tests/certs/scripts/Makefile.am b/tests/certs/scripts/Makefile.am
deleted file mode 100644 (file)
index 82b5f27..0000000
+++ /dev/null
@@ -1,30 +0,0 @@
-#***************************************************************************
-#                                  _   _ ____  _
-#  Project                     ___| | | |  _ \| |
-#                             / __| | | | |_) | |
-#                            | (__| |_| |  _ <| |___
-#                             \___|\___/|_| \_\_____|
-#
-# Copyright (C) Daniel Stenberg, <daniel@haxx.se>, et al.
-#
-# This software is licensed as described in the file COPYING, which
-# you should have received as part of this distribution. The terms
-# are also available at https://curl.se/docs/copyright.html.
-#
-# You may opt to use, copy, modify, merge, publish, distribute and/or sell
-# copies of the Software, and permit persons to whom the Software is
-# furnished to do so, under the terms of the COPYING file.
-#
-# This software is distributed on an "AS IS" basis, WITHOUT WARRANTY OF ANY
-# KIND, either express or implied.
-#
-# SPDX-License-Identifier: curl
-#
-###########################################################################
-AUTOMAKE_OPTIONS = foreign
-
-SCRIPTFILES = \
-  genroot.sh \
-  genserv.sh
-
-EXTRA_DIST = $(SCRIPTFILES)
diff --git a/tests/certs/scripts/genroot.sh b/tests/certs/scripts/genroot.sh
deleted file mode 100755 (executable)
index 7f7fa88..0000000
+++ /dev/null
@@ -1,87 +0,0 @@
-#!/usr/bin/env bash
-#***************************************************************************
-#                                  _   _ ____  _
-#  Project                     ___| | | |  _ \| |
-#                             / __| | | | |_) | |
-#                            | (__| |_| |  _ <| |___
-#                             \___|\___/|_| \_\_____|
-#
-# Copyright (C) EdelWeb for EdelKey and OpenEvidence
-#
-# This software is licensed as described in the file COPYING, which
-# you should have received as part of this distribution. The terms
-# are also available at https://curl.se/docs/copyright.html.
-#
-# You may opt to use, copy, modify, merge, publish, distribute and/or sell
-# copies of the Software, and permit persons to whom the Software is
-# furnished to do so, under the terms of the COPYING file.
-#
-# This software is distributed on an "AS IS" basis, WITHOUT WARRANTY OF ANY
-# KIND, either express or implied.
-#
-# SPDX-License-Identifier: curl
-#
-###########################################################################
-
-# exit on first fail
-set -eu
-
-OPENSSL=openssl
-if [ -f /usr/local/ssl/bin/openssl ]; then
-  OPENSSL=/usr/local/ssl/bin/openssl
-fi
-
-command -v "$OPENSSL"
-"$OPENSSL" version
-
-USAGE='echo Usage is genroot.sh <name>'
-
-SRCDIR=$(pwd)
-
-GENDIR=${GENDIR:-$SRCDIR/gen}
-test -d "$GENDIR" || mkdir "$GENDIR"
-cd "$GENDIR"
-
-KEYSIZE=2048
-DURATION=6000
-# The -sha256 option was introduced in OpenSSL 1.0.1
-DIGESTALGO=-sha256
-
-NOTOK=
-
-PREFIX="${1:-}"
-if [ -z "$PREFIX" ]; then
-  echo 'No configuration prefix'
-  NOTOK=1
-else
-  if [ ! -f "$SRCDIR/$PREFIX-ca.prm" ]; then
-    echo "No configuration file $SRCDIR/$PREFIX-ca.prm"
-    NOTOK=1
-  fi
-fi
-
-if [ -n "$NOTOK" ]; then
-  echo 'Sorry, I cannot do that for you.'
-  $USAGE
-  exit
-fi
-
-echo "PREFIX=$PREFIX DURATION=$DURATION KEYSIZE=$KEYSIZE"
-
-set -x
-
-"$OPENSSL" genrsa -out "$PREFIX-ca.key" -passout fd:0 "$KEYSIZE" <<EOF
-pass:secret
-EOF
-"$OPENSSL" req -config "$SRCDIR/$PREFIX-ca.prm" -new -key "$PREFIX-ca.key" -out "$PREFIX-ca.csr" -passin fd:0 <<EOF
-pass:secret
-EOF
-"$OPENSSL" x509 -extfile "$SRCDIR/$PREFIX-ca.prm" -days "$DURATION" -req -signkey "$PREFIX-ca.key" -in "$PREFIX-ca.csr" -out "$PREFIX-ca.raw-cacert" "$DIGESTALGO"
-"$OPENSSL" x509 -text -in "$PREFIX-ca.raw-cacert" -nameopt multiline > "$PREFIX-ca.cacert"
-"$OPENSSL" x509 -in "$PREFIX-ca.cacert" -outform der -out "$PREFIX-ca.der"
-"$OPENSSL" x509 -in "$PREFIX-ca.cacert" -text -nameopt multiline > "$PREFIX-ca.crt"
-
-for ext in key cacert crt; do
-  cp "$PREFIX-ca.$ext" "$SRCDIR"/
-done
-echo "ca root $PREFIX generated."
diff --git a/tests/certs/scripts/genserv.sh b/tests/certs/scripts/genserv.sh
deleted file mode 100755 (executable)
index cf99d51..0000000
+++ /dev/null
@@ -1,131 +0,0 @@
-#!/usr/bin/env bash
-#***************************************************************************
-#                                  _   _ ____  _
-#  Project                     ___| | | |  _ \| |
-#                             / __| | | | |_) | |
-#                            | (__| |_| |  _ <| |___
-#                             \___|\___/|_| \_\_____|
-#
-# Copyright (C) EdelWeb for EdelKey and OpenEvidence
-#
-# This software is licensed as described in the file COPYING, which
-# you should have received as part of this distribution. The terms
-# are also available at https://curl.se/docs/copyright.html.
-#
-# You may opt to use, copy, modify, merge, publish, distribute and/or sell
-# copies of the Software, and permit persons to whom the Software is
-# furnished to do so, under the terms of the COPYING file.
-#
-# This software is distributed on an "AS IS" basis, WITHOUT WARRANTY OF ANY
-# KIND, either express or implied.
-#
-# SPDX-License-Identifier: curl
-#
-###########################################################################
-
-# exit on first fail
-set -eu
-
-OPENSSL=openssl
-if [ -f /usr/local/ssl/bin/openssl ]; then
-  OPENSSL=/usr/local/ssl/bin/openssl
-fi
-
-command -v "$OPENSSL"
-"$OPENSSL" version
-
-USAGE='echo Usage is genserv.sh <prefix> <caprefix>'
-
-SRCDIR=$(pwd)
-
-GENDIR=${GENDIR:-$SRCDIR/gen}
-test -d "$GENDIR" || mkdir "$GENDIR"
-cd "$GENDIR"
-
-KEYSIZE=2048
-DURATION=300
-# The -sha256 option was introduced in OpenSSL 1.0.1
-DIGESTALGO=-sha256
-
-REQ=YES
-P12=NO
-
-NOTOK=
-
-PREFIX="${1:-}"
-if [ -z "$PREFIX" ]; then
-  echo 'No configuration prefix'
-  NOTOK=1
-else
-  if [ ! -f "$SRCDIR/$PREFIX.prm" ]; then
-    echo "No configuration file $SRCDIR/$PREFIX.prm"
-    NOTOK=1
-  fi
-fi
-
-CAPREFIX="${2:-}"
-if [ -z "$CAPREFIX" ]; then
-  echo 'No CA prefix'
-  NOTOK=1
-else
-  if [ ! -f "$CAPREFIX-ca.cacert" ]; then
-    echo "No CA certificate file $CAPREFIX-ca.cacert"
-    NOTOK=1
-  fi
-  if [ ! -f "$CAPREFIX-ca.key" ]; then
-    echo "No $CAPREFIX key"
-    NOTOK=1
-  fi
-fi
-
-if [ -n "$NOTOK" ]; then
-  echo 'Sorry, I cannot do that for you.'
-  $USAGE
-  exit
-fi
-
-echo "PREFIX=$PREFIX CAPREFIX=$CAPREFIX DURATION=$DURATION KEYSIZE=$KEYSIZE"
-
-set -x
-
-if [ "$REQ" = YES ]; then
-  "$OPENSSL" req -config "$SRCDIR/$PREFIX.prm" -newkey "rsa:$KEYSIZE" -keyout "$PREFIX.key" -out "$PREFIX.csr" -passout fd:0 <<EOF
-pass:secret
-EOF
-fi
-
-"$OPENSSL" rsa -in "$PREFIX.key" -out "$PREFIX.key" -passin fd:0 <<EOF
-pass:secret
-EOF
-
-echo 'pseudo secrets generated'
-
-"$OPENSSL" rsa -in "$PREFIX.key" -pubout -outform DER -out "$PREFIX.pub.der"
-"$OPENSSL" rsa -in "$PREFIX.key" -pubout -outform PEM -out "$PREFIX.pub.pem"
-"$OPENSSL" x509 -extfile "$SRCDIR/$PREFIX.prm" -days "$DURATION" -CA "$CAPREFIX-ca.cacert" -CAkey "$CAPREFIX-ca.key" -CAcreateserial -in "$PREFIX.csr" -req -text -nameopt multiline "$DIGESTALGO" > "$PREFIX.crt"
-
-if [ "$P12" = YES ]; then
-  "$OPENSSL" pkcs12 -export -des3 -out "$PREFIX.p12" -caname "$CAPREFIX" -name "$PREFIX" -inkey "$PREFIX.key" -in "$PREFIX.crt" -certfile "$CAPREFIX-ca.crt"
-fi
-
-"$OPENSSL" x509 -noout -text -hash -in "$PREFIX.crt" -nameopt multiline
-
-# revoke server cert
-touch "$CAPREFIX-ca.db"
-echo 01 > "$CAPREFIX-ca.cnt"
-"$OPENSSL" ca -config "$SRCDIR/$CAPREFIX-ca.cnf" -revoke "$PREFIX.crt"
-
-# issue CRL
-"$OPENSSL" ca -config "$SRCDIR/$CAPREFIX-ca.cnf" -gencrl -out "$PREFIX.crl"
-
-"$OPENSSL" x509 -in "$PREFIX.crt" -outform der -out "$PREFIX.der"
-
-# all together now
-cat "$SRCDIR/$PREFIX.prm" "$PREFIX.key" "$PREFIX.crt" > "$PREFIX.pem"
-chmod o-r "$SRCDIR/$PREFIX.prm"
-
-#for ext in crl crt csr der key pem pub.der pub.pem; do
-for ext in crl crt key pem pub.der pub.pem; do
-  cp "$PREFIX.$ext" "$SRCDIR"/
-done
-echo "certificates for $PREFIX generated."
diff --git a/tests/certs/test-ca.cacert b/tests/certs/test-ca.cacert
deleted file mode 100644 (file)
index d95dc13..0000000
+++ /dev/null
@@ -1,99 +0,0 @@
-Certificate:
-    Data:
-        Version: 3 (0x2)
-        Serial Number:
-            ed:c7:ef:5d:c1:2b:f1:2f
-    Signature Algorithm: sha256WithRSAEncryption
-        Issuer:
-            countryName               = NN
-            organizationName          = Edel Curl Arctic Illudium Research Cloud
-            commonName                = Northern Nowhere Trust Anchor
-        Validity
-            Not Before: Mar  6 11:51:47 2025 GMT
-            Not After : Aug  9 11:51:47 2041 GMT
-        Subject:
-            countryName               = NN
-            organizationName          = Edel Curl Arctic Illudium Research Cloud
-            commonName                = Northern Nowhere Trust Anchor
-        Subject Public Key Info:
-            Public Key Algorithm: rsaEncryption
-                RSA Public-Key: (2048 bit)
-                Modulus:
-                    00:cb:e8:c2:61:24:08:95:87:5d:dd:80:67:29:9a:
-                    0a:b0:55:28:1c:86:75:22:ec:8a:a3:ad:e8:3c:88:
-                    2c:bb:a2:5c:48:0a:9b:36:c3:b3:6b:1d:ef:1c:79:
-                    80:05:cb:81:45:93:4d:96:f8:a7:0c:93:84:71:1e:
-                    5a:27:83:16:84:be:0a:fc:08:eb:f6:60:7f:3e:8e:
-                    6d:39:8b:55:7a:c0:a2:7b:8c:a6:45:27:9e:6e:37:
-                    ad:b5:40:8a:83:7c:d2:0d:b0:e2:3d:ed:f5:3d:26:
-                    de:b7:7c:99:3c:56:98:bc:9d:49:bf:c8:ce:12:b5:
-                    40:1e:f7:4e:91:78:80:52:7a:83:84:9e:ec:0d:0e:
-                    18:40:cb:ec:95:76:85:ff:88:9a:8f:12:a4:ef:7e:
-                    7f:30:66:3a:cb:0e:b4:6a:d7:5c:8c:b3:e1:4c:57:
-                    47:45:ec:59:27:80:5b:11:37:1a:cd:41:d0:30:06:
-                    b7:fa:45:0f:37:8b:39:24:c3:3d:55:ba:a9:ef:68:
-                    88:3e:c4:4c:a7:43:44:13:27:06:95:ba:89:74:59:
-                    f8:a6:d0:8f:39:a2:d7:74:dd:9b:95:95:4b:8f:d7:
-                    70:dc:7b:68:cf:ee:9b:89:72:41:1b:2a:d2:b1:a3:
-                    a4:eb:6a:94:c2:e4:d0:ab:93:83:37:d1:12:28:b3:
-                    19:6b
-                Exponent: 65537 (0x10001)
-        X509v3 extensions:
-            X509v3 Basic Constraints: critical
-                CA:TRUE
-            X509v3 Key Usage: critical
-                Certificate Sign, CRL Sign
-            X509v3 Subject Key Identifier: 
-                9D:2B:CE:95:BF:D8:22:91:A2:E5:AD:FE:79:0E:E9:23:E1:4D:28:32
-            X509v3 Authority Key Identifier: 
-                keyid:9D:2B:CE:95:BF:D8:22:91:A2:E5:AD:FE:79:0E:E9:23:E1:4D:28:32
-
-            Authority Information Access: 
-                CA Issuers - URI:http://test.curl.se/ca/EdelCurlRoot.cer
-
-            X509v3 CRL Distribution Points: 
-
-                Full Name:
-                  URI:http://test.curl.se/ca/EdelCurlRoot.crl
-
-    Signature Algorithm: sha256WithRSAEncryption
-         12:fd:0c:0f:2b:d8:e0:45:e3:b3:f4:43:de:e9:bc:5c:ce:6d:
-         56:db:2a:30:cd:d3:46:5d:c1:6b:00:fb:fc:9c:d8:0b:7d:18:
-         f8:ef:9a:84:3e:44:94:0e:ae:f8:5f:69:ed:1a:ac:0b:c1:af:
-         7e:63:83:2c:cb:73:81:ce:f3:88:1c:8b:59:38:42:15:ba:64:
-         08:ff:55:a9:d9:59:1b:3a:c5:90:b2:fe:19:a6:22:73:f5:a8:
-         c2:58:45:5a:c8:13:2f:cd:39:7f:67:86:17:26:9e:56:19:e6:
-         b9:72:39:a4:21:a9:99:9c:8d:71:15:33:c7:25:90:b5:df:65:
-         9d:35:22:13:a4:b2:e1:56:00:fd:5b:ca:65:58:0d:46:13:fe:
-         d7:ba:c4:3a:56:24:79:cf:e8:fa:26:25:b9:f7:48:31:e8:c3:
-         fd:30:d7:a9:d3:a3:cf:6c:ca:03:d5:b4:54:cd:05:a6:67:a4:
-         ca:fb:25:29:0e:00:e8:cc:37:86:91:4b:e4:8a:f4:eb:15:4c:
-         d6:d6:f5:87:61:00:eb:dd:a9:d8:09:56:ca:e4:1c:1c:79:04:
-         6e:fd:9d:00:54:6a:e1:78:14:c0:a2:ca:c1:07:39:82:57:9e:
-         63:d9:b8:d4:20:96:25:da:59:fe:da:3a:d4:fe:e4:74:f1:19:
-         56:63:01:46
------BEGIN CERTIFICATE-----
-MIIENzCCAx+gAwIBAgIJAO3H713BK/EvMA0GCSqGSIb3DQEBCwUAMGgxCzAJBgNV
-BAYTAk5OMTEwLwYDVQQKDChFZGVsIEN1cmwgQXJjdGljIElsbHVkaXVtIFJlc2Vh
-cmNoIENsb3VkMSYwJAYDVQQDDB1Ob3J0aGVybiBOb3doZXJlIFRydXN0IEFuY2hv
-cjAeFw0yNTAzMDYxMTUxNDdaFw00MTA4MDkxMTUxNDdaMGgxCzAJBgNVBAYTAk5O
-MTEwLwYDVQQKDChFZGVsIEN1cmwgQXJjdGljIElsbHVkaXVtIFJlc2VhcmNoIENs
-b3VkMSYwJAYDVQQDDB1Ob3J0aGVybiBOb3doZXJlIFRydXN0IEFuY2hvcjCCASIw
-DQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAMvowmEkCJWHXd2AZymaCrBVKByG
-dSLsiqOt6DyILLuiXEgKmzbDs2sd7xx5gAXLgUWTTZb4pwyThHEeWieDFoS+CvwI
-6/Zgfz6ObTmLVXrAonuMpkUnnm43rbVAioN80g2w4j3t9T0m3rd8mTxWmLydSb/I
-zhK1QB73TpF4gFJ6g4Se7A0OGEDL7JV2hf+Imo8SpO9+fzBmOssOtGrXXIyz4UxX
-R0XsWSeAWxE3Gs1B0DAGt/pFDzeLOSTDPVW6qe9oiD7ETKdDRBMnBpW6iXRZ+KbQ
-jzmi13Tdm5WVS4/XcNx7aM/um4lyQRsq0rGjpOtqlMLk0KuTgzfREiizGWsCAwEA
-AaOB4zCB4DAPBgNVHRMBAf8EBTADAQH/MA4GA1UdDwEB/wQEAwIBBjAdBgNVHQ4E
-FgQUnSvOlb/YIpGi5a3+eQ7pI+FNKDIwHwYDVR0jBBgwFoAUnSvOlb/YIpGi5a3+
-eQ7pI+FNKDIwQwYIKwYBBQUHAQEENzA1MDMGCCsGAQUFBzAChidodHRwOi8vdGVz
-dC5jdXJsLnNlL2NhL0VkZWxDdXJsUm9vdC5jZXIwOAYDVR0fBDEwLzAtoCugKYYn
-aHR0cDovL3Rlc3QuY3VybC5zZS9jYS9FZGVsQ3VybFJvb3QuY3JsMA0GCSqGSIb3
-DQEBCwUAA4IBAQAS/QwPK9jgReOz9EPe6bxczm1W2yowzdNGXcFrAPv8nNgLfRj4
-75qEPkSUDq74X2ntGqwLwa9+Y4Msy3OBzvOIHItZOEIVumQI/1Wp2VkbOsWQsv4Z
-piJz9ajCWEVayBMvzTl/Z4YXJp5WGea5cjmkIamZnI1xFTPHJZC132WdNSITpLLh
-VgD9W8plWA1GE/7XusQ6ViR5z+j6JiW590gx6MP9MNep06PPbMoD1bRUzQWmZ6TK
-+yUpDgDozDeGkUvkivTrFUzW1vWHYQDr3anYCVbK5BwceQRu/Z0AVGrheBTAosrB
-BzmCV55j2bjUIJYl2ln+2jrU/uR08RlWYwFG
------END CERTIFICATE-----
diff --git a/tests/certs/test-ca.crt b/tests/certs/test-ca.crt
deleted file mode 100644 (file)
index d95dc13..0000000
+++ /dev/null
@@ -1,99 +0,0 @@
-Certificate:
-    Data:
-        Version: 3 (0x2)
-        Serial Number:
-            ed:c7:ef:5d:c1:2b:f1:2f
-    Signature Algorithm: sha256WithRSAEncryption
-        Issuer:
-            countryName               = NN
-            organizationName          = Edel Curl Arctic Illudium Research Cloud
-            commonName                = Northern Nowhere Trust Anchor
-        Validity
-            Not Before: Mar  6 11:51:47 2025 GMT
-            Not After : Aug  9 11:51:47 2041 GMT
-        Subject:
-            countryName               = NN
-            organizationName          = Edel Curl Arctic Illudium Research Cloud
-            commonName                = Northern Nowhere Trust Anchor
-        Subject Public Key Info:
-            Public Key Algorithm: rsaEncryption
-                RSA Public-Key: (2048 bit)
-                Modulus:
-                    00:cb:e8:c2:61:24:08:95:87:5d:dd:80:67:29:9a:
-                    0a:b0:55:28:1c:86:75:22:ec:8a:a3:ad:e8:3c:88:
-                    2c:bb:a2:5c:48:0a:9b:36:c3:b3:6b:1d:ef:1c:79:
-                    80:05:cb:81:45:93:4d:96:f8:a7:0c:93:84:71:1e:
-                    5a:27:83:16:84:be:0a:fc:08:eb:f6:60:7f:3e:8e:
-                    6d:39:8b:55:7a:c0:a2:7b:8c:a6:45:27:9e:6e:37:
-                    ad:b5:40:8a:83:7c:d2:0d:b0:e2:3d:ed:f5:3d:26:
-                    de:b7:7c:99:3c:56:98:bc:9d:49:bf:c8:ce:12:b5:
-                    40:1e:f7:4e:91:78:80:52:7a:83:84:9e:ec:0d:0e:
-                    18:40:cb:ec:95:76:85:ff:88:9a:8f:12:a4:ef:7e:
-                    7f:30:66:3a:cb:0e:b4:6a:d7:5c:8c:b3:e1:4c:57:
-                    47:45:ec:59:27:80:5b:11:37:1a:cd:41:d0:30:06:
-                    b7:fa:45:0f:37:8b:39:24:c3:3d:55:ba:a9:ef:68:
-                    88:3e:c4:4c:a7:43:44:13:27:06:95:ba:89:74:59:
-                    f8:a6:d0:8f:39:a2:d7:74:dd:9b:95:95:4b:8f:d7:
-                    70:dc:7b:68:cf:ee:9b:89:72:41:1b:2a:d2:b1:a3:
-                    a4:eb:6a:94:c2:e4:d0:ab:93:83:37:d1:12:28:b3:
-                    19:6b
-                Exponent: 65537 (0x10001)
-        X509v3 extensions:
-            X509v3 Basic Constraints: critical
-                CA:TRUE
-            X509v3 Key Usage: critical
-                Certificate Sign, CRL Sign
-            X509v3 Subject Key Identifier: 
-                9D:2B:CE:95:BF:D8:22:91:A2:E5:AD:FE:79:0E:E9:23:E1:4D:28:32
-            X509v3 Authority Key Identifier: 
-                keyid:9D:2B:CE:95:BF:D8:22:91:A2:E5:AD:FE:79:0E:E9:23:E1:4D:28:32
-
-            Authority Information Access: 
-                CA Issuers - URI:http://test.curl.se/ca/EdelCurlRoot.cer
-
-            X509v3 CRL Distribution Points: 
-
-                Full Name:
-                  URI:http://test.curl.se/ca/EdelCurlRoot.crl
-
-    Signature Algorithm: sha256WithRSAEncryption
-         12:fd:0c:0f:2b:d8:e0:45:e3:b3:f4:43:de:e9:bc:5c:ce:6d:
-         56:db:2a:30:cd:d3:46:5d:c1:6b:00:fb:fc:9c:d8:0b:7d:18:
-         f8:ef:9a:84:3e:44:94:0e:ae:f8:5f:69:ed:1a:ac:0b:c1:af:
-         7e:63:83:2c:cb:73:81:ce:f3:88:1c:8b:59:38:42:15:ba:64:
-         08:ff:55:a9:d9:59:1b:3a:c5:90:b2:fe:19:a6:22:73:f5:a8:
-         c2:58:45:5a:c8:13:2f:cd:39:7f:67:86:17:26:9e:56:19:e6:
-         b9:72:39:a4:21:a9:99:9c:8d:71:15:33:c7:25:90:b5:df:65:
-         9d:35:22:13:a4:b2:e1:56:00:fd:5b:ca:65:58:0d:46:13:fe:
-         d7:ba:c4:3a:56:24:79:cf:e8:fa:26:25:b9:f7:48:31:e8:c3:
-         fd:30:d7:a9:d3:a3:cf:6c:ca:03:d5:b4:54:cd:05:a6:67:a4:
-         ca:fb:25:29:0e:00:e8:cc:37:86:91:4b:e4:8a:f4:eb:15:4c:
-         d6:d6:f5:87:61:00:eb:dd:a9:d8:09:56:ca:e4:1c:1c:79:04:
-         6e:fd:9d:00:54:6a:e1:78:14:c0:a2:ca:c1:07:39:82:57:9e:
-         63:d9:b8:d4:20:96:25:da:59:fe:da:3a:d4:fe:e4:74:f1:19:
-         56:63:01:46
------BEGIN CERTIFICATE-----
-MIIENzCCAx+gAwIBAgIJAO3H713BK/EvMA0GCSqGSIb3DQEBCwUAMGgxCzAJBgNV
-BAYTAk5OMTEwLwYDVQQKDChFZGVsIEN1cmwgQXJjdGljIElsbHVkaXVtIFJlc2Vh
-cmNoIENsb3VkMSYwJAYDVQQDDB1Ob3J0aGVybiBOb3doZXJlIFRydXN0IEFuY2hv
-cjAeFw0yNTAzMDYxMTUxNDdaFw00MTA4MDkxMTUxNDdaMGgxCzAJBgNVBAYTAk5O
-MTEwLwYDVQQKDChFZGVsIEN1cmwgQXJjdGljIElsbHVkaXVtIFJlc2VhcmNoIENs
-b3VkMSYwJAYDVQQDDB1Ob3J0aGVybiBOb3doZXJlIFRydXN0IEFuY2hvcjCCASIw
-DQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAMvowmEkCJWHXd2AZymaCrBVKByG
-dSLsiqOt6DyILLuiXEgKmzbDs2sd7xx5gAXLgUWTTZb4pwyThHEeWieDFoS+CvwI
-6/Zgfz6ObTmLVXrAonuMpkUnnm43rbVAioN80g2w4j3t9T0m3rd8mTxWmLydSb/I
-zhK1QB73TpF4gFJ6g4Se7A0OGEDL7JV2hf+Imo8SpO9+fzBmOssOtGrXXIyz4UxX
-R0XsWSeAWxE3Gs1B0DAGt/pFDzeLOSTDPVW6qe9oiD7ETKdDRBMnBpW6iXRZ+KbQ
-jzmi13Tdm5WVS4/XcNx7aM/um4lyQRsq0rGjpOtqlMLk0KuTgzfREiizGWsCAwEA
-AaOB4zCB4DAPBgNVHRMBAf8EBTADAQH/MA4GA1UdDwEB/wQEAwIBBjAdBgNVHQ4E
-FgQUnSvOlb/YIpGi5a3+eQ7pI+FNKDIwHwYDVR0jBBgwFoAUnSvOlb/YIpGi5a3+
-eQ7pI+FNKDIwQwYIKwYBBQUHAQEENzA1MDMGCCsGAQUFBzAChidodHRwOi8vdGVz
-dC5jdXJsLnNlL2NhL0VkZWxDdXJsUm9vdC5jZXIwOAYDVR0fBDEwLzAtoCugKYYn
-aHR0cDovL3Rlc3QuY3VybC5zZS9jYS9FZGVsQ3VybFJvb3QuY3JsMA0GCSqGSIb3
-DQEBCwUAA4IBAQAS/QwPK9jgReOz9EPe6bxczm1W2yowzdNGXcFrAPv8nNgLfRj4
-75qEPkSUDq74X2ntGqwLwa9+Y4Msy3OBzvOIHItZOEIVumQI/1Wp2VkbOsWQsv4Z
-piJz9ajCWEVayBMvzTl/Z4YXJp5WGea5cjmkIamZnI1xFTPHJZC132WdNSITpLLh
-VgD9W8plWA1GE/7XusQ6ViR5z+j6JiW590gx6MP9MNep06PPbMoD1bRUzQWmZ6TK
-+yUpDgDozDeGkUvkivTrFUzW1vWHYQDr3anYCVbK5BwceQRu/Z0AVGrheBTAosrB
-BzmCV55j2bjUIJYl2ln+2jrU/uR08RlWYwFG
------END CERTIFICATE-----
diff --git a/tests/certs/test-ca.key b/tests/certs/test-ca.key
deleted file mode 100644 (file)
index 0a2fe65..0000000
+++ /dev/null
@@ -1,27 +0,0 @@
------BEGIN RSA PRIVATE KEY-----
-MIIEowIBAAKCAQEAy+jCYSQIlYdd3YBnKZoKsFUoHIZ1IuyKo63oPIgsu6JcSAqb
-NsOzax3vHHmABcuBRZNNlvinDJOEcR5aJ4MWhL4K/Ajr9mB/Po5tOYtVesCie4ym
-RSeebjettUCKg3zSDbDiPe31PSbet3yZPFaYvJ1Jv8jOErVAHvdOkXiAUnqDhJ7s
-DQ4YQMvslXaF/4iajxKk735/MGY6yw60atdcjLPhTFdHRexZJ4BbETcazUHQMAa3
-+kUPN4s5JMM9Vbqp72iIPsRMp0NEEycGlbqJdFn4ptCPOaLXdN2blZVLj9dw3Hto
-z+6biXJBGyrSsaOk62qUwuTQq5ODN9ESKLMZawIDAQABAoIBACGH+BbzTvoP1Y6s
-I8rCiwluJ3dxYOfKUA4UdgEmP3zneRdbryR1UBbISF69WCEb0vk2/OZbo1S9GWVk
-oVyoANb5TWMesHbGbYZC85En6XmTHeUFPv5WQoZLX6RTpbNznjMkKEAY1mAk+TDh
-K22xq9IwZ0VDZyfKaG3vKxte3nMxaMyT3Gaa8KZGrHI8OgDhd9ty9pzwKkQJslFm
-gObVtGpVNWnKLaHBRre4KcAj8dFxo+alu3a+rIzfUf1fFBLC5LB+m0n2xjoWyyxU
-ahKY2YNv8dgOMlxK62TXJT0VtSZSeBOSU+Wyz+KCZHJKS0pMM/QyijwLTPxgpAtk
-DGwqE8ECgYEA/YNVqFGw8xPTx5pkYl+3Wb84MwdyKc4/fgyOO2tCl6wgvt1EGWvd
-fr3v9m+K2zLwxhIQ1WalUE+zghgT4no4NDc1u3XNoduwyua8RAnu+g0UkyP+U4+Q
-ZoIBgdytTL7NkIRIipPY9hGAC+qK2cu1NvURbIRkUx0R1Y89ASnyu2ECgYEAzejZ
-4ZeCsdfr2KkOGGLOH7NODjxbgHHy5Z97pLK+zuaR25k/nQYBccxupp0eiAU5RuvS
-6oXkCEUIpvOTOCHrCg5M+3jvD67UOA9gFa+SKswSyw+EVTZbtPaBT0hiKHsax6mw
-qOHHE7pzmTP6/CNxedqLRLxEpxY5Q+dVw2iWtEsCgYAg3lNPxG+txGdT3MehHYnX
-H/y4WQHLO8ttm1EhkRGMOqvwMx3uMdcA5L1k9SdKrjsbYyI9mNZcKEk818RUO8Zn
-trTHvklP7/znAa1tIOCUGPgO7768tMNjFv39CVCKv75FO3FwTiT2GmTApsMj4851
-9qYwrKWZRQ6X4r9lFDw9YQKBgCoEMrmKzht2IOUUEhE90Cu9zdav0EgUeGkMsxE3
-fCICAI9b5RQojpDnE0kiVIGS904WfvJmIdLiK1LN7yOMIEbsBh9mXPnJRfqugH/M
-VLow7EDNSMaOkgYKKva/oW/7Nsq5QJglghbve/kuFy/uF5Cy3KpI9IVXzpWhlemK
-5P2jAoGBAKEspNFmBoktf0xcFjjL60aZVIFsUptajwc/Zolp89B8RznqOa4PY4Yy
-VOmCYJKOlc8z9H3guhE15mT3h4rVfITJQZtN+fbvSo6ZIWrJpTOXIxL817k9ABLC
-F6axj6OPoQnvKSCGMG8HZUSAmsP9zuXB9q+rv9S6Vx7/pbKJAPwo
------END RSA PRIVATE KEY-----
diff --git a/tests/certs/test-localhost-san-first.crl b/tests/certs/test-localhost-san-first.crl
deleted file mode 100644 (file)
index 50bee84..0000000
+++ /dev/null
@@ -1,38 +0,0 @@
------BEGIN X509 CRL-----
-MIIGljCCBX4CAQEwDQYJKoZIhvcNAQELBQAwaDELMAkGA1UEBhMCTk4xMTAvBgNV
-BAoMKEVkZWwgQ3VybCBBcmN0aWMgSWxsdWRpdW0gUmVzZWFyY2ggQ2xvdWQxJjAk
-BgNVBAMMHU5vcnRoZXJuIE5vd2hlcmUgVHJ1c3QgQW5jaG9yFw0yNTAzMDYxMTUx
-NDhaFw0yNTA0MDUxMTUxNDhaMIIE0DAaAgkAgTTILYHwU/cXDTI1MDMwNjEwMTkz
-NFowGgIJAIE0yC2B8FP4Fw0yNTAzMDYxMDE5MzRaMBoCCQCBNMgtgfBT+RcNMjUw
-MzA2MTAxOTM0WjAaAgkAgTTILYHwU/oXDTI1MDMwNjEwMTkzNVowGgIJAIE0yC2B
-8FP7Fw0yNTAzMDYxMDE5MzVaMBoCCQCBNMgtgfBT/BcNMjUwMzA2MTAxOTM1WjAa
-AgkAgTTILYHwU/0XDTI1MDMwNjEwNDMzOVowGgIJAIE0yC2B8FP+Fw0yNTAzMDYx
-MDQzMzlaMBoCCQCBNMgtgfBT/xcNMjUwMzA2MTA0MzQwWjAaAgkAgTTILYHwVAAX
-DTI1MDMwNjEwNDM0MFowGgIJAIE0yC2B8FQBFw0yNTAzMDYxMDQzNDBaMBoCCQCB
-NMgtgfBUAhcNMjUwMzA2MTA0NjA4WjAaAgkAgTTILYHwVAMXDTI1MDMwNjEwNDYw
-OFowGgIJAIE0yC2B8FQEFw0yNTAzMDYxMDQ2MDhaMBoCCQCBNMgtgfBUBRcNMjUw
-MzA2MTA0NjA4WjAaAgkAgTTILYHwVAYXDTI1MDMwNjEwNDYwOVowGgIJAIE0yC2B
-8FQHFw0yNTAzMDYxMDQ2MDlaMBoCCQCBNMgtgfBUCBcNMjUwMzA2MTA0ODU5WjAa
-AgkAgTTILYHwVAkXDTI1MDMwNjEwNDg1OVowGgIJAIE0yC2B8FQKFw0yNTAzMDYx
-MDQ4NTlaMBoCCQCBNMgtgfBUCxcNMjUwMzA2MTA0ODU5WjAaAgkAgTTILYHwVAwX
-DTI1MDMwNjEwNDkwMFowGgIJAIE0yC2B8FQNFw0yNTAzMDYxMDQ5MDBaMBoCCQCB
-NMgtgfBUDhcNMjUwMzA2MTExMzM4WjAaAgkAgTTILYHwVA8XDTI1MDMwNjExMTMz
-OFowGgIJAIE0yC2B8FQQFw0yNTAzMDYxMTEzMzhaMBoCCQCBNMgtgfBUERcNMjUw
-MzA2MTExMzM4WjAaAgkAgTTILYHwVBIXDTI1MDMwNjExMTMzOFowGgIJAIE0yC2B
-8FQTFw0yNTAzMDYxMTE1MzBaMBoCCQCBNMgtgfBUFBcNMjUwMzA2MTExNTMwWjAa
-AgkAgTTILYHwVBUXDTI1MDMwNjExMTUzMFowGgIJAIE0yC2B8FQWFw0yNTAzMDYx
-MTE1MzBaMBoCCQCBNMgtgfBUFxcNMjUwMzA2MTExNTMwWjAaAgkAgTTILYHwVBgX
-DTI1MDMwNjExMTUzMFowGgIJAIE0yC2B8FQZFw0yNTAzMDYxMTE5MDNaMBoCCQCB
-NMgtgfBUGhcNMjUwMzA2MTExOTA0WjAaAgkAgTTILYHwVBsXDTI1MDMwNjExMTkw
-NFowGgIJAIE0yC2B8FQcFw0yNTAzMDYxMTE5MDRaMBoCCQCBNMgtgfBUHRcNMjUw
-MzA2MTExOTA0WjAaAgkAgTTILYHwVB4XDTI1MDMwNjExMTkwNFowGgIJAIE0yC2B
-8FQfFw0yNTAzMDYxMTUxNDdaMBoCCQCBNMgtgfBUIBcNMjUwMzA2MTE1MTQ4WjAa
-AgkAgTTILYHwVCEXDTI1MDMwNjExNTE0OFowGgIJAIE0yC2B8FQiFw0yNTAzMDYx
-MTUxNDhaoA4wDDAKBgNVHRQEAwIBATANBgkqhkiG9w0BAQsFAAOCAQEAOdQrSZ52
-zX1CEvfAPHLbvjj7XFeF3OLNPd64+B81dqh9WuLix5xbKQjhpMNj0Qyypc3COvka
-Uzz+H13LzJL4lC4Wt8lawZu0zLeUJ/4oEXxq1wAlwQ/V2ZcE8scVd2t3YRs3IWLi
-u1Gpoq7RSiFv2Zh+EaF3o7VcEdhdKvckQ+lxrZgcEYt5HRz2+/yY8RAhPN1JDw++
-+M1PBgJPj11pKpz01mJ0hYH2lDFC3sTb4dxVGCUDTtg/Be21NF48+OoCBG++JPk1
-EZB/3U5+4UECgQCdBTO14xAt3S21dt2EMIN67bGi943rskxrvrS0V2WXAfMZi15g
-jvjUTbJ/o2Q71w==
------END X509 CRL-----
diff --git a/tests/certs/test-localhost-san-first.crt b/tests/certs/test-localhost-san-first.crt
deleted file mode 100644 (file)
index 84ce9e4..0000000
+++ /dev/null
@@ -1,104 +0,0 @@
-Certificate:
-    Data:
-        Version: 3 (0x2)
-        Serial Number:
-            81:34:c8:2d:81:f0:54:22
-    Signature Algorithm: sha256WithRSAEncryption
-        Issuer:
-            countryName               = NN
-            organizationName          = Edel Curl Arctic Illudium Research Cloud
-            commonName                = Northern Nowhere Trust Anchor
-        Validity
-            Not Before: Mar  6 11:51:48 2025 GMT
-            Not After : Dec 31 11:51:48 2025 GMT
-        Subject:
-            countryName               = NN
-            organizationName          = Edel Curl Arctic Illudium Research Cloud
-            commonName                = localhost.nn
-        Subject Public Key Info:
-            Public Key Algorithm: rsaEncryption
-                RSA Public-Key: (2048 bit)
-                Modulus:
-                    00:b5:4b:5e:a7:57:ac:05:72:11:73:eb:e1:c9:18:
-                    3c:44:cf:98:c1:00:26:4b:db:ad:1f:2c:32:e5:4b:
-                    e8:e3:00:31:8c:24:84:42:f3:7a:53:7f:e8:c1:89:
-                    08:8a:9b:b6:cc:d2:68:17:21:4e:2d:03:ae:58:4e:
-                    71:ea:46:8d:a2:85:18:0e:33:11:6b:ed:82:b3:f0:
-                    ef:d9:55:7c:22:f3:cf:e3:6a:e0:55:5c:34:c0:44:
-                    64:ca:bb:80:46:d6:0f:4a:c9:9d:60:fb:ff:d7:20:
-                    4f:ba:76:09:b0:ce:96:66:e4:7f:90:c1:c3:ae:d2:
-                    b6:6b:f2:06:7d:d0:77:f2:8b:25:e9:01:dc:9e:e9:
-                    1f:97:cd:19:6e:ef:5d:b2:eb:61:aa:33:c3:0a:f0:
-                    d0:58:c3:2a:57:85:a9:f7:37:ec:3a:a5:c5:56:46:
-                    b4:df:71:3f:1d:c0:29:e1:0d:c5:17:cf:bb:bc:cc:
-                    c9:86:d8:6e:93:4a:63:8e:46:d1:03:d1:18:23:f6:
-                    f5:32:88:b3:e1:c0:4f:30:16:15:b7:e7:64:99:e1:
-                    59:54:2d:1d:ac:7f:74:3f:9b:da:c5:4d:3f:3b:2a:
-                    92:36:e4:3e:af:0a:d8:51:d2:17:a4:7f:d0:96:8e:
-                    79:27:85:db:75:dd:36:7b:ac:0a:d3:b0:25:db:a0:
-                    4a:b5
-                Exponent: 65537 (0x10001)
-        X509v3 extensions:
-            X509v3 Subject Alternative Name: 
-                DNS:localhost, DNS:localhost1, DNS:localhost2
-            X509v3 Key Usage: 
-                Digital Signature, Key Encipherment, Key Agreement
-            X509v3 Extended Key Usage: 
-                TLS Web Server Authentication
-            X509v3 Subject Key Identifier: 
-                BD:FE:8D:9C:5D:FF:AC:9B:EC:06:1C:24:60:6A:DA:C1:58:54:40:40
-            X509v3 Authority Key Identifier: 
-                keyid:9D:2B:CE:95:BF:D8:22:91:A2:E5:AD:FE:79:0E:E9:23:E1:4D:28:32
-
-            X509v3 Basic Constraints: 
-                CA:FALSE
-            Authority Information Access: 
-                CA Issuers - URI:http://test.curl.se/ca/EdelCurlRoot.cer
-
-            X509v3 CRL Distribution Points: 
-
-                Full Name:
-                  URI:http://test.curl.se/ca/EdelCurlRoot.crl
-
-    Signature Algorithm: sha256WithRSAEncryption
-         01:5f:58:90:09:4c:e5:f2:f6:0c:73:ac:43:75:34:79:7c:5a:
-         2b:e6:43:33:40:1b:5e:97:75:09:44:98:dd:8b:61:d2:8a:d2:
-         be:d8:04:10:5c:eb:82:11:23:8f:dd:53:51:fa:dc:07:6a:d3:
-         f2:8b:9b:63:1b:22:6b:07:b6:02:7c:dd:e7:ea:33:34:da:ea:
-         48:22:ee:c8:bb:26:d3:b8:7e:f7:6b:46:07:ea:6a:1a:20:94:
-         7a:3f:2a:a1:5a:c5:e7:95:58:b9:9c:95:9f:db:2f:1d:ab:fe:
-         1b:d8:97:88:29:28:05:86:15:57:cc:52:25:26:8c:84:48:ea:
-         33:d7:3c:32:4c:58:96:34:2e:3c:27:2d:72:24:c3:96:93:42:
-         48:c4:9f:c5:b3:29:56:30:e2:e0:d1:53:e2:f5:07:71:b1:74:
-         6d:bc:8c:c8:30:ca:90:74:8a:61:49:13:99:7b:77:1d:d0:91:
-         7f:ad:11:73:ab:ce:0b:8d:67:65:38:7e:a7:5f:f1:76:14:4e:
-         90:9b:04:ec:e9:27:45:45:b5:45:02:2c:3b:e4:37:46:5e:93:
-         fc:b5:19:c7:4f:a3:cb:df:25:7d:6f:7e:31:93:3c:4a:9f:71:
-         19:9b:ef:d5:01:6c:48:40:7f:91:16:82:c8:71:29:2e:2a:4e:
-         a0:0e:99:b3
------BEGIN CERTIFICATE-----
-MIIEYjCCA0qgAwIBAgIJAIE0yC2B8FQiMA0GCSqGSIb3DQEBCwUAMGgxCzAJBgNV
-BAYTAk5OMTEwLwYDVQQKDChFZGVsIEN1cmwgQXJjdGljIElsbHVkaXVtIFJlc2Vh
-cmNoIENsb3VkMSYwJAYDVQQDDB1Ob3J0aGVybiBOb3doZXJlIFRydXN0IEFuY2hv
-cjAeFw0yNTAzMDYxMTUxNDhaFw0yNTEyMzExMTUxNDhaMFcxCzAJBgNVBAYTAk5O
-MTEwLwYDVQQKDChFZGVsIEN1cmwgQXJjdGljIElsbHVkaXVtIFJlc2VhcmNoIENs
-b3VkMRUwEwYDVQQDDAxsb2NhbGhvc3Qubm4wggEiMA0GCSqGSIb3DQEBAQUAA4IB
-DwAwggEKAoIBAQC1S16nV6wFchFz6+HJGDxEz5jBACZL260fLDLlS+jjADGMJIRC
-83pTf+jBiQiKm7bM0mgXIU4tA65YTnHqRo2ihRgOMxFr7YKz8O/ZVXwi88/jauBV
-XDTARGTKu4BG1g9KyZ1g+//XIE+6dgmwzpZm5H+QwcOu0rZr8gZ90HfyiyXpAdye
-6R+XzRlu712y62GqM8MK8NBYwypXhan3N+w6pcVWRrTfcT8dwCnhDcUXz7u8zMmG
-2G6TSmOORtED0Rgj9vUyiLPhwE8wFhW352SZ4VlULR2sf3Q/m9rFTT87KpI25D6v
-CthR0hekf9CWjnknhdt13TZ7rArTsCXboEq1AgMBAAGjggEeMIIBGjAsBgNVHREE
-JTAjgglsb2NhbGhvc3SCCmxvY2FsaG9zdDGCCmxvY2FsaG9zdDIwCwYDVR0PBAQD
-AgOoMBMGA1UdJQQMMAoGCCsGAQUFBwMBMB0GA1UdDgQWBBS9/o2cXf+sm+wGHCRg
-atrBWFRAQDAfBgNVHSMEGDAWgBSdK86Vv9gikaLlrf55Dukj4U0oMjAJBgNVHRME
-AjAAMEMGCCsGAQUFBwEBBDcwNTAzBggrBgEFBQcwAoYnaHR0cDovL3Rlc3QuY3Vy
-bC5zZS9jYS9FZGVsQ3VybFJvb3QuY2VyMDgGA1UdHwQxMC8wLaAroCmGJ2h0dHA6
-Ly90ZXN0LmN1cmwuc2UvY2EvRWRlbEN1cmxSb290LmNybDANBgkqhkiG9w0BAQsF
-AAOCAQEAAV9YkAlM5fL2DHOsQ3U0eXxaK+ZDM0AbXpd1CUSY3Yth0orSvtgEEFzr
-ghEjj91TUfrcB2rT8oubYxsiawe2Anzd5+ozNNrqSCLuyLsm07h+92tGB+pqGiCU
-ej8qoVrF55VYuZyVn9svHav+G9iXiCkoBYYVV8xSJSaMhEjqM9c8MkxYljQuPCct
-ciTDlpNCSMSfxbMpVjDi4NFT4vUHcbF0bbyMyDDKkHSKYUkTmXt3HdCRf60Rc6vO
-C41nZTh+p1/xdhROkJsE7OknRUW1RQIsO+Q3Rl6T/LUZx0+jy98lfW9+MZM8Sp9x
-GZvv1QFsSEB/kRaCyHEpLipOoA6Zsw==
------END CERTIFICATE-----
diff --git a/tests/certs/test-localhost-san-first.key b/tests/certs/test-localhost-san-first.key
deleted file mode 100644 (file)
index 7e17bb1..0000000
+++ /dev/null
@@ -1,27 +0,0 @@
------BEGIN RSA PRIVATE KEY-----
-MIIEpAIBAAKCAQEAtUtep1esBXIRc+vhyRg8RM+YwQAmS9utHywy5Uvo4wAxjCSE
-QvN6U3/owYkIipu2zNJoFyFOLQOuWE5x6kaNooUYDjMRa+2Cs/Dv2VV8IvPP42rg
-VVw0wERkyruARtYPSsmdYPv/1yBPunYJsM6WZuR/kMHDrtK2a/IGfdB38osl6QHc
-nukfl80Zbu9dsuthqjPDCvDQWMMqV4Wp9zfsOqXFVka033E/HcAp4Q3FF8+7vMzJ
-hthuk0pjjkbRA9EYI/b1Moiz4cBPMBYVt+dkmeFZVC0drH90P5vaxU0/OyqSNuQ+
-rwrYUdIXpH/Qlo55J4Xbdd02e6wK07Al26BKtQIDAQABAoIBAQCmYwn4I6qpRMtn
-zLFoUmnd7XmQiIadUHxPA82iTEztKZxPtqP8nmFCiT4hgZbpP4hB60nFELgi8CHu
-wfAix6Xt5qDxR0VR/KXcZ+B5Ys+PdJzzZ3+EWB/B5gNrXTKZ0JQwW2GpRR7FXc5O
-n069ipzWyheZz3u8037BC1uR1OaBHk/qift96QxENFSl6UXMNJwJndVZmnVzTsXK
-sPMtjWiXD36EZkaMB7kFZGYWLYqS+csA2jboPBLqcxuQ/rRjtocuchFrSzhdyR/9
-DZyo1aPdhTDaelt0Zfa1dZB2YEVpsUcgDF7oIIJwVKOlurylarMjQ45ZS4i89Gp5
-RaSQByaBAoGBAOWVvcunQIiagHUJkc3sHI1idI9LLi3Me/MfYHrNfaYy0rbJ2JxU
-sZdzcQ9Of9djb1M5Xu68RiTK+f6S3T90wba0LYAASwl7qGC1xpofRh/FlLzfjHgG
-VEVC6Rlm6Mjh2y4V4SP5J9XeiZDrGjtbXX3ZGH8YcO14SHGk4NvPhYrdAoGBAMon
-RBvUYZIUvWSYT+i5ZjYpo6kemwXG+nJfsux3ehB8aLbJbRQw3aGDvfh+wZy7qV4Z
-nZfFkg2xERaQ5XfgFclePwfgAk1SFUkBdmky+52mjKo2ggLuvSPN6c4RwuHM3LWe
-05wln0ZF5kKMHjjwl42OlOtVonutNItrc3wB8SW5AoGAJ3LkauLxPse1fObJC+Yf
-PdgGCT000R/KyIrCrDc0+OLQvCHQu4P+A/UNH0EwzFTEozs/aawmLVpHPIwFwkqQ
-opExJEZonleGJh/14TOwe/MaTJ3o6BLGViRaI0hAhYvxemi+B81fH+ueHa2YE0zu
-spokEGqltNgvMn/PN1XgL20CgYEAsf3w0jAl2OG6AKC7e0YC4R24pGf2Rxfz3FC2
-0c5BA9MGwCqKiISeIGBHHE0/XCk/70LOp5umBbgqO5xI70u24x7AkMaEQGBNrYJE
-KExjj2Pd5uEniD18+9GKU47/8KDYlHHMEGhv3QgevelxkuEED/fC15MHBa5z3W42
-uLFdCsECgYAnBY8y5gk5tegAajqOsm4qbHHqHtUxEaXONNHRYWDBndwLvnLjYjrt
-eKq+q3Jh2mXTk7vbgVj8gfq6lF5a5vE654gyeQ8pDVieKJoNow/omA5gwi0Rhwgy
-is0Ct82M+GaSaNBySglIhIjU744NpCIANdlBulioWs17/0gN/253fQ==
------END RSA PRIVATE KEY-----
diff --git a/tests/certs/test-localhost-san-first.pem b/tests/certs/test-localhost-san-first.pem
deleted file mode 100644 (file)
index 38a93ea..0000000
+++ /dev/null
@@ -1,166 +0,0 @@
-extensions = x509v3
-
-[ x509v3 ]
-subjectAltName          = DNS:localhost,DNS:localhost1,DNS:localhost2
-keyUsage                = keyEncipherment,digitalSignature,keyAgreement
-extendedKeyUsage        = serverAuth
-subjectKeyIdentifier    = hash
-authorityKeyIdentifier  = keyid
-basicConstraints        = CA:false
-authorityInfoAccess     = @issuer_info
-crlDistributionPoints   = @crl_info
-
-[ crl_ext ]
-authorityKeyIdentifier  = keyid:always
-authorityInfoAccess     = @issuer_info
-
-[ issuer_info ]
-caIssuers;URI.0         = http://test.curl.se/ca/EdelCurlRoot.cer
-
-[ crl_info ]
-URI.0                   = http://test.curl.se/ca/EdelCurlRoot.crl
-
-[ req ]
-default_bits            = 1024
-distinguished_name      = req_DN
-default_md              = sha256
-string_mask             = utf8only
-
-[ req_DN ]
-countryName             = "Country Name is Northern Nowhere"
-countryName_value       = NN
-organizationName        = "Organization Name"
-organizationName_value  = Edel Curl Arctic Illudium Research Cloud
-commonName              = "Common Name"
-commonName_value        = localhost.nn
------BEGIN RSA PRIVATE KEY-----
-MIIEpAIBAAKCAQEAtUtep1esBXIRc+vhyRg8RM+YwQAmS9utHywy5Uvo4wAxjCSE
-QvN6U3/owYkIipu2zNJoFyFOLQOuWE5x6kaNooUYDjMRa+2Cs/Dv2VV8IvPP42rg
-VVw0wERkyruARtYPSsmdYPv/1yBPunYJsM6WZuR/kMHDrtK2a/IGfdB38osl6QHc
-nukfl80Zbu9dsuthqjPDCvDQWMMqV4Wp9zfsOqXFVka033E/HcAp4Q3FF8+7vMzJ
-hthuk0pjjkbRA9EYI/b1Moiz4cBPMBYVt+dkmeFZVC0drH90P5vaxU0/OyqSNuQ+
-rwrYUdIXpH/Qlo55J4Xbdd02e6wK07Al26BKtQIDAQABAoIBAQCmYwn4I6qpRMtn
-zLFoUmnd7XmQiIadUHxPA82iTEztKZxPtqP8nmFCiT4hgZbpP4hB60nFELgi8CHu
-wfAix6Xt5qDxR0VR/KXcZ+B5Ys+PdJzzZ3+EWB/B5gNrXTKZ0JQwW2GpRR7FXc5O
-n069ipzWyheZz3u8037BC1uR1OaBHk/qift96QxENFSl6UXMNJwJndVZmnVzTsXK
-sPMtjWiXD36EZkaMB7kFZGYWLYqS+csA2jboPBLqcxuQ/rRjtocuchFrSzhdyR/9
-DZyo1aPdhTDaelt0Zfa1dZB2YEVpsUcgDF7oIIJwVKOlurylarMjQ45ZS4i89Gp5
-RaSQByaBAoGBAOWVvcunQIiagHUJkc3sHI1idI9LLi3Me/MfYHrNfaYy0rbJ2JxU
-sZdzcQ9Of9djb1M5Xu68RiTK+f6S3T90wba0LYAASwl7qGC1xpofRh/FlLzfjHgG
-VEVC6Rlm6Mjh2y4V4SP5J9XeiZDrGjtbXX3ZGH8YcO14SHGk4NvPhYrdAoGBAMon
-RBvUYZIUvWSYT+i5ZjYpo6kemwXG+nJfsux3ehB8aLbJbRQw3aGDvfh+wZy7qV4Z
-nZfFkg2xERaQ5XfgFclePwfgAk1SFUkBdmky+52mjKo2ggLuvSPN6c4RwuHM3LWe
-05wln0ZF5kKMHjjwl42OlOtVonutNItrc3wB8SW5AoGAJ3LkauLxPse1fObJC+Yf
-PdgGCT000R/KyIrCrDc0+OLQvCHQu4P+A/UNH0EwzFTEozs/aawmLVpHPIwFwkqQ
-opExJEZonleGJh/14TOwe/MaTJ3o6BLGViRaI0hAhYvxemi+B81fH+ueHa2YE0zu
-spokEGqltNgvMn/PN1XgL20CgYEAsf3w0jAl2OG6AKC7e0YC4R24pGf2Rxfz3FC2
-0c5BA9MGwCqKiISeIGBHHE0/XCk/70LOp5umBbgqO5xI70u24x7AkMaEQGBNrYJE
-KExjj2Pd5uEniD18+9GKU47/8KDYlHHMEGhv3QgevelxkuEED/fC15MHBa5z3W42
-uLFdCsECgYAnBY8y5gk5tegAajqOsm4qbHHqHtUxEaXONNHRYWDBndwLvnLjYjrt
-eKq+q3Jh2mXTk7vbgVj8gfq6lF5a5vE654gyeQ8pDVieKJoNow/omA5gwi0Rhwgy
-is0Ct82M+GaSaNBySglIhIjU744NpCIANdlBulioWs17/0gN/253fQ==
------END RSA PRIVATE KEY-----
-Certificate:
-    Data:
-        Version: 3 (0x2)
-        Serial Number:
-            81:34:c8:2d:81:f0:54:22
-    Signature Algorithm: sha256WithRSAEncryption
-        Issuer:
-            countryName               = NN
-            organizationName          = Edel Curl Arctic Illudium Research Cloud
-            commonName                = Northern Nowhere Trust Anchor
-        Validity
-            Not Before: Mar  6 11:51:48 2025 GMT
-            Not After : Dec 31 11:51:48 2025 GMT
-        Subject:
-            countryName               = NN
-            organizationName          = Edel Curl Arctic Illudium Research Cloud
-            commonName                = localhost.nn
-        Subject Public Key Info:
-            Public Key Algorithm: rsaEncryption
-                RSA Public-Key: (2048 bit)
-                Modulus:
-                    00:b5:4b:5e:a7:57:ac:05:72:11:73:eb:e1:c9:18:
-                    3c:44:cf:98:c1:00:26:4b:db:ad:1f:2c:32:e5:4b:
-                    e8:e3:00:31:8c:24:84:42:f3:7a:53:7f:e8:c1:89:
-                    08:8a:9b:b6:cc:d2:68:17:21:4e:2d:03:ae:58:4e:
-                    71:ea:46:8d:a2:85:18:0e:33:11:6b:ed:82:b3:f0:
-                    ef:d9:55:7c:22:f3:cf:e3:6a:e0:55:5c:34:c0:44:
-                    64:ca:bb:80:46:d6:0f:4a:c9:9d:60:fb:ff:d7:20:
-                    4f:ba:76:09:b0:ce:96:66:e4:7f:90:c1:c3:ae:d2:
-                    b6:6b:f2:06:7d:d0:77:f2:8b:25:e9:01:dc:9e:e9:
-                    1f:97:cd:19:6e:ef:5d:b2:eb:61:aa:33:c3:0a:f0:
-                    d0:58:c3:2a:57:85:a9:f7:37:ec:3a:a5:c5:56:46:
-                    b4:df:71:3f:1d:c0:29:e1:0d:c5:17:cf:bb:bc:cc:
-                    c9:86:d8:6e:93:4a:63:8e:46:d1:03:d1:18:23:f6:
-                    f5:32:88:b3:e1:c0:4f:30:16:15:b7:e7:64:99:e1:
-                    59:54:2d:1d:ac:7f:74:3f:9b:da:c5:4d:3f:3b:2a:
-                    92:36:e4:3e:af:0a:d8:51:d2:17:a4:7f:d0:96:8e:
-                    79:27:85:db:75:dd:36:7b:ac:0a:d3:b0:25:db:a0:
-                    4a:b5
-                Exponent: 65537 (0x10001)
-        X509v3 extensions:
-            X509v3 Subject Alternative Name: 
-                DNS:localhost, DNS:localhost1, DNS:localhost2
-            X509v3 Key Usage: 
-                Digital Signature, Key Encipherment, Key Agreement
-            X509v3 Extended Key Usage: 
-                TLS Web Server Authentication
-            X509v3 Subject Key Identifier: 
-                BD:FE:8D:9C:5D:FF:AC:9B:EC:06:1C:24:60:6A:DA:C1:58:54:40:40
-            X509v3 Authority Key Identifier: 
-                keyid:9D:2B:CE:95:BF:D8:22:91:A2:E5:AD:FE:79:0E:E9:23:E1:4D:28:32
-
-            X509v3 Basic Constraints: 
-                CA:FALSE
-            Authority Information Access: 
-                CA Issuers - URI:http://test.curl.se/ca/EdelCurlRoot.cer
-
-            X509v3 CRL Distribution Points: 
-
-                Full Name:
-                  URI:http://test.curl.se/ca/EdelCurlRoot.crl
-
-    Signature Algorithm: sha256WithRSAEncryption
-         01:5f:58:90:09:4c:e5:f2:f6:0c:73:ac:43:75:34:79:7c:5a:
-         2b:e6:43:33:40:1b:5e:97:75:09:44:98:dd:8b:61:d2:8a:d2:
-         be:d8:04:10:5c:eb:82:11:23:8f:dd:53:51:fa:dc:07:6a:d3:
-         f2:8b:9b:63:1b:22:6b:07:b6:02:7c:dd:e7:ea:33:34:da:ea:
-         48:22:ee:c8:bb:26:d3:b8:7e:f7:6b:46:07:ea:6a:1a:20:94:
-         7a:3f:2a:a1:5a:c5:e7:95:58:b9:9c:95:9f:db:2f:1d:ab:fe:
-         1b:d8:97:88:29:28:05:86:15:57:cc:52:25:26:8c:84:48:ea:
-         33:d7:3c:32:4c:58:96:34:2e:3c:27:2d:72:24:c3:96:93:42:
-         48:c4:9f:c5:b3:29:56:30:e2:e0:d1:53:e2:f5:07:71:b1:74:
-         6d:bc:8c:c8:30:ca:90:74:8a:61:49:13:99:7b:77:1d:d0:91:
-         7f:ad:11:73:ab:ce:0b:8d:67:65:38:7e:a7:5f:f1:76:14:4e:
-         90:9b:04:ec:e9:27:45:45:b5:45:02:2c:3b:e4:37:46:5e:93:
-         fc:b5:19:c7:4f:a3:cb:df:25:7d:6f:7e:31:93:3c:4a:9f:71:
-         19:9b:ef:d5:01:6c:48:40:7f:91:16:82:c8:71:29:2e:2a:4e:
-         a0:0e:99:b3
------BEGIN CERTIFICATE-----
-MIIEYjCCA0qgAwIBAgIJAIE0yC2B8FQiMA0GCSqGSIb3DQEBCwUAMGgxCzAJBgNV
-BAYTAk5OMTEwLwYDVQQKDChFZGVsIEN1cmwgQXJjdGljIElsbHVkaXVtIFJlc2Vh
-cmNoIENsb3VkMSYwJAYDVQQDDB1Ob3J0aGVybiBOb3doZXJlIFRydXN0IEFuY2hv
-cjAeFw0yNTAzMDYxMTUxNDhaFw0yNTEyMzExMTUxNDhaMFcxCzAJBgNVBAYTAk5O
-MTEwLwYDVQQKDChFZGVsIEN1cmwgQXJjdGljIElsbHVkaXVtIFJlc2VhcmNoIENs
-b3VkMRUwEwYDVQQDDAxsb2NhbGhvc3Qubm4wggEiMA0GCSqGSIb3DQEBAQUAA4IB
-DwAwggEKAoIBAQC1S16nV6wFchFz6+HJGDxEz5jBACZL260fLDLlS+jjADGMJIRC
-83pTf+jBiQiKm7bM0mgXIU4tA65YTnHqRo2ihRgOMxFr7YKz8O/ZVXwi88/jauBV
-XDTARGTKu4BG1g9KyZ1g+//XIE+6dgmwzpZm5H+QwcOu0rZr8gZ90HfyiyXpAdye
-6R+XzRlu712y62GqM8MK8NBYwypXhan3N+w6pcVWRrTfcT8dwCnhDcUXz7u8zMmG
-2G6TSmOORtED0Rgj9vUyiLPhwE8wFhW352SZ4VlULR2sf3Q/m9rFTT87KpI25D6v
-CthR0hekf9CWjnknhdt13TZ7rArTsCXboEq1AgMBAAGjggEeMIIBGjAsBgNVHREE
-JTAjgglsb2NhbGhvc3SCCmxvY2FsaG9zdDGCCmxvY2FsaG9zdDIwCwYDVR0PBAQD
-AgOoMBMGA1UdJQQMMAoGCCsGAQUFBwMBMB0GA1UdDgQWBBS9/o2cXf+sm+wGHCRg
-atrBWFRAQDAfBgNVHSMEGDAWgBSdK86Vv9gikaLlrf55Dukj4U0oMjAJBgNVHRME
-AjAAMEMGCCsGAQUFBwEBBDcwNTAzBggrBgEFBQcwAoYnaHR0cDovL3Rlc3QuY3Vy
-bC5zZS9jYS9FZGVsQ3VybFJvb3QuY2VyMDgGA1UdHwQxMC8wLaAroCmGJ2h0dHA6
-Ly90ZXN0LmN1cmwuc2UvY2EvRWRlbEN1cmxSb290LmNybDANBgkqhkiG9w0BAQsF
-AAOCAQEAAV9YkAlM5fL2DHOsQ3U0eXxaK+ZDM0AbXpd1CUSY3Yth0orSvtgEEFzr
-ghEjj91TUfrcB2rT8oubYxsiawe2Anzd5+ozNNrqSCLuyLsm07h+92tGB+pqGiCU
-ej8qoVrF55VYuZyVn9svHav+G9iXiCkoBYYVV8xSJSaMhEjqM9c8MkxYljQuPCct
-ciTDlpNCSMSfxbMpVjDi4NFT4vUHcbF0bbyMyDDKkHSKYUkTmXt3HdCRf60Rc6vO
-C41nZTh+p1/xdhROkJsE7OknRUW1RQIsO+Q3Rl6T/LUZx0+jy98lfW9+MZM8Sp9x
-GZvv1QFsSEB/kRaCyHEpLipOoA6Zsw==
------END CERTIFICATE-----
diff --git a/tests/certs/test-localhost-san-first.pub.der b/tests/certs/test-localhost-san-first.pub.der
deleted file mode 100644 (file)
index ab42163..0000000
Binary files a/tests/certs/test-localhost-san-first.pub.der and /dev/null differ
diff --git a/tests/certs/test-localhost-san-first.pub.pem b/tests/certs/test-localhost-san-first.pub.pem
deleted file mode 100644 (file)
index 34968e4..0000000
+++ /dev/null
@@ -1,9 +0,0 @@
------BEGIN PUBLIC KEY-----
-MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAtUtep1esBXIRc+vhyRg8
-RM+YwQAmS9utHywy5Uvo4wAxjCSEQvN6U3/owYkIipu2zNJoFyFOLQOuWE5x6kaN
-ooUYDjMRa+2Cs/Dv2VV8IvPP42rgVVw0wERkyruARtYPSsmdYPv/1yBPunYJsM6W
-ZuR/kMHDrtK2a/IGfdB38osl6QHcnukfl80Zbu9dsuthqjPDCvDQWMMqV4Wp9zfs
-OqXFVka033E/HcAp4Q3FF8+7vMzJhthuk0pjjkbRA9EYI/b1Moiz4cBPMBYVt+dk
-meFZVC0drH90P5vaxU0/OyqSNuQ+rwrYUdIXpH/Qlo55J4Xbdd02e6wK07Al26BK
-tQIDAQAB
------END PUBLIC KEY-----
diff --git a/tests/certs/test-localhost-san-last.crl b/tests/certs/test-localhost-san-last.crl
deleted file mode 100644 (file)
index 6516d1b..0000000
+++ /dev/null
@@ -1,38 +0,0 @@
------BEGIN X509 CRL-----
-MIIGsjCCBZoCAQEwDQYJKoZIhvcNAQELBQAwaDELMAkGA1UEBhMCTk4xMTAvBgNV
-BAoMKEVkZWwgQ3VybCBBcmN0aWMgSWxsdWRpdW0gUmVzZWFyY2ggQ2xvdWQxJjAk
-BgNVBAMMHU5vcnRoZXJuIE5vd2hlcmUgVHJ1c3QgQW5jaG9yFw0yNTAzMDYxMTUx
-NDhaFw0yNTA0MDUxMTUxNDhaMIIE7DAaAgkAgTTILYHwU/cXDTI1MDMwNjEwMTkz
-NFowGgIJAIE0yC2B8FP4Fw0yNTAzMDYxMDE5MzRaMBoCCQCBNMgtgfBT+RcNMjUw
-MzA2MTAxOTM0WjAaAgkAgTTILYHwU/oXDTI1MDMwNjEwMTkzNVowGgIJAIE0yC2B
-8FP7Fw0yNTAzMDYxMDE5MzVaMBoCCQCBNMgtgfBT/BcNMjUwMzA2MTAxOTM1WjAa
-AgkAgTTILYHwU/0XDTI1MDMwNjEwNDMzOVowGgIJAIE0yC2B8FP+Fw0yNTAzMDYx
-MDQzMzlaMBoCCQCBNMgtgfBT/xcNMjUwMzA2MTA0MzQwWjAaAgkAgTTILYHwVAAX
-DTI1MDMwNjEwNDM0MFowGgIJAIE0yC2B8FQBFw0yNTAzMDYxMDQzNDBaMBoCCQCB
-NMgtgfBUAhcNMjUwMzA2MTA0NjA4WjAaAgkAgTTILYHwVAMXDTI1MDMwNjEwNDYw
-OFowGgIJAIE0yC2B8FQEFw0yNTAzMDYxMDQ2MDhaMBoCCQCBNMgtgfBUBRcNMjUw
-MzA2MTA0NjA4WjAaAgkAgTTILYHwVAYXDTI1MDMwNjEwNDYwOVowGgIJAIE0yC2B
-8FQHFw0yNTAzMDYxMDQ2MDlaMBoCCQCBNMgtgfBUCBcNMjUwMzA2MTA0ODU5WjAa
-AgkAgTTILYHwVAkXDTI1MDMwNjEwNDg1OVowGgIJAIE0yC2B8FQKFw0yNTAzMDYx
-MDQ4NTlaMBoCCQCBNMgtgfBUCxcNMjUwMzA2MTA0ODU5WjAaAgkAgTTILYHwVAwX
-DTI1MDMwNjEwNDkwMFowGgIJAIE0yC2B8FQNFw0yNTAzMDYxMDQ5MDBaMBoCCQCB
-NMgtgfBUDhcNMjUwMzA2MTExMzM4WjAaAgkAgTTILYHwVA8XDTI1MDMwNjExMTMz
-OFowGgIJAIE0yC2B8FQQFw0yNTAzMDYxMTEzMzhaMBoCCQCBNMgtgfBUERcNMjUw
-MzA2MTExMzM4WjAaAgkAgTTILYHwVBIXDTI1MDMwNjExMTMzOFowGgIJAIE0yC2B
-8FQTFw0yNTAzMDYxMTE1MzBaMBoCCQCBNMgtgfBUFBcNMjUwMzA2MTExNTMwWjAa
-AgkAgTTILYHwVBUXDTI1MDMwNjExMTUzMFowGgIJAIE0yC2B8FQWFw0yNTAzMDYx
-MTE1MzBaMBoCCQCBNMgtgfBUFxcNMjUwMzA2MTExNTMwWjAaAgkAgTTILYHwVBgX
-DTI1MDMwNjExMTUzMFowGgIJAIE0yC2B8FQZFw0yNTAzMDYxMTE5MDNaMBoCCQCB
-NMgtgfBUGhcNMjUwMzA2MTExOTA0WjAaAgkAgTTILYHwVBsXDTI1MDMwNjExMTkw
-NFowGgIJAIE0yC2B8FQcFw0yNTAzMDYxMTE5MDRaMBoCCQCBNMgtgfBUHRcNMjUw
-MzA2MTExOTA0WjAaAgkAgTTILYHwVB4XDTI1MDMwNjExMTkwNFowGgIJAIE0yC2B
-8FQfFw0yNTAzMDYxMTUxNDdaMBoCCQCBNMgtgfBUIBcNMjUwMzA2MTE1MTQ4WjAa
-AgkAgTTILYHwVCEXDTI1MDMwNjExNTE0OFowGgIJAIE0yC2B8FQiFw0yNTAzMDYx
-MTUxNDhaMBoCCQCBNMgtgfBUIxcNMjUwMzA2MTE1MTQ4WqAOMAwwCgYDVR0UBAMC
-AQEwDQYJKoZIhvcNAQELBQADggEBAFK6ak0zPfAUcLzWQzecy/frPTjPuNTzaEsO
-AOEbQbvJuCfgjCwFpvD4KaSz3pRUs0/TCaOh3lit09sGrGp50k1NWu7DOGc4bDL9
-dYUjhv0x9oozbrFRtfazme1QtG8wpLWnYtxDCTRwDllRyiHsZ8dEL11EKc26tt6D
-dHpnaF5uSMfCJiSsLfDHVabPLFfnU3rqvh02Z8OrOeVaC7T370pjh5xzBHaCqEA3
-zvOeP0XPIDNJ9/KR0+moPIWORbrrcM3VNNsearXej9urthnhziynFRh+QQg1tVzK
-zzrTTrcsKkuR0JMisOLGoqWY6UaAMrp03t4NkSgFoVXH7xBI3Gs=
------END X509 CRL-----
diff --git a/tests/certs/test-localhost-san-last.crt b/tests/certs/test-localhost-san-last.crt
deleted file mode 100644 (file)
index b913b0b..0000000
+++ /dev/null
@@ -1,104 +0,0 @@
-Certificate:
-    Data:
-        Version: 3 (0x2)
-        Serial Number:
-            81:34:c8:2d:81:f0:54:23
-    Signature Algorithm: sha256WithRSAEncryption
-        Issuer:
-            countryName               = NN
-            organizationName          = Edel Curl Arctic Illudium Research Cloud
-            commonName                = Northern Nowhere Trust Anchor
-        Validity
-            Not Before: Mar  6 11:51:48 2025 GMT
-            Not After : Dec 31 11:51:48 2025 GMT
-        Subject:
-            countryName               = NN
-            organizationName          = Edel Curl Arctic Illudium Research Cloud
-            commonName                = localhost.nn
-        Subject Public Key Info:
-            Public Key Algorithm: rsaEncryption
-                RSA Public-Key: (2048 bit)
-                Modulus:
-                    00:ca:6d:71:a2:7a:bb:12:f6:c0:c3:c9:bf:65:6f:
-                    cb:a3:79:1f:dd:52:bd:8e:0e:72:ea:8d:07:c1:b5:
-                    a6:73:c9:66:e5:00:e1:ed:32:88:d8:69:9d:91:08:
-                    a3:af:20:9d:18:16:a9:e0:19:18:2f:74:47:e7:bc:
-                    43:83:f7:df:08:33:0a:a1:c4:af:4f:e5:f8:26:d6:
-                    96:10:61:47:e0:87:f7:24:69:17:7c:eb:b6:01:13:
-                    59:0b:61:10:46:25:04:e0:8c:50:88:35:26:64:ce:
-                    e0:20:ea:2d:3b:fe:98:c8:fc:f1:94:7a:c7:d3:93:
-                    6f:89:34:b5:62:ad:d1:67:2b:b1:b3:a9:ca:5a:8d:
-                    64:ba:04:f5:67:50:5e:73:35:9a:4b:07:8f:f5:4a:
-                    86:36:9e:e4:1d:c3:e4:87:8c:00:43:d3:c6:0d:e7:
-                    be:07:40:cd:ee:6e:b1:bb:1d:ca:93:c8:57:f4:a7:
-                    d5:66:af:a5:8b:7c:bc:28:44:b0:1b:e9:6b:e5:fb:
-                    7d:ee:54:be:cc:93:df:ce:ab:5f:69:c2:cf:04:bf:
-                    df:5c:b4:e2:b3:01:85:5b:f6:ac:11:6f:57:00:af:
-                    3e:b5:a4:d3:7a:08:96:4b:41:cc:68:09:4c:9e:37:
-                    cf:0b:fc:52:cb:64:d5:96:b9:c2:1e:93:f2:da:0c:
-                    70:a9
-                Exponent: 65537 (0x10001)
-        X509v3 extensions:
-            X509v3 Subject Alternative Name: 
-                DNS:localhost1, DNS:localhost2, DNS:localhost
-            X509v3 Key Usage: 
-                Digital Signature, Key Encipherment, Key Agreement
-            X509v3 Extended Key Usage: 
-                TLS Web Server Authentication
-            X509v3 Subject Key Identifier: 
-                D6:04:68:12:9C:5A:27:70:6B:D6:89:55:C1:6B:11:78:DD:74:D8:32
-            X509v3 Authority Key Identifier: 
-                keyid:9D:2B:CE:95:BF:D8:22:91:A2:E5:AD:FE:79:0E:E9:23:E1:4D:28:32
-
-            X509v3 Basic Constraints: 
-                CA:FALSE
-            Authority Information Access: 
-                CA Issuers - URI:http://test.curl.se/ca/EdelCurlRoot.cer
-
-            X509v3 CRL Distribution Points: 
-
-                Full Name:
-                  URI:http://test.curl.se/ca/EdelCurlRoot.crl
-
-    Signature Algorithm: sha256WithRSAEncryption
-         60:7a:35:3f:a7:9b:44:14:cf:8a:9d:38:46:3c:7a:93:43:19:
-         9d:ed:f3:21:32:50:7a:f8:b4:e6:90:d1:5e:26:75:1c:fd:ed:
-         64:b2:fe:5a:9c:96:f6:5b:2d:df:86:7d:4c:87:fa:8f:1d:13:
-         67:f2:f5:91:aa:f9:1b:c3:f7:54:da:17:43:49:00:ad:9e:55:
-         53:43:c1:30:4e:6b:9e:f6:99:26:b1:fa:35:85:d5:d1:70:88:
-         30:87:8e:d3:91:b9:85:fa:b8:e2:31:06:9c:17:c8:2a:2f:9b:
-         e6:e8:5c:c7:6e:57:36:f5:c7:78:a2:9b:01:ef:8d:d5:38:ec:
-         1f:f0:ee:7f:d4:0b:b8:82:1d:01:3a:65:46:47:ba:58:9f:d1:
-         4d:95:18:17:e4:23:4a:76:54:c6:70:5d:fd:ac:f2:83:1d:ed:
-         66:2b:a2:97:28:aa:e3:7f:bd:f2:02:8b:2f:43:fe:c1:74:36:
-         8f:87:60:de:51:0b:44:0a:c4:98:b6:4d:94:e5:ec:ce:72:25:
-         66:66:8e:1c:86:aa:30:5c:57:75:8a:28:eb:b3:51:93:84:45:
-         6a:f7:ce:52:ac:1b:a8:0d:37:df:e4:60:a2:96:18:cf:29:66:
-         a9:e2:08:52:e6:2a:3a:29:8b:3a:28:b1:df:4d:d4:0c:b6:9b:
-         e2:40:b2:33
------BEGIN CERTIFICATE-----
-MIIEYjCCA0qgAwIBAgIJAIE0yC2B8FQjMA0GCSqGSIb3DQEBCwUAMGgxCzAJBgNV
-BAYTAk5OMTEwLwYDVQQKDChFZGVsIEN1cmwgQXJjdGljIElsbHVkaXVtIFJlc2Vh
-cmNoIENsb3VkMSYwJAYDVQQDDB1Ob3J0aGVybiBOb3doZXJlIFRydXN0IEFuY2hv
-cjAeFw0yNTAzMDYxMTUxNDhaFw0yNTEyMzExMTUxNDhaMFcxCzAJBgNVBAYTAk5O
-MTEwLwYDVQQKDChFZGVsIEN1cmwgQXJjdGljIElsbHVkaXVtIFJlc2VhcmNoIENs
-b3VkMRUwEwYDVQQDDAxsb2NhbGhvc3Qubm4wggEiMA0GCSqGSIb3DQEBAQUAA4IB
-DwAwggEKAoIBAQDKbXGiersS9sDDyb9lb8ujeR/dUr2ODnLqjQfBtaZzyWblAOHt
-MojYaZ2RCKOvIJ0YFqngGRgvdEfnvEOD998IMwqhxK9P5fgm1pYQYUfgh/ckaRd8
-67YBE1kLYRBGJQTgjFCINSZkzuAg6i07/pjI/PGUesfTk2+JNLVirdFnK7Gzqcpa
-jWS6BPVnUF5zNZpLB4/1SoY2nuQdw+SHjABD08YN574HQM3ubrG7HcqTyFf0p9Vm
-r6WLfLwoRLAb6Wvl+33uVL7Mk9/Oq19pws8Ev99ctOKzAYVb9qwRb1cArz61pNN6
-CJZLQcxoCUyeN88L/FLLZNWWucIek/LaDHCpAgMBAAGjggEeMIIBGjAsBgNVHREE
-JTAjggpsb2NhbGhvc3Qxggpsb2NhbGhvc3Qygglsb2NhbGhvc3QwCwYDVR0PBAQD
-AgOoMBMGA1UdJQQMMAoGCCsGAQUFBwMBMB0GA1UdDgQWBBTWBGgSnFoncGvWiVXB
-axF43XTYMjAfBgNVHSMEGDAWgBSdK86Vv9gikaLlrf55Dukj4U0oMjAJBgNVHRME
-AjAAMEMGCCsGAQUFBwEBBDcwNTAzBggrBgEFBQcwAoYnaHR0cDovL3Rlc3QuY3Vy
-bC5zZS9jYS9FZGVsQ3VybFJvb3QuY2VyMDgGA1UdHwQxMC8wLaAroCmGJ2h0dHA6
-Ly90ZXN0LmN1cmwuc2UvY2EvRWRlbEN1cmxSb290LmNybDANBgkqhkiG9w0BAQsF
-AAOCAQEAYHo1P6ebRBTPip04Rjx6k0MZne3zITJQevi05pDRXiZ1HP3tZLL+WpyW
-9lst34Z9TIf6jx0TZ/L1kar5G8P3VNoXQ0kArZ5VU0PBME5rnvaZJrH6NYXV0XCI
-MIeO05G5hfq44jEGnBfIKi+b5uhcx25XNvXHeKKbAe+N1TjsH/Duf9QLuIIdATpl
-Rke6WJ/RTZUYF+QjSnZUxnBd/azygx3tZiuilyiq43+98gKLL0P+wXQ2j4dg3lEL
-RArEmLZNlOXsznIlZmaOHIaqMFxXdYoo67NRk4RFavfOUqwbqA033+RgopYYzylm
-qeIIUuYqOimLOiix303UDLab4kCyMw==
------END CERTIFICATE-----
diff --git a/tests/certs/test-localhost-san-last.key b/tests/certs/test-localhost-san-last.key
deleted file mode 100644 (file)
index e20f082..0000000
+++ /dev/null
@@ -1,27 +0,0 @@
------BEGIN RSA PRIVATE KEY-----
-MIIEowIBAAKCAQEAym1xonq7EvbAw8m/ZW/Lo3kf3VK9jg5y6o0HwbWmc8lm5QDh
-7TKI2GmdkQijryCdGBap4BkYL3RH57xDg/ffCDMKocSvT+X4JtaWEGFH4If3JGkX
-fOu2ARNZC2EQRiUE4IxQiDUmZM7gIOotO/6YyPzxlHrH05NviTS1Yq3RZyuxs6nK
-Wo1kugT1Z1BeczWaSweP9UqGNp7kHcPkh4wAQ9PGDee+B0DN7m6xux3Kk8hX9KfV
-Zq+li3y8KESwG+lr5ft97lS+zJPfzqtfacLPBL/fXLTiswGFW/asEW9XAK8+taTT
-egiWS0HMaAlMnjfPC/xSy2TVlrnCHpPy2gxwqQIDAQABAoIBAG6l+jpVGdLY3C9p
-JNyeilJWEAvbgU+YKEp7QmUpFM4vpbXBkL0mJVUeDgnMDiTZD+Wt5bdgIC84QWGz
-L7iAEgKaW9Jm/2kODGG2ZBqaAj8CMx5M75DSCw91cvPcX5fn/k17hT2ex9jMmAiF
-2Kn1lbAvSyHdJ0NIUOxPymIhHthkOgVLDBePx17YY+TvNV5Q7VF89wH2ip7btCdP
-Zkf831V8XBHTmb9QiA01txXZBUYyDfC1qiU6dg/R56zuMVBbyxqA7jJwanDhOdLP
-prhJHo7Ic6yha6kPI1crPcJ9Uves4M2fcRYVh3NzSYGN16GKyRBTrbPh+9QRD5dA
-fPrvnW0CgYEA4/TX009DWuAmiT+hR/b5pjORvIOnAsVyXDKmVrzCdQ9EgW+VbR6a
-5vPEm4auN2CV9xKtzKVo2nVKHHfuaM3sdaa2dP7yXCwhQT/gfoP77MYJ9aKw754L
-SCErdVsc59u3YAn6o5Sk9n1LiqGT1aGlKgsaEPrJsJXoWJoWshVHvX8CgYEA41Sa
-4toCdk/0g22S0Kt7qjX1WrVlQEzcjqSXotlvnPQ7N5FsyBoE/NO7uozZM+rjgvGD
-9TJMF//v+0MSZQPJstWgX4uC2f0HnRQH51Y3kvVC62JLaPEGW7aeq/LDrW5cfiDa
-tlIB+V5cYl7STOR5A4arqNhu9EecChAZCEnvNdcCgYBQBX1WIncEibc9aubU+m/8
-1hGM2bJhGKrijq0xuaWRrkBgJ6mO2rWJ6XzVE9xIeFFsoFP+iPpb5dyUTc2VYORn
-EJTwUScHED7ERwYpo29mWMbaQbhXBWX0diBpXAizo7+lqRshHWcjWCySh9H7pnjy
-X19RIph2sskTgVQCQ9IhRQKBgEMofm1gHHQZYNHm8AWHc4wwTqCSkCvzyQC27Tkl
-5UxH9qqO4sUmsqyCXKZa79vfm4DWmrY4OrSoXpwrD2caPF8Br1QqoeiGUNZ90Wvt
-U5OtsyxYqJCDC+7SP4PqvxYgUWDNke9kwMKLtt00yAoBQSLiiRnjfrvZ3+Y1JUAG
-n42XAoGBAL122wLSCLNuYjcZoQ+scTNmIOf9UV2tAudui/ALLPBL/NjGagisA+cQ
-HlnpzuofsWz6SqBxdZEH6rajp0q5GJ5kj6E7odd3ArKqp7BY7UqoId9bpXgmigIL
-Jhpje0SvYJ/9DDlHTjO1xGOG0WFlztb1x0iZxMFMXY/d/XZQQdzm
------END RSA PRIVATE KEY-----
diff --git a/tests/certs/test-localhost-san-last.pem b/tests/certs/test-localhost-san-last.pem
deleted file mode 100644 (file)
index 1c31ba6..0000000
+++ /dev/null
@@ -1,166 +0,0 @@
-extensions = x509v3
-
-[ x509v3 ]
-subjectAltName          = DNS:localhost1,DNS:localhost2,DNS:localhost
-keyUsage                = keyEncipherment,digitalSignature,keyAgreement
-extendedKeyUsage        = serverAuth
-subjectKeyIdentifier    = hash
-authorityKeyIdentifier  = keyid
-basicConstraints        = CA:false
-authorityInfoAccess     = @issuer_info
-crlDistributionPoints   = @crl_info
-
-[ crl_ext ]
-authorityKeyIdentifier  = keyid:always
-authorityInfoAccess     = @issuer_info
-
-[ issuer_info ]
-caIssuers;URI.0         = http://test.curl.se/ca/EdelCurlRoot.cer
-
-[ crl_info ]
-URI.0                   = http://test.curl.se/ca/EdelCurlRoot.crl
-
-[ req ]
-default_bits            = 1024
-distinguished_name      = req_DN
-default_md              = sha256
-string_mask             = utf8only
-
-[ req_DN ]
-countryName             = "Country Name is Northern Nowhere"
-countryName_value       = NN
-organizationName        = "Organization Name"
-organizationName_value  = Edel Curl Arctic Illudium Research Cloud
-commonName              = "Common Name"
-commonName_value        = localhost.nn
------BEGIN RSA PRIVATE KEY-----
-MIIEowIBAAKCAQEAym1xonq7EvbAw8m/ZW/Lo3kf3VK9jg5y6o0HwbWmc8lm5QDh
-7TKI2GmdkQijryCdGBap4BkYL3RH57xDg/ffCDMKocSvT+X4JtaWEGFH4If3JGkX
-fOu2ARNZC2EQRiUE4IxQiDUmZM7gIOotO/6YyPzxlHrH05NviTS1Yq3RZyuxs6nK
-Wo1kugT1Z1BeczWaSweP9UqGNp7kHcPkh4wAQ9PGDee+B0DN7m6xux3Kk8hX9KfV
-Zq+li3y8KESwG+lr5ft97lS+zJPfzqtfacLPBL/fXLTiswGFW/asEW9XAK8+taTT
-egiWS0HMaAlMnjfPC/xSy2TVlrnCHpPy2gxwqQIDAQABAoIBAG6l+jpVGdLY3C9p
-JNyeilJWEAvbgU+YKEp7QmUpFM4vpbXBkL0mJVUeDgnMDiTZD+Wt5bdgIC84QWGz
-L7iAEgKaW9Jm/2kODGG2ZBqaAj8CMx5M75DSCw91cvPcX5fn/k17hT2ex9jMmAiF
-2Kn1lbAvSyHdJ0NIUOxPymIhHthkOgVLDBePx17YY+TvNV5Q7VF89wH2ip7btCdP
-Zkf831V8XBHTmb9QiA01txXZBUYyDfC1qiU6dg/R56zuMVBbyxqA7jJwanDhOdLP
-prhJHo7Ic6yha6kPI1crPcJ9Uves4M2fcRYVh3NzSYGN16GKyRBTrbPh+9QRD5dA
-fPrvnW0CgYEA4/TX009DWuAmiT+hR/b5pjORvIOnAsVyXDKmVrzCdQ9EgW+VbR6a
-5vPEm4auN2CV9xKtzKVo2nVKHHfuaM3sdaa2dP7yXCwhQT/gfoP77MYJ9aKw754L
-SCErdVsc59u3YAn6o5Sk9n1LiqGT1aGlKgsaEPrJsJXoWJoWshVHvX8CgYEA41Sa
-4toCdk/0g22S0Kt7qjX1WrVlQEzcjqSXotlvnPQ7N5FsyBoE/NO7uozZM+rjgvGD
-9TJMF//v+0MSZQPJstWgX4uC2f0HnRQH51Y3kvVC62JLaPEGW7aeq/LDrW5cfiDa
-tlIB+V5cYl7STOR5A4arqNhu9EecChAZCEnvNdcCgYBQBX1WIncEibc9aubU+m/8
-1hGM2bJhGKrijq0xuaWRrkBgJ6mO2rWJ6XzVE9xIeFFsoFP+iPpb5dyUTc2VYORn
-EJTwUScHED7ERwYpo29mWMbaQbhXBWX0diBpXAizo7+lqRshHWcjWCySh9H7pnjy
-X19RIph2sskTgVQCQ9IhRQKBgEMofm1gHHQZYNHm8AWHc4wwTqCSkCvzyQC27Tkl
-5UxH9qqO4sUmsqyCXKZa79vfm4DWmrY4OrSoXpwrD2caPF8Br1QqoeiGUNZ90Wvt
-U5OtsyxYqJCDC+7SP4PqvxYgUWDNke9kwMKLtt00yAoBQSLiiRnjfrvZ3+Y1JUAG
-n42XAoGBAL122wLSCLNuYjcZoQ+scTNmIOf9UV2tAudui/ALLPBL/NjGagisA+cQ
-HlnpzuofsWz6SqBxdZEH6rajp0q5GJ5kj6E7odd3ArKqp7BY7UqoId9bpXgmigIL
-Jhpje0SvYJ/9DDlHTjO1xGOG0WFlztb1x0iZxMFMXY/d/XZQQdzm
------END RSA PRIVATE KEY-----
-Certificate:
-    Data:
-        Version: 3 (0x2)
-        Serial Number:
-            81:34:c8:2d:81:f0:54:23
-    Signature Algorithm: sha256WithRSAEncryption
-        Issuer:
-            countryName               = NN
-            organizationName          = Edel Curl Arctic Illudium Research Cloud
-            commonName                = Northern Nowhere Trust Anchor
-        Validity
-            Not Before: Mar  6 11:51:48 2025 GMT
-            Not After : Dec 31 11:51:48 2025 GMT
-        Subject:
-            countryName               = NN
-            organizationName          = Edel Curl Arctic Illudium Research Cloud
-            commonName                = localhost.nn
-        Subject Public Key Info:
-            Public Key Algorithm: rsaEncryption
-                RSA Public-Key: (2048 bit)
-                Modulus:
-                    00:ca:6d:71:a2:7a:bb:12:f6:c0:c3:c9:bf:65:6f:
-                    cb:a3:79:1f:dd:52:bd:8e:0e:72:ea:8d:07:c1:b5:
-                    a6:73:c9:66:e5:00:e1:ed:32:88:d8:69:9d:91:08:
-                    a3:af:20:9d:18:16:a9:e0:19:18:2f:74:47:e7:bc:
-                    43:83:f7:df:08:33:0a:a1:c4:af:4f:e5:f8:26:d6:
-                    96:10:61:47:e0:87:f7:24:69:17:7c:eb:b6:01:13:
-                    59:0b:61:10:46:25:04:e0:8c:50:88:35:26:64:ce:
-                    e0:20:ea:2d:3b:fe:98:c8:fc:f1:94:7a:c7:d3:93:
-                    6f:89:34:b5:62:ad:d1:67:2b:b1:b3:a9:ca:5a:8d:
-                    64:ba:04:f5:67:50:5e:73:35:9a:4b:07:8f:f5:4a:
-                    86:36:9e:e4:1d:c3:e4:87:8c:00:43:d3:c6:0d:e7:
-                    be:07:40:cd:ee:6e:b1:bb:1d:ca:93:c8:57:f4:a7:
-                    d5:66:af:a5:8b:7c:bc:28:44:b0:1b:e9:6b:e5:fb:
-                    7d:ee:54:be:cc:93:df:ce:ab:5f:69:c2:cf:04:bf:
-                    df:5c:b4:e2:b3:01:85:5b:f6:ac:11:6f:57:00:af:
-                    3e:b5:a4:d3:7a:08:96:4b:41:cc:68:09:4c:9e:37:
-                    cf:0b:fc:52:cb:64:d5:96:b9:c2:1e:93:f2:da:0c:
-                    70:a9
-                Exponent: 65537 (0x10001)
-        X509v3 extensions:
-            X509v3 Subject Alternative Name: 
-                DNS:localhost1, DNS:localhost2, DNS:localhost
-            X509v3 Key Usage: 
-                Digital Signature, Key Encipherment, Key Agreement
-            X509v3 Extended Key Usage: 
-                TLS Web Server Authentication
-            X509v3 Subject Key Identifier: 
-                D6:04:68:12:9C:5A:27:70:6B:D6:89:55:C1:6B:11:78:DD:74:D8:32
-            X509v3 Authority Key Identifier: 
-                keyid:9D:2B:CE:95:BF:D8:22:91:A2:E5:AD:FE:79:0E:E9:23:E1:4D:28:32
-
-            X509v3 Basic Constraints: 
-                CA:FALSE
-            Authority Information Access: 
-                CA Issuers - URI:http://test.curl.se/ca/EdelCurlRoot.cer
-
-            X509v3 CRL Distribution Points: 
-
-                Full Name:
-                  URI:http://test.curl.se/ca/EdelCurlRoot.crl
-
-    Signature Algorithm: sha256WithRSAEncryption
-         60:7a:35:3f:a7:9b:44:14:cf:8a:9d:38:46:3c:7a:93:43:19:
-         9d:ed:f3:21:32:50:7a:f8:b4:e6:90:d1:5e:26:75:1c:fd:ed:
-         64:b2:fe:5a:9c:96:f6:5b:2d:df:86:7d:4c:87:fa:8f:1d:13:
-         67:f2:f5:91:aa:f9:1b:c3:f7:54:da:17:43:49:00:ad:9e:55:
-         53:43:c1:30:4e:6b:9e:f6:99:26:b1:fa:35:85:d5:d1:70:88:
-         30:87:8e:d3:91:b9:85:fa:b8:e2:31:06:9c:17:c8:2a:2f:9b:
-         e6:e8:5c:c7:6e:57:36:f5:c7:78:a2:9b:01:ef:8d:d5:38:ec:
-         1f:f0:ee:7f:d4:0b:b8:82:1d:01:3a:65:46:47:ba:58:9f:d1:
-         4d:95:18:17:e4:23:4a:76:54:c6:70:5d:fd:ac:f2:83:1d:ed:
-         66:2b:a2:97:28:aa:e3:7f:bd:f2:02:8b:2f:43:fe:c1:74:36:
-         8f:87:60:de:51:0b:44:0a:c4:98:b6:4d:94:e5:ec:ce:72:25:
-         66:66:8e:1c:86:aa:30:5c:57:75:8a:28:eb:b3:51:93:84:45:
-         6a:f7:ce:52:ac:1b:a8:0d:37:df:e4:60:a2:96:18:cf:29:66:
-         a9:e2:08:52:e6:2a:3a:29:8b:3a:28:b1:df:4d:d4:0c:b6:9b:
-         e2:40:b2:33
------BEGIN CERTIFICATE-----
-MIIEYjCCA0qgAwIBAgIJAIE0yC2B8FQjMA0GCSqGSIb3DQEBCwUAMGgxCzAJBgNV
-BAYTAk5OMTEwLwYDVQQKDChFZGVsIEN1cmwgQXJjdGljIElsbHVkaXVtIFJlc2Vh
-cmNoIENsb3VkMSYwJAYDVQQDDB1Ob3J0aGVybiBOb3doZXJlIFRydXN0IEFuY2hv
-cjAeFw0yNTAzMDYxMTUxNDhaFw0yNTEyMzExMTUxNDhaMFcxCzAJBgNVBAYTAk5O
-MTEwLwYDVQQKDChFZGVsIEN1cmwgQXJjdGljIElsbHVkaXVtIFJlc2VhcmNoIENs
-b3VkMRUwEwYDVQQDDAxsb2NhbGhvc3Qubm4wggEiMA0GCSqGSIb3DQEBAQUAA4IB
-DwAwggEKAoIBAQDKbXGiersS9sDDyb9lb8ujeR/dUr2ODnLqjQfBtaZzyWblAOHt
-MojYaZ2RCKOvIJ0YFqngGRgvdEfnvEOD998IMwqhxK9P5fgm1pYQYUfgh/ckaRd8
-67YBE1kLYRBGJQTgjFCINSZkzuAg6i07/pjI/PGUesfTk2+JNLVirdFnK7Gzqcpa
-jWS6BPVnUF5zNZpLB4/1SoY2nuQdw+SHjABD08YN574HQM3ubrG7HcqTyFf0p9Vm
-r6WLfLwoRLAb6Wvl+33uVL7Mk9/Oq19pws8Ev99ctOKzAYVb9qwRb1cArz61pNN6
-CJZLQcxoCUyeN88L/FLLZNWWucIek/LaDHCpAgMBAAGjggEeMIIBGjAsBgNVHREE
-JTAjggpsb2NhbGhvc3Qxggpsb2NhbGhvc3Qygglsb2NhbGhvc3QwCwYDVR0PBAQD
-AgOoMBMGA1UdJQQMMAoGCCsGAQUFBwMBMB0GA1UdDgQWBBTWBGgSnFoncGvWiVXB
-axF43XTYMjAfBgNVHSMEGDAWgBSdK86Vv9gikaLlrf55Dukj4U0oMjAJBgNVHRME
-AjAAMEMGCCsGAQUFBwEBBDcwNTAzBggrBgEFBQcwAoYnaHR0cDovL3Rlc3QuY3Vy
-bC5zZS9jYS9FZGVsQ3VybFJvb3QuY2VyMDgGA1UdHwQxMC8wLaAroCmGJ2h0dHA6
-Ly90ZXN0LmN1cmwuc2UvY2EvRWRlbEN1cmxSb290LmNybDANBgkqhkiG9w0BAQsF
-AAOCAQEAYHo1P6ebRBTPip04Rjx6k0MZne3zITJQevi05pDRXiZ1HP3tZLL+WpyW
-9lst34Z9TIf6jx0TZ/L1kar5G8P3VNoXQ0kArZ5VU0PBME5rnvaZJrH6NYXV0XCI
-MIeO05G5hfq44jEGnBfIKi+b5uhcx25XNvXHeKKbAe+N1TjsH/Duf9QLuIIdATpl
-Rke6WJ/RTZUYF+QjSnZUxnBd/azygx3tZiuilyiq43+98gKLL0P+wXQ2j4dg3lEL
-RArEmLZNlOXsznIlZmaOHIaqMFxXdYoo67NRk4RFavfOUqwbqA033+RgopYYzylm
-qeIIUuYqOimLOiix303UDLab4kCyMw==
------END CERTIFICATE-----
diff --git a/tests/certs/test-localhost-san-last.pub.der b/tests/certs/test-localhost-san-last.pub.der
deleted file mode 100644 (file)
index 3580026..0000000
Binary files a/tests/certs/test-localhost-san-last.pub.der and /dev/null differ
diff --git a/tests/certs/test-localhost-san-last.pub.pem b/tests/certs/test-localhost-san-last.pub.pem
deleted file mode 100644 (file)
index c11aa31..0000000
+++ /dev/null
@@ -1,9 +0,0 @@
------BEGIN PUBLIC KEY-----
-MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAym1xonq7EvbAw8m/ZW/L
-o3kf3VK9jg5y6o0HwbWmc8lm5QDh7TKI2GmdkQijryCdGBap4BkYL3RH57xDg/ff
-CDMKocSvT+X4JtaWEGFH4If3JGkXfOu2ARNZC2EQRiUE4IxQiDUmZM7gIOotO/6Y
-yPzxlHrH05NviTS1Yq3RZyuxs6nKWo1kugT1Z1BeczWaSweP9UqGNp7kHcPkh4wA
-Q9PGDee+B0DN7m6xux3Kk8hX9KfVZq+li3y8KESwG+lr5ft97lS+zJPfzqtfacLP
-BL/fXLTiswGFW/asEW9XAK8+taTTegiWS0HMaAlMnjfPC/xSy2TVlrnCHpPy2gxw
-qQIDAQAB
------END PUBLIC KEY-----
diff --git a/tests/certs/test-localhost.crl b/tests/certs/test-localhost.crl
deleted file mode 100644 (file)
index 2e5bd10..0000000
+++ /dev/null
@@ -1,36 +0,0 @@
------BEGIN X509 CRL-----
-MIIGQjCCBSoCAQEwDQYJKoZIhvcNAQELBQAwaDELMAkGA1UEBhMCTk4xMTAvBgNV
-BAoMKEVkZWwgQ3VybCBBcmN0aWMgSWxsdWRpdW0gUmVzZWFyY2ggQ2xvdWQxJjAk
-BgNVBAMMHU5vcnRoZXJuIE5vd2hlcmUgVHJ1c3QgQW5jaG9yFw0yNTAzMDYxMTUx
-NDdaFw0yNTA0MDUxMTUxNDdaMIIEfDAaAgkAgTTILYHwU/cXDTI1MDMwNjEwMTkz
-NFowGgIJAIE0yC2B8FP4Fw0yNTAzMDYxMDE5MzRaMBoCCQCBNMgtgfBT+RcNMjUw
-MzA2MTAxOTM0WjAaAgkAgTTILYHwU/oXDTI1MDMwNjEwMTkzNVowGgIJAIE0yC2B
-8FP7Fw0yNTAzMDYxMDE5MzVaMBoCCQCBNMgtgfBT/BcNMjUwMzA2MTAxOTM1WjAa
-AgkAgTTILYHwU/0XDTI1MDMwNjEwNDMzOVowGgIJAIE0yC2B8FP+Fw0yNTAzMDYx
-MDQzMzlaMBoCCQCBNMgtgfBT/xcNMjUwMzA2MTA0MzQwWjAaAgkAgTTILYHwVAAX
-DTI1MDMwNjEwNDM0MFowGgIJAIE0yC2B8FQBFw0yNTAzMDYxMDQzNDBaMBoCCQCB
-NMgtgfBUAhcNMjUwMzA2MTA0NjA4WjAaAgkAgTTILYHwVAMXDTI1MDMwNjEwNDYw
-OFowGgIJAIE0yC2B8FQEFw0yNTAzMDYxMDQ2MDhaMBoCCQCBNMgtgfBUBRcNMjUw
-MzA2MTA0NjA4WjAaAgkAgTTILYHwVAYXDTI1MDMwNjEwNDYwOVowGgIJAIE0yC2B
-8FQHFw0yNTAzMDYxMDQ2MDlaMBoCCQCBNMgtgfBUCBcNMjUwMzA2MTA0ODU5WjAa
-AgkAgTTILYHwVAkXDTI1MDMwNjEwNDg1OVowGgIJAIE0yC2B8FQKFw0yNTAzMDYx
-MDQ4NTlaMBoCCQCBNMgtgfBUCxcNMjUwMzA2MTA0ODU5WjAaAgkAgTTILYHwVAwX
-DTI1MDMwNjEwNDkwMFowGgIJAIE0yC2B8FQNFw0yNTAzMDYxMDQ5MDBaMBoCCQCB
-NMgtgfBUDhcNMjUwMzA2MTExMzM4WjAaAgkAgTTILYHwVA8XDTI1MDMwNjExMTMz
-OFowGgIJAIE0yC2B8FQQFw0yNTAzMDYxMTEzMzhaMBoCCQCBNMgtgfBUERcNMjUw
-MzA2MTExMzM4WjAaAgkAgTTILYHwVBIXDTI1MDMwNjExMTMzOFowGgIJAIE0yC2B
-8FQTFw0yNTAzMDYxMTE1MzBaMBoCCQCBNMgtgfBUFBcNMjUwMzA2MTExNTMwWjAa
-AgkAgTTILYHwVBUXDTI1MDMwNjExMTUzMFowGgIJAIE0yC2B8FQWFw0yNTAzMDYx
-MTE1MzBaMBoCCQCBNMgtgfBUFxcNMjUwMzA2MTExNTMwWjAaAgkAgTTILYHwVBgX
-DTI1MDMwNjExMTUzMFowGgIJAIE0yC2B8FQZFw0yNTAzMDYxMTE5MDNaMBoCCQCB
-NMgtgfBUGhcNMjUwMzA2MTExOTA0WjAaAgkAgTTILYHwVBsXDTI1MDMwNjExMTkw
-NFowGgIJAIE0yC2B8FQcFw0yNTAzMDYxMTE5MDRaMBoCCQCBNMgtgfBUHRcNMjUw
-MzA2MTExOTA0WjAaAgkAgTTILYHwVB4XDTI1MDMwNjExMTkwNFowGgIJAIE0yC2B
-8FQfFw0yNTAzMDYxMTUxNDdaoA4wDDAKBgNVHRQEAwIBATANBgkqhkiG9w0BAQsF
-AAOCAQEAhE75mBvf+4gkmovBP4FD6LOTNaafbtZiEBBub2nDkc2KiHJfvQzy08U9
-bnsxD9yAKk79wVGuBOgp9QHSabO6jodbf8UUJ97vYxE8LTE8gJKOS+CPFJz3fbS3
-3p+RLaSrcMXttHlP+BB6pl7Bo2srMVkF971HVPlvpZeCcLUdvidxUNwHd2ck93Xm
-ZzGod6s2H4RQ7TdPt+ARMzbysm3VNvMp10XVjmy/ytktkTIVvXqnLhNNTav144ya
-JEoPMTgtvPN+QI0jFiDb4RsUuhgD+AbS7MdYtxbml7wmiizvEh0i74GcZnNbEeln
-YgZR147KglS1zqANPeSsDvVoXm6a1w==
------END X509 CRL-----
diff --git a/tests/certs/test-localhost.crt b/tests/certs/test-localhost.crt
deleted file mode 100644 (file)
index 5f49eb9..0000000
+++ /dev/null
@@ -1,103 +0,0 @@
-Certificate:
-    Data:
-        Version: 3 (0x2)
-        Serial Number:
-            81:34:c8:2d:81:f0:54:1f
-    Signature Algorithm: sha256WithRSAEncryption
-        Issuer:
-            countryName               = NN
-            organizationName          = Edel Curl Arctic Illudium Research Cloud
-            commonName                = Northern Nowhere Trust Anchor
-        Validity
-            Not Before: Mar  6 11:51:47 2025 GMT
-            Not After : Dec 31 11:51:47 2025 GMT
-        Subject:
-            countryName               = NN
-            organizationName          = Edel Curl Arctic Illudium Research Cloud
-            commonName                = localhost
-        Subject Public Key Info:
-            Public Key Algorithm: rsaEncryption
-                RSA Public-Key: (2048 bit)
-                Modulus:
-                    00:e6:0d:af:59:5e:53:57:3f:4e:c1:e2:f8:cf:30:
-                    65:dd:62:13:31:46:0b:d0:60:80:51:0d:09:33:8d:
-                    e1:b2:0f:0a:f2:fc:10:0b:e1:3a:69:43:c3:e9:eb:
-                    8b:45:8b:d5:26:0e:bd:c8:d4:a6:0f:1b:00:8d:74:
-                    36:60:30:a0:e0:24:c7:fa:dc:0c:e3:83:6c:8b:d1:
-                    fd:2a:a8:a3:d3:21:ff:c5:3c:47:1a:09:e1:8c:32:
-                    79:74:49:e9:f2:df:f7:4d:ac:b4:07:ec:81:40:27:
-                    65:b3:94:69:76:cd:57:1f:21:60:df:b4:7c:08:2f:
-                    33:fd:76:cc:23:c8:ed:1c:fb:bb:8a:74:2e:fe:7c:
-                    1d:d3:2f:22:2d:ff:11:7d:92:50:cc:c0:06:ac:95:
-                    a8:b3:06:42:83:09:1c:52:81:d1:14:21:bf:d1:b0:
-                    99:50:7a:6a:10:0c:30:d5:f0:e4:1a:c7:5d:1b:e9:
-                    be:be:c5:54:eb:e4:72:04:35:c4:14:a1:ba:20:45:
-                    2f:60:c8:e1:a1:de:b5:65:f7:2a:5d:05:d1:92:2d:
-                    22:ce:1a:ca:c2:35:fd:7c:f6:02:47:85:22:8c:5d:
-                    6e:4f:29:6b:3a:f9:84:73:89:4a:64:7b:9f:bd:fe:
-                    0a:4d:a0:08:7a:41:77:a3:dd:ba:c9:20:58:a1:7c:
-                    b8:b1
-                Exponent: 65537 (0x10001)
-        X509v3 extensions:
-            X509v3 Subject Alternative Name: 
-                DNS:localhost
-            X509v3 Key Usage: 
-                Digital Signature, Key Encipherment, Key Agreement
-            X509v3 Extended Key Usage: 
-                TLS Web Server Authentication
-            X509v3 Subject Key Identifier: 
-                B4:23:96:D3:28:32:87:90:18:46:E5:2D:CD:D3:DB:4F:9B:92:76:79
-            X509v3 Authority Key Identifier: 
-                keyid:9D:2B:CE:95:BF:D8:22:91:A2:E5:AD:FE:79:0E:E9:23:E1:4D:28:32
-
-            X509v3 Basic Constraints: 
-                CA:FALSE
-            Authority Information Access: 
-                CA Issuers - URI:http://test.curl.se/ca/EdelCurlRoot.cer
-
-            X509v3 CRL Distribution Points: 
-
-                Full Name:
-                  URI:http://test.curl.se/ca/EdelCurlRoot.crl
-
-    Signature Algorithm: sha256WithRSAEncryption
-         43:b8:3e:47:2e:1c:8e:76:16:4d:c5:04:89:c9:d3:42:5c:af:
-         97:27:da:6a:7f:bb:6d:49:51:0c:60:c7:0b:ce:8f:a3:33:26:
-         ae:f8:75:fa:c8:43:65:b7:c1:a4:eb:bb:9b:50:e4:97:8f:78:
-         b0:a7:00:95:5e:ac:3d:39:96:a6:39:a6:96:ad:5c:1b:e0:d3:
-         81:91:25:f1:1c:bd:dd:70:d5:8d:44:03:6e:8c:93:66:98:fd:
-         1d:66:b8:58:6a:90:11:26:44:3b:4e:8a:c4:ef:f7:4c:f4:57:
-         ba:75:f5:dd:24:43:82:29:12:e8:4e:fc:9e:6f:a8:8e:e7:01:
-         ff:56:e4:2d:62:02:99:a1:a9:fa:45:46:48:58:17:e8:ee:37:
-         31:39:08:b6:a3:55:7e:6a:c5:3e:c0:1c:03:39:bc:64:d8:8d:
-         7e:57:35:71:14:38:77:64:3a:3f:b4:4b:e8:10:31:a1:08:8c:
-         2f:e8:de:d4:f8:a0:e6:07:3b:12:8e:12:83:eb:e3:ba:7c:91:
-         b3:50:5e:f3:df:6d:3f:c1:70:f3:5c:e5:0c:84:1a:9d:5a:ae:
-         bc:ac:53:f2:b6:e5:66:f8:00:c0:74:af:ed:e2:89:36:a6:c2:
-         8b:90:8d:6c:23:a3:60:2e:49:1d:dd:d2:19:45:cb:cf:a4:c3:
-         87:9c:fb:8f
------BEGIN CERTIFICATE-----
-MIIERzCCAy+gAwIBAgIJAIE0yC2B8FQfMA0GCSqGSIb3DQEBCwUAMGgxCzAJBgNV
-BAYTAk5OMTEwLwYDVQQKDChFZGVsIEN1cmwgQXJjdGljIElsbHVkaXVtIFJlc2Vh
-cmNoIENsb3VkMSYwJAYDVQQDDB1Ob3J0aGVybiBOb3doZXJlIFRydXN0IEFuY2hv
-cjAeFw0yNTAzMDYxMTUxNDdaFw0yNTEyMzExMTUxNDdaMFQxCzAJBgNVBAYTAk5O
-MTEwLwYDVQQKDChFZGVsIEN1cmwgQXJjdGljIElsbHVkaXVtIFJlc2VhcmNoIENs
-b3VkMRIwEAYDVQQDDAlsb2NhbGhvc3QwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAw
-ggEKAoIBAQDmDa9ZXlNXP07B4vjPMGXdYhMxRgvQYIBRDQkzjeGyDwry/BAL4Tpp
-Q8Pp64tFi9UmDr3I1KYPGwCNdDZgMKDgJMf63Azjg2yL0f0qqKPTIf/FPEcaCeGM
-Mnl0Seny3/dNrLQH7IFAJ2WzlGl2zVcfIWDftHwILzP9dswjyO0c+7uKdC7+fB3T
-LyIt/xF9klDMwAaslaizBkKDCRxSgdEUIb/RsJlQemoQDDDV8OQax10b6b6+xVTr
-5HIENcQUobogRS9gyOGh3rVl9ypdBdGSLSLOGsrCNf189gJHhSKMXW5PKWs6+YRz
-iUpke5+9/gpNoAh6QXej3brJIFihfLixAgMBAAGjggEGMIIBAjAUBgNVHREEDTAL
-gglsb2NhbGhvc3QwCwYDVR0PBAQDAgOoMBMGA1UdJQQMMAoGCCsGAQUFBwMBMB0G
-A1UdDgQWBBS0I5bTKDKHkBhG5S3N09tPm5J2eTAfBgNVHSMEGDAWgBSdK86Vv9gi
-kaLlrf55Dukj4U0oMjAJBgNVHRMEAjAAMEMGCCsGAQUFBwEBBDcwNTAzBggrBgEF
-BQcwAoYnaHR0cDovL3Rlc3QuY3VybC5zZS9jYS9FZGVsQ3VybFJvb3QuY2VyMDgG
-A1UdHwQxMC8wLaAroCmGJ2h0dHA6Ly90ZXN0LmN1cmwuc2UvY2EvRWRlbEN1cmxS
-b290LmNybDANBgkqhkiG9w0BAQsFAAOCAQEAQ7g+Ry4cjnYWTcUEicnTQlyvlyfa
-an+7bUlRDGDHC86PozMmrvh1+shDZbfBpOu7m1Dkl494sKcAlV6sPTmWpjmmlq1c
-G+DTgZEl8Ry93XDVjUQDboyTZpj9HWa4WGqQESZEO06KxO/3TPRXunX13SRDgikS
-6E78nm+ojucB/1bkLWICmaGp+kVGSFgX6O43MTkItqNVfmrFPsAcAzm8ZNiNflc1
-cRQ4d2Q6P7RL6BAxoQiML+je1Pig5gc7Eo4Sg+vjunyRs1Be899tP8Fw81zlDIQa
-nVquvKxT8rblZvgAwHSv7eKJNqbCi5CNbCOjYC5JHd3SGUXLz6TDh5z7jw==
------END CERTIFICATE-----
diff --git a/tests/certs/test-localhost.key b/tests/certs/test-localhost.key
deleted file mode 100644 (file)
index 235f5e3..0000000
+++ /dev/null
@@ -1,27 +0,0 @@
------BEGIN RSA PRIVATE KEY-----
-MIIEpAIBAAKCAQEA5g2vWV5TVz9OweL4zzBl3WITMUYL0GCAUQ0JM43hsg8K8vwQ
-C+E6aUPD6euLRYvVJg69yNSmDxsAjXQ2YDCg4CTH+twM44Nsi9H9Kqij0yH/xTxH
-GgnhjDJ5dEnp8t/3Tay0B+yBQCdls5Rpds1XHyFg37R8CC8z/XbMI8jtHPu7inQu
-/nwd0y8iLf8RfZJQzMAGrJWoswZCgwkcUoHRFCG/0bCZUHpqEAww1fDkGsddG+m+
-vsVU6+RyBDXEFKG6IEUvYMjhod61ZfcqXQXRki0izhrKwjX9fPYCR4UijF1uTylr
-OvmEc4lKZHufvf4KTaAIekF3o926ySBYoXy4sQIDAQABAoIBAQCorDH7sWgjmRwy
-lirdJlwZlFYEE5qH3qlWQ9uSPB3VwqfBfkR5oVqFYZUcRoInrJ3MOJS30gorGx4t
-mJ5hqmXZ0b36VSryCSMl5QHdLCZpoAz63PY4xjPj6gIY3DS2ybV18wFQqfweQISV
-xWQKIgYVohB4FMm36nwRA/Aq8J/BVgC/SIGJnDW2EGId5op20BdH7APedquXqzzp
-FwETV3hH7QDbdip+Td+5/Nnc9yLg4ecSvOLe5mLaGXgsxhNqAKnY5f3izMh+FTvx
-jgR12x/urhu4mwpKie7Y/JO+FsNJYevHHKYX1wUhGO2Puco4bCUiAecmrO4lFOMX
-auBjsCQtAoGBAPcnzQy8UIHBSxgUaQ2zEWtQNKg/lYy3BiM7rTq8HIAEggL5ylxv
-bP17tIQQZAhayaeR1BKL7yP8d5UlZedI9gzMP23mNsrxpC2BsmcBEZZQFRRFhWsD
-bnVWWQkx6KgVIDtZwQF1OhNUuZxUkTlXMSuSdNNVJADIHd8y7oxaGGvHAoGBAO5J
-Nj3L7eh9Eoh4iEMbyOu1iymE+jdzuY80wVBacMinjpmGE6wlIf/bvwb2/xGMd+Ix
-Sd60wCg/obN/62EAWaiJH88qrF5Uj+l2u1tmp3oRMOiBkXbLhEXzGP9Qcoa6s8gT
-HjatboUgCUuSQrY4OUu+wmqwufBh7poSGFUs/YfHAoGBAL5svgG3/ddbVD5jS2Ww
-uBUUoN2Yz+KxCVuQGTINyW+hCYK9bnq1pyXOcBDoiAof2QrwwpLfmgsB9CjHvbHr
-dxf5Lk3AeCr47uPY79mI60ICxZruzZLb+/kP5F2/RGBsln7j8l7rMSm/t5qJVbL2
-SP4nQzeoe6rWhJ15om4k5Hf1AoGAGpuGOQRKfoloxmBfJs81ckyFS4+TuRltAPat
-F2Hh8iXzoGT+UVycHUvWWtq9xKHgyRsj2oBobJYeYkLIb75wRId7S9DCCo56u2EM
-rroZvWGqCmxdZ9x12rG4etnqz+yNIqwv1X8sNiVLpGqilGJW04RrhSpSuOrWj9Gx
-ceFiNgUCgYBAAubXkD1rcIs2X8Ds3ztwYPaGL8ZX4q8eWvncgjz3YmVve408XD0w
-Sd44NWgjK2LXMv3ddXFdukoDmGm75KhDHWKO9vPBo0wpB5FXkMyHiDyM65X0MZC8
-xzSd9dUcy7TBjMVV2ge81b6U8nCwrdrU2L/0dzigmKnrLrF8MRjFLA==
------END RSA PRIVATE KEY-----
diff --git a/tests/certs/test-localhost.nn.crl b/tests/certs/test-localhost.nn.crl
deleted file mode 100644 (file)
index 95229d7..0000000
+++ /dev/null
@@ -1,37 +0,0 @@
------BEGIN X509 CRL-----
-MIIGXjCCBUYCAQEwDQYJKoZIhvcNAQELBQAwaDELMAkGA1UEBhMCTk4xMTAvBgNV
-BAoMKEVkZWwgQ3VybCBBcmN0aWMgSWxsdWRpdW0gUmVzZWFyY2ggQ2xvdWQxJjAk
-BgNVBAMMHU5vcnRoZXJuIE5vd2hlcmUgVHJ1c3QgQW5jaG9yFw0yNTAzMDYxMTUx
-NDhaFw0yNTA0MDUxMTUxNDhaMIIEmDAaAgkAgTTILYHwU/cXDTI1MDMwNjEwMTkz
-NFowGgIJAIE0yC2B8FP4Fw0yNTAzMDYxMDE5MzRaMBoCCQCBNMgtgfBT+RcNMjUw
-MzA2MTAxOTM0WjAaAgkAgTTILYHwU/oXDTI1MDMwNjEwMTkzNVowGgIJAIE0yC2B
-8FP7Fw0yNTAzMDYxMDE5MzVaMBoCCQCBNMgtgfBT/BcNMjUwMzA2MTAxOTM1WjAa
-AgkAgTTILYHwU/0XDTI1MDMwNjEwNDMzOVowGgIJAIE0yC2B8FP+Fw0yNTAzMDYx
-MDQzMzlaMBoCCQCBNMgtgfBT/xcNMjUwMzA2MTA0MzQwWjAaAgkAgTTILYHwVAAX
-DTI1MDMwNjEwNDM0MFowGgIJAIE0yC2B8FQBFw0yNTAzMDYxMDQzNDBaMBoCCQCB
-NMgtgfBUAhcNMjUwMzA2MTA0NjA4WjAaAgkAgTTILYHwVAMXDTI1MDMwNjEwNDYw
-OFowGgIJAIE0yC2B8FQEFw0yNTAzMDYxMDQ2MDhaMBoCCQCBNMgtgfBUBRcNMjUw
-MzA2MTA0NjA4WjAaAgkAgTTILYHwVAYXDTI1MDMwNjEwNDYwOVowGgIJAIE0yC2B
-8FQHFw0yNTAzMDYxMDQ2MDlaMBoCCQCBNMgtgfBUCBcNMjUwMzA2MTA0ODU5WjAa
-AgkAgTTILYHwVAkXDTI1MDMwNjEwNDg1OVowGgIJAIE0yC2B8FQKFw0yNTAzMDYx
-MDQ4NTlaMBoCCQCBNMgtgfBUCxcNMjUwMzA2MTA0ODU5WjAaAgkAgTTILYHwVAwX
-DTI1MDMwNjEwNDkwMFowGgIJAIE0yC2B8FQNFw0yNTAzMDYxMDQ5MDBaMBoCCQCB
-NMgtgfBUDhcNMjUwMzA2MTExMzM4WjAaAgkAgTTILYHwVA8XDTI1MDMwNjExMTMz
-OFowGgIJAIE0yC2B8FQQFw0yNTAzMDYxMTEzMzhaMBoCCQCBNMgtgfBUERcNMjUw
-MzA2MTExMzM4WjAaAgkAgTTILYHwVBIXDTI1MDMwNjExMTMzOFowGgIJAIE0yC2B
-8FQTFw0yNTAzMDYxMTE1MzBaMBoCCQCBNMgtgfBUFBcNMjUwMzA2MTExNTMwWjAa
-AgkAgTTILYHwVBUXDTI1MDMwNjExMTUzMFowGgIJAIE0yC2B8FQWFw0yNTAzMDYx
-MTE1MzBaMBoCCQCBNMgtgfBUFxcNMjUwMzA2MTExNTMwWjAaAgkAgTTILYHwVBgX
-DTI1MDMwNjExMTUzMFowGgIJAIE0yC2B8FQZFw0yNTAzMDYxMTE5MDNaMBoCCQCB
-NMgtgfBUGhcNMjUwMzA2MTExOTA0WjAaAgkAgTTILYHwVBsXDTI1MDMwNjExMTkw
-NFowGgIJAIE0yC2B8FQcFw0yNTAzMDYxMTE5MDRaMBoCCQCBNMgtgfBUHRcNMjUw
-MzA2MTExOTA0WjAaAgkAgTTILYHwVB4XDTI1MDMwNjExMTkwNFowGgIJAIE0yC2B
-8FQfFw0yNTAzMDYxMTUxNDdaMBoCCQCBNMgtgfBUIBcNMjUwMzA2MTE1MTQ4WqAO
-MAwwCgYDVR0UBAMCAQEwDQYJKoZIhvcNAQELBQADggEBABSYAYf7oUbmHOPkUk0p
-/rIqghCYWv9/PawRBI+ggCaMoC5jj9ppxNwXsI2FGrbN6vwpVbZ5mkF+gs3mNDlA
-fC0/Qj6IMuM/qRSFGXE4OQaQtYRH5BXFT4A0CiKhbBiDE8T8lHaLMIRWXP5phdoU
-X2FtZe/8Es+uyN1iF0KyNMFSIrFayEO4hUYH4KUxGgSq3vIp61JPRvQlHxl4g6jC
-OEH5Q7BLOd718Dzd5o1w9etaiOV8PqLmNd/t7BwX72I33XQyBOJ8sBtlB3y2LgfU
-CN7XlAEzF0+uFTClHHqndkw97+emgjjz/JVKH/M8kBQVQ2tcvbKTiJKhTS/Uw2cR
-uPw=
------END X509 CRL-----
diff --git a/tests/certs/test-localhost.nn.crt b/tests/certs/test-localhost.nn.crt
deleted file mode 100644 (file)
index 41c2392..0000000
+++ /dev/null
@@ -1,104 +0,0 @@
-Certificate:
-    Data:
-        Version: 3 (0x2)
-        Serial Number:
-            81:34:c8:2d:81:f0:54:20
-    Signature Algorithm: sha256WithRSAEncryption
-        Issuer:
-            countryName               = NN
-            organizationName          = Edel Curl Arctic Illudium Research Cloud
-            commonName                = Northern Nowhere Trust Anchor
-        Validity
-            Not Before: Mar  6 11:51:47 2025 GMT
-            Not After : Dec 31 11:51:47 2025 GMT
-        Subject:
-            countryName               = NN
-            organizationName          = Edel Curl Arctic Illudium Research Cloud
-            commonName                = localhost.nn
-        Subject Public Key Info:
-            Public Key Algorithm: rsaEncryption
-                RSA Public-Key: (2048 bit)
-                Modulus:
-                    00:c8:04:06:3e:c7:71:90:6b:e3:ce:39:04:3d:70:
-                    5b:a2:50:fb:9e:9f:68:d9:36:f0:87:b9:82:65:3a:
-                    9a:2a:fe:37:e0:e0:96:f0:27:4b:c0:f2:01:33:11:
-                    ba:ba:06:3d:73:77:34:9f:0d:fd:d8:da:1e:bf:4d:
-                    64:d3:80:d0:65:e8:b5:25:cb:e9:d5:6e:2e:46:9c:
-                    2a:18:07:36:46:17:a2:db:89:08:13:f6:44:01:82:
-                    8f:45:8b:b4:a1:7b:8b:87:36:66:e0:3e:01:ad:0c:
-                    29:07:02:3d:5b:67:ec:0b:2e:c3:3b:c6:da:20:99:
-                    5f:cf:6d:f4:77:12:7b:be:1f:c3:b4:26:5c:f8:7e:
-                    86:39:7f:07:f8:12:15:36:47:0b:1b:f0:02:d6:65:
-                    5c:ba:19:ad:9f:b0:43:9f:54:49:4f:c8:0c:89:07:
-                    c4:78:91:c0:3d:64:87:ba:a3:30:a0:c7:15:2c:d1:
-                    a9:7c:cb:14:9e:8c:55:50:92:cc:ae:64:27:df:eb:
-                    54:86:a1:11:55:74:60:53:5b:cc:dc:9e:7a:85:9b:
-                    e5:e5:2e:03:a2:23:19:23:98:76:87:b1:4b:63:13:
-                    60:8e:ba:c5:c6:ed:d8:d2:fd:ad:a1:dd:15:37:a6:
-                    91:f2:c8:eb:f7:68:ee:ff:f3:d5:c7:81:a3:12:3a:
-                    79:2d
-                Exponent: 65537 (0x10001)
-        X509v3 extensions:
-            X509v3 Subject Alternative Name: 
-                DNS:localhost.nn
-            X509v3 Key Usage: 
-                Digital Signature, Key Encipherment, Key Agreement
-            X509v3 Extended Key Usage: 
-                TLS Web Server Authentication
-            X509v3 Subject Key Identifier: 
-                F7:82:F9:EF:7C:0E:14:42:64:61:2C:F0:9C:36:F2:C0:B5:76:C8:1A
-            X509v3 Authority Key Identifier: 
-                keyid:9D:2B:CE:95:BF:D8:22:91:A2:E5:AD:FE:79:0E:E9:23:E1:4D:28:32
-
-            X509v3 Basic Constraints: 
-                CA:FALSE
-            Authority Information Access: 
-                CA Issuers - URI:http://test.curl.se/ca/EdelCurlRoot.cer
-
-            X509v3 CRL Distribution Points: 
-
-                Full Name:
-                  URI:http://test.curl.se/ca/EdelCurlRoot.crl
-
-    Signature Algorithm: sha256WithRSAEncryption
-         8a:4a:da:16:6e:86:84:f9:3d:8e:76:cf:e5:32:b3:aa:c1:23:
-         87:e6:f7:2e:e9:f0:9f:5d:a0:88:e8:68:71:6d:52:12:53:db:
-         dc:9e:8f:ac:de:95:a2:a7:d6:9e:82:ff:ef:80:49:74:4c:fa:
-         3a:95:73:1d:a5:b2:93:24:3e:79:c7:47:29:04:9c:6d:e2:fa:
-         98:a2:ef:10:f6:f8:00:ea:09:3b:c4:90:7f:f3:43:df:dc:6a:
-         01:dd:c6:32:ae:38:bd:d1:36:c3:e6:05:c1:60:3e:7f:d9:8f:
-         42:7a:f1:66:54:f8:2f:f0:a8:31:84:73:f9:26:2b:71:02:4e:
-         6a:53:d6:c8:b7:5e:b0:27:40:b3:24:ee:93:76:f3:17:5d:94:
-         f6:d9:3a:b7:57:ff:fa:7a:09:13:b8:7f:f4:62:e8:06:0c:1d:
-         94:f0:7a:2a:af:9d:82:da:de:42:26:a2:42:cd:a0:ab:5e:ad:
-         94:97:e2:7c:f5:91:f9:39:d2:3b:26:95:a3:43:b4:8c:20:ca:
-         5e:7c:af:07:48:24:1f:bf:32:8e:f0:a2:85:ff:74:f1:bd:7c:
-         44:63:9f:cf:91:74:b8:a8:0a:59:70:57:12:92:d7:c9:b7:ea:
-         61:a3:e7:6a:5f:4c:36:3c:b8:90:c6:3a:4b:44:42:d0:82:bb:
-         84:64:4a:03
------BEGIN CERTIFICATE-----
-MIIETTCCAzWgAwIBAgIJAIE0yC2B8FQgMA0GCSqGSIb3DQEBCwUAMGgxCzAJBgNV
-BAYTAk5OMTEwLwYDVQQKDChFZGVsIEN1cmwgQXJjdGljIElsbHVkaXVtIFJlc2Vh
-cmNoIENsb3VkMSYwJAYDVQQDDB1Ob3J0aGVybiBOb3doZXJlIFRydXN0IEFuY2hv
-cjAeFw0yNTAzMDYxMTUxNDdaFw0yNTEyMzExMTUxNDdaMFcxCzAJBgNVBAYTAk5O
-MTEwLwYDVQQKDChFZGVsIEN1cmwgQXJjdGljIElsbHVkaXVtIFJlc2VhcmNoIENs
-b3VkMRUwEwYDVQQDDAxsb2NhbGhvc3Qubm4wggEiMA0GCSqGSIb3DQEBAQUAA4IB
-DwAwggEKAoIBAQDIBAY+x3GQa+POOQQ9cFuiUPuen2jZNvCHuYJlOpoq/jfg4Jbw
-J0vA8gEzEbq6Bj1zdzSfDf3Y2h6/TWTTgNBl6LUly+nVbi5GnCoYBzZGF6LbiQgT
-9kQBgo9Fi7She4uHNmbgPgGtDCkHAj1bZ+wLLsM7xtogmV/PbfR3Enu+H8O0Jlz4
-foY5fwf4EhU2Rwsb8ALWZVy6Ga2fsEOfVElPyAyJB8R4kcA9ZIe6ozCgxxUs0al8
-yxSejFVQksyuZCff61SGoRFVdGBTW8zcnnqFm+XlLgOiIxkjmHaHsUtjE2COusXG
-7djS/a2h3RU3ppHyyOv3aO7/89XHgaMSOnktAgMBAAGjggEJMIIBBTAXBgNVHREE
-EDAOggxsb2NhbGhvc3Qubm4wCwYDVR0PBAQDAgOoMBMGA1UdJQQMMAoGCCsGAQUF
-BwMBMB0GA1UdDgQWBBT3gvnvfA4UQmRhLPCcNvLAtXbIGjAfBgNVHSMEGDAWgBSd
-K86Vv9gikaLlrf55Dukj4U0oMjAJBgNVHRMEAjAAMEMGCCsGAQUFBwEBBDcwNTAz
-BggrBgEFBQcwAoYnaHR0cDovL3Rlc3QuY3VybC5zZS9jYS9FZGVsQ3VybFJvb3Qu
-Y2VyMDgGA1UdHwQxMC8wLaAroCmGJ2h0dHA6Ly90ZXN0LmN1cmwuc2UvY2EvRWRl
-bEN1cmxSb290LmNybDANBgkqhkiG9w0BAQsFAAOCAQEAikraFm6GhPk9jnbP5TKz
-qsEjh+b3Lunwn12giOhocW1SElPb3J6PrN6VoqfWnoL/74BJdEz6OpVzHaWykyQ+
-ecdHKQScbeL6mKLvEPb4AOoJO8SQf/ND39xqAd3GMq44vdE2w+YFwWA+f9mPQnrx
-ZlT4L/CoMYRz+SYrcQJOalPWyLdesCdAsyTuk3bzF12U9tk6t1f/+noJE7h/9GLo
-BgwdlPB6Kq+dgtreQiaiQs2gq16tlJfifPWR+TnSOyaVo0O0jCDKXnyvB0gkH78y
-jvCihf908b18RGOfz5F0uKgKWXBXEpLXybfqYaPnal9MNjy4kMY6S0RC0IK7hGRK
-Aw==
------END CERTIFICATE-----
diff --git a/tests/certs/test-localhost.nn.key b/tests/certs/test-localhost.nn.key
deleted file mode 100644 (file)
index cbe4520..0000000
+++ /dev/null
@@ -1,27 +0,0 @@
------BEGIN RSA PRIVATE KEY-----
-MIIEowIBAAKCAQEAyAQGPsdxkGvjzjkEPXBbolD7np9o2Tbwh7mCZTqaKv434OCW
-8CdLwPIBMxG6ugY9c3c0nw392Noev01k04DQZei1Jcvp1W4uRpwqGAc2Rhei24kI
-E/ZEAYKPRYu0oXuLhzZm4D4BrQwpBwI9W2fsCy7DO8baIJlfz230dxJ7vh/DtCZc
-+H6GOX8H+BIVNkcLG/AC1mVcuhmtn7BDn1RJT8gMiQfEeJHAPWSHuqMwoMcVLNGp
-fMsUnoxVUJLMrmQn3+tUhqERVXRgU1vM3J56hZvl5S4DoiMZI5h2h7FLYxNgjrrF
-xu3Y0v2tod0VN6aR8sjr92ju//PVx4GjEjp5LQIDAQABAoIBAQCmscvuqFO6NGCw
-Lw6ckbac6Xc69MnyNfpycyX8bcGs0SAK18KTtXxJ+qcLQ9xmSusN/ywo3wVPpEF5
-1+uO5c1JEY9fR7nC+cexa1cdnW0bL3m4E1VbJaP5yjDTmiJZbtiTQMCuZJ8K9JaA
-09oFAvBTRY7Kk+iYwJp8CrxyPEJK6T7eMMLaLkT9VkRfl3om/cbND4waf15ev7bk
-QyMGNkWbcq4EFto8+OnEifrTBv/InZu31/XzIJO1HW44sf4+/WdUehlEpR1FEfYt
-nFQvJz9w8EQPqTcuE3coQyXAgzjNnRDLXMHeLnVwydHH9Yrh+qY0YyASq6Na/gke
-FtaOPnr1AoGBAOkaMmFIVwrGPNjLysJf0/qjke86v4HN7EpeM1D98jL4EemS9Lch
-fmeUCHRtbjWcCRT6azDZa/hAe0Qe1QE+y7HdkMrDRf94aWwyRl+fvmMWeki8izv3
-3MtK6BZf5rGqt5GAwg8n9eq64SgAh88FdUJ90ULkZLO799ODtaRMKEJDAoGBANup
-zTURGY+dmFoIHBBLQT8+Hs5KoqP3fvxR2a3SytHHEaJfxGcJTaFs4mJ/fqgWm3S2
-w1c4J1OlxJjSY0UcYkqqDF6LnH3T9B4Jrwo0IJsB0BG5oJi2xZj8OEQg8Z0a3b/p
-3DXm3G2toD0MU6TUQMRtBEaWRxd1YQcMuE+5BbfPAoGAeEM/wtkjrzdfpSpfTbFL
-GIDThe11aG7pfeTj7OFX19wMwclD4Eezg5ToV8ktlxMNzHj2XJmQDuCVuCuAEcho
-Jzf8v9/HeWqSWXQGwscT3uN165j67NGQZIIdA44u43MEilk3xcIEKjqId67uYmya
-dtea4zwaiHBuB/5n9IAmNSkCgYBiwzOqeme9tKO9RwwnH07Uun9rTQ9XHX4QwFRY
-3P+n1hNNqDVMBljLDYOzuZMezBtVHJ8zZeH4r/12oJFVj296Fn69O5Q+1r9Zig0T
-T2ChkO0WKxnTz8mEAVLi/tTjSCMPmHwUGBpfjcMP76zj3TLJniJgAk0wdOwNGWD9
-Jzk07QKBgBBsK9q29qyLwOsqfTISwxZVCT+zj/7YMfxvo4RBWNq9SfWJhsGsZpXD
-DBX0My+Qrf0Vl6CV2l2zpqZxe+nGSeCDelJZaqYjhoRAynnawOZ3fNBmBNt7U6jX
-dze4yPef6lUpeVaxPgwCgePUAlvgScV7fqlv4jClGlrwk9DH1YcG
------END RSA PRIVATE KEY-----
diff --git a/tests/certs/test-localhost.nn.pem b/tests/certs/test-localhost.nn.pem
deleted file mode 100644 (file)
index 09d93f8..0000000
+++ /dev/null
@@ -1,166 +0,0 @@
-extensions = x509v3
-
-[ x509v3 ]
-subjectAltName          = DNS:localhost.nn
-keyUsage                = keyEncipherment,digitalSignature,keyAgreement
-extendedKeyUsage        = serverAuth
-subjectKeyIdentifier    = hash
-authorityKeyIdentifier  = keyid
-basicConstraints        = CA:false
-authorityInfoAccess     = @issuer_info
-crlDistributionPoints   = @crl_info
-
-[ crl_ext ]
-authorityKeyIdentifier  = keyid:always
-authorityInfoAccess     = @issuer_info
-
-[ issuer_info ]
-caIssuers;URI.0         = http://test.curl.se/ca/EdelCurlRoot.cer
-
-[ crl_info ]
-URI.0                   = http://test.curl.se/ca/EdelCurlRoot.crl
-
-[ req ]
-default_bits            = 1024
-distinguished_name      = req_DN
-default_md              = sha256
-string_mask             = utf8only
-
-[ req_DN ]
-countryName             = "Country Name is Northern Nowhere"
-countryName_value       = NN
-organizationName        = "Organization Name"
-organizationName_value  = Edel Curl Arctic Illudium Research Cloud
-commonName              = "Common Name"
-commonName_value        = localhost.nn
------BEGIN RSA PRIVATE KEY-----
-MIIEowIBAAKCAQEAyAQGPsdxkGvjzjkEPXBbolD7np9o2Tbwh7mCZTqaKv434OCW
-8CdLwPIBMxG6ugY9c3c0nw392Noev01k04DQZei1Jcvp1W4uRpwqGAc2Rhei24kI
-E/ZEAYKPRYu0oXuLhzZm4D4BrQwpBwI9W2fsCy7DO8baIJlfz230dxJ7vh/DtCZc
-+H6GOX8H+BIVNkcLG/AC1mVcuhmtn7BDn1RJT8gMiQfEeJHAPWSHuqMwoMcVLNGp
-fMsUnoxVUJLMrmQn3+tUhqERVXRgU1vM3J56hZvl5S4DoiMZI5h2h7FLYxNgjrrF
-xu3Y0v2tod0VN6aR8sjr92ju//PVx4GjEjp5LQIDAQABAoIBAQCmscvuqFO6NGCw
-Lw6ckbac6Xc69MnyNfpycyX8bcGs0SAK18KTtXxJ+qcLQ9xmSusN/ywo3wVPpEF5
-1+uO5c1JEY9fR7nC+cexa1cdnW0bL3m4E1VbJaP5yjDTmiJZbtiTQMCuZJ8K9JaA
-09oFAvBTRY7Kk+iYwJp8CrxyPEJK6T7eMMLaLkT9VkRfl3om/cbND4waf15ev7bk
-QyMGNkWbcq4EFto8+OnEifrTBv/InZu31/XzIJO1HW44sf4+/WdUehlEpR1FEfYt
-nFQvJz9w8EQPqTcuE3coQyXAgzjNnRDLXMHeLnVwydHH9Yrh+qY0YyASq6Na/gke
-FtaOPnr1AoGBAOkaMmFIVwrGPNjLysJf0/qjke86v4HN7EpeM1D98jL4EemS9Lch
-fmeUCHRtbjWcCRT6azDZa/hAe0Qe1QE+y7HdkMrDRf94aWwyRl+fvmMWeki8izv3
-3MtK6BZf5rGqt5GAwg8n9eq64SgAh88FdUJ90ULkZLO799ODtaRMKEJDAoGBANup
-zTURGY+dmFoIHBBLQT8+Hs5KoqP3fvxR2a3SytHHEaJfxGcJTaFs4mJ/fqgWm3S2
-w1c4J1OlxJjSY0UcYkqqDF6LnH3T9B4Jrwo0IJsB0BG5oJi2xZj8OEQg8Z0a3b/p
-3DXm3G2toD0MU6TUQMRtBEaWRxd1YQcMuE+5BbfPAoGAeEM/wtkjrzdfpSpfTbFL
-GIDThe11aG7pfeTj7OFX19wMwclD4Eezg5ToV8ktlxMNzHj2XJmQDuCVuCuAEcho
-Jzf8v9/HeWqSWXQGwscT3uN165j67NGQZIIdA44u43MEilk3xcIEKjqId67uYmya
-dtea4zwaiHBuB/5n9IAmNSkCgYBiwzOqeme9tKO9RwwnH07Uun9rTQ9XHX4QwFRY
-3P+n1hNNqDVMBljLDYOzuZMezBtVHJ8zZeH4r/12oJFVj296Fn69O5Q+1r9Zig0T
-T2ChkO0WKxnTz8mEAVLi/tTjSCMPmHwUGBpfjcMP76zj3TLJniJgAk0wdOwNGWD9
-Jzk07QKBgBBsK9q29qyLwOsqfTISwxZVCT+zj/7YMfxvo4RBWNq9SfWJhsGsZpXD
-DBX0My+Qrf0Vl6CV2l2zpqZxe+nGSeCDelJZaqYjhoRAynnawOZ3fNBmBNt7U6jX
-dze4yPef6lUpeVaxPgwCgePUAlvgScV7fqlv4jClGlrwk9DH1YcG
------END RSA PRIVATE KEY-----
-Certificate:
-    Data:
-        Version: 3 (0x2)
-        Serial Number:
-            81:34:c8:2d:81:f0:54:20
-    Signature Algorithm: sha256WithRSAEncryption
-        Issuer:
-            countryName               = NN
-            organizationName          = Edel Curl Arctic Illudium Research Cloud
-            commonName                = Northern Nowhere Trust Anchor
-        Validity
-            Not Before: Mar  6 11:51:47 2025 GMT
-            Not After : Dec 31 11:51:47 2025 GMT
-        Subject:
-            countryName               = NN
-            organizationName          = Edel Curl Arctic Illudium Research Cloud
-            commonName                = localhost.nn
-        Subject Public Key Info:
-            Public Key Algorithm: rsaEncryption
-                RSA Public-Key: (2048 bit)
-                Modulus:
-                    00:c8:04:06:3e:c7:71:90:6b:e3:ce:39:04:3d:70:
-                    5b:a2:50:fb:9e:9f:68:d9:36:f0:87:b9:82:65:3a:
-                    9a:2a:fe:37:e0:e0:96:f0:27:4b:c0:f2:01:33:11:
-                    ba:ba:06:3d:73:77:34:9f:0d:fd:d8:da:1e:bf:4d:
-                    64:d3:80:d0:65:e8:b5:25:cb:e9:d5:6e:2e:46:9c:
-                    2a:18:07:36:46:17:a2:db:89:08:13:f6:44:01:82:
-                    8f:45:8b:b4:a1:7b:8b:87:36:66:e0:3e:01:ad:0c:
-                    29:07:02:3d:5b:67:ec:0b:2e:c3:3b:c6:da:20:99:
-                    5f:cf:6d:f4:77:12:7b:be:1f:c3:b4:26:5c:f8:7e:
-                    86:39:7f:07:f8:12:15:36:47:0b:1b:f0:02:d6:65:
-                    5c:ba:19:ad:9f:b0:43:9f:54:49:4f:c8:0c:89:07:
-                    c4:78:91:c0:3d:64:87:ba:a3:30:a0:c7:15:2c:d1:
-                    a9:7c:cb:14:9e:8c:55:50:92:cc:ae:64:27:df:eb:
-                    54:86:a1:11:55:74:60:53:5b:cc:dc:9e:7a:85:9b:
-                    e5:e5:2e:03:a2:23:19:23:98:76:87:b1:4b:63:13:
-                    60:8e:ba:c5:c6:ed:d8:d2:fd:ad:a1:dd:15:37:a6:
-                    91:f2:c8:eb:f7:68:ee:ff:f3:d5:c7:81:a3:12:3a:
-                    79:2d
-                Exponent: 65537 (0x10001)
-        X509v3 extensions:
-            X509v3 Subject Alternative Name: 
-                DNS:localhost.nn
-            X509v3 Key Usage: 
-                Digital Signature, Key Encipherment, Key Agreement
-            X509v3 Extended Key Usage: 
-                TLS Web Server Authentication
-            X509v3 Subject Key Identifier: 
-                F7:82:F9:EF:7C:0E:14:42:64:61:2C:F0:9C:36:F2:C0:B5:76:C8:1A
-            X509v3 Authority Key Identifier: 
-                keyid:9D:2B:CE:95:BF:D8:22:91:A2:E5:AD:FE:79:0E:E9:23:E1:4D:28:32
-
-            X509v3 Basic Constraints: 
-                CA:FALSE
-            Authority Information Access: 
-                CA Issuers - URI:http://test.curl.se/ca/EdelCurlRoot.cer
-
-            X509v3 CRL Distribution Points: 
-
-                Full Name:
-                  URI:http://test.curl.se/ca/EdelCurlRoot.crl
-
-    Signature Algorithm: sha256WithRSAEncryption
-         8a:4a:da:16:6e:86:84:f9:3d:8e:76:cf:e5:32:b3:aa:c1:23:
-         87:e6:f7:2e:e9:f0:9f:5d:a0:88:e8:68:71:6d:52:12:53:db:
-         dc:9e:8f:ac:de:95:a2:a7:d6:9e:82:ff:ef:80:49:74:4c:fa:
-         3a:95:73:1d:a5:b2:93:24:3e:79:c7:47:29:04:9c:6d:e2:fa:
-         98:a2:ef:10:f6:f8:00:ea:09:3b:c4:90:7f:f3:43:df:dc:6a:
-         01:dd:c6:32:ae:38:bd:d1:36:c3:e6:05:c1:60:3e:7f:d9:8f:
-         42:7a:f1:66:54:f8:2f:f0:a8:31:84:73:f9:26:2b:71:02:4e:
-         6a:53:d6:c8:b7:5e:b0:27:40:b3:24:ee:93:76:f3:17:5d:94:
-         f6:d9:3a:b7:57:ff:fa:7a:09:13:b8:7f:f4:62:e8:06:0c:1d:
-         94:f0:7a:2a:af:9d:82:da:de:42:26:a2:42:cd:a0:ab:5e:ad:
-         94:97:e2:7c:f5:91:f9:39:d2:3b:26:95:a3:43:b4:8c:20:ca:
-         5e:7c:af:07:48:24:1f:bf:32:8e:f0:a2:85:ff:74:f1:bd:7c:
-         44:63:9f:cf:91:74:b8:a8:0a:59:70:57:12:92:d7:c9:b7:ea:
-         61:a3:e7:6a:5f:4c:36:3c:b8:90:c6:3a:4b:44:42:d0:82:bb:
-         84:64:4a:03
------BEGIN CERTIFICATE-----
-MIIETTCCAzWgAwIBAgIJAIE0yC2B8FQgMA0GCSqGSIb3DQEBCwUAMGgxCzAJBgNV
-BAYTAk5OMTEwLwYDVQQKDChFZGVsIEN1cmwgQXJjdGljIElsbHVkaXVtIFJlc2Vh
-cmNoIENsb3VkMSYwJAYDVQQDDB1Ob3J0aGVybiBOb3doZXJlIFRydXN0IEFuY2hv
-cjAeFw0yNTAzMDYxMTUxNDdaFw0yNTEyMzExMTUxNDdaMFcxCzAJBgNVBAYTAk5O
-MTEwLwYDVQQKDChFZGVsIEN1cmwgQXJjdGljIElsbHVkaXVtIFJlc2VhcmNoIENs
-b3VkMRUwEwYDVQQDDAxsb2NhbGhvc3Qubm4wggEiMA0GCSqGSIb3DQEBAQUAA4IB
-DwAwggEKAoIBAQDIBAY+x3GQa+POOQQ9cFuiUPuen2jZNvCHuYJlOpoq/jfg4Jbw
-J0vA8gEzEbq6Bj1zdzSfDf3Y2h6/TWTTgNBl6LUly+nVbi5GnCoYBzZGF6LbiQgT
-9kQBgo9Fi7She4uHNmbgPgGtDCkHAj1bZ+wLLsM7xtogmV/PbfR3Enu+H8O0Jlz4
-foY5fwf4EhU2Rwsb8ALWZVy6Ga2fsEOfVElPyAyJB8R4kcA9ZIe6ozCgxxUs0al8
-yxSejFVQksyuZCff61SGoRFVdGBTW8zcnnqFm+XlLgOiIxkjmHaHsUtjE2COusXG
-7djS/a2h3RU3ppHyyOv3aO7/89XHgaMSOnktAgMBAAGjggEJMIIBBTAXBgNVHREE
-EDAOggxsb2NhbGhvc3Qubm4wCwYDVR0PBAQDAgOoMBMGA1UdJQQMMAoGCCsGAQUF
-BwMBMB0GA1UdDgQWBBT3gvnvfA4UQmRhLPCcNvLAtXbIGjAfBgNVHSMEGDAWgBSd
-K86Vv9gikaLlrf55Dukj4U0oMjAJBgNVHRMEAjAAMEMGCCsGAQUFBwEBBDcwNTAz
-BggrBgEFBQcwAoYnaHR0cDovL3Rlc3QuY3VybC5zZS9jYS9FZGVsQ3VybFJvb3Qu
-Y2VyMDgGA1UdHwQxMC8wLaAroCmGJ2h0dHA6Ly90ZXN0LmN1cmwuc2UvY2EvRWRl
-bEN1cmxSb290LmNybDANBgkqhkiG9w0BAQsFAAOCAQEAikraFm6GhPk9jnbP5TKz
-qsEjh+b3Lunwn12giOhocW1SElPb3J6PrN6VoqfWnoL/74BJdEz6OpVzHaWykyQ+
-ecdHKQScbeL6mKLvEPb4AOoJO8SQf/ND39xqAd3GMq44vdE2w+YFwWA+f9mPQnrx
-ZlT4L/CoMYRz+SYrcQJOalPWyLdesCdAsyTuk3bzF12U9tk6t1f/+noJE7h/9GLo
-BgwdlPB6Kq+dgtreQiaiQs2gq16tlJfifPWR+TnSOyaVo0O0jCDKXnyvB0gkH78y
-jvCihf908b18RGOfz5F0uKgKWXBXEpLXybfqYaPnal9MNjy4kMY6S0RC0IK7hGRK
-Aw==
------END CERTIFICATE-----
diff --git a/tests/certs/test-localhost.nn.pub.der b/tests/certs/test-localhost.nn.pub.der
deleted file mode 100644 (file)
index 8a837ff..0000000
Binary files a/tests/certs/test-localhost.nn.pub.der and /dev/null differ
diff --git a/tests/certs/test-localhost.nn.pub.pem b/tests/certs/test-localhost.nn.pub.pem
deleted file mode 100644 (file)
index 390afc3..0000000
+++ /dev/null
@@ -1,9 +0,0 @@
------BEGIN PUBLIC KEY-----
-MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAyAQGPsdxkGvjzjkEPXBb
-olD7np9o2Tbwh7mCZTqaKv434OCW8CdLwPIBMxG6ugY9c3c0nw392Noev01k04DQ
-Zei1Jcvp1W4uRpwqGAc2Rhei24kIE/ZEAYKPRYu0oXuLhzZm4D4BrQwpBwI9W2fs
-Cy7DO8baIJlfz230dxJ7vh/DtCZc+H6GOX8H+BIVNkcLG/AC1mVcuhmtn7BDn1RJ
-T8gMiQfEeJHAPWSHuqMwoMcVLNGpfMsUnoxVUJLMrmQn3+tUhqERVXRgU1vM3J56
-hZvl5S4DoiMZI5h2h7FLYxNgjrrFxu3Y0v2tod0VN6aR8sjr92ju//PVx4GjEjp5
-LQIDAQAB
------END PUBLIC KEY-----
diff --git a/tests/certs/test-localhost.pem b/tests/certs/test-localhost.pem
deleted file mode 100644 (file)
index 8c62ddd..0000000
+++ /dev/null
@@ -1,165 +0,0 @@
-extensions = x509v3
-
-[ x509v3 ]
-subjectAltName          = DNS:localhost
-keyUsage                = keyEncipherment,digitalSignature,keyAgreement
-extendedKeyUsage        = serverAuth
-subjectKeyIdentifier    = hash
-authorityKeyIdentifier  = keyid
-basicConstraints        = CA:false
-authorityInfoAccess     = @issuer_info
-crlDistributionPoints   = @crl_info
-
-[ crl_ext ]
-authorityKeyIdentifier  = keyid:always
-authorityInfoAccess     = @issuer_info
-
-[ issuer_info ]
-caIssuers;URI.0         = http://test.curl.se/ca/EdelCurlRoot.cer
-
-[ crl_info ]
-URI.0                   = http://test.curl.se/ca/EdelCurlRoot.crl
-
-[ req ]
-default_bits            = 2048
-distinguished_name      = req_DN
-default_md              = sha256
-string_mask             = utf8only
-
-[ req_DN ]
-countryName             = "Country Name is Northern Nowhere"
-countryName_value       = NN
-organizationName        = "Organization Name"
-organizationName_value  = Edel Curl Arctic Illudium Research Cloud
-commonName              = "Common Name"
-commonName_value        = localhost
------BEGIN RSA PRIVATE KEY-----
-MIIEpAIBAAKCAQEA5g2vWV5TVz9OweL4zzBl3WITMUYL0GCAUQ0JM43hsg8K8vwQ
-C+E6aUPD6euLRYvVJg69yNSmDxsAjXQ2YDCg4CTH+twM44Nsi9H9Kqij0yH/xTxH
-GgnhjDJ5dEnp8t/3Tay0B+yBQCdls5Rpds1XHyFg37R8CC8z/XbMI8jtHPu7inQu
-/nwd0y8iLf8RfZJQzMAGrJWoswZCgwkcUoHRFCG/0bCZUHpqEAww1fDkGsddG+m+
-vsVU6+RyBDXEFKG6IEUvYMjhod61ZfcqXQXRki0izhrKwjX9fPYCR4UijF1uTylr
-OvmEc4lKZHufvf4KTaAIekF3o926ySBYoXy4sQIDAQABAoIBAQCorDH7sWgjmRwy
-lirdJlwZlFYEE5qH3qlWQ9uSPB3VwqfBfkR5oVqFYZUcRoInrJ3MOJS30gorGx4t
-mJ5hqmXZ0b36VSryCSMl5QHdLCZpoAz63PY4xjPj6gIY3DS2ybV18wFQqfweQISV
-xWQKIgYVohB4FMm36nwRA/Aq8J/BVgC/SIGJnDW2EGId5op20BdH7APedquXqzzp
-FwETV3hH7QDbdip+Td+5/Nnc9yLg4ecSvOLe5mLaGXgsxhNqAKnY5f3izMh+FTvx
-jgR12x/urhu4mwpKie7Y/JO+FsNJYevHHKYX1wUhGO2Puco4bCUiAecmrO4lFOMX
-auBjsCQtAoGBAPcnzQy8UIHBSxgUaQ2zEWtQNKg/lYy3BiM7rTq8HIAEggL5ylxv
-bP17tIQQZAhayaeR1BKL7yP8d5UlZedI9gzMP23mNsrxpC2BsmcBEZZQFRRFhWsD
-bnVWWQkx6KgVIDtZwQF1OhNUuZxUkTlXMSuSdNNVJADIHd8y7oxaGGvHAoGBAO5J
-Nj3L7eh9Eoh4iEMbyOu1iymE+jdzuY80wVBacMinjpmGE6wlIf/bvwb2/xGMd+Ix
-Sd60wCg/obN/62EAWaiJH88qrF5Uj+l2u1tmp3oRMOiBkXbLhEXzGP9Qcoa6s8gT
-HjatboUgCUuSQrY4OUu+wmqwufBh7poSGFUs/YfHAoGBAL5svgG3/ddbVD5jS2Ww
-uBUUoN2Yz+KxCVuQGTINyW+hCYK9bnq1pyXOcBDoiAof2QrwwpLfmgsB9CjHvbHr
-dxf5Lk3AeCr47uPY79mI60ICxZruzZLb+/kP5F2/RGBsln7j8l7rMSm/t5qJVbL2
-SP4nQzeoe6rWhJ15om4k5Hf1AoGAGpuGOQRKfoloxmBfJs81ckyFS4+TuRltAPat
-F2Hh8iXzoGT+UVycHUvWWtq9xKHgyRsj2oBobJYeYkLIb75wRId7S9DCCo56u2EM
-rroZvWGqCmxdZ9x12rG4etnqz+yNIqwv1X8sNiVLpGqilGJW04RrhSpSuOrWj9Gx
-ceFiNgUCgYBAAubXkD1rcIs2X8Ds3ztwYPaGL8ZX4q8eWvncgjz3YmVve408XD0w
-Sd44NWgjK2LXMv3ddXFdukoDmGm75KhDHWKO9vPBo0wpB5FXkMyHiDyM65X0MZC8
-xzSd9dUcy7TBjMVV2ge81b6U8nCwrdrU2L/0dzigmKnrLrF8MRjFLA==
------END RSA PRIVATE KEY-----
-Certificate:
-    Data:
-        Version: 3 (0x2)
-        Serial Number:
-            81:34:c8:2d:81:f0:54:1f
-    Signature Algorithm: sha256WithRSAEncryption
-        Issuer:
-            countryName               = NN
-            organizationName          = Edel Curl Arctic Illudium Research Cloud
-            commonName                = Northern Nowhere Trust Anchor
-        Validity
-            Not Before: Mar  6 11:51:47 2025 GMT
-            Not After : Dec 31 11:51:47 2025 GMT
-        Subject:
-            countryName               = NN
-            organizationName          = Edel Curl Arctic Illudium Research Cloud
-            commonName                = localhost
-        Subject Public Key Info:
-            Public Key Algorithm: rsaEncryption
-                RSA Public-Key: (2048 bit)
-                Modulus:
-                    00:e6:0d:af:59:5e:53:57:3f:4e:c1:e2:f8:cf:30:
-                    65:dd:62:13:31:46:0b:d0:60:80:51:0d:09:33:8d:
-                    e1:b2:0f:0a:f2:fc:10:0b:e1:3a:69:43:c3:e9:eb:
-                    8b:45:8b:d5:26:0e:bd:c8:d4:a6:0f:1b:00:8d:74:
-                    36:60:30:a0:e0:24:c7:fa:dc:0c:e3:83:6c:8b:d1:
-                    fd:2a:a8:a3:d3:21:ff:c5:3c:47:1a:09:e1:8c:32:
-                    79:74:49:e9:f2:df:f7:4d:ac:b4:07:ec:81:40:27:
-                    65:b3:94:69:76:cd:57:1f:21:60:df:b4:7c:08:2f:
-                    33:fd:76:cc:23:c8:ed:1c:fb:bb:8a:74:2e:fe:7c:
-                    1d:d3:2f:22:2d:ff:11:7d:92:50:cc:c0:06:ac:95:
-                    a8:b3:06:42:83:09:1c:52:81:d1:14:21:bf:d1:b0:
-                    99:50:7a:6a:10:0c:30:d5:f0:e4:1a:c7:5d:1b:e9:
-                    be:be:c5:54:eb:e4:72:04:35:c4:14:a1:ba:20:45:
-                    2f:60:c8:e1:a1:de:b5:65:f7:2a:5d:05:d1:92:2d:
-                    22:ce:1a:ca:c2:35:fd:7c:f6:02:47:85:22:8c:5d:
-                    6e:4f:29:6b:3a:f9:84:73:89:4a:64:7b:9f:bd:fe:
-                    0a:4d:a0:08:7a:41:77:a3:dd:ba:c9:20:58:a1:7c:
-                    b8:b1
-                Exponent: 65537 (0x10001)
-        X509v3 extensions:
-            X509v3 Subject Alternative Name: 
-                DNS:localhost
-            X509v3 Key Usage: 
-                Digital Signature, Key Encipherment, Key Agreement
-            X509v3 Extended Key Usage: 
-                TLS Web Server Authentication
-            X509v3 Subject Key Identifier: 
-                B4:23:96:D3:28:32:87:90:18:46:E5:2D:CD:D3:DB:4F:9B:92:76:79
-            X509v3 Authority Key Identifier: 
-                keyid:9D:2B:CE:95:BF:D8:22:91:A2:E5:AD:FE:79:0E:E9:23:E1:4D:28:32
-
-            X509v3 Basic Constraints: 
-                CA:FALSE
-            Authority Information Access: 
-                CA Issuers - URI:http://test.curl.se/ca/EdelCurlRoot.cer
-
-            X509v3 CRL Distribution Points: 
-
-                Full Name:
-                  URI:http://test.curl.se/ca/EdelCurlRoot.crl
-
-    Signature Algorithm: sha256WithRSAEncryption
-         43:b8:3e:47:2e:1c:8e:76:16:4d:c5:04:89:c9:d3:42:5c:af:
-         97:27:da:6a:7f:bb:6d:49:51:0c:60:c7:0b:ce:8f:a3:33:26:
-         ae:f8:75:fa:c8:43:65:b7:c1:a4:eb:bb:9b:50:e4:97:8f:78:
-         b0:a7:00:95:5e:ac:3d:39:96:a6:39:a6:96:ad:5c:1b:e0:d3:
-         81:91:25:f1:1c:bd:dd:70:d5:8d:44:03:6e:8c:93:66:98:fd:
-         1d:66:b8:58:6a:90:11:26:44:3b:4e:8a:c4:ef:f7:4c:f4:57:
-         ba:75:f5:dd:24:43:82:29:12:e8:4e:fc:9e:6f:a8:8e:e7:01:
-         ff:56:e4:2d:62:02:99:a1:a9:fa:45:46:48:58:17:e8:ee:37:
-         31:39:08:b6:a3:55:7e:6a:c5:3e:c0:1c:03:39:bc:64:d8:8d:
-         7e:57:35:71:14:38:77:64:3a:3f:b4:4b:e8:10:31:a1:08:8c:
-         2f:e8:de:d4:f8:a0:e6:07:3b:12:8e:12:83:eb:e3:ba:7c:91:
-         b3:50:5e:f3:df:6d:3f:c1:70:f3:5c:e5:0c:84:1a:9d:5a:ae:
-         bc:ac:53:f2:b6:e5:66:f8:00:c0:74:af:ed:e2:89:36:a6:c2:
-         8b:90:8d:6c:23:a3:60:2e:49:1d:dd:d2:19:45:cb:cf:a4:c3:
-         87:9c:fb:8f
------BEGIN CERTIFICATE-----
-MIIERzCCAy+gAwIBAgIJAIE0yC2B8FQfMA0GCSqGSIb3DQEBCwUAMGgxCzAJBgNV
-BAYTAk5OMTEwLwYDVQQKDChFZGVsIEN1cmwgQXJjdGljIElsbHVkaXVtIFJlc2Vh
-cmNoIENsb3VkMSYwJAYDVQQDDB1Ob3J0aGVybiBOb3doZXJlIFRydXN0IEFuY2hv
-cjAeFw0yNTAzMDYxMTUxNDdaFw0yNTEyMzExMTUxNDdaMFQxCzAJBgNVBAYTAk5O
-MTEwLwYDVQQKDChFZGVsIEN1cmwgQXJjdGljIElsbHVkaXVtIFJlc2VhcmNoIENs
-b3VkMRIwEAYDVQQDDAlsb2NhbGhvc3QwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAw
-ggEKAoIBAQDmDa9ZXlNXP07B4vjPMGXdYhMxRgvQYIBRDQkzjeGyDwry/BAL4Tpp
-Q8Pp64tFi9UmDr3I1KYPGwCNdDZgMKDgJMf63Azjg2yL0f0qqKPTIf/FPEcaCeGM
-Mnl0Seny3/dNrLQH7IFAJ2WzlGl2zVcfIWDftHwILzP9dswjyO0c+7uKdC7+fB3T
-LyIt/xF9klDMwAaslaizBkKDCRxSgdEUIb/RsJlQemoQDDDV8OQax10b6b6+xVTr
-5HIENcQUobogRS9gyOGh3rVl9ypdBdGSLSLOGsrCNf189gJHhSKMXW5PKWs6+YRz
-iUpke5+9/gpNoAh6QXej3brJIFihfLixAgMBAAGjggEGMIIBAjAUBgNVHREEDTAL
-gglsb2NhbGhvc3QwCwYDVR0PBAQDAgOoMBMGA1UdJQQMMAoGCCsGAQUFBwMBMB0G
-A1UdDgQWBBS0I5bTKDKHkBhG5S3N09tPm5J2eTAfBgNVHSMEGDAWgBSdK86Vv9gi
-kaLlrf55Dukj4U0oMjAJBgNVHRMEAjAAMEMGCCsGAQUFBwEBBDcwNTAzBggrBgEF
-BQcwAoYnaHR0cDovL3Rlc3QuY3VybC5zZS9jYS9FZGVsQ3VybFJvb3QuY2VyMDgG
-A1UdHwQxMC8wLaAroCmGJ2h0dHA6Ly90ZXN0LmN1cmwuc2UvY2EvRWRlbEN1cmxS
-b290LmNybDANBgkqhkiG9w0BAQsFAAOCAQEAQ7g+Ry4cjnYWTcUEicnTQlyvlyfa
-an+7bUlRDGDHC86PozMmrvh1+shDZbfBpOu7m1Dkl494sKcAlV6sPTmWpjmmlq1c
-G+DTgZEl8Ry93XDVjUQDboyTZpj9HWa4WGqQESZEO06KxO/3TPRXunX13SRDgikS
-6E78nm+ojucB/1bkLWICmaGp+kVGSFgX6O43MTkItqNVfmrFPsAcAzm8ZNiNflc1
-cRQ4d2Q6P7RL6BAxoQiML+je1Pig5gc7Eo4Sg+vjunyRs1Be899tP8Fw81zlDIQa
-nVquvKxT8rblZvgAwHSv7eKJNqbCi5CNbCOjYC5JHd3SGUXLz6TDh5z7jw==
------END CERTIFICATE-----
diff --git a/tests/certs/test-localhost.pub.der b/tests/certs/test-localhost.pub.der
deleted file mode 100644 (file)
index 47331fd..0000000
Binary files a/tests/certs/test-localhost.pub.der and /dev/null differ
diff --git a/tests/certs/test-localhost.pub.pem b/tests/certs/test-localhost.pub.pem
deleted file mode 100644 (file)
index 62e399b..0000000
+++ /dev/null
@@ -1,9 +0,0 @@
------BEGIN PUBLIC KEY-----
-MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA5g2vWV5TVz9OweL4zzBl
-3WITMUYL0GCAUQ0JM43hsg8K8vwQC+E6aUPD6euLRYvVJg69yNSmDxsAjXQ2YDCg
-4CTH+twM44Nsi9H9Kqij0yH/xTxHGgnhjDJ5dEnp8t/3Tay0B+yBQCdls5Rpds1X
-HyFg37R8CC8z/XbMI8jtHPu7inQu/nwd0y8iLf8RfZJQzMAGrJWoswZCgwkcUoHR
-FCG/0bCZUHpqEAww1fDkGsddG+m+vsVU6+RyBDXEFKG6IEUvYMjhod61ZfcqXQXR
-ki0izhrKwjX9fPYCR4UijF1uTylrOvmEc4lKZHufvf4KTaAIekF3o926ySBYoXy4
-sQIDAQAB
------END PUBLIC KEY-----
diff --git a/tests/certs/test-localhost0h.crl b/tests/certs/test-localhost0h.crl
deleted file mode 100644 (file)
index 0a0a310..0000000
+++ /dev/null
@@ -1,37 +0,0 @@
------BEGIN X509 CRL-----
-MIIGejCCBWICAQEwDQYJKoZIhvcNAQELBQAwaDELMAkGA1UEBhMCTk4xMTAvBgNV
-BAoMKEVkZWwgQ3VybCBBcmN0aWMgSWxsdWRpdW0gUmVzZWFyY2ggQ2xvdWQxJjAk
-BgNVBAMMHU5vcnRoZXJuIE5vd2hlcmUgVHJ1c3QgQW5jaG9yFw0yNTAzMDYxMTUx
-NDhaFw0yNTA0MDUxMTUxNDhaMIIEtDAaAgkAgTTILYHwU/cXDTI1MDMwNjEwMTkz
-NFowGgIJAIE0yC2B8FP4Fw0yNTAzMDYxMDE5MzRaMBoCCQCBNMgtgfBT+RcNMjUw
-MzA2MTAxOTM0WjAaAgkAgTTILYHwU/oXDTI1MDMwNjEwMTkzNVowGgIJAIE0yC2B
-8FP7Fw0yNTAzMDYxMDE5MzVaMBoCCQCBNMgtgfBT/BcNMjUwMzA2MTAxOTM1WjAa
-AgkAgTTILYHwU/0XDTI1MDMwNjEwNDMzOVowGgIJAIE0yC2B8FP+Fw0yNTAzMDYx
-MDQzMzlaMBoCCQCBNMgtgfBT/xcNMjUwMzA2MTA0MzQwWjAaAgkAgTTILYHwVAAX
-DTI1MDMwNjEwNDM0MFowGgIJAIE0yC2B8FQBFw0yNTAzMDYxMDQzNDBaMBoCCQCB
-NMgtgfBUAhcNMjUwMzA2MTA0NjA4WjAaAgkAgTTILYHwVAMXDTI1MDMwNjEwNDYw
-OFowGgIJAIE0yC2B8FQEFw0yNTAzMDYxMDQ2MDhaMBoCCQCBNMgtgfBUBRcNMjUw
-MzA2MTA0NjA4WjAaAgkAgTTILYHwVAYXDTI1MDMwNjEwNDYwOVowGgIJAIE0yC2B
-8FQHFw0yNTAzMDYxMDQ2MDlaMBoCCQCBNMgtgfBUCBcNMjUwMzA2MTA0ODU5WjAa
-AgkAgTTILYHwVAkXDTI1MDMwNjEwNDg1OVowGgIJAIE0yC2B8FQKFw0yNTAzMDYx
-MDQ4NTlaMBoCCQCBNMgtgfBUCxcNMjUwMzA2MTA0ODU5WjAaAgkAgTTILYHwVAwX
-DTI1MDMwNjEwNDkwMFowGgIJAIE0yC2B8FQNFw0yNTAzMDYxMDQ5MDBaMBoCCQCB
-NMgtgfBUDhcNMjUwMzA2MTExMzM4WjAaAgkAgTTILYHwVA8XDTI1MDMwNjExMTMz
-OFowGgIJAIE0yC2B8FQQFw0yNTAzMDYxMTEzMzhaMBoCCQCBNMgtgfBUERcNMjUw
-MzA2MTExMzM4WjAaAgkAgTTILYHwVBIXDTI1MDMwNjExMTMzOFowGgIJAIE0yC2B
-8FQTFw0yNTAzMDYxMTE1MzBaMBoCCQCBNMgtgfBUFBcNMjUwMzA2MTExNTMwWjAa
-AgkAgTTILYHwVBUXDTI1MDMwNjExMTUzMFowGgIJAIE0yC2B8FQWFw0yNTAzMDYx
-MTE1MzBaMBoCCQCBNMgtgfBUFxcNMjUwMzA2MTExNTMwWjAaAgkAgTTILYHwVBgX
-DTI1MDMwNjExMTUzMFowGgIJAIE0yC2B8FQZFw0yNTAzMDYxMTE5MDNaMBoCCQCB
-NMgtgfBUGhcNMjUwMzA2MTExOTA0WjAaAgkAgTTILYHwVBsXDTI1MDMwNjExMTkw
-NFowGgIJAIE0yC2B8FQcFw0yNTAzMDYxMTE5MDRaMBoCCQCBNMgtgfBUHRcNMjUw
-MzA2MTExOTA0WjAaAgkAgTTILYHwVB4XDTI1MDMwNjExMTkwNFowGgIJAIE0yC2B
-8FQfFw0yNTAzMDYxMTUxNDdaMBoCCQCBNMgtgfBUIBcNMjUwMzA2MTE1MTQ4WjAa
-AgkAgTTILYHwVCEXDTI1MDMwNjExNTE0OFqgDjAMMAoGA1UdFAQDAgEBMA0GCSqG
-SIb3DQEBCwUAA4IBAQBZnXmwUUp0FcVGHfHWsf6rip/4cn5FYso0v4kXSI4icqZ7
-tncP3i6smiDzWqFSNp0TyKzeVvVPAwsafO6TPjUmUZXZrrU64QhJY44AEQbvl1cm
-4QA+JN0RhIxr85e6X4O7VElMz0fV8T8l01izj1+SbAl4W6z3xoZNErskn9LtWY5X
-HvDlgl1hZZc8bw3qZMHQJdvvJ2FHlh7j7ugBVdMZKdO0hoFCjoEMgeVSot7Hjtv1
-R0JYnTFxcuMJ/MVQmxUTdWaLnMqT9RPjzMhLRzOc2WupDvPLla63qvwBxoNWL0Cr
-hkz9i899thHhosi3i+fgQ3Ynf53VoU3jXces2wqU
------END X509 CRL-----
diff --git a/tests/certs/test-localhost0h.crt b/tests/certs/test-localhost0h.crt
deleted file mode 100644 (file)
index a0366e8..0000000
+++ /dev/null
@@ -1,103 +0,0 @@
-Certificate:
-    Data:
-        Version: 3 (0x2)
-        Serial Number:
-            81:34:c8:2d:81:f0:54:21
-    Signature Algorithm: sha256WithRSAEncryption
-        Issuer:
-            countryName               = NN
-            organizationName          = Edel Curl Arctic Illudium Research Cloud
-            commonName                = Northern Nowhere Trust Anchor
-        Validity
-            Not Before: Mar  6 11:51:48 2025 GMT
-            Not After : Dec 31 11:51:48 2025 GMT
-        Subject:
-            countryName               = NN
-            organizationName          = Edel Curl Arctic Illudium Research Cloud
-            commonName                = localhost
-        Subject Public Key Info:
-            Public Key Algorithm: rsaEncryption
-                RSA Public-Key: (2048 bit)
-                Modulus:
-                    00:bd:d7:58:68:62:0c:68:34:df:a2:1d:d9:34:fc:
-                    f1:45:bf:cc:e3:57:38:e6:d3:07:fc:65:e1:b3:28:
-                    ad:d6:2c:3b:2e:a9:6a:b9:07:e7:66:1f:b8:a0:c2:
-                    75:1d:31:84:3e:5d:98:d3:37:bb:a0:96:97:7f:f7:
-                    17:5e:89:ad:6e:bf:8c:0d:ef:c2:7c:f5:3b:76:0a:
-                    84:30:ef:bf:2f:c0:8a:a6:50:33:e1:a4:00:bd:0c:
-                    0c:79:04:09:d1:45:09:fe:b2:4b:a3:cf:1e:3b:65:
-                    b4:5a:a5:a4:86:e0:d6:95:c0:a9:d7:58:ec:8e:4e:
-                    72:3f:33:77:f3:3d:b5:6d:63:28:85:8a:49:e5:20:
-                    ef:56:9a:ad:f3:9d:e2:b6:ca:66:dd:06:e2:cc:09:
-                    86:36:c2:d0:1f:3e:33:bc:bc:c5:23:f7:2a:4c:f0:
-                    5b:4f:3c:60:f4:33:f3:dd:c8:ad:83:d2:45:9f:6d:
-                    0d:cb:b6:29:94:b8:df:3b:c3:73:7e:95:ef:e6:68:
-                    e7:c6:22:79:4a:69:7c:85:4a:88:9d:9a:90:71:42:
-                    79:73:3e:b2:ed:e2:0c:4e:53:85:5a:de:e7:85:37:
-                    6f:0e:21:e1:f1:f0:1d:09:ec:0f:fd:69:5f:d9:74:
-                    71:35:4d:02:73:f3:2d:3e:9c:58:f5:48:d6:63:b4:
-                    fb:85
-                Exponent: 65537 (0x10001)
-        X509v3 extensions:
-            X509v3 Subject Alternative Name: 
-                DNS:localhost
-            X509v3 Key Usage: 
-                Digital Signature, Key Encipherment, Key Agreement
-            X509v3 Extended Key Usage: 
-                TLS Web Server Authentication
-            X509v3 Subject Key Identifier: 
-                F7:A5:D0:5C:C7:C2:37:AA:5D:7A:76:0B:17:61:70:C9:5D:B9:C9:55
-            X509v3 Authority Key Identifier: 
-                keyid:9D:2B:CE:95:BF:D8:22:91:A2:E5:AD:FE:79:0E:E9:23:E1:4D:28:32
-
-            X509v3 Basic Constraints: 
-                CA:FALSE
-            Authority Information Access: 
-                CA Issuers - URI:http://test.curl.se/ca/EdelCurlRoot.cer
-
-            X509v3 CRL Distribution Points: 
-
-                Full Name:
-                  URI:http://test.curl.se/ca/EdelCurlRoot.crl
-
-    Signature Algorithm: sha256WithRSAEncryption
-         28:61:05:e4:55:30:48:40:12:df:f6:fb:64:5e:10:6d:5c:48:
-         d2:ef:b2:c2:27:28:f0:a1:88:5a:c8:ae:cb:87:12:60:04:aa:
-         e0:1e:4c:c3:4c:8e:d5:8a:f8:8c:c8:3f:e5:d7:06:8a:3d:40:
-         c0:ea:03:dd:9c:d6:f5:68:67:71:51:4f:8d:80:1f:d3:53:09:
-         5b:78:be:dc:6d:98:68:c0:38:d2:10:ad:56:95:9c:b7:56:e2:
-         ec:98:b7:6f:3c:f4:b5:1e:94:7b:3d:e2:f7:a4:89:b5:89:61:
-         29:45:ea:05:8d:23:a3:ad:b6:ef:97:21:91:ce:f2:7d:12:3a:
-         e3:fc:e0:eb:85:18:eb:af:b7:51:81:2b:a2:60:01:60:d9:31:
-         96:cb:9c:e3:b9:29:38:f7:51:7d:40:bf:87:6e:42:fa:74:c0:
-         9b:cb:1a:95:63:30:a7:41:b4:65:e3:cc:87:2c:01:d9:00:d8:
-         e3:62:ab:d2:64:37:43:c2:16:36:0f:ae:a6:79:00:d6:37:37:
-         ff:31:6a:77:15:cc:ff:1b:52:33:9b:04:8e:f5:5b:a6:52:60:
-         e8:1c:b8:3e:df:b9:d5:67:ba:3d:23:d6:5a:07:cd:e8:e2:01:
-         0f:57:ea:b0:fb:27:a4:2a:1b:f0:16:01:90:cc:9e:32:13:cc:
-         f1:bf:cb:80
------BEGIN CERTIFICATE-----
-MIIESTCCAzGgAwIBAgIJAIE0yC2B8FQhMA0GCSqGSIb3DQEBCwUAMGgxCzAJBgNV
-BAYTAk5OMTEwLwYDVQQKDChFZGVsIEN1cmwgQXJjdGljIElsbHVkaXVtIFJlc2Vh
-cmNoIENsb3VkMSYwJAYDVQQDDB1Ob3J0aGVybiBOb3doZXJlIFRydXN0IEFuY2hv
-cjAeFw0yNTAzMDYxMTUxNDhaFw0yNTEyMzExMTUxNDhaMFQxCzAJBgNVBAYTAk5O
-MTEwLwYDVQQKDChFZGVsIEN1cmwgQXJjdGljIElsbHVkaXVtIFJlc2VhcmNoIENs
-b3VkMRIwEAYDVQQDDAlsb2NhbGhvc3QwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAw
-ggEKAoIBAQC911hoYgxoNN+iHdk0/PFFv8zjVzjm0wf8ZeGzKK3WLDsuqWq5B+dm
-H7igwnUdMYQ+XZjTN7uglpd/9xdeia1uv4wN78J89Tt2CoQw778vwIqmUDPhpAC9
-DAx5BAnRRQn+skujzx47ZbRapaSG4NaVwKnXWOyOTnI/M3fzPbVtYyiFiknlIO9W
-mq3zneK2ymbdBuLMCYY2wtAfPjO8vMUj9ypM8FtPPGD0M/PdyK2D0kWfbQ3LtimU
-uN87w3N+le/maOfGInlKaXyFSoidmpBxQnlzPrLt4gxOU4Va3ueFN28OIeHx8B0J
-7A/9aV/ZdHE1TQJz8y0+nFj1SNZjtPuFAgMBAAGjggEIMIIBBDAWBgNVHREEDzAN
-ggtsb2NhbGhvc3QAaDALBgNVHQ8EBAMCA6gwEwYDVR0lBAwwCgYIKwYBBQUHAwEw
-HQYDVR0OBBYEFPel0FzHwjeqXXp2CxdhcMlduclVMB8GA1UdIwQYMBaAFJ0rzpW/
-2CKRouWt/nkO6SPhTSgyMAkGA1UdEwQCMAAwQwYIKwYBBQUHAQEENzA1MDMGCCsG
-AQUFBzAChidodHRwOi8vdGVzdC5jdXJsLnNlL2NhL0VkZWxDdXJsUm9vdC5jZXIw
-OAYDVR0fBDEwLzAtoCugKYYnaHR0cDovL3Rlc3QuY3VybC5zZS9jYS9FZGVsQ3Vy
-bFJvb3QuY3JsMA0GCSqGSIb3DQEBCwUAA4IBAQAoYQXkVTBIQBLf9vtkXhBtXEjS
-77LCJyjwoYhayK7LhxJgBKrgHkzDTI7ViviMyD/l1waKPUDA6gPdnNb1aGdxUU+N
-gB/TUwlbeL7cbZhowDjSEK1WlZy3VuLsmLdvPPS1HpR7PeL3pIm1iWEpReoFjSOj
-rbbvlyGRzvJ9Ejrj/ODrhRjrr7dRgSuiYAFg2TGWy5zjuSk491F9QL+HbkL6dMCb
-yxqVYzCnQbRl48yHLAHZANjjYqvSZDdDwhY2D66meQDWNzf/MWp3Fcz/G1IzmwSO
-9VumUmDoHLg+37nVZ7o9I9ZaB83o4gEPV+qw+yekKhvwFgGQzJ4yE8zxv8uA
------END CERTIFICATE-----
diff --git a/tests/certs/test-localhost0h.key b/tests/certs/test-localhost0h.key
deleted file mode 100644 (file)
index 8ead31b..0000000
+++ /dev/null
@@ -1,27 +0,0 @@
------BEGIN RSA PRIVATE KEY-----
-MIIEpgIBAAKCAQEAvddYaGIMaDTfoh3ZNPzxRb/M41c45tMH/GXhsyit1iw7Lqlq
-uQfnZh+4oMJ1HTGEPl2Y0ze7oJaXf/cXXomtbr+MDe/CfPU7dgqEMO+/L8CKplAz
-4aQAvQwMeQQJ0UUJ/rJLo88eO2W0WqWkhuDWlcCp11jsjk5yPzN38z21bWMohYpJ
-5SDvVpqt853itspm3QbizAmGNsLQHz4zvLzFI/cqTPBbTzxg9DPz3citg9JFn20N
-y7YplLjfO8NzfpXv5mjnxiJ5Sml8hUqInZqQcUJ5cz6y7eIMTlOFWt7nhTdvDiHh
-8fAdCewP/Wlf2XRxNU0Cc/MtPpxY9UjWY7T7hQIDAQABAoIBAQCB1IhtusBpc9+N
-a4RkrKgE34sr3zbXBXPstXCJqkRYuJ8w5kRKjpE+Umtd5h9Z+8dJL5GYwgDbbqHl
-rgKZcObfWrhZv6Lu+nfT3pVRMmU6Lx+jZi5VHmgy4c6V5KEiMWkIer8oJDm0vXV+
-mNHQPGwEtmJxGCuPly6i8nwSKh2t1HfRM9yC5bARj/zQq3W+iAkPIUKynHvRvB5+
-ZVClyTYlXLByRu9VvRlDxP5wc1zjHVdfQTG5lSgV0dZGtyT9MdqI9fidnkuxmsDu
-P9WxcmvUPbdM4Uzddb58u80UEzh86HDZo8juCO6JMy2zG1K7vWbh5RIwB/9IW764
-yCnfuEMBAoGBAPGYTd/IQgWEFZZyffOHBJbOffATSn1M4uATk2Xd82facDIgyKJz
-CkUZjxuR5W/znpnFmwMq5FabI504SEp4zYZU9iFKoofYdcsv8/XNWz2dFhuEfReI
-T2pNbRieJFM0+bBOq/bJGlmrRsfqHrmtN+p59VUoE+9XwfPGwr0G5j+xAoGBAMkp
-EvAAwab/0zb71YfoNLbQz+Z5965tUEZY0opc2GvB6heMF8+54I0IapKVCITglmbN
-0pWRRGo0Zyb1rGWoDGgLT6CyJ+gIYpPJWb/iFxUyBQzJzzDkMtAj43eXGSO+7eho
-qVUXJA5uvjDlP8lLPSyDY/2wP8BPYigzQm8hcGIVAoGBANjVXW9wCPFybv2snKap
-k9DWW+nRJpX3H9kFONHAtumLAA+9pNVIcvs5yVtxQn+MI9jXphzdrjqc2wYMsbVF
-XxElyBJxLhbGjFJlI4yFV1KhXmosKymnyb8a5sOli+yyKze2JFlGfUPlmY1r70+u
-y/TCqRJY+itilEz7I2UMgDLBAoGBALcIT3nfRlTca2OZKwZZSzWYs8JC8hFc13Da
-ut84cZdCvuwkBTp2J5JLuSScxD6bV149IsIChpyYB8+UNAPfL0KwIAjYcaUXlBJi
-X+5PGq+nbp7fNU2IJY/rR7p12mMDA9e2+3Q39Q/IxfcZcLuIYSYSezXGW4tw76Ai
-W+1gILCtAoGBAK5f4pSOG6hSYLqn1f0yqpIiTfeA2FJTUSB1eVkO7Y+YNnYpmFok
-1FlsFSlFYi8xqgWqwacs8H2uNnWpYKTpeCYLcWWO3KklddhB54f1+5tpOv0pVgji
-Lczo5hccgURjwx1ebbH8h4rYTBskb9xagw7n28O6BXaGJvx4fjdDwirL
------END RSA PRIVATE KEY-----
diff --git a/tests/certs/test-localhost0h.pem b/tests/certs/test-localhost0h.pem
deleted file mode 100644 (file)
index 504e5b4..0000000
+++ /dev/null
@@ -1,166 +0,0 @@
-extensions = x509v3
-
-[ x509v3 ]
-#subjectAltName         = DNS:localhost\0h
-subjectAltName          = DER:30:0d:82:0b:6c:6f:63:61:6c:68:6f:73:74:00:68
-keyUsage                = keyEncipherment,digitalSignature,keyAgreement
-extendedKeyUsage        = serverAuth
-subjectKeyIdentifier    = hash
-authorityKeyIdentifier  = keyid
-basicConstraints        = CA:false
-authorityInfoAccess     = @issuer_info
-crlDistributionPoints   = @crl_info
-
-[ crl_ext ]
-authorityKeyIdentifier  = keyid:always
-authorityInfoAccess     = @issuer_info
-
-[ issuer_info ]
-caIssuers;URI.0         = http://test.curl.se/ca/EdelCurlRoot.cer
-
-[ crl_info ]
-URI.0                   = http://test.curl.se/ca/EdelCurlRoot.crl
-
-[ req ]
-default_bits            = 1024
-distinguished_name      = req_DN
-default_md              = sha256
-string_mask             = utf8only
-
-[ req_DN ]
-countryName             = "Country Name is Northern Nowhere"
-countryName_value       = NN
-organizationName        = "Organization Name"
-organizationName_value  = Edel Curl Arctic Illudium Research Cloud
-commonName              = "Common Name"
-commonName_value        = localhost
------BEGIN RSA PRIVATE KEY-----
-MIIEpgIBAAKCAQEAvddYaGIMaDTfoh3ZNPzxRb/M41c45tMH/GXhsyit1iw7Lqlq
-uQfnZh+4oMJ1HTGEPl2Y0ze7oJaXf/cXXomtbr+MDe/CfPU7dgqEMO+/L8CKplAz
-4aQAvQwMeQQJ0UUJ/rJLo88eO2W0WqWkhuDWlcCp11jsjk5yPzN38z21bWMohYpJ
-5SDvVpqt853itspm3QbizAmGNsLQHz4zvLzFI/cqTPBbTzxg9DPz3citg9JFn20N
-y7YplLjfO8NzfpXv5mjnxiJ5Sml8hUqInZqQcUJ5cz6y7eIMTlOFWt7nhTdvDiHh
-8fAdCewP/Wlf2XRxNU0Cc/MtPpxY9UjWY7T7hQIDAQABAoIBAQCB1IhtusBpc9+N
-a4RkrKgE34sr3zbXBXPstXCJqkRYuJ8w5kRKjpE+Umtd5h9Z+8dJL5GYwgDbbqHl
-rgKZcObfWrhZv6Lu+nfT3pVRMmU6Lx+jZi5VHmgy4c6V5KEiMWkIer8oJDm0vXV+
-mNHQPGwEtmJxGCuPly6i8nwSKh2t1HfRM9yC5bARj/zQq3W+iAkPIUKynHvRvB5+
-ZVClyTYlXLByRu9VvRlDxP5wc1zjHVdfQTG5lSgV0dZGtyT9MdqI9fidnkuxmsDu
-P9WxcmvUPbdM4Uzddb58u80UEzh86HDZo8juCO6JMy2zG1K7vWbh5RIwB/9IW764
-yCnfuEMBAoGBAPGYTd/IQgWEFZZyffOHBJbOffATSn1M4uATk2Xd82facDIgyKJz
-CkUZjxuR5W/znpnFmwMq5FabI504SEp4zYZU9iFKoofYdcsv8/XNWz2dFhuEfReI
-T2pNbRieJFM0+bBOq/bJGlmrRsfqHrmtN+p59VUoE+9XwfPGwr0G5j+xAoGBAMkp
-EvAAwab/0zb71YfoNLbQz+Z5965tUEZY0opc2GvB6heMF8+54I0IapKVCITglmbN
-0pWRRGo0Zyb1rGWoDGgLT6CyJ+gIYpPJWb/iFxUyBQzJzzDkMtAj43eXGSO+7eho
-qVUXJA5uvjDlP8lLPSyDY/2wP8BPYigzQm8hcGIVAoGBANjVXW9wCPFybv2snKap
-k9DWW+nRJpX3H9kFONHAtumLAA+9pNVIcvs5yVtxQn+MI9jXphzdrjqc2wYMsbVF
-XxElyBJxLhbGjFJlI4yFV1KhXmosKymnyb8a5sOli+yyKze2JFlGfUPlmY1r70+u
-y/TCqRJY+itilEz7I2UMgDLBAoGBALcIT3nfRlTca2OZKwZZSzWYs8JC8hFc13Da
-ut84cZdCvuwkBTp2J5JLuSScxD6bV149IsIChpyYB8+UNAPfL0KwIAjYcaUXlBJi
-X+5PGq+nbp7fNU2IJY/rR7p12mMDA9e2+3Q39Q/IxfcZcLuIYSYSezXGW4tw76Ai
-W+1gILCtAoGBAK5f4pSOG6hSYLqn1f0yqpIiTfeA2FJTUSB1eVkO7Y+YNnYpmFok
-1FlsFSlFYi8xqgWqwacs8H2uNnWpYKTpeCYLcWWO3KklddhB54f1+5tpOv0pVgji
-Lczo5hccgURjwx1ebbH8h4rYTBskb9xagw7n28O6BXaGJvx4fjdDwirL
------END RSA PRIVATE KEY-----
-Certificate:
-    Data:
-        Version: 3 (0x2)
-        Serial Number:
-            81:34:c8:2d:81:f0:54:21
-    Signature Algorithm: sha256WithRSAEncryption
-        Issuer:
-            countryName               = NN
-            organizationName          = Edel Curl Arctic Illudium Research Cloud
-            commonName                = Northern Nowhere Trust Anchor
-        Validity
-            Not Before: Mar  6 11:51:48 2025 GMT
-            Not After : Dec 31 11:51:48 2025 GMT
-        Subject:
-            countryName               = NN
-            organizationName          = Edel Curl Arctic Illudium Research Cloud
-            commonName                = localhost
-        Subject Public Key Info:
-            Public Key Algorithm: rsaEncryption
-                RSA Public-Key: (2048 bit)
-                Modulus:
-                    00:bd:d7:58:68:62:0c:68:34:df:a2:1d:d9:34:fc:
-                    f1:45:bf:cc:e3:57:38:e6:d3:07:fc:65:e1:b3:28:
-                    ad:d6:2c:3b:2e:a9:6a:b9:07:e7:66:1f:b8:a0:c2:
-                    75:1d:31:84:3e:5d:98:d3:37:bb:a0:96:97:7f:f7:
-                    17:5e:89:ad:6e:bf:8c:0d:ef:c2:7c:f5:3b:76:0a:
-                    84:30:ef:bf:2f:c0:8a:a6:50:33:e1:a4:00:bd:0c:
-                    0c:79:04:09:d1:45:09:fe:b2:4b:a3:cf:1e:3b:65:
-                    b4:5a:a5:a4:86:e0:d6:95:c0:a9:d7:58:ec:8e:4e:
-                    72:3f:33:77:f3:3d:b5:6d:63:28:85:8a:49:e5:20:
-                    ef:56:9a:ad:f3:9d:e2:b6:ca:66:dd:06:e2:cc:09:
-                    86:36:c2:d0:1f:3e:33:bc:bc:c5:23:f7:2a:4c:f0:
-                    5b:4f:3c:60:f4:33:f3:dd:c8:ad:83:d2:45:9f:6d:
-                    0d:cb:b6:29:94:b8:df:3b:c3:73:7e:95:ef:e6:68:
-                    e7:c6:22:79:4a:69:7c:85:4a:88:9d:9a:90:71:42:
-                    79:73:3e:b2:ed:e2:0c:4e:53:85:5a:de:e7:85:37:
-                    6f:0e:21:e1:f1:f0:1d:09:ec:0f:fd:69:5f:d9:74:
-                    71:35:4d:02:73:f3:2d:3e:9c:58:f5:48:d6:63:b4:
-                    fb:85
-                Exponent: 65537 (0x10001)
-        X509v3 extensions:
-            X509v3 Subject Alternative Name: 
-                DNS:localhost
-            X509v3 Key Usage: 
-                Digital Signature, Key Encipherment, Key Agreement
-            X509v3 Extended Key Usage: 
-                TLS Web Server Authentication
-            X509v3 Subject Key Identifier: 
-                F7:A5:D0:5C:C7:C2:37:AA:5D:7A:76:0B:17:61:70:C9:5D:B9:C9:55
-            X509v3 Authority Key Identifier: 
-                keyid:9D:2B:CE:95:BF:D8:22:91:A2:E5:AD:FE:79:0E:E9:23:E1:4D:28:32
-
-            X509v3 Basic Constraints: 
-                CA:FALSE
-            Authority Information Access: 
-                CA Issuers - URI:http://test.curl.se/ca/EdelCurlRoot.cer
-
-            X509v3 CRL Distribution Points: 
-
-                Full Name:
-                  URI:http://test.curl.se/ca/EdelCurlRoot.crl
-
-    Signature Algorithm: sha256WithRSAEncryption
-         28:61:05:e4:55:30:48:40:12:df:f6:fb:64:5e:10:6d:5c:48:
-         d2:ef:b2:c2:27:28:f0:a1:88:5a:c8:ae:cb:87:12:60:04:aa:
-         e0:1e:4c:c3:4c:8e:d5:8a:f8:8c:c8:3f:e5:d7:06:8a:3d:40:
-         c0:ea:03:dd:9c:d6:f5:68:67:71:51:4f:8d:80:1f:d3:53:09:
-         5b:78:be:dc:6d:98:68:c0:38:d2:10:ad:56:95:9c:b7:56:e2:
-         ec:98:b7:6f:3c:f4:b5:1e:94:7b:3d:e2:f7:a4:89:b5:89:61:
-         29:45:ea:05:8d:23:a3:ad:b6:ef:97:21:91:ce:f2:7d:12:3a:
-         e3:fc:e0:eb:85:18:eb:af:b7:51:81:2b:a2:60:01:60:d9:31:
-         96:cb:9c:e3:b9:29:38:f7:51:7d:40:bf:87:6e:42:fa:74:c0:
-         9b:cb:1a:95:63:30:a7:41:b4:65:e3:cc:87:2c:01:d9:00:d8:
-         e3:62:ab:d2:64:37:43:c2:16:36:0f:ae:a6:79:00:d6:37:37:
-         ff:31:6a:77:15:cc:ff:1b:52:33:9b:04:8e:f5:5b:a6:52:60:
-         e8:1c:b8:3e:df:b9:d5:67:ba:3d:23:d6:5a:07:cd:e8:e2:01:
-         0f:57:ea:b0:fb:27:a4:2a:1b:f0:16:01:90:cc:9e:32:13:cc:
-         f1:bf:cb:80
------BEGIN CERTIFICATE-----
-MIIESTCCAzGgAwIBAgIJAIE0yC2B8FQhMA0GCSqGSIb3DQEBCwUAMGgxCzAJBgNV
-BAYTAk5OMTEwLwYDVQQKDChFZGVsIEN1cmwgQXJjdGljIElsbHVkaXVtIFJlc2Vh
-cmNoIENsb3VkMSYwJAYDVQQDDB1Ob3J0aGVybiBOb3doZXJlIFRydXN0IEFuY2hv
-cjAeFw0yNTAzMDYxMTUxNDhaFw0yNTEyMzExMTUxNDhaMFQxCzAJBgNVBAYTAk5O
-MTEwLwYDVQQKDChFZGVsIEN1cmwgQXJjdGljIElsbHVkaXVtIFJlc2VhcmNoIENs
-b3VkMRIwEAYDVQQDDAlsb2NhbGhvc3QwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAw
-ggEKAoIBAQC911hoYgxoNN+iHdk0/PFFv8zjVzjm0wf8ZeGzKK3WLDsuqWq5B+dm
-H7igwnUdMYQ+XZjTN7uglpd/9xdeia1uv4wN78J89Tt2CoQw778vwIqmUDPhpAC9
-DAx5BAnRRQn+skujzx47ZbRapaSG4NaVwKnXWOyOTnI/M3fzPbVtYyiFiknlIO9W
-mq3zneK2ymbdBuLMCYY2wtAfPjO8vMUj9ypM8FtPPGD0M/PdyK2D0kWfbQ3LtimU
-uN87w3N+le/maOfGInlKaXyFSoidmpBxQnlzPrLt4gxOU4Va3ueFN28OIeHx8B0J
-7A/9aV/ZdHE1TQJz8y0+nFj1SNZjtPuFAgMBAAGjggEIMIIBBDAWBgNVHREEDzAN
-ggtsb2NhbGhvc3QAaDALBgNVHQ8EBAMCA6gwEwYDVR0lBAwwCgYIKwYBBQUHAwEw
-HQYDVR0OBBYEFPel0FzHwjeqXXp2CxdhcMlduclVMB8GA1UdIwQYMBaAFJ0rzpW/
-2CKRouWt/nkO6SPhTSgyMAkGA1UdEwQCMAAwQwYIKwYBBQUHAQEENzA1MDMGCCsG
-AQUFBzAChidodHRwOi8vdGVzdC5jdXJsLnNlL2NhL0VkZWxDdXJsUm9vdC5jZXIw
-OAYDVR0fBDEwLzAtoCugKYYnaHR0cDovL3Rlc3QuY3VybC5zZS9jYS9FZGVsQ3Vy
-bFJvb3QuY3JsMA0GCSqGSIb3DQEBCwUAA4IBAQAoYQXkVTBIQBLf9vtkXhBtXEjS
-77LCJyjwoYhayK7LhxJgBKrgHkzDTI7ViviMyD/l1waKPUDA6gPdnNb1aGdxUU+N
-gB/TUwlbeL7cbZhowDjSEK1WlZy3VuLsmLdvPPS1HpR7PeL3pIm1iWEpReoFjSOj
-rbbvlyGRzvJ9Ejrj/ODrhRjrr7dRgSuiYAFg2TGWy5zjuSk491F9QL+HbkL6dMCb
-yxqVYzCnQbRl48yHLAHZANjjYqvSZDdDwhY2D66meQDWNzf/MWp3Fcz/G1IzmwSO
-9VumUmDoHLg+37nVZ7o9I9ZaB83o4gEPV+qw+yekKhvwFgGQzJ4yE8zxv8uA
------END CERTIFICATE-----
diff --git a/tests/certs/test-localhost0h.pub.der b/tests/certs/test-localhost0h.pub.der
deleted file mode 100644 (file)
index 38ea63c..0000000
Binary files a/tests/certs/test-localhost0h.pub.der and /dev/null differ
diff --git a/tests/certs/test-localhost0h.pub.pem b/tests/certs/test-localhost0h.pub.pem
deleted file mode 100644 (file)
index 24db233..0000000
+++ /dev/null
@@ -1,9 +0,0 @@
------BEGIN PUBLIC KEY-----
-MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAvddYaGIMaDTfoh3ZNPzx
-Rb/M41c45tMH/GXhsyit1iw7LqlquQfnZh+4oMJ1HTGEPl2Y0ze7oJaXf/cXXomt
-br+MDe/CfPU7dgqEMO+/L8CKplAz4aQAvQwMeQQJ0UUJ/rJLo88eO2W0WqWkhuDW
-lcCp11jsjk5yPzN38z21bWMohYpJ5SDvVpqt853itspm3QbizAmGNsLQHz4zvLzF
-I/cqTPBbTzxg9DPz3citg9JFn20Ny7YplLjfO8NzfpXv5mjnxiJ5Sml8hUqInZqQ
-cUJ5cz6y7eIMTlOFWt7nhTdvDiHh8fAdCewP/Wlf2XRxNU0Cc/MtPpxY9UjWY7T7
-hQIDAQAB
------END PUBLIC KEY-----
index 645ba595a9cdb67774615577b95e5875c32c57b2..2973eb89879c136594762a02bccfcc37a33b1f4c 100644 (file)
@@ -40,7 +40,7 @@ simple HTTPS GET with DER public key pinning (Schannel variant)
 CURL_SSL_BACKEND=schannel
  </setenv>
 <command>
--4 --cacert %SRCDIR/certs/test-ca.crt --pinnedpubkey %SRCDIR/certs/test-localhost.pub.der --ssl-revoke-best-effort https://localhost:%HTTPSPORT/%TESTNUMBER
+-4 --cacert %CERTDIR/certs/test-ca.crt --pinnedpubkey %CERTDIR/certs/test-localhost.pub.der --ssl-revoke-best-effort https://localhost:%HTTPSPORT/%TESTNUMBER
 </command>
 </client>
 
index 61169de6f3b6660c742e02b2edca5bcfae98e69d..adb4f1767134179a8c454fb3e7f72858f05dbdfa 100644 (file)
@@ -36,7 +36,7 @@ https test-localhost.pem
 simple HTTPS GET with DER public key pinning
 </name>
 <command>
--4 --cacert %SRCDIR/certs/test-ca.crt --pinnedpubkey %SRCDIR/certs/test-localhost.pub.der https://localhost:%HTTPSPORT/%TESTNUMBER
+-4 --cacert %CERTDIR/certs/test-ca.crt --pinnedpubkey %CERTDIR/certs/test-localhost.pub.der https://localhost:%HTTPSPORT/%TESTNUMBER
 </command>
 </client>
 
index 67b0dc6560019e6e29e4fa565adacf02f7784963..99a73ad4085e4d263106be01aba34a895f6379d7 100644 (file)
@@ -27,7 +27,7 @@ https test-localhost.pem
 HTTPS wrong DER pinnedpubkey but right CN
 </name>
 <command>
--4 --cacert %SRCDIR/certs/test-ca.crt --pinnedpubkey %SRCDIR/certs/test-localhost.der https://localhost:%HTTPSPORT/%TESTNUMBER
+-4 --cacert %CERTDIR/certs/test-ca.crt --pinnedpubkey %CERTDIR/certs/test-localhost.der https://localhost:%HTTPSPORT/%TESTNUMBER
 </command>
 </client>
 
index d9968bc93f6903f76c7c2753ac22e2fee75a3f78..9f229cfd3ea8782c2cff4b6c2ceee6758e991cd5 100644 (file)
@@ -36,7 +36,7 @@ https test-localhost.pem
 simple HTTPS GET with PEM public key pinning
 </name>
 <command>
--4 --cacert %SRCDIR/certs/test-ca.crt --pinnedpubkey %SRCDIR/certs/test-localhost.pub.pem https://localhost:%HTTPSPORT/%TESTNUMBER
+-4 --cacert %CERTDIR/certs/test-ca.crt --pinnedpubkey %CERTDIR/certs/test-localhost.pub.pem https://localhost:%HTTPSPORT/%TESTNUMBER
 </command>
 </client>
 
index 4cd9be8538b82e99ef054bb9ff2d92ca44717e5f..8c7caef341fb18383dd1a2436fff0061d9a84d95 100644 (file)
@@ -27,7 +27,7 @@ https test-localhost.pem
 HTTPS wrong PEM pinnedpubkey but right CN
 </name>
 <command>
--4 --cacert %SRCDIR/certs/test-ca.crt --pinnedpubkey %SRCDIR/certs/test-localhost.pem https://localhost:%HTTPSPORT/%TESTNUMBER
+-4 --cacert %CERTDIR/certs/test-ca.crt --pinnedpubkey %CERTDIR/certs/test-localhost.pem https://localhost:%HTTPSPORT/%TESTNUMBER
 </command>
 </client>
 
index cf132f5e7130d6e697ab6dd6fc5692c1eb927a12..71112c27f8b26e2573b01becbc5c48b28f02fc88 100644 (file)
@@ -36,7 +36,7 @@ https test-localhost.pem
 simple HTTPS GET with base64-sha256 public key pinning
 </name>
 <command>
--4 --cacert %SRCDIR/certs/test-ca.crt --pinnedpubkey sha256//%sha256b64file[%SRCDIR/certs/test-localhost.pub.der]sha256b64file% https://localhost:%HTTPSPORT/%TESTNUMBER
+-4 --cacert %CERTDIR/certs/test-ca.crt --pinnedpubkey sha256//%sha256b64file[%CERTDIR/certs/test-localhost.pub.der]sha256b64file% https://localhost:%HTTPSPORT/%TESTNUMBER
 </command>
 </client>
 
index 52fd9dff96ea02bd47ac78995feb3bcab3ed0697..84681879275fef819ace7f9c028d308ce52f24fa 100644 (file)
@@ -27,7 +27,7 @@ https test-localhost.pem
 HTTPS wrong base64-sha256 pinnedpubkey but right CN
 </name>
 <command>
--4 --cacert %SRCDIR/certs/test-ca.crt --pinnedpubkey sha256//bSIggTf+ikMG0CtmDlpMVBd7yi7H1md4URogRPqerso= https://localhost:%HTTPSPORT/%TESTNUMBER
+-4 --cacert %CERTDIR/certs/test-ca.crt --pinnedpubkey sha256//bSIggTf+ikMG0CtmDlpMVBd7yi7H1md4URogRPqerso= https://localhost:%HTTPSPORT/%TESTNUMBER
 </command>
 </client>
 
index eeaea967d8a80e4115a2dabd97c65b29f14048fc..3c35eed368dabd155b5d60c42e9013d29212951f 100644 (file)
@@ -26,7 +26,7 @@ https test-localhost.pem
 pinnedpubkey no-match must fail even when insecure
 </name>
 <command>
--4 --insecure --cacert %SRCDIR/certs/test-ca.crt --pinnedpubkey %SRCDIR/certs/test-localhost.nn.pub.der https://localhost:%HTTPSPORT/%TESTNUMBER
+-4 --insecure --cacert %CERTDIR/certs/test-ca.crt --pinnedpubkey %CERTDIR/certs/test-localhost.nn.pub.der https://localhost:%HTTPSPORT/%TESTNUMBER
 </command>
 </client>
 
index 24b1ffb96ab4b55e2905448160fd344a265f19cb..c2c0cdee9acf09ea315d694c3a8ac5419fdb1c7c 100644 (file)
@@ -39,7 +39,7 @@ Ignore certificate revocation "best effort" strategy
 CURL_SSL_BACKEND=schannel
  </setenv>
 <command>
--4 --cacert %SRCDIR/certs/test-ca.crt --ssl-revoke-best-effort https://localhost:%HTTPSPORT/%TESTNUMBER
+-4 --cacert %CERTDIR/certs/test-ca.crt --ssl-revoke-best-effort https://localhost:%HTTPSPORT/%TESTNUMBER
 </command>
 </client>
 
index 353b12f660f52dc01bb1077208d154e7e7247899..117a712c3f8bc3082646bbcaa902925b06909c6e 100644 (file)
@@ -40,7 +40,7 @@ simple HTTPS GET with PEM public key pinning (Schannel variant)
 CURL_SSL_BACKEND=schannel
  </setenv>
 <command>
--4 --cacert %SRCDIR/certs/test-ca.crt --pinnedpubkey %SRCDIR/certs/test-localhost.pub.pem --ssl-revoke-best-effort https://localhost:%HTTPSPORT/%TESTNUMBER
+-4 --cacert %CERTDIR/certs/test-ca.crt --pinnedpubkey %CERTDIR/certs/test-localhost.pub.pem --ssl-revoke-best-effort https://localhost:%HTTPSPORT/%TESTNUMBER
 </command>
 </client>
 
index d6ef5258ad6c9efe1f8692963c4cfb97d7cecdce..f347bbc61b685e9b6552ddc17ebe60e692e02ae3 100644 (file)
@@ -40,7 +40,7 @@ simple HTTPS GET with base64-sha256 public key pinning (Schannel variant)
 CURL_SSL_BACKEND=schannel
  </setenv>
 <command>
--4 --cacert %SRCDIR/certs/test-ca.crt --pinnedpubkey sha256//%sha256b64file[%SRCDIR/certs/test-localhost.pub.der]sha256b64file% --ssl-revoke-best-effort https://localhost:%HTTPSPORT/%TESTNUMBER
+-4 --cacert %CERTDIR/certs/test-ca.crt --pinnedpubkey sha256//%sha256b64file[%CERTDIR/certs/test-localhost.pub.der]sha256b64file% --ssl-revoke-best-effort https://localhost:%HTTPSPORT/%TESTNUMBER
 </command>
 </client>
 
index fa4d0a81f01e51efdbd8e9b71f77ce264af6a5e3..8bcb5e0c62f920bd4408404ab8da85b84a89717e 100644 (file)
@@ -39,7 +39,7 @@ http/3
 HTTP/3 GET:
 </name>
 <command>
---cacert %SRCDIR/certs/test-ca.crt --http3 --resolve localhost:%HTTP3PORT:%HOSTIP https://localhost:%HTTP3PORT/%TESTNUMBER
+--cacert %CERTDIR/certs/test-ca.crt --http3 --resolve localhost:%HTTP3PORT:%HOSTIP https://localhost:%HTTP3PORT/%TESTNUMBER
 </command>
 </client>
 
index 1218e7d1c93ffca3edfbc10566b1905bcdaa4f5b..e53f8804696088d69b4f9d3fb01a0796533c5db7 100644 (file)
@@ -59,7 +59,7 @@ lib%TESTNUMBER
 HTTP GET multiple over HTTP/3
 </name>
 <command>
-https://%HOSTIP:%HTTP3PORT/path/%TESTNUMBER %HOSTIP %HTTP3PORT %SRCDIR/certs/test-ca.cacert
+https://%HOSTIP:%HTTP3PORT/path/%TESTNUMBER %HOSTIP %HTTP3PORT %CERTDIR/certs/test-ca.cacert
 </command>
 </client>
 
index f65466ec81ff68ef3fbcb80bbcd799b290d34c99..f95486ce0f978a3da20db19798cd781a0d7996f9 100644 (file)
@@ -41,7 +41,7 @@ HTTP/3 header-api
 <setenv>
 </setenv>
 <command>
--w '%{header_json}\n' --http3-only --cacert %SRCDIR/certs/test-ca.crt --resolve localhost:%HTTP3PORT:%HOSTIP https://localhost:%HTTP3PORT/%TESTNUMBER
+-w '%{header_json}\n' --http3-only --cacert %CERTDIR/certs/test-ca.crt --resolve localhost:%HTTP3PORT:%HOSTIP https://localhost:%HTTP3PORT/%TESTNUMBER
 </command>
 
 </client>
index ffc18043446c4e5a9eb5004316125f33e0b344d6..92cdf063580cfc6fc260fe70455478ef3df4d6a7 100644 (file)
@@ -35,7 +35,7 @@ https test-localhost-san-first.pem
 HTTPS GET to localhost, first subject alt name matches, CN does not match
 </name>
 <command>
--4 --cacert %SRCDIR/certs/test-ca.crt https://localhost:%HTTPSPORT/%TESTNUMBER
+-4 --cacert %CERTDIR/certs/test-ca.crt https://localhost:%HTTPSPORT/%TESTNUMBER
 </command>
 </client>
 
index dd54661e905dc9d83000b6e7e09ab5531d61cd04..8d0f690999fca0be10616dad284f01f5c0c150d0 100644 (file)
@@ -35,7 +35,7 @@ https test-localhost-san-last.pem
 HTTPS GET to localhost, last subject alt name matches, CN does not match
 </name>
 <command>
--4 --cacert %SRCDIR/certs/test-ca.crt https://localhost:%HTTPSPORT/%TESTNUMBER
+-4 --cacert %CERTDIR/certs/test-ca.crt https://localhost:%HTTPSPORT/%TESTNUMBER
 </command>
 </client>
 
index 49c45de28ea8de467e619959fec92d9291cb4f3e..668c43adc6ec9cda57aaaaeab725ac89f73ff23e 100644 (file)
@@ -39,7 +39,7 @@ HTTPS GET to localhost, first subject alt name matches, CN does not match (Schan
 CURL_SSL_BACKEND=schannel
 </setenv>
 <command>
--4 --cacert %SRCDIR/certs/test-ca.crt --ssl-revoke-best-effort https://localhost:%HTTPSPORT/%TESTNUMBER
+-4 --cacert %CERTDIR/certs/test-ca.crt --ssl-revoke-best-effort https://localhost:%HTTPSPORT/%TESTNUMBER
 </command>
 </client>
 
index a4e9bcbaf7c1b885f3ddbb76116ffe99ffda1626..712e3218d396d0a6d01281c1c19664c0c7c77b65 100644 (file)
@@ -39,7 +39,7 @@ HTTPS GET to localhost, last subject alt name matches, CN does not match (Schann
 CURL_SSL_BACKEND=schannel
 </setenv>
 <command>
--4 --cacert %SRCDIR/certs/test-ca.crt --ssl-revoke-best-effort https://localhost:%HTTPSPORT/%TESTNUMBER
+-4 --cacert %CERTDIR/certs/test-ca.crt --ssl-revoke-best-effort https://localhost:%HTTPSPORT/%TESTNUMBER
 </command>
 </client>
 
index bf0cbae55cc412c4f9805ab560d117af44d48b01..f2415a329fb87077e58971f7d5ce08d53a608a09 100644 (file)
@@ -35,7 +35,7 @@ https test-localhost.pem
 simple HTTPS GET
 </name>
 <command>
--4 --cacert %SRCDIR/certs/test-ca.crt https://localhost:%HTTPSPORT/%TESTNUMBER
+-4 --cacert %CERTDIR/certs/test-ca.crt https://localhost:%HTTPSPORT/%TESTNUMBER
 </command>
 </client>
 
index 5f11c886ab3f4251e3c0eeba9a636bee27eeb011..618153c831375b11f1ac38c7f47b992b225e9994 100644 (file)
@@ -26,7 +26,7 @@ https test-localhost0h.pem
 HTTPS wrong subjectAltName but right CN
 </name>
 <command>
--4 --cacert %SRCDIR/certs/test-ca.crt https://localhost:%HTTPSPORT/%TESTNUMBER
+-4 --cacert %CERTDIR/certs/test-ca.crt https://localhost:%HTTPSPORT/%TESTNUMBER
 </command>
 </client>
 
index 04c13c86a2c092181742a49f4f5a042132d19503..c80872a949ee2fb38e8aa73adf3c3800a1a36e38 100644 (file)
@@ -26,7 +26,7 @@ https test-localhost.nn.pem
 HTTPS GET to localhost and null-prefixed CN cert
 </name>
 <command>
--4 --cacert %SRCDIR/certs/test-ca.crt https://localhost:%HTTPSPORT/%TESTNUMBER
+-4 --cacert %CERTDIR/certs/test-ca.crt https://localhost:%HTTPSPORT/%TESTNUMBER
 </command>
 </client>
 
index 7db791c1d3c11228d6fce9b194e847a68c65f36f..2544f1f37fd14f85c2c1c7605516f3c83a97a763 100644 (file)
@@ -22,7 +22,7 @@ https test-localhost.pem
 CRL test
 </name>
 <command>
--4 --cacert %SRCDIR/certs/test-ca.crt --crlfile %SRCDIR/certs/test-localhost.crl https://localhost:%HTTPSPORT/%TESTNUMBER
+-4 --cacert %CERTDIR/certs/test-ca.crt --crlfile %CERTDIR/certs/test-localhost.crl https://localhost:%HTTPSPORT/%TESTNUMBER
 </command>
 </client>
 
index 2cc9cbaa6e22c095713ff562e14672ebac725555..fe2e38f97855f016fd48213f86b05d65f4632304 100644 (file)
@@ -165,7 +165,7 @@ lib%TESTNUMBER
 </tool>
 # provide URL and ca-cert
 <command>
-https://localhost:%HTTPSPORT/%TESTNUMBER  %SRCDIR/certs/test-ca.crt
+https://localhost:%HTTPSPORT/%TESTNUMBER %CERTDIR/certs/test-ca.crt
 </command>
 </client>
 
index ff481ff1a286b77f740da36d8cb9b49af2211900..f286e41925361eb25f20d4d7682dd1bc1253c34e 100644 (file)
@@ -50,7 +50,7 @@ s/^(.*):(.*)[\r\n]*//
 </stripfile>
 <stdout>
 nomnom
-%strippemfile[%SRCDIR/certs/test-localhost.crt]strippemfile%
+%strippemfile[%CERTDIR/certs/test-localhost.crt]strippemfile%
 </stdout>
 
 </verify>
index a369afc7b306e1479a7db5f1351d2adec391df55..bcf68e4f11d36b48d13daf87e9d845278b7dcae6 100644 (file)
@@ -37,7 +37,7 @@ lib%TESTNUMBER
 </tool>
 # provide URL and ca-cert
 <command>
-https://localhost:%HTTPSPORT/%TESTNUMBER %SRCDIR/certs/test-ca.crt
+https://localhost:%HTTPSPORT/%TESTNUMBER %CERTDIR/certs/test-ca.crt
 </command>
 # Ensure that we're running on localhost because we're checking the host name
 <precheck>
index 2940441b6980a4309e9d2fbdc9d5e643f3ba3883..074c54c1def6dd8a1ebd73de5fe719531b999d3b 100755 (executable)
@@ -102,11 +102,8 @@ while(@ARGV) {
     shift @ARGV;
 }
 
-my $srcdir = dirname(__FILE__);
-$certfile = "$srcdir/certs/$cert.pem";
-$keyfile = "$srcdir/certs/$cert.key";
-$certfile = abs_path($certfile);
-$keyfile = abs_path($keyfile);
+$certfile = abs_path("certs/$cert.pem");
+$keyfile = abs_path("certs/$cert.key");
 
 my $cmdline="$nghttpx --backend=$connect ".
     "--backend-keep-alive-timeout=500ms ".
index 792530fe2b39dbdc1ac8f9834a659d8044b34463..3b1a6b46ee5a95531d30ef936796905620a6c52b 100755 (executable)
@@ -102,11 +102,8 @@ while(@ARGV) {
     shift @ARGV;
 }
 
-my $srcdir = dirname(__FILE__);
-$certfile = "$srcdir/certs/$cert.pem";
-$keyfile = "$srcdir/certs/$cert.key";
-$certfile = abs_path($certfile);
-$keyfile = abs_path($keyfile);
+$certfile = abs_path("certs/$cert.pem");
+$keyfile = abs_path("certs/$cert.key");
 
 my $cmdline="$nghttpx --http2-proxy --backend=$connect ".
     "--backend-keep-alive-timeout=500ms ".
index 8e8049fc0a231a9f792f3208586d10ed755db862..60545ecabe20fc51b2a3f893a4434d486690de13 100755 (executable)
@@ -196,7 +196,7 @@ if(!$logfile) {
 $conffile = "$piddir/${proto}_stunnel.conf";
 
 $capath = abs_path($path);
-$certfile = "$srcdir/". ($stuncert?"certs/$stuncert":"certs/test-localhost.pem");
+$certfile = $stuncert ? "certs/$stuncert" : "certs/test-localhost.pem";
 $certfile = abs_path($certfile);
 
 my $ssltext = uc($proto) ." SSL/TLS:";
index 7af1383715a6cf406a57a0d8a3c832ce6627d190..7b6cfd1c36dded81eb04e8a4539859a207e752ee 100644 (file)
@@ -3083,6 +3083,7 @@ sub subvariables {
     $$thing =~ s/${prefix}FILE_PWD/$file_pwd/g;
     $$thing =~ s/${prefix}SSH_PWD/$ssh_pwd/g;
     $$thing =~ s/${prefix}SRCDIR/$srcdir/g;
+    $$thing =~ s/${prefix}CERTDIR/./g;
     $$thing =~ s/${prefix}USER/$USER/g;
     $$thing =~ s/${prefix}DEV_NULL/$dev_null/g;