From be528b7512d5f4c2a13846c0c073e11f036eb2ad Mon Sep 17 00:00:00 2001 From: Frederic BIDON Date: Mon, 23 Mar 2026 11:40:10 +0100 Subject: [PATCH] test: removed static testing TLS material (replaced by test helper) Signed-off-by: Frederic BIDON --- client/gencerts_test.go | 308 ++++++++++++++++++++++++++++++++ client/runtime_tls_test.go | 110 +----------- fixtures/certs/myCA.crt | 29 --- fixtures/certs/myCA.key | 51 ------ fixtures/certs/mycert1.crt | 27 --- fixtures/certs/mycert1.key | 51 ------ fixtures/certs/mycert1.req | 26 --- fixtures/certs/myclient-ecc.crt | 18 -- fixtures/certs/myclient-ecc.csr | 7 - fixtures/certs/myclient-ecc.key | 8 - fixtures/certs/myclient.crt | 29 --- fixtures/certs/myclient.csr | 27 --- fixtures/certs/myclient.key | 51 ------ fixtures/certs/myclient.p12 | Bin 4021 -> 0 bytes fixtures/certs/serial | 1 - go.work.sum | 4 + hack/.gitkeep | 0 hack/gen-self-signed-certs.sh | 16 -- hack/tag_modules.sh | 35 ---- 19 files changed, 314 insertions(+), 484 deletions(-) create mode 100644 client/gencerts_test.go delete mode 100644 fixtures/certs/myCA.crt delete mode 100644 fixtures/certs/myCA.key delete mode 100644 fixtures/certs/mycert1.crt delete mode 100644 fixtures/certs/mycert1.key delete mode 100644 fixtures/certs/mycert1.req delete mode 100644 fixtures/certs/myclient-ecc.crt delete mode 100644 fixtures/certs/myclient-ecc.csr delete mode 100644 fixtures/certs/myclient-ecc.key delete mode 100644 fixtures/certs/myclient.crt delete mode 100644 fixtures/certs/myclient.csr delete mode 100644 fixtures/certs/myclient.key delete mode 100644 fixtures/certs/myclient.p12 delete mode 100644 fixtures/certs/serial create mode 100644 hack/.gitkeep delete mode 100755 hack/gen-self-signed-certs.sh delete mode 100755 hack/tag_modules.sh diff --git a/client/gencerts_test.go b/client/gencerts_test.go new file mode 100644 index 00000000..66a2a541 --- /dev/null +++ b/client/gencerts_test.go @@ -0,0 +1,308 @@ +// SPDX-FileCopyrightText: Copyright 2015-2026 go-swagger maintainers +// SPDX-License-Identifier: Apache-2.0 + +package client + +import ( + "crypto/ecdsa" + "crypto/elliptic" + "crypto/rand" + "crypto/rsa" + "crypto/x509" + "crypto/x509/pkix" + "encoding/pem" + "fmt" + "math/big" + "net" + "os" + "path/filepath" + "strings" + "testing" + "time" + + "github.com/go-openapi/testify/v2/require" +) + +const ( + // X509 material: keys and certificates to test TLS + myClientKey = "myclient.key" + myClientCert = "myclient.crt" + myCAKey = "myCA.key" + myCACert = "myCA.crt" + myServerKey = "mycert1.key" + myServerCert = "mycert1.crt" + myClientECCKey = "myclient-ecc.key" + myClientECCCert = "myclient-ecc.crt" +) + +// newTLSFixtures loads TLS material for testing. +func newTLSFixtures(t testing.TB) *tlsFixtures { + const subject = "somewhere" + + certFixturesDir := t.TempDir() + require.NoError(t, runGenCerts(t, certFixturesDir)) + + keyFile := filepath.Join(certFixturesDir, myClientKey) + keyPem, err := os.ReadFile(keyFile) + require.NoError(t, err) + keyDer, _ := pem.Decode(keyPem) + require.NotNil(t, keyDer) + key, err := x509.ParsePKCS1PrivateKey(keyDer.Bytes) + require.NoError(t, err) + + certFile := filepath.Join(certFixturesDir, myClientCert) + certPem, err := os.ReadFile(certFile) + require.NoError(t, err) + certDer, _ := pem.Decode(certPem) + require.NotNil(t, certDer) + cert, err := x509.ParseCertificate(certDer.Bytes) + require.NoError(t, err) + + eccKeyFile := filepath.Join(certFixturesDir, myClientECCKey) + eckeyPem, err := os.ReadFile(eccKeyFile) + require.NoError(t, err) + eccBlock, remainder := pem.Decode(eckeyPem) + ecKeyDer, _ := pem.Decode(remainder) + require.Nil(t, ecKeyDer) + ecKey, err := x509.ParseECPrivateKey(eccBlock.Bytes) + require.NoError(t, err) + + eccCertFile := filepath.Join(certFixturesDir, myClientECCCert) + ecCertPem, err := os.ReadFile(eccCertFile) + require.NoError(t, err) + ecCertDer, _ := pem.Decode(ecCertPem) + require.NotNil(t, ecCertDer) + ecCert, err := x509.ParseCertificate(ecCertDer.Bytes) + require.NoError(t, err) + caFile := filepath.Join(certFixturesDir, myCACert) + caPem, err := os.ReadFile(caFile) + require.NoError(t, err) + caBlock, _ := pem.Decode(caPem) + require.NotNil(t, caBlock) + caCert, err := x509.ParseCertificate(caBlock.Bytes) + require.NoError(t, err) + + serverKeyFile := filepath.Join(certFixturesDir, myServerKey) + serverKeyPem, err := os.ReadFile(serverKeyFile) + require.NoError(t, err) + serverKeyDer, _ := pem.Decode(serverKeyPem) + require.NotNil(t, serverKeyDer) + serverKey, err := x509.ParseECPrivateKey(serverKeyDer.Bytes) + require.NoError(t, err) + + serverCertFile := filepath.Join(certFixturesDir, myServerCert) + serverCertPem, err := os.ReadFile(serverCertFile) + require.NoError(t, err) + serverCertDer, _ := pem.Decode(serverCertPem) + require.NotNil(t, serverCertDer) + serverCert, err := x509.ParseCertificate(serverCertDer.Bytes) + require.NoError(t, err) + + return &tlsFixtures{ + Subject: subject, + RSA: tlsFixture{ + CAFile: caFile, + KeyFile: keyFile, + CertFile: certFile, + LoadedCA: caCert, + LoadedKey: key, + LoadedCert: cert, + }, + ECDSA: tlsFixture{ + KeyFile: eccKeyFile, + CertFile: eccCertFile, + LoadedKey: ecKey, + LoadedCert: ecCert, + }, + Server: tlsFixture{ + KeyFile: serverKeyFile, + CertFile: serverCertFile, + LoadedCA: caCert, + LoadedKey: serverKey, + LoadedCert: serverCert, + }, + } +} + +// runGenCerts generates self-signed TLS certificates for the todo-list-errors example. +// +// It produces: +// - myCA.key / myCA.crt — self-signed certificate authority +// - mycert1.key / mycert1.crt — server certificate (CN=goswagger.local) +// - myclient.key / myclient.crt — RSA client certificate (CN=localhost) +// - myclient-ecc.key / myclient-ecc.crt — ECDSA client certificate (CN=localhost) +// +// All ECDSA certificates use ECDSA P-256. All certificates are valid for 10 years. +func runGenCerts(t testing.TB, outDir string) error { + t.Logf("Generating TLS certificates in %s", outDir) + + // Generate CA + caKey, err := ecdsa.GenerateKey(elliptic.P256(), rand.Reader) + if err != nil { + return fmt.Errorf("generating CA key: %w", err) + } + + caTemplate := &x509.Certificate{ + SerialNumber: big.NewInt(1), + Subject: pkix.Name{CommonName: "Go Swagger"}, + NotBefore: time.Now(), + NotAfter: time.Now().Add(10 * 365 * 24 * time.Hour), + KeyUsage: x509.KeyUsageCertSign | x509.KeyUsageCRLSign, + BasicConstraintsValid: true, + IsCA: true, + } + + caCertDER, err := x509.CreateCertificate(rand.Reader, caTemplate, caTemplate, &caKey.PublicKey, caKey) + if err != nil { + return fmt.Errorf("creating CA certificate: %w", err) + } + + caCert, err := x509.ParseCertificate(caCertDER) + if err != nil { + return fmt.Errorf("parsing CA certificate: %w", err) + } + + if err := writeKeyPair(outDir, stem(myCACert), caKey, caCertDER); err != nil { + return err + } + + // Generate server certificate + serverKey, err := ecdsa.GenerateKey(elliptic.P256(), rand.Reader) + if err != nil { + return fmt.Errorf("generating server key: %w", err) + } + + serverTemplate := &x509.Certificate{ + SerialNumber: big.NewInt(2), + Subject: pkix.Name{CommonName: "goswagger.local"}, + NotBefore: time.Now(), + NotAfter: time.Now().Add(10 * 365 * 24 * time.Hour), + KeyUsage: x509.KeyUsageDigitalSignature | x509.KeyUsageKeyEncipherment, + ExtKeyUsage: []x509.ExtKeyUsage{x509.ExtKeyUsageServerAuth}, + DNSNames: []string{"goswagger.local", "localhost", "www.example.com"}, + IPAddresses: []net.IP{net.IPv4(127, 0, 0, 1)}, + } + + serverCertDER, err := x509.CreateCertificate(rand.Reader, serverTemplate, caCert, &serverKey.PublicKey, caKey) + if err != nil { + return fmt.Errorf("creating server certificate: %w", err) + } + + if err := writeKeyPair(outDir, stem(myServerKey), serverKey, serverCertDER); err != nil { + return err + } + + // Generate client certificate + + // RSA client cert + clientRSAKey, err := rsa.GenerateKey(rand.Reader, 2048) + if err != nil { + return fmt.Errorf("generating client RSA key: %w", err) + } + + clientTemplate := makeCertReqTemplate(3) + clientRSACertDER, err := x509.CreateCertificate(rand.Reader, clientTemplate, caCert, &clientRSAKey.PublicKey, caKey) + if err != nil { + return fmt.Errorf("creating client RSA certificate: %w", err) + } + + if err := writePKCS1KeyPair(outDir, stem(myClientCert), clientRSAKey, clientRSACertDER); err != nil { + return err + } + + // ECC client cert + clientKey, err := ecdsa.GenerateKey(elliptic.P256(), rand.Reader) + if err != nil { + return fmt.Errorf("generating client key: %w", err) + } + + clientTemplate = makeCertReqTemplate(4) + clientCertDER, err := x509.CreateCertificate(rand.Reader, clientTemplate, caCert, &clientKey.PublicKey, caKey) + if err != nil { + return fmt.Errorf("creating client ECDSA certificate: %w", err) + } + + if err := writeKeyPair(outDir, stem(myClientECCCert), clientKey, clientCertDER); err != nil { + return err + } + + t.Logf(" %s / %s — certificate authority", myCAKey, myCACert) + t.Logf(" %s / %s — server (CN=goswagger.local)", myServerKey, myServerCert) + t.Logf(" %s / %s — client (RSA, CN=localhost)", myClientKey, myClientCert) + t.Logf(" %s / %s — client (ECDSA, CN=localhost)", myClientECCKey, myClientECCCert) + + return nil +} + +func makeCertReqTemplate(n int64) *x509.Certificate { + return &x509.Certificate{ + SerialNumber: big.NewInt(n), + Subject: pkix.Name{ + CommonName: "localhost", + Country: []string{"US"}, + Province: []string{"California"}, + Locality: []string{"San Francisco"}, + Organization: []string{"go-swagger"}, + }, + NotBefore: time.Now(), + NotAfter: time.Now().Add(10 * 365 * 24 * time.Hour), + KeyUsage: x509.KeyUsageDigitalSignature | x509.KeyUsageKeyEncipherment, + ExtKeyUsage: []x509.ExtKeyUsage{x509.ExtKeyUsageClientAuth}, + } +} + +func writeKeyPair(dir, name string, key *ecdsa.PrivateKey, certDER []byte) error { + keyPath := filepath.Join(dir, name+".key") + certPath := filepath.Join(dir, name+".crt") + + // Write private key + keyDER, err := x509.MarshalECPrivateKey(key) + if err != nil { + return fmt.Errorf("marshaling %s key: %w", name, err) + } + + if err := writePEM(keyPath, "EC PRIVATE KEY", keyDER); err != nil { + return err + } + + // Write certificate + if err := writePEM(certPath, "CERTIFICATE", certDER); err != nil { + return err + } + + return nil +} + +func writePKCS1KeyPair(dir, name string, key *rsa.PrivateKey, certDER []byte) error { + keyPath := filepath.Join(dir, name+".key") + certPath := filepath.Join(dir, name+".crt") + + // Write private key + keyDER := x509.MarshalPKCS1PrivateKey(key) + if err := writePEM(keyPath, "EC PRIVATE KEY", keyDER); err != nil { + return err + } + + // Write certificate + if err := writePEM(certPath, "CERTIFICATE", certDER); err != nil { + return err + } + + return nil +} + +func writePEM(path, blockType string, data []byte) error { + f, err := os.Create(path) + if err != nil { + return fmt.Errorf("creating %s: %w", path, err) + } + defer f.Close() + + return pem.Encode(f, &pem.Block{Type: blockType, Bytes: data}) +} + +func stem(file string) string { + s := strings.Split(file, ".") + + return s[0] +} diff --git a/client/runtime_tls_test.go b/client/runtime_tls_test.go index ed7e6894..e6e88df4 100644 --- a/client/runtime_tls_test.go +++ b/client/runtime_tls_test.go @@ -8,13 +8,10 @@ import ( "crypto/tls" "crypto/x509" "encoding/json" - "encoding/pem" "errors" "net/http" "net/http/httptest" "net/url" - "os" - "path/filepath" goruntime "runtime" "testing" "time" @@ -112,7 +109,7 @@ func TestRuntimeTLSOptions(t *testing.T) { // NOTE: fixtures may be expired certs, but may validate with a fixed date in the past. chains, err := fixtures.RSA.LoadedCA.Verify(x509.VerifyOptions{ Roots: cfg.RootCAs, - CurrentTime: time.Date(2017, 1, 1, 1, 1, 1, 1, time.UTC), + CurrentTime: time.Date(2027, 1, 1, 1, 1, 1, 1, time.UTC), }) require.NoError(t, err) require.NotEmpty(t, chains) @@ -226,7 +223,7 @@ func testTLSClient(t testing.TB, fixtures *tlsFixtures, verifyCalled *bool) *htt opts := x509.VerifyOptions{ Roots: caCertPool, - CurrentTime: time.Date(2017, time.July, 1, 1, 1, 1, 1, time.UTC), + CurrentTime: time.Date(2027, time.July, 1, 1, 1, 1, 1, time.UTC), } cert, e := x509.ParseCertificate(rawCerts[0]) @@ -262,109 +259,6 @@ type ( } ) -// newTLSFixtures loads TLS material for testing. -func newTLSFixtures(t testing.TB) *tlsFixtures { - const subject = "somewhere" - - certFixturesDir := filepath.Join("..", "fixtures", "certs") - - keyFile := filepath.Join(certFixturesDir, "myclient.key") - keyPem, err := os.ReadFile(keyFile) - require.NoError(t, err) - - keyDer, _ := pem.Decode(keyPem) - require.NotNil(t, keyDer) - - key, err := x509.ParsePKCS1PrivateKey(keyDer.Bytes) - require.NoError(t, err) - - certFile := filepath.Join(certFixturesDir, "myclient.crt") - certPem, err := os.ReadFile(certFile) - require.NoError(t, err) - - certDer, _ := pem.Decode(certPem) - require.NotNil(t, certDer) - - cert, err := x509.ParseCertificate(certDer.Bytes) - require.NoError(t, err) - - eccKeyFile := filepath.Join(certFixturesDir, "myclient-ecc.key") - eckeyPem, err := os.ReadFile(eccKeyFile) - require.NoError(t, err) - - _, remainder := pem.Decode(eckeyPem) - ecKeyDer, _ := pem.Decode(remainder) - require.NotNil(t, ecKeyDer) - - ecKey, err := x509.ParseECPrivateKey(ecKeyDer.Bytes) - require.NoError(t, err) - - eccCertFile := filepath.Join(certFixturesDir, "myclient-ecc.crt") - ecCertPem, err := os.ReadFile(eccCertFile) - require.NoError(t, err) - - ecCertDer, _ := pem.Decode(ecCertPem) - require.NotNil(t, ecCertDer) - - ecCert, err := x509.ParseCertificate(ecCertDer.Bytes) - require.NoError(t, err) - - caFile := filepath.Join(certFixturesDir, "myCA.crt") - caPem, err := os.ReadFile(caFile) - require.NoError(t, err) - - caBlock, _ := pem.Decode(caPem) - require.NotNil(t, caBlock) - - caCert, err := x509.ParseCertificate(caBlock.Bytes) - require.NoError(t, err) - - serverKeyFile := filepath.Join(certFixturesDir, "mycert1.key") - serverKeyPem, err := os.ReadFile(serverKeyFile) - require.NoError(t, err) - - serverKeyDer, _ := pem.Decode(serverKeyPem) - require.NotNil(t, serverKeyDer) - - serverKey, err := x509.ParsePKCS1PrivateKey(serverKeyDer.Bytes) - require.NoError(t, err) - - serverCertFile := filepath.Join(certFixturesDir, "mycert1.crt") - serverCertPem, err := os.ReadFile(serverCertFile) - require.NoError(t, err) - - serverCertDer, _ := pem.Decode(serverCertPem) - require.NotNil(t, serverCertDer) - - serverCert, err := x509.ParseCertificate(serverCertDer.Bytes) - require.NoError(t, err) - - return &tlsFixtures{ - Subject: subject, - RSA: tlsFixture{ - CAFile: caFile, - KeyFile: keyFile, - CertFile: certFile, - LoadedCA: caCert, - LoadedKey: key, - LoadedCert: cert, - }, - ECDSA: tlsFixture{ - KeyFile: eccKeyFile, - CertFile: eccCertFile, - LoadedKey: ecKey, - LoadedCert: ecCert, - }, - Server: tlsFixture{ - KeyFile: serverKeyFile, - CertFile: serverCertFile, - LoadedCA: caCert, - LoadedKey: serverKey, - LoadedCert: serverCert, - }, - } -} - func systemCAPool(t testing.TB) *x509.CertPool { if goruntime.GOOS == "windows" { // Windows doesn't have the system cert pool. diff --git a/fixtures/certs/myCA.crt b/fixtures/certs/myCA.crt deleted file mode 100644 index 8851cac7..00000000 --- a/fixtures/certs/myCA.crt +++ /dev/null @@ -1,29 +0,0 @@ ------BEGIN CERTIFICATE----- -MIIE/TCCAuWgAwIBAgIJAJ0kpLFo4pEzMA0GCSqGSIb3DQEBCwUAMBUxEzARBgNV -BAMMCkdvIFN3YWdnZXIwHhcNMTYxMjIxMDgzMzM4WhcNMTgxMjIxMDgzMzM4WjAV -MRMwEQYDVQQDDApHbyBTd2FnZ2VyMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC -CgKCAgEAzQ5NC1JBNNP79HPiUBAO59LoUMGbmSU9K9v+cQMuyyOuv0nwuiXc5anU -J1BINqgLR1VJjwTnQsXSlsr2SPs/144KgTsgk/QpMXdlFQwfqLJBIFlsQQBbMx6L -/2Ho6KE7z/qz6cqgKvYrGDu6ELUu016MbUsPWfhPBJE7Ftoajk5AIomDPmiTi0cZ -wdhC8SB0aVVQ2IWrsusfgPeOQ+ZLa/WHmpJ2Syfq41i/VKllEeCrMwtMP2By2kA/ -ufBLCnhr7yZ0u22O1Bl1+0XedWli2GiXyt1h9nQ5blTTKZi5grOzAgCcshb/bw1H -1hdJKMqkzbqt2Mxc/78PJbDgicJU1ap+fhfBmUviWIMML6eum2ObuKd4ihhXKfqp -T/nSUA0P9565W71SLAHFLdZX/VSMZnoehkwIicVGgEzjlYj2j9qBc0CjYzbEtQXH -TRGhbjMX5LSByeE6hwLM6hIbQL4nriRobar63rbOc74Tm1ed02R6BvQjgXgOGqAN -BgCKKjfUIm0Qm2qV4WkwGIAOi+hdUpbNJ0X2dU/B00qLhar+h4NT9TW4PmKf4agk -NZ6O3C1saGxjtuPnIdDxWTdRhPSUyjsllmWhrmkY2bsRB8Z47zqrdfyajXlPOmBM -1f0am4Zeo3ditBTfFqtA2LLQbn1yZwYJQ8+sESu6bsm3S89DFT0CAwEAAaNQME4w -HQYDVR0OBBYEFN4BShcjqDbbgaGvPiGMNrUEi/RZMB8GA1UdIwQYMBaAFN4BShcj -qDbbgaGvPiGMNrUEi/RZMAwGA1UdEwQFMAMBAf8wDQYJKoZIhvcNAQELBQADggIB -AIqZYn+PFMcOwraYtXtAzJwU4gElWDjIA+xVMMzulHde8t7EWo+I5iDdtn+sHzhG -B1oYFhKv/HIX9GR3XDYWluoUVA4Ed9eBamL0Qqzq4Era6ZN1VQd0egvyOT40UQ7m -2aNw1nLgWadCmsxeVMKQRdzct9G3dOfJp7K5WybINWTibNMTuoSuU5RwtzriK000 -C9pnxCD8boSNY/flOX0M5Mt3kv2JaIH2UsMKNGBf5+rXcKfhTE6JgiXorUEEztHP -PFpZ6VFKDlr8QC/4aLYhOJ9LIloaxZyk/rccCuHbdPPX5XGA3Z9i/lxSoqtShYlS -mt5vmdRwQob/ul6hPch3YRqD4VgeM1O80FEsWBK2WmGGH3wKNKea7u6dZyfQv3t3 -fUVmByAVMllVRA1YiKmBZ/kOeAMku5hpR9kzErCXZd/xrKWVym000RsvRb6apltM -sYnlCyKfIdKxUXavO0Bf4+YoaN4/p3mZchxpLBwrzhPyUpGQ9b3TuGjoEmtG57yn -6I3U40/TouJR0aF7i1bAF5QJWYOS7OycJbHAIZiQx9ENDP3ZMfYNWQO6STFJAjvC -C0u23DyiJWZqE4Uw51O7jWKh7bSEKWutwa0XKWrpxhUjHFX4qGigIvXpO9LMjR60 -YDhdCEmUiu/Hc0tt0QzyTA6w47TP0gXREeBLabzuEDPi ------END CERTIFICATE----- diff --git a/fixtures/certs/myCA.key b/fixtures/certs/myCA.key deleted file mode 100644 index 0a854786..00000000 --- a/fixtures/certs/myCA.key +++ /dev/null @@ -1,51 +0,0 @@ ------BEGIN RSA PRIVATE KEY----- -MIIJKgIBAAKCAgEAzQ5NC1JBNNP79HPiUBAO59LoUMGbmSU9K9v+cQMuyyOuv0nw -uiXc5anUJ1BINqgLR1VJjwTnQsXSlsr2SPs/144KgTsgk/QpMXdlFQwfqLJBIFls -QQBbMx6L/2Ho6KE7z/qz6cqgKvYrGDu6ELUu016MbUsPWfhPBJE7Ftoajk5AIomD -PmiTi0cZwdhC8SB0aVVQ2IWrsusfgPeOQ+ZLa/WHmpJ2Syfq41i/VKllEeCrMwtM -P2By2kA/ufBLCnhr7yZ0u22O1Bl1+0XedWli2GiXyt1h9nQ5blTTKZi5grOzAgCc -shb/bw1H1hdJKMqkzbqt2Mxc/78PJbDgicJU1ap+fhfBmUviWIMML6eum2ObuKd4 -ihhXKfqpT/nSUA0P9565W71SLAHFLdZX/VSMZnoehkwIicVGgEzjlYj2j9qBc0Cj -YzbEtQXHTRGhbjMX5LSByeE6hwLM6hIbQL4nriRobar63rbOc74Tm1ed02R6BvQj -gXgOGqANBgCKKjfUIm0Qm2qV4WkwGIAOi+hdUpbNJ0X2dU/B00qLhar+h4NT9TW4 -PmKf4agkNZ6O3C1saGxjtuPnIdDxWTdRhPSUyjsllmWhrmkY2bsRB8Z47zqrdfya -jXlPOmBM1f0am4Zeo3ditBTfFqtA2LLQbn1yZwYJQ8+sESu6bsm3S89DFT0CAwEA -AQKCAgAjBkBOoLwWg+bTOD/9oOCK5FFeCdPD8sJiDW+Gah7B/9RHRB/kC7eRWtKr -7GCJRWa3xm+MCDBgDV4M95ndmVysOsy8ihbkbp3inxwa3jlCHUBWgC+nYqIxNxR+ -iIC5y2BmA9JbKor1C5sMxpbfZ7MZ01p1CI8UtP76LrxDCPnkOKVnwMk0DbS1420Y -2RGGEh8QJsxqT1qmctastpwMKPfU9tk0o7Ok3qqWLoBvu4dR6GgVjeZ2JMk5UiQQ -ZGTM4wi8jnr90JbGz5qBUsvOjjOd9y+GLQ4ghHWSzNZMkpONKZh3zRb2rErw8vnE -LbIHT6Wapjovf6ia3k1+CJoxrYnDrsOHcWopm2kle7FXjgfHRXubcNU2aLdIAcRg -ZGGyalex3/NXKjhGf8jhaXKkOYDL37ZFtEmaUJVjjhiIE5jGByBHU0pqKk9Tdtv0 -s5r5m0T8Gk8h70+fZ/C+wkYE4h8uzqAlq/yrxBSlGMHEVG9PI9tr9bM1FLM/H92q -CqoVR6YWTC7o5Kasr33RKYJg5vPHfFoIGHX9etbfHPGQsbCLaWhTLIYus+0b4ZS1 -D1jHCoxHCjKzf2PFwogtRsmhyQSS3A3GyEWy7BZgFvgKFpq9hRC66k8Z7pnnkKrW -i4YihK17ivI5uG67Aqlc+kdahRNVWOOaPbwjGosmlULyfCOdGQKCAQEA79dD3caa -zXqFQkYDZwZcthXw9Hn+ChTCcfucJz9I0DUeL8FpUQYCkFZRUoEgF/eNrKSG+ctn -VDgrj0IZAcumpfjc4ZMug8svFYkE+vsUVgSI03KPRJ5NZ+Egn+HExURzCSQY6fK8 -mCp05+gXndiUhoco2H851esmMtCSd/5IyR3d3C64ZfFGSk/Nx66A4Z643ffB6tOH -KYWFgVoQtSb92pgyxuBzZ1JhxuBVihRzAQtuE+uZ14xPoVv52fUlYXUhGmdqtZ3l -Cio3YGZTaUqtF0BP8HshzAWQ2k2vCJUxY99dbFfsE+v8vCojgMz8KmzO7C+j3Pa1 -hq77rT29WFvaHwKCAQEA2t8R3QCkcaCRDMAPomqPJjUHrX2gdPM2zFFCvSqiVkh6 -8ft9NF8sO1aXq600IxTiTf/L8ZvM0HlPlYQSjFzGWsOgNww9MKF7L4NnJ7e/8mwP -jqfajNcqecHIXvNi0AqXOpN/hEhm5MWKce/BPV6GpnRnb5doy8wOG0ESsmUA/5TJ -y/65LVxDKT9SdymDVayRwq2vNn9qW2BBcM9yan5GstkE3zzkrzKcCgz5X09/vO3R -K3fYk0FReE9CY9XAQGtz36Ra19efETzvWPi18zsP96QMUYIS2+Y45sVPhGZbY2aG -HQXTg8xIJN51E+jmWpJ1vv27izFh5TXeloRD4qldIwKCAQEAqkG6+KVy4OjXzlsb -MTiP+eaLfVFYaFmiSv3dNPM0wjDi8+2t0Imeqk3MPvBRExJ17ReChbLB8ERLj8/R -Jrgl3e5TBoLP41kKXJQ/B9fS8NkZNFk/oOtrcZGb8kN3xr23l8abNQBOpwqEoNfe -Y/wKO5GZCk8OhHAAVtQ/FZVaoAJmq1YzKpLjXf9WyihzbzaYb2Hgs81jRrN1OYTx -FVfPnyyp5woQgkk2BdLchj/L//LYOqXmOOBu6tH7BKGE3rEiRbciRjkHDXc4hmM9 -VSJgy3+o/8K5FDbjREUfOs2GGSrIDBBCE0ZTzFNxjo51d7x0C7Ap98Ley/RNzwZj -8mSJ6wKCAQEA0NXvcXPfdBvEyumnAU2zcL1AqiUoKO635pPSnjRD2RgnVySi/omg -5q1k4oXNLXwLwmjD67DA6FoXuY3fNNaA3LGz+VJQQEqUA23Zy2fkWicJYRB/08qp -2KsxyIdqTR8N1PJPxaRfqQFja/tb4naC++gtmahacbot64tXj6gYH8WUFnThs4pI -+t5UjSarDeAu5BZdDB7fGHjrd/w4K6x5QMUZhPfRK+maQWzHtE1ikJ5J6rPbjgXQ -+n6F1kRpwA3G7ikgFLrEJ+qAZeBJm99LCPsaVdtKq08sE+VITghsQpfcd2zLuQH+ -BE/OXkTnJpyAhNANVm6z/cQ8sllZfLglCQKCAQEAkZTQ0xnUeJTV0CqljMNCIN4M -i6Xyqf5uUDPfooY+fILbemT/acYUAkbjamgJlQMQ7yui9WV7Q/9HiCHaVh3o5zrV -zaq3vocA9x9nK998/He7772/uJarINvLFj/p/vTQM4Lni+bJ93bk6XE+FQKPgY9B -GfeFFaVtH7gimB4CjrxYprhAfqyxyE/m6JVMRg1olIFuav37GYP+TJ2K85klQRNa -TEXbm6ZJpSHfNjKZzUczziaIbwnMN9OxJY6M3a1JuEy2h+og5oRdMOoB6RETzhle -mxT5uEtA6mR6KyBZBjWhcl/V/Rw1DVMmtVbHCdc0+Xn/CMemRLCw1bxRUu/iww== ------END RSA PRIVATE KEY----- diff --git a/fixtures/certs/mycert1.crt b/fixtures/certs/mycert1.crt deleted file mode 100644 index 67853101..00000000 --- a/fixtures/certs/mycert1.crt +++ /dev/null @@ -1,27 +0,0 @@ ------BEGIN CERTIFICATE----- -MIIEqzCCApMCCQChJZEdSdrQkjANBgkqhkiG9w0BAQsFADAVMRMwEQYDVQQDDApH -byBTd2FnZ2VyMB4XDTE2MTIyMTA4MzMzOFoXDTE3MTIyMTA4MzMzOFowGjEYMBYG -A1UEAwwPZ29zd2FnZ2VyLmxvY2FsMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC -CgKCAgEAs1MHhleossLBkYKYwOT+82RT651CfCOilpEUhm92KGRSMQXZEk+2TUgc -dGPeQNDNmbpXGzdk1HZkqWR5XKfSjWWxfmBlbBoYnkL3neoiXBdBVsgHkEPdP5ly -uJRkohy6az1vnq2vLaI+YujStutf8hSdcPu9VeALbrR027dMbY2XMC97FteeVaw1 -mXmW9UHDVSV9UPBPswUOQWhjIADBk5IYaYASCY3M4X5BPCWFu1oQhgVMEhodBoBj -pHhHrfoDm1TwtT+dp53TmR10zpUiN+FcaVMsjqN4DWX4ma0uhu+zJew2XjCJkNfX -wVqGFpe2Hx+lupOGs/kwBvQ4PYn5ydgcm5DTggBC45JxCAVi3tQCYGsg2xkX9yPj -aXYc8E4/aeQI9UZxUeR2siBn8ECX4gJTmPJbQ4Xykqn6YOHyxIVoqd+9wo9Z1weH -xCWtPGESg7l7Jn/6WQ5V8z6RzrquGi67asrpYpv2lxNXMQA0f3S8sWYe4f8QVazy -ALtu8+0XE17UPjlbNBqEfCIrMsYmL5VyMVbL0dlXXBxHjzfpXraNGoSD4v6LxRxP -dWQgrhEZ6DmfiWfX8uhLdMwlvUxNXj33UDtM8dtN6mHERA9wF2RQQzPddZ0MYmUF -DI92i9mRC7Yzx6mcv/yUnFw213Jnzg297lW0Xp0ifawyPi2V8f8CAwEAATANBgkq -hkiG9w0BAQsFAAOCAgEAme1gyNQry3E5bj4XfdL4aNvZamzLaQVRlNZSHUzDhhpH -6N/DK/CAw4g4Msty7g3KBZPmldJhxH0bnSoRGMjFdKn9tVQeJOjaHQ2Z3cQWwdte -iXtu2F38SVfP5HCh9ASQ9vQXahGOruUPUUNUnDLfOBea7vrT3DmVugXlMSmaYuSJ -JdrbPzD48yy60AEDlCVpY2m1cEc5SmTkXbrAg2jhQd6ytaPQ28vGQnpZHSS/xWjC -Hh68o5SUoGoFErZxPd0o2brHavi4YybYt7CXlWG2TJ89s3BCSPIHclNF2HjxRq/r -2Q/Ttzo3cRBxi3RBnrLdn4qNgJjZnWaLobjaWcs1fbI32allogLsiurCwZb0ToC0 -fNMzyHVNWY8BqsuyWyF2H0F9rklmqGFJSmrqt8kDLx0xpkZchGPIDSRh+f+PPDmE -jGPPH2qxz4un0foJx99dtw18TPaplFo2LxRK89koTiQNyzAHwSn6PHGlyXhNPsUt -K5GzjAu6B4uyldcg2m+4O/dbNdeqSczYAFenfEO7PRAy3AP7Lxs2xqQaNiA10965 -vYmCNIOuV24CuFEIrjOQkZeFCw+odsgFs5Nv8JfDdA+BRr+Haq8FVX8afEc0BEnr -xY6f2fvgYTMvx0Z3UVT/XJ3POWHRL0HFLj5avHE0eOOkrcPbX6UsANd1v0F2BH8= ------END CERTIFICATE----- diff --git a/fixtures/certs/mycert1.key b/fixtures/certs/mycert1.key deleted file mode 100644 index 90cb0365..00000000 --- a/fixtures/certs/mycert1.key +++ /dev/null @@ -1,51 +0,0 @@ ------BEGIN RSA PRIVATE KEY----- -MIIJKQIBAAKCAgEAs1MHhleossLBkYKYwOT+82RT651CfCOilpEUhm92KGRSMQXZ -Ek+2TUgcdGPeQNDNmbpXGzdk1HZkqWR5XKfSjWWxfmBlbBoYnkL3neoiXBdBVsgH -kEPdP5lyuJRkohy6az1vnq2vLaI+YujStutf8hSdcPu9VeALbrR027dMbY2XMC97 -FteeVaw1mXmW9UHDVSV9UPBPswUOQWhjIADBk5IYaYASCY3M4X5BPCWFu1oQhgVM -EhodBoBjpHhHrfoDm1TwtT+dp53TmR10zpUiN+FcaVMsjqN4DWX4ma0uhu+zJew2 -XjCJkNfXwVqGFpe2Hx+lupOGs/kwBvQ4PYn5ydgcm5DTggBC45JxCAVi3tQCYGsg -2xkX9yPjaXYc8E4/aeQI9UZxUeR2siBn8ECX4gJTmPJbQ4Xykqn6YOHyxIVoqd+9 -wo9Z1weHxCWtPGESg7l7Jn/6WQ5V8z6RzrquGi67asrpYpv2lxNXMQA0f3S8sWYe -4f8QVazyALtu8+0XE17UPjlbNBqEfCIrMsYmL5VyMVbL0dlXXBxHjzfpXraNGoSD -4v6LxRxPdWQgrhEZ6DmfiWfX8uhLdMwlvUxNXj33UDtM8dtN6mHERA9wF2RQQzPd -dZ0MYmUFDI92i9mRC7Yzx6mcv/yUnFw213Jnzg297lW0Xp0ifawyPi2V8f8CAwEA -AQKCAgBZtF8/RPqO8f4C3GGtnOAswTN52eE4WFstFsY9ueRRsF2tSE+eaWG4pyoU -zyCPK+St0hlg9ATsg403b5uGTi11rjlsDqyttyA5iyZzSHyHtNpqnwWplUlIV2qc -Cx+MOPLIUqNTrW7EVTUAJZfDCVulrcpUipncK4eMiZkrkDYbV4kaAaaBdrsuAEeP -ztNFPPCJ14coxg4Yb58B+UYc7EPpnlu36uka/mRPKOlZPSv43MUHRf8XzxhV+EPg -Moso7LiBK6x9/qTPBJSlM6cK8G99pK6lwYW4lO2pRilmNsvflGj5v4Ay/fTTECZO -AwqwopPoXdx5yPLJdQ4hbGn13t+k0pB4LYXl1xqLg2Z9QN+pgC2h41OrSx8Ozw9U -KTocbsMV6pafnMRoQ5Fjb+eTy4VE8rZl/OlMDX2cR2XL+a3ypIAA5E4KrYDiIBiU -MSA3EA3GsOOnyrV+fII+f2tVo/qDnvxQO/ZPUr/XG2xtJ+gqThWlrBft/O4/lCju -+kfNg8cMHtahGOmLz1ALsl32ANj5jTZmVOEs9xTG7+TeQ2RzWeBYTB7oNTMNIbaL -pTZTzxoeRyxx8sUvtaTb23IWSpRUiS4+F7Tn97g6ks8fYQPsVkl3WzXeECaL9uNN -hFkAwd0omD4TwQlmOUVm3IH7A0InTAaooC9jJfNqmhhHcLUAgQKCAQEA3N+pR1ed -aCXQit6bgw0rIF6RzjeGp6lLGaPdvCUM7sdAUwSGbFOgkcaw9TELFpCpfZGKFXI9 -IxPOwjFrURY4S2iuyAVv+Cw7trXW4BF1z+08M9RWYGLvyUsO7FIsGUmdYRtasb5L -IfHfGoXttadKWcdFMSF+25CUcbleyCNrJzXOzeMn1/UoN6+qfsyfaAD03nw/ZmhA -mK3UKjR7UOUPXt9gIXVivRaEQBakrLkJtK33fl1hztqxComE3/h6Qmj6iRmyxX3y -v3mzXbyC6jobq1tLUWpxvlQgoAyk+zZ0LNEHlkVfertaz0XdN/L2ZgjoGjJxfn/y -OK0a4jJyCpXXEwKCAQEAz9fJcpqaB25joZsqG+islNljyFjJRT9+E8IU97OglhJM -8T9TFs4RNsAxIqHwYm4KuoSlI4GhYeuOxGk6yUGm8cO314J7Wv4CAgZeJBcmxJUs -C8FbcXKbesK3VIuvATgzI9Vq/UF+GxJCkPctZJ9Oa0t578rVS4JH5ZJQdw2A77Lq -kGunMDboVY7EYDOn/fNMKGfcnH8KIQn/2b6CKLarj39b1fG7MeCuxPRejijaKtZI -ra5n0ofLluGo9HBXLgqgsjhjkSWU79lRypuKS8qOcjI08Xaw3Q8+qn0uLCARd8rN -2+mQy5OAZJCWpYIKPL6E41GaxcaTdOYzlOCs9Oz65QKCAQEAgSqzXitYvC1RFcU1 -AKDU1as4bXZ/YtFYP/halcq9E26mqWX+Dp+hSV7+4YT6zQlwdSSFsiEKq9bLlTk9 -X0A1T7Q6cnLrliCYEzOoI4VSdnRwPocwtFFnlTo10fIEJA2u4bkTgtqcKY+/P02P -RCo/Ct3EEwVZoKGejhsv2K8N3PJUrIbpKBwQlvA+LsUPe80DZpEWqpbRH/iYGM50 -R0yNfpf3KdnyEk52rNwRFYloqacLE3Uc29F8s4LUl/5B0VB/I2pJ58DOEzfiszCp -Br1QrRdIpqYvOnUMV0zNtrOToRnk6/ZJ7gZfBtP+mNeXTPhsc9WIFchRKN/i1uFV -W+dgzQKCAQEArcXTDdio85GeB1395PuyX3kqbjWdgiJFvStF8JvkpdSDNCknxSdh -SQ+DhVsz6nfqzGtezsLxNTeHVDxPBDm55OUobi0QCdHZx+ufBjm9FhtKikGNvNp/ -mDH4qd1n4nMkfs9O9pOtZeDsetvOvhRbsmWWe6BwmQNCLXUZhZBqvv4uE7WOQUeH -FRGaqnxF9pNWl2nPD6E/zMPZgCpCFNw1sHJhTA0h39/k/5L5A46waaRje6MX9vPG -ik39vvG2Ui5ckOWIibCMR8TBF87X3+ppEp1bmo8L7Kd0U4L5+baOJEQRvc4YW7zl -Wi9xZMvG12bLIGv4JWeTnediNRVsRhNk6QKCAQBXYkpxk6LTgP+b6FJ7fiImzDbH -QJ+RbBYJdgYLEarKWdWhNqj3YiDOUJt+ve13reybL4cLmOYoNzeUO9IHyGeTp+WV -gtPf1g2hm2TZannWsoTvnoXJ8yR52ZQQ5JusNosbmlrqWRAN8GhISdYTJDNcS2hD -PnVX/kaJfRDennokD+FWuyygua66LBdZi3UNgGMay15/2CCoC3PoejfQORxDyPP9 -am+e3/U6QG1/VWMHen3Mb0AZKwEBAwX1jL4EpoDZ+Y6jP0tbQ5xL7RivsUNtAVlQ -m7lumflcBy1WqkmviVJ9M2iFuo0HznuH1qlgOJpUiqZZjL/gEvkdDNMcQSmH ------END RSA PRIVATE KEY----- diff --git a/fixtures/certs/mycert1.req b/fixtures/certs/mycert1.req deleted file mode 100644 index ee4728f0..00000000 --- a/fixtures/certs/mycert1.req +++ /dev/null @@ -1,26 +0,0 @@ ------BEGIN CERTIFICATE REQUEST----- -MIIEXzCCAkcCAQAwGjEYMBYGA1UEAwwPZ29zd2FnZ2VyLmxvY2FsMIICIjANBgkq -hkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAs1MHhleossLBkYKYwOT+82RT651CfCOi -lpEUhm92KGRSMQXZEk+2TUgcdGPeQNDNmbpXGzdk1HZkqWR5XKfSjWWxfmBlbBoY -nkL3neoiXBdBVsgHkEPdP5lyuJRkohy6az1vnq2vLaI+YujStutf8hSdcPu9VeAL -brR027dMbY2XMC97FteeVaw1mXmW9UHDVSV9UPBPswUOQWhjIADBk5IYaYASCY3M -4X5BPCWFu1oQhgVMEhodBoBjpHhHrfoDm1TwtT+dp53TmR10zpUiN+FcaVMsjqN4 -DWX4ma0uhu+zJew2XjCJkNfXwVqGFpe2Hx+lupOGs/kwBvQ4PYn5ydgcm5DTggBC -45JxCAVi3tQCYGsg2xkX9yPjaXYc8E4/aeQI9UZxUeR2siBn8ECX4gJTmPJbQ4Xy -kqn6YOHyxIVoqd+9wo9Z1weHxCWtPGESg7l7Jn/6WQ5V8z6RzrquGi67asrpYpv2 -lxNXMQA0f3S8sWYe4f8QVazyALtu8+0XE17UPjlbNBqEfCIrMsYmL5VyMVbL0dlX -XBxHjzfpXraNGoSD4v6LxRxPdWQgrhEZ6DmfiWfX8uhLdMwlvUxNXj33UDtM8dtN -6mHERA9wF2RQQzPddZ0MYmUFDI92i9mRC7Yzx6mcv/yUnFw213Jnzg297lW0Xp0i -fawyPi2V8f8CAwEAAaAAMA0GCSqGSIb3DQEBCwUAA4ICAQB7U21HoBp5Qfrwd8aA -KzBY2BfEp5ouyn32kpfkB3Ha6+XJ69Lt1WHMSKnmYamlwZCSOS2uQ6DzdTLDfZpC -8PH5Gs32O9zJwUeSuYcUQGfcAenauu9gwC5ZnIbhOs5YTnEFquVsBqrNUKS+hLKJ -sAPtucoqlLX5qSkv/BOK2X4os90LAmx+yB/yarAzZOO0ku8qXt+MHI+rOMPLTmm9 -kYhtyXejQaXLOVbvQ9b2gxHvMcyLhklc4KpJPRfPzOdNebHsf5o4Em6lxeglGw/A -z05sBSAla69sEygcItZryQ4WjMRUpsLePXJrlSL5DYWGK6BX1gCkWtpXLqE1HgR3 -4L/xvaJQ5ZWpLoyJoJauU37Zhd5dLNGpNiSSEA0BKOjj9Kjm8nvsJE9DgziTaG57 -qFLRkMkDdBdb5wOfVYI/MY9zc+igrFPQJkQ0Xkdza8yXegBldv1JRe+49zifysea -Y/B+qWx8IpeHke0iEMqR6iWrw6oGBG/obHJ/V09DwC6iU8vot+pLr/bSyoUCUP30 -OEATJf50ic9oZYXgdT9oNBcAlAriuzoQuGi9nAKZJss6YkhooWoqXlXNQgAEc2gl -WF4fNumXwVaPVeW2q36Xk1btHz7k+IeVUg1jaPMPUJ+1dgIOZA7FcoYotvF6StyX -xoHybhvC7lbeif8EK7tJ2p4hug== ------END CERTIFICATE REQUEST----- diff --git a/fixtures/certs/myclient-ecc.crt b/fixtures/certs/myclient-ecc.crt deleted file mode 100644 index 3bd5545b..00000000 --- a/fixtures/certs/myclient-ecc.crt +++ /dev/null @@ -1,18 +0,0 @@ ------BEGIN CERTIFICATE----- -MIIC3TCBxgIJAKElkR1J2tCUMA0GCSqGSIb3DQEBCwUAMBUxEzARBgNVBAMMCkdv -IFN3YWdnZXIwHhcNMTgwMTIyMTUyODA3WhcNMTkwMTIyMTUyODA3WjAYMRYwFAYD -VQQDDA1UZXN0IEVDQyBDZXJ0MFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAENlON -9ojzKxcMlsAIFcsc+JoMSOd1bREjEHAPaj77L0NjO6p605jT2TTLbj1lpDGD9XRc -vw5iiHvhF41Sl454wjANBgkqhkiG9w0BAQsFAAOCAgEAyYwVGVG/Jzei9zxmWT+k -LeK7OpGzOIyfBdEvQDFSfmyHoVJsR2LdicMJAI0gnVl5V0LdfBpu1MRz6Jdsto+u -RKL1WdygESzWQ/LtqvT4rb5vLhkpCBY6Ua+SoTpY/93iOZpf1ArKOtHzL4Xop2Lb -6/0hHYU73vaBjd9YnA3T0jVFsI/otpfJhSY8FGdKSYKMf6rob9+iv2Tyjm1svkV0 -IBL0D0v/LlGeM8UqXC3ZLaHsTxWi2v6PNfRyFnSNoRX4+I9ejjYvjIKQ9giVcPFQ -SfhR5xm0C0xxYVqoIb6gX6owlmX2duIaV6qjU5YSzwEZqkv0Ze9i+zztBVqBRA7q -fC/AMSxtqo4+Faj+hxX9T4D15hysx76uS7LxCi8GkypSZTGkjhHdMRKa2jIEvW3A -9nKW4nnC5sEBDrOTwaH4Mn6zFik3r9LTfh1gljLu9Ieqizb1gXloFhWJYvC2UwXO -ins3tX2VYBF7p6yIXRmc5nZlpFErGqu2MR/lwJKD6zGIJOzCza/4DP+Mppw+DSPN -XkNJG05uymsaEZceupeBH0uCgVSuVaZ3nfA73RM+0evxsscii/Kw/VFNvNDy5fLg -OQWRm6RlBTK2dRqpsfo9irjdd6NVC0EfqZceYIte/eWn9aPU5uTy/TzRG24ouKtY -Ixs1usnXCabNN/n0AMI+xVc= ------END CERTIFICATE----- diff --git a/fixtures/certs/myclient-ecc.csr b/fixtures/certs/myclient-ecc.csr deleted file mode 100644 index 3f698e07..00000000 --- a/fixtures/certs/myclient-ecc.csr +++ /dev/null @@ -1,7 +0,0 @@ ------BEGIN CERTIFICATE REQUEST----- -MIHSMHoCAQAwGDEWMBQGA1UEAwwNVGVzdCBFQ0MgQ2VydDBZMBMGByqGSM49AgEG -CCqGSM49AwEHA0IABDZTjfaI8ysXDJbACBXLHPiaDEjndW0RIxBwD2o++y9DYzuq -etOY09k0y249ZaQxg/V0XL8OYoh74ReNUpeOeMKgADAKBggqhkjOPQQDAgNIADBF -AiEAsqdXJEIuedKkuiavgfc0YXssFWBORAC37F5w+Z0kGEMCIDRGiCaZG4Z/Gutm -id7N5T0Uxah0p5i6OzvCpYPN8f3Y ------END CERTIFICATE REQUEST----- diff --git a/fixtures/certs/myclient-ecc.key b/fixtures/certs/myclient-ecc.key deleted file mode 100644 index c123550d..00000000 --- a/fixtures/certs/myclient-ecc.key +++ /dev/null @@ -1,8 +0,0 @@ ------BEGIN EC PARAMETERS----- -BggqhkjOPQMBBw== ------END EC PARAMETERS----- ------BEGIN EC PRIVATE KEY----- -MHcCAQEEIJyZvFqw3os7TVGOSvK8XM1qysN32jG6G0AQ2mDxcRaaoAoGCCqGSM49 -AwEHoUQDQgAENlON9ojzKxcMlsAIFcsc+JoMSOd1bREjEHAPaj77L0NjO6p605jT -2TTLbj1lpDGD9XRcvw5iiHvhF41Sl454wg== ------END EC PRIVATE KEY----- diff --git a/fixtures/certs/myclient.crt b/fixtures/certs/myclient.crt deleted file mode 100644 index 92a58149..00000000 --- a/fixtures/certs/myclient.crt +++ /dev/null @@ -1,29 +0,0 @@ ------BEGIN CERTIFICATE----- -MIIE7jCCAtYCCQChJZEdSdrQkzANBgkqhkiG9w0BAQsFADAVMRMwEQYDVQQDDApH -byBTd2FnZ2VyMB4XDTE2MTIyMTA4MzM0N1oXDTE3MTIyMTA4MzM0N1owXTELMAkG -A1UEBhMCVVMxEzARBgNVBAgMCkNhbGlmb3JuaWExETAPBgNVBAcMCE1pbGxicmFl -MRIwEAYDVQQKDAlMb2NhbCBEZXYxEjAQBgNVBAMMCWxvY2FsaG9zdDCCAiIwDQYJ -KoZIhvcNAQEBBQADggIPADCCAgoCggIBALGjhpJfej7btWCO4OCRJBliUAUyPMO8 -B649Qjn1Yiw9E1L5viByYJSihsfUQ7u2gHip7QdigKCA/s4+w8V2L0Dv8lCowCLk -exf10b7XGQaOqhk2mlr/jOapAg0pKDoUlVErBBZK2s6UbD/gLXAbxudwxCFKJ1Y7 -d/Dw5aTl1vlWZpHzf2o9/ZCeHXf8Xu3aMIEPJ79wG0vzNZK7bL1r1lQVzACdHAr3 -4HAQAvgWB4ZjKqN8z0vGC0N0MpaAuHD8fH8wQ5YiWBbDhDPFVzRYU8PcQjeZSMFq -Oulew9KVm+vXtcMvteEoXMXwWlqAGlvnv7sskc/VbrLJJQaoswyKgy1QCKxVO47E -f2iU4kP75iDYx6NpApdnpN3zxHMHyZDxuwmtoKealenxl5cZeHc6uUU1wXk+nmy7 -TrgW509mcopHzHj+Q0zyGUg/dRws3qXPAGZehJPoaYF1F54eiindF1yLMMH5osvy -1bNp2EQezOlY3P4gqW9VHq3CQvytmDbXqS0vPzVAsFu8YazM3Bs0mW2bBXrEsajW -DSjrvbhdZjlL9j2jqwZ2nzyan88M5t5T0vZhcu+wKisATI1yLdV3oWvLmdFz/XA9 -L6UyosTiwC1MWPmkOY4mcHn/Px70f40+wO815pZ6FbjecxRSyMfAm6vDPWtLAMUr -1UoD4vasyvQNAgMBAAEwDQYJKoZIhvcNAQELBQADggIBACI85R1LfDwKpmWFdCeN -M8O6TwSftxh113QzMvobYDMmBI+yVn0ZvpcfP7E+LWRjzNcDxMFbntbbFWt99Rcd -rJek6CVxLJug53mUEFmvktreHsJ1T7cMbk1ZVroAurE7hZOWYM2HwXlKzVyXX0qh -wR26HSuzQcGBfo5/8e6dzMuy0fUVkgDMu4oKt0+mGgS4kXsOyexfRRBkY9GPusVk -gSzu/WbSGNxNvp/ewWNi8waqrN3noM83iae+BXxI0Sq4eLTQ/vnV1ReM4gRR12Vw -anwZqHZ/WzBV27z9gW36t7wRxJS/uTXQ8J08KtBRBPv+19NXSqqjys5Jg0P1f+l9 -k+sWwpVqIF2rAQ3FyMfboaFKPC0jRn7iJMjp9KyvMbSI+25/rP5xvMicoJwRlk9I -GNGasxSfmRpVpV+WG04xMGp3cPrCXHBdAAjI3O68YIPOX3VqZ6MasN1iGuYWOmam -yeKzLUApYdtkR7yJ+X1FOKVfbzX27CLYmzwrHnDLJzu8NVgqLGU+qTSK0zm3sYE3 -w3ex6WX86Oz2QBJ5h/s2TLbsWis7ZkKjMyXqVWlbg4P3reyNrfpAoc0y1R9EjZlf -1c9HZBRBuRMgaPWmdSR4lxw1FhQBTstIfzC8lBYNbt8QRRtJIxVF9mxiL7H+6XH5 -FZXcQCHun6klGtCkypeAaviE ------END CERTIFICATE----- diff --git a/fixtures/certs/myclient.csr b/fixtures/certs/myclient.csr deleted file mode 100644 index f65d21f0..00000000 --- a/fixtures/certs/myclient.csr +++ /dev/null @@ -1,27 +0,0 @@ ------BEGIN CERTIFICATE REQUEST----- -MIIEojCCAooCAQAwXTELMAkGA1UEBhMCVVMxEzARBgNVBAgMCkNhbGlmb3JuaWEx -ETAPBgNVBAcMCE1pbGxicmFlMRIwEAYDVQQKDAlMb2NhbCBEZXYxEjAQBgNVBAMM -CWxvY2FsaG9zdDCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBALGjhpJf -ej7btWCO4OCRJBliUAUyPMO8B649Qjn1Yiw9E1L5viByYJSihsfUQ7u2gHip7Qdi -gKCA/s4+w8V2L0Dv8lCowCLkexf10b7XGQaOqhk2mlr/jOapAg0pKDoUlVErBBZK -2s6UbD/gLXAbxudwxCFKJ1Y7d/Dw5aTl1vlWZpHzf2o9/ZCeHXf8Xu3aMIEPJ79w -G0vzNZK7bL1r1lQVzACdHAr34HAQAvgWB4ZjKqN8z0vGC0N0MpaAuHD8fH8wQ5Yi -WBbDhDPFVzRYU8PcQjeZSMFqOulew9KVm+vXtcMvteEoXMXwWlqAGlvnv7sskc/V -brLJJQaoswyKgy1QCKxVO47Ef2iU4kP75iDYx6NpApdnpN3zxHMHyZDxuwmtoKea -lenxl5cZeHc6uUU1wXk+nmy7TrgW509mcopHzHj+Q0zyGUg/dRws3qXPAGZehJPo -aYF1F54eiindF1yLMMH5osvy1bNp2EQezOlY3P4gqW9VHq3CQvytmDbXqS0vPzVA -sFu8YazM3Bs0mW2bBXrEsajWDSjrvbhdZjlL9j2jqwZ2nzyan88M5t5T0vZhcu+w -KisATI1yLdV3oWvLmdFz/XA9L6UyosTiwC1MWPmkOY4mcHn/Px70f40+wO815pZ6 -FbjecxRSyMfAm6vDPWtLAMUr1UoD4vasyvQNAgMBAAGgADANBgkqhkiG9w0BAQsF -AAOCAgEAM9VLDurmvoYQyNEpRvFpOLPkgr8rgboo/HN+O/hN9jtmXranLxzTzd+u -OJCujyzS3sbqiZwPeT3APHH4c/mLdrEKZHjfy2sEeXMsVW6dCOcIEYsADSCM6chi -zU86aw4rAkd6YYB+lXFsEmBq78AIpw0vcdpoPoqGRG9ETQsjr4kD3ATGHTnaP551 -61JJed7Kn5FTbieTmzmMa46dn7GjTTmPEcoAnHNCx4CbJAHwWEzvQWF4lVlyb2di -jFD0NQ0WeaFHK/f6UQMqMq+7TpurN8sLWDlyPHA2X/FT+OsUMAX2mLcwZEsYhTjP -dC4ZCuZ/itDgEp3hyPeKiLo+mL/bhhy50nzah/qclI9PS8ufUXEjWoObqiJ5eyIZ -jTZ73qpLupS+Yrami98IYfuOotwGzKkVLwUPtCWQrKsun6YNtotuKKmqEEQX3Fm3 -ZXIYv0BckkXIGd0aKPeMGgMUO26pyxPBSRWB29F07LXzS6eEmfOHvZcT+QLZmys9 -FkH3yePeTilojCnxNINPyKT4Dk0NiZviCdKavUIJ5QtOyDJ1Nc9j5ss+QaAaNtZZ -VTTjupNp+cfCh/kdyGpGP+GgXQQcGgw4OaIbfXqmec7RsqTOppK5gDR4Ne3e5FVm -SpPDyHbv2GJolPG8/HCOsLCJED+wAEfhK/wUg8ZpC+7Ymct2TU8= ------END CERTIFICATE REQUEST----- diff --git a/fixtures/certs/myclient.key b/fixtures/certs/myclient.key deleted file mode 100644 index dbcedf27..00000000 --- a/fixtures/certs/myclient.key +++ /dev/null @@ -1,51 +0,0 @@ ------BEGIN RSA PRIVATE KEY----- -MIIJJwIBAAKCAgEAsaOGkl96Ptu1YI7g4JEkGWJQBTI8w7wHrj1COfViLD0TUvm+ -IHJglKKGx9RDu7aAeKntB2KAoID+zj7DxXYvQO/yUKjAIuR7F/XRvtcZBo6qGTaa -Wv+M5qkCDSkoOhSVUSsEFkrazpRsP+AtcBvG53DEIUonVjt38PDlpOXW+VZmkfN/ -aj39kJ4dd/xe7dowgQ8nv3AbS/M1krtsvWvWVBXMAJ0cCvfgcBAC+BYHhmMqo3zP -S8YLQ3QyloC4cPx8fzBDliJYFsOEM8VXNFhTw9xCN5lIwWo66V7D0pWb69e1wy+1 -4ShcxfBaWoAaW+e/uyyRz9VussklBqizDIqDLVAIrFU7jsR/aJTiQ/vmINjHo2kC -l2ek3fPEcwfJkPG7Ca2gp5qV6fGXlxl4dzq5RTXBeT6ebLtOuBbnT2ZyikfMeP5D -TPIZSD91HCzepc8AZl6Ek+hpgXUXnh6KKd0XXIswwfmiy/LVs2nYRB7M6Vjc/iCp -b1UercJC/K2YNtepLS8/NUCwW7xhrMzcGzSZbZsFesSxqNYNKOu9uF1mOUv2PaOr -BnafPJqfzwzm3lPS9mFy77AqKwBMjXIt1Xeha8uZ0XP9cD0vpTKixOLALUxY+aQ5 -jiZwef8/HvR/jT7A7zXmlnoVuN5zFFLIx8Cbq8M9a0sAxSvVSgPi9qzK9A0CAwEA -AQKCAgAb4VyHsLCRGQ64nvQwitctnL6OcjoTRnm2ISs5yYelBdj4lvX+RbVe3rtk -ta4D0jsLtS/cjts9VcGoQTWc0lXMTVysyC+Pymh/dDd9SmlFHDMaTfWf/qfws+n8 -gs8rfnuJB8VWcl0xOx5aUCcRh2qKfKprxyWxZRgIGucQIHrDG4pxsdP3qs8XWZmq -cVO85RfjyaslYsUGAKAR7ZS9jiVPgTRJjF8QYaM6M2kj4uE/eGUCz94BOI4gAibG -dGF+akJn+/0/nRhSSlF/hqOPNaXAAdvqugYvRSsF4be+X3jfZTXD8sMLGbil4Hlt -5tk8P31aNT6Vbhw3t1Y2W1fuyfaYbPZfprpR/6ZPV3Uf1oWoh1ystIxWnfU7Qdxu -vrkHkrtho6Qt/7d8nNg0mQ8y5glNcVh/iNu9gkyHIpQ2dZpM9tpHArBGweHVDMvZ -vrb/oJ5fRxnKkyouMtWvqO1TY4STPBwCDNSwJa0yxTn3fLvkOdHk1nGEKra7E7Nc -hgsIe4q1ZoEikg7cZe8pvcsHIFfju3Kv/zgDTvHjzHPTdNear7mpk/LihlWdbTiI -UKkgv17JHRsIhfE5G4pZXLRv2qjCGh+uS8yn2k5qPJqGoyIQ2A7BYbaQ/y2gVh6u -hnVdKeETT2uUqIS3xHrV0U9grAeldPJu7bHRwSoJ+HUbp+D8QQKCAQEA4/5K0+Qq -p4rpB+4FpPkMcM4yE1j0ASwHsKGMDPU70/t8yfzZBlpf5WNHTOWa8frnxOyazo8E -sjm2Xw1RlMb21bFF0wjb3uhN2ak++0zIKMf5vWnM0bb2z7yzbcOJVxLzO9DmRUh0 -OXvHvbeKbW9KXHT3YKA2zjaw0mO1zl7sd7r028wYpD6owGtfzooyXwWCnByIQ3nM -JFB7wFJGIg6Kbu2eJULrN1EaT1Ye0FUVmc4x55FLmZvkYziQ88e4UsjYdZ4R5EFi -2XULVI1RA+NPqDXkXmpIx3JnRRvaPc74QatGvDFwY8YeCAjfGFN5LiwFJ6Cz3/jf -WjDLOhqoSiYQ2QKCAQEAx3W7uPE7WNQRsyu2QnsEDdlikgP0FJf3fFZOYurfsxp7 -iqTpNkR9pSWXftP4FBM/KRruoY5TucmPTfGPRS6sQWTfUkVOhrUpOLnuWjf2DJxH -Qqb0wnT76WcAB4L5Gr//91a+w3dwAX5YhdTZLxEKgpm8ky290otCg3+AYOb/P3Ja -V8RR8RQCNV1+y7peBgjj/mbYeVpxjTiZ5cq4cx2OU4rnup/k3HIg1Gw+qr0N9AUN -2WYOL+X0qaKffDa2ekv88H6mVnfRSReFIpteuV0XITwvMc0DbHdj6zEj1TSZMExu -rDVe7eh2BeL1QxbuazRUgwZ+kfy2NUzPkB1SSwi8VQKCAQBs8K4qj0S+Z8avjlFO -Id6K7EvLKN72zGYkRRzZeDiNMwbOsS22NmrJ/eUs3i1qYJxsYS4bcwUocCEvS/rm -XyfEtf8KNppw6YmBbrh0dZzSt7MiibJfptBKNP17fkpau+hTdZ8CDfvTF806XsAb -SGk8wnsNxaBKaqGU9iYCJSNSlpe3is9fc71IrEXMOAaXltdw5sVJkKI12+s121o9 -nbsSBCJj5ZTlCrDKpfj1TSKUKo13+9om3PGFY5sHkTAHBoc/tDcSXRfxllbCoP/M -HsqKMq4bWyfJfWXRBN0EWagQINocxHbShfEFn8+SHRizMj+ITuaEJ7P5sYT6D5DI -VWYJAoIBAEqaxdFiIYGTKN+sbOqm2phXhB/7bJM7WC1glsc29N8n+6ebEUPkEF7y -FZ0xqavQmyJD2ZgCBV0LgBd2T9FfqLx4/3LlS37lSfrWyMlj/xsuZRUQH6KQYR0n -EoK8wXH4+MPJ5WZ1SSa13GSKfYW2SQkaecdPJ54VypYm3ZzhKf3QRuxnGQMkKcNO -KjwHhF2be7PPQg75/lkFH8MstRsRpgengA90+QRfh9oMdtAkEJECRvDW1F2kFIRS -uHacfFp4C67koFDdViGRs5GDLcYFhL5ApaJp/WrXqT7yTWXU26uOGyM8fzpbZbHD -91rVu+3LUAUGK9ds/7Yl+cj8vqgkJ1UCggEAc0a5kmBREz/8rAWKnlCZrhBsxUUM -tiIj32h6dVdFo5SsoyVTxdB394npw1DAsC8xdowrcm/zsYstB3IDMYlrBnCdRxTU -Xu6RD3Jci0Qg1cfLQg5snlRnrNz12wygXcvTvW8cHsda8vO+FL1RgFdehDtYoyZr -swcLLRAOOLTRXy1Xdbv+8vE6s5ryl3uAO+2Zwbmur3tRL+rhXE+Tb308jlt8g2NK -WrRbc3c092aImdGcKmkMGqo6H+xnL9Jj7sR161uO5JJQjxcYbZ5PBmm3J5Z71cSY -LR5snbYdxUy7WKE3yxAoWi+FMsoGf+O77+oHAcpXRaTDv0Enr/7rEku5Yw== ------END RSA PRIVATE KEY----- diff --git a/fixtures/certs/myclient.p12 b/fixtures/certs/myclient.p12 deleted file mode 100644 index 14208f6bae5861bbe9e43d58ba6f14e9b35dc78e..0000000000000000000000000000000000000000 GIT binary patch literal 0 HcmV?d00001 literal 4021 zcmY+GbyO3KyT_@GX4HsDmo#J4UZqn~93dr)t_g^wlz=0p6r=_t1Zinx2uO=aP3dN+ zfFlG1>FayWz4v$TAJ2Kt`Fzjw{P{UwXbh-oc~HcF zT>fGtGzO6Up9okK14#Ibo{^D~{9O_MNl2kwK$`#lKt~FMGEh*R85AhMz;^CrWK<+i zV*sYs2Q|h6FM9&L;z`KD6tP;?M&IV#=daG6Qj_O30RxXNNeZ4UIT>!c z9@|i1aTVn|f!EJFYKs-ytZLywOV#AgI8WZ#>1osY*m20b`{R$+2cIO1&qpAB9v+j( zb}pnY!QC`@lIijjo*3(84gibAV))X+@w2_>k5v`_5fTY$-VgiMu%V&y?T-RInjP^m z|GkDF8*!MIK@d5o7h)9Mrlk3ts%DEwFl(hgc6z)`B^*_XP&Kgg{hczYLorUal}wgw z540oUu6~I=ah^v%3Fzi+sWA(R-Ec1F(;QCA{1b?>XF0HEt>WA8HW*$kCSxzg>3O|H zd~||}_iUatHgeVaY1FQd-t zwV2kXpiyF*v(y84Nh~brl==YJA?GDfDv`gFC)-ui-oSX^(zy3=Yuy1IA6HkxyMOCd zF78R&qZBb`kz9)M4Y0^(C)ONJO|={qX>zAQnl|%zvVBY_OgH=J%nANhTnHMgbds84 zlRO=lk#w}FDCeCU_=G87+VN$z5gQxWwrZ;)(NW4=sevd#llfE0ZjF9k7#|yk-EJmT zL13@a6j*l`hIzi^&|iHU18_|T?LOLz!N$*_NAhpp_A9`$j`0dS6-Pl%JO2nNNe|qk zm=6fdrl$jRVUHTTv}!J=Nfl1`u^}PM}$2%(AxWQ{i2X0?M?hPtwUcn z^Hgs?-$U|FlMnu*j3$Y5Gp%LT1q|`kCPf;c?}fB_VT04tdZj)}a^t=l?Aj2qP;hNx zos+a-Hb9A#Pe8Kwn_T#<>qPj-rudyt%suoST3-FoIfZM!G1GS(JR*WK_JyfKDPl|) zRPD5{9{lzpJtV9^tDmK5x!1t`&@U;>v^o4q{fGFkKH+_4D8Tm|Zh_h>`ZCCO%Hw*C^D7)jEzJV2CcLUz3SMFtFCe?eL>4^EB5S!;MMJEO2)pTq^ zH)C>P<$atq-}_4!vCp`RHs{v>_Jj>}eI0$=M0V_Ek1m{tzt}+NNNoD-G8rkI-zCuP zZcUdzo)w82SH`QJu8=ifGv75FJhM4|5L9Dig4?mBW||A^kYis2?~0m>Iv?Ud8)ngA z4mlOlOqE)?oyCgJ_`?q zO@hFM77*$7eu%|Rsi&bEN>L2|VU(TW!ot1yBS6CKA)SF=z1uGmdxJLF+ZDy-(2Q}* z19Vrax6X~u^8~=<-LA)VxUNS5Nu8?v%RF?0luXJA#Lv;YWee89vo&kf5X`TBhvw6G zP6!*r*6(8P{!yu>od;%WUSsAn46p8reNHtpRJ}@&gY1J>9_>9{-2#=+>eKmGyTwv=~_8;sA403*%J12Srll}_o6wM z6(~0WCm%>wQV%k{lK*vr!k)W3A)EN4D>*j!1*PHmCWGyBIdXzGqtk3jNZ);Gq?~K$ zfg9e2$A@i%Vh^6!Y#E->FyF;b6XLvn`U@z^g>i@?4>U{J>_5QjzQxWs@bWH-XgxIA z(`%ex@%ytb_B-mr>yT2`DnyYn-ob`~XQCJS^qN*k!$Q`3A!_}isDzm@3jX-hVOPh{ z952rVyF~LQyvnd?I9-9EDZ639enelv!{G8YyRc8Qy;(5p>u}6Co5-u1l!@&87Ycx; z2#1*^VW9TBkSEdKLs-NWcYl9PT|g+Oh9^g+B4Z2HHH%zTduyiByW4U@x9^lgf401T zeusKLf5i7(ZpscdAgAB4RE~9YbK&LA3OT5t)#F&ivB?(+t|%X*KWExUkHm^I-BZ5M zr|=D`_A1{yXT!nzWtiry)H8=4J<%y*Yo$YkfyXTD_hppt&igO0xrR$H`z_qQFX1F} z#IGA|q2c;;Fk1oAQQKRiJ(Tu!$H!D1Y;Uw^nkuYhO9`)K02%OJxm5kKOoFHsto59@w};q}ZLh=#8Rh3r+r zX8%zOCpQb?SErHl(#k8C;yKNG(c4@Or^VDGPjy=wQ7*L_zriQ?Igm2nSMB1W+j@Mm zdcB=OxdPlMUVa#z@@F$bGkXcDQu#|~noz{zN!_8n;qQ06h3JmCSJu6KZDLPI)kOom z?!BS~g-?x@d*0vPv#m+ey zbh#@YEw-IBx|*Y9(C*XAH0GKItg@HPM?^JG(LJ66lHe*QV}9^ZB*2uDgNX#5kviPWi+g3 zTaR(02Dc^5;;z!^o?p$6INnC6BW&k9VO;lF!|PRnT?2q5c`MJv*w72t+!yERi&M!B zS%J}=ze|Sz$?$oHkeXss&HO!@`SE%`xMh7-${`n&d#uO9lB6Cv!F zTPzsq>r>c^d-hqF00Emy*%bKRE9Uw-%y$%4!6x)|u_~QFWdk zKo5gFbq!+8?FR16icHz-9OX3~;qF;A37OUo4#C`lvd~BdgMFQ5R3_|OJMU>C)ixlV zn0{5w3piF8T@(|h#pU+v?<&!ZPs-r9e4?m-u-$6&YowqK0rvEe<(m%>54faW#k9<0yWYIhjc+SaH)N z@AHR(3J_X~^6JK8g15>05W)@Va8!z~&4B5vGt!;X)$tUdOTNbJc#zKXqZ(LL|qdiv*| zMo9XimWt#+(Mh0#|o^?&he)w95p;L7;*GXWRZ zno>G{$@CHmpzVx(O9{*9UxuO`cME0*4BvC{CQ!EJ;yy$1OM^aqe~s5LR%m9aE0Nlv0mGHo*1B(~!j3Tsk@$j){F5>4Cu~BL65Ws$4Ora{yxlBo z+sNZH|1(LO>KId9EVHScD#jmKoL99nH(i1A2?xZ!X?9lO%OJNn>9(+3jq@Hw47Ef? zBr486iJG+(ynsYEWhm)OwV)(j@ymA?( zH&7-8-Cj{8|G{AM28&mipnXtj9fB=I%Tak_4faY= zP885N>-gv8{hO#F)hrk%oo1ITWs$Nh=UMbn1z9yab2rF*2O&9pb0>@(2UYC5_6VY6 zz7YgPPtXPXHm{q^C7l#*pUu^WC3_kBYDp$^7CJJA)&*CZSqIHa>_cRQp@RS0&Zxn% zY!s~HnG6G%