From: Viktor Szakats Date: Mon, 24 Mar 2025 21:13:29 +0000 (+0100) Subject: runtests: generate certs dynamically, bump to EC-256, tidy up X-Git-Tag: curl-8_13_0~46 X-Git-Url: http://git.ipfire.org/cgi-bin/gitweb.cgi?a=commitdiff_plain;h=44341e736a3e2f7a2b25a774be3a9796e81abab9;p=thirdparty%2Fcurl.git runtests: generate certs dynamically, bump to EC-256, tidy up Before this patch the curl repository and source tarball distribution contained test certificates as binary blobs. Used by runtests. Drop these certificates in favor of generating them dynamically as part of the build process. Both via autotools and CMake. As part of this, improve certificates, the generator script and process, file layout, and fix any issue to make it work fast and smooth both in CI and local builds. Note, cert generator scripts require OpenSSL >=1.0.2 (or LibreSSL >=3.1.0). Generation requires POSIX shell, also with CMake. Without a POSIX shell tests relying on TLS (and stunnel) will fail. Details: - build: generate certs as part of the test run process. - build, tests: generate certs in the build directory. - binarycheck: drop concept of known binary files with hashes. - binarycheck: move binary check logic into spacecheck and drop this separate checker tool. - build: fix to clean all cert files. - autotools: fix to not run leaf cert generators in parallel. To avoid confusion when updating the revocation database and counter. - scripts: drop `scripts` subdir, merge two scripts into one, auto-generate root cert, allow generating multiple leafs at once. - scripts: switch to EC-256 keys (was: RSA-2048). For key size and perf. - scripts: drop `-x` echo, text dumps, most other output. To avoid log noise and make it quicker in CI. - scripts: make it non-RSA-specific. - scripts: delete unused code. - scripts: use POSIX shell shebang. Some envs don't have bash (Alpine). - scripts: pass test pseudo-secrets via the command-line. To avoid: ``` + openssl genrsa -out test-ca.key -passout fd:0 2048 Invalid password argument, starting with "fd:" ``` - cmake: fix to launch generator scripts via the detected POSIX shell. - cmake: fix `build-certs` rule to not depend on `SRPFILES` (`srp-verifier-*`). - cmake: drop `EXCLUDE_FROM_ALL` for the cert subdir. It makes the Visual Studio generator miss to create the `clean-certs`, `build-certs` targets. No target depend on them, so they don't execute implicitly anyway. Fixes: ``` MSBUILD : error MSB1009: Project file does not exist. Switch: clean-certs.vcxproj ``` - cmake: add `VERBATIM USES_TERMINAL` to `build-certs` target. - GHA/linux: install openssl on Alpine, for the cert generator scripts. Follow-up to 556f722fe32e5e9f4e24f0242100c5e9d57c129b #16593 Follow-up to fa461b4eff52b413f88debf543b5350a6cef4724 #14486 Closes #16824 --- diff --git a/.github/scripts/binarycheck.pl b/.github/scripts/binarycheck.pl deleted file mode 100755 index d3a9e7c417..0000000000 --- a/.github/scripts/binarycheck.pl +++ /dev/null @@ -1,115 +0,0 @@ -#!/usr/bin/env perl -#*************************************************************************** -# _ _ ____ _ -# Project ___| | | | _ \| | -# / __| | | | |_) | | -# | (__| |_| | _ <| |___ -# \___|\___/|_| \_\_____| -# -# Copyright (C) Daniel Stenberg, , et al. -# -# This software is licensed as described in the file COPYING, which -# you should have received as part of this distribution. The terms -# are also available at https://curl.se/docs/copyright.html. -# -# You may opt to use, copy, modify, merge, publish, distribute and/or sell -# copies of the Software, and permit persons to whom the Software is -# furnished to do so, under the terms of the COPYING file. -# -# This software is distributed on an "AS IS" basis, WITHOUT WARRANTY OF ANY -# KIND, either express or implied. -# -# SPDX-License-Identifier: curl -# -########################################################################### - -# This scripts scans the entire git repository for binary files. -# -# All files in the git repo that contain signs of being binary are then -# collected and a sha256sum is generated for all of them. That summary is then -# compared to the list of pre-vetted files so that only the exact copies of -# already scrutinized files are deemed okay to "appear binary". -# - -use strict; -use warnings; - -my $root = "."; -my $sumsfile = ".github/scripts/binarycheck.sums"; -if($ARGV[0]) { - $root = $ARGV[0]; -} - -my @bin; -my %known; -my $error = 0; - -sub knownbins { - open(my $mh, "<", "$sumsfile") || - die "can't read known binaries"; - while(<$mh>) { - my $l = $_; - chomp $l; - if($l =~ /^([a-f0-9]+) (.*)/) { - my ($sum, $file) = ($1, $2); - $known{$file} = 1; - } - elsif($l =~ /^#/) { - # skip comments - } - else { - print STDERR "suspicious line in $sumsfile\n"; - $error++; - } - } - close($mh); -} - -sub checkfile { - my ($file) = @_; - open(my $mh, "<", "$file") || die "can't read $file"; - my $line = 0; - while(<$mh>) { - my $l = $_; - $line++; - if($l =~ /([\x00-\x08\x0b\x0c\x0e-\x1f\x7f])/) { - push @bin, $file; - - if(!$known{$file}) { - printf STDERR "$file:$line has unknown binary contents\n"; - $error++; - } - last; - } - } - close($mh); -} - -my @files = `git ls-files -- $root`; - -if(scalar(@files) < 3000) { - # this means this is not the git source code repository or that git does - # not work, error out! - print STDERR "too few files in the git repository!\n"; - exit 1; -} - -knownbins(); - -if(scalar(keys %known) < 4) { - print STDERR "too few known binaries in $sumsfile\n"; - exit 2; -} - -for my $f (@files) { - chomp $f; - checkfile("$root/$f"); -} - -my $check=system("sha256sum -c $sumsfile"); -if($check) { - print STDERR "sha256sum detected a problem\n"; - $error++; -} - -exit $error; diff --git a/.github/scripts/binarycheck.sums b/.github/scripts/binarycheck.sums deleted file mode 100644 index 58585d115e..0000000000 --- a/.github/scripts/binarycheck.sums +++ /dev/null @@ -1,7 +0,0 @@ -# Copyright (C) Daniel Stenberg, , et al. -# SPDX-License-Identifier: curl -c68161dba1c0166e4ab8d8ce00f57326db25d29fdd52c33d9974d0972ec60990 ./tests/certs/test-localhost-san-first.pub.der -82430be03ec1783e2f9fad6e07a6f42cce62f8a23d87ea81a95977b47110c200 ./tests/certs/test-localhost-san-last.pub.der -47233a0092db614f53e96a4df83ddeaa7e5242899ede1c1a90c53423a0b13bba ./tests/certs/test-localhost.nn.pub.der -63898448aa199675a30fb6722046a665a7c1a5c24453e63d8c37397482a7dc52 ./tests/certs/test-localhost.pub.der -f78c61bb06a71d1bf9b034ecfcb7fe35ae85b6a3b87bf3a73c085dc062747dc1 ./tests/certs/test-localhost0h.pub.der diff --git a/.github/scripts/spacecheck.pl b/.github/scripts/spacecheck.pl index b2473b1544..0c16f9312f 100755 --- a/.github/scripts/spacecheck.pl +++ b/.github/scripts/spacecheck.pl @@ -28,16 +28,13 @@ use warnings; my @tabs = ( "^m4/zz40-xc-ovr.m4", - "Makefile\\.[a-z]+\$", + "Makefile\\.(am|example)\$", "/mkfile", "\\.(bat|sln|vc)\$", - "^tests/certs/.+\\.der\$", "^tests/data/test", ); my @mixed_eol = ( - "^tests/certs/.+\\.(crt|der)\$", - "^tests/certs/Server-localhost0h-sv.pem", "^tests/data/test", ); @@ -47,14 +44,9 @@ my @need_crlf = ( ); my @space_at_eol = ( - "^tests/.+\\.(cacert|crt|pem)\$", "^tests/data/test", ); -my @eol_at_eof = ( - "^tests/certs/.+\\.der\$", -); - sub fn_match { my ($filename, @masklist) = @_; @@ -129,7 +121,6 @@ while (my $filename = <$git_ls_files>) { } if ($content ne "" && - !fn_match($filename, @eol_at_eof) && $content !~ /\n\z/) { push @err, "content: has no EOL at EOF"; } @@ -139,6 +130,10 @@ while (my $filename = <$git_ls_files>) { push @err, "content: has multiple EOL at EOF"; } + if($content =~ /([\x00-\x08\x0b\x0c\x0e-\x1f\x7f])/) { + push @err, "content: has binary contents"; + } + if (@err) { $issues++; foreach my $err (@err) { diff --git a/.github/workflows/checksrc.yml b/.github/workflows/checksrc.yml index 83a5f396a4..f172e55341 100644 --- a/.github/workflows/checksrc.yml +++ b/.github/workflows/checksrc.yml @@ -110,9 +110,6 @@ jobs: - name: yamlcheck run: .github/scripts/yamlcheck.sh - - name: binarycheck - run: .github/scripts/binarycheck.pl - # we allow some extra in source code - name: badwords run: | diff --git a/.github/workflows/linux.yml b/.github/workflows/linux.yml index d9b7322f92..7d5a9f23c2 100644 --- a/.github/workflows/linux.yml +++ b/.github/workflows/linux.yml @@ -327,7 +327,7 @@ jobs: libssh2-dev zlib-dev brotli-dev zstd-dev libidn2-dev openldap-dev \ heimdal-dev libpsl-dev c-ares-dev \ py3-impacket py3-asn1 py3-six py3-pycryptodomex \ - perl-time-hires openssh stunnel sudo git + perl-time-hires openssh stunnel sudo git openssl - name: 'cache bearssl' if: contains(matrix.build.install_steps, 'bearssl') diff --git a/.github/workflows/macos.yml b/.github/workflows/macos.yml index 6285c4af22..181525487a 100644 --- a/.github/workflows/macos.yml +++ b/.github/workflows/macos.yml @@ -277,17 +277,6 @@ jobs: - name: 'test configs' run: grep -H -v '^#' bld/tests/config bld/tests/http/config.ini || true - - name: 'build-cert' - if: contains(matrix.build.generate, '-DCURL_USE_SECTRANSP=ON') || contains(matrix.build.configure, '--with-secure-transport') - run: | - if [ -n '${{ matrix.build.generate }}' ]; then - cmake --build bld --target clean-certs - cmake --build bld --target build-certs --parallel 1 - else - make -C bld/tests/certs clean-certs - make -C bld/tests/certs build-certs -j1 - fi - - name: 'build' run: | if [ -n '${{ matrix.build.generate }}' ]; then diff --git a/configure.ac b/configure.ac index 0768b902f1..7f5a2bff59 100644 --- a/configure.ac +++ b/configure.ac @@ -5406,7 +5406,6 @@ AC_CONFIG_FILES([\ tests/config \ tests/configurehelp.pm \ tests/certs/Makefile \ - tests/certs/scripts/Makefile \ tests/data/Makefile \ tests/server/Makefile \ tests/libtest/Makefile \ diff --git a/docs/HTTP3.md b/docs/HTTP3.md index eee26a65c9..b80698fb9e 100644 --- a/docs/HTTP3.md +++ b/docs/HTTP3.md @@ -413,7 +413,7 @@ Run the local h3 server on port 9443, make it proxy all traffic through to HTTP/1 on localhost port 80. For local toying, we can just use the test cert that exists in curl's test dir. - % CERT=$CURLSRC/tests/stunnel.pem + % CERT=/path/to/stunnel.pem % $HOME/bin/nghttpx $CERT $CERT --backend=localhost,80 \ --frontend="localhost,9443;quic" diff --git a/tests/CMakeLists.txt b/tests/CMakeLists.txt index 306aa240a8..6d5539d8f5 100644 --- a/tests/CMakeLists.txt +++ b/tests/CMakeLists.txt @@ -35,16 +35,16 @@ add_subdirectory(http/clients) add_subdirectory(server) add_subdirectory(libtest) add_subdirectory(unit) -add_subdirectory(certs EXCLUDE_FROM_ALL) +add_subdirectory(certs) function(curl_add_runtests _targetname _test_flags) if(NOT BUILD_LIBCURL_DOCS) string(APPEND _test_flags " !documentation") endif() + set(_depends "build-certs") # Skip walking through dependent targets before running tests in CI. # This avoids: GNU Make doing a slow re-evaluation of all targets and # skipping them, MSBuild doing a re-evaluation, and actually rebuilding them. - set(_depends "") if(NOT _targetname STREQUAL "test-ci") set(_depends "testdeps") endif() diff --git a/tests/Makefile.am b/tests/Makefile.am index 05012cb441..87138e2dd5 100644 --- a/tests/Makefile.am +++ b/tests/Makefile.am @@ -157,28 +157,33 @@ SUFFIXES = .1 .md perlcheck: @if ! test -x "$(PERL)"; then echo "No perl!"; exit 2; fi -test: perlcheck all +build-certs: + (cd certs && $(MAKE) build-certs) + +runtests-pre: perlcheck build-certs + +test: runtests-pre all $(TEST) $(TFLAGS) -quiet-test: perlcheck all +quiet-test: runtests-pre all $(TEST) $(TEST_Q) $(TFLAGS) -am-test: perlcheck all +am-test: runtests-pre all $(TEST) $(TEST_AM) $(TFLAGS) -ci-test: perlcheck all +ci-test: runtests-pre all $(TEST) $(TEST_CI) $(TFLAGS) -full-test: perlcheck all +full-test: runtests-pre all $(TEST) $(TEST_F) $(TFLAGS) -nonflaky-test: perlcheck all +nonflaky-test: runtests-pre all $(TEST) $(TEST_NF) $(TFLAGS) -torture-test: perlcheck all +torture-test: runtests-pre all $(TEST) $(TEST_T) $(TFLAGS) -event-test: perlcheck all +event-test: runtests-pre all $(TEST) $(TEST_E) $(TFLAGS) default-pytest: ci-pytest diff --git a/tests/certs/.gitignore b/tests/certs/.gitignore index 986f438c23..98adccef08 100644 --- a/tests/certs/.gitignore +++ b/tests/certs/.gitignore @@ -1,4 +1,14 @@ # Copyright (C) Daniel Stenberg, , et al. # # SPDX-License-Identifier: curl -gen +test-*.crl +test-*.crt +test-*.csr +test-*.der +test-*.key* +test-*.pem +test-ca.cacert +test-ca.cnt* +test-ca.db* +test-ca.raw* +test-ca.srl diff --git a/tests/certs/CMakeLists.txt b/tests/certs/CMakeLists.txt index 314bdece07..f2035b132c 100644 --- a/tests/certs/CMakeLists.txt +++ b/tests/certs/CMakeLists.txt @@ -21,26 +21,30 @@ # SPDX-License-Identifier: curl # ########################################################################### +# Get 'CERTCONFIG_CA', 'CERTCONFIGS', 'GENERATEDCERTS', 'SRPFILES' variables +curl_transform_makefile_inc("Makefile.inc" "${CMAKE_CURRENT_BINARY_DIR}/Makefile.inc.cmake") +include("${CMAKE_CURRENT_BINARY_DIR}/Makefile.inc.cmake") + find_program(SH_EXECUTABLE "sh") mark_as_advanced(SH_EXECUTABLE) if(SH_EXECUTABLE) - # Get 'CERTCONFIGS', 'GENERATEDCERTS', 'SRPFILES' variables - curl_transform_makefile_inc("Makefile.inc" "${CMAKE_CURRENT_BINARY_DIR}/Makefile.inc.cmake") - include("${CMAKE_CURRENT_BINARY_DIR}/Makefile.inc.cmake") - - add_custom_target(clean-certs - COMMAND ${CMAKE_COMMAND} -E remove ${GENERATEDCERTS} - WORKING_DIRECTORY ${CMAKE_CURRENT_SOURCE_DIR} + string(REPLACE ";" " " _certconfigs "${CERTCONFIGS}") + add_custom_command(OUTPUT ${GENERATEDCERTS} + COMMAND ${SH_EXECUTABLE} -c "${CMAKE_CURRENT_SOURCE_DIR}/genserv.sh test ${_certconfigs}" + DEPENDS "${CMAKE_CURRENT_SOURCE_DIR}/genserv.sh" ${CERTCONFIG_CA} ${CERTCONFIGS} + VERBATIM ) - add_custom_target(build-certs - DEPENDS ${CERTCONFIGS} ${SRPFILES} - COMMAND "${CMAKE_CURRENT_SOURCE_DIR}/scripts/genroot.sh" test - COMMAND "${CMAKE_CURRENT_SOURCE_DIR}/scripts/genserv.sh" test-localhost test - COMMAND "${CMAKE_CURRENT_SOURCE_DIR}/scripts/genserv.sh" test-localhost.nn test - COMMAND "${CMAKE_CURRENT_SOURCE_DIR}/scripts/genserv.sh" test-localhost0h test - COMMAND "${CMAKE_CURRENT_SOURCE_DIR}/scripts/genserv.sh" test-localhost-san-first test - COMMAND "${CMAKE_CURRENT_SOURCE_DIR}/scripts/genserv.sh" test-localhost-san-last test - WORKING_DIRECTORY ${CMAKE_CURRENT_SOURCE_DIR} - ) + DEPENDS ${GENERATEDCERTS}) endif() + +add_custom_target(clean-certs + COMMAND ${CMAKE_COMMAND} -E remove ${GENERATEDCERTS} + "test-*.csr" + "test-*.der" + "test-*.keyenc" + "test-ca.cnt*" + "test-ca.db*" + "test-ca.raw*" + "test-ca.srl" +) diff --git a/tests/certs/Makefile.am b/tests/certs/Makefile.am index 7e0b785b1e..0e34fd7d06 100644 --- a/tests/certs/Makefile.am +++ b/tests/certs/Makefile.am @@ -23,35 +23,28 @@ ########################################################################### AUTOMAKE_OPTIONS = foreign -SUBDIRS = scripts - include Makefile.inc -EXTRA_DIST = $(CERTCONFIGS) $(GENERATEDCERTS) $(SRPFILES) CMakeLists.txt +EXTRA_DIST = $(CERTCONFIG_CA) $(CERTCONFIGS) $(SRPFILES) CMakeLists.txt \ + genserv.sh + +DISTCLEANFILES = $(GENERATEDCERTS) # Rebuild the certificates clean-certs: - cd $(srcdir); rm -f $(GENERATEDCERTS) - -build-certs: $(srcdir)/test-ca.cacert $(srcdir)/test-localhost.pem \ - $(srcdir)/test-localhost.nn.pem $(srcdir)/test-localhost0h.pem \ - $(srcdir)/test-localhost-san-first.pem $(srcdir)/test-localhost-san-last.pem - -$(srcdir)/test-ca.cacert: - cd $(srcdir); scripts/genroot.sh test - -$(srcdir)/test-localhost.pem: $(srcdir)/test-ca.cacert - cd $(srcdir); scripts/genserv.sh test-localhost test - -$(srcdir)/test-localhost.nn.pem: $(srcdir)/test-ca.cacert - cd $(srcdir); scripts/genserv.sh test-localhost.nn test - -$(srcdir)/test-localhost0h.pem: $(srcdir)/test-ca.cacert - cd $(srcdir); scripts/genserv.sh test-localhost0h test - -$(srcdir)/test-localhost-san-first.pem: $(srcdir)/test-ca.cacert - cd $(srcdir); scripts/genserv.sh test-localhost-san-first test - -$(srcdir)/test-localhost-san-last.pem: $(srcdir)/test-ca.cacert - cd $(srcdir); scripts/genserv.sh test-localhost-san-last test + rm -f $(GENERATEDCERTS) \ + test-*.csr \ + test-*.der \ + test-*.keyenc \ + test-ca.cnt* \ + test-ca.db* \ + test-ca.raw* \ + test-ca.srl + +build-certs: test-ca.cacert + +# Generate all certs in a single shot, but declare just a single target file +# to support GNU Make <4.3 without "grouped explicit targets" support. +test-ca.cacert: $(CERTCONFIG_CA) $(CERTCONFIGS) genserv.sh + $(srcdir)/genserv.sh test $(CERTCONFIGS) diff --git a/tests/certs/Makefile.inc b/tests/certs/Makefile.inc index 62830464ae..02e5e99ff7 100644 --- a/tests/certs/Makefile.inc +++ b/tests/certs/Makefile.inc @@ -21,9 +21,11 @@ # SPDX-License-Identifier: curl # ########################################################################### -CERTCONFIGS = \ - test-ca.prm \ +CERTCONFIG_CA = \ test-ca.cnf \ + test-ca.prm + +CERTCONFIGS = \ test-localhost.prm \ test-localhost.nn.prm \ test-localhost0h.prm \ diff --git a/tests/certs/genserv.sh b/tests/certs/genserv.sh new file mode 100755 index 0000000000..1a818f35bf --- /dev/null +++ b/tests/certs/genserv.sh @@ -0,0 +1,101 @@ +#!/bin/sh +#*************************************************************************** +# _ _ ____ _ +# Project ___| | | | _ \| | +# / __| | | | |_) | | +# | (__| |_| | _ <| |___ +# \___|\___/|_| \_\_____| +# +# Copyright (C) EdelWeb for EdelKey and OpenEvidence +# +# This software is licensed as described in the file COPYING, which +# you should have received as part of this distribution. The terms +# are also available at https://curl.se/docs/copyright.html. +# +# You may opt to use, copy, modify, merge, publish, distribute and/or sell +# copies of the Software, and permit persons to whom the Software is +# furnished to do so, under the terms of the COPYING file. +# +# This software is distributed on an "AS IS" basis, WITHOUT WARRANTY OF ANY +# KIND, either express or implied. +# +# SPDX-License-Identifier: curl +# +########################################################################### + +# exit on first fail +set -eu + +OPENSSL=openssl +if [ -f /usr/local/ssl/bin/openssl ]; then + OPENSSL=/usr/local/ssl/bin/openssl +fi + +USAGE='echo Usage is genserv.sh [ ...]' + +SRCDIR="$(dirname "${0}")" + +KEYSIZE=prime256v1 + +CAPREFIX="${1:-}" +shift +if [ -z "$CAPREFIX" ]; then + echo 'No CA prefix' + $USAGE + exit +elif [ ! -f "$CAPREFIX-ca.cacert" ] || \ + [ ! -f "$CAPREFIX-ca.key" ]; then + + command -v "$OPENSSL" + "$OPENSSL" version + + # Generating CA root + PREFIX=$CAPREFIX + DURATION=6000 + + "$OPENSSL" genpkey -algorithm EC -pkeyopt ec_paramgen_curve:"$KEYSIZE" -pkeyopt ec_param_enc:named_curve \ + -out "$PREFIX-ca.key" -pass 'pass:secret' + "$OPENSSL" req -config "$SRCDIR/$PREFIX-ca.prm" -new -key "$PREFIX-ca.key" -out "$PREFIX-ca.csr" -passin 'pass:secret' 2>/dev/null + "$OPENSSL" x509 -sha256 -extfile "$SRCDIR/$PREFIX-ca.prm" -days "$DURATION" \ + -req -signkey "$PREFIX-ca.key" -in "$PREFIX-ca.csr" -out "$PREFIX-ca.raw-cacert" + "$OPENSSL" x509 -in "$PREFIX-ca.raw-cacert" -text -nameopt multiline > "$PREFIX-ca.cacert" + "$OPENSSL" x509 -in "$PREFIX-ca.cacert" -outform der -out "$PREFIX-ca.der" + "$OPENSSL" x509 -in "$PREFIX-ca.cacert" -text -nameopt multiline > "$PREFIX-ca.crt" + + echo "CA root generated: $PREFIX ${DURATION}days $KEYSIZE" +fi + +DURATION=300 + +while [ -n "${1:-}" ]; do + + PREFIX="${1%.prm}" + shift + + # pseudo-secrets + "$OPENSSL" genpkey -algorithm EC -pkeyopt ec_paramgen_curve:"$KEYSIZE" -pkeyopt ec_param_enc:named_curve \ + -out "$PREFIX.keyenc" -pass 'pass:secret' + "$OPENSSL" req -config "$SRCDIR/$PREFIX.prm" -new -key "$PREFIX.keyenc" -out "$PREFIX.csr" -passin 'pass:secret' 2>/dev/null + "$OPENSSL" pkey -in "$PREFIX.keyenc" -out "$PREFIX.key" -passin 'pass:secret' + + "$OPENSSL" pkey -in "$PREFIX.key" -pubout -outform DER -out "$PREFIX.pub.der" + "$OPENSSL" pkey -in "$PREFIX.key" -pubout -outform PEM -out "$PREFIX.pub.pem" + "$OPENSSL" x509 -sha256 -extfile "$SRCDIR/$PREFIX.prm" -days "$DURATION" \ + -req -CA "$CAPREFIX-ca.cacert" -CAkey "$CAPREFIX-ca.key" -CAcreateserial -in "$PREFIX.csr" > "$PREFIX.crt" 2>/dev/null + + # revoke server cert + touch "$CAPREFIX-ca.db" + echo 01 > "$CAPREFIX-ca.cnt" + "$OPENSSL" ca -config "$SRCDIR/$CAPREFIX-ca.cnf" -revoke "$PREFIX.crt" 2>/dev/null + + # issue CRL + "$OPENSSL" ca -config "$SRCDIR/$CAPREFIX-ca.cnf" -gencrl -out "$PREFIX.crl" 2>/dev/null + + "$OPENSSL" x509 -in "$PREFIX.crt" -outform der -out "$PREFIX.der" + + # all together now + cat "$SRCDIR/$PREFIX.prm" "$PREFIX.key" "$PREFIX.crt" > "$PREFIX.pem" + chmod o-r "$SRCDIR/$PREFIX.prm" + + echo "Certificate generated: CA=$CAPREFIX ${DURATION}days $KEYSIZE $PREFIX" +done diff --git a/tests/certs/scripts/Makefile.am b/tests/certs/scripts/Makefile.am deleted file mode 100644 index 82b5f277eb..0000000000 --- a/tests/certs/scripts/Makefile.am +++ /dev/null @@ -1,30 +0,0 @@ -#*************************************************************************** -# _ _ ____ _ -# Project ___| | | | _ \| | -# / __| | | | |_) | | -# | (__| |_| | _ <| |___ -# \___|\___/|_| \_\_____| -# -# Copyright (C) Daniel Stenberg, , et al. -# -# This software is licensed as described in the file COPYING, which -# you should have received as part of this distribution. The terms -# are also available at https://curl.se/docs/copyright.html. -# -# You may opt to use, copy, modify, merge, publish, distribute and/or sell -# copies of the Software, and permit persons to whom the Software is -# furnished to do so, under the terms of the COPYING file. -# -# This software is distributed on an "AS IS" basis, WITHOUT WARRANTY OF ANY -# KIND, either express or implied. -# -# SPDX-License-Identifier: curl -# -########################################################################### -AUTOMAKE_OPTIONS = foreign - -SCRIPTFILES = \ - genroot.sh \ - genserv.sh - -EXTRA_DIST = $(SCRIPTFILES) diff --git a/tests/certs/scripts/genroot.sh b/tests/certs/scripts/genroot.sh deleted file mode 100755 index 7f7fa886e9..0000000000 --- a/tests/certs/scripts/genroot.sh +++ /dev/null @@ -1,87 +0,0 @@ -#!/usr/bin/env bash -#*************************************************************************** -# _ _ ____ _ -# Project ___| | | | _ \| | -# / __| | | | |_) | | -# | (__| |_| | _ <| |___ -# \___|\___/|_| \_\_____| -# -# Copyright (C) EdelWeb for EdelKey and OpenEvidence -# -# This software is licensed as described in the file COPYING, which -# you should have received as part of this distribution. The terms -# are also available at https://curl.se/docs/copyright.html. -# -# You may opt to use, copy, modify, merge, publish, distribute and/or sell -# copies of the Software, and permit persons to whom the Software is -# furnished to do so, under the terms of the COPYING file. -# -# This software is distributed on an "AS IS" basis, WITHOUT WARRANTY OF ANY -# KIND, either express or implied. -# -# SPDX-License-Identifier: curl -# -########################################################################### - -# exit on first fail -set -eu - -OPENSSL=openssl -if [ -f /usr/local/ssl/bin/openssl ]; then - OPENSSL=/usr/local/ssl/bin/openssl -fi - -command -v "$OPENSSL" -"$OPENSSL" version - -USAGE='echo Usage is genroot.sh ' - -SRCDIR=$(pwd) - -GENDIR=${GENDIR:-$SRCDIR/gen} -test -d "$GENDIR" || mkdir "$GENDIR" -cd "$GENDIR" - -KEYSIZE=2048 -DURATION=6000 -# The -sha256 option was introduced in OpenSSL 1.0.1 -DIGESTALGO=-sha256 - -NOTOK= - -PREFIX="${1:-}" -if [ -z "$PREFIX" ]; then - echo 'No configuration prefix' - NOTOK=1 -else - if [ ! -f "$SRCDIR/$PREFIX-ca.prm" ]; then - echo "No configuration file $SRCDIR/$PREFIX-ca.prm" - NOTOK=1 - fi -fi - -if [ -n "$NOTOK" ]; then - echo 'Sorry, I cannot do that for you.' - $USAGE - exit -fi - -echo "PREFIX=$PREFIX DURATION=$DURATION KEYSIZE=$KEYSIZE" - -set -x - -"$OPENSSL" genrsa -out "$PREFIX-ca.key" -passout fd:0 "$KEYSIZE" < "$PREFIX-ca.cacert" -"$OPENSSL" x509 -in "$PREFIX-ca.cacert" -outform der -out "$PREFIX-ca.der" -"$OPENSSL" x509 -in "$PREFIX-ca.cacert" -text -nameopt multiline > "$PREFIX-ca.crt" - -for ext in key cacert crt; do - cp "$PREFIX-ca.$ext" "$SRCDIR"/ -done -echo "ca root $PREFIX generated." diff --git a/tests/certs/scripts/genserv.sh b/tests/certs/scripts/genserv.sh deleted file mode 100755 index cf99d511d2..0000000000 --- a/tests/certs/scripts/genserv.sh +++ /dev/null @@ -1,131 +0,0 @@ -#!/usr/bin/env bash -#*************************************************************************** -# _ _ ____ _ -# Project ___| | | | _ \| | -# / __| | | | |_) | | -# | (__| |_| | _ <| |___ -# \___|\___/|_| \_\_____| -# -# Copyright (C) EdelWeb for EdelKey and OpenEvidence -# -# This software is licensed as described in the file COPYING, which -# you should have received as part of this distribution. The terms -# are also available at https://curl.se/docs/copyright.html. -# -# You may opt to use, copy, modify, merge, publish, distribute and/or sell -# copies of the Software, and permit persons to whom the Software is -# furnished to do so, under the terms of the COPYING file. -# -# This software is distributed on an "AS IS" basis, WITHOUT WARRANTY OF ANY -# KIND, either express or implied. -# -# SPDX-License-Identifier: curl -# -########################################################################### - -# exit on first fail -set -eu - -OPENSSL=openssl -if [ -f /usr/local/ssl/bin/openssl ]; then - OPENSSL=/usr/local/ssl/bin/openssl -fi - -command -v "$OPENSSL" -"$OPENSSL" version - -USAGE='echo Usage is genserv.sh ' - -SRCDIR=$(pwd) - -GENDIR=${GENDIR:-$SRCDIR/gen} -test -d "$GENDIR" || mkdir "$GENDIR" -cd "$GENDIR" - -KEYSIZE=2048 -DURATION=300 -# The -sha256 option was introduced in OpenSSL 1.0.1 -DIGESTALGO=-sha256 - -REQ=YES -P12=NO - -NOTOK= - -PREFIX="${1:-}" -if [ -z "$PREFIX" ]; then - echo 'No configuration prefix' - NOTOK=1 -else - if [ ! -f "$SRCDIR/$PREFIX.prm" ]; then - echo "No configuration file $SRCDIR/$PREFIX.prm" - NOTOK=1 - fi -fi - -CAPREFIX="${2:-}" -if [ -z "$CAPREFIX" ]; then - echo 'No CA prefix' - NOTOK=1 -else - if [ ! -f "$CAPREFIX-ca.cacert" ]; then - echo "No CA certificate file $CAPREFIX-ca.cacert" - NOTOK=1 - fi - if [ ! -f "$CAPREFIX-ca.key" ]; then - echo "No $CAPREFIX key" - NOTOK=1 - fi -fi - -if [ -n "$NOTOK" ]; then - echo 'Sorry, I cannot do that for you.' - $USAGE - exit -fi - -echo "PREFIX=$PREFIX CAPREFIX=$CAPREFIX DURATION=$DURATION KEYSIZE=$KEYSIZE" - -set -x - -if [ "$REQ" = YES ]; then - "$OPENSSL" req -config "$SRCDIR/$PREFIX.prm" -newkey "rsa:$KEYSIZE" -keyout "$PREFIX.key" -out "$PREFIX.csr" -passout fd:0 < "$PREFIX.crt" - -if [ "$P12" = YES ]; then - "$OPENSSL" pkcs12 -export -des3 -out "$PREFIX.p12" -caname "$CAPREFIX" -name "$PREFIX" -inkey "$PREFIX.key" -in "$PREFIX.crt" -certfile "$CAPREFIX-ca.crt" -fi - -"$OPENSSL" x509 -noout -text -hash -in "$PREFIX.crt" -nameopt multiline - -# revoke server cert -touch "$CAPREFIX-ca.db" -echo 01 > "$CAPREFIX-ca.cnt" -"$OPENSSL" ca -config "$SRCDIR/$CAPREFIX-ca.cnf" -revoke "$PREFIX.crt" - -# issue CRL -"$OPENSSL" ca -config "$SRCDIR/$CAPREFIX-ca.cnf" -gencrl -out "$PREFIX.crl" - -"$OPENSSL" x509 -in "$PREFIX.crt" -outform der -out "$PREFIX.der" - -# all together now -cat "$SRCDIR/$PREFIX.prm" "$PREFIX.key" "$PREFIX.crt" > "$PREFIX.pem" -chmod o-r "$SRCDIR/$PREFIX.prm" - -#for ext in crl crt csr der key pem pub.der pub.pem; do -for ext in crl crt key pem pub.der pub.pem; do - cp "$PREFIX.$ext" "$SRCDIR"/ -done -echo "certificates for $PREFIX generated." diff --git a/tests/certs/test-ca.cacert b/tests/certs/test-ca.cacert deleted file mode 100644 index d95dc13aae..0000000000 --- a/tests/certs/test-ca.cacert +++ /dev/null @@ -1,99 +0,0 @@ -Certificate: - Data: - Version: 3 (0x2) - Serial Number: - ed:c7:ef:5d:c1:2b:f1:2f - Signature Algorithm: sha256WithRSAEncryption - Issuer: - countryName = NN - organizationName = Edel Curl Arctic Illudium Research Cloud - commonName = Northern Nowhere Trust Anchor - Validity - Not Before: Mar 6 11:51:47 2025 GMT - Not After : Aug 9 11:51:47 2041 GMT - Subject: - countryName = NN - organizationName = Edel Curl Arctic Illudium Research Cloud - commonName = Northern Nowhere Trust Anchor - Subject Public Key Info: - Public Key Algorithm: rsaEncryption - RSA Public-Key: (2048 bit) - Modulus: - 00:cb:e8:c2:61:24:08:95:87:5d:dd:80:67:29:9a: - 0a:b0:55:28:1c:86:75:22:ec:8a:a3:ad:e8:3c:88: - 2c:bb:a2:5c:48:0a:9b:36:c3:b3:6b:1d:ef:1c:79: - 80:05:cb:81:45:93:4d:96:f8:a7:0c:93:84:71:1e: - 5a:27:83:16:84:be:0a:fc:08:eb:f6:60:7f:3e:8e: - 6d:39:8b:55:7a:c0:a2:7b:8c:a6:45:27:9e:6e:37: - ad:b5:40:8a:83:7c:d2:0d:b0:e2:3d:ed:f5:3d:26: - de:b7:7c:99:3c:56:98:bc:9d:49:bf:c8:ce:12:b5: - 40:1e:f7:4e:91:78:80:52:7a:83:84:9e:ec:0d:0e: - 18:40:cb:ec:95:76:85:ff:88:9a:8f:12:a4:ef:7e: - 7f:30:66:3a:cb:0e:b4:6a:d7:5c:8c:b3:e1:4c:57: - 47:45:ec:59:27:80:5b:11:37:1a:cd:41:d0:30:06: - b7:fa:45:0f:37:8b:39:24:c3:3d:55:ba:a9:ef:68: - 88:3e:c4:4c:a7:43:44:13:27:06:95:ba:89:74:59: - f8:a6:d0:8f:39:a2:d7:74:dd:9b:95:95:4b:8f:d7: - 70:dc:7b:68:cf:ee:9b:89:72:41:1b:2a:d2:b1:a3: - a4:eb:6a:94:c2:e4:d0:ab:93:83:37:d1:12:28:b3: - 19:6b - Exponent: 65537 (0x10001) - X509v3 extensions: - X509v3 Basic Constraints: critical - CA:TRUE - X509v3 Key Usage: critical - Certificate Sign, CRL Sign - X509v3 Subject Key Identifier: - 9D:2B:CE:95:BF:D8:22:91:A2:E5:AD:FE:79:0E:E9:23:E1:4D:28:32 - X509v3 Authority Key Identifier: - keyid:9D:2B:CE:95:BF:D8:22:91:A2:E5:AD:FE:79:0E:E9:23:E1:4D:28:32 - - Authority Information Access: - CA Issuers - URI:http://test.curl.se/ca/EdelCurlRoot.cer - - X509v3 CRL Distribution Points: - - Full Name: - URI:http://test.curl.se/ca/EdelCurlRoot.crl - - Signature Algorithm: sha256WithRSAEncryption - 12:fd:0c:0f:2b:d8:e0:45:e3:b3:f4:43:de:e9:bc:5c:ce:6d: - 56:db:2a:30:cd:d3:46:5d:c1:6b:00:fb:fc:9c:d8:0b:7d:18: - f8:ef:9a:84:3e:44:94:0e:ae:f8:5f:69:ed:1a:ac:0b:c1:af: - 7e:63:83:2c:cb:73:81:ce:f3:88:1c:8b:59:38:42:15:ba:64: - 08:ff:55:a9:d9:59:1b:3a:c5:90:b2:fe:19:a6:22:73:f5:a8: - c2:58:45:5a:c8:13:2f:cd:39:7f:67:86:17:26:9e:56:19:e6: - b9:72:39:a4:21:a9:99:9c:8d:71:15:33:c7:25:90:b5:df:65: - 9d:35:22:13:a4:b2:e1:56:00:fd:5b:ca:65:58:0d:46:13:fe: - d7:ba:c4:3a:56:24:79:cf:e8:fa:26:25:b9:f7:48:31:e8:c3: - fd:30:d7:a9:d3:a3:cf:6c:ca:03:d5:b4:54:cd:05:a6:67:a4: - ca:fb:25:29:0e:00:e8:cc:37:86:91:4b:e4:8a:f4:eb:15:4c: - d6:d6:f5:87:61:00:eb:dd:a9:d8:09:56:ca:e4:1c:1c:79:04: - 6e:fd:9d:00:54:6a:e1:78:14:c0:a2:ca:c1:07:39:82:57:9e: - 63:d9:b8:d4:20:96:25:da:59:fe:da:3a:d4:fe:e4:74:f1:19: - 56:63:01:46 ------BEGIN CERTIFICATE----- -MIIENzCCAx+gAwIBAgIJAO3H713BK/EvMA0GCSqGSIb3DQEBCwUAMGgxCzAJBgNV -BAYTAk5OMTEwLwYDVQQKDChFZGVsIEN1cmwgQXJjdGljIElsbHVkaXVtIFJlc2Vh -cmNoIENsb3VkMSYwJAYDVQQDDB1Ob3J0aGVybiBOb3doZXJlIFRydXN0IEFuY2hv -cjAeFw0yNTAzMDYxMTUxNDdaFw00MTA4MDkxMTUxNDdaMGgxCzAJBgNVBAYTAk5O -MTEwLwYDVQQKDChFZGVsIEN1cmwgQXJjdGljIElsbHVkaXVtIFJlc2VhcmNoIENs -b3VkMSYwJAYDVQQDDB1Ob3J0aGVybiBOb3doZXJlIFRydXN0IEFuY2hvcjCCASIw -DQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAMvowmEkCJWHXd2AZymaCrBVKByG -dSLsiqOt6DyILLuiXEgKmzbDs2sd7xx5gAXLgUWTTZb4pwyThHEeWieDFoS+CvwI -6/Zgfz6ObTmLVXrAonuMpkUnnm43rbVAioN80g2w4j3t9T0m3rd8mTxWmLydSb/I -zhK1QB73TpF4gFJ6g4Se7A0OGEDL7JV2hf+Imo8SpO9+fzBmOssOtGrXXIyz4UxX -R0XsWSeAWxE3Gs1B0DAGt/pFDzeLOSTDPVW6qe9oiD7ETKdDRBMnBpW6iXRZ+KbQ -jzmi13Tdm5WVS4/XcNx7aM/um4lyQRsq0rGjpOtqlMLk0KuTgzfREiizGWsCAwEA -AaOB4zCB4DAPBgNVHRMBAf8EBTADAQH/MA4GA1UdDwEB/wQEAwIBBjAdBgNVHQ4E -FgQUnSvOlb/YIpGi5a3+eQ7pI+FNKDIwHwYDVR0jBBgwFoAUnSvOlb/YIpGi5a3+ -eQ7pI+FNKDIwQwYIKwYBBQUHAQEENzA1MDMGCCsGAQUFBzAChidodHRwOi8vdGVz -dC5jdXJsLnNlL2NhL0VkZWxDdXJsUm9vdC5jZXIwOAYDVR0fBDEwLzAtoCugKYYn -aHR0cDovL3Rlc3QuY3VybC5zZS9jYS9FZGVsQ3VybFJvb3QuY3JsMA0GCSqGSIb3 -DQEBCwUAA4IBAQAS/QwPK9jgReOz9EPe6bxczm1W2yowzdNGXcFrAPv8nNgLfRj4 -75qEPkSUDq74X2ntGqwLwa9+Y4Msy3OBzvOIHItZOEIVumQI/1Wp2VkbOsWQsv4Z -piJz9ajCWEVayBMvzTl/Z4YXJp5WGea5cjmkIamZnI1xFTPHJZC132WdNSITpLLh -VgD9W8plWA1GE/7XusQ6ViR5z+j6JiW590gx6MP9MNep06PPbMoD1bRUzQWmZ6TK -+yUpDgDozDeGkUvkivTrFUzW1vWHYQDr3anYCVbK5BwceQRu/Z0AVGrheBTAosrB -BzmCV55j2bjUIJYl2ln+2jrU/uR08RlWYwFG ------END CERTIFICATE----- diff --git a/tests/certs/test-ca.crt b/tests/certs/test-ca.crt deleted file mode 100644 index d95dc13aae..0000000000 --- a/tests/certs/test-ca.crt +++ /dev/null @@ -1,99 +0,0 @@ -Certificate: - Data: - Version: 3 (0x2) - Serial Number: - ed:c7:ef:5d:c1:2b:f1:2f - Signature Algorithm: sha256WithRSAEncryption - Issuer: - countryName = NN - organizationName = Edel Curl Arctic Illudium Research Cloud - commonName = Northern Nowhere Trust Anchor - Validity - Not Before: Mar 6 11:51:47 2025 GMT - Not After : Aug 9 11:51:47 2041 GMT - Subject: - countryName = NN - organizationName = Edel Curl Arctic Illudium Research Cloud - commonName = Northern Nowhere Trust Anchor - Subject Public Key Info: - Public Key Algorithm: rsaEncryption - RSA Public-Key: (2048 bit) - Modulus: - 00:cb:e8:c2:61:24:08:95:87:5d:dd:80:67:29:9a: - 0a:b0:55:28:1c:86:75:22:ec:8a:a3:ad:e8:3c:88: - 2c:bb:a2:5c:48:0a:9b:36:c3:b3:6b:1d:ef:1c:79: - 80:05:cb:81:45:93:4d:96:f8:a7:0c:93:84:71:1e: - 5a:27:83:16:84:be:0a:fc:08:eb:f6:60:7f:3e:8e: - 6d:39:8b:55:7a:c0:a2:7b:8c:a6:45:27:9e:6e:37: - ad:b5:40:8a:83:7c:d2:0d:b0:e2:3d:ed:f5:3d:26: - de:b7:7c:99:3c:56:98:bc:9d:49:bf:c8:ce:12:b5: - 40:1e:f7:4e:91:78:80:52:7a:83:84:9e:ec:0d:0e: - 18:40:cb:ec:95:76:85:ff:88:9a:8f:12:a4:ef:7e: - 7f:30:66:3a:cb:0e:b4:6a:d7:5c:8c:b3:e1:4c:57: - 47:45:ec:59:27:80:5b:11:37:1a:cd:41:d0:30:06: - b7:fa:45:0f:37:8b:39:24:c3:3d:55:ba:a9:ef:68: - 88:3e:c4:4c:a7:43:44:13:27:06:95:ba:89:74:59: - f8:a6:d0:8f:39:a2:d7:74:dd:9b:95:95:4b:8f:d7: - 70:dc:7b:68:cf:ee:9b:89:72:41:1b:2a:d2:b1:a3: - a4:eb:6a:94:c2:e4:d0:ab:93:83:37:d1:12:28:b3: - 19:6b - Exponent: 65537 (0x10001) - X509v3 extensions: - X509v3 Basic Constraints: critical - CA:TRUE - X509v3 Key Usage: critical - Certificate Sign, CRL Sign - X509v3 Subject Key Identifier: - 9D:2B:CE:95:BF:D8:22:91:A2:E5:AD:FE:79:0E:E9:23:E1:4D:28:32 - X509v3 Authority Key Identifier: - keyid:9D:2B:CE:95:BF:D8:22:91:A2:E5:AD:FE:79:0E:E9:23:E1:4D:28:32 - - Authority Information Access: - CA Issuers - URI:http://test.curl.se/ca/EdelCurlRoot.cer - - X509v3 CRL Distribution Points: - - Full Name: - URI:http://test.curl.se/ca/EdelCurlRoot.crl - - Signature Algorithm: sha256WithRSAEncryption - 12:fd:0c:0f:2b:d8:e0:45:e3:b3:f4:43:de:e9:bc:5c:ce:6d: - 56:db:2a:30:cd:d3:46:5d:c1:6b:00:fb:fc:9c:d8:0b:7d:18: - f8:ef:9a:84:3e:44:94:0e:ae:f8:5f:69:ed:1a:ac:0b:c1:af: - 7e:63:83:2c:cb:73:81:ce:f3:88:1c:8b:59:38:42:15:ba:64: - 08:ff:55:a9:d9:59:1b:3a:c5:90:b2:fe:19:a6:22:73:f5:a8: - c2:58:45:5a:c8:13:2f:cd:39:7f:67:86:17:26:9e:56:19:e6: - b9:72:39:a4:21:a9:99:9c:8d:71:15:33:c7:25:90:b5:df:65: - 9d:35:22:13:a4:b2:e1:56:00:fd:5b:ca:65:58:0d:46:13:fe: - d7:ba:c4:3a:56:24:79:cf:e8:fa:26:25:b9:f7:48:31:e8:c3: - fd:30:d7:a9:d3:a3:cf:6c:ca:03:d5:b4:54:cd:05:a6:67:a4: - ca:fb:25:29:0e:00:e8:cc:37:86:91:4b:e4:8a:f4:eb:15:4c: - d6:d6:f5:87:61:00:eb:dd:a9:d8:09:56:ca:e4:1c:1c:79:04: - 6e:fd:9d:00:54:6a:e1:78:14:c0:a2:ca:c1:07:39:82:57:9e: - 63:d9:b8:d4:20:96:25:da:59:fe:da:3a:d4:fe:e4:74:f1:19: - 56:63:01:46 ------BEGIN CERTIFICATE----- -MIIENzCCAx+gAwIBAgIJAO3H713BK/EvMA0GCSqGSIb3DQEBCwUAMGgxCzAJBgNV -BAYTAk5OMTEwLwYDVQQKDChFZGVsIEN1cmwgQXJjdGljIElsbHVkaXVtIFJlc2Vh -cmNoIENsb3VkMSYwJAYDVQQDDB1Ob3J0aGVybiBOb3doZXJlIFRydXN0IEFuY2hv -cjAeFw0yNTAzMDYxMTUxNDdaFw00MTA4MDkxMTUxNDdaMGgxCzAJBgNVBAYTAk5O -MTEwLwYDVQQKDChFZGVsIEN1cmwgQXJjdGljIElsbHVkaXVtIFJlc2VhcmNoIENs -b3VkMSYwJAYDVQQDDB1Ob3J0aGVybiBOb3doZXJlIFRydXN0IEFuY2hvcjCCASIw -DQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAMvowmEkCJWHXd2AZymaCrBVKByG -dSLsiqOt6DyILLuiXEgKmzbDs2sd7xx5gAXLgUWTTZb4pwyThHEeWieDFoS+CvwI -6/Zgfz6ObTmLVXrAonuMpkUnnm43rbVAioN80g2w4j3t9T0m3rd8mTxWmLydSb/I -zhK1QB73TpF4gFJ6g4Se7A0OGEDL7JV2hf+Imo8SpO9+fzBmOssOtGrXXIyz4UxX -R0XsWSeAWxE3Gs1B0DAGt/pFDzeLOSTDPVW6qe9oiD7ETKdDRBMnBpW6iXRZ+KbQ -jzmi13Tdm5WVS4/XcNx7aM/um4lyQRsq0rGjpOtqlMLk0KuTgzfREiizGWsCAwEA -AaOB4zCB4DAPBgNVHRMBAf8EBTADAQH/MA4GA1UdDwEB/wQEAwIBBjAdBgNVHQ4E -FgQUnSvOlb/YIpGi5a3+eQ7pI+FNKDIwHwYDVR0jBBgwFoAUnSvOlb/YIpGi5a3+ -eQ7pI+FNKDIwQwYIKwYBBQUHAQEENzA1MDMGCCsGAQUFBzAChidodHRwOi8vdGVz -dC5jdXJsLnNlL2NhL0VkZWxDdXJsUm9vdC5jZXIwOAYDVR0fBDEwLzAtoCugKYYn -aHR0cDovL3Rlc3QuY3VybC5zZS9jYS9FZGVsQ3VybFJvb3QuY3JsMA0GCSqGSIb3 -DQEBCwUAA4IBAQAS/QwPK9jgReOz9EPe6bxczm1W2yowzdNGXcFrAPv8nNgLfRj4 -75qEPkSUDq74X2ntGqwLwa9+Y4Msy3OBzvOIHItZOEIVumQI/1Wp2VkbOsWQsv4Z -piJz9ajCWEVayBMvzTl/Z4YXJp5WGea5cjmkIamZnI1xFTPHJZC132WdNSITpLLh -VgD9W8plWA1GE/7XusQ6ViR5z+j6JiW590gx6MP9MNep06PPbMoD1bRUzQWmZ6TK -+yUpDgDozDeGkUvkivTrFUzW1vWHYQDr3anYCVbK5BwceQRu/Z0AVGrheBTAosrB -BzmCV55j2bjUIJYl2ln+2jrU/uR08RlWYwFG ------END CERTIFICATE----- diff --git a/tests/certs/test-ca.key b/tests/certs/test-ca.key deleted file mode 100644 index 0a2fe65332..0000000000 --- a/tests/certs/test-ca.key +++ /dev/null @@ -1,27 +0,0 @@ ------BEGIN RSA PRIVATE KEY----- -MIIEowIBAAKCAQEAy+jCYSQIlYdd3YBnKZoKsFUoHIZ1IuyKo63oPIgsu6JcSAqb -NsOzax3vHHmABcuBRZNNlvinDJOEcR5aJ4MWhL4K/Ajr9mB/Po5tOYtVesCie4ym -RSeebjettUCKg3zSDbDiPe31PSbet3yZPFaYvJ1Jv8jOErVAHvdOkXiAUnqDhJ7s -DQ4YQMvslXaF/4iajxKk735/MGY6yw60atdcjLPhTFdHRexZJ4BbETcazUHQMAa3 -+kUPN4s5JMM9Vbqp72iIPsRMp0NEEycGlbqJdFn4ptCPOaLXdN2blZVLj9dw3Hto -z+6biXJBGyrSsaOk62qUwuTQq5ODN9ESKLMZawIDAQABAoIBACGH+BbzTvoP1Y6s -I8rCiwluJ3dxYOfKUA4UdgEmP3zneRdbryR1UBbISF69WCEb0vk2/OZbo1S9GWVk -oVyoANb5TWMesHbGbYZC85En6XmTHeUFPv5WQoZLX6RTpbNznjMkKEAY1mAk+TDh -K22xq9IwZ0VDZyfKaG3vKxte3nMxaMyT3Gaa8KZGrHI8OgDhd9ty9pzwKkQJslFm -gObVtGpVNWnKLaHBRre4KcAj8dFxo+alu3a+rIzfUf1fFBLC5LB+m0n2xjoWyyxU -ahKY2YNv8dgOMlxK62TXJT0VtSZSeBOSU+Wyz+KCZHJKS0pMM/QyijwLTPxgpAtk -DGwqE8ECgYEA/YNVqFGw8xPTx5pkYl+3Wb84MwdyKc4/fgyOO2tCl6wgvt1EGWvd -fr3v9m+K2zLwxhIQ1WalUE+zghgT4no4NDc1u3XNoduwyua8RAnu+g0UkyP+U4+Q -ZoIBgdytTL7NkIRIipPY9hGAC+qK2cu1NvURbIRkUx0R1Y89ASnyu2ECgYEAzejZ -4ZeCsdfr2KkOGGLOH7NODjxbgHHy5Z97pLK+zuaR25k/nQYBccxupp0eiAU5RuvS -6oXkCEUIpvOTOCHrCg5M+3jvD67UOA9gFa+SKswSyw+EVTZbtPaBT0hiKHsax6mw -qOHHE7pzmTP6/CNxedqLRLxEpxY5Q+dVw2iWtEsCgYAg3lNPxG+txGdT3MehHYnX -H/y4WQHLO8ttm1EhkRGMOqvwMx3uMdcA5L1k9SdKrjsbYyI9mNZcKEk818RUO8Zn -trTHvklP7/znAa1tIOCUGPgO7768tMNjFv39CVCKv75FO3FwTiT2GmTApsMj4851 -9qYwrKWZRQ6X4r9lFDw9YQKBgCoEMrmKzht2IOUUEhE90Cu9zdav0EgUeGkMsxE3 -fCICAI9b5RQojpDnE0kiVIGS904WfvJmIdLiK1LN7yOMIEbsBh9mXPnJRfqugH/M -VLow7EDNSMaOkgYKKva/oW/7Nsq5QJglghbve/kuFy/uF5Cy3KpI9IVXzpWhlemK -5P2jAoGBAKEspNFmBoktf0xcFjjL60aZVIFsUptajwc/Zolp89B8RznqOa4PY4Yy -VOmCYJKOlc8z9H3guhE15mT3h4rVfITJQZtN+fbvSo6ZIWrJpTOXIxL817k9ABLC -F6axj6OPoQnvKSCGMG8HZUSAmsP9zuXB9q+rv9S6Vx7/pbKJAPwo ------END RSA PRIVATE KEY----- diff --git a/tests/certs/test-localhost-san-first.crl b/tests/certs/test-localhost-san-first.crl deleted file mode 100644 index 50bee8450f..0000000000 --- a/tests/certs/test-localhost-san-first.crl +++ /dev/null @@ -1,38 +0,0 @@ ------BEGIN X509 CRL----- -MIIGljCCBX4CAQEwDQYJKoZIhvcNAQELBQAwaDELMAkGA1UEBhMCTk4xMTAvBgNV -BAoMKEVkZWwgQ3VybCBBcmN0aWMgSWxsdWRpdW0gUmVzZWFyY2ggQ2xvdWQxJjAk -BgNVBAMMHU5vcnRoZXJuIE5vd2hlcmUgVHJ1c3QgQW5jaG9yFw0yNTAzMDYxMTUx -NDhaFw0yNTA0MDUxMTUxNDhaMIIE0DAaAgkAgTTILYHwU/cXDTI1MDMwNjEwMTkz -NFowGgIJAIE0yC2B8FP4Fw0yNTAzMDYxMDE5MzRaMBoCCQCBNMgtgfBT+RcNMjUw -MzA2MTAxOTM0WjAaAgkAgTTILYHwU/oXDTI1MDMwNjEwMTkzNVowGgIJAIE0yC2B -8FP7Fw0yNTAzMDYxMDE5MzVaMBoCCQCBNMgtgfBT/BcNMjUwMzA2MTAxOTM1WjAa -AgkAgTTILYHwU/0XDTI1MDMwNjEwNDMzOVowGgIJAIE0yC2B8FP+Fw0yNTAzMDYx -MDQzMzlaMBoCCQCBNMgtgfBT/xcNMjUwMzA2MTA0MzQwWjAaAgkAgTTILYHwVAAX -DTI1MDMwNjEwNDM0MFowGgIJAIE0yC2B8FQBFw0yNTAzMDYxMDQzNDBaMBoCCQCB -NMgtgfBUAhcNMjUwMzA2MTA0NjA4WjAaAgkAgTTILYHwVAMXDTI1MDMwNjEwNDYw -OFowGgIJAIE0yC2B8FQEFw0yNTAzMDYxMDQ2MDhaMBoCCQCBNMgtgfBUBRcNMjUw -MzA2MTA0NjA4WjAaAgkAgTTILYHwVAYXDTI1MDMwNjEwNDYwOVowGgIJAIE0yC2B -8FQHFw0yNTAzMDYxMDQ2MDlaMBoCCQCBNMgtgfBUCBcNMjUwMzA2MTA0ODU5WjAa -AgkAgTTILYHwVAkXDTI1MDMwNjEwNDg1OVowGgIJAIE0yC2B8FQKFw0yNTAzMDYx -MDQ4NTlaMBoCCQCBNMgtgfBUCxcNMjUwMzA2MTA0ODU5WjAaAgkAgTTILYHwVAwX -DTI1MDMwNjEwNDkwMFowGgIJAIE0yC2B8FQNFw0yNTAzMDYxMDQ5MDBaMBoCCQCB -NMgtgfBUDhcNMjUwMzA2MTExMzM4WjAaAgkAgTTILYHwVA8XDTI1MDMwNjExMTMz -OFowGgIJAIE0yC2B8FQQFw0yNTAzMDYxMTEzMzhaMBoCCQCBNMgtgfBUERcNMjUw -MzA2MTExMzM4WjAaAgkAgTTILYHwVBIXDTI1MDMwNjExMTMzOFowGgIJAIE0yC2B -8FQTFw0yNTAzMDYxMTE1MzBaMBoCCQCBNMgtgfBUFBcNMjUwMzA2MTExNTMwWjAa -AgkAgTTILYHwVBUXDTI1MDMwNjExMTUzMFowGgIJAIE0yC2B8FQWFw0yNTAzMDYx -MTE1MzBaMBoCCQCBNMgtgfBUFxcNMjUwMzA2MTExNTMwWjAaAgkAgTTILYHwVBgX -DTI1MDMwNjExMTUzMFowGgIJAIE0yC2B8FQZFw0yNTAzMDYxMTE5MDNaMBoCCQCB -NMgtgfBUGhcNMjUwMzA2MTExOTA0WjAaAgkAgTTILYHwVBsXDTI1MDMwNjExMTkw -NFowGgIJAIE0yC2B8FQcFw0yNTAzMDYxMTE5MDRaMBoCCQCBNMgtgfBUHRcNMjUw -MzA2MTExOTA0WjAaAgkAgTTILYHwVB4XDTI1MDMwNjExMTkwNFowGgIJAIE0yC2B -8FQfFw0yNTAzMDYxMTUxNDdaMBoCCQCBNMgtgfBUIBcNMjUwMzA2MTE1MTQ4WjAa -AgkAgTTILYHwVCEXDTI1MDMwNjExNTE0OFowGgIJAIE0yC2B8FQiFw0yNTAzMDYx -MTUxNDhaoA4wDDAKBgNVHRQEAwIBATANBgkqhkiG9w0BAQsFAAOCAQEAOdQrSZ52 -zX1CEvfAPHLbvjj7XFeF3OLNPd64+B81dqh9WuLix5xbKQjhpMNj0Qyypc3COvka -Uzz+H13LzJL4lC4Wt8lawZu0zLeUJ/4oEXxq1wAlwQ/V2ZcE8scVd2t3YRs3IWLi -u1Gpoq7RSiFv2Zh+EaF3o7VcEdhdKvckQ+lxrZgcEYt5HRz2+/yY8RAhPN1JDw++ -+M1PBgJPj11pKpz01mJ0hYH2lDFC3sTb4dxVGCUDTtg/Be21NF48+OoCBG++JPk1 -EZB/3U5+4UECgQCdBTO14xAt3S21dt2EMIN67bGi943rskxrvrS0V2WXAfMZi15g -jvjUTbJ/o2Q71w== ------END X509 CRL----- diff --git a/tests/certs/test-localhost-san-first.crt b/tests/certs/test-localhost-san-first.crt deleted file mode 100644 index 84ce9e4b5a..0000000000 --- a/tests/certs/test-localhost-san-first.crt +++ /dev/null @@ -1,104 +0,0 @@ -Certificate: - Data: - Version: 3 (0x2) - Serial Number: - 81:34:c8:2d:81:f0:54:22 - Signature Algorithm: sha256WithRSAEncryption - Issuer: - countryName = NN - organizationName = Edel Curl Arctic Illudium Research Cloud - commonName = Northern Nowhere Trust Anchor - Validity - Not Before: Mar 6 11:51:48 2025 GMT - Not After : Dec 31 11:51:48 2025 GMT - Subject: - countryName = NN - organizationName = Edel Curl Arctic Illudium Research Cloud - commonName = localhost.nn - Subject Public Key Info: - Public Key Algorithm: rsaEncryption - RSA Public-Key: (2048 bit) - Modulus: - 00:b5:4b:5e:a7:57:ac:05:72:11:73:eb:e1:c9:18: - 3c:44:cf:98:c1:00:26:4b:db:ad:1f:2c:32:e5:4b: - e8:e3:00:31:8c:24:84:42:f3:7a:53:7f:e8:c1:89: - 08:8a:9b:b6:cc:d2:68:17:21:4e:2d:03:ae:58:4e: - 71:ea:46:8d:a2:85:18:0e:33:11:6b:ed:82:b3:f0: - ef:d9:55:7c:22:f3:cf:e3:6a:e0:55:5c:34:c0:44: - 64:ca:bb:80:46:d6:0f:4a:c9:9d:60:fb:ff:d7:20: - 4f:ba:76:09:b0:ce:96:66:e4:7f:90:c1:c3:ae:d2: - b6:6b:f2:06:7d:d0:77:f2:8b:25:e9:01:dc:9e:e9: - 1f:97:cd:19:6e:ef:5d:b2:eb:61:aa:33:c3:0a:f0: - d0:58:c3:2a:57:85:a9:f7:37:ec:3a:a5:c5:56:46: - b4:df:71:3f:1d:c0:29:e1:0d:c5:17:cf:bb:bc:cc: - c9:86:d8:6e:93:4a:63:8e:46:d1:03:d1:18:23:f6: - f5:32:88:b3:e1:c0:4f:30:16:15:b7:e7:64:99:e1: - 59:54:2d:1d:ac:7f:74:3f:9b:da:c5:4d:3f:3b:2a: - 92:36:e4:3e:af:0a:d8:51:d2:17:a4:7f:d0:96:8e: - 79:27:85:db:75:dd:36:7b:ac:0a:d3:b0:25:db:a0: - 4a:b5 - Exponent: 65537 (0x10001) - X509v3 extensions: - X509v3 Subject Alternative Name: - DNS:localhost, DNS:localhost1, DNS:localhost2 - X509v3 Key Usage: - Digital Signature, Key Encipherment, Key Agreement - X509v3 Extended Key Usage: - TLS Web Server Authentication - X509v3 Subject Key Identifier: - BD:FE:8D:9C:5D:FF:AC:9B:EC:06:1C:24:60:6A:DA:C1:58:54:40:40 - X509v3 Authority Key Identifier: - keyid:9D:2B:CE:95:BF:D8:22:91:A2:E5:AD:FE:79:0E:E9:23:E1:4D:28:32 - - X509v3 Basic Constraints: - CA:FALSE - Authority Information Access: - CA Issuers - URI:http://test.curl.se/ca/EdelCurlRoot.cer - - X509v3 CRL Distribution Points: - - Full Name: - URI:http://test.curl.se/ca/EdelCurlRoot.crl - - Signature Algorithm: sha256WithRSAEncryption - 01:5f:58:90:09:4c:e5:f2:f6:0c:73:ac:43:75:34:79:7c:5a: - 2b:e6:43:33:40:1b:5e:97:75:09:44:98:dd:8b:61:d2:8a:d2: - be:d8:04:10:5c:eb:82:11:23:8f:dd:53:51:fa:dc:07:6a:d3: - f2:8b:9b:63:1b:22:6b:07:b6:02:7c:dd:e7:ea:33:34:da:ea: - 48:22:ee:c8:bb:26:d3:b8:7e:f7:6b:46:07:ea:6a:1a:20:94: - 7a:3f:2a:a1:5a:c5:e7:95:58:b9:9c:95:9f:db:2f:1d:ab:fe: - 1b:d8:97:88:29:28:05:86:15:57:cc:52:25:26:8c:84:48:ea: - 33:d7:3c:32:4c:58:96:34:2e:3c:27:2d:72:24:c3:96:93:42: - 48:c4:9f:c5:b3:29:56:30:e2:e0:d1:53:e2:f5:07:71:b1:74: - 6d:bc:8c:c8:30:ca:90:74:8a:61:49:13:99:7b:77:1d:d0:91: - 7f:ad:11:73:ab:ce:0b:8d:67:65:38:7e:a7:5f:f1:76:14:4e: - 90:9b:04:ec:e9:27:45:45:b5:45:02:2c:3b:e4:37:46:5e:93: - fc:b5:19:c7:4f:a3:cb:df:25:7d:6f:7e:31:93:3c:4a:9f:71: - 19:9b:ef:d5:01:6c:48:40:7f:91:16:82:c8:71:29:2e:2a:4e: - a0:0e:99:b3 ------BEGIN CERTIFICATE----- -MIIEYjCCA0qgAwIBAgIJAIE0yC2B8FQiMA0GCSqGSIb3DQEBCwUAMGgxCzAJBgNV -BAYTAk5OMTEwLwYDVQQKDChFZGVsIEN1cmwgQXJjdGljIElsbHVkaXVtIFJlc2Vh -cmNoIENsb3VkMSYwJAYDVQQDDB1Ob3J0aGVybiBOb3doZXJlIFRydXN0IEFuY2hv -cjAeFw0yNTAzMDYxMTUxNDhaFw0yNTEyMzExMTUxNDhaMFcxCzAJBgNVBAYTAk5O -MTEwLwYDVQQKDChFZGVsIEN1cmwgQXJjdGljIElsbHVkaXVtIFJlc2VhcmNoIENs -b3VkMRUwEwYDVQQDDAxsb2NhbGhvc3Qubm4wggEiMA0GCSqGSIb3DQEBAQUAA4IB -DwAwggEKAoIBAQC1S16nV6wFchFz6+HJGDxEz5jBACZL260fLDLlS+jjADGMJIRC -83pTf+jBiQiKm7bM0mgXIU4tA65YTnHqRo2ihRgOMxFr7YKz8O/ZVXwi88/jauBV -XDTARGTKu4BG1g9KyZ1g+//XIE+6dgmwzpZm5H+QwcOu0rZr8gZ90HfyiyXpAdye -6R+XzRlu712y62GqM8MK8NBYwypXhan3N+w6pcVWRrTfcT8dwCnhDcUXz7u8zMmG -2G6TSmOORtED0Rgj9vUyiLPhwE8wFhW352SZ4VlULR2sf3Q/m9rFTT87KpI25D6v -CthR0hekf9CWjnknhdt13TZ7rArTsCXboEq1AgMBAAGjggEeMIIBGjAsBgNVHREE -JTAjgglsb2NhbGhvc3SCCmxvY2FsaG9zdDGCCmxvY2FsaG9zdDIwCwYDVR0PBAQD -AgOoMBMGA1UdJQQMMAoGCCsGAQUFBwMBMB0GA1UdDgQWBBS9/o2cXf+sm+wGHCRg -atrBWFRAQDAfBgNVHSMEGDAWgBSdK86Vv9gikaLlrf55Dukj4U0oMjAJBgNVHRME -AjAAMEMGCCsGAQUFBwEBBDcwNTAzBggrBgEFBQcwAoYnaHR0cDovL3Rlc3QuY3Vy -bC5zZS9jYS9FZGVsQ3VybFJvb3QuY2VyMDgGA1UdHwQxMC8wLaAroCmGJ2h0dHA6 -Ly90ZXN0LmN1cmwuc2UvY2EvRWRlbEN1cmxSb290LmNybDANBgkqhkiG9w0BAQsF -AAOCAQEAAV9YkAlM5fL2DHOsQ3U0eXxaK+ZDM0AbXpd1CUSY3Yth0orSvtgEEFzr -ghEjj91TUfrcB2rT8oubYxsiawe2Anzd5+ozNNrqSCLuyLsm07h+92tGB+pqGiCU -ej8qoVrF55VYuZyVn9svHav+G9iXiCkoBYYVV8xSJSaMhEjqM9c8MkxYljQuPCct -ciTDlpNCSMSfxbMpVjDi4NFT4vUHcbF0bbyMyDDKkHSKYUkTmXt3HdCRf60Rc6vO -C41nZTh+p1/xdhROkJsE7OknRUW1RQIsO+Q3Rl6T/LUZx0+jy98lfW9+MZM8Sp9x -GZvv1QFsSEB/kRaCyHEpLipOoA6Zsw== ------END CERTIFICATE----- diff --git a/tests/certs/test-localhost-san-first.key b/tests/certs/test-localhost-san-first.key deleted file mode 100644 index 7e17bb1968..0000000000 --- a/tests/certs/test-localhost-san-first.key +++ /dev/null @@ -1,27 +0,0 @@ ------BEGIN RSA PRIVATE KEY----- -MIIEpAIBAAKCAQEAtUtep1esBXIRc+vhyRg8RM+YwQAmS9utHywy5Uvo4wAxjCSE -QvN6U3/owYkIipu2zNJoFyFOLQOuWE5x6kaNooUYDjMRa+2Cs/Dv2VV8IvPP42rg -VVw0wERkyruARtYPSsmdYPv/1yBPunYJsM6WZuR/kMHDrtK2a/IGfdB38osl6QHc -nukfl80Zbu9dsuthqjPDCvDQWMMqV4Wp9zfsOqXFVka033E/HcAp4Q3FF8+7vMzJ -hthuk0pjjkbRA9EYI/b1Moiz4cBPMBYVt+dkmeFZVC0drH90P5vaxU0/OyqSNuQ+ -rwrYUdIXpH/Qlo55J4Xbdd02e6wK07Al26BKtQIDAQABAoIBAQCmYwn4I6qpRMtn -zLFoUmnd7XmQiIadUHxPA82iTEztKZxPtqP8nmFCiT4hgZbpP4hB60nFELgi8CHu -wfAix6Xt5qDxR0VR/KXcZ+B5Ys+PdJzzZ3+EWB/B5gNrXTKZ0JQwW2GpRR7FXc5O -n069ipzWyheZz3u8037BC1uR1OaBHk/qift96QxENFSl6UXMNJwJndVZmnVzTsXK -sPMtjWiXD36EZkaMB7kFZGYWLYqS+csA2jboPBLqcxuQ/rRjtocuchFrSzhdyR/9 -DZyo1aPdhTDaelt0Zfa1dZB2YEVpsUcgDF7oIIJwVKOlurylarMjQ45ZS4i89Gp5 -RaSQByaBAoGBAOWVvcunQIiagHUJkc3sHI1idI9LLi3Me/MfYHrNfaYy0rbJ2JxU -sZdzcQ9Of9djb1M5Xu68RiTK+f6S3T90wba0LYAASwl7qGC1xpofRh/FlLzfjHgG -VEVC6Rlm6Mjh2y4V4SP5J9XeiZDrGjtbXX3ZGH8YcO14SHGk4NvPhYrdAoGBAMon -RBvUYZIUvWSYT+i5ZjYpo6kemwXG+nJfsux3ehB8aLbJbRQw3aGDvfh+wZy7qV4Z -nZfFkg2xERaQ5XfgFclePwfgAk1SFUkBdmky+52mjKo2ggLuvSPN6c4RwuHM3LWe -05wln0ZF5kKMHjjwl42OlOtVonutNItrc3wB8SW5AoGAJ3LkauLxPse1fObJC+Yf -PdgGCT000R/KyIrCrDc0+OLQvCHQu4P+A/UNH0EwzFTEozs/aawmLVpHPIwFwkqQ -opExJEZonleGJh/14TOwe/MaTJ3o6BLGViRaI0hAhYvxemi+B81fH+ueHa2YE0zu -spokEGqltNgvMn/PN1XgL20CgYEAsf3w0jAl2OG6AKC7e0YC4R24pGf2Rxfz3FC2 -0c5BA9MGwCqKiISeIGBHHE0/XCk/70LOp5umBbgqO5xI70u24x7AkMaEQGBNrYJE -KExjj2Pd5uEniD18+9GKU47/8KDYlHHMEGhv3QgevelxkuEED/fC15MHBa5z3W42 -uLFdCsECgYAnBY8y5gk5tegAajqOsm4qbHHqHtUxEaXONNHRYWDBndwLvnLjYjrt -eKq+q3Jh2mXTk7vbgVj8gfq6lF5a5vE654gyeQ8pDVieKJoNow/omA5gwi0Rhwgy -is0Ct82M+GaSaNBySglIhIjU744NpCIANdlBulioWs17/0gN/253fQ== ------END RSA PRIVATE KEY----- diff --git a/tests/certs/test-localhost-san-first.pem b/tests/certs/test-localhost-san-first.pem deleted file mode 100644 index 38a93eadec..0000000000 --- a/tests/certs/test-localhost-san-first.pem +++ /dev/null @@ -1,166 +0,0 @@ -extensions = x509v3 - -[ x509v3 ] -subjectAltName = DNS:localhost,DNS:localhost1,DNS:localhost2 -keyUsage = keyEncipherment,digitalSignature,keyAgreement -extendedKeyUsage = serverAuth -subjectKeyIdentifier = hash -authorityKeyIdentifier = keyid -basicConstraints = CA:false -authorityInfoAccess = @issuer_info -crlDistributionPoints = @crl_info - -[ crl_ext ] -authorityKeyIdentifier = keyid:always -authorityInfoAccess = @issuer_info - -[ issuer_info ] -caIssuers;URI.0 = http://test.curl.se/ca/EdelCurlRoot.cer - -[ crl_info ] -URI.0 = http://test.curl.se/ca/EdelCurlRoot.crl - -[ req ] -default_bits = 1024 -distinguished_name = req_DN -default_md = sha256 -string_mask = utf8only - -[ req_DN ] -countryName = "Country Name is Northern Nowhere" -countryName_value = NN -organizationName = "Organization Name" -organizationName_value = Edel Curl Arctic Illudium Research Cloud -commonName = "Common Name" -commonName_value = localhost.nn ------BEGIN RSA PRIVATE KEY----- -MIIEpAIBAAKCAQEAtUtep1esBXIRc+vhyRg8RM+YwQAmS9utHywy5Uvo4wAxjCSE -QvN6U3/owYkIipu2zNJoFyFOLQOuWE5x6kaNooUYDjMRa+2Cs/Dv2VV8IvPP42rg -VVw0wERkyruARtYPSsmdYPv/1yBPunYJsM6WZuR/kMHDrtK2a/IGfdB38osl6QHc -nukfl80Zbu9dsuthqjPDCvDQWMMqV4Wp9zfsOqXFVka033E/HcAp4Q3FF8+7vMzJ -hthuk0pjjkbRA9EYI/b1Moiz4cBPMBYVt+dkmeFZVC0drH90P5vaxU0/OyqSNuQ+ -rwrYUdIXpH/Qlo55J4Xbdd02e6wK07Al26BKtQIDAQABAoIBAQCmYwn4I6qpRMtn -zLFoUmnd7XmQiIadUHxPA82iTEztKZxPtqP8nmFCiT4hgZbpP4hB60nFELgi8CHu -wfAix6Xt5qDxR0VR/KXcZ+B5Ys+PdJzzZ3+EWB/B5gNrXTKZ0JQwW2GpRR7FXc5O -n069ipzWyheZz3u8037BC1uR1OaBHk/qift96QxENFSl6UXMNJwJndVZmnVzTsXK -sPMtjWiXD36EZkaMB7kFZGYWLYqS+csA2jboPBLqcxuQ/rRjtocuchFrSzhdyR/9 -DZyo1aPdhTDaelt0Zfa1dZB2YEVpsUcgDF7oIIJwVKOlurylarMjQ45ZS4i89Gp5 -RaSQByaBAoGBAOWVvcunQIiagHUJkc3sHI1idI9LLi3Me/MfYHrNfaYy0rbJ2JxU -sZdzcQ9Of9djb1M5Xu68RiTK+f6S3T90wba0LYAASwl7qGC1xpofRh/FlLzfjHgG -VEVC6Rlm6Mjh2y4V4SP5J9XeiZDrGjtbXX3ZGH8YcO14SHGk4NvPhYrdAoGBAMon -RBvUYZIUvWSYT+i5ZjYpo6kemwXG+nJfsux3ehB8aLbJbRQw3aGDvfh+wZy7qV4Z -nZfFkg2xERaQ5XfgFclePwfgAk1SFUkBdmky+52mjKo2ggLuvSPN6c4RwuHM3LWe -05wln0ZF5kKMHjjwl42OlOtVonutNItrc3wB8SW5AoGAJ3LkauLxPse1fObJC+Yf -PdgGCT000R/KyIrCrDc0+OLQvCHQu4P+A/UNH0EwzFTEozs/aawmLVpHPIwFwkqQ -opExJEZonleGJh/14TOwe/MaTJ3o6BLGViRaI0hAhYvxemi+B81fH+ueHa2YE0zu -spokEGqltNgvMn/PN1XgL20CgYEAsf3w0jAl2OG6AKC7e0YC4R24pGf2Rxfz3FC2 -0c5BA9MGwCqKiISeIGBHHE0/XCk/70LOp5umBbgqO5xI70u24x7AkMaEQGBNrYJE -KExjj2Pd5uEniD18+9GKU47/8KDYlHHMEGhv3QgevelxkuEED/fC15MHBa5z3W42 -uLFdCsECgYAnBY8y5gk5tegAajqOsm4qbHHqHtUxEaXONNHRYWDBndwLvnLjYjrt -eKq+q3Jh2mXTk7vbgVj8gfq6lF5a5vE654gyeQ8pDVieKJoNow/omA5gwi0Rhwgy -is0Ct82M+GaSaNBySglIhIjU744NpCIANdlBulioWs17/0gN/253fQ== ------END RSA PRIVATE KEY----- -Certificate: - Data: - Version: 3 (0x2) - Serial Number: - 81:34:c8:2d:81:f0:54:22 - Signature Algorithm: sha256WithRSAEncryption - Issuer: - countryName = NN - organizationName = Edel Curl Arctic Illudium Research Cloud - commonName = Northern Nowhere Trust Anchor - Validity - Not Before: Mar 6 11:51:48 2025 GMT - Not After : Dec 31 11:51:48 2025 GMT - Subject: - countryName = NN - organizationName = Edel Curl Arctic Illudium Research Cloud - commonName = localhost.nn - Subject Public Key Info: - Public Key Algorithm: rsaEncryption - RSA Public-Key: (2048 bit) - Modulus: - 00:b5:4b:5e:a7:57:ac:05:72:11:73:eb:e1:c9:18: - 3c:44:cf:98:c1:00:26:4b:db:ad:1f:2c:32:e5:4b: - e8:e3:00:31:8c:24:84:42:f3:7a:53:7f:e8:c1:89: - 08:8a:9b:b6:cc:d2:68:17:21:4e:2d:03:ae:58:4e: - 71:ea:46:8d:a2:85:18:0e:33:11:6b:ed:82:b3:f0: - ef:d9:55:7c:22:f3:cf:e3:6a:e0:55:5c:34:c0:44: - 64:ca:bb:80:46:d6:0f:4a:c9:9d:60:fb:ff:d7:20: - 4f:ba:76:09:b0:ce:96:66:e4:7f:90:c1:c3:ae:d2: - b6:6b:f2:06:7d:d0:77:f2:8b:25:e9:01:dc:9e:e9: - 1f:97:cd:19:6e:ef:5d:b2:eb:61:aa:33:c3:0a:f0: - d0:58:c3:2a:57:85:a9:f7:37:ec:3a:a5:c5:56:46: - b4:df:71:3f:1d:c0:29:e1:0d:c5:17:cf:bb:bc:cc: - c9:86:d8:6e:93:4a:63:8e:46:d1:03:d1:18:23:f6: - f5:32:88:b3:e1:c0:4f:30:16:15:b7:e7:64:99:e1: - 59:54:2d:1d:ac:7f:74:3f:9b:da:c5:4d:3f:3b:2a: - 92:36:e4:3e:af:0a:d8:51:d2:17:a4:7f:d0:96:8e: - 79:27:85:db:75:dd:36:7b:ac:0a:d3:b0:25:db:a0: - 4a:b5 - Exponent: 65537 (0x10001) - X509v3 extensions: - X509v3 Subject Alternative Name: - DNS:localhost, DNS:localhost1, DNS:localhost2 - X509v3 Key Usage: - Digital Signature, Key Encipherment, Key Agreement - X509v3 Extended Key Usage: - TLS Web Server Authentication - X509v3 Subject Key Identifier: - BD:FE:8D:9C:5D:FF:AC:9B:EC:06:1C:24:60:6A:DA:C1:58:54:40:40 - X509v3 Authority Key Identifier: - keyid:9D:2B:CE:95:BF:D8:22:91:A2:E5:AD:FE:79:0E:E9:23:E1:4D:28:32 - - X509v3 Basic Constraints: - CA:FALSE - Authority Information Access: - CA Issuers - URI:http://test.curl.se/ca/EdelCurlRoot.cer - - X509v3 CRL Distribution Points: - - Full Name: - URI:http://test.curl.se/ca/EdelCurlRoot.crl - - Signature Algorithm: sha256WithRSAEncryption - 01:5f:58:90:09:4c:e5:f2:f6:0c:73:ac:43:75:34:79:7c:5a: - 2b:e6:43:33:40:1b:5e:97:75:09:44:98:dd:8b:61:d2:8a:d2: - be:d8:04:10:5c:eb:82:11:23:8f:dd:53:51:fa:dc:07:6a:d3: - f2:8b:9b:63:1b:22:6b:07:b6:02:7c:dd:e7:ea:33:34:da:ea: - 48:22:ee:c8:bb:26:d3:b8:7e:f7:6b:46:07:ea:6a:1a:20:94: - 7a:3f:2a:a1:5a:c5:e7:95:58:b9:9c:95:9f:db:2f:1d:ab:fe: - 1b:d8:97:88:29:28:05:86:15:57:cc:52:25:26:8c:84:48:ea: - 33:d7:3c:32:4c:58:96:34:2e:3c:27:2d:72:24:c3:96:93:42: - 48:c4:9f:c5:b3:29:56:30:e2:e0:d1:53:e2:f5:07:71:b1:74: - 6d:bc:8c:c8:30:ca:90:74:8a:61:49:13:99:7b:77:1d:d0:91: - 7f:ad:11:73:ab:ce:0b:8d:67:65:38:7e:a7:5f:f1:76:14:4e: - 90:9b:04:ec:e9:27:45:45:b5:45:02:2c:3b:e4:37:46:5e:93: - fc:b5:19:c7:4f:a3:cb:df:25:7d:6f:7e:31:93:3c:4a:9f:71: - 19:9b:ef:d5:01:6c:48:40:7f:91:16:82:c8:71:29:2e:2a:4e: - a0:0e:99:b3 ------BEGIN CERTIFICATE----- -MIIEYjCCA0qgAwIBAgIJAIE0yC2B8FQiMA0GCSqGSIb3DQEBCwUAMGgxCzAJBgNV -BAYTAk5OMTEwLwYDVQQKDChFZGVsIEN1cmwgQXJjdGljIElsbHVkaXVtIFJlc2Vh -cmNoIENsb3VkMSYwJAYDVQQDDB1Ob3J0aGVybiBOb3doZXJlIFRydXN0IEFuY2hv -cjAeFw0yNTAzMDYxMTUxNDhaFw0yNTEyMzExMTUxNDhaMFcxCzAJBgNVBAYTAk5O -MTEwLwYDVQQKDChFZGVsIEN1cmwgQXJjdGljIElsbHVkaXVtIFJlc2VhcmNoIENs -b3VkMRUwEwYDVQQDDAxsb2NhbGhvc3Qubm4wggEiMA0GCSqGSIb3DQEBAQUAA4IB -DwAwggEKAoIBAQC1S16nV6wFchFz6+HJGDxEz5jBACZL260fLDLlS+jjADGMJIRC -83pTf+jBiQiKm7bM0mgXIU4tA65YTnHqRo2ihRgOMxFr7YKz8O/ZVXwi88/jauBV -XDTARGTKu4BG1g9KyZ1g+//XIE+6dgmwzpZm5H+QwcOu0rZr8gZ90HfyiyXpAdye -6R+XzRlu712y62GqM8MK8NBYwypXhan3N+w6pcVWRrTfcT8dwCnhDcUXz7u8zMmG -2G6TSmOORtED0Rgj9vUyiLPhwE8wFhW352SZ4VlULR2sf3Q/m9rFTT87KpI25D6v -CthR0hekf9CWjnknhdt13TZ7rArTsCXboEq1AgMBAAGjggEeMIIBGjAsBgNVHREE -JTAjgglsb2NhbGhvc3SCCmxvY2FsaG9zdDGCCmxvY2FsaG9zdDIwCwYDVR0PBAQD -AgOoMBMGA1UdJQQMMAoGCCsGAQUFBwMBMB0GA1UdDgQWBBS9/o2cXf+sm+wGHCRg -atrBWFRAQDAfBgNVHSMEGDAWgBSdK86Vv9gikaLlrf55Dukj4U0oMjAJBgNVHRME -AjAAMEMGCCsGAQUFBwEBBDcwNTAzBggrBgEFBQcwAoYnaHR0cDovL3Rlc3QuY3Vy -bC5zZS9jYS9FZGVsQ3VybFJvb3QuY2VyMDgGA1UdHwQxMC8wLaAroCmGJ2h0dHA6 -Ly90ZXN0LmN1cmwuc2UvY2EvRWRlbEN1cmxSb290LmNybDANBgkqhkiG9w0BAQsF -AAOCAQEAAV9YkAlM5fL2DHOsQ3U0eXxaK+ZDM0AbXpd1CUSY3Yth0orSvtgEEFzr -ghEjj91TUfrcB2rT8oubYxsiawe2Anzd5+ozNNrqSCLuyLsm07h+92tGB+pqGiCU -ej8qoVrF55VYuZyVn9svHav+G9iXiCkoBYYVV8xSJSaMhEjqM9c8MkxYljQuPCct -ciTDlpNCSMSfxbMpVjDi4NFT4vUHcbF0bbyMyDDKkHSKYUkTmXt3HdCRf60Rc6vO -C41nZTh+p1/xdhROkJsE7OknRUW1RQIsO+Q3Rl6T/LUZx0+jy98lfW9+MZM8Sp9x -GZvv1QFsSEB/kRaCyHEpLipOoA6Zsw== ------END CERTIFICATE----- diff --git a/tests/certs/test-localhost-san-first.pub.der b/tests/certs/test-localhost-san-first.pub.der deleted file mode 100644 index ab42163549..0000000000 Binary files a/tests/certs/test-localhost-san-first.pub.der and /dev/null differ diff --git a/tests/certs/test-localhost-san-first.pub.pem b/tests/certs/test-localhost-san-first.pub.pem deleted file mode 100644 index 34968e42a3..0000000000 --- a/tests/certs/test-localhost-san-first.pub.pem +++ /dev/null @@ -1,9 +0,0 @@ ------BEGIN PUBLIC KEY----- -MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAtUtep1esBXIRc+vhyRg8 -RM+YwQAmS9utHywy5Uvo4wAxjCSEQvN6U3/owYkIipu2zNJoFyFOLQOuWE5x6kaN -ooUYDjMRa+2Cs/Dv2VV8IvPP42rgVVw0wERkyruARtYPSsmdYPv/1yBPunYJsM6W -ZuR/kMHDrtK2a/IGfdB38osl6QHcnukfl80Zbu9dsuthqjPDCvDQWMMqV4Wp9zfs -OqXFVka033E/HcAp4Q3FF8+7vMzJhthuk0pjjkbRA9EYI/b1Moiz4cBPMBYVt+dk -meFZVC0drH90P5vaxU0/OyqSNuQ+rwrYUdIXpH/Qlo55J4Xbdd02e6wK07Al26BK -tQIDAQAB ------END PUBLIC KEY----- diff --git a/tests/certs/test-localhost-san-last.crl b/tests/certs/test-localhost-san-last.crl deleted file mode 100644 index 6516d1bd9a..0000000000 --- a/tests/certs/test-localhost-san-last.crl +++ /dev/null @@ -1,38 +0,0 @@ ------BEGIN X509 CRL----- -MIIGsjCCBZoCAQEwDQYJKoZIhvcNAQELBQAwaDELMAkGA1UEBhMCTk4xMTAvBgNV -BAoMKEVkZWwgQ3VybCBBcmN0aWMgSWxsdWRpdW0gUmVzZWFyY2ggQ2xvdWQxJjAk -BgNVBAMMHU5vcnRoZXJuIE5vd2hlcmUgVHJ1c3QgQW5jaG9yFw0yNTAzMDYxMTUx -NDhaFw0yNTA0MDUxMTUxNDhaMIIE7DAaAgkAgTTILYHwU/cXDTI1MDMwNjEwMTkz -NFowGgIJAIE0yC2B8FP4Fw0yNTAzMDYxMDE5MzRaMBoCCQCBNMgtgfBT+RcNMjUw -MzA2MTAxOTM0WjAaAgkAgTTILYHwU/oXDTI1MDMwNjEwMTkzNVowGgIJAIE0yC2B -8FP7Fw0yNTAzMDYxMDE5MzVaMBoCCQCBNMgtgfBT/BcNMjUwMzA2MTAxOTM1WjAa -AgkAgTTILYHwU/0XDTI1MDMwNjEwNDMzOVowGgIJAIE0yC2B8FP+Fw0yNTAzMDYx -MDQzMzlaMBoCCQCBNMgtgfBT/xcNMjUwMzA2MTA0MzQwWjAaAgkAgTTILYHwVAAX -DTI1MDMwNjEwNDM0MFowGgIJAIE0yC2B8FQBFw0yNTAzMDYxMDQzNDBaMBoCCQCB -NMgtgfBUAhcNMjUwMzA2MTA0NjA4WjAaAgkAgTTILYHwVAMXDTI1MDMwNjEwNDYw -OFowGgIJAIE0yC2B8FQEFw0yNTAzMDYxMDQ2MDhaMBoCCQCBNMgtgfBUBRcNMjUw -MzA2MTA0NjA4WjAaAgkAgTTILYHwVAYXDTI1MDMwNjEwNDYwOVowGgIJAIE0yC2B -8FQHFw0yNTAzMDYxMDQ2MDlaMBoCCQCBNMgtgfBUCBcNMjUwMzA2MTA0ODU5WjAa -AgkAgTTILYHwVAkXDTI1MDMwNjEwNDg1OVowGgIJAIE0yC2B8FQKFw0yNTAzMDYx -MDQ4NTlaMBoCCQCBNMgtgfBUCxcNMjUwMzA2MTA0ODU5WjAaAgkAgTTILYHwVAwX -DTI1MDMwNjEwNDkwMFowGgIJAIE0yC2B8FQNFw0yNTAzMDYxMDQ5MDBaMBoCCQCB -NMgtgfBUDhcNMjUwMzA2MTExMzM4WjAaAgkAgTTILYHwVA8XDTI1MDMwNjExMTMz -OFowGgIJAIE0yC2B8FQQFw0yNTAzMDYxMTEzMzhaMBoCCQCBNMgtgfBUERcNMjUw -MzA2MTExMzM4WjAaAgkAgTTILYHwVBIXDTI1MDMwNjExMTMzOFowGgIJAIE0yC2B -8FQTFw0yNTAzMDYxMTE1MzBaMBoCCQCBNMgtgfBUFBcNMjUwMzA2MTExNTMwWjAa -AgkAgTTILYHwVBUXDTI1MDMwNjExMTUzMFowGgIJAIE0yC2B8FQWFw0yNTAzMDYx -MTE1MzBaMBoCCQCBNMgtgfBUFxcNMjUwMzA2MTExNTMwWjAaAgkAgTTILYHwVBgX -DTI1MDMwNjExMTUzMFowGgIJAIE0yC2B8FQZFw0yNTAzMDYxMTE5MDNaMBoCCQCB -NMgtgfBUGhcNMjUwMzA2MTExOTA0WjAaAgkAgTTILYHwVBsXDTI1MDMwNjExMTkw -NFowGgIJAIE0yC2B8FQcFw0yNTAzMDYxMTE5MDRaMBoCCQCBNMgtgfBUHRcNMjUw -MzA2MTExOTA0WjAaAgkAgTTILYHwVB4XDTI1MDMwNjExMTkwNFowGgIJAIE0yC2B -8FQfFw0yNTAzMDYxMTUxNDdaMBoCCQCBNMgtgfBUIBcNMjUwMzA2MTE1MTQ4WjAa -AgkAgTTILYHwVCEXDTI1MDMwNjExNTE0OFowGgIJAIE0yC2B8FQiFw0yNTAzMDYx -MTUxNDhaMBoCCQCBNMgtgfBUIxcNMjUwMzA2MTE1MTQ4WqAOMAwwCgYDVR0UBAMC -AQEwDQYJKoZIhvcNAQELBQADggEBAFK6ak0zPfAUcLzWQzecy/frPTjPuNTzaEsO -AOEbQbvJuCfgjCwFpvD4KaSz3pRUs0/TCaOh3lit09sGrGp50k1NWu7DOGc4bDL9 -dYUjhv0x9oozbrFRtfazme1QtG8wpLWnYtxDCTRwDllRyiHsZ8dEL11EKc26tt6D -dHpnaF5uSMfCJiSsLfDHVabPLFfnU3rqvh02Z8OrOeVaC7T370pjh5xzBHaCqEA3 -zvOeP0XPIDNJ9/KR0+moPIWORbrrcM3VNNsearXej9urthnhziynFRh+QQg1tVzK -zzrTTrcsKkuR0JMisOLGoqWY6UaAMrp03t4NkSgFoVXH7xBI3Gs= ------END X509 CRL----- diff --git a/tests/certs/test-localhost-san-last.crt b/tests/certs/test-localhost-san-last.crt deleted file mode 100644 index b913b0befc..0000000000 --- a/tests/certs/test-localhost-san-last.crt +++ /dev/null @@ -1,104 +0,0 @@ -Certificate: - Data: - Version: 3 (0x2) - Serial Number: - 81:34:c8:2d:81:f0:54:23 - Signature Algorithm: sha256WithRSAEncryption - Issuer: - countryName = NN - organizationName = Edel Curl Arctic Illudium Research Cloud - commonName = Northern Nowhere Trust Anchor - Validity - Not Before: Mar 6 11:51:48 2025 GMT - Not After : Dec 31 11:51:48 2025 GMT - Subject: - countryName = NN - organizationName = Edel Curl Arctic Illudium Research Cloud - commonName = localhost.nn - Subject Public Key Info: - Public Key Algorithm: rsaEncryption - RSA Public-Key: (2048 bit) - Modulus: - 00:ca:6d:71:a2:7a:bb:12:f6:c0:c3:c9:bf:65:6f: - cb:a3:79:1f:dd:52:bd:8e:0e:72:ea:8d:07:c1:b5: - a6:73:c9:66:e5:00:e1:ed:32:88:d8:69:9d:91:08: - a3:af:20:9d:18:16:a9:e0:19:18:2f:74:47:e7:bc: - 43:83:f7:df:08:33:0a:a1:c4:af:4f:e5:f8:26:d6: - 96:10:61:47:e0:87:f7:24:69:17:7c:eb:b6:01:13: - 59:0b:61:10:46:25:04:e0:8c:50:88:35:26:64:ce: - e0:20:ea:2d:3b:fe:98:c8:fc:f1:94:7a:c7:d3:93: - 6f:89:34:b5:62:ad:d1:67:2b:b1:b3:a9:ca:5a:8d: - 64:ba:04:f5:67:50:5e:73:35:9a:4b:07:8f:f5:4a: - 86:36:9e:e4:1d:c3:e4:87:8c:00:43:d3:c6:0d:e7: - be:07:40:cd:ee:6e:b1:bb:1d:ca:93:c8:57:f4:a7: - d5:66:af:a5:8b:7c:bc:28:44:b0:1b:e9:6b:e5:fb: - 7d:ee:54:be:cc:93:df:ce:ab:5f:69:c2:cf:04:bf: - df:5c:b4:e2:b3:01:85:5b:f6:ac:11:6f:57:00:af: - 3e:b5:a4:d3:7a:08:96:4b:41:cc:68:09:4c:9e:37: - cf:0b:fc:52:cb:64:d5:96:b9:c2:1e:93:f2:da:0c: - 70:a9 - Exponent: 65537 (0x10001) - X509v3 extensions: - X509v3 Subject Alternative Name: - DNS:localhost1, DNS:localhost2, DNS:localhost - X509v3 Key Usage: - Digital Signature, Key Encipherment, Key Agreement - X509v3 Extended Key Usage: - TLS Web Server Authentication - X509v3 Subject Key Identifier: - D6:04:68:12:9C:5A:27:70:6B:D6:89:55:C1:6B:11:78:DD:74:D8:32 - X509v3 Authority Key Identifier: - keyid:9D:2B:CE:95:BF:D8:22:91:A2:E5:AD:FE:79:0E:E9:23:E1:4D:28:32 - - X509v3 Basic Constraints: - CA:FALSE - Authority Information Access: - CA Issuers - URI:http://test.curl.se/ca/EdelCurlRoot.cer - - X509v3 CRL Distribution Points: - - Full Name: - URI:http://test.curl.se/ca/EdelCurlRoot.crl - - Signature Algorithm: sha256WithRSAEncryption - 60:7a:35:3f:a7:9b:44:14:cf:8a:9d:38:46:3c:7a:93:43:19: - 9d:ed:f3:21:32:50:7a:f8:b4:e6:90:d1:5e:26:75:1c:fd:ed: - 64:b2:fe:5a:9c:96:f6:5b:2d:df:86:7d:4c:87:fa:8f:1d:13: - 67:f2:f5:91:aa:f9:1b:c3:f7:54:da:17:43:49:00:ad:9e:55: - 53:43:c1:30:4e:6b:9e:f6:99:26:b1:fa:35:85:d5:d1:70:88: - 30:87:8e:d3:91:b9:85:fa:b8:e2:31:06:9c:17:c8:2a:2f:9b: - e6:e8:5c:c7:6e:57:36:f5:c7:78:a2:9b:01:ef:8d:d5:38:ec: - 1f:f0:ee:7f:d4:0b:b8:82:1d:01:3a:65:46:47:ba:58:9f:d1: - 4d:95:18:17:e4:23:4a:76:54:c6:70:5d:fd:ac:f2:83:1d:ed: - 66:2b:a2:97:28:aa:e3:7f:bd:f2:02:8b:2f:43:fe:c1:74:36: - 8f:87:60:de:51:0b:44:0a:c4:98:b6:4d:94:e5:ec:ce:72:25: - 66:66:8e:1c:86:aa:30:5c:57:75:8a:28:eb:b3:51:93:84:45: - 6a:f7:ce:52:ac:1b:a8:0d:37:df:e4:60:a2:96:18:cf:29:66: - a9:e2:08:52:e6:2a:3a:29:8b:3a:28:b1:df:4d:d4:0c:b6:9b: - e2:40:b2:33 ------BEGIN CERTIFICATE----- -MIIEYjCCA0qgAwIBAgIJAIE0yC2B8FQjMA0GCSqGSIb3DQEBCwUAMGgxCzAJBgNV -BAYTAk5OMTEwLwYDVQQKDChFZGVsIEN1cmwgQXJjdGljIElsbHVkaXVtIFJlc2Vh -cmNoIENsb3VkMSYwJAYDVQQDDB1Ob3J0aGVybiBOb3doZXJlIFRydXN0IEFuY2hv -cjAeFw0yNTAzMDYxMTUxNDhaFw0yNTEyMzExMTUxNDhaMFcxCzAJBgNVBAYTAk5O -MTEwLwYDVQQKDChFZGVsIEN1cmwgQXJjdGljIElsbHVkaXVtIFJlc2VhcmNoIENs -b3VkMRUwEwYDVQQDDAxsb2NhbGhvc3Qubm4wggEiMA0GCSqGSIb3DQEBAQUAA4IB -DwAwggEKAoIBAQDKbXGiersS9sDDyb9lb8ujeR/dUr2ODnLqjQfBtaZzyWblAOHt -MojYaZ2RCKOvIJ0YFqngGRgvdEfnvEOD998IMwqhxK9P5fgm1pYQYUfgh/ckaRd8 -67YBE1kLYRBGJQTgjFCINSZkzuAg6i07/pjI/PGUesfTk2+JNLVirdFnK7Gzqcpa -jWS6BPVnUF5zNZpLB4/1SoY2nuQdw+SHjABD08YN574HQM3ubrG7HcqTyFf0p9Vm -r6WLfLwoRLAb6Wvl+33uVL7Mk9/Oq19pws8Ev99ctOKzAYVb9qwRb1cArz61pNN6 -CJZLQcxoCUyeN88L/FLLZNWWucIek/LaDHCpAgMBAAGjggEeMIIBGjAsBgNVHREE -JTAjggpsb2NhbGhvc3Qxggpsb2NhbGhvc3Qygglsb2NhbGhvc3QwCwYDVR0PBAQD -AgOoMBMGA1UdJQQMMAoGCCsGAQUFBwMBMB0GA1UdDgQWBBTWBGgSnFoncGvWiVXB -axF43XTYMjAfBgNVHSMEGDAWgBSdK86Vv9gikaLlrf55Dukj4U0oMjAJBgNVHRME -AjAAMEMGCCsGAQUFBwEBBDcwNTAzBggrBgEFBQcwAoYnaHR0cDovL3Rlc3QuY3Vy -bC5zZS9jYS9FZGVsQ3VybFJvb3QuY2VyMDgGA1UdHwQxMC8wLaAroCmGJ2h0dHA6 -Ly90ZXN0LmN1cmwuc2UvY2EvRWRlbEN1cmxSb290LmNybDANBgkqhkiG9w0BAQsF -AAOCAQEAYHo1P6ebRBTPip04Rjx6k0MZne3zITJQevi05pDRXiZ1HP3tZLL+WpyW -9lst34Z9TIf6jx0TZ/L1kar5G8P3VNoXQ0kArZ5VU0PBME5rnvaZJrH6NYXV0XCI -MIeO05G5hfq44jEGnBfIKi+b5uhcx25XNvXHeKKbAe+N1TjsH/Duf9QLuIIdATpl -Rke6WJ/RTZUYF+QjSnZUxnBd/azygx3tZiuilyiq43+98gKLL0P+wXQ2j4dg3lEL -RArEmLZNlOXsznIlZmaOHIaqMFxXdYoo67NRk4RFavfOUqwbqA033+RgopYYzylm -qeIIUuYqOimLOiix303UDLab4kCyMw== ------END CERTIFICATE----- diff --git a/tests/certs/test-localhost-san-last.key b/tests/certs/test-localhost-san-last.key deleted file mode 100644 index e20f0820bc..0000000000 --- a/tests/certs/test-localhost-san-last.key +++ /dev/null @@ -1,27 +0,0 @@ ------BEGIN RSA PRIVATE KEY----- -MIIEowIBAAKCAQEAym1xonq7EvbAw8m/ZW/Lo3kf3VK9jg5y6o0HwbWmc8lm5QDh -7TKI2GmdkQijryCdGBap4BkYL3RH57xDg/ffCDMKocSvT+X4JtaWEGFH4If3JGkX -fOu2ARNZC2EQRiUE4IxQiDUmZM7gIOotO/6YyPzxlHrH05NviTS1Yq3RZyuxs6nK -Wo1kugT1Z1BeczWaSweP9UqGNp7kHcPkh4wAQ9PGDee+B0DN7m6xux3Kk8hX9KfV -Zq+li3y8KESwG+lr5ft97lS+zJPfzqtfacLPBL/fXLTiswGFW/asEW9XAK8+taTT -egiWS0HMaAlMnjfPC/xSy2TVlrnCHpPy2gxwqQIDAQABAoIBAG6l+jpVGdLY3C9p -JNyeilJWEAvbgU+YKEp7QmUpFM4vpbXBkL0mJVUeDgnMDiTZD+Wt5bdgIC84QWGz -L7iAEgKaW9Jm/2kODGG2ZBqaAj8CMx5M75DSCw91cvPcX5fn/k17hT2ex9jMmAiF -2Kn1lbAvSyHdJ0NIUOxPymIhHthkOgVLDBePx17YY+TvNV5Q7VF89wH2ip7btCdP -Zkf831V8XBHTmb9QiA01txXZBUYyDfC1qiU6dg/R56zuMVBbyxqA7jJwanDhOdLP -prhJHo7Ic6yha6kPI1crPcJ9Uves4M2fcRYVh3NzSYGN16GKyRBTrbPh+9QRD5dA -fPrvnW0CgYEA4/TX009DWuAmiT+hR/b5pjORvIOnAsVyXDKmVrzCdQ9EgW+VbR6a -5vPEm4auN2CV9xKtzKVo2nVKHHfuaM3sdaa2dP7yXCwhQT/gfoP77MYJ9aKw754L -SCErdVsc59u3YAn6o5Sk9n1LiqGT1aGlKgsaEPrJsJXoWJoWshVHvX8CgYEA41Sa -4toCdk/0g22S0Kt7qjX1WrVlQEzcjqSXotlvnPQ7N5FsyBoE/NO7uozZM+rjgvGD -9TJMF//v+0MSZQPJstWgX4uC2f0HnRQH51Y3kvVC62JLaPEGW7aeq/LDrW5cfiDa -tlIB+V5cYl7STOR5A4arqNhu9EecChAZCEnvNdcCgYBQBX1WIncEibc9aubU+m/8 -1hGM2bJhGKrijq0xuaWRrkBgJ6mO2rWJ6XzVE9xIeFFsoFP+iPpb5dyUTc2VYORn -EJTwUScHED7ERwYpo29mWMbaQbhXBWX0diBpXAizo7+lqRshHWcjWCySh9H7pnjy -X19RIph2sskTgVQCQ9IhRQKBgEMofm1gHHQZYNHm8AWHc4wwTqCSkCvzyQC27Tkl -5UxH9qqO4sUmsqyCXKZa79vfm4DWmrY4OrSoXpwrD2caPF8Br1QqoeiGUNZ90Wvt -U5OtsyxYqJCDC+7SP4PqvxYgUWDNke9kwMKLtt00yAoBQSLiiRnjfrvZ3+Y1JUAG -n42XAoGBAL122wLSCLNuYjcZoQ+scTNmIOf9UV2tAudui/ALLPBL/NjGagisA+cQ -HlnpzuofsWz6SqBxdZEH6rajp0q5GJ5kj6E7odd3ArKqp7BY7UqoId9bpXgmigIL -Jhpje0SvYJ/9DDlHTjO1xGOG0WFlztb1x0iZxMFMXY/d/XZQQdzm ------END RSA PRIVATE KEY----- diff --git a/tests/certs/test-localhost-san-last.pem b/tests/certs/test-localhost-san-last.pem deleted file mode 100644 index 1c31ba6e45..0000000000 --- a/tests/certs/test-localhost-san-last.pem +++ /dev/null @@ -1,166 +0,0 @@ -extensions = x509v3 - -[ x509v3 ] -subjectAltName = DNS:localhost1,DNS:localhost2,DNS:localhost -keyUsage = keyEncipherment,digitalSignature,keyAgreement -extendedKeyUsage = serverAuth -subjectKeyIdentifier = hash -authorityKeyIdentifier = keyid -basicConstraints = CA:false -authorityInfoAccess = @issuer_info -crlDistributionPoints = @crl_info - -[ crl_ext ] -authorityKeyIdentifier = keyid:always -authorityInfoAccess = @issuer_info - -[ issuer_info ] -caIssuers;URI.0 = http://test.curl.se/ca/EdelCurlRoot.cer - -[ crl_info ] -URI.0 = http://test.curl.se/ca/EdelCurlRoot.crl - -[ req ] -default_bits = 1024 -distinguished_name = req_DN -default_md = sha256 -string_mask = utf8only - -[ req_DN ] -countryName = "Country Name is Northern Nowhere" -countryName_value = NN -organizationName = "Organization Name" -organizationName_value = Edel Curl Arctic Illudium Research Cloud -commonName = "Common Name" -commonName_value = localhost.nn ------BEGIN RSA PRIVATE KEY----- -MIIEowIBAAKCAQEAym1xonq7EvbAw8m/ZW/Lo3kf3VK9jg5y6o0HwbWmc8lm5QDh -7TKI2GmdkQijryCdGBap4BkYL3RH57xDg/ffCDMKocSvT+X4JtaWEGFH4If3JGkX -fOu2ARNZC2EQRiUE4IxQiDUmZM7gIOotO/6YyPzxlHrH05NviTS1Yq3RZyuxs6nK -Wo1kugT1Z1BeczWaSweP9UqGNp7kHcPkh4wAQ9PGDee+B0DN7m6xux3Kk8hX9KfV -Zq+li3y8KESwG+lr5ft97lS+zJPfzqtfacLPBL/fXLTiswGFW/asEW9XAK8+taTT -egiWS0HMaAlMnjfPC/xSy2TVlrnCHpPy2gxwqQIDAQABAoIBAG6l+jpVGdLY3C9p -JNyeilJWEAvbgU+YKEp7QmUpFM4vpbXBkL0mJVUeDgnMDiTZD+Wt5bdgIC84QWGz -L7iAEgKaW9Jm/2kODGG2ZBqaAj8CMx5M75DSCw91cvPcX5fn/k17hT2ex9jMmAiF -2Kn1lbAvSyHdJ0NIUOxPymIhHthkOgVLDBePx17YY+TvNV5Q7VF89wH2ip7btCdP -Zkf831V8XBHTmb9QiA01txXZBUYyDfC1qiU6dg/R56zuMVBbyxqA7jJwanDhOdLP -prhJHo7Ic6yha6kPI1crPcJ9Uves4M2fcRYVh3NzSYGN16GKyRBTrbPh+9QRD5dA -fPrvnW0CgYEA4/TX009DWuAmiT+hR/b5pjORvIOnAsVyXDKmVrzCdQ9EgW+VbR6a -5vPEm4auN2CV9xKtzKVo2nVKHHfuaM3sdaa2dP7yXCwhQT/gfoP77MYJ9aKw754L -SCErdVsc59u3YAn6o5Sk9n1LiqGT1aGlKgsaEPrJsJXoWJoWshVHvX8CgYEA41Sa -4toCdk/0g22S0Kt7qjX1WrVlQEzcjqSXotlvnPQ7N5FsyBoE/NO7uozZM+rjgvGD -9TJMF//v+0MSZQPJstWgX4uC2f0HnRQH51Y3kvVC62JLaPEGW7aeq/LDrW5cfiDa -tlIB+V5cYl7STOR5A4arqNhu9EecChAZCEnvNdcCgYBQBX1WIncEibc9aubU+m/8 -1hGM2bJhGKrijq0xuaWRrkBgJ6mO2rWJ6XzVE9xIeFFsoFP+iPpb5dyUTc2VYORn -EJTwUScHED7ERwYpo29mWMbaQbhXBWX0diBpXAizo7+lqRshHWcjWCySh9H7pnjy -X19RIph2sskTgVQCQ9IhRQKBgEMofm1gHHQZYNHm8AWHc4wwTqCSkCvzyQC27Tkl -5UxH9qqO4sUmsqyCXKZa79vfm4DWmrY4OrSoXpwrD2caPF8Br1QqoeiGUNZ90Wvt -U5OtsyxYqJCDC+7SP4PqvxYgUWDNke9kwMKLtt00yAoBQSLiiRnjfrvZ3+Y1JUAG -n42XAoGBAL122wLSCLNuYjcZoQ+scTNmIOf9UV2tAudui/ALLPBL/NjGagisA+cQ -HlnpzuofsWz6SqBxdZEH6rajp0q5GJ5kj6E7odd3ArKqp7BY7UqoId9bpXgmigIL -Jhpje0SvYJ/9DDlHTjO1xGOG0WFlztb1x0iZxMFMXY/d/XZQQdzm ------END RSA PRIVATE KEY----- -Certificate: - Data: - Version: 3 (0x2) - Serial Number: - 81:34:c8:2d:81:f0:54:23 - Signature Algorithm: sha256WithRSAEncryption - Issuer: - countryName = NN - organizationName = Edel Curl Arctic Illudium Research Cloud - commonName = Northern Nowhere Trust Anchor - Validity - Not Before: Mar 6 11:51:48 2025 GMT - Not After : Dec 31 11:51:48 2025 GMT - Subject: - countryName = NN - organizationName = Edel Curl Arctic Illudium Research Cloud - commonName = localhost.nn - Subject Public Key Info: - Public Key Algorithm: rsaEncryption - RSA Public-Key: (2048 bit) - Modulus: - 00:ca:6d:71:a2:7a:bb:12:f6:c0:c3:c9:bf:65:6f: - cb:a3:79:1f:dd:52:bd:8e:0e:72:ea:8d:07:c1:b5: - a6:73:c9:66:e5:00:e1:ed:32:88:d8:69:9d:91:08: - a3:af:20:9d:18:16:a9:e0:19:18:2f:74:47:e7:bc: - 43:83:f7:df:08:33:0a:a1:c4:af:4f:e5:f8:26:d6: - 96:10:61:47:e0:87:f7:24:69:17:7c:eb:b6:01:13: - 59:0b:61:10:46:25:04:e0:8c:50:88:35:26:64:ce: - e0:20:ea:2d:3b:fe:98:c8:fc:f1:94:7a:c7:d3:93: - 6f:89:34:b5:62:ad:d1:67:2b:b1:b3:a9:ca:5a:8d: - 64:ba:04:f5:67:50:5e:73:35:9a:4b:07:8f:f5:4a: - 86:36:9e:e4:1d:c3:e4:87:8c:00:43:d3:c6:0d:e7: - be:07:40:cd:ee:6e:b1:bb:1d:ca:93:c8:57:f4:a7: - d5:66:af:a5:8b:7c:bc:28:44:b0:1b:e9:6b:e5:fb: - 7d:ee:54:be:cc:93:df:ce:ab:5f:69:c2:cf:04:bf: - df:5c:b4:e2:b3:01:85:5b:f6:ac:11:6f:57:00:af: - 3e:b5:a4:d3:7a:08:96:4b:41:cc:68:09:4c:9e:37: - cf:0b:fc:52:cb:64:d5:96:b9:c2:1e:93:f2:da:0c: - 70:a9 - Exponent: 65537 (0x10001) - X509v3 extensions: - X509v3 Subject Alternative Name: - DNS:localhost1, DNS:localhost2, DNS:localhost - X509v3 Key Usage: - Digital Signature, Key Encipherment, Key Agreement - X509v3 Extended Key Usage: - TLS Web Server Authentication - X509v3 Subject Key Identifier: - D6:04:68:12:9C:5A:27:70:6B:D6:89:55:C1:6B:11:78:DD:74:D8:32 - X509v3 Authority Key Identifier: - keyid:9D:2B:CE:95:BF:D8:22:91:A2:E5:AD:FE:79:0E:E9:23:E1:4D:28:32 - - X509v3 Basic Constraints: - CA:FALSE - Authority Information Access: - CA Issuers - URI:http://test.curl.se/ca/EdelCurlRoot.cer - - X509v3 CRL Distribution Points: - - Full Name: - URI:http://test.curl.se/ca/EdelCurlRoot.crl - - Signature Algorithm: sha256WithRSAEncryption - 60:7a:35:3f:a7:9b:44:14:cf:8a:9d:38:46:3c:7a:93:43:19: - 9d:ed:f3:21:32:50:7a:f8:b4:e6:90:d1:5e:26:75:1c:fd:ed: - 64:b2:fe:5a:9c:96:f6:5b:2d:df:86:7d:4c:87:fa:8f:1d:13: - 67:f2:f5:91:aa:f9:1b:c3:f7:54:da:17:43:49:00:ad:9e:55: - 53:43:c1:30:4e:6b:9e:f6:99:26:b1:fa:35:85:d5:d1:70:88: - 30:87:8e:d3:91:b9:85:fa:b8:e2:31:06:9c:17:c8:2a:2f:9b: - e6:e8:5c:c7:6e:57:36:f5:c7:78:a2:9b:01:ef:8d:d5:38:ec: - 1f:f0:ee:7f:d4:0b:b8:82:1d:01:3a:65:46:47:ba:58:9f:d1: - 4d:95:18:17:e4:23:4a:76:54:c6:70:5d:fd:ac:f2:83:1d:ed: - 66:2b:a2:97:28:aa:e3:7f:bd:f2:02:8b:2f:43:fe:c1:74:36: - 8f:87:60:de:51:0b:44:0a:c4:98:b6:4d:94:e5:ec:ce:72:25: - 66:66:8e:1c:86:aa:30:5c:57:75:8a:28:eb:b3:51:93:84:45: - 6a:f7:ce:52:ac:1b:a8:0d:37:df:e4:60:a2:96:18:cf:29:66: - a9:e2:08:52:e6:2a:3a:29:8b:3a:28:b1:df:4d:d4:0c:b6:9b: - e2:40:b2:33 ------BEGIN CERTIFICATE----- -MIIEYjCCA0qgAwIBAgIJAIE0yC2B8FQjMA0GCSqGSIb3DQEBCwUAMGgxCzAJBgNV -BAYTAk5OMTEwLwYDVQQKDChFZGVsIEN1cmwgQXJjdGljIElsbHVkaXVtIFJlc2Vh -cmNoIENsb3VkMSYwJAYDVQQDDB1Ob3J0aGVybiBOb3doZXJlIFRydXN0IEFuY2hv -cjAeFw0yNTAzMDYxMTUxNDhaFw0yNTEyMzExMTUxNDhaMFcxCzAJBgNVBAYTAk5O -MTEwLwYDVQQKDChFZGVsIEN1cmwgQXJjdGljIElsbHVkaXVtIFJlc2VhcmNoIENs -b3VkMRUwEwYDVQQDDAxsb2NhbGhvc3Qubm4wggEiMA0GCSqGSIb3DQEBAQUAA4IB -DwAwggEKAoIBAQDKbXGiersS9sDDyb9lb8ujeR/dUr2ODnLqjQfBtaZzyWblAOHt -MojYaZ2RCKOvIJ0YFqngGRgvdEfnvEOD998IMwqhxK9P5fgm1pYQYUfgh/ckaRd8 -67YBE1kLYRBGJQTgjFCINSZkzuAg6i07/pjI/PGUesfTk2+JNLVirdFnK7Gzqcpa -jWS6BPVnUF5zNZpLB4/1SoY2nuQdw+SHjABD08YN574HQM3ubrG7HcqTyFf0p9Vm -r6WLfLwoRLAb6Wvl+33uVL7Mk9/Oq19pws8Ev99ctOKzAYVb9qwRb1cArz61pNN6 -CJZLQcxoCUyeN88L/FLLZNWWucIek/LaDHCpAgMBAAGjggEeMIIBGjAsBgNVHREE -JTAjggpsb2NhbGhvc3Qxggpsb2NhbGhvc3Qygglsb2NhbGhvc3QwCwYDVR0PBAQD -AgOoMBMGA1UdJQQMMAoGCCsGAQUFBwMBMB0GA1UdDgQWBBTWBGgSnFoncGvWiVXB -axF43XTYMjAfBgNVHSMEGDAWgBSdK86Vv9gikaLlrf55Dukj4U0oMjAJBgNVHRME -AjAAMEMGCCsGAQUFBwEBBDcwNTAzBggrBgEFBQcwAoYnaHR0cDovL3Rlc3QuY3Vy -bC5zZS9jYS9FZGVsQ3VybFJvb3QuY2VyMDgGA1UdHwQxMC8wLaAroCmGJ2h0dHA6 -Ly90ZXN0LmN1cmwuc2UvY2EvRWRlbEN1cmxSb290LmNybDANBgkqhkiG9w0BAQsF -AAOCAQEAYHo1P6ebRBTPip04Rjx6k0MZne3zITJQevi05pDRXiZ1HP3tZLL+WpyW -9lst34Z9TIf6jx0TZ/L1kar5G8P3VNoXQ0kArZ5VU0PBME5rnvaZJrH6NYXV0XCI -MIeO05G5hfq44jEGnBfIKi+b5uhcx25XNvXHeKKbAe+N1TjsH/Duf9QLuIIdATpl -Rke6WJ/RTZUYF+QjSnZUxnBd/azygx3tZiuilyiq43+98gKLL0P+wXQ2j4dg3lEL -RArEmLZNlOXsznIlZmaOHIaqMFxXdYoo67NRk4RFavfOUqwbqA033+RgopYYzylm -qeIIUuYqOimLOiix303UDLab4kCyMw== ------END CERTIFICATE----- diff --git a/tests/certs/test-localhost-san-last.pub.der b/tests/certs/test-localhost-san-last.pub.der deleted file mode 100644 index 3580026903..0000000000 Binary files a/tests/certs/test-localhost-san-last.pub.der and /dev/null differ diff --git a/tests/certs/test-localhost-san-last.pub.pem b/tests/certs/test-localhost-san-last.pub.pem deleted file mode 100644 index c11aa319c7..0000000000 --- a/tests/certs/test-localhost-san-last.pub.pem +++ /dev/null @@ -1,9 +0,0 @@ ------BEGIN PUBLIC KEY----- -MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAym1xonq7EvbAw8m/ZW/L -o3kf3VK9jg5y6o0HwbWmc8lm5QDh7TKI2GmdkQijryCdGBap4BkYL3RH57xDg/ff -CDMKocSvT+X4JtaWEGFH4If3JGkXfOu2ARNZC2EQRiUE4IxQiDUmZM7gIOotO/6Y -yPzxlHrH05NviTS1Yq3RZyuxs6nKWo1kugT1Z1BeczWaSweP9UqGNp7kHcPkh4wA -Q9PGDee+B0DN7m6xux3Kk8hX9KfVZq+li3y8KESwG+lr5ft97lS+zJPfzqtfacLP -BL/fXLTiswGFW/asEW9XAK8+taTTegiWS0HMaAlMnjfPC/xSy2TVlrnCHpPy2gxw -qQIDAQAB ------END PUBLIC KEY----- diff --git a/tests/certs/test-localhost.crl b/tests/certs/test-localhost.crl deleted file mode 100644 index 2e5bd10d66..0000000000 --- a/tests/certs/test-localhost.crl +++ /dev/null @@ -1,36 +0,0 @@ ------BEGIN X509 CRL----- -MIIGQjCCBSoCAQEwDQYJKoZIhvcNAQELBQAwaDELMAkGA1UEBhMCTk4xMTAvBgNV -BAoMKEVkZWwgQ3VybCBBcmN0aWMgSWxsdWRpdW0gUmVzZWFyY2ggQ2xvdWQxJjAk -BgNVBAMMHU5vcnRoZXJuIE5vd2hlcmUgVHJ1c3QgQW5jaG9yFw0yNTAzMDYxMTUx -NDdaFw0yNTA0MDUxMTUxNDdaMIIEfDAaAgkAgTTILYHwU/cXDTI1MDMwNjEwMTkz -NFowGgIJAIE0yC2B8FP4Fw0yNTAzMDYxMDE5MzRaMBoCCQCBNMgtgfBT+RcNMjUw -MzA2MTAxOTM0WjAaAgkAgTTILYHwU/oXDTI1MDMwNjEwMTkzNVowGgIJAIE0yC2B -8FP7Fw0yNTAzMDYxMDE5MzVaMBoCCQCBNMgtgfBT/BcNMjUwMzA2MTAxOTM1WjAa -AgkAgTTILYHwU/0XDTI1MDMwNjEwNDMzOVowGgIJAIE0yC2B8FP+Fw0yNTAzMDYx -MDQzMzlaMBoCCQCBNMgtgfBT/xcNMjUwMzA2MTA0MzQwWjAaAgkAgTTILYHwVAAX -DTI1MDMwNjEwNDM0MFowGgIJAIE0yC2B8FQBFw0yNTAzMDYxMDQzNDBaMBoCCQCB -NMgtgfBUAhcNMjUwMzA2MTA0NjA4WjAaAgkAgTTILYHwVAMXDTI1MDMwNjEwNDYw -OFowGgIJAIE0yC2B8FQEFw0yNTAzMDYxMDQ2MDhaMBoCCQCBNMgtgfBUBRcNMjUw -MzA2MTA0NjA4WjAaAgkAgTTILYHwVAYXDTI1MDMwNjEwNDYwOVowGgIJAIE0yC2B -8FQHFw0yNTAzMDYxMDQ2MDlaMBoCCQCBNMgtgfBUCBcNMjUwMzA2MTA0ODU5WjAa -AgkAgTTILYHwVAkXDTI1MDMwNjEwNDg1OVowGgIJAIE0yC2B8FQKFw0yNTAzMDYx -MDQ4NTlaMBoCCQCBNMgtgfBUCxcNMjUwMzA2MTA0ODU5WjAaAgkAgTTILYHwVAwX -DTI1MDMwNjEwNDkwMFowGgIJAIE0yC2B8FQNFw0yNTAzMDYxMDQ5MDBaMBoCCQCB -NMgtgfBUDhcNMjUwMzA2MTExMzM4WjAaAgkAgTTILYHwVA8XDTI1MDMwNjExMTMz -OFowGgIJAIE0yC2B8FQQFw0yNTAzMDYxMTEzMzhaMBoCCQCBNMgtgfBUERcNMjUw -MzA2MTExMzM4WjAaAgkAgTTILYHwVBIXDTI1MDMwNjExMTMzOFowGgIJAIE0yC2B -8FQTFw0yNTAzMDYxMTE1MzBaMBoCCQCBNMgtgfBUFBcNMjUwMzA2MTExNTMwWjAa -AgkAgTTILYHwVBUXDTI1MDMwNjExMTUzMFowGgIJAIE0yC2B8FQWFw0yNTAzMDYx -MTE1MzBaMBoCCQCBNMgtgfBUFxcNMjUwMzA2MTExNTMwWjAaAgkAgTTILYHwVBgX -DTI1MDMwNjExMTUzMFowGgIJAIE0yC2B8FQZFw0yNTAzMDYxMTE5MDNaMBoCCQCB -NMgtgfBUGhcNMjUwMzA2MTExOTA0WjAaAgkAgTTILYHwVBsXDTI1MDMwNjExMTkw -NFowGgIJAIE0yC2B8FQcFw0yNTAzMDYxMTE5MDRaMBoCCQCBNMgtgfBUHRcNMjUw -MzA2MTExOTA0WjAaAgkAgTTILYHwVB4XDTI1MDMwNjExMTkwNFowGgIJAIE0yC2B -8FQfFw0yNTAzMDYxMTUxNDdaoA4wDDAKBgNVHRQEAwIBATANBgkqhkiG9w0BAQsF -AAOCAQEAhE75mBvf+4gkmovBP4FD6LOTNaafbtZiEBBub2nDkc2KiHJfvQzy08U9 -bnsxD9yAKk79wVGuBOgp9QHSabO6jodbf8UUJ97vYxE8LTE8gJKOS+CPFJz3fbS3 -3p+RLaSrcMXttHlP+BB6pl7Bo2srMVkF971HVPlvpZeCcLUdvidxUNwHd2ck93Xm -ZzGod6s2H4RQ7TdPt+ARMzbysm3VNvMp10XVjmy/ytktkTIVvXqnLhNNTav144ya -JEoPMTgtvPN+QI0jFiDb4RsUuhgD+AbS7MdYtxbml7wmiizvEh0i74GcZnNbEeln -YgZR147KglS1zqANPeSsDvVoXm6a1w== ------END X509 CRL----- diff --git a/tests/certs/test-localhost.crt b/tests/certs/test-localhost.crt deleted file mode 100644 index 5f49eb9413..0000000000 --- a/tests/certs/test-localhost.crt +++ /dev/null @@ -1,103 +0,0 @@ -Certificate: - Data: - Version: 3 (0x2) - Serial Number: - 81:34:c8:2d:81:f0:54:1f - Signature Algorithm: sha256WithRSAEncryption - Issuer: - countryName = NN - organizationName = Edel Curl Arctic Illudium Research Cloud - commonName = Northern Nowhere Trust Anchor - Validity - Not Before: Mar 6 11:51:47 2025 GMT - Not After : Dec 31 11:51:47 2025 GMT - Subject: - countryName = NN - organizationName = Edel Curl Arctic Illudium Research Cloud - commonName = localhost - Subject Public Key Info: - Public Key Algorithm: rsaEncryption - RSA Public-Key: (2048 bit) - Modulus: - 00:e6:0d:af:59:5e:53:57:3f:4e:c1:e2:f8:cf:30: - 65:dd:62:13:31:46:0b:d0:60:80:51:0d:09:33:8d: - e1:b2:0f:0a:f2:fc:10:0b:e1:3a:69:43:c3:e9:eb: - 8b:45:8b:d5:26:0e:bd:c8:d4:a6:0f:1b:00:8d:74: - 36:60:30:a0:e0:24:c7:fa:dc:0c:e3:83:6c:8b:d1: - fd:2a:a8:a3:d3:21:ff:c5:3c:47:1a:09:e1:8c:32: - 79:74:49:e9:f2:df:f7:4d:ac:b4:07:ec:81:40:27: - 65:b3:94:69:76:cd:57:1f:21:60:df:b4:7c:08:2f: - 33:fd:76:cc:23:c8:ed:1c:fb:bb:8a:74:2e:fe:7c: - 1d:d3:2f:22:2d:ff:11:7d:92:50:cc:c0:06:ac:95: - a8:b3:06:42:83:09:1c:52:81:d1:14:21:bf:d1:b0: - 99:50:7a:6a:10:0c:30:d5:f0:e4:1a:c7:5d:1b:e9: - be:be:c5:54:eb:e4:72:04:35:c4:14:a1:ba:20:45: - 2f:60:c8:e1:a1:de:b5:65:f7:2a:5d:05:d1:92:2d: - 22:ce:1a:ca:c2:35:fd:7c:f6:02:47:85:22:8c:5d: - 6e:4f:29:6b:3a:f9:84:73:89:4a:64:7b:9f:bd:fe: - 0a:4d:a0:08:7a:41:77:a3:dd:ba:c9:20:58:a1:7c: - b8:b1 - Exponent: 65537 (0x10001) - X509v3 extensions: - X509v3 Subject Alternative Name: - DNS:localhost - X509v3 Key Usage: - Digital Signature, Key Encipherment, Key Agreement - X509v3 Extended Key Usage: - TLS Web Server Authentication - X509v3 Subject Key Identifier: - B4:23:96:D3:28:32:87:90:18:46:E5:2D:CD:D3:DB:4F:9B:92:76:79 - X509v3 Authority Key Identifier: - keyid:9D:2B:CE:95:BF:D8:22:91:A2:E5:AD:FE:79:0E:E9:23:E1:4D:28:32 - - X509v3 Basic Constraints: - CA:FALSE - Authority Information Access: - CA Issuers - URI:http://test.curl.se/ca/EdelCurlRoot.cer - - X509v3 CRL Distribution Points: - - Full Name: - URI:http://test.curl.se/ca/EdelCurlRoot.crl - - Signature Algorithm: sha256WithRSAEncryption - 43:b8:3e:47:2e:1c:8e:76:16:4d:c5:04:89:c9:d3:42:5c:af: - 97:27:da:6a:7f:bb:6d:49:51:0c:60:c7:0b:ce:8f:a3:33:26: - ae:f8:75:fa:c8:43:65:b7:c1:a4:eb:bb:9b:50:e4:97:8f:78: - b0:a7:00:95:5e:ac:3d:39:96:a6:39:a6:96:ad:5c:1b:e0:d3: - 81:91:25:f1:1c:bd:dd:70:d5:8d:44:03:6e:8c:93:66:98:fd: - 1d:66:b8:58:6a:90:11:26:44:3b:4e:8a:c4:ef:f7:4c:f4:57: - ba:75:f5:dd:24:43:82:29:12:e8:4e:fc:9e:6f:a8:8e:e7:01: - ff:56:e4:2d:62:02:99:a1:a9:fa:45:46:48:58:17:e8:ee:37: - 31:39:08:b6:a3:55:7e:6a:c5:3e:c0:1c:03:39:bc:64:d8:8d: - 7e:57:35:71:14:38:77:64:3a:3f:b4:4b:e8:10:31:a1:08:8c: - 2f:e8:de:d4:f8:a0:e6:07:3b:12:8e:12:83:eb:e3:ba:7c:91: - b3:50:5e:f3:df:6d:3f:c1:70:f3:5c:e5:0c:84:1a:9d:5a:ae: - bc:ac:53:f2:b6:e5:66:f8:00:c0:74:af:ed:e2:89:36:a6:c2: - 8b:90:8d:6c:23:a3:60:2e:49:1d:dd:d2:19:45:cb:cf:a4:c3: - 87:9c:fb:8f ------BEGIN CERTIFICATE----- -MIIERzCCAy+gAwIBAgIJAIE0yC2B8FQfMA0GCSqGSIb3DQEBCwUAMGgxCzAJBgNV -BAYTAk5OMTEwLwYDVQQKDChFZGVsIEN1cmwgQXJjdGljIElsbHVkaXVtIFJlc2Vh -cmNoIENsb3VkMSYwJAYDVQQDDB1Ob3J0aGVybiBOb3doZXJlIFRydXN0IEFuY2hv -cjAeFw0yNTAzMDYxMTUxNDdaFw0yNTEyMzExMTUxNDdaMFQxCzAJBgNVBAYTAk5O -MTEwLwYDVQQKDChFZGVsIEN1cmwgQXJjdGljIElsbHVkaXVtIFJlc2VhcmNoIENs -b3VkMRIwEAYDVQQDDAlsb2NhbGhvc3QwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAw -ggEKAoIBAQDmDa9ZXlNXP07B4vjPMGXdYhMxRgvQYIBRDQkzjeGyDwry/BAL4Tpp -Q8Pp64tFi9UmDr3I1KYPGwCNdDZgMKDgJMf63Azjg2yL0f0qqKPTIf/FPEcaCeGM -Mnl0Seny3/dNrLQH7IFAJ2WzlGl2zVcfIWDftHwILzP9dswjyO0c+7uKdC7+fB3T -LyIt/xF9klDMwAaslaizBkKDCRxSgdEUIb/RsJlQemoQDDDV8OQax10b6b6+xVTr -5HIENcQUobogRS9gyOGh3rVl9ypdBdGSLSLOGsrCNf189gJHhSKMXW5PKWs6+YRz -iUpke5+9/gpNoAh6QXej3brJIFihfLixAgMBAAGjggEGMIIBAjAUBgNVHREEDTAL -gglsb2NhbGhvc3QwCwYDVR0PBAQDAgOoMBMGA1UdJQQMMAoGCCsGAQUFBwMBMB0G -A1UdDgQWBBS0I5bTKDKHkBhG5S3N09tPm5J2eTAfBgNVHSMEGDAWgBSdK86Vv9gi -kaLlrf55Dukj4U0oMjAJBgNVHRMEAjAAMEMGCCsGAQUFBwEBBDcwNTAzBggrBgEF -BQcwAoYnaHR0cDovL3Rlc3QuY3VybC5zZS9jYS9FZGVsQ3VybFJvb3QuY2VyMDgG -A1UdHwQxMC8wLaAroCmGJ2h0dHA6Ly90ZXN0LmN1cmwuc2UvY2EvRWRlbEN1cmxS -b290LmNybDANBgkqhkiG9w0BAQsFAAOCAQEAQ7g+Ry4cjnYWTcUEicnTQlyvlyfa -an+7bUlRDGDHC86PozMmrvh1+shDZbfBpOu7m1Dkl494sKcAlV6sPTmWpjmmlq1c -G+DTgZEl8Ry93XDVjUQDboyTZpj9HWa4WGqQESZEO06KxO/3TPRXunX13SRDgikS -6E78nm+ojucB/1bkLWICmaGp+kVGSFgX6O43MTkItqNVfmrFPsAcAzm8ZNiNflc1 -cRQ4d2Q6P7RL6BAxoQiML+je1Pig5gc7Eo4Sg+vjunyRs1Be899tP8Fw81zlDIQa -nVquvKxT8rblZvgAwHSv7eKJNqbCi5CNbCOjYC5JHd3SGUXLz6TDh5z7jw== ------END CERTIFICATE----- diff --git a/tests/certs/test-localhost.key b/tests/certs/test-localhost.key deleted file mode 100644 index 235f5e3294..0000000000 --- a/tests/certs/test-localhost.key +++ /dev/null @@ -1,27 +0,0 @@ ------BEGIN RSA PRIVATE KEY----- -MIIEpAIBAAKCAQEA5g2vWV5TVz9OweL4zzBl3WITMUYL0GCAUQ0JM43hsg8K8vwQ -C+E6aUPD6euLRYvVJg69yNSmDxsAjXQ2YDCg4CTH+twM44Nsi9H9Kqij0yH/xTxH -GgnhjDJ5dEnp8t/3Tay0B+yBQCdls5Rpds1XHyFg37R8CC8z/XbMI8jtHPu7inQu -/nwd0y8iLf8RfZJQzMAGrJWoswZCgwkcUoHRFCG/0bCZUHpqEAww1fDkGsddG+m+ -vsVU6+RyBDXEFKG6IEUvYMjhod61ZfcqXQXRki0izhrKwjX9fPYCR4UijF1uTylr -OvmEc4lKZHufvf4KTaAIekF3o926ySBYoXy4sQIDAQABAoIBAQCorDH7sWgjmRwy -lirdJlwZlFYEE5qH3qlWQ9uSPB3VwqfBfkR5oVqFYZUcRoInrJ3MOJS30gorGx4t -mJ5hqmXZ0b36VSryCSMl5QHdLCZpoAz63PY4xjPj6gIY3DS2ybV18wFQqfweQISV -xWQKIgYVohB4FMm36nwRA/Aq8J/BVgC/SIGJnDW2EGId5op20BdH7APedquXqzzp -FwETV3hH7QDbdip+Td+5/Nnc9yLg4ecSvOLe5mLaGXgsxhNqAKnY5f3izMh+FTvx -jgR12x/urhu4mwpKie7Y/JO+FsNJYevHHKYX1wUhGO2Puco4bCUiAecmrO4lFOMX -auBjsCQtAoGBAPcnzQy8UIHBSxgUaQ2zEWtQNKg/lYy3BiM7rTq8HIAEggL5ylxv -bP17tIQQZAhayaeR1BKL7yP8d5UlZedI9gzMP23mNsrxpC2BsmcBEZZQFRRFhWsD -bnVWWQkx6KgVIDtZwQF1OhNUuZxUkTlXMSuSdNNVJADIHd8y7oxaGGvHAoGBAO5J -Nj3L7eh9Eoh4iEMbyOu1iymE+jdzuY80wVBacMinjpmGE6wlIf/bvwb2/xGMd+Ix -Sd60wCg/obN/62EAWaiJH88qrF5Uj+l2u1tmp3oRMOiBkXbLhEXzGP9Qcoa6s8gT -HjatboUgCUuSQrY4OUu+wmqwufBh7poSGFUs/YfHAoGBAL5svgG3/ddbVD5jS2Ww -uBUUoN2Yz+KxCVuQGTINyW+hCYK9bnq1pyXOcBDoiAof2QrwwpLfmgsB9CjHvbHr -dxf5Lk3AeCr47uPY79mI60ICxZruzZLb+/kP5F2/RGBsln7j8l7rMSm/t5qJVbL2 -SP4nQzeoe6rWhJ15om4k5Hf1AoGAGpuGOQRKfoloxmBfJs81ckyFS4+TuRltAPat -F2Hh8iXzoGT+UVycHUvWWtq9xKHgyRsj2oBobJYeYkLIb75wRId7S9DCCo56u2EM -rroZvWGqCmxdZ9x12rG4etnqz+yNIqwv1X8sNiVLpGqilGJW04RrhSpSuOrWj9Gx -ceFiNgUCgYBAAubXkD1rcIs2X8Ds3ztwYPaGL8ZX4q8eWvncgjz3YmVve408XD0w -Sd44NWgjK2LXMv3ddXFdukoDmGm75KhDHWKO9vPBo0wpB5FXkMyHiDyM65X0MZC8 -xzSd9dUcy7TBjMVV2ge81b6U8nCwrdrU2L/0dzigmKnrLrF8MRjFLA== ------END RSA PRIVATE KEY----- diff --git a/tests/certs/test-localhost.nn.crl b/tests/certs/test-localhost.nn.crl deleted file mode 100644 index 95229d7510..0000000000 --- a/tests/certs/test-localhost.nn.crl +++ /dev/null @@ -1,37 +0,0 @@ ------BEGIN X509 CRL----- -MIIGXjCCBUYCAQEwDQYJKoZIhvcNAQELBQAwaDELMAkGA1UEBhMCTk4xMTAvBgNV -BAoMKEVkZWwgQ3VybCBBcmN0aWMgSWxsdWRpdW0gUmVzZWFyY2ggQ2xvdWQxJjAk -BgNVBAMMHU5vcnRoZXJuIE5vd2hlcmUgVHJ1c3QgQW5jaG9yFw0yNTAzMDYxMTUx -NDhaFw0yNTA0MDUxMTUxNDhaMIIEmDAaAgkAgTTILYHwU/cXDTI1MDMwNjEwMTkz -NFowGgIJAIE0yC2B8FP4Fw0yNTAzMDYxMDE5MzRaMBoCCQCBNMgtgfBT+RcNMjUw -MzA2MTAxOTM0WjAaAgkAgTTILYHwU/oXDTI1MDMwNjEwMTkzNVowGgIJAIE0yC2B -8FP7Fw0yNTAzMDYxMDE5MzVaMBoCCQCBNMgtgfBT/BcNMjUwMzA2MTAxOTM1WjAa -AgkAgTTILYHwU/0XDTI1MDMwNjEwNDMzOVowGgIJAIE0yC2B8FP+Fw0yNTAzMDYx -MDQzMzlaMBoCCQCBNMgtgfBT/xcNMjUwMzA2MTA0MzQwWjAaAgkAgTTILYHwVAAX -DTI1MDMwNjEwNDM0MFowGgIJAIE0yC2B8FQBFw0yNTAzMDYxMDQzNDBaMBoCCQCB -NMgtgfBUAhcNMjUwMzA2MTA0NjA4WjAaAgkAgTTILYHwVAMXDTI1MDMwNjEwNDYw -OFowGgIJAIE0yC2B8FQEFw0yNTAzMDYxMDQ2MDhaMBoCCQCBNMgtgfBUBRcNMjUw -MzA2MTA0NjA4WjAaAgkAgTTILYHwVAYXDTI1MDMwNjEwNDYwOVowGgIJAIE0yC2B -8FQHFw0yNTAzMDYxMDQ2MDlaMBoCCQCBNMgtgfBUCBcNMjUwMzA2MTA0ODU5WjAa -AgkAgTTILYHwVAkXDTI1MDMwNjEwNDg1OVowGgIJAIE0yC2B8FQKFw0yNTAzMDYx -MDQ4NTlaMBoCCQCBNMgtgfBUCxcNMjUwMzA2MTA0ODU5WjAaAgkAgTTILYHwVAwX -DTI1MDMwNjEwNDkwMFowGgIJAIE0yC2B8FQNFw0yNTAzMDYxMDQ5MDBaMBoCCQCB -NMgtgfBUDhcNMjUwMzA2MTExMzM4WjAaAgkAgTTILYHwVA8XDTI1MDMwNjExMTMz -OFowGgIJAIE0yC2B8FQQFw0yNTAzMDYxMTEzMzhaMBoCCQCBNMgtgfBUERcNMjUw -MzA2MTExMzM4WjAaAgkAgTTILYHwVBIXDTI1MDMwNjExMTMzOFowGgIJAIE0yC2B -8FQTFw0yNTAzMDYxMTE1MzBaMBoCCQCBNMgtgfBUFBcNMjUwMzA2MTExNTMwWjAa -AgkAgTTILYHwVBUXDTI1MDMwNjExMTUzMFowGgIJAIE0yC2B8FQWFw0yNTAzMDYx -MTE1MzBaMBoCCQCBNMgtgfBUFxcNMjUwMzA2MTExNTMwWjAaAgkAgTTILYHwVBgX -DTI1MDMwNjExMTUzMFowGgIJAIE0yC2B8FQZFw0yNTAzMDYxMTE5MDNaMBoCCQCB -NMgtgfBUGhcNMjUwMzA2MTExOTA0WjAaAgkAgTTILYHwVBsXDTI1MDMwNjExMTkw -NFowGgIJAIE0yC2B8FQcFw0yNTAzMDYxMTE5MDRaMBoCCQCBNMgtgfBUHRcNMjUw -MzA2MTExOTA0WjAaAgkAgTTILYHwVB4XDTI1MDMwNjExMTkwNFowGgIJAIE0yC2B -8FQfFw0yNTAzMDYxMTUxNDdaMBoCCQCBNMgtgfBUIBcNMjUwMzA2MTE1MTQ4WqAO -MAwwCgYDVR0UBAMCAQEwDQYJKoZIhvcNAQELBQADggEBABSYAYf7oUbmHOPkUk0p -/rIqghCYWv9/PawRBI+ggCaMoC5jj9ppxNwXsI2FGrbN6vwpVbZ5mkF+gs3mNDlA -fC0/Qj6IMuM/qRSFGXE4OQaQtYRH5BXFT4A0CiKhbBiDE8T8lHaLMIRWXP5phdoU -X2FtZe/8Es+uyN1iF0KyNMFSIrFayEO4hUYH4KUxGgSq3vIp61JPRvQlHxl4g6jC -OEH5Q7BLOd718Dzd5o1w9etaiOV8PqLmNd/t7BwX72I33XQyBOJ8sBtlB3y2LgfU -CN7XlAEzF0+uFTClHHqndkw97+emgjjz/JVKH/M8kBQVQ2tcvbKTiJKhTS/Uw2cR -uPw= ------END X509 CRL----- diff --git a/tests/certs/test-localhost.nn.crt b/tests/certs/test-localhost.nn.crt deleted file mode 100644 index 41c2392d69..0000000000 --- a/tests/certs/test-localhost.nn.crt +++ /dev/null @@ -1,104 +0,0 @@ -Certificate: - Data: - Version: 3 (0x2) - Serial Number: - 81:34:c8:2d:81:f0:54:20 - Signature Algorithm: sha256WithRSAEncryption - Issuer: - countryName = NN - organizationName = Edel Curl Arctic Illudium Research Cloud - commonName = Northern Nowhere Trust Anchor - Validity - Not Before: Mar 6 11:51:47 2025 GMT - Not After : Dec 31 11:51:47 2025 GMT - Subject: - countryName = NN - organizationName = Edel Curl Arctic Illudium Research Cloud - commonName = localhost.nn - Subject Public Key Info: - Public Key Algorithm: rsaEncryption - RSA Public-Key: (2048 bit) - Modulus: - 00:c8:04:06:3e:c7:71:90:6b:e3:ce:39:04:3d:70: - 5b:a2:50:fb:9e:9f:68:d9:36:f0:87:b9:82:65:3a: - 9a:2a:fe:37:e0:e0:96:f0:27:4b:c0:f2:01:33:11: - ba:ba:06:3d:73:77:34:9f:0d:fd:d8:da:1e:bf:4d: - 64:d3:80:d0:65:e8:b5:25:cb:e9:d5:6e:2e:46:9c: - 2a:18:07:36:46:17:a2:db:89:08:13:f6:44:01:82: - 8f:45:8b:b4:a1:7b:8b:87:36:66:e0:3e:01:ad:0c: - 29:07:02:3d:5b:67:ec:0b:2e:c3:3b:c6:da:20:99: - 5f:cf:6d:f4:77:12:7b:be:1f:c3:b4:26:5c:f8:7e: - 86:39:7f:07:f8:12:15:36:47:0b:1b:f0:02:d6:65: - 5c:ba:19:ad:9f:b0:43:9f:54:49:4f:c8:0c:89:07: - c4:78:91:c0:3d:64:87:ba:a3:30:a0:c7:15:2c:d1: - a9:7c:cb:14:9e:8c:55:50:92:cc:ae:64:27:df:eb: - 54:86:a1:11:55:74:60:53:5b:cc:dc:9e:7a:85:9b: - e5:e5:2e:03:a2:23:19:23:98:76:87:b1:4b:63:13: - 60:8e:ba:c5:c6:ed:d8:d2:fd:ad:a1:dd:15:37:a6: - 91:f2:c8:eb:f7:68:ee:ff:f3:d5:c7:81:a3:12:3a: - 79:2d - Exponent: 65537 (0x10001) - X509v3 extensions: - X509v3 Subject Alternative Name: - DNS:localhost.nn - X509v3 Key Usage: - Digital Signature, Key Encipherment, Key Agreement - X509v3 Extended Key Usage: - TLS Web Server Authentication - X509v3 Subject Key Identifier: - F7:82:F9:EF:7C:0E:14:42:64:61:2C:F0:9C:36:F2:C0:B5:76:C8:1A - X509v3 Authority Key Identifier: - keyid:9D:2B:CE:95:BF:D8:22:91:A2:E5:AD:FE:79:0E:E9:23:E1:4D:28:32 - - X509v3 Basic Constraints: - CA:FALSE - Authority Information Access: - CA Issuers - URI:http://test.curl.se/ca/EdelCurlRoot.cer - - X509v3 CRL Distribution Points: - - Full Name: - URI:http://test.curl.se/ca/EdelCurlRoot.crl - - Signature Algorithm: sha256WithRSAEncryption - 8a:4a:da:16:6e:86:84:f9:3d:8e:76:cf:e5:32:b3:aa:c1:23: - 87:e6:f7:2e:e9:f0:9f:5d:a0:88:e8:68:71:6d:52:12:53:db: - dc:9e:8f:ac:de:95:a2:a7:d6:9e:82:ff:ef:80:49:74:4c:fa: - 3a:95:73:1d:a5:b2:93:24:3e:79:c7:47:29:04:9c:6d:e2:fa: - 98:a2:ef:10:f6:f8:00:ea:09:3b:c4:90:7f:f3:43:df:dc:6a: - 01:dd:c6:32:ae:38:bd:d1:36:c3:e6:05:c1:60:3e:7f:d9:8f: - 42:7a:f1:66:54:f8:2f:f0:a8:31:84:73:f9:26:2b:71:02:4e: - 6a:53:d6:c8:b7:5e:b0:27:40:b3:24:ee:93:76:f3:17:5d:94: - f6:d9:3a:b7:57:ff:fa:7a:09:13:b8:7f:f4:62:e8:06:0c:1d: - 94:f0:7a:2a:af:9d:82:da:de:42:26:a2:42:cd:a0:ab:5e:ad: - 94:97:e2:7c:f5:91:f9:39:d2:3b:26:95:a3:43:b4:8c:20:ca: - 5e:7c:af:07:48:24:1f:bf:32:8e:f0:a2:85:ff:74:f1:bd:7c: - 44:63:9f:cf:91:74:b8:a8:0a:59:70:57:12:92:d7:c9:b7:ea: - 61:a3:e7:6a:5f:4c:36:3c:b8:90:c6:3a:4b:44:42:d0:82:bb: - 84:64:4a:03 ------BEGIN CERTIFICATE----- -MIIETTCCAzWgAwIBAgIJAIE0yC2B8FQgMA0GCSqGSIb3DQEBCwUAMGgxCzAJBgNV -BAYTAk5OMTEwLwYDVQQKDChFZGVsIEN1cmwgQXJjdGljIElsbHVkaXVtIFJlc2Vh -cmNoIENsb3VkMSYwJAYDVQQDDB1Ob3J0aGVybiBOb3doZXJlIFRydXN0IEFuY2hv -cjAeFw0yNTAzMDYxMTUxNDdaFw0yNTEyMzExMTUxNDdaMFcxCzAJBgNVBAYTAk5O -MTEwLwYDVQQKDChFZGVsIEN1cmwgQXJjdGljIElsbHVkaXVtIFJlc2VhcmNoIENs -b3VkMRUwEwYDVQQDDAxsb2NhbGhvc3Qubm4wggEiMA0GCSqGSIb3DQEBAQUAA4IB -DwAwggEKAoIBAQDIBAY+x3GQa+POOQQ9cFuiUPuen2jZNvCHuYJlOpoq/jfg4Jbw -J0vA8gEzEbq6Bj1zdzSfDf3Y2h6/TWTTgNBl6LUly+nVbi5GnCoYBzZGF6LbiQgT -9kQBgo9Fi7She4uHNmbgPgGtDCkHAj1bZ+wLLsM7xtogmV/PbfR3Enu+H8O0Jlz4 -foY5fwf4EhU2Rwsb8ALWZVy6Ga2fsEOfVElPyAyJB8R4kcA9ZIe6ozCgxxUs0al8 -yxSejFVQksyuZCff61SGoRFVdGBTW8zcnnqFm+XlLgOiIxkjmHaHsUtjE2COusXG -7djS/a2h3RU3ppHyyOv3aO7/89XHgaMSOnktAgMBAAGjggEJMIIBBTAXBgNVHREE -EDAOggxsb2NhbGhvc3Qubm4wCwYDVR0PBAQDAgOoMBMGA1UdJQQMMAoGCCsGAQUF -BwMBMB0GA1UdDgQWBBT3gvnvfA4UQmRhLPCcNvLAtXbIGjAfBgNVHSMEGDAWgBSd -K86Vv9gikaLlrf55Dukj4U0oMjAJBgNVHRMEAjAAMEMGCCsGAQUFBwEBBDcwNTAz -BggrBgEFBQcwAoYnaHR0cDovL3Rlc3QuY3VybC5zZS9jYS9FZGVsQ3VybFJvb3Qu -Y2VyMDgGA1UdHwQxMC8wLaAroCmGJ2h0dHA6Ly90ZXN0LmN1cmwuc2UvY2EvRWRl -bEN1cmxSb290LmNybDANBgkqhkiG9w0BAQsFAAOCAQEAikraFm6GhPk9jnbP5TKz -qsEjh+b3Lunwn12giOhocW1SElPb3J6PrN6VoqfWnoL/74BJdEz6OpVzHaWykyQ+ -ecdHKQScbeL6mKLvEPb4AOoJO8SQf/ND39xqAd3GMq44vdE2w+YFwWA+f9mPQnrx -ZlT4L/CoMYRz+SYrcQJOalPWyLdesCdAsyTuk3bzF12U9tk6t1f/+noJE7h/9GLo -BgwdlPB6Kq+dgtreQiaiQs2gq16tlJfifPWR+TnSOyaVo0O0jCDKXnyvB0gkH78y -jvCihf908b18RGOfz5F0uKgKWXBXEpLXybfqYaPnal9MNjy4kMY6S0RC0IK7hGRK -Aw== ------END CERTIFICATE----- diff --git a/tests/certs/test-localhost.nn.key b/tests/certs/test-localhost.nn.key deleted file mode 100644 index cbe4520630..0000000000 --- a/tests/certs/test-localhost.nn.key +++ /dev/null @@ -1,27 +0,0 @@ ------BEGIN RSA PRIVATE KEY----- -MIIEowIBAAKCAQEAyAQGPsdxkGvjzjkEPXBbolD7np9o2Tbwh7mCZTqaKv434OCW -8CdLwPIBMxG6ugY9c3c0nw392Noev01k04DQZei1Jcvp1W4uRpwqGAc2Rhei24kI -E/ZEAYKPRYu0oXuLhzZm4D4BrQwpBwI9W2fsCy7DO8baIJlfz230dxJ7vh/DtCZc -+H6GOX8H+BIVNkcLG/AC1mVcuhmtn7BDn1RJT8gMiQfEeJHAPWSHuqMwoMcVLNGp -fMsUnoxVUJLMrmQn3+tUhqERVXRgU1vM3J56hZvl5S4DoiMZI5h2h7FLYxNgjrrF -xu3Y0v2tod0VN6aR8sjr92ju//PVx4GjEjp5LQIDAQABAoIBAQCmscvuqFO6NGCw -Lw6ckbac6Xc69MnyNfpycyX8bcGs0SAK18KTtXxJ+qcLQ9xmSusN/ywo3wVPpEF5 -1+uO5c1JEY9fR7nC+cexa1cdnW0bL3m4E1VbJaP5yjDTmiJZbtiTQMCuZJ8K9JaA -09oFAvBTRY7Kk+iYwJp8CrxyPEJK6T7eMMLaLkT9VkRfl3om/cbND4waf15ev7bk -QyMGNkWbcq4EFto8+OnEifrTBv/InZu31/XzIJO1HW44sf4+/WdUehlEpR1FEfYt -nFQvJz9w8EQPqTcuE3coQyXAgzjNnRDLXMHeLnVwydHH9Yrh+qY0YyASq6Na/gke -FtaOPnr1AoGBAOkaMmFIVwrGPNjLysJf0/qjke86v4HN7EpeM1D98jL4EemS9Lch -fmeUCHRtbjWcCRT6azDZa/hAe0Qe1QE+y7HdkMrDRf94aWwyRl+fvmMWeki8izv3 -3MtK6BZf5rGqt5GAwg8n9eq64SgAh88FdUJ90ULkZLO799ODtaRMKEJDAoGBANup -zTURGY+dmFoIHBBLQT8+Hs5KoqP3fvxR2a3SytHHEaJfxGcJTaFs4mJ/fqgWm3S2 -w1c4J1OlxJjSY0UcYkqqDF6LnH3T9B4Jrwo0IJsB0BG5oJi2xZj8OEQg8Z0a3b/p -3DXm3G2toD0MU6TUQMRtBEaWRxd1YQcMuE+5BbfPAoGAeEM/wtkjrzdfpSpfTbFL -GIDThe11aG7pfeTj7OFX19wMwclD4Eezg5ToV8ktlxMNzHj2XJmQDuCVuCuAEcho -Jzf8v9/HeWqSWXQGwscT3uN165j67NGQZIIdA44u43MEilk3xcIEKjqId67uYmya -dtea4zwaiHBuB/5n9IAmNSkCgYBiwzOqeme9tKO9RwwnH07Uun9rTQ9XHX4QwFRY -3P+n1hNNqDVMBljLDYOzuZMezBtVHJ8zZeH4r/12oJFVj296Fn69O5Q+1r9Zig0T -T2ChkO0WKxnTz8mEAVLi/tTjSCMPmHwUGBpfjcMP76zj3TLJniJgAk0wdOwNGWD9 -Jzk07QKBgBBsK9q29qyLwOsqfTISwxZVCT+zj/7YMfxvo4RBWNq9SfWJhsGsZpXD -DBX0My+Qrf0Vl6CV2l2zpqZxe+nGSeCDelJZaqYjhoRAynnawOZ3fNBmBNt7U6jX -dze4yPef6lUpeVaxPgwCgePUAlvgScV7fqlv4jClGlrwk9DH1YcG ------END RSA PRIVATE KEY----- diff --git a/tests/certs/test-localhost.nn.pem b/tests/certs/test-localhost.nn.pem deleted file mode 100644 index 09d93f8d34..0000000000 --- a/tests/certs/test-localhost.nn.pem +++ /dev/null @@ -1,166 +0,0 @@ -extensions = x509v3 - -[ x509v3 ] -subjectAltName = DNS:localhost.nn -keyUsage = keyEncipherment,digitalSignature,keyAgreement -extendedKeyUsage = serverAuth -subjectKeyIdentifier = hash -authorityKeyIdentifier = keyid -basicConstraints = CA:false -authorityInfoAccess = @issuer_info -crlDistributionPoints = @crl_info - -[ crl_ext ] -authorityKeyIdentifier = keyid:always -authorityInfoAccess = @issuer_info - -[ issuer_info ] -caIssuers;URI.0 = http://test.curl.se/ca/EdelCurlRoot.cer - -[ crl_info ] -URI.0 = http://test.curl.se/ca/EdelCurlRoot.crl - -[ req ] -default_bits = 1024 -distinguished_name = req_DN -default_md = sha256 -string_mask = utf8only - -[ req_DN ] -countryName = "Country Name is Northern Nowhere" -countryName_value = NN -organizationName = "Organization Name" -organizationName_value = Edel Curl Arctic Illudium Research Cloud -commonName = "Common Name" -commonName_value = localhost.nn ------BEGIN RSA PRIVATE KEY----- -MIIEowIBAAKCAQEAyAQGPsdxkGvjzjkEPXBbolD7np9o2Tbwh7mCZTqaKv434OCW -8CdLwPIBMxG6ugY9c3c0nw392Noev01k04DQZei1Jcvp1W4uRpwqGAc2Rhei24kI -E/ZEAYKPRYu0oXuLhzZm4D4BrQwpBwI9W2fsCy7DO8baIJlfz230dxJ7vh/DtCZc -+H6GOX8H+BIVNkcLG/AC1mVcuhmtn7BDn1RJT8gMiQfEeJHAPWSHuqMwoMcVLNGp -fMsUnoxVUJLMrmQn3+tUhqERVXRgU1vM3J56hZvl5S4DoiMZI5h2h7FLYxNgjrrF -xu3Y0v2tod0VN6aR8sjr92ju//PVx4GjEjp5LQIDAQABAoIBAQCmscvuqFO6NGCw -Lw6ckbac6Xc69MnyNfpycyX8bcGs0SAK18KTtXxJ+qcLQ9xmSusN/ywo3wVPpEF5 -1+uO5c1JEY9fR7nC+cexa1cdnW0bL3m4E1VbJaP5yjDTmiJZbtiTQMCuZJ8K9JaA -09oFAvBTRY7Kk+iYwJp8CrxyPEJK6T7eMMLaLkT9VkRfl3om/cbND4waf15ev7bk -QyMGNkWbcq4EFto8+OnEifrTBv/InZu31/XzIJO1HW44sf4+/WdUehlEpR1FEfYt -nFQvJz9w8EQPqTcuE3coQyXAgzjNnRDLXMHeLnVwydHH9Yrh+qY0YyASq6Na/gke -FtaOPnr1AoGBAOkaMmFIVwrGPNjLysJf0/qjke86v4HN7EpeM1D98jL4EemS9Lch -fmeUCHRtbjWcCRT6azDZa/hAe0Qe1QE+y7HdkMrDRf94aWwyRl+fvmMWeki8izv3 -3MtK6BZf5rGqt5GAwg8n9eq64SgAh88FdUJ90ULkZLO799ODtaRMKEJDAoGBANup -zTURGY+dmFoIHBBLQT8+Hs5KoqP3fvxR2a3SytHHEaJfxGcJTaFs4mJ/fqgWm3S2 -w1c4J1OlxJjSY0UcYkqqDF6LnH3T9B4Jrwo0IJsB0BG5oJi2xZj8OEQg8Z0a3b/p -3DXm3G2toD0MU6TUQMRtBEaWRxd1YQcMuE+5BbfPAoGAeEM/wtkjrzdfpSpfTbFL -GIDThe11aG7pfeTj7OFX19wMwclD4Eezg5ToV8ktlxMNzHj2XJmQDuCVuCuAEcho -Jzf8v9/HeWqSWXQGwscT3uN165j67NGQZIIdA44u43MEilk3xcIEKjqId67uYmya -dtea4zwaiHBuB/5n9IAmNSkCgYBiwzOqeme9tKO9RwwnH07Uun9rTQ9XHX4QwFRY -3P+n1hNNqDVMBljLDYOzuZMezBtVHJ8zZeH4r/12oJFVj296Fn69O5Q+1r9Zig0T -T2ChkO0WKxnTz8mEAVLi/tTjSCMPmHwUGBpfjcMP76zj3TLJniJgAk0wdOwNGWD9 -Jzk07QKBgBBsK9q29qyLwOsqfTISwxZVCT+zj/7YMfxvo4RBWNq9SfWJhsGsZpXD -DBX0My+Qrf0Vl6CV2l2zpqZxe+nGSeCDelJZaqYjhoRAynnawOZ3fNBmBNt7U6jX -dze4yPef6lUpeVaxPgwCgePUAlvgScV7fqlv4jClGlrwk9DH1YcG ------END RSA PRIVATE KEY----- -Certificate: - Data: - Version: 3 (0x2) - Serial Number: - 81:34:c8:2d:81:f0:54:20 - Signature Algorithm: sha256WithRSAEncryption - Issuer: - countryName = NN - organizationName = Edel Curl Arctic Illudium Research Cloud - commonName = Northern Nowhere Trust Anchor - Validity - Not Before: Mar 6 11:51:47 2025 GMT - Not After : Dec 31 11:51:47 2025 GMT - Subject: - countryName = NN - organizationName = Edel Curl Arctic Illudium Research Cloud - commonName = localhost.nn - Subject Public Key Info: - Public Key Algorithm: rsaEncryption - RSA Public-Key: (2048 bit) - Modulus: - 00:c8:04:06:3e:c7:71:90:6b:e3:ce:39:04:3d:70: - 5b:a2:50:fb:9e:9f:68:d9:36:f0:87:b9:82:65:3a: - 9a:2a:fe:37:e0:e0:96:f0:27:4b:c0:f2:01:33:11: - ba:ba:06:3d:73:77:34:9f:0d:fd:d8:da:1e:bf:4d: - 64:d3:80:d0:65:e8:b5:25:cb:e9:d5:6e:2e:46:9c: - 2a:18:07:36:46:17:a2:db:89:08:13:f6:44:01:82: - 8f:45:8b:b4:a1:7b:8b:87:36:66:e0:3e:01:ad:0c: - 29:07:02:3d:5b:67:ec:0b:2e:c3:3b:c6:da:20:99: - 5f:cf:6d:f4:77:12:7b:be:1f:c3:b4:26:5c:f8:7e: - 86:39:7f:07:f8:12:15:36:47:0b:1b:f0:02:d6:65: - 5c:ba:19:ad:9f:b0:43:9f:54:49:4f:c8:0c:89:07: - c4:78:91:c0:3d:64:87:ba:a3:30:a0:c7:15:2c:d1: - a9:7c:cb:14:9e:8c:55:50:92:cc:ae:64:27:df:eb: - 54:86:a1:11:55:74:60:53:5b:cc:dc:9e:7a:85:9b: - e5:e5:2e:03:a2:23:19:23:98:76:87:b1:4b:63:13: - 60:8e:ba:c5:c6:ed:d8:d2:fd:ad:a1:dd:15:37:a6: - 91:f2:c8:eb:f7:68:ee:ff:f3:d5:c7:81:a3:12:3a: - 79:2d - Exponent: 65537 (0x10001) - X509v3 extensions: - X509v3 Subject Alternative Name: - DNS:localhost.nn - X509v3 Key Usage: - Digital Signature, Key Encipherment, Key Agreement - X509v3 Extended Key Usage: - TLS Web Server Authentication - X509v3 Subject Key Identifier: - F7:82:F9:EF:7C:0E:14:42:64:61:2C:F0:9C:36:F2:C0:B5:76:C8:1A - X509v3 Authority Key Identifier: - keyid:9D:2B:CE:95:BF:D8:22:91:A2:E5:AD:FE:79:0E:E9:23:E1:4D:28:32 - - X509v3 Basic Constraints: - CA:FALSE - Authority Information Access: - CA Issuers - URI:http://test.curl.se/ca/EdelCurlRoot.cer - - X509v3 CRL Distribution Points: - - Full Name: - URI:http://test.curl.se/ca/EdelCurlRoot.crl - - Signature Algorithm: sha256WithRSAEncryption - 8a:4a:da:16:6e:86:84:f9:3d:8e:76:cf:e5:32:b3:aa:c1:23: - 87:e6:f7:2e:e9:f0:9f:5d:a0:88:e8:68:71:6d:52:12:53:db: - dc:9e:8f:ac:de:95:a2:a7:d6:9e:82:ff:ef:80:49:74:4c:fa: - 3a:95:73:1d:a5:b2:93:24:3e:79:c7:47:29:04:9c:6d:e2:fa: - 98:a2:ef:10:f6:f8:00:ea:09:3b:c4:90:7f:f3:43:df:dc:6a: - 01:dd:c6:32:ae:38:bd:d1:36:c3:e6:05:c1:60:3e:7f:d9:8f: - 42:7a:f1:66:54:f8:2f:f0:a8:31:84:73:f9:26:2b:71:02:4e: - 6a:53:d6:c8:b7:5e:b0:27:40:b3:24:ee:93:76:f3:17:5d:94: - f6:d9:3a:b7:57:ff:fa:7a:09:13:b8:7f:f4:62:e8:06:0c:1d: - 94:f0:7a:2a:af:9d:82:da:de:42:26:a2:42:cd:a0:ab:5e:ad: - 94:97:e2:7c:f5:91:f9:39:d2:3b:26:95:a3:43:b4:8c:20:ca: - 5e:7c:af:07:48:24:1f:bf:32:8e:f0:a2:85:ff:74:f1:bd:7c: - 44:63:9f:cf:91:74:b8:a8:0a:59:70:57:12:92:d7:c9:b7:ea: - 61:a3:e7:6a:5f:4c:36:3c:b8:90:c6:3a:4b:44:42:d0:82:bb: - 84:64:4a:03 ------BEGIN CERTIFICATE----- -MIIETTCCAzWgAwIBAgIJAIE0yC2B8FQgMA0GCSqGSIb3DQEBCwUAMGgxCzAJBgNV -BAYTAk5OMTEwLwYDVQQKDChFZGVsIEN1cmwgQXJjdGljIElsbHVkaXVtIFJlc2Vh -cmNoIENsb3VkMSYwJAYDVQQDDB1Ob3J0aGVybiBOb3doZXJlIFRydXN0IEFuY2hv -cjAeFw0yNTAzMDYxMTUxNDdaFw0yNTEyMzExMTUxNDdaMFcxCzAJBgNVBAYTAk5O -MTEwLwYDVQQKDChFZGVsIEN1cmwgQXJjdGljIElsbHVkaXVtIFJlc2VhcmNoIENs -b3VkMRUwEwYDVQQDDAxsb2NhbGhvc3Qubm4wggEiMA0GCSqGSIb3DQEBAQUAA4IB -DwAwggEKAoIBAQDIBAY+x3GQa+POOQQ9cFuiUPuen2jZNvCHuYJlOpoq/jfg4Jbw -J0vA8gEzEbq6Bj1zdzSfDf3Y2h6/TWTTgNBl6LUly+nVbi5GnCoYBzZGF6LbiQgT -9kQBgo9Fi7She4uHNmbgPgGtDCkHAj1bZ+wLLsM7xtogmV/PbfR3Enu+H8O0Jlz4 -foY5fwf4EhU2Rwsb8ALWZVy6Ga2fsEOfVElPyAyJB8R4kcA9ZIe6ozCgxxUs0al8 -yxSejFVQksyuZCff61SGoRFVdGBTW8zcnnqFm+XlLgOiIxkjmHaHsUtjE2COusXG -7djS/a2h3RU3ppHyyOv3aO7/89XHgaMSOnktAgMBAAGjggEJMIIBBTAXBgNVHREE -EDAOggxsb2NhbGhvc3Qubm4wCwYDVR0PBAQDAgOoMBMGA1UdJQQMMAoGCCsGAQUF -BwMBMB0GA1UdDgQWBBT3gvnvfA4UQmRhLPCcNvLAtXbIGjAfBgNVHSMEGDAWgBSd -K86Vv9gikaLlrf55Dukj4U0oMjAJBgNVHRMEAjAAMEMGCCsGAQUFBwEBBDcwNTAz -BggrBgEFBQcwAoYnaHR0cDovL3Rlc3QuY3VybC5zZS9jYS9FZGVsQ3VybFJvb3Qu -Y2VyMDgGA1UdHwQxMC8wLaAroCmGJ2h0dHA6Ly90ZXN0LmN1cmwuc2UvY2EvRWRl -bEN1cmxSb290LmNybDANBgkqhkiG9w0BAQsFAAOCAQEAikraFm6GhPk9jnbP5TKz -qsEjh+b3Lunwn12giOhocW1SElPb3J6PrN6VoqfWnoL/74BJdEz6OpVzHaWykyQ+ -ecdHKQScbeL6mKLvEPb4AOoJO8SQf/ND39xqAd3GMq44vdE2w+YFwWA+f9mPQnrx -ZlT4L/CoMYRz+SYrcQJOalPWyLdesCdAsyTuk3bzF12U9tk6t1f/+noJE7h/9GLo -BgwdlPB6Kq+dgtreQiaiQs2gq16tlJfifPWR+TnSOyaVo0O0jCDKXnyvB0gkH78y -jvCihf908b18RGOfz5F0uKgKWXBXEpLXybfqYaPnal9MNjy4kMY6S0RC0IK7hGRK -Aw== ------END CERTIFICATE----- diff --git a/tests/certs/test-localhost.nn.pub.der b/tests/certs/test-localhost.nn.pub.der deleted file mode 100644 index 8a837ffb55..0000000000 Binary files a/tests/certs/test-localhost.nn.pub.der and /dev/null differ diff --git a/tests/certs/test-localhost.nn.pub.pem b/tests/certs/test-localhost.nn.pub.pem deleted file mode 100644 index 390afc3761..0000000000 --- a/tests/certs/test-localhost.nn.pub.pem +++ /dev/null @@ -1,9 +0,0 @@ ------BEGIN PUBLIC KEY----- -MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAyAQGPsdxkGvjzjkEPXBb -olD7np9o2Tbwh7mCZTqaKv434OCW8CdLwPIBMxG6ugY9c3c0nw392Noev01k04DQ -Zei1Jcvp1W4uRpwqGAc2Rhei24kIE/ZEAYKPRYu0oXuLhzZm4D4BrQwpBwI9W2fs -Cy7DO8baIJlfz230dxJ7vh/DtCZc+H6GOX8H+BIVNkcLG/AC1mVcuhmtn7BDn1RJ -T8gMiQfEeJHAPWSHuqMwoMcVLNGpfMsUnoxVUJLMrmQn3+tUhqERVXRgU1vM3J56 -hZvl5S4DoiMZI5h2h7FLYxNgjrrFxu3Y0v2tod0VN6aR8sjr92ju//PVx4GjEjp5 -LQIDAQAB ------END PUBLIC KEY----- diff --git a/tests/certs/test-localhost.pem b/tests/certs/test-localhost.pem deleted file mode 100644 index 8c62ddd361..0000000000 --- a/tests/certs/test-localhost.pem +++ /dev/null @@ -1,165 +0,0 @@ -extensions = x509v3 - -[ x509v3 ] -subjectAltName = DNS:localhost -keyUsage = keyEncipherment,digitalSignature,keyAgreement -extendedKeyUsage = serverAuth -subjectKeyIdentifier = hash -authorityKeyIdentifier = keyid -basicConstraints = CA:false -authorityInfoAccess = @issuer_info -crlDistributionPoints = @crl_info - -[ crl_ext ] -authorityKeyIdentifier = keyid:always -authorityInfoAccess = @issuer_info - -[ issuer_info ] -caIssuers;URI.0 = http://test.curl.se/ca/EdelCurlRoot.cer - -[ crl_info ] -URI.0 = http://test.curl.se/ca/EdelCurlRoot.crl - -[ req ] -default_bits = 2048 -distinguished_name = req_DN -default_md = sha256 -string_mask = utf8only - -[ req_DN ] -countryName = "Country Name is Northern Nowhere" -countryName_value = NN -organizationName = "Organization Name" -organizationName_value = Edel Curl Arctic Illudium Research Cloud -commonName = "Common Name" -commonName_value = localhost ------BEGIN RSA PRIVATE KEY----- -MIIEpAIBAAKCAQEA5g2vWV5TVz9OweL4zzBl3WITMUYL0GCAUQ0JM43hsg8K8vwQ -C+E6aUPD6euLRYvVJg69yNSmDxsAjXQ2YDCg4CTH+twM44Nsi9H9Kqij0yH/xTxH -GgnhjDJ5dEnp8t/3Tay0B+yBQCdls5Rpds1XHyFg37R8CC8z/XbMI8jtHPu7inQu -/nwd0y8iLf8RfZJQzMAGrJWoswZCgwkcUoHRFCG/0bCZUHpqEAww1fDkGsddG+m+ -vsVU6+RyBDXEFKG6IEUvYMjhod61ZfcqXQXRki0izhrKwjX9fPYCR4UijF1uTylr -OvmEc4lKZHufvf4KTaAIekF3o926ySBYoXy4sQIDAQABAoIBAQCorDH7sWgjmRwy -lirdJlwZlFYEE5qH3qlWQ9uSPB3VwqfBfkR5oVqFYZUcRoInrJ3MOJS30gorGx4t -mJ5hqmXZ0b36VSryCSMl5QHdLCZpoAz63PY4xjPj6gIY3DS2ybV18wFQqfweQISV -xWQKIgYVohB4FMm36nwRA/Aq8J/BVgC/SIGJnDW2EGId5op20BdH7APedquXqzzp -FwETV3hH7QDbdip+Td+5/Nnc9yLg4ecSvOLe5mLaGXgsxhNqAKnY5f3izMh+FTvx -jgR12x/urhu4mwpKie7Y/JO+FsNJYevHHKYX1wUhGO2Puco4bCUiAecmrO4lFOMX -auBjsCQtAoGBAPcnzQy8UIHBSxgUaQ2zEWtQNKg/lYy3BiM7rTq8HIAEggL5ylxv -bP17tIQQZAhayaeR1BKL7yP8d5UlZedI9gzMP23mNsrxpC2BsmcBEZZQFRRFhWsD -bnVWWQkx6KgVIDtZwQF1OhNUuZxUkTlXMSuSdNNVJADIHd8y7oxaGGvHAoGBAO5J -Nj3L7eh9Eoh4iEMbyOu1iymE+jdzuY80wVBacMinjpmGE6wlIf/bvwb2/xGMd+Ix -Sd60wCg/obN/62EAWaiJH88qrF5Uj+l2u1tmp3oRMOiBkXbLhEXzGP9Qcoa6s8gT -HjatboUgCUuSQrY4OUu+wmqwufBh7poSGFUs/YfHAoGBAL5svgG3/ddbVD5jS2Ww -uBUUoN2Yz+KxCVuQGTINyW+hCYK9bnq1pyXOcBDoiAof2QrwwpLfmgsB9CjHvbHr -dxf5Lk3AeCr47uPY79mI60ICxZruzZLb+/kP5F2/RGBsln7j8l7rMSm/t5qJVbL2 -SP4nQzeoe6rWhJ15om4k5Hf1AoGAGpuGOQRKfoloxmBfJs81ckyFS4+TuRltAPat -F2Hh8iXzoGT+UVycHUvWWtq9xKHgyRsj2oBobJYeYkLIb75wRId7S9DCCo56u2EM -rroZvWGqCmxdZ9x12rG4etnqz+yNIqwv1X8sNiVLpGqilGJW04RrhSpSuOrWj9Gx -ceFiNgUCgYBAAubXkD1rcIs2X8Ds3ztwYPaGL8ZX4q8eWvncgjz3YmVve408XD0w -Sd44NWgjK2LXMv3ddXFdukoDmGm75KhDHWKO9vPBo0wpB5FXkMyHiDyM65X0MZC8 -xzSd9dUcy7TBjMVV2ge81b6U8nCwrdrU2L/0dzigmKnrLrF8MRjFLA== ------END RSA PRIVATE KEY----- -Certificate: - Data: - Version: 3 (0x2) - Serial Number: - 81:34:c8:2d:81:f0:54:1f - Signature Algorithm: sha256WithRSAEncryption - Issuer: - countryName = NN - organizationName = Edel Curl Arctic Illudium Research Cloud - commonName = Northern Nowhere Trust Anchor - Validity - Not Before: Mar 6 11:51:47 2025 GMT - Not After : Dec 31 11:51:47 2025 GMT - Subject: - countryName = NN - organizationName = Edel Curl Arctic Illudium Research Cloud - commonName = localhost - Subject Public Key Info: - Public Key Algorithm: rsaEncryption - RSA Public-Key: (2048 bit) - Modulus: - 00:e6:0d:af:59:5e:53:57:3f:4e:c1:e2:f8:cf:30: - 65:dd:62:13:31:46:0b:d0:60:80:51:0d:09:33:8d: - e1:b2:0f:0a:f2:fc:10:0b:e1:3a:69:43:c3:e9:eb: - 8b:45:8b:d5:26:0e:bd:c8:d4:a6:0f:1b:00:8d:74: - 36:60:30:a0:e0:24:c7:fa:dc:0c:e3:83:6c:8b:d1: - fd:2a:a8:a3:d3:21:ff:c5:3c:47:1a:09:e1:8c:32: - 79:74:49:e9:f2:df:f7:4d:ac:b4:07:ec:81:40:27: - 65:b3:94:69:76:cd:57:1f:21:60:df:b4:7c:08:2f: - 33:fd:76:cc:23:c8:ed:1c:fb:bb:8a:74:2e:fe:7c: - 1d:d3:2f:22:2d:ff:11:7d:92:50:cc:c0:06:ac:95: - a8:b3:06:42:83:09:1c:52:81:d1:14:21:bf:d1:b0: - 99:50:7a:6a:10:0c:30:d5:f0:e4:1a:c7:5d:1b:e9: - be:be:c5:54:eb:e4:72:04:35:c4:14:a1:ba:20:45: - 2f:60:c8:e1:a1:de:b5:65:f7:2a:5d:05:d1:92:2d: - 22:ce:1a:ca:c2:35:fd:7c:f6:02:47:85:22:8c:5d: - 6e:4f:29:6b:3a:f9:84:73:89:4a:64:7b:9f:bd:fe: - 0a:4d:a0:08:7a:41:77:a3:dd:ba:c9:20:58:a1:7c: - b8:b1 - Exponent: 65537 (0x10001) - X509v3 extensions: - X509v3 Subject Alternative Name: - DNS:localhost - X509v3 Key Usage: - Digital Signature, Key Encipherment, Key Agreement - X509v3 Extended Key Usage: - TLS Web Server Authentication - X509v3 Subject Key Identifier: - B4:23:96:D3:28:32:87:90:18:46:E5:2D:CD:D3:DB:4F:9B:92:76:79 - X509v3 Authority Key Identifier: - keyid:9D:2B:CE:95:BF:D8:22:91:A2:E5:AD:FE:79:0E:E9:23:E1:4D:28:32 - - X509v3 Basic Constraints: - CA:FALSE - Authority Information Access: - CA Issuers - URI:http://test.curl.se/ca/EdelCurlRoot.cer - - X509v3 CRL Distribution Points: - - Full Name: - URI:http://test.curl.se/ca/EdelCurlRoot.crl - - Signature Algorithm: sha256WithRSAEncryption - 43:b8:3e:47:2e:1c:8e:76:16:4d:c5:04:89:c9:d3:42:5c:af: - 97:27:da:6a:7f:bb:6d:49:51:0c:60:c7:0b:ce:8f:a3:33:26: - ae:f8:75:fa:c8:43:65:b7:c1:a4:eb:bb:9b:50:e4:97:8f:78: - b0:a7:00:95:5e:ac:3d:39:96:a6:39:a6:96:ad:5c:1b:e0:d3: - 81:91:25:f1:1c:bd:dd:70:d5:8d:44:03:6e:8c:93:66:98:fd: - 1d:66:b8:58:6a:90:11:26:44:3b:4e:8a:c4:ef:f7:4c:f4:57: - ba:75:f5:dd:24:43:82:29:12:e8:4e:fc:9e:6f:a8:8e:e7:01: - ff:56:e4:2d:62:02:99:a1:a9:fa:45:46:48:58:17:e8:ee:37: - 31:39:08:b6:a3:55:7e:6a:c5:3e:c0:1c:03:39:bc:64:d8:8d: - 7e:57:35:71:14:38:77:64:3a:3f:b4:4b:e8:10:31:a1:08:8c: - 2f:e8:de:d4:f8:a0:e6:07:3b:12:8e:12:83:eb:e3:ba:7c:91: - b3:50:5e:f3:df:6d:3f:c1:70:f3:5c:e5:0c:84:1a:9d:5a:ae: - bc:ac:53:f2:b6:e5:66:f8:00:c0:74:af:ed:e2:89:36:a6:c2: - 8b:90:8d:6c:23:a3:60:2e:49:1d:dd:d2:19:45:cb:cf:a4:c3: - 87:9c:fb:8f ------BEGIN CERTIFICATE----- -MIIERzCCAy+gAwIBAgIJAIE0yC2B8FQfMA0GCSqGSIb3DQEBCwUAMGgxCzAJBgNV -BAYTAk5OMTEwLwYDVQQKDChFZGVsIEN1cmwgQXJjdGljIElsbHVkaXVtIFJlc2Vh -cmNoIENsb3VkMSYwJAYDVQQDDB1Ob3J0aGVybiBOb3doZXJlIFRydXN0IEFuY2hv -cjAeFw0yNTAzMDYxMTUxNDdaFw0yNTEyMzExMTUxNDdaMFQxCzAJBgNVBAYTAk5O -MTEwLwYDVQQKDChFZGVsIEN1cmwgQXJjdGljIElsbHVkaXVtIFJlc2VhcmNoIENs -b3VkMRIwEAYDVQQDDAlsb2NhbGhvc3QwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAw -ggEKAoIBAQDmDa9ZXlNXP07B4vjPMGXdYhMxRgvQYIBRDQkzjeGyDwry/BAL4Tpp -Q8Pp64tFi9UmDr3I1KYPGwCNdDZgMKDgJMf63Azjg2yL0f0qqKPTIf/FPEcaCeGM -Mnl0Seny3/dNrLQH7IFAJ2WzlGl2zVcfIWDftHwILzP9dswjyO0c+7uKdC7+fB3T -LyIt/xF9klDMwAaslaizBkKDCRxSgdEUIb/RsJlQemoQDDDV8OQax10b6b6+xVTr -5HIENcQUobogRS9gyOGh3rVl9ypdBdGSLSLOGsrCNf189gJHhSKMXW5PKWs6+YRz -iUpke5+9/gpNoAh6QXej3brJIFihfLixAgMBAAGjggEGMIIBAjAUBgNVHREEDTAL -gglsb2NhbGhvc3QwCwYDVR0PBAQDAgOoMBMGA1UdJQQMMAoGCCsGAQUFBwMBMB0G -A1UdDgQWBBS0I5bTKDKHkBhG5S3N09tPm5J2eTAfBgNVHSMEGDAWgBSdK86Vv9gi -kaLlrf55Dukj4U0oMjAJBgNVHRMEAjAAMEMGCCsGAQUFBwEBBDcwNTAzBggrBgEF -BQcwAoYnaHR0cDovL3Rlc3QuY3VybC5zZS9jYS9FZGVsQ3VybFJvb3QuY2VyMDgG -A1UdHwQxMC8wLaAroCmGJ2h0dHA6Ly90ZXN0LmN1cmwuc2UvY2EvRWRlbEN1cmxS -b290LmNybDANBgkqhkiG9w0BAQsFAAOCAQEAQ7g+Ry4cjnYWTcUEicnTQlyvlyfa -an+7bUlRDGDHC86PozMmrvh1+shDZbfBpOu7m1Dkl494sKcAlV6sPTmWpjmmlq1c -G+DTgZEl8Ry93XDVjUQDboyTZpj9HWa4WGqQESZEO06KxO/3TPRXunX13SRDgikS -6E78nm+ojucB/1bkLWICmaGp+kVGSFgX6O43MTkItqNVfmrFPsAcAzm8ZNiNflc1 -cRQ4d2Q6P7RL6BAxoQiML+je1Pig5gc7Eo4Sg+vjunyRs1Be899tP8Fw81zlDIQa -nVquvKxT8rblZvgAwHSv7eKJNqbCi5CNbCOjYC5JHd3SGUXLz6TDh5z7jw== ------END CERTIFICATE----- diff --git a/tests/certs/test-localhost.pub.der b/tests/certs/test-localhost.pub.der deleted file mode 100644 index 47331fd1a2..0000000000 Binary files a/tests/certs/test-localhost.pub.der and /dev/null differ diff --git a/tests/certs/test-localhost.pub.pem b/tests/certs/test-localhost.pub.pem deleted file mode 100644 index 62e399b1fc..0000000000 --- a/tests/certs/test-localhost.pub.pem +++ /dev/null @@ -1,9 +0,0 @@ ------BEGIN PUBLIC KEY----- -MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA5g2vWV5TVz9OweL4zzBl -3WITMUYL0GCAUQ0JM43hsg8K8vwQC+E6aUPD6euLRYvVJg69yNSmDxsAjXQ2YDCg -4CTH+twM44Nsi9H9Kqij0yH/xTxHGgnhjDJ5dEnp8t/3Tay0B+yBQCdls5Rpds1X -HyFg37R8CC8z/XbMI8jtHPu7inQu/nwd0y8iLf8RfZJQzMAGrJWoswZCgwkcUoHR -FCG/0bCZUHpqEAww1fDkGsddG+m+vsVU6+RyBDXEFKG6IEUvYMjhod61ZfcqXQXR -ki0izhrKwjX9fPYCR4UijF1uTylrOvmEc4lKZHufvf4KTaAIekF3o926ySBYoXy4 -sQIDAQAB ------END PUBLIC KEY----- diff --git a/tests/certs/test-localhost0h.crl b/tests/certs/test-localhost0h.crl deleted file mode 100644 index 0a0a310a06..0000000000 --- a/tests/certs/test-localhost0h.crl +++ /dev/null @@ -1,37 +0,0 @@ ------BEGIN X509 CRL----- -MIIGejCCBWICAQEwDQYJKoZIhvcNAQELBQAwaDELMAkGA1UEBhMCTk4xMTAvBgNV -BAoMKEVkZWwgQ3VybCBBcmN0aWMgSWxsdWRpdW0gUmVzZWFyY2ggQ2xvdWQxJjAk -BgNVBAMMHU5vcnRoZXJuIE5vd2hlcmUgVHJ1c3QgQW5jaG9yFw0yNTAzMDYxMTUx -NDhaFw0yNTA0MDUxMTUxNDhaMIIEtDAaAgkAgTTILYHwU/cXDTI1MDMwNjEwMTkz -NFowGgIJAIE0yC2B8FP4Fw0yNTAzMDYxMDE5MzRaMBoCCQCBNMgtgfBT+RcNMjUw -MzA2MTAxOTM0WjAaAgkAgTTILYHwU/oXDTI1MDMwNjEwMTkzNVowGgIJAIE0yC2B -8FP7Fw0yNTAzMDYxMDE5MzVaMBoCCQCBNMgtgfBT/BcNMjUwMzA2MTAxOTM1WjAa -AgkAgTTILYHwU/0XDTI1MDMwNjEwNDMzOVowGgIJAIE0yC2B8FP+Fw0yNTAzMDYx -MDQzMzlaMBoCCQCBNMgtgfBT/xcNMjUwMzA2MTA0MzQwWjAaAgkAgTTILYHwVAAX -DTI1MDMwNjEwNDM0MFowGgIJAIE0yC2B8FQBFw0yNTAzMDYxMDQzNDBaMBoCCQCB -NMgtgfBUAhcNMjUwMzA2MTA0NjA4WjAaAgkAgTTILYHwVAMXDTI1MDMwNjEwNDYw -OFowGgIJAIE0yC2B8FQEFw0yNTAzMDYxMDQ2MDhaMBoCCQCBNMgtgfBUBRcNMjUw -MzA2MTA0NjA4WjAaAgkAgTTILYHwVAYXDTI1MDMwNjEwNDYwOVowGgIJAIE0yC2B -8FQHFw0yNTAzMDYxMDQ2MDlaMBoCCQCBNMgtgfBUCBcNMjUwMzA2MTA0ODU5WjAa -AgkAgTTILYHwVAkXDTI1MDMwNjEwNDg1OVowGgIJAIE0yC2B8FQKFw0yNTAzMDYx -MDQ4NTlaMBoCCQCBNMgtgfBUCxcNMjUwMzA2MTA0ODU5WjAaAgkAgTTILYHwVAwX -DTI1MDMwNjEwNDkwMFowGgIJAIE0yC2B8FQNFw0yNTAzMDYxMDQ5MDBaMBoCCQCB -NMgtgfBUDhcNMjUwMzA2MTExMzM4WjAaAgkAgTTILYHwVA8XDTI1MDMwNjExMTMz -OFowGgIJAIE0yC2B8FQQFw0yNTAzMDYxMTEzMzhaMBoCCQCBNMgtgfBUERcNMjUw -MzA2MTExMzM4WjAaAgkAgTTILYHwVBIXDTI1MDMwNjExMTMzOFowGgIJAIE0yC2B -8FQTFw0yNTAzMDYxMTE1MzBaMBoCCQCBNMgtgfBUFBcNMjUwMzA2MTExNTMwWjAa -AgkAgTTILYHwVBUXDTI1MDMwNjExMTUzMFowGgIJAIE0yC2B8FQWFw0yNTAzMDYx -MTE1MzBaMBoCCQCBNMgtgfBUFxcNMjUwMzA2MTExNTMwWjAaAgkAgTTILYHwVBgX -DTI1MDMwNjExMTUzMFowGgIJAIE0yC2B8FQZFw0yNTAzMDYxMTE5MDNaMBoCCQCB -NMgtgfBUGhcNMjUwMzA2MTExOTA0WjAaAgkAgTTILYHwVBsXDTI1MDMwNjExMTkw -NFowGgIJAIE0yC2B8FQcFw0yNTAzMDYxMTE5MDRaMBoCCQCBNMgtgfBUHRcNMjUw -MzA2MTExOTA0WjAaAgkAgTTILYHwVB4XDTI1MDMwNjExMTkwNFowGgIJAIE0yC2B -8FQfFw0yNTAzMDYxMTUxNDdaMBoCCQCBNMgtgfBUIBcNMjUwMzA2MTE1MTQ4WjAa -AgkAgTTILYHwVCEXDTI1MDMwNjExNTE0OFqgDjAMMAoGA1UdFAQDAgEBMA0GCSqG -SIb3DQEBCwUAA4IBAQBZnXmwUUp0FcVGHfHWsf6rip/4cn5FYso0v4kXSI4icqZ7 -tncP3i6smiDzWqFSNp0TyKzeVvVPAwsafO6TPjUmUZXZrrU64QhJY44AEQbvl1cm -4QA+JN0RhIxr85e6X4O7VElMz0fV8T8l01izj1+SbAl4W6z3xoZNErskn9LtWY5X -HvDlgl1hZZc8bw3qZMHQJdvvJ2FHlh7j7ugBVdMZKdO0hoFCjoEMgeVSot7Hjtv1 -R0JYnTFxcuMJ/MVQmxUTdWaLnMqT9RPjzMhLRzOc2WupDvPLla63qvwBxoNWL0Cr -hkz9i899thHhosi3i+fgQ3Ynf53VoU3jXces2wqU ------END X509 CRL----- diff --git a/tests/certs/test-localhost0h.crt b/tests/certs/test-localhost0h.crt deleted file mode 100644 index a0366e8197..0000000000 --- a/tests/certs/test-localhost0h.crt +++ /dev/null @@ -1,103 +0,0 @@ -Certificate: - Data: - Version: 3 (0x2) - Serial Number: - 81:34:c8:2d:81:f0:54:21 - Signature Algorithm: sha256WithRSAEncryption - Issuer: - countryName = NN - organizationName = Edel Curl Arctic Illudium Research Cloud - commonName = Northern Nowhere Trust Anchor - Validity - Not Before: Mar 6 11:51:48 2025 GMT - Not After : Dec 31 11:51:48 2025 GMT - Subject: - countryName = NN - organizationName = Edel Curl Arctic Illudium Research Cloud - commonName = localhost - Subject Public Key Info: - Public Key Algorithm: rsaEncryption - RSA Public-Key: (2048 bit) - Modulus: - 00:bd:d7:58:68:62:0c:68:34:df:a2:1d:d9:34:fc: - f1:45:bf:cc:e3:57:38:e6:d3:07:fc:65:e1:b3:28: - ad:d6:2c:3b:2e:a9:6a:b9:07:e7:66:1f:b8:a0:c2: - 75:1d:31:84:3e:5d:98:d3:37:bb:a0:96:97:7f:f7: - 17:5e:89:ad:6e:bf:8c:0d:ef:c2:7c:f5:3b:76:0a: - 84:30:ef:bf:2f:c0:8a:a6:50:33:e1:a4:00:bd:0c: - 0c:79:04:09:d1:45:09:fe:b2:4b:a3:cf:1e:3b:65: - b4:5a:a5:a4:86:e0:d6:95:c0:a9:d7:58:ec:8e:4e: - 72:3f:33:77:f3:3d:b5:6d:63:28:85:8a:49:e5:20: - ef:56:9a:ad:f3:9d:e2:b6:ca:66:dd:06:e2:cc:09: - 86:36:c2:d0:1f:3e:33:bc:bc:c5:23:f7:2a:4c:f0: - 5b:4f:3c:60:f4:33:f3:dd:c8:ad:83:d2:45:9f:6d: - 0d:cb:b6:29:94:b8:df:3b:c3:73:7e:95:ef:e6:68: - e7:c6:22:79:4a:69:7c:85:4a:88:9d:9a:90:71:42: - 79:73:3e:b2:ed:e2:0c:4e:53:85:5a:de:e7:85:37: - 6f:0e:21:e1:f1:f0:1d:09:ec:0f:fd:69:5f:d9:74: - 71:35:4d:02:73:f3:2d:3e:9c:58:f5:48:d6:63:b4: - fb:85 - Exponent: 65537 (0x10001) - X509v3 extensions: - X509v3 Subject Alternative Name: - DNS:localhost - X509v3 Key Usage: - Digital Signature, Key Encipherment, Key Agreement - X509v3 Extended Key Usage: - TLS Web Server Authentication - X509v3 Subject Key Identifier: - F7:A5:D0:5C:C7:C2:37:AA:5D:7A:76:0B:17:61:70:C9:5D:B9:C9:55 - X509v3 Authority Key Identifier: - keyid:9D:2B:CE:95:BF:D8:22:91:A2:E5:AD:FE:79:0E:E9:23:E1:4D:28:32 - - X509v3 Basic Constraints: - CA:FALSE - Authority Information Access: - CA Issuers - URI:http://test.curl.se/ca/EdelCurlRoot.cer - - X509v3 CRL Distribution Points: - - Full Name: - URI:http://test.curl.se/ca/EdelCurlRoot.crl - - Signature Algorithm: sha256WithRSAEncryption - 28:61:05:e4:55:30:48:40:12:df:f6:fb:64:5e:10:6d:5c:48: - d2:ef:b2:c2:27:28:f0:a1:88:5a:c8:ae:cb:87:12:60:04:aa: - e0:1e:4c:c3:4c:8e:d5:8a:f8:8c:c8:3f:e5:d7:06:8a:3d:40: - c0:ea:03:dd:9c:d6:f5:68:67:71:51:4f:8d:80:1f:d3:53:09: - 5b:78:be:dc:6d:98:68:c0:38:d2:10:ad:56:95:9c:b7:56:e2: - ec:98:b7:6f:3c:f4:b5:1e:94:7b:3d:e2:f7:a4:89:b5:89:61: - 29:45:ea:05:8d:23:a3:ad:b6:ef:97:21:91:ce:f2:7d:12:3a: - e3:fc:e0:eb:85:18:eb:af:b7:51:81:2b:a2:60:01:60:d9:31: - 96:cb:9c:e3:b9:29:38:f7:51:7d:40:bf:87:6e:42:fa:74:c0: - 9b:cb:1a:95:63:30:a7:41:b4:65:e3:cc:87:2c:01:d9:00:d8: - e3:62:ab:d2:64:37:43:c2:16:36:0f:ae:a6:79:00:d6:37:37: - ff:31:6a:77:15:cc:ff:1b:52:33:9b:04:8e:f5:5b:a6:52:60: - e8:1c:b8:3e:df:b9:d5:67:ba:3d:23:d6:5a:07:cd:e8:e2:01: - 0f:57:ea:b0:fb:27:a4:2a:1b:f0:16:01:90:cc:9e:32:13:cc: - f1:bf:cb:80 ------BEGIN CERTIFICATE----- -MIIESTCCAzGgAwIBAgIJAIE0yC2B8FQhMA0GCSqGSIb3DQEBCwUAMGgxCzAJBgNV -BAYTAk5OMTEwLwYDVQQKDChFZGVsIEN1cmwgQXJjdGljIElsbHVkaXVtIFJlc2Vh -cmNoIENsb3VkMSYwJAYDVQQDDB1Ob3J0aGVybiBOb3doZXJlIFRydXN0IEFuY2hv -cjAeFw0yNTAzMDYxMTUxNDhaFw0yNTEyMzExMTUxNDhaMFQxCzAJBgNVBAYTAk5O -MTEwLwYDVQQKDChFZGVsIEN1cmwgQXJjdGljIElsbHVkaXVtIFJlc2VhcmNoIENs -b3VkMRIwEAYDVQQDDAlsb2NhbGhvc3QwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAw -ggEKAoIBAQC911hoYgxoNN+iHdk0/PFFv8zjVzjm0wf8ZeGzKK3WLDsuqWq5B+dm -H7igwnUdMYQ+XZjTN7uglpd/9xdeia1uv4wN78J89Tt2CoQw778vwIqmUDPhpAC9 -DAx5BAnRRQn+skujzx47ZbRapaSG4NaVwKnXWOyOTnI/M3fzPbVtYyiFiknlIO9W -mq3zneK2ymbdBuLMCYY2wtAfPjO8vMUj9ypM8FtPPGD0M/PdyK2D0kWfbQ3LtimU -uN87w3N+le/maOfGInlKaXyFSoidmpBxQnlzPrLt4gxOU4Va3ueFN28OIeHx8B0J -7A/9aV/ZdHE1TQJz8y0+nFj1SNZjtPuFAgMBAAGjggEIMIIBBDAWBgNVHREEDzAN -ggtsb2NhbGhvc3QAaDALBgNVHQ8EBAMCA6gwEwYDVR0lBAwwCgYIKwYBBQUHAwEw -HQYDVR0OBBYEFPel0FzHwjeqXXp2CxdhcMlduclVMB8GA1UdIwQYMBaAFJ0rzpW/ -2CKRouWt/nkO6SPhTSgyMAkGA1UdEwQCMAAwQwYIKwYBBQUHAQEENzA1MDMGCCsG -AQUFBzAChidodHRwOi8vdGVzdC5jdXJsLnNlL2NhL0VkZWxDdXJsUm9vdC5jZXIw -OAYDVR0fBDEwLzAtoCugKYYnaHR0cDovL3Rlc3QuY3VybC5zZS9jYS9FZGVsQ3Vy -bFJvb3QuY3JsMA0GCSqGSIb3DQEBCwUAA4IBAQAoYQXkVTBIQBLf9vtkXhBtXEjS -77LCJyjwoYhayK7LhxJgBKrgHkzDTI7ViviMyD/l1waKPUDA6gPdnNb1aGdxUU+N -gB/TUwlbeL7cbZhowDjSEK1WlZy3VuLsmLdvPPS1HpR7PeL3pIm1iWEpReoFjSOj -rbbvlyGRzvJ9Ejrj/ODrhRjrr7dRgSuiYAFg2TGWy5zjuSk491F9QL+HbkL6dMCb -yxqVYzCnQbRl48yHLAHZANjjYqvSZDdDwhY2D66meQDWNzf/MWp3Fcz/G1IzmwSO -9VumUmDoHLg+37nVZ7o9I9ZaB83o4gEPV+qw+yekKhvwFgGQzJ4yE8zxv8uA ------END CERTIFICATE----- diff --git a/tests/certs/test-localhost0h.key b/tests/certs/test-localhost0h.key deleted file mode 100644 index 8ead31badb..0000000000 --- a/tests/certs/test-localhost0h.key +++ /dev/null @@ -1,27 +0,0 @@ ------BEGIN RSA PRIVATE KEY----- -MIIEpgIBAAKCAQEAvddYaGIMaDTfoh3ZNPzxRb/M41c45tMH/GXhsyit1iw7Lqlq -uQfnZh+4oMJ1HTGEPl2Y0ze7oJaXf/cXXomtbr+MDe/CfPU7dgqEMO+/L8CKplAz -4aQAvQwMeQQJ0UUJ/rJLo88eO2W0WqWkhuDWlcCp11jsjk5yPzN38z21bWMohYpJ -5SDvVpqt853itspm3QbizAmGNsLQHz4zvLzFI/cqTPBbTzxg9DPz3citg9JFn20N -y7YplLjfO8NzfpXv5mjnxiJ5Sml8hUqInZqQcUJ5cz6y7eIMTlOFWt7nhTdvDiHh -8fAdCewP/Wlf2XRxNU0Cc/MtPpxY9UjWY7T7hQIDAQABAoIBAQCB1IhtusBpc9+N -a4RkrKgE34sr3zbXBXPstXCJqkRYuJ8w5kRKjpE+Umtd5h9Z+8dJL5GYwgDbbqHl -rgKZcObfWrhZv6Lu+nfT3pVRMmU6Lx+jZi5VHmgy4c6V5KEiMWkIer8oJDm0vXV+ -mNHQPGwEtmJxGCuPly6i8nwSKh2t1HfRM9yC5bARj/zQq3W+iAkPIUKynHvRvB5+ -ZVClyTYlXLByRu9VvRlDxP5wc1zjHVdfQTG5lSgV0dZGtyT9MdqI9fidnkuxmsDu -P9WxcmvUPbdM4Uzddb58u80UEzh86HDZo8juCO6JMy2zG1K7vWbh5RIwB/9IW764 -yCnfuEMBAoGBAPGYTd/IQgWEFZZyffOHBJbOffATSn1M4uATk2Xd82facDIgyKJz -CkUZjxuR5W/znpnFmwMq5FabI504SEp4zYZU9iFKoofYdcsv8/XNWz2dFhuEfReI -T2pNbRieJFM0+bBOq/bJGlmrRsfqHrmtN+p59VUoE+9XwfPGwr0G5j+xAoGBAMkp -EvAAwab/0zb71YfoNLbQz+Z5965tUEZY0opc2GvB6heMF8+54I0IapKVCITglmbN -0pWRRGo0Zyb1rGWoDGgLT6CyJ+gIYpPJWb/iFxUyBQzJzzDkMtAj43eXGSO+7eho -qVUXJA5uvjDlP8lLPSyDY/2wP8BPYigzQm8hcGIVAoGBANjVXW9wCPFybv2snKap -k9DWW+nRJpX3H9kFONHAtumLAA+9pNVIcvs5yVtxQn+MI9jXphzdrjqc2wYMsbVF -XxElyBJxLhbGjFJlI4yFV1KhXmosKymnyb8a5sOli+yyKze2JFlGfUPlmY1r70+u -y/TCqRJY+itilEz7I2UMgDLBAoGBALcIT3nfRlTca2OZKwZZSzWYs8JC8hFc13Da -ut84cZdCvuwkBTp2J5JLuSScxD6bV149IsIChpyYB8+UNAPfL0KwIAjYcaUXlBJi -X+5PGq+nbp7fNU2IJY/rR7p12mMDA9e2+3Q39Q/IxfcZcLuIYSYSezXGW4tw76Ai -W+1gILCtAoGBAK5f4pSOG6hSYLqn1f0yqpIiTfeA2FJTUSB1eVkO7Y+YNnYpmFok -1FlsFSlFYi8xqgWqwacs8H2uNnWpYKTpeCYLcWWO3KklddhB54f1+5tpOv0pVgji -Lczo5hccgURjwx1ebbH8h4rYTBskb9xagw7n28O6BXaGJvx4fjdDwirL ------END RSA PRIVATE KEY----- diff --git a/tests/certs/test-localhost0h.pem b/tests/certs/test-localhost0h.pem deleted file mode 100644 index 504e5b4514..0000000000 --- a/tests/certs/test-localhost0h.pem +++ /dev/null @@ -1,166 +0,0 @@ -extensions = x509v3 - -[ x509v3 ] -#subjectAltName = DNS:localhost\0h -subjectAltName = DER:30:0d:82:0b:6c:6f:63:61:6c:68:6f:73:74:00:68 -keyUsage = keyEncipherment,digitalSignature,keyAgreement -extendedKeyUsage = serverAuth -subjectKeyIdentifier = hash -authorityKeyIdentifier = keyid -basicConstraints = CA:false -authorityInfoAccess = @issuer_info -crlDistributionPoints = @crl_info - -[ crl_ext ] -authorityKeyIdentifier = keyid:always -authorityInfoAccess = @issuer_info - -[ issuer_info ] -caIssuers;URI.0 = http://test.curl.se/ca/EdelCurlRoot.cer - -[ crl_info ] -URI.0 = http://test.curl.se/ca/EdelCurlRoot.crl - -[ req ] -default_bits = 1024 -distinguished_name = req_DN -default_md = sha256 -string_mask = utf8only - -[ req_DN ] -countryName = "Country Name is Northern Nowhere" -countryName_value = NN -organizationName = "Organization Name" -organizationName_value = Edel Curl Arctic Illudium Research Cloud -commonName = "Common Name" -commonName_value = localhost ------BEGIN RSA PRIVATE KEY----- -MIIEpgIBAAKCAQEAvddYaGIMaDTfoh3ZNPzxRb/M41c45tMH/GXhsyit1iw7Lqlq -uQfnZh+4oMJ1HTGEPl2Y0ze7oJaXf/cXXomtbr+MDe/CfPU7dgqEMO+/L8CKplAz -4aQAvQwMeQQJ0UUJ/rJLo88eO2W0WqWkhuDWlcCp11jsjk5yPzN38z21bWMohYpJ -5SDvVpqt853itspm3QbizAmGNsLQHz4zvLzFI/cqTPBbTzxg9DPz3citg9JFn20N -y7YplLjfO8NzfpXv5mjnxiJ5Sml8hUqInZqQcUJ5cz6y7eIMTlOFWt7nhTdvDiHh -8fAdCewP/Wlf2XRxNU0Cc/MtPpxY9UjWY7T7hQIDAQABAoIBAQCB1IhtusBpc9+N -a4RkrKgE34sr3zbXBXPstXCJqkRYuJ8w5kRKjpE+Umtd5h9Z+8dJL5GYwgDbbqHl -rgKZcObfWrhZv6Lu+nfT3pVRMmU6Lx+jZi5VHmgy4c6V5KEiMWkIer8oJDm0vXV+ -mNHQPGwEtmJxGCuPly6i8nwSKh2t1HfRM9yC5bARj/zQq3W+iAkPIUKynHvRvB5+ -ZVClyTYlXLByRu9VvRlDxP5wc1zjHVdfQTG5lSgV0dZGtyT9MdqI9fidnkuxmsDu -P9WxcmvUPbdM4Uzddb58u80UEzh86HDZo8juCO6JMy2zG1K7vWbh5RIwB/9IW764 -yCnfuEMBAoGBAPGYTd/IQgWEFZZyffOHBJbOffATSn1M4uATk2Xd82facDIgyKJz -CkUZjxuR5W/znpnFmwMq5FabI504SEp4zYZU9iFKoofYdcsv8/XNWz2dFhuEfReI -T2pNbRieJFM0+bBOq/bJGlmrRsfqHrmtN+p59VUoE+9XwfPGwr0G5j+xAoGBAMkp -EvAAwab/0zb71YfoNLbQz+Z5965tUEZY0opc2GvB6heMF8+54I0IapKVCITglmbN -0pWRRGo0Zyb1rGWoDGgLT6CyJ+gIYpPJWb/iFxUyBQzJzzDkMtAj43eXGSO+7eho -qVUXJA5uvjDlP8lLPSyDY/2wP8BPYigzQm8hcGIVAoGBANjVXW9wCPFybv2snKap -k9DWW+nRJpX3H9kFONHAtumLAA+9pNVIcvs5yVtxQn+MI9jXphzdrjqc2wYMsbVF -XxElyBJxLhbGjFJlI4yFV1KhXmosKymnyb8a5sOli+yyKze2JFlGfUPlmY1r70+u -y/TCqRJY+itilEz7I2UMgDLBAoGBALcIT3nfRlTca2OZKwZZSzWYs8JC8hFc13Da -ut84cZdCvuwkBTp2J5JLuSScxD6bV149IsIChpyYB8+UNAPfL0KwIAjYcaUXlBJi -X+5PGq+nbp7fNU2IJY/rR7p12mMDA9e2+3Q39Q/IxfcZcLuIYSYSezXGW4tw76Ai -W+1gILCtAoGBAK5f4pSOG6hSYLqn1f0yqpIiTfeA2FJTUSB1eVkO7Y+YNnYpmFok -1FlsFSlFYi8xqgWqwacs8H2uNnWpYKTpeCYLcWWO3KklddhB54f1+5tpOv0pVgji -Lczo5hccgURjwx1ebbH8h4rYTBskb9xagw7n28O6BXaGJvx4fjdDwirL ------END RSA PRIVATE KEY----- -Certificate: - Data: - Version: 3 (0x2) - Serial Number: - 81:34:c8:2d:81:f0:54:21 - Signature Algorithm: sha256WithRSAEncryption - Issuer: - countryName = NN - organizationName = Edel Curl Arctic Illudium Research Cloud - commonName = Northern Nowhere Trust Anchor - Validity - Not Before: Mar 6 11:51:48 2025 GMT - Not After : Dec 31 11:51:48 2025 GMT - Subject: - countryName = NN - organizationName = Edel Curl Arctic Illudium Research Cloud - commonName = localhost - Subject Public Key Info: - Public Key Algorithm: rsaEncryption - RSA Public-Key: (2048 bit) - Modulus: - 00:bd:d7:58:68:62:0c:68:34:df:a2:1d:d9:34:fc: - f1:45:bf:cc:e3:57:38:e6:d3:07:fc:65:e1:b3:28: - ad:d6:2c:3b:2e:a9:6a:b9:07:e7:66:1f:b8:a0:c2: - 75:1d:31:84:3e:5d:98:d3:37:bb:a0:96:97:7f:f7: - 17:5e:89:ad:6e:bf:8c:0d:ef:c2:7c:f5:3b:76:0a: - 84:30:ef:bf:2f:c0:8a:a6:50:33:e1:a4:00:bd:0c: - 0c:79:04:09:d1:45:09:fe:b2:4b:a3:cf:1e:3b:65: - b4:5a:a5:a4:86:e0:d6:95:c0:a9:d7:58:ec:8e:4e: - 72:3f:33:77:f3:3d:b5:6d:63:28:85:8a:49:e5:20: - ef:56:9a:ad:f3:9d:e2:b6:ca:66:dd:06:e2:cc:09: - 86:36:c2:d0:1f:3e:33:bc:bc:c5:23:f7:2a:4c:f0: - 5b:4f:3c:60:f4:33:f3:dd:c8:ad:83:d2:45:9f:6d: - 0d:cb:b6:29:94:b8:df:3b:c3:73:7e:95:ef:e6:68: - e7:c6:22:79:4a:69:7c:85:4a:88:9d:9a:90:71:42: - 79:73:3e:b2:ed:e2:0c:4e:53:85:5a:de:e7:85:37: - 6f:0e:21:e1:f1:f0:1d:09:ec:0f:fd:69:5f:d9:74: - 71:35:4d:02:73:f3:2d:3e:9c:58:f5:48:d6:63:b4: - fb:85 - Exponent: 65537 (0x10001) - X509v3 extensions: - X509v3 Subject Alternative Name: - DNS:localhost - X509v3 Key Usage: - Digital Signature, Key Encipherment, Key Agreement - X509v3 Extended Key Usage: - TLS Web Server Authentication - X509v3 Subject Key Identifier: - F7:A5:D0:5C:C7:C2:37:AA:5D:7A:76:0B:17:61:70:C9:5D:B9:C9:55 - X509v3 Authority Key Identifier: - keyid:9D:2B:CE:95:BF:D8:22:91:A2:E5:AD:FE:79:0E:E9:23:E1:4D:28:32 - - X509v3 Basic Constraints: - CA:FALSE - Authority Information Access: - CA Issuers - URI:http://test.curl.se/ca/EdelCurlRoot.cer - - X509v3 CRL Distribution Points: - - Full Name: - URI:http://test.curl.se/ca/EdelCurlRoot.crl - - Signature Algorithm: sha256WithRSAEncryption - 28:61:05:e4:55:30:48:40:12:df:f6:fb:64:5e:10:6d:5c:48: - d2:ef:b2:c2:27:28:f0:a1:88:5a:c8:ae:cb:87:12:60:04:aa: - e0:1e:4c:c3:4c:8e:d5:8a:f8:8c:c8:3f:e5:d7:06:8a:3d:40: - c0:ea:03:dd:9c:d6:f5:68:67:71:51:4f:8d:80:1f:d3:53:09: - 5b:78:be:dc:6d:98:68:c0:38:d2:10:ad:56:95:9c:b7:56:e2: - ec:98:b7:6f:3c:f4:b5:1e:94:7b:3d:e2:f7:a4:89:b5:89:61: - 29:45:ea:05:8d:23:a3:ad:b6:ef:97:21:91:ce:f2:7d:12:3a: - e3:fc:e0:eb:85:18:eb:af:b7:51:81:2b:a2:60:01:60:d9:31: - 96:cb:9c:e3:b9:29:38:f7:51:7d:40:bf:87:6e:42:fa:74:c0: - 9b:cb:1a:95:63:30:a7:41:b4:65:e3:cc:87:2c:01:d9:00:d8: - e3:62:ab:d2:64:37:43:c2:16:36:0f:ae:a6:79:00:d6:37:37: - ff:31:6a:77:15:cc:ff:1b:52:33:9b:04:8e:f5:5b:a6:52:60: - e8:1c:b8:3e:df:b9:d5:67:ba:3d:23:d6:5a:07:cd:e8:e2:01: - 0f:57:ea:b0:fb:27:a4:2a:1b:f0:16:01:90:cc:9e:32:13:cc: - f1:bf:cb:80 ------BEGIN CERTIFICATE----- -MIIESTCCAzGgAwIBAgIJAIE0yC2B8FQhMA0GCSqGSIb3DQEBCwUAMGgxCzAJBgNV -BAYTAk5OMTEwLwYDVQQKDChFZGVsIEN1cmwgQXJjdGljIElsbHVkaXVtIFJlc2Vh -cmNoIENsb3VkMSYwJAYDVQQDDB1Ob3J0aGVybiBOb3doZXJlIFRydXN0IEFuY2hv -cjAeFw0yNTAzMDYxMTUxNDhaFw0yNTEyMzExMTUxNDhaMFQxCzAJBgNVBAYTAk5O -MTEwLwYDVQQKDChFZGVsIEN1cmwgQXJjdGljIElsbHVkaXVtIFJlc2VhcmNoIENs -b3VkMRIwEAYDVQQDDAlsb2NhbGhvc3QwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAw -ggEKAoIBAQC911hoYgxoNN+iHdk0/PFFv8zjVzjm0wf8ZeGzKK3WLDsuqWq5B+dm -H7igwnUdMYQ+XZjTN7uglpd/9xdeia1uv4wN78J89Tt2CoQw778vwIqmUDPhpAC9 -DAx5BAnRRQn+skujzx47ZbRapaSG4NaVwKnXWOyOTnI/M3fzPbVtYyiFiknlIO9W -mq3zneK2ymbdBuLMCYY2wtAfPjO8vMUj9ypM8FtPPGD0M/PdyK2D0kWfbQ3LtimU -uN87w3N+le/maOfGInlKaXyFSoidmpBxQnlzPrLt4gxOU4Va3ueFN28OIeHx8B0J -7A/9aV/ZdHE1TQJz8y0+nFj1SNZjtPuFAgMBAAGjggEIMIIBBDAWBgNVHREEDzAN -ggtsb2NhbGhvc3QAaDALBgNVHQ8EBAMCA6gwEwYDVR0lBAwwCgYIKwYBBQUHAwEw -HQYDVR0OBBYEFPel0FzHwjeqXXp2CxdhcMlduclVMB8GA1UdIwQYMBaAFJ0rzpW/ -2CKRouWt/nkO6SPhTSgyMAkGA1UdEwQCMAAwQwYIKwYBBQUHAQEENzA1MDMGCCsG -AQUFBzAChidodHRwOi8vdGVzdC5jdXJsLnNlL2NhL0VkZWxDdXJsUm9vdC5jZXIw -OAYDVR0fBDEwLzAtoCugKYYnaHR0cDovL3Rlc3QuY3VybC5zZS9jYS9FZGVsQ3Vy -bFJvb3QuY3JsMA0GCSqGSIb3DQEBCwUAA4IBAQAoYQXkVTBIQBLf9vtkXhBtXEjS -77LCJyjwoYhayK7LhxJgBKrgHkzDTI7ViviMyD/l1waKPUDA6gPdnNb1aGdxUU+N -gB/TUwlbeL7cbZhowDjSEK1WlZy3VuLsmLdvPPS1HpR7PeL3pIm1iWEpReoFjSOj -rbbvlyGRzvJ9Ejrj/ODrhRjrr7dRgSuiYAFg2TGWy5zjuSk491F9QL+HbkL6dMCb -yxqVYzCnQbRl48yHLAHZANjjYqvSZDdDwhY2D66meQDWNzf/MWp3Fcz/G1IzmwSO -9VumUmDoHLg+37nVZ7o9I9ZaB83o4gEPV+qw+yekKhvwFgGQzJ4yE8zxv8uA ------END CERTIFICATE----- diff --git a/tests/certs/test-localhost0h.pub.der b/tests/certs/test-localhost0h.pub.der deleted file mode 100644 index 38ea63cfff..0000000000 Binary files a/tests/certs/test-localhost0h.pub.der and /dev/null differ diff --git a/tests/certs/test-localhost0h.pub.pem b/tests/certs/test-localhost0h.pub.pem deleted file mode 100644 index 24db233fc1..0000000000 --- a/tests/certs/test-localhost0h.pub.pem +++ /dev/null @@ -1,9 +0,0 @@ ------BEGIN PUBLIC KEY----- -MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAvddYaGIMaDTfoh3ZNPzx -Rb/M41c45tMH/GXhsyit1iw7LqlquQfnZh+4oMJ1HTGEPl2Y0ze7oJaXf/cXXomt -br+MDe/CfPU7dgqEMO+/L8CKplAz4aQAvQwMeQQJ0UUJ/rJLo88eO2W0WqWkhuDW -lcCp11jsjk5yPzN38z21bWMohYpJ5SDvVpqt853itspm3QbizAmGNsLQHz4zvLzF -I/cqTPBbTzxg9DPz3citg9JFn20Ny7YplLjfO8NzfpXv5mjnxiJ5Sml8hUqInZqQ -cUJ5cz6y7eIMTlOFWt7nhTdvDiHh8fAdCewP/Wlf2XRxNU0Cc/MtPpxY9UjWY7T7 -hQIDAQAB ------END PUBLIC KEY----- diff --git a/tests/data/test2033 b/tests/data/test2033 index 645ba595a9..2973eb8987 100644 --- a/tests/data/test2033 +++ b/tests/data/test2033 @@ -40,7 +40,7 @@ simple HTTPS GET with DER public key pinning (Schannel variant) CURL_SSL_BACKEND=schannel --4 --cacert %SRCDIR/certs/test-ca.crt --pinnedpubkey %SRCDIR/certs/test-localhost.pub.der --ssl-revoke-best-effort https://localhost:%HTTPSPORT/%TESTNUMBER +-4 --cacert %CERTDIR/certs/test-ca.crt --pinnedpubkey %CERTDIR/certs/test-localhost.pub.der --ssl-revoke-best-effort https://localhost:%HTTPSPORT/%TESTNUMBER diff --git a/tests/data/test2034 b/tests/data/test2034 index 61169de6f3..adb4f17671 100644 --- a/tests/data/test2034 +++ b/tests/data/test2034 @@ -36,7 +36,7 @@ https test-localhost.pem simple HTTPS GET with DER public key pinning --4 --cacert %SRCDIR/certs/test-ca.crt --pinnedpubkey %SRCDIR/certs/test-localhost.pub.der https://localhost:%HTTPSPORT/%TESTNUMBER +-4 --cacert %CERTDIR/certs/test-ca.crt --pinnedpubkey %CERTDIR/certs/test-localhost.pub.der https://localhost:%HTTPSPORT/%TESTNUMBER diff --git a/tests/data/test2035 b/tests/data/test2035 index 67b0dc6560..99a73ad408 100644 --- a/tests/data/test2035 +++ b/tests/data/test2035 @@ -27,7 +27,7 @@ https test-localhost.pem HTTPS wrong DER pinnedpubkey but right CN --4 --cacert %SRCDIR/certs/test-ca.crt --pinnedpubkey %SRCDIR/certs/test-localhost.der https://localhost:%HTTPSPORT/%TESTNUMBER +-4 --cacert %CERTDIR/certs/test-ca.crt --pinnedpubkey %CERTDIR/certs/test-localhost.der https://localhost:%HTTPSPORT/%TESTNUMBER diff --git a/tests/data/test2037 b/tests/data/test2037 index d9968bc93f..9f229cfd3e 100644 --- a/tests/data/test2037 +++ b/tests/data/test2037 @@ -36,7 +36,7 @@ https test-localhost.pem simple HTTPS GET with PEM public key pinning --4 --cacert %SRCDIR/certs/test-ca.crt --pinnedpubkey %SRCDIR/certs/test-localhost.pub.pem https://localhost:%HTTPSPORT/%TESTNUMBER +-4 --cacert %CERTDIR/certs/test-ca.crt --pinnedpubkey %CERTDIR/certs/test-localhost.pub.pem https://localhost:%HTTPSPORT/%TESTNUMBER diff --git a/tests/data/test2038 b/tests/data/test2038 index 4cd9be8538..8c7caef341 100644 --- a/tests/data/test2038 +++ b/tests/data/test2038 @@ -27,7 +27,7 @@ https test-localhost.pem HTTPS wrong PEM pinnedpubkey but right CN --4 --cacert %SRCDIR/certs/test-ca.crt --pinnedpubkey %SRCDIR/certs/test-localhost.pem https://localhost:%HTTPSPORT/%TESTNUMBER +-4 --cacert %CERTDIR/certs/test-ca.crt --pinnedpubkey %CERTDIR/certs/test-localhost.pem https://localhost:%HTTPSPORT/%TESTNUMBER diff --git a/tests/data/test2041 b/tests/data/test2041 index cf132f5e71..71112c27f8 100644 --- a/tests/data/test2041 +++ b/tests/data/test2041 @@ -36,7 +36,7 @@ https test-localhost.pem simple HTTPS GET with base64-sha256 public key pinning --4 --cacert %SRCDIR/certs/test-ca.crt --pinnedpubkey sha256//%sha256b64file[%SRCDIR/certs/test-localhost.pub.der]sha256b64file% https://localhost:%HTTPSPORT/%TESTNUMBER +-4 --cacert %CERTDIR/certs/test-ca.crt --pinnedpubkey sha256//%sha256b64file[%CERTDIR/certs/test-localhost.pub.der]sha256b64file% https://localhost:%HTTPSPORT/%TESTNUMBER diff --git a/tests/data/test2042 b/tests/data/test2042 index 52fd9dff96..8468187927 100644 --- a/tests/data/test2042 +++ b/tests/data/test2042 @@ -27,7 +27,7 @@ https test-localhost.pem HTTPS wrong base64-sha256 pinnedpubkey but right CN --4 --cacert %SRCDIR/certs/test-ca.crt --pinnedpubkey sha256//bSIggTf+ikMG0CtmDlpMVBd7yi7H1md4URogRPqerso= https://localhost:%HTTPSPORT/%TESTNUMBER +-4 --cacert %CERTDIR/certs/test-ca.crt --pinnedpubkey sha256//bSIggTf+ikMG0CtmDlpMVBd7yi7H1md4URogRPqerso= https://localhost:%HTTPSPORT/%TESTNUMBER diff --git a/tests/data/test2048 b/tests/data/test2048 index eeaea967d8..3c35eed368 100644 --- a/tests/data/test2048 +++ b/tests/data/test2048 @@ -26,7 +26,7 @@ https test-localhost.pem pinnedpubkey no-match must fail even when insecure --4 --insecure --cacert %SRCDIR/certs/test-ca.crt --pinnedpubkey %SRCDIR/certs/test-localhost.nn.pub.der https://localhost:%HTTPSPORT/%TESTNUMBER +-4 --insecure --cacert %CERTDIR/certs/test-ca.crt --pinnedpubkey %CERTDIR/certs/test-localhost.nn.pub.der https://localhost:%HTTPSPORT/%TESTNUMBER diff --git a/tests/data/test2070 b/tests/data/test2070 index 24b1ffb96a..c2c0cdee9a 100644 --- a/tests/data/test2070 +++ b/tests/data/test2070 @@ -39,7 +39,7 @@ Ignore certificate revocation "best effort" strategy CURL_SSL_BACKEND=schannel --4 --cacert %SRCDIR/certs/test-ca.crt --ssl-revoke-best-effort https://localhost:%HTTPSPORT/%TESTNUMBER +-4 --cacert %CERTDIR/certs/test-ca.crt --ssl-revoke-best-effort https://localhost:%HTTPSPORT/%TESTNUMBER diff --git a/tests/data/test2079 b/tests/data/test2079 index 353b12f660..117a712c3f 100644 --- a/tests/data/test2079 +++ b/tests/data/test2079 @@ -40,7 +40,7 @@ simple HTTPS GET with PEM public key pinning (Schannel variant) CURL_SSL_BACKEND=schannel --4 --cacert %SRCDIR/certs/test-ca.crt --pinnedpubkey %SRCDIR/certs/test-localhost.pub.pem --ssl-revoke-best-effort https://localhost:%HTTPSPORT/%TESTNUMBER +-4 --cacert %CERTDIR/certs/test-ca.crt --pinnedpubkey %CERTDIR/certs/test-localhost.pub.pem --ssl-revoke-best-effort https://localhost:%HTTPSPORT/%TESTNUMBER diff --git a/tests/data/test2087 b/tests/data/test2087 index d6ef5258ad..f347bbc61b 100644 --- a/tests/data/test2087 +++ b/tests/data/test2087 @@ -40,7 +40,7 @@ simple HTTPS GET with base64-sha256 public key pinning (Schannel variant) CURL_SSL_BACKEND=schannel --4 --cacert %SRCDIR/certs/test-ca.crt --pinnedpubkey sha256//%sha256b64file[%SRCDIR/certs/test-localhost.pub.der]sha256b64file% --ssl-revoke-best-effort https://localhost:%HTTPSPORT/%TESTNUMBER +-4 --cacert %CERTDIR/certs/test-ca.crt --pinnedpubkey sha256//%sha256b64file[%CERTDIR/certs/test-localhost.pub.der]sha256b64file% --ssl-revoke-best-effort https://localhost:%HTTPSPORT/%TESTNUMBER diff --git a/tests/data/test2500 b/tests/data/test2500 index fa4d0a81f0..8bcb5e0c62 100644 --- a/tests/data/test2500 +++ b/tests/data/test2500 @@ -39,7 +39,7 @@ http/3 HTTP/3 GET: ---cacert %SRCDIR/certs/test-ca.crt --http3 --resolve localhost:%HTTP3PORT:%HOSTIP https://localhost:%HTTP3PORT/%TESTNUMBER +--cacert %CERTDIR/certs/test-ca.crt --http3 --resolve localhost:%HTTP3PORT:%HOSTIP https://localhost:%HTTP3PORT/%TESTNUMBER diff --git a/tests/data/test2502 b/tests/data/test2502 index 1218e7d1c9..e53f880469 100644 --- a/tests/data/test2502 +++ b/tests/data/test2502 @@ -59,7 +59,7 @@ lib%TESTNUMBER HTTP GET multiple over HTTP/3 -https://%HOSTIP:%HTTP3PORT/path/%TESTNUMBER %HOSTIP %HTTP3PORT %SRCDIR/certs/test-ca.cacert +https://%HOSTIP:%HTTP3PORT/path/%TESTNUMBER %HOSTIP %HTTP3PORT %CERTDIR/certs/test-ca.cacert diff --git a/tests/data/test2503 b/tests/data/test2503 index f65466ec81..f95486ce0f 100644 --- a/tests/data/test2503 +++ b/tests/data/test2503 @@ -41,7 +41,7 @@ HTTP/3 header-api --w '%{header_json}\n' --http3-only --cacert %SRCDIR/certs/test-ca.crt --resolve localhost:%HTTP3PORT:%HOSTIP https://localhost:%HTTP3PORT/%TESTNUMBER +-w '%{header_json}\n' --http3-only --cacert %CERTDIR/certs/test-ca.crt --resolve localhost:%HTTP3PORT:%HOSTIP https://localhost:%HTTP3PORT/%TESTNUMBER diff --git a/tests/data/test3000 b/tests/data/test3000 index ffc1804344..92cdf06358 100644 --- a/tests/data/test3000 +++ b/tests/data/test3000 @@ -35,7 +35,7 @@ https test-localhost-san-first.pem HTTPS GET to localhost, first subject alt name matches, CN does not match --4 --cacert %SRCDIR/certs/test-ca.crt https://localhost:%HTTPSPORT/%TESTNUMBER +-4 --cacert %CERTDIR/certs/test-ca.crt https://localhost:%HTTPSPORT/%TESTNUMBER diff --git a/tests/data/test3001 b/tests/data/test3001 index dd54661e90..8d0f690999 100644 --- a/tests/data/test3001 +++ b/tests/data/test3001 @@ -35,7 +35,7 @@ https test-localhost-san-last.pem HTTPS GET to localhost, last subject alt name matches, CN does not match --4 --cacert %SRCDIR/certs/test-ca.crt https://localhost:%HTTPSPORT/%TESTNUMBER +-4 --cacert %CERTDIR/certs/test-ca.crt https://localhost:%HTTPSPORT/%TESTNUMBER diff --git a/tests/data/test3023 b/tests/data/test3023 index 49c45de28e..668c43adc6 100644 --- a/tests/data/test3023 +++ b/tests/data/test3023 @@ -39,7 +39,7 @@ HTTPS GET to localhost, first subject alt name matches, CN does not match (Schan CURL_SSL_BACKEND=schannel --4 --cacert %SRCDIR/certs/test-ca.crt --ssl-revoke-best-effort https://localhost:%HTTPSPORT/%TESTNUMBER +-4 --cacert %CERTDIR/certs/test-ca.crt --ssl-revoke-best-effort https://localhost:%HTTPSPORT/%TESTNUMBER diff --git a/tests/data/test3024 b/tests/data/test3024 index a4e9bcbaf7..712e3218d3 100644 --- a/tests/data/test3024 +++ b/tests/data/test3024 @@ -39,7 +39,7 @@ HTTPS GET to localhost, last subject alt name matches, CN does not match (Schann CURL_SSL_BACKEND=schannel --4 --cacert %SRCDIR/certs/test-ca.crt --ssl-revoke-best-effort https://localhost:%HTTPSPORT/%TESTNUMBER +-4 --cacert %CERTDIR/certs/test-ca.crt --ssl-revoke-best-effort https://localhost:%HTTPSPORT/%TESTNUMBER diff --git a/tests/data/test310 b/tests/data/test310 index bf0cbae55c..f2415a329f 100644 --- a/tests/data/test310 +++ b/tests/data/test310 @@ -35,7 +35,7 @@ https test-localhost.pem simple HTTPS GET --4 --cacert %SRCDIR/certs/test-ca.crt https://localhost:%HTTPSPORT/%TESTNUMBER +-4 --cacert %CERTDIR/certs/test-ca.crt https://localhost:%HTTPSPORT/%TESTNUMBER diff --git a/tests/data/test311 b/tests/data/test311 index 5f11c886ab..618153c831 100644 --- a/tests/data/test311 +++ b/tests/data/test311 @@ -26,7 +26,7 @@ https test-localhost0h.pem HTTPS wrong subjectAltName but right CN --4 --cacert %SRCDIR/certs/test-ca.crt https://localhost:%HTTPSPORT/%TESTNUMBER +-4 --cacert %CERTDIR/certs/test-ca.crt https://localhost:%HTTPSPORT/%TESTNUMBER diff --git a/tests/data/test312 b/tests/data/test312 index 04c13c86a2..c80872a949 100644 --- a/tests/data/test312 +++ b/tests/data/test312 @@ -26,7 +26,7 @@ https test-localhost.nn.pem HTTPS GET to localhost and null-prefixed CN cert --4 --cacert %SRCDIR/certs/test-ca.crt https://localhost:%HTTPSPORT/%TESTNUMBER +-4 --cacert %CERTDIR/certs/test-ca.crt https://localhost:%HTTPSPORT/%TESTNUMBER diff --git a/tests/data/test313 b/tests/data/test313 index 7db791c1d3..2544f1f37f 100644 --- a/tests/data/test313 +++ b/tests/data/test313 @@ -22,7 +22,7 @@ https test-localhost.pem CRL test --4 --cacert %SRCDIR/certs/test-ca.crt --crlfile %SRCDIR/certs/test-localhost.crl https://localhost:%HTTPSPORT/%TESTNUMBER +-4 --cacert %CERTDIR/certs/test-ca.crt --crlfile %CERTDIR/certs/test-localhost.crl https://localhost:%HTTPSPORT/%TESTNUMBER diff --git a/tests/data/test3207 b/tests/data/test3207 index 2cc9cbaa6e..fe2e38f978 100644 --- a/tests/data/test3207 +++ b/tests/data/test3207 @@ -165,7 +165,7 @@ lib%TESTNUMBER # provide URL and ca-cert -https://localhost:%HTTPSPORT/%TESTNUMBER %SRCDIR/certs/test-ca.crt +https://localhost:%HTTPSPORT/%TESTNUMBER %CERTDIR/certs/test-ca.crt diff --git a/tests/data/test417 b/tests/data/test417 index ff481ff1a2..f286e41925 100644 --- a/tests/data/test417 +++ b/tests/data/test417 @@ -50,7 +50,7 @@ s/^(.*):(.*)[\r\n]*// nomnom -%strippemfile[%SRCDIR/certs/test-localhost.crt]strippemfile% +%strippemfile[%CERTDIR/certs/test-localhost.crt]strippemfile% diff --git a/tests/data/test678 b/tests/data/test678 index a369afc7b3..bcf68e4f11 100644 --- a/tests/data/test678 +++ b/tests/data/test678 @@ -37,7 +37,7 @@ lib%TESTNUMBER # provide URL and ca-cert -https://localhost:%HTTPSPORT/%TESTNUMBER %SRCDIR/certs/test-ca.crt +https://localhost:%HTTPSPORT/%TESTNUMBER %CERTDIR/certs/test-ca.crt # Ensure that we're running on localhost because we're checking the host name diff --git a/tests/http2-server.pl b/tests/http2-server.pl index 2940441b69..074c54c1de 100755 --- a/tests/http2-server.pl +++ b/tests/http2-server.pl @@ -102,11 +102,8 @@ while(@ARGV) { shift @ARGV; } -my $srcdir = dirname(__FILE__); -$certfile = "$srcdir/certs/$cert.pem"; -$keyfile = "$srcdir/certs/$cert.key"; -$certfile = abs_path($certfile); -$keyfile = abs_path($keyfile); +$certfile = abs_path("certs/$cert.pem"); +$keyfile = abs_path("certs/$cert.key"); my $cmdline="$nghttpx --backend=$connect ". "--backend-keep-alive-timeout=500ms ". diff --git a/tests/http3-server.pl b/tests/http3-server.pl index 792530fe2b..3b1a6b46ee 100755 --- a/tests/http3-server.pl +++ b/tests/http3-server.pl @@ -102,11 +102,8 @@ while(@ARGV) { shift @ARGV; } -my $srcdir = dirname(__FILE__); -$certfile = "$srcdir/certs/$cert.pem"; -$keyfile = "$srcdir/certs/$cert.key"; -$certfile = abs_path($certfile); -$keyfile = abs_path($keyfile); +$certfile = abs_path("certs/$cert.pem"); +$keyfile = abs_path("certs/$cert.key"); my $cmdline="$nghttpx --http2-proxy --backend=$connect ". "--backend-keep-alive-timeout=500ms ". diff --git a/tests/secureserver.pl b/tests/secureserver.pl index 8e8049fc0a..60545ecabe 100755 --- a/tests/secureserver.pl +++ b/tests/secureserver.pl @@ -196,7 +196,7 @@ if(!$logfile) { $conffile = "$piddir/${proto}_stunnel.conf"; $capath = abs_path($path); -$certfile = "$srcdir/". ($stuncert?"certs/$stuncert":"certs/test-localhost.pem"); +$certfile = $stuncert ? "certs/$stuncert" : "certs/test-localhost.pem"; $certfile = abs_path($certfile); my $ssltext = uc($proto) ." SSL/TLS:"; diff --git a/tests/servers.pm b/tests/servers.pm index 7af1383715..7b6cfd1c36 100644 --- a/tests/servers.pm +++ b/tests/servers.pm @@ -3083,6 +3083,7 @@ sub subvariables { $$thing =~ s/${prefix}FILE_PWD/$file_pwd/g; $$thing =~ s/${prefix}SSH_PWD/$ssh_pwd/g; $$thing =~ s/${prefix}SRCDIR/$srcdir/g; + $$thing =~ s/${prefix}CERTDIR/./g; $$thing =~ s/${prefix}USER/$USER/g; $$thing =~ s/${prefix}DEV_NULL/$dev_null/g;