Remove cert-svc API, only vcore API remained 19/46719/3
authorKyungwook Tak <k.tak@samsung.com>
Tue, 25 Aug 2015 08:56:12 +0000 (17:56 +0900)
committerKyungwook Tak <k.tak@samsung.com>
Mon, 7 Sep 2015 03:08:14 +0000 (12:08 +0900)
Change-Id: I764cbb3b98a473374097d75ffcdc7ee3a3438cd3
Signed-off-by: Kyungwook Tak <k.tak@samsung.com>
355 files changed:
CMakeLists.txt
cert-svc-vcore.pc.in
cert-svc.pc.in [deleted file]
include/cert-service-util.h [deleted file]
packaging/cert-svc.spec
srcs/CMakeLists.txt [deleted file]
srcs/cert-service-store.c [deleted file]
srcs/cert-service.c [deleted file]
tests/CMakeLists.txt
tests/cert-svc/CMakeLists.txt [deleted file]
tests/cert-svc/Makefile [deleted file]
tests/cert-svc/data/Broot.der [deleted file]
tests/cert-svc/data/Broot.pem [deleted file]
tests/cert-svc/data/TestData/B1.der [deleted file]
tests/cert-svc/data/TestData/B2.der [deleted file]
tests/cert-svc/data/TestData/B3.der [deleted file]
tests/cert-svc/data/TestData/B4.der [deleted file]
tests/cert-svc/data/TestData/B5.der [deleted file]
tests/cert-svc/data/TestData/B6.der [deleted file]
tests/cert-svc/data/TestData/B7.der [deleted file]
tests/cert-svc/data/TestData/B8.der [deleted file]
tests/cert-svc/data/TestData/B9.der [deleted file]
tests/cert-svc/data/TestData/Broot.der [deleted file]
tests/cert-svc/data/TestData/Broot.pem [deleted file]
tests/cert-svc/data/TestData/cert.der [deleted file]
tests/cert-svc/data/TestData/cert_sign.der [deleted file]
tests/cert-svc/data/TestData/decodedCert.data [deleted file]
tests/cert-svc/data/TestData/invalid_message [deleted file]
tests/cert-svc/data/TestData/invalid_priv.pem [deleted file]
tests/cert-svc/data/TestData/invalid_pubkey [deleted file]
tests/cert-svc/data/TestData/invalid_signature [deleted file]
tests/cert-svc/data/TestData/message [deleted file]
tests/cert-svc/data/TestData/metadata [deleted file]
tests/cert-svc/data/TestData/plaintext [deleted file]
tests/cert-svc/data/TestData/prikey [deleted file]
tests/cert-svc/data/TestData/priv.pem [deleted file]
tests/cert-svc/data/TestData/pub.pem [deleted file]
tests/cert-svc/data/TestData/pub_cert.der [deleted file]
tests/cert-svc/data/TestData/pub_cert.pem [deleted file]
tests/cert-svc/data/TestData/pubkey [deleted file]
tests/cert-svc/data/TestData/root1.der [deleted file]
tests/cert-svc/data/TestData/root2.der [deleted file]
tests/cert-svc/data/TestData/root3.der [deleted file]
tests/cert-svc/data/TestData/signature [deleted file]
tests/cert-svc/data/TestData/ssl/.rnd [deleted file]
tests/cert-svc/data/TestData/ssl/CERT1.key [deleted file]
tests/cert-svc/data/TestData/ssl/CERT_NO_AIA.crt [deleted file]
tests/cert-svc/data/TestData/ssl/OCSP_CLIENT1.crt [deleted file]
tests/cert-svc/data/TestData/ssl/OCSP_CLIENT1.key [deleted file]
tests/cert-svc/data/TestData/ssl/OCSP_CLIENT2.crt [deleted file]
tests/cert-svc/data/TestData/ssl/OCSP_CLIENT3.crt [deleted file]
tests/cert-svc/data/TestData/ssl/OCSP_CLIENT4.crt [deleted file]
tests/cert-svc/data/TestData/ssl/OCSP_CLIENT5.crt [deleted file]
tests/cert-svc/data/TestData/ssl/OCSP_CLIENT6.crt [deleted file]
tests/cert-svc/data/TestData/ssl/OCSP_CLIENT7.crt [deleted file]
tests/cert-svc/data/TestData/ssl/OCSP_CLIENT7.key [deleted file]
tests/cert-svc/data/TestData/ssl/authorities/ca.crt [deleted file]
tests/cert-svc/data/TestData/ssl/cert_chain/cert_chain1.crl [deleted file]
tests/cert-svc/data/TestData/ssl/cert_chain/cert_chain1.crt [deleted file]
tests/cert-svc/data/TestData/ssl/cert_chain/cert_chain1.key [deleted file]
tests/cert-svc/data/TestData/ssl/cert_chain/cert_chain10.crl [deleted file]
tests/cert-svc/data/TestData/ssl/cert_chain/cert_chain10.crt [deleted file]
tests/cert-svc/data/TestData/ssl/cert_chain/cert_chain10.key [deleted file]
tests/cert-svc/data/TestData/ssl/cert_chain/cert_chain2.crl [deleted file]
tests/cert-svc/data/TestData/ssl/cert_chain/cert_chain2.crt [deleted file]
tests/cert-svc/data/TestData/ssl/cert_chain/cert_chain2.key [deleted file]
tests/cert-svc/data/TestData/ssl/cert_chain/cert_chain3.crl [deleted file]
tests/cert-svc/data/TestData/ssl/cert_chain/cert_chain3.crt [deleted file]
tests/cert-svc/data/TestData/ssl/cert_chain/cert_chain3.key [deleted file]
tests/cert-svc/data/TestData/ssl/cert_chain/cert_chain4.crl [deleted file]
tests/cert-svc/data/TestData/ssl/cert_chain/cert_chain4.crt [deleted file]
tests/cert-svc/data/TestData/ssl/cert_chain/cert_chain4.key [deleted file]
tests/cert-svc/data/TestData/ssl/cert_chain/cert_chain5.crl [deleted file]
tests/cert-svc/data/TestData/ssl/cert_chain/cert_chain5.crt [deleted file]
tests/cert-svc/data/TestData/ssl/cert_chain/cert_chain5.key [deleted file]
tests/cert-svc/data/TestData/ssl/cert_chain/cert_chain6.crl [deleted file]
tests/cert-svc/data/TestData/ssl/cert_chain/cert_chain6.crt [deleted file]
tests/cert-svc/data/TestData/ssl/cert_chain/cert_chain6.key [deleted file]
tests/cert-svc/data/TestData/ssl/cert_chain/cert_chain7.crl [deleted file]
tests/cert-svc/data/TestData/ssl/cert_chain/cert_chain7.crt [deleted file]
tests/cert-svc/data/TestData/ssl/cert_chain/cert_chain7.key [deleted file]
tests/cert-svc/data/TestData/ssl/cert_chain/cert_chain8.crl [deleted file]
tests/cert-svc/data/TestData/ssl/cert_chain/cert_chain8.crt [deleted file]
tests/cert-svc/data/TestData/ssl/cert_chain/cert_chain8.key [deleted file]
tests/cert-svc/data/TestData/ssl/cert_chain/cert_chain9.crl [deleted file]
tests/cert-svc/data/TestData/ssl/cert_chain/cert_chain9.crt [deleted file]
tests/cert-svc/data/TestData/ssl/cert_chain/cert_chain9.key [deleted file]
tests/cert-svc/data/TestData/ssl/cert_chain/cert_chain_no_aia1.crl [deleted file]
tests/cert-svc/data/TestData/ssl/cert_chain/cert_chain_no_aia1.crt [deleted file]
tests/cert-svc/data/TestData/ssl/cert_chain/cert_chain_no_aia1.key [deleted file]
tests/cert-svc/data/TestData/ssl/cert_chain/cert_chain_no_aia10.crl [deleted file]
tests/cert-svc/data/TestData/ssl/cert_chain/cert_chain_no_aia10.crt [deleted file]
tests/cert-svc/data/TestData/ssl/cert_chain/cert_chain_no_aia10.key [deleted file]
tests/cert-svc/data/TestData/ssl/cert_chain/cert_chain_no_aia2.crl [deleted file]
tests/cert-svc/data/TestData/ssl/cert_chain/cert_chain_no_aia2.crt [deleted file]
tests/cert-svc/data/TestData/ssl/cert_chain/cert_chain_no_aia2.key [deleted file]
tests/cert-svc/data/TestData/ssl/cert_chain/cert_chain_no_aia3.crl [deleted file]
tests/cert-svc/data/TestData/ssl/cert_chain/cert_chain_no_aia3.crt [deleted file]
tests/cert-svc/data/TestData/ssl/cert_chain/cert_chain_no_aia3.key [deleted file]
tests/cert-svc/data/TestData/ssl/cert_chain/cert_chain_no_aia4.crl [deleted file]
tests/cert-svc/data/TestData/ssl/cert_chain/cert_chain_no_aia4.crt [deleted file]
tests/cert-svc/data/TestData/ssl/cert_chain/cert_chain_no_aia4.key [deleted file]
tests/cert-svc/data/TestData/ssl/cert_chain/cert_chain_no_aia5.crl [deleted file]
tests/cert-svc/data/TestData/ssl/cert_chain/cert_chain_no_aia5.crt [deleted file]
tests/cert-svc/data/TestData/ssl/cert_chain/cert_chain_no_aia5.key [deleted file]
tests/cert-svc/data/TestData/ssl/cert_chain/cert_chain_no_aia6.crl [deleted file]
tests/cert-svc/data/TestData/ssl/cert_chain/cert_chain_no_aia6.crt [deleted file]
tests/cert-svc/data/TestData/ssl/cert_chain/cert_chain_no_aia6.key [deleted file]
tests/cert-svc/data/TestData/ssl/cert_chain/cert_chain_no_aia7.crl [deleted file]
tests/cert-svc/data/TestData/ssl/cert_chain/cert_chain_no_aia7.crt [deleted file]
tests/cert-svc/data/TestData/ssl/cert_chain/cert_chain_no_aia7.key [deleted file]
tests/cert-svc/data/TestData/ssl/cert_chain/cert_chain_no_aia8.crl [deleted file]
tests/cert-svc/data/TestData/ssl/cert_chain/cert_chain_no_aia8.crt [deleted file]
tests/cert-svc/data/TestData/ssl/cert_chain/cert_chain_no_aia8.key [deleted file]
tests/cert-svc/data/TestData/ssl/cert_chain/cert_chain_no_aia9.crl [deleted file]
tests/cert-svc/data/TestData/ssl/cert_chain/cert_chain_no_aia9.crt [deleted file]
tests/cert-svc/data/TestData/ssl/cert_chain/cert_chain_no_aia9.key [deleted file]
tests/cert-svc/data/TestData/ssl/cert_chain/configs/config_chain1.cnf [deleted file]
tests/cert-svc/data/TestData/ssl/cert_chain/configs/config_chain10.cnf [deleted file]
tests/cert-svc/data/TestData/ssl/cert_chain/configs/config_chain2.cnf [deleted file]
tests/cert-svc/data/TestData/ssl/cert_chain/configs/config_chain3.cnf [deleted file]
tests/cert-svc/data/TestData/ssl/cert_chain/configs/config_chain4.cnf [deleted file]
tests/cert-svc/data/TestData/ssl/cert_chain/configs/config_chain5.cnf [deleted file]
tests/cert-svc/data/TestData/ssl/cert_chain/configs/config_chain6.cnf [deleted file]
tests/cert-svc/data/TestData/ssl/cert_chain/configs/config_chain7.cnf [deleted file]
tests/cert-svc/data/TestData/ssl/cert_chain/configs/config_chain8.cnf [deleted file]
tests/cert-svc/data/TestData/ssl/cert_chain/configs/config_chain9.cnf [deleted file]
tests/cert-svc/data/TestData/ssl/cert_chain/configs/config_chain_no_aia1.cnf [deleted file]
tests/cert-svc/data/TestData/ssl/cert_chain/configs/config_chain_no_aia10.cnf [deleted file]
tests/cert-svc/data/TestData/ssl/cert_chain/configs/config_chain_no_aia2.cnf [deleted file]
tests/cert-svc/data/TestData/ssl/cert_chain/configs/config_chain_no_aia3.cnf [deleted file]
tests/cert-svc/data/TestData/ssl/cert_chain/configs/config_chain_no_aia4.cnf [deleted file]
tests/cert-svc/data/TestData/ssl/cert_chain/configs/config_chain_no_aia5.cnf [deleted file]
tests/cert-svc/data/TestData/ssl/cert_chain/configs/config_chain_no_aia6.cnf [deleted file]
tests/cert-svc/data/TestData/ssl/cert_chain/configs/config_chain_no_aia7.cnf [deleted file]
tests/cert-svc/data/TestData/ssl/cert_chain/configs/config_chain_no_aia8.cnf [deleted file]
tests/cert-svc/data/TestData/ssl/cert_chain/configs/config_chain_no_aia9.cnf [deleted file]
tests/cert-svc/data/TestData/ssl/cert_chain/index.txt [deleted file]
tests/cert-svc/data/TestData/ssl/cert_chain/index.txt.attr [deleted file]
tests/cert-svc/data/TestData/ssl/cert_chain/index.txt.attr.old [deleted file]
tests/cert-svc/data/TestData/ssl/cert_chain/index.txt.old [deleted file]
tests/cert-svc/data/TestData/ssl/cert_chain/newcerts/2F.pem [deleted file]
tests/cert-svc/data/TestData/ssl/cert_chain/newcerts/30.pem [deleted file]
tests/cert-svc/data/TestData/ssl/cert_chain/newcerts/31.pem [deleted file]
tests/cert-svc/data/TestData/ssl/cert_chain/newcerts/32.pem [deleted file]
tests/cert-svc/data/TestData/ssl/cert_chain/newcerts/33.pem [deleted file]
tests/cert-svc/data/TestData/ssl/cert_chain/newcerts/34.pem [deleted file]
tests/cert-svc/data/TestData/ssl/cert_chain/newcerts/35.pem [deleted file]
tests/cert-svc/data/TestData/ssl/cert_chain/newcerts/36.pem [deleted file]
tests/cert-svc/data/TestData/ssl/cert_chain/newcerts/37.pem [deleted file]
tests/cert-svc/data/TestData/ssl/cert_chain/newcerts/38.pem [deleted file]
tests/cert-svc/data/TestData/ssl/cert_chain/newcerts/39.pem [deleted file]
tests/cert-svc/data/TestData/ssl/cert_chain/newcerts/3A.pem [deleted file]
tests/cert-svc/data/TestData/ssl/cert_chain/newcerts/3B.pem [deleted file]
tests/cert-svc/data/TestData/ssl/cert_chain/newcerts/3C.pem [deleted file]
tests/cert-svc/data/TestData/ssl/cert_chain/newcerts/3D.pem [deleted file]
tests/cert-svc/data/TestData/ssl/cert_chain/newcerts/3E.pem [deleted file]
tests/cert-svc/data/TestData/ssl/cert_chain/newcerts/3F.pem [deleted file]
tests/cert-svc/data/TestData/ssl/cert_chain/newcerts/40.pem [deleted file]
tests/cert-svc/data/TestData/ssl/cert_chain/private/cert_chain1.pem [deleted file]
tests/cert-svc/data/TestData/ssl/cert_chain/private/cert_chain10.pem [deleted file]
tests/cert-svc/data/TestData/ssl/cert_chain/private/cert_chain2.pem [deleted file]
tests/cert-svc/data/TestData/ssl/cert_chain/private/cert_chain3.pem [deleted file]
tests/cert-svc/data/TestData/ssl/cert_chain/private/cert_chain4.pem [deleted file]
tests/cert-svc/data/TestData/ssl/cert_chain/private/cert_chain5.pem [deleted file]
tests/cert-svc/data/TestData/ssl/cert_chain/private/cert_chain6.pem [deleted file]
tests/cert-svc/data/TestData/ssl/cert_chain/private/cert_chain7.pem [deleted file]
tests/cert-svc/data/TestData/ssl/cert_chain/private/cert_chain8.pem [deleted file]
tests/cert-svc/data/TestData/ssl/cert_chain/private/cert_chain9.pem [deleted file]
tests/cert-svc/data/TestData/ssl/cert_chain/private/cert_chain_no_aia1.pem [deleted file]
tests/cert-svc/data/TestData/ssl/cert_chain/private/cert_chain_no_aia10.pem [deleted file]
tests/cert-svc/data/TestData/ssl/cert_chain/private/cert_chain_no_aia2.pem [deleted file]
tests/cert-svc/data/TestData/ssl/cert_chain/private/cert_chain_no_aia3.pem [deleted file]
tests/cert-svc/data/TestData/ssl/cert_chain/private/cert_chain_no_aia4.pem [deleted file]
tests/cert-svc/data/TestData/ssl/cert_chain/private/cert_chain_no_aia5.pem [deleted file]
tests/cert-svc/data/TestData/ssl/cert_chain/private/cert_chain_no_aia6.pem [deleted file]
tests/cert-svc/data/TestData/ssl/cert_chain/private/cert_chain_no_aia7.pem [deleted file]
tests/cert-svc/data/TestData/ssl/cert_chain/private/cert_chain_no_aia8.pem [deleted file]
tests/cert-svc/data/TestData/ssl/cert_chain/private/cert_chain_no_aia9.pem [deleted file]
tests/cert-svc/data/TestData/ssl/cert_chain/serial [deleted file]
tests/cert-svc/data/TestData/ssl/cert_chain/serial.old [deleted file]
tests/cert-svc/data/TestData/ssl/demoCA/ca.csr [deleted file]
tests/cert-svc/data/TestData/ssl/demoCA/cacert.pem [deleted file]
tests/cert-svc/data/TestData/ssl/demoCA/index.txt [deleted file]
tests/cert-svc/data/TestData/ssl/demoCA/index.txt.attr [deleted file]
tests/cert-svc/data/TestData/ssl/demoCA/index.txt.attr.old [deleted file]
tests/cert-svc/data/TestData/ssl/demoCA/index.txt.old [deleted file]
tests/cert-svc/data/TestData/ssl/demoCA/newcerts/01.pem [deleted file]
tests/cert-svc/data/TestData/ssl/demoCA/newcerts/02.pem [deleted file]
tests/cert-svc/data/TestData/ssl/demoCA/newcerts/03.pem [deleted file]
tests/cert-svc/data/TestData/ssl/demoCA/newcerts/04.pem [deleted file]
tests/cert-svc/data/TestData/ssl/demoCA/newcerts/05.pem [deleted file]
tests/cert-svc/data/TestData/ssl/demoCA/newcerts/06.pem [deleted file]
tests/cert-svc/data/TestData/ssl/demoCA/newcerts/07.pem [deleted file]
tests/cert-svc/data/TestData/ssl/demoCA/newcerts/08.pem [deleted file]
tests/cert-svc/data/TestData/ssl/demoCA/newcerts/09.pem [deleted file]
tests/cert-svc/data/TestData/ssl/demoCA/newcerts/0A.pem [deleted file]
tests/cert-svc/data/TestData/ssl/demoCA/newcerts/0B.pem [deleted file]
tests/cert-svc/data/TestData/ssl/demoCA/newcerts/0C.pem [deleted file]
tests/cert-svc/data/TestData/ssl/demoCA/newcerts/0D.pem [deleted file]
tests/cert-svc/data/TestData/ssl/demoCA/newcerts/0E.pem [deleted file]
tests/cert-svc/data/TestData/ssl/demoCA/newcerts/0F.pem [deleted file]
tests/cert-svc/data/TestData/ssl/demoCA/newcerts/10.pem [deleted file]
tests/cert-svc/data/TestData/ssl/demoCA/newcerts/11.pem [deleted file]
tests/cert-svc/data/TestData/ssl/demoCA/newcerts/12.pem [deleted file]
tests/cert-svc/data/TestData/ssl/demoCA/newcerts/13.pem [deleted file]
tests/cert-svc/data/TestData/ssl/demoCA/newcerts/14.pem [deleted file]
tests/cert-svc/data/TestData/ssl/demoCA/newcerts/15.pem [deleted file]
tests/cert-svc/data/TestData/ssl/demoCA/newcerts/16.pem [deleted file]
tests/cert-svc/data/TestData/ssl/demoCA/newcerts/17.pem [deleted file]
tests/cert-svc/data/TestData/ssl/demoCA/newcerts/18.pem [deleted file]
tests/cert-svc/data/TestData/ssl/demoCA/newcerts/19.pem [deleted file]
tests/cert-svc/data/TestData/ssl/demoCA/newcerts/1A.pem [deleted file]
tests/cert-svc/data/TestData/ssl/demoCA/newcerts/1B.pem [deleted file]
tests/cert-svc/data/TestData/ssl/demoCA/newcerts/1C.pem [deleted file]
tests/cert-svc/data/TestData/ssl/demoCA/newcerts/1D.pem [deleted file]
tests/cert-svc/data/TestData/ssl/demoCA/newcerts/1E.pem [deleted file]
tests/cert-svc/data/TestData/ssl/demoCA/newcerts/1F.pem [deleted file]
tests/cert-svc/data/TestData/ssl/demoCA/newcerts/20.pem [deleted file]
tests/cert-svc/data/TestData/ssl/demoCA/newcerts/21.pem [deleted file]
tests/cert-svc/data/TestData/ssl/demoCA/newcerts/22.pem [deleted file]
tests/cert-svc/data/TestData/ssl/demoCA/newcerts/23.pem [deleted file]
tests/cert-svc/data/TestData/ssl/demoCA/newcerts/24.pem [deleted file]
tests/cert-svc/data/TestData/ssl/demoCA/newcerts/25.pem [deleted file]
tests/cert-svc/data/TestData/ssl/demoCA/newcerts/26.pem [deleted file]
tests/cert-svc/data/TestData/ssl/demoCA/newcerts/27.pem [deleted file]
tests/cert-svc/data/TestData/ssl/demoCA/newcerts/28.pem [deleted file]
tests/cert-svc/data/TestData/ssl/demoCA/newcerts/29.pem [deleted file]
tests/cert-svc/data/TestData/ssl/demoCA/newcerts/2A.pem [deleted file]
tests/cert-svc/data/TestData/ssl/demoCA/private/cakey.pem [deleted file]
tests/cert-svc/data/TestData/ssl/demoCA/serial [deleted file]
tests/cert-svc/data/TestData/ssl/demoCA/serial.old [deleted file]
tests/cert-svc/data/TestData/ssl/ocsp_client1_uri.txt [deleted file]
tests/cert-svc/data/TestData/ssl/ocsp_client2_uri.txt [deleted file]
tests/cert-svc/data/TestData/ssl/ocsp_client3_uri.txt [deleted file]
tests/cert-svc/data/TestData/ssl/ocsp_client4_uri.txt [deleted file]
tests/cert-svc/data/TestData/ssl/ocsp_client5_uri.txt [deleted file]
tests/cert-svc/data/TestData/ssl/ocsp_client6_uri.txt [deleted file]
tests/cert-svc/data/TestData/ssl/ocsp_client7_uri.txt [deleted file]
tests/cert-svc/data/TestData/ssl/ocsp_client_chain.txt [deleted file]
tests/cert-svc/data/TestData/ssl/ocsp_client_chain_no_aia.txt [deleted file]
tests/cert-svc/data/TestData/ssl/ocsp_responder.txt [deleted file]
tests/cert-svc/data/TestData/ssl/ocsp_responder_nocheck.txt [deleted file]
tests/cert-svc/data/TestData/ssl/ocsp_responder_nocheck_and_ocsp_signing.txt [deleted file]
tests/cert-svc/data/TestData/ssl/ocsp_svr.crt [deleted file]
tests/cert-svc/data/TestData/ssl/ocsp_svr.key [deleted file]
tests/cert-svc/data/TestData/ssl/ocsp_svr/ocsp_svr.crt [deleted file]
tests/cert-svc/data/TestData/ssl/ocsp_svr_nocheck.crt [deleted file]
tests/cert-svc/data/TestData/ssl/ocsp_svr_nocheck.key [deleted file]
tests/cert-svc/data/TestData/ssl/ocsp_svr_nocheck_and_ocspsigning.crt [deleted file]
tests/cert-svc/data/TestData/ssl/ocsp_svr_nocheck_and_ocspsigning.key [deleted file]
tests/cert-svc/data/TestData/ssl/ocsp_svr_with_response.crt [deleted file]
tests/cert-svc/data/TestData/ssl/ocsp_svr_with_response.key [deleted file]
tests/cert-svc/data/TestData/ssl/resp_ocsp1.der [deleted file]
tests/cert-svc/data/TestData/ssl/sha256.crt [deleted file]
tests/cert-svc/data/caflag/aia_signer.der [deleted file]
tests/cert-svc/data/caflag/invalidCert.der [deleted file]
tests/cert-svc/data/caflag/noaia_signer.der [deleted file]
tests/cert-svc/data/caflag/ocsp_signer.crt [deleted file]
tests/cert-svc/data/caflag/out.pem [deleted file]
tests/cert-svc/data/caflag/rev_signer.der [deleted file]
tests/cert-svc/data/caflag/root_ca.der [deleted file]
tests/cert-svc/data/caflag/root_ca_v1.der [deleted file]
tests/cert-svc/data/caflag/second_ca.der [deleted file]
tests/cert-svc/data/caflag/v1_signer.der [deleted file]
tests/cert-svc/data/cert0.pem [deleted file]
tests/cert-svc/data/cert1.der [deleted file]
tests/cert-svc/data/cert2fake.pem [deleted file]
tests/cert-svc/data/cert3fake.der [deleted file]
tests/cert-svc/data/cert_chain/00.pem [deleted file]
tests/cert-svc/data/cert_chain/01.pem [deleted file]
tests/cert-svc/data/cert_chain/02.pem [deleted file]
tests/cert-svc/data/cert_chain/03.pem [deleted file]
tests/cert-svc/data/cert_chain/04.pem [deleted file]
tests/cert-svc/data/cert_chain/05.pem [deleted file]
tests/cert-svc/data/cert_chain/ca.crt [deleted file]
tests/cert-svc/data/cert_chain/chain1.crt [deleted file]
tests/cert-svc/data/cert_chain/chain2.crt [deleted file]
tests/cert-svc/data/cert_chain/chain3.crt [deleted file]
tests/cert-svc/data/cert_chain/chain4.crt [deleted file]
tests/cert-svc/data/cert_chain/chain5.crt [deleted file]
tests/cert-svc/data/cert_chain/chain_alt.txt [deleted file]
tests/cert-svc/data/cert_chain/csr/chain1.csr [deleted file]
tests/cert-svc/data/cert_chain/csr/chain2.csr [deleted file]
tests/cert-svc/data/cert_chain/csr/chain3.csr [deleted file]
tests/cert-svc/data/cert_chain/csr/chain4.csr [deleted file]
tests/cert-svc/data/cert_chain/csr/chain5.csr [deleted file]
tests/cert-svc/data/cert_chain/csr/server.csr [deleted file]
tests/cert-svc/data/cert_chain/demoCA/index.txt [deleted file]
tests/cert-svc/data/cert_chain/demoCA/index.txt.attr [deleted file]
tests/cert-svc/data/cert_chain/demoCA/index.txt.attr.old [deleted file]
tests/cert-svc/data/cert_chain/demoCA/index.txt.old [deleted file]
tests/cert-svc/data/cert_chain/demoCA/serial [deleted file]
tests/cert-svc/data/cert_chain/demoCA/serial.old [deleted file]
tests/cert-svc/data/cert_chain/key/ca.key [deleted file]
tests/cert-svc/data/cert_chain/key/chain1.key [deleted file]
tests/cert-svc/data/cert_chain/key/chain2.key [deleted file]
tests/cert-svc/data/cert_chain/key/chain3.key [deleted file]
tests/cert-svc/data/cert_chain/key/chain4.key [deleted file]
tests/cert-svc/data/cert_chain/key/chain5.key [deleted file]
tests/cert-svc/data/cert_chain/key/server.key [deleted file]
tests/cert-svc/data/cert_chain/server.crt [deleted file]
tests/cert-svc/data/invalidCert.der [deleted file]
tests/cert-svc/data/newcert.pem [deleted file]
tests/cert-svc/data/notcert.der [deleted file]
tests/cert-svc/data/pfx/pfxtest.crt [deleted file]
tests/cert-svc/data/pfx/pfxtest.key [deleted file]
tests/cert-svc/data/pfx/pfxtest.pfx [deleted file]
tests/cert-svc/data/pfx/temp/server.crt [deleted file]
tests/cert-svc/data/pfx/temp/server.key [deleted file]
tests/cert-svc/data/pfx/temp/server.pfx [deleted file]
tests/cert-svc/data/pfx/temp/temp.crt [deleted file]
tests/cert-svc/data/pfx/temp/temp.key [deleted file]
tests/cert-svc/data/rootcert.pem [deleted file]
tests/cert-svc/data/signing/chain1.crt [deleted file]
tests/cert-svc/data/signing/chain1.key [deleted file]
tests/cert-svc/data/signing/chain1pub.pem [deleted file]
tests/cert-svc/data/signing/msg [deleted file]
tests/cert-svc/data/signing/msg.sig [deleted file]
tests/cert-svc/data/signing/msg.sig.enc [deleted file]
tests/cert-svc/data/signing/msg2 [deleted file]
tests/cert-svc/delete_test.c [deleted file]
tests/cert-svc/extract_test.c [deleted file]
tests/cert-svc/extract_test_pfx.c [deleted file]
tests/cert-svc/mem_test.c [deleted file]
tests/cert-svc/search_test.c [deleted file]
tests/cert-svc/store_test.c [deleted file]
tests/cert-svc/test-certificate-parsing.cpp [deleted file]
tests/cert-svc/test_caflag.c [deleted file]
tests/cert-svc/test_suite.h [deleted file]
tests/cert-svc/test_suite_main.c [deleted file]
tests/cert-svc/verify_sig.c [deleted file]
tests/cert-svc/verify_test.c [deleted file]
vcore/CMakeLists.txt
vcore/cert-svc/cerror.h
vcore/orig/cert-service-debug.h [moved from include/cert-service-debug.h with 100% similarity]
vcore/orig/cert-service-process.c [moved from srcs/cert-service-process.c with 71% similarity]
vcore/orig/cert-service-process.h [moved from include/cert-service-process.h with 78% similarity]
vcore/orig/cert-service-util.c [moved from srcs/cert-service-util.c with 58% similarity]
vcore/orig/cert-service-util.h [moved from include/cert-service-store.h with 76% similarity, mode: 0755]
vcore/orig/cert-service.c [new file with mode: 0644]
vcore/orig/cert-service.h [moved from include/cert-service.h with 84% similarity]
vcore/server/src/cert-server-logic.c
vcore/server/src/cert-server-main.c
vcore/vcore/Certificate.cpp
vcore/vcore/Certificate.h
vcore/vcore/CertificateCollection.cpp
vcore/vcore/CertificateCollection.h
vcore/vcore/CertificateLoader.h
vcore/vcore/SignatureValidator.cpp
vcore/vcore/api.cpp
vcore/vcore/cert-svc-client.c
vcore/vcore/pkcs12.cpp
vcore/vcore/utils.c [deleted file]
vcore/vcore/utils.h [deleted file]

index 2568183..b0a2029 100644 (file)
@@ -26,7 +26,11 @@ ADD_DEFINITIONS("-DBUILD_TYPE_DEBUG")
 ADD_DEFINITIONS("-DDPL_LOGS_ENABLED")
 ENDIF (CMAKE_BUILD_TYPE MATCHES "DEBUG")
 
-SET(TARGET_CERT_SVC_LIB "cert-svc")
+# compiler warning flags
+ADD_DEFINITIONS("-Wall")
+ADD_DEFINITIONS("-Wextra")
+ADD_DEFINITIONS("-Werror")
+
 SET(TARGET_VCORE_LIB "cert-svc-vcore")
 SET(TARGET_CERT_SERVER "cert-server")
 
@@ -41,21 +45,16 @@ ADD_DEFINITIONS("-DCERTSVC_DIR=\"${TZ_SYS_SHARE}/cert-svc/certs/\"")
 ADD_DEFINITIONS("-DCERTSVC_PKCS12_STORAGE_DIR=\"${TZ_SYS_SHARE}/cert-svc/pkcs12/\"")
 ADD_DEFINITIONS("-DSYSTEM_CERT_DIR=\"${TZ_SYS_ETC}/ssl/certs/\"")
 
-CONFIGURE_FILE(cert-svc.pc.in cert-svc.pc @ONLY)
 CONFIGURE_FILE(cert-svc-vcore.pc.in cert-svc-vcore.pc @ONLY)
-
 INSTALL(FILES
-    ${CMAKE_CURRENT_BINARY_DIR}/cert-svc.pc
     ${CMAKE_CURRENT_BINARY_DIR}/cert-svc-vcore.pc
     DESTINATION ${LIBDIR}/pkgconfig
 )
 
-INSTALL(FILES ${CMAKE_CURRENT_SOURCE_DIR}/include/cert-service.h DESTINATION ${INCLUDEDIR})
-
-ADD_SUBDIRECTORY(systemd)
-ADD_SUBDIRECTORY(srcs)
 ADD_SUBDIRECTORY(vcore)
+ADD_SUBDIRECTORY(systemd)
 ADD_SUBDIRECTORY(etc)
+
 IF (DEFINED CERTSVC_TEST_BUILD)
 ADD_DEFINITIONS("-DTESTAPP_RES_DIR=\"${TZ_SYS_RO_APP}/widget/tests/\"")
 ADD_SUBDIRECTORY(tests)
index f5c4b82..c86a7e8 100644 (file)
@@ -6,6 +6,6 @@ includedir=@INCLUDEDIR@
 Name: cert-svc-vcore
 Description: cert-svc-vcore
 Version: @VERSION@
-Requires: cert-svc libxml-2.0 libxslt openssl xmlsec1
+Requires: libxml-2.0 libxslt openssl xmlsec1
 Libs: -L${libdir} -lcert-svc-vcore
 Cflags: -I${includedir}/cert-svc
diff --git a/cert-svc.pc.in b/cert-svc.pc.in
deleted file mode 100644 (file)
index 6b0ebd2..0000000
+++ /dev/null
@@ -1,11 +0,0 @@
-prefix=@PREFIX@
-exec_prefix=@EXEC_PREFIX@
-libdir=@LIBDIR@
-includedir=@INCLUDEDIR@
-
-Name: certification-service
-Description: Certification Service
-Version: @VERSION@
-Requires: openssl
-Libs: -L${libdir} -lcert-svc
-Cflags: -I${includedir}/cert-svc/
diff --git a/include/cert-service-util.h b/include/cert-service-util.h
deleted file mode 100755 (executable)
index af25240..0000000
+++ /dev/null
@@ -1,39 +0,0 @@
-/*
- * certification service
- *
- * Copyright (c) 2000 - 2011 Samsung Electronics Co., Ltd All Rights Reserved 
- *
- * Contact: Kidong Kim <kd0228.kim@samsung.com>
- *
- * Licensed under the Apache License, Version 2.0 (the "License");
- * you may not use this file except in compliance with the License.
- * You may obtain a copy of the License at
- *
- * http://www.apache.org/licenses/LICENSE-2.0
- *
- * Unless required by applicable law or agreed to in writing, software
- * distributed under the License is distributed on an "AS IS" BASIS,
- * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
- * See the License for the specific language governing permissions and
- * limitations under the License.
- *
- */
-
-#ifndef CERT_SERVICE_UTIL_H
-#define CERT_SERVICE_UTIL_H
-
-#ifdef __cplusplus
-extern "C" {
-#endif
-
-int cert_svc_util_get_file_size(const char* filepath, unsigned long int* length);
-int cert_svc_util_load_file_to_buffer(const char* filePath, cert_svc_mem_buff* certBuf);
-int cert_svc_util_load_PFX_file_to_buffer(const char* filePath, cert_svc_mem_buff* certBuf, cert_svc_linked_list** certLink, unsigned char** privateKey, int* priKeyLen, char* passPhrase);
-int cert_svc_util_base64_encode(const unsigned char* in, int inLen, unsigned char* out, int* outLen);
-int cert_svc_util_base64_decode(const unsigned char* in, int inLen, unsigned char* out, int* outLen);
-
-#ifdef __cplusplus
-}
-#endif
-
-#endif // CERT_SERVICE_UTIL_H
index c3ef6ae..4077bc6 100644 (file)
@@ -91,8 +91,6 @@ rm -rf %{buildroot}
 mkdir -p %{buildroot}%{TZ_SYS_SHARE}/license
 cp LICENSE %{buildroot}%{TZ_SYS_SHARE}/license/%{name}
 
-mkdir -p %{buildroot}%{TZ_SYS_SHARE}/cert-svc/certs/user
-mkdir -p %{buildroot}%{TZ_SYS_SHARE}/cert-svc/certs/trusteduser
 mkdir -p %{buildroot}%{TZ_SYS_SHARE}/cert-svc/pkcs12
 mkdir -p %{buildroot}%{TZ_SYS_SHARE}/cert-svc/dbspace
 
@@ -145,7 +143,6 @@ rm %{TZ_SYS_BIN}/initialize_store_db.sh
 %attr(644,root,root) %{_unitdir}/cert-server.socket
 %attr(777,root,root) %{_unitdir}/multi-user.target.wants/cert-server.service
 %attr(777,root,root) %{_unitdir}/sockets.target.wants/cert-server.socket
-%attr(755,root,root) %{_libdir}/libcert-svc.so.*
 %attr(755,root,root) %{_libdir}/libcert-svc-vcore.so.*
 %attr(644,root,root) %{TZ_SYS_SHARE}/license/%{name}
 %attr(644,root,root) %{TZ_SYS_RO_WRT_ENGINE}/schema.xsd
@@ -155,8 +152,6 @@ rm %{TZ_SYS_BIN}/initialize_store_db.sh
 %attr(755,root,root) %{TZ_SYS_BIN}/initialize_store_db.sh
 
 # Resource files install as system
-%{TZ_SYS_SHARE}/cert-svc/certs/user
-%{TZ_SYS_SHARE}/cert-svc/certs/trusteduser
 %{TZ_SYS_SHARE}/cert-svc/pkcs12
 %{TZ_SYS_SHARE}/cert-svc/dbspace
 
@@ -165,10 +160,18 @@ rm %{TZ_SYS_BIN}/initialize_store_db.sh
 %defattr(-,root,root,-)
 %{_includedir}/*
 %{_libdir}/pkgconfig/*
-%{_libdir}/libcert-svc.so
 %{_libdir}/libcert-svc-vcore.so
 
+
 %if 0%{?certsvc_test_build}
+%post test
+ln -sf %{TZ_SYS_SHARE}/ca-certificates/tizen/root_cacert0.pem %{TZ_SYS_ETC}/ssl/certs/
+ln -sf %{TZ_SYS_ETC}/ssl/certs/root_cacert0.pem %{TZ_SYS_ETC}/ssl/certs/ba70bb69.0
+
+%postun test
+rm %{TZ_SYS_ETC}/ssl/certs/root_cacert0.pem
+rm %{TZ_SYS_ETC}/ssl/certs/ba70bb69.0
+
 %files test
 %defattr(644,system,system,755)
 %attr(755,root,root) %{TZ_SYS_BIN}/cert-svc-test*
@@ -176,6 +179,5 @@ rm %{TZ_SYS_BIN}/initialize_store_db.sh
 %{TZ_SYS_ETC}/ssl/certs/8956b9bc.0
 %{TZ_SYS_SHARE}/ca-certificates/tizen/*
 %{TZ_SYS_SHARE}/cert-svc/cert-type/*
-%{TZ_SYS_SHARE}/cert-svc/certs/root_ca*.der
 %{TZ_SYS_SHARE}/cert-svc/tests/*
 %endif
diff --git a/srcs/CMakeLists.txt b/srcs/CMakeLists.txt
deleted file mode 100644 (file)
index b8b1410..0000000
+++ /dev/null
@@ -1,42 +0,0 @@
-# compiler warning flags
-ADD_DEFINITIONS("-Wall")
-ADD_DEFINITIONS("-Wextra")
-ADD_DEFINITIONS("-Werror")
-
-PKG_CHECK_MODULES(CERT_SVC_DEP
-    REQUIRED
-    openssl
-    dlog
-    libxml-2.0
-    )
-
-SET(CERT_SVC_PATH ${CMAKE_CURRENT_SOURCE_DIR})
-
-SET(CERT_SVC_SOURCES
-    ${CERT_SVC_PATH}/cert-service.c
-    ${CERT_SVC_PATH}/cert-service-util.c
-    ${CERT_SVC_PATH}/cert-service-store.c
-    ${CERT_SVC_PATH}/cert-service-process.c
-    )
-
-INCLUDE_DIRECTORIES(
-    SYSTEM
-    ${CERT_SVC_DEP_INCLUDE_DIRS}
-    ${PROJECT_SOURCE_DIR}/include
-    )
-
-ADD_LIBRARY(${TARGET_CERT_SVC_LIB} SHARED ${CERT_SVC_SOURCES})
-
-SET_TARGET_PROPERTIES(
-    ${TARGET_CERT_SVC_LIB}
-    PROPERTIES
-        COMPILE_FLAGS "-D_GNU_SOURCE -fPIC -fvisibility=hidden"
-        SOVERSION ${SO_VERSION}
-        VERSION ${VERSION}
-    )
-
-TARGET_LINK_LIBRARIES(${TARGET_CERT_SVC_LIB}
-    ${CERT_SVC_DEP_LIBRARIES}
-    )
-
-INSTALL(TARGETS ${TARGET_CERT_SVC_LIB} DESTINATION ${LIBDIR})
diff --git a/srcs/cert-service-store.c b/srcs/cert-service-store.c
deleted file mode 100644 (file)
index 82bc401..0000000
+++ /dev/null
@@ -1,221 +0,0 @@
-/*
- * certification service
- *
- * Copyright (c) 2000 - 2011 Samsung Electronics Co., Ltd All Rights Reserved 
- *
- * Contact: Kidong Kim <kd0228.kim@samsung.com>
- *
- * Licensed under the Apache License, Version 2.0 (the "License");
- * you may not use this file except in compliance with the License.
- * You may obtain a copy of the License at
- *
- * http://www.apache.org/licenses/LICENSE-2.0
- *
- * Unless required by applicable law or agreed to in writing, software
- * distributed under the License is distributed on an "AS IS" BASIS,
- * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
- * See the License for the specific language governing permissions and
- * limitations under the License.
- *
- */
-
-#include <stdio.h>
-#include <string.h>
-#include <stdlib.h>
-#include <errno.h>
-#include <unistd.h>
-
-#include <openssl/x509.h>
-
-#include "cert-service.h"
-#include "cert-service-util.h"
-#include "cert-service-debug.h"
-#include "cert-service-store.h"
-
-static int get_file_full_path(char* originalName, const char* location, char* outBuf)
-{
-       int ret = CERT_SVC_ERR_NO_ERROR;
-       char pathLocation[CERT_SVC_MAX_FILE_NAME_SIZE];
-       char buf[CERT_SVC_MAX_FILE_NAME_SIZE];
-       char* token = NULL;
-       char* context = NULL;
-       char seps[] = "_";
-       int nameSize = 0 ;
-
-       if (originalName  == NULL) {
-               SLOGE("[ERR][%s] Check your parameter. Maybe file path is NULL.", __func__);
-               ret = CERT_SVC_ERR_INVALID_PARAMETER;
-               goto err;
-       }
-
-       nameSize = strlen(originalName);
-
-       if (nameSize <= 0 || nameSize >= CERT_SVC_MAX_FILE_NAME_SIZE) {
-               SLOGE("[ERR][%s] Check your parameter. File path is too long.", __func__);
-               ret = CERT_SVC_ERR_INVALID_PARAMETER;
-               goto err;
-       }
-
-       memset(buf, 0x00, sizeof(buf));
-       memset(pathLocation, 0x00, sizeof(pathLocation));
-
-       if(location == NULL) {  // use default path
-               strncpy(buf, SYSTEM_CERT_DIR, sizeof(buf) - 1);
-       }
-       else {
-               int locSize = strlen(location) + strlen(CERTSVC_DIR);
-
-               if (locSize <= 0 || locSize >= CERT_SVC_MAX_FILE_NAME_SIZE) {
-                       SLOGE("[ERR][%s] Check your parameter. Location is too long.", __func__);
-                       ret = CERT_SVC_ERR_INVALID_PARAMETER;
-                       goto err;
-               }
-
-               strncpy(pathLocation, location, sizeof(pathLocation) - 1);
-
-               strncpy(buf, CERTSVC_DIR, sizeof(buf) - 1);
-
-               token = strtok_r(pathLocation, seps, &context);
-        size_t sizeBuf = sizeof(buf);
-               while (token) {
-            if (sizeBuf < (strlen(buf) + strlen(token) + 2)) {
-                ret = CERT_SVC_ERR_MEMORY_ALLOCATION;
-                goto err;
-            }
-                       strncat(buf, token, strlen(token));
-                       strncat(buf, "/", 1);
-                       token = strtok_r(NULL, seps, &context);
-               }
-       }
-
-       if ((nameSize + strlen(buf)) >= CERT_SVC_MAX_FILE_NAME_SIZE) {
-               SLOGE("[ERR][%s] Check your parameter. File path is too long.", __func__);
-               ret = CERT_SVC_ERR_INVALID_PARAMETER;
-               goto err;
-       }
-
-       strncat(buf, originalName, nameSize);
-       strncpy(outBuf, buf, CERT_SVC_MAX_FILE_NAME_SIZE - 1);
-       outBuf[ CERT_SVC_MAX_FILE_NAME_SIZE - 1] = '\0';
-
-err:
-       return ret;
-}
-
-int _add_certificate_to_store(const char* filePath, const char* location)
-{
-       int ret = CERT_SVC_ERR_NO_ERROR;
-       /* get real file name */
-       char* realFileName = NULL;
-       char* fileFullPath = NULL;
-       /* open file and copy */
-       FILE* fp_in = NULL;
-       FILE* fp_out = NULL;
-       unsigned long int inFileLen = 0;
-       char* fileContent = NULL;
-
-       /* initialize variable */
-       fileFullPath = (char*)malloc(sizeof(char) * CERT_SVC_MAX_FILE_NAME_SIZE);
-       if(fileFullPath == NULL) {
-               SLOGE("[ERR][%s] Fail to allocate memory.", __func__);
-               ret = CERT_SVC_ERR_MEMORY_ALLOCATION;
-               goto err;
-       }
-       memset(fileFullPath, 0x00, CERT_SVC_MAX_FILE_NAME_SIZE);
-
-       /* get real file name */
-       realFileName = strrchr(filePath, '/');
-       if(realFileName == NULL) {
-               SLOGE("[ERR][%s] File path MUST be absolute path", __func__);
-               ret = CERT_SVC_ERR_FILE_IO;
-               goto err;
-       }
-       
-       /* get real file full path */
-       get_file_full_path((realFileName + 1), location, fileFullPath);
-
-       /* file open and write */
-       if(!(fp_in = fopen(filePath, "rb"))) {
-               SECURE_SLOGE("[ERR][%s] Fail to open file, [%s]", __func__, filePath);
-               ret = CERT_SVC_ERR_FILE_IO;
-               goto err;
-       }
-       if(!(fp_out = fopen(fileFullPath, "wb"))) {
-               SECURE_SLOGE("[ERR][%s] Fail to open file, [%s]", __func__, fileFullPath);
-               if(errno == EACCES)
-                       ret = CERT_SVC_ERR_PERMISSION_DENIED;
-               else
-                       ret = CERT_SVC_ERR_FILE_IO;
-               goto err;
-       }
-
-       if((ret = cert_svc_util_get_file_size(filePath, &inFileLen)) != CERT_SVC_ERR_NO_ERROR) {
-               SECURE_SLOGE("[ERR][%s] Fail to get file size, [%s]", __func__, filePath);
-               goto err;
-       }
-
-       fileContent = (char*)malloc(sizeof(char) * (int)inFileLen);
-       if(fileContent == NULL) {
-               SLOGE("[ERR][%s] Fail to allocate memory", __func__);
-               ret = CERT_SVC_ERR_MEMORY_ALLOCATION;
-               goto err;
-       }
-       memset(fileContent, 0x00, inFileLen);
-
-       if(fread(fileContent, sizeof(char), inFileLen, fp_in) != inFileLen) {
-               SECURE_SLOGE("[ERR][%s] Fail to read file, [%s]", __func__, filePath);
-               ret = CERT_SVC_ERR_FILE_IO;
-               goto err;
-       }
-       if(fwrite(fileContent, sizeof(char), inFileLen, fp_out) != inFileLen) {
-               SECURE_SLOGE("[ERR][%s] Fail to write file, [%s]", __func__, fileFullPath);
-               ret = CERT_SVC_ERR_FILE_IO;
-               goto err;
-       }
-
-err:
-       if(fp_in != NULL)
-               fclose(fp_in);
-       if(fp_out != NULL)
-               fclose(fp_out);
-
-       if(fileContent != NULL)
-               free(fileContent);
-       if(fileFullPath != NULL)
-               free(fileFullPath);
-
-       return ret;
-}
-
-int _delete_certificate_from_store(const char* fileName, const char* location)
-{
-       int ret = CERT_SVC_ERR_NO_ERROR;
-       char* fileFullPath = NULL;
-
-       /* initialize variable */
-       fileFullPath = (char*)malloc(sizeof(char) * CERT_SVC_MAX_FILE_NAME_SIZE);
-       if(fileFullPath == NULL) {
-               SLOGE("[ERR][%s] Fail to allocate memory.", __func__);
-               ret = CERT_SVC_ERR_MEMORY_ALLOCATION;
-               goto err;
-       }
-       memset(fileFullPath, 0x00, CERT_SVC_MAX_FILE_NAME_SIZE);
-
-       /* get file full path */
-       get_file_full_path((char*)fileName, location, fileFullPath);
-
-       /* delete designated certificate */
-       if(unlink(fileFullPath) == -1) {
-               SECURE_SLOGE("[ERR][%s] Fail to delete file, [%s]", __func__, fileName);
-               if(errno == EACCES)
-                       ret = CERT_SVC_ERR_PERMISSION_DENIED;
-               else
-                       ret = CERT_SVC_ERR_FILE_IO;
-       }
-
-err:
-       if(fileFullPath != NULL)
-               free(fileFullPath);
-       
-       return ret;
-}
diff --git a/srcs/cert-service.c b/srcs/cert-service.c
deleted file mode 100644 (file)
index 185c7ab..0000000
+++ /dev/null
@@ -1,552 +0,0 @@
-/*
- * certification service
- *
- * Copyright (c) 2000 - 2011 Samsung Electronics Co., Ltd All Rights Reserved 
- *
- * Contact: Kidong Kim <kd0228.kim@samsung.com>
- *
- * Licensed under the Apache License, Version 2.0 (the "License");
- * you may not use this file except in compliance with the License.
- * You may obtain a copy of the License at
- *
- * http://www.apache.org/licenses/LICENSE-2.0
- *
- * Unless required by applicable law or agreed to in writing, software
- * distributed under the License is distributed on an "AS IS" BASIS,
- * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
- * See the License for the specific language governing permissions and
- * limitations under the License.
- *
- */
-
-#include <string.h>
-#include <stdlib.h>
-#include <errno.h>
-#include <unistd.h>
-#include <dlfcn.h>
-#include <fcntl.h>
-
-#include "cert-service.h"
-#include "cert-service-util.h"
-#include "cert-service-debug.h"
-#include "cert-service-store.h"
-#include "cert-service-process.h"
-
-#ifndef CERT_SVC_API
-#define CERT_SVC_API   __attribute__((visibility("default")))
-#endif
-
-#define AUTHOR_SIGNATURE "author-signature.xml"
-#define DISTRIBUTOR_SIGNATURE "signature1.xml"
-
-int __is_certified_device(const unsigned char* cert, int certSize)
-{
-       int (*CheckFunc)(const unsigned char *, int) = NULL;
-       int (*CheckFile)(void) = NULL;
-       void *handle = NULL;
-       int result;
-       unsigned char *base64cert = NULL;
-       int base64certSize = 0;
-
-       handle = dlopen("libcert-svc-vcore.so", RTLD_LAZY | RTLD_GLOBAL);
-       if (!handle) {
-               SLOGE("Failed to open notification binary");
-               return 0;
-       }
-
-       CheckFile = (int(*)(void))(dlsym(handle, "CheckProfileFile"));
-       if (!CheckFile) {
-               SLOGE("Failed to open symbol CheckProfileFile");
-        result = 0;
-        goto err;
-       }
-
-       result = CheckFile();
-       if (!result){
-        SLOGD("checking file. device profile dose not exist.");
-        result = -1;
-        goto err;
-       }
-
-       base64cert = (unsigned char *)calloc(certSize*2, 1);
-    if (!base64cert) {
-        result = 0;
-        goto err;
-    }
-       cert_svc_util_base64_encode(cert, certSize, base64cert, &base64certSize);
-
-       CheckFunc = (int(*)(const unsigned char *, int))(dlsym(handle, "CheckDevice"));
-       if (!CheckFunc) {
-               SLOGE("Failed to open symbol CheckDevice");
-        result = 0;
-        goto err_ret_after_free;
-       }
-
-       result = CheckFunc(base64cert, base64certSize);
-       SLOGD("Result of checking device : %d", result);
-
-err_ret_after_free:
-    free(base64cert);
-
-err:
-    dlclose(handle);
-       return result;
-}
-
-int _cert_svc_verify_certificate_with_caflag(CERT_CONTEXT* ctx, int checkCAFlag, int* validity)
-{
-       int ret = CERT_SVC_ERR_NO_ERROR;
-
-       if (!ctx || !ctx->certBuf || ctx->fileNames) {
-               SLOGE("[ERR][%s] Check your parameter. Cannot find certificate.", __func__);
-               return CERT_SVC_ERR_INVALID_PARAMETER;
-       }
-
-       if(!(ctx->fileNames = (cert_svc_filename_list*)malloc(sizeof(cert_svc_filename_list)))) {
-               SLOGE("[ERR][%s] Fail to allocate memory.", __func__);
-               ret = CERT_SVC_ERR_MEMORY_ALLOCATION;
-               goto err;
-       }
-       if(!(ctx->fileNames->filename = (char*)malloc(sizeof(char) * CERT_SVC_MAX_FILE_NAME_SIZE))) {
-               SLOGE("[ERR][%s] Fail to allocate memory.", __func__);
-               ret = CERT_SVC_ERR_MEMORY_ALLOCATION;
-               goto err;
-       }
-       memset(ctx->fileNames->filename, 0x00, CERT_SVC_MAX_FILE_NAME_SIZE);
-       ctx->fileNames->next = NULL;
-
-       if((ret = _verify_certificate_with_caflag(ctx->certBuf, &(ctx->certLink), checkCAFlag, ctx->fileNames, validity)) != CERT_SVC_ERR_NO_ERROR) {
-               SLOGE("[ERR][%s] Fail to verify certificate.", __func__);
-               goto err;
-       }
-
-       SLOGD("root cert path : %s", ctx->fileNames->filename);
-       SLOGD("Success to verify certificate.");
-
-err:
-       return ret;
-}
-
-CERT_SVC_API
-int cert_svc_add_certificate_to_store(const char* filePath, const char* location)
-{
-       int ret = CERT_SVC_ERR_NO_ERROR;
-       char _filePath[CERT_SVC_MAX_FILE_NAME_SIZE];
-       int pathSize = 0;
-
-       if (!filePath) {
-               SLOGE("[ERR][%s] Check your parameter. Maybe file path is NULL.", __func__);
-               return CERT_SVC_ERR_INVALID_PARAMETER;
-       }
-
-       pathSize = strlen(filePath);
-
-       if (pathSize <= 0 || pathSize >= CERT_SVC_MAX_FILE_NAME_SIZE) {
-               SLOGE("[ERR][%s] Check your parameter. Maybe file path is NULL.", __func__);
-               return CERT_SVC_ERR_INVALID_PARAMETER;
-       }
-
-       memset(_filePath, 0x0, sizeof(_filePath));
-
-       if (filePath[0] != '/') { // not absolute path, this is regarded relative file path
-               if (!getcwd(_filePath, sizeof(_filePath))) {
-                       SLOGE("[ERR][%s] Check your parameter. Maybe file path is NULL.", __func__);
-                       return CERT_SVC_ERR_INVALID_OPERATION;
-               }
-
-               int cwdSize = 0;
-               _filePath[sizeof(_filePath) - 1] = '\0';
-
-               cwdSize = strlen(_filePath);
-
-               if (cwdSize <=0 || (cwdSize + pathSize + 1) >= CERT_SVC_MAX_FILE_NAME_SIZE) {
-                       SLOGE("[ERR][%s] Check your parameter. Maybe file path is NULL.", __func__);
-                       return CERT_SVC_ERR_INVALID_OPERATION;
-               }
-
-               strncat(_filePath, "/", 1);
-               strncat(_filePath, filePath, pathSize);
-       } else {
-               strncpy(_filePath, filePath, pathSize);
-       }
-
-       ret = _add_certificate_to_store(_filePath, location);
-
-       if (ret != CERT_SVC_ERR_NO_ERROR) {
-               SLOGE("[ERR][%s] Fail to store certificate, [%s]", __func__, _filePath);
-               return ret;
-       }
-       SLOGD("[%s] Success to add certificate [%s].", __func__, filePath);
-
-       return CERT_SVC_ERR_NO_ERROR;
-}
-
-CERT_SVC_API
-int cert_svc_delete_certificate_from_store(const char* fileName, const char* location)
-{
-       int ret = CERT_SVC_ERR_NO_ERROR;
-
-       if (!fileName || fileName[0] == '/') {
-               SLOGE("[ERR][%s] Check your parameter. Maybe file name is NULL or is not single name.", __func__);
-               return CERT_SVC_ERR_INVALID_PARAMETER;
-       }
-
-       ret = _delete_certificate_from_store(fileName, location);
-       if (ret != CERT_SVC_ERR_NO_ERROR) {
-               SLOGE("[ERR][%s] Fail to delete certificate, [%s]", __func__, fileName);
-               return ret;
-       }
-
-       SLOGD("[%s] Success to delete certificate [%s].", __func__, fileName);
-
-       return CERT_SVC_ERR_NO_ERROR;
-}
-
-CERT_SVC_API
-int cert_svc_verify_certificate(CERT_CONTEXT* ctx, int* validity)
-{
-       return _cert_svc_verify_certificate_with_caflag(ctx, 0, validity);
-}
-
-CERT_SVC_API
-int cert_svc_verify_certificate_with_caflag(CERT_CONTEXT* ctx, int* validity)
-{
-       return _cert_svc_verify_certificate_with_caflag(ctx, 1, validity);
-}
-
-CERT_SVC_API
-int cert_svc_extract_certificate_data(CERT_CONTEXT* ctx)
-{
-       int ret = CERT_SVC_ERR_NO_ERROR;
-
-       if (!ctx || !ctx->certBuf) {
-               SLOGE("[ERR][%s] Check your parameter.", __func__);
-               return CERT_SVC_ERR_INVALID_PARAMETER;
-       }
-
-       if (ctx->certDesc != NULL) {
-               SLOGE("[ERR][%s] certDesc field already be used.", __func__);
-               return CERT_SVC_ERR_INVALID_OPERATION;
-       }
-
-       if (!(ctx->certDesc = (cert_svc_cert_descriptor*)malloc(sizeof(cert_svc_cert_descriptor)))) {
-               SLOGE("[ERR][%s] Fail to allocate memory.", __func__);
-               return CERT_SVC_ERR_MEMORY_ALLOCATION;
-       }
-       memset(ctx->certDesc, 0x00, sizeof(cert_svc_cert_descriptor));
-
-       if ((ret = _extract_certificate_data(ctx->certBuf, ctx->certDesc)) != CERT_SVC_ERR_NO_ERROR) {
-               SLOGE("[ERR][%s] Fail to extract certificate data.", __func__);
-               free(ctx->certDesc);
-               ctx->certDesc = NULL;
-               return ret;
-       }
-
-       SLOGD("[%s] Success to extract certificate.", __func__);
-
-       return CERT_SVC_ERR_NO_ERROR;
-}
-
-CERT_SVC_API
-int cert_svc_search_certificate(CERT_CONTEXT* ctx, search_field fldName, char* fldData)
-{
-       int ret = CERT_SVC_ERR_NO_ERROR;
-
-       if (!ctx || fldName > SEARCH_FIELD_END || !fldData) {
-               SLOGE("[ERR][%s] Invalid parameter. Check your parameter", __func__);
-               return CERT_SVC_ERR_INVALID_PARAMETER;
-       }
-
-       if (ctx->fileNames != NULL) {
-               SLOGE("[ERR][%s] fileNames field already be used.", __func__);
-               return CERT_SVC_ERR_INVALID_OPERATION;
-       }
-
-       if ((ret = _search_certificate(&(ctx->fileNames), fldName, fldData)) != CERT_SVC_ERR_NO_ERROR) {
-               SLOGE("[ERR][%s] Fail to search certificate.", ctx->fileNames);
-               return ret;
-       }
-
-       SLOGD("[%s] Success to search certificate(s).", __func__);
-
-       return CERT_SVC_ERR_NO_ERROR;
-}
-
-CERT_SVC_API
-CERT_CONTEXT* cert_svc_cert_context_init()
-{
-       CERT_CONTEXT* ctx = NULL;
-
-       if (!(ctx = (CERT_CONTEXT*)malloc(sizeof(CERT_CONTEXT)))) {
-               SLOGE("[ERR][%s] Fail to allocate memory.", __func__);
-               return NULL;
-       }
-
-       ctx->certBuf = NULL;
-       ctx->certDesc = NULL;
-       ctx->certLink = NULL;
-       ctx->fileNames = NULL;
-
-       SLOGD("[%s] Success to initialize context.", __func__);
-
-       return ctx;
-}
-
-CERT_SVC_API
-int cert_svc_cert_context_final(CERT_CONTEXT* context)
-{
-       if (!context)
-               return CERT_SVC_ERR_NO_ERROR;
-
-       if (context->certBuf) {
-               free(context->certBuf->data);
-               free(context->certBuf);
-               context->certBuf = NULL;
-       }
-
-       release_certificate_data(context->certDesc);
-       release_cert_list(context->certLink);
-       release_filename_list(context->fileNames);
-
-       free(context);
-       context = NULL;
-
-       SLOGD("[%s] Success to finalize context.", __func__);
-
-       return CERT_SVC_ERR_NO_ERROR;
-}
-
-CERT_SVC_API
-int cert_svc_load_buf_to_context(CERT_CONTEXT* ctx, unsigned char *buf)
-{
-       int ret = CERT_SVC_ERR_NO_ERROR;
-       int size = 0;
-    unsigned char *decodedBuf = NULL;
-    int decodedSize = 0;
-
-       if (!ctx || !buf) {
-               SLOGE("[ERR][%s] context or buf is NULL.", __func__);
-               return CERT_SVC_ERR_INVALID_PARAMETER;
-       }
-
-       if (ctx->certBuf) {
-               SLOGE("[ERR][%s] certBuf is already used. we cannot load buffer content.", __func__);
-               return CERT_SVC_ERR_INVALID_OPERATION;
-       }
-
-       if (!(ctx->certBuf = (cert_svc_mem_buff*)malloc(sizeof(cert_svc_mem_buff)))) {
-               SLOGE("[ERR][%s] Fail to allocate memory.", __func__);
-               return CERT_SVC_ERR_MEMORY_ALLOCATION;
-       }
-       memset(ctx->certBuf, 0x00, sizeof(cert_svc_mem_buff));
-
-       size = strlen((char *)buf);
-       decodedSize = ((size / 4) * 3) + 1;
-
-       if (!(decodedBuf = (unsigned char *)malloc(sizeof(unsigned char) * decodedSize))) {
-               SLOGE("[ERR][%s] Fail to allocate memory.", __func__);
-               return CERT_SVC_ERR_MEMORY_ALLOCATION;
-       }
-
-       if ((ret = cert_svc_util_base64_decode(buf, size, decodedBuf, &decodedSize)) != CERT_SVC_ERR_NO_ERROR) {
-               SLOGE("[ERR][%s] Fail to decode string, ret: [%d]", __func__, ret);
-               free(decodedBuf);
-               return CERT_SVC_ERR_INVALID_OPERATION;
-       }
-
-       ctx->certBuf->data = decodedBuf;
-       ctx->certBuf->size = decodedSize;
-
-       SLOGD("[%s] Success to load certificate buffer content to context.", __func__);
-
-       return CERT_SVC_ERR_NO_ERROR;
-}
-
-CERT_SVC_API
-int cert_svc_load_file_to_context(CERT_CONTEXT* ctx, const char* filePath)
-{
-       int ret = CERT_SVC_ERR_NO_ERROR;
-
-       if (!ctx || !filePath) {
-               SLOGE("[ERR][%s] context or file path is NULL.", __func__);
-               return CERT_SVC_ERR_INVALID_PARAMETER;
-       }
-
-       if (ctx->certBuf) {
-               SLOGE("[ERR][%s] certBuf is already used. we cannot load file.", __func__);
-               return CERT_SVC_ERR_INVALID_OPERATION;
-       }
-
-       if (!(ctx->certBuf = (cert_svc_mem_buff*)malloc(sizeof(cert_svc_mem_buff)))) {
-               SLOGE("[ERR][%s] Fail to allocate memory.", __func__);
-               return CERT_SVC_ERR_MEMORY_ALLOCATION;
-       }
-       memset(ctx->certBuf, 0x00, sizeof(cert_svc_mem_buff));
-
-       if ((ret = cert_svc_util_load_file_to_buffer(filePath, ctx->certBuf)) != CERT_SVC_ERR_NO_ERROR) {
-               SLOGE("[ERR][%s] Fail to load file, filepath: [%s], ret: [%d]", __func__, filePath, ret);
-               free(ctx->certBuf);
-               ctx->certBuf = NULL;
-               return CERT_SVC_ERR_INVALID_OPERATION;
-       }
-       
-       SLOGD("[%s] Success to load certificate file content to context.", __func__);
-
-       return CERT_SVC_ERR_NO_ERROR;
-}
-
-CERT_SVC_API
-int cert_svc_push_buf_into_context(CERT_CONTEXT *ctx, unsigned char* buf)
-{
-       int ret = CERT_SVC_ERR_NO_ERROR;
-       cert_svc_linked_list* cur = NULL;
-       cert_svc_linked_list* new = NULL;
-       int size = 0;
-       unsigned char* decodedBuf = NULL;
-    int decodedSize = 0;
-
-       if (!ctx || !buf) {
-               SLOGE("[ERR][%s] context or buf is NULL.", __func__);
-               return CERT_SVC_ERR_INVALID_PARAMETER;
-       }
-
-       /* memory alloction new item */
-       if (!(new = (cert_svc_linked_list*)malloc(sizeof(cert_svc_linked_list)))) {
-               SLOGE("[ERR][%s] Fail to allocate memory.", __func__);
-               return CERT_SVC_ERR_MEMORY_ALLOCATION;
-       }
-
-       if (!(new->certificate = (cert_svc_mem_buff*)malloc(sizeof(cert_svc_mem_buff)))) {
-               SLOGE("[ERR][%s] Fail to allocate memory.", __func__);
-               free(new);
-               return CERT_SVC_ERR_MEMORY_ALLOCATION;
-       }
-
-       size = strlen((char *)buf);
-       decodedSize = ((size / 4) * 3) + 1;
-
-       if (!(decodedBuf = (unsigned char *)malloc(sizeof(unsigned char) * decodedSize))) {
-               SLOGE("[ERR][%s] Fail to allocate memory.", __func__);
-               release_cert_list(new);
-               return CERT_SVC_ERR_MEMORY_ALLOCATION;
-       }
-
-       if ((ret = cert_svc_util_base64_decode(buf, size, decodedBuf, &decodedSize)) != CERT_SVC_ERR_NO_ERROR) {
-               SLOGE("[ERR][%s] Fail to decode string, ret: [%d]", __func__, ret);
-               release_cert_list(new);
-               free(decodedBuf);
-               return CERT_SVC_ERR_INVALID_OPERATION;
-       }
-
-       new->certificate->data = decodedBuf;
-       new->certificate->size = decodedSize;
-       new->next = NULL;
-
-       /* attach new structure */
-       if (!ctx->certLink) {
-               ctx->certLink = new;
-       } else {
-               cur = ctx->certLink;
-               while (cur->next)
-                       cur = cur->next;
-
-               cur->next = new;
-       }
-       
-       SLOGD("[%s] Success to push certificate buffer content to context.", __func__);
-
-       return CERT_SVC_ERR_NO_ERROR;
-}
-
-CERT_SVC_API
-int cert_svc_push_file_into_context(CERT_CONTEXT *ctx, const char* filePath)
-{
-       int ret = CERT_SVC_ERR_NO_ERROR;
-       cert_svc_linked_list* cur = NULL;
-       cert_svc_linked_list* new = NULL;
-
-       if (!ctx || !filePath) {
-               SLOGE("[ERR][%s] context or file path is NULL.", __func__);
-               return CERT_SVC_ERR_INVALID_PARAMETER;
-       }
-
-       if (!(new = (cert_svc_linked_list*)malloc(sizeof(cert_svc_linked_list)))) {
-               SLOGE("[ERR][%s] Fail to allocate memory.", __func__);
-               return CERT_SVC_ERR_MEMORY_ALLOCATION;
-       }
-       memset(new, 0x00, sizeof(cert_svc_linked_list));
-
-       if (!(new->certificate = (cert_svc_mem_buff*)malloc(sizeof(cert_svc_mem_buff)))) {
-               SLOGE("[ERR][%s] Fail to allocate memory.", __func__);
-               free(new);
-               return CERT_SVC_ERR_MEMORY_ALLOCATION;
-       }
-       memset(new->certificate, 0x00, sizeof(cert_svc_mem_buff));
-
-       if ((ret = cert_svc_util_load_file_to_buffer(filePath, new->certificate)) != CERT_SVC_ERR_NO_ERROR) {
-               SLOGE("[ERR][%s] Fail to load file, filepath: [%s], ret: [%d]", __func__, filePath, ret);
-               release_cert_list(new);
-               return CERT_SVC_ERR_INVALID_OPERATION;
-       }
-       new->next = NULL;
-
-       /* attach new structure */
-       if (!ctx->certLink) {
-               ctx->certLink = new;
-       } else {
-               cur = ctx->certLink;
-               while (cur->next)
-                       cur = cur->next;
-
-               cur->next = new;
-       }
-       
-       SLOGD("[%s] Success to push certificate file content to context.", __func__);
-
-       return CERT_SVC_ERR_NO_ERROR;
-}
-
-CERT_SVC_API
-int cert_svc_load_PFX_file_to_context(CERT_CONTEXT* ctx, unsigned char** privateKey, int* priKeyLen, const char* filePath, char* passPhrase)
-{
-       int ret = CERT_SVC_ERR_NO_ERROR;
-
-       if (!ctx || !filePath) {
-               SLOGE("[ERR][%s] context or file path is NULL.", __func__);
-               return CERT_SVC_ERR_INVALID_PARAMETER;
-       }
-
-       if (ctx->certBuf) {
-               SLOGE("[ERR][%s] certBuf is already used. we cannot load file.", __func__);
-               return CERT_SVC_ERR_INVALID_OPERATION;
-       }
-
-       if (!(ctx->certBuf = (cert_svc_mem_buff*)malloc(sizeof(cert_svc_mem_buff)))) {
-               SLOGE("[ERR][%s] Fail to allocate memory.", __func__);
-               return CERT_SVC_ERR_MEMORY_ALLOCATION;
-       }
-       memset(ctx->certBuf, 0x00, sizeof(cert_svc_mem_buff));
-
-       if ((ret = cert_svc_util_load_PFX_file_to_buffer(filePath, ctx->certBuf, &ctx->certLink, privateKey, priKeyLen, passPhrase)) != CERT_SVC_ERR_NO_ERROR) {
-               SLOGE("[ERR][%s] Fail to load file, filepath: [%s], ret: [%d]", __func__, filePath, ret);
-               free(ctx->certBuf);
-               ctx->certBuf = NULL;
-               return CERT_SVC_ERR_INVALID_OPERATION;
-       }
-       
-       SLOGD("[%s] Success to load certificate file content to context.", __func__);
-
-       return CERT_SVC_ERR_NO_ERROR;
-}
-
-CERT_SVC_API
-char* cert_svc_get_certificate_crt_file_path(void)
-{
-       return CERTSVC_CRT_FILE_PATH;
-}
-
-CERT_SVC_API
-int cert_svc_util_parse_name_fld_data(unsigned char* str, cert_svc_name_fld_data* fld)
-{
-       return parse_name_fld_data(str, fld);
-}
index 57d2a9a..97be24d 100644 (file)
@@ -13,8 +13,6 @@
 #    limitations under the License.
 #
 
-SET(TARGET_TEST_CERT_SVC_OGIG "cert-svc-tests-orig")
-
 SET(TARGET_CAPI_TEST "cert-svc-tests-capi")
 SET(TARGET_PKCS12_TEST "cert-svc-tests-pkcs12")
 SET(TARGET_VCORE_TEST "cert-svc-tests-vcore")
@@ -54,4 +52,3 @@ INCLUDE_DIRECTORIES(
 ADD_SUBDIRECTORY(capi)
 ADD_SUBDIRECTORY(pkcs12)
 ADD_SUBDIRECTORY(vcore)
-ADD_SUBDIRECTORY(cert-svc)
diff --git a/tests/cert-svc/CMakeLists.txt b/tests/cert-svc/CMakeLists.txt
deleted file mode 100644 (file)
index 5aa1c39..0000000
+++ /dev/null
@@ -1,82 +0,0 @@
-# Copyright (c) 2011 Samsung Electronics Co., Ltd All Rights Reserved
-#
-#    Licensed under the Apache License, Version 2.0 (the "License");
-#    you may not use this file except in compliance with the License.
-#    You may obtain a copy of the License at
-#
-#        http://www.apache.org/licenses/LICENSE-2.0
-#
-#    Unless required by applicable law or agreed to in writing, software
-#    distributed under the License is distributed on an "AS IS" BASIS,
-#    WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
-#    See the License for the specific language governing permissions and
-#    limitations under the License.
-#
-# @file        CMakeLists.txt
-# @author      Bartlomiej Grzelewski (b.grzelewski@samsung.com)
-# @version     1.0
-# @brief
-#
-
-SET(CERT_SVC_ORIG_TESTS_DIR ${CMAKE_CURRENT_SOURCE_DIR})
-
-SET(CERT_SVC_OGIG_TESTS_SOURCES
-    ${CERT_SVC_ORIG_TESTS_DIR}/test_caflag.c
-    ${CERT_SVC_ORIG_TESTS_DIR}/test_suite_main.c
-    ${VCORE_DPL_SOURCES}
-    )
-
-INCLUDE_DIRECTORIES(
-    ${CERT_SVC_ORIG_TESTS_DIR}
-    ${PROJECT_SOURCE_DIR}/include
-    )
-
-ADD_EXECUTABLE(${TARGET_TEST_CERT_SVC_OGIG} ${CERT_SVC_OGIG_TESTS_SOURCES} ${DPL_TEST_SOURCES})
-
-TARGET_LINK_LIBRARIES(${TARGET_TEST_CERT_SVC_OGIG}
-    ${TARGET_CERT_SVC_LIB}
-    ${TEST_DEP_LIBRARIES}
-    )
-
-INSTALL(TARGETS ${TARGET_TEST_CERT_SVC_OGIG}
-    DESTINATION ${TZ_SYS_BIN}
-    PERMISSIONS OWNER_READ
-                OWNER_WRITE
-                OWNER_EXECUTE
-                GROUP_READ
-                GROUP_EXECUTE
-                WORLD_READ
-                WORLD_EXECUTE
-    )
-
-INSTALL(FILES
-    ${CERT_SVC_ORIG_TESTS_DIR}/data/caflag/second_ca.der
-    ${CERT_SVC_ORIG_TESTS_DIR}/data/caflag/aia_signer.der
-    ${CERT_SVC_ORIG_TESTS_DIR}/data/caflag/rev_signer.der
-    ${CERT_SVC_ORIG_TESTS_DIR}/data/caflag/noaia_signer.der
-    ${CERT_SVC_ORIG_TESTS_DIR}/data/caflag/v1_signer.der
-    DESTINATION ${TZ_SYS_SHARE}/cert-svc/tests/orig_c/data/caflag
-    PERMISSIONS OWNER_READ
-                GROUP_READ
-                WORLD_READ
-    )
-
-INSTALL(FILES
-    ${CERT_SVC_ORIG_TESTS_DIR}/data/caflag/root_ca.der
-    ${CERT_SVC_ORIG_TESTS_DIR}/data/caflag/root_ca_v1.der
-    DESTINATION ${TZ_SYS_SHARE}/cert-svc/certs
-    PERMISSIONS OWNER_READ
-                GROUP_READ
-                WORLD_READ
-    )
-
-INSTALL(FILES
-    ${CERT_SVC_ORIG_TESTS_DIR}/data/cert0.pem
-    ${CERT_SVC_ORIG_TESTS_DIR}/data/cert1.der
-    ${CERT_SVC_ORIG_TESTS_DIR}/data/cert2fake.pem
-    ${CERT_SVC_ORIG_TESTS_DIR}/data/cert3fake.der
-    DESTINATION ${TZ_SYS_SHARE}/cert-svc/cert-type/
-    PERMISSIONS OWNER_READ
-                GROUP_READ
-                WORLD_READ
-    )
diff --git a/tests/cert-svc/Makefile b/tests/cert-svc/Makefile
deleted file mode 100644 (file)
index fd805e6..0000000
+++ /dev/null
@@ -1,24 +0,0 @@
-.SUFFIX : .c .o
-
-CC = sbs -e gcc
-INC = -I../include/
-LIBS = -lcert-svc
-CFLAGS = -g $(INC)
-
-TARGET = \
-                store_test \
-                delete_test \
-                extract_test \
-                extract_test_pfx \
-                search_test \
-                verify_test \
-                verify_sig \
-                mem_test
-
-all: $(TARGET)
-
-$(TARGET): %: %.c
-       $(CC) -o $@ $< $(CFLAGS) $(LIBS)
-
-clean:
-       rm -rf *.o $(TARGET) *~ *core
diff --git a/tests/cert-svc/data/Broot.der b/tests/cert-svc/data/Broot.der
deleted file mode 100644 (file)
index 12be4d0..0000000
Binary files a/tests/cert-svc/data/Broot.der and /dev/null differ
diff --git a/tests/cert-svc/data/Broot.pem b/tests/cert-svc/data/Broot.pem
deleted file mode 100644 (file)
index fd08360..0000000
+++ /dev/null
@@ -1,17 +0,0 @@
------BEGIN CERTIFICATE-----
-MIICpzCCAhCgAwIBAgIBADANBgkqhkiG9w0BAQUFADBbMQswCQYDVQQGEwJDUjEM
-MAoGA1UECBMDU1RSMQswCQYDVQQKEwJPUjEMMAoGA1UECxMDT1VSMQwwCgYDVQQD
-EwNDTlIxFTATBgkqhkiG9w0BCQEWBkVtYWlsUjAeFw0wNzEyMTkwNTE5MjBaFw0x
-MDEyMTgwNTE5MjBaMFsxCzAJBgNVBAYTAkNSMQwwCgYDVQQIEwNTVFIxCzAJBgNV
-BAoTAk9SMQwwCgYDVQQLEwNPVVIxDDAKBgNVBAMTA0NOUjEVMBMGCSqGSIb3DQEJ
-ARYGRW1haWxSMIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQDG2dhVCOuBD2i4
-mjWLU8vkQpRVylojbSzxvO3uynaOZAnhqLxu2F2ugR1NLJOlrgbjq13xCO4FjKZj
-eb4kln5HJl7GLCNz8ns2+kAtwiVfpZnQ8U6Y/1BLiB7sLH+ONB4g6Rm9cgST1e6H
-e/EJMkzU75+wkj94ORZ4TINDU4kU4QIDAQABo3sweTAJBgNVHRMEAjAAMCwGCWCG
-SAGG+EIBDQQfFh1PcGVuU1NMIEdlbmVyYXRlZCBDZXJ0aWZpY2F0ZTAdBgNVHQ4E
-FgQUX0cbXBYMGt9k4/HRapEA9XUlKk4wHwYDVR0jBBgwFoAUX0cbXBYMGt9k4/HR
-apEA9XUlKk4wDQYJKoZIhvcNAQEFBQADgYEAXyKHjF6k0yNY/og30g1+SsNxYNqC
-yzGEbCywXELFakhQ1qmx12VY6qkeo+khyuiRfp9cDx8sSQ2asypIYeO9ctRNmp4D
-lC8YNI7BdY/g4Xq7uy4BKeng8Mv8VNAtdBaKreJqSk5RvQmepXRiTJgo2DzGlCU5
-3aU1rQ6vF96wFt4=
------END CERTIFICATE-----
diff --git a/tests/cert-svc/data/TestData/B1.der b/tests/cert-svc/data/TestData/B1.der
deleted file mode 100644 (file)
index f0c031b..0000000
Binary files a/tests/cert-svc/data/TestData/B1.der and /dev/null differ
diff --git a/tests/cert-svc/data/TestData/B2.der b/tests/cert-svc/data/TestData/B2.der
deleted file mode 100644 (file)
index 791b301..0000000
Binary files a/tests/cert-svc/data/TestData/B2.der and /dev/null differ
diff --git a/tests/cert-svc/data/TestData/B3.der b/tests/cert-svc/data/TestData/B3.der
deleted file mode 100644 (file)
index e21164a..0000000
Binary files a/tests/cert-svc/data/TestData/B3.der and /dev/null differ
diff --git a/tests/cert-svc/data/TestData/B4.der b/tests/cert-svc/data/TestData/B4.der
deleted file mode 100644 (file)
index 7f1c401..0000000
Binary files a/tests/cert-svc/data/TestData/B4.der and /dev/null differ
diff --git a/tests/cert-svc/data/TestData/B5.der b/tests/cert-svc/data/TestData/B5.der
deleted file mode 100644 (file)
index f0a4e14..0000000
Binary files a/tests/cert-svc/data/TestData/B5.der and /dev/null differ
diff --git a/tests/cert-svc/data/TestData/B6.der b/tests/cert-svc/data/TestData/B6.der
deleted file mode 100644 (file)
index 80e84b4..0000000
Binary files a/tests/cert-svc/data/TestData/B6.der and /dev/null differ
diff --git a/tests/cert-svc/data/TestData/B7.der b/tests/cert-svc/data/TestData/B7.der
deleted file mode 100644 (file)
index 87d34db..0000000
Binary files a/tests/cert-svc/data/TestData/B7.der and /dev/null differ
diff --git a/tests/cert-svc/data/TestData/B8.der b/tests/cert-svc/data/TestData/B8.der
deleted file mode 100644 (file)
index cd047d0..0000000
Binary files a/tests/cert-svc/data/TestData/B8.der and /dev/null differ
diff --git a/tests/cert-svc/data/TestData/B9.der b/tests/cert-svc/data/TestData/B9.der
deleted file mode 100644 (file)
index 276f45e..0000000
Binary files a/tests/cert-svc/data/TestData/B9.der and /dev/null differ
diff --git a/tests/cert-svc/data/TestData/Broot.der b/tests/cert-svc/data/TestData/Broot.der
deleted file mode 100644 (file)
index 12be4d0..0000000
Binary files a/tests/cert-svc/data/TestData/Broot.der and /dev/null differ
diff --git a/tests/cert-svc/data/TestData/Broot.pem b/tests/cert-svc/data/TestData/Broot.pem
deleted file mode 100644 (file)
index fd08360..0000000
+++ /dev/null
@@ -1,17 +0,0 @@
------BEGIN CERTIFICATE-----
-MIICpzCCAhCgAwIBAgIBADANBgkqhkiG9w0BAQUFADBbMQswCQYDVQQGEwJDUjEM
-MAoGA1UECBMDU1RSMQswCQYDVQQKEwJPUjEMMAoGA1UECxMDT1VSMQwwCgYDVQQD
-EwNDTlIxFTATBgkqhkiG9w0BCQEWBkVtYWlsUjAeFw0wNzEyMTkwNTE5MjBaFw0x
-MDEyMTgwNTE5MjBaMFsxCzAJBgNVBAYTAkNSMQwwCgYDVQQIEwNTVFIxCzAJBgNV
-BAoTAk9SMQwwCgYDVQQLEwNPVVIxDDAKBgNVBAMTA0NOUjEVMBMGCSqGSIb3DQEJ
-ARYGRW1haWxSMIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQDG2dhVCOuBD2i4
-mjWLU8vkQpRVylojbSzxvO3uynaOZAnhqLxu2F2ugR1NLJOlrgbjq13xCO4FjKZj
-eb4kln5HJl7GLCNz8ns2+kAtwiVfpZnQ8U6Y/1BLiB7sLH+ONB4g6Rm9cgST1e6H
-e/EJMkzU75+wkj94ORZ4TINDU4kU4QIDAQABo3sweTAJBgNVHRMEAjAAMCwGCWCG
-SAGG+EIBDQQfFh1PcGVuU1NMIEdlbmVyYXRlZCBDZXJ0aWZpY2F0ZTAdBgNVHQ4E
-FgQUX0cbXBYMGt9k4/HRapEA9XUlKk4wHwYDVR0jBBgwFoAUX0cbXBYMGt9k4/HR
-apEA9XUlKk4wDQYJKoZIhvcNAQEFBQADgYEAXyKHjF6k0yNY/og30g1+SsNxYNqC
-yzGEbCywXELFakhQ1qmx12VY6qkeo+khyuiRfp9cDx8sSQ2asypIYeO9ctRNmp4D
-lC8YNI7BdY/g4Xq7uy4BKeng8Mv8VNAtdBaKreJqSk5RvQmepXRiTJgo2DzGlCU5
-3aU1rQ6vF96wFt4=
------END CERTIFICATE-----
diff --git a/tests/cert-svc/data/TestData/cert.der b/tests/cert-svc/data/TestData/cert.der
deleted file mode 100644 (file)
index 80bd6ab..0000000
Binary files a/tests/cert-svc/data/TestData/cert.der and /dev/null differ
diff --git a/tests/cert-svc/data/TestData/cert_sign.der b/tests/cert-svc/data/TestData/cert_sign.der
deleted file mode 100644 (file)
index 86d566a..0000000
Binary files a/tests/cert-svc/data/TestData/cert_sign.der and /dev/null differ
diff --git a/tests/cert-svc/data/TestData/decodedCert.data b/tests/cert-svc/data/TestData/decodedCert.data
deleted file mode 100644 (file)
index 20816dc..0000000
Binary files a/tests/cert-svc/data/TestData/decodedCert.data and /dev/null differ
diff --git a/tests/cert-svc/data/TestData/invalid_message b/tests/cert-svc/data/TestData/invalid_message
deleted file mode 100644 (file)
index c6f271a..0000000
Binary files a/tests/cert-svc/data/TestData/invalid_message and /dev/null differ
diff --git a/tests/cert-svc/data/TestData/invalid_priv.pem b/tests/cert-svc/data/TestData/invalid_priv.pem
deleted file mode 100644 (file)
index d920b03..0000000
+++ /dev/null
@@ -1,15 +0,0 @@
------BEGIN RSA PRIVATE KEY-----
-MIICXwIBAAKBgQDx+bjbdNEi67ys43mIioVWuJpTrKRi4QlVMj7roX1n76DQN4WI
-w/9m6wD0tHsmto  INVALID PRIVATE KEY rSUlS7N5+Vc7Rd2yEGDJokMz4pDI
-FHkuTjTctqhnlKkHbkxeERD+nhnXbH/CKfZZmgW9Mhzls13WZaJLDnrLcwIDAQAB
-AoGBAMKFCYIB6o20DDy/sNd+46nPROC3DH8ggKwodERf0bxX+mLn/0TuqsZFbMNK
-wyVf4R4veczDwICzZLkE8AEaNgzoA/gV0REbj38hgqEAG6D/rZaPwNnqN4CISXur
-3kBypPUE05DG8FhdRC1R6hrMlakvXJw3zHunclIMmWlvk/pBAkEA/i8OTj6nBNz+
-oUrWGyYfuLrUsHVhL5DnwyaR9zKuxzmYRv9xHEAPKU/GBF9YKWxQygwY0o4ql00y
-qZKAXWW7iwJBAPO0Vcz00c4gRWJsFyETPadMq8n84NgccxfOYm9BQsdiOAq+xxTh
-k5c/c+bHUCNoAv7x3pWCn+EVqpnbFtH7TLkCQQCW4G2Yaj4Pd/I44UgHo3CO4W9g
-Mrx2VIgNYXahCdeO8BQAiJ2mTCvztKNwcvvM0rt9wwJ08Og9GRiqaQiC5+ETAkEA
-1+8g2zLNt7tGX1fxAoB+737y9E1ZmINUw3I+K+ACYJI5n+O8mFbrpGc3tfNCoaym
-guki1QzhxtmgySSkSrhFGQJBAOj1P+ku8LHK1l2TWe1DjyqE32T5SGDuq/FLoxnj
-1UNwHaU7GPeRjSftGwxFvPL9alo7dFoTQCgCrTSOvnb0H8w=
------END RSA PRIVATE KEY-----
diff --git a/tests/cert-svc/data/TestData/invalid_pubkey b/tests/cert-svc/data/TestData/invalid_pubkey
deleted file mode 100644 (file)
index f0ac3f8..0000000
Binary files a/tests/cert-svc/data/TestData/invalid_pubkey and /dev/null differ
diff --git a/tests/cert-svc/data/TestData/invalid_signature b/tests/cert-svc/data/TestData/invalid_signature
deleted file mode 100644 (file)
index 06dc91c..0000000
+++ /dev/null
@@ -1,2 +0,0 @@
-0\8a_biÕT^zY\90\9e|æýäINVALID SIGNATURE FILEHäñ\8fH\98Ïú]\98Î<\1e¬ëéû\1a]Sµâ%½\89(h\v
-¾8y*H­6,+âJ\8f+Aõ\89Um\81\81\98Ã|Xe+Ëdä\88¿jT÷X\94\81%hS\f@dÖÃ\8fè\94o\8fV\92ìÝ\9eÊ3J\9a
diff --git a/tests/cert-svc/data/TestData/message b/tests/cert-svc/data/TestData/message
deleted file mode 100644 (file)
index 25c0f37..0000000
Binary files a/tests/cert-svc/data/TestData/message and /dev/null differ
diff --git a/tests/cert-svc/data/TestData/metadata b/tests/cert-svc/data/TestData/metadata
deleted file mode 100644 (file)
index af5626b..0000000
+++ /dev/null
@@ -1 +0,0 @@
-Hello, world!
diff --git a/tests/cert-svc/data/TestData/plaintext b/tests/cert-svc/data/TestData/plaintext
deleted file mode 100644 (file)
index 7a775a7..0000000
+++ /dev/null
@@ -1 +0,0 @@
-abcdefghijklmnopqrstuvwxyzabcdefghijklmnopqrstuvwxyzabcdefghijklmnopqrstuvwxyzabcdefghijklmnopqrstuvwxyzabcdefghijklmnopqrstuvwxyzabcdefghijklmnopqrstuvwxyzabcdefghijklmnopqrstuvwxyzabcdefghijklmnopqrstuvwxyzabcdefghijklmnopqrstuvwxyzabcdefghijklmnopqrstuvwxyzabcdefghijklmnopqrstuvwxyzabcdefghijklmnopqrstuvwxyzabcdefghijklmnopqrstuvwxyzabcdefghijklmnopqrstuvwxyzabcdefghijklmnopqrstuvwxyzabcdefghijklmnopqrstuvwxyzabcdefghijklmnopqrstuvwxyzabcdefghijklmnopqrstuvwxyzabcdefghijklmnopqrstuvwxyzabcdefghijklmnopqrstuvwxyzabcdefghijklmnopqrstuvwxyzabcdefghijklmnopqrstuvwxyzabcdefghijklmnopqrstuvwxyzabcdefghijklmnopqrstuvwxyzabcdefghijklmnopqrstuvwxyzabcdefghijklmnopqrstuvwxyzabcdefghijklmnopqrstuvwxyzabcdefghijklmnopqrstuvwxyzabcdefghijklmnopqrstuvwxyzabcdefghijklmnopqrstuvwxyzabcdefghijklmnopqrstuvwxyzabcdefghijklmnopqrstuvwxyzabcdefghijklmnopqrstuvwxyzabcdefghijklmnopqrstuvwxyzabcdefghijklmnopqrstuvwxyzabcdefghijklmnopqrstuvwxyzabcdefghijklmnopqrstuvwxyzabcdefghijklmnopqrstuvwxyzabcdefghijklmnopqrstuvwxyzabcdefghijklmnopqrstuvwxyzabcdefghijklmnopqrstuvwxyzabcdefghijklmnopqrstuvwxyzabcdefghijklmnopqrstuvwxyzabcdefghijklmnopqrstuvwxyzabcdefghijklmnopqrstuvwxyzabcdefghijklmnopqrstuvwxyzabcdefghijklmnopqrstuvwxyzabcdefghijklmnopqrstuvwxyzabcdefghijklmnopqrstuvwxyzabcdefghijklmnopqrstuvwxyz
diff --git a/tests/cert-svc/data/TestData/prikey b/tests/cert-svc/data/TestData/prikey
deleted file mode 100644 (file)
index c2a20f4..0000000
+++ /dev/null
@@ -1,18 +0,0 @@
------BEGIN RSA PRIVATE KEY-----
-Proc-Type: 4,ENCRYPTED
-DEK-Info: DES-EDE3-CBC,3AFF87E45B7C4AA5
-
-at84LbXLjHmHBbTcdDQ3Idaq9OhStzPN/v/DmYGL4zB6r5BNQQqpqWMHufCGb77k
-BQSaCRKf6J/2BcUmcbhy4hG1hFbca7qkGjbuCPQWS5ivIXmxHTXtLCH1gP6OGVv6
-hKtB8R5JluiSAuzvf9apjOnch+dJMmj/RLSXg5ucjtHlCG7YSI9pRlXl5cm3rPmC
-7fEdoIBXfsdPDcxQ09IVIdOR5WCXQNKOs9JHrrO+z8RhOmczk44dgY2nlXjigfeC
-2ZLZKebhiq1rwqm163HvEcb7wa1tPndubTwR3dwlbUPjZ270amCE8+qoiMspSg3Y
-5uP/J5skC/2xoTzfR6T7Sg2OQPB4MgYbZkcIuHXKuQwnids0+Tp0w76eaa1BkJb+
-GFpe6nz5BqvR5nJSm+3UuRBynQbSq/bHGWgs+bwbGP71uDgmfNzieqfkbQXMD0O/
-KgSqULuuaRl3Ax9C7EwBTbKJVuWeFX8jd7/SnHEi5UszxM3EyzbkHxuJcNY51Y81
-y3xd7z48Nqy97N8N8YzNyW9Uyau8lCqudRuGT19yjswq1fCyrBRoP+vpbi3ZLRPf
-AMgYu7eWK8jb7sQSJiqum+1c5czNgNMI/OlXA+847CPJG9TKSmWWnqrhL0vExvLV
-Ad+ery8fndCIJF9Dt9L5BSwCipjvmyAveNXmj6/JnX19npcBSf6yPHuUNPcPxIWn
-xMkZRkh/kTBnY27BA8ObNFRkZdAK6eNVlaNWoNghw28UZI6ANhn13qe9b/8nc6CQ
-aU3AaNIKhaOHKcHoAICCx3mrxEeqD/bQ2GN2/VAl6iaArHEVzbZrEA==
------END RSA PRIVATE KEY-----
diff --git a/tests/cert-svc/data/TestData/priv.pem b/tests/cert-svc/data/TestData/priv.pem
deleted file mode 100644 (file)
index a97cc72..0000000
+++ /dev/null
@@ -1,15 +0,0 @@
------BEGIN RSA PRIVATE KEY-----
-MIICXwIBAAKBgQDx+bjbdNEi67ys43mIioVWuJpTrKRi4QlVMj7roX1n76DQN4WI
-w/9m6wD0tHsmtoqmzuIvc89GSEqyb7oOtHIYrSUlS7N5+Vc7Rd2yEGDJokMz4pDI
-FHkuTjTctqhnlKkHbkxeERD+nhnXbH/CKfZZmgW9Mhzls13WZaJLDnrLcwIDAQAB
-AoGBAMKFCYIB6o20DDy/sNd+46nPROC3DH8ggKwodERf0bxX+mLn/0TuqsZFbMNK
-wyVf4R4veczDwICzZLkE8AEaNgzoA/gV0REbj38hgqEAG6D/rZaPwNnqN4CISXur
-3kBypPUE05DG8FhdRC1R6hrMlakvXJw3zHunclIMmWlvk/pBAkEA/i8OTj6nBNz+
-oUrWGyYfuLrUsHVhL5DnwyaR9zKuxzmYRv9xHEAPKU/GBF9YKWxQygwY0o4ql00y
-qZKAXWW7iwJBAPO0Vcz00c4gRWJsFyETPadMq8n84NgccxfOYm9BQsdiOAq+xxTh
-k5c/c+bHUCNoAv7x3pWCn+EVqpnbFtH7TLkCQQCW4G2Yaj4Pd/I44UgHo3CO4W9g
-Mrx2VIgNYXahCdeO8BQAiJ2mTCvztKNwcvvM0rt9wwJ08Og9GRiqaQiC5+ETAkEA
-1+8g2zLNt7tGX1fxAoB+737y9E1ZmINUw3I+K+ACYJI5n+O8mFbrpGc3tfNCoaym
-guki1QzhxtmgySSkSrhFGQJBAOj1P+ku8LHK1l2TWe1DjyqE32T5SGDuq/FLoxnj
-1UNwHaU7GPeRjSftGwxFvPL9alo7dFoTQCgCrTSOvnb0H8w=
------END RSA PRIVATE KEY-----
diff --git a/tests/cert-svc/data/TestData/pub.pem b/tests/cert-svc/data/TestData/pub.pem
deleted file mode 100644 (file)
index 7121226..0000000
+++ /dev/null
@@ -1,6 +0,0 @@
------BEGIN PUBLIC KEY-----
-MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQDx+bjbdNEi67ys43mIioVWuJpT
-rKRi4QlVMj7roX1n76DQN4WIw/9m6wD0tHsmtoqmzuIvc89GSEqyb7oOtHIYrSUl
-S7N5+Vc7Rd2yEGDJokMz4pDIFHkuTjTctqhnlKkHbkxeERD+nhnXbH/CKfZZmgW9
-Mhzls13WZaJLDnrLcwIDAQAB
------END PUBLIC KEY-----
diff --git a/tests/cert-svc/data/TestData/pub_cert.der b/tests/cert-svc/data/TestData/pub_cert.der
deleted file mode 100644 (file)
index 583f503..0000000
Binary files a/tests/cert-svc/data/TestData/pub_cert.der and /dev/null differ
diff --git a/tests/cert-svc/data/TestData/pub_cert.pem b/tests/cert-svc/data/TestData/pub_cert.pem
deleted file mode 100644 (file)
index 4f30dba..0000000
+++ /dev/null
@@ -1,23 +0,0 @@
------BEGIN CERTIFICATE-----
-MIID6TCCA1KgAwIBAgIJAMctWiF5xt5tMA0GCSqGSIb3DQEBBQUAMIGqMQswCQYD
-VQQGEwJLUjEVMBMGA1UECBMMUHJvdmluY2VOYW1lMRUwEwYDVQQHEwxMb2NhbGl0
-eU5hbWUxGTAXBgNVBAoTEE9yZ2FuaXphdGlvbk5hbWUxHzAdBgNVBAsTFk9yZ2Fu
-aXphdGlvbmFsVW5pdE5hbWUxEzARBgNVBAMTCkNvbW1vbk5hbWUxHDAaBgkqhkiG
-9w0BCQEWDUVtYWlsQEFkZHJlc3MwHhcNMDgxMjAyMDEyOTU1WhcNMDkxMjAyMDEy
-OTU1WjCBqjELMAkGA1UEBhMCS1IxFTATBgNVBAgTDFByb3ZpbmNlTmFtZTEVMBMG
-A1UEBxMMTG9jYWxpdHlOYW1lMRkwFwYDVQQKExBPcmdhbml6YXRpb25OYW1lMR8w
-HQYDVQQLExZPcmdhbml6YXRpb25hbFVuaXROYW1lMRMwEQYDVQQDEwpDb21tb25O
-YW1lMRwwGgYJKoZIhvcNAQkBFg1FbWFpbEBBZGRyZXNzMIGfMA0GCSqGSIb3DQEB
-AQUAA4GNADCBiQKBgQDx+bjbdNEi67ys43mIioVWuJpTrKRi4QlVMj7roX1n76DQ
-N4WIw/9m6wD0tHsmtoqmzuIvc89GSEqyb7oOtHIYrSUlS7N5+Vc7Rd2yEGDJokMz
-4pDIFHkuTjTctqhnlKkHbkxeERD+nhnXbH/CKfZZmgW9Mhzls13WZaJLDnrLcwID
-AQABo4IBEzCCAQ8wHQYDVR0OBBYEFH/W4In2zyXx5vE+SKt4nIXEmpSqMIHfBgNV
-HSMEgdcwgdSAFH/W4In2zyXx5vE+SKt4nIXEmpSqoYGwpIGtMIGqMQswCQYDVQQG
-EwJLUjEVMBMGA1UECBMMUHJvdmluY2VOYW1lMRUwEwYDVQQHEwxMb2NhbGl0eU5h
-bWUxGTAXBgNVBAoTEE9yZ2FuaXphdGlvbk5hbWUxHzAdBgNVBAsTFk9yZ2FuaXph
-dGlvbmFsVW5pdE5hbWUxEzARBgNVBAMTCkNvbW1vbk5hbWUxHDAaBgkqhkiG9w0B
-CQEWDUVtYWlsQEFkZHJlc3OCCQDHLVohecbebTAMBgNVHRMEBTADAQH/MA0GCSqG
-SIb3DQEBBQUAA4GBACeNJG+xzXv+NQwiSfobosEUo3SqH+e0syRFEKIUjW3BcEe+
-YFdUDThTixp3Y5PFX2oFo23DEBHP09/Wwox7GAYGegZOQ1W7j5oykI2a/zFHC6tb
-5As3hdnKn3wHePsj09qHKv/dPd6BdoGWaXgM1uIqSTCm5GZAynNRQGG0AKBX
------END CERTIFICATE-----
diff --git a/tests/cert-svc/data/TestData/pubkey b/tests/cert-svc/data/TestData/pubkey
deleted file mode 100644 (file)
index 8918178..0000000
Binary files a/tests/cert-svc/data/TestData/pubkey and /dev/null differ
diff --git a/tests/cert-svc/data/TestData/root1.der b/tests/cert-svc/data/TestData/root1.der
deleted file mode 100644 (file)
index 80bd6ab..0000000
Binary files a/tests/cert-svc/data/TestData/root1.der and /dev/null differ
diff --git a/tests/cert-svc/data/TestData/root2.der b/tests/cert-svc/data/TestData/root2.der
deleted file mode 100644 (file)
index 37646f0..0000000
Binary files a/tests/cert-svc/data/TestData/root2.der and /dev/null differ
diff --git a/tests/cert-svc/data/TestData/root3.der b/tests/cert-svc/data/TestData/root3.der
deleted file mode 100644 (file)
index 76f69ce..0000000
Binary files a/tests/cert-svc/data/TestData/root3.der and /dev/null differ
diff --git a/tests/cert-svc/data/TestData/signature b/tests/cert-svc/data/TestData/signature
deleted file mode 100644 (file)
index 1bf0294..0000000
+++ /dev/null
@@ -1,2 +0,0 @@
-0\8a_biÕT^zY\90\9e|æýä`\18¤ýúf#3\ 5òÝÙ¯n\1dJ\90£0\18Ã/\99?Häñ\8fH\98Ïú]\98Î<\1e¬ëéû\1a]Sµâ%½\89(h\v
-¾8y*H­6,+âJ\8f+Aõ\89Um\81\81\98Ã|Xe+Ëdä\88¿jT÷X\94\81%hS\f@dÖÃ\8fè\94o\8fV\92ìÝ\9eÊ3J\9a
\ No newline at end of file
diff --git a/tests/cert-svc/data/TestData/ssl/.rnd b/tests/cert-svc/data/TestData/ssl/.rnd
deleted file mode 100644 (file)
index 3e7f8ea..0000000
Binary files a/tests/cert-svc/data/TestData/ssl/.rnd and /dev/null differ
diff --git a/tests/cert-svc/data/TestData/ssl/CERT1.key b/tests/cert-svc/data/TestData/ssl/CERT1.key
deleted file mode 100644 (file)
index 8e16b68..0000000
+++ /dev/null
@@ -1,15 +0,0 @@
------BEGIN RSA PRIVATE KEY-----
-MIICXQIBAAKBgQDPD8+lCBi/i2wsPFX+AkO3qK9Fo0ooY9HaJnrCDfhYpXPF27j7
-YkfqF3sla9GM4nSW9GvlSTuz5WpjNhn4PNhLnBSdK2pxzDqfudXbYI5EQNcSU1Ll
-cUHIv+wNnFt8jqyZR2VQ5fiVPoo8mdl1R3NR9P02Ru0adxDOHQEMhmsj/wIDAQAB
-AoGARPYsHvfCXlEOFvGFZlLUwN9SeKv4r9kG9FPqgKTseIGqPFSAmGDUOLfXUNBG
-+1gUoo4HPVcVpkWbGC3VmmKRWovD4JOM08Wk+ovdkzKVc3BnJLzDVGoOx7/Whef+
-bkV3IiD1kFIX+YE3IvI+t95QFS5nTdZeyhCiWtz1nAKbIIECQQDwAgMnpE2iPn1e
-NbW9vdit7amCwkGeBSpsBgLbNqFpkpZGWsNvALd68iKbbAGDcgB8tQI/dRUiGnND
-w+Rb371BAkEA3NvQOCMuL7kdYwZfaL//+jvcG52QEdR7iJGKXgKL+mef5XiNQfOX
-DNTpkuFaU3JIQdgNNhspE18A1vU/zvpRPwJBAOgvei/agoRH4e7HFQf3Zmx0s/1c
-wjAGHVEdy5uY0TSZ7Ckp21FCpz4YiyRCq4AnRJNgZUlQkl5IqmPPWdcLr0ECQAMI
-cb+TnBrDrAekGsNRf65sDAXFECluhZPGi+PmnQ1/Rs7b7PSu57AhbGO7/IWQ2DUv
-Rl8r2FCPyW8qRwoMnfkCQQCgIuBlYF3k/NUfBxmdQy3iWbZThRhnFkHlidSbW7uC
-pduzqcc8qHINCDatsMYCaE5WgfQnz3UmF49sNr02Bt61
------END RSA PRIVATE KEY-----
diff --git a/tests/cert-svc/data/TestData/ssl/CERT_NO_AIA.crt b/tests/cert-svc/data/TestData/ssl/CERT_NO_AIA.crt
deleted file mode 100644 (file)
index c7bd523..0000000
+++ /dev/null
@@ -1,92 +0,0 @@
-Certificate:
-    Data:
-        Version: 3 (0x2)
-        Serial Number: 15 (0xf)
-        Signature Algorithm: sha1WithRSAEncryption
-        Issuer: C=KR, ST=KyungGi-Do, L=Suwon-Si, O=Samsung Elec., CN=CA
-        Validity
-            Not Before: Mar 13 03:18:18 2009 GMT
-            Not After : Mar 11 03:18:18 2019 GMT
-        Subject: C=KR, ST=KyungGi-Do, O=Samsung Elec., CN=First Test Certificate
-        Subject Public Key Info:
-            Public Key Algorithm: rsaEncryption
-            RSA Public Key: (1024 bit)
-                Modulus (1024 bit):
-                    00:cf:0f:cf:a5:08:18:bf:8b:6c:2c:3c:55:fe:02:
-                    43:b7:a8:af:45:a3:4a:28:63:d1:da:26:7a:c2:0d:
-                    f8:58:a5:73:c5:db:b8:fb:62:47:ea:17:7b:25:6b:
-                    d1:8c:e2:74:96:f4:6b:e5:49:3b:b3:e5:6a:63:36:
-                    19:f8:3c:d8:4b:9c:14:9d:2b:6a:71:cc:3a:9f:b9:
-                    d5:db:60:8e:44:40:d7:12:53:52:e5:71:41:c8:bf:
-                    ec:0d:9c:5b:7c:8e:ac:99:47:65:50:e5:f8:95:3e:
-                    8a:3c:99:d9:75:47:73:51:f4:fd:36:46:ed:1a:77:
-                    10:ce:1d:01:0c:86:6b:23:ff
-                Exponent: 65537 (0x10001)
-        X509v3 extensions:
-            X509v3 Basic Constraints: 
-                CA:FALSE
-            Netscape Comment: 
-                OpenSSL Generated Certificate
-            X509v3 Subject Key Identifier: 
-                25:0C:EC:1F:D6:1A:A2:95:AF:C1:A3:DA:EF:B1:F3:BE:62:F3:10:6C
-            X509v3 Authority Key Identifier: 
-                DirName:/C=KR/ST=KyungGi-Do/L=Suwon-Si/O=Samsung Elec./CN=CA
-                serial:F2:5B:40:5B:C2:B7:D0:64
-
-    Signature Algorithm: sha1WithRSAEncryption
-        18:fe:74:f1:af:0a:d9:91:ad:b5:7c:f3:01:f8:98:1a:dc:b3:
-        66:6b:f4:bc:16:9a:e6:2b:f2:1f:77:23:89:a8:68:e0:8d:e3:
-        50:f3:f1:e6:38:f1:59:54:9b:44:0f:72:00:1a:61:71:9c:f0:
-        4f:a3:08:9d:17:36:0c:54:82:be:24:04:cb:b5:04:e9:20:c9:
-        6e:bc:8f:af:18:d8:2d:ee:cc:a8:8b:e4:1a:35:98:f6:53:72:
-        89:4f:05:f8:c3:7b:50:13:ee:cf:9f:d3:eb:a7:7c:4a:e6:89:
-        0f:6b:0e:d6:c7:bc:db:04:03:08:25:59:b4:06:5b:ce:a6:db:
-        7b:3a:5d:80:e8:ff:66:e1:22:03:54:28:16:0e:89:c8:5b:aa:
-        b2:6e:1a:0f:07:53:60:bc:f4:2a:2d:a7:89:f2:b4:58:55:47:
-        2e:b1:b2:3c:50:30:6b:0c:12:34:11:5f:54:2a:0a:ab:19:d9:
-        36:ae:e2:16:5e:b8:8e:0d:17:d0:42:82:96:4d:fb:36:56:69:
-        7b:ce:32:fb:91:a4:02:73:8c:75:7e:de:87:06:52:20:ed:26:
-        ff:47:72:f2:f6:01:2e:ec:38:da:0b:5b:be:ec:8e:c6:02:28:
-        92:57:28:04:f5:00:87:90:34:e1:81:c5:cc:21:00:6b:4d:d5:
-        d5:c3:f6:f1:97:e1:5e:8c:ea:56:2e:5e:ce:9e:de:b9:a6:86:
-        60:33:1d:94:76:39:e1:70:9a:d2:b3:9a:f4:47:f8:bd:83:26:
-        38:a0:ab:a3:bc:81:df:6b:79:7d:f5:67:8f:5a:e1:a4:67:29:
-        58:07:66:70:6a:43:dc:f7:4c:82:54:15:a0:2f:ab:c0:9f:24:
-        91:e0:a7:d1:b1:58:bf:43:bf:25:1f:32:fc:98:26:b1:2f:19:
-        8f:d8:69:c1:1a:bd:b0:3e:0a:dc:54:c1:27:34:b9:1b:55:93:
-        ff:e6:23:ac:af:33:ed:8d:6e:ee:36:18:70:9e:a2:87:b6:e2:
-        1d:3a:ee:e8:e2:79:97:15:7c:83:d1:89:71:ab:87:8d:36:a7:
-        7d:d8:4c:e2:b6:b7:1f:32:34:a8:75:ca:4f:00:3e:49:b0:5c:
-        40:1a:9c:6e:bd:b5:5f:f4:2e:c5:0a:54:b4:89:4a:63:35:ff:
-        80:8d:fe:31:e8:2e:92:77:8c:19:1a:2c:b8:95:1e:ef:d5:7d:
-        c6:f9:4d:05:b6:f8:dd:55:0c:10:43:6e:7d:47:c8:b0:83:db:
-        a3:7b:b4:5a:e3:a9:33:b2:ed:23:83:6a:e1:ce:c6:1c:89:27:
-        39:2c:3d:2f:55:49:c8:c5:9d:23:46:fe:88:71:da:ef:2b:25:
-        e4:79:92:2b:1d:61:a6:dc
------BEGIN CERTIFICATE-----
-MIIEfjCCAmagAwIBAgIBDzANBgkqhkiG9w0BAQUFADBaMQswCQYDVQQGEwJLUjET
-MBEGA1UECBMKS3l1bmdHaS1EbzERMA8GA1UEBxMIU3V3b24tU2kxFjAUBgNVBAoT
-DVNhbXN1bmcgRWxlYy4xCzAJBgNVBAMTAkNBMB4XDTA5MDMxMzAzMTgxOFoXDTE5
-MDMxMTAzMTgxOFowWzELMAkGA1UEBhMCS1IxEzARBgNVBAgTCkt5dW5nR2ktRG8x
-FjAUBgNVBAoTDVNhbXN1bmcgRWxlYy4xHzAdBgNVBAMTFkZpcnN0IFRlc3QgQ2Vy
-dGlmaWNhdGUwgZ8wDQYJKoZIhvcNAQEBBQADgY0AMIGJAoGBAM8Pz6UIGL+LbCw8
-Vf4CQ7eor0WjSihj0domesIN+Filc8XbuPtiR+oXeyVr0YzidJb0a+VJO7PlamM2
-Gfg82EucFJ0ranHMOp+51dtgjkRA1xJTUuVxQci/7A2cW3yOrJlHZVDl+JU+ijyZ
-2XVHc1H0/TZG7Rp3EM4dAQyGayP/AgMBAAGjgdEwgc4wCQYDVR0TBAIwADAsBglg
-hkgBhvhCAQ0EHxYdT3BlblNTTCBHZW5lcmF0ZWQgQ2VydGlmaWNhdGUwHQYDVR0O
-BBYEFCUM7B/WGqKVr8Gj2u+x875i8xBsMHQGA1UdIwRtMGuhXqRcMFoxCzAJBgNV
-BAYTAktSMRMwEQYDVQQIEwpLeXVuZ0dpLURvMREwDwYDVQQHEwhTdXdvbi1TaTEW
-MBQGA1UEChMNU2Ftc3VuZyBFbGVjLjELMAkGA1UEAxMCQ0GCCQDyW0BbwrfQZDAN
-BgkqhkiG9w0BAQUFAAOCAgEAGP508a8K2ZGttXzzAfiYGtyzZmv0vBaa5ivyH3cj
-iaho4I3jUPPx5jjxWVSbRA9yABphcZzwT6MInRc2DFSCviQEy7UE6SDJbryPrxjY
-Le7MqIvkGjWY9lNyiU8F+MN7UBPuz5/T66d8SuaJD2sO1se82wQDCCVZtAZbzqbb
-ezpdgOj/ZuEiA1QoFg6JyFuqsm4aDwdTYLz0Ki2nifK0WFVHLrGyPFAwawwSNBFf
-VCoKqxnZNq7iFl64jg0X0EKClk37NlZpe84y+5GkAnOMdX7ehwZSIO0m/0dy8vYB
-Luw42gtbvuyOxgIoklcoBPUAh5A04YHFzCEAa03V1cP28ZfhXozqVi5ezp7euaaG
-YDMdlHY54XCa0rOa9Ef4vYMmOKCro7yB32t5ffVnj1rhpGcpWAdmcGpD3PdMglQV
-oC+rwJ8kkeCn0bFYv0O/JR8y/JgmsS8Zj9hpwRq9sD4K3FTBJzS5G1WT/+YjrK8z
-7Y1u7jYYcJ6ih7biHTru6OJ5lxV8g9GJcauHjTanfdhM4ra3HzI0qHXKTwA+SbBc
-QBqcbr21X/QuxQpUtIlKYzX/gI3+MegukneMGRosuJUe79V9xvlNBbb43VUMEENu
-fUfIsIPbo3u0WuOpM7LtI4Nq4c7GHIknOSw9L1VJyMWdI0b+iHHa7ysl5HmSKx1h
-ptw=
------END CERTIFICATE-----
diff --git a/tests/cert-svc/data/TestData/ssl/OCSP_CLIENT1.crt b/tests/cert-svc/data/TestData/ssl/OCSP_CLIENT1.crt
deleted file mode 100644 (file)
index 0c1799a..0000000
+++ /dev/null
@@ -1,81 +0,0 @@
-Certificate:
-    Data:
-        Version: 3 (0x2)
-        Serial Number: 16 (0x10)
-        Signature Algorithm: sha1WithRSAEncryption
-        Issuer: C=KR, ST=KyungGi-Do, L=Suwon-Si, O=Samsung Elec., CN=CA
-        Validity
-            Not Before: Mar 13 03:23:56 2009 GMT
-            Not After : Mar 11 03:23:56 2019 GMT
-        Subject: C=KR, ST=KyungGi-Do, O=Samsung Elec., CN=First certificate to test OCSP
-        Subject Public Key Info:
-            Public Key Algorithm: rsaEncryption
-            RSA Public Key: (1024 bit)
-                Modulus (1024 bit):
-                    00:c0:a9:51:63:19:e2:cc:f3:9d:19:d8:75:90:ab:
-                    13:40:a3:3f:9d:dc:ef:48:42:0d:00:36:db:ea:68:
-                    fd:b9:15:34:a9:af:0f:52:2b:57:2e:03:74:13:41:
-                    b4:59:69:7e:f6:e1:54:42:8d:c3:f4:85:2b:ff:07:
-                    97:a4:2f:5b:e4:13:be:72:ef:65:e7:59:be:ed:14:
-                    71:82:cc:09:03:50:99:66:08:34:1a:41:45:e6:e3:
-                    37:98:32:6a:15:d4:32:63:f7:26:6c:5a:ed:45:bd:
-                    bb:aa:be:33:4b:9c:cb:b2:03:13:e3:2d:6f:61:57:
-                    2a:e8:e8:44:0f:59:ea:e7:bf
-                Exponent: 65537 (0x10001)
-        X509v3 extensions:
-            Authority Information Access: 
-                OCSP - URI:http://127.0.0.1:80/0002
-
-    Signature Algorithm: sha1WithRSAEncryption
-        75:b9:17:be:1c:06:6f:12:a9:04:1b:63:0b:0d:5c:70:55:e2:
-        31:c0:88:71:d0:56:8e:e5:16:e8:3b:47:1a:08:03:93:56:b2:
-        9b:a2:04:3c:a8:81:10:5a:18:7b:d2:70:ae:7c:0b:94:b6:6c:
-        f2:58:e7:69:82:e5:f2:aa:4e:f3:ac:85:6d:5a:ac:11:53:d2:
-        8d:3d:53:ae:ab:f7:f3:c6:f0:ba:f2:e6:7b:2d:74:74:75:fd:
-        e0:8d:67:c9:12:d5:f2:93:44:48:66:5b:85:26:7d:95:77:48:
-        4f:a4:72:65:67:38:99:47:4e:cd:47:1c:43:7a:0a:58:a6:99:
-        1b:1b:01:09:f7:0b:34:8a:3a:8d:10:e2:ca:9c:48:a3:f6:39:
-        42:3b:43:e6:f6:81:8b:36:5a:ed:33:98:70:24:ca:4f:18:8b:
-        d9:c1:0a:d9:cd:96:33:d0:e8:ac:bd:3f:34:af:86:52:d1:69:
-        6e:90:8e:d0:86:bf:b1:04:3d:85:99:0f:e3:c3:e6:60:47:34:
-        37:97:f2:a2:69:c4:4e:dc:62:d0:eb:c2:24:77:2e:a3:ba:c1:
-        88:a9:b2:b4:fb:79:a6:d4:cf:5e:3f:03:41:25:c4:f3:29:0a:
-        fd:b7:78:55:b1:9a:0c:79:32:2f:2e:fe:69:ba:a0:2c:62:bc:
-        11:38:c4:47:a8:b0:72:70:d1:50:9f:b9:87:64:f5:12:56:c5:
-        f7:ed:8e:23:08:df:d0:0e:1a:6b:25:8c:b3:6b:7c:cc:55:6d:
-        90:83:a9:ef:7d:45:04:a6:dc:7c:0d:80:c1:54:22:d1:b8:e2:
-        43:cc:ad:75:a2:07:eb:d3:26:da:8a:c4:fb:6f:0b:ac:11:f4:
-        01:7f:b9:37:68:ec:1e:60:a2:ae:d6:b2:0b:37:cb:7e:5d:dc:
-        ec:14:21:69:84:ff:fc:61:85:b6:bf:7f:d2:af:3c:70:12:c6:
-        ba:40:e8:b5:25:56:34:ca:44:f1:ea:15:ad:79:50:ec:44:b7:
-        6c:d7:4b:cc:2c:4f:45:01:85:15:76:2a:03:c2:14:9c:3e:bf:
-        87:7b:59:d7:aa:2d:48:20:b6:1a:6e:6e:b0:c2:77:22:3c:ea:
-        24:d0:f8:62:b0:4b:01:3a:48:be:5f:66:73:0a:46:b3:1f:83:
-        41:91:f5:fd:e8:08:08:52:18:3a:8c:6a:19:2c:e3:30:d8:53:
-        13:97:62:83:eb:e3:ed:3a:8e:64:25:b1:8a:01:f4:24:14:6d:
-        d4:61:c1:c3:8d:c3:89:2c:5f:6e:d8:1e:1d:de:b9:77:06:0b:
-        31:63:e4:ce:d9:76:1b:68:48:ea:ec:64:d5:a6:a5:15:29:1d:
-        79:af:21:2d:a8:e6:e6:f8
------BEGIN CERTIFICATE-----
-MIID7DCCAdSgAwIBAgIBEDANBgkqhkiG9w0BAQUFADBaMQswCQYDVQQGEwJLUjET
-MBEGA1UECBMKS3l1bmdHaS1EbzERMA8GA1UEBxMIU3V3b24tU2kxFjAUBgNVBAoT
-DVNhbXN1bmcgRWxlYy4xCzAJBgNVBAMTAkNBMB4XDTA5MDMxMzAzMjM1NloXDTE5
-MDMxMTAzMjM1NlowYzELMAkGA1UEBhMCS1IxEzARBgNVBAgTCkt5dW5nR2ktRG8x
-FjAUBgNVBAoTDVNhbXN1bmcgRWxlYy4xJzAlBgNVBAMTHkZpcnN0IGNlcnRpZmlj
-YXRlIHRvIHRlc3QgT0NTUDCBnzANBgkqhkiG9w0BAQEFAAOBjQAwgYkCgYEAwKlR
-YxnizPOdGdh1kKsTQKM/ndzvSEINADbb6mj9uRU0qa8PUitXLgN0E0G0WWl+9uFU
-Qo3D9IUr/weXpC9b5BO+cu9l51m+7RRxgswJA1CZZgg0GkFF5uM3mDJqFdQyY/cm
-bFrtRb27qr4zS5zLsgMT4y1vYVcq6OhED1nq578CAwEAAaM4MDYwNAYIKwYBBQUH
-AQEEKDAmMCQGCCsGAQUFBzABhhhodHRwOi8vMTI3LjAuMC4xOjgwLzAwMDIwDQYJ
-KoZIhvcNAQEFBQADggIBAHW5F74cBm8SqQQbYwsNXHBV4jHAiHHQVo7lFug7RxoI
-A5NWspuiBDyogRBaGHvScK58C5S2bPJY52mC5fKqTvOshW1arBFT0o09U66r9/PG
-8Lry5nstdHR1/eCNZ8kS1fKTREhmW4UmfZV3SE+kcmVnOJlHTs1HHEN6ClimmRsb
-AQn3CzSKOo0Q4sqcSKP2OUI7Q+b2gYs2Wu0zmHAkyk8Yi9nBCtnNljPQ6Ky9PzSv
-hlLRaW6QjtCGv7EEPYWZD+PD5mBHNDeX8qJpxE7cYtDrwiR3LqO6wYipsrT7eabU
-z14/A0ElxPMpCv23eFWxmgx5Mi8u/mm6oCxivBE4xEeosHJw0VCfuYdk9RJWxfft
-jiMI39AOGmsljLNrfMxVbZCDqe99RQSm3HwNgMFUItG44kPMrXWiB+vTJtqKxPtv
-C6wR9AF/uTdo7B5goq7Wsgs3y35d3OwUIWmE//xhhba/f9KvPHASxrpA6LUlVjTK
-RPHqFa15UOxEt2zXS8wsT0UBhRV2KgPCFJw+v4d7WdeqLUggthpubrDCdyI86iTQ
-+GKwSwE6SL5fZnMKRrMfg0GR9f3oCAhSGDqMahks4zDYUxOXYoPr4+06jmQlsYoB
-9CQUbdRhwcONw4ksX27YHh3euXcGCzFj5M7ZdhtoSOrsZNWmpRUpHXmvIS2o5ub4
------END CERTIFICATE-----
diff --git a/tests/cert-svc/data/TestData/ssl/OCSP_CLIENT1.key b/tests/cert-svc/data/TestData/ssl/OCSP_CLIENT1.key
deleted file mode 100644 (file)
index c82ef70..0000000
+++ /dev/null
@@ -1,15 +0,0 @@
------BEGIN RSA PRIVATE KEY-----
-MIICXAIBAAKBgQDAqVFjGeLM850Z2HWQqxNAoz+d3O9IQg0ANtvqaP25FTSprw9S
-K1cuA3QTQbRZaX724VRCjcP0hSv/B5ekL1vkE75y72XnWb7tFHGCzAkDUJlmCDQa
-QUXm4zeYMmoV1DJj9yZsWu1FvbuqvjNLnMuyAxPjLW9hVyro6EQPWernvwIDAQAB
-AoGADQgm8i4hEj30RXhH04ZO4hNozTPRl7CoEnijfYKmjutpSYUG40b9OaaQJnFO
-UrH5HZf2TB4swBB1/mU0E64EaBX7EciQbBTN0uInTnAJKHVJrFaFqMXYS6rsAKoA
-KjW/2hx0/CFhsulji9s1cqlHKvwKfp3YRbkuQ0ulLsdkmlECQQDqelfLcaVS71pf
-jnxlAP49pQT3t/ee81bnl8o/75vhObxhKu28KSQy3RI13JjecR0RPIpYdPQdPB6h
-fjNbH9D3AkEA0lhjsahWvs2+QBukcN84gJyfa/WBizgVfD/oZVm4fvNZjK3neH0V
-S29bkGfqMroy0U0PAm7Qs36dWnAFMdI1eQJBAMuJgdZ3AzS30vIp5G9k6k0mhuZl
-ykwvHVwR1h2j5+MdVBngwtdXuzVv05Pvtr843yuMKudYNmN+QXSb8QaD2scCQGmi
-7EZfhVkDmKU3fKkW4Zhtj/626B0TyG6C5eJoYaiX7AQjnhi7sMMWpMRr+4kIS9cj
-PQN6xaMvVjUCBwnTSPkCQAP/Iv+ctNcZNuRcDm1g/voruqlMs5bAbhQ50Nut1z3+
-ekOGBxIWXr9mDcBji8OMjww8WBUGuvcJssLPKrTbBGM=
------END RSA PRIVATE KEY-----
diff --git a/tests/cert-svc/data/TestData/ssl/OCSP_CLIENT2.crt b/tests/cert-svc/data/TestData/ssl/OCSP_CLIENT2.crt
deleted file mode 100644 (file)
index 177876b..0000000
+++ /dev/null
@@ -1,81 +0,0 @@
-Certificate:
-    Data:
-        Version: 3 (0x2)
-        Serial Number: 17 (0x11)
-        Signature Algorithm: sha1WithRSAEncryption
-        Issuer: C=KR, ST=KyungGi-Do, L=Suwon-Si, O=Samsung Elec., CN=CA
-        Validity
-            Not Before: Mar 13 03:24:10 2009 GMT
-            Not After : Mar 11 03:24:10 2019 GMT
-        Subject: C=KR, ST=KyungGi-Do, O=Samsung Elec., CN=First certificate to test OCSP
-        Subject Public Key Info:
-            Public Key Algorithm: rsaEncryption
-            RSA Public Key: (1024 bit)
-                Modulus (1024 bit):
-                    00:c0:a9:51:63:19:e2:cc:f3:9d:19:d8:75:90:ab:
-                    13:40:a3:3f:9d:dc:ef:48:42:0d:00:36:db:ea:68:
-                    fd:b9:15:34:a9:af:0f:52:2b:57:2e:03:74:13:41:
-                    b4:59:69:7e:f6:e1:54:42:8d:c3:f4:85:2b:ff:07:
-                    97:a4:2f:5b:e4:13:be:72:ef:65:e7:59:be:ed:14:
-                    71:82:cc:09:03:50:99:66:08:34:1a:41:45:e6:e3:
-                    37:98:32:6a:15:d4:32:63:f7:26:6c:5a:ed:45:bd:
-                    bb:aa:be:33:4b:9c:cb:b2:03:13:e3:2d:6f:61:57:
-                    2a:e8:e8:44:0f:59:ea:e7:bf
-                Exponent: 65537 (0x10001)
-        X509v3 extensions:
-            Authority Information Access: 
-                OCSP - URI:http://127.0.0.1:81/0003
-
-    Signature Algorithm: sha1WithRSAEncryption
-        5a:7d:5f:25:e5:5a:49:3e:e9:06:4c:f1:7f:83:7d:d4:0d:13:
-        36:35:bf:32:92:69:60:1d:ae:2e:ed:89:b3:d4:1e:78:d2:85:
-        35:7a:1f:65:30:78:5e:d3:30:60:3d:7d:2c:be:02:6a:f0:22:
-        5e:82:86:53:01:a4:b6:1c:9f:d4:79:e9:ec:eb:d8:33:85:fb:
-        21:d2:82:77:b9:6d:20:8e:af:82:ff:25:82:27:3b:d7:d9:38:
-        31:a3:2b:bc:55:00:28:f6:f9:bf:01:e6:66:0b:b8:a8:ed:30:
-        09:52:8d:bf:94:7b:96:d1:93:5b:a3:a4:f1:9f:aa:f4:04:54:
-        0b:69:73:af:36:d7:3e:33:2c:29:38:04:9b:65:32:31:fa:17:
-        2f:0a:9f:19:05:d8:01:0c:db:13:1e:55:ec:94:38:3f:83:ee:
-        50:35:d1:6e:4f:32:c3:3d:d3:39:c8:c5:cc:56:b4:33:2e:8b:
-        75:a0:9c:cd:28:e5:42:a1:89:e1:06:90:bd:f3:8e:b5:48:9e:
-        1c:dd:56:4d:d9:ec:6e:0b:7b:72:e5:0a:be:7e:33:5a:13:25:
-        13:87:4c:9a:27:49:02:6d:28:5b:e7:4d:1b:7c:11:22:10:45:
-        b1:57:b7:fc:12:62:69:24:69:ee:67:ce:5b:20:70:6a:22:29:
-        f4:a0:90:59:d3:a2:be:7b:43:3a:59:0b:23:d1:2e:ed:51:98:
-        87:c5:4d:1c:64:08:f8:ca:af:36:ab:5d:00:ce:15:00:f4:ad:
-        34:44:27:8b:72:c6:6d:24:4c:1a:e3:f7:4c:bc:25:a2:a8:e2:
-        a8:79:58:57:a7:5d:f0:20:28:d2:ef:84:ff:ee:42:0f:1e:59:
-        93:4c:05:45:ff:c1:0d:cb:30:1d:bb:26:5a:4d:24:c0:44:52:
-        77:33:17:dd:d1:00:63:1e:9b:4d:ca:28:8b:bb:fd:0d:0b:e3:
-        72:26:94:e2:8c:5a:d7:1a:a6:e7:b7:bc:4b:bf:cc:02:2c:d8:
-        9b:cb:31:7d:09:4c:15:73:5d:1a:a8:46:10:66:68:80:a9:f3:
-        3d:f8:7c:9d:46:3d:ce:ae:75:6f:92:db:34:d3:d7:be:6c:4e:
-        76:b6:b6:b7:a2:a8:b9:9e:a9:f1:6f:a6:e5:01:bb:82:13:bd:
-        7f:24:81:c3:22:54:58:f0:7e:8d:9a:86:82:00:46:66:33:e4:
-        96:98:8a:33:7b:ed:93:9b:cf:68:b5:eb:42:da:6d:50:49:f0:
-        14:27:01:f6:57:09:26:7c:61:81:d0:e5:e9:ec:6d:18:eb:97:
-        1a:55:cf:1f:d9:20:67:8f:71:bb:0c:98:6d:c0:4b:85:32:c9:
-        d3:b7:f3:d0:60:fd:64:01
------BEGIN CERTIFICATE-----
-MIID7DCCAdSgAwIBAgIBETANBgkqhkiG9w0BAQUFADBaMQswCQYDVQQGEwJLUjET
-MBEGA1UECBMKS3l1bmdHaS1EbzERMA8GA1UEBxMIU3V3b24tU2kxFjAUBgNVBAoT
-DVNhbXN1bmcgRWxlYy4xCzAJBgNVBAMTAkNBMB4XDTA5MDMxMzAzMjQxMFoXDTE5
-MDMxMTAzMjQxMFowYzELMAkGA1UEBhMCS1IxEzARBgNVBAgTCkt5dW5nR2ktRG8x
-FjAUBgNVBAoTDVNhbXN1bmcgRWxlYy4xJzAlBgNVBAMTHkZpcnN0IGNlcnRpZmlj
-YXRlIHRvIHRlc3QgT0NTUDCBnzANBgkqhkiG9w0BAQEFAAOBjQAwgYkCgYEAwKlR
-YxnizPOdGdh1kKsTQKM/ndzvSEINADbb6mj9uRU0qa8PUitXLgN0E0G0WWl+9uFU
-Qo3D9IUr/weXpC9b5BO+cu9l51m+7RRxgswJA1CZZgg0GkFF5uM3mDJqFdQyY/cm
-bFrtRb27qr4zS5zLsgMT4y1vYVcq6OhED1nq578CAwEAAaM4MDYwNAYIKwYBBQUH
-AQEEKDAmMCQGCCsGAQUFBzABhhhodHRwOi8vMTI3LjAuMC4xOjgxLzAwMDMwDQYJ
-KoZIhvcNAQEFBQADggIBAFp9XyXlWkk+6QZM8X+DfdQNEzY1vzKSaWAdri7tibPU
-HnjShTV6H2UweF7TMGA9fSy+AmrwIl6ChlMBpLYcn9R56ezr2DOF+yHSgne5bSCO
-r4L/JYInO9fZODGjK7xVACj2+b8B5mYLuKjtMAlSjb+Ue5bRk1ujpPGfqvQEVAtp
-c6821z4zLCk4BJtlMjH6Fy8KnxkF2AEM2xMeVeyUOD+D7lA10W5PMsM90znIxcxW
-tDMui3WgnM0o5UKhieEGkL3zjrVInhzdVk3Z7G4Le3LlCr5+M1oTJROHTJonSQJt
-KFvnTRt8ESIQRbFXt/wSYmkkae5nzlsgcGoiKfSgkFnTor57QzpZCyPRLu1RmIfF
-TRxkCPjKrzarXQDOFQD0rTREJ4tyxm0kTBrj90y8JaKo4qh5WFenXfAgKNLvhP/u
-Qg8eWZNMBUX/wQ3LMB27JlpNJMBEUnczF93RAGMem03KKIu7/Q0L43ImlOKMWtca
-pue3vEu/zAIs2JvLMX0JTBVzXRqoRhBmaICp8z34fJ1GPc6udW+S2zTT175sTna2
-treiqLmeqfFvpuUBu4ITvX8kgcMiVFjwfo2ahoIARmYz5JaYijN77ZObz2i160La
-bVBJ8BQnAfZXCSZ8YYHQ5ensbRjrlxpVzx/ZIGePcbsMmG3AS4UyydO389Bg/WQB
------END CERTIFICATE-----
diff --git a/tests/cert-svc/data/TestData/ssl/OCSP_CLIENT3.crt b/tests/cert-svc/data/TestData/ssl/OCSP_CLIENT3.crt
deleted file mode 100644 (file)
index 830592a..0000000
+++ /dev/null
@@ -1,81 +0,0 @@
-Certificate:
-    Data:
-        Version: 3 (0x2)
-        Serial Number: 18 (0x12)
-        Signature Algorithm: sha1WithRSAEncryption
-        Issuer: C=KR, ST=KyungGi-Do, L=Suwon-Si, O=Samsung Elec., CN=CA
-        Validity
-            Not Before: Mar 13 03:24:20 2009 GMT
-            Not After : Mar 11 03:24:20 2019 GMT
-        Subject: C=KR, ST=KyungGi-Do, O=Samsung Elec., CN=First certificate to test OCSP
-        Subject Public Key Info:
-            Public Key Algorithm: rsaEncryption
-            RSA Public Key: (1024 bit)
-                Modulus (1024 bit):
-                    00:c0:a9:51:63:19:e2:cc:f3:9d:19:d8:75:90:ab:
-                    13:40:a3:3f:9d:dc:ef:48:42:0d:00:36:db:ea:68:
-                    fd:b9:15:34:a9:af:0f:52:2b:57:2e:03:74:13:41:
-                    b4:59:69:7e:f6:e1:54:42:8d:c3:f4:85:2b:ff:07:
-                    97:a4:2f:5b:e4:13:be:72:ef:65:e7:59:be:ed:14:
-                    71:82:cc:09:03:50:99:66:08:34:1a:41:45:e6:e3:
-                    37:98:32:6a:15:d4:32:63:f7:26:6c:5a:ed:45:bd:
-                    bb:aa:be:33:4b:9c:cb:b2:03:13:e3:2d:6f:61:57:
-                    2a:e8:e8:44:0f:59:ea:e7:bf
-                Exponent: 65537 (0x10001)
-        X509v3 extensions:
-            Authority Information Access: 
-                OCSP - URI:http://127.0.0.1:82/0004
-
-    Signature Algorithm: sha1WithRSAEncryption
-        1d:80:7c:33:dd:ab:99:c7:06:f5:aa:fd:16:7d:89:d8:a9:a2:
-        89:38:af:26:b7:b1:0f:69:3d:d6:09:3e:6d:dd:d2:e0:51:b8:
-        97:fc:8d:96:08:0d:33:2d:75:e7:d2:9e:47:2b:fd:46:5b:c9:
-        f2:68:4f:26:8f:83:3d:fc:aa:d7:6a:20:77:15:3f:78:d9:75:
-        b3:79:10:fd:ab:ab:95:34:69:64:3c:8a:65:6d:66:bb:a9:da:
-        26:79:51:59:a7:c2:97:ea:6c:7f:31:91:d3:a5:c2:65:ca:d5:
-        4f:6f:c8:d9:b9:c7:03:7b:c6:2d:16:5f:fe:de:02:28:f3:e9:
-        64:ad:e9:62:3c:e5:91:31:0f:c9:c9:33:1a:a5:66:d8:5b:80:
-        18:6f:5f:55:34:51:43:fa:79:50:ba:17:19:2c:b9:25:b8:a3:
-        a0:b2:08:38:49:6d:3c:86:8c:42:2c:d8:07:bd:39:f1:3c:97:
-        8f:c6:83:cd:85:8f:e9:52:63:77:4f:d6:9e:58:3e:22:f8:29:
-        8e:44:92:c6:b7:ab:28:35:22:7b:b7:d0:8f:34:70:15:f2:4b:
-        91:65:42:8d:d5:ce:75:4b:2f:7b:7e:7f:7e:61:09:5b:b2:1a:
-        64:94:18:c9:8e:c3:ee:a4:89:d6:97:55:76:28:b0:e6:bc:7c:
-        f0:c9:9b:20:e3:a5:10:da:c1:9c:c4:4e:ff:e8:ca:3c:19:82:
-        06:d6:aa:05:cb:05:e5:bd:36:cf:4c:3a:a7:e6:21:af:e8:5e:
-        2d:ee:3b:94:24:91:37:92:95:3f:d3:f8:b8:5a:13:56:16:a7:
-        20:34:f6:fd:cb:59:6d:4c:ff:04:df:ef:61:08:d9:2f:85:a8:
-        b1:7c:07:80:93:31:7b:bb:7f:8d:17:ba:8b:64:41:82:4a:ca:
-        f6:a9:f7:69:b8:cf:ed:17:c1:ca:09:5a:52:c4:ce:a0:9c:e3:
-        4c:52:ab:ea:b3:4f:3c:93:1d:50:bf:60:e8:6e:d1:bf:90:0c:
-        3f:1d:6b:2c:a5:c5:bf:eb:e2:da:cb:76:56:08:51:cc:87:49:
-        21:16:f0:a6:85:ce:0f:c3:32:c2:50:cc:04:f5:d1:bb:de:b8:
-        db:9b:79:e1:d2:73:14:b2:7c:5a:cf:26:7b:24:4a:58:48:58:
-        2e:b1:a1:2f:01:c2:71:40:85:c8:9b:21:10:15:1a:3e:5e:3d:
-        79:53:9c:82:b2:4e:ad:91:96:9f:03:c5:f6:44:ea:d6:d6:cf:
-        3b:1e:74:e6:b1:f2:f4:b3:e0:7d:91:77:ac:50:d9:66:1b:73:
-        59:3e:e6:18:07:bb:e0:60:4f:1e:8d:40:2b:da:25:ac:c8:85:
-        d6:31:62:f3:5b:05:4a:11
------BEGIN CERTIFICATE-----
-MIID7DCCAdSgAwIBAgIBEjANBgkqhkiG9w0BAQUFADBaMQswCQYDVQQGEwJLUjET
-MBEGA1UECBMKS3l1bmdHaS1EbzERMA8GA1UEBxMIU3V3b24tU2kxFjAUBgNVBAoT
-DVNhbXN1bmcgRWxlYy4xCzAJBgNVBAMTAkNBMB4XDTA5MDMxMzAzMjQyMFoXDTE5
-MDMxMTAzMjQyMFowYzELMAkGA1UEBhMCS1IxEzARBgNVBAgTCkt5dW5nR2ktRG8x
-FjAUBgNVBAoTDVNhbXN1bmcgRWxlYy4xJzAlBgNVBAMTHkZpcnN0IGNlcnRpZmlj
-YXRlIHRvIHRlc3QgT0NTUDCBnzANBgkqhkiG9w0BAQEFAAOBjQAwgYkCgYEAwKlR
-YxnizPOdGdh1kKsTQKM/ndzvSEINADbb6mj9uRU0qa8PUitXLgN0E0G0WWl+9uFU
-Qo3D9IUr/weXpC9b5BO+cu9l51m+7RRxgswJA1CZZgg0GkFF5uM3mDJqFdQyY/cm
-bFrtRb27qr4zS5zLsgMT4y1vYVcq6OhED1nq578CAwEAAaM4MDYwNAYIKwYBBQUH
-AQEEKDAmMCQGCCsGAQUFBzABhhhodHRwOi8vMTI3LjAuMC4xOjgyLzAwMDQwDQYJ
-KoZIhvcNAQEFBQADggIBAB2AfDPdq5nHBvWq/RZ9idipook4rya3sQ9pPdYJPm3d
-0uBRuJf8jZYIDTMtdefSnkcr/UZbyfJoTyaPgz38qtdqIHcVP3jZdbN5EP2rq5U0
-aWQ8imVtZrup2iZ5UVmnwpfqbH8xkdOlwmXK1U9vyNm5xwN7xi0WX/7eAijz6WSt
-6WI85ZExD8nJMxqlZthbgBhvX1U0UUP6eVC6FxksuSW4o6CyCDhJbTyGjEIs2Ae9
-OfE8l4/Gg82Fj+lSY3dP1p5YPiL4KY5Eksa3qyg1Inu30I80cBXyS5FlQo3VznVL
-L3t+f35hCVuyGmSUGMmOw+6kidaXVXYosOa8fPDJmyDjpRDawZzETv/oyjwZggbW
-qgXLBeW9Ns9MOqfmIa/oXi3uO5QkkTeSlT/T+LhaE1YWpyA09v3LWW1M/wTf72EI
-2S+FqLF8B4CTMXu7f40XuotkQYJKyvap92m4z+0XwcoJWlLEzqCc40xSq+qzTzyT
-HVC/YOhu0b+QDD8dayylxb/r4trLdlYIUcyHSSEW8KaFzg/DMsJQzAT10bveuNub
-eeHScxSyfFrPJnskSlhIWC6xoS8BwnFAhcibIRAVGj5ePXlTnIKyTq2Rlp8DxfZE
-6tbWzzsedOax8vSz4H2Rd6xQ2WYbc1k+5hgHu+BgTx6NQCvaJazIhdYxYvNbBUoR
------END CERTIFICATE-----
diff --git a/tests/cert-svc/data/TestData/ssl/OCSP_CLIENT4.crt b/tests/cert-svc/data/TestData/ssl/OCSP_CLIENT4.crt
deleted file mode 100644 (file)
index 0ff43d6..0000000
+++ /dev/null
@@ -1,81 +0,0 @@
-Certificate:
-    Data:
-        Version: 3 (0x2)
-        Serial Number: 19 (0x13)
-        Signature Algorithm: sha1WithRSAEncryption
-        Issuer: C=KR, ST=KyungGi-Do, L=Suwon-Si, O=Samsung Elec., CN=CA
-        Validity
-            Not Before: Mar 13 03:24:30 2009 GMT
-            Not After : Mar 11 03:24:30 2019 GMT
-        Subject: C=KR, ST=KyungGi-Do, O=Samsung Elec., CN=First certificate to test OCSP
-        Subject Public Key Info:
-            Public Key Algorithm: rsaEncryption
-            RSA Public Key: (1024 bit)
-                Modulus (1024 bit):
-                    00:c0:a9:51:63:19:e2:cc:f3:9d:19:d8:75:90:ab:
-                    13:40:a3:3f:9d:dc:ef:48:42:0d:00:36:db:ea:68:
-                    fd:b9:15:34:a9:af:0f:52:2b:57:2e:03:74:13:41:
-                    b4:59:69:7e:f6:e1:54:42:8d:c3:f4:85:2b:ff:07:
-                    97:a4:2f:5b:e4:13:be:72:ef:65:e7:59:be:ed:14:
-                    71:82:cc:09:03:50:99:66:08:34:1a:41:45:e6:e3:
-                    37:98:32:6a:15:d4:32:63:f7:26:6c:5a:ed:45:bd:
-                    bb:aa:be:33:4b:9c:cb:b2:03:13:e3:2d:6f:61:57:
-                    2a:e8:e8:44:0f:59:ea:e7:bf
-                Exponent: 65537 (0x10001)
-        X509v3 extensions:
-            Authority Information Access: 
-                OCSP - URI:http://127.0.0.1:83/0005
-
-    Signature Algorithm: sha1WithRSAEncryption
-        9b:ea:5d:a3:f4:b2:04:44:31:6b:64:e4:7d:25:5d:69:1b:25:
-        3d:63:d4:3f:2c:0f:c6:60:44:70:18:57:31:be:84:38:e8:53:
-        29:dd:5e:f2:5c:8e:41:6d:e8:ea:a7:23:91:b9:f4:c1:20:2c:
-        cd:d6:b4:b4:e6:9d:c3:b4:5b:4c:48:dd:3a:cc:cd:9e:0c:93:
-        bb:e0:03:43:1c:ab:01:86:4e:67:44:ad:68:3d:e6:00:4d:9e:
-        95:5f:86:0f:e4:18:af:3d:76:a4:1b:91:5e:e8:07:2b:aa:62:
-        4e:d9:af:f8:15:e7:3c:bb:8c:f4:a9:4f:df:72:f6:b0:6a:36:
-        ad:eb:d2:10:02:cb:65:28:a7:4c:4f:98:e1:7b:1e:aa:af:3e:
-        61:65:91:58:94:99:26:69:29:06:50:02:44:61:a6:3c:ee:8a:
-        7e:db:56:5a:f5:cc:d6:58:6f:a2:40:51:e1:81:fa:3b:b8:4b:
-        8d:00:64:b2:99:d3:e7:8a:52:78:b3:67:a1:64:5d:dd:a0:c5:
-        54:1d:de:07:29:ef:85:01:d4:e9:24:44:8b:df:9b:f5:ae:80:
-        4d:fa:4d:08:76:7c:97:6b:86:74:22:56:d1:87:6b:41:54:66:
-        fc:3b:d2:3e:2d:95:c1:46:06:b9:db:0e:8b:e1:be:c8:56:82:
-        c3:1d:df:84:b6:50:ee:b8:30:3c:54:07:49:8b:e2:d4:a7:b8:
-        35:0d:b6:09:7e:04:01:bb:71:86:8c:50:87:a7:3a:2d:b8:7c:
-        24:cd:b1:a6:87:b8:eb:d5:dc:8f:02:21:f9:71:06:34:c4:e5:
-        6f:ff:53:4b:dd:33:96:60:8b:6d:bb:03:b1:36:31:2d:02:6c:
-        7f:ba:70:0a:78:b8:fb:45:92:84:5b:1e:a7:15:39:13:33:fd:
-        6f:a7:95:76:10:1f:b3:cd:11:e8:ed:ce:2c:63:cd:64:23:62:
-        c4:21:d6:48:bf:f7:10:b8:da:d5:72:14:ad:5a:a0:5d:4a:2b:
-        a0:76:5f:b8:3b:d2:6b:8a:7f:6b:6a:cc:84:eb:6a:be:d9:26:
-        2c:bb:38:06:b8:f4:d4:fb:78:85:83:c8:ad:6e:56:f9:67:5f:
-        bc:3c:41:b6:f0:6f:d4:45:78:ed:3e:2f:c7:3a:3e:9a:98:68:
-        c4:64:79:29:51:19:cd:a6:70:c4:04:30:50:86:9c:f2:54:57:
-        b1:e1:7d:4a:d5:34:fc:93:31:6d:64:15:79:31:c0:70:d5:db:
-        bc:a0:be:21:22:1e:61:ac:4a:9f:a2:a6:ff:de:52:2e:31:d7:
-        5e:39:66:c6:47:55:f6:64:f5:bd:ed:c0:60:b8:59:88:a1:8e:
-        8c:5f:20:1b:be:41:51:f4
------BEGIN CERTIFICATE-----
-MIID7DCCAdSgAwIBAgIBEzANBgkqhkiG9w0BAQUFADBaMQswCQYDVQQGEwJLUjET
-MBEGA1UECBMKS3l1bmdHaS1EbzERMA8GA1UEBxMIU3V3b24tU2kxFjAUBgNVBAoT
-DVNhbXN1bmcgRWxlYy4xCzAJBgNVBAMTAkNBMB4XDTA5MDMxMzAzMjQzMFoXDTE5
-MDMxMTAzMjQzMFowYzELMAkGA1UEBhMCS1IxEzARBgNVBAgTCkt5dW5nR2ktRG8x
-FjAUBgNVBAoTDVNhbXN1bmcgRWxlYy4xJzAlBgNVBAMTHkZpcnN0IGNlcnRpZmlj
-YXRlIHRvIHRlc3QgT0NTUDCBnzANBgkqhkiG9w0BAQEFAAOBjQAwgYkCgYEAwKlR
-YxnizPOdGdh1kKsTQKM/ndzvSEINADbb6mj9uRU0qa8PUitXLgN0E0G0WWl+9uFU
-Qo3D9IUr/weXpC9b5BO+cu9l51m+7RRxgswJA1CZZgg0GkFF5uM3mDJqFdQyY/cm
-bFrtRb27qr4zS5zLsgMT4y1vYVcq6OhED1nq578CAwEAAaM4MDYwNAYIKwYBBQUH
-AQEEKDAmMCQGCCsGAQUFBzABhhhodHRwOi8vMTI3LjAuMC4xOjgzLzAwMDUwDQYJ
-KoZIhvcNAQEFBQADggIBAJvqXaP0sgREMWtk5H0lXWkbJT1j1D8sD8ZgRHAYVzG+
-hDjoUyndXvJcjkFt6OqnI5G59MEgLM3WtLTmncO0W0xI3TrMzZ4Mk7vgA0McqwGG
-TmdErWg95gBNnpVfhg/kGK89dqQbkV7oByuqYk7Zr/gV5zy7jPSpT99y9rBqNq3r
-0hACy2Uop0xPmOF7HqqvPmFlkViUmSZpKQZQAkRhpjzuin7bVlr1zNZYb6JAUeGB
-+ju4S40AZLKZ0+eKUnizZ6FkXd2gxVQd3gcp74UB1OkkRIvfm/WugE36TQh2fJdr
-hnQiVtGHa0FUZvw70j4tlcFGBrnbDovhvshWgsMd34S2UO64MDxUB0mL4tSnuDUN
-tgl+BAG7cYaMUIenOi24fCTNsaaHuOvV3I8CIflxBjTE5W//U0vdM5Zgi227A7E2
-MS0CbH+6cAp4uPtFkoRbHqcVORMz/W+nlXYQH7PNEejtzixjzWQjYsQh1ki/9xC4
-2tVyFK1aoF1KK6B2X7g70muKf2tqzITrar7ZJiy7OAa49NT7eIWDyK1uVvlnX7w8
-Qbbwb9RFeO0+L8c6PpqYaMRkeSlRGc2mcMQEMFCGnPJUV7HhfUrVNPyTMW1kFXkx
-wHDV27ygviEiHmGsSp+ipv/eUi4x1145ZsZHVfZk9b3twGC4WYihjoxfIBu+QVH0
------END CERTIFICATE-----
diff --git a/tests/cert-svc/data/TestData/ssl/OCSP_CLIENT5.crt b/tests/cert-svc/data/TestData/ssl/OCSP_CLIENT5.crt
deleted file mode 100644 (file)
index 099dd23..0000000
+++ /dev/null
@@ -1,81 +0,0 @@
-Certificate:
-    Data:
-        Version: 3 (0x2)
-        Serial Number: 20 (0x14)
-        Signature Algorithm: sha1WithRSAEncryption
-        Issuer: C=KR, ST=KyungGi-Do, L=Suwon-Si, O=Samsung Elec., CN=CA
-        Validity
-            Not Before: Mar 13 03:24:40 2009 GMT
-            Not After : Mar 11 03:24:40 2019 GMT
-        Subject: C=KR, ST=KyungGi-Do, O=Samsung Elec., CN=First certificate to test OCSP
-        Subject Public Key Info:
-            Public Key Algorithm: rsaEncryption
-            RSA Public Key: (1024 bit)
-                Modulus (1024 bit):
-                    00:c0:a9:51:63:19:e2:cc:f3:9d:19:d8:75:90:ab:
-                    13:40:a3:3f:9d:dc:ef:48:42:0d:00:36:db:ea:68:
-                    fd:b9:15:34:a9:af:0f:52:2b:57:2e:03:74:13:41:
-                    b4:59:69:7e:f6:e1:54:42:8d:c3:f4:85:2b:ff:07:
-                    97:a4:2f:5b:e4:13:be:72:ef:65:e7:59:be:ed:14:
-                    71:82:cc:09:03:50:99:66:08:34:1a:41:45:e6:e3:
-                    37:98:32:6a:15:d4:32:63:f7:26:6c:5a:ed:45:bd:
-                    bb:aa:be:33:4b:9c:cb:b2:03:13:e3:2d:6f:61:57:
-                    2a:e8:e8:44:0f:59:ea:e7:bf
-                Exponent: 65537 (0x10001)
-        X509v3 extensions:
-            Authority Information Access: 
-                OCSP - URI:http://127.0.0.1:84/0006
-
-    Signature Algorithm: sha1WithRSAEncryption
-        49:da:46:14:f1:5a:4a:09:cb:36:a5:fe:ab:50:f5:ea:e1:b2:
-        18:79:dc:d7:79:bb:a8:b0:8d:0b:b5:e1:a9:60:db:8a:e9:3a:
-        b8:15:b0:eb:e4:45:bf:90:64:6b:4e:c1:dc:7e:9d:5f:47:0e:
-        be:7b:22:ba:c2:71:3d:5d:8b:8f:14:67:1d:19:51:54:05:5a:
-        06:11:e1:1f:ca:bb:98:1a:a3:d6:16:b9:5d:8d:03:70:28:40:
-        ca:3a:7d:fe:a7:c3:40:ab:7a:0a:42:3a:95:f6:da:fd:bc:d9:
-        09:50:70:9a:7a:b4:e9:ae:75:b7:cd:a8:56:f4:2e:7c:ef:40:
-        63:6d:02:da:50:29:c8:df:2f:40:04:84:9d:60:a2:3c:21:fc:
-        d6:64:02:72:cb:4c:5b:e1:68:d9:0a:16:84:58:47:a5:d1:28:
-        18:86:eb:07:b9:1f:db:9f:46:de:6b:2d:2e:4e:20:9a:40:3a:
-        56:86:28:9f:c5:15:97:1a:3f:70:18:5f:44:1d:64:d0:76:ef:
-        09:c5:23:21:03:32:9c:c4:23:af:c4:1f:85:fd:da:b8:40:33:
-        b6:c2:7d:2b:67:ff:88:a0:9c:a8:2e:9e:4b:40:44:6b:bc:c0:
-        3b:f2:b3:a3:d5:f0:b4:04:85:cd:b4:cd:49:3d:34:64:1e:1d:
-        16:a1:8f:05:74:8e:91:ee:98:6c:cc:c8:d8:c3:5e:fd:65:4a:
-        15:ed:28:cb:0b:c3:b6:29:bc:d6:3d:0d:0e:a8:21:36:27:74:
-        9d:f2:7c:58:1f:88:25:35:2b:7f:4c:16:38:df:0f:32:8f:db:
-        22:96:ad:e8:8b:bd:d8:d5:e9:e1:b0:fe:53:03:e6:c7:67:78:
-        bf:a6:50:dc:2a:0a:c9:a2:df:6a:d5:c3:db:eb:20:1c:78:ed:
-        69:14:d4:f5:26:62:78:f6:33:a0:ac:95:19:5d:a6:d9:30:8d:
-        21:80:2d:42:dc:a5:a5:a0:42:41:e8:60:f1:4d:81:6d:e6:58:
-        32:b9:e4:23:09:34:3e:7a:fb:69:4b:f3:c0:8a:00:c3:59:2b:
-        02:13:fc:4e:9c:3e:8f:34:fe:b0:ca:07:df:6b:1d:97:9c:ca:
-        a9:b1:b6:8f:2d:92:6c:12:4b:64:23:d6:47:c1:f2:6f:79:16:
-        78:7b:f8:36:b9:83:a3:a4:e7:0f:c0:99:d9:a3:09:45:ac:92:
-        52:62:26:64:51:04:e9:92:6f:3e:f9:62:93:c5:2a:00:5b:d3:
-        0b:66:75:ad:bb:5d:12:37:09:3c:b6:95:6d:c2:05:17:8f:d7:
-        79:aa:0d:6a:6c:00:6e:94:0c:e8:e3:31:9d:8e:63:e9:f9:d2:
-        dc:8e:07:36:9a:e3:08:55
------BEGIN CERTIFICATE-----
-MIID7DCCAdSgAwIBAgIBFDANBgkqhkiG9w0BAQUFADBaMQswCQYDVQQGEwJLUjET
-MBEGA1UECBMKS3l1bmdHaS1EbzERMA8GA1UEBxMIU3V3b24tU2kxFjAUBgNVBAoT
-DVNhbXN1bmcgRWxlYy4xCzAJBgNVBAMTAkNBMB4XDTA5MDMxMzAzMjQ0MFoXDTE5
-MDMxMTAzMjQ0MFowYzELMAkGA1UEBhMCS1IxEzARBgNVBAgTCkt5dW5nR2ktRG8x
-FjAUBgNVBAoTDVNhbXN1bmcgRWxlYy4xJzAlBgNVBAMTHkZpcnN0IGNlcnRpZmlj
-YXRlIHRvIHRlc3QgT0NTUDCBnzANBgkqhkiG9w0BAQEFAAOBjQAwgYkCgYEAwKlR
-YxnizPOdGdh1kKsTQKM/ndzvSEINADbb6mj9uRU0qa8PUitXLgN0E0G0WWl+9uFU
-Qo3D9IUr/weXpC9b5BO+cu9l51m+7RRxgswJA1CZZgg0GkFF5uM3mDJqFdQyY/cm
-bFrtRb27qr4zS5zLsgMT4y1vYVcq6OhED1nq578CAwEAAaM4MDYwNAYIKwYBBQUH
-AQEEKDAmMCQGCCsGAQUFBzABhhhodHRwOi8vMTI3LjAuMC4xOjg0LzAwMDYwDQYJ
-KoZIhvcNAQEFBQADggIBAEnaRhTxWkoJyzal/qtQ9erhshh53Nd5u6iwjQu14alg
-24rpOrgVsOvkRb+QZGtOwdx+nV9HDr57IrrCcT1di48UZx0ZUVQFWgYR4R/Ku5ga
-o9YWuV2NA3AoQMo6ff6nw0CregpCOpX22v282QlQcJp6tOmudbfNqFb0LnzvQGNt
-AtpQKcjfL0AEhJ1gojwh/NZkAnLLTFvhaNkKFoRYR6XRKBiG6we5H9ufRt5rLS5O
-IJpAOlaGKJ/FFZcaP3AYX0QdZNB27wnFIyEDMpzEI6/EH4X92rhAM7bCfStn/4ig
-nKgunktARGu8wDvys6PV8LQEhc20zUk9NGQeHRahjwV0jpHumGzMyNjDXv1lShXt
-KMsLw7YpvNY9DQ6oITYndJ3yfFgfiCU1K39MFjjfDzKP2yKWreiLvdjV6eGw/lMD
-5sdneL+mUNwqCsmi32rVw9vrIBx47WkU1PUmYnj2M6CslRldptkwjSGALULcpaWg
-QkHoYPFNgW3mWDK55CMJND56+2lL88CKAMNZKwIT/E6cPo80/rDKB99rHZecyqmx
-to8tkmwSS2Qj1kfB8m95Fnh7+Da5g6Ok5w/AmdmjCUWsklJiJmRRBOmSbz75YpPF
-KgBb0wtmda27XRI3CTy2lW3CBReP13mqDWpsAG6UDOjjMZ2OY+n50tyOBzaa4whV
------END CERTIFICATE-----
diff --git a/tests/cert-svc/data/TestData/ssl/OCSP_CLIENT6.crt b/tests/cert-svc/data/TestData/ssl/OCSP_CLIENT6.crt
deleted file mode 100644 (file)
index 30ab2f1..0000000
+++ /dev/null
@@ -1,81 +0,0 @@
-Certificate:
-    Data:
-        Version: 3 (0x2)
-        Serial Number: 22 (0x16)
-        Signature Algorithm: sha1WithRSAEncryption
-        Issuer: C=KR, ST=KyungGi-Do, L=Suwon-Si, O=Samsung Elec., CN=CA
-        Validity
-            Not Before: Mar 14 13:48:12 2009 GMT
-            Not After : Mar 14 13:48:12 2010 GMT
-        Subject: C=KR, ST=KyungGi-Do, O=Samsung Elec., CN=First certificate to test OCSP
-        Subject Public Key Info:
-            Public Key Algorithm: rsaEncryption
-            RSA Public Key: (1024 bit)
-                Modulus (1024 bit):
-                    00:c0:a9:51:63:19:e2:cc:f3:9d:19:d8:75:90:ab:
-                    13:40:a3:3f:9d:dc:ef:48:42:0d:00:36:db:ea:68:
-                    fd:b9:15:34:a9:af:0f:52:2b:57:2e:03:74:13:41:
-                    b4:59:69:7e:f6:e1:54:42:8d:c3:f4:85:2b:ff:07:
-                    97:a4:2f:5b:e4:13:be:72:ef:65:e7:59:be:ed:14:
-                    71:82:cc:09:03:50:99:66:08:34:1a:41:45:e6:e3:
-                    37:98:32:6a:15:d4:32:63:f7:26:6c:5a:ed:45:bd:
-                    bb:aa:be:33:4b:9c:cb:b2:03:13:e3:2d:6f:61:57:
-                    2a:e8:e8:44:0f:59:ea:e7:bf
-                Exponent: 65537 (0x10001)
-        X509v3 extensions:
-            Authority Information Access: 
-                OCSP - URI:http://127.0.0.1:85/0007
-
-    Signature Algorithm: sha1WithRSAEncryption
-        b1:9e:ce:8d:09:9e:f9:21:6f:be:f2:a7:54:6e:24:82:e3:2b:
-        88:b7:0d:e0:e2:49:33:b4:8b:ad:60:71:cc:20:23:57:cf:17:
-        a8:46:c0:a7:1a:5f:8e:8d:1a:cc:0b:1b:da:a4:34:b1:d7:74:
-        1b:a7:e4:71:a1:2d:fd:2e:18:51:02:2c:93:ff:a9:f7:98:bd:
-        ed:6b:4c:55:8e:24:f6:97:8e:8a:80:56:52:7a:17:da:94:96:
-        fa:27:78:8c:65:40:a6:b1:d2:2a:13:fe:76:c0:0c:f2:04:3f:
-        d1:88:25:c3:5a:05:ca:33:d7:bb:27:e2:8b:e8:d4:00:fd:fc:
-        b6:a8:9d:27:c2:f9:ea:98:32:79:85:9d:a3:e7:bf:78:65:e8:
-        15:ef:49:48:87:a9:b2:b4:c4:cb:ec:a7:da:90:36:d6:c5:6f:
-        ff:c3:85:19:13:0b:27:6a:d3:c4:e7:97:62:08:49:a3:e9:22:
-        9a:3c:d1:91:8f:6e:8e:87:47:0e:38:43:8e:5a:84:f6:9c:24:
-        c1:9f:90:29:dc:38:73:72:7d:3f:d6:7f:dd:b3:d1:1d:cf:7b:
-        bc:31:a6:6b:b4:be:10:06:94:69:a0:16:ef:bd:e9:e7:a2:8b:
-        18:e1:10:27:7f:9d:8a:f9:60:18:d5:93:54:d6:4e:c2:31:bf:
-        37:00:db:d5:cf:85:da:e9:7b:e4:bb:48:f3:a5:6e:ba:48:1b:
-        50:6a:10:99:f8:77:81:95:78:1b:d0:fe:d0:74:47:28:05:34:
-        32:32:5f:1f:52:42:85:f8:7a:f1:a8:87:ff:2f:6c:ec:83:09:
-        91:85:0a:43:ce:35:a2:7f:94:b6:ae:70:94:b6:0f:c9:c7:8a:
-        ee:7c:a7:32:8a:ee:c3:e1:ee:01:34:c1:b8:db:98:80:4c:ac:
-        5f:ac:18:02:fa:f5:c1:36:df:39:57:57:81:b9:26:d0:81:0e:
-        75:79:18:21:29:a6:cb:eb:97:58:f2:dd:8a:88:c1:a2:c7:54:
-        9f:97:89:b1:ef:ff:11:5f:18:0a:cd:25:3e:d8:35:07:45:55:
-        1e:bb:a2:54:fc:66:ac:0f:ac:2a:77:d6:1a:a4:44:cc:5a:49:
-        37:45:70:5b:c9:3d:2c:6d:c1:7e:af:4d:9c:4f:2a:a2:d9:01:
-        3d:e2:7f:a4:f2:4b:d7:60:b1:06:a3:b4:46:35:43:1c:be:79:
-        46:a7:8a:50:ee:22:4f:b8:57:45:c9:83:8a:65:bb:7a:86:b3:
-        30:3a:7c:62:d3:b7:08:34:a7:05:0a:44:a7:57:5c:2b:b6:34:
-        03:ea:3a:61:06:c9:f2:65:16:f2:20:c5:32:0a:61:20:c9:f7:
-        07:2e:e8:d2:f2:67:c4:64
------BEGIN CERTIFICATE-----
-MIID7DCCAdSgAwIBAgIBFjANBgkqhkiG9w0BAQUFADBaMQswCQYDVQQGEwJLUjET
-MBEGA1UECBMKS3l1bmdHaS1EbzERMA8GA1UEBxMIU3V3b24tU2kxFjAUBgNVBAoT
-DVNhbXN1bmcgRWxlYy4xCzAJBgNVBAMTAkNBMB4XDTA5MDMxNDEzNDgxMloXDTEw
-MDMxNDEzNDgxMlowYzELMAkGA1UEBhMCS1IxEzARBgNVBAgTCkt5dW5nR2ktRG8x
-FjAUBgNVBAoTDVNhbXN1bmcgRWxlYy4xJzAlBgNVBAMTHkZpcnN0IGNlcnRpZmlj
-YXRlIHRvIHRlc3QgT0NTUDCBnzANBgkqhkiG9w0BAQEFAAOBjQAwgYkCgYEAwKlR
-YxnizPOdGdh1kKsTQKM/ndzvSEINADbb6mj9uRU0qa8PUitXLgN0E0G0WWl+9uFU
-Qo3D9IUr/weXpC9b5BO+cu9l51m+7RRxgswJA1CZZgg0GkFF5uM3mDJqFdQyY/cm
-bFrtRb27qr4zS5zLsgMT4y1vYVcq6OhED1nq578CAwEAAaM4MDYwNAYIKwYBBQUH
-AQEEKDAmMCQGCCsGAQUFBzABhhhodHRwOi8vMTI3LjAuMC4xOjg1LzAwMDcwDQYJ
-KoZIhvcNAQEFBQADggIBALGezo0Jnvkhb77yp1RuJILjK4i3DeDiSTO0i61gccwg
-I1fPF6hGwKcaX46NGswLG9qkNLHXdBun5HGhLf0uGFECLJP/qfeYve1rTFWOJPaX
-joqAVlJ6F9qUlvoneIxlQKax0ioT/nbADPIEP9GIJcNaBcoz17sn4ovo1AD9/Lao
-nSfC+eqYMnmFnaPnv3hl6BXvSUiHqbK0xMvsp9qQNtbFb//DhRkTCydq08Tnl2II
-SaPpIpo80ZGPbo6HRw44Q45ahPacJMGfkCncOHNyfT/Wf92z0R3Pe7wxpmu0vhAG
-lGmgFu+96eeiixjhECd/nYr5YBjVk1TWTsIxvzcA29XPhdrpe+S7SPOlbrpIG1Bq
-EJn4d4GVeBvQ/tB0RygFNDIyXx9SQoX4evGoh/8vbOyDCZGFCkPONaJ/lLaucJS2
-D8nHiu58pzKK7sPh7gE0wbjbmIBMrF+sGAL69cE23zlXV4G5JtCBDnV5GCEppsvr
-l1jy3YqIwaLHVJ+XibHv/xFfGArNJT7YNQdFVR67olT8ZqwPrCp31hqkRMxaSTdF
-cFvJPSxtwX6vTZxPKqLZAT3if6TyS9dgsQajtEY1Qxy+eUanilDuIk+4V0XJg4pl
-u3qGszA6fGLTtwg0pwUKRKdXXCu2NAPqOmEGyfJlFvIgxTIKYSDJ9wcu6NLyZ8Rk
------END CERTIFICATE-----
diff --git a/tests/cert-svc/data/TestData/ssl/OCSP_CLIENT7.crt b/tests/cert-svc/data/TestData/ssl/OCSP_CLIENT7.crt
deleted file mode 100644 (file)
index d3d25a0..0000000
+++ /dev/null
@@ -1,82 +0,0 @@
-Certificate:
-    Data:
-        Version: 3 (0x2)
-        Serial Number: 41 (0x29)
-        Signature Algorithm: sha1WithRSAEncryption
-        Issuer: C=KR, ST=KyungGi-Do, L=Suwon-Si, O=Samsung Elec., CN=CA
-        Validity
-            Not Before: Mar 16 23:32:11 2009 GMT
-            Not After : Mar 14 23:32:11 2019 GMT
-        Subject: C=KR, ST=KyungGi-Do, O=Samsung Elec., CN=Seventh OCSP Client certificate
-        Subject Public Key Info:
-            Public Key Algorithm: rsaEncryption
-            RSA Public Key: (1024 bit)
-                Modulus (1024 bit):
-                    00:ab:f9:60:ff:9d:55:0f:31:12:2c:f2:df:64:22:
-                    fb:c0:97:1d:e4:13:fb:d7:15:37:5d:b9:2d:97:37:
-                    c4:e8:34:cb:00:85:22:4d:8a:85:80:a1:ae:90:5e:
-                    71:bf:6d:0d:a3:c3:8d:ce:47:58:60:25:bb:9c:95:
-                    0a:0b:cd:23:01:ae:18:be:d5:65:bd:8b:55:bf:ee:
-                    59:8a:db:20:bd:f9:f3:ac:53:2e:09:99:fb:27:7d:
-                    23:8b:f6:96:d9:41:37:0a:43:16:1f:f9:5d:84:b3:
-                    3b:79:45:ff:dd:b2:35:99:c0:db:85:24:22:a8:7e:
-                    ff:e0:8b:f2:d8:ca:3e:ae:e5
-                Exponent: 65537 (0x10001)
-        X509v3 extensions:
-            Authority Information Access: 
-                OCSP - URI:http://127.0.0.1:86/0008
-
-    Signature Algorithm: sha1WithRSAEncryption
-        08:02:c2:09:8a:f6:f1:d7:9e:d3:30:dc:ce:97:fc:84:bd:5b:
-        ae:60:39:82:0a:06:38:43:1e:55:de:83:11:d3:12:e0:81:76:
-        fd:5c:6e:9e:30:73:6d:8f:b2:32:a6:60:24:24:ee:e3:fd:73:
-        10:12:e6:c7:23:6b:1f:4e:b5:52:e3:12:09:ee:dd:19:d2:b4:
-        a6:34:e6:14:3c:79:58:95:4b:25:e3:f6:97:d2:cc:20:93:48:
-        1f:d5:2f:37:db:15:bf:f4:71:ad:04:bd:95:80:57:a5:49:bb:
-        aa:ca:f3:ff:af:62:dd:f9:94:75:38:59:6c:74:ef:ac:1e:19:
-        60:6d:4b:be:f7:62:2f:c6:68:b9:c4:fc:8a:fd:9f:b2:4d:44:
-        87:12:51:6e:7d:5f:41:2c:ea:e6:9c:3c:bd:cf:dc:aa:14:b2:
-        34:16:e0:38:b3:8c:f4:d7:68:1f:6c:cc:3c:da:30:32:8e:58:
-        5b:9a:bf:75:7a:38:a3:cf:60:6f:74:cc:a6:c1:55:f6:96:84:
-        98:04:db:b1:07:d6:f6:06:11:af:c2:fb:81:a4:77:04:4d:55:
-        9d:c4:28:d4:3c:d0:97:a0:f8:d4:18:59:cc:23:3a:b3:c0:82:
-        ad:1d:e2:4c:e4:da:24:73:cd:77:ab:db:22:07:94:d1:16:26:
-        27:82:e2:d5:82:f9:e1:29:fb:8f:9e:88:a2:1b:5c:8b:31:3c:
-        c6:1c:ae:16:31:28:f8:e2:5c:9d:e9:e8:d7:d9:fe:0a:39:3f:
-        fa:65:20:53:5e:20:32:4b:b8:a8:4b:a8:b8:e8:f1:3f:0a:80:
-        7d:b4:8c:1b:e6:54:d3:02:d6:56:a3:a6:4e:87:9a:51:ed:0d:
-        52:9b:e1:66:c8:64:c8:95:55:08:aa:f9:c0:9d:5a:89:03:21:
-        6b:29:96:f8:42:64:6a:3f:d5:92:d5:13:00:6c:89:38:ea:01:
-        0d:28:3b:a0:12:e1:cf:cf:fd:10:5e:a3:9b:67:0b:3e:a7:17:
-        7a:de:76:25:26:54:db:0f:a8:f9:e9:50:f0:1e:9a:0d:ad:d6:
-        ad:63:32:be:c0:bb:7a:66:be:c9:d3:f2:1e:48:c3:f5:2b:15:
-        4d:39:cc:88:32:65:97:99:01:41:12:07:4e:d7:1d:af:fa:46:
-        29:93:02:70:ed:df:89:a3:d5:50:1c:07:ed:df:f8:5c:d6:11:
-        c6:1a:32:e6:2b:e7:49:d8:82:16:dd:41:5d:13:9c:a0:00:68:
-        82:54:f8:5e:2a:81:3e:fe:0b:bf:6e:de:e2:b4:4f:09:31:74:
-        4d:6a:2d:b7:a9:0a:54:f4:a7:1f:63:8a:6e:73:bc:e3:38:9e:
-        b8:26:e5:f6:8a:dd:ad:14
------BEGIN CERTIFICATE-----
-MIID7TCCAdWgAwIBAgIBKTANBgkqhkiG9w0BAQUFADBaMQswCQYDVQQGEwJLUjET
-MBEGA1UECBMKS3l1bmdHaS1EbzERMA8GA1UEBxMIU3V3b24tU2kxFjAUBgNVBAoT
-DVNhbXN1bmcgRWxlYy4xCzAJBgNVBAMTAkNBMB4XDTA5MDMxNjIzMzIxMVoXDTE5
-MDMxNDIzMzIxMVowZDELMAkGA1UEBhMCS1IxEzARBgNVBAgTCkt5dW5nR2ktRG8x
-FjAUBgNVBAoTDVNhbXN1bmcgRWxlYy4xKDAmBgNVBAMTH1NldmVudGggT0NTUCBD
-bGllbnQgY2VydGlmaWNhdGUwgZ8wDQYJKoZIhvcNAQEBBQADgY0AMIGJAoGBAKv5
-YP+dVQ8xEizy32Qi+8CXHeQT+9cVN125LZc3xOg0ywCFIk2KhYChrpBecb9tDaPD
-jc5HWGAlu5yVCgvNIwGuGL7VZb2LVb/uWYrbIL3586xTLgmZ+yd9I4v2ltlBNwpD
-Fh/5XYSzO3lF/92yNZnA24UkIqh+/+CL8tjKPq7lAgMBAAGjODA2MDQGCCsGAQUF
-BwEBBCgwJjAkBggrBgEFBQcwAYYYaHR0cDovLzEyNy4wLjAuMTo4Ni8wMDA4MA0G
-CSqGSIb3DQEBBQUAA4ICAQAIAsIJivbx157TMNzOl/yEvVuuYDmCCgY4Qx5V3oMR
-0xLggXb9XG6eMHNtj7IypmAkJO7j/XMQEubHI2sfTrVS4xIJ7t0Z0rSmNOYUPHlY
-lUsl4/aX0swgk0gf1S832xW/9HGtBL2VgFelSbuqyvP/r2Ld+ZR1OFlsdO+sHhlg
-bUu+92Ivxmi5xPyK/Z+yTUSHElFufV9BLOrmnDy9z9yqFLI0FuA4s4z012gfbMw8
-2jAyjlhbmr91ejijz2BvdMymwVX2loSYBNuxB9b2BhGvwvuBpHcETVWdxCjUPNCX
-oPjUGFnMIzqzwIKtHeJM5Nokc813q9siB5TRFiYnguLVgvnhKfuPnoiiG1yLMTzG
-HK4WMSj44lyd6ejX2f4KOT/6ZSBTXiAyS7ioS6i46PE/CoB9tIwb5lTTAtZWo6ZO
-h5pR7Q1Sm+FmyGTIlVUIqvnAnVqJAyFrKZb4QmRqP9WS1RMAbIk46gENKDugEuHP
-z/0QXqObZws+pxd63nYlJlTbD6j56VDwHpoNrdatYzK+wLt6Zr7J0/IeSMP1KxVN
-OcyIMmWXmQFBEgdO1x2v+kYpkwJw7d+Jo9VQHAft3/hc1hHGGjLmK+dJ2IIW3UFd
-E5ygAGiCVPheKoE+/gu/bt7itE8JMXRNai23qQpU9KcfY4puc7zjOJ64JuX2it2t
-FA==
------END CERTIFICATE-----
diff --git a/tests/cert-svc/data/TestData/ssl/OCSP_CLIENT7.key b/tests/cert-svc/data/TestData/ssl/OCSP_CLIENT7.key
deleted file mode 100644 (file)
index 9bb405a..0000000
+++ /dev/null
@@ -1,15 +0,0 @@
------BEGIN RSA PRIVATE KEY-----
-MIICXAIBAAKBgQCr+WD/nVUPMRIs8t9kIvvAlx3kE/vXFTdduS2XN8ToNMsAhSJN
-ioWAoa6QXnG/bQ2jw43OR1hgJbuclQoLzSMBrhi+1WW9i1W/7lmK2yC9+fOsUy4J
-mfsnfSOL9pbZQTcKQxYf+V2Eszt5Rf/dsjWZwNuFJCKofv/gi/LYyj6u5QIDAQAB
-AoGATwAeWQ5TdskaCl//0yZm9A/3gUDU3fc3GezpTqAl6m3mG3UNTwWlUnPzlwpr
-wn48V9CLogkQRgrPZpzoooc33trobB4AOArUwvmOpvfUTV6QfqgqKetBoWkRbnW2
-bRPSg+6Au8WhS97WYjMJishKsqgJSxzM/O8ZGD0rypiHG8ECQQDVGGBveE6MUIgg
-UisnkmB/bgdLwfM9h5hTWMvorS66QLJeMbYUBzPRsQbzjaplvqwc/MhNNFa+bW4h
-tBpMGkbpAkEAzpl8u/pXWR1IsIrl8nyVRRJQCqElrAds/biF7uKeYeQzDJjRLHdy
-8a2KEXL79fCEagf4BYuMIpSp1lJWcZxinQJBAJxefe1uT91g/vMQuMAaBpubxtjN
-ostk499NSpwb8S0Vao36Vo0N1/WovNwd+Ysdxriiue0FWh30uRscSSvNIHkCQAtT
-nOQNaIaJNXgAVXUC4Ygk5eB/TzpsOcx7NlSPdhF12lqhci5W6iVX1073l9q28fuC
-LlXXfbpTnjAS2Yxm/30CQAPX7Gx0QbM+juuMhZXNUSZdGXgRe59Y0sDRqJ8WPAUR
-6ADfsota0RF80sIFT0NJLe1AIjaC/U5hlFrCtEceov8=
------END RSA PRIVATE KEY-----
diff --git a/tests/cert-svc/data/TestData/ssl/authorities/ca.crt b/tests/cert-svc/data/TestData/ssl/authorities/ca.crt
deleted file mode 100644 (file)
index 646524d..0000000
+++ /dev/null
@@ -1,30 +0,0 @@
------BEGIN CERTIFICATE-----
-MIIFMDCCAxgCCQDyW0BbwrfQZDANBgkqhkiG9w0BAQUFADBaMQswCQYDVQQGEwJL
-UjETMBEGA1UECBMKS3l1bmdHaS1EbzERMA8GA1UEBxMIU3V3b24tU2kxFjAUBgNV
-BAoTDVNhbXN1bmcgRWxlYy4xCzAJBgNVBAMTAkNBMB4XDTA5MDMwNjA3MjIxNFoX
-DTE5MDMwNDA3MjIxNFowWjELMAkGA1UEBhMCS1IxEzARBgNVBAgTCkt5dW5nR2kt
-RG8xETAPBgNVBAcTCFN1d29uLVNpMRYwFAYDVQQKEw1TYW1zdW5nIEVsZWMuMQsw
-CQYDVQQDEwJDQTCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAMXhh68a
-WUeOMDqFnGm1yuqgKJ5gL7aLXkLvaoptZnZchTi+LbzDEIhAyHLVZhzW5TTalY9I
-svqIB+vax6kYSJl1vzIqha7dBsHcftCqJqlDwl35pPOOfDJBcMjd211arVe/7XHI
-sdTmOaGpBVF/7WGMGgla9HIFLnr/EocSdxq/tyU82TPHBpTfjOnkXxuZLkvcTBdm
-2e3Za6iLoXZBUwqAEbbfTQnsBClcBgUyaVR1bxwLjEbjmg8N9RvpHSNDhVBQkjRg
-80znryxojICHB3JplfNBFGJ+PtymRXQEouvzZRiy0tLRHydvULO1hsVO/mGtaKyh
-FILUkn240w1u8aiyM/7a1VEy+hYS4lLOiQnbCsZI6gWdzmroa1tBOOV3mjTb0tjn
-xIGbGu2fnEQMrKhRBN1l04hELBlTUqGgvXqWBgYB03uaHt61Ul4HjAPqLWkmWu/C
-ZlEO6ewoCoJHCPR0Z89gGdrcMzJBaF2dsceurIcYL+rSlALTkpo3SiQiRlqcNSQQ
-UUhFcE+fsQq050gXxk6AMjZi3EZC/Lj2Z/oYcf5hiwt7gnzMux5A0Mxob8g4gRGI
-hOOxDxZg53X9frdTW6xnMTGHq2mqmVtQnquvz6MNcDw7cnJBUQkUWHkq4wvL3y6z
-bhBFUXsX7gBKox0JMY3PHeH+untLNoWdi9F9AgMBAAEwDQYJKoZIhvcNAQEFBQAD
-ggIBAHVU/HAqDC+bX8J0Nt7y0jO1ioUun6qPzjcQ9QRYjZ71JrsRbTgNmYkKtBi1
-8TZ/Dyq27OO612N4qrGe8dZwTK7z8bhVv4+mjgpP/uyO1woLDpYof26z09cfYd3z
-J0OE7Ta0/OlMYCDWl6ORPCNkfv7Bj0cS/XsJczfJAaPdyUozTR6Jl4qARHgS07H4
-ITZGnzPSk34AhJdZFVcnepCSjb4eXTJw1xjAd/OIaD8qtAnrrx/RnWAiii7BIUN/
-O6oOBSumPIrzBbgOJ96KyE5DDaoaECBWEFeyLsXk9PW3PC4CcPrTW1qjkr2cFrPm
-oYhIb2NkYQzpx36wLqG9tiGGiO8BFmyDjffAu8rBvMIFDGjy62fA+n/BMyrfxrQ3
-bKPt/GVHEEhhpNVAF+aRdJk7UtirLIrOYnRJDcbi51ZYiLpogmsH0PZ7JcC2ZkCb
-w753asG0K48OcRNw4c2D0tOXWUE+pkTjbE4HUD4xU+of3x3V98xHghd2G8MOMoRL
-M4tcK/zs76pOY6gfNuZe8nN/9RI+gsiiswWLkSBDEJEAEngZchdmd0I+8ed9qKW8
-Sm+85bfdya+Pbl858kubbkVup8wdl6wfILV+1XZOks1enknQYbls6Gx6mF9Llx1h
-mEHwvjERzOA7ykbVsRj/42Rn4g6JNEzJIZCsaSowk1zt0imn
------END CERTIFICATE-----
diff --git a/tests/cert-svc/data/TestData/ssl/cert_chain/cert_chain1.crl b/tests/cert-svc/data/TestData/ssl/cert_chain/cert_chain1.crl
deleted file mode 100644 (file)
index 75efe22..0000000
+++ /dev/null
@@ -1,11 +0,0 @@
------BEGIN CERTIFICATE REQUEST-----
-MIIBpDCCAQ0CAQAwZDELMAkGA1UEBhMCS1IxEzARBgNVBAgTCkt5dW5nR2ktRG8x
-ETAPBgNVBAcTCFN1d29uLVNpMRYwFAYDVQQKEw1TYW1zdW5nIEVsZWMuMRUwEwYD
-VQQDEwxDZXJ0IENoYWluIDEwgZ8wDQYJKoZIhvcNAQEBBQADgY0AMIGJAoGBAMe1
-y9pN5QxRxXP50eN0G1usaTIVMbxvSvM62+uLYBoF/AcNHKH89yAuZZUYYfLuOH6N
-6Q/7oedTTWr+xLM5u2/5FLGvEyUM87IM6GPfiNtVTdKVYa1H/eUE/Wzvy9rPThrh
-mA/dfgEwFcQV6c269viBSzUVLpEFZNOGxZ4NrV5pAgMBAAGgADANBgkqhkiG9w0B
-AQUFAAOBgQBLCg6kFYFJpEjLdeXsScF/NQ1oBOxzF3GsEfhV1fwErLk9fvW4xep8
-CkzYzXbvZrrW1MLYgj0Bp0A3HJjnLttZXLXB2rmgwvWdcap7QziypjoR2R2GmPhm
-4iVZyKpVW19lV3ofUHLU6TTbP0wC3LGfQoSZv80Tp6mBdtwccQGDHQ==
------END CERTIFICATE REQUEST-----
diff --git a/tests/cert-svc/data/TestData/ssl/cert_chain/cert_chain1.crt b/tests/cert-svc/data/TestData/ssl/cert_chain/cert_chain1.crt
deleted file mode 100644 (file)
index c4eb3e2..0000000
+++ /dev/null
@@ -1,81 +0,0 @@
-Certificate:
-    Data:
-        Version: 3 (0x2)
-        Serial Number: 50 (0x32)
-        Signature Algorithm: sha1WithRSAEncryption
-        Issuer: C=KR, ST=KyungGi-Do, L=Suwon-Si, O=Samsung Elec., CN=CA
-        Validity
-            Not Before: Mar 24 07:30:26 2009 GMT
-            Not After : Mar 24 07:30:26 2010 GMT
-        Subject: C=KR, ST=KyungGi-Do, O=Samsung Elec., CN=Cert Chain 1
-        Subject Public Key Info:
-            Public Key Algorithm: rsaEncryption
-            RSA Public Key: (1024 bit)
-                Modulus (1024 bit):
-                    00:c7:b5:cb:da:4d:e5:0c:51:c5:73:f9:d1:e3:74:
-                    1b:5b:ac:69:32:15:31:bc:6f:4a:f3:3a:db:eb:8b:
-                    60:1a:05:fc:07:0d:1c:a1:fc:f7:20:2e:65:95:18:
-                    61:f2:ee:38:7e:8d:e9:0f:fb:a1:e7:53:4d:6a:fe:
-                    c4:b3:39:bb:6f:f9:14:b1:af:13:25:0c:f3:b2:0c:
-                    e8:63:df:88:db:55:4d:d2:95:61:ad:47:fd:e5:04:
-                    fd:6c:ef:cb:da:cf:4e:1a:e1:98:0f:dd:7e:01:30:
-                    15:c4:15:e9:cd:ba:f6:f8:81:4b:35:15:2e:91:05:
-                    64:d3:86:c5:9e:0d:ad:5e:69
-                Exponent: 65537 (0x10001)
-        X509v3 extensions:
-            Authority Information Access: 
-                OCSP - URI:http://127.0.0.1:89/0002
-
-    Signature Algorithm: sha1WithRSAEncryption
-        0a:20:59:10:b7:68:03:8d:c5:82:bf:b2:4d:4e:a5:0b:54:51:
-        27:4d:ec:86:a8:f0:5c:e8:8d:20:23:f5:81:c2:61:7a:40:2c:
-        dc:bd:dd:7e:d1:f1:4e:70:4c:77:7b:11:ed:1b:4b:a6:1e:4d:
-        6d:9b:f4:99:81:39:a3:3d:cd:fc:1f:ce:16:62:05:c4:99:1c:
-        68:e3:98:d6:47:ea:73:e4:b0:70:d3:fa:23:b9:4d:8a:09:91:
-        66:ef:57:cb:68:1c:39:c3:5c:c3:92:a3:d0:c5:db:65:af:e2:
-        18:62:73:e4:aa:be:c7:e6:a5:7b:e7:31:f0:30:3e:2a:0c:1a:
-        21:f1:1e:19:5f:12:b7:31:58:93:46:12:f0:7e:a8:73:46:a1:
-        df:2b:c3:8c:c1:ea:0f:a3:29:20:e3:ee:ad:6f:d4:a1:db:f9:
-        76:d1:20:71:78:a1:b9:fb:b2:27:df:61:5a:00:17:38:29:f7:
-        65:14:98:26:87:83:a2:84:31:1c:a2:22:12:2f:9a:1d:fa:bd:
-        55:0c:f3:71:10:bb:f5:42:a4:12:01:61:87:2b:3e:46:bd:ad:
-        4b:6b:07:e3:64:30:3a:1f:57:b8:26:44:27:de:c3:8e:07:c6:
-        24:06:97:4a:10:4e:7a:b5:60:d9:b2:4d:4d:ad:38:6f:0e:41:
-        db:f4:a8:51:81:42:79:fd:c5:94:67:8f:21:d5:05:bc:7b:b8:
-        f3:94:8b:39:0c:30:7b:42:09:0f:77:0e:7e:93:e8:35:b0:ac:
-        00:e0:4d:03:a6:3c:f3:96:bf:23:06:95:0d:bb:20:26:9c:7b:
-        86:6c:f6:ff:84:65:a8:35:de:ad:c8:c6:57:c1:00:ae:61:4e:
-        2a:0c:67:f0:9a:e3:36:4a:45:5f:3f:1f:20:13:fe:0a:f9:7d:
-        b5:a4:ba:ba:b5:f6:09:9e:40:fb:c6:d6:f5:74:d4:ea:0d:4b:
-        53:32:89:3d:7b:f5:c3:42:3d:57:69:76:07:28:1a:62:f7:24:
-        c3:a1:cf:6c:77:d6:6e:98:9a:ce:4f:59:e2:94:d7:8d:80:40:
-        f4:eb:84:40:ca:7e:67:0e:58:7c:b8:12:e0:8e:f1:67:05:5e:
-        ff:b4:5e:84:cf:3a:af:d1:26:49:91:8c:60:3c:c6:8a:ed:3f:
-        be:30:0c:f0:1e:62:1d:61:cd:00:d5:7d:97:47:c6:28:94:90:
-        91:47:a1:18:6e:8a:97:6c:51:f4:52:0b:69:d3:c0:4b:2b:7a:
-        1b:cf:3a:7d:d4:56:a5:b4:df:95:d9:b7:db:c1:ee:4c:72:27:
-        21:b4:19:06:de:57:19:e3:7f:22:11:72:9f:01:68:9d:a5:aa:
-        d2:85:85:b8:59:15:c6:24
------BEGIN CERTIFICATE-----
-MIID2jCCAcKgAwIBAgIBMjANBgkqhkiG9w0BAQUFADBaMQswCQYDVQQGEwJLUjET
-MBEGA1UECBMKS3l1bmdHaS1EbzERMA8GA1UEBxMIU3V3b24tU2kxFjAUBgNVBAoT
-DVNhbXN1bmcgRWxlYy4xCzAJBgNVBAMTAkNBMB4XDTA5MDMyNDA3MzAyNloXDTEw
-MDMyNDA3MzAyNlowUTELMAkGA1UEBhMCS1IxEzARBgNVBAgTCkt5dW5nR2ktRG8x
-FjAUBgNVBAoTDVNhbXN1bmcgRWxlYy4xFTATBgNVBAMTDENlcnQgQ2hhaW4gMTCB
-nzANBgkqhkiG9w0BAQEFAAOBjQAwgYkCgYEAx7XL2k3lDFHFc/nR43QbW6xpMhUx
-vG9K8zrb64tgGgX8Bw0cofz3IC5llRhh8u44fo3pD/uh51NNav7Eszm7b/kUsa8T
-JQzzsgzoY9+I21VN0pVhrUf95QT9bO/L2s9OGuGYD91+ATAVxBXpzbr2+IFLNRUu
-kQVk04bFng2tXmkCAwEAAaM4MDYwNAYIKwYBBQUHAQEEKDAmMCQGCCsGAQUFBzAB
-hhhodHRwOi8vMTI3LjAuMC4xOjg5LzAwMDIwDQYJKoZIhvcNAQEFBQADggIBAAog
-WRC3aAONxYK/sk1OpQtUUSdN7Iao8FzojSAj9YHCYXpALNy93X7R8U5wTHd7Ee0b
-S6YeTW2b9JmBOaM9zfwfzhZiBcSZHGjjmNZH6nPksHDT+iO5TYoJkWbvV8toHDnD
-XMOSo9DF22Wv4hhic+SqvsfmpXvnMfAwPioMGiHxHhlfErcxWJNGEvB+qHNGod8r
-w4zB6g+jKSDj7q1v1KHb+XbRIHF4obn7siffYVoAFzgp92UUmCaHg6KEMRyiIhIv
-mh36vVUM83EQu/VCpBIBYYcrPka9rUtrB+NkMDofV7gmRCfew44HxiQGl0oQTnq1
-YNmyTU2tOG8OQdv0qFGBQnn9xZRnjyHVBbx7uPOUizkMMHtCCQ93Dn6T6DWwrADg
-TQOmPPOWvyMGlQ27ICace4Zs9v+EZag13q3IxlfBAK5hTioMZ/Ca4zZKRV8/HyAT
-/gr5fbWkurq19gmeQPvG1vV01OoNS1MyiT179cNCPVdpdgcoGmL3JMOhz2x31m6Y
-ms5PWeKU142AQPTrhEDKfmcOWHy4EuCO8WcFXv+0XoTPOq/RJkmRjGA8xortP74w
-DPAeYh1hzQDVfZdHxiiUkJFHoRhuipdsUfRSC2nTwEsrehvPOn3UVqW035XZt9vB
-7kxyJyG0GQbeVxnjfyIRcp8BaJ2lqtKFhbhZFcYk
------END CERTIFICATE-----
diff --git a/tests/cert-svc/data/TestData/ssl/cert_chain/cert_chain1.key b/tests/cert-svc/data/TestData/ssl/cert_chain/cert_chain1.key
deleted file mode 100644 (file)
index e152d65..0000000
+++ /dev/null
@@ -1,15 +0,0 @@
------BEGIN RSA PRIVATE KEY-----
-MIICXQIBAAKBgQDHtcvaTeUMUcVz+dHjdBtbrGkyFTG8b0rzOtvri2AaBfwHDRyh
-/PcgLmWVGGHy7jh+jekP+6HnU01q/sSzObtv+RSxrxMlDPOyDOhj34jbVU3SlWGt
-R/3lBP1s78vaz04a4ZgP3X4BMBXEFenNuvb4gUs1FS6RBWTThsWeDa1eaQIDAQAB
-AoGBAITKrA6vRsLnSGyyS057cImHXbdQgm6ybdrHY13+odsL6aXioQxRAR1j3GXD
-/bUjk2sK/1KCVghTyqF/X9lwZOGFOM5XsyptHxF/afgBljGzZwW21GBG4hSfSOjm
-+yL2Xhlejol1GbC3D9jLksxrfcKuVFkXbBJVYp1dQ+9wBWvRAkEA8AwIpeMYz4/B
-W83f2FnK81ETeO8DKldFQADlgv4q3F/un2oSCxBglyyq0i7JjdK2/kgxHN62zsxZ
-LeDZUr1z5QJBANT7gO03J8jODO8wqqaS63T/0vxoMHrAF/l/NC0Fpk5AZutDvsn9
-yWLy0PNwJlLzKo8XBCjIY9wVxiwS9/Ic4DUCQFWUpLyns1/Eq7YUNvsGQFHxFNUn
-uWQuCvVfnHPQM+2vkf5prZceNqGO/jPDFH6ooi8UA9Z8HIar2ht+L1zNSHUCQQDI
-Ifk5bv2sfKq8zH9e/WnRzF7nHcSIZB9jLDvMHqXynCPZ6RPL3PWzTDY6uuTYR3Vz
-dg5LgFoNwkwwuDZTRP0NAkAUHcJbjs2ey95utZ/to9Cl+ztaJWoa83dSQCx978l0
-a9O/kVYympJTHCnL8mU9QqePQvJjtgBY4ypcsaJ2luFV
------END RSA PRIVATE KEY-----
diff --git a/tests/cert-svc/data/TestData/ssl/cert_chain/cert_chain10.crl b/tests/cert-svc/data/TestData/ssl/cert_chain/cert_chain10.crl
deleted file mode 100644 (file)
index 1fa3283..0000000
+++ /dev/null
@@ -1,11 +0,0 @@
------BEGIN CERTIFICATE REQUEST-----
-MIIBpTCCAQ4CAQAwZTELMAkGA1UEBhMCS1IxEzARBgNVBAgTCkt5dW5nR2ktRG8x
-ETAPBgNVBAcTCFN1d29uLVNpMRYwFAYDVQQKEw1TYW1zdW5nIEVsZWMuMRYwFAYD
-VQQDEw1DZXJ0IENoYWluIDEwMIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQDa
-eurpTfFGrr35DIHe/fTPE/x0VBv3+9Ow9q4y/hcN35Hid8e3ZItTSLJQxhDTTcLC
-nlPRrzv+0MNkv5VIo16FKffDGUxUCXpCgby58GPrCpA8nfoluO6AUMG5wo0o66Qb
-iLUvDDAEjJeoqZonfFp5A0n87IE5YRxSm5ea8FTbLwIDAQABoAAwDQYJKoZIhvcN
-AQEFBQADgYEAm45LnopOspLWfwwEJxCYyX/DmQ8v7bsm50hvVAn71/Zh9GiD3cnV
-fgsyNQsoPR56gnh9y8QJvZjfUzQue37ueMZyXegCbgn2/bh51HaS3cW6R8Tbq5vq
-PBpU1sXVSRyBK1iqH8DoBH8O5f0a1Tf4vI8k36j/pS3UWZW5T+2Kj9U=
------END CERTIFICATE REQUEST-----
diff --git a/tests/cert-svc/data/TestData/ssl/cert_chain/cert_chain10.crt b/tests/cert-svc/data/TestData/ssl/cert_chain/cert_chain10.crt
deleted file mode 100644 (file)
index 12a7b64..0000000
+++ /dev/null
@@ -1,52 +0,0 @@
-Certificate:
-    Data:
-        Version: 3 (0x2)
-        Serial Number: 55 (0x37)
-        Signature Algorithm: sha1WithRSAEncryption
-        Issuer: C=KR, ST=KyungGi-Do, O=Samsung Elec., CN=Cert Chain 9
-        Validity
-            Not Before: Mar 24 07:09:56 2009 GMT
-            Not After : Mar 24 07:09:56 2010 GMT
-        Subject: C=KR, ST=KyungGi-Do, O=Samsung Elec., CN=Cert Chain 10
-        Subject Public Key Info:
-            Public Key Algorithm: rsaEncryption
-            RSA Public Key: (1024 bit)
-                Modulus (1024 bit):
-                    00:da:7a:ea:e9:4d:f1:46:ae:bd:f9:0c:81:de:fd:
-                    f4:cf:13:fc:74:54:1b:f7:fb:d3:b0:f6:ae:32:fe:
-                    17:0d:df:91:e2:77:c7:b7:64:8b:53:48:b2:50:c6:
-                    10:d3:4d:c2:c2:9e:53:d1:af:3b:fe:d0:c3:64:bf:
-                    95:48:a3:5e:85:29:f7:c3:19:4c:54:09:7a:42:81:
-                    bc:b9:f0:63:eb:0a:90:3c:9d:fa:25:b8:ee:80:50:
-                    c1:b9:c2:8d:28:eb:a4:1b:88:b5:2f:0c:30:04:8c:
-                    97:a8:a9:9a:27:7c:5a:79:03:49:fc:ec:81:39:61:
-                    1c:52:9b:97:9a:f0:54:db:2f
-                Exponent: 65537 (0x10001)
-        X509v3 extensions:
-            Authority Information Access: 
-                OCSP - URI:http://127.0.0.1:89/0002
-
-    Signature Algorithm: sha1WithRSAEncryption
-        81:7f:37:9d:a6:8f:7d:f1:03:b0:78:a3:44:7e:c1:31:27:f0:
-        73:51:eb:55:76:3f:1b:a5:59:0f:5b:ab:2f:ff:72:9d:8a:46:
-        af:30:a4:c1:6a:25:1c:04:b9:22:14:b8:39:52:f1:4f:f0:24:
-        eb:f0:5f:62:79:24:c2:ec:84:92:87:5d:9c:05:87:e8:b1:71:
-        a7:30:fc:03:2d:9f:c5:3b:7c:58:7e:7a:86:75:50:ad:14:5e:
-        f9:69:c4:49:1e:58:33:da:5f:eb:bc:c5:ac:10:2a:dd:3c:87:
-        1c:0f:aa:37:93:c0:68:4c:3d:b4:0c:30:78:63:af:8a:f4:80:
-        e8:8e
------BEGIN CERTIFICATE-----
-MIICUTCCAbqgAwIBAgIBNzANBgkqhkiG9w0BAQUFADBRMQswCQYDVQQGEwJLUjET
-MBEGA1UECBMKS3l1bmdHaS1EbzEWMBQGA1UEChMNU2Ftc3VuZyBFbGVjLjEVMBMG
-A1UEAxMMQ2VydCBDaGFpbiA5MB4XDTA5MDMyNDA3MDk1NloXDTEwMDMyNDA3MDk1
-NlowUjELMAkGA1UEBhMCS1IxEzARBgNVBAgTCkt5dW5nR2ktRG8xFjAUBgNVBAoT
-DVNhbXN1bmcgRWxlYy4xFjAUBgNVBAMTDUNlcnQgQ2hhaW4gMTAwgZ8wDQYJKoZI
-hvcNAQEBBQADgY0AMIGJAoGBANp66ulN8UauvfkMgd799M8T/HRUG/f707D2rjL+
-Fw3fkeJ3x7dki1NIslDGENNNwsKeU9GvO/7Qw2S/lUijXoUp98MZTFQJekKBvLnw
-Y+sKkDyd+iW47oBQwbnCjSjrpBuItS8MMASMl6ipmid8WnkDSfzsgTlhHFKbl5rw
-VNsvAgMBAAGjODA2MDQGCCsGAQUFBwEBBCgwJjAkBggrBgEFBQcwAYYYaHR0cDov
-LzEyNy4wLjAuMTo4OS8wMDAyMA0GCSqGSIb3DQEBBQUAA4GBAIF/N52mj33xA7B4
-o0R+wTEn8HNR61V2PxulWQ9bqy//cp2KRq8wpMFqJRwEuSIUuDlS8U/wJOvwX2J5
-JMLshJKHXZwFh+ixcacw/AMtn8U7fFh+eoZ1UK0UXvlpxEkeWDPaX+u8xawQKt08
-hxwPqjeTwGhMPbQMMHhjr4r0gOiO
------END CERTIFICATE-----
diff --git a/tests/cert-svc/data/TestData/ssl/cert_chain/cert_chain10.key b/tests/cert-svc/data/TestData/ssl/cert_chain/cert_chain10.key
deleted file mode 100644 (file)
index 0cb0874..0000000
+++ /dev/null
@@ -1,15 +0,0 @@
------BEGIN RSA PRIVATE KEY-----
-MIICXgIBAAKBgQDaeurpTfFGrr35DIHe/fTPE/x0VBv3+9Ow9q4y/hcN35Hid8e3
-ZItTSLJQxhDTTcLCnlPRrzv+0MNkv5VIo16FKffDGUxUCXpCgby58GPrCpA8nfol
-uO6AUMG5wo0o66QbiLUvDDAEjJeoqZonfFp5A0n87IE5YRxSm5ea8FTbLwIDAQAB
-AoGBALyImbKeifi+zjzeKCwv5lPUIWSZOFF0xKbPGF/0mBxms1NEndmKMBi8gPPn
-F5ngXpLnYdluaE1qBVMpaD94ixSyDPpma813+TpeuTiyBsTDEWuBmRFkqNLP/G4d
-r6t5QI70416sfeMoDHwLygrFAGhQ+Kd1E7PtuSP+zcEWhK2BAkEA+FPGot/RW5Nv
-geG7v5FlU2Qu/uJHbR4f7yVbHopYh94ulJM3EyLvqbzNguS9RztcdQxt18IBoRLu
-Q1a5bdhrIQJBAOE7DnRG/n5AQpmAMObQaMp9sXafVly3KltLiEkJEImGdgg2H43y
-tf+1mfBoFpGF7tI574bprFT+p/IpG4D+TE8CQFWhVeK+OUxRx+bKt1o0wfMCne4I
-i0bGV464m/YpEKQxanCTXy97IZevYlKbm+VfQ9+c3JfE75jilUSlOCX3teECQQDb
-l1CIXY9SWCSWtDz5TMheZB3ZoY/55TsOt52wV34gF1CMwPgS1UhMfyoPEeyvBP3L
-SWEXEExMsdvcZefC5CxRAkEArkFcrJ8KTJii0neLhFi1UkuKdoGxeVx9TGikV/fr
-wXVLTrG/SyVKjWH+qMyN4B1i23MQsdBtnL6e1+q4tXcwTQ==
------END RSA PRIVATE KEY-----
diff --git a/tests/cert-svc/data/TestData/ssl/cert_chain/cert_chain2.crl b/tests/cert-svc/data/TestData/ssl/cert_chain/cert_chain2.crl
deleted file mode 100644 (file)
index 0549c81..0000000
+++ /dev/null
@@ -1,11 +0,0 @@
------BEGIN CERTIFICATE REQUEST-----
-MIIBpDCCAQ0CAQAwZDELMAkGA1UEBhMCS1IxEzARBgNVBAgTCkt5dW5nR2ktRG8x
-ETAPBgNVBAcTCFN1d29uLVNpMRYwFAYDVQQKEw1TYW1zdW5nIEVsZWMuMRUwEwYD
-VQQDEwxDZXJ0IENoYWluIDIwgZ8wDQYJKoZIhvcNAQEBBQADgY0AMIGJAoGBANte
-pqtg84X2DQcXjK5SeBN1IYzTSiDRDYriNJX/0jEp52LprM5ept33oDjzlrIkBrbI
-xgZXuvDwaQh6wb+HywYrevyBJjaBRgSbmR8fDjYFr33yV/smHaWjW69wHW9VK9bf
-O91LUR4XpomUXhacCP3ZXB6tefFbQsI3WXPZ5bVlAgMBAAGgADANBgkqhkiG9w0B
-AQUFAAOBgQBp9/rm/8Gr74HMFqeYZLcW8UuIi3hykrWlQCCLPgTl8eWc7gYRBVQ+
-cbvSj06cpf0oKivPVfHWTj40e+wG4pWD3czl3KlGpRqPNRM6AzwkRWHZEzlyQ82n
-l3URQ1VRDeuXNhJxUM632NDKFmKK7vil2vjOguLYFTuJhKnHahaLYw==
------END CERTIFICATE REQUEST-----
diff --git a/tests/cert-svc/data/TestData/ssl/cert_chain/cert_chain2.crt b/tests/cert-svc/data/TestData/ssl/cert_chain/cert_chain2.crt
deleted file mode 100644 (file)
index 13cb5c9..0000000
+++ /dev/null
@@ -1,52 +0,0 @@
-Certificate:
-    Data:
-        Version: 3 (0x2)
-        Serial Number: 47 (0x2f)
-        Signature Algorithm: sha1WithRSAEncryption
-        Issuer: C=KR, ST=KyungGi-Do, O=Samsung Elec., CN=Cert Chain 1
-        Validity
-            Not Before: Mar 24 07:09:44 2009 GMT
-            Not After : Mar 24 07:09:44 2010 GMT
-        Subject: C=KR, ST=KyungGi-Do, O=Samsung Elec., CN=Cert Chain 2
-        Subject Public Key Info:
-            Public Key Algorithm: rsaEncryption
-            RSA Public Key: (1024 bit)
-                Modulus (1024 bit):
-                    00:db:5e:a6:ab:60:f3:85:f6:0d:07:17:8c:ae:52:
-                    78:13:75:21:8c:d3:4a:20:d1:0d:8a:e2:34:95:ff:
-                    d2:31:29:e7:62:e9:ac:ce:5e:a6:dd:f7:a0:38:f3:
-                    96:b2:24:06:b6:c8:c6:06:57:ba:f0:f0:69:08:7a:
-                    c1:bf:87:cb:06:2b:7a:fc:81:26:36:81:46:04:9b:
-                    99:1f:1f:0e:36:05:af:7d:f2:57:fb:26:1d:a5:a3:
-                    5b:af:70:1d:6f:55:2b:d6:df:3b:dd:4b:51:1e:17:
-                    a6:89:94:5e:16:9c:08:fd:d9:5c:1e:ad:79:f1:5b:
-                    42:c2:37:59:73:d9:e5:b5:65
-                Exponent: 65537 (0x10001)
-        X509v3 extensions:
-            Authority Information Access: 
-                OCSP - URI:http://127.0.0.1:89/0002
-
-    Signature Algorithm: sha1WithRSAEncryption
-        c1:6c:a1:95:34:3e:32:74:35:1a:cb:76:24:cb:1b:e2:a0:ff:
-        6a:78:ef:8d:7f:dd:40:3f:39:85:aa:19:a9:e5:ce:ca:c4:2d:
-        b8:6c:6d:d4:e9:b1:a2:45:94:16:d7:8b:23:3a:d3:7f:6d:b0:
-        8a:7c:ed:2e:6c:e3:ba:dc:3c:25:4b:13:f4:28:a4:f9:87:b4:
-        69:b5:51:4d:da:d4:7e:9e:0f:99:6e:1a:5a:5f:b5:dc:f2:7b:
-        d5:8f:57:39:61:e3:a8:2e:bc:8a:b7:9d:d3:21:58:81:12:b9:
-        e5:bc:b9:fc:bd:39:2d:e8:8b:c0:49:bc:ba:16:ee:43:58:d9:
-        93:82
------BEGIN CERTIFICATE-----
-MIICUDCCAbmgAwIBAgIBLzANBgkqhkiG9w0BAQUFADBRMQswCQYDVQQGEwJLUjET
-MBEGA1UECBMKS3l1bmdHaS1EbzEWMBQGA1UEChMNU2Ftc3VuZyBFbGVjLjEVMBMG
-A1UEAxMMQ2VydCBDaGFpbiAxMB4XDTA5MDMyNDA3MDk0NFoXDTEwMDMyNDA3MDk0
-NFowUTELMAkGA1UEBhMCS1IxEzARBgNVBAgTCkt5dW5nR2ktRG8xFjAUBgNVBAoT
-DVNhbXN1bmcgRWxlYy4xFTATBgNVBAMTDENlcnQgQ2hhaW4gMjCBnzANBgkqhkiG
-9w0BAQEFAAOBjQAwgYkCgYEA216mq2DzhfYNBxeMrlJ4E3UhjNNKINENiuI0lf/S
-MSnnYumszl6m3fegOPOWsiQGtsjGBle68PBpCHrBv4fLBit6/IEmNoFGBJuZHx8O
-NgWvffJX+yYdpaNbr3Adb1Ur1t873UtRHhemiZReFpwI/dlcHq158VtCwjdZc9nl
-tWUCAwEAAaM4MDYwNAYIKwYBBQUHAQEEKDAmMCQGCCsGAQUFBzABhhhodHRwOi8v
-MTI3LjAuMC4xOjg5LzAwMDIwDQYJKoZIhvcNAQEFBQADgYEAwWyhlTQ+MnQ1Gst2
-JMsb4qD/anjvjX/dQD85haoZqeXOysQtuGxt1OmxokWUFteLIzrTf22winztLmzj
-utw8JUsT9Cik+Ye0abVRTdrUfp4PmW4aWl+13PJ71Y9XOWHjqC68ired0yFYgRK5
-5by5/L05LeiLwEm8uhbuQ1jZk4I=
------END CERTIFICATE-----
diff --git a/tests/cert-svc/data/TestData/ssl/cert_chain/cert_chain2.key b/tests/cert-svc/data/TestData/ssl/cert_chain/cert_chain2.key
deleted file mode 100644 (file)
index 898f118..0000000
+++ /dev/null
@@ -1,15 +0,0 @@
------BEGIN RSA PRIVATE KEY-----
-MIICWwIBAAKBgQDbXqarYPOF9g0HF4yuUngTdSGM00og0Q2K4jSV/9IxKedi6azO
-Xqbd96A485ayJAa2yMYGV7rw8GkIesG/h8sGK3r8gSY2gUYEm5kfHw42Ba998lf7
-Jh2lo1uvcB1vVSvW3zvdS1EeF6aJlF4WnAj92VwerXnxW0LCN1lz2eW1ZQIDAQAB
-AoGAfGJmzrXiXwrsyCCqPA222BGKPHdxiLoAm8c3WfX8ELRZ5tPoj/tLUoCd8Kzt
-vYR/6hRddCs6bHNkmtJAGYG9s20fU7o6TrFJd/l4qjYVNl9cxKaWoMXN3xmANrFD
-3ZiXOotSQrNCqJdllg6AvezCNRL1yDGppWXAL7TM2OGxTAECQQDwYJPFSid+CMR3
-fQTvQBsmdsrUSHaDIENMYHAfq2BqWYIkNRL2PHmhfiQ5yepi1MzQ2clq+2Gbvl8K
-zmMkiEcFAkEA6aCMYZkXCM33+lRnBd447qGpj0uYgH+VGmq9WPhugfag/UtdVfsL
-H3pBnMcfLctot4dFgFGKaAOpMDRVVZBC4QJABQwCDkJgUeUdOuUFFYDjEQutdoeO
-9XHX9+KOeBvBCnqWoOv8We8rHpjnac8zfJ+7LSdlczmT8xEsLa3npvy1gQJAXaBR
-oetQJ98jOdcJUni0KC3xXdPV0elPP773Eui8oKjN67SAOyzYUE0WblX+UMPru2Ei
-oUIMTZLqAr92U0v1AQJAchSMGsAOQ113Ck4O5AWOkegz9EZFkCs9g1kmNxBmLVtv
-11Jw1oMbJG+03OnXyf55zRroTCXqqt8GZUSQrVOg9A==
------END RSA PRIVATE KEY-----
diff --git a/tests/cert-svc/data/TestData/ssl/cert_chain/cert_chain3.crl b/tests/cert-svc/data/TestData/ssl/cert_chain/cert_chain3.crl
deleted file mode 100644 (file)
index e473395..0000000
+++ /dev/null
@@ -1,11 +0,0 @@
------BEGIN CERTIFICATE REQUEST-----
-MIIBpDCCAQ0CAQAwZDELMAkGA1UEBhMCS1IxEzARBgNVBAgTCkt5dW5nR2ktRG8x
-ETAPBgNVBAcTCFN1d29uLVNpMRYwFAYDVQQKEw1TYW1zdW5nIEVsZWMuMRUwEwYD
-VQQDEwxDZXJ0IENoYWluIDMwgZ8wDQYJKoZIhvcNAQEBBQADgY0AMIGJAoGBAMY9
-x+UPx1koqrb8XtANlW3fjIJCbe+prVGsc8HhCqGOgG6sCjVVYT1EMkbZ9wNLMbDi
-orP4kUvjXB1c4EhRUZoGQRriTEVcwCqGRETOAQJW5ptLjV5Jp/lAGwCTkdYuJJ8f
-BFnraFH+dLoSsLh9e8KV/6an/d6KoWn7gIWlpkNPAgMBAAGgADANBgkqhkiG9w0B
-AQUFAAOBgQBj+KktKrbneMSXk1AqRHqT1CyMjwgWmHsEkzsvey/hitowV7vypOGh
-WjBwRJ1SrjZcn54Z+70CcM1Nv4qwSMOK3HhidwAH203CCAgMQoGmH9qYnQ2fbMgr
-DuwIQJbr0Gvm2zvz5Xrvj78OrnhX/X3YjWLtVhh1XeoUCTo8HVrgaA==
------END CERTIFICATE REQUEST-----
diff --git a/tests/cert-svc/data/TestData/ssl/cert_chain/cert_chain3.crt b/tests/cert-svc/data/TestData/ssl/cert_chain/cert_chain3.crt
deleted file mode 100644 (file)
index 96152fc..0000000
+++ /dev/null
@@ -1,52 +0,0 @@
-Certificate:
-    Data:
-        Version: 3 (0x2)
-        Serial Number: 48 (0x30)
-        Signature Algorithm: sha1WithRSAEncryption
-        Issuer: C=KR, ST=KyungGi-Do, O=Samsung Elec., CN=Cert Chain 2
-        Validity
-            Not Before: Mar 24 07:09:46 2009 GMT
-            Not After : Mar 24 07:09:46 2010 GMT
-        Subject: C=KR, ST=KyungGi-Do, O=Samsung Elec., CN=Cert Chain 3
-        Subject Public Key Info:
-            Public Key Algorithm: rsaEncryption
-            RSA Public Key: (1024 bit)
-                Modulus (1024 bit):
-                    00:c6:3d:c7:e5:0f:c7:59:28:aa:b6:fc:5e:d0:0d:
-                    95:6d:df:8c:82:42:6d:ef:a9:ad:51:ac:73:c1:e1:
-                    0a:a1:8e:80:6e:ac:0a:35:55:61:3d:44:32:46:d9:
-                    f7:03:4b:31:b0:e2:a2:b3:f8:91:4b:e3:5c:1d:5c:
-                    e0:48:51:51:9a:06:41:1a:e2:4c:45:5c:c0:2a:86:
-                    44:44:ce:01:02:56:e6:9b:4b:8d:5e:49:a7:f9:40:
-                    1b:00:93:91:d6:2e:24:9f:1f:04:59:eb:68:51:fe:
-                    74:ba:12:b0:b8:7d:7b:c2:95:ff:a6:a7:fd:de:8a:
-                    a1:69:fb:80:85:a5:a6:43:4f
-                Exponent: 65537 (0x10001)
-        X509v3 extensions:
-            Authority Information Access: 
-                OCSP - URI:http://127.0.0.1:89/0002
-
-    Signature Algorithm: sha1WithRSAEncryption
-        87:26:72:c1:5b:e8:04:3a:3f:c5:65:24:17:7a:e5:40:67:f3:
-        1e:cd:91:0c:75:bd:aa:14:61:d1:1a:2c:d7:11:21:bb:a3:70:
-        92:54:e5:3d:30:d1:b5:50:73:72:1b:72:e8:47:b0:af:a9:85:
-        f5:e4:d5:53:d5:db:4d:88:48:00:4c:69:32:ab:f2:a8:d0:57:
-        90:c6:24:fc:7b:77:de:6c:dd:c5:c9:6e:5b:21:15:73:4d:4d:
-        f7:a3:ca:31:60:84:24:e9:4d:21:fc:88:ce:13:99:35:76:4c:
-        e7:26:47:43:a7:eb:79:bd:7e:aa:80:48:ad:5c:46:ae:ab:74:
-        9e:29
------BEGIN CERTIFICATE-----
-MIICUDCCAbmgAwIBAgIBMDANBgkqhkiG9w0BAQUFADBRMQswCQYDVQQGEwJLUjET
-MBEGA1UECBMKS3l1bmdHaS1EbzEWMBQGA1UEChMNU2Ftc3VuZyBFbGVjLjEVMBMG
-A1UEAxMMQ2VydCBDaGFpbiAyMB4XDTA5MDMyNDA3MDk0NloXDTEwMDMyNDA3MDk0
-NlowUTELMAkGA1UEBhMCS1IxEzARBgNVBAgTCkt5dW5nR2ktRG8xFjAUBgNVBAoT
-DVNhbXN1bmcgRWxlYy4xFTATBgNVBAMTDENlcnQgQ2hhaW4gMzCBnzANBgkqhkiG
-9w0BAQEFAAOBjQAwgYkCgYEAxj3H5Q/HWSiqtvxe0A2Vbd+MgkJt76mtUaxzweEK
-oY6AbqwKNVVhPUQyRtn3A0sxsOKis/iRS+NcHVzgSFFRmgZBGuJMRVzAKoZERM4B
-Albmm0uNXkmn+UAbAJOR1i4knx8EWetoUf50uhKwuH17wpX/pqf93oqhafuAhaWm
-Q08CAwEAAaM4MDYwNAYIKwYBBQUHAQEEKDAmMCQGCCsGAQUFBzABhhhodHRwOi8v
-MTI3LjAuMC4xOjg5LzAwMDIwDQYJKoZIhvcNAQEFBQADgYEAhyZywVvoBDo/xWUk
-F3rlQGfzHs2RDHW9qhRh0Ros1xEhu6NwklTlPTDRtVBzchty6Eewr6mF9eTVU9Xb
-TYhIAExpMqvyqNBXkMYk/Ht33mzdxcluWyEVc01N96PKMWCEJOlNIfyIzhOZNXZM
-5yZHQ6freb1+qoBIrVxGrqt0nik=
------END CERTIFICATE-----
diff --git a/tests/cert-svc/data/TestData/ssl/cert_chain/cert_chain3.key b/tests/cert-svc/data/TestData/ssl/cert_chain/cert_chain3.key
deleted file mode 100644 (file)
index 8deae87..0000000
+++ /dev/null
@@ -1,15 +0,0 @@
------BEGIN RSA PRIVATE KEY-----
-MIICXAIBAAKBgQDGPcflD8dZKKq2/F7QDZVt34yCQm3vqa1RrHPB4QqhjoBurAo1
-VWE9RDJG2fcDSzGw4qKz+JFL41wdXOBIUVGaBkEa4kxFXMAqhkREzgECVuabS41e
-Saf5QBsAk5HWLiSfHwRZ62hR/nS6ErC4fXvClf+mp/3eiqFp+4CFpaZDTwIDAQAB
-AoGBAIJPyj7AiIILQWzXqFuLElcPRAW8NRf9qXiuq8kebSaVzcbyQCOe5DSpx4Lb
-dIwtuZRU5i73jkscQUjr7GKdUc2NHvCDQzjnk7S5uu8NFiHXqVXDJxHwAZI0svzD
-vFilu2E3r9Wj7dZa7l4uSEXLyagdwo0bD2xcrdwnyu5qLTuBAkEA7CUIGOEAK7ly
-Xweti+/fnni6cznMmWi1DDeM39GtbxHI3oPa2d7Ddkn5ZWRtFbIepLWi5+k6Xzpz
-fkCaA3js9wJBANbo4y/L/QKNhASI70DlKwFiJr+4RmQ1739l2BDHW+8crw+sM3VZ
-exVtHHKw6U6wqLMvzaojVZwnEJo05uWQ/mkCQGU7jtgThN45ttUUVoq5/3RRLyT8
-b0CIyax+F+9PVPlbd3AkuGpT/Bk2pyqXPchiPo6/qyGeMz7lsOM70IqSiYsCQGUU
-6u6rSpityT98zNPANmcTLFiWqv0tZTWNyH+z1Sj1W93KR/XVHZBpXq0PSt1JOD/3
-pwt0TSsCMMvnQAcQGKkCQCXU5eHdRmhCp9Eei5+fI+XUhBLkqzyrqlK1NVijgXTE
-kSXhaQWG9iLDDNgSkO6ofCPOTwcfIteXnc1OjGB/0Jk=
------END RSA PRIVATE KEY-----
diff --git a/tests/cert-svc/data/TestData/ssl/cert_chain/cert_chain4.crl b/tests/cert-svc/data/TestData/ssl/cert_chain/cert_chain4.crl
deleted file mode 100644 (file)
index e0cfc75..0000000
+++ /dev/null
@@ -1,11 +0,0 @@
------BEGIN CERTIFICATE REQUEST-----
-MIIBpDCCAQ0CAQAwZDELMAkGA1UEBhMCS1IxEzARBgNVBAgTCkt5dW5nR2ktRG8x
-ETAPBgNVBAcTCFN1d29uLVNpMRYwFAYDVQQKEw1TYW1zdW5nIEVsZWMuMRUwEwYD
-VQQDEwxDZXJ0IENoYWluIDQwgZ8wDQYJKoZIhvcNAQEBBQADgY0AMIGJAoGBALoF
-MPZlb8bkVABxHIVsXlpCZ99m4qNpvoXZhMCLG71N8u/fAdNlM/lmmgh54SFuiuY8
-3JbyQ+kyaJ0GBtf8+9LaWBaBGczXQyD0hcEDmzTAbHqhGV1PQYz7dH1Mhshv+fLI
-1DjMwEQLwLANSCssxp+SIS2A3Uu92uJ9rfVdp6V/AgMBAAGgADANBgkqhkiG9w0B
-AQUFAAOBgQCDwFPg48L29Vm880XqQ9ngfj9ylWk3wbW4SFnSNVRoC7g476/dNg7R
-lMyuzHOGYWPQUDUBB9hrlIgOo11jihD3VMVSZRfz4U/+yPq6AU6J5QB8p8ibz5gE
-sjyUHkuc9lwniTtZvqbVuvXM73UlqQJ3Y5OCW1nrAE5eoaH9Zr7ifg==
------END CERTIFICATE REQUEST-----
diff --git a/tests/cert-svc/data/TestData/ssl/cert_chain/cert_chain4.crt b/tests/cert-svc/data/TestData/ssl/cert_chain/cert_chain4.crt
deleted file mode 100644 (file)
index c13a05c..0000000
+++ /dev/null
@@ -1,52 +0,0 @@
-Certificate:
-    Data:
-        Version: 3 (0x2)
-        Serial Number: 49 (0x31)
-        Signature Algorithm: sha1WithRSAEncryption
-        Issuer: C=KR, ST=KyungGi-Do, O=Samsung Elec., CN=Cert Chain 3
-        Validity
-            Not Before: Mar 24 07:09:47 2009 GMT
-            Not After : Mar 24 07:09:47 2010 GMT
-        Subject: C=KR, ST=KyungGi-Do, O=Samsung Elec., CN=Cert Chain 4
-        Subject Public Key Info:
-            Public Key Algorithm: rsaEncryption
-            RSA Public Key: (1024 bit)
-                Modulus (1024 bit):
-                    00:ba:05:30:f6:65:6f:c6:e4:54:00:71:1c:85:6c:
-                    5e:5a:42:67:df:66:e2:a3:69:be:85:d9:84:c0:8b:
-                    1b:bd:4d:f2:ef:df:01:d3:65:33:f9:66:9a:08:79:
-                    e1:21:6e:8a:e6:3c:dc:96:f2:43:e9:32:68:9d:06:
-                    06:d7:fc:fb:d2:da:58:16:81:19:cc:d7:43:20:f4:
-                    85:c1:03:9b:34:c0:6c:7a:a1:19:5d:4f:41:8c:fb:
-                    74:7d:4c:86:c8:6f:f9:f2:c8:d4:38:cc:c0:44:0b:
-                    c0:b0:0d:48:2b:2c:c6:9f:92:21:2d:80:dd:4b:bd:
-                    da:e2:7d:ad:f5:5d:a7:a5:7f
-                Exponent: 65537 (0x10001)
-        X509v3 extensions:
-            Authority Information Access: 
-                OCSP - URI:http://127.0.0.1:89/0002
-
-    Signature Algorithm: sha1WithRSAEncryption
-        b6:bc:69:88:2c:7a:dd:69:8b:90:cf:a8:ec:33:db:ad:10:06:
-        ad:d2:94:ee:cf:d3:33:97:ac:60:38:e0:5a:a4:7b:d0:ca:a7:
-        5c:19:be:93:1c:61:85:14:08:f0:35:44:99:d4:7e:b0:fb:be:
-        4e:5c:18:a9:b9:b5:9a:91:4e:d1:e1:44:8d:ec:ca:4e:eb:6e:
-        17:27:76:0d:57:ad:cf:32:e4:a5:bc:b6:ad:22:e5:27:6d:11:
-        81:4d:4c:09:14:ea:11:7c:81:14:5e:fb:95:4d:f3:1d:5d:d0:
-        f9:b6:45:e7:c5:c6:40:21:64:60:2e:71:1f:32:dc:21:fe:5c:
-        45:da
------BEGIN CERTIFICATE-----
-MIICUDCCAbmgAwIBAgIBMTANBgkqhkiG9w0BAQUFADBRMQswCQYDVQQGEwJLUjET
-MBEGA1UECBMKS3l1bmdHaS1EbzEWMBQGA1UEChMNU2Ftc3VuZyBFbGVjLjEVMBMG
-A1UEAxMMQ2VydCBDaGFpbiAzMB4XDTA5MDMyNDA3MDk0N1oXDTEwMDMyNDA3MDk0
-N1owUTELMAkGA1UEBhMCS1IxEzARBgNVBAgTCkt5dW5nR2ktRG8xFjAUBgNVBAoT
-DVNhbXN1bmcgRWxlYy4xFTATBgNVBAMTDENlcnQgQ2hhaW4gNDCBnzANBgkqhkiG
-9w0BAQEFAAOBjQAwgYkCgYEAugUw9mVvxuRUAHEchWxeWkJn32bio2m+hdmEwIsb
-vU3y798B02Uz+WaaCHnhIW6K5jzclvJD6TJonQYG1/z70tpYFoEZzNdDIPSFwQOb
-NMBseqEZXU9BjPt0fUyGyG/58sjUOMzARAvAsA1IKyzGn5IhLYDdS73a4n2t9V2n
-pX8CAwEAAaM4MDYwNAYIKwYBBQUHAQEEKDAmMCQGCCsGAQUFBzABhhhodHRwOi8v
-MTI3LjAuMC4xOjg5LzAwMDIwDQYJKoZIhvcNAQEFBQADgYEAtrxpiCx63WmLkM+o
-7DPbrRAGrdKU7s/TM5esYDjgWqR70MqnXBm+kxxhhRQI8DVEmdR+sPu+TlwYqbm1
-mpFO0eFEjezKTutuFyd2DVetzzLkpby2rSLlJ20RgU1MCRTqEXyBFF77lU3zHV3Q
-+bZF58XGQCFkYC5xHzLcIf5cRdo=
------END CERTIFICATE-----
diff --git a/tests/cert-svc/data/TestData/ssl/cert_chain/cert_chain4.key b/tests/cert-svc/data/TestData/ssl/cert_chain/cert_chain4.key
deleted file mode 100644 (file)
index 7e246a9..0000000
+++ /dev/null
@@ -1,15 +0,0 @@
------BEGIN RSA PRIVATE KEY-----
-MIICXAIBAAKBgQC6BTD2ZW/G5FQAcRyFbF5aQmffZuKjab6F2YTAixu9TfLv3wHT
-ZTP5ZpoIeeEhbormPNyW8kPpMmidBgbX/PvS2lgWgRnM10Mg9IXBA5s0wGx6oRld
-T0GM+3R9TIbIb/nyyNQ4zMBEC8CwDUgrLMafkiEtgN1Lvdrifa31XaelfwIDAQAB
-AoGAV3w1iMwwA5RCxWptBXrv7PcqLvEOSdhjmEOyoXNK+n78cD+rdiY0iWjtrGrV
-rIl2nc2l2P/bXIMunBrHgTEjpTtQQIr1n8xqCJeyLXaVaCi2rjLYSdvxC+lABoMc
-/+pODEWl1VJdEckXg9w8Jr7VY0toc3zeKbsZJuGr2O559xECQQDiYqx/fFhMb6tN
-+/LkhLCCgeHbURSW7UABiOocNE2crznHfZcWSD04GLH/UgwhP3RJ6CHcOtmXSD11
-ZQkNugZ9AkEA0lq+2QxhcFDAeJWfeFFZLw8I67xRY6tlZIiOQyWnRFVh6eHPvduU
-BfYxBU6FA9G0MAWgGxgZqtOLxqnQIuuQqwJBALlnSJCsHICVH/2hLv66MPjhOEDu
-uWcV7MqU/+6TY1DELRTVJWzJQuHzT6uj3W1JU4rHwxtjUxrTvgmr8ms8g90CQCGE
-2kJlyaUHCRRt6yJV/BsWjzpZILL8HcT+SYUDm/q0jEyjceHz+ktU5ozM7T8ljEvW
-qaOHnJdu7Cf06TiXRs8CQGMP4OjEfVMq+JxG5puFaa8e1fbSjiTP4EsUgRcE1Bzj
-UqT7VwOrJZXFTYK7Z9ZyG7z03WpVeucertzdRNNby9A=
------END RSA PRIVATE KEY-----
diff --git a/tests/cert-svc/data/TestData/ssl/cert_chain/cert_chain5.crl b/tests/cert-svc/data/TestData/ssl/cert_chain/cert_chain5.crl
deleted file mode 100644 (file)
index f49d3a7..0000000
+++ /dev/null
@@ -1,11 +0,0 @@
------BEGIN CERTIFICATE REQUEST-----
-MIIBpDCCAQ0CAQAwZDELMAkGA1UEBhMCS1IxEzARBgNVBAgTCkt5dW5nR2ktRG8x
-ETAPBgNVBAcTCFN1d29uLVNpMRYwFAYDVQQKEw1TYW1zdW5nIEVsZWMuMRUwEwYD
-VQQDEwxDZXJ0IENoYWluIDUwgZ8wDQYJKoZIhvcNAQEBBQADgY0AMIGJAoGBAK9m
-4MEu+XXtCyezOskdnzkh+RTuHKTuw/AkpsdD3fkD0EQB5RnpeyZlPD09mrlpKgBG
-DssgmMadN34MkKbXsFQrS/M+mxkzoTTrYuO5u/7MyjrZ/HEKZe8w8/QbVfCLuRLY
-UCUlrF1jn9HFIfJaBLEqNKASYA+KPquih+Vb1ki/AgMBAAGgADANBgkqhkiG9w0B
-AQUFAAOBgQBOhSWuteVBcr9zMnKrrNFAGKZJ4TBgqfPP5zjIoDnk8vE+7B0gUot3
-sp+sUkA03izQ5Ctx8Rdd9D4P752f2XEk+lEftnOokLcZu6EXgVtYh1aHqTFqyzK+
-3Ap/3yYmdC0KBbzIF7fDS/vTGJLlkEu5WpswNxfEvPEs7z9T6hdtXg==
------END CERTIFICATE REQUEST-----
diff --git a/tests/cert-svc/data/TestData/ssl/cert_chain/cert_chain5.crt b/tests/cert-svc/data/TestData/ssl/cert_chain/cert_chain5.crt
deleted file mode 100644 (file)
index c5549bf..0000000
+++ /dev/null
@@ -1,52 +0,0 @@
-Certificate:
-    Data:
-        Version: 3 (0x2)
-        Serial Number: 50 (0x32)
-        Signature Algorithm: sha1WithRSAEncryption
-        Issuer: C=KR, ST=KyungGi-Do, O=Samsung Elec., CN=Cert Chain 4
-        Validity
-            Not Before: Mar 24 07:09:48 2009 GMT
-            Not After : Mar 24 07:09:48 2010 GMT
-        Subject: C=KR, ST=KyungGi-Do, O=Samsung Elec., CN=Cert Chain 5
-        Subject Public Key Info:
-            Public Key Algorithm: rsaEncryption
-            RSA Public Key: (1024 bit)
-                Modulus (1024 bit):
-                    00:af:66:e0:c1:2e:f9:75:ed:0b:27:b3:3a:c9:1d:
-                    9f:39:21:f9:14:ee:1c:a4:ee:c3:f0:24:a6:c7:43:
-                    dd:f9:03:d0:44:01:e5:19:e9:7b:26:65:3c:3d:3d:
-                    9a:b9:69:2a:00:46:0e:cb:20:98:c6:9d:37:7e:0c:
-                    90:a6:d7:b0:54:2b:4b:f3:3e:9b:19:33:a1:34:eb:
-                    62:e3:b9:bb:fe:cc:ca:3a:d9:fc:71:0a:65:ef:30:
-                    f3:f4:1b:55:f0:8b:b9:12:d8:50:25:25:ac:5d:63:
-                    9f:d1:c5:21:f2:5a:04:b1:2a:34:a0:12:60:0f:8a:
-                    3e:ab:a2:87:e5:5b:d6:48:bf
-                Exponent: 65537 (0x10001)
-        X509v3 extensions:
-            Authority Information Access: 
-                OCSP - URI:http://127.0.0.1:89/0002
-
-    Signature Algorithm: sha1WithRSAEncryption
-        9f:b3:eb:f1:0b:e7:fa:c3:f0:6a:3b:ba:67:c3:ae:48:51:63:
-        2c:7a:b9:c7:cd:d9:92:46:75:40:a5:a2:d6:ba:8e:a1:cb:c7:
-        fd:5d:98:f7:2a:e5:0a:06:49:42:8a:e0:09:b1:eb:18:9c:c9:
-        1b:e5:d1:4f:a0:0a:a6:14:68:54:7a:b7:9b:f6:44:c5:d8:a1:
-        21:99:c9:49:db:64:a5:53:48:5f:b6:d3:ba:fa:73:67:10:10:
-        5e:12:45:f8:27:a8:e0:fb:7c:16:73:fb:98:e1:3e:35:f3:de:
-        7c:b7:1c:42:2d:d2:9b:8e:03:f5:5f:c7:2f:51:b1:ff:73:45:
-        d2:70
------BEGIN CERTIFICATE-----
-MIICUDCCAbmgAwIBAgIBMjANBgkqhkiG9w0BAQUFADBRMQswCQYDVQQGEwJLUjET
-MBEGA1UECBMKS3l1bmdHaS1EbzEWMBQGA1UEChMNU2Ftc3VuZyBFbGVjLjEVMBMG
-A1UEAxMMQ2VydCBDaGFpbiA0MB4XDTA5MDMyNDA3MDk0OFoXDTEwMDMyNDA3MDk0
-OFowUTELMAkGA1UEBhMCS1IxEzARBgNVBAgTCkt5dW5nR2ktRG8xFjAUBgNVBAoT
-DVNhbXN1bmcgRWxlYy4xFTATBgNVBAMTDENlcnQgQ2hhaW4gNTCBnzANBgkqhkiG
-9w0BAQEFAAOBjQAwgYkCgYEAr2bgwS75de0LJ7M6yR2fOSH5FO4cpO7D8CSmx0Pd
-+QPQRAHlGel7JmU8PT2auWkqAEYOyyCYxp03fgyQptewVCtL8z6bGTOhNOti47m7
-/szKOtn8cQpl7zDz9BtV8Iu5EthQJSWsXWOf0cUh8loEsSo0oBJgD4o+q6KH5VvW
-SL8CAwEAAaM4MDYwNAYIKwYBBQUHAQEEKDAmMCQGCCsGAQUFBzABhhhodHRwOi8v
-MTI3LjAuMC4xOjg5LzAwMDIwDQYJKoZIhvcNAQEFBQADgYEAn7Pr8Qvn+sPwaju6
-Z8OuSFFjLHq5x83ZkkZ1QKWi1rqOocvH/V2Y9yrlCgZJQorgCbHrGJzJG+XRT6AK
-phRoVHq3m/ZExdihIZnJSdtkpVNIX7bTuvpzZxAQXhJF+Ceo4Pt8FnP7mOE+NfPe
-fLccQi3Sm44D9V/HL1Gx/3NF0nA=
------END CERTIFICATE-----
diff --git a/tests/cert-svc/data/TestData/ssl/cert_chain/cert_chain5.key b/tests/cert-svc/data/TestData/ssl/cert_chain/cert_chain5.key
deleted file mode 100644 (file)
index 756db4d..0000000
+++ /dev/null
@@ -1,15 +0,0 @@
------BEGIN RSA PRIVATE KEY-----
-MIICXgIBAAKBgQCvZuDBLvl17QsnszrJHZ85IfkU7hyk7sPwJKbHQ935A9BEAeUZ
-6XsmZTw9PZq5aSoARg7LIJjGnTd+DJCm17BUK0vzPpsZM6E062Ljubv+zMo62fxx
-CmXvMPP0G1Xwi7kS2FAlJaxdY5/RxSHyWgSxKjSgEmAPij6rooflW9ZIvwIDAQAB
-AoGAUnAV3nYHhSdeANC6JmAnv6B6Ax5OlC4sJSf0wt7g6vKh5fTGCsGzwb3+7AGS
-QOZueSZ0OYAejerCdBnPurrRAlZLifGptbvinAu9lRDpmaF2HUmQa4Dc0c+Y1Roa
-pzWnPzMWlBrhmWqmK/DwZNJ+Vusufv3yO8epjsOGCgUVUiECQQDnRPDf0KyJlzC5
-Xc9Dc3/pdn0D6La3IChyLiPo10rg5dBN/mTCnlPxnvauiTQkyPS7j+2n2oUKwcEE
-jVuwKf/ZAkEAwiiNEsejDkTLHIwDVkNa14+Glh3s0Ct5ajFv1HslQesKElMnjKVy
-ab7YAQBij9Ty24p3K6mdGWY5Nwe02JNGVwJBAK++OfU61AJyu/oBCaHOQWOeQP4Z
-d8/NRi8OVQd5o1MoEJVUPimOu2efTwHvDYruktt9UjH94p/8ALt+2DAUmnECQQCw
-EyhEdKlJYle0DsFj9Hcob2+FKaQ98H8OL8ETt43FJsqebay7HrsQbNLkrZ20hFCt
-ifeisBHZG9wdLK7zjTPHAkEAnGsXnM+YYDlm4OwChrpq0qcuud5uOgx4RuCniEol
-mij1xTDGrJGLEBkFhZ+KwOLoaM8m7javKXQejqTeE6E8Fg==
------END RSA PRIVATE KEY-----
diff --git a/tests/cert-svc/data/TestData/ssl/cert_chain/cert_chain6.crl b/tests/cert-svc/data/TestData/ssl/cert_chain/cert_chain6.crl
deleted file mode 100644 (file)
index 290f526..0000000
+++ /dev/null
@@ -1,11 +0,0 @@
------BEGIN CERTIFICATE REQUEST-----
-MIIBpDCCAQ0CAQAwZDELMAkGA1UEBhMCS1IxEzARBgNVBAgTCkt5dW5nR2ktRG8x
-ETAPBgNVBAcTCFN1d29uLVNpMRYwFAYDVQQKEw1TYW1zdW5nIEVsZWMuMRUwEwYD
-VQQDEwxDZXJ0IENoYWluIDYwgZ8wDQYJKoZIhvcNAQEBBQADgY0AMIGJAoGBAM4S
-INEUYAFHqkxmG0xPhy/sr/wRQb3ZmHq44d1Z0MCeQNK3i8eKZeoNDDbx5kVh3G8I
-J2LQeBsmcdT+C5/qhhtDxwjWxetbEcmLg46nBQ1cbM6rcOB9BeoGOfmMlFZWN2Kz
-GHe94VtToQdNx8zGTC7vqoMZtazjcisNcnoKyoFvAgMBAAGgADANBgkqhkiG9w0B
-AQUFAAOBgQAU4t4likO62t1Pvrg9g4o/bx9Z7ccdQyJSF3dG+gL1dJs71aas8hBV
-Z5tnuuX0VIw8Ze7pSqCltNJb1OKYT6XNrxipTWbqrJURVyLHXOPJiq7O3+Ug/8qP
-a155z1LbEabXHPjDzCZ3TXplWDgfEGfa3iA2DOQsxZlrRdqrcrskeA==
------END CERTIFICATE REQUEST-----
diff --git a/tests/cert-svc/data/TestData/ssl/cert_chain/cert_chain6.crt b/tests/cert-svc/data/TestData/ssl/cert_chain/cert_chain6.crt
deleted file mode 100644 (file)
index 08c010b..0000000
+++ /dev/null
@@ -1,52 +0,0 @@
-Certificate:
-    Data:
-        Version: 3 (0x2)
-        Serial Number: 51 (0x33)
-        Signature Algorithm: sha1WithRSAEncryption
-        Issuer: C=KR, ST=KyungGi-Do, O=Samsung Elec., CN=Cert Chain 5
-        Validity
-            Not Before: Mar 24 07:09:51 2009 GMT
-            Not After : Mar 24 07:09:51 2010 GMT
-        Subject: C=KR, ST=KyungGi-Do, O=Samsung Elec., CN=Cert Chain 6
-        Subject Public Key Info:
-            Public Key Algorithm: rsaEncryption
-            RSA Public Key: (1024 bit)
-                Modulus (1024 bit):
-                    00:ce:12:20:d1:14:60:01:47:aa:4c:66:1b:4c:4f:
-                    87:2f:ec:af:fc:11:41:bd:d9:98:7a:b8:e1:dd:59:
-                    d0:c0:9e:40:d2:b7:8b:c7:8a:65:ea:0d:0c:36:f1:
-                    e6:45:61:dc:6f:08:27:62:d0:78:1b:26:71:d4:fe:
-                    0b:9f:ea:86:1b:43:c7:08:d6:c5:eb:5b:11:c9:8b:
-                    83:8e:a7:05:0d:5c:6c:ce:ab:70:e0:7d:05:ea:06:
-                    39:f9:8c:94:56:56:37:62:b3:18:77:bd:e1:5b:53:
-                    a1:07:4d:c7:cc:c6:4c:2e:ef:aa:83:19:b5:ac:e3:
-                    72:2b:0d:72:7a:0a:ca:81:6f
-                Exponent: 65537 (0x10001)
-        X509v3 extensions:
-            Authority Information Access: 
-                OCSP - URI:http://127.0.0.1:89/0002
-
-    Signature Algorithm: sha1WithRSAEncryption
-        47:f3:03:ee:f0:fe:31:bb:01:47:ca:0e:69:65:a2:f8:4a:6f:
-        ca:6c:86:80:42:e3:87:49:22:b9:15:f0:da:b6:ca:d9:8b:7f:
-        f9:38:c0:72:d0:d1:b3:44:8d:95:5e:ab:e7:ad:37:34:ba:8b:
-        2f:11:64:b5:20:09:70:fe:cf:6d:3e:d3:7f:f7:f1:ae:31:74:
-        aa:ae:a7:0b:65:4e:e0:0b:80:87:25:d0:0c:bc:db:f5:ac:0c:
-        18:8e:4b:c2:42:88:e6:29:4f:2e:6e:df:72:f4:2f:27:39:b8:
-        e4:dc:64:1a:d7:c8:f3:f8:42:53:60:53:24:d7:38:75:50:bc:
-        d1:30
------BEGIN CERTIFICATE-----
-MIICUDCCAbmgAwIBAgIBMzANBgkqhkiG9w0BAQUFADBRMQswCQYDVQQGEwJLUjET
-MBEGA1UECBMKS3l1bmdHaS1EbzEWMBQGA1UEChMNU2Ftc3VuZyBFbGVjLjEVMBMG
-A1UEAxMMQ2VydCBDaGFpbiA1MB4XDTA5MDMyNDA3MDk1MVoXDTEwMDMyNDA3MDk1
-MVowUTELMAkGA1UEBhMCS1IxEzARBgNVBAgTCkt5dW5nR2ktRG8xFjAUBgNVBAoT
-DVNhbXN1bmcgRWxlYy4xFTATBgNVBAMTDENlcnQgQ2hhaW4gNjCBnzANBgkqhkiG
-9w0BAQEFAAOBjQAwgYkCgYEAzhIg0RRgAUeqTGYbTE+HL+yv/BFBvdmYerjh3VnQ
-wJ5A0reLx4pl6g0MNvHmRWHcbwgnYtB4GyZx1P4Ln+qGG0PHCNbF61sRyYuDjqcF
-DVxszqtw4H0F6gY5+YyUVlY3YrMYd73hW1OhB03HzMZMLu+qgxm1rONyKw1yegrK
-gW8CAwEAAaM4MDYwNAYIKwYBBQUHAQEEKDAmMCQGCCsGAQUFBzABhhhodHRwOi8v
-MTI3LjAuMC4xOjg5LzAwMDIwDQYJKoZIhvcNAQEFBQADgYEAR/MD7vD+MbsBR8oO
-aWWi+EpvymyGgELjh0kiuRXw2rbK2Yt/+TjActDRs0SNlV6r5603NLqLLxFktSAJ
-cP7PbT7Tf/fxrjF0qq6nC2VO4AuAhyXQDLzb9awMGI5LwkKI5ilPLm7fcvQvJzm4
-5NxkGtfI8/hCU2BTJNc4dVC80TA=
------END CERTIFICATE-----
diff --git a/tests/cert-svc/data/TestData/ssl/cert_chain/cert_chain6.key b/tests/cert-svc/data/TestData/ssl/cert_chain/cert_chain6.key
deleted file mode 100644 (file)
index db255f5..0000000
+++ /dev/null
@@ -1,15 +0,0 @@
------BEGIN RSA PRIVATE KEY-----
-MIICXQIBAAKBgQDOEiDRFGABR6pMZhtMT4cv7K/8EUG92Zh6uOHdWdDAnkDSt4vH
-imXqDQw28eZFYdxvCCdi0HgbJnHU/guf6oYbQ8cI1sXrWxHJi4OOpwUNXGzOq3Dg
-fQXqBjn5jJRWVjdisxh3veFbU6EHTcfMxkwu76qDGbWs43IrDXJ6CsqBbwIDAQAB
-AoGAWzE2iI/ltGtMd6av6eM/xfuOHZRdbXB/w79RZK08biEaOqWzG8ipNRw1DZOa
-/ZVDAXewRlBO9mTa9xC9gDU+xsKywipWyRPnv5Yy7qfT+NP/JZCvwlL7qhqtHXzt
-KPpJ5GRxcJ+o05CartwA7fCXdv9T/qF02O2nZxCIYOpFRwECQQDqMoXwT37xvE5/
-/efvGAlBQGCj02YdjBxWRwx5iq1HeU5H4tqTKrfUWyI1m3cZFXUzjz0iH/SoK2jL
-7IwMwl9BAkEA4UFIcDVADwJMuLPqKuIDB49rXY+BO9mno9hfgcZ4Y/fWZcF+lJtR
-Mw8H+PsCkObu603wxiQGWIsyZPorDTZkrwJAU7S7Kqk/NieX5ydZPpvYsvnPkL5+
-QRFTD4NVchue020IDamHdhJOohfwojhu2QhSW5tWvlutlm3thvWFGQpgAQJBAIHz
-uMfLYM6H5B025qSgyWCmNCnA7azKr/VNkiP7jV8XD2CbFdzEEj9jr5TLszpHkJS9
-3WdiRyrz+znYPdgchk8CQQCzC1Z/NbGXu7H/OjsMD6SNgpZDmqctdXjn6jKjZr7c
-vtyoo2WkJtkREWzWPd+pEDxJCsAuxMCtVifJYLkMCa+w
------END RSA PRIVATE KEY-----
diff --git a/tests/cert-svc/data/TestData/ssl/cert_chain/cert_chain7.crl b/tests/cert-svc/data/TestData/ssl/cert_chain/cert_chain7.crl
deleted file mode 100644 (file)
index 82ced09..0000000
+++ /dev/null
@@ -1,11 +0,0 @@
------BEGIN CERTIFICATE REQUEST-----
-MIIBpDCCAQ0CAQAwZDELMAkGA1UEBhMCS1IxEzARBgNVBAgTCkt5dW5nR2ktRG8x
-ETAPBgNVBAcTCFN1d29uLVNpMRYwFAYDVQQKEw1TYW1zdW5nIEVsZWMuMRUwEwYD
-VQQDEwxDZXJ0IENoYWluIDcwgZ8wDQYJKoZIhvcNAQEBBQADgY0AMIGJAoGBANXC
-GPP8CjxO9yvG/R/XE7s1dG7KXasJZyHQ7afomX55UrgyPStfG3gOqiu25wPs9X60
-VDuH2QIex+YEzyd7NuYvjo6U91vGblEs3hfaBEXqMdCVxFA8Fo4hx/AOtYbIWEim
-DU2ipoyBemeJQ1YcyuNpiggFV7dtA8IEr3th7oQnAgMBAAGgADANBgkqhkiG9w0B
-AQUFAAOBgQCkBxeKgQYEaocFnvlHiM94YS7cJB31E8mnIinvB+HgxdkPxgxwMD70
-iq/EcsRXOLVk07i5C5jJ0kygnBhDnIUooTlRf9dNa8yzqlJrnbsU9bkF7d0KziBu
-iFxR4uNjdPPVYg8Ah4V96DjivKlsLotpOMS7cbhOaCT7YG8hH8YXpw==
------END CERTIFICATE REQUEST-----
diff --git a/tests/cert-svc/data/TestData/ssl/cert_chain/cert_chain7.crt b/tests/cert-svc/data/TestData/ssl/cert_chain/cert_chain7.crt
deleted file mode 100644 (file)
index f07ee6c..0000000
+++ /dev/null
@@ -1,52 +0,0 @@
-Certificate:
-    Data:
-        Version: 3 (0x2)
-        Serial Number: 52 (0x34)
-        Signature Algorithm: sha1WithRSAEncryption
-        Issuer: C=KR, ST=KyungGi-Do, O=Samsung Elec., CN=Cert Chain 6
-        Validity
-            Not Before: Mar 24 07:09:53 2009 GMT
-            Not After : Mar 24 07:09:53 2010 GMT
-        Subject: C=KR, ST=KyungGi-Do, O=Samsung Elec., CN=Cert Chain 7
-        Subject Public Key Info:
-            Public Key Algorithm: rsaEncryption
-            RSA Public Key: (1024 bit)
-                Modulus (1024 bit):
-                    00:d5:c2:18:f3:fc:0a:3c:4e:f7:2b:c6:fd:1f:d7:
-                    13:bb:35:74:6e:ca:5d:ab:09:67:21:d0:ed:a7:e8:
-                    99:7e:79:52:b8:32:3d:2b:5f:1b:78:0e:aa:2b:b6:
-                    e7:03:ec:f5:7e:b4:54:3b:87:d9:02:1e:c7:e6:04:
-                    cf:27:7b:36:e6:2f:8e:8e:94:f7:5b:c6:6e:51:2c:
-                    de:17:da:04:45:ea:31:d0:95:c4:50:3c:16:8e:21:
-                    c7:f0:0e:b5:86:c8:58:48:a6:0d:4d:a2:a6:8c:81:
-                    7a:67:89:43:56:1c:ca:e3:69:8a:08:05:57:b7:6d:
-                    03:c2:04:af:7b:61:ee:84:27
-                Exponent: 65537 (0x10001)
-        X509v3 extensions:
-            Authority Information Access: 
-                OCSP - URI:http://127.0.0.1:89/0002
-
-    Signature Algorithm: sha1WithRSAEncryption
-        49:e7:f8:dc:ad:06:43:cb:d8:67:e6:e7:c0:7e:dd:a8:21:cd:
-        b9:53:a8:d8:7a:24:df:dc:9c:bb:55:1d:d8:ca:44:0b:0f:fb:
-        f8:db:61:2a:97:79:21:e6:96:2a:8c:76:c4:eb:ad:77:45:53:
-        f5:e2:de:29:7d:29:88:3a:d4:a3:a8:5a:dc:37:24:43:d1:57:
-        a5:5b:0b:3e:05:2d:0a:1a:0e:18:37:50:cc:36:54:85:37:28:
-        50:c8:61:c7:94:48:a0:60:ab:68:b0:b2:a8:61:14:5e:4a:dd:
-        04:8a:1a:69:01:45:e2:c6:e2:cb:15:e6:01:49:98:3c:5a:5d:
-        2a:d4
------BEGIN CERTIFICATE-----
-MIICUDCCAbmgAwIBAgIBNDANBgkqhkiG9w0BAQUFADBRMQswCQYDVQQGEwJLUjET
-MBEGA1UECBMKS3l1bmdHaS1EbzEWMBQGA1UEChMNU2Ftc3VuZyBFbGVjLjEVMBMG
-A1UEAxMMQ2VydCBDaGFpbiA2MB4XDTA5MDMyNDA3MDk1M1oXDTEwMDMyNDA3MDk1
-M1owUTELMAkGA1UEBhMCS1IxEzARBgNVBAgTCkt5dW5nR2ktRG8xFjAUBgNVBAoT
-DVNhbXN1bmcgRWxlYy4xFTATBgNVBAMTDENlcnQgQ2hhaW4gNzCBnzANBgkqhkiG
-9w0BAQEFAAOBjQAwgYkCgYEA1cIY8/wKPE73K8b9H9cTuzV0bspdqwlnIdDtp+iZ
-fnlSuDI9K18beA6qK7bnA+z1frRUO4fZAh7H5gTPJ3s25i+OjpT3W8ZuUSzeF9oE
-Reox0JXEUDwWjiHH8A61hshYSKYNTaKmjIF6Z4lDVhzK42mKCAVXt20DwgSve2Hu
-hCcCAwEAAaM4MDYwNAYIKwYBBQUHAQEEKDAmMCQGCCsGAQUFBzABhhhodHRwOi8v
-MTI3LjAuMC4xOjg5LzAwMDIwDQYJKoZIhvcNAQEFBQADgYEASef43K0GQ8vYZ+bn
-wH7dqCHNuVOo2Hok39ycu1Ud2MpECw/7+NthKpd5IeaWKox2xOutd0VT9eLeKX0p
-iDrUo6ha3DckQ9FXpVsLPgUtChoOGDdQzDZUhTcoUMhhx5RIoGCraLCyqGEUXkrd
-BIoaaQFF4sbiyxXmAUmYPFpdKtQ=
------END CERTIFICATE-----
diff --git a/tests/cert-svc/data/TestData/ssl/cert_chain/cert_chain7.key b/tests/cert-svc/data/TestData/ssl/cert_chain/cert_chain7.key
deleted file mode 100644 (file)
index fdffada..0000000
+++ /dev/null
@@ -1,15 +0,0 @@
------BEGIN RSA PRIVATE KEY-----
-MIICXgIBAAKBgQDVwhjz/Ao8Tvcrxv0f1xO7NXRuyl2rCWch0O2n6Jl+eVK4Mj0r
-Xxt4DqortucD7PV+tFQ7h9kCHsfmBM8nezbmL46OlPdbxm5RLN4X2gRF6jHQlcRQ
-PBaOIcfwDrWGyFhIpg1NoqaMgXpniUNWHMrjaYoIBVe3bQPCBK97Ye6EJwIDAQAB
-AoGAb2ARplalcqTmTm4BB20F/94rS2qvgWWF0e3NVlZwW6CVRBoRGx8T7eseKWbE
-WZxGkX0eAmKW5G7rUuMgmH6vrC2NjFBNvfMLPK3kVxhQVx3Rwu9nN2/u2olzBcMt
-epGj0Yyu7kRHol/ld1+DmoBUOYb6BlOpDyGWdFFa4eW1IhECQQD8s/SXIMXIHBF8
-tUd7rPXm6e96php4M2jaY1ezB5MO7laNivcCioIHihWgEY+BrzuH8moeJbLL1TtJ
-KhzysxmPAkEA2IwQYLVOCfKegG7yzgkbrrzwdWNi0i6P2LAl96kFWzf6DcUTuHun
-GYGMv1yCMj/jzZ+k0VTMWETgJKRzFZUv6QJBAKlxYQgVCYlsiK0+QHhFOX1kTxfG
-WOlQT3ZgNmXtJkZUueSe0ZH6ncXAaU+zdq5WeWxmt5EPZhwXFnGws0hpnzECQQCL
-QIbHqc+lVf/XV4GMPQ8wLw/ybRb/UjHuhlfkCy0Gm9iRQkqMN/gcztJTvIl9BtjX
-QfIbKwy9No1tAtN+7ZEBAkEA8T3mn9G2pTg/49iBP0TW1fJBsdacWj8ZK1D3egto
-JR7qKqVyQTifeJpeATTX/vvuTu0ikbshLotT/UBGy8dBtw==
------END RSA PRIVATE KEY-----
diff --git a/tests/cert-svc/data/TestData/ssl/cert_chain/cert_chain8.crl b/tests/cert-svc/data/TestData/ssl/cert_chain/cert_chain8.crl
deleted file mode 100644 (file)
index c099c5f..0000000
+++ /dev/null
@@ -1,11 +0,0 @@
------BEGIN CERTIFICATE REQUEST-----
-MIIBpDCCAQ0CAQAwZDELMAkGA1UEBhMCS1IxEzARBgNVBAgTCkt5dW5nR2ktRG8x
-ETAPBgNVBAcTCFN1d29uLVNpMRYwFAYDVQQKEw1TYW1zdW5nIEVsZWMuMRUwEwYD
-VQQDEwxDZXJ0IENoYWluIDgwgZ8wDQYJKoZIhvcNAQEBBQADgY0AMIGJAoGBAOTg
-xNyGAJRpsdWIcsjCUsBWYg72gKLvjmj52tmFAVkEXvf8Ixbc/y1SCoyBlvokHUuJ
-YCwlGutOpiHFH1uH1mWM1+GiVWd+AXwohNcjVvT44ZykH3T+a8AUzP0Fe7r2sOP1
-fkbOcDlck0MB+K04pgxxYJ4LDb9CbNOeIUxV7XRzAgMBAAGgADANBgkqhkiG9w0B
-AQUFAAOBgQC8LTrpUri6N2x1c8Dyrge+RTsYHP4XjtXX3tSx6A0I58t2MvoXBzPA
-pnpu2X3Y14xxoGZc0zs12d32mnHmwHzH4iQpb0VvYWstrtX13sjMQc0M9K4M61Me
-I3iWynn5mZbqAwZDEv57uXLJuzOmcMQ3BHe2bOpiVKUA3z7uDzR8vw==
------END CERTIFICATE REQUEST-----
diff --git a/tests/cert-svc/data/TestData/ssl/cert_chain/cert_chain8.crt b/tests/cert-svc/data/TestData/ssl/cert_chain/cert_chain8.crt
deleted file mode 100644 (file)
index 60073f6..0000000
+++ /dev/null
@@ -1,52 +0,0 @@
-Certificate:
-    Data:
-        Version: 3 (0x2)
-        Serial Number: 53 (0x35)
-        Signature Algorithm: sha1WithRSAEncryption
-        Issuer: C=KR, ST=KyungGi-Do, O=Samsung Elec., CN=Cert Chain 7
-        Validity
-            Not Before: Mar 24 07:09:54 2009 GMT
-            Not After : Mar 24 07:09:54 2010 GMT
-        Subject: C=KR, ST=KyungGi-Do, O=Samsung Elec., CN=Cert Chain 8
-        Subject Public Key Info:
-            Public Key Algorithm: rsaEncryption
-            RSA Public Key: (1024 bit)
-                Modulus (1024 bit):
-                    00:e4:e0:c4:dc:86:00:94:69:b1:d5:88:72:c8:c2:
-                    52:c0:56:62:0e:f6:80:a2:ef:8e:68:f9:da:d9:85:
-                    01:59:04:5e:f7:fc:23:16:dc:ff:2d:52:0a:8c:81:
-                    96:fa:24:1d:4b:89:60:2c:25:1a:eb:4e:a6:21:c5:
-                    1f:5b:87:d6:65:8c:d7:e1:a2:55:67:7e:01:7c:28:
-                    84:d7:23:56:f4:f8:e1:9c:a4:1f:74:fe:6b:c0:14:
-                    cc:fd:05:7b:ba:f6:b0:e3:f5:7e:46:ce:70:39:5c:
-                    93:43:01:f8:ad:38:a6:0c:71:60:9e:0b:0d:bf:42:
-                    6c:d3:9e:21:4c:55:ed:74:73
-                Exponent: 65537 (0x10001)
-        X509v3 extensions:
-            Authority Information Access: 
-                OCSP - URI:http://127.0.0.1:89/0002
-
-    Signature Algorithm: sha1WithRSAEncryption
-        be:aa:0c:d9:b6:cc:d6:e1:47:ca:cb:6a:36:5e:67:43:f6:8e:
-        ab:d9:2a:5c:9d:e0:74:f5:55:70:80:8e:2f:f8:16:4c:2d:4c:
-        9c:94:80:6b:6b:c0:7a:e4:0f:f4:60:64:10:ba:93:f5:2a:39:
-        0f:5f:06:8a:d4:75:5b:b2:c4:92:25:ad:21:fa:98:75:54:48:
-        b5:d6:80:c6:9d:96:af:bf:fd:f4:57:80:cf:03:5c:dc:2b:b3:
-        f6:a2:7a:8e:8d:a5:01:92:53:e4:b7:77:99:1b:71:04:97:66:
-        57:a1:28:9d:3b:f8:ac:2e:15:18:17:2e:5d:0b:47:49:3b:65:
-        88:fc
------BEGIN CERTIFICATE-----
-MIICUDCCAbmgAwIBAgIBNTANBgkqhkiG9w0BAQUFADBRMQswCQYDVQQGEwJLUjET
-MBEGA1UECBMKS3l1bmdHaS1EbzEWMBQGA1UEChMNU2Ftc3VuZyBFbGVjLjEVMBMG
-A1UEAxMMQ2VydCBDaGFpbiA3MB4XDTA5MDMyNDA3MDk1NFoXDTEwMDMyNDA3MDk1
-NFowUTELMAkGA1UEBhMCS1IxEzARBgNVBAgTCkt5dW5nR2ktRG8xFjAUBgNVBAoT
-DVNhbXN1bmcgRWxlYy4xFTATBgNVBAMTDENlcnQgQ2hhaW4gODCBnzANBgkqhkiG
-9w0BAQEFAAOBjQAwgYkCgYEA5ODE3IYAlGmx1YhyyMJSwFZiDvaAou+OaPna2YUB
-WQRe9/wjFtz/LVIKjIGW+iQdS4lgLCUa606mIcUfW4fWZYzX4aJVZ34BfCiE1yNW
-9PjhnKQfdP5rwBTM/QV7uvaw4/V+Rs5wOVyTQwH4rTimDHFgngsNv0Js054hTFXt
-dHMCAwEAAaM4MDYwNAYIKwYBBQUHAQEEKDAmMCQGCCsGAQUFBzABhhhodHRwOi8v
-MTI3LjAuMC4xOjg5LzAwMDIwDQYJKoZIhvcNAQEFBQADgYEAvqoM2bbM1uFHystq
-Nl5nQ/aOq9kqXJ3gdPVVcICOL/gWTC1MnJSAa2vAeuQP9GBkELqT9So5D18GitR1
-W7LEkiWtIfqYdVRItdaAxp2Wr7/99FeAzwNc3Cuz9qJ6jo2lAZJT5Ld3mRtxBJdm
-V6EonTv4rC4VGBcuXQtHSTtliPw=
------END CERTIFICATE-----
diff --git a/tests/cert-svc/data/TestData/ssl/cert_chain/cert_chain8.key b/tests/cert-svc/data/TestData/ssl/cert_chain/cert_chain8.key
deleted file mode 100644 (file)
index 5982533..0000000
+++ /dev/null
@@ -1,15 +0,0 @@
------BEGIN RSA PRIVATE KEY-----
-MIICXAIBAAKBgQDk4MTchgCUabHViHLIwlLAVmIO9oCi745o+drZhQFZBF73/CMW
-3P8tUgqMgZb6JB1LiWAsJRrrTqYhxR9bh9ZljNfholVnfgF8KITXI1b0+OGcpB90
-/mvAFMz9BXu69rDj9X5GznA5XJNDAfitOKYMcWCeCw2/QmzTniFMVe10cwIDAQAB
-AoGALlxlI/I0zds2/XTdI1NRZcpZpIRD/D0gEJ2DugnaAwkCn6LADNKJEcoLfviE
-93g3QuS5yVdew4kz16VRO74hLCCjm7M++isvLhljozWAotBVfllQ8g9HcCuG551y
-y2vTDbrKUfeNUELBd2DKjYMN4K3gJRzPcjh6eQvZ238fl8ECQQD6cRMUPzdKLwQp
-dlTQ5dBeLJ14cn9zoFkBkgoF1JGXtDxhs+5elZQPS+skPoDy+ergjOMN8ixSaQ6T
-FJ/X73STAkEA6fUtQ2x/Q+YJcoRr5EEKqtyEPIZEeACAzRdxps1PAI++vafjk3x2
-5v/pTcpAEMSRzjZtlQTqC+fkx2vMANDMoQJAMPx7IeO3meAWbVHDB1Vca39Ike27
-dk9v+XmqUjeg/s53XRkH0CJr4o4UAXPkXyJ5SdDk/K5Y8wmvmx9WoLMq1wJBAMKy
-SX/Bq8tKhXQqpUrnocP9DYL8zb/70zRaHTeNxgAWn8pfDDFxs9WbBIG7HUOXAivU
-+a64zzknOymGGNhY6uECQE+NCMEicPRY8yNuNX2Ygr0Uxwbb0we55N8GA24Prkrl
-crhKfL6y0MdsHAgnIRaGV2+mpehS9TbVlx31AdFrugE=
------END RSA PRIVATE KEY-----
diff --git a/tests/cert-svc/data/TestData/ssl/cert_chain/cert_chain9.crl b/tests/cert-svc/data/TestData/ssl/cert_chain/cert_chain9.crl
deleted file mode 100644 (file)
index 09bed52..0000000
+++ /dev/null
@@ -1,11 +0,0 @@
------BEGIN CERTIFICATE REQUEST-----
-MIIBpDCCAQ0CAQAwZDELMAkGA1UEBhMCS1IxEzARBgNVBAgTCkt5dW5nR2ktRG8x
-ETAPBgNVBAcTCFN1d29uLVNpMRYwFAYDVQQKEw1TYW1zdW5nIEVsZWMuMRUwEwYD
-VQQDEwxDZXJ0IENoYWluIDkwgZ8wDQYJKoZIhvcNAQEBBQADgY0AMIGJAoGBAOHI
-MkJfqFOzIqNYmnwe/jMSZFw+RRhbI6x5Q0XXZG985KOVXPnhxLFjQ5x+EIGqf961
-t4WmtWA5JSJIZMVUGm6xIpDzjBeFwr4cgaqmexS0ehOylHJC73fMMKTIXICyRy73
-21PqrmNaGSAwK/HQow4NTMDJfpu1C9tRaucOdGnvAgMBAAGgADANBgkqhkiG9w0B
-AQUFAAOBgQDfGF6773CFR6nLxqZl91TH8JViLLsQgN3JSMh9e71JJrjVN/pg8XHy
-FyR2cFwubPkDwtIrb5EBtPqH7iNHymDwjqD2wpICNKZ+n/4KNjJ4mNP3bYj951/9
-KndQJfEViEKfsMM/aRDcKQMxHyAB17nmu0hsJs2rFhVutgAWfv1HQw==
------END CERTIFICATE REQUEST-----
diff --git a/tests/cert-svc/data/TestData/ssl/cert_chain/cert_chain9.crt b/tests/cert-svc/data/TestData/ssl/cert_chain/cert_chain9.crt
deleted file mode 100644 (file)
index 7df26a8..0000000
+++ /dev/null
@@ -1,52 +0,0 @@
-Certificate:
-    Data:
-        Version: 3 (0x2)
-        Serial Number: 54 (0x36)
-        Signature Algorithm: sha1WithRSAEncryption
-        Issuer: C=KR, ST=KyungGi-Do, O=Samsung Elec., CN=Cert Chain 8
-        Validity
-            Not Before: Mar 24 07:09:55 2009 GMT
-            Not After : Mar 24 07:09:55 2010 GMT
-        Subject: C=KR, ST=KyungGi-Do, O=Samsung Elec., CN=Cert Chain 9
-        Subject Public Key Info:
-            Public Key Algorithm: rsaEncryption
-            RSA Public Key: (1024 bit)
-                Modulus (1024 bit):
-                    00:e1:c8:32:42:5f:a8:53:b3:22:a3:58:9a:7c:1e:
-                    fe:33:12:64:5c:3e:45:18:5b:23:ac:79:43:45:d7:
-                    64:6f:7c:e4:a3:95:5c:f9:e1:c4:b1:63:43:9c:7e:
-                    10:81:aa:7f:de:b5:b7:85:a6:b5:60:39:25:22:48:
-                    64:c5:54:1a:6e:b1:22:90:f3:8c:17:85:c2:be:1c:
-                    81:aa:a6:7b:14:b4:7a:13:b2:94:72:42:ef:77:cc:
-                    30:a4:c8:5c:80:b2:47:2e:f7:db:53:ea:ae:63:5a:
-                    19:20:30:2b:f1:d0:a3:0e:0d:4c:c0:c9:7e:9b:b5:
-                    0b:db:51:6a:e7:0e:74:69:ef
-                Exponent: 65537 (0x10001)
-        X509v3 extensions:
-            Authority Information Access: 
-                OCSP - URI:http://127.0.0.1:89/0002
-
-    Signature Algorithm: sha1WithRSAEncryption
-        d9:93:84:69:52:8d:5a:7e:c4:b7:04:54:a0:47:32:04:c7:be:
-        7b:94:1b:f9:b6:c5:88:84:a1:b4:22:4f:3b:28:ae:29:90:f1:
-        e4:25:f0:b9:e6:a0:dd:0e:0c:15:a9:6c:e4:8a:fa:a0:42:a7:
-        f9:4e:b7:0b:53:c1:ab:cb:a7:83:4c:0b:03:f0:64:95:75:5f:
-        09:dc:2c:a2:19:d6:51:e8:e4:86:7f:50:60:69:01:64:a5:fd:
-        0c:bb:0e:a0:cb:63:9c:b5:2c:22:63:f6:a4:e2:b1:9b:62:a5:
-        8c:c7:e5:a3:93:d8:18:6a:f2:95:b6:53:6a:8d:be:b0:ce:fa:
-        e9:71
------BEGIN CERTIFICATE-----
-MIICUDCCAbmgAwIBAgIBNjANBgkqhkiG9w0BAQUFADBRMQswCQYDVQQGEwJLUjET
-MBEGA1UECBMKS3l1bmdHaS1EbzEWMBQGA1UEChMNU2Ftc3VuZyBFbGVjLjEVMBMG
-A1UEAxMMQ2VydCBDaGFpbiA4MB4XDTA5MDMyNDA3MDk1NVoXDTEwMDMyNDA3MDk1
-NVowUTELMAkGA1UEBhMCS1IxEzARBgNVBAgTCkt5dW5nR2ktRG8xFjAUBgNVBAoT
-DVNhbXN1bmcgRWxlYy4xFTATBgNVBAMTDENlcnQgQ2hhaW4gOTCBnzANBgkqhkiG
-9w0BAQEFAAOBjQAwgYkCgYEA4cgyQl+oU7Mio1iafB7+MxJkXD5FGFsjrHlDRddk
-b3zko5Vc+eHEsWNDnH4Qgap/3rW3haa1YDklIkhkxVQabrEikPOMF4XCvhyBqqZ7
-FLR6E7KUckLvd8wwpMhcgLJHLvfbU+quY1oZIDAr8dCjDg1MwMl+m7UL21Fq5w50
-ae8CAwEAAaM4MDYwNAYIKwYBBQUHAQEEKDAmMCQGCCsGAQUFBzABhhhodHRwOi8v
-MTI3LjAuMC4xOjg5LzAwMDIwDQYJKoZIhvcNAQEFBQADgYEA2ZOEaVKNWn7EtwRU
-oEcyBMe+e5Qb+bbFiIShtCJPOyiuKZDx5CXwueag3Q4MFals5Ir6oEKn+U63C1PB
-q8ung0wLA/BklXVfCdwsohnWUejkhn9QYGkBZKX9DLsOoMtjnLUsImP2pOKxm2Kl
-jMflo5PYGGrylbZTao2+sM766XE=
------END CERTIFICATE-----
diff --git a/tests/cert-svc/data/TestData/ssl/cert_chain/cert_chain9.key b/tests/cert-svc/data/TestData/ssl/cert_chain/cert_chain9.key
deleted file mode 100644 (file)
index 37e2d48..0000000
+++ /dev/null
@@ -1,15 +0,0 @@
------BEGIN RSA PRIVATE KEY-----
-MIICXAIBAAKBgQDhyDJCX6hTsyKjWJp8Hv4zEmRcPkUYWyOseUNF12RvfOSjlVz5
-4cSxY0OcfhCBqn/etbeFprVgOSUiSGTFVBpusSKQ84wXhcK+HIGqpnsUtHoTspRy
-Qu93zDCkyFyAskcu99tT6q5jWhkgMCvx0KMODUzAyX6btQvbUWrnDnRp7wIDAQAB
-AoGABu56fIcrR8aMHa+urnjVHQRHiH1w6ZqCsdzXL+G496NB8bO4MwO3YirF/Jvy
-LcjqPBAgHj5L+zRF65OFZHl8hjKtKxeRvZcFe2XhUwPCN/HJv6OPUSUSIGMxL+XL
-4G62lt1tFHVZRjy9mLyqOg2SNwun6c3+dOySdvDY6vixxgECQQD32q9mwkHx8NqQ
-2GTGWRNgIDsCR9bnmy1gGKxzKhQLdg0cNwmQrfTCgHXwfeBUr1eSXW6RqTx/WGlA
-LqFdyiTBAkEA6TPOoAW+EaXPxx21MmzbqqgK6GqLh7NHM2Z2rkqR++933jGJqS1F
-nr4jmWLoSQX017IPz/mlDxlL++CvWIXKrwJAHXMbgj80rLWskqdTmgm9dp99w3Cb
-xVs30gI8g1aNmSsGtcKIXWt9+Jpg6RlbzVQkOJznZWFRceQkZV7lB4rcQQJARfTw
-qziNyCWBqy3SSYo2a391pjswGElDtruqJqbgHD++Kb2amlGmbPSFIWJ2ZFGRHZOh
-ArbVOS5RiQHiGCAqqQJBAMIp5kevQOAr/xYC8BLB6SD7XtfLKTJnZSHy7pWy6xeJ
-ffn7QLqwUWMcyrvja+CQgBTKx7u8/MKLSgqohWguWEM=
------END RSA PRIVATE KEY-----
diff --git a/tests/cert-svc/data/TestData/ssl/cert_chain/cert_chain_no_aia1.crl b/tests/cert-svc/data/TestData/ssl/cert_chain/cert_chain_no_aia1.crl
deleted file mode 100644 (file)
index 4bdd37f..0000000
+++ /dev/null
@@ -1,11 +0,0 @@
------BEGIN CERTIFICATE REQUEST-----
-MIIBqzCCARQCAQAwazELMAkGA1UEBhMCS1IxEzARBgNVBAgTCkt5dW5nR2ktRG8x
-ETAPBgNVBAcTCFN1d29uLVNpMRYwFAYDVQQKEw1TYW1zdW5nIEVsZWMuMRwwGgYD
-VQQDExNDZXJ0IENoYWluIE5vIEFJQSAxMIGfMA0GCSqGSIb3DQEBAQUAA4GNADCB
-iQKBgQDNNrJ+X/+2VFhuPKiMLMA1EN/YFIpD6iI8mddzEatkxkmVWdfEZNmjoPlo
-i93iobvhqujqrkZx+Fw1s6wS59dBPUU0P240jkFfvD4QUjMuR4uI1OjMXXtmldUN
-jB+R6YXfoGhAgZeR8IonaQZDe1Lqcn4boiYu8eKSwq8bJ8FskwIDAQABoAAwDQYJ
-KoZIhvcNAQEFBQADgYEAzALn2w53TUTmfkTbyT5GUpxkB8qi07U9R1WrQf0qRLT4
-0NPdNJaZTS3QoqJAcXXcfpMxdcTO+qgQbESu/StvBlnN6Y5CWIZhy/yL0jg/Fwrb
-dAlIIVfbgcHpjTwMNdPyMfHy96AgOH8QAKXSwojzadpt4dSh9rSWP2GTKSdS+NQ=
------END CERTIFICATE REQUEST-----
diff --git a/tests/cert-svc/data/TestData/ssl/cert_chain/cert_chain_no_aia1.crt b/tests/cert-svc/data/TestData/ssl/cert_chain/cert_chain_no_aia1.crt
deleted file mode 100644 (file)
index 7794e3d..0000000
+++ /dev/null
@@ -1,81 +0,0 @@
-Certificate:
-    Data:
-        Version: 3 (0x2)
-        Serial Number: 49 (0x31)
-        Signature Algorithm: sha1WithRSAEncryption
-        Issuer: C=KR, ST=KyungGi-Do, L=Suwon-Si, O=Samsung Elec., CN=CA
-        Validity
-            Not Before: Mar 24 07:21:43 2009 GMT
-            Not After : Mar 24 07:21:43 2010 GMT
-        Subject: C=KR, ST=KyungGi-Do, O=Samsung Elec., CN=Cert Chain No AIA 1
-        Subject Public Key Info:
-            Public Key Algorithm: rsaEncryption
-            RSA Public Key: (1024 bit)
-                Modulus (1024 bit):
-                    00:cd:36:b2:7e:5f:ff:b6:54:58:6e:3c:a8:8c:2c:
-                    c0:35:10:df:d8:14:8a:43:ea:22:3c:99:d7:73:11:
-                    ab:64:c6:49:95:59:d7:c4:64:d9:a3:a0:f9:68:8b:
-                    dd:e2:a1:bb:e1:aa:e8:ea:ae:46:71:f8:5c:35:b3:
-                    ac:12:e7:d7:41:3d:45:34:3f:6e:34:8e:41:5f:bc:
-                    3e:10:52:33:2e:47:8b:88:d4:e8:cc:5d:7b:66:95:
-                    d5:0d:8c:1f:91:e9:85:df:a0:68:40:81:97:91:f0:
-                    8a:27:69:06:43:7b:52:ea:72:7e:1b:a2:26:2e:f1:
-                    e2:92:c2:af:1b:27:c1:6c:93
-                Exponent: 65537 (0x10001)
-        X509v3 extensions:
-            Authority Information Access: 
-                OCSP - URI:http://127.0.0.1:89/0002
-
-    Signature Algorithm: sha1WithRSAEncryption
-        06:45:50:fc:2e:79:07:60:e0:bb:b7:f5:31:31:b5:86:e5:22:
-        63:6e:69:ee:81:4e:6e:c1:7c:ae:14:8f:78:74:1a:c6:c2:d7:
-        23:4f:e4:c7:5c:23:a6:74:0f:49:d3:c5:13:2d:93:b1:80:d9:
-        b3:e7:51:ac:44:37:08:56:e3:9a:a9:aa:45:47:a0:39:de:a4:
-        cf:f0:1f:06:2c:a1:f4:ff:db:74:00:e6:eb:bf:ed:3c:10:69:
-        8a:f5:96:93:71:08:c2:91:92:f4:8f:f5:f8:3c:41:68:6a:b1:
-        71:19:a7:45:fc:72:32:6c:49:35:18:ac:fa:9b:f1:47:46:d6:
-        b5:50:83:83:e1:cb:6d:88:73:63:bc:b7:19:29:2f:47:ea:78:
-        a3:28:77:41:c7:7d:36:d9:69:17:b3:b2:60:04:dc:b4:30:a3:
-        86:a4:99:80:0f:5e:0c:70:54:aa:92:bc:1c:4c:70:9e:0a:63:
-        73:26:53:8a:31:5f:aa:12:aa:c1:62:88:0a:24:0e:77:44:85:
-        12:3c:86:47:81:3a:52:dd:21:ca:58:1d:16:08:02:af:c0:58:
-        39:1e:31:52:ed:d5:16:08:2a:2d:3d:40:01:7c:f1:69:13:a0:
-        5e:e5:cd:6f:d6:4a:62:68:7d:15:db:a7:c2:fd:b3:ac:34:c9:
-        ed:32:a8:2d:3b:6d:c7:aa:0b:91:a5:11:48:d2:25:4d:74:f6:
-        d0:82:1a:6a:4c:e8:10:73:8e:d4:11:45:18:f8:62:4f:c5:3b:
-        ac:16:0f:ad:6e:21:86:16:f8:49:e7:b9:f9:41:64:5e:dc:0b:
-        35:0b:d5:b1:46:84:ae:62:99:69:2f:77:db:73:25:18:f9:24:
-        92:ff:05:23:6d:53:82:16:ec:0e:ae:e5:a9:07:10:95:f5:09:
-        99:d4:82:8c:e9:2c:bf:88:48:92:3f:74:b6:e6:6d:e1:f5:8c:
-        37:d7:81:d0:31:e0:85:e0:5a:97:39:bb:29:e7:97:9f:d5:eb:
-        ac:6f:fd:bf:80:24:e5:cc:4e:c8:5f:dc:aa:51:7d:25:6e:7e:
-        83:d5:d6:cf:1c:8a:3d:fa:db:e6:c1:b6:1c:ef:34:4f:1e:51:
-        1c:2b:ae:c9:b5:36:93:c4:ec:04:0f:78:19:0f:f2:0b:c0:78:
-        f2:18:3c:2f:b2:f7:07:58:7b:3b:11:fa:4d:50:e2:95:01:63:
-        cb:84:02:95:08:4c:87:38:14:50:23:9e:81:3e:0a:95:a6:ab:
-        d0:26:3e:75:cd:d8:4c:f3:5a:40:71:b9:07:41:3b:2f:4f:f1:
-        11:fa:e3:dc:07:c9:b5:b1:a9:9c:11:b5:07:cc:40:f0:53:5d:
-        8f:8e:21:89:1b:ca:f8:60
------BEGIN CERTIFICATE-----
-MIID4TCCAcmgAwIBAgIBMTANBgkqhkiG9w0BAQUFADBaMQswCQYDVQQGEwJLUjET
-MBEGA1UECBMKS3l1bmdHaS1EbzERMA8GA1UEBxMIU3V3b24tU2kxFjAUBgNVBAoT
-DVNhbXN1bmcgRWxlYy4xCzAJBgNVBAMTAkNBMB4XDTA5MDMyNDA3MjE0M1oXDTEw
-MDMyNDA3MjE0M1owWDELMAkGA1UEBhMCS1IxEzARBgNVBAgTCkt5dW5nR2ktRG8x
-FjAUBgNVBAoTDVNhbXN1bmcgRWxlYy4xHDAaBgNVBAMTE0NlcnQgQ2hhaW4gTm8g
-QUlBIDEwgZ8wDQYJKoZIhvcNAQEBBQADgY0AMIGJAoGBAM02sn5f/7ZUWG48qIws
-wDUQ39gUikPqIjyZ13MRq2TGSZVZ18Rk2aOg+WiL3eKhu+Gq6OquRnH4XDWzrBLn
-10E9RTQ/bjSOQV+8PhBSMy5Hi4jU6Mxde2aV1Q2MH5Hphd+gaECBl5HwiidpBkN7
-UupyfhuiJi7x4pLCrxsnwWyTAgMBAAGjODA2MDQGCCsGAQUFBwEBBCgwJjAkBggr
-BgEFBQcwAYYYaHR0cDovLzEyNy4wLjAuMTo4OS8wMDAyMA0GCSqGSIb3DQEBBQUA
-A4ICAQAGRVD8LnkHYOC7t/UxMbWG5SJjbmnugU5uwXyuFI94dBrGwtcjT+THXCOm
-dA9J08UTLZOxgNmz51GsRDcIVuOaqapFR6A53qTP8B8GLKH0/9t0AObrv+08EGmK
-9ZaTcQjCkZL0j/X4PEFoarFxGadF/HIybEk1GKz6m/FHRta1UIOD4cttiHNjvLcZ
-KS9H6nijKHdBx3022WkXs7JgBNy0MKOGpJmAD14McFSqkrwcTHCeCmNzJlOKMV+q
-EqrBYogKJA53RIUSPIZHgTpS3SHKWB0WCAKvwFg5HjFS7dUWCCotPUABfPFpE6Be
-5c1v1kpiaH0V26fC/bOsNMntMqgtO23HqguRpRFI0iVNdPbQghpqTOgQc47UEUUY
-+GJPxTusFg+tbiGGFvhJ57n5QWRe3As1C9WxRoSuYplpL3fbcyUY+SSS/wUjbVOC
-FuwOruWpBxCV9QmZ1IKM6Sy/iEiSP3S25m3h9Yw314HQMeCF4FqXObsp55ef1eus
-b/2/gCTlzE7IX9yqUX0lbn6D1dbPHIo9+tvmwbYc7zRPHlEcK67JtTaTxOwED3gZ
-D/ILwHjyGDwvsvcHWHs7EfpNUOKVAWPLhAKVCEyHOBRQI56BPgqVpqvQJj51zdhM
-81pAcbkHQTsvT/ER+uPcB8m1samcEbUHzEDwU12PjiGJG8r4YA==
------END CERTIFICATE-----
diff --git a/tests/cert-svc/data/TestData/ssl/cert_chain/cert_chain_no_aia1.key b/tests/cert-svc/data/TestData/ssl/cert_chain/cert_chain_no_aia1.key
deleted file mode 100644 (file)
index f91598c..0000000
+++ /dev/null
@@ -1,15 +0,0 @@
------BEGIN RSA PRIVATE KEY-----
-MIICXAIBAAKBgQDNNrJ+X/+2VFhuPKiMLMA1EN/YFIpD6iI8mddzEatkxkmVWdfE
-ZNmjoPloi93iobvhqujqrkZx+Fw1s6wS59dBPUU0P240jkFfvD4QUjMuR4uI1OjM
-XXtmldUNjB+R6YXfoGhAgZeR8IonaQZDe1Lqcn4boiYu8eKSwq8bJ8FskwIDAQAB
-AoGBAKtzAVm4FspcWa1wHFlQoh0zxfCf6IypNoVu+qP2pT2CtMOE1lIM+BBPU1DX
-WkAYZAI8anB3vf9GQrPTMvZwoFMub7ifTsgBe+gJzbWKpfuDYRmi8figArTopirg
-yphtF+wZd5x0Yas0Ak+mxfojUuWF9Scv2p3yiope5KYkC9/xAkEA/KqYc1ucAzsV
-qIfZDWv/971IcJacWFm+l1M/jZB62Cimtkyw4zvPV6O6QOOMqJMyBJPE7AWBEGBS
-G7kO6yqjhwJBAM/r01/KtZErJL/fZn+bXJxxYgIZ0oBqxEigcMLiRSjyDiVwyR4N
-0BeWrI0IoVQpJeWCq0uL/cKmA/oMcDtriZUCQCB4M9svPJ9VqnTb8FK/PEez9Wky
-kajw74M22YXxuTeqEbJ/rIOnHgAfNEI+e8b2E4lvC/Fgy7M1DZgucfJaqmUCQDb7
-4zr6zUclhKNk/aMTP8tzRHrPv1YMZfnay9cNpUJtuIX4LIdRGc2TH/Bv7tHly8rE
-4m2pCKNX6cdPUMK17n0CQBt2Y0RX3Q7OoJqzbi63JtP4eYwdaI28xnncPMhvwWji
-arwmzoNeD7T7tkOEZOC+rlhXZaeZLI6LYUyC5ouEn3M=
------END RSA PRIVATE KEY-----
diff --git a/tests/cert-svc/data/TestData/ssl/cert_chain/cert_chain_no_aia10.crl b/tests/cert-svc/data/TestData/ssl/cert_chain/cert_chain_no_aia10.crl
deleted file mode 100644 (file)
index 5e5d740..0000000
+++ /dev/null
@@ -1,11 +0,0 @@
------BEGIN CERTIFICATE REQUEST-----
-MIIBrDCCARUCAQAwbDELMAkGA1UEBhMCS1IxEzARBgNVBAgTCkt5dW5nR2ktRG8x
-ETAPBgNVBAcTCFN1d29uLVNpMRYwFAYDVQQKEw1TYW1zdW5nIEVsZWMuMR0wGwYD
-VQQDExRDZXJ0IENoYWluIE5vIEFJQSAxMDCBnzANBgkqhkiG9w0BAQEFAAOBjQAw
-gYkCgYEA3wcv7lR2SVKfFnoKOS9EbRdnymoM10LCRWD5t6Li6i9TFGkCVwZ+RLbH
-a59BuBwqF2s4pYnA7OJMwFmXbI0Xz+WGPTuxaZCA/oR7N065HV6Y/EY4x/EmJH16
-/PrXUVnRul8HhZ5D3/1uXzXIpP4kol6KuwG1XcXLDkD16UwLAEMCAwEAAaAAMA0G
-CSqGSIb3DQEBBQUAA4GBAC3Hy+pM3gfT72/XQizjzulBIwppfiqSKChXX+SmGIIL
-LDVcCXNQYvqvYJqXvNSHzZPy5sOdTPibkNU9nWj0jABa9PdhTmwDeb724HttVBvN
-7/h/hYaowlrxTgqJH/LzXjT2AGYGTixnuCphuom94tRnD2yWaKYAGq8xc/kOIkiZ
------END CERTIFICATE REQUEST-----
diff --git a/tests/cert-svc/data/TestData/ssl/cert_chain/cert_chain_no_aia10.crt b/tests/cert-svc/data/TestData/ssl/cert_chain/cert_chain_no_aia10.crt
deleted file mode 100644 (file)
index 1696eaf..0000000
+++ /dev/null
@@ -1,52 +0,0 @@
-Certificate:
-    Data:
-        Version: 3 (0x2)
-        Serial Number: 64 (0x40)
-        Signature Algorithm: sha1WithRSAEncryption
-        Issuer: C=KR, ST=KyungGi-Do, O=Samsung Elec., CN=Cert Chain No AIA 9
-        Validity
-            Not Before: Mar 24 07:21:53 2009 GMT
-            Not After : Mar 24 07:21:53 2010 GMT
-        Subject: C=KR, ST=KyungGi-Do, O=Samsung Elec., CN=Cert Chain No AIA 10
-        Subject Public Key Info:
-            Public Key Algorithm: rsaEncryption
-            RSA Public Key: (1024 bit)
-                Modulus (1024 bit):
-                    00:df:07:2f:ee:54:76:49:52:9f:16:7a:0a:39:2f:
-                    44:6d:17:67:ca:6a:0c:d7:42:c2:45:60:f9:b7:a2:
-                    e2:ea:2f:53:14:69:02:57:06:7e:44:b6:c7:6b:9f:
-                    41:b8:1c:2a:17:6b:38:a5:89:c0:ec:e2:4c:c0:59:
-                    97:6c:8d:17:cf:e5:86:3d:3b:b1:69:90:80:fe:84:
-                    7b:37:4e:b9:1d:5e:98:fc:46:38:c7:f1:26:24:7d:
-                    7a:fc:fa:d7:51:59:d1:ba:5f:07:85:9e:43:df:fd:
-                    6e:5f:35:c8:a4:fe:24:a2:5e:8a:bb:01:b5:5d:c5:
-                    cb:0e:40:f5:e9:4c:0b:00:43
-                Exponent: 65537 (0x10001)
-        X509v3 extensions:
-            Authority Information Access: 
-                OCSP - URI:http://127.0.0.1:89/0002
-
-    Signature Algorithm: sha1WithRSAEncryption
-        6f:3d:1c:f3:6a:7d:23:49:43:c3:dd:41:43:81:42:f4:60:bf:
-        87:d4:5f:83:96:1c:6a:c3:06:28:e5:76:fb:5c:17:fc:60:1c:
-        04:07:03:99:92:d4:01:ac:97:81:0c:2a:7c:67:18:88:60:88:
-        dc:a9:35:c1:89:75:d8:0b:0a:c3:ff:43:4a:5a:93:3a:d3:67:
-        b2:ce:8d:8a:8c:19:b5:23:b5:ed:b9:df:26:52:70:09:41:4e:
-        68:1a:54:08:74:c8:ff:bf:03:70:f1:9b:ef:65:2e:e2:23:74:
-        12:77:c4:25:de:fe:58:a9:a9:fa:d2:fb:4b:40:70:24:31:2b:
-        bc:64
------BEGIN CERTIFICATE-----
-MIICXzCCAcigAwIBAgIBQDANBgkqhkiG9w0BAQUFADBYMQswCQYDVQQGEwJLUjET
-MBEGA1UECBMKS3l1bmdHaS1EbzEWMBQGA1UEChMNU2Ftc3VuZyBFbGVjLjEcMBoG
-A1UEAxMTQ2VydCBDaGFpbiBObyBBSUEgOTAeFw0wOTAzMjQwNzIxNTNaFw0xMDAz
-MjQwNzIxNTNaMFkxCzAJBgNVBAYTAktSMRMwEQYDVQQIEwpLeXVuZ0dpLURvMRYw
-FAYDVQQKEw1TYW1zdW5nIEVsZWMuMR0wGwYDVQQDExRDZXJ0IENoYWluIE5vIEFJ
-QSAxMDCBnzANBgkqhkiG9w0BAQEFAAOBjQAwgYkCgYEA3wcv7lR2SVKfFnoKOS9E
-bRdnymoM10LCRWD5t6Li6i9TFGkCVwZ+RLbHa59BuBwqF2s4pYnA7OJMwFmXbI0X
-z+WGPTuxaZCA/oR7N065HV6Y/EY4x/EmJH16/PrXUVnRul8HhZ5D3/1uXzXIpP4k
-ol6KuwG1XcXLDkD16UwLAEMCAwEAAaM4MDYwNAYIKwYBBQUHAQEEKDAmMCQGCCsG
-AQUFBzABhhhodHRwOi8vMTI3LjAuMC4xOjg5LzAwMDIwDQYJKoZIhvcNAQEFBQAD
-gYEAbz0c82p9I0lDw91BQ4FC9GC/h9Rfg5YcasMGKOV2+1wX/GAcBAcDmZLUAayX
-gQwqfGcYiGCI3Kk1wYl12AsKw/9DSlqTOtNnss6NiowZtSO17bnfJlJwCUFOaBpU
-CHTI/78DcPGb72Uu4iN0EnfEJd7+WKmp+tL7S0BwJDErvGQ=
------END CERTIFICATE-----
diff --git a/tests/cert-svc/data/TestData/ssl/cert_chain/cert_chain_no_aia10.key b/tests/cert-svc/data/TestData/ssl/cert_chain/cert_chain_no_aia10.key
deleted file mode 100644 (file)
index a6a95d5..0000000
+++ /dev/null
@@ -1,15 +0,0 @@
------BEGIN RSA PRIVATE KEY-----
-MIICXAIBAAKBgQDfBy/uVHZJUp8Wego5L0RtF2fKagzXQsJFYPm3ouLqL1MUaQJX
-Bn5Etsdrn0G4HCoXazilicDs4kzAWZdsjRfP5YY9O7FpkID+hHs3TrkdXpj8RjjH
-8SYkfXr8+tdRWdG6XweFnkPf/W5fNcik/iSiXoq7AbVdxcsOQPXpTAsAQwIDAQAB
-AoGBALSKYOaRQN/CHj5XtIbuGHonBEH670IiLJl1EzDwjrf8b0iKaPaBrx14yJ36
-YXzkb75dcZGvnZkk5/SdkdKxtJ93Y83Gan34fWXWZFurdBs6B26v4wVAaRYofR53
-/75CnfCDelDH5HgtHj8tw/F4zBIxC3r7CsFn04lKQM+mEd1hAkEA+rYoUSTA9RPB
-1Ki1gRiwph3Zan5Tsgt2qngWU0Ek/wsqKkwSeRgHZ5AkpsunKal7bGKMHA3yPo02
-E2EDEHLmTQJBAOO7ifiUoN88roep9pl0diYfLclTUakPViDlzIO7gulvNR0mq43D
-BH1JAUVMU19A8VbilKnUS2q6bqpqaCih6M8CQHUFnV/ypdY++JRIgx/U5G9FM3xP
-psVOMH91OgZ2O8yH65B+nYjEPICMeW8ZU9dQcnmurfNSVyX3R6xX9dQxrWkCQHLC
-1TqBm7gjmkgfbHfUap23ZJlp9WLeqaaWZ0OTQNtmATwZeqZLun1wRsWnOvRrg7Mn
-J4eVxhOYs6AJU0f2n50CQHfQU3xMJiTFfLvO8FV4fD39w141xYooC2glDWPFns+b
-v3Wkd9M6Nuv+gOB9vdG9I5+X9XSkKonkmcwU9Odjv8k=
------END RSA PRIVATE KEY-----
diff --git a/tests/cert-svc/data/TestData/ssl/cert_chain/cert_chain_no_aia2.crl b/tests/cert-svc/data/TestData/ssl/cert_chain/cert_chain_no_aia2.crl
deleted file mode 100644 (file)
index e22ec2c..0000000
+++ /dev/null
@@ -1,11 +0,0 @@
------BEGIN CERTIFICATE REQUEST-----
-MIIBqzCCARQCAQAwazELMAkGA1UEBhMCS1IxEzARBgNVBAgTCkt5dW5nR2ktRG8x
-ETAPBgNVBAcTCFN1d29uLVNpMRYwFAYDVQQKEw1TYW1zdW5nIEVsZWMuMRwwGgYD
-VQQDExNDZXJ0IENoYWluIE5vIEFJQSAyMIGfMA0GCSqGSIb3DQEBAQUAA4GNADCB
-iQKBgQDTOaekGWEoNU/wm/C4jVXp2k01nj1swDCxi8BQpAhq1uP68/HLnxQutsvS
-Fz29izGOyJUT8PwDQjACmGzuKunBKp954Ak1p269cGKuCVNUqWI2I7cVmAHGxVJH
-oYzB3nxNhjjQEiRXdpm6HyNiIKV5EqKakLiqUJZZFu0pdJ1nUwIDAQABoAAwDQYJ
-KoZIhvcNAQEFBQADgYEAuEP1aoTsRfFjG8te5yZEEbD7I8uPVin7G0GUCxYE2oof
-p6C0vCW1CDvSJJ1vQJTF3v26PpKLROqpsiNKpr1uq/R12HanmTdBOgCb/2psEt5Q
-sljxJFtog+PwiGdVlUB0QIZDuUeJom/IvoQ3CxfjZsm9b98jtlCw9ccCJhTKtgI=
------END CERTIFICATE REQUEST-----
diff --git a/tests/cert-svc/data/TestData/ssl/cert_chain/cert_chain_no_aia2.crt b/tests/cert-svc/data/TestData/ssl/cert_chain/cert_chain_no_aia2.crt
deleted file mode 100644 (file)
index 06691f5..0000000
+++ /dev/null
@@ -1,52 +0,0 @@
-Certificate:
-    Data:
-        Version: 3 (0x2)
-        Serial Number: 56 (0x38)
-        Signature Algorithm: sha1WithRSAEncryption
-        Issuer: C=KR, ST=KyungGi-Do, O=Samsung Elec., CN=Cert Chain No AIA 1
-        Validity
-            Not Before: Mar 24 07:21:45 2009 GMT
-            Not After : Mar 24 07:21:45 2010 GMT
-        Subject: C=KR, ST=KyungGi-Do, O=Samsung Elec., CN=Cert Chain No AIA 2
-        Subject Public Key Info:
-            Public Key Algorithm: rsaEncryption
-            RSA Public Key: (1024 bit)
-                Modulus (1024 bit):
-                    00:d3:39:a7:a4:19:61:28:35:4f:f0:9b:f0:b8:8d:
-                    55:e9:da:4d:35:9e:3d:6c:c0:30:b1:8b:c0:50:a4:
-                    08:6a:d6:e3:fa:f3:f1:cb:9f:14:2e:b6:cb:d2:17:
-                    3d:bd:8b:31:8e:c8:95:13:f0:fc:03:42:30:02:98:
-                    6c:ee:2a:e9:c1:2a:9f:79:e0:09:35:a7:6e:bd:70:
-                    62:ae:09:53:54:a9:62:36:23:b7:15:98:01:c6:c5:
-                    52:47:a1:8c:c1:de:7c:4d:86:38:d0:12:24:57:76:
-                    99:ba:1f:23:62:20:a5:79:12:a2:9a:90:b8:aa:50:
-                    96:59:16:ed:29:74:9d:67:53
-                Exponent: 65537 (0x10001)
-        X509v3 extensions:
-            Authority Information Access: 
-                OCSP - URI:http://127.0.0.1:89/0002
-
-    Signature Algorithm: sha1WithRSAEncryption
-        29:8e:68:80:e0:f2:ce:29:e5:70:95:67:0d:51:4a:a8:a0:9c:
-        9f:4f:2f:3a:83:40:67:6e:01:cb:21:bf:4a:a7:16:3d:df:f8:
-        2b:ca:6d:86:92:cc:46:99:99:b5:11:09:4d:25:c7:15:5f:64:
-        66:1a:18:69:ce:37:86:96:ab:e6:2e:3d:63:a3:cf:14:91:3b:
-        19:fc:79:a7:37:60:eb:51:12:3f:4d:3b:07:6c:0e:ae:69:2c:
-        07:4d:6a:ca:5d:97:e5:f0:24:96:7e:fa:f3:83:ec:53:7a:b1:
-        53:cb:42:c5:15:b0:04:9f:36:5c:d0:d5:92:49:38:e5:a5:ef:
-        91:d2
------BEGIN CERTIFICATE-----
-MIICXjCCAcegAwIBAgIBODANBgkqhkiG9w0BAQUFADBYMQswCQYDVQQGEwJLUjET
-MBEGA1UECBMKS3l1bmdHaS1EbzEWMBQGA1UEChMNU2Ftc3VuZyBFbGVjLjEcMBoG
-A1UEAxMTQ2VydCBDaGFpbiBObyBBSUEgMTAeFw0wOTAzMjQwNzIxNDVaFw0xMDAz
-MjQwNzIxNDVaMFgxCzAJBgNVBAYTAktSMRMwEQYDVQQIEwpLeXVuZ0dpLURvMRYw
-FAYDVQQKEw1TYW1zdW5nIEVsZWMuMRwwGgYDVQQDExNDZXJ0IENoYWluIE5vIEFJ
-QSAyMIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQDTOaekGWEoNU/wm/C4jVXp
-2k01nj1swDCxi8BQpAhq1uP68/HLnxQutsvSFz29izGOyJUT8PwDQjACmGzuKunB
-Kp954Ak1p269cGKuCVNUqWI2I7cVmAHGxVJHoYzB3nxNhjjQEiRXdpm6HyNiIKV5
-EqKakLiqUJZZFu0pdJ1nUwIDAQABozgwNjA0BggrBgEFBQcBAQQoMCYwJAYIKwYB
-BQUHMAGGGGh0dHA6Ly8xMjcuMC4wLjE6ODkvMDAwMjANBgkqhkiG9w0BAQUFAAOB
-gQApjmiA4PLOKeVwlWcNUUqooJyfTy86g0BnbgHLIb9KpxY93/grym2GksxGmZm1
-EQlNJccVX2RmGhhpzjeGlqvmLj1jo88UkTsZ/HmnN2DrURI/TTsHbA6uaSwHTWrK
-XZfl8CSWfvrzg+xTerFTy0LFFbAEnzZc0NWSSTjlpe+R0g==
------END CERTIFICATE-----
diff --git a/tests/cert-svc/data/TestData/ssl/cert_chain/cert_chain_no_aia2.key b/tests/cert-svc/data/TestData/ssl/cert_chain/cert_chain_no_aia2.key
deleted file mode 100644 (file)
index 265f30d..0000000
+++ /dev/null
@@ -1,15 +0,0 @@
------BEGIN RSA PRIVATE KEY-----
-MIICXAIBAAKBgQDTOaekGWEoNU/wm/C4jVXp2k01nj1swDCxi8BQpAhq1uP68/HL
-nxQutsvSFz29izGOyJUT8PwDQjACmGzuKunBKp954Ak1p269cGKuCVNUqWI2I7cV
-mAHGxVJHoYzB3nxNhjjQEiRXdpm6HyNiIKV5EqKakLiqUJZZFu0pdJ1nUwIDAQAB
-AoGASSfMwe7wUWa1exXnN2Pr/4RV/V4C1Cl0M+m8/7DwIWCvsPjQI7/C07MHwInA
-HmeZEGS0DSYHgnFoA14bTBmcv2Jh+XJRsjN8Qari8gsfoC3+gTT1CuvrVxP55xM7
-w5c/hUKBIbhyAMHfcS/lqV+o+1ahxSMtbHWkKZYL/i3h/oECQQD/lt6wu0Ne2jwy
-iHchL6l+Sz5bMpW9Qx23WpwiGPOlh3YzwDZHZRNmkJbXI3sIXvC8mjSOhyxI33iB
-NlpoZEIhAkEA05CJc53tiIBqg4YzlxKw5u/oeR0qvGFJFP6D8UnRTSet0R/hnlAX
-VVns28irMOGZ3gRLskRxv0EMRoViO+Ji8wJBAJO3qYrxH/XRIZt/HYLznf0dFbP1
-n29cO+99keFvFFol2V39iCFpPHY5uMQsgG4NGQuYACoj26deaLIdLNFKqKECQD4A
-4ze+NipGMHFBeIczFCNqdkBgmvDAtlFv0i16C9xH37olVNM3986s3yz+n6VgyN53
-ddPWGVwK7VURrFuOmp8CQEEDc0bBtkJgXfObV2PYGJRVuGGP6S1RqL+7VNfmu5/+
-ZJAdwJZOdl3PDL8b9XNSgayuBCK6Wwt3GGzdtvqz76s=
------END RSA PRIVATE KEY-----
diff --git a/tests/cert-svc/data/TestData/ssl/cert_chain/cert_chain_no_aia3.crl b/tests/cert-svc/data/TestData/ssl/cert_chain/cert_chain_no_aia3.crl
deleted file mode 100644 (file)
index 03710eb..0000000
+++ /dev/null
@@ -1,11 +0,0 @@
------BEGIN CERTIFICATE REQUEST-----
-MIIBqzCCARQCAQAwazELMAkGA1UEBhMCS1IxEzARBgNVBAgTCkt5dW5nR2ktRG8x
-ETAPBgNVBAcTCFN1d29uLVNpMRYwFAYDVQQKEw1TYW1zdW5nIEVsZWMuMRwwGgYD
-VQQDExNDZXJ0IENoYWluIE5vIEFJQSAzMIGfMA0GCSqGSIb3DQEBAQUAA4GNADCB
-iQKBgQCjhFcier8v7KbTxvLhFJKOnbFa8m+Zn1MI0fnvANqnLcNkbzHfTEkgBoiS
-18b/DJlJ0MVXu+qHTQasaDVqPiNs3S9OfPyc5tAdZeSHeX7ZwB7Ne/WBv3mK2G6U
-IvF5ptxS6u3m94YxXbc5/M1z7Q0f8sp5uiUe9LlsvCgIqUaqHQIDAQABoAAwDQYJ
-KoZIhvcNAQEFBQADgYEAKD2wV5jk1IjZY09e6qCrmlqDo0ma4FPHXXTkHHrah3qW
-ThqhAGLs6tukFkzqKiPRx9yxL8Pp+TtLtaPmLO+nX8QbEABXArgJIVrIeuPQPwbW
-L8OL2+glnnygdWD2yzNXSddn8k2HpZS1IWhjRg8vUTied9rhwzPq1N4uk79TQAU=
------END CERTIFICATE REQUEST-----
diff --git a/tests/cert-svc/data/TestData/ssl/cert_chain/cert_chain_no_aia3.crt b/tests/cert-svc/data/TestData/ssl/cert_chain/cert_chain_no_aia3.crt
deleted file mode 100644 (file)
index f37e1a2..0000000
+++ /dev/null
@@ -1,62 +0,0 @@
-Certificate:
-    Data:
-        Version: 3 (0x2)
-        Serial Number: 57 (0x39)
-        Signature Algorithm: sha1WithRSAEncryption
-        Issuer: C=KR, ST=KyungGi-Do, O=Samsung Elec., CN=Cert Chain No AIA 2
-        Validity
-            Not Before: Mar 24 07:21:47 2009 GMT
-            Not After : Mar 24 07:21:47 2010 GMT
-        Subject: C=KR, ST=KyungGi-Do, O=Samsung Elec., CN=Cert Chain No AIA 3
-        Subject Public Key Info:
-            Public Key Algorithm: rsaEncryption
-            RSA Public Key: (1024 bit)
-                Modulus (1024 bit):
-                    00:a3:84:57:22:7a:bf:2f:ec:a6:d3:c6:f2:e1:14:
-                    92:8e:9d:b1:5a:f2:6f:99:9f:53:08:d1:f9:ef:00:
-                    da:a7:2d:c3:64:6f:31:df:4c:49:20:06:88:92:d7:
-                    c6:ff:0c:99:49:d0:c5:57:bb:ea:87:4d:06:ac:68:
-                    35:6a:3e:23:6c:dd:2f:4e:7c:fc:9c:e6:d0:1d:65:
-                    e4:87:79:7e:d9:c0:1e:cd:7b:f5:81:bf:79:8a:d8:
-                    6e:94:22:f1:79:a6:dc:52:ea:ed:e6:f7:86:31:5d:
-                    b7:39:fc:cd:73:ed:0d:1f:f2:ca:79:ba:25:1e:f4:
-                    b9:6c:bc:28:08:a9:46:aa:1d
-                Exponent: 65537 (0x10001)
-        X509v3 extensions:
-            X509v3 Basic Constraints: 
-                CA:FALSE
-            Netscape Comment: 
-                OpenSSL Generated Certificate
-            X509v3 Subject Key Identifier: 
-                05:E8:B5:E4:89:7E:CD:72:28:E1:08:B5:B2:9F:8E:A2:13:2B:2C:A7
-            X509v3 Authority Key Identifier: 
-                DirName:/C=KR/ST=KyungGi-Do/O=Samsung Elec./CN=Cert Chain No AIA 1
-                serial:38
-
-    Signature Algorithm: sha1WithRSAEncryption
-        36:e5:af:2d:c4:bd:c1:16:27:74:f0:0a:a5:12:4c:da:d6:e2:
-        60:98:ee:3d:7a:d1:55:a0:ed:57:fd:6b:9b:fc:19:4b:f3:b2:
-        41:19:a7:6c:f7:15:63:68:18:09:6d:db:23:f9:e1:2a:d6:75:
-        e5:18:46:2b:82:57:4e:1a:f8:03:fa:3d:7c:aa:70:8e:17:25:
-        c6:b2:ab:ca:94:90:fd:2a:69:53:f5:11:81:68:06:f8:2d:5d:
-        92:39:b4:96:f0:d0:b5:03:c2:15:26:f4:e9:c0:9a:28:39:dd:
-        67:ea:a6:9f:27:44:69:2e:95:e0:a1:03:f6:3c:a1:f7:92:f4:
-        a2:b8
------BEGIN CERTIFICATE-----
-MIIC7jCCAlegAwIBAgIBOTANBgkqhkiG9w0BAQUFADBYMQswCQYDVQQGEwJLUjET
-MBEGA1UECBMKS3l1bmdHaS1EbzEWMBQGA1UEChMNU2Ftc3VuZyBFbGVjLjEcMBoG
-A1UEAxMTQ2VydCBDaGFpbiBObyBBSUEgMjAeFw0wOTAzMjQwNzIxNDdaFw0xMDAz
-MjQwNzIxNDdaMFgxCzAJBgNVBAYTAktSMRMwEQYDVQQIEwpLeXVuZ0dpLURvMRYw
-FAYDVQQKEw1TYW1zdW5nIEVsZWMuMRwwGgYDVQQDExNDZXJ0IENoYWluIE5vIEFJ
-QSAzMIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQCjhFcier8v7KbTxvLhFJKO
-nbFa8m+Zn1MI0fnvANqnLcNkbzHfTEkgBoiS18b/DJlJ0MVXu+qHTQasaDVqPiNs
-3S9OfPyc5tAdZeSHeX7ZwB7Ne/WBv3mK2G6UIvF5ptxS6u3m94YxXbc5/M1z7Q0f
-8sp5uiUe9LlsvCgIqUaqHQIDAQABo4HHMIHEMAkGA1UdEwQCMAAwLAYJYIZIAYb4
-QgENBB8WHU9wZW5TU0wgR2VuZXJhdGVkIENlcnRpZmljYXRlMB0GA1UdDgQWBBQF
-6LXkiX7NcijhCLWyn46iEysspzBqBgNVHSMEYzBhoVykWjBYMQswCQYDVQQGEwJL
-UjETMBEGA1UECBMKS3l1bmdHaS1EbzEWMBQGA1UEChMNU2Ftc3VuZyBFbGVjLjEc
-MBoGA1UEAxMTQ2VydCBDaGFpbiBObyBBSUEgMYIBODANBgkqhkiG9w0BAQUFAAOB
-gQA25a8txL3BFid08AqlEkza1uJgmO49etFVoO1X/Wub/BlL87JBGads9xVjaBgJ
-bdsj+eEq1nXlGEYrgldOGvgD+j18qnCOFyXGsqvKlJD9KmlT9RGBaAb4LV2SObSW
-8NC1A8IVJvTpwJooOd1n6qafJ0RpLpXgoQP2PKH3kvSiuA==
------END CERTIFICATE-----
diff --git a/tests/cert-svc/data/TestData/ssl/cert_chain/cert_chain_no_aia3.key b/tests/cert-svc/data/TestData/ssl/cert_chain/cert_chain_no_aia3.key
deleted file mode 100644 (file)
index 0217b1c..0000000
+++ /dev/null
@@ -1,15 +0,0 @@
------BEGIN RSA PRIVATE KEY-----
-MIICXQIBAAKBgQCjhFcier8v7KbTxvLhFJKOnbFa8m+Zn1MI0fnvANqnLcNkbzHf
-TEkgBoiS18b/DJlJ0MVXu+qHTQasaDVqPiNs3S9OfPyc5tAdZeSHeX7ZwB7Ne/WB
-v3mK2G6UIvF5ptxS6u3m94YxXbc5/M1z7Q0f8sp5uiUe9LlsvCgIqUaqHQIDAQAB
-AoGAbD/eV2sfSqDGSIj6nVs7MsLeeLDqhK7fD4XCiiDsn6RCKCkcwREFj/gDTgMf
-MBWtHRriqhQzTOMHOfe69NyyIf7eXihRjkX7Ist+gi1wiKqdr0ECECC3sGdWR/pu
-wLBDtC2ynqiezbxog+/3C3YWs0+DTsnn87aOeKbIIfoMSFkCQQDNBAqw/BKw4dDd
-msMGJqbI3UIobZVOEXLwTi3ZWwDMIM+HMJPyT62U67cCg35M4L/EMxYBYMhqdS3f
-tixN9+bLAkEAzC5ZxDEG4S3j44m1Ff58qBStbV4SBlM18jZgjEVqeYlqStWq8U7J
-lJLpa3F8C26bUNWXTwl7i5BIykpGjZ0ttwJAAdIVXjj+2X9H4Y/sR3O0a3g7jCxc
-9RKGmMe49IMwYJ+x+BtgVPiMLBRjzavpRTmBunZRrbV0Ui20OJZfklmvPQJBAIiX
-EVIgAhwtmOAkxVGbV0UR4Brj7Wbxz4rjOZ9c6Ke5d7PsUFjxfgS4axKHbpYvPhPL
-b1deXpm0wh0hpyUhWu0CQQCX+HNWjZ/3oGTxWHVWhj7Q1J18CyxDj7SISA87mv84
-QZuso4AGYpbuZUdWr2cJcBvbP+ZX7DCjsr+5Ns/3Foqq
------END RSA PRIVATE KEY-----
diff --git a/tests/cert-svc/data/TestData/ssl/cert_chain/cert_chain_no_aia4.crl b/tests/cert-svc/data/TestData/ssl/cert_chain/cert_chain_no_aia4.crl
deleted file mode 100644 (file)
index 7b200b5..0000000
+++ /dev/null
@@ -1,11 +0,0 @@
------BEGIN CERTIFICATE REQUEST-----
-MIIBqzCCARQCAQAwazELMAkGA1UEBhMCS1IxEzARBgNVBAgTCkt5dW5nR2ktRG8x
-ETAPBgNVBAcTCFN1d29uLVNpMRYwFAYDVQQKEw1TYW1zdW5nIEVsZWMuMRwwGgYD
-VQQDExNDZXJ0IENoYWluIE5vIEFJQSA0MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCB
-iQKBgQDLjdBvdPcqlkda+ePVcjqBlMcP4qKbEU6SFWHcP7j9n7iuGFQlyuAaj0n3
-4YFkdkdatLydEQltx3EDzTirhV9pWu1rqjKnhbR1mqrc7O6dTgNR446miYLjJhNC
-mYcEX1lYQ4ky7do06bLKM68p6yAL50oQDD8AlHU2xfhNS6SIlQIDAQABoAAwDQYJ
-KoZIhvcNAQEFBQADgYEAgVwPigLP9cqlHrcmhsgMxqsmem1hsw2tmMBK3kccxat+
-c/sHgX5E5MHrUPta5NTlhsiA+A4PABY7Jr/WpGww3/iXJr5UUq+lLpTRg2wYL57c
-FzieD8na8Pve5KLhgdPwAwuQjLjV8ZlADIGUSoqEMBbT4oSxXoPXKHZJHbQyUrI=
------END CERTIFICATE REQUEST-----
diff --git a/tests/cert-svc/data/TestData/ssl/cert_chain/cert_chain_no_aia4.crt b/tests/cert-svc/data/TestData/ssl/cert_chain/cert_chain_no_aia4.crt
deleted file mode 100644 (file)
index a08d32c..0000000
+++ /dev/null
@@ -1,52 +0,0 @@
-Certificate:
-    Data:
-        Version: 3 (0x2)
-        Serial Number: 58 (0x3a)
-        Signature Algorithm: sha1WithRSAEncryption
-        Issuer: C=KR, ST=KyungGi-Do, O=Samsung Elec., CN=Cert Chain No AIA 3
-        Validity
-            Not Before: Mar 24 07:21:48 2009 GMT
-            Not After : Mar 24 07:21:48 2010 GMT
-        Subject: C=KR, ST=KyungGi-Do, O=Samsung Elec., CN=Cert Chain No AIA 4
-        Subject Public Key Info:
-            Public Key Algorithm: rsaEncryption
-            RSA Public Key: (1024 bit)
-                Modulus (1024 bit):
-                    00:cb:8d:d0:6f:74:f7:2a:96:47:5a:f9:e3:d5:72:
-                    3a:81:94:c7:0f:e2:a2:9b:11:4e:92:15:61:dc:3f:
-                    b8:fd:9f:b8:ae:18:54:25:ca:e0:1a:8f:49:f7:e1:
-                    81:64:76:47:5a:b4:bc:9d:11:09:6d:c7:71:03:cd:
-                    38:ab:85:5f:69:5a:ed:6b:aa:32:a7:85:b4:75:9a:
-                    aa:dc:ec:ee:9d:4e:03:51:e3:8e:a6:89:82:e3:26:
-                    13:42:99:87:04:5f:59:58:43:89:32:ed:da:34:e9:
-                    b2:ca:33:af:29:eb:20:0b:e7:4a:10:0c:3f:00:94:
-                    75:36:c5:f8:4d:4b:a4:88:95
-                Exponent: 65537 (0x10001)
-        X509v3 extensions:
-            Authority Information Access: 
-                OCSP - URI:http://127.0.0.1:89/0002
-
-    Signature Algorithm: sha1WithRSAEncryption
-        6f:51:b6:28:15:d9:aa:56:70:0d:2a:f0:52:8b:c4:53:47:68:
-        78:fe:fe:89:c2:3b:87:23:40:87:04:02:67:74:4d:3c:cc:39:
-        48:30:f6:9c:12:74:be:48:26:5a:7c:a1:bf:d0:fa:19:89:63:
-        66:fe:44:2d:f5:e5:e8:9f:57:c5:20:fe:f0:10:2f:f0:6d:16:
-        ef:a0:2b:db:95:05:72:cb:63:e4:2b:28:38:8f:aa:b9:51:f2:
-        88:19:0e:c1:c8:e7:0d:66:b8:13:f2:13:2d:ee:f0:dd:98:56:
-        04:af:c6:c8:81:07:ce:44:f5:23:7b:a4:72:32:4d:43:a9:61:
-        72:d6
------BEGIN CERTIFICATE-----
-MIICXjCCAcegAwIBAgIBOjANBgkqhkiG9w0BAQUFADBYMQswCQYDVQQGEwJLUjET
-MBEGA1UECBMKS3l1bmdHaS1EbzEWMBQGA1UEChMNU2Ftc3VuZyBFbGVjLjEcMBoG
-A1UEAxMTQ2VydCBDaGFpbiBObyBBSUEgMzAeFw0wOTAzMjQwNzIxNDhaFw0xMDAz
-MjQwNzIxNDhaMFgxCzAJBgNVBAYTAktSMRMwEQYDVQQIEwpLeXVuZ0dpLURvMRYw
-FAYDVQQKEw1TYW1zdW5nIEVsZWMuMRwwGgYDVQQDExNDZXJ0IENoYWluIE5vIEFJ
-QSA0MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQDLjdBvdPcqlkda+ePVcjqB
-lMcP4qKbEU6SFWHcP7j9n7iuGFQlyuAaj0n34YFkdkdatLydEQltx3EDzTirhV9p
-Wu1rqjKnhbR1mqrc7O6dTgNR446miYLjJhNCmYcEX1lYQ4ky7do06bLKM68p6yAL
-50oQDD8AlHU2xfhNS6SIlQIDAQABozgwNjA0BggrBgEFBQcBAQQoMCYwJAYIKwYB
-BQUHMAGGGGh0dHA6Ly8xMjcuMC4wLjE6ODkvMDAwMjANBgkqhkiG9w0BAQUFAAOB
-gQBvUbYoFdmqVnANKvBSi8RTR2h4/v6JwjuHI0CHBAJndE08zDlIMPacEnS+SCZa
-fKG/0PoZiWNm/kQt9eXon1fFIP7wEC/wbRbvoCvblQVyy2PkKyg4j6q5UfKIGQ7B
-yOcNZrgT8hMt7vDdmFYEr8bIgQfORPUje6RyMk1DqWFy1g==
------END CERTIFICATE-----
diff --git a/tests/cert-svc/data/TestData/ssl/cert_chain/cert_chain_no_aia4.key b/tests/cert-svc/data/TestData/ssl/cert_chain/cert_chain_no_aia4.key
deleted file mode 100644 (file)
index 6785e26..0000000
+++ /dev/null
@@ -1,15 +0,0 @@
------BEGIN RSA PRIVATE KEY-----
-MIICXQIBAAKBgQDLjdBvdPcqlkda+ePVcjqBlMcP4qKbEU6SFWHcP7j9n7iuGFQl
-yuAaj0n34YFkdkdatLydEQltx3EDzTirhV9pWu1rqjKnhbR1mqrc7O6dTgNR446m
-iYLjJhNCmYcEX1lYQ4ky7do06bLKM68p6yAL50oQDD8AlHU2xfhNS6SIlQIDAQAB
-AoGBAJMGntwypujq3SV4Q7mDpYC9Xr85muvYp2Da8vFsUYlYGcQeLIGTtSVaBDp4
-dsaCrG13CJmGmcHigd4WGG3DizK7HnlOU6GuKdJfISJAT0Di/oSnH1gpIxGzxsA0
-IAjrncQT0yPcXtS/YXv4VMhOHdWTmaZvsuP0aJjd04hg/yyhAkEA623ruT6oKxk6
-5QeO8OFhUxi9ahgzQYHfHU9bXshRoCVA9OE9EzxyYvQRJa4s2WcJoRmFpwTPQoUW
-iZnhKBBr2QJBAN1W56AFsqtNY33joZA1GIjZEhgbeZF1w+VUUcYWQ8wvOFYYq71S
-lmw2QpZdAhgFtQ5Sy31xVbbp7USrAoXNOR0CQCyyD6B5jr+v6Ih2qOJ+R1XZSoyL
-z59OIqeT20rhSO3YZL6YzFmMjkLPBzpaGNWlRCS7ja4psZd1YNP6zM4oX/ECQB0u
-F9tA5Q0wZq1yFRqt5U4lT/1doelLXUgelalHxihlEUhIeFu9R5d8j8rC+EOyfOwm
-fi1Lg8FZla433V1GcQECQQCDC1toUTOs6zQMR8Qjbg806oEeNCrXCuRSvER9F216
-W/gfkyu3O7ZMyTLDzssExEBemXqIwP7cPvi4AudCR+rF
------END RSA PRIVATE KEY-----
diff --git a/tests/cert-svc/data/TestData/ssl/cert_chain/cert_chain_no_aia5.crl b/tests/cert-svc/data/TestData/ssl/cert_chain/cert_chain_no_aia5.crl
deleted file mode 100644 (file)
index 3cd2191..0000000
+++ /dev/null
@@ -1,11 +0,0 @@
------BEGIN CERTIFICATE REQUEST-----
-MIIBqzCCARQCAQAwazELMAkGA1UEBhMCS1IxEzARBgNVBAgTCkt5dW5nR2ktRG8x
-ETAPBgNVBAcTCFN1d29uLVNpMRYwFAYDVQQKEw1TYW1zdW5nIEVsZWMuMRwwGgYD
-VQQDExNDZXJ0IENoYWluIE5vIEFJQSA1MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCB
-iQKBgQDbDHCjS40S+kdfXzpBkRh6m+OvmVZwlnF90Hzu2dI6kMtCyOsGpYEko9Ce
-0DMEiFCk4jI3GrikP3dWtD+pzCd+ycmJHspktk7m/PoXzjuUf7IUb0CteHXzCb5i
-Db6vQGHcFkuUTIsWznlfl1lWGYoj6iF8PQJTCTIXtifubjEeTQIDAQABoAAwDQYJ
-KoZIhvcNAQEFBQADgYEArvxoIPSE97c62AF3OvMdckVtQeJLJqqBfNYXoLwlzoEo
-h56Sn+WtrrLEcqp1wt196Wn0BOFjZIzVSMEyNSX5WZ7m5CQskdHHeXjQ9lOkKU7e
-Z58GLZL8g+8Z7hJitgAUFdVeDDt4yxRI5KTWeSNziKL2Nt9qnqf/KNZa7E6qbPU=
------END CERTIFICATE REQUEST-----
diff --git a/tests/cert-svc/data/TestData/ssl/cert_chain/cert_chain_no_aia5.crt b/tests/cert-svc/data/TestData/ssl/cert_chain/cert_chain_no_aia5.crt
deleted file mode 100644 (file)
index d0cedf9..0000000
+++ /dev/null
@@ -1,52 +0,0 @@
-Certificate:
-    Data:
-        Version: 3 (0x2)
-        Serial Number: 59 (0x3b)
-        Signature Algorithm: sha1WithRSAEncryption
-        Issuer: C=KR, ST=KyungGi-Do, O=Samsung Elec., CN=Cert Chain No AIA 4
-        Validity
-            Not Before: Mar 24 07:21:49 2009 GMT
-            Not After : Mar 24 07:21:49 2010 GMT
-        Subject: C=KR, ST=KyungGi-Do, O=Samsung Elec., CN=Cert Chain No AIA 5
-        Subject Public Key Info:
-            Public Key Algorithm: rsaEncryption
-            RSA Public Key: (1024 bit)
-                Modulus (1024 bit):
-                    00:db:0c:70:a3:4b:8d:12:fa:47:5f:5f:3a:41:91:
-                    18:7a:9b:e3:af:99:56:70:96:71:7d:d0:7c:ee:d9:
-                    d2:3a:90:cb:42:c8:eb:06:a5:81:24:a3:d0:9e:d0:
-                    33:04:88:50:a4:e2:32:37:1a:b8:a4:3f:77:56:b4:
-                    3f:a9:cc:27:7e:c9:c9:89:1e:ca:64:b6:4e:e6:fc:
-                    fa:17:ce:3b:94:7f:b2:14:6f:40:ad:78:75:f3:09:
-                    be:62:0d:be:af:40:61:dc:16:4b:94:4c:8b:16:ce:
-                    79:5f:97:59:56:19:8a:23:ea:21:7c:3d:02:53:09:
-                    32:17:b6:27:ee:6e:31:1e:4d
-                Exponent: 65537 (0x10001)
-        X509v3 extensions:
-            Authority Information Access: 
-                OCSP - URI:http://127.0.0.1:89/0002
-
-    Signature Algorithm: sha1WithRSAEncryption
-        86:d9:2f:aa:12:1f:31:35:60:68:49:8c:4e:75:b3:5e:8f:f2:
-        81:69:79:7f:92:ca:32:ca:cf:a3:45:d0:8a:2c:d6:8b:9a:e6:
-        a8:3d:19:66:ee:3b:03:25:4b:ed:56:c2:49:09:99:98:b3:9f:
-        13:11:ee:b5:ad:00:b8:36:31:6e:91:f6:fd:f3:95:7e:90:b9:
-        0b:26:ab:06:72:cf:57:33:3c:88:4e:aa:c4:bb:89:a5:60:95:
-        11:b5:e6:eb:1f:8f:fb:b0:f0:c5:78:be:6a:7f:39:29:e4:5b:
-        7b:28:16:d2:b6:bf:38:af:25:de:7b:22:23:d3:23:ca:03:0d:
-        c6:08
------BEGIN CERTIFICATE-----
-MIICXjCCAcegAwIBAgIBOzANBgkqhkiG9w0BAQUFADBYMQswCQYDVQQGEwJLUjET
-MBEGA1UECBMKS3l1bmdHaS1EbzEWMBQGA1UEChMNU2Ftc3VuZyBFbGVjLjEcMBoG
-A1UEAxMTQ2VydCBDaGFpbiBObyBBSUEgNDAeFw0wOTAzMjQwNzIxNDlaFw0xMDAz
-MjQwNzIxNDlaMFgxCzAJBgNVBAYTAktSMRMwEQYDVQQIEwpLeXVuZ0dpLURvMRYw
-FAYDVQQKEw1TYW1zdW5nIEVsZWMuMRwwGgYDVQQDExNDZXJ0IENoYWluIE5vIEFJ
-QSA1MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQDbDHCjS40S+kdfXzpBkRh6
-m+OvmVZwlnF90Hzu2dI6kMtCyOsGpYEko9Ce0DMEiFCk4jI3GrikP3dWtD+pzCd+
-ycmJHspktk7m/PoXzjuUf7IUb0CteHXzCb5iDb6vQGHcFkuUTIsWznlfl1lWGYoj
-6iF8PQJTCTIXtifubjEeTQIDAQABozgwNjA0BggrBgEFBQcBAQQoMCYwJAYIKwYB
-BQUHMAGGGGh0dHA6Ly8xMjcuMC4wLjE6ODkvMDAwMjANBgkqhkiG9w0BAQUFAAOB
-gQCG2S+qEh8xNWBoSYxOdbNej/KBaXl/ksoyys+jRdCKLNaLmuaoPRlm7jsDJUvt
-VsJJCZmYs58TEe61rQC4NjFukfb985V+kLkLJqsGcs9XMzyITqrEu4mlYJURtebr
-H4/7sPDFeL5qfzkp5Ft7KBbStr84ryXeeyIj0yPKAw3GCA==
------END CERTIFICATE-----
diff --git a/tests/cert-svc/data/TestData/ssl/cert_chain/cert_chain_no_aia5.key b/tests/cert-svc/data/TestData/ssl/cert_chain/cert_chain_no_aia5.key
deleted file mode 100644 (file)
index 014cc30..0000000
+++ /dev/null
@@ -1,15 +0,0 @@
------BEGIN RSA PRIVATE KEY-----
-MIICXgIBAAKBgQDbDHCjS40S+kdfXzpBkRh6m+OvmVZwlnF90Hzu2dI6kMtCyOsG
-pYEko9Ce0DMEiFCk4jI3GrikP3dWtD+pzCd+ycmJHspktk7m/PoXzjuUf7IUb0Ct
-eHXzCb5iDb6vQGHcFkuUTIsWznlfl1lWGYoj6iF8PQJTCTIXtifubjEeTQIDAQAB
-AoGBANOC9ZiYMUar6RMMbsI1CsAJmxdKJw9cFYZ5NMmmBruKaNq6C0dFtKfejmlr
-fHfZ8JTl3bsb0EK5DdDpB7g7a73WT1338htfrH+3e0LRsj0hU7SidXOgb0Cw922d
-nRW53198ARkPc3b20uuFI71+4x8Vs5KDHiYNs644IpKD+2o5AkEA8WdqEkLaY3Wm
-muV5l9SZ5bKFDv+lWV7AQTjUGslJOxlq3AwB4hBK5CJiiybYyTcV3e4jWJZfnN/t
-J5NSeXVY9wJBAOhK/yp/UqblY96LgrlrfX7qQ+u6/drPHwp6JvlAGFyPzjN5WAO5
-i/9FZdKmjIvQOBu1OjvKjS5B/CpM4cTcVdsCQQDvEZJLaWesDgyj49RKV+LdRrFd
-TDHtUtek/+mWaXcbjy1zpHSM88OnMKJU2nDgvKvsMHVSuwEPc/gCNHT+Ege7AkAv
-/B4Nx1NpioVA2YzdhKjd6MKzFWOPKa392hHm9yiRJluwImbeDhwvVUSdaS4rS43r
-m1o2M7dKUPMoQc15fxJ1AkEAq8F4Ij94qy+eGc25H4ZkGOZTdr6iyn9ffncEqf42
-xvLu/L+RSuPu4VozAqzlXUWSi5Msnmxx0GaRtKJXZ/7AuQ==
------END RSA PRIVATE KEY-----
diff --git a/tests/cert-svc/data/TestData/ssl/cert_chain/cert_chain_no_aia6.crl b/tests/cert-svc/data/TestData/ssl/cert_chain/cert_chain_no_aia6.crl
deleted file mode 100644 (file)
index 56b32fd..0000000
+++ /dev/null
@@ -1,11 +0,0 @@
------BEGIN CERTIFICATE REQUEST-----
-MIIBqzCCARQCAQAwazELMAkGA1UEBhMCS1IxEzARBgNVBAgTCkt5dW5nR2ktRG8x
-ETAPBgNVBAcTCFN1d29uLVNpMRYwFAYDVQQKEw1TYW1zdW5nIEVsZWMuMRwwGgYD
-VQQDExNDZXJ0IENoYWluIE5vIEFJQSA2MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCB
-iQKBgQCWTobpyriDSEdy+q0BqCbAxgkQ7zfgYuZr4ZedFcLliPruUIH/6/tIgG/b
-QbdRWGTrjbcvAxoLNttTHRl8Sfl2DDk280/p9seQXwLd3OdRwkTMn4dME9TlkRxK
-7TOigHbIVn78yXMreNl+o7IjzWnKoaeM44yXPnGsyARWvZfN0QIDAQABoAAwDQYJ
-KoZIhvcNAQEFBQADgYEAQ9NTrKzNXwwH6oENb9jaNK6RKMaTzjpw+wLwVYEwy6zy
-cdewGroTrbWeDxUtHDPdxITo54b8HVJcPGytQtlSgpJHK9JxLlm1EBWMzAaRPMsK
-HUcL9JP716Saga0FddWLTrn5WWCQuqfZF31nBappGmXY0L+gl7vRpIMu6toCdAI=
------END CERTIFICATE REQUEST-----
diff --git a/tests/cert-svc/data/TestData/ssl/cert_chain/cert_chain_no_aia6.crt b/tests/cert-svc/data/TestData/ssl/cert_chain/cert_chain_no_aia6.crt
deleted file mode 100644 (file)
index 6e0a696..0000000
+++ /dev/null
@@ -1,52 +0,0 @@
-Certificate:
-    Data:
-        Version: 3 (0x2)
-        Serial Number: 60 (0x3c)
-        Signature Algorithm: sha1WithRSAEncryption
-        Issuer: C=KR, ST=KyungGi-Do, O=Samsung Elec., CN=Cert Chain No AIA 5
-        Validity
-            Not Before: Mar 24 07:21:50 2009 GMT
-            Not After : Mar 24 07:21:50 2010 GMT
-        Subject: C=KR, ST=KyungGi-Do, O=Samsung Elec., CN=Cert Chain No AIA 6
-        Subject Public Key Info:
-            Public Key Algorithm: rsaEncryption
-            RSA Public Key: (1024 bit)
-                Modulus (1024 bit):
-                    00:96:4e:86:e9:ca:b8:83:48:47:72:fa:ad:01:a8:
-                    26:c0:c6:09:10:ef:37:e0:62:e6:6b:e1:97:9d:15:
-                    c2:e5:88:fa:ee:50:81:ff:eb:fb:48:80:6f:db:41:
-                    b7:51:58:64:eb:8d:b7:2f:03:1a:0b:36:db:53:1d:
-                    19:7c:49:f9:76:0c:39:36:f3:4f:e9:f6:c7:90:5f:
-                    02:dd:dc:e7:51:c2:44:cc:9f:87:4c:13:d4:e5:91:
-                    1c:4a:ed:33:a2:80:76:c8:56:7e:fc:c9:73:2b:78:
-                    d9:7e:a3:b2:23:cd:69:ca:a1:a7:8c:e3:8c:97:3e:
-                    71:ac:c8:04:56:bd:97:cd:d1
-                Exponent: 65537 (0x10001)
-        X509v3 extensions:
-            Authority Information Access: 
-                OCSP - URI:http://127.0.0.1:89/0002
-
-    Signature Algorithm: sha1WithRSAEncryption
-        6f:e5:2b:c2:3c:65:22:24:f1:1c:a4:c4:c1:35:73:40:a0:8a:
-        f0:13:06:c7:46:19:83:51:e0:c6:9f:d8:49:93:59:41:3f:71:
-        2d:31:67:55:98:49:42:aa:07:42:81:b5:4f:29:11:36:3f:23:
-        47:75:75:89:18:95:a4:ea:af:9f:4f:b2:0e:0b:21:4e:74:4f:
-        2c:18:74:c9:05:21:55:e7:e7:b2:85:9a:4f:70:ce:d1:89:1d:
-        9e:f8:02:30:d0:60:c5:2a:78:87:67:9e:04:3e:8a:7b:f9:df:
-        0b:4e:41:3a:81:fa:35:fa:d7:77:5f:7c:1f:cc:59:da:94:9b:
-        94:55
------BEGIN CERTIFICATE-----
-MIICXjCCAcegAwIBAgIBPDANBgkqhkiG9w0BAQUFADBYMQswCQYDVQQGEwJLUjET
-MBEGA1UECBMKS3l1bmdHaS1EbzEWMBQGA1UEChMNU2Ftc3VuZyBFbGVjLjEcMBoG
-A1UEAxMTQ2VydCBDaGFpbiBObyBBSUEgNTAeFw0wOTAzMjQwNzIxNTBaFw0xMDAz
-MjQwNzIxNTBaMFgxCzAJBgNVBAYTAktSMRMwEQYDVQQIEwpLeXVuZ0dpLURvMRYw
-FAYDVQQKEw1TYW1zdW5nIEVsZWMuMRwwGgYDVQQDExNDZXJ0IENoYWluIE5vIEFJ
-QSA2MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQCWTobpyriDSEdy+q0BqCbA
-xgkQ7zfgYuZr4ZedFcLliPruUIH/6/tIgG/bQbdRWGTrjbcvAxoLNttTHRl8Sfl2
-DDk280/p9seQXwLd3OdRwkTMn4dME9TlkRxK7TOigHbIVn78yXMreNl+o7IjzWnK
-oaeM44yXPnGsyARWvZfN0QIDAQABozgwNjA0BggrBgEFBQcBAQQoMCYwJAYIKwYB
-BQUHMAGGGGh0dHA6Ly8xMjcuMC4wLjE6ODkvMDAwMjANBgkqhkiG9w0BAQUFAAOB
-gQBv5SvCPGUiJPEcpMTBNXNAoIrwEwbHRhmDUeDGn9hJk1lBP3EtMWdVmElCqgdC
-gbVPKRE2PyNHdXWJGJWk6q+fT7IOCyFOdE8sGHTJBSFV5+eyhZpPcM7RiR2e+AIw
-0GDFKniHZ54EPop7+d8LTkE6gfo1+td3X3wfzFnalJuUVQ==
------END CERTIFICATE-----
diff --git a/tests/cert-svc/data/TestData/ssl/cert_chain/cert_chain_no_aia6.key b/tests/cert-svc/data/TestData/ssl/cert_chain/cert_chain_no_aia6.key
deleted file mode 100644 (file)
index d4cb2bf..0000000
+++ /dev/null
@@ -1,15 +0,0 @@
------BEGIN RSA PRIVATE KEY-----
-MIICXAIBAAKBgQCWTobpyriDSEdy+q0BqCbAxgkQ7zfgYuZr4ZedFcLliPruUIH/
-6/tIgG/bQbdRWGTrjbcvAxoLNttTHRl8Sfl2DDk280/p9seQXwLd3OdRwkTMn4dM
-E9TlkRxK7TOigHbIVn78yXMreNl+o7IjzWnKoaeM44yXPnGsyARWvZfN0QIDAQAB
-AoGAXqPJPRIAxeDP5CzEnGN1KzJGaRxG0YlUTp836JfYJNDwNvgIMs0yZn9Abwzc
-0WJYAR01N2u7jU4YISgUcPbfFCcoH0f7p5xknHee9CYXt+YkNT52YNdungP60I4m
-1EQID3Xn4/h0+vsb6ZnlUMWUFfxhfBtixvwQZuZrtixbLfECQQDGym+ysZvvxyA5
-SfiH8Ixs93hixX5csyFyDieNFntI/otZt3R+RKSHSODGAXbPgOzIWrfD91/YA6R2
-LotEJFJtAkEAwZAdZ2xvV2uVuOxre5CZtXw1dMLZolC2thAmrqoAdMek1UcSK8wI
-ZdmE9XneAKcQx3esR0AvTIbKx24/6DFqdQJAOiN0fX+CSqMjIn4myKMqfqf1tnVq
-GnRtQK0xFgtQLS381VVZJaCvub0vt9kvxUpAdexKOG79wfB2xfWg12IEFQJBAKnV
-qGcZtqvuwuUJ09kMbEHYJRM48DpCNb6Td01j7piIn7Fe9aumD2xGKio07ryF2ewa
-rfeqcpXj40KPEtXJng0CQEPJULeB6FKRqzGWsyIe4u7ow2MjMIou7m66HyjvjkHP
-6Rg5DA0dSEjwJeMFQ8AklKPtLyuIyrkFunjctYXx0Cg=
------END RSA PRIVATE KEY-----
diff --git a/tests/cert-svc/data/TestData/ssl/cert_chain/cert_chain_no_aia7.crl b/tests/cert-svc/data/TestData/ssl/cert_chain/cert_chain_no_aia7.crl
deleted file mode 100644 (file)
index 6a397fb..0000000
+++ /dev/null
@@ -1,11 +0,0 @@
------BEGIN CERTIFICATE REQUEST-----
-MIIBqzCCARQCAQAwazELMAkGA1UEBhMCS1IxEzARBgNVBAgTCkt5dW5nR2ktRG8x
-ETAPBgNVBAcTCFN1d29uLVNpMRYwFAYDVQQKEw1TYW1zdW5nIEVsZWMuMRwwGgYD
-VQQDExNDZXJ0IENoYWluIE5vIEFJQSA3MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCB
-iQKBgQC0W/5IECvrWK/GDlcqpVzMV4VE8tnRQ4TTQIv3euDosZ3o9LFFxmcUm6Wo
-4o/LMabbYZANqgqeJtxLCzOifAdyke5q7Hc09H6lDjkTqNWGhhJbpIs4kVckjak7
-+PGmSIkgqVuz/spW8MrR7JmcV2rfjiOhfr5ffM+p2z+43KGaOQIDAQABoAAwDQYJ
-KoZIhvcNAQEFBQADgYEAA0W3BM0qKXbW57gq2ZOo6/ZRYMqv0snG1Nc7mjlQrXRO
-fojBgWh3k1olzNv1XVmLI/jo9fs9E7Xcuvipiv9KMb5ba7oBzWXx8fKvyjbVX8qL
-G/tlyNiuX4pRbYHdh3C+zkkgItktl/DmxF344t/8Jdm/m28opW7cH0e2Zpp14ts=
------END CERTIFICATE REQUEST-----
diff --git a/tests/cert-svc/data/TestData/ssl/cert_chain/cert_chain_no_aia7.crt b/tests/cert-svc/data/TestData/ssl/cert_chain/cert_chain_no_aia7.crt
deleted file mode 100644 (file)
index 87fdfab..0000000
+++ /dev/null
@@ -1,52 +0,0 @@
-Certificate:
-    Data:
-        Version: 3 (0x2)
-        Serial Number: 61 (0x3d)
-        Signature Algorithm: sha1WithRSAEncryption
-        Issuer: C=KR, ST=KyungGi-Do, O=Samsung Elec., CN=Cert Chain No AIA 6
-        Validity
-            Not Before: Mar 24 07:21:51 2009 GMT
-            Not After : Mar 24 07:21:51 2010 GMT
-        Subject: C=KR, ST=KyungGi-Do, O=Samsung Elec., CN=Cert Chain No AIA 7
-        Subject Public Key Info:
-            Public Key Algorithm: rsaEncryption
-            RSA Public Key: (1024 bit)
-                Modulus (1024 bit):
-                    00:b4:5b:fe:48:10:2b:eb:58:af:c6:0e:57:2a:a5:
-                    5c:cc:57:85:44:f2:d9:d1:43:84:d3:40:8b:f7:7a:
-                    e0:e8:b1:9d:e8:f4:b1:45:c6:67:14:9b:a5:a8:e2:
-                    8f:cb:31:a6:db:61:90:0d:aa:0a:9e:26:dc:4b:0b:
-                    33:a2:7c:07:72:91:ee:6a:ec:77:34:f4:7e:a5:0e:
-                    39:13:a8:d5:86:86:12:5b:a4:8b:38:91:57:24:8d:
-                    a9:3b:f8:f1:a6:48:89:20:a9:5b:b3:fe:ca:56:f0:
-                    ca:d1:ec:99:9c:57:6a:df:8e:23:a1:7e:be:5f:7c:
-                    cf:a9:db:3f:b8:dc:a1:9a:39
-                Exponent: 65537 (0x10001)
-        X509v3 extensions:
-            Authority Information Access: 
-                OCSP - URI:http://127.0.0.1:89/0002
-
-    Signature Algorithm: sha1WithRSAEncryption
-        1d:2e:83:cb:9e:92:3e:d2:0a:fb:74:87:66:3d:57:84:09:11:
-        4a:2a:68:0e:da:9e:4d:7b:25:af:56:fa:3c:d5:4c:02:fe:43:
-        dd:c3:66:c9:5d:55:50:40:15:8f:06:74:13:83:27:c5:19:7e:
-        55:f3:fa:26:ec:3e:c0:1a:5d:20:ee:09:af:38:83:f8:0e:da:
-        bf:07:87:07:a5:70:79:21:2c:38:5b:e0:f8:d1:57:0f:9b:d1:
-        ee:a3:86:02:b5:e0:5b:64:08:5f:64:8b:43:65:ac:60:8a:c9:
-        6f:47:37:66:61:c1:74:b0:74:0a:24:12:36:c1:28:58:b6:04:
-        9b:4c
------BEGIN CERTIFICATE-----
-MIICXjCCAcegAwIBAgIBPTANBgkqhkiG9w0BAQUFADBYMQswCQYDVQQGEwJLUjET
-MBEGA1UECBMKS3l1bmdHaS1EbzEWMBQGA1UEChMNU2Ftc3VuZyBFbGVjLjEcMBoG
-A1UEAxMTQ2VydCBDaGFpbiBObyBBSUEgNjAeFw0wOTAzMjQwNzIxNTFaFw0xMDAz
-MjQwNzIxNTFaMFgxCzAJBgNVBAYTAktSMRMwEQYDVQQIEwpLeXVuZ0dpLURvMRYw
-FAYDVQQKEw1TYW1zdW5nIEVsZWMuMRwwGgYDVQQDExNDZXJ0IENoYWluIE5vIEFJ
-QSA3MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQC0W/5IECvrWK/GDlcqpVzM
-V4VE8tnRQ4TTQIv3euDosZ3o9LFFxmcUm6Wo4o/LMabbYZANqgqeJtxLCzOifAdy
-ke5q7Hc09H6lDjkTqNWGhhJbpIs4kVckjak7+PGmSIkgqVuz/spW8MrR7JmcV2rf
-jiOhfr5ffM+p2z+43KGaOQIDAQABozgwNjA0BggrBgEFBQcBAQQoMCYwJAYIKwYB
-BQUHMAGGGGh0dHA6Ly8xMjcuMC4wLjE6ODkvMDAwMjANBgkqhkiG9w0BAQUFAAOB
-gQAdLoPLnpI+0gr7dIdmPVeECRFKKmgO2p5NeyWvVvo81UwC/kPdw2bJXVVQQBWP
-BnQTgyfFGX5V8/om7D7AGl0g7gmvOIP4Dtq/B4cHpXB5ISw4W+D40VcPm9Huo4YC
-teBbZAhfZItDZaxgislvRzdmYcF0sHQKJBI2wShYtgSbTA==
------END CERTIFICATE-----
diff --git a/tests/cert-svc/data/TestData/ssl/cert_chain/cert_chain_no_aia7.key b/tests/cert-svc/data/TestData/ssl/cert_chain/cert_chain_no_aia7.key
deleted file mode 100644 (file)
index 2882a88..0000000
+++ /dev/null
@@ -1,15 +0,0 @@
------BEGIN RSA PRIVATE KEY-----
-MIICXAIBAAKBgQC0W/5IECvrWK/GDlcqpVzMV4VE8tnRQ4TTQIv3euDosZ3o9LFF
-xmcUm6Wo4o/LMabbYZANqgqeJtxLCzOifAdyke5q7Hc09H6lDjkTqNWGhhJbpIs4
-kVckjak7+PGmSIkgqVuz/spW8MrR7JmcV2rfjiOhfr5ffM+p2z+43KGaOQIDAQAB
-AoGAKiqfxoVRX1J6tdlAc835ZiTIGZiVaCFa+nDKyG9ICd8Mxhv/HgsGqoDBODzP
-1XekRQIIRcmNdfAr7LePuNs6eh/qm98UulUr6zpEMXu8/DIqI6Lf4F8GMwMaD2lx
-qmnQK+fziDrhrw10Y1ijy/ttEg6wDwCeQJJs/Iz3ncOEIMkCQQDo93B/RhJas6Gd
-bIC5IIe5pwvyOzmkn6dOWCIZDU5WXJ3A2gtNDdhO6MunaFCA2i+R4RSu8dDQjUXC
-dtthEfVfAkEAxjEGfrEg1NW7ug6CB2yvJiKzoHn6mVWUapKWfbstaodOrU1+WWtU
-CpWn0cm6ytGOeSI1Ylc2vnp667QikWq/ZwJBAKvV97CpKtikLs1DPx9OE06pHHKr
-pLT83hc3gs8ftWyWG/Yn3rYTRD3QEIeGtfqU9QmREASKcQ+jZJUvvlk3OdkCQArY
-9hULFtPvWtYFI0LKxQ9eSNyYsImh8Hygx1HcY9D31OuRWUAFqtTlegj2dJ3TOGwS
-3j8irOFiDMZH1riE0jMCQDtk5fJZd61phQ25I4mkBf4+8qCOiiWneuapdJlX1r+C
-5GmsM9fDr/m+pBNAbQP2vR+38wSHEuEt0U9MC7NEAHU=
------END RSA PRIVATE KEY-----
diff --git a/tests/cert-svc/data/TestData/ssl/cert_chain/cert_chain_no_aia8.crl b/tests/cert-svc/data/TestData/ssl/cert_chain/cert_chain_no_aia8.crl
deleted file mode 100644 (file)
index 9d1bc6c..0000000
+++ /dev/null
@@ -1,11 +0,0 @@
------BEGIN CERTIFICATE REQUEST-----
-MIIBqzCCARQCAQAwazELMAkGA1UEBhMCS1IxEzARBgNVBAgTCkt5dW5nR2ktRG8x
-ETAPBgNVBAcTCFN1d29uLVNpMRYwFAYDVQQKEw1TYW1zdW5nIEVsZWMuMRwwGgYD
-VQQDExNDZXJ0IENoYWluIE5vIEFJQSA4MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCB
-iQKBgQC8dmzRZbvDmPpNGTSmQ4rBHf8ETPnJv8XZTAiUokxVMQloOjVhxi59anqH
-iLohTF5eKNnT/QG8TuJVqNfVoHLRtftv+Mp69+aJsD7Jg+X9jan8Cv2g3aIzF06g
-Djcisu8n5GfVWICLFqGiVsNzaX3uR9mvTRl+nysIrUtRB0CZ8QIDAQABoAAwDQYJ
-KoZIhvcNAQEFBQADgYEACgjxLIxQBVD3sgcHFUzN1o7ibcA1Y82FC3HIowZfs/n9
-VPj7EhZ1J+PVZzszjjsTLHp3hjVn9g+gYVpen0MYVTbIn4733qaA7vImfv3DCN4B
-Wk75YhVBRuvJSbIKplQeJPyDGXdMfrtLQ6dYiHImkVHwkp1kueq9H5jU6TUrDd8=
------END CERTIFICATE REQUEST-----
diff --git a/tests/cert-svc/data/TestData/ssl/cert_chain/cert_chain_no_aia8.crt b/tests/cert-svc/data/TestData/ssl/cert_chain/cert_chain_no_aia8.crt
deleted file mode 100644 (file)
index 397c8cc..0000000
+++ /dev/null
@@ -1,52 +0,0 @@
-Certificate:
-    Data:
-        Version: 3 (0x2)
-        Serial Number: 62 (0x3e)
-        Signature Algorithm: sha1WithRSAEncryption
-        Issuer: C=KR, ST=KyungGi-Do, O=Samsung Elec., CN=Cert Chain No AIA 7
-        Validity
-            Not Before: Mar 24 07:21:52 2009 GMT
-            Not After : Mar 24 07:21:52 2010 GMT
-        Subject: C=KR, ST=KyungGi-Do, O=Samsung Elec., CN=Cert Chain No AIA 8
-        Subject Public Key Info:
-            Public Key Algorithm: rsaEncryption
-            RSA Public Key: (1024 bit)
-                Modulus (1024 bit):
-                    00:bc:76:6c:d1:65:bb:c3:98:fa:4d:19:34:a6:43:
-                    8a:c1:1d:ff:04:4c:f9:c9:bf:c5:d9:4c:08:94:a2:
-                    4c:55:31:09:68:3a:35:61:c6:2e:7d:6a:7a:87:88:
-                    ba:21:4c:5e:5e:28:d9:d3:fd:01:bc:4e:e2:55:a8:
-                    d7:d5:a0:72:d1:b5:fb:6f:f8:ca:7a:f7:e6:89:b0:
-                    3e:c9:83:e5:fd:8d:a9:fc:0a:fd:a0:dd:a2:33:17:
-                    4e:a0:0e:37:22:b2:ef:27:e4:67:d5:58:80:8b:16:
-                    a1:a2:56:c3:73:69:7d:ee:47:d9:af:4d:19:7e:9f:
-                    2b:08:ad:4b:51:07:40:99:f1
-                Exponent: 65537 (0x10001)
-        X509v3 extensions:
-            Authority Information Access: 
-                OCSP - URI:http://127.0.0.1:89/0002
-
-    Signature Algorithm: sha1WithRSAEncryption
-        40:8d:52:73:c3:85:6b:6c:4f:54:51:06:eb:d8:cd:40:5d:3d:
-        89:c2:06:4d:c6:70:5e:cc:64:40:3f:bb:3e:d4:52:b0:8d:57:
-        77:f3:1f:63:89:b3:21:b0:72:c6:ef:97:77:06:90:6f:fd:e8:
-        c3:d4:d6:13:f7:18:a8:eb:1e:87:b8:98:20:4a:0b:58:74:81:
-        59:eb:6e:50:f3:68:b2:e2:8c:a2:4b:92:c5:fa:e1:4f:43:ae:
-        51:ca:a6:c7:2c:40:16:2f:24:d3:a2:91:d5:45:7d:a7:3c:6e:
-        65:74:a7:b0:a6:a0:07:d7:1d:3a:2e:51:6e:de:7f:e6:5b:73:
-        e2:7d
------BEGIN CERTIFICATE-----
-MIICXjCCAcegAwIBAgIBPjANBgkqhkiG9w0BAQUFADBYMQswCQYDVQQGEwJLUjET
-MBEGA1UECBMKS3l1bmdHaS1EbzEWMBQGA1UEChMNU2Ftc3VuZyBFbGVjLjEcMBoG
-A1UEAxMTQ2VydCBDaGFpbiBObyBBSUEgNzAeFw0wOTAzMjQwNzIxNTJaFw0xMDAz
-MjQwNzIxNTJaMFgxCzAJBgNVBAYTAktSMRMwEQYDVQQIEwpLeXVuZ0dpLURvMRYw
-FAYDVQQKEw1TYW1zdW5nIEVsZWMuMRwwGgYDVQQDExNDZXJ0IENoYWluIE5vIEFJ
-QSA4MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQC8dmzRZbvDmPpNGTSmQ4rB
-Hf8ETPnJv8XZTAiUokxVMQloOjVhxi59anqHiLohTF5eKNnT/QG8TuJVqNfVoHLR
-tftv+Mp69+aJsD7Jg+X9jan8Cv2g3aIzF06gDjcisu8n5GfVWICLFqGiVsNzaX3u
-R9mvTRl+nysIrUtRB0CZ8QIDAQABozgwNjA0BggrBgEFBQcBAQQoMCYwJAYIKwYB
-BQUHMAGGGGh0dHA6Ly8xMjcuMC4wLjE6ODkvMDAwMjANBgkqhkiG9w0BAQUFAAOB
-gQBAjVJzw4VrbE9UUQbr2M1AXT2JwgZNxnBezGRAP7s+1FKwjVd38x9jibMhsHLG
-75d3BpBv/ejD1NYT9xio6x6HuJggSgtYdIFZ625Q82iy4oyiS5LF+uFPQ65RyqbH
-LEAWLyTTopHVRX2nPG5ldKewpqAH1x06LlFu3n/mW3PifQ==
------END CERTIFICATE-----
diff --git a/tests/cert-svc/data/TestData/ssl/cert_chain/cert_chain_no_aia8.key b/tests/cert-svc/data/TestData/ssl/cert_chain/cert_chain_no_aia8.key
deleted file mode 100644 (file)
index 9380709..0000000
+++ /dev/null
@@ -1,15 +0,0 @@
------BEGIN RSA PRIVATE KEY-----
-MIICXQIBAAKBgQC8dmzRZbvDmPpNGTSmQ4rBHf8ETPnJv8XZTAiUokxVMQloOjVh
-xi59anqHiLohTF5eKNnT/QG8TuJVqNfVoHLRtftv+Mp69+aJsD7Jg+X9jan8Cv2g
-3aIzF06gDjcisu8n5GfVWICLFqGiVsNzaX3uR9mvTRl+nysIrUtRB0CZ8QIDAQAB
-AoGAeD+3vwQCghMh4f+rMEr4RbA1/zB+UNQkEToKX4wO2Gypa+94ECK7lxpRhBkh
-ag2oSLwYAML2UIiksbNBw/TUTRJUIvVFGNj01ZAY/ToySwZyB+iGVvYLs14CWCh+
-lIG8Yv6jeioXW6lUYuKGX/8MgKxsYqdjTuNDBUTU/wYHZgECQQDezuG53RnhW+cv
-612+metzu3+9tnz1YME9d+xJSHehNG+44ZojxIujYaZpwq4riPfPp61JKJmJ9A1p
-QUDQfLeZAkEA2Im5unIRak409a6uNlZ4ga6ISROewyoGe+pzch7trOGgcmcTy3mA
-ZqmmRcolcpQ8Zvk/8pEbgSWwh1GxOuOMGQJBALwEyOcXdad+7nC5pboaGV7ocrud
-K4XFyEwezv5ocMtQfJb/iht02IFe/hdxeZizVKufS9PYtvh7QnX34sIM/MECQGHy
-Cjy3lAEN1w66MLsLaf7ev26unUWSINS0O/wG2WM1u6mDzoRfNSE646b1xPKK8rdx
-Tuedk19bePn8jbohayECQQDWDO5OcgeD/3Yyy5ybll7UC+8O1RWHx/aYV6xI1Nbm
-G4UsxB6jeEoHUD68YQ/LCaphFsrcYDK9KCaFn9qqcGeJ
------END RSA PRIVATE KEY-----
diff --git a/tests/cert-svc/data/TestData/ssl/cert_chain/cert_chain_no_aia9.crl b/tests/cert-svc/data/TestData/ssl/cert_chain/cert_chain_no_aia9.crl
deleted file mode 100644 (file)
index 6424613..0000000
+++ /dev/null
@@ -1,11 +0,0 @@
------BEGIN CERTIFICATE REQUEST-----
-MIIBqzCCARQCAQAwazELMAkGA1UEBhMCS1IxEzARBgNVBAgTCkt5dW5nR2ktRG8x
-ETAPBgNVBAcTCFN1d29uLVNpMRYwFAYDVQQKEw1TYW1zdW5nIEVsZWMuMRwwGgYD
-VQQDExNDZXJ0IENoYWluIE5vIEFJQSA5MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCB
-iQKBgQCocGkc8UikcaUr0NjxAB/KKhfQP08fQ6AEUj4oczsgA5ZHmRnclTVBrwNO
-CAHB1QhlTHWfKXPTq7P1nOfgc6hOvv2GZ/f0IEJ2OYWUkbhsdADIyIvRJDiS3XR2
-6Mpp9paqKRsyTtdlTdyHTP9g3ESlBmAqL0jmoJyT6yT/dKXQEwIDAQABoAAwDQYJ
-KoZIhvcNAQEFBQADgYEAbWNnnytyqTafHeNCAQVVBsNuHKJhmNfYVfmrghQCPNzd
-TAJ1uAbbwN8kLFYbQ8qS0Va+yeSbgzqXRfn8WIpPbgYVMU+KPkVtJd9fjRJpFJbg
-Blr6TnXY+2PiGvzptLcPzE5u4un7cNyl+rc1rVzmCS26Gj6e7C7ysAHzedapDvI=
------END CERTIFICATE REQUEST-----
diff --git a/tests/cert-svc/data/TestData/ssl/cert_chain/cert_chain_no_aia9.crt b/tests/cert-svc/data/TestData/ssl/cert_chain/cert_chain_no_aia9.crt
deleted file mode 100644 (file)
index 3259a5b..0000000
+++ /dev/null
@@ -1,52 +0,0 @@
-Certificate:
-    Data:
-        Version: 3 (0x2)
-        Serial Number: 63 (0x3f)
-        Signature Algorithm: sha1WithRSAEncryption
-        Issuer: C=KR, ST=KyungGi-Do, O=Samsung Elec., CN=Cert Chain No AIA 8
-        Validity
-            Not Before: Mar 24 07:21:52 2009 GMT
-            Not After : Mar 24 07:21:52 2010 GMT
-        Subject: C=KR, ST=KyungGi-Do, O=Samsung Elec., CN=Cert Chain No AIA 9
-        Subject Public Key Info:
-            Public Key Algorithm: rsaEncryption
-            RSA Public Key: (1024 bit)
-                Modulus (1024 bit):
-                    00:a8:70:69:1c:f1:48:a4:71:a5:2b:d0:d8:f1:00:
-                    1f:ca:2a:17:d0:3f:4f:1f:43:a0:04:52:3e:28:73:
-                    3b:20:03:96:47:99:19:dc:95:35:41:af:03:4e:08:
-                    01:c1:d5:08:65:4c:75:9f:29:73:d3:ab:b3:f5:9c:
-                    e7:e0:73:a8:4e:be:fd:86:67:f7:f4:20:42:76:39:
-                    85:94:91:b8:6c:74:00:c8:c8:8b:d1:24:38:92:dd:
-                    74:76:e8:ca:69:f6:96:aa:29:1b:32:4e:d7:65:4d:
-                    dc:87:4c:ff:60:dc:44:a5:06:60:2a:2f:48:e6:a0:
-                    9c:93:eb:24:ff:74:a5:d0:13
-                Exponent: 65537 (0x10001)
-        X509v3 extensions:
-            Authority Information Access: 
-                OCSP - URI:http://127.0.0.1:89/0002
-
-    Signature Algorithm: sha1WithRSAEncryption
-        8f:6f:4d:2a:68:f1:d5:08:43:43:3f:5a:53:d8:fe:71:93:e8:
-        08:e5:a3:4f:dc:b2:9b:20:89:7c:dd:b0:57:7f:f7:1f:45:09:
-        78:c0:ba:99:0e:ab:fe:a5:1c:de:37:f6:dd:9a:b2:f1:9f:f0:
-        15:19:4b:6c:32:dc:5f:8e:af:4f:3f:fe:a3:67:ae:78:ba:af:
-        cd:41:fd:c9:31:ca:ce:7e:82:2e:c6:40:4d:94:b9:cd:fa:d5:
-        a1:b3:b6:10:47:2d:75:f1:37:3f:e9:62:81:a3:ff:7f:72:04:
-        f7:26:6d:d4:c0:22:38:a1:6c:64:10:66:fe:0d:95:e7:2e:64:
-        c8:d5
------BEGIN CERTIFICATE-----
-MIICXjCCAcegAwIBAgIBPzANBgkqhkiG9w0BAQUFADBYMQswCQYDVQQGEwJLUjET
-MBEGA1UECBMKS3l1bmdHaS1EbzEWMBQGA1UEChMNU2Ftc3VuZyBFbGVjLjEcMBoG
-A1UEAxMTQ2VydCBDaGFpbiBObyBBSUEgODAeFw0wOTAzMjQwNzIxNTJaFw0xMDAz
-MjQwNzIxNTJaMFgxCzAJBgNVBAYTAktSMRMwEQYDVQQIEwpLeXVuZ0dpLURvMRYw
-FAYDVQQKEw1TYW1zdW5nIEVsZWMuMRwwGgYDVQQDExNDZXJ0IENoYWluIE5vIEFJ
-QSA5MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQCocGkc8UikcaUr0NjxAB/K
-KhfQP08fQ6AEUj4oczsgA5ZHmRnclTVBrwNOCAHB1QhlTHWfKXPTq7P1nOfgc6hO
-vv2GZ/f0IEJ2OYWUkbhsdADIyIvRJDiS3XR26Mpp9paqKRsyTtdlTdyHTP9g3ESl
-BmAqL0jmoJyT6yT/dKXQEwIDAQABozgwNjA0BggrBgEFBQcBAQQoMCYwJAYIKwYB
-BQUHMAGGGGh0dHA6Ly8xMjcuMC4wLjE6ODkvMDAwMjANBgkqhkiG9w0BAQUFAAOB
-gQCPb00qaPHVCENDP1pT2P5xk+gI5aNP3LKbIIl83bBXf/cfRQl4wLqZDqv+pRze
-N/bdmrLxn/AVGUtsMtxfjq9PP/6jZ654uq/NQf3JMcrOfoIuxkBNlLnN+tWhs7YQ
-Ry118Tc/6WKBo/9/cgT3Jm3UwCI4oWxkEGb+DZXnLmTI1Q==
------END CERTIFICATE-----
diff --git a/tests/cert-svc/data/TestData/ssl/cert_chain/cert_chain_no_aia9.key b/tests/cert-svc/data/TestData/ssl/cert_chain/cert_chain_no_aia9.key
deleted file mode 100644 (file)
index 99a1155..0000000
+++ /dev/null
@@ -1,15 +0,0 @@
------BEGIN RSA PRIVATE KEY-----
-MIICXAIBAAKBgQCocGkc8UikcaUr0NjxAB/KKhfQP08fQ6AEUj4oczsgA5ZHmRnc
-lTVBrwNOCAHB1QhlTHWfKXPTq7P1nOfgc6hOvv2GZ/f0IEJ2OYWUkbhsdADIyIvR
-JDiS3XR26Mpp9paqKRsyTtdlTdyHTP9g3ESlBmAqL0jmoJyT6yT/dKXQEwIDAQAB
-AoGBAJigAx7uo1wefgQN4gW+jw+oxJs2QoOZy00fGKOehlyj43BNEloF+ZPi+aOj
-LbRtTIY9mfb2oLWUSCSuYI3JPx9jIsNMeCgn+/Eo96mjOPvifKgz0D4tNPsGTmf5
-PSEDPdN6NdpIuPoCyn8dTEseL99FDe4JNu1Hotm6xzyl0m+BAkEA0s2LJKsQZKFw
-APuwpvLXiLE2n3jxZzxNTJY4X3TGkcDPkkh7LJLo/39KkGZ6jke73IY5UCYXKrSU
-t1UlPMTx2wJBAMyNnx2o4c0P3KRyOICS45q+9CMbASIN7aSxNg3Y/bb9R0sVQbXc
-C8HpfUN2erpMy2oCjcIt/aU47tTCrkJvfCkCQC+KY2L1oVDQh63xFTnRcoJFVQhK
-AkdB9jzbdAMzFsUwMp/O8NhwmVNlpa9DLUiBLQDi1HIa5Qagixl9flRiJhkCQGB6
-n8T+hdoRlDEgCpRiM+YmEMKKFyO3zBG039jyMuDfX4QDd6XOLuF8Pm/WbxZ16C+N
-Gs2uoYcPbl59oHGHYdkCQFYRupnzOGMA6qLlP/moi0j7OzOK0JpMLCvkGg5GcNVl
-MD2Jgl3O/7JVWQQ/21rS6BLbQHr4Uty6T79bHu6ZeYY=
------END RSA PRIVATE KEY-----
diff --git a/tests/cert-svc/data/TestData/ssl/cert_chain/configs/config_chain1.cnf b/tests/cert-svc/data/TestData/ssl/cert_chain/configs/config_chain1.cnf
deleted file mode 100644 (file)
index 4cf83a0..0000000
+++ /dev/null
@@ -1,313 +0,0 @@
-#
-# OpenSSL example configuration file.
-# This is mostly being used for generation of certificate requests.
-#
-
-# This definition stops the following lines choking if HOME isn't
-# defined.
-HOME                   = .
-RANDFILE               = $ENV::HOME/.rnd
-
-# Extra OBJECT IDENTIFIER info:
-#oid_file              = $ENV::HOME/.oid
-oid_section            = new_oids
-
-# To use this configuration file with the "-extfile" option of the
-# "openssl x509" utility, name here the section containing the
-# X.509v3 extensions to use:
-# extensions           = 
-# (Alternatively, use a configuration file that has only
-# X.509v3 extensions in its main [= default] section.)
-
-[ new_oids ]
-
-# We can add new OIDs in here for use by 'ca' and 'req'.
-# Add a simple OID like this:
-# testoid1=1.2.3.4
-# Or use config file substitution like this:
-# testoid2=${testoid1}.5.6
-
-####################################################################
-[ ca ]
-default_ca     = CA_default            # The default ca section
-
-####################################################################
-[ CA_default ]
-
-dir            = ./demoCA              # Where everything is kept
-certs          = $dir/certs            # Where the issued certs are kept
-crl_dir                = $dir/crl              # Where the issued crl are kept
-database       = $dir/index.txt        # database index file.
-#unique_subject        = no                    # Set to 'no' to allow creation of
-                                       # several ctificates with same subject.
-new_certs_dir  = $dir/newcerts         # default place for new certs.
-
-certificate    = $dir/cacert.pem       # The CA certificate
-serial         = $dir/serial           # The current serial number
-crlnumber      = $dir/crlnumber        # the current crl number
-                                       # must be commented out to leave a V1 CRL
-crl            = $dir/crl.pem          # The current CRL
-private_key    = $dir/private/cakey.pem # The private key
-RANDFILE       = $dir/private/.rand    # private random number file
-
-x509_extensions        = usr_cert              # The extentions to add to the cert
-
-# Comment out the following two lines for the "traditional"
-# (and highly broken) format.
-name_opt       = ca_default            # Subject Name options
-cert_opt       = ca_default            # Certificate field options
-
-# Extension copying option: use with caution.
-# copy_extensions = copy
-
-# Extensions to add to a CRL. Note: Netscape communicator chokes on V2 CRLs
-# so this is commented out by default to leave a V1 CRL.
-# crlnumber must also be commented out to leave a V1 CRL.
-# crl_extensions       = crl_ext
-
-default_days   = 365                   # how long to certify for
-default_crl_days= 30                   # how long before next CRL
-default_md     = sha1                  # which md to use.
-preserve       = no                    # keep passed DN ordering
-
-# A few difference way of specifying how similar the request should look
-# For type CA, the listed attributes must be the same, and the optional
-# and supplied fields are just that :-)
-policy         = policy_match
-
-# For the CA policy
-[ policy_match ]
-countryName            = match
-stateOrProvinceName    = match
-organizationName       = match
-organizationalUnitName = optional
-commonName             = supplied
-emailAddress           = optional
-
-# For the 'anything' policy
-# At this point in time, you must list all acceptable 'object'
-# types.
-[ policy_anything ]
-countryName            = optional
-stateOrProvinceName    = optional
-localityName           = optional
-organizationName       = optional
-organizationalUnitName = optional
-commonName             = supplied
-emailAddress           = optional
-
-####################################################################
-[ req ]
-default_bits           = 1024
-default_keyfile        = privkey.pem
-distinguished_name     = req_distinguished_name
-attributes             = req_attributes
-x509_extensions        = v3_ca # The extentions to add to the self signed cert
-
-# Passwords for private keys if not present they will be prompted for
-# input_password = secret
-# output_password = secret
-
-# This sets a mask for permitted string types. There are several options. 
-# default: PrintableString, T61String, BMPString.
-# pkix  : PrintableString, BMPString.
-# utf8only: only UTF8Strings.
-# nombstr : PrintableString, T61String (no BMPStrings or UTF8Strings).
-# MASK:XXXX a literal mask value.
-# WARNING: current versions of Netscape crash on BMPStrings or UTF8Strings
-# so use this option with caution!
-string_mask = nombstr
-
-# req_extensions = v3_req # The extensions to add to a certificate request
-
-[ req_distinguished_name ]
-countryName                    = Country Name (2 letter code)
-countryName_default            = AU
-countryName_min                        = 2
-countryName_max                        = 2
-
-stateOrProvinceName            = State or Province Name (full name)
-stateOrProvinceName_default    = Some-State
-
-localityName                   = Locality Name (eg, city)
-
-0.organizationName             = Organization Name (eg, company)
-0.organizationName_default     = Internet Widgits Pty Ltd
-
-# we can do this but it is not needed normally :-)
-#1.organizationName            = Second Organization Name (eg, company)
-#1.organizationName_default    = World Wide Web Pty Ltd
-
-organizationalUnitName         = Organizational Unit Name (eg, section)
-#organizationalUnitName_default        =
-
-commonName                     = Common Name (eg, YOUR name)
-commonName_max                 = 64
-
-emailAddress                   = Email Address
-emailAddress_max               = 64
-
-# SET-ex3                      = SET extension number 3
-
-[ req_attributes ]
-challengePassword              = A challenge password
-challengePassword_min          = 4
-challengePassword_max          = 20
-
-unstructuredName               = An optional company name
-
-[ usr_cert ]
-
-# These extensions are added when 'ca' signs a request.
-
-# This goes against PKIX guidelines but some CAs do it and some software
-# requires this to avoid interpreting an end user certificate as a CA.
-
-basicConstraints=CA:FALSE
-
-# Here are some examples of the usage of nsCertType. If it is omitted
-# the certificate can be used for anything *except* object signing.
-
-# This is OK for an SSL server.
-# nsCertType                   = server
-
-# For an object signing certificate this would be used.
-# nsCertType = objsign
-
-# For normal client use this is typical
-# nsCertType = client, email
-
-# and for everything including object signing:
-# nsCertType = client, email, objsign
-
-# This is typical in keyUsage for a client certificate.
-# keyUsage = nonRepudiation, digitalSignature, keyEncipherment
-
-# This will be displayed in Netscape's comment listbox.
-nsComment                      = "OpenSSL Generated Certificate"
-
-# PKIX recommendations harmless if included in all certificates.
-subjectKeyIdentifier=hash
-authorityKeyIdentifier=keyid,issuer
-
-# This stuff is for subjectAltName and issuerAltname.
-# Import the email address.
-# subjectAltName=email:copy
-# An alternative to produce certificates that aren't
-# deprecated according to PKIX.
-# subjectAltName=email:move
-
-# Copy subject details
-# issuerAltName=issuer:copy
-
-#nsCaRevocationUrl             = http://www.domain.dom/ca-crl.pem
-#nsBaseUrl
-#nsRevocationUrl
-#nsRenewalUrl
-#nsCaPolicyUrl
-#nsSslServerName
-
-[ v3_req ]
-
-# Extensions to add to a certificate request
-
-basicConstraints = CA:FALSE
-keyUsage = nonRepudiation, digitalSignature, keyEncipherment
-
-[ v3_ca ]
-
-
-# Extensions for a typical CA
-
-
-# PKIX recommendation.
-
-subjectKeyIdentifier=hash
-
-authorityKeyIdentifier=keyid:always,issuer:always
-
-# This is what PKIX recommends but some broken software chokes on critical
-# extensions.
-#basicConstraints = critical,CA:true
-# So we do this instead.
-basicConstraints = CA:true
-
-# Key usage: this is typical for a CA certificate. However since it will
-# prevent it being used as an test self-signed certificate it is best
-# left out by default.
-# keyUsage = cRLSign, keyCertSign
-
-# Some might want this also
-# nsCertType = sslCA, emailCA
-
-# Include email address in subject alt name: another PKIX recommendation
-# subjectAltName=email:copy
-# Copy issuer details
-# issuerAltName=issuer:copy
-
-# DER hex encoding of an extension: beware experts only!
-# obj=DER:02:03
-# Where 'obj' is a standard or added object
-# You can even override a supported extension:
-# basicConstraints= critical, DER:30:03:01:01:FF
-
-[ crl_ext ]
-
-# CRL extensions.
-# Only issuerAltName and authorityKeyIdentifier make any sense in a CRL.
-
-# issuerAltName=issuer:copy
-authorityKeyIdentifier=keyid:always,issuer:always
-
-[ proxy_cert_ext ]
-# These extensions should be added when creating a proxy certificate
-
-# This goes against PKIX guidelines but some CAs do it and some software
-# requires this to avoid interpreting an end user certificate as a CA.
-
-basicConstraints=CA:FALSE
-
-# Here are some examples of the usage of nsCertType. If it is omitted
-# the certificate can be used for anything *except* object signing.
-
-# This is OK for an SSL server.
-# nsCertType                   = server
-
-# For an object signing certificate this would be used.
-# nsCertType = objsign
-
-# For normal client use this is typical
-# nsCertType = client, email
-
-# and for everything including object signing:
-# nsCertType = client, email, objsign
-
-# This is typical in keyUsage for a client certificate.
-# keyUsage = nonRepudiation, digitalSignature, keyEncipherment
-
-# This will be displayed in Netscape's comment listbox.
-nsComment                      = "OpenSSL Generated Certificate"
-
-# PKIX recommendations harmless if included in all certificates.
-subjectKeyIdentifier=hash
-authorityKeyIdentifier=keyid,issuer:always
-
-# This stuff is for subjectAltName and issuerAltname.
-# Import the email address.
-# subjectAltName=email:copy
-# An alternative to produce certificates that aren't
-# deprecated according to PKIX.
-# subjectAltName=email:move
-
-# Copy subject details
-# issuerAltName=issuer:copy
-
-#nsCaRevocationUrl             = http://www.domain.dom/ca-crl.pem
-#nsBaseUrl
-#nsRevocationUrl
-#nsRenewalUrl
-#nsCaPolicyUrl
-#nsSslServerName
-
-# This really needs to be in place for it to be a proxy certificate.
-proxyCertInfo=critical,language:id-ppl-anyLanguage,pathlen:3,policy:foo
diff --git a/tests/cert-svc/data/TestData/ssl/cert_chain/configs/config_chain10.cnf b/tests/cert-svc/data/TestData/ssl/cert_chain/configs/config_chain10.cnf
deleted file mode 100644 (file)
index 8d418bf..0000000
+++ /dev/null
@@ -1,313 +0,0 @@
-#
-# OpenSSL example configuration file.
-# This is mostly being used for generation of certificate requests.
-#
-
-# This definition stops the following lines choking if HOME isn't
-# defined.
-HOME                   = .
-RANDFILE               = $ENV::HOME/.rnd
-
-# Extra OBJECT IDENTIFIER info:
-#oid_file              = $ENV::HOME/.oid
-oid_section            = new_oids
-
-# To use this configuration file with the "-extfile" option of the
-# "openssl x509" utility, name here the section containing the
-# X.509v3 extensions to use:
-# extensions           = 
-# (Alternatively, use a configuration file that has only
-# X.509v3 extensions in its main [= default] section.)
-
-[ new_oids ]
-
-# We can add new OIDs in here for use by 'ca' and 'req'.
-# Add a simple OID like this:
-# testoid1=1.2.3.4
-# Or use config file substitution like this:
-# testoid2=${testoid1}.5.6
-
-####################################################################
-[ ca ]
-default_ca     = CA_default            # The default ca section
-
-####################################################################
-[ CA_default ]
-
-dir            = ./cert_chain          # Where everything is kept
-certs          = $dir/certs            # Where the issued certs are kept
-crl_dir                = $dir/crl              # Where the issued crl are kept
-database       = $dir/index.txt        # database index file.
-#unique_subject        = no                    # Set to 'no' to allow creation of
-                                       # several ctificates with same subject.
-new_certs_dir  = $dir/newcerts         # default place for new certs.
-
-certificate    = $dir/cert_chain9.crt  # The CA certificate
-serial         = $dir/serial           # The current serial number
-crlnumber      = $dir/crlnumber        # the current crl number
-                                       # must be commented out to leave a V1 CRL
-crl            = $dir/crl.pem          # The current CRL
-private_key    = $dir/private/cert_chain9.pem # The private key
-RANDFILE       = $dir/private/.rand    # private random number file
-
-x509_extensions        = usr_cert              # The extentions to add to the cert
-
-# Comment out the following two lines for the "traditional"
-# (and highly broken) format.
-name_opt       = ca_default            # Subject Name options
-cert_opt       = ca_default            # Certificate field options
-
-# Extension copying option: use with caution.
-# copy_extensions = copy
-
-# Extensions to add to a CRL. Note: Netscape communicator chokes on V2 CRLs
-# so this is commented out by default to leave a V1 CRL.
-# crlnumber must also be commented out to leave a V1 CRL.
-# crl_extensions       = crl_ext
-
-default_days   = 365                   # how long to certify for
-default_crl_days= 30                   # how long before next CRL
-default_md     = sha1                  # which md to use.
-preserve       = no                    # keep passed DN ordering
-
-# A few difference way of specifying how similar the request should look
-# For type CA, the listed attributes must be the same, and the optional
-# and supplied fields are just that :-)
-policy         = policy_match
-
-# For the CA policy
-[ policy_match ]
-countryName            = match
-stateOrProvinceName    = match
-organizationName       = match
-organizationalUnitName = optional
-commonName             = supplied
-emailAddress           = optional
-
-# For the 'anything' policy
-# At this point in time, you must list all acceptable 'object'
-# types.
-[ policy_anything ]
-countryName            = optional
-stateOrProvinceName    = optional
-localityName           = optional
-organizationName       = optional
-organizationalUnitName = optional
-commonName             = supplied
-emailAddress           = optional
-
-####################################################################
-[ req ]
-default_bits           = 1024
-default_keyfile        = privkey.pem
-distinguished_name     = req_distinguished_name
-attributes             = req_attributes
-x509_extensions        = v3_ca # The extentions to add to the self signed cert
-
-# Passwords for private keys if not present they will be prompted for
-# input_password = secret
-# output_password = secret
-
-# This sets a mask for permitted string types. There are several options. 
-# default: PrintableString, T61String, BMPString.
-# pkix  : PrintableString, BMPString.
-# utf8only: only UTF8Strings.
-# nombstr : PrintableString, T61String (no BMPStrings or UTF8Strings).
-# MASK:XXXX a literal mask value.
-# WARNING: current versions of Netscape crash on BMPStrings or UTF8Strings
-# so use this option with caution!
-string_mask = nombstr
-
-# req_extensions = v3_req # The extensions to add to a certificate request
-
-[ req_distinguished_name ]
-countryName                    = Country Name (2 letter code)
-countryName_default            = AU
-countryName_min                        = 2
-countryName_max                        = 2
-
-stateOrProvinceName            = State or Province Name (full name)
-stateOrProvinceName_default    = Some-State
-
-localityName                   = Locality Name (eg, city)
-
-0.organizationName             = Organization Name (eg, company)
-0.organizationName_default     = Internet Widgits Pty Ltd
-
-# we can do this but it is not needed normally :-)
-#1.organizationName            = Second Organization Name (eg, company)
-#1.organizationName_default    = World Wide Web Pty Ltd
-
-organizationalUnitName         = Organizational Unit Name (eg, section)
-#organizationalUnitName_default        =
-
-commonName                     = Common Name (eg, YOUR name)
-commonName_max                 = 64
-
-emailAddress                   = Email Address
-emailAddress_max               = 64
-
-# SET-ex3                      = SET extension number 3
-
-[ req_attributes ]
-challengePassword              = A challenge password
-challengePassword_min          = 4
-challengePassword_max          = 20
-
-unstructuredName               = An optional company name
-
-[ usr_cert ]
-
-# These extensions are added when 'ca' signs a request.
-
-# This goes against PKIX guidelines but some CAs do it and some software
-# requires this to avoid interpreting an end user certificate as a CA.
-
-basicConstraints=CA:FALSE
-
-# Here are some examples of the usage of nsCertType. If it is omitted
-# the certificate can be used for anything *except* object signing.
-
-# This is OK for an SSL server.
-# nsCertType                   = server
-
-# For an object signing certificate this would be used.
-# nsCertType = objsign
-
-# For normal client use this is typical
-# nsCertType = client, email
-
-# and for everything including object signing:
-# nsCertType = client, email, objsign
-
-# This is typical in keyUsage for a client certificate.
-# keyUsage = nonRepudiation, digitalSignature, keyEncipherment
-
-# This will be displayed in Netscape's comment listbox.
-nsComment                      = "OpenSSL Generated Certificate"
-
-# PKIX recommendations harmless if included in all certificates.
-subjectKeyIdentifier=hash
-authorityKeyIdentifier=keyid,issuer
-
-# This stuff is for subjectAltName and issuerAltname.
-# Import the email address.
-# subjectAltName=email:copy
-# An alternative to produce certificates that aren't
-# deprecated according to PKIX.
-# subjectAltName=email:move
-
-# Copy subject details
-# issuerAltName=issuer:copy
-
-#nsCaRevocationUrl             = http://www.domain.dom/ca-crl.pem
-#nsBaseUrl
-#nsRevocationUrl
-#nsRenewalUrl
-#nsCaPolicyUrl
-#nsSslServerName
-
-[ v3_req ]
-
-# Extensions to add to a certificate request
-
-basicConstraints = CA:FALSE
-keyUsage = nonRepudiation, digitalSignature, keyEncipherment
-
-[ v3_ca ]
-
-
-# Extensions for a typical CA
-
-
-# PKIX recommendation.
-
-subjectKeyIdentifier=hash
-
-authorityKeyIdentifier=keyid:always,issuer:always
-
-# This is what PKIX recommends but some broken software chokes on critical
-# extensions.
-#basicConstraints = critical,CA:true
-# So we do this instead.
-basicConstraints = CA:true
-
-# Key usage: this is typical for a CA certificate. However since it will
-# prevent it being used as an test self-signed certificate it is best
-# left out by default.
-# keyUsage = cRLSign, keyCertSign
-
-# Some might want this also
-# nsCertType = sslCA, emailCA
-
-# Include email address in subject alt name: another PKIX recommendation
-# subjectAltName=email:copy
-# Copy issuer details
-# issuerAltName=issuer:copy
-
-# DER hex encoding of an extension: beware experts only!
-# obj=DER:02:03
-# Where 'obj' is a standard or added object
-# You can even override a supported extension:
-# basicConstraints= critical, DER:30:03:01:01:FF
-
-[ crl_ext ]
-
-# CRL extensions.
-# Only issuerAltName and authorityKeyIdentifier make any sense in a CRL.
-
-# issuerAltName=issuer:copy
-authorityKeyIdentifier=keyid:always,issuer:always
-
-[ proxy_cert_ext ]
-# These extensions should be added when creating a proxy certificate
-
-# This goes against PKIX guidelines but some CAs do it and some software
-# requires this to avoid interpreting an end user certificate as a CA.
-
-basicConstraints=CA:FALSE
-
-# Here are some examples of the usage of nsCertType. If it is omitted
-# the certificate can be used for anything *except* object signing.
-
-# This is OK for an SSL server.
-# nsCertType                   = server
-
-# For an object signing certificate this would be used.
-# nsCertType = objsign
-
-# For normal client use this is typical
-# nsCertType = client, email
-
-# and for everything including object signing:
-# nsCertType = client, email, objsign
-
-# This is typical in keyUsage for a client certificate.
-# keyUsage = nonRepudiation, digitalSignature, keyEncipherment
-
-# This will be displayed in Netscape's comment listbox.
-nsComment                      = "OpenSSL Generated Certificate"
-
-# PKIX recommendations harmless if included in all certificates.
-subjectKeyIdentifier=hash
-authorityKeyIdentifier=keyid,issuer:always
-
-# This stuff is for subjectAltName and issuerAltname.
-# Import the email address.
-# subjectAltName=email:copy
-# An alternative to produce certificates that aren't
-# deprecated according to PKIX.
-# subjectAltName=email:move
-
-# Copy subject details
-# issuerAltName=issuer:copy
-
-#nsCaRevocationUrl             = http://www.domain.dom/ca-crl.pem
-#nsBaseUrl
-#nsRevocationUrl
-#nsRenewalUrl
-#nsCaPolicyUrl
-#nsSslServerName
-
-# This really needs to be in place for it to be a proxy certificate.
-proxyCertInfo=critical,language:id-ppl-anyLanguage,pathlen:3,policy:foo
diff --git a/tests/cert-svc/data/TestData/ssl/cert_chain/configs/config_chain2.cnf b/tests/cert-svc/data/TestData/ssl/cert_chain/configs/config_chain2.cnf
deleted file mode 100644 (file)
index 905bb59..0000000
+++ /dev/null
@@ -1,313 +0,0 @@
-#
-# OpenSSL example configuration file.
-# This is mostly being used for generation of certificate requests.
-#
-
-# This definition stops the following lines choking if HOME isn't
-# defined.
-HOME                   = .
-RANDFILE               = $ENV::HOME/.rnd
-
-# Extra OBJECT IDENTIFIER info:
-#oid_file              = $ENV::HOME/.oid
-oid_section            = new_oids
-
-# To use this configuration file with the "-extfile" option of the
-# "openssl x509" utility, name here the section containing the
-# X.509v3 extensions to use:
-# extensions           = 
-# (Alternatively, use a configuration file that has only
-# X.509v3 extensions in its main [= default] section.)
-
-[ new_oids ]
-
-# We can add new OIDs in here for use by 'ca' and 'req'.
-# Add a simple OID like this:
-# testoid1=1.2.3.4
-# Or use config file substitution like this:
-# testoid2=${testoid1}.5.6
-
-####################################################################
-[ ca ]
-default_ca     = CA_default            # The default ca section
-
-####################################################################
-[ CA_default ]
-
-dir            = ./cert_chain          # Where everything is kept
-certs          = $dir/certs            # Where the issued certs are kept
-crl_dir                = $dir/crl              # Where the issued crl are kept
-database       = $dir/index.txt        # database index file.
-#unique_subject        = no                    # Set to 'no' to allow creation of
-                                       # several ctificates with same subject.
-new_certs_dir  = $dir/newcerts         # default place for new certs.
-
-certificate    = $dir/cert_chain1.crt  # The CA certificate
-serial         = $dir/serial           # The current serial number
-crlnumber      = $dir/crlnumber        # the current crl number
-                                       # must be commented out to leave a V1 CRL
-crl            = $dir/crl.pem          # The current CRL
-private_key    = $dir/private/cert_chain1.pem # The private key
-RANDFILE       = $dir/private/.rand    # private random number file
-
-x509_extensions        = usr_cert              # The extentions to add to the cert
-
-# Comment out the following two lines for the "traditional"
-# (and highly broken) format.
-name_opt       = ca_default            # Subject Name options
-cert_opt       = ca_default            # Certificate field options
-
-# Extension copying option: use with caution.
-# copy_extensions = copy
-
-# Extensions to add to a CRL. Note: Netscape communicator chokes on V2 CRLs
-# so this is commented out by default to leave a V1 CRL.
-# crlnumber must also be commented out to leave a V1 CRL.
-# crl_extensions       = crl_ext
-
-default_days   = 365                   # how long to certify for
-default_crl_days= 30                   # how long before next CRL
-default_md     = sha1                  # which md to use.
-preserve       = no                    # keep passed DN ordering
-
-# A few difference way of specifying how similar the request should look
-# For type CA, the listed attributes must be the same, and the optional
-# and supplied fields are just that :-)
-policy         = policy_match
-
-# For the CA policy
-[ policy_match ]
-countryName            = match
-stateOrProvinceName    = match
-organizationName       = match
-organizationalUnitName = optional
-commonName             = supplied
-emailAddress           = optional
-
-# For the 'anything' policy
-# At this point in time, you must list all acceptable 'object'
-# types.
-[ policy_anything ]
-countryName            = optional
-stateOrProvinceName    = optional
-localityName           = optional
-organizationName       = optional
-organizationalUnitName = optional
-commonName             = supplied
-emailAddress           = optional
-
-####################################################################
-[ req ]
-default_bits           = 1024
-default_keyfile        = privkey.pem
-distinguished_name     = req_distinguished_name
-attributes             = req_attributes
-x509_extensions        = v3_ca # The extentions to add to the self signed cert
-
-# Passwords for private keys if not present they will be prompted for
-# input_password = secret
-# output_password = secret
-
-# This sets a mask for permitted string types. There are several options. 
-# default: PrintableString, T61String, BMPString.
-# pkix  : PrintableString, BMPString.
-# utf8only: only UTF8Strings.
-# nombstr : PrintableString, T61String (no BMPStrings or UTF8Strings).
-# MASK:XXXX a literal mask value.
-# WARNING: current versions of Netscape crash on BMPStrings or UTF8Strings
-# so use this option with caution!
-string_mask = nombstr
-
-# req_extensions = v3_req # The extensions to add to a certificate request
-
-[ req_distinguished_name ]
-countryName                    = Country Name (2 letter code)
-countryName_default            = AU
-countryName_min                        = 2
-countryName_max                        = 2
-
-stateOrProvinceName            = State or Province Name (full name)
-stateOrProvinceName_default    = Some-State
-
-localityName                   = Locality Name (eg, city)
-
-0.organizationName             = Organization Name (eg, company)
-0.organizationName_default     = Internet Widgits Pty Ltd
-
-# we can do this but it is not needed normally :-)
-#1.organizationName            = Second Organization Name (eg, company)
-#1.organizationName_default    = World Wide Web Pty Ltd
-
-organizationalUnitName         = Organizational Unit Name (eg, section)
-#organizationalUnitName_default        =
-
-commonName                     = Common Name (eg, YOUR name)
-commonName_max                 = 64
-
-emailAddress                   = Email Address
-emailAddress_max               = 64
-
-# SET-ex3                      = SET extension number 3
-
-[ req_attributes ]
-challengePassword              = A challenge password
-challengePassword_min          = 4
-challengePassword_max          = 20
-
-unstructuredName               = An optional company name
-
-[ usr_cert ]
-
-# These extensions are added when 'ca' signs a request.
-
-# This goes against PKIX guidelines but some CAs do it and some software
-# requires this to avoid interpreting an end user certificate as a CA.
-
-basicConstraints=CA:FALSE
-
-# Here are some examples of the usage of nsCertType. If it is omitted
-# the certificate can be used for anything *except* object signing.
-
-# This is OK for an SSL server.
-# nsCertType                   = server
-
-# For an object signing certificate this would be used.
-# nsCertType = objsign
-
-# For normal client use this is typical
-# nsCertType = client, email
-
-# and for everything including object signing:
-# nsCertType = client, email, objsign
-
-# This is typical in keyUsage for a client certificate.
-# keyUsage = nonRepudiation, digitalSignature, keyEncipherment
-
-# This will be displayed in Netscape's comment listbox.
-nsComment                      = "OpenSSL Generated Certificate"
-
-# PKIX recommendations harmless if included in all certificates.
-subjectKeyIdentifier=hash
-authorityKeyIdentifier=keyid,issuer
-
-# This stuff is for subjectAltName and issuerAltname.
-# Import the email address.
-# subjectAltName=email:copy
-# An alternative to produce certificates that aren't
-# deprecated according to PKIX.
-# subjectAltName=email:move
-
-# Copy subject details
-# issuerAltName=issuer:copy
-
-#nsCaRevocationUrl             = http://www.domain.dom/ca-crl.pem
-#nsBaseUrl
-#nsRevocationUrl
-#nsRenewalUrl
-#nsCaPolicyUrl
-#nsSslServerName
-
-[ v3_req ]
-
-# Extensions to add to a certificate request
-
-basicConstraints = CA:FALSE
-keyUsage = nonRepudiation, digitalSignature, keyEncipherment
-
-[ v3_ca ]
-
-
-# Extensions for a typical CA
-
-
-# PKIX recommendation.
-
-subjectKeyIdentifier=hash
-
-authorityKeyIdentifier=keyid:always,issuer:always
-
-# This is what PKIX recommends but some broken software chokes on critical
-# extensions.
-#basicConstraints = critical,CA:true
-# So we do this instead.
-basicConstraints = CA:true
-
-# Key usage: this is typical for a CA certificate. However since it will
-# prevent it being used as an test self-signed certificate it is best
-# left out by default.
-# keyUsage = cRLSign, keyCertSign
-
-# Some might want this also
-# nsCertType = sslCA, emailCA
-
-# Include email address in subject alt name: another PKIX recommendation
-# subjectAltName=email:copy
-# Copy issuer details
-# issuerAltName=issuer:copy
-
-# DER hex encoding of an extension: beware experts only!
-# obj=DER:02:03
-# Where 'obj' is a standard or added object
-# You can even override a supported extension:
-# basicConstraints= critical, DER:30:03:01:01:FF
-
-[ crl_ext ]
-
-# CRL extensions.
-# Only issuerAltName and authorityKeyIdentifier make any sense in a CRL.
-
-# issuerAltName=issuer:copy
-authorityKeyIdentifier=keyid:always,issuer:always
-
-[ proxy_cert_ext ]
-# These extensions should be added when creating a proxy certificate
-
-# This goes against PKIX guidelines but some CAs do it and some software
-# requires this to avoid interpreting an end user certificate as a CA.
-
-basicConstraints=CA:FALSE
-
-# Here are some examples of the usage of nsCertType. If it is omitted
-# the certificate can be used for anything *except* object signing.
-
-# This is OK for an SSL server.
-# nsCertType                   = server
-
-# For an object signing certificate this would be used.
-# nsCertType = objsign
-
-# For normal client use this is typical
-# nsCertType = client, email
-
-# and for everything including object signing:
-# nsCertType = client, email, objsign
-
-# This is typical in keyUsage for a client certificate.
-# keyUsage = nonRepudiation, digitalSignature, keyEncipherment
-
-# This will be displayed in Netscape's comment listbox.
-nsComment                      = "OpenSSL Generated Certificate"
-
-# PKIX recommendations harmless if included in all certificates.
-subjectKeyIdentifier=hash
-authorityKeyIdentifier=keyid,issuer:always
-
-# This stuff is for subjectAltName and issuerAltname.
-# Import the email address.
-# subjectAltName=email:copy
-# An alternative to produce certificates that aren't
-# deprecated according to PKIX.
-# subjectAltName=email:move
-
-# Copy subject details
-# issuerAltName=issuer:copy
-
-#nsCaRevocationUrl             = http://www.domain.dom/ca-crl.pem
-#nsBaseUrl
-#nsRevocationUrl
-#nsRenewalUrl
-#nsCaPolicyUrl
-#nsSslServerName
-
-# This really needs to be in place for it to be a proxy certificate.
-proxyCertInfo=critical,language:id-ppl-anyLanguage,pathlen:3,policy:foo
diff --git a/tests/cert-svc/data/TestData/ssl/cert_chain/configs/config_chain3.cnf b/tests/cert-svc/data/TestData/ssl/cert_chain/configs/config_chain3.cnf
deleted file mode 100644 (file)
index 6b4b9db..0000000
+++ /dev/null
@@ -1,313 +0,0 @@
-#
-# OpenSSL example configuration file.
-# This is mostly being used for generation of certificate requests.
-#
-
-# This definition stops the following lines choking if HOME isn't
-# defined.
-HOME                   = .
-RANDFILE               = $ENV::HOME/.rnd
-
-# Extra OBJECT IDENTIFIER info:
-#oid_file              = $ENV::HOME/.oid
-oid_section            = new_oids
-
-# To use this configuration file with the "-extfile" option of the
-# "openssl x509" utility, name here the section containing the
-# X.509v3 extensions to use:
-# extensions           = 
-# (Alternatively, use a configuration file that has only
-# X.509v3 extensions in its main [= default] section.)
-
-[ new_oids ]
-
-# We can add new OIDs in here for use by 'ca' and 'req'.
-# Add a simple OID like this:
-# testoid1=1.2.3.4
-# Or use config file substitution like this:
-# testoid2=${testoid1}.5.6
-
-####################################################################
-[ ca ]
-default_ca     = CA_default            # The default ca section
-
-####################################################################
-[ CA_default ]
-
-dir            = ./cert_chain          # Where everything is kept
-certs          = $dir/certs            # Where the issued certs are kept
-crl_dir                = $dir/crl              # Where the issued crl are kept
-database       = $dir/index.txt        # database index file.
-#unique_subject        = no                    # Set to 'no' to allow creation of
-                                       # several ctificates with same subject.
-new_certs_dir  = $dir/newcerts         # default place for new certs.
-
-certificate    = $dir/cert_chain2.crt  # The CA certificate
-serial         = $dir/serial           # The current serial number
-crlnumber      = $dir/crlnumber        # the current crl number
-                                       # must be commented out to leave a V1 CRL
-crl            = $dir/crl.pem          # The current CRL
-private_key    = $dir/private/cert_chain2.pem # The private key
-RANDFILE       = $dir/private/.rand    # private random number file
-
-x509_extensions        = usr_cert              # The extentions to add to the cert
-
-# Comment out the following two lines for the "traditional"
-# (and highly broken) format.
-name_opt       = ca_default            # Subject Name options
-cert_opt       = ca_default            # Certificate field options
-
-# Extension copying option: use with caution.
-# copy_extensions = copy
-
-# Extensions to add to a CRL. Note: Netscape communicator chokes on V2 CRLs
-# so this is commented out by default to leave a V1 CRL.
-# crlnumber must also be commented out to leave a V1 CRL.
-# crl_extensions       = crl_ext
-
-default_days   = 365                   # how long to certify for
-default_crl_days= 30                   # how long before next CRL
-default_md     = sha1                  # which md to use.
-preserve       = no                    # keep passed DN ordering
-
-# A few difference way of specifying how similar the request should look
-# For type CA, the listed attributes must be the same, and the optional
-# and supplied fields are just that :-)
-policy         = policy_match
-
-# For the CA policy
-[ policy_match ]
-countryName            = match
-stateOrProvinceName    = match
-organizationName       = match
-organizationalUnitName = optional
-commonName             = supplied
-emailAddress           = optional
-
-# For the 'anything' policy
-# At this point in time, you must list all acceptable 'object'
-# types.
-[ policy_anything ]
-countryName            = optional
-stateOrProvinceName    = optional
-localityName           = optional
-organizationName       = optional
-organizationalUnitName = optional
-commonName             = supplied
-emailAddress           = optional
-
-####################################################################
-[ req ]
-default_bits           = 1024
-default_keyfile        = privkey.pem
-distinguished_name     = req_distinguished_name
-attributes             = req_attributes
-x509_extensions        = v3_ca # The extentions to add to the self signed cert
-
-# Passwords for private keys if not present they will be prompted for
-# input_password = secret
-# output_password = secret
-
-# This sets a mask for permitted string types. There are several options. 
-# default: PrintableString, T61String, BMPString.
-# pkix  : PrintableString, BMPString.
-# utf8only: only UTF8Strings.
-# nombstr : PrintableString, T61String (no BMPStrings or UTF8Strings).
-# MASK:XXXX a literal mask value.
-# WARNING: current versions of Netscape crash on BMPStrings or UTF8Strings
-# so use this option with caution!
-string_mask = nombstr
-
-# req_extensions = v3_req # The extensions to add to a certificate request
-
-[ req_distinguished_name ]
-countryName                    = Country Name (2 letter code)
-countryName_default            = AU
-countryName_min                        = 2
-countryName_max                        = 2
-
-stateOrProvinceName            = State or Province Name (full name)
-stateOrProvinceName_default    = Some-State
-
-localityName                   = Locality Name (eg, city)
-
-0.organizationName             = Organization Name (eg, company)
-0.organizationName_default     = Internet Widgits Pty Ltd
-
-# we can do this but it is not needed normally :-)
-#1.organizationName            = Second Organization Name (eg, company)
-#1.organizationName_default    = World Wide Web Pty Ltd
-
-organizationalUnitName         = Organizational Unit Name (eg, section)
-#organizationalUnitName_default        =
-
-commonName                     = Common Name (eg, YOUR name)
-commonName_max                 = 64
-
-emailAddress                   = Email Address
-emailAddress_max               = 64
-
-# SET-ex3                      = SET extension number 3
-
-[ req_attributes ]
-challengePassword              = A challenge password
-challengePassword_min          = 4
-challengePassword_max          = 20
-
-unstructuredName               = An optional company name
-
-[ usr_cert ]
-
-# These extensions are added when 'ca' signs a request.
-
-# This goes against PKIX guidelines but some CAs do it and some software
-# requires this to avoid interpreting an end user certificate as a CA.
-
-basicConstraints=CA:FALSE
-
-# Here are some examples of the usage of nsCertType. If it is omitted
-# the certificate can be used for anything *except* object signing.
-
-# This is OK for an SSL server.
-# nsCertType                   = server
-
-# For an object signing certificate this would be used.
-# nsCertType = objsign
-
-# For normal client use this is typical
-# nsCertType = client, email
-
-# and for everything including object signing:
-# nsCertType = client, email, objsign
-
-# This is typical in keyUsage for a client certificate.
-# keyUsage = nonRepudiation, digitalSignature, keyEncipherment
-
-# This will be displayed in Netscape's comment listbox.
-nsComment                      = "OpenSSL Generated Certificate"
-
-# PKIX recommendations harmless if included in all certificates.
-subjectKeyIdentifier=hash
-authorityKeyIdentifier=keyid,issuer
-
-# This stuff is for subjectAltName and issuerAltname.
-# Import the email address.
-# subjectAltName=email:copy
-# An alternative to produce certificates that aren't
-# deprecated according to PKIX.
-# subjectAltName=email:move
-
-# Copy subject details
-# issuerAltName=issuer:copy
-
-#nsCaRevocationUrl             = http://www.domain.dom/ca-crl.pem
-#nsBaseUrl
-#nsRevocationUrl
-#nsRenewalUrl
-#nsCaPolicyUrl
-#nsSslServerName
-
-[ v3_req ]
-
-# Extensions to add to a certificate request
-
-basicConstraints = CA:FALSE
-keyUsage = nonRepudiation, digitalSignature, keyEncipherment
-
-[ v3_ca ]
-
-
-# Extensions for a typical CA
-
-
-# PKIX recommendation.
-
-subjectKeyIdentifier=hash
-
-authorityKeyIdentifier=keyid:always,issuer:always
-
-# This is what PKIX recommends but some broken software chokes on critical
-# extensions.
-#basicConstraints = critical,CA:true
-# So we do this instead.
-basicConstraints = CA:true
-
-# Key usage: this is typical for a CA certificate. However since it will
-# prevent it being used as an test self-signed certificate it is best
-# left out by default.
-# keyUsage = cRLSign, keyCertSign
-
-# Some might want this also
-# nsCertType = sslCA, emailCA
-
-# Include email address in subject alt name: another PKIX recommendation
-# subjectAltName=email:copy
-# Copy issuer details
-# issuerAltName=issuer:copy
-
-# DER hex encoding of an extension: beware experts only!
-# obj=DER:02:03
-# Where 'obj' is a standard or added object
-# You can even override a supported extension:
-# basicConstraints= critical, DER:30:03:01:01:FF
-
-[ crl_ext ]
-
-# CRL extensions.
-# Only issuerAltName and authorityKeyIdentifier make any sense in a CRL.
-
-# issuerAltName=issuer:copy
-authorityKeyIdentifier=keyid:always,issuer:always
-
-[ proxy_cert_ext ]
-# These extensions should be added when creating a proxy certificate
-
-# This goes against PKIX guidelines but some CAs do it and some software
-# requires this to avoid interpreting an end user certificate as a CA.
-
-basicConstraints=CA:FALSE
-
-# Here are some examples of the usage of nsCertType. If it is omitted
-# the certificate can be used for anything *except* object signing.
-
-# This is OK for an SSL server.
-# nsCertType                   = server
-
-# For an object signing certificate this would be used.
-# nsCertType = objsign
-
-# For normal client use this is typical
-# nsCertType = client, email
-
-# and for everything including object signing:
-# nsCertType = client, email, objsign
-
-# This is typical in keyUsage for a client certificate.
-# keyUsage = nonRepudiation, digitalSignature, keyEncipherment
-
-# This will be displayed in Netscape's comment listbox.
-nsComment                      = "OpenSSL Generated Certificate"
-
-# PKIX recommendations harmless if included in all certificates.
-subjectKeyIdentifier=hash
-authorityKeyIdentifier=keyid,issuer:always
-
-# This stuff is for subjectAltName and issuerAltname.
-# Import the email address.
-# subjectAltName=email:copy
-# An alternative to produce certificates that aren't
-# deprecated according to PKIX.
-# subjectAltName=email:move
-
-# Copy subject details
-# issuerAltName=issuer:copy
-
-#nsCaRevocationUrl             = http://www.domain.dom/ca-crl.pem
-#nsBaseUrl
-#nsRevocationUrl
-#nsRenewalUrl
-#nsCaPolicyUrl
-#nsSslServerName
-
-# This really needs to be in place for it to be a proxy certificate.
-proxyCertInfo=critical,language:id-ppl-anyLanguage,pathlen:3,policy:foo
diff --git a/tests/cert-svc/data/TestData/ssl/cert_chain/configs/config_chain4.cnf b/tests/cert-svc/data/TestData/ssl/cert_chain/configs/config_chain4.cnf
deleted file mode 100644 (file)
index 3f8a51c..0000000
+++ /dev/null
@@ -1,313 +0,0 @@
-#
-# OpenSSL example configuration file.
-# This is mostly being used for generation of certificate requests.
-#
-
-# This definition stops the following lines choking if HOME isn't
-# defined.
-HOME                   = .
-RANDFILE               = $ENV::HOME/.rnd
-
-# Extra OBJECT IDENTIFIER info:
-#oid_file              = $ENV::HOME/.oid
-oid_section            = new_oids
-
-# To use this configuration file with the "-extfile" option of the
-# "openssl x509" utility, name here the section containing the
-# X.509v3 extensions to use:
-# extensions           = 
-# (Alternatively, use a configuration file that has only
-# X.509v3 extensions in its main [= default] section.)
-
-[ new_oids ]
-
-# We can add new OIDs in here for use by 'ca' and 'req'.
-# Add a simple OID like this:
-# testoid1=1.2.3.4
-# Or use config file substitution like this:
-# testoid2=${testoid1}.5.6
-
-####################################################################
-[ ca ]
-default_ca     = CA_default            # The default ca section
-
-####################################################################
-[ CA_default ]
-
-dir            = ./cert_chain          # Where everything is kept
-certs          = $dir/certs            # Where the issued certs are kept
-crl_dir                = $dir/crl              # Where the issued crl are kept
-database       = $dir/index.txt        # database index file.
-#unique_subject        = no                    # Set to 'no' to allow creation of
-                                       # several ctificates with same subject.
-new_certs_dir  = $dir/newcerts         # default place for new certs.
-
-certificate    = $dir/cert_chain3.crt  # The CA certificate
-serial         = $dir/serial           # The current serial number
-crlnumber      = $dir/crlnumber        # the current crl number
-                                       # must be commented out to leave a V1 CRL
-crl            = $dir/crl.pem          # The current CRL
-private_key    = $dir/private/cert_chain3.pem # The private key
-RANDFILE       = $dir/private/.rand    # private random number file
-
-x509_extensions        = usr_cert              # The extentions to add to the cert
-
-# Comment out the following two lines for the "traditional"
-# (and highly broken) format.
-name_opt       = ca_default            # Subject Name options
-cert_opt       = ca_default            # Certificate field options
-
-# Extension copying option: use with caution.
-# copy_extensions = copy
-
-# Extensions to add to a CRL. Note: Netscape communicator chokes on V2 CRLs
-# so this is commented out by default to leave a V1 CRL.
-# crlnumber must also be commented out to leave a V1 CRL.
-# crl_extensions       = crl_ext
-
-default_days   = 365                   # how long to certify for
-default_crl_days= 30                   # how long before next CRL
-default_md     = sha1                  # which md to use.
-preserve       = no                    # keep passed DN ordering
-
-# A few difference way of specifying how similar the request should look
-# For type CA, the listed attributes must be the same, and the optional
-# and supplied fields are just that :-)
-policy         = policy_match
-
-# For the CA policy
-[ policy_match ]
-countryName            = match
-stateOrProvinceName    = match
-organizationName       = match
-organizationalUnitName = optional
-commonName             = supplied
-emailAddress           = optional
-
-# For the 'anything' policy
-# At this point in time, you must list all acceptable 'object'
-# types.
-[ policy_anything ]
-countryName            = optional
-stateOrProvinceName    = optional
-localityName           = optional
-organizationName       = optional
-organizationalUnitName = optional
-commonName             = supplied
-emailAddress           = optional
-
-####################################################################
-[ req ]
-default_bits           = 1024
-default_keyfile        = privkey.pem
-distinguished_name     = req_distinguished_name
-attributes             = req_attributes
-x509_extensions        = v3_ca # The extentions to add to the self signed cert
-
-# Passwords for private keys if not present they will be prompted for
-# input_password = secret
-# output_password = secret
-
-# This sets a mask for permitted string types. There are several options. 
-# default: PrintableString, T61String, BMPString.
-# pkix  : PrintableString, BMPString.
-# utf8only: only UTF8Strings.
-# nombstr : PrintableString, T61String (no BMPStrings or UTF8Strings).
-# MASK:XXXX a literal mask value.
-# WARNING: current versions of Netscape crash on BMPStrings or UTF8Strings
-# so use this option with caution!
-string_mask = nombstr
-
-# req_extensions = v3_req # The extensions to add to a certificate request
-
-[ req_distinguished_name ]
-countryName                    = Country Name (2 letter code)
-countryName_default            = AU
-countryName_min                        = 2
-countryName_max                        = 2
-
-stateOrProvinceName            = State or Province Name (full name)
-stateOrProvinceName_default    = Some-State
-
-localityName                   = Locality Name (eg, city)
-
-0.organizationName             = Organization Name (eg, company)
-0.organizationName_default     = Internet Widgits Pty Ltd
-
-# we can do this but it is not needed normally :-)
-#1.organizationName            = Second Organization Name (eg, company)
-#1.organizationName_default    = World Wide Web Pty Ltd
-
-organizationalUnitName         = Organizational Unit Name (eg, section)
-#organizationalUnitName_default        =
-
-commonName                     = Common Name (eg, YOUR name)
-commonName_max                 = 64
-
-emailAddress                   = Email Address
-emailAddress_max               = 64
-
-# SET-ex3                      = SET extension number 3
-
-[ req_attributes ]
-challengePassword              = A challenge password
-challengePassword_min          = 4
-challengePassword_max          = 20
-
-unstructuredName               = An optional company name
-
-[ usr_cert ]
-
-# These extensions are added when 'ca' signs a request.
-
-# This goes against PKIX guidelines but some CAs do it and some software
-# requires this to avoid interpreting an end user certificate as a CA.
-
-basicConstraints=CA:FALSE
-
-# Here are some examples of the usage of nsCertType. If it is omitted
-# the certificate can be used for anything *except* object signing.
-
-# This is OK for an SSL server.
-# nsCertType                   = server
-
-# For an object signing certificate this would be used.
-# nsCertType = objsign
-
-# For normal client use this is typical
-# nsCertType = client, email
-
-# and for everything including object signing:
-# nsCertType = client, email, objsign
-
-# This is typical in keyUsage for a client certificate.
-# keyUsage = nonRepudiation, digitalSignature, keyEncipherment
-
-# This will be displayed in Netscape's comment listbox.
-nsComment                      = "OpenSSL Generated Certificate"
-
-# PKIX recommendations harmless if included in all certificates.
-subjectKeyIdentifier=hash
-authorityKeyIdentifier=keyid,issuer
-
-# This stuff is for subjectAltName and issuerAltname.
-# Import the email address.
-# subjectAltName=email:copy
-# An alternative to produce certificates that aren't
-# deprecated according to PKIX.
-# subjectAltName=email:move
-
-# Copy subject details
-# issuerAltName=issuer:copy
-
-#nsCaRevocationUrl             = http://www.domain.dom/ca-crl.pem
-#nsBaseUrl
-#nsRevocationUrl
-#nsRenewalUrl
-#nsCaPolicyUrl
-#nsSslServerName
-
-[ v3_req ]
-
-# Extensions to add to a certificate request
-
-basicConstraints = CA:FALSE
-keyUsage = nonRepudiation, digitalSignature, keyEncipherment
-
-[ v3_ca ]
-
-
-# Extensions for a typical CA
-
-
-# PKIX recommendation.
-
-subjectKeyIdentifier=hash
-
-authorityKeyIdentifier=keyid:always,issuer:always
-
-# This is what PKIX recommends but some broken software chokes on critical
-# extensions.
-#basicConstraints = critical,CA:true
-# So we do this instead.
-basicConstraints = CA:true
-
-# Key usage: this is typical for a CA certificate. However since it will
-# prevent it being used as an test self-signed certificate it is best
-# left out by default.
-# keyUsage = cRLSign, keyCertSign
-
-# Some might want this also
-# nsCertType = sslCA, emailCA
-
-# Include email address in subject alt name: another PKIX recommendation
-# subjectAltName=email:copy
-# Copy issuer details
-# issuerAltName=issuer:copy
-
-# DER hex encoding of an extension: beware experts only!
-# obj=DER:02:03
-# Where 'obj' is a standard or added object
-# You can even override a supported extension:
-# basicConstraints= critical, DER:30:03:01:01:FF
-
-[ crl_ext ]
-
-# CRL extensions.
-# Only issuerAltName and authorityKeyIdentifier make any sense in a CRL.
-
-# issuerAltName=issuer:copy
-authorityKeyIdentifier=keyid:always,issuer:always
-
-[ proxy_cert_ext ]
-# These extensions should be added when creating a proxy certificate
-
-# This goes against PKIX guidelines but some CAs do it and some software
-# requires this to avoid interpreting an end user certificate as a CA.
-
-basicConstraints=CA:FALSE
-
-# Here are some examples of the usage of nsCertType. If it is omitted
-# the certificate can be used for anything *except* object signing.
-
-# This is OK for an SSL server.
-# nsCertType                   = server
-
-# For an object signing certificate this would be used.
-# nsCertType = objsign
-
-# For normal client use this is typical
-# nsCertType = client, email
-
-# and for everything including object signing:
-# nsCertType = client, email, objsign
-
-# This is typical in keyUsage for a client certificate.
-# keyUsage = nonRepudiation, digitalSignature, keyEncipherment
-
-# This will be displayed in Netscape's comment listbox.
-nsComment                      = "OpenSSL Generated Certificate"
-
-# PKIX recommendations harmless if included in all certificates.
-subjectKeyIdentifier=hash
-authorityKeyIdentifier=keyid,issuer:always
-
-# This stuff is for subjectAltName and issuerAltname.
-# Import the email address.
-# subjectAltName=email:copy
-# An alternative to produce certificates that aren't
-# deprecated according to PKIX.
-# subjectAltName=email:move
-
-# Copy subject details
-# issuerAltName=issuer:copy
-
-#nsCaRevocationUrl             = http://www.domain.dom/ca-crl.pem
-#nsBaseUrl
-#nsRevocationUrl
-#nsRenewalUrl
-#nsCaPolicyUrl
-#nsSslServerName
-
-# This really needs to be in place for it to be a proxy certificate.
-proxyCertInfo=critical,language:id-ppl-anyLanguage,pathlen:3,policy:foo
diff --git a/tests/cert-svc/data/TestData/ssl/cert_chain/configs/config_chain5.cnf b/tests/cert-svc/data/TestData/ssl/cert_chain/configs/config_chain5.cnf
deleted file mode 100644 (file)
index 1fb4520..0000000
+++ /dev/null
@@ -1,313 +0,0 @@
-#
-# OpenSSL example configuration file.
-# This is mostly being used for generation of certificate requests.
-#
-
-# This definition stops the following lines choking if HOME isn't
-# defined.
-HOME                   = .
-RANDFILE               = $ENV::HOME/.rnd
-
-# Extra OBJECT IDENTIFIER info:
-#oid_file              = $ENV::HOME/.oid
-oid_section            = new_oids
-
-# To use this configuration file with the "-extfile" option of the
-# "openssl x509" utility, name here the section containing the
-# X.509v3 extensions to use:
-# extensions           = 
-# (Alternatively, use a configuration file that has only
-# X.509v3 extensions in its main [= default] section.)
-
-[ new_oids ]
-
-# We can add new OIDs in here for use by 'ca' and 'req'.
-# Add a simple OID like this:
-# testoid1=1.2.3.4
-# Or use config file substitution like this:
-# testoid2=${testoid1}.5.6
-
-####################################################################
-[ ca ]
-default_ca     = CA_default            # The default ca section
-
-####################################################################
-[ CA_default ]
-
-dir            = ./cert_chain          # Where everything is kept
-certs          = $dir/certs            # Where the issued certs are kept
-crl_dir                = $dir/crl              # Where the issued crl are kept
-database       = $dir/index.txt        # database index file.
-#unique_subject        = no                    # Set to 'no' to allow creation of
-                                       # several ctificates with same subject.
-new_certs_dir  = $dir/newcerts         # default place for new certs.
-
-certificate    = $dir/cert_chain4.crt # The CA certificate
-serial         = $dir/serial           # The current serial number
-crlnumber      = $dir/crlnumber        # the current crl number
-                                       # must be commented out to leave a V1 CRL
-crl            = $dir/crl.pem          # The current CRL
-private_key    = $dir/private/cert_chain4.pem # The private key
-RANDFILE       = $dir/private/.rand    # private random number file
-
-x509_extensions        = usr_cert              # The extentions to add to the cert
-
-# Comment out the following two lines for the "traditional"
-# (and highly broken) format.
-name_opt       = ca_default            # Subject Name options
-cert_opt       = ca_default            # Certificate field options
-
-# Extension copying option: use with caution.
-# copy_extensions = copy
-
-# Extensions to add to a CRL. Note: Netscape communicator chokes on V2 CRLs
-# so this is commented out by default to leave a V1 CRL.
-# crlnumber must also be commented out to leave a V1 CRL.
-# crl_extensions       = crl_ext
-
-default_days   = 365                   # how long to certify for
-default_crl_days= 30                   # how long before next CRL
-default_md     = sha1                  # which md to use.
-preserve       = no                    # keep passed DN ordering
-
-# A few difference way of specifying how similar the request should look
-# For type CA, the listed attributes must be the same, and the optional
-# and supplied fields are just that :-)
-policy         = policy_match
-
-# For the CA policy
-[ policy_match ]
-countryName            = match
-stateOrProvinceName    = match
-organizationName       = match
-organizationalUnitName = optional
-commonName             = supplied
-emailAddress           = optional
-
-# For the 'anything' policy
-# At this point in time, you must list all acceptable 'object'
-# types.
-[ policy_anything ]
-countryName            = optional
-stateOrProvinceName    = optional
-localityName           = optional
-organizationName       = optional
-organizationalUnitName = optional
-commonName             = supplied
-emailAddress           = optional
-
-####################################################################
-[ req ]
-default_bits           = 1024
-default_keyfile        = privkey.pem
-distinguished_name     = req_distinguished_name
-attributes             = req_attributes
-x509_extensions        = v3_ca # The extentions to add to the self signed cert
-
-# Passwords for private keys if not present they will be prompted for
-# input_password = secret
-# output_password = secret
-
-# This sets a mask for permitted string types. There are several options. 
-# default: PrintableString, T61String, BMPString.
-# pkix  : PrintableString, BMPString.
-# utf8only: only UTF8Strings.
-# nombstr : PrintableString, T61String (no BMPStrings or UTF8Strings).
-# MASK:XXXX a literal mask value.
-# WARNING: current versions of Netscape crash on BMPStrings or UTF8Strings
-# so use this option with caution!
-string_mask = nombstr
-
-# req_extensions = v3_req # The extensions to add to a certificate request
-
-[ req_distinguished_name ]
-countryName                    = Country Name (2 letter code)
-countryName_default            = AU
-countryName_min                        = 2
-countryName_max                        = 2
-
-stateOrProvinceName            = State or Province Name (full name)
-stateOrProvinceName_default    = Some-State
-
-localityName                   = Locality Name (eg, city)
-
-0.organizationName             = Organization Name (eg, company)
-0.organizationName_default     = Internet Widgits Pty Ltd
-
-# we can do this but it is not needed normally :-)
-#1.organizationName            = Second Organization Name (eg, company)
-#1.organizationName_default    = World Wide Web Pty Ltd
-
-organizationalUnitName         = Organizational Unit Name (eg, section)
-#organizationalUnitName_default        =
-
-commonName                     = Common Name (eg, YOUR name)
-commonName_max                 = 64
-
-emailAddress                   = Email Address
-emailAddress_max               = 64
-
-# SET-ex3                      = SET extension number 3
-
-[ req_attributes ]
-challengePassword              = A challenge password
-challengePassword_min          = 4
-challengePassword_max          = 20
-
-unstructuredName               = An optional company name
-
-[ usr_cert ]
-
-# These extensions are added when 'ca' signs a request.
-
-# This goes against PKIX guidelines but some CAs do it and some software
-# requires this to avoid interpreting an end user certificate as a CA.
-
-basicConstraints=CA:FALSE
-
-# Here are some examples of the usage of nsCertType. If it is omitted
-# the certificate can be used for anything *except* object signing.
-
-# This is OK for an SSL server.
-# nsCertType                   = server
-
-# For an object signing certificate this would be used.
-# nsCertType = objsign
-
-# For normal client use this is typical
-# nsCertType = client, email
-
-# and for everything including object signing:
-# nsCertType = client, email, objsign
-
-# This is typical in keyUsage for a client certificate.
-# keyUsage = nonRepudiation, digitalSignature, keyEncipherment
-
-# This will be displayed in Netscape's comment listbox.
-nsComment                      = "OpenSSL Generated Certificate"
-
-# PKIX recommendations harmless if included in all certificates.
-subjectKeyIdentifier=hash
-authorityKeyIdentifier=keyid,issuer
-
-# This stuff is for subjectAltName and issuerAltname.
-# Import the email address.
-# subjectAltName=email:copy
-# An alternative to produce certificates that aren't
-# deprecated according to PKIX.
-# subjectAltName=email:move
-
-# Copy subject details
-# issuerAltName=issuer:copy
-
-#nsCaRevocationUrl             = http://www.domain.dom/ca-crl.pem
-#nsBaseUrl
-#nsRevocationUrl
-#nsRenewalUrl
-#nsCaPolicyUrl
-#nsSslServerName
-
-[ v3_req ]
-
-# Extensions to add to a certificate request
-
-basicConstraints = CA:FALSE
-keyUsage = nonRepudiation, digitalSignature, keyEncipherment
-
-[ v3_ca ]
-
-
-# Extensions for a typical CA
-
-
-# PKIX recommendation.
-
-subjectKeyIdentifier=hash
-
-authorityKeyIdentifier=keyid:always,issuer:always
-
-# This is what PKIX recommends but some broken software chokes on critical
-# extensions.
-#basicConstraints = critical,CA:true
-# So we do this instead.
-basicConstraints = CA:true
-
-# Key usage: this is typical for a CA certificate. However since it will
-# prevent it being used as an test self-signed certificate it is best
-# left out by default.
-# keyUsage = cRLSign, keyCertSign
-
-# Some might want this also
-# nsCertType = sslCA, emailCA
-
-# Include email address in subject alt name: another PKIX recommendation
-# subjectAltName=email:copy
-# Copy issuer details
-# issuerAltName=issuer:copy
-
-# DER hex encoding of an extension: beware experts only!
-# obj=DER:02:03
-# Where 'obj' is a standard or added object
-# You can even override a supported extension:
-# basicConstraints= critical, DER:30:03:01:01:FF
-
-[ crl_ext ]
-
-# CRL extensions.
-# Only issuerAltName and authorityKeyIdentifier make any sense in a CRL.
-
-# issuerAltName=issuer:copy
-authorityKeyIdentifier=keyid:always,issuer:always
-
-[ proxy_cert_ext ]
-# These extensions should be added when creating a proxy certificate
-
-# This goes against PKIX guidelines but some CAs do it and some software
-# requires this to avoid interpreting an end user certificate as a CA.
-
-basicConstraints=CA:FALSE
-
-# Here are some examples of the usage of nsCertType. If it is omitted
-# the certificate can be used for anything *except* object signing.
-
-# This is OK for an SSL server.
-# nsCertType                   = server
-
-# For an object signing certificate this would be used.
-# nsCertType = objsign
-
-# For normal client use this is typical
-# nsCertType = client, email
-
-# and for everything including object signing:
-# nsCertType = client, email, objsign
-
-# This is typical in keyUsage for a client certificate.
-# keyUsage = nonRepudiation, digitalSignature, keyEncipherment
-
-# This will be displayed in Netscape's comment listbox.
-nsComment                      = "OpenSSL Generated Certificate"
-
-# PKIX recommendations harmless if included in all certificates.
-subjectKeyIdentifier=hash
-authorityKeyIdentifier=keyid,issuer:always
-
-# This stuff is for subjectAltName and issuerAltname.
-# Import the email address.
-# subjectAltName=email:copy
-# An alternative to produce certificates that aren't
-# deprecated according to PKIX.
-# subjectAltName=email:move
-
-# Copy subject details
-# issuerAltName=issuer:copy
-
-#nsCaRevocationUrl             = http://www.domain.dom/ca-crl.pem
-#nsBaseUrl
-#nsRevocationUrl
-#nsRenewalUrl
-#nsCaPolicyUrl
-#nsSslServerName
-
-# This really needs to be in place for it to be a proxy certificate.
-proxyCertInfo=critical,language:id-ppl-anyLanguage,pathlen:3,policy:foo
diff --git a/tests/cert-svc/data/TestData/ssl/cert_chain/configs/config_chain6.cnf b/tests/cert-svc/data/TestData/ssl/cert_chain/configs/config_chain6.cnf
deleted file mode 100644 (file)
index 7ff40b9..0000000
+++ /dev/null
@@ -1,313 +0,0 @@
-#
-# OpenSSL example configuration file.
-# This is mostly being used for generation of certificate requests.
-#
-
-# This definition stops the following lines choking if HOME isn't
-# defined.
-HOME                   = .
-RANDFILE               = $ENV::HOME/.rnd
-
-# Extra OBJECT IDENTIFIER info:
-#oid_file              = $ENV::HOME/.oid
-oid_section            = new_oids
-
-# To use this configuration file with the "-extfile" option of the
-# "openssl x509" utility, name here the section containing the
-# X.509v3 extensions to use:
-# extensions           = 
-# (Alternatively, use a configuration file that has only
-# X.509v3 extensions in its main [= default] section.)
-
-[ new_oids ]
-
-# We can add new OIDs in here for use by 'ca' and 'req'.
-# Add a simple OID like this:
-# testoid1=1.2.3.4
-# Or use config file substitution like this:
-# testoid2=${testoid1}.5.6
-
-####################################################################
-[ ca ]
-default_ca     = CA_default            # The default ca section
-
-####################################################################
-[ CA_default ]
-
-dir            = ./cert_chain          # Where everything is kept
-certs          = $dir/certs            # Where the issued certs are kept
-crl_dir                = $dir/crl              # Where the issued crl are kept
-database       = $dir/index.txt        # database index file.
-#unique_subject        = no                    # Set to 'no' to allow creation of
-                                       # several ctificates with same subject.
-new_certs_dir  = $dir/newcerts         # default place for new certs.
-
-certificate    = $dir/cert_chain5.crt  # The CA certificate
-serial         = $dir/serial           # The current serial number
-crlnumber      = $dir/crlnumber        # the current crl number
-                                       # must be commented out to leave a V1 CRL
-crl            = $dir/crl.pem          # The current CRL
-private_key    = $dir/private/cert_chain5.pem # The private key
-RANDFILE       = $dir/private/.rand    # private random number file
-
-x509_extensions        = usr_cert              # The extentions to add to the cert
-
-# Comment out the following two lines for the "traditional"
-# (and highly broken) format.
-name_opt       = ca_default            # Subject Name options
-cert_opt       = ca_default            # Certificate field options
-
-# Extension copying option: use with caution.
-# copy_extensions = copy
-
-# Extensions to add to a CRL. Note: Netscape communicator chokes on V2 CRLs
-# so this is commented out by default to leave a V1 CRL.
-# crlnumber must also be commented out to leave a V1 CRL.
-# crl_extensions       = crl_ext
-
-default_days   = 365                   # how long to certify for
-default_crl_days= 30                   # how long before next CRL
-default_md     = sha1                  # which md to use.
-preserve       = no                    # keep passed DN ordering
-
-# A few difference way of specifying how similar the request should look
-# For type CA, the listed attributes must be the same, and the optional
-# and supplied fields are just that :-)
-policy         = policy_match
-
-# For the CA policy
-[ policy_match ]
-countryName            = match
-stateOrProvinceName    = match
-organizationName       = match
-organizationalUnitName = optional
-commonName             = supplied
-emailAddress           = optional
-
-# For the 'anything' policy
-# At this point in time, you must list all acceptable 'object'
-# types.
-[ policy_anything ]
-countryName            = optional
-stateOrProvinceName    = optional
-localityName           = optional
-organizationName       = optional
-organizationalUnitName = optional
-commonName             = supplied
-emailAddress           = optional
-
-####################################################################
-[ req ]
-default_bits           = 1024
-default_keyfile        = privkey.pem
-distinguished_name     = req_distinguished_name
-attributes             = req_attributes
-x509_extensions        = v3_ca # The extentions to add to the self signed cert
-
-# Passwords for private keys if not present they will be prompted for
-# input_password = secret
-# output_password = secret
-
-# This sets a mask for permitted string types. There are several options. 
-# default: PrintableString, T61String, BMPString.
-# pkix  : PrintableString, BMPString.
-# utf8only: only UTF8Strings.
-# nombstr : PrintableString, T61String (no BMPStrings or UTF8Strings).
-# MASK:XXXX a literal mask value.
-# WARNING: current versions of Netscape crash on BMPStrings or UTF8Strings
-# so use this option with caution!
-string_mask = nombstr
-
-# req_extensions = v3_req # The extensions to add to a certificate request
-
-[ req_distinguished_name ]
-countryName                    = Country Name (2 letter code)
-countryName_default            = AU
-countryName_min                        = 2
-countryName_max                        = 2
-
-stateOrProvinceName            = State or Province Name (full name)
-stateOrProvinceName_default    = Some-State
-
-localityName                   = Locality Name (eg, city)
-
-0.organizationName             = Organization Name (eg, company)
-0.organizationName_default     = Internet Widgits Pty Ltd
-
-# we can do this but it is not needed normally :-)
-#1.organizationName            = Second Organization Name (eg, company)
-#1.organizationName_default    = World Wide Web Pty Ltd
-
-organizationalUnitName         = Organizational Unit Name (eg, section)
-#organizationalUnitName_default        =
-
-commonName                     = Common Name (eg, YOUR name)
-commonName_max                 = 64
-
-emailAddress                   = Email Address
-emailAddress_max               = 64
-
-# SET-ex3                      = SET extension number 3
-
-[ req_attributes ]
-challengePassword              = A challenge password
-challengePassword_min          = 4
-challengePassword_max          = 20
-
-unstructuredName               = An optional company name
-
-[ usr_cert ]
-
-# These extensions are added when 'ca' signs a request.
-
-# This goes against PKIX guidelines but some CAs do it and some software
-# requires this to avoid interpreting an end user certificate as a CA.
-
-basicConstraints=CA:FALSE
-
-# Here are some examples of the usage of nsCertType. If it is omitted
-# the certificate can be used for anything *except* object signing.
-
-# This is OK for an SSL server.
-# nsCertType                   = server
-
-# For an object signing certificate this would be used.
-# nsCertType = objsign
-
-# For normal client use this is typical
-# nsCertType = client, email
-
-# and for everything including object signing:
-# nsCertType = client, email, objsign
-
-# This is typical in keyUsage for a client certificate.
-# keyUsage = nonRepudiation, digitalSignature, keyEncipherment
-
-# This will be displayed in Netscape's comment listbox.
-nsComment                      = "OpenSSL Generated Certificate"
-
-# PKIX recommendations harmless if included in all certificates.
-subjectKeyIdentifier=hash
-authorityKeyIdentifier=keyid,issuer
-
-# This stuff is for subjectAltName and issuerAltname.
-# Import the email address.
-# subjectAltName=email:copy
-# An alternative to produce certificates that aren't
-# deprecated according to PKIX.
-# subjectAltName=email:move
-
-# Copy subject details
-# issuerAltName=issuer:copy
-
-#nsCaRevocationUrl             = http://www.domain.dom/ca-crl.pem
-#nsBaseUrl
-#nsRevocationUrl
-#nsRenewalUrl
-#nsCaPolicyUrl
-#nsSslServerName
-
-[ v3_req ]
-
-# Extensions to add to a certificate request
-
-basicConstraints = CA:FALSE
-keyUsage = nonRepudiation, digitalSignature, keyEncipherment
-
-[ v3_ca ]
-
-
-# Extensions for a typical CA
-
-
-# PKIX recommendation.
-
-subjectKeyIdentifier=hash
-
-authorityKeyIdentifier=keyid:always,issuer:always
-
-# This is what PKIX recommends but some broken software chokes on critical
-# extensions.
-#basicConstraints = critical,CA:true
-# So we do this instead.
-basicConstraints = CA:true
-
-# Key usage: this is typical for a CA certificate. However since it will
-# prevent it being used as an test self-signed certificate it is best
-# left out by default.
-# keyUsage = cRLSign, keyCertSign
-
-# Some might want this also
-# nsCertType = sslCA, emailCA
-
-# Include email address in subject alt name: another PKIX recommendation
-# subjectAltName=email:copy
-# Copy issuer details
-# issuerAltName=issuer:copy
-
-# DER hex encoding of an extension: beware experts only!
-# obj=DER:02:03
-# Where 'obj' is a standard or added object
-# You can even override a supported extension:
-# basicConstraints= critical, DER:30:03:01:01:FF
-
-[ crl_ext ]
-
-# CRL extensions.
-# Only issuerAltName and authorityKeyIdentifier make any sense in a CRL.
-
-# issuerAltName=issuer:copy
-authorityKeyIdentifier=keyid:always,issuer:always
-
-[ proxy_cert_ext ]
-# These extensions should be added when creating a proxy certificate
-
-# This goes against PKIX guidelines but some CAs do it and some software
-# requires this to avoid interpreting an end user certificate as a CA.
-
-basicConstraints=CA:FALSE
-
-# Here are some examples of the usage of nsCertType. If it is omitted
-# the certificate can be used for anything *except* object signing.
-
-# This is OK for an SSL server.
-# nsCertType                   = server
-
-# For an object signing certificate this would be used.
-# nsCertType = objsign
-
-# For normal client use this is typical
-# nsCertType = client, email
-
-# and for everything including object signing:
-# nsCertType = client, email, objsign
-
-# This is typical in keyUsage for a client certificate.
-# keyUsage = nonRepudiation, digitalSignature, keyEncipherment
-
-# This will be displayed in Netscape's comment listbox.
-nsComment                      = "OpenSSL Generated Certificate"
-
-# PKIX recommendations harmless if included in all certificates.
-subjectKeyIdentifier=hash
-authorityKeyIdentifier=keyid,issuer:always
-
-# This stuff is for subjectAltName and issuerAltname.
-# Import the email address.
-# subjectAltName=email:copy
-# An alternative to produce certificates that aren't
-# deprecated according to PKIX.
-# subjectAltName=email:move
-
-# Copy subject details
-# issuerAltName=issuer:copy
-
-#nsCaRevocationUrl             = http://www.domain.dom/ca-crl.pem
-#nsBaseUrl
-#nsRevocationUrl
-#nsRenewalUrl
-#nsCaPolicyUrl
-#nsSslServerName
-
-# This really needs to be in place for it to be a proxy certificate.
-proxyCertInfo=critical,language:id-ppl-anyLanguage,pathlen:3,policy:foo
diff --git a/tests/cert-svc/data/TestData/ssl/cert_chain/configs/config_chain7.cnf b/tests/cert-svc/data/TestData/ssl/cert_chain/configs/config_chain7.cnf
deleted file mode 100644 (file)
index db26689..0000000
+++ /dev/null
@@ -1,313 +0,0 @@
-#
-# OpenSSL example configuration file.
-# This is mostly being used for generation of certificate requests.
-#
-
-# This definition stops the following lines choking if HOME isn't
-# defined.
-HOME                   = .
-RANDFILE               = $ENV::HOME/.rnd
-
-# Extra OBJECT IDENTIFIER info:
-#oid_file              = $ENV::HOME/.oid
-oid_section            = new_oids
-
-# To use this configuration file with the "-extfile" option of the
-# "openssl x509" utility, name here the section containing the
-# X.509v3 extensions to use:
-# extensions           = 
-# (Alternatively, use a configuration file that has only
-# X.509v3 extensions in its main [= default] section.)
-
-[ new_oids ]
-
-# We can add new OIDs in here for use by 'ca' and 'req'.
-# Add a simple OID like this:
-# testoid1=1.2.3.4
-# Or use config file substitution like this:
-# testoid2=${testoid1}.5.6
-
-####################################################################
-[ ca ]
-default_ca     = CA_default            # The default ca section
-
-####################################################################
-[ CA_default ]
-
-dir            = ./cert_chain          # Where everything is kept
-certs          = $dir/certs            # Where the issued certs are kept
-crl_dir                = $dir/crl              # Where the issued crl are kept
-database       = $dir/index.txt        # database index file.
-#unique_subject        = no                    # Set to 'no' to allow creation of
-                                       # several ctificates with same subject.
-new_certs_dir  = $dir/newcerts         # default place for new certs.
-
-certificate    = $dir/cert_chain6.crt  # The CA certificate
-serial         = $dir/serial           # The current serial number
-crlnumber      = $dir/crlnumber        # the current crl number
-                                       # must be commented out to leave a V1 CRL
-crl            = $dir/crl.pem          # The current CRL
-private_key    = $dir/private/cert_chain6.pem # The private key
-RANDFILE       = $dir/private/.rand    # private random number file
-
-x509_extensions        = usr_cert              # The extentions to add to the cert
-
-# Comment out the following two lines for the "traditional"
-# (and highly broken) format.
-name_opt       = ca_default            # Subject Name options
-cert_opt       = ca_default            # Certificate field options
-
-# Extension copying option: use with caution.
-# copy_extensions = copy
-
-# Extensions to add to a CRL. Note: Netscape communicator chokes on V2 CRLs
-# so this is commented out by default to leave a V1 CRL.
-# crlnumber must also be commented out to leave a V1 CRL.
-# crl_extensions       = crl_ext
-
-default_days   = 365                   # how long to certify for
-default_crl_days= 30                   # how long before next CRL
-default_md     = sha1                  # which md to use.
-preserve       = no                    # keep passed DN ordering
-
-# A few difference way of specifying how similar the request should look
-# For type CA, the listed attributes must be the same, and the optional
-# and supplied fields are just that :-)
-policy         = policy_match
-
-# For the CA policy
-[ policy_match ]
-countryName            = match
-stateOrProvinceName    = match
-organizationName       = match
-organizationalUnitName = optional
-commonName             = supplied
-emailAddress           = optional
-
-# For the 'anything' policy
-# At this point in time, you must list all acceptable 'object'
-# types.
-[ policy_anything ]
-countryName            = optional
-stateOrProvinceName    = optional
-localityName           = optional
-organizationName       = optional
-organizationalUnitName = optional
-commonName             = supplied
-emailAddress           = optional
-
-####################################################################
-[ req ]
-default_bits           = 1024
-default_keyfile        = privkey.pem
-distinguished_name     = req_distinguished_name
-attributes             = req_attributes
-x509_extensions        = v3_ca # The extentions to add to the self signed cert
-
-# Passwords for private keys if not present they will be prompted for
-# input_password = secret
-# output_password = secret
-
-# This sets a mask for permitted string types. There are several options. 
-# default: PrintableString, T61String, BMPString.
-# pkix  : PrintableString, BMPString.
-# utf8only: only UTF8Strings.
-# nombstr : PrintableString, T61String (no BMPStrings or UTF8Strings).
-# MASK:XXXX a literal mask value.
-# WARNING: current versions of Netscape crash on BMPStrings or UTF8Strings
-# so use this option with caution!
-string_mask = nombstr
-
-# req_extensions = v3_req # The extensions to add to a certificate request
-
-[ req_distinguished_name ]
-countryName                    = Country Name (2 letter code)
-countryName_default            = AU
-countryName_min                        = 2
-countryName_max                        = 2
-
-stateOrProvinceName            = State or Province Name (full name)
-stateOrProvinceName_default    = Some-State
-
-localityName                   = Locality Name (eg, city)
-
-0.organizationName             = Organization Name (eg, company)
-0.organizationName_default     = Internet Widgits Pty Ltd
-
-# we can do this but it is not needed normally :-)
-#1.organizationName            = Second Organization Name (eg, company)
-#1.organizationName_default    = World Wide Web Pty Ltd
-
-organizationalUnitName         = Organizational Unit Name (eg, section)
-#organizationalUnitName_default        =
-
-commonName                     = Common Name (eg, YOUR name)
-commonName_max                 = 64
-
-emailAddress                   = Email Address
-emailAddress_max               = 64
-
-# SET-ex3                      = SET extension number 3
-
-[ req_attributes ]
-challengePassword              = A challenge password
-challengePassword_min          = 4
-challengePassword_max          = 20
-
-unstructuredName               = An optional company name
-
-[ usr_cert ]
-
-# These extensions are added when 'ca' signs a request.
-
-# This goes against PKIX guidelines but some CAs do it and some software
-# requires this to avoid interpreting an end user certificate as a CA.
-
-basicConstraints=CA:FALSE
-
-# Here are some examples of the usage of nsCertType. If it is omitted
-# the certificate can be used for anything *except* object signing.
-
-# This is OK for an SSL server.
-# nsCertType                   = server
-
-# For an object signing certificate this would be used.
-# nsCertType = objsign
-
-# For normal client use this is typical
-# nsCertType = client, email
-
-# and for everything including object signing:
-# nsCertType = client, email, objsign
-
-# This is typical in keyUsage for a client certificate.
-# keyUsage = nonRepudiation, digitalSignature, keyEncipherment
-
-# This will be displayed in Netscape's comment listbox.
-nsComment                      = "OpenSSL Generated Certificate"
-
-# PKIX recommendations harmless if included in all certificates.
-subjectKeyIdentifier=hash
-authorityKeyIdentifier=keyid,issuer
-
-# This stuff is for subjectAltName and issuerAltname.
-# Import the email address.
-# subjectAltName=email:copy
-# An alternative to produce certificates that aren't
-# deprecated according to PKIX.
-# subjectAltName=email:move
-
-# Copy subject details
-# issuerAltName=issuer:copy
-
-#nsCaRevocationUrl             = http://www.domain.dom/ca-crl.pem
-#nsBaseUrl
-#nsRevocationUrl
-#nsRenewalUrl
-#nsCaPolicyUrl
-#nsSslServerName
-
-[ v3_req ]
-
-# Extensions to add to a certificate request
-
-basicConstraints = CA:FALSE
-keyUsage = nonRepudiation, digitalSignature, keyEncipherment
-
-[ v3_ca ]
-
-
-# Extensions for a typical CA
-
-
-# PKIX recommendation.
-
-subjectKeyIdentifier=hash
-
-authorityKeyIdentifier=keyid:always,issuer:always
-
-# This is what PKIX recommends but some broken software chokes on critical
-# extensions.
-#basicConstraints = critical,CA:true
-# So we do this instead.
-basicConstraints = CA:true
-
-# Key usage: this is typical for a CA certificate. However since it will
-# prevent it being used as an test self-signed certificate it is best
-# left out by default.
-# keyUsage = cRLSign, keyCertSign
-
-# Some might want this also
-# nsCertType = sslCA, emailCA
-
-# Include email address in subject alt name: another PKIX recommendation
-# subjectAltName=email:copy
-# Copy issuer details
-# issuerAltName=issuer:copy
-
-# DER hex encoding of an extension: beware experts only!
-# obj=DER:02:03
-# Where 'obj' is a standard or added object
-# You can even override a supported extension:
-# basicConstraints= critical, DER:30:03:01:01:FF
-
-[ crl_ext ]
-
-# CRL extensions.
-# Only issuerAltName and authorityKeyIdentifier make any sense in a CRL.
-
-# issuerAltName=issuer:copy
-authorityKeyIdentifier=keyid:always,issuer:always
-
-[ proxy_cert_ext ]
-# These extensions should be added when creating a proxy certificate
-
-# This goes against PKIX guidelines but some CAs do it and some software
-# requires this to avoid interpreting an end user certificate as a CA.
-
-basicConstraints=CA:FALSE
-
-# Here are some examples of the usage of nsCertType. If it is omitted
-# the certificate can be used for anything *except* object signing.
-
-# This is OK for an SSL server.
-# nsCertType                   = server
-
-# For an object signing certificate this would be used.
-# nsCertType = objsign
-
-# For normal client use this is typical
-# nsCertType = client, email
-
-# and for everything including object signing:
-# nsCertType = client, email, objsign
-
-# This is typical in keyUsage for a client certificate.
-# keyUsage = nonRepudiation, digitalSignature, keyEncipherment
-
-# This will be displayed in Netscape's comment listbox.
-nsComment                      = "OpenSSL Generated Certificate"
-
-# PKIX recommendations harmless if included in all certificates.
-subjectKeyIdentifier=hash
-authorityKeyIdentifier=keyid,issuer:always
-
-# This stuff is for subjectAltName and issuerAltname.
-# Import the email address.
-# subjectAltName=email:copy
-# An alternative to produce certificates that aren't
-# deprecated according to PKIX.
-# subjectAltName=email:move
-
-# Copy subject details
-# issuerAltName=issuer:copy
-
-#nsCaRevocationUrl             = http://www.domain.dom/ca-crl.pem
-#nsBaseUrl
-#nsRevocationUrl
-#nsRenewalUrl
-#nsCaPolicyUrl
-#nsSslServerName
-
-# This really needs to be in place for it to be a proxy certificate.
-proxyCertInfo=critical,language:id-ppl-anyLanguage,pathlen:3,policy:foo
diff --git a/tests/cert-svc/data/TestData/ssl/cert_chain/configs/config_chain8.cnf b/tests/cert-svc/data/TestData/ssl/cert_chain/configs/config_chain8.cnf
deleted file mode 100644 (file)
index d341cdd..0000000
+++ /dev/null
@@ -1,313 +0,0 @@
-#
-# OpenSSL example configuration file.
-# This is mostly being used for generation of certificate requests.
-#
-
-# This definition stops the following lines choking if HOME isn't
-# defined.
-HOME                   = .
-RANDFILE               = $ENV::HOME/.rnd
-
-# Extra OBJECT IDENTIFIER info:
-#oid_file              = $ENV::HOME/.oid
-oid_section            = new_oids
-
-# To use this configuration file with the "-extfile" option of the
-# "openssl x509" utility, name here the section containing the
-# X.509v3 extensions to use:
-# extensions           = 
-# (Alternatively, use a configuration file that has only
-# X.509v3 extensions in its main [= default] section.)
-
-[ new_oids ]
-
-# We can add new OIDs in here for use by 'ca' and 'req'.
-# Add a simple OID like this:
-# testoid1=1.2.3.4
-# Or use config file substitution like this:
-# testoid2=${testoid1}.5.6
-
-####################################################################
-[ ca ]
-default_ca     = CA_default            # The default ca section
-
-####################################################################
-[ CA_default ]
-
-dir            = ./cert_chain          # Where everything is kept
-certs          = $dir/certs            # Where the issued certs are kept
-crl_dir                = $dir/crl              # Where the issued crl are kept
-database       = $dir/index.txt        # database index file.
-#unique_subject        = no                    # Set to 'no' to allow creation of
-                                       # several ctificates with same subject.
-new_certs_dir  = $dir/newcerts         # default place for new certs.
-
-certificate    = $dir/cert_chain7.crt  # The CA certificate
-serial         = $dir/serial           # The current serial number
-crlnumber      = $dir/crlnumber        # the current crl number
-                                       # must be commented out to leave a V1 CRL
-crl            = $dir/crl.pem          # The current CRL
-private_key    = $dir/private/cert_chain7.pem # The private key
-RANDFILE       = $dir/private/.rand    # private random number file
-
-x509_extensions        = usr_cert              # The extentions to add to the cert
-
-# Comment out the following two lines for the "traditional"
-# (and highly broken) format.
-name_opt       = ca_default            # Subject Name options
-cert_opt       = ca_default            # Certificate field options
-
-# Extension copying option: use with caution.
-# copy_extensions = copy
-
-# Extensions to add to a CRL. Note: Netscape communicator chokes on V2 CRLs
-# so this is commented out by default to leave a V1 CRL.
-# crlnumber must also be commented out to leave a V1 CRL.
-# crl_extensions       = crl_ext
-
-default_days   = 365                   # how long to certify for
-default_crl_days= 30                   # how long before next CRL
-default_md     = sha1                  # which md to use.
-preserve       = no                    # keep passed DN ordering
-
-# A few difference way of specifying how similar the request should look
-# For type CA, the listed attributes must be the same, and the optional
-# and supplied fields are just that :-)
-policy         = policy_match
-
-# For the CA policy
-[ policy_match ]
-countryName            = match
-stateOrProvinceName    = match
-organizationName       = match
-organizationalUnitName = optional
-commonName             = supplied
-emailAddress           = optional
-
-# For the 'anything' policy
-# At this point in time, you must list all acceptable 'object'
-# types.
-[ policy_anything ]
-countryName            = optional
-stateOrProvinceName    = optional
-localityName           = optional
-organizationName       = optional
-organizationalUnitName = optional
-commonName             = supplied
-emailAddress           = optional
-
-####################################################################
-[ req ]
-default_bits           = 1024
-default_keyfile        = privkey.pem
-distinguished_name     = req_distinguished_name
-attributes             = req_attributes
-x509_extensions        = v3_ca # The extentions to add to the self signed cert
-
-# Passwords for private keys if not present they will be prompted for
-# input_password = secret
-# output_password = secret
-
-# This sets a mask for permitted string types. There are several options. 
-# default: PrintableString, T61String, BMPString.
-# pkix  : PrintableString, BMPString.
-# utf8only: only UTF8Strings.
-# nombstr : PrintableString, T61String (no BMPStrings or UTF8Strings).
-# MASK:XXXX a literal mask value.
-# WARNING: current versions of Netscape crash on BMPStrings or UTF8Strings
-# so use this option with caution!
-string_mask = nombstr
-
-# req_extensions = v3_req # The extensions to add to a certificate request
-
-[ req_distinguished_name ]
-countryName                    = Country Name (2 letter code)
-countryName_default            = AU
-countryName_min                        = 2
-countryName_max                        = 2
-
-stateOrProvinceName            = State or Province Name (full name)
-stateOrProvinceName_default    = Some-State
-
-localityName                   = Locality Name (eg, city)
-
-0.organizationName             = Organization Name (eg, company)
-0.organizationName_default     = Internet Widgits Pty Ltd
-
-# we can do this but it is not needed normally :-)
-#1.organizationName            = Second Organization Name (eg, company)
-#1.organizationName_default    = World Wide Web Pty Ltd
-
-organizationalUnitName         = Organizational Unit Name (eg, section)
-#organizationalUnitName_default        =
-
-commonName                     = Common Name (eg, YOUR name)
-commonName_max                 = 64
-
-emailAddress                   = Email Address
-emailAddress_max               = 64
-
-# SET-ex3                      = SET extension number 3
-
-[ req_attributes ]
-challengePassword              = A challenge password
-challengePassword_min          = 4
-challengePassword_max          = 20
-
-unstructuredName               = An optional company name
-
-[ usr_cert ]
-
-# These extensions are added when 'ca' signs a request.
-
-# This goes against PKIX guidelines but some CAs do it and some software
-# requires this to avoid interpreting an end user certificate as a CA.
-
-basicConstraints=CA:FALSE
-
-# Here are some examples of the usage of nsCertType. If it is omitted
-# the certificate can be used for anything *except* object signing.
-
-# This is OK for an SSL server.
-# nsCertType                   = server
-
-# For an object signing certificate this would be used.
-# nsCertType = objsign
-
-# For normal client use this is typical
-# nsCertType = client, email
-
-# and for everything including object signing:
-# nsCertType = client, email, objsign
-
-# This is typical in keyUsage for a client certificate.
-# keyUsage = nonRepudiation, digitalSignature, keyEncipherment
-
-# This will be displayed in Netscape's comment listbox.
-nsComment                      = "OpenSSL Generated Certificate"
-
-# PKIX recommendations harmless if included in all certificates.
-subjectKeyIdentifier=hash
-authorityKeyIdentifier=keyid,issuer
-
-# This stuff is for subjectAltName and issuerAltname.
-# Import the email address.
-# subjectAltName=email:copy
-# An alternative to produce certificates that aren't
-# deprecated according to PKIX.
-# subjectAltName=email:move
-
-# Copy subject details
-# issuerAltName=issuer:copy
-
-#nsCaRevocationUrl             = http://www.domain.dom/ca-crl.pem
-#nsBaseUrl
-#nsRevocationUrl
-#nsRenewalUrl
-#nsCaPolicyUrl
-#nsSslServerName
-
-[ v3_req ]
-
-# Extensions to add to a certificate request
-
-basicConstraints = CA:FALSE
-keyUsage = nonRepudiation, digitalSignature, keyEncipherment
-
-[ v3_ca ]
-
-
-# Extensions for a typical CA
-
-
-# PKIX recommendation.
-
-subjectKeyIdentifier=hash
-
-authorityKeyIdentifier=keyid:always,issuer:always
-
-# This is what PKIX recommends but some broken software chokes on critical
-# extensions.
-#basicConstraints = critical,CA:true
-# So we do this instead.
-basicConstraints = CA:true
-
-# Key usage: this is typical for a CA certificate. However since it will
-# prevent it being used as an test self-signed certificate it is best
-# left out by default.
-# keyUsage = cRLSign, keyCertSign
-
-# Some might want this also
-# nsCertType = sslCA, emailCA
-
-# Include email address in subject alt name: another PKIX recommendation
-# subjectAltName=email:copy
-# Copy issuer details
-# issuerAltName=issuer:copy
-
-# DER hex encoding of an extension: beware experts only!
-# obj=DER:02:03
-# Where 'obj' is a standard or added object
-# You can even override a supported extension:
-# basicConstraints= critical, DER:30:03:01:01:FF
-
-[ crl_ext ]
-
-# CRL extensions.
-# Only issuerAltName and authorityKeyIdentifier make any sense in a CRL.
-
-# issuerAltName=issuer:copy
-authorityKeyIdentifier=keyid:always,issuer:always
-
-[ proxy_cert_ext ]
-# These extensions should be added when creating a proxy certificate
-
-# This goes against PKIX guidelines but some CAs do it and some software
-# requires this to avoid interpreting an end user certificate as a CA.
-
-basicConstraints=CA:FALSE
-
-# Here are some examples of the usage of nsCertType. If it is omitted
-# the certificate can be used for anything *except* object signing.
-
-# This is OK for an SSL server.
-# nsCertType                   = server
-
-# For an object signing certificate this would be used.
-# nsCertType = objsign
-
-# For normal client use this is typical
-# nsCertType = client, email
-
-# and for everything including object signing:
-# nsCertType = client, email, objsign
-
-# This is typical in keyUsage for a client certificate.
-# keyUsage = nonRepudiation, digitalSignature, keyEncipherment
-
-# This will be displayed in Netscape's comment listbox.
-nsComment                      = "OpenSSL Generated Certificate"
-
-# PKIX recommendations harmless if included in all certificates.
-subjectKeyIdentifier=hash
-authorityKeyIdentifier=keyid,issuer:always
-
-# This stuff is for subjectAltName and issuerAltname.
-# Import the email address.
-# subjectAltName=email:copy
-# An alternative to produce certificates that aren't
-# deprecated according to PKIX.
-# subjectAltName=email:move
-
-# Copy subject details
-# issuerAltName=issuer:copy
-
-#nsCaRevocationUrl             = http://www.domain.dom/ca-crl.pem
-#nsBaseUrl
-#nsRevocationUrl
-#nsRenewalUrl
-#nsCaPolicyUrl
-#nsSslServerName
-
-# This really needs to be in place for it to be a proxy certificate.
-proxyCertInfo=critical,language:id-ppl-anyLanguage,pathlen:3,policy:foo
diff --git a/tests/cert-svc/data/TestData/ssl/cert_chain/configs/config_chain9.cnf b/tests/cert-svc/data/TestData/ssl/cert_chain/configs/config_chain9.cnf
deleted file mode 100644 (file)
index 920d692..0000000
+++ /dev/null
@@ -1,313 +0,0 @@
-#
-# OpenSSL example configuration file.
-# This is mostly being used for generation of certificate requests.
-#
-
-# This definition stops the following lines choking if HOME isn't
-# defined.
-HOME                   = .
-RANDFILE               = $ENV::HOME/.rnd
-
-# Extra OBJECT IDENTIFIER info:
-#oid_file              = $ENV::HOME/.oid
-oid_section            = new_oids
-
-# To use this configuration file with the "-extfile" option of the
-# "openssl x509" utility, name here the section containing the
-# X.509v3 extensions to use:
-# extensions           = 
-# (Alternatively, use a configuration file that has only
-# X.509v3 extensions in its main [= default] section.)
-
-[ new_oids ]
-
-# We can add new OIDs in here for use by 'ca' and 'req'.
-# Add a simple OID like this:
-# testoid1=1.2.3.4
-# Or use config file substitution like this:
-# testoid2=${testoid1}.5.6
-
-####################################################################
-[ ca ]
-default_ca     = CA_default            # The default ca section
-
-####################################################################
-[ CA_default ]
-
-dir            = ./cert_chain          # Where everything is kept
-certs          = $dir/certs            # Where the issued certs are kept
-crl_dir                = $dir/crl              # Where the issued crl are kept
-database       = $dir/index.txt        # database index file.
-#unique_subject        = no                    # Set to 'no' to allow creation of
-                                       # several ctificates with same subject.
-new_certs_dir  = $dir/newcerts         # default place for new certs.
-
-certificate    = $dir/cert_chain8.crt # The CA certificate
-serial         = $dir/serial           # The current serial number
-crlnumber      = $dir/crlnumber        # the current crl number
-                                       # must be commented out to leave a V1 CRL
-crl            = $dir/crl.pem          # The current CRL
-private_key    = $dir/private/cert_chain8.pem # The private key
-RANDFILE       = $dir/private/.rand    # private random number file
-
-x509_extensions        = usr_cert              # The extentions to add to the cert
-
-# Comment out the following two lines for the "traditional"
-# (and highly broken) format.
-name_opt       = ca_default            # Subject Name options
-cert_opt       = ca_default            # Certificate field options
-
-# Extension copying option: use with caution.
-# copy_extensions = copy
-
-# Extensions to add to a CRL. Note: Netscape communicator chokes on V2 CRLs
-# so this is commented out by default to leave a V1 CRL.
-# crlnumber must also be commented out to leave a V1 CRL.
-# crl_extensions       = crl_ext
-
-default_days   = 365                   # how long to certify for
-default_crl_days= 30                   # how long before next CRL
-default_md     = sha1                  # which md to use.
-preserve       = no                    # keep passed DN ordering
-
-# A few difference way of specifying how similar the request should look
-# For type CA, the listed attributes must be the same, and the optional
-# and supplied fields are just that :-)
-policy         = policy_match
-
-# For the CA policy
-[ policy_match ]
-countryName            = match
-stateOrProvinceName    = match
-organizationName       = match
-organizationalUnitName = optional
-commonName             = supplied
-emailAddress           = optional
-
-# For the 'anything' policy
-# At this point in time, you must list all acceptable 'object'
-# types.
-[ policy_anything ]
-countryName            = optional
-stateOrProvinceName    = optional
-localityName           = optional
-organizationName       = optional
-organizationalUnitName = optional
-commonName             = supplied
-emailAddress           = optional
-
-####################################################################
-[ req ]
-default_bits           = 1024
-default_keyfile        = privkey.pem
-distinguished_name     = req_distinguished_name
-attributes             = req_attributes
-x509_extensions        = v3_ca # The extentions to add to the self signed cert
-
-# Passwords for private keys if not present they will be prompted for
-# input_password = secret
-# output_password = secret
-
-# This sets a mask for permitted string types. There are several options. 
-# default: PrintableString, T61String, BMPString.
-# pkix  : PrintableString, BMPString.
-# utf8only: only UTF8Strings.
-# nombstr : PrintableString, T61String (no BMPStrings or UTF8Strings).
-# MASK:XXXX a literal mask value.
-# WARNING: current versions of Netscape crash on BMPStrings or UTF8Strings
-# so use this option with caution!
-string_mask = nombstr
-
-# req_extensions = v3_req # The extensions to add to a certificate request
-
-[ req_distinguished_name ]
-countryName                    = Country Name (2 letter code)
-countryName_default            = AU
-countryName_min                        = 2
-countryName_max                        = 2
-
-stateOrProvinceName            = State or Province Name (full name)
-stateOrProvinceName_default    = Some-State
-
-localityName                   = Locality Name (eg, city)
-
-0.organizationName             = Organization Name (eg, company)
-0.organizationName_default     = Internet Widgits Pty Ltd
-
-# we can do this but it is not needed normally :-)
-#1.organizationName            = Second Organization Name (eg, company)
-#1.organizationName_default    = World Wide Web Pty Ltd
-
-organizationalUnitName         = Organizational Unit Name (eg, section)
-#organizationalUnitName_default        =
-
-commonName                     = Common Name (eg, YOUR name)
-commonName_max                 = 64
-
-emailAddress                   = Email Address
-emailAddress_max               = 64
-
-# SET-ex3                      = SET extension number 3
-
-[ req_attributes ]
-challengePassword              = A challenge password
-challengePassword_min          = 4
-challengePassword_max          = 20
-
-unstructuredName               = An optional company name
-
-[ usr_cert ]
-
-# These extensions are added when 'ca' signs a request.
-
-# This goes against PKIX guidelines but some CAs do it and some software
-# requires this to avoid interpreting an end user certificate as a CA.
-
-basicConstraints=CA:FALSE
-
-# Here are some examples of the usage of nsCertType. If it is omitted
-# the certificate can be used for anything *except* object signing.
-
-# This is OK for an SSL server.
-# nsCertType                   = server
-
-# For an object signing certificate this would be used.
-# nsCertType = objsign
-
-# For normal client use this is typical
-# nsCertType = client, email
-
-# and for everything including object signing:
-# nsCertType = client, email, objsign
-
-# This is typical in keyUsage for a client certificate.
-# keyUsage = nonRepudiation, digitalSignature, keyEncipherment
-
-# This will be displayed in Netscape's comment listbox.
-nsComment                      = "OpenSSL Generated Certificate"
-
-# PKIX recommendations harmless if included in all certificates.
-subjectKeyIdentifier=hash
-authorityKeyIdentifier=keyid,issuer
-
-# This stuff is for subjectAltName and issuerAltname.
-# Import the email address.
-# subjectAltName=email:copy
-# An alternative to produce certificates that aren't
-# deprecated according to PKIX.
-# subjectAltName=email:move
-
-# Copy subject details
-# issuerAltName=issuer:copy
-
-#nsCaRevocationUrl             = http://www.domain.dom/ca-crl.pem
-#nsBaseUrl
-#nsRevocationUrl
-#nsRenewalUrl
-#nsCaPolicyUrl
-#nsSslServerName
-
-[ v3_req ]
-
-# Extensions to add to a certificate request
-
-basicConstraints = CA:FALSE
-keyUsage = nonRepudiation, digitalSignature, keyEncipherment
-
-[ v3_ca ]
-
-
-# Extensions for a typical CA
-
-
-# PKIX recommendation.
-
-subjectKeyIdentifier=hash
-
-authorityKeyIdentifier=keyid:always,issuer:always
-
-# This is what PKIX recommends but some broken software chokes on critical
-# extensions.
-#basicConstraints = critical,CA:true
-# So we do this instead.
-basicConstraints = CA:true
-
-# Key usage: this is typical for a CA certificate. However since it will
-# prevent it being used as an test self-signed certificate it is best
-# left out by default.
-# keyUsage = cRLSign, keyCertSign
-
-# Some might want this also
-# nsCertType = sslCA, emailCA
-
-# Include email address in subject alt name: another PKIX recommendation
-# subjectAltName=email:copy
-# Copy issuer details
-# issuerAltName=issuer:copy
-
-# DER hex encoding of an extension: beware experts only!
-# obj=DER:02:03
-# Where 'obj' is a standard or added object
-# You can even override a supported extension:
-# basicConstraints= critical, DER:30:03:01:01:FF
-
-[ crl_ext ]
-
-# CRL extensions.
-# Only issuerAltName and authorityKeyIdentifier make any sense in a CRL.
-
-# issuerAltName=issuer:copy
-authorityKeyIdentifier=keyid:always,issuer:always
-
-[ proxy_cert_ext ]
-# These extensions should be added when creating a proxy certificate
-
-# This goes against PKIX guidelines but some CAs do it and some software
-# requires this to avoid interpreting an end user certificate as a CA.
-
-basicConstraints=CA:FALSE
-
-# Here are some examples of the usage of nsCertType. If it is omitted
-# the certificate can be used for anything *except* object signing.
-
-# This is OK for an SSL server.
-# nsCertType                   = server
-
-# For an object signing certificate this would be used.
-# nsCertType = objsign
-
-# For normal client use this is typical
-# nsCertType = client, email
-
-# and for everything including object signing:
-# nsCertType = client, email, objsign
-
-# This is typical in keyUsage for a client certificate.
-# keyUsage = nonRepudiation, digitalSignature, keyEncipherment
-
-# This will be displayed in Netscape's comment listbox.
-nsComment                      = "OpenSSL Generated Certificate"
-
-# PKIX recommendations harmless if included in all certificates.
-subjectKeyIdentifier=hash
-authorityKeyIdentifier=keyid,issuer:always
-
-# This stuff is for subjectAltName and issuerAltname.
-# Import the email address.
-# subjectAltName=email:copy
-# An alternative to produce certificates that aren't
-# deprecated according to PKIX.
-# subjectAltName=email:move
-
-# Copy subject details
-# issuerAltName=issuer:copy
-
-#nsCaRevocationUrl             = http://www.domain.dom/ca-crl.pem
-#nsBaseUrl
-#nsRevocationUrl
-#nsRenewalUrl
-#nsCaPolicyUrl
-#nsSslServerName
-
-# This really needs to be in place for it to be a proxy certificate.
-proxyCertInfo=critical,language:id-ppl-anyLanguage,pathlen:3,policy:foo
diff --git a/tests/cert-svc/data/TestData/ssl/cert_chain/configs/config_chain_no_aia1.cnf b/tests/cert-svc/data/TestData/ssl/cert_chain/configs/config_chain_no_aia1.cnf
deleted file mode 100644 (file)
index 9e59020..0000000
+++ /dev/null
@@ -1,313 +0,0 @@
-#
-# OpenSSL example configuration file.
-# This is mostly being used for generation of certificate requests.
-#
-
-# This definition stops the following lines choking if HOME isn't
-# defined.
-HOME                   = .
-RANDFILE               = $ENV::HOME/.rnd
-
-# Extra OBJECT IDENTIFIER info:
-#oid_file              = $ENV::HOME/.oid
-oid_section            = new_oids
-
-# To use this configuration file with the "-extfile" option of the
-# "openssl x509" utility, name here the section containing the
-# X.509v3 extensions to use:
-# extensions           = 
-# (Alternatively, use a configuration file that has only
-# X.509v3 extensions in its main [= default] section.)
-
-[ new_oids ]
-
-# We can add new OIDs in here for use by 'ca' and 'req'.
-# Add a simple OID like this:
-# testoid1=1.2.3.4
-# Or use config file substitution like this:
-# testoid2=${testoid1}.5.6
-
-####################################################################
-[ ca ]
-default_ca     = CA_default            # The default ca section
-
-####################################################################
-[ CA_default ]
-
-dir            = ./demoCA              # Where everything is kept
-certs          = $dir/certs            # Where the issued certs are kept
-crl_dir                = $dir/crl              # Where the issued crl are kept
-database       = $dir/index.txt        # database index file.
-#unique_subject        = no                    # Set to 'no' to allow creation of
-                                       # several ctificates with same subject.
-new_certs_dir  = $dir/newcerts         # default place for new certs.
-
-certificate    = $dir/cacert.pem       # The CA certificate
-serial         = $dir/serial           # The current serial number
-crlnumber      = $dir/crlnumber        # the current crl number
-                                       # must be commented out to leave a V1 CRL
-crl            = $dir/crl.pem          # The current CRL
-private_key    = $dir/private/cakey.pem# The private key
-RANDFILE       = $dir/private/.rand    # private random number file
-
-x509_extensions        = usr_cert              # The extentions to add to the cert
-
-# Comment out the following two lines for the "traditional"
-# (and highly broken) format.
-name_opt       = ca_default            # Subject Name options
-cert_opt       = ca_default            # Certificate field options
-
-# Extension copying option: use with caution.
-# copy_extensions = copy
-
-# Extensions to add to a CRL. Note: Netscape communicator chokes on V2 CRLs
-# so this is commented out by default to leave a V1 CRL.
-# crlnumber must also be commented out to leave a V1 CRL.
-# crl_extensions       = crl_ext
-
-default_days   = 365                   # how long to certify for
-default_crl_days= 30                   # how long before next CRL
-default_md     = sha1                  # which md to use.
-preserve       = no                    # keep passed DN ordering
-
-# A few difference way of specifying how similar the request should look
-# For type CA, the listed attributes must be the same, and the optional
-# and supplied fields are just that :-)
-policy         = policy_match
-
-# For the CA policy
-[ policy_match ]
-countryName            = match
-stateOrProvinceName    = match
-organizationName       = match
-organizationalUnitName = optional
-commonName             = supplied
-emailAddress           = optional
-
-# For the 'anything' policy
-# At this point in time, you must list all acceptable 'object'
-# types.
-[ policy_anything ]
-countryName            = optional
-stateOrProvinceName    = optional
-localityName           = optional
-organizationName       = optional
-organizationalUnitName = optional
-commonName             = supplied
-emailAddress           = optional
-
-####################################################################
-[ req ]
-default_bits           = 1024
-default_keyfile        = privkey.pem
-distinguished_name     = req_distinguished_name
-attributes             = req_attributes
-x509_extensions        = v3_ca # The extentions to add to the self signed cert
-
-# Passwords for private keys if not present they will be prompted for
-# input_password = secret
-# output_password = secret
-
-# This sets a mask for permitted string types. There are several options. 
-# default: PrintableString, T61String, BMPString.
-# pkix  : PrintableString, BMPString.
-# utf8only: only UTF8Strings.
-# nombstr : PrintableString, T61String (no BMPStrings or UTF8Strings).
-# MASK:XXXX a literal mask value.
-# WARNING: current versions of Netscape crash on BMPStrings or UTF8Strings
-# so use this option with caution!
-string_mask = nombstr
-
-# req_extensions = v3_req # The extensions to add to a certificate request
-
-[ req_distinguished_name ]
-countryName                    = Country Name (2 letter code)
-countryName_default            = AU
-countryName_min                        = 2
-countryName_max                        = 2
-
-stateOrProvinceName            = State or Province Name (full name)
-stateOrProvinceName_default    = Some-State
-
-localityName                   = Locality Name (eg, city)
-
-0.organizationName             = Organization Name (eg, company)
-0.organizationName_default     = Internet Widgits Pty Ltd
-
-# we can do this but it is not needed normally :-)
-#1.organizationName            = Second Organization Name (eg, company)
-#1.organizationName_default    = World Wide Web Pty Ltd
-
-organizationalUnitName         = Organizational Unit Name (eg, section)
-#organizationalUnitName_default        =
-
-commonName                     = Common Name (eg, YOUR name)
-commonName_max                 = 64
-
-emailAddress                   = Email Address
-emailAddress_max               = 64
-
-# SET-ex3                      = SET extension number 3
-
-[ req_attributes ]
-challengePassword              = A challenge password
-challengePassword_min          = 4
-challengePassword_max          = 20
-
-unstructuredName               = An optional company name
-
-[ usr_cert ]
-
-# These extensions are added when 'ca' signs a request.
-
-# This goes against PKIX guidelines but some CAs do it and some software
-# requires this to avoid interpreting an end user certificate as a CA.
-
-basicConstraints=CA:FALSE
-
-# Here are some examples of the usage of nsCertType. If it is omitted
-# the certificate can be used for anything *except* object signing.
-
-# This is OK for an SSL server.
-# nsCertType                   = server
-
-# For an object signing certificate this would be used.
-# nsCertType = objsign
-
-# For normal client use this is typical
-# nsCertType = client, email
-
-# and for everything including object signing:
-# nsCertType = client, email, objsign
-
-# This is typical in keyUsage for a client certificate.
-# keyUsage = nonRepudiation, digitalSignature, keyEncipherment
-
-# This will be displayed in Netscape's comment listbox.
-nsComment                      = "OpenSSL Generated Certificate"
-
-# PKIX recommendations harmless if included in all certificates.
-subjectKeyIdentifier=hash
-authorityKeyIdentifier=keyid,issuer
-
-# This stuff is for subjectAltName and issuerAltname.
-# Import the email address.
-# subjectAltName=email:copy
-# An alternative to produce certificates that aren't
-# deprecated according to PKIX.
-# subjectAltName=email:move
-
-# Copy subject details
-# issuerAltName=issuer:copy
-
-#nsCaRevocationUrl             = http://www.domain.dom/ca-crl.pem
-#nsBaseUrl
-#nsRevocationUrl
-#nsRenewalUrl
-#nsCaPolicyUrl
-#nsSslServerName
-
-[ v3_req ]
-
-# Extensions to add to a certificate request
-
-basicConstraints = CA:FALSE
-keyUsage = nonRepudiation, digitalSignature, keyEncipherment
-
-[ v3_ca ]
-
-
-# Extensions for a typical CA
-
-
-# PKIX recommendation.
-
-subjectKeyIdentifier=hash
-
-authorityKeyIdentifier=keyid:always,issuer:always
-
-# This is what PKIX recommends but some broken software chokes on critical
-# extensions.
-#basicConstraints = critical,CA:true
-# So we do this instead.
-basicConstraints = CA:true
-
-# Key usage: this is typical for a CA certificate. However since it will
-# prevent it being used as an test self-signed certificate it is best
-# left out by default.
-# keyUsage = cRLSign, keyCertSign
-
-# Some might want this also
-# nsCertType = sslCA, emailCA
-
-# Include email address in subject alt name: another PKIX recommendation
-# subjectAltName=email:copy
-# Copy issuer details
-# issuerAltName=issuer:copy
-
-# DER hex encoding of an extension: beware experts only!
-# obj=DER:02:03
-# Where 'obj' is a standard or added object
-# You can even override a supported extension:
-# basicConstraints= critical, DER:30:03:01:01:FF
-
-[ crl_ext ]
-
-# CRL extensions.
-# Only issuerAltName and authorityKeyIdentifier make any sense in a CRL.
-
-# issuerAltName=issuer:copy
-authorityKeyIdentifier=keyid:always,issuer:always
-
-[ proxy_cert_ext ]
-# These extensions should be added when creating a proxy certificate
-
-# This goes against PKIX guidelines but some CAs do it and some software
-# requires this to avoid interpreting an end user certificate as a CA.
-
-basicConstraints=CA:FALSE
-
-# Here are some examples of the usage of nsCertType. If it is omitted
-# the certificate can be used for anything *except* object signing.
-
-# This is OK for an SSL server.
-# nsCertType                   = server
-
-# For an object signing certificate this would be used.
-# nsCertType = objsign
-
-# For normal client use this is typical
-# nsCertType = client, email
-
-# and for everything including object signing:
-# nsCertType = client, email, objsign
-
-# This is typical in keyUsage for a client certificate.
-# keyUsage = nonRepudiation, digitalSignature, keyEncipherment
-
-# This will be displayed in Netscape's comment listbox.
-nsComment                      = "OpenSSL Generated Certificate"
-
-# PKIX recommendations harmless if included in all certificates.
-subjectKeyIdentifier=hash
-authorityKeyIdentifier=keyid,issuer:always
-
-# This stuff is for subjectAltName and issuerAltname.
-# Import the email address.
-# subjectAltName=email:copy
-# An alternative to produce certificates that aren't
-# deprecated according to PKIX.
-# subjectAltName=email:move
-
-# Copy subject details
-# issuerAltName=issuer:copy
-
-#nsCaRevocationUrl             = http://www.domain.dom/ca-crl.pem
-#nsBaseUrl
-#nsRevocationUrl
-#nsRenewalUrl
-#nsCaPolicyUrl
-#nsSslServerName
-
-# This really needs to be in place for it to be a proxy certificate.
-proxyCertInfo=critical,language:id-ppl-anyLanguage,pathlen:3,policy:foo
diff --git a/tests/cert-svc/data/TestData/ssl/cert_chain/configs/config_chain_no_aia10.cnf b/tests/cert-svc/data/TestData/ssl/cert_chain/configs/config_chain_no_aia10.cnf
deleted file mode 100644 (file)
index 133d8ca..0000000
+++ /dev/null
@@ -1,313 +0,0 @@
-#
-# OpenSSL example configuration file.
-# This is mostly being used for generation of certificate requests.
-#
-
-# This definition stops the following lines choking if HOME isn't
-# defined.
-HOME                   = .
-RANDFILE               = $ENV::HOME/.rnd
-
-# Extra OBJECT IDENTIFIER info:
-#oid_file              = $ENV::HOME/.oid
-oid_section            = new_oids
-
-# To use this configuration file with the "-extfile" option of the
-# "openssl x509" utility, name here the section containing the
-# X.509v3 extensions to use:
-# extensions           = 
-# (Alternatively, use a configuration file that has only
-# X.509v3 extensions in its main [= default] section.)
-
-[ new_oids ]
-
-# We can add new OIDs in here for use by 'ca' and 'req'.
-# Add a simple OID like this:
-# testoid1=1.2.3.4
-# Or use config file substitution like this:
-# testoid2=${testoid1}.5.6
-
-####################################################################
-[ ca ]
-default_ca     = CA_default            # The default ca section
-
-####################################################################
-[ CA_default ]
-
-dir            = ./cert_chain          # Where everything is kept
-certs          = $dir/certs            # Where the issued certs are kept
-crl_dir                = $dir/crl              # Where the issued crl are kept
-database       = $dir/index.txt        # database index file.
-#unique_subject        = no                    # Set to 'no' to allow creation of
-                                       # several ctificates with same subject.
-new_certs_dir  = $dir/newcerts         # default place for new certs.
-
-certificate    = $dir/cert_chain_no_aia9.crt   # The CA certificate
-serial         = $dir/serial           # The current serial number
-crlnumber      = $dir/crlnumber        # the current crl number
-                                       # must be commented out to leave a V1 CRL
-crl            = $dir/crl.pem          # The current CRL
-private_key    = $dir/private/cert_chain_no_aia9.pem # The private key
-RANDFILE       = $dir/private/.rand    # private random number file
-
-x509_extensions        = usr_cert              # The extentions to add to the cert
-
-# Comment out the following two lines for the "traditional"
-# (and highly broken) format.
-name_opt       = ca_default            # Subject Name options
-cert_opt       = ca_default            # Certificate field options
-
-# Extension copying option: use with caution.
-# copy_extensions = copy
-
-# Extensions to add to a CRL. Note: Netscape communicator chokes on V2 CRLs
-# so this is commented out by default to leave a V1 CRL.
-# crlnumber must also be commented out to leave a V1 CRL.
-# crl_extensions       = crl_ext
-
-default_days   = 365                   # how long to certify for
-default_crl_days= 30                   # how long before next CRL
-default_md     = sha1                  # which md to use.
-preserve       = no                    # keep passed DN ordering
-
-# A few difference way of specifying how similar the request should look
-# For type CA, the listed attributes must be the same, and the optional
-# and supplied fields are just that :-)
-policy         = policy_match
-
-# For the CA policy
-[ policy_match ]
-countryName            = match
-stateOrProvinceName    = match
-organizationName       = match
-organizationalUnitName = optional
-commonName             = supplied
-emailAddress           = optional
-
-# For the 'anything' policy
-# At this point in time, you must list all acceptable 'object'
-# types.
-[ policy_anything ]
-countryName            = optional
-stateOrProvinceName    = optional
-localityName           = optional
-organizationName       = optional
-organizationalUnitName = optional
-commonName             = supplied
-emailAddress           = optional
-
-####################################################################
-[ req ]
-default_bits           = 1024
-default_keyfile        = privkey.pem
-distinguished_name     = req_distinguished_name
-attributes             = req_attributes
-x509_extensions        = v3_ca # The extentions to add to the self signed cert
-
-# Passwords for private keys if not present they will be prompted for
-# input_password = secret
-# output_password = secret
-
-# This sets a mask for permitted string types. There are several options. 
-# default: PrintableString, T61String, BMPString.
-# pkix  : PrintableString, BMPString.
-# utf8only: only UTF8Strings.
-# nombstr : PrintableString, T61String (no BMPStrings or UTF8Strings).
-# MASK:XXXX a literal mask value.
-# WARNING: current versions of Netscape crash on BMPStrings or UTF8Strings
-# so use this option with caution!
-string_mask = nombstr
-
-# req_extensions = v3_req # The extensions to add to a certificate request
-
-[ req_distinguished_name ]
-countryName                    = Country Name (2 letter code)
-countryName_default            = AU
-countryName_min                        = 2
-countryName_max                        = 2
-
-stateOrProvinceName            = State or Province Name (full name)
-stateOrProvinceName_default    = Some-State
-
-localityName                   = Locality Name (eg, city)
-
-0.organizationName             = Organization Name (eg, company)
-0.organizationName_default     = Internet Widgits Pty Ltd
-
-# we can do this but it is not needed normally :-)
-#1.organizationName            = Second Organization Name (eg, company)
-#1.organizationName_default    = World Wide Web Pty Ltd
-
-organizationalUnitName         = Organizational Unit Name (eg, section)
-#organizationalUnitName_default        =
-
-commonName                     = Common Name (eg, YOUR name)
-commonName_max                 = 64
-
-emailAddress                   = Email Address
-emailAddress_max               = 64
-
-# SET-ex3                      = SET extension number 3
-
-[ req_attributes ]
-challengePassword              = A challenge password
-challengePassword_min          = 4
-challengePassword_max          = 20
-
-unstructuredName               = An optional company name
-
-[ usr_cert ]
-
-# These extensions are added when 'ca' signs a request.
-
-# This goes against PKIX guidelines but some CAs do it and some software
-# requires this to avoid interpreting an end user certificate as a CA.
-
-basicConstraints=CA:FALSE
-
-# Here are some examples of the usage of nsCertType. If it is omitted
-# the certificate can be used for anything *except* object signing.
-
-# This is OK for an SSL server.
-# nsCertType                   = server
-
-# For an object signing certificate this would be used.
-# nsCertType = objsign
-
-# For normal client use this is typical
-# nsCertType = client, email
-
-# and for everything including object signing:
-# nsCertType = client, email, objsign
-
-# This is typical in keyUsage for a client certificate.
-# keyUsage = nonRepudiation, digitalSignature, keyEncipherment
-
-# This will be displayed in Netscape's comment listbox.
-nsComment                      = "OpenSSL Generated Certificate"
-
-# PKIX recommendations harmless if included in all certificates.
-subjectKeyIdentifier=hash
-authorityKeyIdentifier=keyid,issuer
-
-# This stuff is for subjectAltName and issuerAltname.
-# Import the email address.
-# subjectAltName=email:copy
-# An alternative to produce certificates that aren't
-# deprecated according to PKIX.
-# subjectAltName=email:move
-
-# Copy subject details
-# issuerAltName=issuer:copy
-
-#nsCaRevocationUrl             = http://www.domain.dom/ca-crl.pem
-#nsBaseUrl
-#nsRevocationUrl
-#nsRenewalUrl
-#nsCaPolicyUrl
-#nsSslServerName
-
-[ v3_req ]
-
-# Extensions to add to a certificate request
-
-basicConstraints = CA:FALSE
-keyUsage = nonRepudiation, digitalSignature, keyEncipherment
-
-[ v3_ca ]
-
-
-# Extensions for a typical CA
-
-
-# PKIX recommendation.
-
-subjectKeyIdentifier=hash
-
-authorityKeyIdentifier=keyid:always,issuer:always
-
-# This is what PKIX recommends but some broken software chokes on critical
-# extensions.
-#basicConstraints = critical,CA:true
-# So we do this instead.
-basicConstraints = CA:true
-
-# Key usage: this is typical for a CA certificate. However since it will
-# prevent it being used as an test self-signed certificate it is best
-# left out by default.
-# keyUsage = cRLSign, keyCertSign
-
-# Some might want this also
-# nsCertType = sslCA, emailCA
-
-# Include email address in subject alt name: another PKIX recommendation
-# subjectAltName=email:copy
-# Copy issuer details
-# issuerAltName=issuer:copy
-
-# DER hex encoding of an extension: beware experts only!
-# obj=DER:02:03
-# Where 'obj' is a standard or added object
-# You can even override a supported extension:
-# basicConstraints= critical, DER:30:03:01:01:FF
-
-[ crl_ext ]
-
-# CRL extensions.
-# Only issuerAltName and authorityKeyIdentifier make any sense in a CRL.
-
-# issuerAltName=issuer:copy
-authorityKeyIdentifier=keyid:always,issuer:always
-
-[ proxy_cert_ext ]
-# These extensions should be added when creating a proxy certificate
-
-# This goes against PKIX guidelines but some CAs do it and some software
-# requires this to avoid interpreting an end user certificate as a CA.
-
-basicConstraints=CA:FALSE
-
-# Here are some examples of the usage of nsCertType. If it is omitted
-# the certificate can be used for anything *except* object signing.
-
-# This is OK for an SSL server.
-# nsCertType                   = server
-
-# For an object signing certificate this would be used.
-# nsCertType = objsign
-
-# For normal client use this is typical
-# nsCertType = client, email
-
-# and for everything including object signing:
-# nsCertType = client, email, objsign
-
-# This is typical in keyUsage for a client certificate.
-# keyUsage = nonRepudiation, digitalSignature, keyEncipherment
-
-# This will be displayed in Netscape's comment listbox.
-nsComment                      = "OpenSSL Generated Certificate"
-
-# PKIX recommendations harmless if included in all certificates.
-subjectKeyIdentifier=hash
-authorityKeyIdentifier=keyid,issuer:always
-
-# This stuff is for subjectAltName and issuerAltname.
-# Import the email address.
-# subjectAltName=email:copy
-# An alternative to produce certificates that aren't
-# deprecated according to PKIX.
-# subjectAltName=email:move
-
-# Copy subject details
-# issuerAltName=issuer:copy
-
-#nsCaRevocationUrl             = http://www.domain.dom/ca-crl.pem
-#nsBaseUrl
-#nsRevocationUrl
-#nsRenewalUrl
-#nsCaPolicyUrl
-#nsSslServerName
-
-# This really needs to be in place for it to be a proxy certificate.
-proxyCertInfo=critical,language:id-ppl-anyLanguage,pathlen:3,policy:foo
diff --git a/tests/cert-svc/data/TestData/ssl/cert_chain/configs/config_chain_no_aia2.cnf b/tests/cert-svc/data/TestData/ssl/cert_chain/configs/config_chain_no_aia2.cnf
deleted file mode 100644 (file)
index 79a5b14..0000000
+++ /dev/null
@@ -1,313 +0,0 @@
-#
-# OpenSSL example configuration file.
-# This is mostly being used for generation of certificate requests.
-#
-
-# This definition stops the following lines choking if HOME isn't
-# defined.
-HOME                   = .
-RANDFILE               = $ENV::HOME/.rnd
-
-# Extra OBJECT IDENTIFIER info:
-#oid_file              = $ENV::HOME/.oid
-oid_section            = new_oids
-
-# To use this configuration file with the "-extfile" option of the
-# "openssl x509" utility, name here the section containing the
-# X.509v3 extensions to use:
-# extensions           = 
-# (Alternatively, use a configuration file that has only
-# X.509v3 extensions in its main [= default] section.)
-
-[ new_oids ]
-
-# We can add new OIDs in here for use by 'ca' and 'req'.
-# Add a simple OID like this:
-# testoid1=1.2.3.4
-# Or use config file substitution like this:
-# testoid2=${testoid1}.5.6
-
-####################################################################
-[ ca ]
-default_ca     = CA_default            # The default ca section
-
-####################################################################
-[ CA_default ]
-
-dir            = ./cert_chain          # Where everything is kept
-certs          = $dir/certs            # Where the issued certs are kept
-crl_dir                = $dir/crl              # Where the issued crl are kept
-database       = $dir/index.txt        # database index file.
-#unique_subject        = no                    # Set to 'no' to allow creation of
-                                       # several ctificates with same subject.
-new_certs_dir  = $dir/newcerts         # default place for new certs.
-
-certificate    = $dir/cert_chain_no_aia1.crt   # The CA certificate
-serial         = $dir/serial           # The current serial number
-crlnumber      = $dir/crlnumber        # the current crl number
-                                       # must be commented out to leave a V1 CRL
-crl            = $dir/crl.pem          # The current CRL
-private_key    = $dir/private/cert_chain_no_aia1.pem # The private key
-RANDFILE       = $dir/private/.rand    # private random number file
-
-x509_extensions        = usr_cert              # The extentions to add to the cert
-
-# Comment out the following two lines for the "traditional"
-# (and highly broken) format.
-name_opt       = ca_default            # Subject Name options
-cert_opt       = ca_default            # Certificate field options
-
-# Extension copying option: use with caution.
-# copy_extensions = copy
-
-# Extensions to add to a CRL. Note: Netscape communicator chokes on V2 CRLs
-# so this is commented out by default to leave a V1 CRL.
-# crlnumber must also be commented out to leave a V1 CRL.
-# crl_extensions       = crl_ext
-
-default_days   = 365                   # how long to certify for
-default_crl_days= 30                   # how long before next CRL
-default_md     = sha1                  # which md to use.
-preserve       = no                    # keep passed DN ordering
-
-# A few difference way of specifying how similar the request should look
-# For type CA, the listed attributes must be the same, and the optional
-# and supplied fields are just that :-)
-policy         = policy_match
-
-# For the CA policy
-[ policy_match ]
-countryName            = match
-stateOrProvinceName    = match
-organizationName       = match
-organizationalUnitName = optional
-commonName             = supplied
-emailAddress           = optional
-
-# For the 'anything' policy
-# At this point in time, you must list all acceptable 'object'
-# types.
-[ policy_anything ]
-countryName            = optional
-stateOrProvinceName    = optional
-localityName           = optional
-organizationName       = optional
-organizationalUnitName = optional
-commonName             = supplied
-emailAddress           = optional
-
-####################################################################
-[ req ]
-default_bits           = 1024
-default_keyfile        = privkey.pem
-distinguished_name     = req_distinguished_name
-attributes             = req_attributes
-x509_extensions        = v3_ca # The extentions to add to the self signed cert
-
-# Passwords for private keys if not present they will be prompted for
-# input_password = secret
-# output_password = secret
-
-# This sets a mask for permitted string types. There are several options. 
-# default: PrintableString, T61String, BMPString.
-# pkix  : PrintableString, BMPString.
-# utf8only: only UTF8Strings.
-# nombstr : PrintableString, T61String (no BMPStrings or UTF8Strings).
-# MASK:XXXX a literal mask value.
-# WARNING: current versions of Netscape crash on BMPStrings or UTF8Strings
-# so use this option with caution!
-string_mask = nombstr
-
-# req_extensions = v3_req # The extensions to add to a certificate request
-
-[ req_distinguished_name ]
-countryName                    = Country Name (2 letter code)
-countryName_default            = AU
-countryName_min                        = 2
-countryName_max                        = 2
-
-stateOrProvinceName            = State or Province Name (full name)
-stateOrProvinceName_default    = Some-State
-
-localityName                   = Locality Name (eg, city)
-
-0.organizationName             = Organization Name (eg, company)
-0.organizationName_default     = Internet Widgits Pty Ltd
-
-# we can do this but it is not needed normally :-)
-#1.organizationName            = Second Organization Name (eg, company)
-#1.organizationName_default    = World Wide Web Pty Ltd
-
-organizationalUnitName         = Organizational Unit Name (eg, section)
-#organizationalUnitName_default        =
-
-commonName                     = Common Name (eg, YOUR name)
-commonName_max                 = 64
-
-emailAddress                   = Email Address
-emailAddress_max               = 64
-
-# SET-ex3                      = SET extension number 3
-
-[ req_attributes ]
-challengePassword              = A challenge password
-challengePassword_min          = 4
-challengePassword_max          = 20
-
-unstructuredName               = An optional company name
-
-[ usr_cert ]
-
-# These extensions are added when 'ca' signs a request.
-
-# This goes against PKIX guidelines but some CAs do it and some software
-# requires this to avoid interpreting an end user certificate as a CA.
-
-basicConstraints=CA:FALSE
-
-# Here are some examples of the usage of nsCertType. If it is omitted
-# the certificate can be used for anything *except* object signing.
-
-# This is OK for an SSL server.
-# nsCertType                   = server
-
-# For an object signing certificate this would be used.
-# nsCertType = objsign
-
-# For normal client use this is typical
-# nsCertType = client, email
-
-# and for everything including object signing:
-# nsCertType = client, email, objsign
-
-# This is typical in keyUsage for a client certificate.
-# keyUsage = nonRepudiation, digitalSignature, keyEncipherment
-
-# This will be displayed in Netscape's comment listbox.
-nsComment                      = "OpenSSL Generated Certificate"
-
-# PKIX recommendations harmless if included in all certificates.
-subjectKeyIdentifier=hash
-authorityKeyIdentifier=keyid,issuer
-
-# This stuff is for subjectAltName and issuerAltname.
-# Import the email address.
-# subjectAltName=email:copy
-# An alternative to produce certificates that aren't
-# deprecated according to PKIX.
-# subjectAltName=email:move
-
-# Copy subject details
-# issuerAltName=issuer:copy
-
-#nsCaRevocationUrl             = http://www.domain.dom/ca-crl.pem
-#nsBaseUrl
-#nsRevocationUrl
-#nsRenewalUrl
-#nsCaPolicyUrl
-#nsSslServerName
-
-[ v3_req ]
-
-# Extensions to add to a certificate request
-
-basicConstraints = CA:FALSE
-keyUsage = nonRepudiation, digitalSignature, keyEncipherment
-
-[ v3_ca ]
-
-
-# Extensions for a typical CA
-
-
-# PKIX recommendation.
-
-subjectKeyIdentifier=hash
-
-authorityKeyIdentifier=keyid:always,issuer:always
-
-# This is what PKIX recommends but some broken software chokes on critical
-# extensions.
-#basicConstraints = critical,CA:true
-# So we do this instead.
-basicConstraints = CA:true
-
-# Key usage: this is typical for a CA certificate. However since it will
-# prevent it being used as an test self-signed certificate it is best
-# left out by default.
-# keyUsage = cRLSign, keyCertSign
-
-# Some might want this also
-# nsCertType = sslCA, emailCA
-
-# Include email address in subject alt name: another PKIX recommendation
-# subjectAltName=email:copy
-# Copy issuer details
-# issuerAltName=issuer:copy
-
-# DER hex encoding of an extension: beware experts only!
-# obj=DER:02:03
-# Where 'obj' is a standard or added object
-# You can even override a supported extension:
-# basicConstraints= critical, DER:30:03:01:01:FF
-
-[ crl_ext ]
-
-# CRL extensions.
-# Only issuerAltName and authorityKeyIdentifier make any sense in a CRL.
-
-# issuerAltName=issuer:copy
-authorityKeyIdentifier=keyid:always,issuer:always
-
-[ proxy_cert_ext ]
-# These extensions should be added when creating a proxy certificate
-
-# This goes against PKIX guidelines but some CAs do it and some software
-# requires this to avoid interpreting an end user certificate as a CA.
-
-basicConstraints=CA:FALSE
-
-# Here are some examples of the usage of nsCertType. If it is omitted
-# the certificate can be used for anything *except* object signing.
-
-# This is OK for an SSL server.
-# nsCertType                   = server
-
-# For an object signing certificate this would be used.
-# nsCertType = objsign
-
-# For normal client use this is typical
-# nsCertType = client, email
-
-# and for everything including object signing:
-# nsCertType = client, email, objsign
-
-# This is typical in keyUsage for a client certificate.
-# keyUsage = nonRepudiation, digitalSignature, keyEncipherment
-
-# This will be displayed in Netscape's comment listbox.
-nsComment                      = "OpenSSL Generated Certificate"
-
-# PKIX recommendations harmless if included in all certificates.
-subjectKeyIdentifier=hash
-authorityKeyIdentifier=keyid,issuer:always
-
-# This stuff is for subjectAltName and issuerAltname.
-# Import the email address.
-# subjectAltName=email:copy
-# An alternative to produce certificates that aren't
-# deprecated according to PKIX.
-# subjectAltName=email:move
-
-# Copy subject details
-# issuerAltName=issuer:copy
-
-#nsCaRevocationUrl             = http://www.domain.dom/ca-crl.pem
-#nsBaseUrl
-#nsRevocationUrl
-#nsRenewalUrl
-#nsCaPolicyUrl
-#nsSslServerName
-
-# This really needs to be in place for it to be a proxy certificate.
-proxyCertInfo=critical,language:id-ppl-anyLanguage,pathlen:3,policy:foo
diff --git a/tests/cert-svc/data/TestData/ssl/cert_chain/configs/config_chain_no_aia3.cnf b/tests/cert-svc/data/TestData/ssl/cert_chain/configs/config_chain_no_aia3.cnf
deleted file mode 100644 (file)
index e66757a..0000000
+++ /dev/null
@@ -1,313 +0,0 @@
-#
-# OpenSSL example configuration file.
-# This is mostly being used for generation of certificate requests.
-#
-
-# This definition stops the following lines choking if HOME isn't
-# defined.
-HOME                   = .
-RANDFILE               = $ENV::HOME/.rnd
-
-# Extra OBJECT IDENTIFIER info:
-#oid_file              = $ENV::HOME/.oid
-oid_section            = new_oids
-
-# To use this configuration file with the "-extfile" option of the
-# "openssl x509" utility, name here the section containing the
-# X.509v3 extensions to use:
-# extensions           = 
-# (Alternatively, use a configuration file that has only
-# X.509v3 extensions in its main [= default] section.)
-
-[ new_oids ]
-
-# We can add new OIDs in here for use by 'ca' and 'req'.
-# Add a simple OID like this:
-# testoid1=1.2.3.4
-# Or use config file substitution like this:
-# testoid2=${testoid1}.5.6
-
-####################################################################
-[ ca ]
-default_ca     = CA_default            # The default ca section
-
-####################################################################
-[ CA_default ]
-
-dir            = ./cert_chain          # Where everything is kept
-certs          = $dir/certs            # Where the issued certs are kept
-crl_dir                = $dir/crl              # Where the issued crl are kept
-database       = $dir/index.txt        # database index file.
-#unique_subject        = no                    # Set to 'no' to allow creation of
-                                       # several ctificates with same subject.
-new_certs_dir  = $dir/newcerts         # default place for new certs.
-
-certificate    = $dir/cert_chain_no_aia2.crt   # The CA certificate
-serial         = $dir/serial           # The current serial number
-crlnumber      = $dir/crlnumber        # the current crl number
-                                       # must be commented out to leave a V1 CRL
-crl            = $dir/crl.pem          # The current CRL
-private_key    = $dir/private/cert_chain_no_aia2.pem # The private key
-RANDFILE       = $dir/private/.rand    # private random number file
-
-x509_extensions        = usr_cert              # The extentions to add to the cert
-
-# Comment out the following two lines for the "traditional"
-# (and highly broken) format.
-name_opt       = ca_default            # Subject Name options
-cert_opt       = ca_default            # Certificate field options
-
-# Extension copying option: use with caution.
-# copy_extensions = copy
-
-# Extensions to add to a CRL. Note: Netscape communicator chokes on V2 CRLs
-# so this is commented out by default to leave a V1 CRL.
-# crlnumber must also be commented out to leave a V1 CRL.
-# crl_extensions       = crl_ext
-
-default_days   = 365                   # how long to certify for
-default_crl_days= 30                   # how long before next CRL
-default_md     = sha1                  # which md to use.
-preserve       = no                    # keep passed DN ordering
-
-# A few difference way of specifying how similar the request should look
-# For type CA, the listed attributes must be the same, and the optional
-# and supplied fields are just that :-)
-policy         = policy_match
-
-# For the CA policy
-[ policy_match ]
-countryName            = match
-stateOrProvinceName    = match
-organizationName       = match
-organizationalUnitName = optional
-commonName             = supplied
-emailAddress           = optional
-
-# For the 'anything' policy
-# At this point in time, you must list all acceptable 'object'
-# types.
-[ policy_anything ]
-countryName            = optional
-stateOrProvinceName    = optional
-localityName           = optional
-organizationName       = optional
-organizationalUnitName = optional
-commonName             = supplied
-emailAddress           = optional
-
-####################################################################
-[ req ]
-default_bits           = 1024
-default_keyfile        = privkey.pem
-distinguished_name     = req_distinguished_name
-attributes             = req_attributes
-x509_extensions        = v3_ca # The extentions to add to the self signed cert
-
-# Passwords for private keys if not present they will be prompted for
-# input_password = secret
-# output_password = secret
-
-# This sets a mask for permitted string types. There are several options. 
-# default: PrintableString, T61String, BMPString.
-# pkix  : PrintableString, BMPString.
-# utf8only: only UTF8Strings.
-# nombstr : PrintableString, T61String (no BMPStrings or UTF8Strings).
-# MASK:XXXX a literal mask value.
-# WARNING: current versions of Netscape crash on BMPStrings or UTF8Strings
-# so use this option with caution!
-string_mask = nombstr
-
-# req_extensions = v3_req # The extensions to add to a certificate request
-
-[ req_distinguished_name ]
-countryName                    = Country Name (2 letter code)
-countryName_default            = AU
-countryName_min                        = 2
-countryName_max                        = 2
-
-stateOrProvinceName            = State or Province Name (full name)
-stateOrProvinceName_default    = Some-State
-
-localityName                   = Locality Name (eg, city)
-
-0.organizationName             = Organization Name (eg, company)
-0.organizationName_default     = Internet Widgits Pty Ltd
-
-# we can do this but it is not needed normally :-)
-#1.organizationName            = Second Organization Name (eg, company)
-#1.organizationName_default    = World Wide Web Pty Ltd
-
-organizationalUnitName         = Organizational Unit Name (eg, section)
-#organizationalUnitName_default        =
-
-commonName                     = Common Name (eg, YOUR name)
-commonName_max                 = 64
-
-emailAddress                   = Email Address
-emailAddress_max               = 64
-
-# SET-ex3                      = SET extension number 3
-
-[ req_attributes ]
-challengePassword              = A challenge password
-challengePassword_min          = 4
-challengePassword_max          = 20
-
-unstructuredName               = An optional company name
-
-[ usr_cert ]
-
-# These extensions are added when 'ca' signs a request.
-
-# This goes against PKIX guidelines but some CAs do it and some software
-# requires this to avoid interpreting an end user certificate as a CA.
-
-basicConstraints=CA:FALSE
-
-# Here are some examples of the usage of nsCertType. If it is omitted
-# the certificate can be used for anything *except* object signing.
-
-# This is OK for an SSL server.
-# nsCertType                   = server
-
-# For an object signing certificate this would be used.
-# nsCertType = objsign
-
-# For normal client use this is typical
-# nsCertType = client, email
-
-# and for everything including object signing:
-# nsCertType = client, email, objsign
-
-# This is typical in keyUsage for a client certificate.
-# keyUsage = nonRepudiation, digitalSignature, keyEncipherment
-
-# This will be displayed in Netscape's comment listbox.
-nsComment                      = "OpenSSL Generated Certificate"
-
-# PKIX recommendations harmless if included in all certificates.
-subjectKeyIdentifier=hash
-authorityKeyIdentifier=keyid,issuer
-
-# This stuff is for subjectAltName and issuerAltname.
-# Import the email address.
-# subjectAltName=email:copy
-# An alternative to produce certificates that aren't
-# deprecated according to PKIX.
-# subjectAltName=email:move
-
-# Copy subject details
-# issuerAltName=issuer:copy
-
-#nsCaRevocationUrl             = http://www.domain.dom/ca-crl.pem
-#nsBaseUrl
-#nsRevocationUrl
-#nsRenewalUrl
-#nsCaPolicyUrl
-#nsSslServerName
-
-[ v3_req ]
-
-# Extensions to add to a certificate request
-
-basicConstraints = CA:FALSE
-keyUsage = nonRepudiation, digitalSignature, keyEncipherment
-
-[ v3_ca ]
-
-
-# Extensions for a typical CA
-
-
-# PKIX recommendation.
-
-subjectKeyIdentifier=hash
-
-authorityKeyIdentifier=keyid:always,issuer:always
-
-# This is what PKIX recommends but some broken software chokes on critical
-# extensions.
-#basicConstraints = critical,CA:true
-# So we do this instead.
-basicConstraints = CA:true
-
-# Key usage: this is typical for a CA certificate. However since it will
-# prevent it being used as an test self-signed certificate it is best
-# left out by default.
-# keyUsage = cRLSign, keyCertSign
-
-# Some might want this also
-# nsCertType = sslCA, emailCA
-
-# Include email address in subject alt name: another PKIX recommendation
-# subjectAltName=email:copy
-# Copy issuer details
-# issuerAltName=issuer:copy
-
-# DER hex encoding of an extension: beware experts only!
-# obj=DER:02:03
-# Where 'obj' is a standard or added object
-# You can even override a supported extension:
-# basicConstraints= critical, DER:30:03:01:01:FF
-
-[ crl_ext ]
-
-# CRL extensions.
-# Only issuerAltName and authorityKeyIdentifier make any sense in a CRL.
-
-# issuerAltName=issuer:copy
-authorityKeyIdentifier=keyid:always,issuer:always
-
-[ proxy_cert_ext ]
-# These extensions should be added when creating a proxy certificate
-
-# This goes against PKIX guidelines but some CAs do it and some software
-# requires this to avoid interpreting an end user certificate as a CA.
-
-basicConstraints=CA:FALSE
-
-# Here are some examples of the usage of nsCertType. If it is omitted
-# the certificate can be used for anything *except* object signing.
-
-# This is OK for an SSL server.
-# nsCertType                   = server
-
-# For an object signing certificate this would be used.
-# nsCertType = objsign
-
-# For normal client use this is typical
-# nsCertType = client, email
-
-# and for everything including object signing:
-# nsCertType = client, email, objsign
-
-# This is typical in keyUsage for a client certificate.
-# keyUsage = nonRepudiation, digitalSignature, keyEncipherment
-
-# This will be displayed in Netscape's comment listbox.
-nsComment                      = "OpenSSL Generated Certificate"
-
-# PKIX recommendations harmless if included in all certificates.
-subjectKeyIdentifier=hash
-authorityKeyIdentifier=keyid,issuer:always
-
-# This stuff is for subjectAltName and issuerAltname.
-# Import the email address.
-# subjectAltName=email:copy
-# An alternative to produce certificates that aren't
-# deprecated according to PKIX.
-# subjectAltName=email:move
-
-# Copy subject details
-# issuerAltName=issuer:copy
-
-#nsCaRevocationUrl             = http://www.domain.dom/ca-crl.pem
-#nsBaseUrl
-#nsRevocationUrl
-#nsRenewalUrl
-#nsCaPolicyUrl
-#nsSslServerName
-
-# This really needs to be in place for it to be a proxy certificate.
-proxyCertInfo=critical,language:id-ppl-anyLanguage,pathlen:3,policy:foo
diff --git a/tests/cert-svc/data/TestData/ssl/cert_chain/configs/config_chain_no_aia4.cnf b/tests/cert-svc/data/TestData/ssl/cert_chain/configs/config_chain_no_aia4.cnf
deleted file mode 100644 (file)
index e7de251..0000000
+++ /dev/null
@@ -1,313 +0,0 @@
-#
-# OpenSSL example configuration file.
-# This is mostly being used for generation of certificate requests.
-#
-
-# This definition stops the following lines choking if HOME isn't
-# defined.
-HOME                   = .
-RANDFILE               = $ENV::HOME/.rnd
-
-# Extra OBJECT IDENTIFIER info:
-#oid_file              = $ENV::HOME/.oid
-oid_section            = new_oids
-
-# To use this configuration file with the "-extfile" option of the
-# "openssl x509" utility, name here the section containing the
-# X.509v3 extensions to use:
-# extensions           = 
-# (Alternatively, use a configuration file that has only
-# X.509v3 extensions in its main [= default] section.)
-
-[ new_oids ]
-
-# We can add new OIDs in here for use by 'ca' and 'req'.
-# Add a simple OID like this:
-# testoid1=1.2.3.4
-# Or use config file substitution like this:
-# testoid2=${testoid1}.5.6
-
-####################################################################
-[ ca ]
-default_ca     = CA_default            # The default ca section
-
-####################################################################
-[ CA_default ]
-
-dir            = ./cert_chain          # Where everything is kept
-certs          = $dir/certs            # Where the issued certs are kept
-crl_dir                = $dir/crl              # Where the issued crl are kept
-database       = $dir/index.txt        # database index file.
-#unique_subject        = no                    # Set to 'no' to allow creation of
-                                       # several ctificates with same subject.
-new_certs_dir  = $dir/newcerts         # default place for new certs.
-
-certificate    = $dir/cert_chain_no_aia3.crt   # The CA certificate
-serial         = $dir/serial           # The current serial number
-crlnumber      = $dir/crlnumber        # the current crl number
-                                       # must be commented out to leave a V1 CRL
-crl            = $dir/crl.pem          # The current CRL
-private_key    = $dir/private/cert_chain_no_aia3.pem # The private key
-RANDFILE       = $dir/private/.rand    # private random number file
-
-x509_extensions        = usr_cert              # The extentions to add to the cert
-
-# Comment out the following two lines for the "traditional"
-# (and highly broken) format.
-name_opt       = ca_default            # Subject Name options
-cert_opt       = ca_default            # Certificate field options
-
-# Extension copying option: use with caution.
-# copy_extensions = copy
-
-# Extensions to add to a CRL. Note: Netscape communicator chokes on V2 CRLs
-# so this is commented out by default to leave a V1 CRL.
-# crlnumber must also be commented out to leave a V1 CRL.
-# crl_extensions       = crl_ext
-
-default_days   = 365                   # how long to certify for
-default_crl_days= 30                   # how long before next CRL
-default_md     = sha1                  # which md to use.
-preserve       = no                    # keep passed DN ordering
-
-# A few difference way of specifying how similar the request should look
-# For type CA, the listed attributes must be the same, and the optional
-# and supplied fields are just that :-)
-policy         = policy_match
-
-# For the CA policy
-[ policy_match ]
-countryName            = match
-stateOrProvinceName    = match
-organizationName       = match
-organizationalUnitName = optional
-commonName             = supplied
-emailAddress           = optional
-
-# For the 'anything' policy
-# At this point in time, you must list all acceptable 'object'
-# types.
-[ policy_anything ]
-countryName            = optional
-stateOrProvinceName    = optional
-localityName           = optional
-organizationName       = optional
-organizationalUnitName = optional
-commonName             = supplied
-emailAddress           = optional
-
-####################################################################
-[ req ]
-default_bits           = 1024
-default_keyfile        = privkey.pem
-distinguished_name     = req_distinguished_name
-attributes             = req_attributes
-x509_extensions        = v3_ca # The extentions to add to the self signed cert
-
-# Passwords for private keys if not present they will be prompted for
-# input_password = secret
-# output_password = secret
-
-# This sets a mask for permitted string types. There are several options. 
-# default: PrintableString, T61String, BMPString.
-# pkix  : PrintableString, BMPString.
-# utf8only: only UTF8Strings.
-# nombstr : PrintableString, T61String (no BMPStrings or UTF8Strings).
-# MASK:XXXX a literal mask value.
-# WARNING: current versions of Netscape crash on BMPStrings or UTF8Strings
-# so use this option with caution!
-string_mask = nombstr
-
-# req_extensions = v3_req # The extensions to add to a certificate request
-
-[ req_distinguished_name ]
-countryName                    = Country Name (2 letter code)
-countryName_default            = AU
-countryName_min                        = 2
-countryName_max                        = 2
-
-stateOrProvinceName            = State or Province Name (full name)
-stateOrProvinceName_default    = Some-State
-
-localityName                   = Locality Name (eg, city)
-
-0.organizationName             = Organization Name (eg, company)
-0.organizationName_default     = Internet Widgits Pty Ltd
-
-# we can do this but it is not needed normally :-)
-#1.organizationName            = Second Organization Name (eg, company)
-#1.organizationName_default    = World Wide Web Pty Ltd
-
-organizationalUnitName         = Organizational Unit Name (eg, section)
-#organizationalUnitName_default        =
-
-commonName                     = Common Name (eg, YOUR name)
-commonName_max                 = 64
-
-emailAddress                   = Email Address
-emailAddress_max               = 64
-
-# SET-ex3                      = SET extension number 3
-
-[ req_attributes ]
-challengePassword              = A challenge password
-challengePassword_min          = 4
-challengePassword_max          = 20
-
-unstructuredName               = An optional company name
-
-[ usr_cert ]
-
-# These extensions are added when 'ca' signs a request.
-
-# This goes against PKIX guidelines but some CAs do it and some software
-# requires this to avoid interpreting an end user certificate as a CA.
-
-basicConstraints=CA:FALSE
-
-# Here are some examples of the usage of nsCertType. If it is omitted
-# the certificate can be used for anything *except* object signing.
-
-# This is OK for an SSL server.
-# nsCertType                   = server
-
-# For an object signing certificate this would be used.
-# nsCertType = objsign
-
-# For normal client use this is typical
-# nsCertType = client, email
-
-# and for everything including object signing:
-# nsCertType = client, email, objsign
-
-# This is typical in keyUsage for a client certificate.
-# keyUsage = nonRepudiation, digitalSignature, keyEncipherment
-
-# This will be displayed in Netscape's comment listbox.
-nsComment                      = "OpenSSL Generated Certificate"
-
-# PKIX recommendations harmless if included in all certificates.
-subjectKeyIdentifier=hash
-authorityKeyIdentifier=keyid,issuer
-
-# This stuff is for subjectAltName and issuerAltname.
-# Import the email address.
-# subjectAltName=email:copy
-# An alternative to produce certificates that aren't
-# deprecated according to PKIX.
-# subjectAltName=email:move
-
-# Copy subject details
-# issuerAltName=issuer:copy
-
-#nsCaRevocationUrl             = http://www.domain.dom/ca-crl.pem
-#nsBaseUrl
-#nsRevocationUrl
-#nsRenewalUrl
-#nsCaPolicyUrl
-#nsSslServerName
-
-[ v3_req ]
-
-# Extensions to add to a certificate request
-
-basicConstraints = CA:FALSE
-keyUsage = nonRepudiation, digitalSignature, keyEncipherment
-
-[ v3_ca ]
-
-
-# Extensions for a typical CA
-
-
-# PKIX recommendation.
-
-subjectKeyIdentifier=hash
-
-authorityKeyIdentifier=keyid:always,issuer:always
-
-# This is what PKIX recommends but some broken software chokes on critical
-# extensions.
-#basicConstraints = critical,CA:true
-# So we do this instead.
-basicConstraints = CA:true
-
-# Key usage: this is typical for a CA certificate. However since it will
-# prevent it being used as an test self-signed certificate it is best
-# left out by default.
-# keyUsage = cRLSign, keyCertSign
-
-# Some might want this also
-# nsCertType = sslCA, emailCA
-
-# Include email address in subject alt name: another PKIX recommendation
-# subjectAltName=email:copy
-# Copy issuer details
-# issuerAltName=issuer:copy
-
-# DER hex encoding of an extension: beware experts only!
-# obj=DER:02:03
-# Where 'obj' is a standard or added object
-# You can even override a supported extension:
-# basicConstraints= critical, DER:30:03:01:01:FF
-
-[ crl_ext ]
-
-# CRL extensions.
-# Only issuerAltName and authorityKeyIdentifier make any sense in a CRL.
-
-# issuerAltName=issuer:copy
-authorityKeyIdentifier=keyid:always,issuer:always
-
-[ proxy_cert_ext ]
-# These extensions should be added when creating a proxy certificate
-
-# This goes against PKIX guidelines but some CAs do it and some software
-# requires this to avoid interpreting an end user certificate as a CA.
-
-basicConstraints=CA:FALSE
-
-# Here are some examples of the usage of nsCertType. If it is omitted
-# the certificate can be used for anything *except* object signing.
-
-# This is OK for an SSL server.
-# nsCertType                   = server
-
-# For an object signing certificate this would be used.
-# nsCertType = objsign
-
-# For normal client use this is typical
-# nsCertType = client, email
-
-# and for everything including object signing:
-# nsCertType = client, email, objsign
-
-# This is typical in keyUsage for a client certificate.
-# keyUsage = nonRepudiation, digitalSignature, keyEncipherment
-
-# This will be displayed in Netscape's comment listbox.
-nsComment                      = "OpenSSL Generated Certificate"
-
-# PKIX recommendations harmless if included in all certificates.
-subjectKeyIdentifier=hash
-authorityKeyIdentifier=keyid,issuer:always
-
-# This stuff is for subjectAltName and issuerAltname.
-# Import the email address.
-# subjectAltName=email:copy
-# An alternative to produce certificates that aren't
-# deprecated according to PKIX.
-# subjectAltName=email:move
-
-# Copy subject details
-# issuerAltName=issuer:copy
-
-#nsCaRevocationUrl             = http://www.domain.dom/ca-crl.pem
-#nsBaseUrl
-#nsRevocationUrl
-#nsRenewalUrl
-#nsCaPolicyUrl
-#nsSslServerName
-
-# This really needs to be in place for it to be a proxy certificate.
-proxyCertInfo=critical,language:id-ppl-anyLanguage,pathlen:3,policy:foo
diff --git a/tests/cert-svc/data/TestData/ssl/cert_chain/configs/config_chain_no_aia5.cnf b/tests/cert-svc/data/TestData/ssl/cert_chain/configs/config_chain_no_aia5.cnf
deleted file mode 100644 (file)
index 1ad17ce..0000000
+++ /dev/null
@@ -1,313 +0,0 @@
-#
-# OpenSSL example configuration file.
-# This is mostly being used for generation of certificate requests.
-#
-
-# This definition stops the following lines choking if HOME isn't
-# defined.
-HOME                   = .
-RANDFILE               = $ENV::HOME/.rnd
-
-# Extra OBJECT IDENTIFIER info:
-#oid_file              = $ENV::HOME/.oid
-oid_section            = new_oids
-
-# To use this configuration file with the "-extfile" option of the
-# "openssl x509" utility, name here the section containing the
-# X.509v3 extensions to use:
-# extensions           = 
-# (Alternatively, use a configuration file that has only
-# X.509v3 extensions in its main [= default] section.)
-
-[ new_oids ]
-
-# We can add new OIDs in here for use by 'ca' and 'req'.
-# Add a simple OID like this:
-# testoid1=1.2.3.4
-# Or use config file substitution like this:
-# testoid2=${testoid1}.5.6
-
-####################################################################
-[ ca ]
-default_ca     = CA_default            # The default ca section
-
-####################################################################
-[ CA_default ]
-
-dir            = ./cert_chain          # Where everything is kept
-certs          = $dir/certs            # Where the issued certs are kept
-crl_dir                = $dir/crl              # Where the issued crl are kept
-database       = $dir/index.txt        # database index file.
-#unique_subject        = no                    # Set to 'no' to allow creation of
-                                       # several ctificates with same subject.
-new_certs_dir  = $dir/newcerts         # default place for new certs.
-
-certificate    = $dir/cert_chain_no_aia4.crt   # The CA certificate
-serial         = $dir/serial           # The current serial number
-crlnumber      = $dir/crlnumber        # the current crl number
-                                       # must be commented out to leave a V1 CRL
-crl            = $dir/crl.pem          # The current CRL
-private_key    = $dir/private/cert_chain_no_aia4.pem # The private key
-RANDFILE       = $dir/private/.rand    # private random number file
-
-x509_extensions        = usr_cert              # The extentions to add to the cert
-
-# Comment out the following two lines for the "traditional"
-# (and highly broken) format.
-name_opt       = ca_default            # Subject Name options
-cert_opt       = ca_default            # Certificate field options
-
-# Extension copying option: use with caution.
-# copy_extensions = copy
-
-# Extensions to add to a CRL. Note: Netscape communicator chokes on V2 CRLs
-# so this is commented out by default to leave a V1 CRL.
-# crlnumber must also be commented out to leave a V1 CRL.
-# crl_extensions       = crl_ext
-
-default_days   = 365                   # how long to certify for
-default_crl_days= 30                   # how long before next CRL
-default_md     = sha1                  # which md to use.
-preserve       = no                    # keep passed DN ordering
-
-# A few difference way of specifying how similar the request should look
-# For type CA, the listed attributes must be the same, and the optional
-# and supplied fields are just that :-)
-policy         = policy_match
-
-# For the CA policy
-[ policy_match ]
-countryName            = match
-stateOrProvinceName    = match
-organizationName       = match
-organizationalUnitName = optional
-commonName             = supplied
-emailAddress           = optional
-
-# For the 'anything' policy
-# At this point in time, you must list all acceptable 'object'
-# types.
-[ policy_anything ]
-countryName            = optional
-stateOrProvinceName    = optional
-localityName           = optional
-organizationName       = optional
-organizationalUnitName = optional
-commonName             = supplied
-emailAddress           = optional
-
-####################################################################
-[ req ]
-default_bits           = 1024
-default_keyfile        = privkey.pem
-distinguished_name     = req_distinguished_name
-attributes             = req_attributes
-x509_extensions        = v3_ca # The extentions to add to the self signed cert
-
-# Passwords for private keys if not present they will be prompted for
-# input_password = secret
-# output_password = secret
-
-# This sets a mask for permitted string types. There are several options. 
-# default: PrintableString, T61String, BMPString.
-# pkix  : PrintableString, BMPString.
-# utf8only: only UTF8Strings.
-# nombstr : PrintableString, T61String (no BMPStrings or UTF8Strings).
-# MASK:XXXX a literal mask value.
-# WARNING: current versions of Netscape crash on BMPStrings or UTF8Strings
-# so use this option with caution!
-string_mask = nombstr
-
-# req_extensions = v3_req # The extensions to add to a certificate request
-
-[ req_distinguished_name ]
-countryName                    = Country Name (2 letter code)
-countryName_default            = AU
-countryName_min                        = 2
-countryName_max                        = 2
-
-stateOrProvinceName            = State or Province Name (full name)
-stateOrProvinceName_default    = Some-State
-
-localityName                   = Locality Name (eg, city)
-
-0.organizationName             = Organization Name (eg, company)
-0.organizationName_default     = Internet Widgits Pty Ltd
-
-# we can do this but it is not needed normally :-)
-#1.organizationName            = Second Organization Name (eg, company)
-#1.organizationName_default    = World Wide Web Pty Ltd
-
-organizationalUnitName         = Organizational Unit Name (eg, section)
-#organizationalUnitName_default        =
-
-commonName                     = Common Name (eg, YOUR name)
-commonName_max                 = 64
-
-emailAddress                   = Email Address
-emailAddress_max               = 64
-
-# SET-ex3                      = SET extension number 3
-
-[ req_attributes ]
-challengePassword              = A challenge password
-challengePassword_min          = 4
-challengePassword_max          = 20
-
-unstructuredName               = An optional company name
-
-[ usr_cert ]
-
-# These extensions are added when 'ca' signs a request.
-
-# This goes against PKIX guidelines but some CAs do it and some software
-# requires this to avoid interpreting an end user certificate as a CA.
-
-basicConstraints=CA:FALSE
-
-# Here are some examples of the usage of nsCertType. If it is omitted
-# the certificate can be used for anything *except* object signing.
-
-# This is OK for an SSL server.
-# nsCertType                   = server
-
-# For an object signing certificate this would be used.
-# nsCertType = objsign
-
-# For normal client use this is typical
-# nsCertType = client, email
-
-# and for everything including object signing:
-# nsCertType = client, email, objsign
-
-# This is typical in keyUsage for a client certificate.
-# keyUsage = nonRepudiation, digitalSignature, keyEncipherment
-
-# This will be displayed in Netscape's comment listbox.
-nsComment                      = "OpenSSL Generated Certificate"
-
-# PKIX recommendations harmless if included in all certificates.
-subjectKeyIdentifier=hash
-authorityKeyIdentifier=keyid,issuer
-
-# This stuff is for subjectAltName and issuerAltname.
-# Import the email address.
-# subjectAltName=email:copy
-# An alternative to produce certificates that aren't
-# deprecated according to PKIX.
-# subjectAltName=email:move
-
-# Copy subject details
-# issuerAltName=issuer:copy
-
-#nsCaRevocationUrl             = http://www.domain.dom/ca-crl.pem
-#nsBaseUrl
-#nsRevocationUrl
-#nsRenewalUrl
-#nsCaPolicyUrl
-#nsSslServerName
-
-[ v3_req ]
-
-# Extensions to add to a certificate request
-
-basicConstraints = CA:FALSE
-keyUsage = nonRepudiation, digitalSignature, keyEncipherment
-
-[ v3_ca ]
-
-
-# Extensions for a typical CA
-
-
-# PKIX recommendation.
-
-subjectKeyIdentifier=hash
-
-authorityKeyIdentifier=keyid:always,issuer:always
-
-# This is what PKIX recommends but some broken software chokes on critical
-# extensions.
-#basicConstraints = critical,CA:true
-# So we do this instead.
-basicConstraints = CA:true
-
-# Key usage: this is typical for a CA certificate. However since it will
-# prevent it being used as an test self-signed certificate it is best
-# left out by default.
-# keyUsage = cRLSign, keyCertSign
-
-# Some might want this also
-# nsCertType = sslCA, emailCA
-
-# Include email address in subject alt name: another PKIX recommendation
-# subjectAltName=email:copy
-# Copy issuer details
-# issuerAltName=issuer:copy
-
-# DER hex encoding of an extension: beware experts only!
-# obj=DER:02:03
-# Where 'obj' is a standard or added object
-# You can even override a supported extension:
-# basicConstraints= critical, DER:30:03:01:01:FF
-
-[ crl_ext ]
-
-# CRL extensions.
-# Only issuerAltName and authorityKeyIdentifier make any sense in a CRL.
-
-# issuerAltName=issuer:copy
-authorityKeyIdentifier=keyid:always,issuer:always
-
-[ proxy_cert_ext ]
-# These extensions should be added when creating a proxy certificate
-
-# This goes against PKIX guidelines but some CAs do it and some software
-# requires this to avoid interpreting an end user certificate as a CA.
-
-basicConstraints=CA:FALSE
-
-# Here are some examples of the usage of nsCertType. If it is omitted
-# the certificate can be used for anything *except* object signing.
-
-# This is OK for an SSL server.
-# nsCertType                   = server
-
-# For an object signing certificate this would be used.
-# nsCertType = objsign
-
-# For normal client use this is typical
-# nsCertType = client, email
-
-# and for everything including object signing:
-# nsCertType = client, email, objsign
-
-# This is typical in keyUsage for a client certificate.
-# keyUsage = nonRepudiation, digitalSignature, keyEncipherment
-
-# This will be displayed in Netscape's comment listbox.
-nsComment                      = "OpenSSL Generated Certificate"
-
-# PKIX recommendations harmless if included in all certificates.
-subjectKeyIdentifier=hash
-authorityKeyIdentifier=keyid,issuer:always
-
-# This stuff is for subjectAltName and issuerAltname.
-# Import the email address.
-# subjectAltName=email:copy
-# An alternative to produce certificates that aren't
-# deprecated according to PKIX.
-# subjectAltName=email:move
-
-# Copy subject details
-# issuerAltName=issuer:copy
-
-#nsCaRevocationUrl             = http://www.domain.dom/ca-crl.pem
-#nsBaseUrl
-#nsRevocationUrl
-#nsRenewalUrl
-#nsCaPolicyUrl
-#nsSslServerName
-
-# This really needs to be in place for it to be a proxy certificate.
-proxyCertInfo=critical,language:id-ppl-anyLanguage,pathlen:3,policy:foo
diff --git a/tests/cert-svc/data/TestData/ssl/cert_chain/configs/config_chain_no_aia6.cnf b/tests/cert-svc/data/TestData/ssl/cert_chain/configs/config_chain_no_aia6.cnf
deleted file mode 100644 (file)
index 4d09fb6..0000000
+++ /dev/null
@@ -1,313 +0,0 @@
-#
-# OpenSSL example configuration file.
-# This is mostly being used for generation of certificate requests.
-#
-
-# This definition stops the following lines choking if HOME isn't
-# defined.
-HOME                   = .
-RANDFILE               = $ENV::HOME/.rnd
-
-# Extra OBJECT IDENTIFIER info:
-#oid_file              = $ENV::HOME/.oid
-oid_section            = new_oids
-
-# To use this configuration file with the "-extfile" option of the
-# "openssl x509" utility, name here the section containing the
-# X.509v3 extensions to use:
-# extensions           = 
-# (Alternatively, use a configuration file that has only
-# X.509v3 extensions in its main [= default] section.)
-
-[ new_oids ]
-
-# We can add new OIDs in here for use by 'ca' and 'req'.
-# Add a simple OID like this:
-# testoid1=1.2.3.4
-# Or use config file substitution like this:
-# testoid2=${testoid1}.5.6
-
-####################################################################
-[ ca ]
-default_ca     = CA_default            # The default ca section
-
-####################################################################
-[ CA_default ]
-
-dir            = ./cert_chain          # Where everything is kept
-certs          = $dir/certs            # Where the issued certs are kept
-crl_dir                = $dir/crl              # Where the issued crl are kept
-database       = $dir/index.txt        # database index file.
-#unique_subject        = no                    # Set to 'no' to allow creation of
-                                       # several ctificates with same subject.
-new_certs_dir  = $dir/newcerts         # default place for new certs.
-
-certificate    = $dir/cert_chain_no_aia5.crt   # The CA certificate
-serial         = $dir/serial           # The current serial number
-crlnumber      = $dir/crlnumber        # the current crl number
-                                       # must be commented out to leave a V1 CRL
-crl            = $dir/crl.pem          # The current CRL
-private_key    = $dir/private/cert_chain_no_aia5.pem # The private key
-RANDFILE       = $dir/private/.rand    # private random number file
-
-x509_extensions        = usr_cert              # The extentions to add to the cert
-
-# Comment out the following two lines for the "traditional"
-# (and highly broken) format.
-name_opt       = ca_default            # Subject Name options
-cert_opt       = ca_default            # Certificate field options
-
-# Extension copying option: use with caution.
-# copy_extensions = copy
-
-# Extensions to add to a CRL. Note: Netscape communicator chokes on V2 CRLs
-# so this is commented out by default to leave a V1 CRL.
-# crlnumber must also be commented out to leave a V1 CRL.
-# crl_extensions       = crl_ext
-
-default_days   = 365                   # how long to certify for
-default_crl_days= 30                   # how long before next CRL
-default_md     = sha1                  # which md to use.
-preserve       = no                    # keep passed DN ordering
-
-# A few difference way of specifying how similar the request should look
-# For type CA, the listed attributes must be the same, and the optional
-# and supplied fields are just that :-)
-policy         = policy_match
-
-# For the CA policy
-[ policy_match ]
-countryName            = match
-stateOrProvinceName    = match
-organizationName       = match
-organizationalUnitName = optional
-commonName             = supplied
-emailAddress           = optional
-
-# For the 'anything' policy
-# At this point in time, you must list all acceptable 'object'
-# types.
-[ policy_anything ]
-countryName            = optional
-stateOrProvinceName    = optional
-localityName           = optional
-organizationName       = optional
-organizationalUnitName = optional
-commonName             = supplied
-emailAddress           = optional
-
-####################################################################
-[ req ]
-default_bits           = 1024
-default_keyfile        = privkey.pem
-distinguished_name     = req_distinguished_name
-attributes             = req_attributes
-x509_extensions        = v3_ca # The extentions to add to the self signed cert
-
-# Passwords for private keys if not present they will be prompted for
-# input_password = secret
-# output_password = secret
-
-# This sets a mask for permitted string types. There are several options. 
-# default: PrintableString, T61String, BMPString.
-# pkix  : PrintableString, BMPString.
-# utf8only: only UTF8Strings.
-# nombstr : PrintableString, T61String (no BMPStrings or UTF8Strings).
-# MASK:XXXX a literal mask value.
-# WARNING: current versions of Netscape crash on BMPStrings or UTF8Strings
-# so use this option with caution!
-string_mask = nombstr
-
-# req_extensions = v3_req # The extensions to add to a certificate request
-
-[ req_distinguished_name ]
-countryName                    = Country Name (2 letter code)
-countryName_default            = AU
-countryName_min                        = 2
-countryName_max                        = 2
-
-stateOrProvinceName            = State or Province Name (full name)
-stateOrProvinceName_default    = Some-State
-
-localityName                   = Locality Name (eg, city)
-
-0.organizationName             = Organization Name (eg, company)
-0.organizationName_default     = Internet Widgits Pty Ltd
-
-# we can do this but it is not needed normally :-)
-#1.organizationName            = Second Organization Name (eg, company)
-#1.organizationName_default    = World Wide Web Pty Ltd
-
-organizationalUnitName         = Organizational Unit Name (eg, section)
-#organizationalUnitName_default        =
-
-commonName                     = Common Name (eg, YOUR name)
-commonName_max                 = 64
-
-emailAddress                   = Email Address
-emailAddress_max               = 64
-
-# SET-ex3                      = SET extension number 3
-
-[ req_attributes ]
-challengePassword              = A challenge password
-challengePassword_min          = 4
-challengePassword_max          = 20
-
-unstructuredName               = An optional company name
-
-[ usr_cert ]
-
-# These extensions are added when 'ca' signs a request.
-
-# This goes against PKIX guidelines but some CAs do it and some software
-# requires this to avoid interpreting an end user certificate as a CA.
-
-basicConstraints=CA:FALSE
-
-# Here are some examples of the usage of nsCertType. If it is omitted
-# the certificate can be used for anything *except* object signing.
-
-# This is OK for an SSL server.
-# nsCertType                   = server
-
-# For an object signing certificate this would be used.
-# nsCertType = objsign
-
-# For normal client use this is typical
-# nsCertType = client, email
-
-# and for everything including object signing:
-# nsCertType = client, email, objsign
-
-# This is typical in keyUsage for a client certificate.
-# keyUsage = nonRepudiation, digitalSignature, keyEncipherment
-
-# This will be displayed in Netscape's comment listbox.
-nsComment                      = "OpenSSL Generated Certificate"
-
-# PKIX recommendations harmless if included in all certificates.
-subjectKeyIdentifier=hash
-authorityKeyIdentifier=keyid,issuer
-
-# This stuff is for subjectAltName and issuerAltname.
-# Import the email address.
-# subjectAltName=email:copy
-# An alternative to produce certificates that aren't
-# deprecated according to PKIX.
-# subjectAltName=email:move
-
-# Copy subject details
-# issuerAltName=issuer:copy
-
-#nsCaRevocationUrl             = http://www.domain.dom/ca-crl.pem
-#nsBaseUrl
-#nsRevocationUrl
-#nsRenewalUrl
-#nsCaPolicyUrl
-#nsSslServerName
-
-[ v3_req ]
-
-# Extensions to add to a certificate request
-
-basicConstraints = CA:FALSE
-keyUsage = nonRepudiation, digitalSignature, keyEncipherment
-
-[ v3_ca ]
-
-
-# Extensions for a typical CA
-
-
-# PKIX recommendation.
-
-subjectKeyIdentifier=hash
-
-authorityKeyIdentifier=keyid:always,issuer:always
-
-# This is what PKIX recommends but some broken software chokes on critical
-# extensions.
-#basicConstraints = critical,CA:true
-# So we do this instead.
-basicConstraints = CA:true
-
-# Key usage: this is typical for a CA certificate. However since it will
-# prevent it being used as an test self-signed certificate it is best
-# left out by default.
-# keyUsage = cRLSign, keyCertSign
-
-# Some might want this also
-# nsCertType = sslCA, emailCA
-
-# Include email address in subject alt name: another PKIX recommendation
-# subjectAltName=email:copy
-# Copy issuer details
-# issuerAltName=issuer:copy
-
-# DER hex encoding of an extension: beware experts only!
-# obj=DER:02:03
-# Where 'obj' is a standard or added object
-# You can even override a supported extension:
-# basicConstraints= critical, DER:30:03:01:01:FF
-
-[ crl_ext ]
-
-# CRL extensions.
-# Only issuerAltName and authorityKeyIdentifier make any sense in a CRL.
-
-# issuerAltName=issuer:copy
-authorityKeyIdentifier=keyid:always,issuer:always
-
-[ proxy_cert_ext ]
-# These extensions should be added when creating a proxy certificate
-
-# This goes against PKIX guidelines but some CAs do it and some software
-# requires this to avoid interpreting an end user certificate as a CA.
-
-basicConstraints=CA:FALSE
-
-# Here are some examples of the usage of nsCertType. If it is omitted
-# the certificate can be used for anything *except* object signing.
-
-# This is OK for an SSL server.
-# nsCertType                   = server
-
-# For an object signing certificate this would be used.
-# nsCertType = objsign
-
-# For normal client use this is typical
-# nsCertType = client, email
-
-# and for everything including object signing:
-# nsCertType = client, email, objsign
-
-# This is typical in keyUsage for a client certificate.
-# keyUsage = nonRepudiation, digitalSignature, keyEncipherment
-
-# This will be displayed in Netscape's comment listbox.
-nsComment                      = "OpenSSL Generated Certificate"
-
-# PKIX recommendations harmless if included in all certificates.
-subjectKeyIdentifier=hash
-authorityKeyIdentifier=keyid,issuer:always
-
-# This stuff is for subjectAltName and issuerAltname.
-# Import the email address.
-# subjectAltName=email:copy
-# An alternative to produce certificates that aren't
-# deprecated according to PKIX.
-# subjectAltName=email:move
-
-# Copy subject details
-# issuerAltName=issuer:copy
-
-#nsCaRevocationUrl             = http://www.domain.dom/ca-crl.pem
-#nsBaseUrl
-#nsRevocationUrl
-#nsRenewalUrl
-#nsCaPolicyUrl
-#nsSslServerName
-
-# This really needs to be in place for it to be a proxy certificate.
-proxyCertInfo=critical,language:id-ppl-anyLanguage,pathlen:3,policy:foo
diff --git a/tests/cert-svc/data/TestData/ssl/cert_chain/configs/config_chain_no_aia7.cnf b/tests/cert-svc/data/TestData/ssl/cert_chain/configs/config_chain_no_aia7.cnf
deleted file mode 100644 (file)
index 1e5aca0..0000000
+++ /dev/null
@@ -1,313 +0,0 @@
-#
-# OpenSSL example configuration file.
-# This is mostly being used for generation of certificate requests.
-#
-
-# This definition stops the following lines choking if HOME isn't
-# defined.
-HOME                   = .
-RANDFILE               = $ENV::HOME/.rnd
-
-# Extra OBJECT IDENTIFIER info:
-#oid_file              = $ENV::HOME/.oid
-oid_section            = new_oids
-
-# To use this configuration file with the "-extfile" option of the
-# "openssl x509" utility, name here the section containing the
-# X.509v3 extensions to use:
-# extensions           = 
-# (Alternatively, use a configuration file that has only
-# X.509v3 extensions in its main [= default] section.)
-
-[ new_oids ]
-
-# We can add new OIDs in here for use by 'ca' and 'req'.
-# Add a simple OID like this:
-# testoid1=1.2.3.4
-# Or use config file substitution like this:
-# testoid2=${testoid1}.5.6
-
-####################################################################
-[ ca ]
-default_ca     = CA_default            # The default ca section
-
-####################################################################
-[ CA_default ]
-
-dir            = ./cert_chain          # Where everything is kept
-certs          = $dir/certs            # Where the issued certs are kept
-crl_dir                = $dir/crl              # Where the issued crl are kept
-database       = $dir/index.txt        # database index file.
-#unique_subject        = no                    # Set to 'no' to allow creation of
-                                       # several ctificates with same subject.
-new_certs_dir  = $dir/newcerts         # default place for new certs.
-
-certificate    = $dir/cert_chain_no_aia6.crt   # The CA certificate
-serial         = $dir/serial           # The current serial number
-crlnumber      = $dir/crlnumber        # the current crl number
-                                       # must be commented out to leave a V1 CRL
-crl            = $dir/crl.pem          # The current CRL
-private_key    = $dir/private/cert_chain_no_aia6.pem # The private key
-RANDFILE       = $dir/private/.rand    # private random number file
-
-x509_extensions        = usr_cert              # The extentions to add to the cert
-
-# Comment out the following two lines for the "traditional"
-# (and highly broken) format.
-name_opt       = ca_default            # Subject Name options
-cert_opt       = ca_default            # Certificate field options
-
-# Extension copying option: use with caution.
-# copy_extensions = copy
-
-# Extensions to add to a CRL. Note: Netscape communicator chokes on V2 CRLs
-# so this is commented out by default to leave a V1 CRL.
-# crlnumber must also be commented out to leave a V1 CRL.
-# crl_extensions       = crl_ext
-
-default_days   = 365                   # how long to certify for
-default_crl_days= 30                   # how long before next CRL
-default_md     = sha1                  # which md to use.
-preserve       = no                    # keep passed DN ordering
-
-# A few difference way of specifying how similar the request should look
-# For type CA, the listed attributes must be the same, and the optional
-# and supplied fields are just that :-)
-policy         = policy_match
-
-# For the CA policy
-[ policy_match ]
-countryName            = match
-stateOrProvinceName    = match
-organizationName       = match
-organizationalUnitName = optional
-commonName             = supplied
-emailAddress           = optional
-
-# For the 'anything' policy
-# At this point in time, you must list all acceptable 'object'
-# types.
-[ policy_anything ]
-countryName            = optional
-stateOrProvinceName    = optional
-localityName           = optional
-organizationName       = optional
-organizationalUnitName = optional
-commonName             = supplied
-emailAddress           = optional
-
-####################################################################
-[ req ]
-default_bits           = 1024
-default_keyfile        = privkey.pem
-distinguished_name     = req_distinguished_name
-attributes             = req_attributes
-x509_extensions        = v3_ca # The extentions to add to the self signed cert
-
-# Passwords for private keys if not present they will be prompted for
-# input_password = secret
-# output_password = secret
-
-# This sets a mask for permitted string types. There are several options. 
-# default: PrintableString, T61String, BMPString.
-# pkix  : PrintableString, BMPString.
-# utf8only: only UTF8Strings.
-# nombstr : PrintableString, T61String (no BMPStrings or UTF8Strings).
-# MASK:XXXX a literal mask value.
-# WARNING: current versions of Netscape crash on BMPStrings or UTF8Strings
-# so use this option with caution!
-string_mask = nombstr
-
-# req_extensions = v3_req # The extensions to add to a certificate request
-
-[ req_distinguished_name ]
-countryName                    = Country Name (2 letter code)
-countryName_default            = AU
-countryName_min                        = 2
-countryName_max                        = 2
-
-stateOrProvinceName            = State or Province Name (full name)
-stateOrProvinceName_default    = Some-State
-
-localityName                   = Locality Name (eg, city)
-
-0.organizationName             = Organization Name (eg, company)
-0.organizationName_default     = Internet Widgits Pty Ltd
-
-# we can do this but it is not needed normally :-)
-#1.organizationName            = Second Organization Name (eg, company)
-#1.organizationName_default    = World Wide Web Pty Ltd
-
-organizationalUnitName         = Organizational Unit Name (eg, section)
-#organizationalUnitName_default        =
-
-commonName                     = Common Name (eg, YOUR name)
-commonName_max                 = 64
-
-emailAddress                   = Email Address
-emailAddress_max               = 64
-
-# SET-ex3                      = SET extension number 3
-
-[ req_attributes ]
-challengePassword              = A challenge password
-challengePassword_min          = 4
-challengePassword_max          = 20
-
-unstructuredName               = An optional company name
-
-[ usr_cert ]
-
-# These extensions are added when 'ca' signs a request.
-
-# This goes against PKIX guidelines but some CAs do it and some software
-# requires this to avoid interpreting an end user certificate as a CA.
-
-basicConstraints=CA:FALSE
-
-# Here are some examples of the usage of nsCertType. If it is omitted
-# the certificate can be used for anything *except* object signing.
-
-# This is OK for an SSL server.
-# nsCertType                   = server
-
-# For an object signing certificate this would be used.
-# nsCertType = objsign
-
-# For normal client use this is typical
-# nsCertType = client, email
-
-# and for everything including object signing:
-# nsCertType = client, email, objsign
-
-# This is typical in keyUsage for a client certificate.
-# keyUsage = nonRepudiation, digitalSignature, keyEncipherment
-
-# This will be displayed in Netscape's comment listbox.
-nsComment                      = "OpenSSL Generated Certificate"
-
-# PKIX recommendations harmless if included in all certificates.
-subjectKeyIdentifier=hash
-authorityKeyIdentifier=keyid,issuer
-
-# This stuff is for subjectAltName and issuerAltname.
-# Import the email address.
-# subjectAltName=email:copy
-# An alternative to produce certificates that aren't
-# deprecated according to PKIX.
-# subjectAltName=email:move
-
-# Copy subject details
-# issuerAltName=issuer:copy
-
-#nsCaRevocationUrl             = http://www.domain.dom/ca-crl.pem
-#nsBaseUrl
-#nsRevocationUrl
-#nsRenewalUrl
-#nsCaPolicyUrl
-#nsSslServerName
-
-[ v3_req ]
-
-# Extensions to add to a certificate request
-
-basicConstraints = CA:FALSE
-keyUsage = nonRepudiation, digitalSignature, keyEncipherment
-
-[ v3_ca ]
-
-
-# Extensions for a typical CA
-
-
-# PKIX recommendation.
-
-subjectKeyIdentifier=hash
-
-authorityKeyIdentifier=keyid:always,issuer:always
-
-# This is what PKIX recommends but some broken software chokes on critical
-# extensions.
-#basicConstraints = critical,CA:true
-# So we do this instead.
-basicConstraints = CA:true
-
-# Key usage: this is typical for a CA certificate. However since it will
-# prevent it being used as an test self-signed certificate it is best
-# left out by default.
-# keyUsage = cRLSign, keyCertSign
-
-# Some might want this also
-# nsCertType = sslCA, emailCA
-
-# Include email address in subject alt name: another PKIX recommendation
-# subjectAltName=email:copy
-# Copy issuer details
-# issuerAltName=issuer:copy
-
-# DER hex encoding of an extension: beware experts only!
-# obj=DER:02:03
-# Where 'obj' is a standard or added object
-# You can even override a supported extension:
-# basicConstraints= critical, DER:30:03:01:01:FF
-
-[ crl_ext ]
-
-# CRL extensions.
-# Only issuerAltName and authorityKeyIdentifier make any sense in a CRL.
-
-# issuerAltName=issuer:copy
-authorityKeyIdentifier=keyid:always,issuer:always
-
-[ proxy_cert_ext ]
-# These extensions should be added when creating a proxy certificate
-
-# This goes against PKIX guidelines but some CAs do it and some software
-# requires this to avoid interpreting an end user certificate as a CA.
-
-basicConstraints=CA:FALSE
-
-# Here are some examples of the usage of nsCertType. If it is omitted
-# the certificate can be used for anything *except* object signing.
-
-# This is OK for an SSL server.
-# nsCertType                   = server
-
-# For an object signing certificate this would be used.
-# nsCertType = objsign
-
-# For normal client use this is typical
-# nsCertType = client, email
-
-# and for everything including object signing:
-# nsCertType = client, email, objsign
-
-# This is typical in keyUsage for a client certificate.
-# keyUsage = nonRepudiation, digitalSignature, keyEncipherment
-
-# This will be displayed in Netscape's comment listbox.
-nsComment                      = "OpenSSL Generated Certificate"
-
-# PKIX recommendations harmless if included in all certificates.
-subjectKeyIdentifier=hash
-authorityKeyIdentifier=keyid,issuer:always
-
-# This stuff is for subjectAltName and issuerAltname.
-# Import the email address.
-# subjectAltName=email:copy
-# An alternative to produce certificates that aren't
-# deprecated according to PKIX.
-# subjectAltName=email:move
-
-# Copy subject details
-# issuerAltName=issuer:copy
-
-#nsCaRevocationUrl             = http://www.domain.dom/ca-crl.pem
-#nsBaseUrl
-#nsRevocationUrl
-#nsRenewalUrl
-#nsCaPolicyUrl
-#nsSslServerName
-
-# This really needs to be in place for it to be a proxy certificate.
-proxyCertInfo=critical,language:id-ppl-anyLanguage,pathlen:3,policy:foo
diff --git a/tests/cert-svc/data/TestData/ssl/cert_chain/configs/config_chain_no_aia8.cnf b/tests/cert-svc/data/TestData/ssl/cert_chain/configs/config_chain_no_aia8.cnf
deleted file mode 100644 (file)
index 6b4f2f3..0000000
+++ /dev/null
@@ -1,313 +0,0 @@
-#
-# OpenSSL example configuration file.
-# This is mostly being used for generation of certificate requests.
-#
-
-# This definition stops the following lines choking if HOME isn't
-# defined.
-HOME                   = .
-RANDFILE               = $ENV::HOME/.rnd
-
-# Extra OBJECT IDENTIFIER info:
-#oid_file              = $ENV::HOME/.oid
-oid_section            = new_oids
-
-# To use this configuration file with the "-extfile" option of the
-# "openssl x509" utility, name here the section containing the
-# X.509v3 extensions to use:
-# extensions           = 
-# (Alternatively, use a configuration file that has only
-# X.509v3 extensions in its main [= default] section.)
-
-[ new_oids ]
-
-# We can add new OIDs in here for use by 'ca' and 'req'.
-# Add a simple OID like this:
-# testoid1=1.2.3.4
-# Or use config file substitution like this:
-# testoid2=${testoid1}.5.6
-
-####################################################################
-[ ca ]
-default_ca     = CA_default            # The default ca section
-
-####################################################################
-[ CA_default ]
-
-dir            = ./cert_chain          # Where everything is kept
-certs          = $dir/certs            # Where the issued certs are kept
-crl_dir                = $dir/crl              # Where the issued crl are kept
-database       = $dir/index.txt        # database index file.
-#unique_subject        = no                    # Set to 'no' to allow creation of
-                                       # several ctificates with same subject.
-new_certs_dir  = $dir/newcerts         # default place for new certs.
-
-certificate    = $dir/cert_chain_no_aia7.crt   # The CA certificate
-serial         = $dir/serial           # The current serial number
-crlnumber      = $dir/crlnumber        # the current crl number
-                                       # must be commented out to leave a V1 CRL
-crl            = $dir/crl.pem          # The current CRL
-private_key    = $dir/private/cert_chain_no_aia7.pem # The private key
-RANDFILE       = $dir/private/.rand    # private random number file
-
-x509_extensions        = usr_cert              # The extentions to add to the cert
-
-# Comment out the following two lines for the "traditional"
-# (and highly broken) format.
-name_opt       = ca_default            # Subject Name options
-cert_opt       = ca_default            # Certificate field options
-
-# Extension copying option: use with caution.
-# copy_extensions = copy
-
-# Extensions to add to a CRL. Note: Netscape communicator chokes on V2 CRLs
-# so this is commented out by default to leave a V1 CRL.
-# crlnumber must also be commented out to leave a V1 CRL.
-# crl_extensions       = crl_ext
-
-default_days   = 365                   # how long to certify for
-default_crl_days= 30                   # how long before next CRL
-default_md     = sha1                  # which md to use.
-preserve       = no                    # keep passed DN ordering
-
-# A few difference way of specifying how similar the request should look
-# For type CA, the listed attributes must be the same, and the optional
-# and supplied fields are just that :-)
-policy         = policy_match
-
-# For the CA policy
-[ policy_match ]
-countryName            = match
-stateOrProvinceName    = match
-organizationName       = match
-organizationalUnitName = optional
-commonName             = supplied
-emailAddress           = optional
-
-# For the 'anything' policy
-# At this point in time, you must list all acceptable 'object'
-# types.
-[ policy_anything ]
-countryName            = optional
-stateOrProvinceName    = optional
-localityName           = optional
-organizationName       = optional
-organizationalUnitName = optional
-commonName             = supplied
-emailAddress           = optional
-
-####################################################################
-[ req ]
-default_bits           = 1024
-default_keyfile        = privkey.pem
-distinguished_name     = req_distinguished_name
-attributes             = req_attributes
-x509_extensions        = v3_ca # The extentions to add to the self signed cert
-
-# Passwords for private keys if not present they will be prompted for
-# input_password = secret
-# output_password = secret
-
-# This sets a mask for permitted string types. There are several options. 
-# default: PrintableString, T61String, BMPString.
-# pkix  : PrintableString, BMPString.
-# utf8only: only UTF8Strings.
-# nombstr : PrintableString, T61String (no BMPStrings or UTF8Strings).
-# MASK:XXXX a literal mask value.
-# WARNING: current versions of Netscape crash on BMPStrings or UTF8Strings
-# so use this option with caution!
-string_mask = nombstr
-
-# req_extensions = v3_req # The extensions to add to a certificate request
-
-[ req_distinguished_name ]
-countryName                    = Country Name (2 letter code)
-countryName_default            = AU
-countryName_min                        = 2
-countryName_max                        = 2
-
-stateOrProvinceName            = State or Province Name (full name)
-stateOrProvinceName_default    = Some-State
-
-localityName                   = Locality Name (eg, city)
-
-0.organizationName             = Organization Name (eg, company)
-0.organizationName_default     = Internet Widgits Pty Ltd
-
-# we can do this but it is not needed normally :-)
-#1.organizationName            = Second Organization Name (eg, company)
-#1.organizationName_default    = World Wide Web Pty Ltd
-
-organizationalUnitName         = Organizational Unit Name (eg, section)
-#organizationalUnitName_default        =
-
-commonName                     = Common Name (eg, YOUR name)
-commonName_max                 = 64
-
-emailAddress                   = Email Address
-emailAddress_max               = 64
-
-# SET-ex3                      = SET extension number 3
-
-[ req_attributes ]
-challengePassword              = A challenge password
-challengePassword_min          = 4
-challengePassword_max          = 20
-
-unstructuredName               = An optional company name
-
-[ usr_cert ]
-
-# These extensions are added when 'ca' signs a request.
-
-# This goes against PKIX guidelines but some CAs do it and some software
-# requires this to avoid interpreting an end user certificate as a CA.
-
-basicConstraints=CA:FALSE
-
-# Here are some examples of the usage of nsCertType. If it is omitted
-# the certificate can be used for anything *except* object signing.
-
-# This is OK for an SSL server.
-# nsCertType                   = server
-
-# For an object signing certificate this would be used.
-# nsCertType = objsign
-
-# For normal client use this is typical
-# nsCertType = client, email
-
-# and for everything including object signing:
-# nsCertType = client, email, objsign
-
-# This is typical in keyUsage for a client certificate.
-# keyUsage = nonRepudiation, digitalSignature, keyEncipherment
-
-# This will be displayed in Netscape's comment listbox.
-nsComment                      = "OpenSSL Generated Certificate"
-
-# PKIX recommendations harmless if included in all certificates.
-subjectKeyIdentifier=hash
-authorityKeyIdentifier=keyid,issuer
-
-# This stuff is for subjectAltName and issuerAltname.
-# Import the email address.
-# subjectAltName=email:copy
-# An alternative to produce certificates that aren't
-# deprecated according to PKIX.
-# subjectAltName=email:move
-
-# Copy subject details
-# issuerAltName=issuer:copy
-
-#nsCaRevocationUrl             = http://www.domain.dom/ca-crl.pem
-#nsBaseUrl
-#nsRevocationUrl
-#nsRenewalUrl
-#nsCaPolicyUrl
-#nsSslServerName
-
-[ v3_req ]
-
-# Extensions to add to a certificate request
-
-basicConstraints = CA:FALSE
-keyUsage = nonRepudiation, digitalSignature, keyEncipherment
-
-[ v3_ca ]
-
-
-# Extensions for a typical CA
-
-
-# PKIX recommendation.
-
-subjectKeyIdentifier=hash
-
-authorityKeyIdentifier=keyid:always,issuer:always
-
-# This is what PKIX recommends but some broken software chokes on critical
-# extensions.
-#basicConstraints = critical,CA:true
-# So we do this instead.
-basicConstraints = CA:true
-
-# Key usage: this is typical for a CA certificate. However since it will
-# prevent it being used as an test self-signed certificate it is best
-# left out by default.
-# keyUsage = cRLSign, keyCertSign
-
-# Some might want this also
-# nsCertType = sslCA, emailCA
-
-# Include email address in subject alt name: another PKIX recommendation
-# subjectAltName=email:copy
-# Copy issuer details
-# issuerAltName=issuer:copy
-
-# DER hex encoding of an extension: beware experts only!
-# obj=DER:02:03
-# Where 'obj' is a standard or added object
-# You can even override a supported extension:
-# basicConstraints= critical, DER:30:03:01:01:FF
-
-[ crl_ext ]
-
-# CRL extensions.
-# Only issuerAltName and authorityKeyIdentifier make any sense in a CRL.
-
-# issuerAltName=issuer:copy
-authorityKeyIdentifier=keyid:always,issuer:always
-
-[ proxy_cert_ext ]
-# These extensions should be added when creating a proxy certificate
-
-# This goes against PKIX guidelines but some CAs do it and some software
-# requires this to avoid interpreting an end user certificate as a CA.
-
-basicConstraints=CA:FALSE
-
-# Here are some examples of the usage of nsCertType. If it is omitted
-# the certificate can be used for anything *except* object signing.
-
-# This is OK for an SSL server.
-# nsCertType                   = server
-
-# For an object signing certificate this would be used.
-# nsCertType = objsign
-
-# For normal client use this is typical
-# nsCertType = client, email
-
-# and for everything including object signing:
-# nsCertType = client, email, objsign
-
-# This is typical in keyUsage for a client certificate.
-# keyUsage = nonRepudiation, digitalSignature, keyEncipherment
-
-# This will be displayed in Netscape's comment listbox.
-nsComment                      = "OpenSSL Generated Certificate"
-
-# PKIX recommendations harmless if included in all certificates.
-subjectKeyIdentifier=hash
-authorityKeyIdentifier=keyid,issuer:always
-
-# This stuff is for subjectAltName and issuerAltname.
-# Import the email address.
-# subjectAltName=email:copy
-# An alternative to produce certificates that aren't
-# deprecated according to PKIX.
-# subjectAltName=email:move
-
-# Copy subject details
-# issuerAltName=issuer:copy
-
-#nsCaRevocationUrl             = http://www.domain.dom/ca-crl.pem
-#nsBaseUrl
-#nsRevocationUrl
-#nsRenewalUrl
-#nsCaPolicyUrl
-#nsSslServerName
-
-# This really needs to be in place for it to be a proxy certificate.
-proxyCertInfo=critical,language:id-ppl-anyLanguage,pathlen:3,policy:foo
diff --git a/tests/cert-svc/data/TestData/ssl/cert_chain/configs/config_chain_no_aia9.cnf b/tests/cert-svc/data/TestData/ssl/cert_chain/configs/config_chain_no_aia9.cnf
deleted file mode 100644 (file)
index fecdb41..0000000
+++ /dev/null
@@ -1,313 +0,0 @@
-#
-# OpenSSL example configuration file.
-# This is mostly being used for generation of certificate requests.
-#
-
-# This definition stops the following lines choking if HOME isn't
-# defined.
-HOME                   = .
-RANDFILE               = $ENV::HOME/.rnd
-
-# Extra OBJECT IDENTIFIER info:
-#oid_file              = $ENV::HOME/.oid
-oid_section            = new_oids
-
-# To use this configuration file with the "-extfile" option of the
-# "openssl x509" utility, name here the section containing the
-# X.509v3 extensions to use:
-# extensions           = 
-# (Alternatively, use a configuration file that has only
-# X.509v3 extensions in its main [= default] section.)
-
-[ new_oids ]
-
-# We can add new OIDs in here for use by 'ca' and 'req'.
-# Add a simple OID like this:
-# testoid1=1.2.3.4
-# Or use config file substitution like this:
-# testoid2=${testoid1}.5.6
-
-####################################################################
-[ ca ]
-default_ca     = CA_default            # The default ca section
-
-####################################################################
-[ CA_default ]
-
-dir            = ./cert_chain          # Where everything is kept
-certs          = $dir/certs            # Where the issued certs are kept
-crl_dir                = $dir/crl              # Where the issued crl are kept
-database       = $dir/index.txt        # database index file.
-#unique_subject        = no                    # Set to 'no' to allow creation of
-                                       # several ctificates with same subject.
-new_certs_dir  = $dir/newcerts         # default place for new certs.
-
-certificate    = $dir/cert_chain_no_aia8.crt   # The CA certificate
-serial         = $dir/serial           # The current serial number
-crlnumber      = $dir/crlnumber        # the current crl number
-                                       # must be commented out to leave a V1 CRL
-crl            = $dir/crl.pem          # The current CRL
-private_key    = $dir/private/cert_chain_no_aia8.pem # The private key
-RANDFILE       = $dir/private/.rand    # private random number file
-
-x509_extensions        = usr_cert              # The extentions to add to the cert
-
-# Comment out the following two lines for the "traditional"
-# (and highly broken) format.
-name_opt       = ca_default            # Subject Name options
-cert_opt       = ca_default            # Certificate field options
-
-# Extension copying option: use with caution.
-# copy_extensions = copy
-
-# Extensions to add to a CRL. Note: Netscape communicator chokes on V2 CRLs
-# so this is commented out by default to leave a V1 CRL.
-# crlnumber must also be commented out to leave a V1 CRL.
-# crl_extensions       = crl_ext
-
-default_days   = 365                   # how long to certify for
-default_crl_days= 30                   # how long before next CRL
-default_md     = sha1                  # which md to use.
-preserve       = no                    # keep passed DN ordering
-
-# A few difference way of specifying how similar the request should look
-# For type CA, the listed attributes must be the same, and the optional
-# and supplied fields are just that :-)
-policy         = policy_match
-
-# For the CA policy
-[ policy_match ]
-countryName            = match
-stateOrProvinceName    = match
-organizationName       = match
-organizationalUnitName = optional
-commonName             = supplied
-emailAddress           = optional
-
-# For the 'anything' policy
-# At this point in time, you must list all acceptable 'object'
-# types.
-[ policy_anything ]
-countryName            = optional
-stateOrProvinceName    = optional
-localityName           = optional
-organizationName       = optional
-organizationalUnitName = optional
-commonName             = supplied
-emailAddress           = optional
-
-####################################################################
-[ req ]
-default_bits           = 1024
-default_keyfile        = privkey.pem
-distinguished_name     = req_distinguished_name
-attributes             = req_attributes
-x509_extensions        = v3_ca # The extentions to add to the self signed cert
-
-# Passwords for private keys if not present they will be prompted for
-# input_password = secret
-# output_password = secret
-
-# This sets a mask for permitted string types. There are several options. 
-# default: PrintableString, T61String, BMPString.
-# pkix  : PrintableString, BMPString.
-# utf8only: only UTF8Strings.
-# nombstr : PrintableString, T61String (no BMPStrings or UTF8Strings).
-# MASK:XXXX a literal mask value.
-# WARNING: current versions of Netscape crash on BMPStrings or UTF8Strings
-# so use this option with caution!
-string_mask = nombstr
-
-# req_extensions = v3_req # The extensions to add to a certificate request
-
-[ req_distinguished_name ]
-countryName                    = Country Name (2 letter code)
-countryName_default            = AU
-countryName_min                        = 2
-countryName_max                        = 2
-
-stateOrProvinceName            = State or Province Name (full name)
-stateOrProvinceName_default    = Some-State
-
-localityName                   = Locality Name (eg, city)
-
-0.organizationName             = Organization Name (eg, company)
-0.organizationName_default     = Internet Widgits Pty Ltd
-
-# we can do this but it is not needed normally :-)
-#1.organizationName            = Second Organization Name (eg, company)
-#1.organizationName_default    = World Wide Web Pty Ltd
-
-organizationalUnitName         = Organizational Unit Name (eg, section)
-#organizationalUnitName_default        =
-
-commonName                     = Common Name (eg, YOUR name)
-commonName_max                 = 64
-
-emailAddress                   = Email Address
-emailAddress_max               = 64
-
-# SET-ex3                      = SET extension number 3
-
-[ req_attributes ]
-challengePassword              = A challenge password
-challengePassword_min          = 4
-challengePassword_max          = 20
-
-unstructuredName               = An optional company name
-
-[ usr_cert ]
-
-# These extensions are added when 'ca' signs a request.
-
-# This goes against PKIX guidelines but some CAs do it and some software
-# requires this to avoid interpreting an end user certificate as a CA.
-
-basicConstraints=CA:FALSE
-
-# Here are some examples of the usage of nsCertType. If it is omitted
-# the certificate can be used for anything *except* object signing.
-
-# This is OK for an SSL server.
-# nsCertType                   = server
-
-# For an object signing certificate this would be used.
-# nsCertType = objsign
-
-# For normal client use this is typical
-# nsCertType = client, email
-
-# and for everything including object signing:
-# nsCertType = client, email, objsign
-
-# This is typical in keyUsage for a client certificate.
-# keyUsage = nonRepudiation, digitalSignature, keyEncipherment
-
-# This will be displayed in Netscape's comment listbox.
-nsComment                      = "OpenSSL Generated Certificate"
-
-# PKIX recommendations harmless if included in all certificates.
-subjectKeyIdentifier=hash
-authorityKeyIdentifier=keyid,issuer
-
-# This stuff is for subjectAltName and issuerAltname.
-# Import the email address.
-# subjectAltName=email:copy
-# An alternative to produce certificates that aren't
-# deprecated according to PKIX.
-# subjectAltName=email:move
-
-# Copy subject details
-# issuerAltName=issuer:copy
-
-#nsCaRevocationUrl             = http://www.domain.dom/ca-crl.pem
-#nsBaseUrl
-#nsRevocationUrl
-#nsRenewalUrl
-#nsCaPolicyUrl
-#nsSslServerName
-
-[ v3_req ]
-
-# Extensions to add to a certificate request
-
-basicConstraints = CA:FALSE
-keyUsage = nonRepudiation, digitalSignature, keyEncipherment
-
-[ v3_ca ]
-
-
-# Extensions for a typical CA
-
-
-# PKIX recommendation.
-
-subjectKeyIdentifier=hash
-
-authorityKeyIdentifier=keyid:always,issuer:always
-
-# This is what PKIX recommends but some broken software chokes on critical
-# extensions.
-#basicConstraints = critical,CA:true
-# So we do this instead.
-basicConstraints = CA:true
-
-# Key usage: this is typical for a CA certificate. However since it will
-# prevent it being used as an test self-signed certificate it is best
-# left out by default.
-# keyUsage = cRLSign, keyCertSign
-
-# Some might want this also
-# nsCertType = sslCA, emailCA
-
-# Include email address in subject alt name: another PKIX recommendation
-# subjectAltName=email:copy
-# Copy issuer details
-# issuerAltName=issuer:copy
-
-# DER hex encoding of an extension: beware experts only!
-# obj=DER:02:03
-# Where 'obj' is a standard or added object
-# You can even override a supported extension:
-# basicConstraints= critical, DER:30:03:01:01:FF
-
-[ crl_ext ]
-
-# CRL extensions.
-# Only issuerAltName and authorityKeyIdentifier make any sense in a CRL.
-
-# issuerAltName=issuer:copy
-authorityKeyIdentifier=keyid:always,issuer:always
-
-[ proxy_cert_ext ]
-# These extensions should be added when creating a proxy certificate
-
-# This goes against PKIX guidelines but some CAs do it and some software
-# requires this to avoid interpreting an end user certificate as a CA.
-
-basicConstraints=CA:FALSE
-
-# Here are some examples of the usage of nsCertType. If it is omitted
-# the certificate can be used for anything *except* object signing.
-
-# This is OK for an SSL server.
-# nsCertType                   = server
-
-# For an object signing certificate this would be used.
-# nsCertType = objsign
-
-# For normal client use this is typical
-# nsCertType = client, email
-
-# and for everything including object signing:
-# nsCertType = client, email, objsign
-
-# This is typical in keyUsage for a client certificate.
-# keyUsage = nonRepudiation, digitalSignature, keyEncipherment
-
-# This will be displayed in Netscape's comment listbox.
-nsComment                      = "OpenSSL Generated Certificate"
-
-# PKIX recommendations harmless if included in all certificates.
-subjectKeyIdentifier=hash
-authorityKeyIdentifier=keyid,issuer:always
-
-# This stuff is for subjectAltName and issuerAltname.
-# Import the email address.
-# subjectAltName=email:copy
-# An alternative to produce certificates that aren't
-# deprecated according to PKIX.
-# subjectAltName=email:move
-
-# Copy subject details
-# issuerAltName=issuer:copy
-
-#nsCaRevocationUrl             = http://www.domain.dom/ca-crl.pem
-#nsBaseUrl
-#nsRevocationUrl
-#nsRenewalUrl
-#nsCaPolicyUrl
-#nsSslServerName
-
-# This really needs to be in place for it to be a proxy certificate.
-proxyCertInfo=critical,language:id-ppl-anyLanguage,pathlen:3,policy:foo
diff --git a/tests/cert-svc/data/TestData/ssl/cert_chain/index.txt b/tests/cert-svc/data/TestData/ssl/cert_chain/index.txt
deleted file mode 100644 (file)
index 857ea56..0000000
+++ /dev/null
@@ -1,64 +0,0 @@
-V      100306080002Z           01      unknown /C=KR/ST=KyungGi-Do/O=Samsung Elec./CN=OCSP Responder
-V      100309031315Z           02      unknown /C=KR/ST=KyungGi-Do/O=Samsung Elec./CN=Certificate for OCSP Client test - IP address as AIA
-V      100309060955Z           03      unknown /C=KR/ST=KyungGi-Do/O=Samsung Elec./CN=First certificate to test OCSP
-V      100309061108Z           04      unknown /C=KR/ST=KyungGi-Do/O=Samsung Elec./CN=First certificate to test OCSP
-V      100309061223Z           05      unknown /C=KR/ST=KyungGi-Do/O=Samsung Elec./CN=First certificate to test OCSP
-V      100310001031Z           06      unknown /C=KR/ST=KyungGi-Do/O=Samsung Elec./CN=OCSP Responder
-V      100310001451Z           07      unknown /C=KR/ST=KyungGi-Do/O=Samsung Elec./CN=OCSP Responder
-V      100310080409Z           08      unknown /C=KR/ST=KyungGi-Do/O=Samsung Elec./CN=First certificate to test OCSP
-V      100311104952Z           09      unknown /C=KR/ST=KyungGi-Do/O=Samsung Elec./CN=OCSP Responder
-V      100313011918Z           0A      unknown /C=KR/ST=KyungGi-Do/O=Samsung Elec./CN=First certificate to test OCSP
-V      100313022703Z           0B      unknown /C=KR/ST=KyungGi-Do/O=Samsung Elec./CN=First certificate to test OCSP
-V      100313023759Z           0C      unknown /C=KR/ST=KyungGi-Do/O=Samsung Elec./CN=OCSP Responder
-V      100313023935Z           0D      unknown /C=KR/ST=KyungGi-Do/O=Samsung Elec./CN=First certificate to test OCSP
-V      190311031642Z           0E      unknown /C=KR/ST=KyungGi-Do/O=Samsung Elec./CN=Second Responder Certificate
-V      190311031818Z           0F      unknown /C=KR/ST=KyungGi-Do/O=Samsung Elec./CN=First Test Certificate
-V      190311032356Z           10      unknown /C=KR/ST=KyungGi-Do/O=Samsung Elec./CN=First certificate to test OCSP
-V      190311032410Z           11      unknown /C=KR/ST=KyungGi-Do/O=Samsung Elec./CN=First certificate to test OCSP
-V      190311032420Z           12      unknown /C=KR/ST=KyungGi-Do/O=Samsung Elec./CN=First certificate to test OCSP
-V      190311032430Z           13      unknown /C=KR/ST=KyungGi-Do/O=Samsung Elec./CN=First certificate to test OCSP
-V      190311032440Z           14      unknown /C=KR/ST=KyungGi-Do/O=Samsung Elec./CN=First certificate to test OCSP
-V      100314113542Z           15      unknown /C=KR/ST=KyungGi-Do/O=Samsung Elec./CN=OCSP Responder
-V      100314134812Z           16      unknown /C=KR/ST=KyungGi-Do/O=Samsung Elec./CN=First certificate to test OCSP
-V      100316053643Z           17      unknown /C=KR/ST=KyungGi-Do/O=Samsung Elec./CN=First certificate to test OCSP
-V      100316053834Z           18      unknown /C=KR/ST=KyungGi-Do/O=Samsung Elec./CN=First certificate to test OCSP
-V      100316061833Z           19      unknown /C=KR/ST=KyungGi-Do/O=Samsung Elec./CN=Second Responder Certificate
-V      100316114226Z           1A      unknown /C=KR/ST=KyungGi-Do/O=Samsung Elec./CN=OCSP Responder
-V      100316115653Z           1B      unknown /C=KR/ST=KyungGi-Do/O=Samsung Elec./CN=OCSP Responder
-V      100316121050Z           1C      unknown /C=KR/ST=KyungGi-Do/O=Samsung Elec./CN=OCSP Responder
-V      100316121256Z           1D      unknown /C=KR/ST=KyungGi-Do/O=Samsung Elec./CN=OCSP Responder
-V      100316121311Z           1E      unknown /C=KR/ST=KyungGi-Do/O=Samsung Elec./CN=OCSP Responder
-V      100316121809Z           1F      unknown /C=KR/ST=KyungGi-Do/O=Samsung Elec./CN=OCSP Responder
-V      100316122916Z           20      unknown /C=KR/ST=KyungGi-Do/O=Samsung Elec./CN=OCSP Responder
-V      100316123325Z           21      unknown /C=KR/ST=KyungGi-Do/O=Samsung Elec./CN=OCSP Responder
-V      100316125036Z           22      unknown /C=KR/ST=KyungGi-Do/O=Samsung Elec./CN=OCSP Responder
-V      100316125902Z           23      unknown /C=KR/ST=KyungGi-Do/O=Samsung Elec./CN=OCSP Responder
-V      100316125924Z           24      unknown /C=KR/ST=KyungGi-Do/O=Samsung Elec./CN=OCSP Responder
-V      100316125941Z           25      unknown /C=KR/ST=KyungGi-Do/O=Samsung Elec./CN=OCSP Responder
-V      100316140429Z           26      unknown /C=KR/ST=KyungGi-Do/O=Samsung Elec./CN=Responder certificate with nocheck ext. field
-V      190314230611Z           27      unknown /C=KR/ST=KyungGi-Do/O=Samsung Elec./CN=Responder certificate with nocheck ext. field
-V      190314230854Z           28      unknown /C=KR/ST=KyungGi-Do/O=Samsung Elec./CN=OCSP Responder's certificate with delegation
-V      190314233211Z           29      unknown /C=KR/ST=KyungGi-Do/O=Samsung Elec./CN=Seventh OCSP Client certificate
-V      100324064920Z           2A      unknown /C=KR/ST=KyungGi-Do/O=Samsung Elec./CN=Cert Chain 1
-V      100324070428Z           2B      unknown /C=KR/ST=KyungGi-Do/O=Samsung Elec./CN=Cert Chain 1
-V      100324070457Z           2C      unknown /C=KR/ST=KyungGi-Do/O=Samsung Elec./CN=Cert Chain 1
-V      100324070709Z           2D      unknown /C=KR/ST=KyungGi-Do/O=Samsung Elec./CN=Cert Chain 1
-V      100324070746Z           2E      unknown /C=KR/ST=KyungGi-Do/O=Samsung Elec./CN=Cert Chain 1
-V      100324070944Z           2F      unknown /C=KR/ST=KyungGi-Do/O=Samsung Elec./CN=Cert Chain 2
-V      100324070946Z           30      unknown /C=KR/ST=KyungGi-Do/O=Samsung Elec./CN=Cert Chain 3
-V      100324070947Z           31      unknown /C=KR/ST=KyungGi-Do/O=Samsung Elec./CN=Cert Chain 4
-V      100324070948Z           32      unknown /C=KR/ST=KyungGi-Do/O=Samsung Elec./CN=Cert Chain 5
-V      100324070951Z           33      unknown /C=KR/ST=KyungGi-Do/O=Samsung Elec./CN=Cert Chain 6
-V      100324070953Z           34      unknown /C=KR/ST=KyungGi-Do/O=Samsung Elec./CN=Cert Chain 7
-V      100324070954Z           35      unknown /C=KR/ST=KyungGi-Do/O=Samsung Elec./CN=Cert Chain 8
-V      100324070955Z           36      unknown /C=KR/ST=KyungGi-Do/O=Samsung Elec./CN=Cert Chain 9
-V      100324070956Z           37      unknown /C=KR/ST=KyungGi-Do/O=Samsung Elec./CN=Cert Chain 10
-V      100324072145Z           38      unknown /C=KR/ST=KyungGi-Do/O=Samsung Elec./CN=Cert Chain No AIA 2
-V      100324072147Z           39      unknown /C=KR/ST=KyungGi-Do/O=Samsung Elec./CN=Cert Chain No AIA 3
-V      100324072148Z           3A      unknown /C=KR/ST=KyungGi-Do/O=Samsung Elec./CN=Cert Chain No AIA 4
-V      100324072149Z           3B      unknown /C=KR/ST=KyungGi-Do/O=Samsung Elec./CN=Cert Chain No AIA 5
-V      100324072150Z           3C      unknown /C=KR/ST=KyungGi-Do/O=Samsung Elec./CN=Cert Chain No AIA 6
-V      100324072151Z           3D      unknown /C=KR/ST=KyungGi-Do/O=Samsung Elec./CN=Cert Chain No AIA 7
-V      100324072152Z           3E      unknown /C=KR/ST=KyungGi-Do/O=Samsung Elec./CN=Cert Chain No AIA 8
-V      100324072152Z           3F      unknown /C=KR/ST=KyungGi-Do/O=Samsung Elec./CN=Cert Chain No AIA 9
-V      100324072153Z           40      unknown /C=KR/ST=KyungGi-Do/O=Samsung Elec./CN=Cert Chain No AIA 10
diff --git a/tests/cert-svc/data/TestData/ssl/cert_chain/index.txt.attr b/tests/cert-svc/data/TestData/ssl/cert_chain/index.txt.attr
deleted file mode 100644 (file)
index 3a7e39e..0000000
+++ /dev/null
@@ -1 +0,0 @@
-unique_subject = no
diff --git a/tests/cert-svc/data/TestData/ssl/cert_chain/index.txt.attr.old b/tests/cert-svc/data/TestData/ssl/cert_chain/index.txt.attr.old
deleted file mode 100644 (file)
index 3a7e39e..0000000
+++ /dev/null
@@ -1 +0,0 @@
-unique_subject = no
diff --git a/tests/cert-svc/data/TestData/ssl/cert_chain/index.txt.old b/tests/cert-svc/data/TestData/ssl/cert_chain/index.txt.old
deleted file mode 100644 (file)
index 11a49e6..0000000
+++ /dev/null
@@ -1,63 +0,0 @@
-V      100306080002Z           01      unknown /C=KR/ST=KyungGi-Do/O=Samsung Elec./CN=OCSP Responder
-V      100309031315Z           02      unknown /C=KR/ST=KyungGi-Do/O=Samsung Elec./CN=Certificate for OCSP Client test - IP address as AIA
-V      100309060955Z           03      unknown /C=KR/ST=KyungGi-Do/O=Samsung Elec./CN=First certificate to test OCSP
-V      100309061108Z           04      unknown /C=KR/ST=KyungGi-Do/O=Samsung Elec./CN=First certificate to test OCSP
-V      100309061223Z           05      unknown /C=KR/ST=KyungGi-Do/O=Samsung Elec./CN=First certificate to test OCSP
-V      100310001031Z           06      unknown /C=KR/ST=KyungGi-Do/O=Samsung Elec./CN=OCSP Responder
-V      100310001451Z           07      unknown /C=KR/ST=KyungGi-Do/O=Samsung Elec./CN=OCSP Responder
-V      100310080409Z           08      unknown /C=KR/ST=KyungGi-Do/O=Samsung Elec./CN=First certificate to test OCSP
-V      100311104952Z           09      unknown /C=KR/ST=KyungGi-Do/O=Samsung Elec./CN=OCSP Responder
-V      100313011918Z           0A      unknown /C=KR/ST=KyungGi-Do/O=Samsung Elec./CN=First certificate to test OCSP
-V      100313022703Z           0B      unknown /C=KR/ST=KyungGi-Do/O=Samsung Elec./CN=First certificate to test OCSP
-V      100313023759Z           0C      unknown /C=KR/ST=KyungGi-Do/O=Samsung Elec./CN=OCSP Responder
-V      100313023935Z           0D      unknown /C=KR/ST=KyungGi-Do/O=Samsung Elec./CN=First certificate to test OCSP
-V      190311031642Z           0E      unknown /C=KR/ST=KyungGi-Do/O=Samsung Elec./CN=Second Responder Certificate
-V      190311031818Z           0F      unknown /C=KR/ST=KyungGi-Do/O=Samsung Elec./CN=First Test Certificate
-V      190311032356Z           10      unknown /C=KR/ST=KyungGi-Do/O=Samsung Elec./CN=First certificate to test OCSP
-V      190311032410Z           11      unknown /C=KR/ST=KyungGi-Do/O=Samsung Elec./CN=First certificate to test OCSP
-V      190311032420Z           12      unknown /C=KR/ST=KyungGi-Do/O=Samsung Elec./CN=First certificate to test OCSP
-V      190311032430Z           13      unknown /C=KR/ST=KyungGi-Do/O=Samsung Elec./CN=First certificate to test OCSP
-V      190311032440Z           14      unknown /C=KR/ST=KyungGi-Do/O=Samsung Elec./CN=First certificate to test OCSP
-V      100314113542Z           15      unknown /C=KR/ST=KyungGi-Do/O=Samsung Elec./CN=OCSP Responder
-V      100314134812Z           16      unknown /C=KR/ST=KyungGi-Do/O=Samsung Elec./CN=First certificate to test OCSP
-V      100316053643Z           17      unknown /C=KR/ST=KyungGi-Do/O=Samsung Elec./CN=First certificate to test OCSP
-V      100316053834Z           18      unknown /C=KR/ST=KyungGi-Do/O=Samsung Elec./CN=First certificate to test OCSP
-V      100316061833Z           19      unknown /C=KR/ST=KyungGi-Do/O=Samsung Elec./CN=Second Responder Certificate
-V      100316114226Z           1A      unknown /C=KR/ST=KyungGi-Do/O=Samsung Elec./CN=OCSP Responder
-V      100316115653Z           1B      unknown /C=KR/ST=KyungGi-Do/O=Samsung Elec./CN=OCSP Responder
-V      100316121050Z           1C      unknown /C=KR/ST=KyungGi-Do/O=Samsung Elec./CN=OCSP Responder
-V      100316121256Z           1D      unknown /C=KR/ST=KyungGi-Do/O=Samsung Elec./CN=OCSP Responder
-V      100316121311Z           1E      unknown /C=KR/ST=KyungGi-Do/O=Samsung Elec./CN=OCSP Responder
-V      100316121809Z           1F      unknown /C=KR/ST=KyungGi-Do/O=Samsung Elec./CN=OCSP Responder
-V      100316122916Z           20      unknown /C=KR/ST=KyungGi-Do/O=Samsung Elec./CN=OCSP Responder
-V      100316123325Z           21      unknown /C=KR/ST=KyungGi-Do/O=Samsung Elec./CN=OCSP Responder
-V      100316125036Z           22      unknown /C=KR/ST=KyungGi-Do/O=Samsung Elec./CN=OCSP Responder
-V      100316125902Z           23      unknown /C=KR/ST=KyungGi-Do/O=Samsung Elec./CN=OCSP Responder
-V      100316125924Z           24      unknown /C=KR/ST=KyungGi-Do/O=Samsung Elec./CN=OCSP Responder
-V      100316125941Z           25      unknown /C=KR/ST=KyungGi-Do/O=Samsung Elec./CN=OCSP Responder
-V      100316140429Z           26      unknown /C=KR/ST=KyungGi-Do/O=Samsung Elec./CN=Responder certificate with nocheck ext. field
-V      190314230611Z           27      unknown /C=KR/ST=KyungGi-Do/O=Samsung Elec./CN=Responder certificate with nocheck ext. field
-V      190314230854Z           28      unknown /C=KR/ST=KyungGi-Do/O=Samsung Elec./CN=OCSP Responder's certificate with delegation
-V      190314233211Z           29      unknown /C=KR/ST=KyungGi-Do/O=Samsung Elec./CN=Seventh OCSP Client certificate
-V      100324064920Z           2A      unknown /C=KR/ST=KyungGi-Do/O=Samsung Elec./CN=Cert Chain 1
-V      100324070428Z           2B      unknown /C=KR/ST=KyungGi-Do/O=Samsung Elec./CN=Cert Chain 1
-V      100324070457Z           2C      unknown /C=KR/ST=KyungGi-Do/O=Samsung Elec./CN=Cert Chain 1
-V      100324070709Z           2D      unknown /C=KR/ST=KyungGi-Do/O=Samsung Elec./CN=Cert Chain 1
-V      100324070746Z           2E      unknown /C=KR/ST=KyungGi-Do/O=Samsung Elec./CN=Cert Chain 1
-V      100324070944Z           2F      unknown /C=KR/ST=KyungGi-Do/O=Samsung Elec./CN=Cert Chain 2
-V      100324070946Z           30      unknown /C=KR/ST=KyungGi-Do/O=Samsung Elec./CN=Cert Chain 3
-V      100324070947Z           31      unknown /C=KR/ST=KyungGi-Do/O=Samsung Elec./CN=Cert Chain 4
-V      100324070948Z           32      unknown /C=KR/ST=KyungGi-Do/O=Samsung Elec./CN=Cert Chain 5
-V      100324070951Z           33      unknown /C=KR/ST=KyungGi-Do/O=Samsung Elec./CN=Cert Chain 6
-V      100324070953Z           34      unknown /C=KR/ST=KyungGi-Do/O=Samsung Elec./CN=Cert Chain 7
-V      100324070954Z           35      unknown /C=KR/ST=KyungGi-Do/O=Samsung Elec./CN=Cert Chain 8
-V      100324070955Z           36      unknown /C=KR/ST=KyungGi-Do/O=Samsung Elec./CN=Cert Chain 9
-V      100324070956Z           37      unknown /C=KR/ST=KyungGi-Do/O=Samsung Elec./CN=Cert Chain 10
-V      100324072145Z           38      unknown /C=KR/ST=KyungGi-Do/O=Samsung Elec./CN=Cert Chain No AIA 2
-V      100324072147Z           39      unknown /C=KR/ST=KyungGi-Do/O=Samsung Elec./CN=Cert Chain No AIA 3
-V      100324072148Z           3A      unknown /C=KR/ST=KyungGi-Do/O=Samsung Elec./CN=Cert Chain No AIA 4
-V      100324072149Z           3B      unknown /C=KR/ST=KyungGi-Do/O=Samsung Elec./CN=Cert Chain No AIA 5
-V      100324072150Z           3C      unknown /C=KR/ST=KyungGi-Do/O=Samsung Elec./CN=Cert Chain No AIA 6
-V      100324072151Z           3D      unknown /C=KR/ST=KyungGi-Do/O=Samsung Elec./CN=Cert Chain No AIA 7
-V      100324072152Z           3E      unknown /C=KR/ST=KyungGi-Do/O=Samsung Elec./CN=Cert Chain No AIA 8
-V      100324072152Z           3F      unknown /C=KR/ST=KyungGi-Do/O=Samsung Elec./CN=Cert Chain No AIA 9
diff --git a/tests/cert-svc/data/TestData/ssl/cert_chain/newcerts/2F.pem b/tests/cert-svc/data/TestData/ssl/cert_chain/newcerts/2F.pem
deleted file mode 100644 (file)
index 13cb5c9..0000000
+++ /dev/null
@@ -1,52 +0,0 @@
-Certificate:
-    Data:
-        Version: 3 (0x2)
-        Serial Number: 47 (0x2f)
-        Signature Algorithm: sha1WithRSAEncryption
-        Issuer: C=KR, ST=KyungGi-Do, O=Samsung Elec., CN=Cert Chain 1
-        Validity
-            Not Before: Mar 24 07:09:44 2009 GMT
-            Not After : Mar 24 07:09:44 2010 GMT
-        Subject: C=KR, ST=KyungGi-Do, O=Samsung Elec., CN=Cert Chain 2
-        Subject Public Key Info:
-            Public Key Algorithm: rsaEncryption
-            RSA Public Key: (1024 bit)
-                Modulus (1024 bit):
-                    00:db:5e:a6:ab:60:f3:85:f6:0d:07:17:8c:ae:52:
-                    78:13:75:21:8c:d3:4a:20:d1:0d:8a:e2:34:95:ff:
-                    d2:31:29:e7:62:e9:ac:ce:5e:a6:dd:f7:a0:38:f3:
-                    96:b2:24:06:b6:c8:c6:06:57:ba:f0:f0:69:08:7a:
-                    c1:bf:87:cb:06:2b:7a:fc:81:26:36:81:46:04:9b:
-                    99:1f:1f:0e:36:05:af:7d:f2:57:fb:26:1d:a5:a3:
-                    5b:af:70:1d:6f:55:2b:d6:df:3b:dd:4b:51:1e:17:
-                    a6:89:94:5e:16:9c:08:fd:d9:5c:1e:ad:79:f1:5b:
-                    42:c2:37:59:73:d9:e5:b5:65
-                Exponent: 65537 (0x10001)
-        X509v3 extensions:
-            Authority Information Access: 
-                OCSP - URI:http://127.0.0.1:89/0002
-
-    Signature Algorithm: sha1WithRSAEncryption
-        c1:6c:a1:95:34:3e:32:74:35:1a:cb:76:24:cb:1b:e2:a0:ff:
-        6a:78:ef:8d:7f:dd:40:3f:39:85:aa:19:a9:e5:ce:ca:c4:2d:
-        b8:6c:6d:d4:e9:b1:a2:45:94:16:d7:8b:23:3a:d3:7f:6d:b0:
-        8a:7c:ed:2e:6c:e3:ba:dc:3c:25:4b:13:f4:28:a4:f9:87:b4:
-        69:b5:51:4d:da:d4:7e:9e:0f:99:6e:1a:5a:5f:b5:dc:f2:7b:
-        d5:8f:57:39:61:e3:a8:2e:bc:8a:b7:9d:d3:21:58:81:12:b9:
-        e5:bc:b9:fc:bd:39:2d:e8:8b:c0:49:bc:ba:16:ee:43:58:d9:
-        93:82
------BEGIN CERTIFICATE-----
-MIICUDCCAbmgAwIBAgIBLzANBgkqhkiG9w0BAQUFADBRMQswCQYDVQQGEwJLUjET
-MBEGA1UECBMKS3l1bmdHaS1EbzEWMBQGA1UEChMNU2Ftc3VuZyBFbGVjLjEVMBMG
-A1UEAxMMQ2VydCBDaGFpbiAxMB4XDTA5MDMyNDA3MDk0NFoXDTEwMDMyNDA3MDk0
-NFowUTELMAkGA1UEBhMCS1IxEzARBgNVBAgTCkt5dW5nR2ktRG8xFjAUBgNVBAoT
-DVNhbXN1bmcgRWxlYy4xFTATBgNVBAMTDENlcnQgQ2hhaW4gMjCBnzANBgkqhkiG
-9w0BAQEFAAOBjQAwgYkCgYEA216mq2DzhfYNBxeMrlJ4E3UhjNNKINENiuI0lf/S
-MSnnYumszl6m3fegOPOWsiQGtsjGBle68PBpCHrBv4fLBit6/IEmNoFGBJuZHx8O
-NgWvffJX+yYdpaNbr3Adb1Ur1t873UtRHhemiZReFpwI/dlcHq158VtCwjdZc9nl
-tWUCAwEAAaM4MDYwNAYIKwYBBQUHAQEEKDAmMCQGCCsGAQUFBzABhhhodHRwOi8v
-MTI3LjAuMC4xOjg5LzAwMDIwDQYJKoZIhvcNAQEFBQADgYEAwWyhlTQ+MnQ1Gst2
-JMsb4qD/anjvjX/dQD85haoZqeXOysQtuGxt1OmxokWUFteLIzrTf22winztLmzj
-utw8JUsT9Cik+Ye0abVRTdrUfp4PmW4aWl+13PJ71Y9XOWHjqC68ired0yFYgRK5
-5by5/L05LeiLwEm8uhbuQ1jZk4I=
------END CERTIFICATE-----
diff --git a/tests/cert-svc/data/TestData/ssl/cert_chain/newcerts/30.pem b/tests/cert-svc/data/TestData/ssl/cert_chain/newcerts/30.pem
deleted file mode 100644 (file)
index 96152fc..0000000
+++ /dev/null
@@ -1,52 +0,0 @@
-Certificate:
-    Data:
-        Version: 3 (0x2)
-        Serial Number: 48 (0x30)
-        Signature Algorithm: sha1WithRSAEncryption
-        Issuer: C=KR, ST=KyungGi-Do, O=Samsung Elec., CN=Cert Chain 2
-        Validity
-            Not Before: Mar 24 07:09:46 2009 GMT
-            Not After : Mar 24 07:09:46 2010 GMT
-        Subject: C=KR, ST=KyungGi-Do, O=Samsung Elec., CN=Cert Chain 3
-        Subject Public Key Info:
-            Public Key Algorithm: rsaEncryption
-            RSA Public Key: (1024 bit)
-                Modulus (1024 bit):
-                    00:c6:3d:c7:e5:0f:c7:59:28:aa:b6:fc:5e:d0:0d:
-                    95:6d:df:8c:82:42:6d:ef:a9:ad:51:ac:73:c1:e1:
-                    0a:a1:8e:80:6e:ac:0a:35:55:61:3d:44:32:46:d9:
-                    f7:03:4b:31:b0:e2:a2:b3:f8:91:4b:e3:5c:1d:5c:
-                    e0:48:51:51:9a:06:41:1a:e2:4c:45:5c:c0:2a:86:
-                    44:44:ce:01:02:56:e6:9b:4b:8d:5e:49:a7:f9:40:
-                    1b:00:93:91:d6:2e:24:9f:1f:04:59:eb:68:51:fe:
-                    74:ba:12:b0:b8:7d:7b:c2:95:ff:a6:a7:fd:de:8a:
-                    a1:69:fb:80:85:a5:a6:43:4f
-                Exponent: 65537 (0x10001)
-        X509v3 extensions:
-            Authority Information Access: 
-                OCSP - URI:http://127.0.0.1:89/0002
-
-    Signature Algorithm: sha1WithRSAEncryption
-        87:26:72:c1:5b:e8:04:3a:3f:c5:65:24:17:7a:e5:40:67:f3:
-        1e:cd:91:0c:75:bd:aa:14:61:d1:1a:2c:d7:11:21:bb:a3:70:
-        92:54:e5:3d:30:d1:b5:50:73:72:1b:72:e8:47:b0:af:a9:85:
-        f5:e4:d5:53:d5:db:4d:88:48:00:4c:69:32:ab:f2:a8:d0:57:
-        90:c6:24:fc:7b:77:de:6c:dd:c5:c9:6e:5b:21:15:73:4d:4d:
-        f7:a3:ca:31:60:84:24:e9:4d:21:fc:88:ce:13:99:35:76:4c:
-        e7:26:47:43:a7:eb:79:bd:7e:aa:80:48:ad:5c:46:ae:ab:74:
-        9e:29
------BEGIN CERTIFICATE-----
-MIICUDCCAbmgAwIBAgIBMDANBgkqhkiG9w0BAQUFADBRMQswCQYDVQQGEwJLUjET
-MBEGA1UECBMKS3l1bmdHaS1EbzEWMBQGA1UEChMNU2Ftc3VuZyBFbGVjLjEVMBMG
-A1UEAxMMQ2VydCBDaGFpbiAyMB4XDTA5MDMyNDA3MDk0NloXDTEwMDMyNDA3MDk0
-NlowUTELMAkGA1UEBhMCS1IxEzARBgNVBAgTCkt5dW5nR2ktRG8xFjAUBgNVBAoT
-DVNhbXN1bmcgRWxlYy4xFTATBgNVBAMTDENlcnQgQ2hhaW4gMzCBnzANBgkqhkiG
-9w0BAQEFAAOBjQAwgYkCgYEAxj3H5Q/HWSiqtvxe0A2Vbd+MgkJt76mtUaxzweEK
-oY6AbqwKNVVhPUQyRtn3A0sxsOKis/iRS+NcHVzgSFFRmgZBGuJMRVzAKoZERM4B
-Albmm0uNXkmn+UAbAJOR1i4knx8EWetoUf50uhKwuH17wpX/pqf93oqhafuAhaWm
-Q08CAwEAAaM4MDYwNAYIKwYBBQUHAQEEKDAmMCQGCCsGAQUFBzABhhhodHRwOi8v
-MTI3LjAuMC4xOjg5LzAwMDIwDQYJKoZIhvcNAQEFBQADgYEAhyZywVvoBDo/xWUk
-F3rlQGfzHs2RDHW9qhRh0Ros1xEhu6NwklTlPTDRtVBzchty6Eewr6mF9eTVU9Xb
-TYhIAExpMqvyqNBXkMYk/Ht33mzdxcluWyEVc01N96PKMWCEJOlNIfyIzhOZNXZM
-5yZHQ6freb1+qoBIrVxGrqt0nik=
------END CERTIFICATE-----
diff --git a/tests/cert-svc/data/TestData/ssl/cert_chain/newcerts/31.pem b/tests/cert-svc/data/TestData/ssl/cert_chain/newcerts/31.pem
deleted file mode 100644 (file)
index c13a05c..0000000
+++ /dev/null
@@ -1,52 +0,0 @@
-Certificate:
-    Data:
-        Version: 3 (0x2)
-        Serial Number: 49 (0x31)
-        Signature Algorithm: sha1WithRSAEncryption
-        Issuer: C=KR, ST=KyungGi-Do, O=Samsung Elec., CN=Cert Chain 3
-        Validity
-            Not Before: Mar 24 07:09:47 2009 GMT
-            Not After : Mar 24 07:09:47 2010 GMT
-        Subject: C=KR, ST=KyungGi-Do, O=Samsung Elec., CN=Cert Chain 4
-        Subject Public Key Info:
-            Public Key Algorithm: rsaEncryption
-            RSA Public Key: (1024 bit)
-                Modulus (1024 bit):
-                    00:ba:05:30:f6:65:6f:c6:e4:54:00:71:1c:85:6c:
-                    5e:5a:42:67:df:66:e2:a3:69:be:85:d9:84:c0:8b:
-                    1b:bd:4d:f2:ef:df:01:d3:65:33:f9:66:9a:08:79:
-                    e1:21:6e:8a:e6:3c:dc:96:f2:43:e9:32:68:9d:06:
-                    06:d7:fc:fb:d2:da:58:16:81:19:cc:d7:43:20:f4:
-                    85:c1:03:9b:34:c0:6c:7a:a1:19:5d:4f:41:8c:fb:
-                    74:7d:4c:86:c8:6f:f9:f2:c8:d4:38:cc:c0:44:0b:
-                    c0:b0:0d:48:2b:2c:c6:9f:92:21:2d:80:dd:4b:bd:
-                    da:e2:7d:ad:f5:5d:a7:a5:7f
-                Exponent: 65537 (0x10001)
-        X509v3 extensions:
-            Authority Information Access: 
-                OCSP - URI:http://127.0.0.1:89/0002
-
-    Signature Algorithm: sha1WithRSAEncryption
-        b6:bc:69:88:2c:7a:dd:69:8b:90:cf:a8:ec:33:db:ad:10:06:
-        ad:d2:94:ee:cf:d3:33:97:ac:60:38:e0:5a:a4:7b:d0:ca:a7:
-        5c:19:be:93:1c:61:85:14:08:f0:35:44:99:d4:7e:b0:fb:be:
-        4e:5c:18:a9:b9:b5:9a:91:4e:d1:e1:44:8d:ec:ca:4e:eb:6e:
-        17:27:76:0d:57:ad:cf:32:e4:a5:bc:b6:ad:22:e5:27:6d:11:
-        81:4d:4c:09:14:ea:11:7c:81:14:5e:fb:95:4d:f3:1d:5d:d0:
-        f9:b6:45:e7:c5:c6:40:21:64:60:2e:71:1f:32:dc:21:fe:5c:
-        45:da
------BEGIN CERTIFICATE-----
-MIICUDCCAbmgAwIBAgIBMTANBgkqhkiG9w0BAQUFADBRMQswCQYDVQQGEwJLUjET
-MBEGA1UECBMKS3l1bmdHaS1EbzEWMBQGA1UEChMNU2Ftc3VuZyBFbGVjLjEVMBMG
-A1UEAxMMQ2VydCBDaGFpbiAzMB4XDTA5MDMyNDA3MDk0N1oXDTEwMDMyNDA3MDk0
-N1owUTELMAkGA1UEBhMCS1IxEzARBgNVBAgTCkt5dW5nR2ktRG8xFjAUBgNVBAoT
-DVNhbXN1bmcgRWxlYy4xFTATBgNVBAMTDENlcnQgQ2hhaW4gNDCBnzANBgkqhkiG
-9w0BAQEFAAOBjQAwgYkCgYEAugUw9mVvxuRUAHEchWxeWkJn32bio2m+hdmEwIsb
-vU3y798B02Uz+WaaCHnhIW6K5jzclvJD6TJonQYG1/z70tpYFoEZzNdDIPSFwQOb
-NMBseqEZXU9BjPt0fUyGyG/58sjUOMzARAvAsA1IKyzGn5IhLYDdS73a4n2t9V2n
-pX8CAwEAAaM4MDYwNAYIKwYBBQUHAQEEKDAmMCQGCCsGAQUFBzABhhhodHRwOi8v
-MTI3LjAuMC4xOjg5LzAwMDIwDQYJKoZIhvcNAQEFBQADgYEAtrxpiCx63WmLkM+o
-7DPbrRAGrdKU7s/TM5esYDjgWqR70MqnXBm+kxxhhRQI8DVEmdR+sPu+TlwYqbm1
-mpFO0eFEjezKTutuFyd2DVetzzLkpby2rSLlJ20RgU1MCRTqEXyBFF77lU3zHV3Q
-+bZF58XGQCFkYC5xHzLcIf5cRdo=
------END CERTIFICATE-----
diff --git a/tests/cert-svc/data/TestData/ssl/cert_chain/newcerts/32.pem b/tests/cert-svc/data/TestData/ssl/cert_chain/newcerts/32.pem
deleted file mode 100644 (file)
index c5549bf..0000000
+++ /dev/null
@@ -1,52 +0,0 @@
-Certificate:
-    Data:
-        Version: 3 (0x2)
-        Serial Number: 50 (0x32)
-        Signature Algorithm: sha1WithRSAEncryption
-        Issuer: C=KR, ST=KyungGi-Do, O=Samsung Elec., CN=Cert Chain 4
-        Validity
-            Not Before: Mar 24 07:09:48 2009 GMT
-            Not After : Mar 24 07:09:48 2010 GMT
-        Subject: C=KR, ST=KyungGi-Do, O=Samsung Elec., CN=Cert Chain 5
-        Subject Public Key Info:
-            Public Key Algorithm: rsaEncryption
-            RSA Public Key: (1024 bit)
-                Modulus (1024 bit):
-                    00:af:66:e0:c1:2e:f9:75:ed:0b:27:b3:3a:c9:1d:
-                    9f:39:21:f9:14:ee:1c:a4:ee:c3:f0:24:a6:c7:43:
-                    dd:f9:03:d0:44:01:e5:19:e9:7b:26:65:3c:3d:3d:
-                    9a:b9:69:2a:00:46:0e:cb:20:98:c6:9d:37:7e:0c:
-                    90:a6:d7:b0:54:2b:4b:f3:3e:9b:19:33:a1:34:eb:
-                    62:e3:b9:bb:fe:cc:ca:3a:d9:fc:71:0a:65:ef:30:
-                    f3:f4:1b:55:f0:8b:b9:12:d8:50:25:25:ac:5d:63:
-                    9f:d1:c5:21:f2:5a:04:b1:2a:34:a0:12:60:0f:8a:
-                    3e:ab:a2:87:e5:5b:d6:48:bf
-                Exponent: 65537 (0x10001)
-        X509v3 extensions:
-            Authority Information Access: 
-                OCSP - URI:http://127.0.0.1:89/0002
-
-    Signature Algorithm: sha1WithRSAEncryption
-        9f:b3:eb:f1:0b:e7:fa:c3:f0:6a:3b:ba:67:c3:ae:48:51:63:
-        2c:7a:b9:c7:cd:d9:92:46:75:40:a5:a2:d6:ba:8e:a1:cb:c7:
-        fd:5d:98:f7:2a:e5:0a:06:49:42:8a:e0:09:b1:eb:18:9c:c9:
-        1b:e5:d1:4f:a0:0a:a6:14:68:54:7a:b7:9b:f6:44:c5:d8:a1:
-        21:99:c9:49:db:64:a5:53:48:5f:b6:d3:ba:fa:73:67:10:10:
-        5e:12:45:f8:27:a8:e0:fb:7c:16:73:fb:98:e1:3e:35:f3:de:
-        7c:b7:1c:42:2d:d2:9b:8e:03:f5:5f:c7:2f:51:b1:ff:73:45:
-        d2:70
------BEGIN CERTIFICATE-----
-MIICUDCCAbmgAwIBAgIBMjANBgkqhkiG9w0BAQUFADBRMQswCQYDVQQGEwJLUjET
-MBEGA1UECBMKS3l1bmdHaS1EbzEWMBQGA1UEChMNU2Ftc3VuZyBFbGVjLjEVMBMG
-A1UEAxMMQ2VydCBDaGFpbiA0MB4XDTA5MDMyNDA3MDk0OFoXDTEwMDMyNDA3MDk0
-OFowUTELMAkGA1UEBhMCS1IxEzARBgNVBAgTCkt5dW5nR2ktRG8xFjAUBgNVBAoT
-DVNhbXN1bmcgRWxlYy4xFTATBgNVBAMTDENlcnQgQ2hhaW4gNTCBnzANBgkqhkiG
-9w0BAQEFAAOBjQAwgYkCgYEAr2bgwS75de0LJ7M6yR2fOSH5FO4cpO7D8CSmx0Pd
-+QPQRAHlGel7JmU8PT2auWkqAEYOyyCYxp03fgyQptewVCtL8z6bGTOhNOti47m7
-/szKOtn8cQpl7zDz9BtV8Iu5EthQJSWsXWOf0cUh8loEsSo0oBJgD4o+q6KH5VvW
-SL8CAwEAAaM4MDYwNAYIKwYBBQUHAQEEKDAmMCQGCCsGAQUFBzABhhhodHRwOi8v
-MTI3LjAuMC4xOjg5LzAwMDIwDQYJKoZIhvcNAQEFBQADgYEAn7Pr8Qvn+sPwaju6
-Z8OuSFFjLHq5x83ZkkZ1QKWi1rqOocvH/V2Y9yrlCgZJQorgCbHrGJzJG+XRT6AK
-phRoVHq3m/ZExdihIZnJSdtkpVNIX7bTuvpzZxAQXhJF+Ceo4Pt8FnP7mOE+NfPe
-fLccQi3Sm44D9V/HL1Gx/3NF0nA=
------END CERTIFICATE-----
diff --git a/tests/cert-svc/data/TestData/ssl/cert_chain/newcerts/33.pem b/tests/cert-svc/data/TestData/ssl/cert_chain/newcerts/33.pem
deleted file mode 100644 (file)
index 08c010b..0000000
+++ /dev/null
@@ -1,52 +0,0 @@
-Certificate:
-    Data:
-        Version: 3 (0x2)
-        Serial Number: 51 (0x33)
-        Signature Algorithm: sha1WithRSAEncryption
-        Issuer: C=KR, ST=KyungGi-Do, O=Samsung Elec., CN=Cert Chain 5
-        Validity
-            Not Before: Mar 24 07:09:51 2009 GMT
-            Not After : Mar 24 07:09:51 2010 GMT
-        Subject: C=KR, ST=KyungGi-Do, O=Samsung Elec., CN=Cert Chain 6
-        Subject Public Key Info:
-            Public Key Algorithm: rsaEncryption
-            RSA Public Key: (1024 bit)
-                Modulus (1024 bit):
-                    00:ce:12:20:d1:14:60:01:47:aa:4c:66:1b:4c:4f:
-                    87:2f:ec:af:fc:11:41:bd:d9:98:7a:b8:e1:dd:59:
-                    d0:c0:9e:40:d2:b7:8b:c7:8a:65:ea:0d:0c:36:f1:
-                    e6:45:61:dc:6f:08:27:62:d0:78:1b:26:71:d4:fe:
-                    0b:9f:ea:86:1b:43:c7:08:d6:c5:eb:5b:11:c9:8b:
-                    83:8e:a7:05:0d:5c:6c:ce:ab:70:e0:7d:05:ea:06:
-                    39:f9:8c:94:56:56:37:62:b3:18:77:bd:e1:5b:53:
-                    a1:07:4d:c7:cc:c6:4c:2e:ef:aa:83:19:b5:ac:e3:
-                    72:2b:0d:72:7a:0a:ca:81:6f
-                Exponent: 65537 (0x10001)
-        X509v3 extensions:
-            Authority Information Access: 
-                OCSP - URI:http://127.0.0.1:89/0002
-
-    Signature Algorithm: sha1WithRSAEncryption
-        47:f3:03:ee:f0:fe:31:bb:01:47:ca:0e:69:65:a2:f8:4a:6f:
-        ca:6c:86:80:42:e3:87:49:22:b9:15:f0:da:b6:ca:d9:8b:7f:
-        f9:38:c0:72:d0:d1:b3:44:8d:95:5e:ab:e7:ad:37:34:ba:8b:
-        2f:11:64:b5:20:09:70:fe:cf:6d:3e:d3:7f:f7:f1:ae:31:74:
-        aa:ae:a7:0b:65:4e:e0:0b:80:87:25:d0:0c:bc:db:f5:ac:0c:
-        18:8e:4b:c2:42:88:e6:29:4f:2e:6e:df:72:f4:2f:27:39:b8:
-        e4:dc:64:1a:d7:c8:f3:f8:42:53:60:53:24:d7:38:75:50:bc:
-        d1:30
------BEGIN CERTIFICATE-----
-MIICUDCCAbmgAwIBAgIBMzANBgkqhkiG9w0BAQUFADBRMQswCQYDVQQGEwJLUjET
-MBEGA1UECBMKS3l1bmdHaS1EbzEWMBQGA1UEChMNU2Ftc3VuZyBFbGVjLjEVMBMG
-A1UEAxMMQ2VydCBDaGFpbiA1MB4XDTA5MDMyNDA3MDk1MVoXDTEwMDMyNDA3MDk1
-MVowUTELMAkGA1UEBhMCS1IxEzARBgNVBAgTCkt5dW5nR2ktRG8xFjAUBgNVBAoT
-DVNhbXN1bmcgRWxlYy4xFTATBgNVBAMTDENlcnQgQ2hhaW4gNjCBnzANBgkqhkiG
-9w0BAQEFAAOBjQAwgYkCgYEAzhIg0RRgAUeqTGYbTE+HL+yv/BFBvdmYerjh3VnQ
-wJ5A0reLx4pl6g0MNvHmRWHcbwgnYtB4GyZx1P4Ln+qGG0PHCNbF61sRyYuDjqcF
-DVxszqtw4H0F6gY5+YyUVlY3YrMYd73hW1OhB03HzMZMLu+qgxm1rONyKw1yegrK
-gW8CAwEAAaM4MDYwNAYIKwYBBQUHAQEEKDAmMCQGCCsGAQUFBzABhhhodHRwOi8v
-MTI3LjAuMC4xOjg5LzAwMDIwDQYJKoZIhvcNAQEFBQADgYEAR/MD7vD+MbsBR8oO
-aWWi+EpvymyGgELjh0kiuRXw2rbK2Yt/+TjActDRs0SNlV6r5603NLqLLxFktSAJ
-cP7PbT7Tf/fxrjF0qq6nC2VO4AuAhyXQDLzb9awMGI5LwkKI5ilPLm7fcvQvJzm4
-5NxkGtfI8/hCU2BTJNc4dVC80TA=
------END CERTIFICATE-----
diff --git a/tests/cert-svc/data/TestData/ssl/cert_chain/newcerts/34.pem b/tests/cert-svc/data/TestData/ssl/cert_chain/newcerts/34.pem
deleted file mode 100644 (file)
index f07ee6c..0000000
+++ /dev/null
@@ -1,52 +0,0 @@
-Certificate:
-    Data:
-        Version: 3 (0x2)
-        Serial Number: 52 (0x34)
-        Signature Algorithm: sha1WithRSAEncryption
-        Issuer: C=KR, ST=KyungGi-Do, O=Samsung Elec., CN=Cert Chain 6
-        Validity
-            Not Before: Mar 24 07:09:53 2009 GMT
-            Not After : Mar 24 07:09:53 2010 GMT
-        Subject: C=KR, ST=KyungGi-Do, O=Samsung Elec., CN=Cert Chain 7
-        Subject Public Key Info:
-            Public Key Algorithm: rsaEncryption
-            RSA Public Key: (1024 bit)
-                Modulus (1024 bit):
-                    00:d5:c2:18:f3:fc:0a:3c:4e:f7:2b:c6:fd:1f:d7:
-                    13:bb:35:74:6e:ca:5d:ab:09:67:21:d0:ed:a7:e8:
-                    99:7e:79:52:b8:32:3d:2b:5f:1b:78:0e:aa:2b:b6:
-                    e7:03:ec:f5:7e:b4:54:3b:87:d9:02:1e:c7:e6:04:
-                    cf:27:7b:36:e6:2f:8e:8e:94:f7:5b:c6:6e:51:2c:
-                    de:17:da:04:45:ea:31:d0:95:c4:50:3c:16:8e:21:
-                    c7:f0:0e:b5:86:c8:58:48:a6:0d:4d:a2:a6:8c:81:
-                    7a:67:89:43:56:1c:ca:e3:69:8a:08:05:57:b7:6d:
-                    03:c2:04:af:7b:61:ee:84:27
-                Exponent: 65537 (0x10001)
-        X509v3 extensions:
-            Authority Information Access: 
-                OCSP - URI:http://127.0.0.1:89/0002
-
-    Signature Algorithm: sha1WithRSAEncryption
-        49:e7:f8:dc:ad:06:43:cb:d8:67:e6:e7:c0:7e:dd:a8:21:cd:
-        b9:53:a8:d8:7a:24:df:dc:9c:bb:55:1d:d8:ca:44:0b:0f:fb:
-        f8:db:61:2a:97:79:21:e6:96:2a:8c:76:c4:eb:ad:77:45:53:
-        f5:e2:de:29:7d:29:88:3a:d4:a3:a8:5a:dc:37:24:43:d1:57:
-        a5:5b:0b:3e:05:2d:0a:1a:0e:18:37:50:cc:36:54:85:37:28:
-        50:c8:61:c7:94:48:a0:60:ab:68:b0:b2:a8:61:14:5e:4a:dd:
-        04:8a:1a:69:01:45:e2:c6:e2:cb:15:e6:01:49:98:3c:5a:5d:
-        2a:d4
------BEGIN CERTIFICATE-----
-MIICUDCCAbmgAwIBAgIBNDANBgkqhkiG9w0BAQUFADBRMQswCQYDVQQGEwJLUjET
-MBEGA1UECBMKS3l1bmdHaS1EbzEWMBQGA1UEChMNU2Ftc3VuZyBFbGVjLjEVMBMG
-A1UEAxMMQ2VydCBDaGFpbiA2MB4XDTA5MDMyNDA3MDk1M1oXDTEwMDMyNDA3MDk1
-M1owUTELMAkGA1UEBhMCS1IxEzARBgNVBAgTCkt5dW5nR2ktRG8xFjAUBgNVBAoT
-DVNhbXN1bmcgRWxlYy4xFTATBgNVBAMTDENlcnQgQ2hhaW4gNzCBnzANBgkqhkiG
-9w0BAQEFAAOBjQAwgYkCgYEA1cIY8/wKPE73K8b9H9cTuzV0bspdqwlnIdDtp+iZ
-fnlSuDI9K18beA6qK7bnA+z1frRUO4fZAh7H5gTPJ3s25i+OjpT3W8ZuUSzeF9oE
-Reox0JXEUDwWjiHH8A61hshYSKYNTaKmjIF6Z4lDVhzK42mKCAVXt20DwgSve2Hu
-hCcCAwEAAaM4MDYwNAYIKwYBBQUHAQEEKDAmMCQGCCsGAQUFBzABhhhodHRwOi8v
-MTI3LjAuMC4xOjg5LzAwMDIwDQYJKoZIhvcNAQEFBQADgYEASef43K0GQ8vYZ+bn
-wH7dqCHNuVOo2Hok39ycu1Ud2MpECw/7+NthKpd5IeaWKox2xOutd0VT9eLeKX0p
-iDrUo6ha3DckQ9FXpVsLPgUtChoOGDdQzDZUhTcoUMhhx5RIoGCraLCyqGEUXkrd
-BIoaaQFF4sbiyxXmAUmYPFpdKtQ=
------END CERTIFICATE-----
diff --git a/tests/cert-svc/data/TestData/ssl/cert_chain/newcerts/35.pem b/tests/cert-svc/data/TestData/ssl/cert_chain/newcerts/35.pem
deleted file mode 100644 (file)
index 60073f6..0000000
+++ /dev/null
@@ -1,52 +0,0 @@
-Certificate:
-    Data:
-        Version: 3 (0x2)
-        Serial Number: 53 (0x35)
-        Signature Algorithm: sha1WithRSAEncryption
-        Issuer: C=KR, ST=KyungGi-Do, O=Samsung Elec., CN=Cert Chain 7
-        Validity
-            Not Before: Mar 24 07:09:54 2009 GMT
-            Not After : Mar 24 07:09:54 2010 GMT
-        Subject: C=KR, ST=KyungGi-Do, O=Samsung Elec., CN=Cert Chain 8
-        Subject Public Key Info:
-            Public Key Algorithm: rsaEncryption
-            RSA Public Key: (1024 bit)
-                Modulus (1024 bit):
-                    00:e4:e0:c4:dc:86:00:94:69:b1:d5:88:72:c8:c2:
-                    52:c0:56:62:0e:f6:80:a2:ef:8e:68:f9:da:d9:85:
-                    01:59:04:5e:f7:fc:23:16:dc:ff:2d:52:0a:8c:81:
-                    96:fa:24:1d:4b:89:60:2c:25:1a:eb:4e:a6:21:c5:
-                    1f:5b:87:d6:65:8c:d7:e1:a2:55:67:7e:01:7c:28:
-                    84:d7:23:56:f4:f8:e1:9c:a4:1f:74:fe:6b:c0:14:
-                    cc:fd:05:7b:ba:f6:b0:e3:f5:7e:46:ce:70:39:5c:
-                    93:43:01:f8:ad:38:a6:0c:71:60:9e:0b:0d:bf:42:
-                    6c:d3:9e:21:4c:55:ed:74:73
-                Exponent: 65537 (0x10001)
-        X509v3 extensions:
-            Authority Information Access: 
-                OCSP - URI:http://127.0.0.1:89/0002
-
-    Signature Algorithm: sha1WithRSAEncryption
-        be:aa:0c:d9:b6:cc:d6:e1:47:ca:cb:6a:36:5e:67:43:f6:8e:
-        ab:d9:2a:5c:9d:e0:74:f5:55:70:80:8e:2f:f8:16:4c:2d:4c:
-        9c:94:80:6b:6b:c0:7a:e4:0f:f4:60:64:10:ba:93:f5:2a:39:
-        0f:5f:06:8a:d4:75:5b:b2:c4:92:25:ad:21:fa:98:75:54:48:
-        b5:d6:80:c6:9d:96:af:bf:fd:f4:57:80:cf:03:5c:dc:2b:b3:
-        f6:a2:7a:8e:8d:a5:01:92:53:e4:b7:77:99:1b:71:04:97:66:
-        57:a1:28:9d:3b:f8:ac:2e:15:18:17:2e:5d:0b:47:49:3b:65:
-        88:fc
------BEGIN CERTIFICATE-----
-MIICUDCCAbmgAwIBAgIBNTANBgkqhkiG9w0BAQUFADBRMQswCQYDVQQGEwJLUjET
-MBEGA1UECBMKS3l1bmdHaS1EbzEWMBQGA1UEChMNU2Ftc3VuZyBFbGVjLjEVMBMG
-A1UEAxMMQ2VydCBDaGFpbiA3MB4XDTA5MDMyNDA3MDk1NFoXDTEwMDMyNDA3MDk1
-NFowUTELMAkGA1UEBhMCS1IxEzARBgNVBAgTCkt5dW5nR2ktRG8xFjAUBgNVBAoT
-DVNhbXN1bmcgRWxlYy4xFTATBgNVBAMTDENlcnQgQ2hhaW4gODCBnzANBgkqhkiG
-9w0BAQEFAAOBjQAwgYkCgYEA5ODE3IYAlGmx1YhyyMJSwFZiDvaAou+OaPna2YUB
-WQRe9/wjFtz/LVIKjIGW+iQdS4lgLCUa606mIcUfW4fWZYzX4aJVZ34BfCiE1yNW
-9PjhnKQfdP5rwBTM/QV7uvaw4/V+Rs5wOVyTQwH4rTimDHFgngsNv0Js054hTFXt
-dHMCAwEAAaM4MDYwNAYIKwYBBQUHAQEEKDAmMCQGCCsGAQUFBzABhhhodHRwOi8v
-MTI3LjAuMC4xOjg5LzAwMDIwDQYJKoZIhvcNAQEFBQADgYEAvqoM2bbM1uFHystq
-Nl5nQ/aOq9kqXJ3gdPVVcICOL/gWTC1MnJSAa2vAeuQP9GBkELqT9So5D18GitR1
-W7LEkiWtIfqYdVRItdaAxp2Wr7/99FeAzwNc3Cuz9qJ6jo2lAZJT5Ld3mRtxBJdm
-V6EonTv4rC4VGBcuXQtHSTtliPw=
------END CERTIFICATE-----
diff --git a/tests/cert-svc/data/TestData/ssl/cert_chain/newcerts/36.pem b/tests/cert-svc/data/TestData/ssl/cert_chain/newcerts/36.pem
deleted file mode 100644 (file)
index 7df26a8..0000000
+++ /dev/null
@@ -1,52 +0,0 @@
-Certificate:
-    Data:
-        Version: 3 (0x2)
-        Serial Number: 54 (0x36)
-        Signature Algorithm: sha1WithRSAEncryption
-        Issuer: C=KR, ST=KyungGi-Do, O=Samsung Elec., CN=Cert Chain 8
-        Validity
-            Not Before: Mar 24 07:09:55 2009 GMT
-            Not After : Mar 24 07:09:55 2010 GMT
-        Subject: C=KR, ST=KyungGi-Do, O=Samsung Elec., CN=Cert Chain 9
-        Subject Public Key Info:
-            Public Key Algorithm: rsaEncryption
-            RSA Public Key: (1024 bit)
-                Modulus (1024 bit):
-                    00:e1:c8:32:42:5f:a8:53:b3:22:a3:58:9a:7c:1e:
-                    fe:33:12:64:5c:3e:45:18:5b:23:ac:79:43:45:d7:
-                    64:6f:7c:e4:a3:95:5c:f9:e1:c4:b1:63:43:9c:7e:
-                    10:81:aa:7f:de:b5:b7:85:a6:b5:60:39:25:22:48:
-                    64:c5:54:1a:6e:b1:22:90:f3:8c:17:85:c2:be:1c:
-                    81:aa:a6:7b:14:b4:7a:13:b2:94:72:42:ef:77:cc:
-                    30:a4:c8:5c:80:b2:47:2e:f7:db:53:ea:ae:63:5a:
-                    19:20:30:2b:f1:d0:a3:0e:0d:4c:c0:c9:7e:9b:b5:
-                    0b:db:51:6a:e7:0e:74:69:ef
-                Exponent: 65537 (0x10001)
-        X509v3 extensions:
-            Authority Information Access: 
-                OCSP - URI:http://127.0.0.1:89/0002
-
-    Signature Algorithm: sha1WithRSAEncryption
-        d9:93:84:69:52:8d:5a:7e:c4:b7:04:54:a0:47:32:04:c7:be:
-        7b:94:1b:f9:b6:c5:88:84:a1:b4:22:4f:3b:28:ae:29:90:f1:
-        e4:25:f0:b9:e6:a0:dd:0e:0c:15:a9:6c:e4:8a:fa:a0:42:a7:
-        f9:4e:b7:0b:53:c1:ab:cb:a7:83:4c:0b:03:f0:64:95:75:5f:
-        09:dc:2c:a2:19:d6:51:e8:e4:86:7f:50:60:69:01:64:a5:fd:
-        0c:bb:0e:a0:cb:63:9c:b5:2c:22:63:f6:a4:e2:b1:9b:62:a5:
-        8c:c7:e5:a3:93:d8:18:6a:f2:95:b6:53:6a:8d:be:b0:ce:fa:
-        e9:71
------BEGIN CERTIFICATE-----
-MIICUDCCAbmgAwIBAgIBNjANBgkqhkiG9w0BAQUFADBRMQswCQYDVQQGEwJLUjET
-MBEGA1UECBMKS3l1bmdHaS1EbzEWMBQGA1UEChMNU2Ftc3VuZyBFbGVjLjEVMBMG
-A1UEAxMMQ2VydCBDaGFpbiA4MB4XDTA5MDMyNDA3MDk1NVoXDTEwMDMyNDA3MDk1
-NVowUTELMAkGA1UEBhMCS1IxEzARBgNVBAgTCkt5dW5nR2ktRG8xFjAUBgNVBAoT
-DVNhbXN1bmcgRWxlYy4xFTATBgNVBAMTDENlcnQgQ2hhaW4gOTCBnzANBgkqhkiG
-9w0BAQEFAAOBjQAwgYkCgYEA4cgyQl+oU7Mio1iafB7+MxJkXD5FGFsjrHlDRddk
-b3zko5Vc+eHEsWNDnH4Qgap/3rW3haa1YDklIkhkxVQabrEikPOMF4XCvhyBqqZ7
-FLR6E7KUckLvd8wwpMhcgLJHLvfbU+quY1oZIDAr8dCjDg1MwMl+m7UL21Fq5w50
-ae8CAwEAAaM4MDYwNAYIKwYBBQUHAQEEKDAmMCQGCCsGAQUFBzABhhhodHRwOi8v
-MTI3LjAuMC4xOjg5LzAwMDIwDQYJKoZIhvcNAQEFBQADgYEA2ZOEaVKNWn7EtwRU
-oEcyBMe+e5Qb+bbFiIShtCJPOyiuKZDx5CXwueag3Q4MFals5Ir6oEKn+U63C1PB
-q8ung0wLA/BklXVfCdwsohnWUejkhn9QYGkBZKX9DLsOoMtjnLUsImP2pOKxm2Kl
-jMflo5PYGGrylbZTao2+sM766XE=
------END CERTIFICATE-----
diff --git a/tests/cert-svc/data/TestData/ssl/cert_chain/newcerts/37.pem b/tests/cert-svc/data/TestData/ssl/cert_chain/newcerts/37.pem
deleted file mode 100644 (file)
index 12a7b64..0000000
+++ /dev/null
@@ -1,52 +0,0 @@
-Certificate:
-    Data:
-        Version: 3 (0x2)
-        Serial Number: 55 (0x37)
-        Signature Algorithm: sha1WithRSAEncryption
-        Issuer: C=KR, ST=KyungGi-Do, O=Samsung Elec., CN=Cert Chain 9
-        Validity
-            Not Before: Mar 24 07:09:56 2009 GMT
-            Not After : Mar 24 07:09:56 2010 GMT
-        Subject: C=KR, ST=KyungGi-Do, O=Samsung Elec., CN=Cert Chain 10
-        Subject Public Key Info:
-            Public Key Algorithm: rsaEncryption
-            RSA Public Key: (1024 bit)
-                Modulus (1024 bit):
-                    00:da:7a:ea:e9:4d:f1:46:ae:bd:f9:0c:81:de:fd:
-                    f4:cf:13:fc:74:54:1b:f7:fb:d3:b0:f6:ae:32:fe:
-                    17:0d:df:91:e2:77:c7:b7:64:8b:53:48:b2:50:c6:
-                    10:d3:4d:c2:c2:9e:53:d1:af:3b:fe:d0:c3:64:bf:
-                    95:48:a3:5e:85:29:f7:c3:19:4c:54:09:7a:42:81:
-                    bc:b9:f0:63:eb:0a:90:3c:9d:fa:25:b8:ee:80:50:
-                    c1:b9:c2:8d:28:eb:a4:1b:88:b5:2f:0c:30:04:8c:
-                    97:a8:a9:9a:27:7c:5a:79:03:49:fc:ec:81:39:61:
-                    1c:52:9b:97:9a:f0:54:db:2f
-                Exponent: 65537 (0x10001)
-        X509v3 extensions:
-            Authority Information Access: 
-                OCSP - URI:http://127.0.0.1:89/0002
-
-    Signature Algorithm: sha1WithRSAEncryption
-        81:7f:37:9d:a6:8f:7d:f1:03:b0:78:a3:44:7e:c1:31:27:f0:
-        73:51:eb:55:76:3f:1b:a5:59:0f:5b:ab:2f:ff:72:9d:8a:46:
-        af:30:a4:c1:6a:25:1c:04:b9:22:14:b8:39:52:f1:4f:f0:24:
-        eb:f0:5f:62:79:24:c2:ec:84:92:87:5d:9c:05:87:e8:b1:71:
-        a7:30:fc:03:2d:9f:c5:3b:7c:58:7e:7a:86:75:50:ad:14:5e:
-        f9:69:c4:49:1e:58:33:da:5f:eb:bc:c5:ac:10:2a:dd:3c:87:
-        1c:0f:aa:37:93:c0:68:4c:3d:b4:0c:30:78:63:af:8a:f4:80:
-        e8:8e
------BEGIN CERTIFICATE-----
-MIICUTCCAbqgAwIBAgIBNzANBgkqhkiG9w0BAQUFADBRMQswCQYDVQQGEwJLUjET
-MBEGA1UECBMKS3l1bmdHaS1EbzEWMBQGA1UEChMNU2Ftc3VuZyBFbGVjLjEVMBMG
-A1UEAxMMQ2VydCBDaGFpbiA5MB4XDTA5MDMyNDA3MDk1NloXDTEwMDMyNDA3MDk1
-NlowUjELMAkGA1UEBhMCS1IxEzARBgNVBAgTCkt5dW5nR2ktRG8xFjAUBgNVBAoT
-DVNhbXN1bmcgRWxlYy4xFjAUBgNVBAMTDUNlcnQgQ2hhaW4gMTAwgZ8wDQYJKoZI
-hvcNAQEBBQADgY0AMIGJAoGBANp66ulN8UauvfkMgd799M8T/HRUG/f707D2rjL+
-Fw3fkeJ3x7dki1NIslDGENNNwsKeU9GvO/7Qw2S/lUijXoUp98MZTFQJekKBvLnw
-Y+sKkDyd+iW47oBQwbnCjSjrpBuItS8MMASMl6ipmid8WnkDSfzsgTlhHFKbl5rw
-VNsvAgMBAAGjODA2MDQGCCsGAQUFBwEBBCgwJjAkBggrBgEFBQcwAYYYaHR0cDov
-LzEyNy4wLjAuMTo4OS8wMDAyMA0GCSqGSIb3DQEBBQUAA4GBAIF/N52mj33xA7B4
-o0R+wTEn8HNR61V2PxulWQ9bqy//cp2KRq8wpMFqJRwEuSIUuDlS8U/wJOvwX2J5
-JMLshJKHXZwFh+ixcacw/AMtn8U7fFh+eoZ1UK0UXvlpxEkeWDPaX+u8xawQKt08
-hxwPqjeTwGhMPbQMMHhjr4r0gOiO
------END CERTIFICATE-----
diff --git a/tests/cert-svc/data/TestData/ssl/cert_chain/newcerts/38.pem b/tests/cert-svc/data/TestData/ssl/cert_chain/newcerts/38.pem
deleted file mode 100644 (file)
index 06691f5..0000000
+++ /dev/null
@@ -1,52 +0,0 @@
-Certificate:
-    Data:
-        Version: 3 (0x2)
-        Serial Number: 56 (0x38)
-        Signature Algorithm: sha1WithRSAEncryption
-        Issuer: C=KR, ST=KyungGi-Do, O=Samsung Elec., CN=Cert Chain No AIA 1
-        Validity
-            Not Before: Mar 24 07:21:45 2009 GMT
-            Not After : Mar 24 07:21:45 2010 GMT
-        Subject: C=KR, ST=KyungGi-Do, O=Samsung Elec., CN=Cert Chain No AIA 2
-        Subject Public Key Info:
-            Public Key Algorithm: rsaEncryption
-            RSA Public Key: (1024 bit)
-                Modulus (1024 bit):
-                    00:d3:39:a7:a4:19:61:28:35:4f:f0:9b:f0:b8:8d:
-                    55:e9:da:4d:35:9e:3d:6c:c0:30:b1:8b:c0:50:a4:
-                    08:6a:d6:e3:fa:f3:f1:cb:9f:14:2e:b6:cb:d2:17:
-                    3d:bd:8b:31:8e:c8:95:13:f0:fc:03:42:30:02:98:
-                    6c:ee:2a:e9:c1:2a:9f:79:e0:09:35:a7:6e:bd:70:
-                    62:ae:09:53:54:a9:62:36:23:b7:15:98:01:c6:c5:
-                    52:47:a1:8c:c1:de:7c:4d:86:38:d0:12:24:57:76:
-                    99:ba:1f:23:62:20:a5:79:12:a2:9a:90:b8:aa:50:
-                    96:59:16:ed:29:74:9d:67:53
-                Exponent: 65537 (0x10001)
-        X509v3 extensions:
-            Authority Information Access: 
-                OCSP - URI:http://127.0.0.1:89/0002
-
-    Signature Algorithm: sha1WithRSAEncryption
-        29:8e:68:80:e0:f2:ce:29:e5:70:95:67:0d:51:4a:a8:a0:9c:
-        9f:4f:2f:3a:83:40:67:6e:01:cb:21:bf:4a:a7:16:3d:df:f8:
-        2b:ca:6d:86:92:cc:46:99:99:b5:11:09:4d:25:c7:15:5f:64:
-        66:1a:18:69:ce:37:86:96:ab:e6:2e:3d:63:a3:cf:14:91:3b:
-        19:fc:79:a7:37:60:eb:51:12:3f:4d:3b:07:6c:0e:ae:69:2c:
-        07:4d:6a:ca:5d:97:e5:f0:24:96:7e:fa:f3:83:ec:53:7a:b1:
-        53:cb:42:c5:15:b0:04:9f:36:5c:d0:d5:92:49:38:e5:a5:ef:
-        91:d2
------BEGIN CERTIFICATE-----
-MIICXjCCAcegAwIBAgIBODANBgkqhkiG9w0BAQUFADBYMQswCQYDVQQGEwJLUjET
-MBEGA1UECBMKS3l1bmdHaS1EbzEWMBQGA1UEChMNU2Ftc3VuZyBFbGVjLjEcMBoG
-A1UEAxMTQ2VydCBDaGFpbiBObyBBSUEgMTAeFw0wOTAzMjQwNzIxNDVaFw0xMDAz
-MjQwNzIxNDVaMFgxCzAJBgNVBAYTAktSMRMwEQYDVQQIEwpLeXVuZ0dpLURvMRYw
-FAYDVQQKEw1TYW1zdW5nIEVsZWMuMRwwGgYDVQQDExNDZXJ0IENoYWluIE5vIEFJ
-QSAyMIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQDTOaekGWEoNU/wm/C4jVXp
-2k01nj1swDCxi8BQpAhq1uP68/HLnxQutsvSFz29izGOyJUT8PwDQjACmGzuKunB
-Kp954Ak1p269cGKuCVNUqWI2I7cVmAHGxVJHoYzB3nxNhjjQEiRXdpm6HyNiIKV5
-EqKakLiqUJZZFu0pdJ1nUwIDAQABozgwNjA0BggrBgEFBQcBAQQoMCYwJAYIKwYB
-BQUHMAGGGGh0dHA6Ly8xMjcuMC4wLjE6ODkvMDAwMjANBgkqhkiG9w0BAQUFAAOB
-gQApjmiA4PLOKeVwlWcNUUqooJyfTy86g0BnbgHLIb9KpxY93/grym2GksxGmZm1
-EQlNJccVX2RmGhhpzjeGlqvmLj1jo88UkTsZ/HmnN2DrURI/TTsHbA6uaSwHTWrK
-XZfl8CSWfvrzg+xTerFTy0LFFbAEnzZc0NWSSTjlpe+R0g==
------END CERTIFICATE-----
diff --git a/tests/cert-svc/data/TestData/ssl/cert_chain/newcerts/39.pem b/tests/cert-svc/data/TestData/ssl/cert_chain/newcerts/39.pem
deleted file mode 100644 (file)
index f37e1a2..0000000
+++ /dev/null
@@ -1,62 +0,0 @@
-Certificate:
-    Data:
-        Version: 3 (0x2)
-        Serial Number: 57 (0x39)
-        Signature Algorithm: sha1WithRSAEncryption
-        Issuer: C=KR, ST=KyungGi-Do, O=Samsung Elec., CN=Cert Chain No AIA 2
-        Validity
-            Not Before: Mar 24 07:21:47 2009 GMT
-            Not After : Mar 24 07:21:47 2010 GMT
-        Subject: C=KR, ST=KyungGi-Do, O=Samsung Elec., CN=Cert Chain No AIA 3
-        Subject Public Key Info:
-            Public Key Algorithm: rsaEncryption
-            RSA Public Key: (1024 bit)
-                Modulus (1024 bit):
-                    00:a3:84:57:22:7a:bf:2f:ec:a6:d3:c6:f2:e1:14:
-                    92:8e:9d:b1:5a:f2:6f:99:9f:53:08:d1:f9:ef:00:
-                    da:a7:2d:c3:64:6f:31:df:4c:49:20:06:88:92:d7:
-                    c6:ff:0c:99:49:d0:c5:57:bb:ea:87:4d:06:ac:68:
-                    35:6a:3e:23:6c:dd:2f:4e:7c:fc:9c:e6:d0:1d:65:
-                    e4:87:79:7e:d9:c0:1e:cd:7b:f5:81:bf:79:8a:d8:
-                    6e:94:22:f1:79:a6:dc:52:ea:ed:e6:f7:86:31:5d:
-                    b7:39:fc:cd:73:ed:0d:1f:f2:ca:79:ba:25:1e:f4:
-                    b9:6c:bc:28:08:a9:46:aa:1d
-                Exponent: 65537 (0x10001)
-        X509v3 extensions:
-            X509v3 Basic Constraints: 
-                CA:FALSE
-            Netscape Comment: 
-                OpenSSL Generated Certificate
-            X509v3 Subject Key Identifier: 
-                05:E8:B5:E4:89:7E:CD:72:28:E1:08:B5:B2:9F:8E:A2:13:2B:2C:A7
-            X509v3 Authority Key Identifier: 
-                DirName:/C=KR/ST=KyungGi-Do/O=Samsung Elec./CN=Cert Chain No AIA 1
-                serial:38
-
-    Signature Algorithm: sha1WithRSAEncryption
-        36:e5:af:2d:c4:bd:c1:16:27:74:f0:0a:a5:12:4c:da:d6:e2:
-        60:98:ee:3d:7a:d1:55:a0:ed:57:fd:6b:9b:fc:19:4b:f3:b2:
-        41:19:a7:6c:f7:15:63:68:18:09:6d:db:23:f9:e1:2a:d6:75:
-        e5:18:46:2b:82:57:4e:1a:f8:03:fa:3d:7c:aa:70:8e:17:25:
-        c6:b2:ab:ca:94:90:fd:2a:69:53:f5:11:81:68:06:f8:2d:5d:
-        92:39:b4:96:f0:d0:b5:03:c2:15:26:f4:e9:c0:9a:28:39:dd:
-        67:ea:a6:9f:27:44:69:2e:95:e0:a1:03:f6:3c:a1:f7:92:f4:
-        a2:b8
------BEGIN CERTIFICATE-----
-MIIC7jCCAlegAwIBAgIBOTANBgkqhkiG9w0BAQUFADBYMQswCQYDVQQGEwJLUjET
-MBEGA1UECBMKS3l1bmdHaS1EbzEWMBQGA1UEChMNU2Ftc3VuZyBFbGVjLjEcMBoG
-A1UEAxMTQ2VydCBDaGFpbiBObyBBSUEgMjAeFw0wOTAzMjQwNzIxNDdaFw0xMDAz
-MjQwNzIxNDdaMFgxCzAJBgNVBAYTAktSMRMwEQYDVQQIEwpLeXVuZ0dpLURvMRYw
-FAYDVQQKEw1TYW1zdW5nIEVsZWMuMRwwGgYDVQQDExNDZXJ0IENoYWluIE5vIEFJ
-QSAzMIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQCjhFcier8v7KbTxvLhFJKO
-nbFa8m+Zn1MI0fnvANqnLcNkbzHfTEkgBoiS18b/DJlJ0MVXu+qHTQasaDVqPiNs
-3S9OfPyc5tAdZeSHeX7ZwB7Ne/WBv3mK2G6UIvF5ptxS6u3m94YxXbc5/M1z7Q0f
-8sp5uiUe9LlsvCgIqUaqHQIDAQABo4HHMIHEMAkGA1UdEwQCMAAwLAYJYIZIAYb4
-QgENBB8WHU9wZW5TU0wgR2VuZXJhdGVkIENlcnRpZmljYXRlMB0GA1UdDgQWBBQF
-6LXkiX7NcijhCLWyn46iEysspzBqBgNVHSMEYzBhoVykWjBYMQswCQYDVQQGEwJL
-UjETMBEGA1UECBMKS3l1bmdHaS1EbzEWMBQGA1UEChMNU2Ftc3VuZyBFbGVjLjEc
-MBoGA1UEAxMTQ2VydCBDaGFpbiBObyBBSUEgMYIBODANBgkqhkiG9w0BAQUFAAOB
-gQA25a8txL3BFid08AqlEkza1uJgmO49etFVoO1X/Wub/BlL87JBGads9xVjaBgJ
-bdsj+eEq1nXlGEYrgldOGvgD+j18qnCOFyXGsqvKlJD9KmlT9RGBaAb4LV2SObSW
-8NC1A8IVJvTpwJooOd1n6qafJ0RpLpXgoQP2PKH3kvSiuA==
------END CERTIFICATE-----
diff --git a/tests/cert-svc/data/TestData/ssl/cert_chain/newcerts/3A.pem b/tests/cert-svc/data/TestData/ssl/cert_chain/newcerts/3A.pem
deleted file mode 100644 (file)
index a08d32c..0000000
+++ /dev/null
@@ -1,52 +0,0 @@
-Certificate:
-    Data:
-        Version: 3 (0x2)
-        Serial Number: 58 (0x3a)
-        Signature Algorithm: sha1WithRSAEncryption
-        Issuer: C=KR, ST=KyungGi-Do, O=Samsung Elec., CN=Cert Chain No AIA 3
-        Validity
-            Not Before: Mar 24 07:21:48 2009 GMT
-            Not After : Mar 24 07:21:48 2010 GMT
-        Subject: C=KR, ST=KyungGi-Do, O=Samsung Elec., CN=Cert Chain No AIA 4
-        Subject Public Key Info:
-            Public Key Algorithm: rsaEncryption
-            RSA Public Key: (1024 bit)
-                Modulus (1024 bit):
-                    00:cb:8d:d0:6f:74:f7:2a:96:47:5a:f9:e3:d5:72:
-                    3a:81:94:c7:0f:e2:a2:9b:11:4e:92:15:61:dc:3f:
-                    b8:fd:9f:b8:ae:18:54:25:ca:e0:1a:8f:49:f7:e1:
-                    81:64:76:47:5a:b4:bc:9d:11:09:6d:c7:71:03:cd:
-                    38:ab:85:5f:69:5a:ed:6b:aa:32:a7:85:b4:75:9a:
-                    aa:dc:ec:ee:9d:4e:03:51:e3:8e:a6:89:82:e3:26:
-                    13:42:99:87:04:5f:59:58:43:89:32:ed:da:34:e9:
-                    b2:ca:33:af:29:eb:20:0b:e7:4a:10:0c:3f:00:94:
-                    75:36:c5:f8:4d:4b:a4:88:95
-                Exponent: 65537 (0x10001)
-        X509v3 extensions:
-            Authority Information Access: 
-                OCSP - URI:http://127.0.0.1:89/0002
-
-    Signature Algorithm: sha1WithRSAEncryption
-        6f:51:b6:28:15:d9:aa:56:70:0d:2a:f0:52:8b:c4:53:47:68:
-        78:fe:fe:89:c2:3b:87:23:40:87:04:02:67:74:4d:3c:cc:39:
-        48:30:f6:9c:12:74:be:48:26:5a:7c:a1:bf:d0:fa:19:89:63:
-        66:fe:44:2d:f5:e5:e8:9f:57:c5:20:fe:f0:10:2f:f0:6d:16:
-        ef:a0:2b:db:95:05:72:cb:63:e4:2b:28:38:8f:aa:b9:51:f2:
-        88:19:0e:c1:c8:e7:0d:66:b8:13:f2:13:2d:ee:f0:dd:98:56:
-        04:af:c6:c8:81:07:ce:44:f5:23:7b:a4:72:32:4d:43:a9:61:
-        72:d6
------BEGIN CERTIFICATE-----
-MIICXjCCAcegAwIBAgIBOjANBgkqhkiG9w0BAQUFADBYMQswCQYDVQQGEwJLUjET
-MBEGA1UECBMKS3l1bmdHaS1EbzEWMBQGA1UEChMNU2Ftc3VuZyBFbGVjLjEcMBoG
-A1UEAxMTQ2VydCBDaGFpbiBObyBBSUEgMzAeFw0wOTAzMjQwNzIxNDhaFw0xMDAz
-MjQwNzIxNDhaMFgxCzAJBgNVBAYTAktSMRMwEQYDVQQIEwpLeXVuZ0dpLURvMRYw
-FAYDVQQKEw1TYW1zdW5nIEVsZWMuMRwwGgYDVQQDExNDZXJ0IENoYWluIE5vIEFJ
-QSA0MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQDLjdBvdPcqlkda+ePVcjqB
-lMcP4qKbEU6SFWHcP7j9n7iuGFQlyuAaj0n34YFkdkdatLydEQltx3EDzTirhV9p
-Wu1rqjKnhbR1mqrc7O6dTgNR446miYLjJhNCmYcEX1lYQ4ky7do06bLKM68p6yAL
-50oQDD8AlHU2xfhNS6SIlQIDAQABozgwNjA0BggrBgEFBQcBAQQoMCYwJAYIKwYB
-BQUHMAGGGGh0dHA6Ly8xMjcuMC4wLjE6ODkvMDAwMjANBgkqhkiG9w0BAQUFAAOB
-gQBvUbYoFdmqVnANKvBSi8RTR2h4/v6JwjuHI0CHBAJndE08zDlIMPacEnS+SCZa
-fKG/0PoZiWNm/kQt9eXon1fFIP7wEC/wbRbvoCvblQVyy2PkKyg4j6q5UfKIGQ7B
-yOcNZrgT8hMt7vDdmFYEr8bIgQfORPUje6RyMk1DqWFy1g==
------END CERTIFICATE-----
diff --git a/tests/cert-svc/data/TestData/ssl/cert_chain/newcerts/3B.pem b/tests/cert-svc/data/TestData/ssl/cert_chain/newcerts/3B.pem
deleted file mode 100644 (file)
index d0cedf9..0000000
+++ /dev/null
@@ -1,52 +0,0 @@
-Certificate:
-    Data:
-        Version: 3 (0x2)
-        Serial Number: 59 (0x3b)
-        Signature Algorithm: sha1WithRSAEncryption
-        Issuer: C=KR, ST=KyungGi-Do, O=Samsung Elec., CN=Cert Chain No AIA 4
-        Validity
-            Not Before: Mar 24 07:21:49 2009 GMT
-            Not After : Mar 24 07:21:49 2010 GMT
-        Subject: C=KR, ST=KyungGi-Do, O=Samsung Elec., CN=Cert Chain No AIA 5
-        Subject Public Key Info:
-            Public Key Algorithm: rsaEncryption
-            RSA Public Key: (1024 bit)
-                Modulus (1024 bit):
-                    00:db:0c:70:a3:4b:8d:12:fa:47:5f:5f:3a:41:91:
-                    18:7a:9b:e3:af:99:56:70:96:71:7d:d0:7c:ee:d9:
-                    d2:3a:90:cb:42:c8:eb:06:a5:81:24:a3:d0:9e:d0:
-                    33:04:88:50:a4:e2:32:37:1a:b8:a4:3f:77:56:b4:
-                    3f:a9:cc:27:7e:c9:c9:89:1e:ca:64:b6:4e:e6:fc:
-                    fa:17:ce:3b:94:7f:b2:14:6f:40:ad:78:75:f3:09:
-                    be:62:0d:be:af:40:61:dc:16:4b:94:4c:8b:16:ce:
-                    79:5f:97:59:56:19:8a:23:ea:21:7c:3d:02:53:09:
-                    32:17:b6:27:ee:6e:31:1e:4d
-                Exponent: 65537 (0x10001)
-        X509v3 extensions:
-            Authority Information Access: 
-                OCSP - URI:http://127.0.0.1:89/0002
-
-    Signature Algorithm: sha1WithRSAEncryption
-        86:d9:2f:aa:12:1f:31:35:60:68:49:8c:4e:75:b3:5e:8f:f2:
-        81:69:79:7f:92:ca:32:ca:cf:a3:45:d0:8a:2c:d6:8b:9a:e6:
-        a8:3d:19:66:ee:3b:03:25:4b:ed:56:c2:49:09:99:98:b3:9f:
-        13:11:ee:b5:ad:00:b8:36:31:6e:91:f6:fd:f3:95:7e:90:b9:
-        0b:26:ab:06:72:cf:57:33:3c:88:4e:aa:c4:bb:89:a5:60:95:
-        11:b5:e6:eb:1f:8f:fb:b0:f0:c5:78:be:6a:7f:39:29:e4:5b:
-        7b:28:16:d2:b6:bf:38:af:25:de:7b:22:23:d3:23:ca:03:0d:
-        c6:08
------BEGIN CERTIFICATE-----
-MIICXjCCAcegAwIBAgIBOzANBgkqhkiG9w0BAQUFADBYMQswCQYDVQQGEwJLUjET
-MBEGA1UECBMKS3l1bmdHaS1EbzEWMBQGA1UEChMNU2Ftc3VuZyBFbGVjLjEcMBoG
-A1UEAxMTQ2VydCBDaGFpbiBObyBBSUEgNDAeFw0wOTAzMjQwNzIxNDlaFw0xMDAz
-MjQwNzIxNDlaMFgxCzAJBgNVBAYTAktSMRMwEQYDVQQIEwpLeXVuZ0dpLURvMRYw
-FAYDVQQKEw1TYW1zdW5nIEVsZWMuMRwwGgYDVQQDExNDZXJ0IENoYWluIE5vIEFJ
-QSA1MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQDbDHCjS40S+kdfXzpBkRh6
-m+OvmVZwlnF90Hzu2dI6kMtCyOsGpYEko9Ce0DMEiFCk4jI3GrikP3dWtD+pzCd+
-ycmJHspktk7m/PoXzjuUf7IUb0CteHXzCb5iDb6vQGHcFkuUTIsWznlfl1lWGYoj
-6iF8PQJTCTIXtifubjEeTQIDAQABozgwNjA0BggrBgEFBQcBAQQoMCYwJAYIKwYB
-BQUHMAGGGGh0dHA6Ly8xMjcuMC4wLjE6ODkvMDAwMjANBgkqhkiG9w0BAQUFAAOB
-gQCG2S+qEh8xNWBoSYxOdbNej/KBaXl/ksoyys+jRdCKLNaLmuaoPRlm7jsDJUvt
-VsJJCZmYs58TEe61rQC4NjFukfb985V+kLkLJqsGcs9XMzyITqrEu4mlYJURtebr
-H4/7sPDFeL5qfzkp5Ft7KBbStr84ryXeeyIj0yPKAw3GCA==
------END CERTIFICATE-----
diff --git a/tests/cert-svc/data/TestData/ssl/cert_chain/newcerts/3C.pem b/tests/cert-svc/data/TestData/ssl/cert_chain/newcerts/3C.pem
deleted file mode 100644 (file)
index 6e0a696..0000000
+++ /dev/null
@@ -1,52 +0,0 @@
-Certificate:
-    Data:
-        Version: 3 (0x2)
-        Serial Number: 60 (0x3c)
-        Signature Algorithm: sha1WithRSAEncryption
-        Issuer: C=KR, ST=KyungGi-Do, O=Samsung Elec., CN=Cert Chain No AIA 5
-        Validity
-            Not Before: Mar 24 07:21:50 2009 GMT
-            Not After : Mar 24 07:21:50 2010 GMT
-        Subject: C=KR, ST=KyungGi-Do, O=Samsung Elec., CN=Cert Chain No AIA 6
-        Subject Public Key Info:
-            Public Key Algorithm: rsaEncryption
-            RSA Public Key: (1024 bit)
-                Modulus (1024 bit):
-                    00:96:4e:86:e9:ca:b8:83:48:47:72:fa:ad:01:a8:
-                    26:c0:c6:09:10:ef:37:e0:62:e6:6b:e1:97:9d:15:
-                    c2:e5:88:fa:ee:50:81:ff:eb:fb:48:80:6f:db:41:
-                    b7:51:58:64:eb:8d:b7:2f:03:1a:0b:36:db:53:1d:
-                    19:7c:49:f9:76:0c:39:36:f3:4f:e9:f6:c7:90:5f:
-                    02:dd:dc:e7:51:c2:44:cc:9f:87:4c:13:d4:e5:91:
-                    1c:4a:ed:33:a2:80:76:c8:56:7e:fc:c9:73:2b:78:
-                    d9:7e:a3:b2:23:cd:69:ca:a1:a7:8c:e3:8c:97:3e:
-                    71:ac:c8:04:56:bd:97:cd:d1
-                Exponent: 65537 (0x10001)
-        X509v3 extensions:
-            Authority Information Access: 
-                OCSP - URI:http://127.0.0.1:89/0002
-
-    Signature Algorithm: sha1WithRSAEncryption
-        6f:e5:2b:c2:3c:65:22:24:f1:1c:a4:c4:c1:35:73:40:a0:8a:
-        f0:13:06:c7:46:19:83:51:e0:c6:9f:d8:49:93:59:41:3f:71:
-        2d:31:67:55:98:49:42:aa:07:42:81:b5:4f:29:11:36:3f:23:
-        47:75:75:89:18:95:a4:ea:af:9f:4f:b2:0e:0b:21:4e:74:4f:
-        2c:18:74:c9:05:21:55:e7:e7:b2:85:9a:4f:70:ce:d1:89:1d:
-        9e:f8:02:30:d0:60:c5:2a:78:87:67:9e:04:3e:8a:7b:f9:df:
-        0b:4e:41:3a:81:fa:35:fa:d7:77:5f:7c:1f:cc:59:da:94:9b:
-        94:55
------BEGIN CERTIFICATE-----
-MIICXjCCAcegAwIBAgIBPDANBgkqhkiG9w0BAQUFADBYMQswCQYDVQQGEwJLUjET
-MBEGA1UECBMKS3l1bmdHaS1EbzEWMBQGA1UEChMNU2Ftc3VuZyBFbGVjLjEcMBoG
-A1UEAxMTQ2VydCBDaGFpbiBObyBBSUEgNTAeFw0wOTAzMjQwNzIxNTBaFw0xMDAz
-MjQwNzIxNTBaMFgxCzAJBgNVBAYTAktSMRMwEQYDVQQIEwpLeXVuZ0dpLURvMRYw
-FAYDVQQKEw1TYW1zdW5nIEVsZWMuMRwwGgYDVQQDExNDZXJ0IENoYWluIE5vIEFJ
-QSA2MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQCWTobpyriDSEdy+q0BqCbA
-xgkQ7zfgYuZr4ZedFcLliPruUIH/6/tIgG/bQbdRWGTrjbcvAxoLNttTHRl8Sfl2
-DDk280/p9seQXwLd3OdRwkTMn4dME9TlkRxK7TOigHbIVn78yXMreNl+o7IjzWnK
-oaeM44yXPnGsyARWvZfN0QIDAQABozgwNjA0BggrBgEFBQcBAQQoMCYwJAYIKwYB
-BQUHMAGGGGh0dHA6Ly8xMjcuMC4wLjE6ODkvMDAwMjANBgkqhkiG9w0BAQUFAAOB
-gQBv5SvCPGUiJPEcpMTBNXNAoIrwEwbHRhmDUeDGn9hJk1lBP3EtMWdVmElCqgdC
-gbVPKRE2PyNHdXWJGJWk6q+fT7IOCyFOdE8sGHTJBSFV5+eyhZpPcM7RiR2e+AIw
-0GDFKniHZ54EPop7+d8LTkE6gfo1+td3X3wfzFnalJuUVQ==
------END CERTIFICATE-----
diff --git a/tests/cert-svc/data/TestData/ssl/cert_chain/newcerts/3D.pem b/tests/cert-svc/data/TestData/ssl/cert_chain/newcerts/3D.pem
deleted file mode 100644 (file)
index 87fdfab..0000000
+++ /dev/null
@@ -1,52 +0,0 @@
-Certificate:
-    Data:
-        Version: 3 (0x2)
-        Serial Number: 61 (0x3d)
-        Signature Algorithm: sha1WithRSAEncryption
-        Issuer: C=KR, ST=KyungGi-Do, O=Samsung Elec., CN=Cert Chain No AIA 6
-        Validity
-            Not Before: Mar 24 07:21:51 2009 GMT
-            Not After : Mar 24 07:21:51 2010 GMT
-        Subject: C=KR, ST=KyungGi-Do, O=Samsung Elec., CN=Cert Chain No AIA 7
-        Subject Public Key Info:
-            Public Key Algorithm: rsaEncryption
-            RSA Public Key: (1024 bit)
-                Modulus (1024 bit):
-                    00:b4:5b:fe:48:10:2b:eb:58:af:c6:0e:57:2a:a5:
-                    5c:cc:57:85:44:f2:d9:d1:43:84:d3:40:8b:f7:7a:
-                    e0:e8:b1:9d:e8:f4:b1:45:c6:67:14:9b:a5:a8:e2:
-                    8f:cb:31:a6:db:61:90:0d:aa:0a:9e:26:dc:4b:0b:
-                    33:a2:7c:07:72:91:ee:6a:ec:77:34:f4:7e:a5:0e:
-                    39:13:a8:d5:86:86:12:5b:a4:8b:38:91:57:24:8d:
-                    a9:3b:f8:f1:a6:48:89:20:a9:5b:b3:fe:ca:56:f0:
-                    ca:d1:ec:99:9c:57:6a:df:8e:23:a1:7e:be:5f:7c:
-                    cf:a9:db:3f:b8:dc:a1:9a:39
-                Exponent: 65537 (0x10001)
-        X509v3 extensions:
-            Authority Information Access: 
-                OCSP - URI:http://127.0.0.1:89/0002
-
-    Signature Algorithm: sha1WithRSAEncryption
-        1d:2e:83:cb:9e:92:3e:d2:0a:fb:74:87:66:3d:57:84:09:11:
-        4a:2a:68:0e:da:9e:4d:7b:25:af:56:fa:3c:d5:4c:02:fe:43:
-        dd:c3:66:c9:5d:55:50:40:15:8f:06:74:13:83:27:c5:19:7e:
-        55:f3:fa:26:ec:3e:c0:1a:5d:20:ee:09:af:38:83:f8:0e:da:
-        bf:07:87:07:a5:70:79:21:2c:38:5b:e0:f8:d1:57:0f:9b:d1:
-        ee:a3:86:02:b5:e0:5b:64:08:5f:64:8b:43:65:ac:60:8a:c9:
-        6f:47:37:66:61:c1:74:b0:74:0a:24:12:36:c1:28:58:b6:04:
-        9b:4c
------BEGIN CERTIFICATE-----
-MIICXjCCAcegAwIBAgIBPTANBgkqhkiG9w0BAQUFADBYMQswCQYDVQQGEwJLUjET
-MBEGA1UECBMKS3l1bmdHaS1EbzEWMBQGA1UEChMNU2Ftc3VuZyBFbGVjLjEcMBoG
-A1UEAxMTQ2VydCBDaGFpbiBObyBBSUEgNjAeFw0wOTAzMjQwNzIxNTFaFw0xMDAz
-MjQwNzIxNTFaMFgxCzAJBgNVBAYTAktSMRMwEQYDVQQIEwpLeXVuZ0dpLURvMRYw
-FAYDVQQKEw1TYW1zdW5nIEVsZWMuMRwwGgYDVQQDExNDZXJ0IENoYWluIE5vIEFJ
-QSA3MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQC0W/5IECvrWK/GDlcqpVzM
-V4VE8tnRQ4TTQIv3euDosZ3o9LFFxmcUm6Wo4o/LMabbYZANqgqeJtxLCzOifAdy
-ke5q7Hc09H6lDjkTqNWGhhJbpIs4kVckjak7+PGmSIkgqVuz/spW8MrR7JmcV2rf
-jiOhfr5ffM+p2z+43KGaOQIDAQABozgwNjA0BggrBgEFBQcBAQQoMCYwJAYIKwYB
-BQUHMAGGGGh0dHA6Ly8xMjcuMC4wLjE6ODkvMDAwMjANBgkqhkiG9w0BAQUFAAOB
-gQAdLoPLnpI+0gr7dIdmPVeECRFKKmgO2p5NeyWvVvo81UwC/kPdw2bJXVVQQBWP
-BnQTgyfFGX5V8/om7D7AGl0g7gmvOIP4Dtq/B4cHpXB5ISw4W+D40VcPm9Huo4YC
-teBbZAhfZItDZaxgislvRzdmYcF0sHQKJBI2wShYtgSbTA==
------END CERTIFICATE-----
diff --git a/tests/cert-svc/data/TestData/ssl/cert_chain/newcerts/3E.pem b/tests/cert-svc/data/TestData/ssl/cert_chain/newcerts/3E.pem
deleted file mode 100644 (file)
index 397c8cc..0000000
+++ /dev/null
@@ -1,52 +0,0 @@
-Certificate:
-    Data:
-        Version: 3 (0x2)
-        Serial Number: 62 (0x3e)
-        Signature Algorithm: sha1WithRSAEncryption
-        Issuer: C=KR, ST=KyungGi-Do, O=Samsung Elec., CN=Cert Chain No AIA 7
-        Validity
-            Not Before: Mar 24 07:21:52 2009 GMT
-            Not After : Mar 24 07:21:52 2010 GMT
-        Subject: C=KR, ST=KyungGi-Do, O=Samsung Elec., CN=Cert Chain No AIA 8
-        Subject Public Key Info:
-            Public Key Algorithm: rsaEncryption
-            RSA Public Key: (1024 bit)
-                Modulus (1024 bit):
-                    00:bc:76:6c:d1:65:bb:c3:98:fa:4d:19:34:a6:43:
-                    8a:c1:1d:ff:04:4c:f9:c9:bf:c5:d9:4c:08:94:a2:
-                    4c:55:31:09:68:3a:35:61:c6:2e:7d:6a:7a:87:88:
-                    ba:21:4c:5e:5e:28:d9:d3:fd:01:bc:4e:e2:55:a8:
-                    d7:d5:a0:72:d1:b5:fb:6f:f8:ca:7a:f7:e6:89:b0:
-                    3e:c9:83:e5:fd:8d:a9:fc:0a:fd:a0:dd:a2:33:17:
-                    4e:a0:0e:37:22:b2:ef:27:e4:67:d5:58:80:8b:16:
-                    a1:a2:56:c3:73:69:7d:ee:47:d9:af:4d:19:7e:9f:
-                    2b:08:ad:4b:51:07:40:99:f1
-                Exponent: 65537 (0x10001)
-        X509v3 extensions:
-            Authority Information Access: 
-                OCSP - URI:http://127.0.0.1:89/0002
-
-    Signature Algorithm: sha1WithRSAEncryption
-        40:8d:52:73:c3:85:6b:6c:4f:54:51:06:eb:d8:cd:40:5d:3d:
-        89:c2:06:4d:c6:70:5e:cc:64:40:3f:bb:3e:d4:52:b0:8d:57:
-        77:f3:1f:63:89:b3:21:b0:72:c6:ef:97:77:06:90:6f:fd:e8:
-        c3:d4:d6:13:f7:18:a8:eb:1e:87:b8:98:20:4a:0b:58:74:81:
-        59:eb:6e:50:f3:68:b2:e2:8c:a2:4b:92:c5:fa:e1:4f:43:ae:
-        51:ca:a6:c7:2c:40:16:2f:24:d3:a2:91:d5:45:7d:a7:3c:6e:
-        65:74:a7:b0:a6:a0:07:d7:1d:3a:2e:51:6e:de:7f:e6:5b:73:
-        e2:7d
------BEGIN CERTIFICATE-----
-MIICXjCCAcegAwIBAgIBPjANBgkqhkiG9w0BAQUFADBYMQswCQYDVQQGEwJLUjET
-MBEGA1UECBMKS3l1bmdHaS1EbzEWMBQGA1UEChMNU2Ftc3VuZyBFbGVjLjEcMBoG
-A1UEAxMTQ2VydCBDaGFpbiBObyBBSUEgNzAeFw0wOTAzMjQwNzIxNTJaFw0xMDAz
-MjQwNzIxNTJaMFgxCzAJBgNVBAYTAktSMRMwEQYDVQQIEwpLeXVuZ0dpLURvMRYw
-FAYDVQQKEw1TYW1zdW5nIEVsZWMuMRwwGgYDVQQDExNDZXJ0IENoYWluIE5vIEFJ
-QSA4MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQC8dmzRZbvDmPpNGTSmQ4rB
-Hf8ETPnJv8XZTAiUokxVMQloOjVhxi59anqHiLohTF5eKNnT/QG8TuJVqNfVoHLR
-tftv+Mp69+aJsD7Jg+X9jan8Cv2g3aIzF06gDjcisu8n5GfVWICLFqGiVsNzaX3u
-R9mvTRl+nysIrUtRB0CZ8QIDAQABozgwNjA0BggrBgEFBQcBAQQoMCYwJAYIKwYB
-BQUHMAGGGGh0dHA6Ly8xMjcuMC4wLjE6ODkvMDAwMjANBgkqhkiG9w0BAQUFAAOB
-gQBAjVJzw4VrbE9UUQbr2M1AXT2JwgZNxnBezGRAP7s+1FKwjVd38x9jibMhsHLG
-75d3BpBv/ejD1NYT9xio6x6HuJggSgtYdIFZ625Q82iy4oyiS5LF+uFPQ65RyqbH
-LEAWLyTTopHVRX2nPG5ldKewpqAH1x06LlFu3n/mW3PifQ==
------END CERTIFICATE-----
diff --git a/tests/cert-svc/data/TestData/ssl/cert_chain/newcerts/3F.pem b/tests/cert-svc/data/TestData/ssl/cert_chain/newcerts/3F.pem
deleted file mode 100644 (file)
index 3259a5b..0000000
+++ /dev/null
@@ -1,52 +0,0 @@
-Certificate:
-    Data:
-        Version: 3 (0x2)
-        Serial Number: 63 (0x3f)
-        Signature Algorithm: sha1WithRSAEncryption
-        Issuer: C=KR, ST=KyungGi-Do, O=Samsung Elec., CN=Cert Chain No AIA 8
-        Validity
-            Not Before: Mar 24 07:21:52 2009 GMT
-            Not After : Mar 24 07:21:52 2010 GMT
-        Subject: C=KR, ST=KyungGi-Do, O=Samsung Elec., CN=Cert Chain No AIA 9
-        Subject Public Key Info:
-            Public Key Algorithm: rsaEncryption
-            RSA Public Key: (1024 bit)
-                Modulus (1024 bit):
-                    00:a8:70:69:1c:f1:48:a4:71:a5:2b:d0:d8:f1:00:
-                    1f:ca:2a:17:d0:3f:4f:1f:43:a0:04:52:3e:28:73:
-                    3b:20:03:96:47:99:19:dc:95:35:41:af:03:4e:08:
-                    01:c1:d5:08:65:4c:75:9f:29:73:d3:ab:b3:f5:9c:
-                    e7:e0:73:a8:4e:be:fd:86:67:f7:f4:20:42:76:39:
-                    85:94:91:b8:6c:74:00:c8:c8:8b:d1:24:38:92:dd:
-                    74:76:e8:ca:69:f6:96:aa:29:1b:32:4e:d7:65:4d:
-                    dc:87:4c:ff:60:dc:44:a5:06:60:2a:2f:48:e6:a0:
-                    9c:93:eb:24:ff:74:a5:d0:13
-                Exponent: 65537 (0x10001)
-        X509v3 extensions:
-            Authority Information Access: 
-                OCSP - URI:http://127.0.0.1:89/0002
-
-    Signature Algorithm: sha1WithRSAEncryption
-        8f:6f:4d:2a:68:f1:d5:08:43:43:3f:5a:53:d8:fe:71:93:e8:
-        08:e5:a3:4f:dc:b2:9b:20:89:7c:dd:b0:57:7f:f7:1f:45:09:
-        78:c0:ba:99:0e:ab:fe:a5:1c:de:37:f6:dd:9a:b2:f1:9f:f0:
-        15:19:4b:6c:32:dc:5f:8e:af:4f:3f:fe:a3:67:ae:78:ba:af:
-        cd:41:fd:c9:31:ca:ce:7e:82:2e:c6:40:4d:94:b9:cd:fa:d5:
-        a1:b3:b6:10:47:2d:75:f1:37:3f:e9:62:81:a3:ff:7f:72:04:
-        f7:26:6d:d4:c0:22:38:a1:6c:64:10:66:fe:0d:95:e7:2e:64:
-        c8:d5
------BEGIN CERTIFICATE-----
-MIICXjCCAcegAwIBAgIBPzANBgkqhkiG9w0BAQUFADBYMQswCQYDVQQGEwJLUjET
-MBEGA1UECBMKS3l1bmdHaS1EbzEWMBQGA1UEChMNU2Ftc3VuZyBFbGVjLjEcMBoG
-A1UEAxMTQ2VydCBDaGFpbiBObyBBSUEgODAeFw0wOTAzMjQwNzIxNTJaFw0xMDAz
-MjQwNzIxNTJaMFgxCzAJBgNVBAYTAktSMRMwEQYDVQQIEwpLeXVuZ0dpLURvMRYw
-FAYDVQQKEw1TYW1zdW5nIEVsZWMuMRwwGgYDVQQDExNDZXJ0IENoYWluIE5vIEFJ
-QSA5MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQCocGkc8UikcaUr0NjxAB/K
-KhfQP08fQ6AEUj4oczsgA5ZHmRnclTVBrwNOCAHB1QhlTHWfKXPTq7P1nOfgc6hO
-vv2GZ/f0IEJ2OYWUkbhsdADIyIvRJDiS3XR26Mpp9paqKRsyTtdlTdyHTP9g3ESl
-BmAqL0jmoJyT6yT/dKXQEwIDAQABozgwNjA0BggrBgEFBQcBAQQoMCYwJAYIKwYB
-BQUHMAGGGGh0dHA6Ly8xMjcuMC4wLjE6ODkvMDAwMjANBgkqhkiG9w0BAQUFAAOB
-gQCPb00qaPHVCENDP1pT2P5xk+gI5aNP3LKbIIl83bBXf/cfRQl4wLqZDqv+pRze
-N/bdmrLxn/AVGUtsMtxfjq9PP/6jZ654uq/NQf3JMcrOfoIuxkBNlLnN+tWhs7YQ
-Ry118Tc/6WKBo/9/cgT3Jm3UwCI4oWxkEGb+DZXnLmTI1Q==
------END CERTIFICATE-----
diff --git a/tests/cert-svc/data/TestData/ssl/cert_chain/newcerts/40.pem b/tests/cert-svc/data/TestData/ssl/cert_chain/newcerts/40.pem
deleted file mode 100644 (file)
index 1696eaf..0000000
+++ /dev/null
@@ -1,52 +0,0 @@
-Certificate:
-    Data:
-        Version: 3 (0x2)
-        Serial Number: 64 (0x40)
-        Signature Algorithm: sha1WithRSAEncryption
-        Issuer: C=KR, ST=KyungGi-Do, O=Samsung Elec., CN=Cert Chain No AIA 9
-        Validity
-            Not Before: Mar 24 07:21:53 2009 GMT
-            Not After : Mar 24 07:21:53 2010 GMT
-        Subject: C=KR, ST=KyungGi-Do, O=Samsung Elec., CN=Cert Chain No AIA 10
-        Subject Public Key Info:
-            Public Key Algorithm: rsaEncryption
-            RSA Public Key: (1024 bit)
-                Modulus (1024 bit):
-                    00:df:07:2f:ee:54:76:49:52:9f:16:7a:0a:39:2f:
-                    44:6d:17:67:ca:6a:0c:d7:42:c2:45:60:f9:b7:a2:
-                    e2:ea:2f:53:14:69:02:57:06:7e:44:b6:c7:6b:9f:
-                    41:b8:1c:2a:17:6b:38:a5:89:c0:ec:e2:4c:c0:59:
-                    97:6c:8d:17:cf:e5:86:3d:3b:b1:69:90:80:fe:84:
-                    7b:37:4e:b9:1d:5e:98:fc:46:38:c7:f1:26:24:7d:
-                    7a:fc:fa:d7:51:59:d1:ba:5f:07:85:9e:43:df:fd:
-                    6e:5f:35:c8:a4:fe:24:a2:5e:8a:bb:01:b5:5d:c5:
-                    cb:0e:40:f5:e9:4c:0b:00:43
-                Exponent: 65537 (0x10001)
-        X509v3 extensions:
-            Authority Information Access: 
-                OCSP - URI:http://127.0.0.1:89/0002
-
-    Signature Algorithm: sha1WithRSAEncryption
-        6f:3d:1c:f3:6a:7d:23:49:43:c3:dd:41:43:81:42:f4:60:bf:
-        87:d4:5f:83:96:1c:6a:c3:06:28:e5:76:fb:5c:17:fc:60:1c:
-        04:07:03:99:92:d4:01:ac:97:81:0c:2a:7c:67:18:88:60:88:
-        dc:a9:35:c1:89:75:d8:0b:0a:c3:ff:43:4a:5a:93:3a:d3:67:
-        b2:ce:8d:8a:8c:19:b5:23:b5:ed:b9:df:26:52:70:09:41:4e:
-        68:1a:54:08:74:c8:ff:bf:03:70:f1:9b:ef:65:2e:e2:23:74:
-        12:77:c4:25:de:fe:58:a9:a9:fa:d2:fb:4b:40:70:24:31:2b:
-        bc:64
------BEGIN CERTIFICATE-----
-MIICXzCCAcigAwIBAgIBQDANBgkqhkiG9w0BAQUFADBYMQswCQYDVQQGEwJLUjET
-MBEGA1UECBMKS3l1bmdHaS1EbzEWMBQGA1UEChMNU2Ftc3VuZyBFbGVjLjEcMBoG
-A1UEAxMTQ2VydCBDaGFpbiBObyBBSUEgOTAeFw0wOTAzMjQwNzIxNTNaFw0xMDAz
-MjQwNzIxNTNaMFkxCzAJBgNVBAYTAktSMRMwEQYDVQQIEwpLeXVuZ0dpLURvMRYw
-FAYDVQQKEw1TYW1zdW5nIEVsZWMuMR0wGwYDVQQDExRDZXJ0IENoYWluIE5vIEFJ
-QSAxMDCBnzANBgkqhkiG9w0BAQEFAAOBjQAwgYkCgYEA3wcv7lR2SVKfFnoKOS9E
-bRdnymoM10LCRWD5t6Li6i9TFGkCVwZ+RLbHa59BuBwqF2s4pYnA7OJMwFmXbI0X
-z+WGPTuxaZCA/oR7N065HV6Y/EY4x/EmJH16/PrXUVnRul8HhZ5D3/1uXzXIpP4k
-ol6KuwG1XcXLDkD16UwLAEMCAwEAAaM4MDYwNAYIKwYBBQUHAQEEKDAmMCQGCCsG
-AQUFBzABhhhodHRwOi8vMTI3LjAuMC4xOjg5LzAwMDIwDQYJKoZIhvcNAQEFBQAD
-gYEAbz0c82p9I0lDw91BQ4FC9GC/h9Rfg5YcasMGKOV2+1wX/GAcBAcDmZLUAayX
-gQwqfGcYiGCI3Kk1wYl12AsKw/9DSlqTOtNnss6NiowZtSO17bnfJlJwCUFOaBpU
-CHTI/78DcPGb72Uu4iN0EnfEJd7+WKmp+tL7S0BwJDErvGQ=
------END CERTIFICATE-----
diff --git a/tests/cert-svc/data/TestData/ssl/cert_chain/private/cert_chain1.pem b/tests/cert-svc/data/TestData/ssl/cert_chain/private/cert_chain1.pem
deleted file mode 100644 (file)
index e152d65..0000000
+++ /dev/null
@@ -1,15 +0,0 @@
------BEGIN RSA PRIVATE KEY-----
-MIICXQIBAAKBgQDHtcvaTeUMUcVz+dHjdBtbrGkyFTG8b0rzOtvri2AaBfwHDRyh
-/PcgLmWVGGHy7jh+jekP+6HnU01q/sSzObtv+RSxrxMlDPOyDOhj34jbVU3SlWGt
-R/3lBP1s78vaz04a4ZgP3X4BMBXEFenNuvb4gUs1FS6RBWTThsWeDa1eaQIDAQAB
-AoGBAITKrA6vRsLnSGyyS057cImHXbdQgm6ybdrHY13+odsL6aXioQxRAR1j3GXD
-/bUjk2sK/1KCVghTyqF/X9lwZOGFOM5XsyptHxF/afgBljGzZwW21GBG4hSfSOjm
-+yL2Xhlejol1GbC3D9jLksxrfcKuVFkXbBJVYp1dQ+9wBWvRAkEA8AwIpeMYz4/B
-W83f2FnK81ETeO8DKldFQADlgv4q3F/un2oSCxBglyyq0i7JjdK2/kgxHN62zsxZ
-LeDZUr1z5QJBANT7gO03J8jODO8wqqaS63T/0vxoMHrAF/l/NC0Fpk5AZutDvsn9
-yWLy0PNwJlLzKo8XBCjIY9wVxiwS9/Ic4DUCQFWUpLyns1/Eq7YUNvsGQFHxFNUn
-uWQuCvVfnHPQM+2vkf5prZceNqGO/jPDFH6ooi8UA9Z8HIar2ht+L1zNSHUCQQDI
-Ifk5bv2sfKq8zH9e/WnRzF7nHcSIZB9jLDvMHqXynCPZ6RPL3PWzTDY6uuTYR3Vz
-dg5LgFoNwkwwuDZTRP0NAkAUHcJbjs2ey95utZ/to9Cl+ztaJWoa83dSQCx978l0
-a9O/kVYympJTHCnL8mU9QqePQvJjtgBY4ypcsaJ2luFV
------END RSA PRIVATE KEY-----
diff --git a/tests/cert-svc/data/TestData/ssl/cert_chain/private/cert_chain10.pem b/tests/cert-svc/data/TestData/ssl/cert_chain/private/cert_chain10.pem
deleted file mode 100644 (file)
index 0cb0874..0000000
+++ /dev/null
@@ -1,15 +0,0 @@
------BEGIN RSA PRIVATE KEY-----
-MIICXgIBAAKBgQDaeurpTfFGrr35DIHe/fTPE/x0VBv3+9Ow9q4y/hcN35Hid8e3
-ZItTSLJQxhDTTcLCnlPRrzv+0MNkv5VIo16FKffDGUxUCXpCgby58GPrCpA8nfol
-uO6AUMG5wo0o66QbiLUvDDAEjJeoqZonfFp5A0n87IE5YRxSm5ea8FTbLwIDAQAB
-AoGBALyImbKeifi+zjzeKCwv5lPUIWSZOFF0xKbPGF/0mBxms1NEndmKMBi8gPPn
-F5ngXpLnYdluaE1qBVMpaD94ixSyDPpma813+TpeuTiyBsTDEWuBmRFkqNLP/G4d
-r6t5QI70416sfeMoDHwLygrFAGhQ+Kd1E7PtuSP+zcEWhK2BAkEA+FPGot/RW5Nv
-geG7v5FlU2Qu/uJHbR4f7yVbHopYh94ulJM3EyLvqbzNguS9RztcdQxt18IBoRLu
-Q1a5bdhrIQJBAOE7DnRG/n5AQpmAMObQaMp9sXafVly3KltLiEkJEImGdgg2H43y
-tf+1mfBoFpGF7tI574bprFT+p/IpG4D+TE8CQFWhVeK+OUxRx+bKt1o0wfMCne4I
-i0bGV464m/YpEKQxanCTXy97IZevYlKbm+VfQ9+c3JfE75jilUSlOCX3teECQQDb
-l1CIXY9SWCSWtDz5TMheZB3ZoY/55TsOt52wV34gF1CMwPgS1UhMfyoPEeyvBP3L
-SWEXEExMsdvcZefC5CxRAkEArkFcrJ8KTJii0neLhFi1UkuKdoGxeVx9TGikV/fr
-wXVLTrG/SyVKjWH+qMyN4B1i23MQsdBtnL6e1+q4tXcwTQ==
------END RSA PRIVATE KEY-----
diff --git a/tests/cert-svc/data/TestData/ssl/cert_chain/private/cert_chain2.pem b/tests/cert-svc/data/TestData/ssl/cert_chain/private/cert_chain2.pem
deleted file mode 100644 (file)
index 898f118..0000000
+++ /dev/null
@@ -1,15 +0,0 @@
------BEGIN RSA PRIVATE KEY-----
-MIICWwIBAAKBgQDbXqarYPOF9g0HF4yuUngTdSGM00og0Q2K4jSV/9IxKedi6azO
-Xqbd96A485ayJAa2yMYGV7rw8GkIesG/h8sGK3r8gSY2gUYEm5kfHw42Ba998lf7
-Jh2lo1uvcB1vVSvW3zvdS1EeF6aJlF4WnAj92VwerXnxW0LCN1lz2eW1ZQIDAQAB
-AoGAfGJmzrXiXwrsyCCqPA222BGKPHdxiLoAm8c3WfX8ELRZ5tPoj/tLUoCd8Kzt
-vYR/6hRddCs6bHNkmtJAGYG9s20fU7o6TrFJd/l4qjYVNl9cxKaWoMXN3xmANrFD
-3ZiXOotSQrNCqJdllg6AvezCNRL1yDGppWXAL7TM2OGxTAECQQDwYJPFSid+CMR3
-fQTvQBsmdsrUSHaDIENMYHAfq2BqWYIkNRL2PHmhfiQ5yepi1MzQ2clq+2Gbvl8K
-zmMkiEcFAkEA6aCMYZkXCM33+lRnBd447qGpj0uYgH+VGmq9WPhugfag/UtdVfsL
-H3pBnMcfLctot4dFgFGKaAOpMDRVVZBC4QJABQwCDkJgUeUdOuUFFYDjEQutdoeO
-9XHX9+KOeBvBCnqWoOv8We8rHpjnac8zfJ+7LSdlczmT8xEsLa3npvy1gQJAXaBR
-oetQJ98jOdcJUni0KC3xXdPV0elPP773Eui8oKjN67SAOyzYUE0WblX+UMPru2Ei
-oUIMTZLqAr92U0v1AQJAchSMGsAOQ113Ck4O5AWOkegz9EZFkCs9g1kmNxBmLVtv
-11Jw1oMbJG+03OnXyf55zRroTCXqqt8GZUSQrVOg9A==
------END RSA PRIVATE KEY-----
diff --git a/tests/cert-svc/data/TestData/ssl/cert_chain/private/cert_chain3.pem b/tests/cert-svc/data/TestData/ssl/cert_chain/private/cert_chain3.pem
deleted file mode 100644 (file)
index 8deae87..0000000
+++ /dev/null
@@ -1,15 +0,0 @@
------BEGIN RSA PRIVATE KEY-----
-MIICXAIBAAKBgQDGPcflD8dZKKq2/F7QDZVt34yCQm3vqa1RrHPB4QqhjoBurAo1
-VWE9RDJG2fcDSzGw4qKz+JFL41wdXOBIUVGaBkEa4kxFXMAqhkREzgECVuabS41e
-Saf5QBsAk5HWLiSfHwRZ62hR/nS6ErC4fXvClf+mp/3eiqFp+4CFpaZDTwIDAQAB
-AoGBAIJPyj7AiIILQWzXqFuLElcPRAW8NRf9qXiuq8kebSaVzcbyQCOe5DSpx4Lb
-dIwtuZRU5i73jkscQUjr7GKdUc2NHvCDQzjnk7S5uu8NFiHXqVXDJxHwAZI0svzD
-vFilu2E3r9Wj7dZa7l4uSEXLyagdwo0bD2xcrdwnyu5qLTuBAkEA7CUIGOEAK7ly
-Xweti+/fnni6cznMmWi1DDeM39GtbxHI3oPa2d7Ddkn5ZWRtFbIepLWi5+k6Xzpz
-fkCaA3js9wJBANbo4y/L/QKNhASI70DlKwFiJr+4RmQ1739l2BDHW+8crw+sM3VZ
-exVtHHKw6U6wqLMvzaojVZwnEJo05uWQ/mkCQGU7jtgThN45ttUUVoq5/3RRLyT8
-b0CIyax+F+9PVPlbd3AkuGpT/Bk2pyqXPchiPo6/qyGeMz7lsOM70IqSiYsCQGUU
-6u6rSpityT98zNPANmcTLFiWqv0tZTWNyH+z1Sj1W93KR/XVHZBpXq0PSt1JOD/3
-pwt0TSsCMMvnQAcQGKkCQCXU5eHdRmhCp9Eei5+fI+XUhBLkqzyrqlK1NVijgXTE
-kSXhaQWG9iLDDNgSkO6ofCPOTwcfIteXnc1OjGB/0Jk=
------END RSA PRIVATE KEY-----
diff --git a/tests/cert-svc/data/TestData/ssl/cert_chain/private/cert_chain4.pem b/tests/cert-svc/data/TestData/ssl/cert_chain/private/cert_chain4.pem
deleted file mode 100644 (file)
index 7e246a9..0000000
+++ /dev/null
@@ -1,15 +0,0 @@
------BEGIN RSA PRIVATE KEY-----
-MIICXAIBAAKBgQC6BTD2ZW/G5FQAcRyFbF5aQmffZuKjab6F2YTAixu9TfLv3wHT
-ZTP5ZpoIeeEhbormPNyW8kPpMmidBgbX/PvS2lgWgRnM10Mg9IXBA5s0wGx6oRld
-T0GM+3R9TIbIb/nyyNQ4zMBEC8CwDUgrLMafkiEtgN1Lvdrifa31XaelfwIDAQAB
-AoGAV3w1iMwwA5RCxWptBXrv7PcqLvEOSdhjmEOyoXNK+n78cD+rdiY0iWjtrGrV
-rIl2nc2l2P/bXIMunBrHgTEjpTtQQIr1n8xqCJeyLXaVaCi2rjLYSdvxC+lABoMc
-/+pODEWl1VJdEckXg9w8Jr7VY0toc3zeKbsZJuGr2O559xECQQDiYqx/fFhMb6tN
-+/LkhLCCgeHbURSW7UABiOocNE2crznHfZcWSD04GLH/UgwhP3RJ6CHcOtmXSD11
-ZQkNugZ9AkEA0lq+2QxhcFDAeJWfeFFZLw8I67xRY6tlZIiOQyWnRFVh6eHPvduU
-BfYxBU6FA9G0MAWgGxgZqtOLxqnQIuuQqwJBALlnSJCsHICVH/2hLv66MPjhOEDu
-uWcV7MqU/+6TY1DELRTVJWzJQuHzT6uj3W1JU4rHwxtjUxrTvgmr8ms8g90CQCGE
-2kJlyaUHCRRt6yJV/BsWjzpZILL8HcT+SYUDm/q0jEyjceHz+ktU5ozM7T8ljEvW
-qaOHnJdu7Cf06TiXRs8CQGMP4OjEfVMq+JxG5puFaa8e1fbSjiTP4EsUgRcE1Bzj
-UqT7VwOrJZXFTYK7Z9ZyG7z03WpVeucertzdRNNby9A=
------END RSA PRIVATE KEY-----
diff --git a/tests/cert-svc/data/TestData/ssl/cert_chain/private/cert_chain5.pem b/tests/cert-svc/data/TestData/ssl/cert_chain/private/cert_chain5.pem
deleted file mode 100644 (file)
index 756db4d..0000000
+++ /dev/null
@@ -1,15 +0,0 @@
------BEGIN RSA PRIVATE KEY-----
-MIICXgIBAAKBgQCvZuDBLvl17QsnszrJHZ85IfkU7hyk7sPwJKbHQ935A9BEAeUZ
-6XsmZTw9PZq5aSoARg7LIJjGnTd+DJCm17BUK0vzPpsZM6E062Ljubv+zMo62fxx
-CmXvMPP0G1Xwi7kS2FAlJaxdY5/RxSHyWgSxKjSgEmAPij6rooflW9ZIvwIDAQAB
-AoGAUnAV3nYHhSdeANC6JmAnv6B6Ax5OlC4sJSf0wt7g6vKh5fTGCsGzwb3+7AGS
-QOZueSZ0OYAejerCdBnPurrRAlZLifGptbvinAu9lRDpmaF2HUmQa4Dc0c+Y1Roa
-pzWnPzMWlBrhmWqmK/DwZNJ+Vusufv3yO8epjsOGCgUVUiECQQDnRPDf0KyJlzC5
-Xc9Dc3/pdn0D6La3IChyLiPo10rg5dBN/mTCnlPxnvauiTQkyPS7j+2n2oUKwcEE
-jVuwKf/ZAkEAwiiNEsejDkTLHIwDVkNa14+Glh3s0Ct5ajFv1HslQesKElMnjKVy
-ab7YAQBij9Ty24p3K6mdGWY5Nwe02JNGVwJBAK++OfU61AJyu/oBCaHOQWOeQP4Z
-d8/NRi8OVQd5o1MoEJVUPimOu2efTwHvDYruktt9UjH94p/8ALt+2DAUmnECQQCw
-EyhEdKlJYle0DsFj9Hcob2+FKaQ98H8OL8ETt43FJsqebay7HrsQbNLkrZ20hFCt
-ifeisBHZG9wdLK7zjTPHAkEAnGsXnM+YYDlm4OwChrpq0qcuud5uOgx4RuCniEol
-mij1xTDGrJGLEBkFhZ+KwOLoaM8m7javKXQejqTeE6E8Fg==
------END RSA PRIVATE KEY-----
diff --git a/tests/cert-svc/data/TestData/ssl/cert_chain/private/cert_chain6.pem b/tests/cert-svc/data/TestData/ssl/cert_chain/private/cert_chain6.pem
deleted file mode 100644 (file)
index db255f5..0000000
+++ /dev/null
@@ -1,15 +0,0 @@
------BEGIN RSA PRIVATE KEY-----
-MIICXQIBAAKBgQDOEiDRFGABR6pMZhtMT4cv7K/8EUG92Zh6uOHdWdDAnkDSt4vH
-imXqDQw28eZFYdxvCCdi0HgbJnHU/guf6oYbQ8cI1sXrWxHJi4OOpwUNXGzOq3Dg
-fQXqBjn5jJRWVjdisxh3veFbU6EHTcfMxkwu76qDGbWs43IrDXJ6CsqBbwIDAQAB
-AoGAWzE2iI/ltGtMd6av6eM/xfuOHZRdbXB/w79RZK08biEaOqWzG8ipNRw1DZOa
-/ZVDAXewRlBO9mTa9xC9gDU+xsKywipWyRPnv5Yy7qfT+NP/JZCvwlL7qhqtHXzt
-KPpJ5GRxcJ+o05CartwA7fCXdv9T/qF02O2nZxCIYOpFRwECQQDqMoXwT37xvE5/
-/efvGAlBQGCj02YdjBxWRwx5iq1HeU5H4tqTKrfUWyI1m3cZFXUzjz0iH/SoK2jL
-7IwMwl9BAkEA4UFIcDVADwJMuLPqKuIDB49rXY+BO9mno9hfgcZ4Y/fWZcF+lJtR
-Mw8H+PsCkObu603wxiQGWIsyZPorDTZkrwJAU7S7Kqk/NieX5ydZPpvYsvnPkL5+
-QRFTD4NVchue020IDamHdhJOohfwojhu2QhSW5tWvlutlm3thvWFGQpgAQJBAIHz
-uMfLYM6H5B025qSgyWCmNCnA7azKr/VNkiP7jV8XD2CbFdzEEj9jr5TLszpHkJS9
-3WdiRyrz+znYPdgchk8CQQCzC1Z/NbGXu7H/OjsMD6SNgpZDmqctdXjn6jKjZr7c
-vtyoo2WkJtkREWzWPd+pEDxJCsAuxMCtVifJYLkMCa+w
------END RSA PRIVATE KEY-----
diff --git a/tests/cert-svc/data/TestData/ssl/cert_chain/private/cert_chain7.pem b/tests/cert-svc/data/TestData/ssl/cert_chain/private/cert_chain7.pem
deleted file mode 100644 (file)
index fdffada..0000000
+++ /dev/null
@@ -1,15 +0,0 @@
------BEGIN RSA PRIVATE KEY-----
-MIICXgIBAAKBgQDVwhjz/Ao8Tvcrxv0f1xO7NXRuyl2rCWch0O2n6Jl+eVK4Mj0r
-Xxt4DqortucD7PV+tFQ7h9kCHsfmBM8nezbmL46OlPdbxm5RLN4X2gRF6jHQlcRQ
-PBaOIcfwDrWGyFhIpg1NoqaMgXpniUNWHMrjaYoIBVe3bQPCBK97Ye6EJwIDAQAB
-AoGAb2ARplalcqTmTm4BB20F/94rS2qvgWWF0e3NVlZwW6CVRBoRGx8T7eseKWbE
-WZxGkX0eAmKW5G7rUuMgmH6vrC2NjFBNvfMLPK3kVxhQVx3Rwu9nN2/u2olzBcMt
-epGj0Yyu7kRHol/ld1+DmoBUOYb6BlOpDyGWdFFa4eW1IhECQQD8s/SXIMXIHBF8
-tUd7rPXm6e96php4M2jaY1ezB5MO7laNivcCioIHihWgEY+BrzuH8moeJbLL1TtJ
-KhzysxmPAkEA2IwQYLVOCfKegG7yzgkbrrzwdWNi0i6P2LAl96kFWzf6DcUTuHun
-GYGMv1yCMj/jzZ+k0VTMWETgJKRzFZUv6QJBAKlxYQgVCYlsiK0+QHhFOX1kTxfG
-WOlQT3ZgNmXtJkZUueSe0ZH6ncXAaU+zdq5WeWxmt5EPZhwXFnGws0hpnzECQQCL
-QIbHqc+lVf/XV4GMPQ8wLw/ybRb/UjHuhlfkCy0Gm9iRQkqMN/gcztJTvIl9BtjX
-QfIbKwy9No1tAtN+7ZEBAkEA8T3mn9G2pTg/49iBP0TW1fJBsdacWj8ZK1D3egto
-JR7qKqVyQTifeJpeATTX/vvuTu0ikbshLotT/UBGy8dBtw==
------END RSA PRIVATE KEY-----
diff --git a/tests/cert-svc/data/TestData/ssl/cert_chain/private/cert_chain8.pem b/tests/cert-svc/data/TestData/ssl/cert_chain/private/cert_chain8.pem
deleted file mode 100644 (file)
index 5982533..0000000
+++ /dev/null
@@ -1,15 +0,0 @@
------BEGIN RSA PRIVATE KEY-----
-MIICXAIBAAKBgQDk4MTchgCUabHViHLIwlLAVmIO9oCi745o+drZhQFZBF73/CMW
-3P8tUgqMgZb6JB1LiWAsJRrrTqYhxR9bh9ZljNfholVnfgF8KITXI1b0+OGcpB90
-/mvAFMz9BXu69rDj9X5GznA5XJNDAfitOKYMcWCeCw2/QmzTniFMVe10cwIDAQAB
-AoGALlxlI/I0zds2/XTdI1NRZcpZpIRD/D0gEJ2DugnaAwkCn6LADNKJEcoLfviE
-93g3QuS5yVdew4kz16VRO74hLCCjm7M++isvLhljozWAotBVfllQ8g9HcCuG551y
-y2vTDbrKUfeNUELBd2DKjYMN4K3gJRzPcjh6eQvZ238fl8ECQQD6cRMUPzdKLwQp
-dlTQ5dBeLJ14cn9zoFkBkgoF1JGXtDxhs+5elZQPS+skPoDy+ergjOMN8ixSaQ6T
-FJ/X73STAkEA6fUtQ2x/Q+YJcoRr5EEKqtyEPIZEeACAzRdxps1PAI++vafjk3x2
-5v/pTcpAEMSRzjZtlQTqC+fkx2vMANDMoQJAMPx7IeO3meAWbVHDB1Vca39Ike27
-dk9v+XmqUjeg/s53XRkH0CJr4o4UAXPkXyJ5SdDk/K5Y8wmvmx9WoLMq1wJBAMKy
-SX/Bq8tKhXQqpUrnocP9DYL8zb/70zRaHTeNxgAWn8pfDDFxs9WbBIG7HUOXAivU
-+a64zzknOymGGNhY6uECQE+NCMEicPRY8yNuNX2Ygr0Uxwbb0we55N8GA24Prkrl
-crhKfL6y0MdsHAgnIRaGV2+mpehS9TbVlx31AdFrugE=
------END RSA PRIVATE KEY-----
diff --git a/tests/cert-svc/data/TestData/ssl/cert_chain/private/cert_chain9.pem b/tests/cert-svc/data/TestData/ssl/cert_chain/private/cert_chain9.pem
deleted file mode 100644 (file)
index 37e2d48..0000000
+++ /dev/null
@@ -1,15 +0,0 @@
------BEGIN RSA PRIVATE KEY-----
-MIICXAIBAAKBgQDhyDJCX6hTsyKjWJp8Hv4zEmRcPkUYWyOseUNF12RvfOSjlVz5
-4cSxY0OcfhCBqn/etbeFprVgOSUiSGTFVBpusSKQ84wXhcK+HIGqpnsUtHoTspRy
-Qu93zDCkyFyAskcu99tT6q5jWhkgMCvx0KMODUzAyX6btQvbUWrnDnRp7wIDAQAB
-AoGABu56fIcrR8aMHa+urnjVHQRHiH1w6ZqCsdzXL+G496NB8bO4MwO3YirF/Jvy
-LcjqPBAgHj5L+zRF65OFZHl8hjKtKxeRvZcFe2XhUwPCN/HJv6OPUSUSIGMxL+XL
-4G62lt1tFHVZRjy9mLyqOg2SNwun6c3+dOySdvDY6vixxgECQQD32q9mwkHx8NqQ
-2GTGWRNgIDsCR9bnmy1gGKxzKhQLdg0cNwmQrfTCgHXwfeBUr1eSXW6RqTx/WGlA
-LqFdyiTBAkEA6TPOoAW+EaXPxx21MmzbqqgK6GqLh7NHM2Z2rkqR++933jGJqS1F
-nr4jmWLoSQX017IPz/mlDxlL++CvWIXKrwJAHXMbgj80rLWskqdTmgm9dp99w3Cb
-xVs30gI8g1aNmSsGtcKIXWt9+Jpg6RlbzVQkOJznZWFRceQkZV7lB4rcQQJARfTw
-qziNyCWBqy3SSYo2a391pjswGElDtruqJqbgHD++Kb2amlGmbPSFIWJ2ZFGRHZOh
-ArbVOS5RiQHiGCAqqQJBAMIp5kevQOAr/xYC8BLB6SD7XtfLKTJnZSHy7pWy6xeJ
-ffn7QLqwUWMcyrvja+CQgBTKx7u8/MKLSgqohWguWEM=
------END RSA PRIVATE KEY-----
diff --git a/tests/cert-svc/data/TestData/ssl/cert_chain/private/cert_chain_no_aia1.pem b/tests/cert-svc/data/TestData/ssl/cert_chain/private/cert_chain_no_aia1.pem
deleted file mode 100644 (file)
index f91598c..0000000
+++ /dev/null
@@ -1,15 +0,0 @@
------BEGIN RSA PRIVATE KEY-----
-MIICXAIBAAKBgQDNNrJ+X/+2VFhuPKiMLMA1EN/YFIpD6iI8mddzEatkxkmVWdfE
-ZNmjoPloi93iobvhqujqrkZx+Fw1s6wS59dBPUU0P240jkFfvD4QUjMuR4uI1OjM
-XXtmldUNjB+R6YXfoGhAgZeR8IonaQZDe1Lqcn4boiYu8eKSwq8bJ8FskwIDAQAB
-AoGBAKtzAVm4FspcWa1wHFlQoh0zxfCf6IypNoVu+qP2pT2CtMOE1lIM+BBPU1DX
-WkAYZAI8anB3vf9GQrPTMvZwoFMub7ifTsgBe+gJzbWKpfuDYRmi8figArTopirg
-yphtF+wZd5x0Yas0Ak+mxfojUuWF9Scv2p3yiope5KYkC9/xAkEA/KqYc1ucAzsV
-qIfZDWv/971IcJacWFm+l1M/jZB62Cimtkyw4zvPV6O6QOOMqJMyBJPE7AWBEGBS
-G7kO6yqjhwJBAM/r01/KtZErJL/fZn+bXJxxYgIZ0oBqxEigcMLiRSjyDiVwyR4N
-0BeWrI0IoVQpJeWCq0uL/cKmA/oMcDtriZUCQCB4M9svPJ9VqnTb8FK/PEez9Wky
-kajw74M22YXxuTeqEbJ/rIOnHgAfNEI+e8b2E4lvC/Fgy7M1DZgucfJaqmUCQDb7
-4zr6zUclhKNk/aMTP8tzRHrPv1YMZfnay9cNpUJtuIX4LIdRGc2TH/Bv7tHly8rE
-4m2pCKNX6cdPUMK17n0CQBt2Y0RX3Q7OoJqzbi63JtP4eYwdaI28xnncPMhvwWji
-arwmzoNeD7T7tkOEZOC+rlhXZaeZLI6LYUyC5ouEn3M=
------END RSA PRIVATE KEY-----
diff --git a/tests/cert-svc/data/TestData/ssl/cert_chain/private/cert_chain_no_aia10.pem b/tests/cert-svc/data/TestData/ssl/cert_chain/private/cert_chain_no_aia10.pem
deleted file mode 100644 (file)
index a6a95d5..0000000
+++ /dev/null
@@ -1,15 +0,0 @@
------BEGIN RSA PRIVATE KEY-----
-MIICXAIBAAKBgQDfBy/uVHZJUp8Wego5L0RtF2fKagzXQsJFYPm3ouLqL1MUaQJX
-Bn5Etsdrn0G4HCoXazilicDs4kzAWZdsjRfP5YY9O7FpkID+hHs3TrkdXpj8RjjH
-8SYkfXr8+tdRWdG6XweFnkPf/W5fNcik/iSiXoq7AbVdxcsOQPXpTAsAQwIDAQAB
-AoGBALSKYOaRQN/CHj5XtIbuGHonBEH670IiLJl1EzDwjrf8b0iKaPaBrx14yJ36
-YXzkb75dcZGvnZkk5/SdkdKxtJ93Y83Gan34fWXWZFurdBs6B26v4wVAaRYofR53
-/75CnfCDelDH5HgtHj8tw/F4zBIxC3r7CsFn04lKQM+mEd1hAkEA+rYoUSTA9RPB
-1Ki1gRiwph3Zan5Tsgt2qngWU0Ek/wsqKkwSeRgHZ5AkpsunKal7bGKMHA3yPo02
-E2EDEHLmTQJBAOO7ifiUoN88roep9pl0diYfLclTUakPViDlzIO7gulvNR0mq43D
-BH1JAUVMU19A8VbilKnUS2q6bqpqaCih6M8CQHUFnV/ypdY++JRIgx/U5G9FM3xP
-psVOMH91OgZ2O8yH65B+nYjEPICMeW8ZU9dQcnmurfNSVyX3R6xX9dQxrWkCQHLC
-1TqBm7gjmkgfbHfUap23ZJlp9WLeqaaWZ0OTQNtmATwZeqZLun1wRsWnOvRrg7Mn
-J4eVxhOYs6AJU0f2n50CQHfQU3xMJiTFfLvO8FV4fD39w141xYooC2glDWPFns+b
-v3Wkd9M6Nuv+gOB9vdG9I5+X9XSkKonkmcwU9Odjv8k=
------END RSA PRIVATE KEY-----
diff --git a/tests/cert-svc/data/TestData/ssl/cert_chain/private/cert_chain_no_aia2.pem b/tests/cert-svc/data/TestData/ssl/cert_chain/private/cert_chain_no_aia2.pem
deleted file mode 100644 (file)
index 265f30d..0000000
+++ /dev/null
@@ -1,15 +0,0 @@
------BEGIN RSA PRIVATE KEY-----
-MIICXAIBAAKBgQDTOaekGWEoNU/wm/C4jVXp2k01nj1swDCxi8BQpAhq1uP68/HL
-nxQutsvSFz29izGOyJUT8PwDQjACmGzuKunBKp954Ak1p269cGKuCVNUqWI2I7cV
-mAHGxVJHoYzB3nxNhjjQEiRXdpm6HyNiIKV5EqKakLiqUJZZFu0pdJ1nUwIDAQAB
-AoGASSfMwe7wUWa1exXnN2Pr/4RV/V4C1Cl0M+m8/7DwIWCvsPjQI7/C07MHwInA
-HmeZEGS0DSYHgnFoA14bTBmcv2Jh+XJRsjN8Qari8gsfoC3+gTT1CuvrVxP55xM7
-w5c/hUKBIbhyAMHfcS/lqV+o+1ahxSMtbHWkKZYL/i3h/oECQQD/lt6wu0Ne2jwy
-iHchL6l+Sz5bMpW9Qx23WpwiGPOlh3YzwDZHZRNmkJbXI3sIXvC8mjSOhyxI33iB
-NlpoZEIhAkEA05CJc53tiIBqg4YzlxKw5u/oeR0qvGFJFP6D8UnRTSet0R/hnlAX
-VVns28irMOGZ3gRLskRxv0EMRoViO+Ji8wJBAJO3qYrxH/XRIZt/HYLznf0dFbP1
-n29cO+99keFvFFol2V39iCFpPHY5uMQsgG4NGQuYACoj26deaLIdLNFKqKECQD4A
-4ze+NipGMHFBeIczFCNqdkBgmvDAtlFv0i16C9xH37olVNM3986s3yz+n6VgyN53
-ddPWGVwK7VURrFuOmp8CQEEDc0bBtkJgXfObV2PYGJRVuGGP6S1RqL+7VNfmu5/+
-ZJAdwJZOdl3PDL8b9XNSgayuBCK6Wwt3GGzdtvqz76s=
------END RSA PRIVATE KEY-----
diff --git a/tests/cert-svc/data/TestData/ssl/cert_chain/private/cert_chain_no_aia3.pem b/tests/cert-svc/data/TestData/ssl/cert_chain/private/cert_chain_no_aia3.pem
deleted file mode 100644 (file)
index 0217b1c..0000000
+++ /dev/null
@@ -1,15 +0,0 @@
------BEGIN RSA PRIVATE KEY-----
-MIICXQIBAAKBgQCjhFcier8v7KbTxvLhFJKOnbFa8m+Zn1MI0fnvANqnLcNkbzHf
-TEkgBoiS18b/DJlJ0MVXu+qHTQasaDVqPiNs3S9OfPyc5tAdZeSHeX7ZwB7Ne/WB
-v3mK2G6UIvF5ptxS6u3m94YxXbc5/M1z7Q0f8sp5uiUe9LlsvCgIqUaqHQIDAQAB
-AoGAbD/eV2sfSqDGSIj6nVs7MsLeeLDqhK7fD4XCiiDsn6RCKCkcwREFj/gDTgMf
-MBWtHRriqhQzTOMHOfe69NyyIf7eXihRjkX7Ist+gi1wiKqdr0ECECC3sGdWR/pu
-wLBDtC2ynqiezbxog+/3C3YWs0+DTsnn87aOeKbIIfoMSFkCQQDNBAqw/BKw4dDd
-msMGJqbI3UIobZVOEXLwTi3ZWwDMIM+HMJPyT62U67cCg35M4L/EMxYBYMhqdS3f
-tixN9+bLAkEAzC5ZxDEG4S3j44m1Ff58qBStbV4SBlM18jZgjEVqeYlqStWq8U7J
-lJLpa3F8C26bUNWXTwl7i5BIykpGjZ0ttwJAAdIVXjj+2X9H4Y/sR3O0a3g7jCxc
-9RKGmMe49IMwYJ+x+BtgVPiMLBRjzavpRTmBunZRrbV0Ui20OJZfklmvPQJBAIiX
-EVIgAhwtmOAkxVGbV0UR4Brj7Wbxz4rjOZ9c6Ke5d7PsUFjxfgS4axKHbpYvPhPL
-b1deXpm0wh0hpyUhWu0CQQCX+HNWjZ/3oGTxWHVWhj7Q1J18CyxDj7SISA87mv84
-QZuso4AGYpbuZUdWr2cJcBvbP+ZX7DCjsr+5Ns/3Foqq
------END RSA PRIVATE KEY-----
diff --git a/tests/cert-svc/data/TestData/ssl/cert_chain/private/cert_chain_no_aia4.pem b/tests/cert-svc/data/TestData/ssl/cert_chain/private/cert_chain_no_aia4.pem
deleted file mode 100644 (file)
index 6785e26..0000000
+++ /dev/null
@@ -1,15 +0,0 @@
------BEGIN RSA PRIVATE KEY-----
-MIICXQIBAAKBgQDLjdBvdPcqlkda+ePVcjqBlMcP4qKbEU6SFWHcP7j9n7iuGFQl
-yuAaj0n34YFkdkdatLydEQltx3EDzTirhV9pWu1rqjKnhbR1mqrc7O6dTgNR446m
-iYLjJhNCmYcEX1lYQ4ky7do06bLKM68p6yAL50oQDD8AlHU2xfhNS6SIlQIDAQAB
-AoGBAJMGntwypujq3SV4Q7mDpYC9Xr85muvYp2Da8vFsUYlYGcQeLIGTtSVaBDp4
-dsaCrG13CJmGmcHigd4WGG3DizK7HnlOU6GuKdJfISJAT0Di/oSnH1gpIxGzxsA0
-IAjrncQT0yPcXtS/YXv4VMhOHdWTmaZvsuP0aJjd04hg/yyhAkEA623ruT6oKxk6
-5QeO8OFhUxi9ahgzQYHfHU9bXshRoCVA9OE9EzxyYvQRJa4s2WcJoRmFpwTPQoUW
-iZnhKBBr2QJBAN1W56AFsqtNY33joZA1GIjZEhgbeZF1w+VUUcYWQ8wvOFYYq71S
-lmw2QpZdAhgFtQ5Sy31xVbbp7USrAoXNOR0CQCyyD6B5jr+v6Ih2qOJ+R1XZSoyL
-z59OIqeT20rhSO3YZL6YzFmMjkLPBzpaGNWlRCS7ja4psZd1YNP6zM4oX/ECQB0u
-F9tA5Q0wZq1yFRqt5U4lT/1doelLXUgelalHxihlEUhIeFu9R5d8j8rC+EOyfOwm
-fi1Lg8FZla433V1GcQECQQCDC1toUTOs6zQMR8Qjbg806oEeNCrXCuRSvER9F216
-W/gfkyu3O7ZMyTLDzssExEBemXqIwP7cPvi4AudCR+rF
------END RSA PRIVATE KEY-----
diff --git a/tests/cert-svc/data/TestData/ssl/cert_chain/private/cert_chain_no_aia5.pem b/tests/cert-svc/data/TestData/ssl/cert_chain/private/cert_chain_no_aia5.pem
deleted file mode 100644 (file)
index 014cc30..0000000
+++ /dev/null
@@ -1,15 +0,0 @@
------BEGIN RSA PRIVATE KEY-----
-MIICXgIBAAKBgQDbDHCjS40S+kdfXzpBkRh6m+OvmVZwlnF90Hzu2dI6kMtCyOsG
-pYEko9Ce0DMEiFCk4jI3GrikP3dWtD+pzCd+ycmJHspktk7m/PoXzjuUf7IUb0Ct
-eHXzCb5iDb6vQGHcFkuUTIsWznlfl1lWGYoj6iF8PQJTCTIXtifubjEeTQIDAQAB
-AoGBANOC9ZiYMUar6RMMbsI1CsAJmxdKJw9cFYZ5NMmmBruKaNq6C0dFtKfejmlr
-fHfZ8JTl3bsb0EK5DdDpB7g7a73WT1338htfrH+3e0LRsj0hU7SidXOgb0Cw922d
-nRW53198ARkPc3b20uuFI71+4x8Vs5KDHiYNs644IpKD+2o5AkEA8WdqEkLaY3Wm
-muV5l9SZ5bKFDv+lWV7AQTjUGslJOxlq3AwB4hBK5CJiiybYyTcV3e4jWJZfnN/t
-J5NSeXVY9wJBAOhK/yp/UqblY96LgrlrfX7qQ+u6/drPHwp6JvlAGFyPzjN5WAO5
-i/9FZdKmjIvQOBu1OjvKjS5B/CpM4cTcVdsCQQDvEZJLaWesDgyj49RKV+LdRrFd
-TDHtUtek/+mWaXcbjy1zpHSM88OnMKJU2nDgvKvsMHVSuwEPc/gCNHT+Ege7AkAv
-/B4Nx1NpioVA2YzdhKjd6MKzFWOPKa392hHm9yiRJluwImbeDhwvVUSdaS4rS43r
-m1o2M7dKUPMoQc15fxJ1AkEAq8F4Ij94qy+eGc25H4ZkGOZTdr6iyn9ffncEqf42
-xvLu/L+RSuPu4VozAqzlXUWSi5Msnmxx0GaRtKJXZ/7AuQ==
------END RSA PRIVATE KEY-----
diff --git a/tests/cert-svc/data/TestData/ssl/cert_chain/private/cert_chain_no_aia6.pem b/tests/cert-svc/data/TestData/ssl/cert_chain/private/cert_chain_no_aia6.pem
deleted file mode 100644 (file)
index d4cb2bf..0000000
+++ /dev/null
@@ -1,15 +0,0 @@
------BEGIN RSA PRIVATE KEY-----
-MIICXAIBAAKBgQCWTobpyriDSEdy+q0BqCbAxgkQ7zfgYuZr4ZedFcLliPruUIH/
-6/tIgG/bQbdRWGTrjbcvAxoLNttTHRl8Sfl2DDk280/p9seQXwLd3OdRwkTMn4dM
-E9TlkRxK7TOigHbIVn78yXMreNl+o7IjzWnKoaeM44yXPnGsyARWvZfN0QIDAQAB
-AoGAXqPJPRIAxeDP5CzEnGN1KzJGaRxG0YlUTp836JfYJNDwNvgIMs0yZn9Abwzc
-0WJYAR01N2u7jU4YISgUcPbfFCcoH0f7p5xknHee9CYXt+YkNT52YNdungP60I4m
-1EQID3Xn4/h0+vsb6ZnlUMWUFfxhfBtixvwQZuZrtixbLfECQQDGym+ysZvvxyA5
-SfiH8Ixs93hixX5csyFyDieNFntI/otZt3R+RKSHSODGAXbPgOzIWrfD91/YA6R2
-LotEJFJtAkEAwZAdZ2xvV2uVuOxre5CZtXw1dMLZolC2thAmrqoAdMek1UcSK8wI
-ZdmE9XneAKcQx3esR0AvTIbKx24/6DFqdQJAOiN0fX+CSqMjIn4myKMqfqf1tnVq
-GnRtQK0xFgtQLS381VVZJaCvub0vt9kvxUpAdexKOG79wfB2xfWg12IEFQJBAKnV
-qGcZtqvuwuUJ09kMbEHYJRM48DpCNb6Td01j7piIn7Fe9aumD2xGKio07ryF2ewa
-rfeqcpXj40KPEtXJng0CQEPJULeB6FKRqzGWsyIe4u7ow2MjMIou7m66HyjvjkHP
-6Rg5DA0dSEjwJeMFQ8AklKPtLyuIyrkFunjctYXx0Cg=
------END RSA PRIVATE KEY-----
diff --git a/tests/cert-svc/data/TestData/ssl/cert_chain/private/cert_chain_no_aia7.pem b/tests/cert-svc/data/TestData/ssl/cert_chain/private/cert_chain_no_aia7.pem
deleted file mode 100644 (file)
index 2882a88..0000000
+++ /dev/null
@@ -1,15 +0,0 @@
------BEGIN RSA PRIVATE KEY-----
-MIICXAIBAAKBgQC0W/5IECvrWK/GDlcqpVzMV4VE8tnRQ4TTQIv3euDosZ3o9LFF
-xmcUm6Wo4o/LMabbYZANqgqeJtxLCzOifAdyke5q7Hc09H6lDjkTqNWGhhJbpIs4
-kVckjak7+PGmSIkgqVuz/spW8MrR7JmcV2rfjiOhfr5ffM+p2z+43KGaOQIDAQAB
-AoGAKiqfxoVRX1J6tdlAc835ZiTIGZiVaCFa+nDKyG9ICd8Mxhv/HgsGqoDBODzP
-1XekRQIIRcmNdfAr7LePuNs6eh/qm98UulUr6zpEMXu8/DIqI6Lf4F8GMwMaD2lx
-qmnQK+fziDrhrw10Y1ijy/ttEg6wDwCeQJJs/Iz3ncOEIMkCQQDo93B/RhJas6Gd
-bIC5IIe5pwvyOzmkn6dOWCIZDU5WXJ3A2gtNDdhO6MunaFCA2i+R4RSu8dDQjUXC
-dtthEfVfAkEAxjEGfrEg1NW7ug6CB2yvJiKzoHn6mVWUapKWfbstaodOrU1+WWtU
-CpWn0cm6ytGOeSI1Ylc2vnp667QikWq/ZwJBAKvV97CpKtikLs1DPx9OE06pHHKr
-pLT83hc3gs8ftWyWG/Yn3rYTRD3QEIeGtfqU9QmREASKcQ+jZJUvvlk3OdkCQArY
-9hULFtPvWtYFI0LKxQ9eSNyYsImh8Hygx1HcY9D31OuRWUAFqtTlegj2dJ3TOGwS
-3j8irOFiDMZH1riE0jMCQDtk5fJZd61phQ25I4mkBf4+8qCOiiWneuapdJlX1r+C
-5GmsM9fDr/m+pBNAbQP2vR+38wSHEuEt0U9MC7NEAHU=
------END RSA PRIVATE KEY-----
diff --git a/tests/cert-svc/data/TestData/ssl/cert_chain/private/cert_chain_no_aia8.pem b/tests/cert-svc/data/TestData/ssl/cert_chain/private/cert_chain_no_aia8.pem
deleted file mode 100644 (file)
index 9380709..0000000
+++ /dev/null
@@ -1,15 +0,0 @@
------BEGIN RSA PRIVATE KEY-----
-MIICXQIBAAKBgQC8dmzRZbvDmPpNGTSmQ4rBHf8ETPnJv8XZTAiUokxVMQloOjVh
-xi59anqHiLohTF5eKNnT/QG8TuJVqNfVoHLRtftv+Mp69+aJsD7Jg+X9jan8Cv2g
-3aIzF06gDjcisu8n5GfVWICLFqGiVsNzaX3uR9mvTRl+nysIrUtRB0CZ8QIDAQAB
-AoGAeD+3vwQCghMh4f+rMEr4RbA1/zB+UNQkEToKX4wO2Gypa+94ECK7lxpRhBkh
-ag2oSLwYAML2UIiksbNBw/TUTRJUIvVFGNj01ZAY/ToySwZyB+iGVvYLs14CWCh+
-lIG8Yv6jeioXW6lUYuKGX/8MgKxsYqdjTuNDBUTU/wYHZgECQQDezuG53RnhW+cv
-612+metzu3+9tnz1YME9d+xJSHehNG+44ZojxIujYaZpwq4riPfPp61JKJmJ9A1p
-QUDQfLeZAkEA2Im5unIRak409a6uNlZ4ga6ISROewyoGe+pzch7trOGgcmcTy3mA
-ZqmmRcolcpQ8Zvk/8pEbgSWwh1GxOuOMGQJBALwEyOcXdad+7nC5pboaGV7ocrud
-K4XFyEwezv5ocMtQfJb/iht02IFe/hdxeZizVKufS9PYtvh7QnX34sIM/MECQGHy
-Cjy3lAEN1w66MLsLaf7ev26unUWSINS0O/wG2WM1u6mDzoRfNSE646b1xPKK8rdx
-Tuedk19bePn8jbohayECQQDWDO5OcgeD/3Yyy5ybll7UC+8O1RWHx/aYV6xI1Nbm
-G4UsxB6jeEoHUD68YQ/LCaphFsrcYDK9KCaFn9qqcGeJ
------END RSA PRIVATE KEY-----
diff --git a/tests/cert-svc/data/TestData/ssl/cert_chain/private/cert_chain_no_aia9.pem b/tests/cert-svc/data/TestData/ssl/cert_chain/private/cert_chain_no_aia9.pem
deleted file mode 100644 (file)
index 99a1155..0000000
+++ /dev/null
@@ -1,15 +0,0 @@
------BEGIN RSA PRIVATE KEY-----
-MIICXAIBAAKBgQCocGkc8UikcaUr0NjxAB/KKhfQP08fQ6AEUj4oczsgA5ZHmRnc
-lTVBrwNOCAHB1QhlTHWfKXPTq7P1nOfgc6hOvv2GZ/f0IEJ2OYWUkbhsdADIyIvR
-JDiS3XR26Mpp9paqKRsyTtdlTdyHTP9g3ESlBmAqL0jmoJyT6yT/dKXQEwIDAQAB
-AoGBAJigAx7uo1wefgQN4gW+jw+oxJs2QoOZy00fGKOehlyj43BNEloF+ZPi+aOj
-LbRtTIY9mfb2oLWUSCSuYI3JPx9jIsNMeCgn+/Eo96mjOPvifKgz0D4tNPsGTmf5
-PSEDPdN6NdpIuPoCyn8dTEseL99FDe4JNu1Hotm6xzyl0m+BAkEA0s2LJKsQZKFw
-APuwpvLXiLE2n3jxZzxNTJY4X3TGkcDPkkh7LJLo/39KkGZ6jke73IY5UCYXKrSU
-t1UlPMTx2wJBAMyNnx2o4c0P3KRyOICS45q+9CMbASIN7aSxNg3Y/bb9R0sVQbXc
-C8HpfUN2erpMy2oCjcIt/aU47tTCrkJvfCkCQC+KY2L1oVDQh63xFTnRcoJFVQhK
-AkdB9jzbdAMzFsUwMp/O8NhwmVNlpa9DLUiBLQDi1HIa5Qagixl9flRiJhkCQGB6
-n8T+hdoRlDEgCpRiM+YmEMKKFyO3zBG039jyMuDfX4QDd6XOLuF8Pm/WbxZ16C+N
-Gs2uoYcPbl59oHGHYdkCQFYRupnzOGMA6qLlP/moi0j7OzOK0JpMLCvkGg5GcNVl
-MD2Jgl3O/7JVWQQ/21rS6BLbQHr4Uty6T79bHu6ZeYY=
------END RSA PRIVATE KEY-----
diff --git a/tests/cert-svc/data/TestData/ssl/cert_chain/serial b/tests/cert-svc/data/TestData/ssl/cert_chain/serial
deleted file mode 100644 (file)
index 87523dd..0000000
+++ /dev/null
@@ -1 +0,0 @@
-41
diff --git a/tests/cert-svc/data/TestData/ssl/cert_chain/serial.old b/tests/cert-svc/data/TestData/ssl/cert_chain/serial.old
deleted file mode 100644 (file)
index 425151f..0000000
+++ /dev/null
@@ -1 +0,0 @@
-40
diff --git a/tests/cert-svc/data/TestData/ssl/demoCA/ca.csr b/tests/cert-svc/data/TestData/ssl/demoCA/ca.csr
deleted file mode 100644 (file)
index 5c09561..0000000
+++ /dev/null
@@ -1,27 +0,0 @@
------BEGIN CERTIFICATE REQUEST-----
-MIIEnzCCAocCAQAwWjELMAkGA1UEBhMCS1IxEzARBgNVBAgTCkt5dW5nR2ktRG8x
-ETAPBgNVBAcTCFN1d29uLVNpMRYwFAYDVQQKEw1TYW1zdW5nIEVsZWMuMQswCQYD
-VQQDEwJDQTCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAMXhh68aWUeO
-MDqFnGm1yuqgKJ5gL7aLXkLvaoptZnZchTi+LbzDEIhAyHLVZhzW5TTalY9IsvqI
-B+vax6kYSJl1vzIqha7dBsHcftCqJqlDwl35pPOOfDJBcMjd211arVe/7XHIsdTm
-OaGpBVF/7WGMGgla9HIFLnr/EocSdxq/tyU82TPHBpTfjOnkXxuZLkvcTBdm2e3Z
-a6iLoXZBUwqAEbbfTQnsBClcBgUyaVR1bxwLjEbjmg8N9RvpHSNDhVBQkjRg80zn
-ryxojICHB3JplfNBFGJ+PtymRXQEouvzZRiy0tLRHydvULO1hsVO/mGtaKyhFILU
-kn240w1u8aiyM/7a1VEy+hYS4lLOiQnbCsZI6gWdzmroa1tBOOV3mjTb0tjnxIGb
-Gu2fnEQMrKhRBN1l04hELBlTUqGgvXqWBgYB03uaHt61Ul4HjAPqLWkmWu/CZlEO
-6ewoCoJHCPR0Z89gGdrcMzJBaF2dsceurIcYL+rSlALTkpo3SiQiRlqcNSQQUUhF
-cE+fsQq050gXxk6AMjZi3EZC/Lj2Z/oYcf5hiwt7gnzMux5A0Mxob8g4gRGIhOOx
-DxZg53X9frdTW6xnMTGHq2mqmVtQnquvz6MNcDw7cnJBUQkUWHkq4wvL3y6zbhBF
-UXsX7gBKox0JMY3PHeH+untLNoWdi9F9AgMBAAGgADANBgkqhkiG9w0BAQUFAAOC
-AgEARyunUCI3xAmw7kJY0NbLJA/+SvULDT+x0DMsHp/GHB25GFqPh8LXd7+nYCxR
-b4XKMUPwVhOuZgLIgv2yGcSvztXtm9OVtonVmrWfHCDPPrKVABrYOZ6odhKiIi6s
-hzW0MKEwcl774cqO8YYZwrJF4tHCc0sDKK3iCcw0JvRN/x64XlmeidiHyhgrJwPd
-REzMZaBTGiL69EKLs6JwUndI2cY8vOOmISSW098RRy0kJSLZXKvgx/vLlfCMEDdn
-vZm/5bCuOIiCMcu2JFGG4DsVV32kfUSDgkmUbVK9Cb2c/irldxh277Dt2vBzpG3T
-j8R7TOJcUfjjt61LCO1KVZMx/STGUqbyNJq1Zk8hWbK+x4ed+Abo4CHZS5kN7DWo
-IieX5xESyFqoHMyyoZVQ1n0DGk7SbQDTOrN4Iq1okMscRdZuZVwv34yadmZbQRWB
-V+HvEqOSYFOqeZLi7kEGiuPwEtQD189VbXLNpD4blWMcV7Uji9LeRJ00enFPcEHR
-MOZ7axCJKpEHyoRcJwYEceUhx8j8WOuVnptySbR+o20NNMcdCZ3Iaht5SfFaB/HO
-GOdL0kne1nrWcyPUWPQZmCYVrNvAraeJ657T9dnsIf6UWUk1Q7fbyXl7vAvtY3mt
-5V52iP/BiImA+Xy+7XwY/ByrPJrqdWpQxueI+GcO7v77i6k=
------END CERTIFICATE REQUEST-----
diff --git a/tests/cert-svc/data/TestData/ssl/demoCA/cacert.pem b/tests/cert-svc/data/TestData/ssl/demoCA/cacert.pem
deleted file mode 100644 (file)
index 646524d..0000000
+++ /dev/null
@@ -1,30 +0,0 @@
------BEGIN CERTIFICATE-----
-MIIFMDCCAxgCCQDyW0BbwrfQZDANBgkqhkiG9w0BAQUFADBaMQswCQYDVQQGEwJL
-UjETMBEGA1UECBMKS3l1bmdHaS1EbzERMA8GA1UEBxMIU3V3b24tU2kxFjAUBgNV
-BAoTDVNhbXN1bmcgRWxlYy4xCzAJBgNVBAMTAkNBMB4XDTA5MDMwNjA3MjIxNFoX
-DTE5MDMwNDA3MjIxNFowWjELMAkGA1UEBhMCS1IxEzARBgNVBAgTCkt5dW5nR2kt
-RG8xETAPBgNVBAcTCFN1d29uLVNpMRYwFAYDVQQKEw1TYW1zdW5nIEVsZWMuMQsw
-CQYDVQQDEwJDQTCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAMXhh68a
-WUeOMDqFnGm1yuqgKJ5gL7aLXkLvaoptZnZchTi+LbzDEIhAyHLVZhzW5TTalY9I
-svqIB+vax6kYSJl1vzIqha7dBsHcftCqJqlDwl35pPOOfDJBcMjd211arVe/7XHI
-sdTmOaGpBVF/7WGMGgla9HIFLnr/EocSdxq/tyU82TPHBpTfjOnkXxuZLkvcTBdm
-2e3Za6iLoXZBUwqAEbbfTQnsBClcBgUyaVR1bxwLjEbjmg8N9RvpHSNDhVBQkjRg
-80znryxojICHB3JplfNBFGJ+PtymRXQEouvzZRiy0tLRHydvULO1hsVO/mGtaKyh
-FILUkn240w1u8aiyM/7a1VEy+hYS4lLOiQnbCsZI6gWdzmroa1tBOOV3mjTb0tjn
-xIGbGu2fnEQMrKhRBN1l04hELBlTUqGgvXqWBgYB03uaHt61Ul4HjAPqLWkmWu/C
-ZlEO6ewoCoJHCPR0Z89gGdrcMzJBaF2dsceurIcYL+rSlALTkpo3SiQiRlqcNSQQ
-UUhFcE+fsQq050gXxk6AMjZi3EZC/Lj2Z/oYcf5hiwt7gnzMux5A0Mxob8g4gRGI
-hOOxDxZg53X9frdTW6xnMTGHq2mqmVtQnquvz6MNcDw7cnJBUQkUWHkq4wvL3y6z
-bhBFUXsX7gBKox0JMY3PHeH+untLNoWdi9F9AgMBAAEwDQYJKoZIhvcNAQEFBQAD
-ggIBAHVU/HAqDC+bX8J0Nt7y0jO1ioUun6qPzjcQ9QRYjZ71JrsRbTgNmYkKtBi1
-8TZ/Dyq27OO612N4qrGe8dZwTK7z8bhVv4+mjgpP/uyO1woLDpYof26z09cfYd3z
-J0OE7Ta0/OlMYCDWl6ORPCNkfv7Bj0cS/XsJczfJAaPdyUozTR6Jl4qARHgS07H4
-ITZGnzPSk34AhJdZFVcnepCSjb4eXTJw1xjAd/OIaD8qtAnrrx/RnWAiii7BIUN/
-O6oOBSumPIrzBbgOJ96KyE5DDaoaECBWEFeyLsXk9PW3PC4CcPrTW1qjkr2cFrPm
-oYhIb2NkYQzpx36wLqG9tiGGiO8BFmyDjffAu8rBvMIFDGjy62fA+n/BMyrfxrQ3
-bKPt/GVHEEhhpNVAF+aRdJk7UtirLIrOYnRJDcbi51ZYiLpogmsH0PZ7JcC2ZkCb
-w753asG0K48OcRNw4c2D0tOXWUE+pkTjbE4HUD4xU+of3x3V98xHghd2G8MOMoRL
-M4tcK/zs76pOY6gfNuZe8nN/9RI+gsiiswWLkSBDEJEAEngZchdmd0I+8ed9qKW8
-Sm+85bfdya+Pbl858kubbkVup8wdl6wfILV+1XZOks1enknQYbls6Gx6mF9Llx1h
-mEHwvjERzOA7ykbVsRj/42Rn4g6JNEzJIZCsaSowk1zt0imn
------END CERTIFICATE-----
diff --git a/tests/cert-svc/data/TestData/ssl/demoCA/index.txt b/tests/cert-svc/data/TestData/ssl/demoCA/index.txt
deleted file mode 100644 (file)
index 3fd04a4..0000000
+++ /dev/null
@@ -1,42 +0,0 @@
-V      100306080002Z           01      unknown /C=KR/ST=KyungGi-Do/O=Samsung Elec./CN=OCSP Responder
-V      100309031315Z           02      unknown /C=KR/ST=KyungGi-Do/O=Samsung Elec./CN=Certificate for OCSP Client test - IP address as AIA
-V      100309060955Z           03      unknown /C=KR/ST=KyungGi-Do/O=Samsung Elec./CN=First certificate to test OCSP
-V      100309061108Z           04      unknown /C=KR/ST=KyungGi-Do/O=Samsung Elec./CN=First certificate to test OCSP
-V      100309061223Z           05      unknown /C=KR/ST=KyungGi-Do/O=Samsung Elec./CN=First certificate to test OCSP
-V      100310001031Z           06      unknown /C=KR/ST=KyungGi-Do/O=Samsung Elec./CN=OCSP Responder
-V      100310001451Z           07      unknown /C=KR/ST=KyungGi-Do/O=Samsung Elec./CN=OCSP Responder
-V      100310080409Z           08      unknown /C=KR/ST=KyungGi-Do/O=Samsung Elec./CN=First certificate to test OCSP
-V      100311104952Z           09      unknown /C=KR/ST=KyungGi-Do/O=Samsung Elec./CN=OCSP Responder
-V      100313011918Z           0A      unknown /C=KR/ST=KyungGi-Do/O=Samsung Elec./CN=First certificate to test OCSP
-V      100313022703Z           0B      unknown /C=KR/ST=KyungGi-Do/O=Samsung Elec./CN=First certificate to test OCSP
-V      100313023759Z           0C      unknown /C=KR/ST=KyungGi-Do/O=Samsung Elec./CN=OCSP Responder
-V      100313023935Z           0D      unknown /C=KR/ST=KyungGi-Do/O=Samsung Elec./CN=First certificate to test OCSP
-V      190311031642Z           0E      unknown /C=KR/ST=KyungGi-Do/O=Samsung Elec./CN=Second Responder Certificate
-V      190311031818Z           0F      unknown /C=KR/ST=KyungGi-Do/O=Samsung Elec./CN=First Test Certificate
-V      190311032356Z           10      unknown /C=KR/ST=KyungGi-Do/O=Samsung Elec./CN=First certificate to test OCSP
-V      190311032410Z           11      unknown /C=KR/ST=KyungGi-Do/O=Samsung Elec./CN=First certificate to test OCSP
-V      190311032420Z           12      unknown /C=KR/ST=KyungGi-Do/O=Samsung Elec./CN=First certificate to test OCSP
-V      190311032430Z           13      unknown /C=KR/ST=KyungGi-Do/O=Samsung Elec./CN=First certificate to test OCSP
-V      190311032440Z           14      unknown /C=KR/ST=KyungGi-Do/O=Samsung Elec./CN=First certificate to test OCSP
-V      100314113542Z           15      unknown /C=KR/ST=KyungGi-Do/O=Samsung Elec./CN=OCSP Responder
-V      100314134812Z           16      unknown /C=KR/ST=KyungGi-Do/O=Samsung Elec./CN=First certificate to test OCSP
-V      100316053643Z           17      unknown /C=KR/ST=KyungGi-Do/O=Samsung Elec./CN=First certificate to test OCSP
-V      100316053834Z           18      unknown /C=KR/ST=KyungGi-Do/O=Samsung Elec./CN=First certificate to test OCSP
-V      100316061833Z           19      unknown /C=KR/ST=KyungGi-Do/O=Samsung Elec./CN=Second Responder Certificate
-V      100316114226Z           1A      unknown /C=KR/ST=KyungGi-Do/O=Samsung Elec./CN=OCSP Responder
-V      100316115653Z           1B      unknown /C=KR/ST=KyungGi-Do/O=Samsung Elec./CN=OCSP Responder
-V      100316121050Z           1C      unknown /C=KR/ST=KyungGi-Do/O=Samsung Elec./CN=OCSP Responder
-V      100316121256Z           1D      unknown /C=KR/ST=KyungGi-Do/O=Samsung Elec./CN=OCSP Responder
-V      100316121311Z           1E      unknown /C=KR/ST=KyungGi-Do/O=Samsung Elec./CN=OCSP Responder
-V      100316121809Z           1F      unknown /C=KR/ST=KyungGi-Do/O=Samsung Elec./CN=OCSP Responder
-V      100316122916Z           20      unknown /C=KR/ST=KyungGi-Do/O=Samsung Elec./CN=OCSP Responder
-V      100316123325Z           21      unknown /C=KR/ST=KyungGi-Do/O=Samsung Elec./CN=OCSP Responder
-V      100316125036Z           22      unknown /C=KR/ST=KyungGi-Do/O=Samsung Elec./CN=OCSP Responder
-V      100316125902Z           23      unknown /C=KR/ST=KyungGi-Do/O=Samsung Elec./CN=OCSP Responder
-V      100316125924Z           24      unknown /C=KR/ST=KyungGi-Do/O=Samsung Elec./CN=OCSP Responder
-V      100316125941Z           25      unknown /C=KR/ST=KyungGi-Do/O=Samsung Elec./CN=OCSP Responder
-V      100316140429Z           26      unknown /C=KR/ST=KyungGi-Do/O=Samsung Elec./CN=Responder certificate with nocheck ext. field
-V      190314230611Z           27      unknown /C=KR/ST=KyungGi-Do/O=Samsung Elec./CN=Responder certificate with nocheck ext. field
-V      190314230854Z           28      unknown /C=KR/ST=KyungGi-Do/O=Samsung Elec./CN=OCSP Responder's certificate with delegation
-V      190314233211Z           29      unknown /C=KR/ST=KyungGi-Do/O=Samsung Elec./CN=Seventh OCSP Client certificate
-V      190618082147Z           2A      unknown /C=KR/ST=KyungGi-Do/O=Samsung Elec./CN=First Test Certificate
diff --git a/tests/cert-svc/data/TestData/ssl/demoCA/index.txt.attr b/tests/cert-svc/data/TestData/ssl/demoCA/index.txt.attr
deleted file mode 100644 (file)
index 3a7e39e..0000000
+++ /dev/null
@@ -1 +0,0 @@
-unique_subject = no
diff --git a/tests/cert-svc/data/TestData/ssl/demoCA/index.txt.attr.old b/tests/cert-svc/data/TestData/ssl/demoCA/index.txt.attr.old
deleted file mode 100644 (file)
index 3a7e39e..0000000
+++ /dev/null
@@ -1 +0,0 @@
-unique_subject = no
diff --git a/tests/cert-svc/data/TestData/ssl/demoCA/index.txt.old b/tests/cert-svc/data/TestData/ssl/demoCA/index.txt.old
deleted file mode 100644 (file)
index 7de5529..0000000
+++ /dev/null
@@ -1,41 +0,0 @@
-V      100306080002Z           01      unknown /C=KR/ST=KyungGi-Do/O=Samsung Elec./CN=OCSP Responder
-V      100309031315Z           02      unknown /C=KR/ST=KyungGi-Do/O=Samsung Elec./CN=Certificate for OCSP Client test - IP address as AIA
-V      100309060955Z           03      unknown /C=KR/ST=KyungGi-Do/O=Samsung Elec./CN=First certificate to test OCSP
-V      100309061108Z           04      unknown /C=KR/ST=KyungGi-Do/O=Samsung Elec./CN=First certificate to test OCSP
-V      100309061223Z           05      unknown /C=KR/ST=KyungGi-Do/O=Samsung Elec./CN=First certificate to test OCSP
-V      100310001031Z           06      unknown /C=KR/ST=KyungGi-Do/O=Samsung Elec./CN=OCSP Responder
-V      100310001451Z           07      unknown /C=KR/ST=KyungGi-Do/O=Samsung Elec./CN=OCSP Responder
-V      100310080409Z           08      unknown /C=KR/ST=KyungGi-Do/O=Samsung Elec./CN=First certificate to test OCSP
-V      100311104952Z           09      unknown /C=KR/ST=KyungGi-Do/O=Samsung Elec./CN=OCSP Responder
-V      100313011918Z           0A      unknown /C=KR/ST=KyungGi-Do/O=Samsung Elec./CN=First certificate to test OCSP
-V      100313022703Z           0B      unknown /C=KR/ST=KyungGi-Do/O=Samsung Elec./CN=First certificate to test OCSP
-V      100313023759Z           0C      unknown /C=KR/ST=KyungGi-Do/O=Samsung Elec./CN=OCSP Responder
-V      100313023935Z           0D      unknown /C=KR/ST=KyungGi-Do/O=Samsung Elec./CN=First certificate to test OCSP
-V      190311031642Z           0E      unknown /C=KR/ST=KyungGi-Do/O=Samsung Elec./CN=Second Responder Certificate
-V      190311031818Z           0F      unknown /C=KR/ST=KyungGi-Do/O=Samsung Elec./CN=First Test Certificate
-V      190311032356Z           10      unknown /C=KR/ST=KyungGi-Do/O=Samsung Elec./CN=First certificate to test OCSP
-V      190311032410Z           11      unknown /C=KR/ST=KyungGi-Do/O=Samsung Elec./CN=First certificate to test OCSP
-V      190311032420Z           12      unknown /C=KR/ST=KyungGi-Do/O=Samsung Elec./CN=First certificate to test OCSP
-V      190311032430Z           13      unknown /C=KR/ST=KyungGi-Do/O=Samsung Elec./CN=First certificate to test OCSP
-V      190311032440Z           14      unknown /C=KR/ST=KyungGi-Do/O=Samsung Elec./CN=First certificate to test OCSP
-V      100314113542Z           15      unknown /C=KR/ST=KyungGi-Do/O=Samsung Elec./CN=OCSP Responder
-V      100314134812Z           16      unknown /C=KR/ST=KyungGi-Do/O=Samsung Elec./CN=First certificate to test OCSP
-V      100316053643Z           17      unknown /C=KR/ST=KyungGi-Do/O=Samsung Elec./CN=First certificate to test OCSP
-V      100316053834Z           18      unknown /C=KR/ST=KyungGi-Do/O=Samsung Elec./CN=First certificate to test OCSP
-V      100316061833Z           19      unknown /C=KR/ST=KyungGi-Do/O=Samsung Elec./CN=Second Responder Certificate
-V      100316114226Z           1A      unknown /C=KR/ST=KyungGi-Do/O=Samsung Elec./CN=OCSP Responder
-V      100316115653Z           1B      unknown /C=KR/ST=KyungGi-Do/O=Samsung Elec./CN=OCSP Responder
-V      100316121050Z           1C      unknown /C=KR/ST=KyungGi-Do/O=Samsung Elec./CN=OCSP Responder
-V      100316121256Z           1D      unknown /C=KR/ST=KyungGi-Do/O=Samsung Elec./CN=OCSP Responder
-V      100316121311Z           1E      unknown /C=KR/ST=KyungGi-Do/O=Samsung Elec./CN=OCSP Responder
-V      100316121809Z           1F      unknown /C=KR/ST=KyungGi-Do/O=Samsung Elec./CN=OCSP Responder
-V      100316122916Z           20      unknown /C=KR/ST=KyungGi-Do/O=Samsung Elec./CN=OCSP Responder
-V      100316123325Z           21      unknown /C=KR/ST=KyungGi-Do/O=Samsung Elec./CN=OCSP Responder
-V      100316125036Z           22      unknown /C=KR/ST=KyungGi-Do/O=Samsung Elec./CN=OCSP Responder
-V      100316125902Z           23      unknown /C=KR/ST=KyungGi-Do/O=Samsung Elec./CN=OCSP Responder
-V      100316125924Z           24      unknown /C=KR/ST=KyungGi-Do/O=Samsung Elec./CN=OCSP Responder
-V      100316125941Z           25      unknown /C=KR/ST=KyungGi-Do/O=Samsung Elec./CN=OCSP Responder
-V      100316140429Z           26      unknown /C=KR/ST=KyungGi-Do/O=Samsung Elec./CN=Responder certificate with nocheck ext. field
-V      190314230611Z           27      unknown /C=KR/ST=KyungGi-Do/O=Samsung Elec./CN=Responder certificate with nocheck ext. field
-V      190314230854Z           28      unknown /C=KR/ST=KyungGi-Do/O=Samsung Elec./CN=OCSP Responder's certificate with delegation
-V      190314233211Z           29      unknown /C=KR/ST=KyungGi-Do/O=Samsung Elec./CN=Seventh OCSP Client certificate
diff --git a/tests/cert-svc/data/TestData/ssl/demoCA/newcerts/01.pem b/tests/cert-svc/data/TestData/ssl/demoCA/newcerts/01.pem
deleted file mode 100644 (file)
index a3c5540..0000000
+++ /dev/null
@@ -1,79 +0,0 @@
-Certificate:
-    Data:
-        Version: 3 (0x2)
-        Serial Number: 1 (0x1)
-        Signature Algorithm: sha1WithRSAEncryption
-        Issuer: C=KR, ST=KyungGi-Do, L=Suwon-Si, O=Samsung Elec., CN=CA
-        Validity
-            Not Before: Mar  6 08:00:02 2009 GMT
-            Not After : Mar  6 08:00:02 2010 GMT
-        Subject: C=KR, ST=KyungGi-Do, O=Samsung Elec., CN=OCSP Responder
-        Subject Public Key Info:
-            Public Key Algorithm: rsaEncryption
-            RSA Public Key: (1024 bit)
-                Modulus (1024 bit):
-                    00:d4:41:90:ba:e8:97:0c:89:05:f0:95:75:44:ff:
-                    f3:c9:b1:68:90:0a:83:a2:30:6d:f4:8d:2d:e1:ec:
-                    c7:bd:ba:24:39:bf:ae:29:fa:65:2b:c6:98:ee:13:
-                    74:7c:5d:68:36:5b:b4:0c:ae:6b:99:40:b8:39:a2:
-                    df:fa:97:e3:62:37:ff:3c:ae:39:6a:1c:77:39:81:
-                    2e:9d:c9:a4:30:e0:4c:e6:18:e9:57:04:a1:09:0b:
-                    ab:ac:00:9c:ca:65:96:59:1f:e9:21:86:9b:d8:ef:
-                    86:db:99:70:1c:39:31:9f:48:f9:02:0d:4d:53:aa:
-                    ac:ad:f1:58:ca:84:98:44:95
-                Exponent: 65537 (0x10001)
-        X509v3 extensions:
-            X509v3 Extended Key Usage: 
-                OCSP Signing
-    Signature Algorithm: sha1WithRSAEncryption
-        0e:0d:eb:90:52:0b:d8:81:b9:b1:87:da:b4:c2:18:5b:fc:01:
-        bc:de:1b:16:5e:09:e1:a4:76:68:7a:05:e0:77:58:f0:bf:ce:
-        8e:52:f1:fb:ab:35:9b:1d:e7:40:14:88:b5:36:0a:1d:b6:70:
-        cc:83:bd:2c:2f:7b:9e:fa:33:29:4f:c8:5e:ec:fb:56:90:1b:
-        7c:9c:c0:e8:0e:bb:92:dc:20:5f:22:10:d6:c3:68:3d:26:6e:
-        f1:3f:df:42:45:f1:82:04:76:ef:3c:a9:d5:be:8e:dd:3b:a8:
-        d4:c3:08:51:f9:2e:60:8e:93:4c:c3:e2:93:ea:ef:6c:d0:47:
-        f1:f3:15:8e:6e:66:0b:22:36:32:8a:f7:7f:c9:41:d8:d1:69:
-        0d:32:62:ea:3c:fe:72:8a:c8:77:ff:5f:a1:4a:59:1b:5a:12:
-        7b:a0:52:17:ae:6e:d4:d6:b3:c1:3b:50:26:3e:55:46:37:39:
-        50:ea:2b:fd:97:15:ca:ca:fc:a3:dd:9b:72:c9:d8:a9:39:aa:
-        e2:77:b1:d1:bd:2c:62:0c:90:72:75:32:e0:18:3d:4b:01:9c:
-        e7:69:77:c8:05:1e:49:44:0f:fa:e2:71:0e:6b:b2:99:f6:a8:
-        ae:fe:4b:02:73:fa:00:7b:f4:2b:50:44:b2:50:12:2a:82:ee:
-        be:da:ff:47:51:b6:95:f7:fb:39:c7:7f:1f:01:b7:5c:19:01:
-        87:d8:c0:3d:bf:d5:ca:1d:67:6e:1b:6b:e6:98:8a:81:ab:91:
-        53:ef:03:e0:62:17:c2:5f:f5:ed:4b:24:12:10:64:aa:09:bf:
-        8b:fa:bb:54:a1:45:6a:7e:0a:f8:85:d2:ae:cc:b5:65:1a:db:
-        9b:17:1f:e5:64:f3:1b:8a:be:40:10:28:d9:a5:ac:30:ed:7e:
-        fb:40:39:8b:f3:8d:10:1a:db:85:fd:83:a6:89:eb:09:b3:c1:
-        a2:3f:b4:a9:35:62:58:24:6a:37:76:a8:e9:80:12:b9:bc:b0:
-        db:e3:ba:e4:a2:dc:b9:8f:ac:99:6d:95:44:7b:b1:7e:1b:05:
-        c3:79:25:bc:ae:15:4f:7c:f7:b6:70:0d:fb:d7:fc:91:d9:d4:
-        52:a3:bb:50:83:a2:2e:c9:ec:26:73:e3:a5:e2:b3:24:87:1e:
-        48:28:f5:7c:49:51:51:c4:1f:8e:06:53:cb:3c:49:8d:b9:ae:
-        ce:51:a9:85:a8:25:57:02:22:70:17:16:78:29:31:c9:ad:63:
-        3f:39:75:1d:c2:ce:7a:0d:85:96:95:3b:01:02:0a:15:8b:ef:
-        93:74:65:44:c3:87:19:01:04:0a:87:82:da:66:f6:bd:34:00:
-        ab:09:25:e3:20:4d:87:6e
------BEGIN CERTIFICATE-----
-MIIDuzCCAaOgAwIBAgIBATANBgkqhkiG9w0BAQUFADBaMQswCQYDVQQGEwJLUjET
-MBEGA1UECBMKS3l1bmdHaS1EbzERMA8GA1UEBxMIU3V3b24tU2kxFjAUBgNVBAoT
-DVNhbXN1bmcgRWxlYy4xCzAJBgNVBAMTAkNBMB4XDTA5MDMwNjA4MDAwMloXDTEw
-MDMwNjA4MDAwMlowUzELMAkGA1UEBhMCS1IxEzARBgNVBAgTCkt5dW5nR2ktRG8x
-FjAUBgNVBAoTDVNhbXN1bmcgRWxlYy4xFzAVBgNVBAMTDk9DU1AgUmVzcG9uZGVy
-MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQDUQZC66JcMiQXwlXVE//PJsWiQ
-CoOiMG30jS3h7Me9uiQ5v64p+mUrxpjuE3R8XWg2W7QMrmuZQLg5ot/6l+NiN/88
-rjlqHHc5gS6dyaQw4EzmGOlXBKEJC6usAJzKZZZZH+khhpvY74bbmXAcOTGfSPkC
-DU1Tqqyt8VjKhJhElQIDAQABoxcwFTATBgNVHSUEDDAKBggrBgEFBQcDCTANBgkq
-hkiG9w0BAQUFAAOCAgEADg3rkFIL2IG5sYfatMIYW/wBvN4bFl4J4aR2aHoF4HdY
-8L/OjlLx+6s1mx3nQBSItTYKHbZwzIO9LC97nvozKU/IXuz7VpAbfJzA6A67ktwg
-XyIQ1sNoPSZu8T/fQkXxggR27zyp1b6O3Tuo1MMIUfkuYI6TTMPik+rvbNBH8fMV
-jm5mCyI2Mor3f8lB2NFpDTJi6jz+corId/9foUpZG1oSe6BSF65u1NazwTtQJj5V
-Rjc5UOor/ZcVysr8o92bcsnYqTmq4nex0b0sYgyQcnUy4Bg9SwGc52l3yAUeSUQP
-+uJxDmuymfaorv5LAnP6AHv0K1BEslASKoLuvtr/R1G2lff7Ocd/HwG3XBkBh9jA
-Pb/Vyh1nbhtr5piKgauRU+8D4GIXwl/17UskEhBkqgm/i/q7VKFFan4K+IXSrsy1
-ZRrbmxcf5WTzG4q+QBAo2aWsMO1++0A5i/ONEBrbhf2DponrCbPBoj+0qTViWCRq
-N3ao6YASubyw2+O65KLcuY+smW2VRHuxfhsFw3klvK4VT3z3tnAN+9f8kdnUUqO7
-UIOiLsnsJnPjpeKzJIceSCj1fElRUcQfjgZTyzxJjbmuzlGphaglVwIicBcWeCkx
-ya1jPzl1HcLOeg2FlpU7AQIKFYvvk3RlRMOHGQEECoeC2mb2vTQAqwkl4yBNh24=
------END CERTIFICATE-----
diff --git a/tests/cert-svc/data/TestData/ssl/demoCA/newcerts/02.pem b/tests/cert-svc/data/TestData/ssl/demoCA/newcerts/02.pem
deleted file mode 100644 (file)
index 99119fa..0000000
+++ /dev/null
@@ -1,82 +0,0 @@
-Certificate:
-    Data:
-        Version: 3 (0x2)
-        Serial Number: 2 (0x2)
-        Signature Algorithm: sha1WithRSAEncryption
-        Issuer: C=KR, ST=KyungGi-Do, L=Suwon-Si, O=Samsung Elec., CN=CA
-        Validity
-            Not Before: Mar  9 03:13:15 2009 GMT
-            Not After : Mar  9 03:13:15 2010 GMT
-        Subject: C=KR, ST=KyungGi-Do, O=Samsung Elec., CN=Certificate for OCSP Client test - IP address as AIA
-        Subject Public Key Info:
-            Public Key Algorithm: rsaEncryption
-            RSA Public Key: (1024 bit)
-                Modulus (1024 bit):
-                    00:e1:a1:0b:40:23:f4:c2:29:2a:e6:9a:f8:55:86:
-                    03:94:76:99:15:00:61:d5:97:00:ca:aa:7e:f6:d1:
-                    7b:70:12:40:99:00:01:94:8c:69:7f:c0:fa:d7:72:
-                    7d:fc:61:54:3d:ad:02:53:a3:c4:49:24:8b:42:59:
-                    61:01:b5:4f:52:83:df:09:de:19:5a:a6:ce:78:7b:
-                    1e:fd:03:2a:4e:24:37:89:d8:12:61:c2:f5:49:74:
-                    c5:f8:75:7b:02:b2:5a:a8:2d:a3:b3:18:3f:f0:0a:
-                    18:e9:f9:e0:92:fa:37:b8:f2:15:99:23:26:07:a1:
-                    cb:2e:e3:c6:1f:d8:88:65:cd
-                Exponent: 65537 (0x10001)
-        X509v3 extensions:
-            Authority Information Access: 
-                OCSP - IP Address:127.0.0.1
-
-    Signature Algorithm: sha1WithRSAEncryption
-        3c:50:d3:19:27:36:33:e5:1d:a9:e0:30:c1:bf:8b:90:6c:ef:
-        e6:40:e7:2a:5e:f6:1c:f4:e1:17:f2:2d:50:42:30:e7:68:30:
-        d8:ea:a1:bc:92:77:b8:06:cb:f2:d8:b9:bc:26:c1:ff:6f:8c:
-        cf:3b:22:a1:2f:07:c4:41:a8:91:4c:fd:1b:c8:85:5c:21:cf:
-        03:1b:1a:15:c4:f4:3e:bc:10:8a:27:82:fa:2c:a9:1b:e9:07:
-        72:bc:a2:79:91:3d:99:45:8c:cc:08:5d:c9:b9:4f:94:19:d0:
-        5e:9c:08:7c:8b:6c:11:c5:a7:7e:f3:5c:95:35:23:55:d2:cd:
-        06:34:98:00:a3:64:54:5e:ad:b4:d1:4d:e0:cd:4d:cf:11:53:
-        d4:12:88:9a:42:12:77:61:73:2d:ae:9a:ba:2a:73:f5:59:96:
-        e5:0b:85:3c:01:3f:16:0e:df:fc:c6:e5:a9:68:21:e9:09:7a:
-        7e:a9:fb:32:f0:69:d2:6d:30:e2:ed:34:6f:3d:fa:75:86:88:
-        08:5f:fa:ee:72:b6:51:e3:77:00:cb:25:27:42:cd:86:46:f0:
-        1a:08:6c:e4:a4:b0:97:2b:69:12:e6:3d:81:9b:d5:aa:31:c2:
-        ac:93:43:04:3a:c1:e9:cf:53:f7:0a:ff:ed:6b:ef:ef:d0:43:
-        43:54:de:10:de:c7:77:f3:e7:d1:14:66:c2:02:25:e2:5b:c6:
-        c9:09:3c:a5:c0:b5:6e:e9:b0:6c:03:87:3f:b6:9c:3c:f8:9e:
-        21:7c:dd:2d:99:09:62:ee:7f:44:d6:4c:dc:ff:33:97:77:86:
-        03:1b:e0:16:c8:c6:83:79:9f:20:a4:a5:e0:f6:0d:d5:d2:c2:
-        ab:80:2b:f0:f4:09:e8:9d:38:9e:d3:2e:5b:3c:72:7b:1f:56:
-        d7:96:d7:e3:49:de:b1:99:e6:1f:44:0c:9a:11:ac:18:8b:64:
-        a5:4f:48:eb:93:b5:73:1e:1e:ee:62:39:f0:65:2f:6f:ff:76:
-        28:ac:d3:15:6a:39:04:b1:2b:1b:46:07:1a:b3:71:ea:e6:2c:
-        55:3d:f6:a5:c9:a1:5e:aa:bc:a5:35:61:8f:ec:69:ca:78:76:
-        cd:b5:47:04:66:d3:96:84:62:0f:c0:8e:17:df:24:6c:81:b1:
-        85:9a:83:94:88:c1:37:e5:fa:bc:6d:f6:b3:b3:93:67:58:20:
-        63:73:81:9e:51:f9:5d:dd:ba:c9:a9:7c:ee:cd:5f:8b:df:d0:
-        2e:33:e4:aa:4e:35:17:6b:79:47:17:d0:89:68:53:37:0e:87:
-        b7:9f:56:91:c9:a8:5d:12:5c:95:be:24:ff:8b:79:73:12:2e:
-        25:66:01:33:ac:08:e4:3a
------BEGIN CERTIFICATE-----
-MIID7jCCAdagAwIBAgIBAjANBgkqhkiG9w0BAQUFADBaMQswCQYDVQQGEwJLUjET
-MBEGA1UECBMKS3l1bmdHaS1EbzERMA8GA1UEBxMIU3V3b24tU2kxFjAUBgNVBAoT
-DVNhbXN1bmcgRWxlYy4xCzAJBgNVBAMTAkNBMB4XDTA5MDMwOTAzMTMxNVoXDTEw
-MDMwOTAzMTMxNVoweTELMAkGA1UEBhMCS1IxEzARBgNVBAgTCkt5dW5nR2ktRG8x
-FjAUBgNVBAoTDVNhbXN1bmcgRWxlYy4xPTA7BgNVBAMTNENlcnRpZmljYXRlIGZv
-ciBPQ1NQIENsaWVudCB0ZXN0IC0gSVAgYWRkcmVzcyBhcyBBSUEwgZ8wDQYJKoZI
-hvcNAQEBBQADgY0AMIGJAoGBAOGhC0Aj9MIpKuaa+FWGA5R2mRUAYdWXAMqqfvbR
-e3ASQJkAAZSMaX/A+tdyffxhVD2tAlOjxEkki0JZYQG1T1KD3wneGVqmznh7Hv0D
-Kk4kN4nYEmHC9Ul0xfh1ewKyWqgto7MYP/AKGOn54JL6N7jyFZkjJgehyy7jxh/Y
-iGXNAgMBAAGjJDAiMCAGCCsGAQUFBwEBBBQwEjAQBggrBgEFBQcwAYcEfwAAATAN
-BgkqhkiG9w0BAQUFAAOCAgEAPFDTGSc2M+UdqeAwwb+LkGzv5kDnKl72HPThF/It
-UEIw52gw2OqhvJJ3uAbL8ti5vCbB/2+MzzsioS8HxEGokUz9G8iFXCHPAxsaFcT0
-PrwQiieC+iypG+kHcryieZE9mUWMzAhdyblPlBnQXpwIfItsEcWnfvNclTUjVdLN
-BjSYAKNkVF6ttNFN4M1NzxFT1BKImkISd2FzLa6auipz9VmW5QuFPAE/Fg7f/Mbl
-qWgh6Ql6fqn7MvBp0m0w4u00bz36dYaICF/67nK2UeN3AMslJ0LNhkbwGghs5KSw
-lytpEuY9gZvVqjHCrJNDBDrB6c9T9wr/7Wvv79BDQ1TeEN7Hd/Pn0RRmwgIl4lvG
-yQk8pcC1bumwbAOHP7acPPieIXzdLZkJYu5/RNZM3P8zl3eGAxvgFsjGg3mfIKSl
-4PYN1dLCq4Ar8PQJ6J04ntMuWzxyex9W15bX40nesZnmH0QMmhGsGItkpU9I65O1
-cx4e7mI58GUvb/92KKzTFWo5BLErG0YHGrNx6uYsVT32pcmhXqq8pTVhj+xpynh2
-zbVHBGbTloRiD8COF98kbIGxhZqDlIjBN+X6vG32s7OTZ1ggY3OBnlH5Xd26yal8
-7s1fi9/QLjPkqk41F2t5RxfQiWhTNw6Ht59WkcmoXRJclb4k/4t5cxIuJWYBM6wI
-5Do=
------END CERTIFICATE-----
diff --git a/tests/cert-svc/data/TestData/ssl/demoCA/newcerts/03.pem b/tests/cert-svc/data/TestData/ssl/demoCA/newcerts/03.pem
deleted file mode 100644 (file)
index 5ef078e..0000000
+++ /dev/null
@@ -1,81 +0,0 @@
-Certificate:
-    Data:
-        Version: 3 (0x2)
-        Serial Number: 3 (0x3)
-        Signature Algorithm: sha1WithRSAEncryption
-        Issuer: C=KR, ST=KyungGi-Do, L=Suwon-Si, O=Samsung Elec., CN=CA
-        Validity
-            Not Before: Mar  9 06:09:55 2009 GMT
-            Not After : Mar  9 06:09:55 2010 GMT
-        Subject: C=KR, ST=KyungGi-Do, O=Samsung Elec., CN=First certificate to test OCSP
-        Subject Public Key Info:
-            Public Key Algorithm: rsaEncryption
-            RSA Public Key: (1024 bit)
-                Modulus (1024 bit):
-                    00:c0:a9:51:63:19:e2:cc:f3:9d:19:d8:75:90:ab:
-                    13:40:a3:3f:9d:dc:ef:48:42:0d:00:36:db:ea:68:
-                    fd:b9:15:34:a9:af:0f:52:2b:57:2e:03:74:13:41:
-                    b4:59:69:7e:f6:e1:54:42:8d:c3:f4:85:2b:ff:07:
-                    97:a4:2f:5b:e4:13:be:72:ef:65:e7:59:be:ed:14:
-                    71:82:cc:09:03:50:99:66:08:34:1a:41:45:e6:e3:
-                    37:98:32:6a:15:d4:32:63:f7:26:6c:5a:ed:45:bd:
-                    bb:aa:be:33:4b:9c:cb:b2:03:13:e3:2d:6f:61:57:
-                    2a:e8:e8:44:0f:59:ea:e7:bf
-                Exponent: 65537 (0x10001)
-        X509v3 extensions:
-            Authority Information Access: 
-                OCSP - URI:http://127.0.0.1:80
-
-    Signature Algorithm: sha1WithRSAEncryption
-        a2:38:fe:fc:ab:b7:a1:d0:6d:52:b9:bd:7d:ab:24:94:01:bf:
-        2c:26:a9:6d:90:33:ac:3a:84:f3:35:7d:2e:26:5b:27:30:c7:
-        98:ba:a2:a8:a8:21:1c:32:a4:e9:3c:0a:91:9e:f9:e7:f1:6a:
-        9a:c4:58:e6:24:1c:78:8e:2e:94:9c:c1:d8:87:bf:ba:0b:84:
-        b8:96:5f:47:fc:b1:da:5d:d6:ae:a1:d7:37:36:4a:bf:41:5e:
-        cc:6f:ef:4f:2f:a1:a4:25:ba:b9:a3:01:6d:3e:e9:19:e4:a7:
-        05:51:f9:a4:8b:09:e3:3c:1f:0d:e2:98:9d:5a:66:c2:e2:80:
-        ef:7d:4c:34:00:fe:08:10:4a:8f:6d:3d:46:95:cb:5a:19:95:
-        65:98:b0:b7:9f:ec:14:65:56:04:c7:a5:e3:95:5e:5a:11:30:
-        92:4f:40:e2:bc:b9:01:cb:ff:a9:34:b3:c0:7e:ab:3d:8d:f9:
-        68:aa:46:33:2c:52:fd:ab:5a:b0:32:27:f0:43:8e:79:cd:aa:
-        c9:c8:1b:1e:45:58:8c:36:b3:39:c4:25:a6:9c:81:01:5f:a3:
-        19:d8:4d:e1:a3:a0:14:92:45:0c:ba:38:57:ce:aa:c6:98:b7:
-        b0:53:74:fb:d6:52:ba:3b:0a:95:29:d6:99:57:d5:4f:19:48:
-        e1:87:ac:ed:14:2c:34:0c:65:e7:d3:df:c0:92:5f:4b:2b:9c:
-        3c:48:a0:bb:21:af:fe:37:b5:84:36:00:e5:97:00:ef:46:75:
-        9f:e8:b4:24:91:76:ae:49:ed:a6:63:3d:22:2b:26:39:f6:77:
-        76:f0:d1:93:bd:68:6e:66:50:50:4f:26:d1:4b:8f:d3:b1:b8:
-        07:8b:5f:f8:ca:79:b6:40:1d:ab:09:14:e0:96:32:69:4a:bd:
-        81:c2:5f:1e:5f:d8:84:9c:df:3a:3e:0c:14:10:46:b6:9d:b4:
-        2d:71:f5:57:37:8e:b4:b5:9b:26:d5:69:89:7c:12:d8:0c:29:
-        42:96:5b:e8:57:07:da:60:3e:c8:4e:52:83:b1:46:4b:91:ad:
-        1e:89:97:b0:26:a6:b9:d5:b2:67:9b:e5:8c:02:56:aa:44:78:
-        7b:15:a7:ad:ed:7b:d4:75:ac:5f:3e:fd:f3:52:89:7d:a5:25:
-        5f:2d:b2:cb:99:25:8a:64:48:39:23:c0:82:34:4f:06:41:c3:
-        07:d9:38:cc:99:59:c2:f0:88:65:91:7e:fb:59:3a:02:34:02:
-        5a:90:4a:78:11:c0:fe:ab:09:04:c9:66:80:1e:fa:24:fc:c8:
-        cd:d8:bf:b4:fe:23:5d:22:0c:92:09:90:2d:76:a6:99:c1:7e:
-        d4:68:b4:36:ae:11:c8:b2
------BEGIN CERTIFICATE-----
-MIID5zCCAc+gAwIBAgIBAzANBgkqhkiG9w0BAQUFADBaMQswCQYDVQQGEwJLUjET
-MBEGA1UECBMKS3l1bmdHaS1EbzERMA8GA1UEBxMIU3V3b24tU2kxFjAUBgNVBAoT
-DVNhbXN1bmcgRWxlYy4xCzAJBgNVBAMTAkNBMB4XDTA5MDMwOTA2MDk1NVoXDTEw
-MDMwOTA2MDk1NVowYzELMAkGA1UEBhMCS1IxEzARBgNVBAgTCkt5dW5nR2ktRG8x
-FjAUBgNVBAoTDVNhbXN1bmcgRWxlYy4xJzAlBgNVBAMTHkZpcnN0IGNlcnRpZmlj
-YXRlIHRvIHRlc3QgT0NTUDCBnzANBgkqhkiG9w0BAQEFAAOBjQAwgYkCgYEAwKlR
-YxnizPOdGdh1kKsTQKM/ndzvSEINADbb6mj9uRU0qa8PUitXLgN0E0G0WWl+9uFU
-Qo3D9IUr/weXpC9b5BO+cu9l51m+7RRxgswJA1CZZgg0GkFF5uM3mDJqFdQyY/cm
-bFrtRb27qr4zS5zLsgMT4y1vYVcq6OhED1nq578CAwEAAaMzMDEwLwYIKwYBBQUH
-AQEEIzAhMB8GCCsGAQUFBzABhhNodHRwOi8vMTI3LjAuMC4xOjgwMA0GCSqGSIb3
-DQEBBQUAA4ICAQCiOP78q7eh0G1Sub19qySUAb8sJqltkDOsOoTzNX0uJlsnMMeY
-uqKoqCEcMqTpPAqRnvnn8WqaxFjmJBx4ji6UnMHYh7+6C4S4ll9H/LHaXdauodc3
-Nkq/QV7Mb+9PL6GkJbq5owFtPukZ5KcFUfmkiwnjPB8N4pidWmbC4oDvfUw0AP4I
-EEqPbT1GlctaGZVlmLC3n+wUZVYEx6XjlV5aETCST0DivLkBy/+pNLPAfqs9jflo
-qkYzLFL9q1qwMifwQ455zarJyBseRViMNrM5xCWmnIEBX6MZ2E3ho6AUkkUMujhX
-zqrGmLewU3T71lK6OwqVKdaZV9VPGUjhh6ztFCw0DGXn09/Akl9LK5w8SKC7Ia/+
-N7WENgDllwDvRnWf6LQkkXauSe2mYz0iKyY59nd28NGTvWhuZlBQTybRS4/TsbgH
-i1/4ynm2QB2rCRTgljJpSr2Bwl8eX9iEnN86PgwUEEa2nbQtcfVXN460tZsm1WmJ
-fBLYDClCllvoVwfaYD7ITlKDsUZLka0eiZewJqa51bJnm+WMAlaqRHh7Faet7XvU
-daxfPv3zUol9pSVfLbLLmSWKZEg5I8CCNE8GQcMH2TjMmVnC8IhlkX77WToCNAJa
-kEp4EcD+qwkEyWaAHvok/MjN2L+0/iNdIgySCZAtdqaZwX7UaLQ2rhHIsg==
------END CERTIFICATE-----
diff --git a/tests/cert-svc/data/TestData/ssl/demoCA/newcerts/04.pem b/tests/cert-svc/data/TestData/ssl/demoCA/newcerts/04.pem
deleted file mode 100644 (file)
index 8de6e3d..0000000
+++ /dev/null
@@ -1,81 +0,0 @@
-Certificate:
-    Data:
-        Version: 3 (0x2)
-        Serial Number: 4 (0x4)
-        Signature Algorithm: sha1WithRSAEncryption
-        Issuer: C=KR, ST=KyungGi-Do, L=Suwon-Si, O=Samsung Elec., CN=CA
-        Validity
-            Not Before: Mar  9 06:11:08 2009 GMT
-            Not After : Mar  9 06:11:08 2010 GMT
-        Subject: C=KR, ST=KyungGi-Do, O=Samsung Elec., CN=First certificate to test OCSP
-        Subject Public Key Info:
-            Public Key Algorithm: rsaEncryption
-            RSA Public Key: (1024 bit)
-                Modulus (1024 bit):
-                    00:c0:a9:51:63:19:e2:cc:f3:9d:19:d8:75:90:ab:
-                    13:40:a3:3f:9d:dc:ef:48:42:0d:00:36:db:ea:68:
-                    fd:b9:15:34:a9:af:0f:52:2b:57:2e:03:74:13:41:
-                    b4:59:69:7e:f6:e1:54:42:8d:c3:f4:85:2b:ff:07:
-                    97:a4:2f:5b:e4:13:be:72:ef:65:e7:59:be:ed:14:
-                    71:82:cc:09:03:50:99:66:08:34:1a:41:45:e6:e3:
-                    37:98:32:6a:15:d4:32:63:f7:26:6c:5a:ed:45:bd:
-                    bb:aa:be:33:4b:9c:cb:b2:03:13:e3:2d:6f:61:57:
-                    2a:e8:e8:44:0f:59:ea:e7:bf
-                Exponent: 65537 (0x10001)
-        X509v3 extensions:
-            Authority Information Access: 
-                OCSP - URI:http://127.0.0.1:80
-
-    Signature Algorithm: sha1WithRSAEncryption
-        6c:b3:f9:8e:f2:e6:c1:5e:a5:61:96:b3:77:9a:e7:bb:ba:6c:
-        ff:0c:cc:47:b7:4f:f4:98:08:57:0f:40:cb:4a:3b:dc:52:64:
-        04:33:e3:c3:94:65:1d:a7:2b:d8:59:3b:74:37:cc:0e:06:fa:
-        db:8c:b5:45:08:b1:f6:0b:3f:c8:f6:d6:36:4a:9b:df:41:58:
-        7c:9d:85:e4:d7:a3:87:64:68:1c:0d:33:bc:f3:b0:c7:01:72:
-        ee:e8:e0:9b:e4:bf:b1:71:ec:eb:ca:6c:c5:4f:b8:66:06:42:
-        fd:24:a4:d3:cb:35:d1:e8:0a:88:dd:ff:4e:43:59:87:96:9a:
-        13:08:8b:e4:c6:3f:3d:b8:5f:5f:91:a1:2f:39:bf:a7:33:4c:
-        7d:3d:38:3d:b9:f7:15:f6:eb:f6:c3:5a:ed:1d:54:d2:7b:98:
-        aa:32:06:7e:b1:9c:fe:29:02:be:7e:f2:d6:75:0a:a8:21:e6:
-        38:6e:8d:29:60:65:64:5c:7a:1d:75:fd:48:ca:25:76:79:95:
-        19:0b:98:d5:76:14:c0:27:92:aa:f7:c6:1f:bc:82:65:d0:7c:
-        ea:bb:a0:1c:e6:7b:0f:5d:87:8f:31:75:5a:79:49:cd:eb:1d:
-        ee:02:e1:4c:ae:d0:89:78:d1:43:fb:ca:08:11:26:4c:46:43:
-        a4:43:3f:55:a0:5c:d3:48:ee:e7:6c:c0:d1:1e:1c:7d:af:45:
-        0c:6f:31:33:df:28:dd:94:71:09:e5:1c:12:86:58:2a:78:0c:
-        e3:05:5e:92:ae:fb:0b:2e:16:bb:9a:d0:b9:d8:77:8b:17:fb:
-        fe:9a:0c:99:bb:1e:9a:ac:b4:dc:08:fa:6b:f8:48:fc:71:c7:
-        06:16:20:5c:38:19:66:f7:4d:86:e8:6e:f9:f9:4c:94:d7:df:
-        57:d4:2a:08:37:a7:71:17:51:37:3e:b3:8e:0a:5a:4c:1f:6c:
-        24:5a:df:4b:39:ec:a1:12:8a:c1:95:43:e8:6f:5a:63:b2:20:
-        1b:b0:c4:67:17:a9:be:c3:1d:04:99:26:37:f9:df:04:3d:e9:
-        26:54:d2:26:20:30:df:f8:1d:0e:1a:21:12:a5:b4:cf:ae:5f:
-        4b:87:6d:3c:a3:9f:5f:e9:ad:34:ed:38:59:8c:be:2b:c7:1a:
-        51:a3:b9:8a:1c:ae:47:b0:93:78:5a:21:fc:c1:91:6d:87:3c:
-        74:2a:a7:6f:fc:73:fe:6c:c8:17:19:2c:1f:2e:17:b9:62:38:
-        bd:0e:81:fb:6e:39:94:25:55:21:d3:6a:6a:c4:3e:00:61:99:
-        00:33:d5:6b:36:2e:f6:d4:bf:bc:d0:a5:c6:51:95:aa:d4:67:
-        aa:b7:a2:92:10:7a:96:51
------BEGIN CERTIFICATE-----
-MIID5zCCAc+gAwIBAgIBBDANBgkqhkiG9w0BAQUFADBaMQswCQYDVQQGEwJLUjET
-MBEGA1UECBMKS3l1bmdHaS1EbzERMA8GA1UEBxMIU3V3b24tU2kxFjAUBgNVBAoT
-DVNhbXN1bmcgRWxlYy4xCzAJBgNVBAMTAkNBMB4XDTA5MDMwOTA2MTEwOFoXDTEw
-MDMwOTA2MTEwOFowYzELMAkGA1UEBhMCS1IxEzARBgNVBAgTCkt5dW5nR2ktRG8x
-FjAUBgNVBAoTDVNhbXN1bmcgRWxlYy4xJzAlBgNVBAMTHkZpcnN0IGNlcnRpZmlj
-YXRlIHRvIHRlc3QgT0NTUDCBnzANBgkqhkiG9w0BAQEFAAOBjQAwgYkCgYEAwKlR
-YxnizPOdGdh1kKsTQKM/ndzvSEINADbb6mj9uRU0qa8PUitXLgN0E0G0WWl+9uFU
-Qo3D9IUr/weXpC9b5BO+cu9l51m+7RRxgswJA1CZZgg0GkFF5uM3mDJqFdQyY/cm
-bFrtRb27qr4zS5zLsgMT4y1vYVcq6OhED1nq578CAwEAAaMzMDEwLwYIKwYBBQUH
-AQEEIzAhMB8GCCsGAQUFBzABhhNodHRwOi8vMTI3LjAuMC4xOjgwMA0GCSqGSIb3
-DQEBBQUAA4ICAQBss/mO8ubBXqVhlrN3mue7umz/DMxHt0/0mAhXD0DLSjvcUmQE
-M+PDlGUdpyvYWTt0N8wOBvrbjLVFCLH2Cz/I9tY2SpvfQVh8nYXk16OHZGgcDTO8
-87DHAXLu6OCb5L+xcezrymzFT7hmBkL9JKTTyzXR6AqI3f9OQ1mHlpoTCIvkxj89
-uF9fkaEvOb+nM0x9PTg9ufcV9uv2w1rtHVTSe5iqMgZ+sZz+KQK+fvLWdQqoIeY4
-bo0pYGVkXHoddf1IyiV2eZUZC5jVdhTAJ5Kq98YfvIJl0Hzqu6Ac5nsPXYePMXVa
-eUnN6x3uAuFMrtCJeNFD+8oIESZMRkOkQz9VoFzTSO7nbMDRHhx9r0UMbzEz3yjd
-lHEJ5RwShlgqeAzjBV6SrvsLLha7mtC52HeLF/v+mgyZux6arLTcCPpr+Ej8cccG
-FiBcOBlm902G6G75+UyU199X1CoIN6dxF1E3PrOOClpMH2wkWt9LOeyhEorBlUPo
-b1pjsiAbsMRnF6m+wx0EmSY3+d8EPekmVNImIDDf+B0OGiESpbTPrl9Lh208o59f
-6a007ThZjL4rxxpRo7mKHK5HsJN4WiH8wZFthzx0Kqdv/HP+bMgXGSwfLhe5Yji9
-DoH7bjmUJVUh02pqxD4AYZkAM9VrNi721L+80KXGUZWq1Geqt6KSEHqWUQ==
------END CERTIFICATE-----
diff --git a/tests/cert-svc/data/TestData/ssl/demoCA/newcerts/05.pem b/tests/cert-svc/data/TestData/ssl/demoCA/newcerts/05.pem
deleted file mode 100644 (file)
index de8f1da..0000000
+++ /dev/null
@@ -1,81 +0,0 @@
-Certificate:
-    Data:
-        Version: 3 (0x2)
-        Serial Number: 5 (0x5)
-        Signature Algorithm: sha1WithRSAEncryption
-        Issuer: C=KR, ST=KyungGi-Do, L=Suwon-Si, O=Samsung Elec., CN=CA
-        Validity
-            Not Before: Mar  9 06:12:23 2009 GMT
-            Not After : Mar  9 06:12:23 2010 GMT
-        Subject: C=KR, ST=KyungGi-Do, O=Samsung Elec., CN=First certificate to test OCSP
-        Subject Public Key Info:
-            Public Key Algorithm: rsaEncryption
-            RSA Public Key: (1024 bit)
-                Modulus (1024 bit):
-                    00:c0:a9:51:63:19:e2:cc:f3:9d:19:d8:75:90:ab:
-                    13:40:a3:3f:9d:dc:ef:48:42:0d:00:36:db:ea:68:
-                    fd:b9:15:34:a9:af:0f:52:2b:57:2e:03:74:13:41:
-                    b4:59:69:7e:f6:e1:54:42:8d:c3:f4:85:2b:ff:07:
-                    97:a4:2f:5b:e4:13:be:72:ef:65:e7:59:be:ed:14:
-                    71:82:cc:09:03:50:99:66:08:34:1a:41:45:e6:e3:
-                    37:98:32:6a:15:d4:32:63:f7:26:6c:5a:ed:45:bd:
-                    bb:aa:be:33:4b:9c:cb:b2:03:13:e3:2d:6f:61:57:
-                    2a:e8:e8:44:0f:59:ea:e7:bf
-                Exponent: 65537 (0x10001)
-        X509v3 extensions:
-            Authority Information Access: 
-                OCSP - URI:http://127.0.0.1:80
-
-    Signature Algorithm: sha1WithRSAEncryption
-        4d:c8:99:4f:87:bc:aa:fa:03:99:57:b0:9b:56:a4:6a:7f:fc:
-        34:5d:ef:c5:9e:f1:d2:65:95:8c:f0:d6:47:9e:50:3b:1b:1f:
-        54:a7:75:6c:67:19:11:c4:c0:23:2f:a2:80:2c:08:84:10:63:
-        17:f5:4f:e7:24:53:cf:f6:52:64:b4:e6:5a:44:73:c9:f2:c0:
-        91:5f:23:2a:a4:4e:14:57:19:9e:82:82:d5:e1:cd:2e:1a:8d:
-        6c:45:e9:46:41:ec:25:e1:84:c9:f7:97:61:0c:2d:28:86:03:
-        1f:bf:8f:61:f2:b4:37:eb:e9:e7:9e:1a:55:1c:95:2d:50:f8:
-        1e:01:b8:3a:22:cb:18:00:43:ec:6c:6c:51:0c:ee:28:a1:85:
-        1c:b5:15:69:8b:0d:45:26:d9:48:19:d3:42:6a:e9:29:81:60:
-        db:49:df:f0:1a:4b:82:68:f0:40:af:8b:22:1f:60:08:8a:40:
-        e3:c1:cc:89:8f:28:12:ea:70:eb:a7:98:af:c8:2e:36:0d:5f:
-        b9:eb:79:dc:64:f4:a6:70:91:00:f6:0e:81:bc:f6:35:d2:0a:
-        ed:52:ff:2e:69:68:72:d1:19:32:39:47:80:82:c3:3d:36:98:
-        2f:9a:fe:6d:dc:7c:45:7a:fe:01:d6:36:de:53:92:4e:2c:0c:
-        b1:a2:39:d1:5f:50:c4:6a:a1:2b:15:17:df:20:8f:dd:79:cf:
-        f1:ce:76:df:fa:b1:f6:6b:67:e7:c7:3a:7d:2e:53:fe:f7:c2:
-        1f:b7:fa:71:09:b7:9f:83:91:0a:ce:eb:00:55:47:35:0b:ef:
-        fc:ac:b2:03:e0:78:89:2d:56:a8:52:a1:93:6c:44:25:58:bd:
-        4a:ba:f9:85:23:fc:c0:db:4c:8b:95:54:be:ed:18:90:46:27:
-        f1:3f:37:26:00:08:9f:fc:ce:5b:7e:64:26:46:51:42:c1:de:
-        c4:2f:a8:73:74:0b:e6:48:aa:f3:01:df:63:36:d9:4b:6a:08:
-        02:ac:51:44:e9:ce:99:02:62:f5:87:d9:b2:a6:0b:77:bf:93:
-        bd:ea:47:4c:6c:83:b5:0f:ca:ba:9b:55:8c:da:4f:87:63:d6:
-        32:87:b0:8a:74:3e:02:f5:47:96:dd:85:26:2e:43:63:96:45:
-        48:ca:45:b9:7c:4e:ae:93:69:0c:72:b2:c1:fe:81:ae:ab:be:
-        e9:14:eb:ea:d6:e8:a4:a3:4f:dc:90:d5:10:b7:53:b7:85:81:
-        aa:46:bc:c6:f6:97:1f:a7:55:0b:e2:45:e8:f9:ef:f4:62:88:
-        bd:46:85:39:55:3c:32:92:1c:41:0c:cc:92:3b:17:9a:cc:ef:
-        2f:3b:c5:e0:39:cc:23:47
------BEGIN CERTIFICATE-----
-MIID5zCCAc+gAwIBAgIBBTANBgkqhkiG9w0BAQUFADBaMQswCQYDVQQGEwJLUjET
-MBEGA1UECBMKS3l1bmdHaS1EbzERMA8GA1UEBxMIU3V3b24tU2kxFjAUBgNVBAoT
-DVNhbXN1bmcgRWxlYy4xCzAJBgNVBAMTAkNBMB4XDTA5MDMwOTA2MTIyM1oXDTEw
-MDMwOTA2MTIyM1owYzELMAkGA1UEBhMCS1IxEzARBgNVBAgTCkt5dW5nR2ktRG8x
-FjAUBgNVBAoTDVNhbXN1bmcgRWxlYy4xJzAlBgNVBAMTHkZpcnN0IGNlcnRpZmlj
-YXRlIHRvIHRlc3QgT0NTUDCBnzANBgkqhkiG9w0BAQEFAAOBjQAwgYkCgYEAwKlR
-YxnizPOdGdh1kKsTQKM/ndzvSEINADbb6mj9uRU0qa8PUitXLgN0E0G0WWl+9uFU
-Qo3D9IUr/weXpC9b5BO+cu9l51m+7RRxgswJA1CZZgg0GkFF5uM3mDJqFdQyY/cm
-bFrtRb27qr4zS5zLsgMT4y1vYVcq6OhED1nq578CAwEAAaMzMDEwLwYIKwYBBQUH
-AQEEIzAhMB8GCCsGAQUFBzABhhNodHRwOi8vMTI3LjAuMC4xOjgwMA0GCSqGSIb3
-DQEBBQUAA4ICAQBNyJlPh7yq+gOZV7CbVqRqf/w0Xe/FnvHSZZWM8NZHnlA7Gx9U
-p3VsZxkRxMAjL6KALAiEEGMX9U/nJFPP9lJktOZaRHPJ8sCRXyMqpE4UVxmegoLV
-4c0uGo1sRelGQewl4YTJ95dhDC0ohgMfv49h8rQ36+nnnhpVHJUtUPgeAbg6IssY
-AEPsbGxRDO4ooYUctRVpiw1FJtlIGdNCaukpgWDbSd/wGkuCaPBAr4siH2AIikDj
-wcyJjygS6nDrp5ivyC42DV+563ncZPSmcJEA9g6BvPY10grtUv8uaWhy0RkyOUeA
-gsM9Npgvmv5t3HxFev4B1jbeU5JOLAyxojnRX1DEaqErFRffII/dec/xznbf+rH2
-a2fnxzp9LlP+98Ift/pxCbefg5EKzusAVUc1C+/8rLID4HiJLVaoUqGTbEQlWL1K
-uvmFI/zA20yLlVS+7RiQRifxPzcmAAif/M5bfmQmRlFCwd7EL6hzdAvmSKrzAd9j
-NtlLaggCrFFE6c6ZAmL1h9mypgt3v5O96kdMbIO1D8q6m1WM2k+HY9Yyh7CKdD4C
-9UeW3YUmLkNjlkVIykW5fE6uk2kMcrLB/oGuq77pFOvq1uiko0/ckNUQt1O3hYGq
-RrzG9pcfp1UL4kXo+e/0Yoi9RoU5VTwykhxBDMySOxeazO8vO8XgOcwjRw==
------END CERTIFICATE-----
diff --git a/tests/cert-svc/data/TestData/ssl/demoCA/newcerts/06.pem b/tests/cert-svc/data/TestData/ssl/demoCA/newcerts/06.pem
deleted file mode 100644 (file)
index 2fb2e95..0000000
+++ /dev/null
@@ -1,79 +0,0 @@
-Certificate:
-    Data:
-        Version: 3 (0x2)
-        Serial Number: 6 (0x6)
-        Signature Algorithm: sha1WithRSAEncryption
-        Issuer: C=KR, ST=KyungGi-Do, L=Suwon-Si, O=Samsung Elec., CN=CA
-        Validity
-            Not Before: Mar 10 00:10:31 2009 GMT
-            Not After : Mar 10 00:10:31 2010 GMT
-        Subject: C=KR, ST=KyungGi-Do, O=Samsung Elec., CN=OCSP Responder
-        Subject Public Key Info:
-            Public Key Algorithm: rsaEncryption
-            RSA Public Key: (1024 bit)
-                Modulus (1024 bit):
-                    00:d4:41:90:ba:e8:97:0c:89:05:f0:95:75:44:ff:
-                    f3:c9:b1:68:90:0a:83:a2:30:6d:f4:8d:2d:e1:ec:
-                    c7:bd:ba:24:39:bf:ae:29:fa:65:2b:c6:98:ee:13:
-                    74:7c:5d:68:36:5b:b4:0c:ae:6b:99:40:b8:39:a2:
-                    df:fa:97:e3:62:37:ff:3c:ae:39:6a:1c:77:39:81:
-                    2e:9d:c9:a4:30:e0:4c:e6:18:e9:57:04:a1:09:0b:
-                    ab:ac:00:9c:ca:65:96:59:1f:e9:21:86:9b:d8:ef:
-                    86:db:99:70:1c:39:31:9f:48:f9:02:0d:4d:53:aa:
-                    ac:ad:f1:58:ca:84:98:44:95
-                Exponent: 65537 (0x10001)
-        X509v3 extensions:
-            X509v3 Extended Key Usage: 
-                OCSP Signing
-    Signature Algorithm: sha1WithRSAEncryption
-        a5:f6:ed:d3:38:76:cd:45:47:1f:0d:cf:67:ee:7d:e7:c5:dc:
-        fe:a6:8d:88:3e:f8:29:dd:54:1c:a4:b7:3b:7b:a3:59:5d:64:
-        16:a9:2a:66:3b:3e:08:2d:32:88:0e:cd:8c:05:84:39:a0:19:
-        1f:91:24:ee:e9:a8:a7:b6:21:40:ca:12:d7:e5:98:4a:0f:d7:
-        31:e4:86:b0:1b:56:c1:38:d7:26:c2:fb:3d:2b:71:68:4c:a4:
-        80:16:2e:13:1a:d6:5e:92:b9:cf:ff:19:ea:65:49:b1:db:17:
-        b8:d3:46:99:2c:12:20:51:6c:7d:a3:41:b3:88:f6:88:e2:07:
-        6e:49:6f:32:8d:dc:a0:e3:01:e6:5e:15:07:06:55:48:ae:f5:
-        77:8c:92:92:31:fa:06:29:5e:fc:16:1c:69:25:62:7e:6c:e4:
-        9b:60:c1:c9:28:6b:62:d3:72:bb:e6:a1:41:89:5d:56:5b:3f:
-        38:98:c0:c0:08:41:84:01:c1:cf:23:44:92:98:f7:47:40:a0:
-        8c:a7:29:a3:2d:15:f8:cd:7b:40:dc:84:8f:46:0f:d4:fe:78:
-        96:3a:53:01:31:64:47:3b:d8:50:92:7f:87:6c:94:ce:9e:07:
-        96:53:0a:c5:a8:2b:07:b4:8c:55:0d:e3:96:1b:fd:62:e8:19:
-        c7:bc:ab:79:65:aa:83:5d:a3:94:db:84:23:e2:4c:ef:74:8f:
-        36:15:71:fd:a1:78:f0:c4:23:2e:ec:8b:de:df:23:58:6e:f6:
-        c0:4a:ff:d0:b4:1b:f5:dd:e4:ab:bf:65:13:ee:ac:e4:86:31:
-        35:60:8d:04:bd:a3:90:35:11:b6:55:86:65:22:ec:ae:ef:65:
-        06:27:91:b7:a3:a0:84:83:c3:ae:fb:39:0b:74:c2:aa:da:2e:
-        52:27:5a:07:10:ba:10:a8:2c:54:c1:87:4d:cb:d5:fa:6f:6a:
-        fe:1b:61:74:79:96:c4:b1:26:61:2d:26:6a:59:07:cd:20:11:
-        15:13:78:9b:77:5b:65:43:17:e0:0a:6e:6e:e5:72:37:58:3a:
-        96:e4:28:08:56:c5:78:2a:e8:ac:cb:44:66:25:a4:19:8a:bb:
-        c8:10:8f:25:0d:93:a2:e8:d0:58:85:69:b0:fd:fa:38:83:90:
-        29:84:57:1c:39:6c:52:87:f5:4b:de:cf:c6:b8:4a:e2:a2:c8:
-        c9:4e:7a:a3:51:13:d7:62:3a:31:7c:b9:ad:df:1e:a2:2f:c6:
-        5f:3f:f9:e3:e7:e2:8d:6c:1d:49:93:b7:ea:84:80:01:41:6e:
-        8d:a4:00:4e:9c:8b:5a:6f:84:6e:04:a2:7c:9c:e7:6b:30:50:
-        a5:1d:2d:2e:00:24:6c:6b
------BEGIN CERTIFICATE-----
-MIIDuzCCAaOgAwIBAgIBBjANBgkqhkiG9w0BAQUFADBaMQswCQYDVQQGEwJLUjET
-MBEGA1UECBMKS3l1bmdHaS1EbzERMA8GA1UEBxMIU3V3b24tU2kxFjAUBgNVBAoT
-DVNhbXN1bmcgRWxlYy4xCzAJBgNVBAMTAkNBMB4XDTA5MDMxMDAwMTAzMVoXDTEw
-MDMxMDAwMTAzMVowUzELMAkGA1UEBhMCS1IxEzARBgNVBAgTCkt5dW5nR2ktRG8x
-FjAUBgNVBAoTDVNhbXN1bmcgRWxlYy4xFzAVBgNVBAMTDk9DU1AgUmVzcG9uZGVy
-MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQDUQZC66JcMiQXwlXVE//PJsWiQ
-CoOiMG30jS3h7Me9uiQ5v64p+mUrxpjuE3R8XWg2W7QMrmuZQLg5ot/6l+NiN/88
-rjlqHHc5gS6dyaQw4EzmGOlXBKEJC6usAJzKZZZZH+khhpvY74bbmXAcOTGfSPkC
-DU1Tqqyt8VjKhJhElQIDAQABoxcwFTATBgNVHSUEDDAKBggrBgEFBQcDCTANBgkq
-hkiG9w0BAQUFAAOCAgEApfbt0zh2zUVHHw3PZ+5958Xc/qaNiD74Kd1UHKS3O3uj
-WV1kFqkqZjs+CC0yiA7NjAWEOaAZH5Ek7umop7YhQMoS1+WYSg/XMeSGsBtWwTjX
-JsL7PStxaEykgBYuExrWXpK5z/8Z6mVJsdsXuNNGmSwSIFFsfaNBs4j2iOIHbklv
-Mo3coOMB5l4VBwZVSK71d4ySkjH6Bile/BYcaSVifmzkm2DByShrYtNyu+ahQYld
-Vls/OJjAwAhBhAHBzyNEkpj3R0CgjKcpoy0V+M17QNyEj0YP1P54ljpTATFkRzvY
-UJJ/h2yUzp4HllMKxagrB7SMVQ3jlhv9YugZx7yreWWqg12jlNuEI+JM73SPNhVx
-/aF48MQjLuyL3t8jWG72wEr/0LQb9d3kq79lE+6s5IYxNWCNBL2jkDURtlWGZSLs
-ru9lBieRt6OghIPDrvs5C3TCqtouUidaBxC6EKgsVMGHTcvV+m9q/hthdHmWxLEm
-YS0malkHzSARFRN4m3dbZUMX4ApubuVyN1g6luQoCFbFeCrorMtEZiWkGYq7yBCP
-JQ2ToujQWIVpsP36OIOQKYRXHDlsUof1S97PxrhK4qLIyU56o1ET12I6MXy5rd8e
-oi/GXz/54+fijWwdSZO36oSAAUFujaQATpyLWm+EbgSifJznazBQpR0tLgAkbGs=
------END CERTIFICATE-----
diff --git a/tests/cert-svc/data/TestData/ssl/demoCA/newcerts/07.pem b/tests/cert-svc/data/TestData/ssl/demoCA/newcerts/07.pem
deleted file mode 100644 (file)
index 5550456..0000000
+++ /dev/null
@@ -1,79 +0,0 @@
-Certificate:
-    Data:
-        Version: 3 (0x2)
-        Serial Number: 7 (0x7)
-        Signature Algorithm: sha1WithRSAEncryption
-        Issuer: C=KR, ST=KyungGi-Do, L=Suwon-Si, O=Samsung Elec., CN=CA
-        Validity
-            Not Before: Mar 10 00:14:51 2009 GMT
-            Not After : Mar 10 00:14:51 2010 GMT
-        Subject: C=KR, ST=KyungGi-Do, O=Samsung Elec., CN=OCSP Responder
-        Subject Public Key Info:
-            Public Key Algorithm: rsaEncryption
-            RSA Public Key: (1024 bit)
-                Modulus (1024 bit):
-                    00:b9:0e:80:20:fc:74:49:08:cb:83:87:76:e4:42:
-                    03:42:6e:56:1b:ae:73:43:9b:a6:cf:5d:33:1d:37:
-                    cf:b5:22:bc:79:5e:6a:69:02:3e:e2:08:c5:f5:be:
-                    ee:ef:df:4f:85:41:a2:5f:d3:76:39:3f:61:56:14:
-                    1f:c1:cc:ec:45:e3:b2:e2:b0:e8:20:9f:a9:e7:8a:
-                    b8:ed:3f:e4:6f:86:d8:e5:d5:3b:fe:47:e8:8f:51:
-                    ee:dd:b6:7f:36:6b:c7:75:f7:78:04:df:ac:51:b3:
-                    25:65:04:ab:0d:ce:db:5e:3a:db:6a:8f:da:69:46:
-                    c7:92:f2:b3:ba:6c:90:3d:71
-                Exponent: 65537 (0x10001)
-        X509v3 extensions:
-            X509v3 Extended Key Usage: 
-                OCSP Signing
-    Signature Algorithm: sha1WithRSAEncryption
-        2d:28:82:cc:79:30:2e:b5:8e:4f:d9:3b:f4:8b:c8:a3:e6:3b:
-        cb:2c:0f:97:1c:8b:7f:06:e1:5d:3b:ec:af:c5:de:ef:c4:fa:
-        0b:63:ee:cb:ad:60:7f:42:6f:82:6d:f2:fb:bb:9a:36:f7:1a:
-        6c:9c:82:e8:17:18:41:35:47:72:e8:36:b4:1a:c1:ae:59:7c:
-        92:07:62:8f:00:9a:2e:c8:5e:62:20:5f:14:82:0d:fe:de:04:
-        c8:b0:b6:03:d4:aa:41:70:4f:f9:05:ba:b5:c7:3c:36:a0:68:
-        81:c5:82:91:56:fc:65:fe:73:c4:b3:91:d2:c4:51:16:cb:48:
-        32:e3:b1:ea:a4:dc:e0:de:9b:f2:75:22:cd:04:2d:2d:c9:76:
-        aa:3b:b8:c6:1a:86:86:1f:a7:11:e0:6d:16:f4:5b:b3:09:1d:
-        34:c1:0e:1a:c8:21:82:91:73:bc:e5:c5:cb:d3:ed:46:d5:f5:
-        a6:f8:65:a6:91:7b:cd:a9:0d:a6:37:3e:d9:3f:6f:c4:c7:aa:
-        d9:95:75:dc:6d:38:9e:54:3d:0f:a1:26:16:28:71:6b:14:9e:
-        be:66:8b:f4:71:c1:3e:34:a0:a1:5d:da:31:1c:63:9f:9d:01:
-        7f:62:13:9d:3b:74:a2:b3:0a:d5:24:c0:35:07:c0:6d:20:c1:
-        2a:21:fb:82:a5:9c:eb:3e:ce:25:57:02:d6:38:77:5e:a0:2a:
-        52:0c:f7:3f:f3:d3:aa:0c:53:a9:1c:e9:39:d7:0d:96:28:b8:
-        e2:e9:1c:e3:92:12:1e:e1:3e:44:5a:fb:25:1e:2c:74:a9:93:
-        24:a0:f0:02:63:bf:e2:45:a0:c5:6f:40:e4:3b:b2:b1:f1:0a:
-        19:89:b9:54:d6:61:21:3d:7b:4b:91:fe:d9:f0:e1:48:20:d9:
-        0b:e2:be:dd:f7:5b:6f:c8:76:ca:74:9f:a5:4a:9a:9c:1d:f0:
-        ec:40:72:82:67:fc:2a:9f:4e:f1:7f:e4:b5:7e:c0:3f:22:36:
-        18:c3:48:88:7f:0c:2d:26:cc:40:c5:82:bd:23:e5:6c:ce:3c:
-        27:19:27:fe:7b:1b:fa:cb:38:0a:9f:a6:44:4b:c2:22:63:68:
-        3c:fa:86:11:af:5d:05:7c:5b:fd:26:9a:78:18:c7:f6:1e:1f:
-        69:b9:ba:71:3b:dc:95:c1:3f:59:17:42:f1:48:2b:10:5f:67:
-        46:32:37:4a:1a:85:d0:00:81:92:50:6c:29:80:e1:b5:bf:52:
-        a8:79:c0:5d:b9:36:e3:f7:d5:69:dc:de:54:13:c0:d3:6e:7a:
-        9c:a8:e9:e4:f6:57:ed:aa:bd:6e:c1:c5:35:ed:72:17:65:e3:
-        cd:f0:a3:a0:10:95:b8:70
------BEGIN CERTIFICATE-----
-MIIDuzCCAaOgAwIBAgIBBzANBgkqhkiG9w0BAQUFADBaMQswCQYDVQQGEwJLUjET
-MBEGA1UECBMKS3l1bmdHaS1EbzERMA8GA1UEBxMIU3V3b24tU2kxFjAUBgNVBAoT
-DVNhbXN1bmcgRWxlYy4xCzAJBgNVBAMTAkNBMB4XDTA5MDMxMDAwMTQ1MVoXDTEw
-MDMxMDAwMTQ1MVowUzELMAkGA1UEBhMCS1IxEzARBgNVBAgTCkt5dW5nR2ktRG8x
-FjAUBgNVBAoTDVNhbXN1bmcgRWxlYy4xFzAVBgNVBAMTDk9DU1AgUmVzcG9uZGVy
-MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQC5DoAg/HRJCMuDh3bkQgNCblYb
-rnNDm6bPXTMdN8+1Irx5XmppAj7iCMX1vu7v30+FQaJf03Y5P2FWFB/BzOxF47Li
-sOggn6nnirjtP+Rvhtjl1Tv+R+iPUe7dtn82a8d193gE36xRsyVlBKsNztteOttq
-j9ppRseS8rO6bJA9cQIDAQABoxcwFTATBgNVHSUEDDAKBggrBgEFBQcDCTANBgkq
-hkiG9w0BAQUFAAOCAgEALSiCzHkwLrWOT9k79IvIo+Y7yywPlxyLfwbhXTvsr8Xe
-78T6C2Puy61gf0Jvgm3y+7uaNvcabJyC6BcYQTVHcug2tBrBrll8kgdijwCaLshe
-YiBfFIIN/t4EyLC2A9SqQXBP+QW6tcc8NqBogcWCkVb8Zf5zxLOR0sRRFstIMuOx
-6qTc4N6b8nUizQQtLcl2qju4xhqGhh+nEeBtFvRbswkdNMEOGsghgpFzvOXFy9Pt
-RtX1pvhlppF7zakNpjc+2T9vxMeq2ZV13G04nlQ9D6EmFihxaxSevmaL9HHBPjSg
-oV3aMRxjn50Bf2ITnTt0orMK1STANQfAbSDBKiH7gqWc6z7OJVcC1jh3XqAqUgz3
-P/PTqgxTqRzpOdcNlii44ukc45ISHuE+RFr7JR4sdKmTJKDwAmO/4kWgxW9A5Duy
-sfEKGYm5VNZhIT17S5H+2fDhSCDZC+K+3fdbb8h2ynSfpUqanB3w7EBygmf8Kp9O
-8X/ktX7APyI2GMNIiH8MLSbMQMWCvSPlbM48Jxkn/nsb+ss4Cp+mREvCImNoPPqG
-Ea9dBXxb/SaaeBjH9h4fabm6cTvclcE/WRdC8UgrEF9nRjI3ShqF0ACBklBsKYDh
-tb9SqHnAXbk24/fVadzeVBPA0256nKjp5PZX7aq9bsHFNe1yF2XjzfCjoBCVuHA=
------END CERTIFICATE-----
diff --git a/tests/cert-svc/data/TestData/ssl/demoCA/newcerts/08.pem b/tests/cert-svc/data/TestData/ssl/demoCA/newcerts/08.pem
deleted file mode 100644 (file)
index 9dba2db..0000000
+++ /dev/null
@@ -1,81 +0,0 @@
-Certificate:
-    Data:
-        Version: 3 (0x2)
-        Serial Number: 8 (0x8)
-        Signature Algorithm: sha1WithRSAEncryption
-        Issuer: C=KR, ST=KyungGi-Do, L=Suwon-Si, O=Samsung Elec., CN=CA
-        Validity
-            Not Before: Mar 10 08:04:09 2009 GMT
-            Not After : Mar 10 08:04:09 2010 GMT
-        Subject: C=KR, ST=KyungGi-Do, O=Samsung Elec., CN=First certificate to test OCSP
-        Subject Public Key Info:
-            Public Key Algorithm: rsaEncryption
-            RSA Public Key: (1024 bit)
-                Modulus (1024 bit):
-                    00:c0:a9:51:63:19:e2:cc:f3:9d:19:d8:75:90:ab:
-                    13:40:a3:3f:9d:dc:ef:48:42:0d:00:36:db:ea:68:
-                    fd:b9:15:34:a9:af:0f:52:2b:57:2e:03:74:13:41:
-                    b4:59:69:7e:f6:e1:54:42:8d:c3:f4:85:2b:ff:07:
-                    97:a4:2f:5b:e4:13:be:72:ef:65:e7:59:be:ed:14:
-                    71:82:cc:09:03:50:99:66:08:34:1a:41:45:e6:e3:
-                    37:98:32:6a:15:d4:32:63:f7:26:6c:5a:ed:45:bd:
-                    bb:aa:be:33:4b:9c:cb:b2:03:13:e3:2d:6f:61:57:
-                    2a:e8:e8:44:0f:59:ea:e7:bf
-                Exponent: 65537 (0x10001)
-        X509v3 extensions:
-            Authority Information Access: 
-                OCSP - URI:http://127.0.0.1:80/0001
-
-    Signature Algorithm: sha1WithRSAEncryption
-        71:65:df:93:41:79:18:74:88:43:3b:dd:0f:b4:ac:96:16:f3:
-        0c:39:28:03:3e:3a:ee:0f:ce:d8:8c:14:3d:ae:e7:f8:a5:ff:
-        2f:f3:a9:17:0e:a3:6f:d0:a0:97:bb:b9:96:ba:ec:fc:3f:ef:
-        86:5c:d0:1c:66:2a:ac:7a:ca:a4:c2:4b:a3:6d:5f:3e:eb:e3:
-        df:c7:74:d8:b8:04:ab:de:91:96:26:1b:83:78:6e:4c:37:ad:
-        b1:90:e8:35:b2:da:fb:ee:8b:75:02:21:a0:11:b7:52:4f:90:
-        86:6c:5a:be:74:b8:cf:3b:0c:ff:08:27:f5:d9:13:62:fc:8e:
-        61:35:bb:48:fa:28:d0:5d:1b:73:4b:c3:29:d0:e0:b4:9b:9f:
-        59:9e:6a:5d:7a:55:4f:91:94:28:0c:76:e5:9e:83:db:f9:1e:
-        44:98:5d:6c:a6:2e:a0:b2:bf:f3:f0:d8:45:46:77:26:32:32:
-        2f:a2:8a:80:37:81:78:74:5f:91:e8:25:a7:bd:d2:34:cb:57:
-        80:d3:cf:1d:b1:2d:fb:d1:fd:0b:84:a5:86:f1:c9:25:06:3a:
-        65:06:8b:e8:b0:6b:57:35:73:30:18:a9:fe:c6:6f:8c:63:45:
-        62:c3:8b:f6:d8:70:38:8a:e7:c2:63:0e:4a:4b:a7:d8:45:42:
-        59:96:af:05:4c:ac:fe:d5:cc:45:7e:b6:30:39:52:f2:e8:26:
-        0d:22:be:b6:bf:e9:d4:ff:f7:5a:55:b3:5c:86:95:72:01:06:
-        d8:58:26:21:9b:b9:02:f0:03:84:16:d3:f0:20:cb:7d:28:c8:
-        f5:6d:d8:8e:57:29:f8:ba:c2:f4:e5:ea:d2:f1:6e:8b:44:f1:
-        a0:1a:5b:e8:e1:e2:a1:6c:18:a5:06:df:d0:94:6c:20:34:c1:
-        0c:5e:e5:fc:d8:74:e6:a1:6a:a5:00:ca:30:a3:6b:71:8b:3c:
-        27:8b:c0:b5:2a:e0:78:10:8a:8b:ae:0b:ff:8a:f2:ef:e1:1e:
-        dd:2a:d5:2f:8f:98:b1:4d:db:66:6b:b1:bd:85:d6:36:bd:19:
-        29:bd:40:1d:1a:b5:7f:77:a5:08:3f:98:07:38:82:e5:e3:53:
-        b7:cc:54:66:e0:f2:b7:4c:0c:da:3c:5b:5f:d9:9b:f6:86:e2:
-        e6:c8:d4:9a:81:e2:5b:e3:a7:0d:d9:4c:ac:98:b2:b7:de:56:
-        2c:82:3a:a2:64:55:36:2b:d5:95:1c:ff:bd:25:1c:9e:a1:55:
-        d6:00:c2:ae:d3:54:63:33:ac:30:dd:52:90:78:53:9f:7c:b4:
-        72:4c:1a:3e:b1:90:5e:ce:af:a0:d7:5f:3e:dd:c5:28:42:03:
-        ea:a7:5e:5b:ff:fa:b0:89
------BEGIN CERTIFICATE-----
-MIID7DCCAdSgAwIBAgIBCDANBgkqhkiG9w0BAQUFADBaMQswCQYDVQQGEwJLUjET
-MBEGA1UECBMKS3l1bmdHaS1EbzERMA8GA1UEBxMIU3V3b24tU2kxFjAUBgNVBAoT
-DVNhbXN1bmcgRWxlYy4xCzAJBgNVBAMTAkNBMB4XDTA5MDMxMDA4MDQwOVoXDTEw
-MDMxMDA4MDQwOVowYzELMAkGA1UEBhMCS1IxEzARBgNVBAgTCkt5dW5nR2ktRG8x
-FjAUBgNVBAoTDVNhbXN1bmcgRWxlYy4xJzAlBgNVBAMTHkZpcnN0IGNlcnRpZmlj
-YXRlIHRvIHRlc3QgT0NTUDCBnzANBgkqhkiG9w0BAQEFAAOBjQAwgYkCgYEAwKlR
-YxnizPOdGdh1kKsTQKM/ndzvSEINADbb6mj9uRU0qa8PUitXLgN0E0G0WWl+9uFU
-Qo3D9IUr/weXpC9b5BO+cu9l51m+7RRxgswJA1CZZgg0GkFF5uM3mDJqFdQyY/cm
-bFrtRb27qr4zS5zLsgMT4y1vYVcq6OhED1nq578CAwEAAaM4MDYwNAYIKwYBBQUH
-AQEEKDAmMCQGCCsGAQUFBzABhhhodHRwOi8vMTI3LjAuMC4xOjgwLzAwMDEwDQYJ
-KoZIhvcNAQEFBQADggIBAHFl35NBeRh0iEM73Q+0rJYW8ww5KAM+Ou4PztiMFD2u
-5/il/y/zqRcOo2/QoJe7uZa67Pw/74Zc0BxmKqx6yqTCS6NtXz7r49/HdNi4BKve
-kZYmG4N4bkw3rbGQ6DWy2vvui3UCIaARt1JPkIZsWr50uM87DP8IJ/XZE2L8jmE1
-u0j6KNBdG3NLwynQ4LSbn1meal16VU+RlCgMduWeg9v5HkSYXWymLqCyv/Pw2EVG
-dyYyMi+iioA3gXh0X5HoJae90jTLV4DTzx2xLfvR/QuEpYbxySUGOmUGi+iwa1c1
-czAYqf7Gb4xjRWLDi/bYcDiK58JjDkpLp9hFQlmWrwVMrP7VzEV+tjA5UvLoJg0i
-vra/6dT/91pVs1yGlXIBBthYJiGbuQLwA4QW0/Agy30oyPVt2I5XKfi6wvTl6tLx
-botE8aAaW+jh4qFsGKUG39CUbCA0wQxe5fzYdOahaqUAyjCja3GLPCeLwLUq4HgQ
-iouuC/+K8u/hHt0q1S+PmLFN22Zrsb2F1ja9GSm9QB0atX93pQg/mAc4guXjU7fM
-VGbg8rdMDNo8W1/Zm/aG4ubI1JqB4lvjpw3ZTKyYsrfeViyCOqJkVTYr1ZUc/70l
-HJ6hVdYAwq7TVGMzrDDdUpB4U598tHJMGj6xkF7Or6DXXz7dxShCA+qnXlv/+rCJ
------END CERTIFICATE-----
diff --git a/tests/cert-svc/data/TestData/ssl/demoCA/newcerts/09.pem b/tests/cert-svc/data/TestData/ssl/demoCA/newcerts/09.pem
deleted file mode 100644 (file)
index 399064f..0000000
+++ /dev/null
@@ -1,91 +0,0 @@
-Certificate:
-    Data:
-        Version: 3 (0x2)
-        Serial Number: 9 (0x9)
-        Signature Algorithm: sha1WithRSAEncryption
-        Issuer: C=KR, ST=KyungGi-Do, L=Suwon-Si, O=Samsung Elec., CN=CA
-        Validity
-            Not Before: Mar 11 10:49:52 2009 GMT
-            Not After : Mar 11 10:49:52 2010 GMT
-        Subject: C=KR, ST=KyungGi-Do, O=Samsung Elec., CN=OCSP Responder
-        Subject Public Key Info:
-            Public Key Algorithm: rsaEncryption
-            RSA Public Key: (1024 bit)
-                Modulus (1024 bit):
-                    00:b9:0e:80:20:fc:74:49:08:cb:83:87:76:e4:42:
-                    03:42:6e:56:1b:ae:73:43:9b:a6:cf:5d:33:1d:37:
-                    cf:b5:22:bc:79:5e:6a:69:02:3e:e2:08:c5:f5:be:
-                    ee:ef:df:4f:85:41:a2:5f:d3:76:39:3f:61:56:14:
-                    1f:c1:cc:ec:45:e3:b2:e2:b0:e8:20:9f:a9:e7:8a:
-                    b8:ed:3f:e4:6f:86:d8:e5:d5:3b:fe:47:e8:8f:51:
-                    ee:dd:b6:7f:36:6b:c7:75:f7:78:04:df:ac:51:b3:
-                    25:65:04:ab:0d:ce:db:5e:3a:db:6a:8f:da:69:46:
-                    c7:92:f2:b3:ba:6c:90:3d:71
-                Exponent: 65537 (0x10001)
-        X509v3 extensions:
-            X509v3 Basic Constraints: 
-                CA:FALSE
-            Netscape Comment: 
-                OpenSSL Generated Certificate
-            X509v3 Subject Key Identifier: 
-                CB:F2:C4:A9:D8:FB:EB:6D:99:08:AB:41:10:5D:9F:90:77:73:E5:AA
-            X509v3 Authority Key Identifier: 
-                DirName:/C=KR/ST=KyungGi-Do/L=Suwon-Si/O=Samsung Elec./CN=CA
-                serial:F2:5B:40:5B:C2:B7:D0:64
-
-    Signature Algorithm: sha1WithRSAEncryption
-        38:fc:55:d5:e9:ae:c2:64:71:3d:ec:7d:b3:b3:a2:3c:cc:81:
-        97:19:5d:88:b1:a9:64:44:0a:74:80:80:5d:b8:c2:1f:8b:e6:
-        8f:ae:03:e1:61:ba:68:ff:16:2e:8e:c4:81:44:ce:ac:06:db:
-        c1:57:d3:e5:a3:f6:e2:02:78:b5:a3:ef:04:57:3a:59:f4:df:
-        46:d2:18:61:8b:06:fc:57:15:39:0f:22:c7:81:3c:df:51:9e:
-        c1:ac:b4:21:81:4b:1f:90:36:9a:dc:6b:4d:5d:7d:2a:e5:ab:
-        d9:fe:5c:58:17:c3:58:01:a2:3d:d5:f9:e4:d8:e8:fe:be:e1:
-        da:8d:30:e2:22:ef:59:48:8f:0f:ba:09:66:64:96:85:d5:b1:
-        90:b6:51:cc:99:35:5b:d9:e6:c4:57:07:98:c7:f5:68:7d:e2:
-        59:40:82:ae:9f:64:02:47:43:69:27:4a:9c:e4:70:b4:a9:20:
-        c1:4f:10:9a:50:eb:c1:52:75:a6:72:84:cc:92:b4:cd:e1:36:
-        e8:1a:ad:19:dc:0e:a2:49:e8:c8:0d:cd:ea:97:53:fc:a4:ea:
-        0d:16:81:af:41:38:90:b2:c8:69:f4:1c:55:1c:18:84:1b:b4:
-        82:c9:c0:c7:45:d8:6c:3a:b6:0e:9b:89:f1:20:c0:a9:0d:cf:
-        b9:ae:84:19:7f:4c:2b:be:46:4d:61:b3:bc:56:ed:a2:01:4d:
-        46:a9:2d:bb:3b:73:5b:18:fc:eb:7f:60:d5:ac:60:92:f4:c0:
-        73:14:54:f1:be:c5:90:e9:f0:37:69:20:cb:a7:e9:74:52:e4:
-        30:38:b9:20:44:5e:9d:eb:86:ae:ed:38:8d:7d:32:59:d7:d7:
-        0b:8e:78:28:a3:3b:5e:f5:a4:35:f7:fe:e9:19:4c:7a:82:c0:
-        19:0f:99:bb:49:ba:38:8e:78:5c:5f:a5:7c:f7:58:aa:53:6c:
-        d0:bd:6a:4a:87:e7:27:f8:7a:75:cf:0d:d0:98:93:5d:8f:e2:
-        85:cf:4c:93:18:34:bf:40:4c:b9:16:00:1d:ec:ce:bd:93:78:
-        46:80:d9:89:a5:52:41:db:f0:8b:13:f0:07:7c:35:dc:69:69:
-        16:67:31:60:ea:27:34:cb:8a:9b:d9:98:48:f6:fa:77:74:9d:
-        07:a8:60:df:74:e9:e1:25:5f:83:78:0d:69:37:b4:a5:78:7d:
-        0d:0f:e0:17:b9:42:7f:9e:41:33:5a:f3:b0:80:3e:f2:ed:5e:
-        93:60:8a:4e:88:a2:5e:40:ae:f9:ec:11:cb:76:0d:b6:ee:54:
-        31:f0:a3:37:9e:0f:22:c4:b8:c5:63:24:8c:c5:a9:24:c9:1b:
-        27:c6:1b:69:21:08:8c:33
------BEGIN CERTIFICATE-----
-MIIEdjCCAl6gAwIBAgIBCTANBgkqhkiG9w0BAQUFADBaMQswCQYDVQQGEwJLUjET
-MBEGA1UECBMKS3l1bmdHaS1EbzERMA8GA1UEBxMIU3V3b24tU2kxFjAUBgNVBAoT
-DVNhbXN1bmcgRWxlYy4xCzAJBgNVBAMTAkNBMB4XDTA5MDMxMTEwNDk1MloXDTEw
-MDMxMTEwNDk1MlowUzELMAkGA1UEBhMCS1IxEzARBgNVBAgTCkt5dW5nR2ktRG8x
-FjAUBgNVBAoTDVNhbXN1bmcgRWxlYy4xFzAVBgNVBAMTDk9DU1AgUmVzcG9uZGVy
-MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQC5DoAg/HRJCMuDh3bkQgNCblYb
-rnNDm6bPXTMdN8+1Irx5XmppAj7iCMX1vu7v30+FQaJf03Y5P2FWFB/BzOxF47Li
-sOggn6nnirjtP+Rvhtjl1Tv+R+iPUe7dtn82a8d193gE36xRsyVlBKsNztteOttq
-j9ppRseS8rO6bJA9cQIDAQABo4HRMIHOMAkGA1UdEwQCMAAwLAYJYIZIAYb4QgEN
-BB8WHU9wZW5TU0wgR2VuZXJhdGVkIENlcnRpZmljYXRlMB0GA1UdDgQWBBTL8sSp
-2PvrbZkIq0EQXZ+Qd3PlqjB0BgNVHSMEbTBroV6kXDBaMQswCQYDVQQGEwJLUjET
-MBEGA1UECBMKS3l1bmdHaS1EbzERMA8GA1UEBxMIU3V3b24tU2kxFjAUBgNVBAoT
-DVNhbXN1bmcgRWxlYy4xCzAJBgNVBAMTAkNBggkA8ltAW8K30GQwDQYJKoZIhvcN
-AQEFBQADggIBADj8VdXprsJkcT3sfbOzojzMgZcZXYixqWRECnSAgF24wh+L5o+u
-A+Fhumj/Fi6OxIFEzqwG28FX0+Wj9uICeLWj7wRXOln030bSGGGLBvxXFTkPIseB
-PN9RnsGstCGBSx+QNprca01dfSrlq9n+XFgXw1gBoj3V+eTY6P6+4dqNMOIi71lI
-jw+6CWZkloXVsZC2UcyZNVvZ5sRXB5jH9Wh94llAgq6fZAJHQ2knSpzkcLSpIMFP
-EJpQ68FSdaZyhMyStM3hNugarRncDqJJ6MgNzeqXU/yk6g0Wga9BOJCyyGn0HFUc
-GIQbtILJwMdF2Gw6tg6bifEgwKkNz7muhBl/TCu+Rk1hs7xW7aIBTUapLbs7c1sY
-/Ot/YNWsYJL0wHMUVPG+xZDp8DdpIMun6XRS5DA4uSBEXp3rhq7tOI19MlnX1wuO
-eCijO171pDX3/ukZTHqCwBkPmbtJujiOeFxfpXz3WKpTbNC9akqH5yf4enXPDdCY
-k12P4oXPTJMYNL9ATLkWAB3szr2TeEaA2YmlUkHb8IsT8Ad8NdxpaRZnMWDqJzTL
-ipvZmEj2+nd0nQeoYN906eElX4N4DWk3tKV4fQ0P4Be5Qn+eQTNa87CAPvLtXpNg
-ik6Iol5ArvnsEct2DbbuVDHwozeeDyLEuMVjJIzFqSTJGyfGG2khCIwz
------END CERTIFICATE-----
diff --git a/tests/cert-svc/data/TestData/ssl/demoCA/newcerts/0A.pem b/tests/cert-svc/data/TestData/ssl/demoCA/newcerts/0A.pem
deleted file mode 100644 (file)
index edf549c..0000000
+++ /dev/null
@@ -1,81 +0,0 @@
-Certificate:
-    Data:
-        Version: 3 (0x2)
-        Serial Number: 10 (0xa)
-        Signature Algorithm: sha1WithRSAEncryption
-        Issuer: C=KR, ST=KyungGi-Do, L=Suwon-Si, O=Samsung Elec., CN=CA
-        Validity
-            Not Before: Mar 13 01:19:18 2009 GMT
-            Not After : Mar 13 01:19:18 2010 GMT
-        Subject: C=KR, ST=KyungGi-Do, O=Samsung Elec., CN=First certificate to test OCSP
-        Subject Public Key Info:
-            Public Key Algorithm: rsaEncryption
-            RSA Public Key: (1024 bit)
-                Modulus (1024 bit):
-                    00:c0:a9:51:63:19:e2:cc:f3:9d:19:d8:75:90:ab:
-                    13:40:a3:3f:9d:dc:ef:48:42:0d:00:36:db:ea:68:
-                    fd:b9:15:34:a9:af:0f:52:2b:57:2e:03:74:13:41:
-                    b4:59:69:7e:f6:e1:54:42:8d:c3:f4:85:2b:ff:07:
-                    97:a4:2f:5b:e4:13:be:72:ef:65:e7:59:be:ed:14:
-                    71:82:cc:09:03:50:99:66:08:34:1a:41:45:e6:e3:
-                    37:98:32:6a:15:d4:32:63:f7:26:6c:5a:ed:45:bd:
-                    bb:aa:be:33:4b:9c:cb:b2:03:13:e3:2d:6f:61:57:
-                    2a:e8:e8:44:0f:59:ea:e7:bf
-                Exponent: 65537 (0x10001)
-        X509v3 extensions:
-            Authority Information Access: 
-                OCSP - URI:http://127.0.0.1:81/0002
-
-    Signature Algorithm: sha1WithRSAEncryption
-        c2:1a:cb:28:cf:52:fa:67:16:85:c5:cb:7b:b8:4c:75:20:06:
-        62:ab:43:9f:95:f6:d8:98:ab:26:ec:89:32:d6:14:15:cb:5d:
-        5c:17:a4:4f:b5:c7:0e:9c:3e:f3:f0:11:ea:db:9d:5b:29:e8:
-        8d:14:1e:bb:46:1e:10:68:01:4f:3a:1b:40:4a:4c:a2:47:b4:
-        b5:e6:c4:97:ce:df:56:a5:29:60:f5:e2:6e:d6:29:01:b8:23:
-        2a:58:89:d3:5f:6a:06:28:b6:b6:5b:0f:c7:ae:62:d2:9b:32:
-        06:ac:82:c4:f0:a1:fe:89:af:99:23:e4:7c:98:76:b0:e4:64:
-        6b:17:24:67:fa:f4:41:65:4e:c6:1d:cc:89:52:8c:4a:52:26:
-        8a:42:5b:7f:1a:93:d0:53:93:57:65:3f:6f:23:17:1c:68:13:
-        58:13:50:f7:9f:a5:32:2e:5f:20:23:9e:b4:a2:75:fb:a7:d8:
-        3a:c8:6c:86:18:b8:e0:09:08:c9:ec:b2:a6:6b:43:c2:c7:af:
-        b6:c2:a4:97:cc:35:d5:06:38:1d:73:7f:4b:ca:54:9f:b6:94:
-        2d:82:81:62:37:b8:74:8a:33:1c:ed:52:4f:8f:5b:88:fd:b4:
-        61:97:2e:b9:2b:99:0b:5a:f6:2a:03:bc:e2:6f:d1:16:cc:da:
-        be:97:26:06:e8:50:1f:e7:01:ec:5f:d8:d7:ca:74:84:70:48:
-        55:3c:6f:c8:31:ed:0c:39:7a:7f:ed:81:7a:ed:f4:3b:e1:06:
-        07:1d:f1:3b:81:ae:7d:1c:c7:6a:74:d9:a0:de:3f:ce:f4:d1:
-        9b:ea:43:f7:e0:46:7e:ae:a2:42:2b:58:3d:a3:c3:1c:37:2d:
-        b7:6b:5d:3a:64:9f:97:e1:a4:1b:7e:63:06:1c:7b:3b:fa:73:
-        a3:41:a9:65:bd:3f:42:38:ab:27:cc:07:b4:d2:0f:f8:04:26:
-        47:17:55:a6:30:83:81:87:28:55:7f:c1:53:ba:f1:09:5a:78:
-        cb:05:1a:08:45:42:89:78:0e:2d:a3:ed:a3:d0:70:5c:bc:0f:
-        f5:ee:52:dd:04:37:25:d2:20:e9:d9:e7:08:ef:39:83:e3:71:
-        4f:87:1d:1b:20:57:e1:7e:18:c8:30:1d:16:c5:5a:8b:8b:b3:
-        f7:28:c8:7a:7f:e1:9a:60:25:49:bc:60:c0:95:3f:8d:8a:67:
-        af:2d:ca:d5:e0:70:f1:07:2c:77:ea:61:72:64:cb:b5:56:fc:
-        9d:42:d4:99:19:ae:75:4d:61:0b:49:42:fb:fa:25:44:de:fa:
-        d7:98:39:7c:32:3e:9c:57:a9:51:82:63:f5:93:dd:fd:da:a8:
-        04:96:67:8e:c6:2b:5f:59
------BEGIN CERTIFICATE-----
-MIID7DCCAdSgAwIBAgIBCjANBgkqhkiG9w0BAQUFADBaMQswCQYDVQQGEwJLUjET
-MBEGA1UECBMKS3l1bmdHaS1EbzERMA8GA1UEBxMIU3V3b24tU2kxFjAUBgNVBAoT
-DVNhbXN1bmcgRWxlYy4xCzAJBgNVBAMTAkNBMB4XDTA5MDMxMzAxMTkxOFoXDTEw
-MDMxMzAxMTkxOFowYzELMAkGA1UEBhMCS1IxEzARBgNVBAgTCkt5dW5nR2ktRG8x
-FjAUBgNVBAoTDVNhbXN1bmcgRWxlYy4xJzAlBgNVBAMTHkZpcnN0IGNlcnRpZmlj
-YXRlIHRvIHRlc3QgT0NTUDCBnzANBgkqhkiG9w0BAQEFAAOBjQAwgYkCgYEAwKlR
-YxnizPOdGdh1kKsTQKM/ndzvSEINADbb6mj9uRU0qa8PUitXLgN0E0G0WWl+9uFU
-Qo3D9IUr/weXpC9b5BO+cu9l51m+7RRxgswJA1CZZgg0GkFF5uM3mDJqFdQyY/cm
-bFrtRb27qr4zS5zLsgMT4y1vYVcq6OhED1nq578CAwEAAaM4MDYwNAYIKwYBBQUH
-AQEEKDAmMCQGCCsGAQUFBzABhhhodHRwOi8vMTI3LjAuMC4xOjgxLzAwMDIwDQYJ
-KoZIhvcNAQEFBQADggIBAMIayyjPUvpnFoXFy3u4THUgBmKrQ5+V9tiYqybsiTLW
-FBXLXVwXpE+1xw6cPvPwEerbnVsp6I0UHrtGHhBoAU86G0BKTKJHtLXmxJfO31al
-KWD14m7WKQG4IypYidNfagYotrZbD8euYtKbMgasgsTwof6Jr5kj5HyYdrDkZGsX
-JGf69EFlTsYdzIlSjEpSJopCW38ak9BTk1dlP28jFxxoE1gTUPefpTIuXyAjnrSi
-dfun2DrIbIYYuOAJCMnssqZrQ8LHr7bCpJfMNdUGOB1zf0vKVJ+2lC2CgWI3uHSK
-MxztUk+PW4j9tGGXLrkrmQta9ioDvOJv0RbM2r6XJgboUB/nAexf2NfKdIRwSFU8
-b8gx7Qw5en/tgXrt9DvhBgcd8TuBrn0cx2p02aDeP8700ZvqQ/fgRn6uokIrWD2j
-wxw3LbdrXTpkn5fhpBt+YwYcezv6c6NBqWW9P0I4qyfMB7TSD/gEJkcXVaYwg4GH
-KFV/wVO68QlaeMsFGghFQol4Di2j7aPQcFy8D/XuUt0ENyXSIOnZ5wjvOYPjcU+H
-HRsgV+F+GMgwHRbFWouLs/coyHp/4ZpgJUm8YMCVP42KZ68tytXgcPEHLHfqYXJk
-y7VW/J1C1JkZrnVNYQtJQvv6JUTe+teYOXwyPpxXqVGCY/WT3f3aqASWZ47GK19Z
------END CERTIFICATE-----
diff --git a/tests/cert-svc/data/TestData/ssl/demoCA/newcerts/0B.pem b/tests/cert-svc/data/TestData/ssl/demoCA/newcerts/0B.pem
deleted file mode 100644 (file)
index b7b6b8c..0000000
+++ /dev/null
@@ -1,81 +0,0 @@
-Certificate:
-    Data:
-        Version: 3 (0x2)
-        Serial Number: 11 (0xb)
-        Signature Algorithm: sha1WithRSAEncryption
-        Issuer: C=KR, ST=KyungGi-Do, L=Suwon-Si, O=Samsung Elec., CN=CA
-        Validity
-            Not Before: Mar 13 02:27:03 2009 GMT
-            Not After : Mar 13 02:27:03 2010 GMT
-        Subject: C=KR, ST=KyungGi-Do, O=Samsung Elec., CN=First certificate to test OCSP
-        Subject Public Key Info:
-            Public Key Algorithm: rsaEncryption
-            RSA Public Key: (1024 bit)
-                Modulus (1024 bit):
-                    00:c0:a9:51:63:19:e2:cc:f3:9d:19:d8:75:90:ab:
-                    13:40:a3:3f:9d:dc:ef:48:42:0d:00:36:db:ea:68:
-                    fd:b9:15:34:a9:af:0f:52:2b:57:2e:03:74:13:41:
-                    b4:59:69:7e:f6:e1:54:42:8d:c3:f4:85:2b:ff:07:
-                    97:a4:2f:5b:e4:13:be:72:ef:65:e7:59:be:ed:14:
-                    71:82:cc:09:03:50:99:66:08:34:1a:41:45:e6:e3:
-                    37:98:32:6a:15:d4:32:63:f7:26:6c:5a:ed:45:bd:
-                    bb:aa:be:33:4b:9c:cb:b2:03:13:e3:2d:6f:61:57:
-                    2a:e8:e8:44:0f:59:ea:e7:bf
-                Exponent: 65537 (0x10001)
-        X509v3 extensions:
-            Authority Information Access: 
-                OCSP - URI:http://127.0.0.1:82/0003
-
-    Signature Algorithm: sha1WithRSAEncryption
-        ae:34:5f:7e:66:8f:b1:5c:eb:da:31:33:60:29:43:c6:be:d7:
-        1b:4e:22:97:41:9e:7a:0f:7f:e0:3b:d0:6e:6a:50:ba:a1:1f:
-        f0:78:e6:b0:a6:a2:08:c1:6f:5b:db:9f:42:a0:ba:8e:6b:99:
-        c3:91:a1:81:16:79:65:6c:bc:ca:76:b7:06:d9:89:ba:ad:12:
-        32:32:b7:c3:c3:18:e2:7d:d5:88:4c:19:ab:33:03:70:c1:b3:
-        14:1e:f4:b3:93:c9:73:94:f5:38:0a:52:da:b9:ef:76:32:fd:
-        6d:d3:a2:ff:13:52:da:e1:d5:d6:8e:db:35:5b:df:dd:60:aa:
-        99:2d:4e:bb:d4:08:43:8e:86:3c:28:51:bc:5e:d0:bd:08:7a:
-        62:c7:ae:73:f3:92:60:b6:59:19:f3:ca:8a:fe:70:1a:67:c7:
-        7e:95:79:f1:79:2c:56:2c:17:28:03:86:49:86:54:e0:3b:f2:
-        c1:ef:0f:12:cb:f9:4c:0d:fe:b9:7a:23:13:bc:67:ce:6b:d9:
-        9a:68:68:71:00:ab:aa:f7:43:1a:1c:be:35:dd:69:cc:88:50:
-        41:db:5a:41:e5:a5:9a:bc:2d:2b:fd:0d:52:e8:c5:ac:13:9e:
-        d4:99:12:2d:6d:01:10:e6:44:87:07:b2:b9:b6:54:84:69:c9:
-        76:1b:c6:a5:cc:58:7b:82:14:78:9b:f1:79:19:25:44:86:56:
-        e1:ce:0c:bf:7a:4e:23:d7:12:f4:b6:60:d6:1d:44:db:d6:97:
-        89:a9:54:36:75:91:d6:ef:88:01:94:cd:52:d4:6d:b3:7e:6d:
-        61:75:fc:e0:c8:ad:ee:0a:b2:f9:e2:33:42:08:c3:f9:d1:46:
-        6f:50:47:2d:51:e3:25:c3:cc:c5:1f:a9:04:8b:90:29:8f:1f:
-        94:c9:de:c2:16:1a:60:e7:a0:03:65:17:3e:45:c5:5a:66:f2:
-        ff:9d:1d:1f:4d:ed:f3:92:76:70:a2:7d:43:ef:6d:e8:23:b8:
-        9d:ad:dd:24:0b:59:22:1a:5a:0b:25:2e:55:a1:57:5b:c9:40:
-        cc:60:3e:a9:73:29:94:8e:83:dc:4e:25:54:6a:79:dc:f2:71:
-        28:4d:c9:ec:b4:96:ad:36:8c:cb:e0:cb:54:0e:1f:e9:86:0b:
-        c0:32:c2:66:3b:35:e5:45:54:a0:1d:2c:3e:c2:fb:a0:b0:b2:
-        d1:7a:cc:fc:1f:37:81:8a:89:af:fd:60:e8:50:95:33:4a:12:
-        98:7f:f6:51:c4:de:06:d9:8c:d0:11:b7:fb:a8:07:b4:8a:70:
-        a2:3b:dc:5f:1b:d3:46:f9:e4:c7:46:b3:e9:38:bd:20:6f:7c:
-        6b:d6:07:4d:90:c7:67:0a
------BEGIN CERTIFICATE-----
-MIID7DCCAdSgAwIBAgIBCzANBgkqhkiG9w0BAQUFADBaMQswCQYDVQQGEwJLUjET
-MBEGA1UECBMKS3l1bmdHaS1EbzERMA8GA1UEBxMIU3V3b24tU2kxFjAUBgNVBAoT
-DVNhbXN1bmcgRWxlYy4xCzAJBgNVBAMTAkNBMB4XDTA5MDMxMzAyMjcwM1oXDTEw
-MDMxMzAyMjcwM1owYzELMAkGA1UEBhMCS1IxEzARBgNVBAgTCkt5dW5nR2ktRG8x
-FjAUBgNVBAoTDVNhbXN1bmcgRWxlYy4xJzAlBgNVBAMTHkZpcnN0IGNlcnRpZmlj
-YXRlIHRvIHRlc3QgT0NTUDCBnzANBgkqhkiG9w0BAQEFAAOBjQAwgYkCgYEAwKlR
-YxnizPOdGdh1kKsTQKM/ndzvSEINADbb6mj9uRU0qa8PUitXLgN0E0G0WWl+9uFU
-Qo3D9IUr/weXpC9b5BO+cu9l51m+7RRxgswJA1CZZgg0GkFF5uM3mDJqFdQyY/cm
-bFrtRb27qr4zS5zLsgMT4y1vYVcq6OhED1nq578CAwEAAaM4MDYwNAYIKwYBBQUH
-AQEEKDAmMCQGCCsGAQUFBzABhhhodHRwOi8vMTI3LjAuMC4xOjgyLzAwMDMwDQYJ
-KoZIhvcNAQEFBQADggIBAK40X35mj7Fc69oxM2ApQ8a+1xtOIpdBnnoPf+A70G5q
-ULqhH/B45rCmogjBb1vbn0Kguo5rmcORoYEWeWVsvMp2twbZibqtEjIyt8PDGOJ9
-1YhMGaszA3DBsxQe9LOTyXOU9TgKUtq573Yy/W3Tov8TUtrh1daO2zVb391gqpkt
-TrvUCEOOhjwoUbxe0L0IemLHrnPzkmC2WRnzyor+cBpnx36VefF5LFYsFygDhkmG
-VOA78sHvDxLL+UwN/rl6IxO8Z85r2ZpoaHEAq6r3QxocvjXdacyIUEHbWkHlpZq8
-LSv9DVLoxawTntSZEi1tARDmRIcHsrm2VIRpyXYbxqXMWHuCFHib8XkZJUSGVuHO
-DL96TiPXEvS2YNYdRNvWl4mpVDZ1kdbviAGUzVLUbbN+bWF1/ODIre4KsvniM0II
-w/nRRm9QRy1R4yXDzMUfqQSLkCmPH5TJ3sIWGmDnoANlFz5FxVpm8v+dHR9N7fOS
-dnCifUPvbegjuJ2t3SQLWSIaWgslLlWhV1vJQMxgPqlzKZSOg9xOJVRqedzycShN
-yey0lq02jMvgy1QOH+mGC8AywmY7NeVFVKAdLD7C+6CwstF6zPwfN4GKia/9YOhQ
-lTNKEph/9lHE3gbZjNARt/uoB7SKcKI73F8b00b55MdGs+k4vSBvfGvWB02Qx2cK
------END CERTIFICATE-----
diff --git a/tests/cert-svc/data/TestData/ssl/demoCA/newcerts/0C.pem b/tests/cert-svc/data/TestData/ssl/demoCA/newcerts/0C.pem
deleted file mode 100644 (file)
index 6cb947a..0000000
+++ /dev/null
@@ -1,79 +0,0 @@
-Certificate:
-    Data:
-        Version: 3 (0x2)
-        Serial Number: 12 (0xc)
-        Signature Algorithm: sha1WithRSAEncryption
-        Issuer: C=KR, ST=KyungGi-Do, L=Suwon-Si, O=Samsung Elec., CN=CA
-        Validity
-            Not Before: Mar 13 02:37:59 2009 GMT
-            Not After : Mar 13 02:37:59 2010 GMT
-        Subject: C=KR, ST=KyungGi-Do, O=Samsung Elec., CN=OCSP Responder
-        Subject Public Key Info:
-            Public Key Algorithm: rsaEncryption
-            RSA Public Key: (1024 bit)
-                Modulus (1024 bit):
-                    00:b9:0e:80:20:fc:74:49:08:cb:83:87:76:e4:42:
-                    03:42:6e:56:1b:ae:73:43:9b:a6:cf:5d:33:1d:37:
-                    cf:b5:22:bc:79:5e:6a:69:02:3e:e2:08:c5:f5:be:
-                    ee:ef:df:4f:85:41:a2:5f:d3:76:39:3f:61:56:14:
-                    1f:c1:cc:ec:45:e3:b2:e2:b0:e8:20:9f:a9:e7:8a:
-                    b8:ed:3f:e4:6f:86:d8:e5:d5:3b:fe:47:e8:8f:51:
-                    ee:dd:b6:7f:36:6b:c7:75:f7:78:04:df:ac:51:b3:
-                    25:65:04:ab:0d:ce:db:5e:3a:db:6a:8f:da:69:46:
-                    c7:92:f2:b3:ba:6c:90:3d:71
-                Exponent: 65537 (0x10001)
-        X509v3 extensions:
-            X509v3 Extended Key Usage: 
-                OCSP Signing
-    Signature Algorithm: sha1WithRSAEncryption
-        83:b5:a0:1e:ef:2c:c8:07:9b:9b:e3:cc:d4:af:39:f0:cb:88:
-        bd:8e:8b:e2:66:95:43:4a:a7:4d:19:9b:44:1b:99:4a:57:2d:
-        1e:38:d6:06:9b:49:99:17:57:37:74:bd:fd:3f:63:2e:8f:5e:
-        87:00:66:bc:29:04:0f:34:a5:85:5b:e4:85:17:6f:3e:a4:3e:
-        e6:97:dd:90:64:1b:00:6a:37:e0:29:7a:3d:76:d7:9b:ff:e5:
-        08:8f:d1:8d:77:f8:de:44:f7:00:b8:d3:d8:e8:07:7a:28:2a:
-        26:ca:63:b1:47:69:3b:c4:8c:ce:af:1e:15:53:ec:31:92:ba:
-        02:f4:e5:51:d9:dd:c7:37:44:9f:d3:28:fd:fb:05:ab:db:06:
-        51:2b:84:bb:7a:b7:99:1c:f6:8f:d1:37:ac:aa:38:16:f1:08:
-        e1:ee:a1:43:b3:d9:fb:ea:83:9a:cc:e7:75:3e:98:79:86:2c:
-        60:32:08:43:a7:01:f9:75:cc:2e:77:8a:de:85:04:5a:4c:90:
-        5b:64:29:33:38:14:bd:7e:e4:1e:0b:7c:47:14:23:57:94:e5:
-        ca:53:dd:c4:30:83:77:b7:42:e6:5f:1a:02:d4:6c:08:8a:55:
-        78:1d:3f:50:0b:0e:bf:03:af:4c:f7:a6:7a:da:33:f3:a6:62:
-        5e:25:89:e9:a8:f4:7c:06:16:6e:28:c5:f9:82:4b:b3:39:b0:
-        bb:72:d0:15:5e:dd:ba:d5:bd:b1:7d:50:22:1d:92:10:65:bf:
-        99:45:01:0b:d0:a5:e0:5f:37:c3:d3:92:58:28:9b:97:c5:96:
-        a5:2e:27:fc:86:04:11:9a:1c:84:0a:f2:37:51:27:1d:df:e8:
-        1a:c4:94:d1:53:39:7f:27:eb:16:ca:27:77:d1:f8:46:fe:d7:
-        e8:ab:06:94:87:66:dc:03:c4:cb:a9:9d:21:0c:f4:93:d0:d3:
-        d5:45:a5:56:28:37:d6:81:be:9c:18:98:b3:b1:f2:b9:1a:ad:
-        98:e8:92:39:a2:eb:c5:f4:d0:2f:82:09:ce:7e:dd:0e:94:cc:
-        80:8e:e5:af:04:06:67:04:c1:23:ee:4a:06:c0:5c:ac:75:b1:
-        ed:e2:d0:8f:8d:8b:23:3a:94:3b:41:78:48:7c:c8:f7:dc:53:
-        1d:0b:fa:14:70:0c:ed:d3:8b:84:4c:81:d5:f0:d7:b2:3a:27:
-        e6:82:ad:12:18:4d:19:b3:65:e6:de:fa:14:11:10:c8:66:cc:
-        f7:b2:08:af:90:02:62:51:d1:31:aa:7e:f9:1c:b4:99:83:b8:
-        e3:26:18:78:f3:7f:3a:c7:b5:59:eb:cb:32:8b:39:a4:86:14:
-        0a:55:3e:1d:24:56:2f:97
------BEGIN CERTIFICATE-----
-MIIDuzCCAaOgAwIBAgIBDDANBgkqhkiG9w0BAQUFADBaMQswCQYDVQQGEwJLUjET
-MBEGA1UECBMKS3l1bmdHaS1EbzERMA8GA1UEBxMIU3V3b24tU2kxFjAUBgNVBAoT
-DVNhbXN1bmcgRWxlYy4xCzAJBgNVBAMTAkNBMB4XDTA5MDMxMzAyMzc1OVoXDTEw
-MDMxMzAyMzc1OVowUzELMAkGA1UEBhMCS1IxEzARBgNVBAgTCkt5dW5nR2ktRG8x
-FjAUBgNVBAoTDVNhbXN1bmcgRWxlYy4xFzAVBgNVBAMTDk9DU1AgUmVzcG9uZGVy
-MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQC5DoAg/HRJCMuDh3bkQgNCblYb
-rnNDm6bPXTMdN8+1Irx5XmppAj7iCMX1vu7v30+FQaJf03Y5P2FWFB/BzOxF47Li
-sOggn6nnirjtP+Rvhtjl1Tv+R+iPUe7dtn82a8d193gE36xRsyVlBKsNztteOttq
-j9ppRseS8rO6bJA9cQIDAQABoxcwFTATBgNVHSUEDDAKBggrBgEFBQcDCTANBgkq
-hkiG9w0BAQUFAAOCAgEAg7WgHu8syAebm+PM1K858MuIvY6L4maVQ0qnTRmbRBuZ
-SlctHjjWBptJmRdXN3S9/T9jLo9ehwBmvCkEDzSlhVvkhRdvPqQ+5pfdkGQbAGo3
-4Cl6PXbXm//lCI/RjXf43kT3ALjT2OgHeigqJspjsUdpO8SMzq8eFVPsMZK6AvTl
-UdndxzdEn9Mo/fsFq9sGUSuEu3q3mRz2j9E3rKo4FvEI4e6hQ7PZ++qDmszndT6Y
-eYYsYDIIQ6cB+XXMLneK3oUEWkyQW2QpMzgUvX7kHgt8RxQjV5TlylPdxDCDd7dC
-5l8aAtRsCIpVeB0/UAsOvwOvTPemetoz86ZiXiWJ6aj0fAYWbijF+YJLszmwu3LQ
-FV7dutW9sX1QIh2SEGW/mUUBC9Cl4F83w9OSWCibl8WWpS4n/IYEEZochAryN1En
-Hd/oGsSU0VM5fyfrFsond9H4Rv7X6KsGlIdm3APEy6mdIQz0k9DT1UWlVig31oG+
-nBiYs7HyuRqtmOiSOaLrxfTQL4IJzn7dDpTMgI7lrwQGZwTBI+5KBsBcrHWx7eLQ
-j42LIzqUO0F4SHzI99xTHQv6FHAM7dOLhEyB1fDXsjon5oKtEhhNGbNl5t76FBEQ
-yGbM97IIr5ACYlHRMap++Ry0mYO44yYYePN/Ose1WevLMos5pIYUClU+HSRWL5c=
------END CERTIFICATE-----
diff --git a/tests/cert-svc/data/TestData/ssl/demoCA/newcerts/0D.pem b/tests/cert-svc/data/TestData/ssl/demoCA/newcerts/0D.pem
deleted file mode 100644 (file)
index 912b986..0000000
+++ /dev/null
@@ -1,81 +0,0 @@
-Certificate:
-    Data:
-        Version: 3 (0x2)
-        Serial Number: 13 (0xd)
-        Signature Algorithm: sha1WithRSAEncryption
-        Issuer: C=KR, ST=KyungGi-Do, L=Suwon-Si, O=Samsung Elec., CN=CA
-        Validity
-            Not Before: Mar 13 02:39:35 2009 GMT
-            Not After : Mar 13 02:39:35 2010 GMT
-        Subject: C=KR, ST=KyungGi-Do, O=Samsung Elec., CN=First certificate to test OCSP
-        Subject Public Key Info:
-            Public Key Algorithm: rsaEncryption
-            RSA Public Key: (1024 bit)
-                Modulus (1024 bit):
-                    00:c0:a9:51:63:19:e2:cc:f3:9d:19:d8:75:90:ab:
-                    13:40:a3:3f:9d:dc:ef:48:42:0d:00:36:db:ea:68:
-                    fd:b9:15:34:a9:af:0f:52:2b:57:2e:03:74:13:41:
-                    b4:59:69:7e:f6:e1:54:42:8d:c3:f4:85:2b:ff:07:
-                    97:a4:2f:5b:e4:13:be:72:ef:65:e7:59:be:ed:14:
-                    71:82:cc:09:03:50:99:66:08:34:1a:41:45:e6:e3:
-                    37:98:32:6a:15:d4:32:63:f7:26:6c:5a:ed:45:bd:
-                    bb:aa:be:33:4b:9c:cb:b2:03:13:e3:2d:6f:61:57:
-                    2a:e8:e8:44:0f:59:ea:e7:bf
-                Exponent: 65537 (0x10001)
-        X509v3 extensions:
-            Authority Information Access: 
-                OCSP - URI:http://127.0.0.1:83/0004
-
-    Signature Algorithm: sha1WithRSAEncryption
-        24:50:3d:65:cc:60:62:13:c0:3b:e1:01:0d:17:35:e8:7a:a8:
-        05:1e:b3:70:dc:fe:d3:84:7e:71:14:c3:86:73:23:76:d9:bb:
-        de:41:b4:02:3b:d7:db:03:6d:1f:44:1e:65:a6:b5:79:80:7f:
-        2a:8b:11:f4:71:b1:de:13:17:1c:d3:b2:51:f7:b5:ee:29:27:
-        ff:06:96:4f:18:f6:7a:0f:bd:ed:39:d2:ab:ff:1c:b4:21:87:
-        f3:fd:ed:2b:fe:19:29:bb:4b:41:d1:48:37:f7:34:fe:f1:92:
-        80:85:33:d6:df:bf:d4:40:f4:5f:42:de:22:88:86:11:78:c8:
-        ac:9c:f2:87:95:b0:c6:d6:54:40:e3:c1:64:30:5c:46:f6:a1:
-        16:64:80:50:20:f8:9c:fe:da:8e:b5:ea:c3:83:18:c8:f3:13:
-        95:01:cc:fe:85:bc:be:56:bc:f2:fe:70:c1:fa:86:43:9a:e0:
-        7e:cd:8d:f1:d8:d2:35:51:df:9c:46:36:3b:c0:97:75:ac:9c:
-        a7:90:ee:92:b9:9f:5d:cc:54:95:5f:69:38:23:cc:cf:c6:0a:
-        c8:55:b7:80:b8:93:98:fc:a9:4c:71:e0:dd:f9:27:d1:db:9c:
-        0d:54:9a:d0:05:40:97:cc:45:d5:60:a8:c9:bb:4e:c0:c5:b4:
-        01:f5:82:d5:5a:8c:28:01:b9:b3:be:bc:25:32:f1:e6:70:e7:
-        e4:42:45:4a:d8:06:cb:42:ed:3a:ec:97:42:97:b1:5c:cd:a0:
-        99:94:24:a5:94:c6:b3:5e:c9:06:6b:c5:b8:af:26:48:52:bd:
-        bb:93:36:1d:01:6c:33:34:3b:a4:ba:76:0b:bc:44:20:8a:d2:
-        ee:1d:70:81:94:01:35:69:a5:5b:30:f1:1e:50:9a:a3:20:b0:
-        ae:70:f0:28:bc:48:e3:62:f2:1d:84:53:a4:e0:4f:56:6e:5f:
-        ba:d1:f0:38:46:5d:c8:06:ab:94:f5:f1:d6:80:55:8f:73:cb:
-        64:17:70:6f:38:26:06:9f:9e:68:d4:3c:43:c0:10:fe:a9:99:
-        67:8d:d4:0d:c9:d7:04:41:0e:e8:fe:09:41:29:f3:b3:ba:e0:
-        3b:b1:09:67:68:82:93:24:23:a2:da:bb:d1:01:2b:28:5f:56:
-        27:2b:a4:8f:fd:f3:46:e9:62:67:3b:d6:26:80:f5:06:b8:0f:
-        08:dc:22:49:f3:f2:26:ef:b5:db:89:9a:b5:15:3b:45:b2:89:
-        35:8b:6d:49:dd:79:d0:49:6c:c4:78:1c:46:f7:4f:34:6f:37:
-        17:da:6f:7f:c2:54:5f:70:29:1b:36:c3:44:16:0d:1b:d9:f4:
-        ab:bb:2d:87:65:99:6a:d1
------BEGIN CERTIFICATE-----
-MIID7DCCAdSgAwIBAgIBDTANBgkqhkiG9w0BAQUFADBaMQswCQYDVQQGEwJLUjET
-MBEGA1UECBMKS3l1bmdHaS1EbzERMA8GA1UEBxMIU3V3b24tU2kxFjAUBgNVBAoT
-DVNhbXN1bmcgRWxlYy4xCzAJBgNVBAMTAkNBMB4XDTA5MDMxMzAyMzkzNVoXDTEw
-MDMxMzAyMzkzNVowYzELMAkGA1UEBhMCS1IxEzARBgNVBAgTCkt5dW5nR2ktRG8x
-FjAUBgNVBAoTDVNhbXN1bmcgRWxlYy4xJzAlBgNVBAMTHkZpcnN0IGNlcnRpZmlj
-YXRlIHRvIHRlc3QgT0NTUDCBnzANBgkqhkiG9w0BAQEFAAOBjQAwgYkCgYEAwKlR
-YxnizPOdGdh1kKsTQKM/ndzvSEINADbb6mj9uRU0qa8PUitXLgN0E0G0WWl+9uFU
-Qo3D9IUr/weXpC9b5BO+cu9l51m+7RRxgswJA1CZZgg0GkFF5uM3mDJqFdQyY/cm
-bFrtRb27qr4zS5zLsgMT4y1vYVcq6OhED1nq578CAwEAAaM4MDYwNAYIKwYBBQUH
-AQEEKDAmMCQGCCsGAQUFBzABhhhodHRwOi8vMTI3LjAuMC4xOjgzLzAwMDQwDQYJ
-KoZIhvcNAQEFBQADggIBACRQPWXMYGITwDvhAQ0XNeh6qAUes3Dc/tOEfnEUw4Zz
-I3bZu95BtAI719sDbR9EHmWmtXmAfyqLEfRxsd4TFxzTslH3te4pJ/8Glk8Y9noP
-ve050qv/HLQhh/P97Sv+GSm7S0HRSDf3NP7xkoCFM9bfv9RA9F9C3iKIhhF4yKyc
-8oeVsMbWVEDjwWQwXEb2oRZkgFAg+Jz+2o616sODGMjzE5UBzP6FvL5WvPL+cMH6
-hkOa4H7NjfHY0jVR35xGNjvAl3WsnKeQ7pK5n13MVJVfaTgjzM/GCshVt4C4k5j8
-qUxx4N35J9HbnA1UmtAFQJfMRdVgqMm7TsDFtAH1gtVajCgBubO+vCUy8eZw5+RC
-RUrYBstC7Trsl0KXsVzNoJmUJKWUxrNeyQZrxbivJkhSvbuTNh0BbDM0O6S6dgu8
-RCCK0u4dcIGUATVppVsw8R5QmqMgsK5w8Ci8SONi8h2EU6TgT1ZuX7rR8DhGXcgG
-q5T18daAVY9zy2QXcG84JgafnmjUPEPAEP6pmWeN1A3J1wRBDuj+CUEp87O64Dux
-CWdogpMkI6Lau9EBKyhfVicrpI/980bpYmc71iaA9Qa4DwjcIknz8ibvtduJmrUV
-O0WyiTWLbUndedBJbMR4HEb3TzRvNxfab3/CVF9wKRs2w0QWDRvZ9Ku7LYdlmWrR
------END CERTIFICATE-----
diff --git a/tests/cert-svc/data/TestData/ssl/demoCA/newcerts/0E.pem b/tests/cert-svc/data/TestData/ssl/demoCA/newcerts/0E.pem
deleted file mode 100644 (file)
index 0846e40..0000000
+++ /dev/null
@@ -1,80 +0,0 @@
-Certificate:
-    Data:
-        Version: 3 (0x2)
-        Serial Number: 14 (0xe)
-        Signature Algorithm: sha1WithRSAEncryption
-        Issuer: C=KR, ST=KyungGi-Do, L=Suwon-Si, O=Samsung Elec., CN=CA
-        Validity
-            Not Before: Mar 13 03:16:42 2009 GMT
-            Not After : Mar 11 03:16:42 2019 GMT
-        Subject: C=KR, ST=KyungGi-Do, O=Samsung Elec., CN=Second Responder Certificate
-        Subject Public Key Info:
-            Public Key Algorithm: rsaEncryption
-            RSA Public Key: (1024 bit)
-                Modulus (1024 bit):
-                    00:aa:01:31:49:34:0e:6c:b5:25:a0:da:35:71:cf:
-                    9d:a7:c4:ad:27:31:ee:c2:46:fe:03:8f:4f:ed:f7:
-                    75:d5:b9:01:c6:a9:8f:8d:17:ca:8c:82:82:63:ed:
-                    08:d4:05:9e:31:3c:c9:66:59:41:72:63:8e:01:3e:
-                    a2:39:d1:9c:51:9c:c5:9a:ad:72:0d:e6:2b:19:ba:
-                    45:a6:18:f6:e2:79:72:4b:5e:79:74:38:b5:86:9c:
-                    57:bb:2c:e8:f5:57:9b:32:34:86:2a:2f:40:2f:5d:
-                    dd:9c:f5:63:d4:2e:ad:b1:d3:25:22:7c:86:89:84:
-                    c9:26:70:3c:c8:11:64:ed:47
-                Exponent: 65537 (0x10001)
-        X509v3 extensions:
-            X509v3 Extended Key Usage: 
-                OCSP Signing
-    Signature Algorithm: sha1WithRSAEncryption
-        b8:56:6b:f9:21:8a:79:e8:53:38:c7:84:e0:c3:96:6c:f3:71:
-        95:dc:31:9a:ef:fc:fb:b5:18:c6:35:26:3d:ee:4d:00:9c:e4:
-        10:25:a9:2e:a0:41:8a:37:a9:91:02:9c:52:ec:0d:7a:bf:e9:
-        bb:54:6d:4a:92:5c:9d:c8:01:17:a3:8f:25:fd:32:a7:11:e4:
-        77:fd:ce:7c:4b:c9:ae:32:e6:d5:25:cc:a4:97:bb:07:f3:1d:
-        f0:11:8a:d8:f1:37:e6:4f:3c:99:30:44:20:04:3d:82:fc:87:
-        60:24:21:a9:46:e7:d8:41:2c:76:d8:a5:58:44:ca:85:71:31:
-        24:f2:45:7d:fb:70:db:1b:93:42:21:85:69:5d:19:13:85:7c:
-        85:6c:83:8f:bf:c1:a7:3d:49:b9:68:4e:a2:12:2e:9d:89:c3:
-        a7:1b:86:71:e4:cc:29:79:0e:b1:19:07:ca:2d:b8:95:87:f4:
-        8d:4a:be:06:0d:d0:e1:1a:ed:ea:a2:52:f3:f2:7b:1f:3c:10:
-        c6:67:be:00:3a:36:ca:ad:93:d4:ee:b3:9d:e8:47:6e:bb:6f:
-        12:6b:cf:3d:73:22:a3:15:e0:e1:51:88:86:e6:2a:23:ee:e1:
-        32:55:0c:b8:73:35:f7:42:9e:4c:c4:ea:f5:3c:d5:20:ef:32:
-        27:c2:b5:9b:ad:f0:a8:bf:72:5c:5b:fc:41:e4:a0:6d:b2:4d:
-        c0:69:a5:b2:dc:70:d6:90:ae:2e:81:41:f4:ec:33:c5:43:4e:
-        70:eb:1c:17:4c:d9:ed:8f:97:2e:20:17:9d:40:bc:d1:ae:74:
-        21:8b:ab:cc:b0:86:5a:cd:42:9c:df:13:16:59:56:27:be:26:
-        bb:92:5f:7a:86:9e:f5:19:45:1f:36:8a:e3:55:5d:89:3b:2f:
-        ed:13:9c:e7:ae:bd:eb:34:31:a2:02:70:0c:a7:32:d3:d1:be:
-        c0:2f:0e:10:b7:43:2d:ab:68:70:b4:a1:e1:25:c1:ae:1c:43:
-        32:c0:90:81:c1:39:0b:27:e7:14:c9:28:db:40:0f:1f:9c:ce:
-        1b:8b:26:ca:b8:41:01:e7:cb:92:b0:8a:14:00:f3:e0:3c:84:
-        d3:2c:45:19:15:01:02:ab:bd:e8:19:6b:d7:7e:c6:5a:a9:3a:
-        d5:00:23:15:2a:e9:93:7d:11:75:cc:c6:c3:8e:5f:3f:d3:3f:
-        05:9f:40:12:a9:a8:bc:50:dc:42:02:62:7d:00:6a:ef:08:e1:
-        69:87:4d:2a:9b:54:49:35:80:58:12:92:a1:33:65:20:5f:29:
-        cf:ab:03:8e:0b:91:08:9e:52:d6:b2:d7:ec:bb:38:9b:d5:5d:
-        f6:b2:89:f5:00:bb:0f:f2
------BEGIN CERTIFICATE-----
-MIIDyTCCAbGgAwIBAgIBDjANBgkqhkiG9w0BAQUFADBaMQswCQYDVQQGEwJLUjET
-MBEGA1UECBMKS3l1bmdHaS1EbzERMA8GA1UEBxMIU3V3b24tU2kxFjAUBgNVBAoT
-DVNhbXN1bmcgRWxlYy4xCzAJBgNVBAMTAkNBMB4XDTA5MDMxMzAzMTY0MloXDTE5
-MDMxMTAzMTY0MlowYTELMAkGA1UEBhMCS1IxEzARBgNVBAgTCkt5dW5nR2ktRG8x
-FjAUBgNVBAoTDVNhbXN1bmcgRWxlYy4xJTAjBgNVBAMTHFNlY29uZCBSZXNwb25k
-ZXIgQ2VydGlmaWNhdGUwgZ8wDQYJKoZIhvcNAQEBBQADgY0AMIGJAoGBAKoBMUk0
-Dmy1JaDaNXHPnafErScx7sJG/gOPT+33ddW5Acapj40XyoyCgmPtCNQFnjE8yWZZ
-QXJjjgE+ojnRnFGcxZqtcg3mKxm6RaYY9uJ5ckteeXQ4tYacV7ss6PVXmzI0hiov
-QC9d3Zz1Y9QurbHTJSJ8homEySZwPMgRZO1HAgMBAAGjFzAVMBMGA1UdJQQMMAoG
-CCsGAQUFBwMJMA0GCSqGSIb3DQEBBQUAA4ICAQC4Vmv5IYp56FM4x4Tgw5Zs83GV
-3DGa7/z7tRjGNSY97k0AnOQQJakuoEGKN6mRApxS7A16v+m7VG1KklydyAEXo48l
-/TKnEeR3/c58S8muMubVJcykl7sH8x3wEYrY8TfmTzyZMEQgBD2C/IdgJCGpRufY
-QSx22KVYRMqFcTEk8kV9+3DbG5NCIYVpXRkThXyFbIOPv8GnPUm5aE6iEi6dicOn
-G4Zx5MwpeQ6xGQfKLbiVh/SNSr4GDdDhGu3qolLz8nsfPBDGZ74AOjbKrZPU7rOd
-6Eduu28Sa889cyKjFeDhUYiG5ioj7uEyVQy4czX3Qp5MxOr1PNUg7zInwrWbrfCo
-v3JcW/xB5KBtsk3AaaWy3HDWkK4ugUH07DPFQ05w6xwXTNntj5cuIBedQLzRrnQh
-i6vMsIZazUKc3xMWWVYnvia7kl96hp71GUUfNorjVV2JOy/tE5znrr3rNDGiAnAM
-pzLT0b7ALw4Qt0Mtq2hwtKHhJcGuHEMywJCBwTkLJ+cUySjbQA8fnM4biybKuEEB
-58uSsIoUAPPgPITTLEUZFQECq73oGWvXfsZaqTrVACMVKumTfRF1zMbDjl8/0z8F
-n0ASqai8UNxCAmJ9AGrvCOFph00qm1RJNYBYEpKhM2UgXynPqwOOC5EInlLWstfs
-uzib1V32son1ALsP8g==
------END CERTIFICATE-----
diff --git a/tests/cert-svc/data/TestData/ssl/demoCA/newcerts/0F.pem b/tests/cert-svc/data/TestData/ssl/demoCA/newcerts/0F.pem
deleted file mode 100644 (file)
index c7bd523..0000000
+++ /dev/null
@@ -1,92 +0,0 @@
-Certificate:
-    Data:
-        Version: 3 (0x2)
-        Serial Number: 15 (0xf)
-        Signature Algorithm: sha1WithRSAEncryption
-        Issuer: C=KR, ST=KyungGi-Do, L=Suwon-Si, O=Samsung Elec., CN=CA
-        Validity
-            Not Before: Mar 13 03:18:18 2009 GMT
-            Not After : Mar 11 03:18:18 2019 GMT
-        Subject: C=KR, ST=KyungGi-Do, O=Samsung Elec., CN=First Test Certificate
-        Subject Public Key Info:
-            Public Key Algorithm: rsaEncryption
-            RSA Public Key: (1024 bit)
-                Modulus (1024 bit):
-                    00:cf:0f:cf:a5:08:18:bf:8b:6c:2c:3c:55:fe:02:
-                    43:b7:a8:af:45:a3:4a:28:63:d1:da:26:7a:c2:0d:
-                    f8:58:a5:73:c5:db:b8:fb:62:47:ea:17:7b:25:6b:
-                    d1:8c:e2:74:96:f4:6b:e5:49:3b:b3:e5:6a:63:36:
-                    19:f8:3c:d8:4b:9c:14:9d:2b:6a:71:cc:3a:9f:b9:
-                    d5:db:60:8e:44:40:d7:12:53:52:e5:71:41:c8:bf:
-                    ec:0d:9c:5b:7c:8e:ac:99:47:65:50:e5:f8:95:3e:
-                    8a:3c:99:d9:75:47:73:51:f4:fd:36:46:ed:1a:77:
-                    10:ce:1d:01:0c:86:6b:23:ff
-                Exponent: 65537 (0x10001)
-        X509v3 extensions:
-            X509v3 Basic Constraints: 
-                CA:FALSE
-            Netscape Comment: 
-                OpenSSL Generated Certificate
-            X509v3 Subject Key Identifier: 
-                25:0C:EC:1F:D6:1A:A2:95:AF:C1:A3:DA:EF:B1:F3:BE:62:F3:10:6C
-            X509v3 Authority Key Identifier: 
-                DirName:/C=KR/ST=KyungGi-Do/L=Suwon-Si/O=Samsung Elec./CN=CA
-                serial:F2:5B:40:5B:C2:B7:D0:64
-
-    Signature Algorithm: sha1WithRSAEncryption
-        18:fe:74:f1:af:0a:d9:91:ad:b5:7c:f3:01:f8:98:1a:dc:b3:
-        66:6b:f4:bc:16:9a:e6:2b:f2:1f:77:23:89:a8:68:e0:8d:e3:
-        50:f3:f1:e6:38:f1:59:54:9b:44:0f:72:00:1a:61:71:9c:f0:
-        4f:a3:08:9d:17:36:0c:54:82:be:24:04:cb:b5:04:e9:20:c9:
-        6e:bc:8f:af:18:d8:2d:ee:cc:a8:8b:e4:1a:35:98:f6:53:72:
-        89:4f:05:f8:c3:7b:50:13:ee:cf:9f:d3:eb:a7:7c:4a:e6:89:
-        0f:6b:0e:d6:c7:bc:db:04:03:08:25:59:b4:06:5b:ce:a6:db:
-        7b:3a:5d:80:e8:ff:66:e1:22:03:54:28:16:0e:89:c8:5b:aa:
-        b2:6e:1a:0f:07:53:60:bc:f4:2a:2d:a7:89:f2:b4:58:55:47:
-        2e:b1:b2:3c:50:30:6b:0c:12:34:11:5f:54:2a:0a:ab:19:d9:
-        36:ae:e2:16:5e:b8:8e:0d:17:d0:42:82:96:4d:fb:36:56:69:
-        7b:ce:32:fb:91:a4:02:73:8c:75:7e:de:87:06:52:20:ed:26:
-        ff:47:72:f2:f6:01:2e:ec:38:da:0b:5b:be:ec:8e:c6:02:28:
-        92:57:28:04:f5:00:87:90:34:e1:81:c5:cc:21:00:6b:4d:d5:
-        d5:c3:f6:f1:97:e1:5e:8c:ea:56:2e:5e:ce:9e:de:b9:a6:86:
-        60:33:1d:94:76:39:e1:70:9a:d2:b3:9a:f4:47:f8:bd:83:26:
-        38:a0:ab:a3:bc:81:df:6b:79:7d:f5:67:8f:5a:e1:a4:67:29:
-        58:07:66:70:6a:43:dc:f7:4c:82:54:15:a0:2f:ab:c0:9f:24:
-        91:e0:a7:d1:b1:58:bf:43:bf:25:1f:32:fc:98:26:b1:2f:19:
-        8f:d8:69:c1:1a:bd:b0:3e:0a:dc:54:c1:27:34:b9:1b:55:93:
-        ff:e6:23:ac:af:33:ed:8d:6e:ee:36:18:70:9e:a2:87:b6:e2:
-        1d:3a:ee:e8:e2:79:97:15:7c:83:d1:89:71:ab:87:8d:36:a7:
-        7d:d8:4c:e2:b6:b7:1f:32:34:a8:75:ca:4f:00:3e:49:b0:5c:
-        40:1a:9c:6e:bd:b5:5f:f4:2e:c5:0a:54:b4:89:4a:63:35:ff:
-        80:8d:fe:31:e8:2e:92:77:8c:19:1a:2c:b8:95:1e:ef:d5:7d:
-        c6:f9:4d:05:b6:f8:dd:55:0c:10:43:6e:7d:47:c8:b0:83:db:
-        a3:7b:b4:5a:e3:a9:33:b2:ed:23:83:6a:e1:ce:c6:1c:89:27:
-        39:2c:3d:2f:55:49:c8:c5:9d:23:46:fe:88:71:da:ef:2b:25:
-        e4:79:92:2b:1d:61:a6:dc
------BEGIN CERTIFICATE-----
-MIIEfjCCAmagAwIBAgIBDzANBgkqhkiG9w0BAQUFADBaMQswCQYDVQQGEwJLUjET
-MBEGA1UECBMKS3l1bmdHaS1EbzERMA8GA1UEBxMIU3V3b24tU2kxFjAUBgNVBAoT
-DVNhbXN1bmcgRWxlYy4xCzAJBgNVBAMTAkNBMB4XDTA5MDMxMzAzMTgxOFoXDTE5
-MDMxMTAzMTgxOFowWzELMAkGA1UEBhMCS1IxEzARBgNVBAgTCkt5dW5nR2ktRG8x
-FjAUBgNVBAoTDVNhbXN1bmcgRWxlYy4xHzAdBgNVBAMTFkZpcnN0IFRlc3QgQ2Vy
-dGlmaWNhdGUwgZ8wDQYJKoZIhvcNAQEBBQADgY0AMIGJAoGBAM8Pz6UIGL+LbCw8
-Vf4CQ7eor0WjSihj0domesIN+Filc8XbuPtiR+oXeyVr0YzidJb0a+VJO7PlamM2
-Gfg82EucFJ0ranHMOp+51dtgjkRA1xJTUuVxQci/7A2cW3yOrJlHZVDl+JU+ijyZ
-2XVHc1H0/TZG7Rp3EM4dAQyGayP/AgMBAAGjgdEwgc4wCQYDVR0TBAIwADAsBglg
-hkgBhvhCAQ0EHxYdT3BlblNTTCBHZW5lcmF0ZWQgQ2VydGlmaWNhdGUwHQYDVR0O
-BBYEFCUM7B/WGqKVr8Gj2u+x875i8xBsMHQGA1UdIwRtMGuhXqRcMFoxCzAJBgNV
-BAYTAktSMRMwEQYDVQQIEwpLeXVuZ0dpLURvMREwDwYDVQQHEwhTdXdvbi1TaTEW
-MBQGA1UEChMNU2Ftc3VuZyBFbGVjLjELMAkGA1UEAxMCQ0GCCQDyW0BbwrfQZDAN
-BgkqhkiG9w0BAQUFAAOCAgEAGP508a8K2ZGttXzzAfiYGtyzZmv0vBaa5ivyH3cj
-iaho4I3jUPPx5jjxWVSbRA9yABphcZzwT6MInRc2DFSCviQEy7UE6SDJbryPrxjY
-Le7MqIvkGjWY9lNyiU8F+MN7UBPuz5/T66d8SuaJD2sO1se82wQDCCVZtAZbzqbb
-ezpdgOj/ZuEiA1QoFg6JyFuqsm4aDwdTYLz0Ki2nifK0WFVHLrGyPFAwawwSNBFf
-VCoKqxnZNq7iFl64jg0X0EKClk37NlZpe84y+5GkAnOMdX7ehwZSIO0m/0dy8vYB
-Luw42gtbvuyOxgIoklcoBPUAh5A04YHFzCEAa03V1cP28ZfhXozqVi5ezp7euaaG
-YDMdlHY54XCa0rOa9Ef4vYMmOKCro7yB32t5ffVnj1rhpGcpWAdmcGpD3PdMglQV
-oC+rwJ8kkeCn0bFYv0O/JR8y/JgmsS8Zj9hpwRq9sD4K3FTBJzS5G1WT/+YjrK8z
-7Y1u7jYYcJ6ih7biHTru6OJ5lxV8g9GJcauHjTanfdhM4ra3HzI0qHXKTwA+SbBc
-QBqcbr21X/QuxQpUtIlKYzX/gI3+MegukneMGRosuJUe79V9xvlNBbb43VUMEENu
-fUfIsIPbo3u0WuOpM7LtI4Nq4c7GHIknOSw9L1VJyMWdI0b+iHHa7ysl5HmSKx1h
-ptw=
------END CERTIFICATE-----
diff --git a/tests/cert-svc/data/TestData/ssl/demoCA/newcerts/10.pem b/tests/cert-svc/data/TestData/ssl/demoCA/newcerts/10.pem
deleted file mode 100644 (file)
index 0c1799a..0000000
+++ /dev/null
@@ -1,81 +0,0 @@
-Certificate:
-    Data:
-        Version: 3 (0x2)
-        Serial Number: 16 (0x10)
-        Signature Algorithm: sha1WithRSAEncryption
-        Issuer: C=KR, ST=KyungGi-Do, L=Suwon-Si, O=Samsung Elec., CN=CA
-        Validity
-            Not Before: Mar 13 03:23:56 2009 GMT
-            Not After : Mar 11 03:23:56 2019 GMT
-        Subject: C=KR, ST=KyungGi-Do, O=Samsung Elec., CN=First certificate to test OCSP
-        Subject Public Key Info:
-            Public Key Algorithm: rsaEncryption
-            RSA Public Key: (1024 bit)
-                Modulus (1024 bit):
-                    00:c0:a9:51:63:19:e2:cc:f3:9d:19:d8:75:90:ab:
-                    13:40:a3:3f:9d:dc:ef:48:42:0d:00:36:db:ea:68:
-                    fd:b9:15:34:a9:af:0f:52:2b:57:2e:03:74:13:41:
-                    b4:59:69:7e:f6:e1:54:42:8d:c3:f4:85:2b:ff:07:
-                    97:a4:2f:5b:e4:13:be:72:ef:65:e7:59:be:ed:14:
-                    71:82:cc:09:03:50:99:66:08:34:1a:41:45:e6:e3:
-                    37:98:32:6a:15:d4:32:63:f7:26:6c:5a:ed:45:bd:
-                    bb:aa:be:33:4b:9c:cb:b2:03:13:e3:2d:6f:61:57:
-                    2a:e8:e8:44:0f:59:ea:e7:bf
-                Exponent: 65537 (0x10001)
-        X509v3 extensions:
-            Authority Information Access: 
-                OCSP - URI:http://127.0.0.1:80/0002
-
-    Signature Algorithm: sha1WithRSAEncryption
-        75:b9:17:be:1c:06:6f:12:a9:04:1b:63:0b:0d:5c:70:55:e2:
-        31:c0:88:71:d0:56:8e:e5:16:e8:3b:47:1a:08:03:93:56:b2:
-        9b:a2:04:3c:a8:81:10:5a:18:7b:d2:70:ae:7c:0b:94:b6:6c:
-        f2:58:e7:69:82:e5:f2:aa:4e:f3:ac:85:6d:5a:ac:11:53:d2:
-        8d:3d:53:ae:ab:f7:f3:c6:f0:ba:f2:e6:7b:2d:74:74:75:fd:
-        e0:8d:67:c9:12:d5:f2:93:44:48:66:5b:85:26:7d:95:77:48:
-        4f:a4:72:65:67:38:99:47:4e:cd:47:1c:43:7a:0a:58:a6:99:
-        1b:1b:01:09:f7:0b:34:8a:3a:8d:10:e2:ca:9c:48:a3:f6:39:
-        42:3b:43:e6:f6:81:8b:36:5a:ed:33:98:70:24:ca:4f:18:8b:
-        d9:c1:0a:d9:cd:96:33:d0:e8:ac:bd:3f:34:af:86:52:d1:69:
-        6e:90:8e:d0:86:bf:b1:04:3d:85:99:0f:e3:c3:e6:60:47:34:
-        37:97:f2:a2:69:c4:4e:dc:62:d0:eb:c2:24:77:2e:a3:ba:c1:
-        88:a9:b2:b4:fb:79:a6:d4:cf:5e:3f:03:41:25:c4:f3:29:0a:
-        fd:b7:78:55:b1:9a:0c:79:32:2f:2e:fe:69:ba:a0:2c:62:bc:
-        11:38:c4:47:a8:b0:72:70:d1:50:9f:b9:87:64:f5:12:56:c5:
-        f7:ed:8e:23:08:df:d0:0e:1a:6b:25:8c:b3:6b:7c:cc:55:6d:
-        90:83:a9:ef:7d:45:04:a6:dc:7c:0d:80:c1:54:22:d1:b8:e2:
-        43:cc:ad:75:a2:07:eb:d3:26:da:8a:c4:fb:6f:0b:ac:11:f4:
-        01:7f:b9:37:68:ec:1e:60:a2:ae:d6:b2:0b:37:cb:7e:5d:dc:
-        ec:14:21:69:84:ff:fc:61:85:b6:bf:7f:d2:af:3c:70:12:c6:
-        ba:40:e8:b5:25:56:34:ca:44:f1:ea:15:ad:79:50:ec:44:b7:
-        6c:d7:4b:cc:2c:4f:45:01:85:15:76:2a:03:c2:14:9c:3e:bf:
-        87:7b:59:d7:aa:2d:48:20:b6:1a:6e:6e:b0:c2:77:22:3c:ea:
-        24:d0:f8:62:b0:4b:01:3a:48:be:5f:66:73:0a:46:b3:1f:83:
-        41:91:f5:fd:e8:08:08:52:18:3a:8c:6a:19:2c:e3:30:d8:53:
-        13:97:62:83:eb:e3:ed:3a:8e:64:25:b1:8a:01:f4:24:14:6d:
-        d4:61:c1:c3:8d:c3:89:2c:5f:6e:d8:1e:1d:de:b9:77:06:0b:
-        31:63:e4:ce:d9:76:1b:68:48:ea:ec:64:d5:a6:a5:15:29:1d:
-        79:af:21:2d:a8:e6:e6:f8
------BEGIN CERTIFICATE-----
-MIID7DCCAdSgAwIBAgIBEDANBgkqhkiG9w0BAQUFADBaMQswCQYDVQQGEwJLUjET
-MBEGA1UECBMKS3l1bmdHaS1EbzERMA8GA1UEBxMIU3V3b24tU2kxFjAUBgNVBAoT
-DVNhbXN1bmcgRWxlYy4xCzAJBgNVBAMTAkNBMB4XDTA5MDMxMzAzMjM1NloXDTE5
-MDMxMTAzMjM1NlowYzELMAkGA1UEBhMCS1IxEzARBgNVBAgTCkt5dW5nR2ktRG8x
-FjAUBgNVBAoTDVNhbXN1bmcgRWxlYy4xJzAlBgNVBAMTHkZpcnN0IGNlcnRpZmlj
-YXRlIHRvIHRlc3QgT0NTUDCBnzANBgkqhkiG9w0BAQEFAAOBjQAwgYkCgYEAwKlR
-YxnizPOdGdh1kKsTQKM/ndzvSEINADbb6mj9uRU0qa8PUitXLgN0E0G0WWl+9uFU
-Qo3D9IUr/weXpC9b5BO+cu9l51m+7RRxgswJA1CZZgg0GkFF5uM3mDJqFdQyY/cm
-bFrtRb27qr4zS5zLsgMT4y1vYVcq6OhED1nq578CAwEAAaM4MDYwNAYIKwYBBQUH
-AQEEKDAmMCQGCCsGAQUFBzABhhhodHRwOi8vMTI3LjAuMC4xOjgwLzAwMDIwDQYJ
-KoZIhvcNAQEFBQADggIBAHW5F74cBm8SqQQbYwsNXHBV4jHAiHHQVo7lFug7RxoI
-A5NWspuiBDyogRBaGHvScK58C5S2bPJY52mC5fKqTvOshW1arBFT0o09U66r9/PG
-8Lry5nstdHR1/eCNZ8kS1fKTREhmW4UmfZV3SE+kcmVnOJlHTs1HHEN6ClimmRsb
-AQn3CzSKOo0Q4sqcSKP2OUI7Q+b2gYs2Wu0zmHAkyk8Yi9nBCtnNljPQ6Ky9PzSv
-hlLRaW6QjtCGv7EEPYWZD+PD5mBHNDeX8qJpxE7cYtDrwiR3LqO6wYipsrT7eabU
-z14/A0ElxPMpCv23eFWxmgx5Mi8u/mm6oCxivBE4xEeosHJw0VCfuYdk9RJWxfft
-jiMI39AOGmsljLNrfMxVbZCDqe99RQSm3HwNgMFUItG44kPMrXWiB+vTJtqKxPtv
-C6wR9AF/uTdo7B5goq7Wsgs3y35d3OwUIWmE//xhhba/f9KvPHASxrpA6LUlVjTK
-RPHqFa15UOxEt2zXS8wsT0UBhRV2KgPCFJw+v4d7WdeqLUggthpubrDCdyI86iTQ
-+GKwSwE6SL5fZnMKRrMfg0GR9f3oCAhSGDqMahks4zDYUxOXYoPr4+06jmQlsYoB
-9CQUbdRhwcONw4ksX27YHh3euXcGCzFj5M7ZdhtoSOrsZNWmpRUpHXmvIS2o5ub4
------END CERTIFICATE-----
diff --git a/tests/cert-svc/data/TestData/ssl/demoCA/newcerts/11.pem b/tests/cert-svc/data/TestData/ssl/demoCA/newcerts/11.pem
deleted file mode 100644 (file)
index 177876b..0000000
+++ /dev/null
@@ -1,81 +0,0 @@
-Certificate:
-    Data:
-        Version: 3 (0x2)
-        Serial Number: 17 (0x11)
-        Signature Algorithm: sha1WithRSAEncryption
-        Issuer: C=KR, ST=KyungGi-Do, L=Suwon-Si, O=Samsung Elec., CN=CA
-        Validity
-            Not Before: Mar 13 03:24:10 2009 GMT
-            Not After : Mar 11 03:24:10 2019 GMT
-        Subject: C=KR, ST=KyungGi-Do, O=Samsung Elec., CN=First certificate to test OCSP
-        Subject Public Key Info:
-            Public Key Algorithm: rsaEncryption
-            RSA Public Key: (1024 bit)
-                Modulus (1024 bit):
-                    00:c0:a9:51:63:19:e2:cc:f3:9d:19:d8:75:90:ab:
-                    13:40:a3:3f:9d:dc:ef:48:42:0d:00:36:db:ea:68:
-                    fd:b9:15:34:a9:af:0f:52:2b:57:2e:03:74:13:41:
-                    b4:59:69:7e:f6:e1:54:42:8d:c3:f4:85:2b:ff:07:
-                    97:a4:2f:5b:e4:13:be:72:ef:65:e7:59:be:ed:14:
-                    71:82:cc:09:03:50:99:66:08:34:1a:41:45:e6:e3:
-                    37:98:32:6a:15:d4:32:63:f7:26:6c:5a:ed:45:bd:
-                    bb:aa:be:33:4b:9c:cb:b2:03:13:e3:2d:6f:61:57:
-                    2a:e8:e8:44:0f:59:ea:e7:bf
-                Exponent: 65537 (0x10001)
-        X509v3 extensions:
-            Authority Information Access: 
-                OCSP - URI:http://127.0.0.1:81/0003
-
-    Signature Algorithm: sha1WithRSAEncryption
-        5a:7d:5f:25:e5:5a:49:3e:e9:06:4c:f1:7f:83:7d:d4:0d:13:
-        36:35:bf:32:92:69:60:1d:ae:2e:ed:89:b3:d4:1e:78:d2:85:
-        35:7a:1f:65:30:78:5e:d3:30:60:3d:7d:2c:be:02:6a:f0:22:
-        5e:82:86:53:01:a4:b6:1c:9f:d4:79:e9:ec:eb:d8:33:85:fb:
-        21:d2:82:77:b9:6d:20:8e:af:82:ff:25:82:27:3b:d7:d9:38:
-        31:a3:2b:bc:55:00:28:f6:f9:bf:01:e6:66:0b:b8:a8:ed:30:
-        09:52:8d:bf:94:7b:96:d1:93:5b:a3:a4:f1:9f:aa:f4:04:54:
-        0b:69:73:af:36:d7:3e:33:2c:29:38:04:9b:65:32:31:fa:17:
-        2f:0a:9f:19:05:d8:01:0c:db:13:1e:55:ec:94:38:3f:83:ee:
-        50:35:d1:6e:4f:32:c3:3d:d3:39:c8:c5:cc:56:b4:33:2e:8b:
-        75:a0:9c:cd:28:e5:42:a1:89:e1:06:90:bd:f3:8e:b5:48:9e:
-        1c:dd:56:4d:d9:ec:6e:0b:7b:72:e5:0a:be:7e:33:5a:13:25:
-        13:87:4c:9a:27:49:02:6d:28:5b:e7:4d:1b:7c:11:22:10:45:
-        b1:57:b7:fc:12:62:69:24:69:ee:67:ce:5b:20:70:6a:22:29:
-        f4:a0:90:59:d3:a2:be:7b:43:3a:59:0b:23:d1:2e:ed:51:98:
-        87:c5:4d:1c:64:08:f8:ca:af:36:ab:5d:00:ce:15:00:f4:ad:
-        34:44:27:8b:72:c6:6d:24:4c:1a:e3:f7:4c:bc:25:a2:a8:e2:
-        a8:79:58:57:a7:5d:f0:20:28:d2:ef:84:ff:ee:42:0f:1e:59:
-        93:4c:05:45:ff:c1:0d:cb:30:1d:bb:26:5a:4d:24:c0:44:52:
-        77:33:17:dd:d1:00:63:1e:9b:4d:ca:28:8b:bb:fd:0d:0b:e3:
-        72:26:94:e2:8c:5a:d7:1a:a6:e7:b7:bc:4b:bf:cc:02:2c:d8:
-        9b:cb:31:7d:09:4c:15:73:5d:1a:a8:46:10:66:68:80:a9:f3:
-        3d:f8:7c:9d:46:3d:ce:ae:75:6f:92:db:34:d3:d7:be:6c:4e:
-        76:b6:b6:b7:a2:a8:b9:9e:a9:f1:6f:a6:e5:01:bb:82:13:bd:
-        7f:24:81:c3:22:54:58:f0:7e:8d:9a:86:82:00:46:66:33:e4:
-        96:98:8a:33:7b:ed:93:9b:cf:68:b5:eb:42:da:6d:50:49:f0:
-        14:27:01:f6:57:09:26:7c:61:81:d0:e5:e9:ec:6d:18:eb:97:
-        1a:55:cf:1f:d9:20:67:8f:71:bb:0c:98:6d:c0:4b:85:32:c9:
-        d3:b7:f3:d0:60:fd:64:01
------BEGIN CERTIFICATE-----
-MIID7DCCAdSgAwIBAgIBETANBgkqhkiG9w0BAQUFADBaMQswCQYDVQQGEwJLUjET
-MBEGA1UECBMKS3l1bmdHaS1EbzERMA8GA1UEBxMIU3V3b24tU2kxFjAUBgNVBAoT
-DVNhbXN1bmcgRWxlYy4xCzAJBgNVBAMTAkNBMB4XDTA5MDMxMzAzMjQxMFoXDTE5
-MDMxMTAzMjQxMFowYzELMAkGA1UEBhMCS1IxEzARBgNVBAgTCkt5dW5nR2ktRG8x
-FjAUBgNVBAoTDVNhbXN1bmcgRWxlYy4xJzAlBgNVBAMTHkZpcnN0IGNlcnRpZmlj
-YXRlIHRvIHRlc3QgT0NTUDCBnzANBgkqhkiG9w0BAQEFAAOBjQAwgYkCgYEAwKlR
-YxnizPOdGdh1kKsTQKM/ndzvSEINADbb6mj9uRU0qa8PUitXLgN0E0G0WWl+9uFU
-Qo3D9IUr/weXpC9b5BO+cu9l51m+7RRxgswJA1CZZgg0GkFF5uM3mDJqFdQyY/cm
-bFrtRb27qr4zS5zLsgMT4y1vYVcq6OhED1nq578CAwEAAaM4MDYwNAYIKwYBBQUH
-AQEEKDAmMCQGCCsGAQUFBzABhhhodHRwOi8vMTI3LjAuMC4xOjgxLzAwMDMwDQYJ
-KoZIhvcNAQEFBQADggIBAFp9XyXlWkk+6QZM8X+DfdQNEzY1vzKSaWAdri7tibPU
-HnjShTV6H2UweF7TMGA9fSy+AmrwIl6ChlMBpLYcn9R56ezr2DOF+yHSgne5bSCO
-r4L/JYInO9fZODGjK7xVACj2+b8B5mYLuKjtMAlSjb+Ue5bRk1ujpPGfqvQEVAtp
-c6821z4zLCk4BJtlMjH6Fy8KnxkF2AEM2xMeVeyUOD+D7lA10W5PMsM90znIxcxW
-tDMui3WgnM0o5UKhieEGkL3zjrVInhzdVk3Z7G4Le3LlCr5+M1oTJROHTJonSQJt
-KFvnTRt8ESIQRbFXt/wSYmkkae5nzlsgcGoiKfSgkFnTor57QzpZCyPRLu1RmIfF
-TRxkCPjKrzarXQDOFQD0rTREJ4tyxm0kTBrj90y8JaKo4qh5WFenXfAgKNLvhP/u
-Qg8eWZNMBUX/wQ3LMB27JlpNJMBEUnczF93RAGMem03KKIu7/Q0L43ImlOKMWtca
-pue3vEu/zAIs2JvLMX0JTBVzXRqoRhBmaICp8z34fJ1GPc6udW+S2zTT175sTna2
-treiqLmeqfFvpuUBu4ITvX8kgcMiVFjwfo2ahoIARmYz5JaYijN77ZObz2i160La
-bVBJ8BQnAfZXCSZ8YYHQ5ensbRjrlxpVzx/ZIGePcbsMmG3AS4UyydO389Bg/WQB
------END CERTIFICATE-----
diff --git a/tests/cert-svc/data/TestData/ssl/demoCA/newcerts/12.pem b/tests/cert-svc/data/TestData/ssl/demoCA/newcerts/12.pem
deleted file mode 100644 (file)
index 830592a..0000000
+++ /dev/null
@@ -1,81 +0,0 @@
-Certificate:
-    Data:
-        Version: 3 (0x2)
-        Serial Number: 18 (0x12)
-        Signature Algorithm: sha1WithRSAEncryption
-        Issuer: C=KR, ST=KyungGi-Do, L=Suwon-Si, O=Samsung Elec., CN=CA
-        Validity
-            Not Before: Mar 13 03:24:20 2009 GMT
-            Not After : Mar 11 03:24:20 2019 GMT
-        Subject: C=KR, ST=KyungGi-Do, O=Samsung Elec., CN=First certificate to test OCSP
-        Subject Public Key Info:
-            Public Key Algorithm: rsaEncryption
-            RSA Public Key: (1024 bit)
-                Modulus (1024 bit):
-                    00:c0:a9:51:63:19:e2:cc:f3:9d:19:d8:75:90:ab:
-                    13:40:a3:3f:9d:dc:ef:48:42:0d:00:36:db:ea:68:
-                    fd:b9:15:34:a9:af:0f:52:2b:57:2e:03:74:13:41:
-                    b4:59:69:7e:f6:e1:54:42:8d:c3:f4:85:2b:ff:07:
-                    97:a4:2f:5b:e4:13:be:72:ef:65:e7:59:be:ed:14:
-                    71:82:cc:09:03:50:99:66:08:34:1a:41:45:e6:e3:
-                    37:98:32:6a:15:d4:32:63:f7:26:6c:5a:ed:45:bd:
-                    bb:aa:be:33:4b:9c:cb:b2:03:13:e3:2d:6f:61:57:
-                    2a:e8:e8:44:0f:59:ea:e7:bf
-                Exponent: 65537 (0x10001)
-        X509v3 extensions:
-            Authority Information Access: 
-                OCSP - URI:http://127.0.0.1:82/0004
-
-    Signature Algorithm: sha1WithRSAEncryption
-        1d:80:7c:33:dd:ab:99:c7:06:f5:aa:fd:16:7d:89:d8:a9:a2:
-        89:38:af:26:b7:b1:0f:69:3d:d6:09:3e:6d:dd:d2:e0:51:b8:
-        97:fc:8d:96:08:0d:33:2d:75:e7:d2:9e:47:2b:fd:46:5b:c9:
-        f2:68:4f:26:8f:83:3d:fc:aa:d7:6a:20:77:15:3f:78:d9:75:
-        b3:79:10:fd:ab:ab:95:34:69:64:3c:8a:65:6d:66:bb:a9:da:
-        26:79:51:59:a7:c2:97:ea:6c:7f:31:91:d3:a5:c2:65:ca:d5:
-        4f:6f:c8:d9:b9:c7:03:7b:c6:2d:16:5f:fe:de:02:28:f3:e9:
-        64:ad:e9:62:3c:e5:91:31:0f:c9:c9:33:1a:a5:66:d8:5b:80:
-        18:6f:5f:55:34:51:43:fa:79:50:ba:17:19:2c:b9:25:b8:a3:
-        a0:b2:08:38:49:6d:3c:86:8c:42:2c:d8:07:bd:39:f1:3c:97:
-        8f:c6:83:cd:85:8f:e9:52:63:77:4f:d6:9e:58:3e:22:f8:29:
-        8e:44:92:c6:b7:ab:28:35:22:7b:b7:d0:8f:34:70:15:f2:4b:
-        91:65:42:8d:d5:ce:75:4b:2f:7b:7e:7f:7e:61:09:5b:b2:1a:
-        64:94:18:c9:8e:c3:ee:a4:89:d6:97:55:76:28:b0:e6:bc:7c:
-        f0:c9:9b:20:e3:a5:10:da:c1:9c:c4:4e:ff:e8:ca:3c:19:82:
-        06:d6:aa:05:cb:05:e5:bd:36:cf:4c:3a:a7:e6:21:af:e8:5e:
-        2d:ee:3b:94:24:91:37:92:95:3f:d3:f8:b8:5a:13:56:16:a7:
-        20:34:f6:fd:cb:59:6d:4c:ff:04:df:ef:61:08:d9:2f:85:a8:
-        b1:7c:07:80:93:31:7b:bb:7f:8d:17:ba:8b:64:41:82:4a:ca:
-        f6:a9:f7:69:b8:cf:ed:17:c1:ca:09:5a:52:c4:ce:a0:9c:e3:
-        4c:52:ab:ea:b3:4f:3c:93:1d:50:bf:60:e8:6e:d1:bf:90:0c:
-        3f:1d:6b:2c:a5:c5:bf:eb:e2:da:cb:76:56:08:51:cc:87:49:
-        21:16:f0:a6:85:ce:0f:c3:32:c2:50:cc:04:f5:d1:bb:de:b8:
-        db:9b:79:e1:d2:73:14:b2:7c:5a:cf:26:7b:24:4a:58:48:58:
-        2e:b1:a1:2f:01:c2:71:40:85:c8:9b:21:10:15:1a:3e:5e:3d:
-        79:53:9c:82:b2:4e:ad:91:96:9f:03:c5:f6:44:ea:d6:d6:cf:
-        3b:1e:74:e6:b1:f2:f4:b3:e0:7d:91:77:ac:50:d9:66:1b:73:
-        59:3e:e6:18:07:bb:e0:60:4f:1e:8d:40:2b:da:25:ac:c8:85:
-        d6:31:62:f3:5b:05:4a:11
------BEGIN CERTIFICATE-----
-MIID7DCCAdSgAwIBAgIBEjANBgkqhkiG9w0BAQUFADBaMQswCQYDVQQGEwJLUjET
-MBEGA1UECBMKS3l1bmdHaS1EbzERMA8GA1UEBxMIU3V3b24tU2kxFjAUBgNVBAoT
-DVNhbXN1bmcgRWxlYy4xCzAJBgNVBAMTAkNBMB4XDTA5MDMxMzAzMjQyMFoXDTE5
-MDMxMTAzMjQyMFowYzELMAkGA1UEBhMCS1IxEzARBgNVBAgTCkt5dW5nR2ktRG8x
-FjAUBgNVBAoTDVNhbXN1bmcgRWxlYy4xJzAlBgNVBAMTHkZpcnN0IGNlcnRpZmlj
-YXRlIHRvIHRlc3QgT0NTUDCBnzANBgkqhkiG9w0BAQEFAAOBjQAwgYkCgYEAwKlR
-YxnizPOdGdh1kKsTQKM/ndzvSEINADbb6mj9uRU0qa8PUitXLgN0E0G0WWl+9uFU
-Qo3D9IUr/weXpC9b5BO+cu9l51m+7RRxgswJA1CZZgg0GkFF5uM3mDJqFdQyY/cm
-bFrtRb27qr4zS5zLsgMT4y1vYVcq6OhED1nq578CAwEAAaM4MDYwNAYIKwYBBQUH
-AQEEKDAmMCQGCCsGAQUFBzABhhhodHRwOi8vMTI3LjAuMC4xOjgyLzAwMDQwDQYJ
-KoZIhvcNAQEFBQADggIBAB2AfDPdq5nHBvWq/RZ9idipook4rya3sQ9pPdYJPm3d
-0uBRuJf8jZYIDTMtdefSnkcr/UZbyfJoTyaPgz38qtdqIHcVP3jZdbN5EP2rq5U0
-aWQ8imVtZrup2iZ5UVmnwpfqbH8xkdOlwmXK1U9vyNm5xwN7xi0WX/7eAijz6WSt
-6WI85ZExD8nJMxqlZthbgBhvX1U0UUP6eVC6FxksuSW4o6CyCDhJbTyGjEIs2Ae9
-OfE8l4/Gg82Fj+lSY3dP1p5YPiL4KY5Eksa3qyg1Inu30I80cBXyS5FlQo3VznVL
-L3t+f35hCVuyGmSUGMmOw+6kidaXVXYosOa8fPDJmyDjpRDawZzETv/oyjwZggbW
-qgXLBeW9Ns9MOqfmIa/oXi3uO5QkkTeSlT/T+LhaE1YWpyA09v3LWW1M/wTf72EI
-2S+FqLF8B4CTMXu7f40XuotkQYJKyvap92m4z+0XwcoJWlLEzqCc40xSq+qzTzyT
-HVC/YOhu0b+QDD8dayylxb/r4trLdlYIUcyHSSEW8KaFzg/DMsJQzAT10bveuNub
-eeHScxSyfFrPJnskSlhIWC6xoS8BwnFAhcibIRAVGj5ePXlTnIKyTq2Rlp8DxfZE
-6tbWzzsedOax8vSz4H2Rd6xQ2WYbc1k+5hgHu+BgTx6NQCvaJazIhdYxYvNbBUoR
------END CERTIFICATE-----
diff --git a/tests/cert-svc/data/TestData/ssl/demoCA/newcerts/13.pem b/tests/cert-svc/data/TestData/ssl/demoCA/newcerts/13.pem
deleted file mode 100644 (file)
index 0ff43d6..0000000
+++ /dev/null
@@ -1,81 +0,0 @@
-Certificate:
-    Data:
-        Version: 3 (0x2)
-        Serial Number: 19 (0x13)
-        Signature Algorithm: sha1WithRSAEncryption
-        Issuer: C=KR, ST=KyungGi-Do, L=Suwon-Si, O=Samsung Elec., CN=CA
-        Validity
-            Not Before: Mar 13 03:24:30 2009 GMT
-            Not After : Mar 11 03:24:30 2019 GMT
-        Subject: C=KR, ST=KyungGi-Do, O=Samsung Elec., CN=First certificate to test OCSP
-        Subject Public Key Info:
-            Public Key Algorithm: rsaEncryption
-            RSA Public Key: (1024 bit)
-                Modulus (1024 bit):
-                    00:c0:a9:51:63:19:e2:cc:f3:9d:19:d8:75:90:ab:
-                    13:40:a3:3f:9d:dc:ef:48:42:0d:00:36:db:ea:68:
-                    fd:b9:15:34:a9:af:0f:52:2b:57:2e:03:74:13:41:
-                    b4:59:69:7e:f6:e1:54:42:8d:c3:f4:85:2b:ff:07:
-                    97:a4:2f:5b:e4:13:be:72:ef:65:e7:59:be:ed:14:
-                    71:82:cc:09:03:50:99:66:08:34:1a:41:45:e6:e3:
-                    37:98:32:6a:15:d4:32:63:f7:26:6c:5a:ed:45:bd:
-                    bb:aa:be:33:4b:9c:cb:b2:03:13:e3:2d:6f:61:57:
-                    2a:e8:e8:44:0f:59:ea:e7:bf
-                Exponent: 65537 (0x10001)
-        X509v3 extensions:
-            Authority Information Access: 
-                OCSP - URI:http://127.0.0.1:83/0005
-
-    Signature Algorithm: sha1WithRSAEncryption
-        9b:ea:5d:a3:f4:b2:04:44:31:6b:64:e4:7d:25:5d:69:1b:25:
-        3d:63:d4:3f:2c:0f:c6:60:44:70:18:57:31:be:84:38:e8:53:
-        29:dd:5e:f2:5c:8e:41:6d:e8:ea:a7:23:91:b9:f4:c1:20:2c:
-        cd:d6:b4:b4:e6:9d:c3:b4:5b:4c:48:dd:3a:cc:cd:9e:0c:93:
-        bb:e0:03:43:1c:ab:01:86:4e:67:44:ad:68:3d:e6:00:4d:9e:
-        95:5f:86:0f:e4:18:af:3d:76:a4:1b:91:5e:e8:07:2b:aa:62:
-        4e:d9:af:f8:15:e7:3c:bb:8c:f4:a9:4f:df:72:f6:b0:6a:36:
-        ad:eb:d2:10:02:cb:65:28:a7:4c:4f:98:e1:7b:1e:aa:af:3e:
-        61:65:91:58:94:99:26:69:29:06:50:02:44:61:a6:3c:ee:8a:
-        7e:db:56:5a:f5:cc:d6:58:6f:a2:40:51:e1:81:fa:3b:b8:4b:
-        8d:00:64:b2:99:d3:e7:8a:52:78:b3:67:a1:64:5d:dd:a0:c5:
-        54:1d:de:07:29:ef:85:01:d4:e9:24:44:8b:df:9b:f5:ae:80:
-        4d:fa:4d:08:76:7c:97:6b:86:74:22:56:d1:87:6b:41:54:66:
-        fc:3b:d2:3e:2d:95:c1:46:06:b9:db:0e:8b:e1:be:c8:56:82:
-        c3:1d:df:84:b6:50:ee:b8:30:3c:54:07:49:8b:e2:d4:a7:b8:
-        35:0d:b6:09:7e:04:01:bb:71:86:8c:50:87:a7:3a:2d:b8:7c:
-        24:cd:b1:a6:87:b8:eb:d5:dc:8f:02:21:f9:71:06:34:c4:e5:
-        6f:ff:53:4b:dd:33:96:60:8b:6d:bb:03:b1:36:31:2d:02:6c:
-        7f:ba:70:0a:78:b8:fb:45:92:84:5b:1e:a7:15:39:13:33:fd:
-        6f:a7:95:76:10:1f:b3:cd:11:e8:ed:ce:2c:63:cd:64:23:62:
-        c4:21:d6:48:bf:f7:10:b8:da:d5:72:14:ad:5a:a0:5d:4a:2b:
-        a0:76:5f:b8:3b:d2:6b:8a:7f:6b:6a:cc:84:eb:6a:be:d9:26:
-        2c:bb:38:06:b8:f4:d4:fb:78:85:83:c8:ad:6e:56:f9:67:5f:
-        bc:3c:41:b6:f0:6f:d4:45:78:ed:3e:2f:c7:3a:3e:9a:98:68:
-        c4:64:79:29:51:19:cd:a6:70:c4:04:30:50:86:9c:f2:54:57:
-        b1:e1:7d:4a:d5:34:fc:93:31:6d:64:15:79:31:c0:70:d5:db:
-        bc:a0:be:21:22:1e:61:ac:4a:9f:a2:a6:ff:de:52:2e:31:d7:
-        5e:39:66:c6:47:55:f6:64:f5:bd:ed:c0:60:b8:59:88:a1:8e:
-        8c:5f:20:1b:be:41:51:f4
------BEGIN CERTIFICATE-----
-MIID7DCCAdSgAwIBAgIBEzANBgkqhkiG9w0BAQUFADBaMQswCQYDVQQGEwJLUjET
-MBEGA1UECBMKS3l1bmdHaS1EbzERMA8GA1UEBxMIU3V3b24tU2kxFjAUBgNVBAoT
-DVNhbXN1bmcgRWxlYy4xCzAJBgNVBAMTAkNBMB4XDTA5MDMxMzAzMjQzMFoXDTE5
-MDMxMTAzMjQzMFowYzELMAkGA1UEBhMCS1IxEzARBgNVBAgTCkt5dW5nR2ktRG8x
-FjAUBgNVBAoTDVNhbXN1bmcgRWxlYy4xJzAlBgNVBAMTHkZpcnN0IGNlcnRpZmlj
-YXRlIHRvIHRlc3QgT0NTUDCBnzANBgkqhkiG9w0BAQEFAAOBjQAwgYkCgYEAwKlR
-YxnizPOdGdh1kKsTQKM/ndzvSEINADbb6mj9uRU0qa8PUitXLgN0E0G0WWl+9uFU
-Qo3D9IUr/weXpC9b5BO+cu9l51m+7RRxgswJA1CZZgg0GkFF5uM3mDJqFdQyY/cm
-bFrtRb27qr4zS5zLsgMT4y1vYVcq6OhED1nq578CAwEAAaM4MDYwNAYIKwYBBQUH
-AQEEKDAmMCQGCCsGAQUFBzABhhhodHRwOi8vMTI3LjAuMC4xOjgzLzAwMDUwDQYJ
-KoZIhvcNAQEFBQADggIBAJvqXaP0sgREMWtk5H0lXWkbJT1j1D8sD8ZgRHAYVzG+
-hDjoUyndXvJcjkFt6OqnI5G59MEgLM3WtLTmncO0W0xI3TrMzZ4Mk7vgA0McqwGG
-TmdErWg95gBNnpVfhg/kGK89dqQbkV7oByuqYk7Zr/gV5zy7jPSpT99y9rBqNq3r
-0hACy2Uop0xPmOF7HqqvPmFlkViUmSZpKQZQAkRhpjzuin7bVlr1zNZYb6JAUeGB
-+ju4S40AZLKZ0+eKUnizZ6FkXd2gxVQd3gcp74UB1OkkRIvfm/WugE36TQh2fJdr
-hnQiVtGHa0FUZvw70j4tlcFGBrnbDovhvshWgsMd34S2UO64MDxUB0mL4tSnuDUN
-tgl+BAG7cYaMUIenOi24fCTNsaaHuOvV3I8CIflxBjTE5W//U0vdM5Zgi227A7E2
-MS0CbH+6cAp4uPtFkoRbHqcVORMz/W+nlXYQH7PNEejtzixjzWQjYsQh1ki/9xC4
-2tVyFK1aoF1KK6B2X7g70muKf2tqzITrar7ZJiy7OAa49NT7eIWDyK1uVvlnX7w8
-Qbbwb9RFeO0+L8c6PpqYaMRkeSlRGc2mcMQEMFCGnPJUV7HhfUrVNPyTMW1kFXkx
-wHDV27ygviEiHmGsSp+ipv/eUi4x1145ZsZHVfZk9b3twGC4WYihjoxfIBu+QVH0
------END CERTIFICATE-----
diff --git a/tests/cert-svc/data/TestData/ssl/demoCA/newcerts/14.pem b/tests/cert-svc/data/TestData/ssl/demoCA/newcerts/14.pem
deleted file mode 100644 (file)
index 099dd23..0000000
+++ /dev/null
@@ -1,81 +0,0 @@
-Certificate:
-    Data:
-        Version: 3 (0x2)
-        Serial Number: 20 (0x14)
-        Signature Algorithm: sha1WithRSAEncryption
-        Issuer: C=KR, ST=KyungGi-Do, L=Suwon-Si, O=Samsung Elec., CN=CA
-        Validity
-            Not Before: Mar 13 03:24:40 2009 GMT
-            Not After : Mar 11 03:24:40 2019 GMT
-        Subject: C=KR, ST=KyungGi-Do, O=Samsung Elec., CN=First certificate to test OCSP
-        Subject Public Key Info:
-            Public Key Algorithm: rsaEncryption
-            RSA Public Key: (1024 bit)
-                Modulus (1024 bit):
-                    00:c0:a9:51:63:19:e2:cc:f3:9d:19:d8:75:90:ab:
-                    13:40:a3:3f:9d:dc:ef:48:42:0d:00:36:db:ea:68:
-                    fd:b9:15:34:a9:af:0f:52:2b:57:2e:03:74:13:41:
-                    b4:59:69:7e:f6:e1:54:42:8d:c3:f4:85:2b:ff:07:
-                    97:a4:2f:5b:e4:13:be:72:ef:65:e7:59:be:ed:14:
-                    71:82:cc:09:03:50:99:66:08:34:1a:41:45:e6:e3:
-                    37:98:32:6a:15:d4:32:63:f7:26:6c:5a:ed:45:bd:
-                    bb:aa:be:33:4b:9c:cb:b2:03:13:e3:2d:6f:61:57:
-                    2a:e8:e8:44:0f:59:ea:e7:bf
-                Exponent: 65537 (0x10001)
-        X509v3 extensions:
-            Authority Information Access: 
-                OCSP - URI:http://127.0.0.1:84/0006
-
-    Signature Algorithm: sha1WithRSAEncryption
-        49:da:46:14:f1:5a:4a:09:cb:36:a5:fe:ab:50:f5:ea:e1:b2:
-        18:79:dc:d7:79:bb:a8:b0:8d:0b:b5:e1:a9:60:db:8a:e9:3a:
-        b8:15:b0:eb:e4:45:bf:90:64:6b:4e:c1:dc:7e:9d:5f:47:0e:
-        be:7b:22:ba:c2:71:3d:5d:8b:8f:14:67:1d:19:51:54:05:5a:
-        06:11:e1:1f:ca:bb:98:1a:a3:d6:16:b9:5d:8d:03:70:28:40:
-        ca:3a:7d:fe:a7:c3:40:ab:7a:0a:42:3a:95:f6:da:fd:bc:d9:
-        09:50:70:9a:7a:b4:e9:ae:75:b7:cd:a8:56:f4:2e:7c:ef:40:
-        63:6d:02:da:50:29:c8:df:2f:40:04:84:9d:60:a2:3c:21:fc:
-        d6:64:02:72:cb:4c:5b:e1:68:d9:0a:16:84:58:47:a5:d1:28:
-        18:86:eb:07:b9:1f:db:9f:46:de:6b:2d:2e:4e:20:9a:40:3a:
-        56:86:28:9f:c5:15:97:1a:3f:70:18:5f:44:1d:64:d0:76:ef:
-        09:c5:23:21:03:32:9c:c4:23:af:c4:1f:85:fd:da:b8:40:33:
-        b6:c2:7d:2b:67:ff:88:a0:9c:a8:2e:9e:4b:40:44:6b:bc:c0:
-        3b:f2:b3:a3:d5:f0:b4:04:85:cd:b4:cd:49:3d:34:64:1e:1d:
-        16:a1:8f:05:74:8e:91:ee:98:6c:cc:c8:d8:c3:5e:fd:65:4a:
-        15:ed:28:cb:0b:c3:b6:29:bc:d6:3d:0d:0e:a8:21:36:27:74:
-        9d:f2:7c:58:1f:88:25:35:2b:7f:4c:16:38:df:0f:32:8f:db:
-        22:96:ad:e8:8b:bd:d8:d5:e9:e1:b0:fe:53:03:e6:c7:67:78:
-        bf:a6:50:dc:2a:0a:c9:a2:df:6a:d5:c3:db:eb:20:1c:78:ed:
-        69:14:d4:f5:26:62:78:f6:33:a0:ac:95:19:5d:a6:d9:30:8d:
-        21:80:2d:42:dc:a5:a5:a0:42:41:e8:60:f1:4d:81:6d:e6:58:
-        32:b9:e4:23:09:34:3e:7a:fb:69:4b:f3:c0:8a:00:c3:59:2b:
-        02:13:fc:4e:9c:3e:8f:34:fe:b0:ca:07:df:6b:1d:97:9c:ca:
-        a9:b1:b6:8f:2d:92:6c:12:4b:64:23:d6:47:c1:f2:6f:79:16:
-        78:7b:f8:36:b9:83:a3:a4:e7:0f:c0:99:d9:a3:09:45:ac:92:
-        52:62:26:64:51:04:e9:92:6f:3e:f9:62:93:c5:2a:00:5b:d3:
-        0b:66:75:ad:bb:5d:12:37:09:3c:b6:95:6d:c2:05:17:8f:d7:
-        79:aa:0d:6a:6c:00:6e:94:0c:e8:e3:31:9d:8e:63:e9:f9:d2:
-        dc:8e:07:36:9a:e3:08:55
------BEGIN CERTIFICATE-----
-MIID7DCCAdSgAwIBAgIBFDANBgkqhkiG9w0BAQUFADBaMQswCQYDVQQGEwJLUjET
-MBEGA1UECBMKS3l1bmdHaS1EbzERMA8GA1UEBxMIU3V3b24tU2kxFjAUBgNVBAoT
-DVNhbXN1bmcgRWxlYy4xCzAJBgNVBAMTAkNBMB4XDTA5MDMxMzAzMjQ0MFoXDTE5
-MDMxMTAzMjQ0MFowYzELMAkGA1UEBhMCS1IxEzARBgNVBAgTCkt5dW5nR2ktRG8x
-FjAUBgNVBAoTDVNhbXN1bmcgRWxlYy4xJzAlBgNVBAMTHkZpcnN0IGNlcnRpZmlj
-YXRlIHRvIHRlc3QgT0NTUDCBnzANBgkqhkiG9w0BAQEFAAOBjQAwgYkCgYEAwKlR
-YxnizPOdGdh1kKsTQKM/ndzvSEINADbb6mj9uRU0qa8PUitXLgN0E0G0WWl+9uFU
-Qo3D9IUr/weXpC9b5BO+cu9l51m+7RRxgswJA1CZZgg0GkFF5uM3mDJqFdQyY/cm
-bFrtRb27qr4zS5zLsgMT4y1vYVcq6OhED1nq578CAwEAAaM4MDYwNAYIKwYBBQUH
-AQEEKDAmMCQGCCsGAQUFBzABhhhodHRwOi8vMTI3LjAuMC4xOjg0LzAwMDYwDQYJ
-KoZIhvcNAQEFBQADggIBAEnaRhTxWkoJyzal/qtQ9erhshh53Nd5u6iwjQu14alg
-24rpOrgVsOvkRb+QZGtOwdx+nV9HDr57IrrCcT1di48UZx0ZUVQFWgYR4R/Ku5ga
-o9YWuV2NA3AoQMo6ff6nw0CregpCOpX22v282QlQcJp6tOmudbfNqFb0LnzvQGNt
-AtpQKcjfL0AEhJ1gojwh/NZkAnLLTFvhaNkKFoRYR6XRKBiG6we5H9ufRt5rLS5O
-IJpAOlaGKJ/FFZcaP3AYX0QdZNB27wnFIyEDMpzEI6/EH4X92rhAM7bCfStn/4ig
-nKgunktARGu8wDvys6PV8LQEhc20zUk9NGQeHRahjwV0jpHumGzMyNjDXv1lShXt
-KMsLw7YpvNY9DQ6oITYndJ3yfFgfiCU1K39MFjjfDzKP2yKWreiLvdjV6eGw/lMD
-5sdneL+mUNwqCsmi32rVw9vrIBx47WkU1PUmYnj2M6CslRldptkwjSGALULcpaWg
-QkHoYPFNgW3mWDK55CMJND56+2lL88CKAMNZKwIT/E6cPo80/rDKB99rHZecyqmx
-to8tkmwSS2Qj1kfB8m95Fnh7+Da5g6Ok5w/AmdmjCUWsklJiJmRRBOmSbz75YpPF
-KgBb0wtmda27XRI3CTy2lW3CBReP13mqDWpsAG6UDOjjMZ2OY+n50tyOBzaa4whV
------END CERTIFICATE-----
diff --git a/tests/cert-svc/data/TestData/ssl/demoCA/newcerts/15.pem b/tests/cert-svc/data/TestData/ssl/demoCA/newcerts/15.pem
deleted file mode 100644 (file)
index 912e429..0000000
+++ /dev/null
@@ -1,79 +0,0 @@
-Certificate:
-    Data:
-        Version: 3 (0x2)
-        Serial Number: 21 (0x15)
-        Signature Algorithm: sha1WithRSAEncryption
-        Issuer: C=KR, ST=KyungGi-Do, L=Suwon-Si, O=Samsung Elec., CN=CA
-        Validity
-            Not Before: Mar 14 11:35:42 2009 GMT
-            Not After : Mar 14 11:35:42 2010 GMT
-        Subject: C=KR, ST=KyungGi-Do, O=Samsung Elec., CN=OCSP Responder
-        Subject Public Key Info:
-            Public Key Algorithm: rsaEncryption
-            RSA Public Key: (1024 bit)
-                Modulus (1024 bit):
-                    00:b9:0e:80:20:fc:74:49:08:cb:83:87:76:e4:42:
-                    03:42:6e:56:1b:ae:73:43:9b:a6:cf:5d:33:1d:37:
-                    cf:b5:22:bc:79:5e:6a:69:02:3e:e2:08:c5:f5:be:
-                    ee:ef:df:4f:85:41:a2:5f:d3:76:39:3f:61:56:14:
-                    1f:c1:cc:ec:45:e3:b2:e2:b0:e8:20:9f:a9:e7:8a:
-                    b8:ed:3f:e4:6f:86:d8:e5:d5:3b:fe:47:e8:8f:51:
-                    ee:dd:b6:7f:36:6b:c7:75:f7:78:04:df:ac:51:b3:
-                    25:65:04:ab:0d:ce:db:5e:3a:db:6a:8f:da:69:46:
-                    c7:92:f2:b3:ba:6c:90:3d:71
-                Exponent: 65537 (0x10001)
-        X509v3 extensions:
-            OCSP No Check: 
-
-    Signature Algorithm: sha1WithRSAEncryption
-        80:91:21:6b:30:15:99:38:e1:5c:74:82:7d:25:f0:ee:15:cb:
-        44:f0:01:16:3d:17:09:7f:8e:73:bf:3b:34:52:c7:1d:0f:f6:
-        8f:30:34:76:d7:c2:b9:95:14:a0:01:f8:93:de:ff:62:7e:c1:
-        79:f2:de:e2:cf:0d:f8:9a:b3:6a:ab:cf:cf:68:12:9f:e2:81:
-        7b:05:1f:27:34:a6:f6:68:9c:46:45:cd:d5:02:d7:7d:e0:d9:
-        b5:ef:7b:f6:7b:5c:d9:29:ae:f2:55:dd:10:7a:58:74:bc:ef:
-        a9:9b:9f:a8:e4:89:99:f0:df:3e:d4:c9:64:85:fa:fa:15:d0:
-        d2:20:2c:07:49:55:43:50:f4:0a:fd:dc:20:e5:cf:d5:e7:d6:
-        2c:65:af:18:37:13:78:f5:dd:6e:43:a1:aa:be:93:20:be:4c:
-        1f:71:47:10:cb:1c:48:62:5a:80:c6:d5:a4:23:c0:06:a0:e5:
-        d7:d5:b2:bb:4e:d8:fe:cf:d7:ae:93:ce:bb:ab:96:07:f8:a3:
-        fb:e9:4f:04:b0:96:a5:b4:3f:89:2c:d5:c9:cd:95:6c:38:cc:
-        68:f3:3c:1b:0f:0e:c6:d2:b8:bc:8e:5a:97:66:eb:b7:9e:c1:
-        3a:0c:17:74:e8:4c:91:5b:33:e4:3f:b5:1c:d7:91:e2:6f:5b:
-        9c:27:ad:00:c6:30:49:ba:2e:a0:8d:a1:6f:c5:97:e5:b7:58:
-        ca:ee:8c:71:4e:3c:7a:f1:82:fc:6e:74:77:53:e5:d1:7a:02:
-        35:c2:6b:91:7a:38:2c:17:42:45:2a:a6:b3:e9:e2:7e:80:a0:
-        b4:7d:dc:a8:4b:76:34:92:cf:87:76:b8:a8:31:b5:a7:1d:cf:
-        93:10:bf:1d:bc:5a:65:1e:95:17:8c:4c:d6:5a:b4:08:a4:b7:
-        9c:99:3a:a9:b4:45:c1:aa:5a:62:7f:6e:25:63:01:c3:e3:ad:
-        c0:1a:d7:5d:75:07:60:93:73:8e:9e:1e:7c:96:2d:39:b8:1b:
-        85:4a:9e:8f:b9:2e:eb:94:c4:83:43:60:87:30:26:0b:9f:26:
-        a9:02:81:4a:df:20:08:e0:2c:8f:b8:c5:96:38:7e:b8:c8:88:
-        32:e6:d4:ab:e4:13:4e:fe:66:fc:77:ef:e4:1c:5a:76:8d:60:
-        e4:f9:d7:be:ed:94:f2:92:e3:b5:5c:28:ea:a4:2d:d6:b6:76:
-        64:4b:d4:f1:3a:eb:22:08:b0:f0:a9:31:1a:1d:e4:59:c3:07:
-        7b:28:ed:55:ac:e6:bf:da:21:ce:44:77:79:10:a5:5c:66:b3:
-        a7:65:e1:15:59:81:f7:48:f4:eb:83:2a:08:1b:4f:08:0b:fd:
-        2c:22:21:a7:c7:6b:87:d1
------BEGIN CERTIFICATE-----
-MIIDtzCCAZ+gAwIBAgIBFTANBgkqhkiG9w0BAQUFADBaMQswCQYDVQQGEwJLUjET
-MBEGA1UECBMKS3l1bmdHaS1EbzERMA8GA1UEBxMIU3V3b24tU2kxFjAUBgNVBAoT
-DVNhbXN1bmcgRWxlYy4xCzAJBgNVBAMTAkNBMB4XDTA5MDMxNDExMzU0MloXDTEw
-MDMxNDExMzU0MlowUzELMAkGA1UEBhMCS1IxEzARBgNVBAgTCkt5dW5nR2ktRG8x
-FjAUBgNVBAoTDVNhbXN1bmcgRWxlYy4xFzAVBgNVBAMTDk9DU1AgUmVzcG9uZGVy
-MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQC5DoAg/HRJCMuDh3bkQgNCblYb
-rnNDm6bPXTMdN8+1Irx5XmppAj7iCMX1vu7v30+FQaJf03Y5P2FWFB/BzOxF47Li
-sOggn6nnirjtP+Rvhtjl1Tv+R+iPUe7dtn82a8d193gE36xRsyVlBKsNztteOttq
-j9ppRseS8rO6bJA9cQIDAQABoxMwETAPBgkrBgEFBQcwAQUEAgUAMA0GCSqGSIb3
-DQEBBQUAA4ICAQCAkSFrMBWZOOFcdIJ9JfDuFctE8AEWPRcJf45zvzs0UscdD/aP
-MDR218K5lRSgAfiT3v9ifsF58t7izw34mrNqq8/PaBKf4oF7BR8nNKb2aJxGRc3V
-Atd94Nm173v2e1zZKa7yVd0Qelh0vO+pm5+o5ImZ8N8+1Mlkhfr6FdDSICwHSVVD
-UPQK/dwg5c/V59YsZa8YNxN49d1uQ6GqvpMgvkwfcUcQyxxIYlqAxtWkI8AGoOXX
-1bK7Ttj+z9euk867q5YH+KP76U8EsJaltD+JLNXJzZVsOMxo8zwbDw7G0ri8jlqX
-Zuu3nsE6DBd06EyRWzPkP7Uc15Hib1ucJ60AxjBJui6gjaFvxZflt1jK7oxxTjx6
-8YL8bnR3U+XRegI1wmuRejgsF0JFKqaz6eJ+gKC0fdyoS3Y0ks+HdrioMbWnHc+T
-EL8dvFplHpUXjEzWWrQIpLecmTqptEXBqlpif24lYwHD463AGtdddQdgk3OOnh58
-li05uBuFSp6PuS7rlMSDQ2CHMCYLnyapAoFK3yAI4CyPuMWWOH64yIgy5tSr5BNO
-/mb8d+/kHFp2jWDk+de+7ZTykuO1XCjqpC3WtnZkS9TxOusiCLDwqTEaHeRZwwd7
-KO1VrOa/2iHORHd5EKVcZrOnZeEVWYH3SPTrgyoIG08IC/0sIiGnx2uH0Q==
------END CERTIFICATE-----
diff --git a/tests/cert-svc/data/TestData/ssl/demoCA/newcerts/16.pem b/tests/cert-svc/data/TestData/ssl/demoCA/newcerts/16.pem
deleted file mode 100644 (file)
index 30ab2f1..0000000
+++ /dev/null
@@ -1,81 +0,0 @@
-Certificate:
-    Data:
-        Version: 3 (0x2)
-        Serial Number: 22 (0x16)
-        Signature Algorithm: sha1WithRSAEncryption
-        Issuer: C=KR, ST=KyungGi-Do, L=Suwon-Si, O=Samsung Elec., CN=CA
-        Validity
-            Not Before: Mar 14 13:48:12 2009 GMT
-            Not After : Mar 14 13:48:12 2010 GMT
-        Subject: C=KR, ST=KyungGi-Do, O=Samsung Elec., CN=First certificate to test OCSP
-        Subject Public Key Info:
-            Public Key Algorithm: rsaEncryption
-            RSA Public Key: (1024 bit)
-                Modulus (1024 bit):
-                    00:c0:a9:51:63:19:e2:cc:f3:9d:19:d8:75:90:ab:
-                    13:40:a3:3f:9d:dc:ef:48:42:0d:00:36:db:ea:68:
-                    fd:b9:15:34:a9:af:0f:52:2b:57:2e:03:74:13:41:
-                    b4:59:69:7e:f6:e1:54:42:8d:c3:f4:85:2b:ff:07:
-                    97:a4:2f:5b:e4:13:be:72:ef:65:e7:59:be:ed:14:
-                    71:82:cc:09:03:50:99:66:08:34:1a:41:45:e6:e3:
-                    37:98:32:6a:15:d4:32:63:f7:26:6c:5a:ed:45:bd:
-                    bb:aa:be:33:4b:9c:cb:b2:03:13:e3:2d:6f:61:57:
-                    2a:e8:e8:44:0f:59:ea:e7:bf
-                Exponent: 65537 (0x10001)
-        X509v3 extensions:
-            Authority Information Access: 
-                OCSP - URI:http://127.0.0.1:85/0007
-
-    Signature Algorithm: sha1WithRSAEncryption
-        b1:9e:ce:8d:09:9e:f9:21:6f:be:f2:a7:54:6e:24:82:e3:2b:
-        88:b7:0d:e0:e2:49:33:b4:8b:ad:60:71:cc:20:23:57:cf:17:
-        a8:46:c0:a7:1a:5f:8e:8d:1a:cc:0b:1b:da:a4:34:b1:d7:74:
-        1b:a7:e4:71:a1:2d:fd:2e:18:51:02:2c:93:ff:a9:f7:98:bd:
-        ed:6b:4c:55:8e:24:f6:97:8e:8a:80:56:52:7a:17:da:94:96:
-        fa:27:78:8c:65:40:a6:b1:d2:2a:13:fe:76:c0:0c:f2:04:3f:
-        d1:88:25:c3:5a:05:ca:33:d7:bb:27:e2:8b:e8:d4:00:fd:fc:
-        b6:a8:9d:27:c2:f9:ea:98:32:79:85:9d:a3:e7:bf:78:65:e8:
-        15:ef:49:48:87:a9:b2:b4:c4:cb:ec:a7:da:90:36:d6:c5:6f:
-        ff:c3:85:19:13:0b:27:6a:d3:c4:e7:97:62:08:49:a3:e9:22:
-        9a:3c:d1:91:8f:6e:8e:87:47:0e:38:43:8e:5a:84:f6:9c:24:
-        c1:9f:90:29:dc:38:73:72:7d:3f:d6:7f:dd:b3:d1:1d:cf:7b:
-        bc:31:a6:6b:b4:be:10:06:94:69:a0:16:ef:bd:e9:e7:a2:8b:
-        18:e1:10:27:7f:9d:8a:f9:60:18:d5:93:54:d6:4e:c2:31:bf:
-        37:00:db:d5:cf:85:da:e9:7b:e4:bb:48:f3:a5:6e:ba:48:1b:
-        50:6a:10:99:f8:77:81:95:78:1b:d0:fe:d0:74:47:28:05:34:
-        32:32:5f:1f:52:42:85:f8:7a:f1:a8:87:ff:2f:6c:ec:83:09:
-        91:85:0a:43:ce:35:a2:7f:94:b6:ae:70:94:b6:0f:c9:c7:8a:
-        ee:7c:a7:32:8a:ee:c3:e1:ee:01:34:c1:b8:db:98:80:4c:ac:
-        5f:ac:18:02:fa:f5:c1:36:df:39:57:57:81:b9:26:d0:81:0e:
-        75:79:18:21:29:a6:cb:eb:97:58:f2:dd:8a:88:c1:a2:c7:54:
-        9f:97:89:b1:ef:ff:11:5f:18:0a:cd:25:3e:d8:35:07:45:55:
-        1e:bb:a2:54:fc:66:ac:0f:ac:2a:77:d6:1a:a4:44:cc:5a:49:
-        37:45:70:5b:c9:3d:2c:6d:c1:7e:af:4d:9c:4f:2a:a2:d9:01:
-        3d:e2:7f:a4:f2:4b:d7:60:b1:06:a3:b4:46:35:43:1c:be:79:
-        46:a7:8a:50:ee:22:4f:b8:57:45:c9:83:8a:65:bb:7a:86:b3:
-        30:3a:7c:62:d3:b7:08:34:a7:05:0a:44:a7:57:5c:2b:b6:34:
-        03:ea:3a:61:06:c9:f2:65:16:f2:20:c5:32:0a:61:20:c9:f7:
-        07:2e:e8:d2:f2:67:c4:64
------BEGIN CERTIFICATE-----
-MIID7DCCAdSgAwIBAgIBFjANBgkqhkiG9w0BAQUFADBaMQswCQYDVQQGEwJLUjET
-MBEGA1UECBMKS3l1bmdHaS1EbzERMA8GA1UEBxMIU3V3b24tU2kxFjAUBgNVBAoT
-DVNhbXN1bmcgRWxlYy4xCzAJBgNVBAMTAkNBMB4XDTA5MDMxNDEzNDgxMloXDTEw
-MDMxNDEzNDgxMlowYzELMAkGA1UEBhMCS1IxEzARBgNVBAgTCkt5dW5nR2ktRG8x
-FjAUBgNVBAoTDVNhbXN1bmcgRWxlYy4xJzAlBgNVBAMTHkZpcnN0IGNlcnRpZmlj
-YXRlIHRvIHRlc3QgT0NTUDCBnzANBgkqhkiG9w0BAQEFAAOBjQAwgYkCgYEAwKlR
-YxnizPOdGdh1kKsTQKM/ndzvSEINADbb6mj9uRU0qa8PUitXLgN0E0G0WWl+9uFU
-Qo3D9IUr/weXpC9b5BO+cu9l51m+7RRxgswJA1CZZgg0GkFF5uM3mDJqFdQyY/cm
-bFrtRb27qr4zS5zLsgMT4y1vYVcq6OhED1nq578CAwEAAaM4MDYwNAYIKwYBBQUH
-AQEEKDAmMCQGCCsGAQUFBzABhhhodHRwOi8vMTI3LjAuMC4xOjg1LzAwMDcwDQYJ
-KoZIhvcNAQEFBQADggIBALGezo0Jnvkhb77yp1RuJILjK4i3DeDiSTO0i61gccwg
-I1fPF6hGwKcaX46NGswLG9qkNLHXdBun5HGhLf0uGFECLJP/qfeYve1rTFWOJPaX
-joqAVlJ6F9qUlvoneIxlQKax0ioT/nbADPIEP9GIJcNaBcoz17sn4ovo1AD9/Lao
-nSfC+eqYMnmFnaPnv3hl6BXvSUiHqbK0xMvsp9qQNtbFb//DhRkTCydq08Tnl2II
-SaPpIpo80ZGPbo6HRw44Q45ahPacJMGfkCncOHNyfT/Wf92z0R3Pe7wxpmu0vhAG
-lGmgFu+96eeiixjhECd/nYr5YBjVk1TWTsIxvzcA29XPhdrpe+S7SPOlbrpIG1Bq
-EJn4d4GVeBvQ/tB0RygFNDIyXx9SQoX4evGoh/8vbOyDCZGFCkPONaJ/lLaucJS2
-D8nHiu58pzKK7sPh7gE0wbjbmIBMrF+sGAL69cE23zlXV4G5JtCBDnV5GCEppsvr
-l1jy3YqIwaLHVJ+XibHv/xFfGArNJT7YNQdFVR67olT8ZqwPrCp31hqkRMxaSTdF
-cFvJPSxtwX6vTZxPKqLZAT3if6TyS9dgsQajtEY1Qxy+eUanilDuIk+4V0XJg4pl
-u3qGszA6fGLTtwg0pwUKRKdXXCu2NAPqOmEGyfJlFvIgxTIKYSDJ9wcu6NLyZ8Rk
------END CERTIFICATE-----
diff --git a/tests/cert-svc/data/TestData/ssl/demoCA/newcerts/17.pem b/tests/cert-svc/data/TestData/ssl/demoCA/newcerts/17.pem
deleted file mode 100644 (file)
index 0371f9d..0000000
+++ /dev/null
@@ -1,92 +0,0 @@
-Certificate:
-    Data:
-        Version: 3 (0x2)
-        Serial Number: 23 (0x17)
-        Signature Algorithm: sha1WithRSAEncryption
-        Issuer: C=KR, ST=KyungGi-Do, L=Suwon-Si, O=Samsung Elec., CN=CA
-        Validity
-            Not Before: Mar 16 05:36:43 2009 GMT
-            Not After : Mar 16 05:36:43 2010 GMT
-        Subject: C=KR, ST=KyungGi-Do, O=Samsung Elec., CN=First certificate to test OCSP
-        Subject Public Key Info:
-            Public Key Algorithm: rsaEncryption
-            RSA Public Key: (1024 bit)
-                Modulus (1024 bit):
-                    00:c0:a9:51:63:19:e2:cc:f3:9d:19:d8:75:90:ab:
-                    13:40:a3:3f:9d:dc:ef:48:42:0d:00:36:db:ea:68:
-                    fd:b9:15:34:a9:af:0f:52:2b:57:2e:03:74:13:41:
-                    b4:59:69:7e:f6:e1:54:42:8d:c3:f4:85:2b:ff:07:
-                    97:a4:2f:5b:e4:13:be:72:ef:65:e7:59:be:ed:14:
-                    71:82:cc:09:03:50:99:66:08:34:1a:41:45:e6:e3:
-                    37:98:32:6a:15:d4:32:63:f7:26:6c:5a:ed:45:bd:
-                    bb:aa:be:33:4b:9c:cb:b2:03:13:e3:2d:6f:61:57:
-                    2a:e8:e8:44:0f:59:ea:e7:bf
-                Exponent: 65537 (0x10001)
-        X509v3 extensions:
-            X509v3 Basic Constraints: 
-                CA:FALSE
-            Netscape Comment: 
-                OpenSSL Generated Certificate
-            X509v3 Subject Key Identifier: 
-                6C:00:26:BD:98:D4:60:DD:06:EA:CA:73:09:35:6A:7E:1F:92:D9:59
-            X509v3 Authority Key Identifier: 
-                DirName:/C=KR/ST=KyungGi-Do/L=Suwon-Si/O=Samsung Elec./CN=CA
-                serial:F2:5B:40:5B:C2:B7:D0:64
-
-    Signature Algorithm: sha1WithRSAEncryption
-        5b:8c:6e:80:cd:e0:8f:cc:7d:a4:c1:d6:61:9a:78:93:eb:04:
-        85:60:12:e1:1c:6d:0d:2e:fa:2a:1e:c9:08:ac:b5:6d:a8:00:
-        c8:8b:e5:1d:72:80:5a:df:d1:c9:88:10:a6:fe:35:62:11:72:
-        5f:08:e7:94:f2:0a:0b:79:0e:04:9f:4f:16:d9:45:10:67:c4:
-        5e:a2:34:a6:89:f9:67:3c:88:9e:82:d4:d4:28:42:ce:bd:c8:
-        0a:cf:b6:9f:a9:7f:a1:5d:21:58:95:64:bd:84:24:2c:00:bf:
-        29:ea:b6:f6:d2:b4:b9:03:6b:34:81:cb:5d:a8:fb:55:96:99:
-        1a:71:94:cf:37:7e:83:c5:01:a6:cb:cd:38:06:27:49:99:56:
-        38:06:19:f7:62:80:24:8c:4f:79:0f:2d:a4:b8:cc:6e:4b:35:
-        5a:d2:8e:f1:26:b4:fb:d7:85:0d:7f:c6:a2:a3:20:e5:48:b8:
-        0b:ee:a0:7d:a9:6d:e2:88:41:ee:f6:47:a6:1f:52:c2:ca:6c:
-        d9:d0:53:0f:a3:db:ee:12:0f:56:cf:51:75:70:9a:1a:02:c4:
-        ff:7e:46:77:75:1b:d6:d9:e2:7b:fb:a6:0f:11:49:9f:59:5d:
-        2c:d8:0f:61:eb:c4:8f:51:1a:95:ae:dd:33:0e:da:40:90:67:
-        6b:a3:7b:4d:9d:a2:53:37:c1:98:a5:c1:f5:b4:a6:dd:5e:ac:
-        b3:d3:ef:9d:1a:bc:15:1b:cb:8b:b7:73:ba:bd:3d:b9:6a:18:
-        e2:a2:ad:d8:54:5e:ea:81:71:ad:a1:e2:83:c9:89:3c:83:35:
-        92:80:65:46:aa:45:45:4f:a3:c5:a4:a3:32:43:05:ec:a4:9f:
-        61:5a:14:1a:0b:5b:6e:84:bf:d7:1d:fe:20:eb:c0:45:d4:92:
-        f2:56:09:12:dd:1a:0d:75:9d:43:0b:0b:71:0d:c7:1b:38:63:
-        b5:75:7b:f2:3e:d6:0d:07:21:ab:73:51:fe:e3:0f:36:b4:33:
-        d3:94:f2:ae:42:24:b1:2e:9d:68:69:18:d2:5a:1e:64:a6:67:
-        d2:40:f9:de:b5:d5:dd:15:72:de:05:a0:43:c7:b9:13:bd:e5:
-        10:fd:52:f1:27:0f:95:5a:a4:cd:5a:ba:c6:7c:bd:14:4e:46:
-        51:b1:b9:00:98:23:16:ce:ae:0a:6c:11:67:18:73:e7:d1:aa:
-        e9:6e:99:82:b7:2b:f2:e7:8c:8e:b5:2a:76:16:14:57:93:5e:
-        a4:7a:ec:f5:96:90:22:88:66:ca:3c:8b:92:95:2c:21:3f:a0:
-        9e:56:c5:c2:27:1a:d8:9e:fa:fd:da:3b:96:52:cc:94:cf:5f:
-        d3:a8:b0:c0:f5:7c:58:f6
------BEGIN CERTIFICATE-----
-MIIEhjCCAm6gAwIBAgIBFzANBgkqhkiG9w0BAQUFADBaMQswCQYDVQQGEwJLUjET
-MBEGA1UECBMKS3l1bmdHaS1EbzERMA8GA1UEBxMIU3V3b24tU2kxFjAUBgNVBAoT
-DVNhbXN1bmcgRWxlYy4xCzAJBgNVBAMTAkNBMB4XDTA5MDMxNjA1MzY0M1oXDTEw
-MDMxNjA1MzY0M1owYzELMAkGA1UEBhMCS1IxEzARBgNVBAgTCkt5dW5nR2ktRG8x
-FjAUBgNVBAoTDVNhbXN1bmcgRWxlYy4xJzAlBgNVBAMTHkZpcnN0IGNlcnRpZmlj
-YXRlIHRvIHRlc3QgT0NTUDCBnzANBgkqhkiG9w0BAQEFAAOBjQAwgYkCgYEAwKlR
-YxnizPOdGdh1kKsTQKM/ndzvSEINADbb6mj9uRU0qa8PUitXLgN0E0G0WWl+9uFU
-Qo3D9IUr/weXpC9b5BO+cu9l51m+7RRxgswJA1CZZgg0GkFF5uM3mDJqFdQyY/cm
-bFrtRb27qr4zS5zLsgMT4y1vYVcq6OhED1nq578CAwEAAaOB0TCBzjAJBgNVHRME
-AjAAMCwGCWCGSAGG+EIBDQQfFh1PcGVuU1NMIEdlbmVyYXRlZCBDZXJ0aWZpY2F0
-ZTAdBgNVHQ4EFgQUbAAmvZjUYN0G6spzCTVqfh+S2VkwdAYDVR0jBG0wa6FepFww
-WjELMAkGA1UEBhMCS1IxEzARBgNVBAgTCkt5dW5nR2ktRG8xETAPBgNVBAcTCFN1
-d29uLVNpMRYwFAYDVQQKEw1TYW1zdW5nIEVsZWMuMQswCQYDVQQDEwJDQYIJAPJb
-QFvCt9BkMA0GCSqGSIb3DQEBBQUAA4ICAQBbjG6AzeCPzH2kwdZhmniT6wSFYBLh
-HG0NLvoqHskIrLVtqADIi+UdcoBa39HJiBCm/jViEXJfCOeU8goLeQ4En08W2UUQ
-Z8ReojSmiflnPIiegtTUKELOvcgKz7afqX+hXSFYlWS9hCQsAL8p6rb20rS5A2s0
-gctdqPtVlpkacZTPN36DxQGmy804BidJmVY4Bhn3YoAkjE95Dy2kuMxuSzVa0o7x
-JrT714UNf8aioyDlSLgL7qB9qW3iiEHu9kemH1LCymzZ0FMPo9vuEg9Wz1F1cJoa
-AsT/fkZ3dRvW2eJ7+6YPEUmfWV0s2A9h68SPURqVrt0zDtpAkGdro3tNnaJTN8GY
-pcH1tKbdXqyz0++dGrwVG8uLt3O6vT25ahjioq3YVF7qgXGtoeKDyYk8gzWSgGVG
-qkVFT6PFpKMyQwXspJ9hWhQaC1tuhL/XHf4g68BF1JLyVgkS3RoNdZ1DCwtxDccb
-OGO1dXvyPtYNByGrc1H+4w82tDPTlPKuQiSxLp1oaRjSWh5kpmfSQPnetdXdFXLe
-BaBDx7kTveUQ/VLxJw+VWqTNWrrGfL0UTkZRsbkAmCMWzq4KbBFnGHPn0arpbpmC
-tyvy54yOtSp2FhRXk16keuz1lpAiiGbKPIuSlSwhP6CeVsXCJxrYnvr92juWUsyU
-z1/TqLDA9XxY9g==
------END CERTIFICATE-----
diff --git a/tests/cert-svc/data/TestData/ssl/demoCA/newcerts/18.pem b/tests/cert-svc/data/TestData/ssl/demoCA/newcerts/18.pem
deleted file mode 100644 (file)
index 0e189f1..0000000
+++ /dev/null
@@ -1,92 +0,0 @@
-Certificate:
-    Data:
-        Version: 3 (0x2)
-        Serial Number: 24 (0x18)
-        Signature Algorithm: sha1WithRSAEncryption
-        Issuer: C=KR, ST=KyungGi-Do, L=Suwon-Si, O=Samsung Elec., CN=CA
-        Validity
-            Not Before: Mar 16 05:38:34 2009 GMT
-            Not After : Mar 16 05:38:34 2010 GMT
-        Subject: C=KR, ST=KyungGi-Do, O=Samsung Elec., CN=First certificate to test OCSP
-        Subject Public Key Info:
-            Public Key Algorithm: rsaEncryption
-            RSA Public Key: (1024 bit)
-                Modulus (1024 bit):
-                    00:c0:a9:51:63:19:e2:cc:f3:9d:19:d8:75:90:ab:
-                    13:40:a3:3f:9d:dc:ef:48:42:0d:00:36:db:ea:68:
-                    fd:b9:15:34:a9:af:0f:52:2b:57:2e:03:74:13:41:
-                    b4:59:69:7e:f6:e1:54:42:8d:c3:f4:85:2b:ff:07:
-                    97:a4:2f:5b:e4:13:be:72:ef:65:e7:59:be:ed:14:
-                    71:82:cc:09:03:50:99:66:08:34:1a:41:45:e6:e3:
-                    37:98:32:6a:15:d4:32:63:f7:26:6c:5a:ed:45:bd:
-                    bb:aa:be:33:4b:9c:cb:b2:03:13:e3:2d:6f:61:57:
-                    2a:e8:e8:44:0f:59:ea:e7:bf
-                Exponent: 65537 (0x10001)
-        X509v3 extensions:
-            X509v3 Basic Constraints: 
-                CA:FALSE
-            Netscape Comment: 
-                OpenSSL Generated Certificate
-            X509v3 Subject Key Identifier: 
-                6C:00:26:BD:98:D4:60:DD:06:EA:CA:73:09:35:6A:7E:1F:92:D9:59
-            X509v3 Authority Key Identifier: 
-                DirName:/C=KR/ST=KyungGi-Do/L=Suwon-Si/O=Samsung Elec./CN=CA
-                serial:F2:5B:40:5B:C2:B7:D0:64
-
-    Signature Algorithm: sha1WithRSAEncryption
-        5e:a6:39:dd:09:b5:6e:ef:1c:05:01:1b:91:7b:cc:26:66:0b:
-        53:f0:69:1b:ae:7e:10:42:ef:38:c7:ce:09:0f:17:c9:28:df:
-        7d:ab:e2:b6:ab:8d:56:17:38:db:e7:b0:2a:52:e0:ec:16:6a:
-        cf:db:8b:31:4f:bb:88:89:2e:24:1c:db:a3:b1:c9:fb:d5:9b:
-        e2:58:1d:6d:ca:cc:14:79:cc:e0:b1:27:8f:2a:a2:60:90:dc:
-        7e:bf:52:65:1d:81:14:18:65:d4:f4:af:43:00:bc:88:50:4b:
-        ef:14:1a:5f:d2:7e:64:0e:fd:e0:26:cb:09:f8:b7:04:49:3e:
-        6f:56:88:fa:0d:9e:23:90:06:98:ff:75:06:29:09:9b:df:21:
-        69:e9:fa:53:a4:c0:9a:06:a7:e2:50:03:e8:13:32:db:a0:62:
-        5f:a6:0e:3b:7f:0a:d8:f7:62:56:2e:ca:4b:f7:cb:59:00:d8:
-        15:32:57:fc:67:24:8e:38:c1:7f:3a:a6:ca:ac:29:5b:b6:e6:
-        e5:2b:5a:f4:52:16:e3:5b:00:f1:46:c9:29:9b:75:e3:e3:28:
-        69:fa:cb:52:69:5c:96:1b:2d:a2:ee:26:e3:df:10:fe:67:31:
-        7f:bf:3a:7c:81:8c:87:1c:7c:ba:11:96:21:23:02:f9:ab:d8:
-        a7:33:ca:b2:47:12:07:c8:c7:a1:67:2a:1f:81:0d:11:f6:12:
-        c2:5e:b3:82:77:fb:d6:6e:a9:e5:0e:b3:5c:49:da:c5:b6:0a:
-        3b:55:80:8a:b5:0d:ce:94:64:3f:68:f4:e9:4a:00:5b:1b:19:
-        a2:29:bc:2f:a4:7c:23:ee:30:c4:48:7e:8b:c5:65:f4:1b:cc:
-        4c:5e:dc:fb:38:ed:2d:8e:2b:d8:e4:65:d4:bd:9f:9e:6f:08:
-        d0:35:24:86:72:f8:0d:ec:e0:15:49:ed:2a:67:43:13:88:f8:
-        fa:1f:03:e1:cb:14:e4:3c:5d:f9:78:b1:1c:a6:20:05:22:b1:
-        dc:e2:3d:d4:1c:62:a6:32:61:03:ce:2a:3c:bc:08:57:65:de:
-        ec:cf:26:ef:fd:1d:b8:91:f1:a7:e5:d9:2c:94:70:cb:e4:9c:
-        c6:78:b6:f3:ff:e4:9b:89:aa:fa:30:1d:62:0a:a7:ba:59:57:
-        7b:40:f4:bb:47:1a:80:a7:f3:f4:da:ea:2f:e5:96:0b:7f:39:
-        f7:66:0c:bb:c3:33:c9:2d:9d:36:eb:29:6a:31:1b:b9:f6:31:
-        3c:b7:fc:18:29:0f:67:a4:ca:6c:db:56:b2:fe:17:37:4d:35:
-        38:c5:e8:62:b0:94:3a:ba:da:f6:4b:6c:81:22:05:90:60:ba:
-        0d:0c:d8:d8:e2:c8:33:6a
------BEGIN CERTIFICATE-----
-MIIEhjCCAm6gAwIBAgIBGDANBgkqhkiG9w0BAQUFADBaMQswCQYDVQQGEwJLUjET
-MBEGA1UECBMKS3l1bmdHaS1EbzERMA8GA1UEBxMIU3V3b24tU2kxFjAUBgNVBAoT
-DVNhbXN1bmcgRWxlYy4xCzAJBgNVBAMTAkNBMB4XDTA5MDMxNjA1MzgzNFoXDTEw
-MDMxNjA1MzgzNFowYzELMAkGA1UEBhMCS1IxEzARBgNVBAgTCkt5dW5nR2ktRG8x
-FjAUBgNVBAoTDVNhbXN1bmcgRWxlYy4xJzAlBgNVBAMTHkZpcnN0IGNlcnRpZmlj
-YXRlIHRvIHRlc3QgT0NTUDCBnzANBgkqhkiG9w0BAQEFAAOBjQAwgYkCgYEAwKlR
-YxnizPOdGdh1kKsTQKM/ndzvSEINADbb6mj9uRU0qa8PUitXLgN0E0G0WWl+9uFU
-Qo3D9IUr/weXpC9b5BO+cu9l51m+7RRxgswJA1CZZgg0GkFF5uM3mDJqFdQyY/cm
-bFrtRb27qr4zS5zLsgMT4y1vYVcq6OhED1nq578CAwEAAaOB0TCBzjAJBgNVHRME
-AjAAMCwGCWCGSAGG+EIBDQQfFh1PcGVuU1NMIEdlbmVyYXRlZCBDZXJ0aWZpY2F0
-ZTAdBgNVHQ4EFgQUbAAmvZjUYN0G6spzCTVqfh+S2VkwdAYDVR0jBG0wa6FepFww
-WjELMAkGA1UEBhMCS1IxEzARBgNVBAgTCkt5dW5nR2ktRG8xETAPBgNVBAcTCFN1
-d29uLVNpMRYwFAYDVQQKEw1TYW1zdW5nIEVsZWMuMQswCQYDVQQDEwJDQYIJAPJb
-QFvCt9BkMA0GCSqGSIb3DQEBBQUAA4ICAQBepjndCbVu7xwFARuRe8wmZgtT8Gkb
-rn4QQu84x84JDxfJKN99q+K2q41WFzjb57AqUuDsFmrP24sxT7uIiS4kHNujscn7
-1ZviWB1tyswUeczgsSePKqJgkNx+v1JlHYEUGGXU9K9DALyIUEvvFBpf0n5kDv3g
-JssJ+LcEST5vVoj6DZ4jkAaY/3UGKQmb3yFp6fpTpMCaBqfiUAPoEzLboGJfpg47
-fwrY92JWLspL98tZANgVMlf8ZySOOMF/OqbKrClbtublK1r0UhbjWwDxRskpm3Xj
-4yhp+stSaVyWGy2i7ibj3xD+ZzF/vzp8gYyHHHy6EZYhIwL5q9inM8qyRxIHyMeh
-ZyofgQ0R9hLCXrOCd/vWbqnlDrNcSdrFtgo7VYCKtQ3OlGQ/aPTpSgBbGxmiKbwv
-pHwj7jDESH6LxWX0G8xMXtz7OO0tjivY5GXUvZ+ebwjQNSSGcvgN7OAVSe0qZ0MT
-iPj6HwPhyxTkPF35eLEcpiAFIrHc4j3UHGKmMmEDzio8vAhXZd7szybv/R24kfGn
-5dkslHDL5JzGeLbz/+Sbiar6MB1iCqe6WVd7QPS7RxqAp/P02uov5ZYLfzn3Zgy7
-wzPJLZ026ylqMRu59jE8t/wYKQ9npMps21ay/hc3TTU4xehisJQ6utr2S2yBIgWQ
-YLoNDNjY4sgzag==
------END CERTIFICATE-----
diff --git a/tests/cert-svc/data/TestData/ssl/demoCA/newcerts/19.pem b/tests/cert-svc/data/TestData/ssl/demoCA/newcerts/19.pem
deleted file mode 100644 (file)
index 5e6f035..0000000
+++ /dev/null
@@ -1,82 +0,0 @@
-Certificate:
-    Data:
-        Version: 3 (0x2)
-        Serial Number: 25 (0x19)
-        Signature Algorithm: sha1WithRSAEncryption
-        Issuer: C=KR, ST=KyungGi-Do, L=Suwon-Si, O=Samsung Elec., CN=CA
-        Validity
-            Not Before: Mar 16 06:18:33 2009 GMT
-            Not After : Mar 16 06:18:33 2010 GMT
-        Subject: C=KR, ST=KyungGi-Do, O=Samsung Elec., CN=Second Responder Certificate
-        Subject Public Key Info:
-            Public Key Algorithm: rsaEncryption
-            RSA Public Key: (1024 bit)
-                Modulus (1024 bit):
-                    00:aa:01:31:49:34:0e:6c:b5:25:a0:da:35:71:cf:
-                    9d:a7:c4:ad:27:31:ee:c2:46:fe:03:8f:4f:ed:f7:
-                    75:d5:b9:01:c6:a9:8f:8d:17:ca:8c:82:82:63:ed:
-                    08:d4:05:9e:31:3c:c9:66:59:41:72:63:8e:01:3e:
-                    a2:39:d1:9c:51:9c:c5:9a:ad:72:0d:e6:2b:19:ba:
-                    45:a6:18:f6:e2:79:72:4b:5e:79:74:38:b5:86:9c:
-                    57:bb:2c:e8:f5:57:9b:32:34:86:2a:2f:40:2f:5d:
-                    dd:9c:f5:63:d4:2e:ad:b1:d3:25:22:7c:86:89:84:
-                    c9:26:70:3c:c8:11:64:ed:47
-                Exponent: 65537 (0x10001)
-        X509v3 extensions:
-            X509v3 Extended Key Usage: 
-                OCSP Signing
-            OCSP No Check: 
-
-    Signature Algorithm: sha1WithRSAEncryption
-        23:9f:5b:21:e4:9f:c8:2f:37:b9:e4:84:fa:72:b5:16:b1:59:
-        1d:5a:76:1a:be:ce:e2:08:d1:0e:0e:a1:ed:0a:5f:71:68:4e:
-        7e:34:f2:7f:3c:2d:5a:d2:a3:2d:b1:91:a6:46:c4:13:ac:5f:
-        2f:35:23:f2:d9:19:16:74:ee:1e:18:b8:43:7c:d0:7a:33:96:
-        0b:ae:12:be:91:68:1b:98:7f:b3:5e:a2:c1:d8:64:e9:b6:24:
-        3c:ef:f3:b7:0a:66:f9:8b:9b:9d:30:10:f5:95:97:83:41:6e:
-        22:f7:1c:19:d6:da:6a:92:e1:28:79:f7:7d:60:12:f8:fe:e1:
-        79:f7:8b:b5:04:a3:9d:b5:cb:a7:e6:b2:50:a4:48:ee:e6:d5:
-        6e:ea:b6:3a:ca:c8:11:3a:4d:c1:20:e5:4b:d2:59:f3:af:40:
-        a9:4f:aa:81:1a:2d:4b:c2:99:43:fa:11:05:85:11:cf:ec:9b:
-        b3:96:4e:62:8e:3e:3c:64:82:df:50:ab:6a:31:e6:66:35:c0:
-        c5:dd:c2:a3:ba:f1:2b:66:7f:19:ba:3e:05:e8:e4:69:48:33:
-        9a:89:39:2c:dc:b1:98:02:b5:18:8d:11:54:a9:40:27:2b:38:
-        42:a4:fc:ea:46:80:0a:07:c7:a6:af:0a:2a:47:6d:bb:44:e8:
-        3e:b7:27:ba:7b:1f:3a:00:c5:7f:de:96:88:dd:6b:bc:65:19:
-        8f:39:96:53:13:78:4d:59:d8:76:5b:17:eb:57:71:2d:fb:2a:
-        b5:c9:d3:ea:af:9b:7c:39:88:82:c5:13:8a:d8:d5:4c:f5:90:
-        25:dd:11:ef:f4:d2:5b:4f:e7:d8:d7:ee:c6:7b:2f:59:6d:55:
-        54:3f:6e:ac:16:f4:3d:8a:b3:76:65:f6:13:6c:e8:6d:68:bf:
-        2b:79:66:ed:9a:02:e7:4e:3b:65:cd:de:38:84:bc:7b:56:a2:
-        e6:bb:88:f1:54:71:eb:4d:04:e7:13:80:44:73:53:66:90:ef:
-        c7:c4:cf:e6:87:91:2c:cf:23:06:95:16:08:90:6a:9d:df:06:
-        51:89:39:f0:61:5c:b8:79:7d:c4:ad:c4:4c:26:30:3d:13:bc:
-        ac:4f:bb:69:42:e1:28:89:1d:ac:1e:a7:81:86:4e:fd:4d:ba:
-        06:a4:9b:33:06:e0:39:76:52:52:12:eb:c4:be:f5:e9:c9:ff:
-        73:df:f2:6c:73:27:64:60:5d:1b:5f:9c:07:8e:89:10:a3:27:
-        15:0e:7b:08:1e:a2:57:8c:f2:a5:e6:4c:86:4a:03:7a:45:a1:
-        ee:40:71:15:17:55:a3:7d:24:33:b3:57:46:11:07:c6:19:a0:
-        50:aa:3a:97:7a:41:36:dc
------BEGIN CERTIFICATE-----
-MIID2jCCAcKgAwIBAgIBGTANBgkqhkiG9w0BAQUFADBaMQswCQYDVQQGEwJLUjET
-MBEGA1UECBMKS3l1bmdHaS1EbzERMA8GA1UEBxMIU3V3b24tU2kxFjAUBgNVBAoT
-DVNhbXN1bmcgRWxlYy4xCzAJBgNVBAMTAkNBMB4XDTA5MDMxNjA2MTgzM1oXDTEw
-MDMxNjA2MTgzM1owYTELMAkGA1UEBhMCS1IxEzARBgNVBAgTCkt5dW5nR2ktRG8x
-FjAUBgNVBAoTDVNhbXN1bmcgRWxlYy4xJTAjBgNVBAMTHFNlY29uZCBSZXNwb25k
-ZXIgQ2VydGlmaWNhdGUwgZ8wDQYJKoZIhvcNAQEBBQADgY0AMIGJAoGBAKoBMUk0
-Dmy1JaDaNXHPnafErScx7sJG/gOPT+33ddW5Acapj40XyoyCgmPtCNQFnjE8yWZZ
-QXJjjgE+ojnRnFGcxZqtcg3mKxm6RaYY9uJ5ckteeXQ4tYacV7ss6PVXmzI0hiov
-QC9d3Zz1Y9QurbHTJSJ8homEySZwPMgRZO1HAgMBAAGjKDAmMBMGA1UdJQQMMAoG
-CCsGAQUFBwMJMA8GCSsGAQUFBzABBQQCBQAwDQYJKoZIhvcNAQEFBQADggIBACOf
-WyHkn8gvN7nkhPpytRaxWR1adhq+zuII0Q4Ooe0KX3FoTn408n88LVrSoy2xkaZG
-xBOsXy81I/LZGRZ07h4YuEN80HozlguuEr6RaBuYf7NeosHYZOm2JDzv87cKZvmL
-m50wEPWVl4NBbiL3HBnW2mqS4Sh5931gEvj+4Xn3i7UEo521y6fmslCkSO7m1W7q
-tjrKyBE6TcEg5UvSWfOvQKlPqoEaLUvCmUP6EQWFEc/sm7OWTmKOPjxkgt9Qq2ox
-5mY1wMXdwqO68Stmfxm6PgXo5GlIM5qJOSzcsZgCtRiNEVSpQCcrOEKk/OpGgAoH
-x6avCipHbbtE6D63J7p7HzoAxX/elojda7xlGY85llMTeE1Z2HZbF+tXcS37KrXJ
-0+qvm3w5iILFE4rY1Uz1kCXdEe/00ltP59jX7sZ7L1ltVVQ/bqwW9D2Ks3Zl9hNs
-6G1ovyt5Zu2aAudOO2XN3jiEvHtWoua7iPFUcetNBOcTgERzU2aQ78fEz+aHkSzP
-IwaVFgiQap3fBlGJOfBhXLh5fcStxEwmMD0TvKxPu2lC4SiJHawep4GGTv1Nugak
-mzMG4Dl2UlIS68S+9enJ/3Pf8mxzJ2RgXRtfnAeOiRCjJxUOewgeoleM8qXmTIZK
-A3pFoe5AcRUXVaN9JDOzV0YRB8YZoFCqOpd6QTbc
------END CERTIFICATE-----
diff --git a/tests/cert-svc/data/TestData/ssl/demoCA/newcerts/1A.pem b/tests/cert-svc/data/TestData/ssl/demoCA/newcerts/1A.pem
deleted file mode 100644 (file)
index 4279287..0000000
+++ /dev/null
@@ -1,79 +0,0 @@
-Certificate:
-    Data:
-        Version: 3 (0x2)
-        Serial Number: 26 (0x1a)
-        Signature Algorithm: sha1WithRSAEncryption
-        Issuer: C=KR, ST=KyungGi-Do, L=Suwon-Si, O=Samsung Elec., CN=CA
-        Validity
-            Not Before: Mar 16 11:42:26 2009 GMT
-            Not After : Mar 16 11:42:26 2010 GMT
-        Subject: C=KR, ST=KyungGi-Do, O=Samsung Elec., CN=OCSP Responder
-        Subject Public Key Info:
-            Public Key Algorithm: rsaEncryption
-            RSA Public Key: (1024 bit)
-                Modulus (1024 bit):
-                    00:b9:0e:80:20:fc:74:49:08:cb:83:87:76:e4:42:
-                    03:42:6e:56:1b:ae:73:43:9b:a6:cf:5d:33:1d:37:
-                    cf:b5:22:bc:79:5e:6a:69:02:3e:e2:08:c5:f5:be:
-                    ee:ef:df:4f:85:41:a2:5f:d3:76:39:3f:61:56:14:
-                    1f:c1:cc:ec:45:e3:b2:e2:b0:e8:20:9f:a9:e7:8a:
-                    b8:ed:3f:e4:6f:86:d8:e5:d5:3b:fe:47:e8:8f:51:
-                    ee:dd:b6:7f:36:6b:c7:75:f7:78:04:df:ac:51:b3:
-                    25:65:04:ab:0d:ce:db:5e:3a:db:6a:8f:da:69:46:
-                    c7:92:f2:b3:ba:6c:90:3d:71
-                Exponent: 65537 (0x10001)
-        X509v3 extensions:
-            X509v3 Extended Key Usage: 
-                OCSP No Check
-    Signature Algorithm: sha1WithRSAEncryption
-        a9:46:f1:69:d0:17:5c:84:65:ff:4e:17:ba:5a:3a:2a:f5:75:
-        ec:c2:2f:50:1a:fc:ce:7e:b0:9f:16:bd:51:fd:27:51:1a:8f:
-        8c:d9:b1:c3:27:e9:b4:77:17:2d:d8:fc:e9:fe:e0:57:35:08:
-        8f:f2:50:18:9b:e9:14:90:c2:e2:94:1b:19:18:9d:df:c1:20:
-        9f:fd:4c:31:a1:b6:68:41:b6:93:66:04:74:03:d4:34:a2:cb:
-        bd:88:3a:36:9c:c0:a0:79:52:33:3d:c5:9f:fb:3e:32:24:cb:
-        68:aa:78:d2:24:a3:44:39:55:28:3d:20:9a:c0:e9:98:cf:44:
-        40:74:4c:83:83:8d:1d:2a:ce:f8:1d:b4:3c:f1:ca:60:5c:58:
-        4a:7c:a9:6d:96:1c:96:16:82:7d:0c:14:26:6d:b6:e4:2f:05:
-        4c:6f:0a:ed:59:aa:43:f8:e7:f5:a2:a5:01:c0:32:87:32:73:
-        fe:e4:b2:c0:ee:07:cf:f3:07:e4:e5:16:c2:07:91:7c:01:8c:
-        5d:89:38:40:c6:43:80:ac:fb:cc:27:5a:de:9b:c7:70:c6:5b:
-        2e:c8:c7:f9:08:2f:42:7e:ee:44:6e:50:29:5b:19:2f:16:fb:
-        0d:16:f9:43:f3:82:c2:c0:ed:2d:a2:51:f2:1c:07:61:1b:2e:
-        c4:be:f4:7d:20:83:a9:0d:ff:bb:ec:86:c5:c5:5e:57:66:70:
-        06:f1:0e:89:ba:a7:6b:39:dd:46:46:dc:a6:ec:fe:c8:44:4e:
-        bd:1d:d5:9b:2b:a2:df:04:9d:40:35:ce:35:3b:d1:b7:91:5c:
-        e6:5f:83:23:a2:9e:d5:be:46:9f:6a:43:4c:36:86:4c:a9:a5:
-        ce:05:e1:c2:65:9b:70:cd:67:63:c7:a5:1b:01:0d:3e:c3:cd:
-        91:3e:65:33:72:2b:38:14:db:18:bb:f9:1a:3d:80:92:fb:66:
-        86:06:29:0b:48:ef:91:35:e6:00:8f:81:22:3f:3a:36:af:9c:
-        7f:9e:b1:f5:40:ab:43:8b:ff:f2:a2:0a:8d:7e:23:e3:97:3a:
-        72:3d:70:fb:25:61:e0:a6:26:b3:d8:6e:62:77:ab:be:b8:16:
-        88:2e:b5:0c:9a:44:e9:7f:01:96:d1:29:08:b1:a3:55:00:97:
-        ff:9d:2f:68:b8:bb:88:8f:03:47:4c:39:a9:62:fe:e0:fa:eb:
-        4c:f2:f6:0e:23:43:ca:83:cb:54:84:79:c4:72:9d:1b:02:97:
-        ec:4a:50:5f:cd:10:ba:89:fb:4f:2e:df:50:06:be:55:fd:30:
-        c9:ca:58:94:a3:d3:e3:42:83:21:79:89:f7:dd:eb:46:f0:9a:
-        88:1b:26:d9:a5:de:4b:c7
------BEGIN CERTIFICATE-----
-MIIDvDCCAaSgAwIBAgIBGjANBgkqhkiG9w0BAQUFADBaMQswCQYDVQQGEwJLUjET
-MBEGA1UECBMKS3l1bmdHaS1EbzERMA8GA1UEBxMIU3V3b24tU2kxFjAUBgNVBAoT
-DVNhbXN1bmcgRWxlYy4xCzAJBgNVBAMTAkNBMB4XDTA5MDMxNjExNDIyNloXDTEw
-MDMxNjExNDIyNlowUzELMAkGA1UEBhMCS1IxEzARBgNVBAgTCkt5dW5nR2ktRG8x
-FjAUBgNVBAoTDVNhbXN1bmcgRWxlYy4xFzAVBgNVBAMTDk9DU1AgUmVzcG9uZGVy
-MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQC5DoAg/HRJCMuDh3bkQgNCblYb
-rnNDm6bPXTMdN8+1Irx5XmppAj7iCMX1vu7v30+FQaJf03Y5P2FWFB/BzOxF47Li
-sOggn6nnirjtP+Rvhtjl1Tv+R+iPUe7dtn82a8d193gE36xRsyVlBKsNztteOttq
-j9ppRseS8rO6bJA9cQIDAQABoxgwFjAUBgNVHSUEDTALBgkrBgEFBQcwAQUwDQYJ
-KoZIhvcNAQEFBQADggIBAKlG8WnQF1yEZf9OF7paOir1dezCL1Aa/M5+sJ8WvVH9
-J1Eaj4zZscMn6bR3Fy3Y/On+4Fc1CI/yUBib6RSQwuKUGxkYnd/BIJ/9TDGhtmhB
-tpNmBHQD1DSiy72IOjacwKB5UjM9xZ/7PjIky2iqeNIko0Q5VSg9IJrA6ZjPREB0
-TIODjR0qzvgdtDzxymBcWEp8qW2WHJYWgn0MFCZttuQvBUxvCu1ZqkP45/WipQHA
-Mocyc/7kssDuB8/zB+TlFsIHkXwBjF2JOEDGQ4Cs+8wnWt6bx3DGWy7Ix/kIL0J+
-7kRuUClbGS8W+w0W+UPzgsLA7S2iUfIcB2EbLsS+9H0gg6kN/7vshsXFXldmcAbx
-Dom6p2s53UZG3Kbs/shETr0d1Zsrot8EnUA1zjU70beRXOZfgyOintW+Rp9qQ0w2
-hkyppc4F4cJlm3DNZ2PHpRsBDT7DzZE+ZTNyKzgU2xi7+Ro9gJL7ZoYGKQtI75E1
-5gCPgSI/OjavnH+esfVAq0OL//KiCo1+I+OXOnI9cPslYeCmJrPYbmJ3q764Fogu
-tQyaROl/AZbRKQixo1UAl/+dL2i4u4iPA0dMOali/uD660zy9g4jQ8qDy1SEecRy
-nRsCl+xKUF/NELqJ+08u31AGvlX9MMnKWJSj0+NCgyF5iffd60bwmogbJtml3kvH
------END CERTIFICATE-----
diff --git a/tests/cert-svc/data/TestData/ssl/demoCA/newcerts/1B.pem b/tests/cert-svc/data/TestData/ssl/demoCA/newcerts/1B.pem
deleted file mode 100644 (file)
index 7463494..0000000
+++ /dev/null
@@ -1,79 +0,0 @@
-Certificate:
-    Data:
-        Version: 3 (0x2)
-        Serial Number: 27 (0x1b)
-        Signature Algorithm: sha1WithRSAEncryption
-        Issuer: C=KR, ST=KyungGi-Do, L=Suwon-Si, O=Samsung Elec., CN=CA
-        Validity
-            Not Before: Mar 16 11:56:53 2009 GMT
-            Not After : Mar 16 11:56:53 2010 GMT
-        Subject: C=KR, ST=KyungGi-Do, O=Samsung Elec., CN=OCSP Responder
-        Subject Public Key Info:
-            Public Key Algorithm: rsaEncryption
-            RSA Public Key: (1024 bit)
-                Modulus (1024 bit):
-                    00:b9:0e:80:20:fc:74:49:08:cb:83:87:76:e4:42:
-                    03:42:6e:56:1b:ae:73:43:9b:a6:cf:5d:33:1d:37:
-                    cf:b5:22:bc:79:5e:6a:69:02:3e:e2:08:c5:f5:be:
-                    ee:ef:df:4f:85:41:a2:5f:d3:76:39:3f:61:56:14:
-                    1f:c1:cc:ec:45:e3:b2:e2:b0:e8:20:9f:a9:e7:8a:
-                    b8:ed:3f:e4:6f:86:d8:e5:d5:3b:fe:47:e8:8f:51:
-                    ee:dd:b6:7f:36:6b:c7:75:f7:78:04:df:ac:51:b3:
-                    25:65:04:ab:0d:ce:db:5e:3a:db:6a:8f:da:69:46:
-                    c7:92:f2:b3:ba:6c:90:3d:71
-                Exponent: 65537 (0x10001)
-        X509v3 extensions:
-            OCSP No Check: 
-
-    Signature Algorithm: sha1WithRSAEncryption
-        30:ef:e6:6f:c4:15:ce:e0:09:3e:ab:07:cb:30:ca:64:77:a0:
-        cb:ca:9e:0e:b5:57:10:16:65:f3:f6:ff:76:c6:30:f1:28:5b:
-        0f:9e:57:dd:fc:0a:b2:45:7b:ff:2a:e5:52:5c:39:62:cf:ff:
-        20:06:e5:d4:50:d9:20:07:29:65:db:4a:96:b3:62:6e:3c:8e:
-        fc:8c:16:2f:b7:e6:82:13:e5:c9:47:ae:79:25:6c:1b:90:01:
-        53:3a:d6:65:9d:3f:0d:b4:69:cc:72:e1:e1:5b:f3:bc:80:5d:
-        a0:a0:3a:be:99:59:e2:b4:84:eb:53:91:b7:f5:87:0c:e6:81:
-        47:b2:be:28:5f:7c:26:df:18:ea:fc:7f:36:bb:3d:a3:9a:2b:
-        86:04:32:26:7e:25:12:45:d0:56:6e:a7:d1:43:7d:f2:d4:85:
-        d3:a6:4e:9d:82:3b:15:77:5b:b5:77:7d:37:06:1c:84:ed:09:
-        bc:21:bb:fd:56:89:ee:f7:7d:8d:8f:ae:ab:37:5a:c0:9e:17:
-        43:77:19:b3:2f:26:4b:1d:68:e3:95:0f:f9:09:6a:27:a5:26:
-        e0:00:cc:a4:7d:4c:89:a4:d9:54:56:5c:80:10:b2:eb:23:9d:
-        53:64:ac:45:7e:85:ff:4b:34:29:56:91:8a:a6:9d:19:9f:0c:
-        1a:c3:3a:82:eb:9f:0e:ab:a2:18:0a:d9:cd:20:bb:1a:33:51:
-        38:c6:5b:7e:bf:fe:6f:cd:96:b9:b3:22:7e:99:b0:5b:52:e0:
-        a6:3b:07:87:28:83:18:12:cb:5e:d1:8e:29:52:e1:16:9e:a1:
-        7e:0a:5c:2c:e2:e1:9d:2d:19:ce:c5:f3:f0:a1:99:18:5f:6d:
-        ea:07:8e:b5:0e:ab:e3:76:b8:f3:22:77:2b:52:70:4d:d3:9a:
-        26:85:81:2c:13:70:d7:5e:da:0a:13:64:74:f4:22:98:33:c6:
-        1f:99:6c:6a:55:7a:05:e6:51:7e:9b:ae:27:ff:68:4b:a9:5b:
-        71:69:9f:fe:86:3f:3e:5d:47:8f:72:4b:07:2e:9a:29:07:36:
-        e3:2c:dd:94:72:f6:9b:04:b4:18:2a:49:c6:b6:1c:7f:e5:81:
-        ea:21:13:ca:50:0e:fe:b0:47:04:4d:52:b0:dc:39:50:a5:ac:
-        4c:7a:72:c8:a3:c9:d3:f2:07:dc:1b:bc:83:e7:6c:9d:2a:a9:
-        c0:0a:5f:ff:d1:fc:d3:8f:fe:8c:b3:58:64:b5:d6:44:6a:7e:
-        b5:23:ea:7d:18:a5:f3:e1:7a:d1:56:cf:7d:05:b9:29:fc:28:
-        c1:e7:50:37:49:c7:17:69:73:d1:91:ac:d0:a3:ef:c1:99:1d:
-        91:f6:55:9b:46:b6:46:4e
------BEGIN CERTIFICATE-----
-MIIDtzCCAZ+gAwIBAgIBGzANBgkqhkiG9w0BAQUFADBaMQswCQYDVQQGEwJLUjET
-MBEGA1UECBMKS3l1bmdHaS1EbzERMA8GA1UEBxMIU3V3b24tU2kxFjAUBgNVBAoT
-DVNhbXN1bmcgRWxlYy4xCzAJBgNVBAMTAkNBMB4XDTA5MDMxNjExNTY1M1oXDTEw
-MDMxNjExNTY1M1owUzELMAkGA1UEBhMCS1IxEzARBgNVBAgTCkt5dW5nR2ktRG8x
-FjAUBgNVBAoTDVNhbXN1bmcgRWxlYy4xFzAVBgNVBAMTDk9DU1AgUmVzcG9uZGVy
-MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQC5DoAg/HRJCMuDh3bkQgNCblYb
-rnNDm6bPXTMdN8+1Irx5XmppAj7iCMX1vu7v30+FQaJf03Y5P2FWFB/BzOxF47Li
-sOggn6nnirjtP+Rvhtjl1Tv+R+iPUe7dtn82a8d193gE36xRsyVlBKsNztteOttq
-j9ppRseS8rO6bJA9cQIDAQABoxMwETAPBgkrBgEFBQcwAQUEAgUAMA0GCSqGSIb3
-DQEBBQUAA4ICAQAw7+ZvxBXO4Ak+qwfLMMpkd6DLyp4OtVcQFmXz9v92xjDxKFsP
-nlfd/AqyRXv/KuVSXDliz/8gBuXUUNkgByll20qWs2JuPI78jBYvt+aCE+XJR655
-JWwbkAFTOtZlnT8NtGnMcuHhW/O8gF2goDq+mVnitITrU5G39YcM5oFHsr4oX3wm
-3xjq/H82uz2jmiuGBDImfiUSRdBWbqfRQ33y1IXTpk6dgjsVd1u1d303BhyE7Qm8
-Ibv9Vonu932Nj66rN1rAnhdDdxmzLyZLHWjjlQ/5CWonpSbgAMykfUyJpNlUVlyA
-ELLrI51TZKxFfoX/SzQpVpGKpp0ZnwwawzqC658Oq6IYCtnNILsaM1E4xlt+v/5v
-zZa5syJ+mbBbUuCmOweHKIMYEste0Y4pUuEWnqF+Clws4uGdLRnOxfPwoZkYX23q
-B461DqvjdrjzIncrUnBN05omhYEsE3DXXtoKE2R09CKYM8YfmWxqVXoF5lF+m64n
-/2hLqVtxaZ/+hj8+XUePcksHLpopBzbjLN2UcvabBLQYKknGthx/5YHqIRPKUA7+
-sEcETVKw3DlQpaxMenLIo8nT8gfcG7yD52ydKqnACl//0fzTj/6Ms1hktdZEan61
-I+p9GKXz4XrRVs99Bbkp/CjB51A3SccXaXPRkazQo+/BmR2R9lWbRrZGTg==
------END CERTIFICATE-----
diff --git a/tests/cert-svc/data/TestData/ssl/demoCA/newcerts/1C.pem b/tests/cert-svc/data/TestData/ssl/demoCA/newcerts/1C.pem
deleted file mode 100644 (file)
index 8d384fe..0000000
+++ /dev/null
@@ -1,79 +0,0 @@
-Certificate:
-    Data:
-        Version: 3 (0x2)
-        Serial Number: 28 (0x1c)
-        Signature Algorithm: sha1WithRSAEncryption
-        Issuer: C=KR, ST=KyungGi-Do, L=Suwon-Si, O=Samsung Elec., CN=CA
-        Validity
-            Not Before: Mar 16 12:10:50 2009 GMT
-            Not After : Mar 16 12:10:50 2010 GMT
-        Subject: C=KR, ST=KyungGi-Do, O=Samsung Elec., CN=OCSP Responder
-        Subject Public Key Info:
-            Public Key Algorithm: rsaEncryption
-            RSA Public Key: (1024 bit)
-                Modulus (1024 bit):
-                    00:b9:0e:80:20:fc:74:49:08:cb:83:87:76:e4:42:
-                    03:42:6e:56:1b:ae:73:43:9b:a6:cf:5d:33:1d:37:
-                    cf:b5:22:bc:79:5e:6a:69:02:3e:e2:08:c5:f5:be:
-                    ee:ef:df:4f:85:41:a2:5f:d3:76:39:3f:61:56:14:
-                    1f:c1:cc:ec:45:e3:b2:e2:b0:e8:20:9f:a9:e7:8a:
-                    b8:ed:3f:e4:6f:86:d8:e5:d5:3b:fe:47:e8:8f:51:
-                    ee:dd:b6:7f:36:6b:c7:75:f7:78:04:df:ac:51:b3:
-                    25:65:04:ab:0d:ce:db:5e:3a:db:6a:8f:da:69:46:
-                    c7:92:f2:b3:ba:6c:90:3d:71
-                Exponent: 65537 (0x10001)
-        X509v3 extensions:
-            OCSP No Check: 
-
-    Signature Algorithm: sha1WithRSAEncryption
-        9e:15:66:51:b4:ba:c2:50:57:2f:fb:35:bd:43:53:67:26:73:
-        96:30:ae:28:d3:fb:b6:d1:4c:e4:bb:1a:c6:f3:e4:40:b6:bb:
-        a8:85:c8:1f:e8:09:cd:5a:ec:c2:4d:21:7c:24:85:c2:78:1d:
-        97:1f:65:41:50:4c:f7:c2:87:0d:5f:1b:0e:30:b1:66:97:9b:
-        4d:d3:32:27:e2:a5:50:17:80:55:0b:d7:4e:ae:9d:94:c1:4f:
-        c3:98:f4:d7:64:9c:e5:c9:16:e0:2a:11:8e:27:8d:00:d8:5d:
-        3d:61:15:8b:0d:16:39:f1:71:a1:d4:0c:28:fe:d8:47:09:d7:
-        be:00:95:39:3b:c0:1c:b2:fd:c4:74:e0:97:df:61:4d:90:db:
-        7f:bf:85:21:72:91:90:fa:19:67:6e:cf:ef:61:86:0d:6d:60:
-        c6:9b:83:5a:44:fb:d6:d2:1f:f1:2b:5e:0f:3d:6c:a3:07:c3:
-        e6:99:13:73:53:71:b5:29:97:d9:43:73:f7:f5:47:41:08:92:
-        59:22:95:3e:8d:5e:ff:3f:ad:17:2f:b4:2d:da:b8:5e:09:5a:
-        23:c7:b4:eb:cb:3b:b8:83:e9:1c:5c:72:df:65:52:36:54:2f:
-        73:0c:57:89:32:80:a4:3e:80:5b:d4:cf:84:73:63:62:27:86:
-        0a:61:51:63:1a:58:e8:ed:09:5b:a7:99:97:a3:e6:00:ee:46:
-        e5:b7:c6:2f:2f:1a:57:8c:8b:e4:ff:19:f1:eb:3d:8a:ef:a6:
-        ea:3b:7e:d8:82:d6:cf:ff:fc:56:b9:85:4d:9a:21:a4:05:d3:
-        3a:9a:84:b6:cc:2a:d5:7b:08:2b:00:fe:de:aa:55:53:4f:5c:
-        d1:a3:61:8e:44:d3:85:22:ab:88:a6:79:dc:8d:b4:39:e7:28:
-        5a:30:68:10:bc:94:19:95:5f:6c:58:94:a4:05:da:5e:d9:1e:
-        ae:7b:50:cc:33:e8:db:b6:8f:ee:2e:28:da:fe:31:18:c1:a8:
-        50:d9:2b:5c:b1:f8:1b:f5:ab:35:28:31:ca:85:3e:2b:14:0f:
-        5a:49:94:6e:1b:3e:d7:ee:8b:ee:51:f2:24:7e:a6:d7:fd:b3:
-        48:7e:e1:39:d9:e5:fa:4a:72:2c:4e:6f:64:39:48:88:23:3b:
-        23:b3:7f:b1:aa:07:76:37:49:e1:81:fa:57:e5:58:d6:b8:bd:
-        e1:84:e4:47:7e:02:23:3c:21:3e:51:42:c5:ad:dd:41:1c:e5:
-        27:17:c0:2c:cf:11:f0:19:ab:96:92:f3:d8:88:df:11:bc:7f:
-        05:aa:14:03:7f:4b:31:2a:8f:1b:00:79:4e:bd:1e:71:24:3f:
-        c8:27:5a:e6:a7:8a:87:3e
------BEGIN CERTIFICATE-----
-MIIDtzCCAZ+gAwIBAgIBHDANBgkqhkiG9w0BAQUFADBaMQswCQYDVQQGEwJLUjET
-MBEGA1UECBMKS3l1bmdHaS1EbzERMA8GA1UEBxMIU3V3b24tU2kxFjAUBgNVBAoT
-DVNhbXN1bmcgRWxlYy4xCzAJBgNVBAMTAkNBMB4XDTA5MDMxNjEyMTA1MFoXDTEw
-MDMxNjEyMTA1MFowUzELMAkGA1UEBhMCS1IxEzARBgNVBAgTCkt5dW5nR2ktRG8x
-FjAUBgNVBAoTDVNhbXN1bmcgRWxlYy4xFzAVBgNVBAMTDk9DU1AgUmVzcG9uZGVy
-MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQC5DoAg/HRJCMuDh3bkQgNCblYb
-rnNDm6bPXTMdN8+1Irx5XmppAj7iCMX1vu7v30+FQaJf03Y5P2FWFB/BzOxF47Li
-sOggn6nnirjtP+Rvhtjl1Tv+R+iPUe7dtn82a8d193gE36xRsyVlBKsNztteOttq
-j9ppRseS8rO6bJA9cQIDAQABoxMwETAPBgkrBgEFBQcwAQUEAgUAMA0GCSqGSIb3
-DQEBBQUAA4ICAQCeFWZRtLrCUFcv+zW9Q1NnJnOWMK4o0/u20UzkuxrG8+RAtruo
-hcgf6AnNWuzCTSF8JIXCeB2XH2VBUEz3wocNXxsOMLFml5tN0zIn4qVQF4BVC9dO
-rp2UwU/DmPTXZJzlyRbgKhGOJ40A2F09YRWLDRY58XGh1Awo/thHCde+AJU5O8Ac
-sv3EdOCX32FNkNt/v4UhcpGQ+hlnbs/vYYYNbWDGm4NaRPvW0h/xK14PPWyjB8Pm
-mRNzU3G1KZfZQ3P39UdBCJJZIpU+jV7/P60XL7Qt2rheCVojx7Tryzu4g+kcXHLf
-ZVI2VC9zDFeJMoCkPoBb1M+Ec2NiJ4YKYVFjGljo7Qlbp5mXo+YA7kblt8YvLxpX
-jIvk/xnx6z2K76bqO37YgtbP//xWuYVNmiGkBdM6moS2zCrVewgrAP7eqlVTT1zR
-o2GORNOFIquIpnncjbQ55yhaMGgQvJQZlV9sWJSkBdpe2R6ue1DMM+jbto/uLija
-/jEYwahQ2Stcsfgb9as1KDHKhT4rFA9aSZRuGz7X7ovuUfIkfqbX/bNIfuE52eX6
-SnIsTm9kOUiIIzsjs3+xqgd2N0nhgfpX5VjWuL3hhORHfgIjPCE+UULFrd1BHOUn
-F8AszxHwGauWkvPYiN8RvH8FqhQDf0sxKo8bAHlOvR5xJD/IJ1rmp4qHPg==
------END CERTIFICATE-----
diff --git a/tests/cert-svc/data/TestData/ssl/demoCA/newcerts/1D.pem b/tests/cert-svc/data/TestData/ssl/demoCA/newcerts/1D.pem
deleted file mode 100644 (file)
index ccb3cdb..0000000
+++ /dev/null
@@ -1,79 +0,0 @@
-Certificate:
-    Data:
-        Version: 3 (0x2)
-        Serial Number: 29 (0x1d)
-        Signature Algorithm: sha1WithRSAEncryption
-        Issuer: C=KR, ST=KyungGi-Do, L=Suwon-Si, O=Samsung Elec., CN=CA
-        Validity
-            Not Before: Mar 16 12:12:56 2009 GMT
-            Not After : Mar 16 12:12:56 2010 GMT
-        Subject: C=KR, ST=KyungGi-Do, O=Samsung Elec., CN=OCSP Responder
-        Subject Public Key Info:
-            Public Key Algorithm: rsaEncryption
-            RSA Public Key: (1024 bit)
-                Modulus (1024 bit):
-                    00:b9:0e:80:20:fc:74:49:08:cb:83:87:76:e4:42:
-                    03:42:6e:56:1b:ae:73:43:9b:a6:cf:5d:33:1d:37:
-                    cf:b5:22:bc:79:5e:6a:69:02:3e:e2:08:c5:f5:be:
-                    ee:ef:df:4f:85:41:a2:5f:d3:76:39:3f:61:56:14:
-                    1f:c1:cc:ec:45:e3:b2:e2:b0:e8:20:9f:a9:e7:8a:
-                    b8:ed:3f:e4:6f:86:d8:e5:d5:3b:fe:47:e8:8f:51:
-                    ee:dd:b6:7f:36:6b:c7:75:f7:78:04:df:ac:51:b3:
-                    25:65:04:ab:0d:ce:db:5e:3a:db:6a:8f:da:69:46:
-                    c7:92:f2:b3:ba:6c:90:3d:71
-                Exponent: 65537 (0x10001)
-        X509v3 extensions:
-            OCSP No Check: 
-
-    Signature Algorithm: sha1WithRSAEncryption
-        08:72:72:7b:9c:62:fb:4d:ed:66:dc:d9:f2:db:a0:89:0e:ff:
-        04:54:3a:16:60:e4:d9:c8:68:44:54:ee:27:a9:8a:45:ff:26:
-        7e:05:1e:c9:61:cd:f3:54:25:d8:72:6e:6f:87:a1:65:ad:cd:
-        f4:8b:86:8f:5e:20:ab:82:4f:ac:1e:ec:a7:fd:66:2b:33:73:
-        64:44:36:8a:a8:3e:fa:9c:48:ce:ec:52:a9:23:51:94:4b:61:
-        55:d5:ea:83:95:30:a2:af:ef:69:ac:bc:48:47:bd:5f:18:5a:
-        64:71:6c:65:a9:e7:fd:d2:c1:5f:56:68:6c:90:74:f9:a3:35:
-        92:7d:aa:d9:d7:64:20:6d:84:d1:53:a8:b8:06:05:83:5f:e2:
-        e4:94:81:55:09:df:3d:88:fb:76:f1:ee:59:67:75:41:70:77:
-        fe:7c:c2:b6:d3:7a:13:a0:ab:99:62:7a:fc:5e:d2:ea:d0:99:
-        91:3a:57:8b:01:99:3a:78:3b:6c:b6:8d:1b:9d:21:69:90:28:
-        34:c6:f3:14:81:94:d3:9d:5c:d2:0b:44:78:29:f9:fb:c2:e8:
-        30:47:eb:27:ab:8b:b5:d4:28:a3:6d:fa:83:5d:13:76:da:d2:
-        da:77:c3:d0:e0:d3:8b:c1:6e:e4:e0:94:b3:6a:4d:60:9b:84:
-        24:02:75:ca:89:4b:60:83:51:3a:7a:b1:c7:e7:d4:55:40:fa:
-        ac:7e:1b:c4:f4:d9:01:e2:84:e7:16:20:92:68:6f:dd:2f:a5:
-        5a:c5:40:24:9f:89:e9:53:43:02:76:ea:a2:be:17:de:c8:da:
-        fa:0e:2a:b8:98:25:0f:c9:2e:31:6f:a9:bf:ec:54:09:bf:e0:
-        74:af:23:bd:ee:b1:c4:2b:91:8a:dc:c4:14:e5:52:c9:c8:fd:
-        ae:c0:87:e1:8e:a9:b5:25:2b:ce:43:fa:3a:2a:02:fb:2f:9a:
-        04:7a:39:e1:8f:84:99:4c:61:6a:24:7c:a3:66:bc:93:80:4e:
-        14:22:bc:fb:eb:a0:2f:e2:5a:be:01:c5:3d:76:72:ce:d6:be:
-        e7:e0:01:27:ca:22:35:1b:81:84:c4:d6:ee:24:8d:f0:be:cd:
-        0e:a8:85:29:f2:23:20:23:52:14:4a:c0:8a:ac:9a:d6:14:63:
-        01:1f:41:f7:8c:c5:18:4e:39:64:05:f6:da:44:a3:18:1a:6f:
-        77:62:40:f2:e5:d6:ab:4d:55:8b:ed:76:f6:73:80:de:1c:b9:
-        69:84:11:aa:e2:56:07:e6:0a:a1:41:4b:a5:b4:92:f4:30:48:
-        4d:df:e6:a6:52:97:84:8d:7e:04:24:99:d1:93:a4:55:8b:d7:
-        c9:82:44:63:74:f3:1f:d5
------BEGIN CERTIFICATE-----
-MIIDtzCCAZ+gAwIBAgIBHTANBgkqhkiG9w0BAQUFADBaMQswCQYDVQQGEwJLUjET
-MBEGA1UECBMKS3l1bmdHaS1EbzERMA8GA1UEBxMIU3V3b24tU2kxFjAUBgNVBAoT
-DVNhbXN1bmcgRWxlYy4xCzAJBgNVBAMTAkNBMB4XDTA5MDMxNjEyMTI1NloXDTEw
-MDMxNjEyMTI1NlowUzELMAkGA1UEBhMCS1IxEzARBgNVBAgTCkt5dW5nR2ktRG8x
-FjAUBgNVBAoTDVNhbXN1bmcgRWxlYy4xFzAVBgNVBAMTDk9DU1AgUmVzcG9uZGVy
-MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQC5DoAg/HRJCMuDh3bkQgNCblYb
-rnNDm6bPXTMdN8+1Irx5XmppAj7iCMX1vu7v30+FQaJf03Y5P2FWFB/BzOxF47Li
-sOggn6nnirjtP+Rvhtjl1Tv+R+iPUe7dtn82a8d193gE36xRsyVlBKsNztteOttq
-j9ppRseS8rO6bJA9cQIDAQABoxMwETAPBgkrBgEFBQcwAQUEAgUAMA0GCSqGSIb3
-DQEBBQUAA4ICAQAIcnJ7nGL7Te1m3Nny26CJDv8EVDoWYOTZyGhEVO4nqYpF/yZ+
-BR7JYc3zVCXYcm5vh6Flrc30i4aPXiCrgk+sHuyn/WYrM3NkRDaKqD76nEjO7FKp
-I1GUS2FV1eqDlTCir+9prLxIR71fGFpkcWxlqef90sFfVmhskHT5ozWSfarZ12Qg
-bYTRU6i4BgWDX+LklIFVCd89iPt28e5ZZ3VBcHf+fMK203oToKuZYnr8XtLq0JmR
-OleLAZk6eDtsto0bnSFpkCg0xvMUgZTTnVzSC0R4Kfn7wugwR+snq4u11CijbfqD
-XRN22tLad8PQ4NOLwW7k4JSzak1gm4QkAnXKiUtgg1E6erHH59RVQPqsfhvE9NkB
-4oTnFiCSaG/dL6VaxUAkn4npU0MCduqivhfeyNr6Diq4mCUPyS4xb6m/7FQJv+B0
-ryO97rHEK5GK3MQU5VLJyP2uwIfhjqm1JSvOQ/o6KgL7L5oEejnhj4SZTGFqJHyj
-ZryTgE4UIrz766Av4lq+AcU9dnLO1r7n4AEnyiI1G4GExNbuJI3wvs0OqIUp8iMg
-I1IUSsCKrJrWFGMBH0H3jMUYTjlkBfbaRKMYGm93YkDy5darTVWL7Xb2c4DeHLlp
-hBGq4lYH5gqhQUultJL0MEhN3+amUpeEjX4EJJnRk6RVi9fJgkRjdPMf1Q==
------END CERTIFICATE-----
diff --git a/tests/cert-svc/data/TestData/ssl/demoCA/newcerts/1E.pem b/tests/cert-svc/data/TestData/ssl/demoCA/newcerts/1E.pem
deleted file mode 100644 (file)
index a3648ae..0000000
+++ /dev/null
@@ -1,82 +0,0 @@
-Certificate:
-    Data:
-        Version: 3 (0x2)
-        Serial Number: 30 (0x1e)
-        Signature Algorithm: sha1WithRSAEncryption
-        Issuer: C=KR, ST=KyungGi-Do, L=Suwon-Si, O=Samsung Elec., CN=CA
-        Validity
-            Not Before: Mar 16 12:13:11 2009 GMT
-            Not After : Mar 16 12:13:11 2010 GMT
-        Subject: C=KR, ST=KyungGi-Do, O=Samsung Elec., CN=OCSP Responder
-        Subject Public Key Info:
-            Public Key Algorithm: rsaEncryption
-            RSA Public Key: (1024 bit)
-                Modulus (1024 bit):
-                    00:b9:0e:80:20:fc:74:49:08:cb:83:87:76:e4:42:
-                    03:42:6e:56:1b:ae:73:43:9b:a6:cf:5d:33:1d:37:
-                    cf:b5:22:bc:79:5e:6a:69:02:3e:e2:08:c5:f5:be:
-                    ee:ef:df:4f:85:41:a2:5f:d3:76:39:3f:61:56:14:
-                    1f:c1:cc:ec:45:e3:b2:e2:b0:e8:20:9f:a9:e7:8a:
-                    b8:ed:3f:e4:6f:86:d8:e5:d5:3b:fe:47:e8:8f:51:
-                    ee:dd:b6:7f:36:6b:c7:75:f7:78:04:df:ac:51:b3:
-                    25:65:04:ab:0d:ce:db:5e:3a:db:6a:8f:da:69:46:
-                    c7:92:f2:b3:ba:6c:90:3d:71
-                Exponent: 65537 (0x10001)
-        X509v3 extensions:
-            OCSP No Check: 
-
-            X509v3 Extended Key Usage: 
-                OCSP Signing
-    Signature Algorithm: sha1WithRSAEncryption
-        8f:da:fe:f8:bb:53:ba:a5:4a:ed:09:6e:4e:5e:10:3f:aa:ce:
-        b4:49:9e:53:d9:66:ff:3c:1e:d6:b4:7b:b5:ca:74:7e:11:12:
-        2e:da:a5:9b:2d:81:40:aa:f6:06:4a:df:43:59:63:cd:31:05:
-        8b:20:4b:1d:c0:66:e7:02:c5:6f:b3:a6:5e:ad:73:fc:88:61:
-        e7:b4:fe:59:c7:3b:85:4c:06:97:87:5f:c3:80:fc:28:29:b4:
-        2d:c6:3b:ea:ac:4d:ce:d8:f3:f7:ca:45:9c:23:33:80:23:da:
-        83:39:a7:d6:51:a0:a2:79:56:48:f3:2b:ca:c4:31:56:09:ab:
-        2e:c8:50:0a:24:c1:36:3e:11:5d:cd:1b:9b:d7:38:59:70:a1:
-        ea:de:50:fa:44:37:33:1a:b3:24:b7:a6:29:3c:21:1e:66:cf:
-        23:65:12:90:01:20:1a:b4:be:39:ff:7e:bf:55:17:5f:bd:fc:
-        77:67:12:15:c9:9c:42:7f:49:f5:6f:96:15:68:ba:e9:b1:16:
-        dc:ac:92:b0:26:55:2e:1f:90:62:1c:da:29:94:1c:17:d3:92:
-        6b:1d:83:bc:ac:cb:3f:b9:d1:e4:e2:a4:67:f4:c0:a1:21:ff:
-        3f:92:ab:9a:d2:6f:8b:0b:f9:a0:75:b2:da:20:38:08:b6:b9:
-        1c:b8:8a:af:c8:67:63:f2:53:fa:9e:0c:8f:3d:fa:5d:07:0d:
-        af:96:10:e6:fa:6f:76:c4:7e:ac:82:e7:2c:04:c4:7b:66:be:
-        25:69:f9:cb:10:1d:8f:29:6a:f1:0b:50:b3:00:d6:47:75:03:
-        b6:34:96:60:f8:32:e2:9b:a0:b2:71:e4:6f:31:4f:d3:64:48:
-        d3:01:27:ba:e8:11:76:36:86:7e:74:9d:44:cd:25:bc:7f:90:
-        f7:64:a1:10:ae:75:82:f9:5d:b6:65:83:5b:71:19:89:9d:0e:
-        70:01:46:bf:86:d2:82:cf:ca:c5:c6:34:54:67:ea:e4:9c:32:
-        db:12:ad:d2:8d:78:9b:07:cb:06:f1:f0:3c:0a:56:70:11:9b:
-        71:2d:41:1c:b5:81:cf:a1:6f:2e:17:f5:54:99:ea:c0:79:e5:
-        d0:0c:df:50:2a:aa:ff:e3:8b:a3:66:2a:9f:f0:84:b6:8f:e6:
-        8e:fd:d9:91:e5:8c:8b:5b:d1:77:d7:1d:b1:06:b6:1e:48:32:
-        82:d5:28:f2:24:40:2e:71:5c:e1:16:1e:14:2d:77:22:d3:ab:
-        84:b6:c0:ad:67:3d:b2:a6:15:f8:00:f9:95:f7:32:05:3b:e7:
-        a7:41:62:16:3f:f6:55:f1:c0:9e:6a:c5:00:a1:9c:78:27:58:
-        ea:80:17:5f:80:fa:9d:b0
------BEGIN CERTIFICATE-----
-MIIDzDCCAbSgAwIBAgIBHjANBgkqhkiG9w0BAQUFADBaMQswCQYDVQQGEwJLUjET
-MBEGA1UECBMKS3l1bmdHaS1EbzERMA8GA1UEBxMIU3V3b24tU2kxFjAUBgNVBAoT
-DVNhbXN1bmcgRWxlYy4xCzAJBgNVBAMTAkNBMB4XDTA5MDMxNjEyMTMxMVoXDTEw
-MDMxNjEyMTMxMVowUzELMAkGA1UEBhMCS1IxEzARBgNVBAgTCkt5dW5nR2ktRG8x
-FjAUBgNVBAoTDVNhbXN1bmcgRWxlYy4xFzAVBgNVBAMTDk9DU1AgUmVzcG9uZGVy
-MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQC5DoAg/HRJCMuDh3bkQgNCblYb
-rnNDm6bPXTMdN8+1Irx5XmppAj7iCMX1vu7v30+FQaJf03Y5P2FWFB/BzOxF47Li
-sOggn6nnirjtP+Rvhtjl1Tv+R+iPUe7dtn82a8d193gE36xRsyVlBKsNztteOttq
-j9ppRseS8rO6bJA9cQIDAQABoygwJjAPBgkrBgEFBQcwAQUEAgUAMBMGA1UdJQQM
-MAoGCCsGAQUFBwMJMA0GCSqGSIb3DQEBBQUAA4ICAQCP2v74u1O6pUrtCW5OXhA/
-qs60SZ5T2Wb/PB7WtHu1ynR+ERIu2qWbLYFAqvYGSt9DWWPNMQWLIEsdwGbnAsVv
-s6ZerXP8iGHntP5ZxzuFTAaXh1/DgPwoKbQtxjvqrE3O2PP3ykWcIzOAI9qDOafW
-UaCieVZI8yvKxDFWCasuyFAKJME2PhFdzRub1zhZcKHq3lD6RDczGrMkt6YpPCEe
-Zs8jZRKQASAatL45/36/VRdfvfx3ZxIVyZxCf0n1b5YVaLrpsRbcrJKwJlUuH5Bi
-HNoplBwX05JrHYO8rMs/udHk4qRn9MChIf8/kqua0m+LC/mgdbLaIDgItrkcuIqv
-yGdj8lP6ngyPPfpdBw2vlhDm+m92xH6sgucsBMR7Zr4lafnLEB2PKWrxC1CzANZH
-dQO2NJZg+DLim6CyceRvMU/TZEjTASe66BF2NoZ+dJ1EzSW8f5D3ZKEQrnWC+V22
-ZYNbcRmJnQ5wAUa/htKCz8rFxjRUZ+rknDLbEq3SjXibB8sG8fA8ClZwEZtxLUEc
-tYHPoW8uF/VUmerAeeXQDN9QKqr/44ujZiqf8IS2j+aO/dmR5YyLW9F31x2xBrYe
-SDKC1SjyJEAucVzhFh4ULXci06uEtsCtZz2yphX4APmV9zIFO+enQWIWP/ZV8cCe
-asUAoZx4J1jqgBdfgPqdsA==
------END CERTIFICATE-----
diff --git a/tests/cert-svc/data/TestData/ssl/demoCA/newcerts/1F.pem b/tests/cert-svc/data/TestData/ssl/demoCA/newcerts/1F.pem
deleted file mode 100644 (file)
index 826fbd4..0000000
+++ /dev/null
@@ -1,82 +0,0 @@
-Certificate:
-    Data:
-        Version: 3 (0x2)
-        Serial Number: 31 (0x1f)
-        Signature Algorithm: sha1WithRSAEncryption
-        Issuer: C=KR, ST=KyungGi-Do, L=Suwon-Si, O=Samsung Elec., CN=CA
-        Validity
-            Not Before: Mar 16 12:18:09 2009 GMT
-            Not After : Mar 16 12:18:09 2010 GMT
-        Subject: C=KR, ST=KyungGi-Do, O=Samsung Elec., CN=OCSP Responder
-        Subject Public Key Info:
-            Public Key Algorithm: rsaEncryption
-            RSA Public Key: (1024 bit)
-                Modulus (1024 bit):
-                    00:b9:0e:80:20:fc:74:49:08:cb:83:87:76:e4:42:
-                    03:42:6e:56:1b:ae:73:43:9b:a6:cf:5d:33:1d:37:
-                    cf:b5:22:bc:79:5e:6a:69:02:3e:e2:08:c5:f5:be:
-                    ee:ef:df:4f:85:41:a2:5f:d3:76:39:3f:61:56:14:
-                    1f:c1:cc:ec:45:e3:b2:e2:b0:e8:20:9f:a9:e7:8a:
-                    b8:ed:3f:e4:6f:86:d8:e5:d5:3b:fe:47:e8:8f:51:
-                    ee:dd:b6:7f:36:6b:c7:75:f7:78:04:df:ac:51:b3:
-                    25:65:04:ab:0d:ce:db:5e:3a:db:6a:8f:da:69:46:
-                    c7:92:f2:b3:ba:6c:90:3d:71
-                Exponent: 65537 (0x10001)
-        X509v3 extensions:
-            OCSP No Check: 
-
-            X509v3 Extended Key Usage: 
-                OCSP Signing
-    Signature Algorithm: sha1WithRSAEncryption
-        79:52:2d:07:c5:c3:28:24:6e:4e:fa:96:bc:67:29:f8:1c:1d:
-        b0:c9:ea:1a:5a:1b:6c:a6:c8:c2:05:3f:3c:2c:8d:23:6c:5e:
-        04:09:ae:80:d5:a6:0b:72:6b:58:29:45:4f:38:f6:01:14:0e:
-        fd:6a:c3:80:8d:a6:1c:05:e9:9f:a5:a9:93:0a:f3:2a:6b:47:
-        dd:b9:77:4f:89:e9:e8:15:ae:46:d1:55:0e:79:d2:63:df:0a:
-        28:c6:c3:6b:d9:b8:66:6a:b1:28:15:68:ec:33:2d:51:9e:eb:
-        08:12:61:5c:6d:17:b9:6c:db:33:b6:e4:99:4f:7c:3e:3c:31:
-        28:04:8a:d9:a8:dd:43:b4:80:4c:3d:8f:43:a8:d4:8b:da:f5:
-        04:7d:0c:c3:f7:c3:75:ab:b1:a9:a3:7e:f1:d0:44:46:99:c0:
-        7f:00:ce:3d:82:b4:07:4b:37:5f:68:49:99:d9:9d:c9:b0:ab:
-        8b:45:2b:cd:b0:19:33:3a:81:8e:25:1e:e8:ad:b7:1c:8b:0a:
-        18:96:e2:78:cc:53:ef:fc:b4:90:46:55:7b:d6:3b:8f:cf:e0:
-        7f:f9:0e:41:04:a4:06:3e:9c:86:6e:c8:2c:11:de:6a:8b:82:
-        a5:49:70:d2:ac:3a:45:4a:c9:fb:1e:a5:4c:0e:1d:88:b5:86:
-        ac:08:a6:57:61:6c:1c:7f:63:7a:44:ad:50:16:f8:f9:2f:22:
-        4b:ba:ae:22:fc:b9:58:fe:9d:b4:31:a8:7d:f5:86:18:03:01:
-        7b:51:c1:57:7f:62:77:1d:e6:98:06:1c:da:7f:cd:f0:e8:12:
-        9c:7e:70:c3:bc:bd:db:18:de:57:f3:4c:1a:6a:b6:e1:24:3f:
-        2c:2d:3e:ee:7f:01:45:84:09:5f:cf:ff:a6:26:a9:36:8e:13:
-        d8:f5:72:85:4a:0e:55:a5:6c:27:ef:91:e4:1c:93:f4:93:75:
-        c4:b5:22:16:b3:af:ec:81:72:dd:f2:4c:a4:f5:99:00:f7:e8:
-        f1:9e:a1:e3:a1:dd:ea:e3:5e:47:d1:ea:72:cb:6d:b6:60:cc:
-        de:3c:f4:cf:7e:c1:3d:bf:c1:34:88:cb:ee:a2:23:2e:72:ca:
-        56:f2:ec:9b:16:3b:5e:8e:02:0f:d5:7e:d2:8a:49:26:fb:59:
-        3f:6c:15:1c:b3:cf:a0:6e:70:b6:81:31:44:cf:9a:70:1d:86:
-        a6:9a:7e:7e:88:85:34:72:9d:da:3e:3f:65:ad:ad:d2:67:2a:
-        22:62:4d:c2:9a:dd:f4:23:45:be:e2:e2:26:cb:f4:7b:f4:5f:
-        45:d2:6a:71:a9:9c:69:cd:c5:c1:f3:96:44:f5:d2:95:77:bc:
-        1c:aa:79:cc:a1:d5:3c:32
------BEGIN CERTIFICATE-----
-MIIDzDCCAbSgAwIBAgIBHzANBgkqhkiG9w0BAQUFADBaMQswCQYDVQQGEwJLUjET
-MBEGA1UECBMKS3l1bmdHaS1EbzERMA8GA1UEBxMIU3V3b24tU2kxFjAUBgNVBAoT
-DVNhbXN1bmcgRWxlYy4xCzAJBgNVBAMTAkNBMB4XDTA5MDMxNjEyMTgwOVoXDTEw
-MDMxNjEyMTgwOVowUzELMAkGA1UEBhMCS1IxEzARBgNVBAgTCkt5dW5nR2ktRG8x
-FjAUBgNVBAoTDVNhbXN1bmcgRWxlYy4xFzAVBgNVBAMTDk9DU1AgUmVzcG9uZGVy
-MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQC5DoAg/HRJCMuDh3bkQgNCblYb
-rnNDm6bPXTMdN8+1Irx5XmppAj7iCMX1vu7v30+FQaJf03Y5P2FWFB/BzOxF47Li
-sOggn6nnirjtP+Rvhtjl1Tv+R+iPUe7dtn82a8d193gE36xRsyVlBKsNztteOttq
-j9ppRseS8rO6bJA9cQIDAQABoygwJjAPBgkrBgEFBQcwAQUEAgUAMBMGA1UdJQQM
-MAoGCCsGAQUFBwMJMA0GCSqGSIb3DQEBBQUAA4ICAQB5Ui0HxcMoJG5O+pa8Zyn4
-HB2wyeoaWhtspsjCBT88LI0jbF4ECa6A1aYLcmtYKUVPOPYBFA79asOAjaYcBemf
-pamTCvMqa0fduXdPienoFa5G0VUOedJj3wooxsNr2bhmarEoFWjsMy1RnusIEmFc
-bRe5bNsztuSZT3w+PDEoBIrZqN1DtIBMPY9DqNSL2vUEfQzD98N1q7Gpo37x0ERG
-mcB/AM49grQHSzdfaEmZ2Z3JsKuLRSvNsBkzOoGOJR7orbcciwoYluJ4zFPv/LSQ
-RlV71juPz+B/+Q5BBKQGPpyGbsgsEd5qi4KlSXDSrDpFSsn7HqVMDh2ItYasCKZX
-YWwcf2N6RK1QFvj5LyJLuq4i/LlY/p20Mah99YYYAwF7UcFXf2J3HeaYBhzaf83w
-6BKcfnDDvL3bGN5X80waarbhJD8sLT7ufwFFhAlfz/+mJqk2jhPY9XKFSg5VpWwn
-75HkHJP0k3XEtSIWs6/sgXLd8kyk9ZkA9+jxnqHjod3q415H0epyy222YMzePPTP
-fsE9v8E0iMvuoiMucspW8uybFjtejgIP1X7Sikkm+1k/bBUcs8+gbnC2gTFEz5pw
-HYammn5+iIU0cp3aPj9lra3SZyoiYk3Cmt30I0W+4uImy/R79F9F0mpxqZxpzcXB
-85ZE9dKVd7wcqnnModU8Mg==
------END CERTIFICATE-----
diff --git a/tests/cert-svc/data/TestData/ssl/demoCA/newcerts/20.pem b/tests/cert-svc/data/TestData/ssl/demoCA/newcerts/20.pem
deleted file mode 100644 (file)
index 67dbfb4..0000000
+++ /dev/null
@@ -1,82 +0,0 @@
-Certificate:
-    Data:
-        Version: 3 (0x2)
-        Serial Number: 32 (0x20)
-        Signature Algorithm: sha1WithRSAEncryption
-        Issuer: C=KR, ST=KyungGi-Do, L=Suwon-Si, O=Samsung Elec., CN=CA
-        Validity
-            Not Before: Mar 16 12:29:16 2009 GMT
-            Not After : Mar 16 12:29:16 2010 GMT
-        Subject: C=KR, ST=KyungGi-Do, O=Samsung Elec., CN=OCSP Responder
-        Subject Public Key Info:
-            Public Key Algorithm: rsaEncryption
-            RSA Public Key: (1024 bit)
-                Modulus (1024 bit):
-                    00:b9:0e:80:20:fc:74:49:08:cb:83:87:76:e4:42:
-                    03:42:6e:56:1b:ae:73:43:9b:a6:cf:5d:33:1d:37:
-                    cf:b5:22:bc:79:5e:6a:69:02:3e:e2:08:c5:f5:be:
-                    ee:ef:df:4f:85:41:a2:5f:d3:76:39:3f:61:56:14:
-                    1f:c1:cc:ec:45:e3:b2:e2:b0:e8:20:9f:a9:e7:8a:
-                    b8:ed:3f:e4:6f:86:d8:e5:d5:3b:fe:47:e8:8f:51:
-                    ee:dd:b6:7f:36:6b:c7:75:f7:78:04:df:ac:51:b3:
-                    25:65:04:ab:0d:ce:db:5e:3a:db:6a:8f:da:69:46:
-                    c7:92:f2:b3:ba:6c:90:3d:71
-                Exponent: 65537 (0x10001)
-        X509v3 extensions:
-            X509v3 Extended Key Usage: 
-                OCSP Signing
-            OCSP No Check: 
-
-    Signature Algorithm: sha1WithRSAEncryption
-        22:63:3c:cd:27:23:8b:bf:c2:f1:d9:e8:f8:62:0b:58:a6:7d:
-        d7:f1:1f:d8:a2:0e:02:1f:51:30:a9:fd:b6:2a:e0:f3:55:f4:
-        a6:a4:d5:f2:3b:b1:2d:09:66:67:ab:f3:12:07:4f:98:96:7d:
-        7a:95:64:99:df:b0:75:b1:5a:51:76:bc:70:82:80:5f:14:0c:
-        d6:f3:4a:0c:26:87:d2:ad:ed:8a:fe:94:73:6b:37:c6:3e:b5:
-        70:a4:06:a8:48:af:fc:45:6c:d8:71:ae:9d:a1:05:14:26:bc:
-        3c:76:1e:f0:d4:00:08:b3:5d:9e:0b:da:c4:51:c2:3f:da:25:
-        e5:ff:9f:20:9a:30:c1:03:cb:62:64:2d:de:20:a0:c4:53:d9:
-        a8:b2:36:4d:db:2f:1d:f6:31:48:b1:8a:32:9d:4a:5d:b2:8d:
-        e1:57:e7:47:c8:c6:58:e2:91:5f:de:dd:6c:e1:36:57:12:7d:
-        54:75:5b:d8:11:15:75:53:70:79:4e:46:ce:5d:b5:4d:62:ac:
-        79:14:0a:0b:57:aa:ef:43:aa:5c:7f:97:df:cf:51:7c:08:98:
-        db:36:f2:9d:66:7f:98:c2:9e:2b:70:85:f0:9c:41:19:32:c2:
-        5c:27:08:7e:b9:d1:f1:fb:a6:05:55:ad:6e:73:04:dd:14:fb:
-        d6:e5:17:f6:3b:bc:30:93:e8:0f:66:0f:90:2b:c4:60:f7:2c:
-        de:35:e1:33:da:a0:67:54:00:d8:2a:2f:e1:8c:0b:a3:33:94:
-        32:cc:94:fe:d6:d8:96:0c:58:92:ee:89:a8:8e:c8:75:e5:a3:
-        2a:94:8a:b8:bb:c2:c3:1c:1d:4d:af:c9:4a:5b:6a:83:34:34:
-        ed:f8:f4:fc:23:d5:93:85:39:ad:12:d6:86:48:e4:9c:23:b2:
-        84:9e:77:8f:3f:17:c2:91:b8:95:a8:69:4d:43:be:a1:13:9c:
-        d8:30:cb:e1:ce:91:92:11:eb:b3:e3:83:2c:ab:f1:2b:3e:7d:
-        5d:dc:6b:69:64:28:a5:cc:06:8e:39:9f:f6:11:ec:f9:b3:86:
-        bb:c6:26:2f:a9:dd:70:39:34:e3:7a:97:4e:f2:cd:fd:8f:29:
-        d7:e7:37:15:53:ab:98:3c:51:65:0c:c4:d1:0e:cb:33:17:4f:
-        1c:b3:81:e5:90:f0:43:86:74:a3:40:c4:4a:0d:bb:65:0b:c2:
-        de:b7:ec:e8:99:e4:92:d1:16:31:0a:2b:6a:d9:e5:8c:13:3f:
-        ec:e6:cf:c0:08:6b:92:37:ae:e2:a9:9c:c6:3b:0f:2d:e4:82:
-        d6:b5:92:be:db:65:53:95:7f:fe:09:cd:79:bd:23:ac:3b:5c:
-        ec:3b:98:90:76:90:c4:c5
------BEGIN CERTIFICATE-----
-MIIDzDCCAbSgAwIBAgIBIDANBgkqhkiG9w0BAQUFADBaMQswCQYDVQQGEwJLUjET
-MBEGA1UECBMKS3l1bmdHaS1EbzERMA8GA1UEBxMIU3V3b24tU2kxFjAUBgNVBAoT
-DVNhbXN1bmcgRWxlYy4xCzAJBgNVBAMTAkNBMB4XDTA5MDMxNjEyMjkxNloXDTEw
-MDMxNjEyMjkxNlowUzELMAkGA1UEBhMCS1IxEzARBgNVBAgTCkt5dW5nR2ktRG8x
-FjAUBgNVBAoTDVNhbXN1bmcgRWxlYy4xFzAVBgNVBAMTDk9DU1AgUmVzcG9uZGVy
-MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQC5DoAg/HRJCMuDh3bkQgNCblYb
-rnNDm6bPXTMdN8+1Irx5XmppAj7iCMX1vu7v30+FQaJf03Y5P2FWFB/BzOxF47Li
-sOggn6nnirjtP+Rvhtjl1Tv+R+iPUe7dtn82a8d193gE36xRsyVlBKsNztteOttq
-j9ppRseS8rO6bJA9cQIDAQABoygwJjATBgNVHSUEDDAKBggrBgEFBQcDCTAPBgkr
-BgEFBQcwAQUEAgUAMA0GCSqGSIb3DQEBBQUAA4ICAQAiYzzNJyOLv8Lx2ej4YgtY
-pn3X8R/Yog4CH1Ewqf22KuDzVfSmpNXyO7EtCWZnq/MSB0+Yln16lWSZ37B1sVpR
-drxwgoBfFAzW80oMJofSre2K/pRzazfGPrVwpAaoSK/8RWzYca6doQUUJrw8dh7w
-1AAIs12eC9rEUcI/2iXl/58gmjDBA8tiZC3eIKDEU9mosjZN2y8d9jFIsYoynUpd
-so3hV+dHyMZY4pFf3t1s4TZXEn1UdVvYERV1U3B5TkbOXbVNYqx5FAoLV6rvQ6pc
-f5ffz1F8CJjbNvKdZn+Ywp4rcIXwnEEZMsJcJwh+udHx+6YFVa1ucwTdFPvW5Rf2
-O7wwk+gPZg+QK8Rg9yzeNeEz2qBnVADYKi/hjAujM5QyzJT+1tiWDFiS7omojsh1
-5aMqlIq4u8LDHB1Nr8lKW2qDNDTt+PT8I9WThTmtEtaGSOScI7KEnnePPxfCkbiV
-qGlNQ76hE5zYMMvhzpGSEeuz44Msq/ErPn1d3GtpZCilzAaOOZ/2Eez5s4a7xiYv
-qd1wOTTjepdO8s39jynX5zcVU6uYPFFlDMTRDsszF08cs4HlkPBDhnSjQMRKDbtl
-C8Let+zomeSS0RYxCitq2eWMEz/s5s/ACGuSN67iqZzGOw8t5ILWtZK+22VTlX/+
-Cc15vSOsO1zsO5iQdpDExQ==
------END CERTIFICATE-----
diff --git a/tests/cert-svc/data/TestData/ssl/demoCA/newcerts/21.pem b/tests/cert-svc/data/TestData/ssl/demoCA/newcerts/21.pem
deleted file mode 100644 (file)
index ba1c080..0000000
+++ /dev/null
@@ -1,79 +0,0 @@
-Certificate:
-    Data:
-        Version: 3 (0x2)
-        Serial Number: 33 (0x21)
-        Signature Algorithm: sha1WithRSAEncryption
-        Issuer: C=KR, ST=KyungGi-Do, L=Suwon-Si, O=Samsung Elec., CN=CA
-        Validity
-            Not Before: Mar 16 12:33:25 2009 GMT
-            Not After : Mar 16 12:33:25 2010 GMT
-        Subject: C=KR, ST=KyungGi-Do, O=Samsung Elec., CN=OCSP Responder
-        Subject Public Key Info:
-            Public Key Algorithm: rsaEncryption
-            RSA Public Key: (1024 bit)
-                Modulus (1024 bit):
-                    00:b9:0e:80:20:fc:74:49:08:cb:83:87:76:e4:42:
-                    03:42:6e:56:1b:ae:73:43:9b:a6:cf:5d:33:1d:37:
-                    cf:b5:22:bc:79:5e:6a:69:02:3e:e2:08:c5:f5:be:
-                    ee:ef:df:4f:85:41:a2:5f:d3:76:39:3f:61:56:14:
-                    1f:c1:cc:ec:45:e3:b2:e2:b0:e8:20:9f:a9:e7:8a:
-                    b8:ed:3f:e4:6f:86:d8:e5:d5:3b:fe:47:e8:8f:51:
-                    ee:dd:b6:7f:36:6b:c7:75:f7:78:04:df:ac:51:b3:
-                    25:65:04:ab:0d:ce:db:5e:3a:db:6a:8f:da:69:46:
-                    c7:92:f2:b3:ba:6c:90:3d:71
-                Exponent: 65537 (0x10001)
-        X509v3 extensions:
-            OCSP No Check: 
-
-    Signature Algorithm: sha1WithRSAEncryption
-        82:41:0d:08:56:89:0d:b0:bc:15:6e:8a:aa:b9:85:55:2c:61:
-        4f:78:7c:41:3d:d3:06:00:3a:de:69:19:4f:b2:44:bd:fd:ca:
-        42:aa:ed:12:76:bb:6e:e7:fa:29:ab:ec:7b:d5:cb:48:8a:e8:
-        3b:ef:30:a4:b1:94:73:83:43:21:f9:1f:7c:38:cc:a9:9b:a1:
-        7b:ba:af:96:9e:c4:e2:96:39:6f:d5:ec:b2:5a:95:a2:ee:4a:
-        b2:c4:45:df:54:12:69:fa:2f:b6:e3:42:8f:da:e9:eb:8b:0a:
-        14:fd:c2:da:97:07:fd:31:6f:74:8a:cc:18:43:4c:e6:e3:de:
-        91:4b:72:d4:1d:17:51:18:d8:6c:b7:51:e4:ad:e0:f3:45:70:
-        98:e7:1a:e5:e6:bc:54:7a:b6:e4:a3:66:0a:e0:7e:2f:71:64:
-        f9:b8:f6:b9:eb:ca:e4:a9:14:b2:b2:82:39:19:e4:57:76:68:
-        66:92:a3:15:e8:83:cb:d7:2c:fb:5e:e7:c3:50:9d:df:a5:dc:
-        c6:f7:a0:93:e6:ab:bb:f8:8e:85:4c:a2:3a:bd:8c:c7:e8:0d:
-        13:df:e8:cb:8c:4a:ef:d6:8c:42:e6:e0:9c:45:60:e3:45:ad:
-        ad:d9:fb:56:7a:ca:73:2d:87:33:c8:37:b9:f3:9a:a6:c3:c2:
-        79:76:29:aa:c7:75:b7:12:fb:14:07:e0:13:48:c1:69:ad:a3:
-        bd:9f:94:83:46:aa:b3:44:0a:f2:62:bb:55:9a:80:46:fb:86:
-        af:0d:60:39:7a:ee:dc:ac:15:a2:1f:2b:c2:43:0f:cd:d2:c0:
-        49:a9:7f:1e:28:ca:69:91:e0:06:1d:b2:ed:71:02:0a:1f:7b:
-        2f:19:8b:fe:5d:b3:b8:dd:a0:ad:0d:c6:75:47:ae:15:8e:d1:
-        4f:f3:1c:f3:ee:fe:eb:34:c2:ea:9d:7d:6d:33:00:8a:55:e8:
-        ef:26:68:a4:91:90:d5:f9:e4:1c:5f:77:14:c8:17:b1:fd:41:
-        f2:28:74:ca:1a:e4:be:01:26:cf:3d:3b:46:98:6e:25:ee:ab:
-        66:75:3d:a5:cf:06:5a:5f:ff:a9:3a:58:de:3d:2f:22:0a:13:
-        5a:94:6a:f2:fd:f0:1a:c2:06:c9:96:f1:3a:59:87:50:83:5c:
-        57:c3:e4:36:df:7a:0d:02:c3:20:c2:cb:2c:cc:df:46:6c:51:
-        df:04:11:51:11:ae:81:a3:2a:2e:35:a8:77:1b:37:35:37:54:
-        ea:3b:c1:46:a7:48:e3:78:40:c3:a2:3a:f7:3e:94:ff:48:4c:
-        55:79:ff:84:e5:38:4c:f3:16:82:27:7f:e1:c2:61:96:d3:d3:
-        c1:94:92:94:8c:3d:3e:34
------BEGIN CERTIFICATE-----
-MIIDtzCCAZ+gAwIBAgIBITANBgkqhkiG9w0BAQUFADBaMQswCQYDVQQGEwJLUjET
-MBEGA1UECBMKS3l1bmdHaS1EbzERMA8GA1UEBxMIU3V3b24tU2kxFjAUBgNVBAoT
-DVNhbXN1bmcgRWxlYy4xCzAJBgNVBAMTAkNBMB4XDTA5MDMxNjEyMzMyNVoXDTEw
-MDMxNjEyMzMyNVowUzELMAkGA1UEBhMCS1IxEzARBgNVBAgTCkt5dW5nR2ktRG8x
-FjAUBgNVBAoTDVNhbXN1bmcgRWxlYy4xFzAVBgNVBAMTDk9DU1AgUmVzcG9uZGVy
-MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQC5DoAg/HRJCMuDh3bkQgNCblYb
-rnNDm6bPXTMdN8+1Irx5XmppAj7iCMX1vu7v30+FQaJf03Y5P2FWFB/BzOxF47Li
-sOggn6nnirjtP+Rvhtjl1Tv+R+iPUe7dtn82a8d193gE36xRsyVlBKsNztteOttq
-j9ppRseS8rO6bJA9cQIDAQABoxMwETAPBgkrBgEFBQcwAQUEAgUAMA0GCSqGSIb3
-DQEBBQUAA4ICAQCCQQ0IVokNsLwVboqquYVVLGFPeHxBPdMGADreaRlPskS9/cpC
-qu0Sdrtu5/opq+x71ctIiug77zCksZRzg0Mh+R98OMypm6F7uq+WnsTiljlv1eyy
-WpWi7kqyxEXfVBJp+i+240KP2unriwoU/cLalwf9MW90iswYQ0zm496RS3LUHRdR
-GNhst1HkreDzRXCY5xrl5rxUerbko2YK4H4vcWT5uPa568rkqRSysoI5GeRXdmhm
-kqMV6IPL1yz7XufDUJ3fpdzG96CT5qu7+I6FTKI6vYzH6A0T3+jLjErv1oxC5uCc
-RWDjRa2t2ftWespzLYczyDe585qmw8J5dimqx3W3EvsUB+ATSMFpraO9n5SDRqqz
-RAryYrtVmoBG+4avDWA5eu7crBWiHyvCQw/N0sBJqX8eKMppkeAGHbLtcQIKH3sv
-GYv+XbO43aCtDcZ1R64VjtFP8xzz7v7rNMLqnX1tMwCKVejvJmikkZDV+eQcX3cU
-yBex/UHyKHTKGuS+ASbPPTtGmG4l7qtmdT2lzwZaX/+pOljePS8iChNalGry/fAa
-wgbJlvE6WYdQg1xXw+Q233oNAsMgwssszN9GbFHfBBFREa6BoyouNah3Gzc1N1Tq
-O8FGp0jjeEDDojr3PpT/SExVef+E5ThM8xaCJ3/hwmGW09PBlJKUjD0+NA==
------END CERTIFICATE-----
diff --git a/tests/cert-svc/data/TestData/ssl/demoCA/newcerts/22.pem b/tests/cert-svc/data/TestData/ssl/demoCA/newcerts/22.pem
deleted file mode 100644 (file)
index 6ade2c8..0000000
+++ /dev/null
@@ -1,82 +0,0 @@
-Certificate:
-    Data:
-        Version: 3 (0x2)
-        Serial Number: 34 (0x22)
-        Signature Algorithm: sha1WithRSAEncryption
-        Issuer: C=KR, ST=KyungGi-Do, L=Suwon-Si, O=Samsung Elec., CN=CA
-        Validity
-            Not Before: Mar 16 12:50:36 2009 GMT
-            Not After : Mar 16 12:50:36 2010 GMT
-        Subject: C=KR, ST=KyungGi-Do, O=Samsung Elec., CN=OCSP Responder
-        Subject Public Key Info:
-            Public Key Algorithm: rsaEncryption
-            RSA Public Key: (1024 bit)
-                Modulus (1024 bit):
-                    00:b9:0e:80:20:fc:74:49:08:cb:83:87:76:e4:42:
-                    03:42:6e:56:1b:ae:73:43:9b:a6:cf:5d:33:1d:37:
-                    cf:b5:22:bc:79:5e:6a:69:02:3e:e2:08:c5:f5:be:
-                    ee:ef:df:4f:85:41:a2:5f:d3:76:39:3f:61:56:14:
-                    1f:c1:cc:ec:45:e3:b2:e2:b0:e8:20:9f:a9:e7:8a:
-                    b8:ed:3f:e4:6f:86:d8:e5:d5:3b:fe:47:e8:8f:51:
-                    ee:dd:b6:7f:36:6b:c7:75:f7:78:04:df:ac:51:b3:
-                    25:65:04:ab:0d:ce:db:5e:3a:db:6a:8f:da:69:46:
-                    c7:92:f2:b3:ba:6c:90:3d:71
-                Exponent: 65537 (0x10001)
-        X509v3 extensions:
-            OCSP No Check: 
-
-            X509v3 Extended Key Usage: 
-                OCSP Signing
-    Signature Algorithm: sha1WithRSAEncryption
-        01:64:cf:9d:45:b8:8f:e5:96:d2:fe:3f:dc:bc:58:cb:db:6b:
-        26:ec:33:9b:84:6a:f8:a9:3e:5a:8a:3b:97:63:db:c8:d1:0c:
-        3e:c1:8d:1f:6f:16:20:9a:d9:97:78:2f:7a:4f:d1:49:fa:e0:
-        0d:fe:aa:20:d4:97:71:ed:44:63:2d:eb:91:86:83:70:0e:44:
-        1d:7c:91:3d:31:11:a8:bb:60:7c:65:71:73:1c:b1:5e:d2:f2:
-        11:78:be:3a:90:2d:a4:79:a0:b6:53:33:8e:cb:f4:ee:5e:ce:
-        4b:41:19:c5:27:13:f5:fa:09:4c:5d:af:52:59:95:4c:2f:2b:
-        3b:24:2c:54:8f:72:2f:86:c7:57:a4:3a:f3:f2:bf:29:60:f5:
-        f6:31:73:8a:62:2e:83:c5:8c:91:ba:85:ab:e1:b6:5a:fb:50:
-        fd:e5:3e:96:f7:dd:9b:1d:91:ac:2d:1b:b7:ca:62:c8:f7:a4:
-        17:6d:2d:ab:87:4b:69:9e:0f:cc:6a:e4:40:3b:82:64:c7:0d:
-        7b:81:56:20:5d:cd:1b:99:2e:35:31:78:4a:e6:d8:aa:8e:42:
-        6c:c5:e5:bf:a0:f1:5a:1e:21:6a:c0:cb:85:f1:90:6c:93:53:
-        66:a8:62:1e:a7:77:15:1f:de:09:23:13:5f:b8:12:33:31:c1:
-        4b:44:3b:e1:c4:3f:6a:f5:98:72:d1:ab:e7:9f:0e:f1:46:19:
-        0b:09:f6:bd:f4:fe:e0:1f:9f:ff:5c:3b:69:42:5e:ec:a5:ab:
-        85:11:29:23:24:fc:37:ab:4f:b0:9c:a3:2c:5d:84:4d:b3:d9:
-        fc:a0:87:36:15:22:30:b5:de:f8:27:4e:12:41:11:81:3b:8b:
-        2d:d8:34:d5:79:0b:fa:47:54:5b:46:2e:2c:6d:f4:e1:7e:78:
-        2d:86:ec:17:5e:29:3a:97:af:7e:0e:df:9a:d2:7d:f0:10:0d:
-        c0:ac:ce:5c:ae:fe:b4:01:82:cf:5f:f9:be:ba:b2:15:5d:04:
-        5a:58:06:92:2a:5f:e3:98:6a:10:da:51:60:30:66:17:cb:ba:
-        5b:79:e8:17:63:16:e8:67:40:07:c6:ea:b9:8f:12:d4:31:de:
-        95:b8:dd:e6:04:5b:3f:b6:c6:25:7b:23:51:2f:62:c5:5f:f9:
-        d5:2e:9b:7f:ba:d9:fc:72:6f:3a:2c:b6:1f:98:87:ea:48:df:
-        07:97:90:6d:21:48:6b:6a:92:d5:d0:2e:6b:37:56:3e:2a:74:
-        fa:84:02:57:9c:81:eb:e0:2d:3a:e4:2c:94:15:69:75:65:e0:
-        d7:b2:d5:a8:94:39:da:21:85:b2:51:bc:c3:b0:da:16:a5:06:
-        98:bc:9f:e6:ea:4a:2c:ab
------BEGIN CERTIFICATE-----
-MIIDzDCCAbSgAwIBAgIBIjANBgkqhkiG9w0BAQUFADBaMQswCQYDVQQGEwJLUjET
-MBEGA1UECBMKS3l1bmdHaS1EbzERMA8GA1UEBxMIU3V3b24tU2kxFjAUBgNVBAoT
-DVNhbXN1bmcgRWxlYy4xCzAJBgNVBAMTAkNBMB4XDTA5MDMxNjEyNTAzNloXDTEw
-MDMxNjEyNTAzNlowUzELMAkGA1UEBhMCS1IxEzARBgNVBAgTCkt5dW5nR2ktRG8x
-FjAUBgNVBAoTDVNhbXN1bmcgRWxlYy4xFzAVBgNVBAMTDk9DU1AgUmVzcG9uZGVy
-MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQC5DoAg/HRJCMuDh3bkQgNCblYb
-rnNDm6bPXTMdN8+1Irx5XmppAj7iCMX1vu7v30+FQaJf03Y5P2FWFB/BzOxF47Li
-sOggn6nnirjtP+Rvhtjl1Tv+R+iPUe7dtn82a8d193gE36xRsyVlBKsNztteOttq
-j9ppRseS8rO6bJA9cQIDAQABoygwJjAPBgkrBgEFBQcwAQUEAgUAMBMGA1UdJQQM
-MAoGCCsGAQUFBwMJMA0GCSqGSIb3DQEBBQUAA4ICAQABZM+dRbiP5ZbS/j/cvFjL
-22sm7DObhGr4qT5aijuXY9vI0Qw+wY0fbxYgmtmXeC96T9FJ+uAN/qog1Jdx7URj
-LeuRhoNwDkQdfJE9MRGou2B8ZXFzHLFe0vIReL46kC2keaC2UzOOy/TuXs5LQRnF
-JxP1+glMXa9SWZVMLys7JCxUj3IvhsdXpDrz8r8pYPX2MXOKYi6DxYyRuoWr4bZa
-+1D95T6W992bHZGsLRu3ymLI96QXbS2rh0tpng/MauRAO4Jkxw17gVYgXc0bmS41
-MXhK5tiqjkJsxeW/oPFaHiFqwMuF8ZBsk1NmqGIep3cVH94JIxNfuBIzMcFLRDvh
-xD9q9Zhy0avnnw7xRhkLCfa99P7gH5//XDtpQl7spauFESkjJPw3q0+wnKMsXYRN
-s9n8oIc2FSIwtd74J04SQRGBO4st2DTVeQv6R1RbRi4sbfThfngthuwXXik6l69+
-Dt+a0n3wEA3ArM5crv60AYLPX/m+urIVXQRaWAaSKl/jmGoQ2lFgMGYXy7pbeegX
-YxboZ0AHxuq5jxLUMd6VuN3mBFs/tsYleyNRL2LFX/nVLpt/utn8cm86LLYfmIfq
-SN8Hl5BtIUhrapLV0C5rN1Y+KnT6hAJXnIHr4C065CyUFWl1ZeDXstWolDnaIYWy
-UbzDsNoWpQaYvJ/m6kosqw==
------END CERTIFICATE-----
diff --git a/tests/cert-svc/data/TestData/ssl/demoCA/newcerts/23.pem b/tests/cert-svc/data/TestData/ssl/demoCA/newcerts/23.pem
deleted file mode 100644 (file)
index b0f45ad..0000000
+++ /dev/null
@@ -1,79 +0,0 @@
-Certificate:
-    Data:
-        Version: 3 (0x2)
-        Serial Number: 35 (0x23)
-        Signature Algorithm: sha1WithRSAEncryption
-        Issuer: C=KR, ST=KyungGi-Do, L=Suwon-Si, O=Samsung Elec., CN=CA
-        Validity
-            Not Before: Mar 16 12:59:02 2009 GMT
-            Not After : Mar 16 12:59:02 2010 GMT
-        Subject: C=KR, ST=KyungGi-Do, O=Samsung Elec., CN=OCSP Responder
-        Subject Public Key Info:
-            Public Key Algorithm: rsaEncryption
-            RSA Public Key: (1024 bit)
-                Modulus (1024 bit):
-                    00:b9:0e:80:20:fc:74:49:08:cb:83:87:76:e4:42:
-                    03:42:6e:56:1b:ae:73:43:9b:a6:cf:5d:33:1d:37:
-                    cf:b5:22:bc:79:5e:6a:69:02:3e:e2:08:c5:f5:be:
-                    ee:ef:df:4f:85:41:a2:5f:d3:76:39:3f:61:56:14:
-                    1f:c1:cc:ec:45:e3:b2:e2:b0:e8:20:9f:a9:e7:8a:
-                    b8:ed:3f:e4:6f:86:d8:e5:d5:3b:fe:47:e8:8f:51:
-                    ee:dd:b6:7f:36:6b:c7:75:f7:78:04:df:ac:51:b3:
-                    25:65:04:ab:0d:ce:db:5e:3a:db:6a:8f:da:69:46:
-                    c7:92:f2:b3:ba:6c:90:3d:71
-                Exponent: 65537 (0x10001)
-        X509v3 extensions:
-            OCSP No Check: 
-
-    Signature Algorithm: sha1WithRSAEncryption
-        56:3b:b8:5c:63:eb:9d:db:55:cc:00:8e:5b:2b:2b:b1:17:d4:
-        f0:a4:ca:f7:b9:02:37:ea:2a:ff:df:34:a0:ba:af:a2:47:a5:
-        8e:1a:f9:eb:97:51:16:a5:6a:35:20:3f:5a:8a:25:98:00:73:
-        3e:b1:c9:1c:9c:a2:12:72:be:3f:ce:e3:7e:09:c0:8c:4a:eb:
-        33:4c:77:7c:5c:7c:d7:20:07:a0:9f:48:1d:f9:9a:24:e1:50:
-        f6:63:c4:6e:70:65:12:51:47:79:c5:0e:d9:c2:c5:f5:69:67:
-        34:a5:b9:64:6e:31:ed:76:5b:66:74:41:10:35:58:48:43:e1:
-        29:72:25:dd:64:9b:80:03:31:96:a2:d0:75:58:06:66:37:c2:
-        86:fb:42:a6:50:3b:8c:22:e0:b9:a7:b5:7d:35:df:5d:58:ca:
-        f1:e9:be:60:6d:cc:2d:72:d7:c6:c1:8e:48:6f:ed:54:06:fa:
-        31:92:c7:34:8a:64:32:82:4b:a9:20:9f:8c:1d:2d:c1:f1:35:
-        77:5b:0f:7d:f0:2a:0c:a8:b2:cb:86:ac:cd:9c:5d:91:df:78:
-        b1:e1:cc:1e:f7:da:7e:3d:01:4a:86:07:86:9f:50:3b:69:91:
-        cf:3e:22:ec:7a:e3:c8:8f:f8:69:d2:f0:16:de:b6:5c:e4:fa:
-        89:1a:de:74:d3:fb:df:16:1d:46:d4:7d:b6:74:8a:eb:fc:bf:
-        c0:82:3b:1d:c3:af:6f:b5:12:f2:c6:cc:05:47:12:cb:4e:f6:
-        48:b9:da:bd:da:b0:dc:3c:a5:83:29:11:7e:66:7f:1e:08:5f:
-        7e:90:13:a5:63:c9:76:5e:91:b2:37:3b:ff:e7:8d:07:ab:0c:
-        34:57:17:8d:09:92:86:1b:63:68:c1:e3:c8:f1:56:19:46:5b:
-        a9:1a:13:a2:23:9b:57:2d:92:25:cc:b7:fe:62:1c:80:bb:08:
-        e4:23:1d:9f:ad:5c:41:6d:27:b2:9d:d6:03:96:c6:22:f1:cb:
-        87:04:c7:55:22:4b:88:6c:07:11:e6:d1:ca:0e:2a:5a:a4:9b:
-        ea:e4:90:ef:e5:ea:ae:a5:db:dd:dd:85:da:a3:80:1a:fb:91:
-        df:f3:8a:65:35:8f:a8:d4:65:51:b7:f7:f9:fb:b4:97:d8:a2:
-        4d:04:4d:f5:89:d2:ed:ee:f4:2e:b4:ba:45:8f:36:1d:20:0a:
-        89:c6:aa:be:39:1c:cb:e4:07:a1:d0:0e:c7:8c:b0:70:25:10:
-        7e:cb:64:0d:1f:32:5e:b5:7b:c0:d9:15:e4:aa:a5:b3:5f:4a:
-        91:0f:b5:b8:9e:a2:6b:f7:d7:73:35:dc:bc:e2:88:6e:b1:79:
-        0c:f6:dd:e9:9a:fb:1a:45
------BEGIN CERTIFICATE-----
-MIIDtzCCAZ+gAwIBAgIBIzANBgkqhkiG9w0BAQUFADBaMQswCQYDVQQGEwJLUjET
-MBEGA1UECBMKS3l1bmdHaS1EbzERMA8GA1UEBxMIU3V3b24tU2kxFjAUBgNVBAoT
-DVNhbXN1bmcgRWxlYy4xCzAJBgNVBAMTAkNBMB4XDTA5MDMxNjEyNTkwMloXDTEw
-MDMxNjEyNTkwMlowUzELMAkGA1UEBhMCS1IxEzARBgNVBAgTCkt5dW5nR2ktRG8x
-FjAUBgNVBAoTDVNhbXN1bmcgRWxlYy4xFzAVBgNVBAMTDk9DU1AgUmVzcG9uZGVy
-MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQC5DoAg/HRJCMuDh3bkQgNCblYb
-rnNDm6bPXTMdN8+1Irx5XmppAj7iCMX1vu7v30+FQaJf03Y5P2FWFB/BzOxF47Li
-sOggn6nnirjtP+Rvhtjl1Tv+R+iPUe7dtn82a8d193gE36xRsyVlBKsNztteOttq
-j9ppRseS8rO6bJA9cQIDAQABoxMwETAPBgkrBgEFBQcwAQUEAgUAMA0GCSqGSIb3
-DQEBBQUAA4ICAQBWO7hcY+ud21XMAI5bKyuxF9TwpMr3uQI36ir/3zSguq+iR6WO
-Gvnrl1EWpWo1ID9aiiWYAHM+sckcnKIScr4/zuN+CcCMSuszTHd8XHzXIAegn0gd
-+Zok4VD2Y8RucGUSUUd5xQ7ZwsX1aWc0pblkbjHtdltmdEEQNVhIQ+EpciXdZJuA
-AzGWotB1WAZmN8KG+0KmUDuMIuC5p7V9Nd9dWMrx6b5gbcwtctfGwY5Ib+1UBvox
-ksc0imQygkupIJ+MHS3B8TV3Ww998CoMqLLLhqzNnF2R33ix4cwe99p+PQFKhgeG
-n1A7aZHPPiLseuPIj/hp0vAW3rZc5PqJGt500/vfFh1G1H22dIrr/L/Agjsdw69v
-tRLyxswFRxLLTvZIudq92rDcPKWDKRF+Zn8eCF9+kBOlY8l2XpGyNzv/540Hqww0
-VxeNCZKGG2NowePI8VYZRlupGhOiI5tXLZIlzLf+YhyAuwjkIx2frVxBbSeyndYD
-lsYi8cuHBMdVIkuIbAcR5tHKDipapJvq5JDv5equpdvd3YXao4Aa+5Hf84plNY+o
-1GVRt/f5+7SX2KJNBE31idLt7vQutLpFjzYdIAqJxqq+ORzL5Aeh0A7HjLBwJRB+
-y2QNHzJetXvA2RXkqqWzX0qRD7W4nqJr99dzNdy84ohusXkM9t3pmvsaRQ==
------END CERTIFICATE-----
diff --git a/tests/cert-svc/data/TestData/ssl/demoCA/newcerts/24.pem b/tests/cert-svc/data/TestData/ssl/demoCA/newcerts/24.pem
deleted file mode 100644 (file)
index 74acea7..0000000
+++ /dev/null
@@ -1,79 +0,0 @@
-Certificate:
-    Data:
-        Version: 3 (0x2)
-        Serial Number: 36 (0x24)
-        Signature Algorithm: sha1WithRSAEncryption
-        Issuer: C=KR, ST=KyungGi-Do, L=Suwon-Si, O=Samsung Elec., CN=CA
-        Validity
-            Not Before: Mar 16 12:59:24 2009 GMT
-            Not After : Mar 16 12:59:24 2010 GMT
-        Subject: C=KR, ST=KyungGi-Do, O=Samsung Elec., CN=OCSP Responder
-        Subject Public Key Info:
-            Public Key Algorithm: rsaEncryption
-            RSA Public Key: (1024 bit)
-                Modulus (1024 bit):
-                    00:b9:0e:80:20:fc:74:49:08:cb:83:87:76:e4:42:
-                    03:42:6e:56:1b:ae:73:43:9b:a6:cf:5d:33:1d:37:
-                    cf:b5:22:bc:79:5e:6a:69:02:3e:e2:08:c5:f5:be:
-                    ee:ef:df:4f:85:41:a2:5f:d3:76:39:3f:61:56:14:
-                    1f:c1:cc:ec:45:e3:b2:e2:b0:e8:20:9f:a9:e7:8a:
-                    b8:ed:3f:e4:6f:86:d8:e5:d5:3b:fe:47:e8:8f:51:
-                    ee:dd:b6:7f:36:6b:c7:75:f7:78:04:df:ac:51:b3:
-                    25:65:04:ab:0d:ce:db:5e:3a:db:6a:8f:da:69:46:
-                    c7:92:f2:b3:ba:6c:90:3d:71
-                Exponent: 65537 (0x10001)
-        X509v3 extensions:
-            OCSP No Check: 
-
-    Signature Algorithm: sha1WithRSAEncryption
-        5c:26:43:01:d9:b4:43:ff:e0:3f:49:67:cd:a3:ea:1c:b3:75:
-        f9:12:d8:c8:0b:96:65:a5:bd:db:15:3c:d6:18:2c:00:59:2d:
-        1c:17:a6:74:8d:48:03:70:9c:c9:70:00:74:81:0b:b6:5d:c3:
-        cf:41:ed:1b:1a:06:89:f7:e3:b0:61:33:bf:b9:9b:11:68:bb:
-        30:50:c2:f5:13:40:84:42:b8:7d:9e:cb:03:03:8f:5c:7b:44:
-        23:dc:e3:ed:dc:09:c6:d4:aa:23:19:50:bc:6c:2a:a9:f9:3b:
-        55:e7:3d:34:aa:6e:96:7a:a5:72:95:9e:42:21:05:ca:98:1d:
-        06:80:55:8e:b8:eb:d7:56:12:f9:84:c3:c9:2e:73:eb:fa:5b:
-        15:f4:11:a5:95:b5:52:90:52:c7:0e:8c:7a:5d:30:34:2e:4b:
-        ca:98:91:19:cc:3b:88:5f:18:85:8f:0d:31:97:ee:2d:7c:d4:
-        95:ea:b1:03:15:7d:f6:0a:64:bd:8f:b4:fd:7e:51:91:c2:6d:
-        13:51:7c:0f:d8:6d:6e:a8:56:3a:73:a2:d9:9a:37:19:ce:31:
-        8f:a2:b7:39:c9:5e:f0:8b:7d:fe:e4:19:9d:49:11:86:1c:d6:
-        04:00:84:53:62:ee:94:f9:7c:b3:2d:db:5a:3c:3d:ce:e9:5f:
-        76:52:c5:b8:b6:2b:02:52:8a:b2:5f:99:00:9b:12:36:77:d4:
-        38:ad:8f:34:b3:7e:2b:6d:cf:34:7b:f3:62:79:4b:da:8f:54:
-        bd:cb:f9:d8:10:71:d7:dc:37:34:f9:2c:33:b9:33:b0:38:f8:
-        ec:6c:70:61:ad:37:92:28:71:a5:fe:08:54:9f:1d:6f:ba:28:
-        1d:6b:a8:35:a4:09:06:73:b8:38:a4:32:48:a9:4b:a9:7c:32:
-        0c:18:bd:4b:8f:e0:b6:d7:83:30:89:df:d2:da:5a:f6:5b:fa:
-        84:5c:32:bf:1d:6d:1d:9e:d5:a9:a2:75:88:3d:4a:15:d8:cb:
-        41:7d:ec:94:f1:18:f6:9f:7f:c6:75:1f:77:02:2f:7b:30:1e:
-        56:b6:bd:b1:c6:d9:e9:44:71:bb:1c:74:a0:17:1a:da:10:4e:
-        22:f1:e0:13:6e:ec:56:61:18:72:fe:81:a6:2d:47:c3:90:9a:
-        3a:4d:06:97:9a:22:ef:f4:7c:37:d9:64:3b:6c:15:9f:fd:77:
-        cc:a9:77:ff:6a:7e:dd:06:0d:43:c5:a6:37:39:df:4d:a5:80:
-        ac:5d:f8:d5:7c:ca:90:a3:58:2b:b6:ea:ed:f1:c3:91:15:28:
-        e3:5e:c0:fb:f9:6e:18:de:63:df:43:a5:d3:8f:ae:4e:44:3c:
-        4c:6c:92:40:1f:bd:d1:6a
------BEGIN CERTIFICATE-----
-MIIDtzCCAZ+gAwIBAgIBJDANBgkqhkiG9w0BAQUFADBaMQswCQYDVQQGEwJLUjET
-MBEGA1UECBMKS3l1bmdHaS1EbzERMA8GA1UEBxMIU3V3b24tU2kxFjAUBgNVBAoT
-DVNhbXN1bmcgRWxlYy4xCzAJBgNVBAMTAkNBMB4XDTA5MDMxNjEyNTkyNFoXDTEw
-MDMxNjEyNTkyNFowUzELMAkGA1UEBhMCS1IxEzARBgNVBAgTCkt5dW5nR2ktRG8x
-FjAUBgNVBAoTDVNhbXN1bmcgRWxlYy4xFzAVBgNVBAMTDk9DU1AgUmVzcG9uZGVy
-MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQC5DoAg/HRJCMuDh3bkQgNCblYb
-rnNDm6bPXTMdN8+1Irx5XmppAj7iCMX1vu7v30+FQaJf03Y5P2FWFB/BzOxF47Li
-sOggn6nnirjtP+Rvhtjl1Tv+R+iPUe7dtn82a8d193gE36xRsyVlBKsNztteOttq
-j9ppRseS8rO6bJA9cQIDAQABoxMwETAPBgkrBgEFBQcwAQUEAgUAMA0GCSqGSIb3
-DQEBBQUAA4ICAQBcJkMB2bRD/+A/SWfNo+ocs3X5EtjIC5Zlpb3bFTzWGCwAWS0c
-F6Z0jUgDcJzJcAB0gQu2XcPPQe0bGgaJ9+OwYTO/uZsRaLswUML1E0CEQrh9nssD
-A49ce0Qj3OPt3AnG1KojGVC8bCqp+TtV5z00qm6WeqVylZ5CIQXKmB0GgFWOuOvX
-VhL5hMPJLnPr+lsV9BGllbVSkFLHDox6XTA0LkvKmJEZzDuIXxiFjw0xl+4tfNSV
-6rEDFX32CmS9j7T9flGRwm0TUXwP2G1uqFY6c6LZmjcZzjGPorc5yV7wi33+5Bmd
-SRGGHNYEAIRTYu6U+XyzLdtaPD3O6V92UsW4tisCUoqyX5kAmxI2d9Q4rY80s34r
-bc80e/NieUvaj1S9y/nYEHHX3Dc0+SwzuTOwOPjsbHBhrTeSKHGl/ghUnx1vuigd
-a6g1pAkGc7g4pDJIqUupfDIMGL1Lj+C214Mwid/S2lr2W/qEXDK/HW0dntWponWI
-PUoV2MtBfeyU8Rj2n3/GdR93Ai97MB5Wtr2xxtnpRHG7HHSgFxraEE4i8eATbuxW
-YRhy/oGmLUfDkJo6TQaXmiLv9Hw32WQ7bBWf/XfMqXf/an7dBg1DxaY3Od9NpYCs
-XfjVfMqQo1grturt8cORFSjjXsD7+W4Y3mPfQ6XTj65ORDxMbJJAH73Rag==
------END CERTIFICATE-----
diff --git a/tests/cert-svc/data/TestData/ssl/demoCA/newcerts/25.pem b/tests/cert-svc/data/TestData/ssl/demoCA/newcerts/25.pem
deleted file mode 100644 (file)
index 3b5a187..0000000
+++ /dev/null
@@ -1,79 +0,0 @@
-Certificate:
-    Data:
-        Version: 3 (0x2)
-        Serial Number: 37 (0x25)
-        Signature Algorithm: sha1WithRSAEncryption
-        Issuer: C=KR, ST=KyungGi-Do, L=Suwon-Si, O=Samsung Elec., CN=CA
-        Validity
-            Not Before: Mar 16 12:59:41 2009 GMT
-            Not After : Mar 16 12:59:41 2010 GMT
-        Subject: C=KR, ST=KyungGi-Do, O=Samsung Elec., CN=OCSP Responder
-        Subject Public Key Info:
-            Public Key Algorithm: rsaEncryption
-            RSA Public Key: (1024 bit)
-                Modulus (1024 bit):
-                    00:b9:0e:80:20:fc:74:49:08:cb:83:87:76:e4:42:
-                    03:42:6e:56:1b:ae:73:43:9b:a6:cf:5d:33:1d:37:
-                    cf:b5:22:bc:79:5e:6a:69:02:3e:e2:08:c5:f5:be:
-                    ee:ef:df:4f:85:41:a2:5f:d3:76:39:3f:61:56:14:
-                    1f:c1:cc:ec:45:e3:b2:e2:b0:e8:20:9f:a9:e7:8a:
-                    b8:ed:3f:e4:6f:86:d8:e5:d5:3b:fe:47:e8:8f:51:
-                    ee:dd:b6:7f:36:6b:c7:75:f7:78:04:df:ac:51:b3:
-                    25:65:04:ab:0d:ce:db:5e:3a:db:6a:8f:da:69:46:
-                    c7:92:f2:b3:ba:6c:90:3d:71
-                Exponent: 65537 (0x10001)
-        X509v3 extensions:
-            OCSP No Check: 
-
-    Signature Algorithm: sha1WithRSAEncryption
-        26:92:48:59:3d:33:df:db:c5:57:57:5a:6e:1d:b0:33:bc:83:
-        c5:27:d8:97:dc:a7:96:24:19:d8:58:8b:7d:9b:e7:80:89:6a:
-        e2:7c:fe:68:6e:11:3d:83:40:65:01:f1:44:58:20:9a:3b:14:
-        c6:66:ed:1b:e4:86:46:fb:81:6b:b1:9d:0c:4a:0b:5d:90:c6:
-        d0:08:0a:3d:b2:45:31:a1:aa:0f:e9:be:f2:5f:03:31:70:10:
-        55:c8:6e:d8:df:ca:9b:3e:77:f5:c5:c0:87:e0:8e:f2:16:c2:
-        d5:35:a9:e6:c6:e7:15:e7:4d:db:f2:bd:01:8f:23:59:2b:36:
-        5e:97:80:ec:02:47:60:a6:9f:a3:57:b8:d4:ef:81:9f:6b:c8:
-        58:65:43:8a:47:c1:8d:1c:20:e5:1e:e1:ce:89:72:60:ec:63:
-        c2:96:11:0e:be:98:d3:8f:85:b7:33:28:fb:d5:57:4e:96:3f:
-        2b:1c:d6:65:e7:ad:82:67:d8:ca:82:be:a7:74:7b:87:02:8b:
-        de:70:aa:d3:77:e7:6d:e4:97:02:24:07:ea:03:40:de:16:de:
-        94:0c:7e:d9:f3:cc:37:ac:b9:39:ee:ea:b5:4b:ee:21:00:9c:
-        0a:54:cf:bd:35:dd:92:71:8b:98:4d:9b:f9:4e:40:b1:d2:bb:
-        9c:5c:98:53:dc:7f:13:e5:c6:21:b8:c5:42:81:f0:10:bc:a6:
-        0d:b7:53:9b:38:67:82:85:2d:bd:87:20:f6:e0:4c:06:a0:b8:
-        30:a6:74:b2:ee:43:31:95:53:02:ad:c0:88:83:d0:70:d1:af:
-        b4:97:66:d1:00:c9:c5:d2:a7:d1:be:b1:fb:1b:75:86:a1:ef:
-        0d:c2:78:77:ae:d5:aa:e9:2c:66:80:f7:04:7c:b9:f5:cd:32:
-        cf:c2:a2:11:9f:34:39:ec:ee:e0:fe:80:c4:34:24:c3:1c:43:
-        3b:44:d2:55:44:55:28:ef:38:bd:07:37:ad:fd:92:2e:1b:96:
-        0d:0a:08:84:a6:74:4c:c3:99:0b:11:36:4e:04:47:6a:82:b3:
-        45:c7:73:7c:9e:9f:a3:46:c2:b5:26:21:21:8d:04:31:79:db:
-        b6:71:b0:1b:7f:3c:9b:eb:07:cc:0d:c2:44:20:48:91:1d:b3:
-        2a:34:4f:b9:f3:4e:6f:86:46:83:3c:56:ab:87:8f:bf:e6:15:
-        60:4d:d3:d9:56:0e:9c:eb:86:ea:df:2d:1c:5e:9b:c7:38:ec:
-        c5:db:22:b7:92:55:2b:ba:3e:3f:da:09:5e:82:ab:9a:fe:bb:
-        2b:ac:11:f3:b9:d8:8f:aa:35:66:d3:cd:bc:5b:69:11:e6:06:
-        31:92:07:a2:3f:86:26:43
------BEGIN CERTIFICATE-----
-MIIDtzCCAZ+gAwIBAgIBJTANBgkqhkiG9w0BAQUFADBaMQswCQYDVQQGEwJLUjET
-MBEGA1UECBMKS3l1bmdHaS1EbzERMA8GA1UEBxMIU3V3b24tU2kxFjAUBgNVBAoT
-DVNhbXN1bmcgRWxlYy4xCzAJBgNVBAMTAkNBMB4XDTA5MDMxNjEyNTk0MVoXDTEw
-MDMxNjEyNTk0MVowUzELMAkGA1UEBhMCS1IxEzARBgNVBAgTCkt5dW5nR2ktRG8x
-FjAUBgNVBAoTDVNhbXN1bmcgRWxlYy4xFzAVBgNVBAMTDk9DU1AgUmVzcG9uZGVy
-MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQC5DoAg/HRJCMuDh3bkQgNCblYb
-rnNDm6bPXTMdN8+1Irx5XmppAj7iCMX1vu7v30+FQaJf03Y5P2FWFB/BzOxF47Li
-sOggn6nnirjtP+Rvhtjl1Tv+R+iPUe7dtn82a8d193gE36xRsyVlBKsNztteOttq
-j9ppRseS8rO6bJA9cQIDAQABoxMwETAPBgkrBgEFBQcwAQUEAgUAMA0GCSqGSIb3
-DQEBBQUAA4ICAQAmkkhZPTPf28VXV1puHbAzvIPFJ9iX3KeWJBnYWIt9m+eAiWri
-fP5obhE9g0BlAfFEWCCaOxTGZu0b5IZG+4FrsZ0MSgtdkMbQCAo9skUxoaoP6b7y
-XwMxcBBVyG7Y38qbPnf1xcCH4I7yFsLVNanmxucV503b8r0BjyNZKzZel4DsAkdg
-pp+jV7jU74Gfa8hYZUOKR8GNHCDlHuHOiXJg7GPClhEOvpjTj4W3Myj71VdOlj8r
-HNZl562CZ9jKgr6ndHuHAovecKrTd+dt5JcCJAfqA0DeFt6UDH7Z88w3rLk57uq1
-S+4hAJwKVM+9Nd2ScYuYTZv5TkCx0rucXJhT3H8T5cYhuMVCgfAQvKYNt1ObOGeC
-hS29hyD24EwGoLgwpnSy7kMxlVMCrcCIg9Bw0a+0l2bRAMnF0qfRvrH7G3WGoe8N
-wnh3rtWq6SxmgPcEfLn1zTLPwqIRnzQ57O7g/oDENCTDHEM7RNJVRFUo7zi9Bzet
-/ZIuG5YNCgiEpnRMw5kLETZOBEdqgrNFx3N8np+jRsK1JiEhjQQxedu2cbAbfzyb
-6wfMDcJEIEiRHbMqNE+5805vhkaDPFarh4+/5hVgTdPZVg6c64bq3y0cXpvHOOzF
-2yK3klUruj4/2glegqua/rsrrBHzudiPqjVm0828W2kR5gYxkgeiP4YmQw==
------END CERTIFICATE-----
diff --git a/tests/cert-svc/data/TestData/ssl/demoCA/newcerts/26.pem b/tests/cert-svc/data/TestData/ssl/demoCA/newcerts/26.pem
deleted file mode 100644 (file)
index b0ec9fc..0000000
+++ /dev/null
@@ -1,80 +0,0 @@
-Certificate:
-    Data:
-        Version: 3 (0x2)
-        Serial Number: 38 (0x26)
-        Signature Algorithm: sha1WithRSAEncryption
-        Issuer: C=KR, ST=KyungGi-Do, L=Suwon-Si, O=Samsung Elec., CN=CA
-        Validity
-            Not Before: Mar 16 14:04:29 2009 GMT
-            Not After : Mar 16 14:04:29 2010 GMT
-        Subject: C=KR, ST=KyungGi-Do, O=Samsung Elec., CN=Responder certificate with nocheck ext. field
-        Subject Public Key Info:
-            Public Key Algorithm: rsaEncryption
-            RSA Public Key: (1024 bit)
-                Modulus (1024 bit):
-                    00:c3:69:f4:12:34:1b:04:51:33:26:84:9e:5a:fe:
-                    2b:d7:d8:eb:6a:14:af:e5:58:68:a5:71:e4:5e:8a:
-                    55:dc:69:71:14:3f:16:48:b1:52:ee:22:05:fd:2a:
-                    e7:6e:ce:f1:24:49:f0:06:3d:f5:ed:6c:ed:26:11:
-                    93:93:4e:08:05:91:26:b9:22:e8:77:8b:6f:50:a5:
-                    db:14:28:2c:c2:94:86:d2:64:11:0e:8a:51:eb:54:
-                    3b:5a:1f:70:0a:b2:5c:e2:b2:62:99:30:7c:8c:71:
-                    f6:08:28:4f:d9:38:38:38:f3:82:cd:3a:ed:57:5c:
-                    c9:d2:bc:47:fa:96:24:2e:d5
-                Exponent: 65537 (0x10001)
-        X509v3 extensions:
-            OCSP No Check: 
-
-    Signature Algorithm: sha1WithRSAEncryption
-        41:77:99:bc:20:b3:78:98:b9:5c:ce:5b:21:0c:27:40:77:3c:
-        98:1e:f0:b6:2e:5f:70:f1:80:b1:bc:7b:fb:02:4d:86:a8:e9:
-        0c:fb:d9:ec:f4:f6:bb:33:8b:f4:f4:6d:21:f7:08:5a:aa:5c:
-        ab:bf:05:c6:7f:4f:65:b7:c9:85:77:35:67:37:f9:a3:78:d8:
-        7c:40:ca:2d:f6:17:f0:14:47:78:82:3b:ed:58:0b:b1:2d:69:
-        47:ee:39:35:17:04:94:2a:d6:57:d7:85:4b:76:a7:bc:38:31:
-        7f:a2:65:fe:e5:f5:7c:de:61:ee:ef:58:06:a1:3f:c1:49:cf:
-        e6:83:94:6a:42:d3:c4:f8:d7:51:2d:7c:1c:1e:3c:43:77:6b:
-        c9:64:aa:ca:30:94:ec:05:84:0e:54:6d:1d:95:74:82:88:90:
-        45:f9:25:83:23:2c:51:98:2e:91:6d:06:77:19:97:58:88:54:
-        5c:99:e3:71:c2:97:93:b5:5d:d2:c7:58:a7:f7:ec:b2:18:b1:
-        d5:b7:13:59:9f:d9:cf:5c:b2:48:a9:55:ec:25:2c:67:e2:f4:
-        b1:12:7f:18:a7:35:28:c3:fd:29:d2:84:f5:91:4e:57:a4:27:
-        42:37:a2:2d:ea:ae:a1:c8:c3:0a:b5:ee:60:b0:c3:6e:df:e3:
-        0c:33:65:06:21:89:51:83:7a:24:4a:e8:79:48:1d:a5:d4:35:
-        dd:3f:c8:46:9b:77:8f:3e:28:26:a2:08:aa:72:9d:a4:12:05:
-        ae:5b:2c:e9:28:3d:6d:87:0c:ed:c1:74:19:c9:c5:67:34:bf:
-        6e:cb:9f:3c:2e:12:b2:57:80:b3:bd:97:8d:16:ba:2a:7f:28:
-        9d:66:6f:78:c4:a3:26:81:07:68:3f:8c:ca:08:cc:3a:0e:de:
-        0d:6d:c6:c8:c9:9e:b0:a0:aa:89:b9:a3:96:a8:31:65:2b:bf:
-        fe:01:b9:26:9e:27:31:b6:c9:28:a9:f3:0c:bd:26:c5:b2:8d:
-        35:9b:50:6e:e0:38:76:2f:7a:44:a2:7d:54:c5:fa:bf:0b:d8:
-        0c:ae:97:ed:64:b9:0d:42:07:87:4b:e7:f2:bb:77:1e:19:61:
-        47:3d:7b:bc:a7:9b:b7:d1:d9:2a:de:ec:f8:6d:f2:0b:1e:21:
-        2f:8b:9b:6e:67:07:06:df:fb:30:83:4f:67:7d:d2:b0:9a:2c:
-        0d:06:d0:9e:08:51:f2:e4:3f:56:ff:ec:32:d6:08:52:3e:00:
-        16:b1:8c:8a:8d:01:3f:12:6b:df:53:e8:2d:1d:4c:e5:72:86:
-        96:cf:2b:40:d7:2f:d0:e7:9f:ce:19:a1:65:30:cd:1a:82:fa:
-        5a:c5:2d:a0:0a:5f:18:2a
------BEGIN CERTIFICATE-----
-MIID1jCCAb6gAwIBAgIBJjANBgkqhkiG9w0BAQUFADBaMQswCQYDVQQGEwJLUjET
-MBEGA1UECBMKS3l1bmdHaS1EbzERMA8GA1UEBxMIU3V3b24tU2kxFjAUBgNVBAoT
-DVNhbXN1bmcgRWxlYy4xCzAJBgNVBAMTAkNBMB4XDTA5MDMxNjE0MDQyOVoXDTEw
-MDMxNjE0MDQyOVowcjELMAkGA1UEBhMCS1IxEzARBgNVBAgTCkt5dW5nR2ktRG8x
-FjAUBgNVBAoTDVNhbXN1bmcgRWxlYy4xNjA0BgNVBAMTLVJlc3BvbmRlciBjZXJ0
-aWZpY2F0ZSB3aXRoIG5vY2hlY2sgZXh0LiBmaWVsZDCBnzANBgkqhkiG9w0BAQEF
-AAOBjQAwgYkCgYEAw2n0EjQbBFEzJoSeWv4r19jrahSv5VhopXHkXopV3GlxFD8W
-SLFS7iIF/Srnbs7xJEnwBj317WztJhGTk04IBZEmuSLod4tvUKXbFCgswpSG0mQR
-DopR61Q7Wh9wCrJc4rJimTB8jHH2CChP2Tg4OPOCzTrtV1zJ0rxH+pYkLtUCAwEA
-AaMTMBEwDwYJKwYBBQUHMAEFBAIFADANBgkqhkiG9w0BAQUFAAOCAgEAQXeZvCCz
-eJi5XM5bIQwnQHc8mB7wti5fcPGAsbx7+wJNhqjpDPvZ7PT2uzOL9PRtIfcIWqpc
-q78Fxn9PZbfJhXc1Zzf5o3jYfEDKLfYX8BRHeII77VgLsS1pR+45NRcElCrWV9eF
-S3anvDgxf6Jl/uX1fN5h7u9YBqE/wUnP5oOUakLTxPjXUS18HB48Q3dryWSqyjCU
-7AWEDlRtHZV0goiQRfklgyMsUZgukW0GdxmXWIhUXJnjccKXk7Vd0sdYp/fsshix
-1bcTWZ/Zz1yySKlV7CUsZ+L0sRJ/GKc1KMP9KdKE9ZFOV6QnQjeiLequocjDCrXu
-YLDDbt/jDDNlBiGJUYN6JEroeUgdpdQ13T/IRpt3jz4oJqIIqnKdpBIFrlss6Sg9
-bYcM7cF0GcnFZzS/bsufPC4SsleAs72XjRa6Kn8onWZveMSjJoEHaD+MygjMOg7e
-DW3GyMmesKCqibmjlqgxZSu//gG5Jp4nMbbJKKnzDL0mxbKNNZtQbuA4di96RKJ9
-VMX6vwvYDK6X7WS5DUIHh0vn8rt3HhlhRz17vKebt9HZKt7s+G3yCx4hL4ubbmcH
-Bt/7MINPZ33SsJosDQbQnghR8uQ/Vv/sMtYIUj4AFrGMio0BPxJr31PoLR1M5XKG
-ls8rQNcv0OefzhmhZTDNGoL6WsUtoApfGCo=
------END CERTIFICATE-----
diff --git a/tests/cert-svc/data/TestData/ssl/demoCA/newcerts/27.pem b/tests/cert-svc/data/TestData/ssl/demoCA/newcerts/27.pem
deleted file mode 100644 (file)
index 6b31eed..0000000
+++ /dev/null
@@ -1,80 +0,0 @@
-Certificate:
-    Data:
-        Version: 3 (0x2)
-        Serial Number: 39 (0x27)
-        Signature Algorithm: sha1WithRSAEncryption
-        Issuer: C=KR, ST=KyungGi-Do, L=Suwon-Si, O=Samsung Elec., CN=CA
-        Validity
-            Not Before: Mar 16 23:06:11 2009 GMT
-            Not After : Mar 14 23:06:11 2019 GMT
-        Subject: C=KR, ST=KyungGi-Do, O=Samsung Elec., CN=Responder certificate with nocheck ext. field
-        Subject Public Key Info:
-            Public Key Algorithm: rsaEncryption
-            RSA Public Key: (1024 bit)
-                Modulus (1024 bit):
-                    00:c3:69:f4:12:34:1b:04:51:33:26:84:9e:5a:fe:
-                    2b:d7:d8:eb:6a:14:af:e5:58:68:a5:71:e4:5e:8a:
-                    55:dc:69:71:14:3f:16:48:b1:52:ee:22:05:fd:2a:
-                    e7:6e:ce:f1:24:49:f0:06:3d:f5:ed:6c:ed:26:11:
-                    93:93:4e:08:05:91:26:b9:22:e8:77:8b:6f:50:a5:
-                    db:14:28:2c:c2:94:86:d2:64:11:0e:8a:51:eb:54:
-                    3b:5a:1f:70:0a:b2:5c:e2:b2:62:99:30:7c:8c:71:
-                    f6:08:28:4f:d9:38:38:38:f3:82:cd:3a:ed:57:5c:
-                    c9:d2:bc:47:fa:96:24:2e:d5
-                Exponent: 65537 (0x10001)
-        X509v3 extensions:
-            OCSP No Check: 
-
-    Signature Algorithm: sha1WithRSAEncryption
-        69:71:40:12:af:e4:be:42:52:ff:7a:a8:bf:e3:41:f2:2b:75:
-        0d:22:10:e8:d6:1e:d3:c0:bb:90:7f:76:46:92:a9:63:2b:50:
-        74:c8:73:c4:7b:0e:a0:b7:ed:5c:20:06:18:64:1b:7b:82:21:
-        a7:82:bc:c0:33:53:8b:5f:68:c7:de:5f:95:31:52:93:5d:0f:
-        78:4c:ff:50:2f:e0:57:ba:f5:49:cb:94:ba:34:85:e9:f1:10:
-        76:27:66:6d:d6:46:f6:9d:51:2d:04:96:b5:78:f7:c6:1b:25:
-        b4:0a:e7:89:f4:9f:a5:33:92:51:00:86:97:0f:47:cc:3a:8d:
-        5e:3a:c2:ad:51:48:7e:7a:03:7a:d1:a7:6d:14:8a:64:f9:5a:
-        e1:1c:cb:82:e1:42:f3:8c:dc:87:8e:9b:c8:e4:68:3c:26:eb:
-        0a:19:c8:1c:71:88:7e:c9:66:f7:fe:1a:ee:3a:52:1b:54:60:
-        95:e8:37:e6:0d:b3:8b:bf:02:07:e7:f8:16:64:f9:34:50:8c:
-        bd:54:e5:d1:0b:a8:5f:59:79:de:2a:ea:44:92:be:3e:b2:0d:
-        cd:fa:df:d3:93:10:c9:ef:40:d3:31:a7:06:e3:39:15:68:5d:
-        d7:94:4f:96:69:8e:13:8d:f3:fb:79:eb:33:50:1e:af:fa:c3:
-        d8:81:47:1b:89:05:39:62:ea:c4:ef:f7:15:29:e2:43:f2:66:
-        93:51:20:12:10:17:c9:c7:f3:7c:e0:fd:59:dc:38:ca:b2:f5:
-        fd:fe:5d:f8:9a:83:70:72:b9:e1:6b:a6:60:db:9d:a3:58:3e:
-        5e:73:a4:ce:18:12:ba:dc:56:72:f8:b4:d8:4c:e8:d9:9c:5e:
-        cf:d1:76:56:7e:2e:33:9d:1a:80:eb:dd:7c:69:c0:9c:d3:5c:
-        5c:d3:a2:89:7c:44:87:66:10:6e:f9:90:b6:72:58:90:77:48:
-        ea:56:25:52:e3:c6:bd:3c:95:99:ae:fd:2a:f7:b2:1f:87:bc:
-        af:93:ba:2d:0f:1a:ff:7e:90:3b:ae:63:96:9e:68:97:32:16:
-        ed:b8:ce:7d:48:f2:b9:83:fc:24:dc:34:1a:34:a4:19:80:78:
-        ec:b2:6c:a0:e8:15:37:1e:8d:fa:b9:62:a2:25:5d:d3:14:50:
-        f6:68:4b:09:b3:12:ac:cc:63:bb:2b:e6:2a:33:ee:c7:1c:c6:
-        64:14:47:e2:c3:29:26:ba:f9:e8:2e:34:c1:cc:9e:3b:2d:57:
-        cd:f7:fe:fb:d8:13:65:5c:42:a8:71:61:df:d7:ae:16:71:7f:
-        fd:fb:66:d6:a2:92:52:e9:cb:65:03:7d:13:8c:bc:d4:5a:1a:
-        c0:55:0d:5f:1c:85:a0:1e
------BEGIN CERTIFICATE-----
-MIID1jCCAb6gAwIBAgIBJzANBgkqhkiG9w0BAQUFADBaMQswCQYDVQQGEwJLUjET
-MBEGA1UECBMKS3l1bmdHaS1EbzERMA8GA1UEBxMIU3V3b24tU2kxFjAUBgNVBAoT
-DVNhbXN1bmcgRWxlYy4xCzAJBgNVBAMTAkNBMB4XDTA5MDMxNjIzMDYxMVoXDTE5
-MDMxNDIzMDYxMVowcjELMAkGA1UEBhMCS1IxEzARBgNVBAgTCkt5dW5nR2ktRG8x
-FjAUBgNVBAoTDVNhbXN1bmcgRWxlYy4xNjA0BgNVBAMTLVJlc3BvbmRlciBjZXJ0
-aWZpY2F0ZSB3aXRoIG5vY2hlY2sgZXh0LiBmaWVsZDCBnzANBgkqhkiG9w0BAQEF
-AAOBjQAwgYkCgYEAw2n0EjQbBFEzJoSeWv4r19jrahSv5VhopXHkXopV3GlxFD8W
-SLFS7iIF/Srnbs7xJEnwBj317WztJhGTk04IBZEmuSLod4tvUKXbFCgswpSG0mQR
-DopR61Q7Wh9wCrJc4rJimTB8jHH2CChP2Tg4OPOCzTrtV1zJ0rxH+pYkLtUCAwEA
-AaMTMBEwDwYJKwYBBQUHMAEFBAIFADANBgkqhkiG9w0BAQUFAAOCAgEAaXFAEq/k
-vkJS/3qov+NB8it1DSIQ6NYe08C7kH92RpKpYytQdMhzxHsOoLftXCAGGGQbe4Ih
-p4K8wDNTi19ox95flTFSk10PeEz/UC/gV7r1ScuUujSF6fEQdidmbdZG9p1RLQSW
-tXj3xhsltArnifSfpTOSUQCGlw9HzDqNXjrCrVFIfnoDetGnbRSKZPla4RzLguFC
-84zch46byORoPCbrChnIHHGIfslm9/4a7jpSG1Rgleg35g2zi78CB+f4FmT5NFCM
-vVTl0QuoX1l53irqRJK+PrINzfrf05MQye9A0zGnBuM5FWhd15RPlmmOE43z+3nr
-M1Aer/rD2IFHG4kFOWLqxO/3FSniQ/Jmk1EgEhAXycfzfOD9Wdw4yrL1/f5d+JqD
-cHK54WumYNudo1g+XnOkzhgSutxWcvi02Ezo2Zxez9F2Vn4uM50agOvdfGnAnNNc
-XNOiiXxEh2YQbvmQtnJYkHdI6lYlUuPGvTyVma79KveyH4e8r5O6LQ8a/36QO65j
-lp5olzIW7bjOfUjyuYP8JNw0GjSkGYB47LJsoOgVNx6N+rlioiVd0xRQ9mhLCbMS
-rMxjuyvmKjPuxxzGZBRH4sMpJrr56C40wcyeOy1Xzff++9gTZVxCqHFh39euFnF/
-/ftm1qKSUunLZQN9E4y81FoawFUNXxyFoB4=
------END CERTIFICATE-----
diff --git a/tests/cert-svc/data/TestData/ssl/demoCA/newcerts/28.pem b/tests/cert-svc/data/TestData/ssl/demoCA/newcerts/28.pem
deleted file mode 100644 (file)
index 892ac97..0000000
+++ /dev/null
@@ -1,82 +0,0 @@
-Certificate:
-    Data:
-        Version: 3 (0x2)
-        Serial Number: 40 (0x28)
-        Signature Algorithm: sha1WithRSAEncryption
-        Issuer: C=KR, ST=KyungGi-Do, L=Suwon-Si, O=Samsung Elec., CN=CA
-        Validity
-            Not Before: Mar 16 23:08:54 2009 GMT
-            Not After : Mar 14 23:08:54 2019 GMT
-        Subject: C=KR, ST=KyungGi-Do, O=Samsung Elec., CN=OCSP Responder's certificate with delegation
-        Subject Public Key Info:
-            Public Key Algorithm: rsaEncryption
-            RSA Public Key: (1024 bit)
-                Modulus (1024 bit):
-                    00:d0:8a:8e:73:c5:57:a8:03:b0:2c:1f:05:05:36:
-                    1b:90:89:db:48:b2:cd:e8:ea:02:95:d8:30:c3:c6:
-                    3e:6a:8c:19:70:0c:a7:cb:a6:07:df:ec:42:c9:dc:
-                    18:cf:ef:73:cd:d1:eb:51:c0:bd:0e:51:63:6f:a3:
-                    ce:26:a0:02:da:32:a3:65:36:ad:42:02:85:9b:df:
-                    9e:0a:51:41:93:f9:02:ff:f0:63:be:38:2e:b9:d9:
-                    07:db:3c:81:23:4f:2a:0d:24:50:6e:e2:ef:59:f4:
-                    91:3a:fb:fd:55:19:4b:49:71:08:bd:f9:2d:ea:64:
-                    82:f6:1a:ca:46:60:ac:de:e5
-                Exponent: 65537 (0x10001)
-        X509v3 extensions:
-            X509v3 Extended Key Usage: 
-                OCSP Signing
-            OCSP No Check: 
-
-    Signature Algorithm: sha1WithRSAEncryption
-        05:a1:04:c7:55:71:a8:52:04:d6:60:f3:37:08:15:50:86:71:
-        bf:8e:9e:9b:60:50:6e:57:1e:b1:30:3a:e0:8a:e0:74:90:c0:
-        be:97:78:f1:8b:52:f3:6b:e6:45:38:a5:7b:e2:47:2d:5c:80:
-        15:e7:74:b2:b1:66:db:eb:96:67:7c:01:8b:5e:c1:c2:59:33:
-        2e:62:a9:a3:7f:c7:b8:07:ee:27:22:83:11:e3:e9:b9:59:a5:
-        1f:27:1f:6f:b9:34:c5:c2:ae:d5:cd:59:59:28:05:78:ff:0f:
-        18:6a:c8:22:5b:40:06:0b:a9:ee:8c:e5:44:04:59:a0:f2:42:
-        e8:52:a4:ec:45:78:1e:b4:cf:02:e5:b5:31:d2:f4:93:15:58:
-        bc:02:a6:b0:01:5a:d9:72:eb:80:64:e9:f1:d5:38:69:f4:1a:
-        4d:7c:78:d7:ba:9e:ca:41:22:a6:09:c2:7e:fe:90:20:7f:72:
-        ae:ca:76:30:39:e5:1e:70:63:bc:68:e4:ee:0f:e7:7a:b0:cf:
-        c4:70:26:b8:dd:4e:9f:9f:75:11:05:be:d8:17:95:c1:75:ac:
-        e6:91:f7:b8:8e:93:f3:45:c1:9d:10:10:71:69:92:6d:f1:b8:
-        73:18:ed:02:84:6d:ab:6c:cc:91:be:ac:3c:61:39:48:74:e2:
-        27:b9:16:5e:02:6c:c4:1b:35:a2:68:24:44:5c:4e:37:58:6d:
-        f3:a4:e9:6a:d9:56:92:6d:05:6e:e1:f3:f5:7b:11:40:4b:2b:
-        13:32:e5:18:5b:62:64:1a:17:9f:91:fd:0c:95:54:02:09:6f:
-        48:ea:c8:ae:7e:24:bb:a8:b1:33:c8:98:50:90:8d:b2:5b:21:
-        1e:af:d2:78:ae:87:a7:32:82:3d:aa:9d:66:0d:92:59:02:8c:
-        3f:73:43:76:74:58:f9:95:fd:5c:90:31:d7:c7:7a:2a:fb:e0:
-        bb:b8:50:62:3c:44:09:34:dd:68:10:11:be:c6:c3:65:a4:e8:
-        e3:9d:0f:59:a2:a7:e5:d5:97:8b:48:a0:d4:30:31:aa:9e:4b:
-        e2:30:ed:06:72:c8:97:0d:6a:70:a8:c9:ca:9c:d4:f1:57:0b:
-        bf:24:43:7e:b7:a1:a5:91:af:ac:ae:f5:c6:8b:ef:aa:61:e5:
-        c4:7d:37:31:a0:5f:e9:45:9d:d8:08:b9:15:da:16:2a:16:77:
-        c7:82:0e:02:6e:9b:ec:25:f3:8f:8d:11:41:0b:56:a9:7b:1d:
-        0f:f3:be:fa:46:ee:cb:80:3b:09:1f:85:90:70:ed:1d:e3:65:
-        f4:81:3f:ef:86:32:6c:9c:b0:35:e2:73:41:fb:0c:0c:2d:2d:
-        cb:45:0e:73:d3:39:98:36
------BEGIN CERTIFICATE-----
-MIID6jCCAdKgAwIBAgIBKDANBgkqhkiG9w0BAQUFADBaMQswCQYDVQQGEwJLUjET
-MBEGA1UECBMKS3l1bmdHaS1EbzERMA8GA1UEBxMIU3V3b24tU2kxFjAUBgNVBAoT
-DVNhbXN1bmcgRWxlYy4xCzAJBgNVBAMTAkNBMB4XDTA5MDMxNjIzMDg1NFoXDTE5
-MDMxNDIzMDg1NFowcTELMAkGA1UEBhMCS1IxEzARBgNVBAgTCkt5dW5nR2ktRG8x
-FjAUBgNVBAoTDVNhbXN1bmcgRWxlYy4xNTAzBgNVBAMTLE9DU1AgUmVzcG9uZGVy
-J3MgY2VydGlmaWNhdGUgd2l0aCBkZWxlZ2F0aW9uMIGfMA0GCSqGSIb3DQEBAQUA
-A4GNADCBiQKBgQDQio5zxVeoA7AsHwUFNhuQidtIss3o6gKV2DDDxj5qjBlwDKfL
-pgff7ELJ3BjP73PN0etRwL0OUWNvo84moALaMqNlNq1CAoWb354KUUGT+QL/8GO+
-OC652QfbPIEjTyoNJFBu4u9Z9JE6+/1VGUtJcQi9+S3qZIL2GspGYKze5QIDAQAB
-oygwJjATBgNVHSUEDDAKBggrBgEFBQcDCTAPBgkrBgEFBQcwAQUEAgUAMA0GCSqG
-SIb3DQEBBQUAA4ICAQAFoQTHVXGoUgTWYPM3CBVQhnG/jp6bYFBuVx6xMDrgiuB0
-kMC+l3jxi1Lza+ZFOKV74kctXIAV53SysWbb65ZnfAGLXsHCWTMuYqmjf8e4B+4n
-IoMR4+m5WaUfJx9vuTTFwq7VzVlZKAV4/w8YasgiW0AGC6nujOVEBFmg8kLoUqTs
-RXgetM8C5bUx0vSTFVi8AqawAVrZcuuAZOnx1Thp9BpNfHjXup7KQSKmCcJ+/pAg
-f3KuynYwOeUecGO8aOTuD+d6sM/EcCa43U6fn3URBb7YF5XBdazmkfe4jpPzRcGd
-EBBxaZJt8bhzGO0ChG2rbMyRvqw8YTlIdOInuRZeAmzEGzWiaCREXE43WG3zpOlq
-2VaSbQVu4fP1exFASysTMuUYW2JkGhefkf0MlVQCCW9I6siufiS7qLEzyJhQkI2y
-WyEer9J4roenMoI9qp1mDZJZAow/c0N2dFj5lf1ckDHXx3oq++C7uFBiPEQJNN1o
-EBG+xsNlpOjjnQ9Zoqfl1ZeLSKDUMDGqnkviMO0GcsiXDWpwqMnKnNTxVwu/JEN+
-t6Glka+srvXGi++qYeXEfTcxoF/pRZ3YCLkV2hYqFnfHgg4CbpvsJfOPjRFBC1ap
-ex0P8776Ru7LgDsJH4WQcO0d42X0gT/vhjJsnLA14nNB+wwMLS3LRQ5z0zmYNg==
------END CERTIFICATE-----
diff --git a/tests/cert-svc/data/TestData/ssl/demoCA/newcerts/29.pem b/tests/cert-svc/data/TestData/ssl/demoCA/newcerts/29.pem
deleted file mode 100644 (file)
index d3d25a0..0000000
+++ /dev/null
@@ -1,82 +0,0 @@
-Certificate:
-    Data:
-        Version: 3 (0x2)
-        Serial Number: 41 (0x29)
-        Signature Algorithm: sha1WithRSAEncryption
-        Issuer: C=KR, ST=KyungGi-Do, L=Suwon-Si, O=Samsung Elec., CN=CA
-        Validity
-            Not Before: Mar 16 23:32:11 2009 GMT
-            Not After : Mar 14 23:32:11 2019 GMT
-        Subject: C=KR, ST=KyungGi-Do, O=Samsung Elec., CN=Seventh OCSP Client certificate
-        Subject Public Key Info:
-            Public Key Algorithm: rsaEncryption
-            RSA Public Key: (1024 bit)
-                Modulus (1024 bit):
-                    00:ab:f9:60:ff:9d:55:0f:31:12:2c:f2:df:64:22:
-                    fb:c0:97:1d:e4:13:fb:d7:15:37:5d:b9:2d:97:37:
-                    c4:e8:34:cb:00:85:22:4d:8a:85:80:a1:ae:90:5e:
-                    71:bf:6d:0d:a3:c3:8d:ce:47:58:60:25:bb:9c:95:
-                    0a:0b:cd:23:01:ae:18:be:d5:65:bd:8b:55:bf:ee:
-                    59:8a:db:20:bd:f9:f3:ac:53:2e:09:99:fb:27:7d:
-                    23:8b:f6:96:d9:41:37:0a:43:16:1f:f9:5d:84:b3:
-                    3b:79:45:ff:dd:b2:35:99:c0:db:85:24:22:a8:7e:
-                    ff:e0:8b:f2:d8:ca:3e:ae:e5
-                Exponent: 65537 (0x10001)
-        X509v3 extensions:
-            Authority Information Access: 
-                OCSP - URI:http://127.0.0.1:86/0008
-
-    Signature Algorithm: sha1WithRSAEncryption
-        08:02:c2:09:8a:f6:f1:d7:9e:d3:30:dc:ce:97:fc:84:bd:5b:
-        ae:60:39:82:0a:06:38:43:1e:55:de:83:11:d3:12:e0:81:76:
-        fd:5c:6e:9e:30:73:6d:8f:b2:32:a6:60:24:24:ee:e3:fd:73:
-        10:12:e6:c7:23:6b:1f:4e:b5:52:e3:12:09:ee:dd:19:d2:b4:
-        a6:34:e6:14:3c:79:58:95:4b:25:e3:f6:97:d2:cc:20:93:48:
-        1f:d5:2f:37:db:15:bf:f4:71:ad:04:bd:95:80:57:a5:49:bb:
-        aa:ca:f3:ff:af:62:dd:f9:94:75:38:59:6c:74:ef:ac:1e:19:
-        60:6d:4b:be:f7:62:2f:c6:68:b9:c4:fc:8a:fd:9f:b2:4d:44:
-        87:12:51:6e:7d:5f:41:2c:ea:e6:9c:3c:bd:cf:dc:aa:14:b2:
-        34:16:e0:38:b3:8c:f4:d7:68:1f:6c:cc:3c:da:30:32:8e:58:
-        5b:9a:bf:75:7a:38:a3:cf:60:6f:74:cc:a6:c1:55:f6:96:84:
-        98:04:db:b1:07:d6:f6:06:11:af:c2:fb:81:a4:77:04:4d:55:
-        9d:c4:28:d4:3c:d0:97:a0:f8:d4:18:59:cc:23:3a:b3:c0:82:
-        ad:1d:e2:4c:e4:da:24:73:cd:77:ab:db:22:07:94:d1:16:26:
-        27:82:e2:d5:82:f9:e1:29:fb:8f:9e:88:a2:1b:5c:8b:31:3c:
-        c6:1c:ae:16:31:28:f8:e2:5c:9d:e9:e8:d7:d9:fe:0a:39:3f:
-        fa:65:20:53:5e:20:32:4b:b8:a8:4b:a8:b8:e8:f1:3f:0a:80:
-        7d:b4:8c:1b:e6:54:d3:02:d6:56:a3:a6:4e:87:9a:51:ed:0d:
-        52:9b:e1:66:c8:64:c8:95:55:08:aa:f9:c0:9d:5a:89:03:21:
-        6b:29:96:f8:42:64:6a:3f:d5:92:d5:13:00:6c:89:38:ea:01:
-        0d:28:3b:a0:12:e1:cf:cf:fd:10:5e:a3:9b:67:0b:3e:a7:17:
-        7a:de:76:25:26:54:db:0f:a8:f9:e9:50:f0:1e:9a:0d:ad:d6:
-        ad:63:32:be:c0:bb:7a:66:be:c9:d3:f2:1e:48:c3:f5:2b:15:
-        4d:39:cc:88:32:65:97:99:01:41:12:07:4e:d7:1d:af:fa:46:
-        29:93:02:70:ed:df:89:a3:d5:50:1c:07:ed:df:f8:5c:d6:11:
-        c6:1a:32:e6:2b:e7:49:d8:82:16:dd:41:5d:13:9c:a0:00:68:
-        82:54:f8:5e:2a:81:3e:fe:0b:bf:6e:de:e2:b4:4f:09:31:74:
-        4d:6a:2d:b7:a9:0a:54:f4:a7:1f:63:8a:6e:73:bc:e3:38:9e:
-        b8:26:e5:f6:8a:dd:ad:14
------BEGIN CERTIFICATE-----
-MIID7TCCAdWgAwIBAgIBKTANBgkqhkiG9w0BAQUFADBaMQswCQYDVQQGEwJLUjET
-MBEGA1UECBMKS3l1bmdHaS1EbzERMA8GA1UEBxMIU3V3b24tU2kxFjAUBgNVBAoT
-DVNhbXN1bmcgRWxlYy4xCzAJBgNVBAMTAkNBMB4XDTA5MDMxNjIzMzIxMVoXDTE5
-MDMxNDIzMzIxMVowZDELMAkGA1UEBhMCS1IxEzARBgNVBAgTCkt5dW5nR2ktRG8x
-FjAUBgNVBAoTDVNhbXN1bmcgRWxlYy4xKDAmBgNVBAMTH1NldmVudGggT0NTUCBD
-bGllbnQgY2VydGlmaWNhdGUwgZ8wDQYJKoZIhvcNAQEBBQADgY0AMIGJAoGBAKv5
-YP+dVQ8xEizy32Qi+8CXHeQT+9cVN125LZc3xOg0ywCFIk2KhYChrpBecb9tDaPD
-jc5HWGAlu5yVCgvNIwGuGL7VZb2LVb/uWYrbIL3586xTLgmZ+yd9I4v2ltlBNwpD
-Fh/5XYSzO3lF/92yNZnA24UkIqh+/+CL8tjKPq7lAgMBAAGjODA2MDQGCCsGAQUF
-BwEBBCgwJjAkBggrBgEFBQcwAYYYaHR0cDovLzEyNy4wLjAuMTo4Ni8wMDA4MA0G
-CSqGSIb3DQEBBQUAA4ICAQAIAsIJivbx157TMNzOl/yEvVuuYDmCCgY4Qx5V3oMR
-0xLggXb9XG6eMHNtj7IypmAkJO7j/XMQEubHI2sfTrVS4xIJ7t0Z0rSmNOYUPHlY
-lUsl4/aX0swgk0gf1S832xW/9HGtBL2VgFelSbuqyvP/r2Ld+ZR1OFlsdO+sHhlg
-bUu+92Ivxmi5xPyK/Z+yTUSHElFufV9BLOrmnDy9z9yqFLI0FuA4s4z012gfbMw8
-2jAyjlhbmr91ejijz2BvdMymwVX2loSYBNuxB9b2BhGvwvuBpHcETVWdxCjUPNCX
-oPjUGFnMIzqzwIKtHeJM5Nokc813q9siB5TRFiYnguLVgvnhKfuPnoiiG1yLMTzG
-HK4WMSj44lyd6ejX2f4KOT/6ZSBTXiAyS7ioS6i46PE/CoB9tIwb5lTTAtZWo6ZO
-h5pR7Q1Sm+FmyGTIlVUIqvnAnVqJAyFrKZb4QmRqP9WS1RMAbIk46gENKDugEuHP
-z/0QXqObZws+pxd63nYlJlTbD6j56VDwHpoNrdatYzK+wLt6Zr7J0/IeSMP1KxVN
-OcyIMmWXmQFBEgdO1x2v+kYpkwJw7d+Jo9VQHAft3/hc1hHGGjLmK+dJ2IIW3UFd
-E5ygAGiCVPheKoE+/gu/bt7itE8JMXRNai23qQpU9KcfY4puc7zjOJ64JuX2it2t
-FA==
------END CERTIFICATE-----
diff --git a/tests/cert-svc/data/TestData/ssl/demoCA/newcerts/2A.pem b/tests/cert-svc/data/TestData/ssl/demoCA/newcerts/2A.pem
deleted file mode 100644 (file)
index f3fd8ed..0000000
+++ /dev/null
@@ -1,92 +0,0 @@
-Certificate:
-    Data:
-        Version: 3 (0x2)
-        Serial Number: 42 (0x2a)
-        Signature Algorithm: sha256WithRSAEncryption
-        Issuer: C=KR, ST=KyungGi-Do, L=Suwon-Si, O=Samsung Elec., CN=CA
-        Validity
-            Not Before: Jun 20 08:21:47 2009 GMT
-            Not After : Jun 18 08:21:47 2019 GMT
-        Subject: C=KR, ST=KyungGi-Do, O=Samsung Elec., CN=First Test Certificate
-        Subject Public Key Info:
-            Public Key Algorithm: rsaEncryption
-            RSA Public Key: (1024 bit)
-                Modulus (1024 bit):
-                    00:cf:0f:cf:a5:08:18:bf:8b:6c:2c:3c:55:fe:02:
-                    43:b7:a8:af:45:a3:4a:28:63:d1:da:26:7a:c2:0d:
-                    f8:58:a5:73:c5:db:b8:fb:62:47:ea:17:7b:25:6b:
-                    d1:8c:e2:74:96:f4:6b:e5:49:3b:b3:e5:6a:63:36:
-                    19:f8:3c:d8:4b:9c:14:9d:2b:6a:71:cc:3a:9f:b9:
-                    d5:db:60:8e:44:40:d7:12:53:52:e5:71:41:c8:bf:
-                    ec:0d:9c:5b:7c:8e:ac:99:47:65:50:e5:f8:95:3e:
-                    8a:3c:99:d9:75:47:73:51:f4:fd:36:46:ed:1a:77:
-                    10:ce:1d:01:0c:86:6b:23:ff
-                Exponent: 65537 (0x10001)
-        X509v3 extensions:
-            X509v3 Basic Constraints: 
-                CA:FALSE
-            Netscape Comment: 
-                OpenSSL Generated Certificate
-            X509v3 Subject Key Identifier: 
-                25:0C:EC:1F:D6:1A:A2:95:AF:C1:A3:DA:EF:B1:F3:BE:62:F3:10:6C
-            X509v3 Authority Key Identifier: 
-                DirName:/C=KR/ST=KyungGi-Do/L=Suwon-Si/O=Samsung Elec./CN=CA
-                serial:F2:5B:40:5B:C2:B7:D0:64
-
-    Signature Algorithm: sha256WithRSAEncryption
-        b1:3e:50:ff:5f:32:b2:09:6b:52:98:07:5a:78:7f:fe:12:6f:
-        87:25:d4:bc:96:45:07:31:e0:ae:52:d1:9e:04:d8:05:84:cf:
-        e2:e5:82:01:b5:46:ce:4e:47:d6:ef:87:7c:37:d6:67:99:ab:
-        ad:4d:70:eb:98:fe:31:f1:f8:e9:a2:c5:40:4f:a6:c4:79:15:
-        64:d3:64:d2:3f:05:b5:08:16:88:46:22:72:86:a1:8e:ef:df:
-        67:25:d7:74:bd:01:04:b8:70:00:0d:9d:36:d0:9e:3a:4b:7e:
-        0d:3d:9e:3d:ce:fb:47:ee:7d:5b:b9:c1:65:2b:4c:ef:26:89:
-        ed:1b:bc:17:4a:63:41:b3:99:e7:c5:4d:d5:31:af:d7:4b:3b:
-        37:ce:99:da:8f:53:20:40:14:95:14:09:61:ba:9c:c0:1b:66:
-        7c:e7:e3:4c:28:c6:48:e8:6c:02:55:3c:44:18:d1:29:88:7b:
-        ff:30:e5:be:ee:8e:da:95:fe:04:c2:c8:a1:ce:81:46:b9:bb:
-        b2:3d:ad:af:a9:e3:a8:c1:8f:d8:51:48:d1:c6:e9:c8:c8:94:
-        6f:7c:b0:fc:92:04:d0:8f:30:30:f1:a3:d0:f8:dc:aa:52:2c:
-        1f:bd:f3:67:ac:97:6e:0d:1a:82:c1:a2:30:9e:d3:95:74:47:
-        b5:49:c8:73:7a:c6:73:20:18:7a:98:8f:c1:3e:5f:1a:04:33:
-        9b:ff:e0:ab:9e:f8:ca:92:bc:e8:94:b8:ce:87:89:75:e6:49:
-        bd:d5:7f:1f:44:b6:48:fc:02:4f:b5:25:f4:ff:53:98:5f:0f:
-        95:52:d2:00:2a:41:85:cb:8d:f4:a1:a6:ef:68:ac:b5:fa:a7:
-        94:91:cc:64:5c:30:43:01:90:84:eb:8f:66:3b:98:4c:42:43:
-        3d:31:47:28:da:49:eb:e9:14:67:c5:81:f6:13:a3:c3:a5:ee:
-        c4:28:0e:52:ee:c7:b2:e6:f8:c3:79:63:12:45:c1:06:5b:94:
-        48:f1:4c:32:c7:69:9d:6d:b3:0b:c5:98:93:f4:4b:c7:64:35:
-        23:22:56:c7:fa:e3:0c:3b:39:cf:b4:ca:cf:d2:10:97:b3:95:
-        e4:f7:53:d3:cb:5e:43:82:d4:7c:e5:83:a4:cf:4e:0b:c8:16:
-        35:5e:8a:2b:47:8a:6e:2f:98:02:d4:cc:9d:28:a9:95:ff:ab:
-        73:df:01:c6:ff:df:7b:33:21:e0:db:81:8d:59:11:f0:f3:92:
-        f7:c5:8c:83:2e:22:55:dd:1f:78:5c:f7:a3:fc:de:99:8f:46:
-        50:ff:75:db:bb:58:07:fa:01:c1:67:8c:18:c4:3f:2f:b7:41:
-        f7:ec:56:e7:1a:4b:e4:78
------BEGIN CERTIFICATE-----
-MIIEfjCCAmagAwIBAgIBKjANBgkqhkiG9w0BAQsFADBaMQswCQYDVQQGEwJLUjET
-MBEGA1UECBMKS3l1bmdHaS1EbzERMA8GA1UEBxMIU3V3b24tU2kxFjAUBgNVBAoT
-DVNhbXN1bmcgRWxlYy4xCzAJBgNVBAMTAkNBMB4XDTA5MDYyMDA4MjE0N1oXDTE5
-MDYxODA4MjE0N1owWzELMAkGA1UEBhMCS1IxEzARBgNVBAgTCkt5dW5nR2ktRG8x
-FjAUBgNVBAoTDVNhbXN1bmcgRWxlYy4xHzAdBgNVBAMTFkZpcnN0IFRlc3QgQ2Vy
-dGlmaWNhdGUwgZ8wDQYJKoZIhvcNAQEBBQADgY0AMIGJAoGBAM8Pz6UIGL+LbCw8
-Vf4CQ7eor0WjSihj0domesIN+Filc8XbuPtiR+oXeyVr0YzidJb0a+VJO7PlamM2
-Gfg82EucFJ0ranHMOp+51dtgjkRA1xJTUuVxQci/7A2cW3yOrJlHZVDl+JU+ijyZ
-2XVHc1H0/TZG7Rp3EM4dAQyGayP/AgMBAAGjgdEwgc4wCQYDVR0TBAIwADAsBglg
-hkgBhvhCAQ0EHxYdT3BlblNTTCBHZW5lcmF0ZWQgQ2VydGlmaWNhdGUwHQYDVR0O
-BBYEFCUM7B/WGqKVr8Gj2u+x875i8xBsMHQGA1UdIwRtMGuhXqRcMFoxCzAJBgNV
-BAYTAktSMRMwEQYDVQQIEwpLeXVuZ0dpLURvMREwDwYDVQQHEwhTdXdvbi1TaTEW
-MBQGA1UEChMNU2Ftc3VuZyBFbGVjLjELMAkGA1UEAxMCQ0GCCQDyW0BbwrfQZDAN
-BgkqhkiG9w0BAQsFAAOCAgEAsT5Q/18ysglrUpgHWnh//hJvhyXUvJZFBzHgrlLR
-ngTYBYTP4uWCAbVGzk5H1u+HfDfWZ5mrrU1w65j+MfH46aLFQE+mxHkVZNNk0j8F
-tQgWiEYicoahju/fZyXXdL0BBLhwAA2dNtCeOkt+DT2ePc77R+59W7nBZStM7yaJ
-7Ru8F0pjQbOZ58VN1TGv10s7N86Z2o9TIEAUlRQJYbqcwBtmfOfjTCjGSOhsAlU8
-RBjRKYh7/zDlvu6O2pX+BMLIoc6BRrm7sj2tr6njqMGP2FFI0cbpyMiUb3yw/JIE
-0I8wMPGj0PjcqlIsH73zZ6yXbg0agsGiMJ7TlXRHtUnIc3rGcyAYepiPwT5fGgQz
-m//gq574ypK86JS4zoeJdeZJvdV/H0S2SPwCT7Ul9P9TmF8PlVLSACpBhcuN9KGm
-72istfqnlJHMZFwwQwGQhOuPZjuYTEJDPTFHKNpJ6+kUZ8WB9hOjw6XuxCgOUu7H
-sub4w3ljEkXBBluUSPFMMsdpnW2zC8WYk/RLx2Q1IyJWx/rjDDs5z7TKz9IQl7OV
-5PdT08teQ4LUfOWDpM9OC8gWNV6KK0eKbi+YAtTMnSiplf+rc98Bxv/fezMh4NuB
-jVkR8POS98WMgy4iVd0feFz3o/zemY9GUP9127tYB/oBwWeMGMQ/L7dB9+xW5xpL
-5Hg=
------END CERTIFICATE-----
diff --git a/tests/cert-svc/data/TestData/ssl/demoCA/private/cakey.pem b/tests/cert-svc/data/TestData/ssl/demoCA/private/cakey.pem
deleted file mode 100644 (file)
index 3b74363..0000000
+++ /dev/null
@@ -1,51 +0,0 @@
------BEGIN RSA PRIVATE KEY-----
-MIIJKAIBAAKCAgEAxeGHrxpZR44wOoWcabXK6qAonmAvtoteQu9qim1mdlyFOL4t
-vMMQiEDIctVmHNblNNqVj0iy+ogH69rHqRhImXW/MiqFrt0Gwdx+0KomqUPCXfmk
-8458MkFwyN3bXVqtV7/tccix1OY5oakFUX/tYYwaCVr0cgUuev8ShxJ3Gr+3JTzZ
-M8cGlN+M6eRfG5kuS9xMF2bZ7dlrqIuhdkFTCoARtt9NCewEKVwGBTJpVHVvHAuM
-RuOaDw31G+kdI0OFUFCSNGDzTOevLGiMgIcHcmmV80EUYn4+3KZFdASi6/NlGLLS
-0tEfJ29Qs7WGxU7+Ya1orKEUgtSSfbjTDW7xqLIz/trVUTL6FhLiUs6JCdsKxkjq
-BZ3OauhrW0E45XeaNNvS2OfEgZsa7Z+cRAysqFEE3WXTiEQsGVNSoaC9epYGBgHT
-e5oe3rVSXgeMA+otaSZa78JmUQ7p7CgKgkcI9HRnz2AZ2twzMkFoXZ2xx66shxgv
-6tKUAtOSmjdKJCJGWpw1JBBRSEVwT5+xCrTnSBfGToAyNmLcRkL8uPZn+hhx/mGL
-C3uCfMy7HkDQzGhvyDiBEYiE47EPFmDndf1+t1NbrGcxMYeraaqZW1Ceq6/Pow1w
-PDtyckFRCRRYeSrjC8vfLrNuEEVRexfuAEqjHQkxjc8d4f66e0s2hZ2L0X0CAwEA
-AQKCAgBEQ968QLnGHr5yof9o1IdxU9lPcd1j+0aEjvXRVZaAhMCM58b9lMnSR48f
-VpFIp7Yg+ruX17uvBFi/PBWfNzpsfpt8IgFGZwfav0eckuaNhEu8gdAvGdustrjD
-Aw6XcR3V5Od0VolK6jW9mIK2MAzjlyKwUYl9AF6dnft1T6B5QORc21YPL70MhOan
-FdrduYWoNBKoDBponJYwaiNEmZqdR7tUvEpmft6cqhuFlXOS6IRxR2aYWhKe2PDT
-NSORM8z8/R7DJSMqR8894b9+45ZlGRna9nui0uy60D2rnaHbBne9AowKoIw/3X4Y
-0SnyTaMibWFsFJHv5Ie5CZb9zmVdcqAKZniikngDOLkxdqTr1U4T4hAP4ICahKjl
-/mugIlg67Oua6Opd2LBpDsw4/5nXM2XyWwb6OFdDVCvnsV9v1pdRu2m8qZIQkWwC
-2eEkuN3aW0DYOalWldjLggMGFrByZKp6H2+upvygJdInRIOlNA4e+aOmFFLWnCQ3
-HgXlLXvT8FJsAs/52eYTi3QFaYSb+WgagROw7FBZHXwyfV7f2Lrty9o/lh4AwAqv
-4KtPfhQ0eVtB/3L7Pa+QuW5IBjjUbrrNCH3uo+NuJ+mOVzVZ/eVF4WlEDhapTyCh
-YL/hMMIijRhf4VNkNch84Ly2lzvMxTnO/yFgomgMBf7vdYJBnQKCAQEA8LNvx3U2
-rNQqa342Uep15k3RBUTDtN8d6s06CpiRz+d/qKl/8MteENl0SQAOGmbmVfa4QUD9
-jFCD18D0sM0qERLB63Jwr62y1sRi2m47QEzWHzx81OxjKHZZw2K6YmHXE9JzurX5
-2+ifdUiU2uOmqS1IVrIFOZuQef0xqVq7PSSjbL3DwPefWQakRnmhpL1iTzgnswTu
-7PPoqZaV9QmgjCGgMhNZlvQINXM8dYsAgfUlVZwKqkzAip9FpJLdmOUhyF2I+p6b
-zjSwsA0MslyBqc/mkZBxAjMR7j4KeshwCosGpf12Ax/7eWIsBZBI2+GktPsUwiS0
-FsCX7b5s/Xk1SwKCAQEA0nVZUelZKUg+aoaQmAoJ1h83XaqOqV+uN7jjxYag9+Ts
-Ay4mfhkMra6p7xfEz0lWiOVXDfq7jOSiefsvIAaVlr+EPBzyGpFN46S0A00EKloZ
-ysP2R3bqI46VlqPcqaSZoj8dGWVN+gmz7zuu0usv0uzZx9wJ8cbxkC9LnD9Ka7dG
-ea8al5FoC2eJHQGMfIj+RlRWdSZ2dkRWPb9oLpaTtQW7iLnFQDheZcK8lTcBxTc5
-gkGqv4Ab/ItNg6ukCd75lgHdxgNE5GNfBofu/68zn1qJjpP4YwJ9B8+4JPHmfl2f
-F4OGvD9jq439/z8M4ymM4TjQbi0qYDfGPfgeja//VwKCAQAutcOlY1u+4lVxEscb
-0nIaxVMgwJ1yBjJaFIWE9OKnA/fEFVCcu/p/LpPgbsBN41YjrINJNoF9r0pGnk1d
-2hKlyYwUUtsHXJ/uCaJdXTLmYYLUAPsAnvcHLSBySEB/Qxln4VlQDGx2fogjTHiG
-mdMH1Z/KIzXcXhIFelse0FqxnOCSA6lvUx57Oky62HPD8nSXhwA9P2HWXebysiRb
-rwiW6RebYCHsp2LIbJp4/QaWMaqTGHsBXW+n9wyeyVlziFOr/GrOp+T4eUUohP/H
-xSfsekn2SZ+Em8CJCUUjWq5TfXNG1w8FwDke7yw30C4zbXB3Jpp6qoDAQZO6MVAZ
-SGJNAoIBAE1B2sog+SQYayE7yLSnarj5uJ9fzwMKJrA55RNLuqeFl8YLGQJNO8Q+
-TA+DEDJv355dYjm1g0fTXnmc5c3B3QP7xhUzIwTxtkAM5DAaA59wd+thSHUviAAJ
-hYxJFuYHkIZo2MvLznYtPapipGi1AVdSrxeZBOWGfILLedwft7gXDX35868UJ7eY
-CFNnkCTfPUigCST0O6RqraX5L8t6Zzqaoh8s4uYSS0Tb2dKE4Nd+0FOqu32VD7ED
-ii79wTgGbGTOxpS7+nxEpkuFdwzRSggDel+mnhXqge9uJ1EYo95bi91b4QgV1QbT
-FxyuDpMNW7QJ4Smw1s9/afyxqrWkl/0CggEBAO5OYdCU/EQCmz2cNcYTbUQRffh9
-cpILgXA8RI7Ravn7x9AyjoO9mhBwQRernPX/YQdL1homYhOC/NW7xCyr8qpOhmLh
-bplV/TBOl74w114EZxvv0w4M9gxP666x3Kx7FzFs4gLNcHXh3eA8jzjiEJQQafwy
-/LPDjVf1mQjmVKVj8keqsB2pJi/NgJuCl7qBdJbNvzcw/bhAT1HhQwuZ+2Z9+lO0
-5mcaxOgbvEv1MBQ5J/m0Afx5fYcNQbrS8S43b3Z3aiqd0ljybs3eDg3JEuRLMYc4
-EDiEvtDqv0nq/VK1yTYG1DhZRDPaVxWUplVl/sH57FzpbY4nVyUvAt5tSUo=
------END RSA PRIVATE KEY-----
diff --git a/tests/cert-svc/data/TestData/ssl/demoCA/serial b/tests/cert-svc/data/TestData/ssl/demoCA/serial
deleted file mode 100644 (file)
index 6a38d8b..0000000
+++ /dev/null
@@ -1 +0,0 @@
-2B
diff --git a/tests/cert-svc/data/TestData/ssl/demoCA/serial.old b/tests/cert-svc/data/TestData/ssl/demoCA/serial.old
deleted file mode 100644 (file)
index 8676c24..0000000
+++ /dev/null
@@ -1 +0,0 @@
-2A
diff --git a/tests/cert-svc/data/TestData/ssl/ocsp_client1_uri.txt b/tests/cert-svc/data/TestData/ssl/ocsp_client1_uri.txt
deleted file mode 100644 (file)
index 87ead05..0000000
+++ /dev/null
@@ -1 +0,0 @@
-authorityInfoAccess = OCSP;URI:http://127.0.0.1:80/0002
diff --git a/tests/cert-svc/data/TestData/ssl/ocsp_client2_uri.txt b/tests/cert-svc/data/TestData/ssl/ocsp_client2_uri.txt
deleted file mode 100644 (file)
index 4469fa2..0000000
+++ /dev/null
@@ -1 +0,0 @@
-authorityInfoAccess = OCSP;URI:http://127.0.0.1:81/0003
diff --git a/tests/cert-svc/data/TestData/ssl/ocsp_client3_uri.txt b/tests/cert-svc/data/TestData/ssl/ocsp_client3_uri.txt
deleted file mode 100644 (file)
index a9d8864..0000000
+++ /dev/null
@@ -1 +0,0 @@
-authorityInfoAccess = OCSP;URI:http://127.0.0.1:82/0004
diff --git a/tests/cert-svc/data/TestData/ssl/ocsp_client4_uri.txt b/tests/cert-svc/data/TestData/ssl/ocsp_client4_uri.txt
deleted file mode 100644 (file)
index 15f96c1..0000000
+++ /dev/null
@@ -1 +0,0 @@
-authorityInfoAccess = OCSP;URI:http://127.0.0.1:83/0005
diff --git a/tests/cert-svc/data/TestData/ssl/ocsp_client5_uri.txt b/tests/cert-svc/data/TestData/ssl/ocsp_client5_uri.txt
deleted file mode 100644 (file)
index 0ac72c9..0000000
+++ /dev/null
@@ -1 +0,0 @@
-authorityInfoAccess = OCSP;URI:http://127.0.0.1:84/0006
diff --git a/tests/cert-svc/data/TestData/ssl/ocsp_client6_uri.txt b/tests/cert-svc/data/TestData/ssl/ocsp_client6_uri.txt
deleted file mode 100644 (file)
index 00da98a..0000000
+++ /dev/null
@@ -1 +0,0 @@
-authorityInfoAccess = OCSP;URI:http://127.0.0.1:85/0007
diff --git a/tests/cert-svc/data/TestData/ssl/ocsp_client7_uri.txt b/tests/cert-svc/data/TestData/ssl/ocsp_client7_uri.txt
deleted file mode 100644 (file)
index 71d3327..0000000
+++ /dev/null
@@ -1 +0,0 @@
-authorityInfoAccess = OCSP;URI:http://127.0.0.1:86/0008
diff --git a/tests/cert-svc/data/TestData/ssl/ocsp_client_chain.txt b/tests/cert-svc/data/TestData/ssl/ocsp_client_chain.txt
deleted file mode 100644 (file)
index e733920..0000000
+++ /dev/null
@@ -1 +0,0 @@
-authorityInfoAccess = OCSP;URI:http://127.0.0.1:89/0002
diff --git a/tests/cert-svc/data/TestData/ssl/ocsp_client_chain_no_aia.txt b/tests/cert-svc/data/TestData/ssl/ocsp_client_chain_no_aia.txt
deleted file mode 100644 (file)
index e216ba3..0000000
+++ /dev/null
@@ -1 +0,0 @@
-authorityInfoAccess = OCSP;URI:http://127.0.0.1:90/0003
diff --git a/tests/cert-svc/data/TestData/ssl/ocsp_responder.txt b/tests/cert-svc/data/TestData/ssl/ocsp_responder.txt
deleted file mode 100644 (file)
index 584b480..0000000
+++ /dev/null
@@ -1 +0,0 @@
-extendedKeyUsage=OCSPSigning
diff --git a/tests/cert-svc/data/TestData/ssl/ocsp_responder_nocheck.txt b/tests/cert-svc/data/TestData/ssl/ocsp_responder_nocheck.txt
deleted file mode 100644 (file)
index 7b2a41b..0000000
+++ /dev/null
@@ -1 +0,0 @@
-noCheck=
diff --git a/tests/cert-svc/data/TestData/ssl/ocsp_responder_nocheck_and_ocsp_signing.txt b/tests/cert-svc/data/TestData/ssl/ocsp_responder_nocheck_and_ocsp_signing.txt
deleted file mode 100644 (file)
index 5c939ed..0000000
+++ /dev/null
@@ -1,2 +0,0 @@
-extendedKeyUsage=OCSPSigning
-noCheck=
diff --git a/tests/cert-svc/data/TestData/ssl/ocsp_svr.crt b/tests/cert-svc/data/TestData/ssl/ocsp_svr.crt
deleted file mode 100644 (file)
index 5550456..0000000
+++ /dev/null
@@ -1,79 +0,0 @@
-Certificate:
-    Data:
-        Version: 3 (0x2)
-        Serial Number: 7 (0x7)
-        Signature Algorithm: sha1WithRSAEncryption
-        Issuer: C=KR, ST=KyungGi-Do, L=Suwon-Si, O=Samsung Elec., CN=CA
-        Validity
-            Not Before: Mar 10 00:14:51 2009 GMT
-            Not After : Mar 10 00:14:51 2010 GMT
-        Subject: C=KR, ST=KyungGi-Do, O=Samsung Elec., CN=OCSP Responder
-        Subject Public Key Info:
-            Public Key Algorithm: rsaEncryption
-            RSA Public Key: (1024 bit)
-                Modulus (1024 bit):
-                    00:b9:0e:80:20:fc:74:49:08:cb:83:87:76:e4:42:
-                    03:42:6e:56:1b:ae:73:43:9b:a6:cf:5d:33:1d:37:
-                    cf:b5:22:bc:79:5e:6a:69:02:3e:e2:08:c5:f5:be:
-                    ee:ef:df:4f:85:41:a2:5f:d3:76:39:3f:61:56:14:
-                    1f:c1:cc:ec:45:e3:b2:e2:b0:e8:20:9f:a9:e7:8a:
-                    b8:ed:3f:e4:6f:86:d8:e5:d5:3b:fe:47:e8:8f:51:
-                    ee:dd:b6:7f:36:6b:c7:75:f7:78:04:df:ac:51:b3:
-                    25:65:04:ab:0d:ce:db:5e:3a:db:6a:8f:da:69:46:
-                    c7:92:f2:b3:ba:6c:90:3d:71
-                Exponent: 65537 (0x10001)
-        X509v3 extensions:
-            X509v3 Extended Key Usage: 
-                OCSP Signing
-    Signature Algorithm: sha1WithRSAEncryption
-        2d:28:82:cc:79:30:2e:b5:8e:4f:d9:3b:f4:8b:c8:a3:e6:3b:
-        cb:2c:0f:97:1c:8b:7f:06:e1:5d:3b:ec:af:c5:de:ef:c4:fa:
-        0b:63:ee:cb:ad:60:7f:42:6f:82:6d:f2:fb:bb:9a:36:f7:1a:
-        6c:9c:82:e8:17:18:41:35:47:72:e8:36:b4:1a:c1:ae:59:7c:
-        92:07:62:8f:00:9a:2e:c8:5e:62:20:5f:14:82:0d:fe:de:04:
-        c8:b0:b6:03:d4:aa:41:70:4f:f9:05:ba:b5:c7:3c:36:a0:68:
-        81:c5:82:91:56:fc:65:fe:73:c4:b3:91:d2:c4:51:16:cb:48:
-        32:e3:b1:ea:a4:dc:e0:de:9b:f2:75:22:cd:04:2d:2d:c9:76:
-        aa:3b:b8:c6:1a:86:86:1f:a7:11:e0:6d:16:f4:5b:b3:09:1d:
-        34:c1:0e:1a:c8:21:82:91:73:bc:e5:c5:cb:d3:ed:46:d5:f5:
-        a6:f8:65:a6:91:7b:cd:a9:0d:a6:37:3e:d9:3f:6f:c4:c7:aa:
-        d9:95:75:dc:6d:38:9e:54:3d:0f:a1:26:16:28:71:6b:14:9e:
-        be:66:8b:f4:71:c1:3e:34:a0:a1:5d:da:31:1c:63:9f:9d:01:
-        7f:62:13:9d:3b:74:a2:b3:0a:d5:24:c0:35:07:c0:6d:20:c1:
-        2a:21:fb:82:a5:9c:eb:3e:ce:25:57:02:d6:38:77:5e:a0:2a:
-        52:0c:f7:3f:f3:d3:aa:0c:53:a9:1c:e9:39:d7:0d:96:28:b8:
-        e2:e9:1c:e3:92:12:1e:e1:3e:44:5a:fb:25:1e:2c:74:a9:93:
-        24:a0:f0:02:63:bf:e2:45:a0:c5:6f:40:e4:3b:b2:b1:f1:0a:
-        19:89:b9:54:d6:61:21:3d:7b:4b:91:fe:d9:f0:e1:48:20:d9:
-        0b:e2:be:dd:f7:5b:6f:c8:76:ca:74:9f:a5:4a:9a:9c:1d:f0:
-        ec:40:72:82:67:fc:2a:9f:4e:f1:7f:e4:b5:7e:c0:3f:22:36:
-        18:c3:48:88:7f:0c:2d:26:cc:40:c5:82:bd:23:e5:6c:ce:3c:
-        27:19:27:fe:7b:1b:fa:cb:38:0a:9f:a6:44:4b:c2:22:63:68:
-        3c:fa:86:11:af:5d:05:7c:5b:fd:26:9a:78:18:c7:f6:1e:1f:
-        69:b9:ba:71:3b:dc:95:c1:3f:59:17:42:f1:48:2b:10:5f:67:
-        46:32:37:4a:1a:85:d0:00:81:92:50:6c:29:80:e1:b5:bf:52:
-        a8:79:c0:5d:b9:36:e3:f7:d5:69:dc:de:54:13:c0:d3:6e:7a:
-        9c:a8:e9:e4:f6:57:ed:aa:bd:6e:c1:c5:35:ed:72:17:65:e3:
-        cd:f0:a3:a0:10:95:b8:70
------BEGIN CERTIFICATE-----
-MIIDuzCCAaOgAwIBAgIBBzANBgkqhkiG9w0BAQUFADBaMQswCQYDVQQGEwJLUjET
-MBEGA1UECBMKS3l1bmdHaS1EbzERMA8GA1UEBxMIU3V3b24tU2kxFjAUBgNVBAoT
-DVNhbXN1bmcgRWxlYy4xCzAJBgNVBAMTAkNBMB4XDTA5MDMxMDAwMTQ1MVoXDTEw
-MDMxMDAwMTQ1MVowUzELMAkGA1UEBhMCS1IxEzARBgNVBAgTCkt5dW5nR2ktRG8x
-FjAUBgNVBAoTDVNhbXN1bmcgRWxlYy4xFzAVBgNVBAMTDk9DU1AgUmVzcG9uZGVy
-MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQC5DoAg/HRJCMuDh3bkQgNCblYb
-rnNDm6bPXTMdN8+1Irx5XmppAj7iCMX1vu7v30+FQaJf03Y5P2FWFB/BzOxF47Li
-sOggn6nnirjtP+Rvhtjl1Tv+R+iPUe7dtn82a8d193gE36xRsyVlBKsNztteOttq
-j9ppRseS8rO6bJA9cQIDAQABoxcwFTATBgNVHSUEDDAKBggrBgEFBQcDCTANBgkq
-hkiG9w0BAQUFAAOCAgEALSiCzHkwLrWOT9k79IvIo+Y7yywPlxyLfwbhXTvsr8Xe
-78T6C2Puy61gf0Jvgm3y+7uaNvcabJyC6BcYQTVHcug2tBrBrll8kgdijwCaLshe
-YiBfFIIN/t4EyLC2A9SqQXBP+QW6tcc8NqBogcWCkVb8Zf5zxLOR0sRRFstIMuOx
-6qTc4N6b8nUizQQtLcl2qju4xhqGhh+nEeBtFvRbswkdNMEOGsghgpFzvOXFy9Pt
-RtX1pvhlppF7zakNpjc+2T9vxMeq2ZV13G04nlQ9D6EmFihxaxSevmaL9HHBPjSg
-oV3aMRxjn50Bf2ITnTt0orMK1STANQfAbSDBKiH7gqWc6z7OJVcC1jh3XqAqUgz3
-P/PTqgxTqRzpOdcNlii44ukc45ISHuE+RFr7JR4sdKmTJKDwAmO/4kWgxW9A5Duy
-sfEKGYm5VNZhIT17S5H+2fDhSCDZC+K+3fdbb8h2ynSfpUqanB3w7EBygmf8Kp9O
-8X/ktX7APyI2GMNIiH8MLSbMQMWCvSPlbM48Jxkn/nsb+ss4Cp+mREvCImNoPPqG
-Ea9dBXxb/SaaeBjH9h4fabm6cTvclcE/WRdC8UgrEF9nRjI3ShqF0ACBklBsKYDh
-tb9SqHnAXbk24/fVadzeVBPA0256nKjp5PZX7aq9bsHFNe1yF2XjzfCjoBCVuHA=
------END CERTIFICATE-----
diff --git a/tests/cert-svc/data/TestData/ssl/ocsp_svr.key b/tests/cert-svc/data/TestData/ssl/ocsp_svr.key
deleted file mode 100644 (file)
index 055435e..0000000
+++ /dev/null
@@ -1,15 +0,0 @@
------BEGIN RSA PRIVATE KEY-----
-MIICXAIBAAKBgQC5DoAg/HRJCMuDh3bkQgNCblYbrnNDm6bPXTMdN8+1Irx5Xmpp
-Aj7iCMX1vu7v30+FQaJf03Y5P2FWFB/BzOxF47LisOggn6nnirjtP+Rvhtjl1Tv+
-R+iPUe7dtn82a8d193gE36xRsyVlBKsNztteOttqj9ppRseS8rO6bJA9cQIDAQAB
-AoGAfBn7VyO2IBxjzssTsjOK2AwCdwHgjqBdl4aa9qctBf5LguEMX2uAHDlh+FGZ
-Dwgk3eqMJ9M5315fukg4m9D/SSJB5KzmdUB9OQaVe5zhteWOyFUFmMPWOwckKbHj
-EZ+VLpab1PcQQm7VPPAGkF2p2J5UTR/JXt3ZPPj25+orKXkCQQDtnKJ0KtowUUjM
-84+EV9nb7MdJJSAYBr0FKwqSyXsE/WdjqIGh5n/DtJcx6j44IaTn77EIOWHjztQa
-e7/uuZ63AkEAx2CvuyGE4gijAZSQl7gLdgd5JbaJ4dXsFYb5WZK9TuoglsFoUFjC
-aWP9ozPQQGCdTjt4LM5Ln3SuShIopBndFwJBAK0CuwsI1LwPw4lv4tUDPp8y5dxt
-itPTvDgSIe3FhKyacniPDmy7L9ZpHRn8LHekj7VNwsJxPcSpKalq59LEFzsCQCAT
-vjItQmPbX95xOJIwWiezLBqVM7nR4RnVjWiL40k/Ad8/XrkOjrjGDZikTW0OHkDn
-8H3E8wXEkAX6xe8g+iECQEq02B0Je95yRzhFU2OfcZFz9B5YdNXkWAORNGNHV8nO
-m4hVtlawDFWvhHhB/o6JG3QlN3UWy0TRgqZssfb+pNA=
------END RSA PRIVATE KEY-----
diff --git a/tests/cert-svc/data/TestData/ssl/ocsp_svr/ocsp_svr.crt b/tests/cert-svc/data/TestData/ssl/ocsp_svr/ocsp_svr.crt
deleted file mode 100644 (file)
index 5550456..0000000
+++ /dev/null
@@ -1,79 +0,0 @@
-Certificate:
-    Data:
-        Version: 3 (0x2)
-        Serial Number: 7 (0x7)
-        Signature Algorithm: sha1WithRSAEncryption
-        Issuer: C=KR, ST=KyungGi-Do, L=Suwon-Si, O=Samsung Elec., CN=CA
-        Validity
-            Not Before: Mar 10 00:14:51 2009 GMT
-            Not After : Mar 10 00:14:51 2010 GMT
-        Subject: C=KR, ST=KyungGi-Do, O=Samsung Elec., CN=OCSP Responder
-        Subject Public Key Info:
-            Public Key Algorithm: rsaEncryption
-            RSA Public Key: (1024 bit)
-                Modulus (1024 bit):
-                    00:b9:0e:80:20:fc:74:49:08:cb:83:87:76:e4:42:
-                    03:42:6e:56:1b:ae:73:43:9b:a6:cf:5d:33:1d:37:
-                    cf:b5:22:bc:79:5e:6a:69:02:3e:e2:08:c5:f5:be:
-                    ee:ef:df:4f:85:41:a2:5f:d3:76:39:3f:61:56:14:
-                    1f:c1:cc:ec:45:e3:b2:e2:b0:e8:20:9f:a9:e7:8a:
-                    b8:ed:3f:e4:6f:86:d8:e5:d5:3b:fe:47:e8:8f:51:
-                    ee:dd:b6:7f:36:6b:c7:75:f7:78:04:df:ac:51:b3:
-                    25:65:04:ab:0d:ce:db:5e:3a:db:6a:8f:da:69:46:
-                    c7:92:f2:b3:ba:6c:90:3d:71
-                Exponent: 65537 (0x10001)
-        X509v3 extensions:
-            X509v3 Extended Key Usage: 
-                OCSP Signing
-    Signature Algorithm: sha1WithRSAEncryption
-        2d:28:82:cc:79:30:2e:b5:8e:4f:d9:3b:f4:8b:c8:a3:e6:3b:
-        cb:2c:0f:97:1c:8b:7f:06:e1:5d:3b:ec:af:c5:de:ef:c4:fa:
-        0b:63:ee:cb:ad:60:7f:42:6f:82:6d:f2:fb:bb:9a:36:f7:1a:
-        6c:9c:82:e8:17:18:41:35:47:72:e8:36:b4:1a:c1:ae:59:7c:
-        92:07:62:8f:00:9a:2e:c8:5e:62:20:5f:14:82:0d:fe:de:04:
-        c8:b0:b6:03:d4:aa:41:70:4f:f9:05:ba:b5:c7:3c:36:a0:68:
-        81:c5:82:91:56:fc:65:fe:73:c4:b3:91:d2:c4:51:16:cb:48:
-        32:e3:b1:ea:a4:dc:e0:de:9b:f2:75:22:cd:04:2d:2d:c9:76:
-        aa:3b:b8:c6:1a:86:86:1f:a7:11:e0:6d:16:f4:5b:b3:09:1d:
-        34:c1:0e:1a:c8:21:82:91:73:bc:e5:c5:cb:d3:ed:46:d5:f5:
-        a6:f8:65:a6:91:7b:cd:a9:0d:a6:37:3e:d9:3f:6f:c4:c7:aa:
-        d9:95:75:dc:6d:38:9e:54:3d:0f:a1:26:16:28:71:6b:14:9e:
-        be:66:8b:f4:71:c1:3e:34:a0:a1:5d:da:31:1c:63:9f:9d:01:
-        7f:62:13:9d:3b:74:a2:b3:0a:d5:24:c0:35:07:c0:6d:20:c1:
-        2a:21:fb:82:a5:9c:eb:3e:ce:25:57:02:d6:38:77:5e:a0:2a:
-        52:0c:f7:3f:f3:d3:aa:0c:53:a9:1c:e9:39:d7:0d:96:28:b8:
-        e2:e9:1c:e3:92:12:1e:e1:3e:44:5a:fb:25:1e:2c:74:a9:93:
-        24:a0:f0:02:63:bf:e2:45:a0:c5:6f:40:e4:3b:b2:b1:f1:0a:
-        19:89:b9:54:d6:61:21:3d:7b:4b:91:fe:d9:f0:e1:48:20:d9:
-        0b:e2:be:dd:f7:5b:6f:c8:76:ca:74:9f:a5:4a:9a:9c:1d:f0:
-        ec:40:72:82:67:fc:2a:9f:4e:f1:7f:e4:b5:7e:c0:3f:22:36:
-        18:c3:48:88:7f:0c:2d:26:cc:40:c5:82:bd:23:e5:6c:ce:3c:
-        27:19:27:fe:7b:1b:fa:cb:38:0a:9f:a6:44:4b:c2:22:63:68:
-        3c:fa:86:11:af:5d:05:7c:5b:fd:26:9a:78:18:c7:f6:1e:1f:
-        69:b9:ba:71:3b:dc:95:c1:3f:59:17:42:f1:48:2b:10:5f:67:
-        46:32:37:4a:1a:85:d0:00:81:92:50:6c:29:80:e1:b5:bf:52:
-        a8:79:c0:5d:b9:36:e3:f7:d5:69:dc:de:54:13:c0:d3:6e:7a:
-        9c:a8:e9:e4:f6:57:ed:aa:bd:6e:c1:c5:35:ed:72:17:65:e3:
-        cd:f0:a3:a0:10:95:b8:70
------BEGIN CERTIFICATE-----
-MIIDuzCCAaOgAwIBAgIBBzANBgkqhkiG9w0BAQUFADBaMQswCQYDVQQGEwJLUjET
-MBEGA1UECBMKS3l1bmdHaS1EbzERMA8GA1UEBxMIU3V3b24tU2kxFjAUBgNVBAoT
-DVNhbXN1bmcgRWxlYy4xCzAJBgNVBAMTAkNBMB4XDTA5MDMxMDAwMTQ1MVoXDTEw
-MDMxMDAwMTQ1MVowUzELMAkGA1UEBhMCS1IxEzARBgNVBAgTCkt5dW5nR2ktRG8x
-FjAUBgNVBAoTDVNhbXN1bmcgRWxlYy4xFzAVBgNVBAMTDk9DU1AgUmVzcG9uZGVy
-MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQC5DoAg/HRJCMuDh3bkQgNCblYb
-rnNDm6bPXTMdN8+1Irx5XmppAj7iCMX1vu7v30+FQaJf03Y5P2FWFB/BzOxF47Li
-sOggn6nnirjtP+Rvhtjl1Tv+R+iPUe7dtn82a8d193gE36xRsyVlBKsNztteOttq
-j9ppRseS8rO6bJA9cQIDAQABoxcwFTATBgNVHSUEDDAKBggrBgEFBQcDCTANBgkq
-hkiG9w0BAQUFAAOCAgEALSiCzHkwLrWOT9k79IvIo+Y7yywPlxyLfwbhXTvsr8Xe
-78T6C2Puy61gf0Jvgm3y+7uaNvcabJyC6BcYQTVHcug2tBrBrll8kgdijwCaLshe
-YiBfFIIN/t4EyLC2A9SqQXBP+QW6tcc8NqBogcWCkVb8Zf5zxLOR0sRRFstIMuOx
-6qTc4N6b8nUizQQtLcl2qju4xhqGhh+nEeBtFvRbswkdNMEOGsghgpFzvOXFy9Pt
-RtX1pvhlppF7zakNpjc+2T9vxMeq2ZV13G04nlQ9D6EmFihxaxSevmaL9HHBPjSg
-oV3aMRxjn50Bf2ITnTt0orMK1STANQfAbSDBKiH7gqWc6z7OJVcC1jh3XqAqUgz3
-P/PTqgxTqRzpOdcNlii44ukc45ISHuE+RFr7JR4sdKmTJKDwAmO/4kWgxW9A5Duy
-sfEKGYm5VNZhIT17S5H+2fDhSCDZC+K+3fdbb8h2ynSfpUqanB3w7EBygmf8Kp9O
-8X/ktX7APyI2GMNIiH8MLSbMQMWCvSPlbM48Jxkn/nsb+ss4Cp+mREvCImNoPPqG
-Ea9dBXxb/SaaeBjH9h4fabm6cTvclcE/WRdC8UgrEF9nRjI3ShqF0ACBklBsKYDh
-tb9SqHnAXbk24/fVadzeVBPA0256nKjp5PZX7aq9bsHFNe1yF2XjzfCjoBCVuHA=
------END CERTIFICATE-----
diff --git a/tests/cert-svc/data/TestData/ssl/ocsp_svr_nocheck.crt b/tests/cert-svc/data/TestData/ssl/ocsp_svr_nocheck.crt
deleted file mode 100644 (file)
index 6b31eed..0000000
+++ /dev/null
@@ -1,80 +0,0 @@
-Certificate:
-    Data:
-        Version: 3 (0x2)
-        Serial Number: 39 (0x27)
-        Signature Algorithm: sha1WithRSAEncryption
-        Issuer: C=KR, ST=KyungGi-Do, L=Suwon-Si, O=Samsung Elec., CN=CA
-        Validity
-            Not Before: Mar 16 23:06:11 2009 GMT
-            Not After : Mar 14 23:06:11 2019 GMT
-        Subject: C=KR, ST=KyungGi-Do, O=Samsung Elec., CN=Responder certificate with nocheck ext. field
-        Subject Public Key Info:
-            Public Key Algorithm: rsaEncryption
-            RSA Public Key: (1024 bit)
-                Modulus (1024 bit):
-                    00:c3:69:f4:12:34:1b:04:51:33:26:84:9e:5a:fe:
-                    2b:d7:d8:eb:6a:14:af:e5:58:68:a5:71:e4:5e:8a:
-                    55:dc:69:71:14:3f:16:48:b1:52:ee:22:05:fd:2a:
-                    e7:6e:ce:f1:24:49:f0:06:3d:f5:ed:6c:ed:26:11:
-                    93:93:4e:08:05:91:26:b9:22:e8:77:8b:6f:50:a5:
-                    db:14:28:2c:c2:94:86:d2:64:11:0e:8a:51:eb:54:
-                    3b:5a:1f:70:0a:b2:5c:e2:b2:62:99:30:7c:8c:71:
-                    f6:08:28:4f:d9:38:38:38:f3:82:cd:3a:ed:57:5c:
-                    c9:d2:bc:47:fa:96:24:2e:d5
-                Exponent: 65537 (0x10001)
-        X509v3 extensions:
-            OCSP No Check: 
-
-    Signature Algorithm: sha1WithRSAEncryption
-        69:71:40:12:af:e4:be:42:52:ff:7a:a8:bf:e3:41:f2:2b:75:
-        0d:22:10:e8:d6:1e:d3:c0:bb:90:7f:76:46:92:a9:63:2b:50:
-        74:c8:73:c4:7b:0e:a0:b7:ed:5c:20:06:18:64:1b:7b:82:21:
-        a7:82:bc:c0:33:53:8b:5f:68:c7:de:5f:95:31:52:93:5d:0f:
-        78:4c:ff:50:2f:e0:57:ba:f5:49:cb:94:ba:34:85:e9:f1:10:
-        76:27:66:6d:d6:46:f6:9d:51:2d:04:96:b5:78:f7:c6:1b:25:
-        b4:0a:e7:89:f4:9f:a5:33:92:51:00:86:97:0f:47:cc:3a:8d:
-        5e:3a:c2:ad:51:48:7e:7a:03:7a:d1:a7:6d:14:8a:64:f9:5a:
-        e1:1c:cb:82:e1:42:f3:8c:dc:87:8e:9b:c8:e4:68:3c:26:eb:
-        0a:19:c8:1c:71:88:7e:c9:66:f7:fe:1a:ee:3a:52:1b:54:60:
-        95:e8:37:e6:0d:b3:8b:bf:02:07:e7:f8:16:64:f9:34:50:8c:
-        bd:54:e5:d1:0b:a8:5f:59:79:de:2a:ea:44:92:be:3e:b2:0d:
-        cd:fa:df:d3:93:10:c9:ef:40:d3:31:a7:06:e3:39:15:68:5d:
-        d7:94:4f:96:69:8e:13:8d:f3:fb:79:eb:33:50:1e:af:fa:c3:
-        d8:81:47:1b:89:05:39:62:ea:c4:ef:f7:15:29:e2:43:f2:66:
-        93:51:20:12:10:17:c9:c7:f3:7c:e0:fd:59:dc:38:ca:b2:f5:
-        fd:fe:5d:f8:9a:83:70:72:b9:e1:6b:a6:60:db:9d:a3:58:3e:
-        5e:73:a4:ce:18:12:ba:dc:56:72:f8:b4:d8:4c:e8:d9:9c:5e:
-        cf:d1:76:56:7e:2e:33:9d:1a:80:eb:dd:7c:69:c0:9c:d3:5c:
-        5c:d3:a2:89:7c:44:87:66:10:6e:f9:90:b6:72:58:90:77:48:
-        ea:56:25:52:e3:c6:bd:3c:95:99:ae:fd:2a:f7:b2:1f:87:bc:
-        af:93:ba:2d:0f:1a:ff:7e:90:3b:ae:63:96:9e:68:97:32:16:
-        ed:b8:ce:7d:48:f2:b9:83:fc:24:dc:34:1a:34:a4:19:80:78:
-        ec:b2:6c:a0:e8:15:37:1e:8d:fa:b9:62:a2:25:5d:d3:14:50:
-        f6:68:4b:09:b3:12:ac:cc:63:bb:2b:e6:2a:33:ee:c7:1c:c6:
-        64:14:47:e2:c3:29:26:ba:f9:e8:2e:34:c1:cc:9e:3b:2d:57:
-        cd:f7:fe:fb:d8:13:65:5c:42:a8:71:61:df:d7:ae:16:71:7f:
-        fd:fb:66:d6:a2:92:52:e9:cb:65:03:7d:13:8c:bc:d4:5a:1a:
-        c0:55:0d:5f:1c:85:a0:1e
------BEGIN CERTIFICATE-----
-MIID1jCCAb6gAwIBAgIBJzANBgkqhkiG9w0BAQUFADBaMQswCQYDVQQGEwJLUjET
-MBEGA1UECBMKS3l1bmdHaS1EbzERMA8GA1UEBxMIU3V3b24tU2kxFjAUBgNVBAoT
-DVNhbXN1bmcgRWxlYy4xCzAJBgNVBAMTAkNBMB4XDTA5MDMxNjIzMDYxMVoXDTE5
-MDMxNDIzMDYxMVowcjELMAkGA1UEBhMCS1IxEzARBgNVBAgTCkt5dW5nR2ktRG8x
-FjAUBgNVBAoTDVNhbXN1bmcgRWxlYy4xNjA0BgNVBAMTLVJlc3BvbmRlciBjZXJ0
-aWZpY2F0ZSB3aXRoIG5vY2hlY2sgZXh0LiBmaWVsZDCBnzANBgkqhkiG9w0BAQEF
-AAOBjQAwgYkCgYEAw2n0EjQbBFEzJoSeWv4r19jrahSv5VhopXHkXopV3GlxFD8W
-SLFS7iIF/Srnbs7xJEnwBj317WztJhGTk04IBZEmuSLod4tvUKXbFCgswpSG0mQR
-DopR61Q7Wh9wCrJc4rJimTB8jHH2CChP2Tg4OPOCzTrtV1zJ0rxH+pYkLtUCAwEA
-AaMTMBEwDwYJKwYBBQUHMAEFBAIFADANBgkqhkiG9w0BAQUFAAOCAgEAaXFAEq/k
-vkJS/3qov+NB8it1DSIQ6NYe08C7kH92RpKpYytQdMhzxHsOoLftXCAGGGQbe4Ih
-p4K8wDNTi19ox95flTFSk10PeEz/UC/gV7r1ScuUujSF6fEQdidmbdZG9p1RLQSW
-tXj3xhsltArnifSfpTOSUQCGlw9HzDqNXjrCrVFIfnoDetGnbRSKZPla4RzLguFC
-84zch46byORoPCbrChnIHHGIfslm9/4a7jpSG1Rgleg35g2zi78CB+f4FmT5NFCM
-vVTl0QuoX1l53irqRJK+PrINzfrf05MQye9A0zGnBuM5FWhd15RPlmmOE43z+3nr
-M1Aer/rD2IFHG4kFOWLqxO/3FSniQ/Jmk1EgEhAXycfzfOD9Wdw4yrL1/f5d+JqD
-cHK54WumYNudo1g+XnOkzhgSutxWcvi02Ezo2Zxez9F2Vn4uM50agOvdfGnAnNNc
-XNOiiXxEh2YQbvmQtnJYkHdI6lYlUuPGvTyVma79KveyH4e8r5O6LQ8a/36QO65j
-lp5olzIW7bjOfUjyuYP8JNw0GjSkGYB47LJsoOgVNx6N+rlioiVd0xRQ9mhLCbMS
-rMxjuyvmKjPuxxzGZBRH4sMpJrr56C40wcyeOy1Xzff++9gTZVxCqHFh39euFnF/
-/ftm1qKSUunLZQN9E4y81FoawFUNXxyFoB4=
------END CERTIFICATE-----
diff --git a/tests/cert-svc/data/TestData/ssl/ocsp_svr_nocheck.key b/tests/cert-svc/data/TestData/ssl/ocsp_svr_nocheck.key
deleted file mode 100644 (file)
index 4946d6b..0000000
+++ /dev/null
@@ -1,15 +0,0 @@
------BEGIN RSA PRIVATE KEY-----
-MIICXAIBAAKBgQDDafQSNBsEUTMmhJ5a/ivX2OtqFK/lWGilceReilXcaXEUPxZI
-sVLuIgX9KuduzvEkSfAGPfXtbO0mEZOTTggFkSa5Iuh3i29QpdsUKCzClIbSZBEO
-ilHrVDtaH3AKslzismKZMHyMcfYIKE/ZODg484LNOu1XXMnSvEf6liQu1QIDAQAB
-AoGADsM3XBSxoc7clWFZcThYaZMKndX4P9RA+5ayEO5UdDVHBKeLcGxs/m51k12l
-ZDqf/wTS7DXMGWasN78GLg+sDVXKhzmGIcI7Lql8bVbeXIn8CQaCG+Ol7VmUwDw4
-LAoguwyyKZbeWTzsdRdumhHyLnjVXDnBw3oUYGDtVvIMgXUCQQDo4Y+qsWEa/88O
-M+0LjnM0Ua4DGpHLiKtGkmsc9+Lyhq1bRa07F78ufsVW7Fv3esOa2dyOU9+cK/oe
-fukRZH3/AkEA1tAzV8bRVxoyFahZ31yEnag9op+ZdH45TiIKT/TpA3skxaanV5aJ
-xa3czmfOge3izwZ5e/Gq2MVuCHiRUUb7KwJAQy11/P5IDbrHJsix04iXEPuS39BV
-SEo3ZhcskOGs9NsGvPJ/gzFZc/cbw/RQnzYpoMzBw8jME0fYUd24K806TwJAWQD2
-5P2Zqy9NZS/V3PgmcnRM5V6fZGcQM1FjWHGvQiP5vnMojt/uwZsiC9ty8t6vxPt3
-xmUBVsOmrZfXDggM9QJBAKKwevWzPt5v42+mZhN1qWeHgHk/urFWn5+ITIzVNZmD
-FvIQ/2iBj2YmLiD3pbgT0eflAdfSM8enTyqZ431nOFE=
------END RSA PRIVATE KEY-----
diff --git a/tests/cert-svc/data/TestData/ssl/ocsp_svr_nocheck_and_ocspsigning.crt b/tests/cert-svc/data/TestData/ssl/ocsp_svr_nocheck_and_ocspsigning.crt
deleted file mode 100644 (file)
index 892ac97..0000000
+++ /dev/null
@@ -1,82 +0,0 @@
-Certificate:
-    Data:
-        Version: 3 (0x2)
-        Serial Number: 40 (0x28)
-        Signature Algorithm: sha1WithRSAEncryption
-        Issuer: C=KR, ST=KyungGi-Do, L=Suwon-Si, O=Samsung Elec., CN=CA
-        Validity
-            Not Before: Mar 16 23:08:54 2009 GMT
-            Not After : Mar 14 23:08:54 2019 GMT
-        Subject: C=KR, ST=KyungGi-Do, O=Samsung Elec., CN=OCSP Responder's certificate with delegation
-        Subject Public Key Info:
-            Public Key Algorithm: rsaEncryption
-            RSA Public Key: (1024 bit)
-                Modulus (1024 bit):
-                    00:d0:8a:8e:73:c5:57:a8:03:b0:2c:1f:05:05:36:
-                    1b:90:89:db:48:b2:cd:e8:ea:02:95:d8:30:c3:c6:
-                    3e:6a:8c:19:70:0c:a7:cb:a6:07:df:ec:42:c9:dc:
-                    18:cf:ef:73:cd:d1:eb:51:c0:bd:0e:51:63:6f:a3:
-                    ce:26:a0:02:da:32:a3:65:36:ad:42:02:85:9b:df:
-                    9e:0a:51:41:93:f9:02:ff:f0:63:be:38:2e:b9:d9:
-                    07:db:3c:81:23:4f:2a:0d:24:50:6e:e2:ef:59:f4:
-                    91:3a:fb:fd:55:19:4b:49:71:08:bd:f9:2d:ea:64:
-                    82:f6:1a:ca:46:60:ac:de:e5
-                Exponent: 65537 (0x10001)
-        X509v3 extensions:
-            X509v3 Extended Key Usage: 
-                OCSP Signing
-            OCSP No Check: 
-
-    Signature Algorithm: sha1WithRSAEncryption
-        05:a1:04:c7:55:71:a8:52:04:d6:60:f3:37:08:15:50:86:71:
-        bf:8e:9e:9b:60:50:6e:57:1e:b1:30:3a:e0:8a:e0:74:90:c0:
-        be:97:78:f1:8b:52:f3:6b:e6:45:38:a5:7b:e2:47:2d:5c:80:
-        15:e7:74:b2:b1:66:db:eb:96:67:7c:01:8b:5e:c1:c2:59:33:
-        2e:62:a9:a3:7f:c7:b8:07:ee:27:22:83:11:e3:e9:b9:59:a5:
-        1f:27:1f:6f:b9:34:c5:c2:ae:d5:cd:59:59:28:05:78:ff:0f:
-        18:6a:c8:22:5b:40:06:0b:a9:ee:8c:e5:44:04:59:a0:f2:42:
-        e8:52:a4:ec:45:78:1e:b4:cf:02:e5:b5:31:d2:f4:93:15:58:
-        bc:02:a6:b0:01:5a:d9:72:eb:80:64:e9:f1:d5:38:69:f4:1a:
-        4d:7c:78:d7:ba:9e:ca:41:22:a6:09:c2:7e:fe:90:20:7f:72:
-        ae:ca:76:30:39:e5:1e:70:63:bc:68:e4:ee:0f:e7:7a:b0:cf:
-        c4:70:26:b8:dd:4e:9f:9f:75:11:05:be:d8:17:95:c1:75:ac:
-        e6:91:f7:b8:8e:93:f3:45:c1:9d:10:10:71:69:92:6d:f1:b8:
-        73:18:ed:02:84:6d:ab:6c:cc:91:be:ac:3c:61:39:48:74:e2:
-        27:b9:16:5e:02:6c:c4:1b:35:a2:68:24:44:5c:4e:37:58:6d:
-        f3:a4:e9:6a:d9:56:92:6d:05:6e:e1:f3:f5:7b:11:40:4b:2b:
-        13:32:e5:18:5b:62:64:1a:17:9f:91:fd:0c:95:54:02:09:6f:
-        48:ea:c8:ae:7e:24:bb:a8:b1:33:c8:98:50:90:8d:b2:5b:21:
-        1e:af:d2:78:ae:87:a7:32:82:3d:aa:9d:66:0d:92:59:02:8c:
-        3f:73:43:76:74:58:f9:95:fd:5c:90:31:d7:c7:7a:2a:fb:e0:
-        bb:b8:50:62:3c:44:09:34:dd:68:10:11:be:c6:c3:65:a4:e8:
-        e3:9d:0f:59:a2:a7:e5:d5:97:8b:48:a0:d4:30:31:aa:9e:4b:
-        e2:30:ed:06:72:c8:97:0d:6a:70:a8:c9:ca:9c:d4:f1:57:0b:
-        bf:24:43:7e:b7:a1:a5:91:af:ac:ae:f5:c6:8b:ef:aa:61:e5:
-        c4:7d:37:31:a0:5f:e9:45:9d:d8:08:b9:15:da:16:2a:16:77:
-        c7:82:0e:02:6e:9b:ec:25:f3:8f:8d:11:41:0b:56:a9:7b:1d:
-        0f:f3:be:fa:46:ee:cb:80:3b:09:1f:85:90:70:ed:1d:e3:65:
-        f4:81:3f:ef:86:32:6c:9c:b0:35:e2:73:41:fb:0c:0c:2d:2d:
-        cb:45:0e:73:d3:39:98:36
------BEGIN CERTIFICATE-----
-MIID6jCCAdKgAwIBAgIBKDANBgkqhkiG9w0BAQUFADBaMQswCQYDVQQGEwJLUjET
-MBEGA1UECBMKS3l1bmdHaS1EbzERMA8GA1UEBxMIU3V3b24tU2kxFjAUBgNVBAoT
-DVNhbXN1bmcgRWxlYy4xCzAJBgNVBAMTAkNBMB4XDTA5MDMxNjIzMDg1NFoXDTE5
-MDMxNDIzMDg1NFowcTELMAkGA1UEBhMCS1IxEzARBgNVBAgTCkt5dW5nR2ktRG8x
-FjAUBgNVBAoTDVNhbXN1bmcgRWxlYy4xNTAzBgNVBAMTLE9DU1AgUmVzcG9uZGVy
-J3MgY2VydGlmaWNhdGUgd2l0aCBkZWxlZ2F0aW9uMIGfMA0GCSqGSIb3DQEBAQUA
-A4GNADCBiQKBgQDQio5zxVeoA7AsHwUFNhuQidtIss3o6gKV2DDDxj5qjBlwDKfL
-pgff7ELJ3BjP73PN0etRwL0OUWNvo84moALaMqNlNq1CAoWb354KUUGT+QL/8GO+
-OC652QfbPIEjTyoNJFBu4u9Z9JE6+/1VGUtJcQi9+S3qZIL2GspGYKze5QIDAQAB
-oygwJjATBgNVHSUEDDAKBggrBgEFBQcDCTAPBgkrBgEFBQcwAQUEAgUAMA0GCSqG
-SIb3DQEBBQUAA4ICAQAFoQTHVXGoUgTWYPM3CBVQhnG/jp6bYFBuVx6xMDrgiuB0
-kMC+l3jxi1Lza+ZFOKV74kctXIAV53SysWbb65ZnfAGLXsHCWTMuYqmjf8e4B+4n
-IoMR4+m5WaUfJx9vuTTFwq7VzVlZKAV4/w8YasgiW0AGC6nujOVEBFmg8kLoUqTs
-RXgetM8C5bUx0vSTFVi8AqawAVrZcuuAZOnx1Thp9BpNfHjXup7KQSKmCcJ+/pAg
-f3KuynYwOeUecGO8aOTuD+d6sM/EcCa43U6fn3URBb7YF5XBdazmkfe4jpPzRcGd
-EBBxaZJt8bhzGO0ChG2rbMyRvqw8YTlIdOInuRZeAmzEGzWiaCREXE43WG3zpOlq
-2VaSbQVu4fP1exFASysTMuUYW2JkGhefkf0MlVQCCW9I6siufiS7qLEzyJhQkI2y
-WyEer9J4roenMoI9qp1mDZJZAow/c0N2dFj5lf1ckDHXx3oq++C7uFBiPEQJNN1o
-EBG+xsNlpOjjnQ9Zoqfl1ZeLSKDUMDGqnkviMO0GcsiXDWpwqMnKnNTxVwu/JEN+
-t6Glka+srvXGi++qYeXEfTcxoF/pRZ3YCLkV2hYqFnfHgg4CbpvsJfOPjRFBC1ap
-ex0P8776Ru7LgDsJH4WQcO0d42X0gT/vhjJsnLA14nNB+wwMLS3LRQ5z0zmYNg==
------END CERTIFICATE-----
diff --git a/tests/cert-svc/data/TestData/ssl/ocsp_svr_nocheck_and_ocspsigning.key b/tests/cert-svc/data/TestData/ssl/ocsp_svr_nocheck_and_ocspsigning.key
deleted file mode 100644 (file)
index 3c1f779..0000000
+++ /dev/null
@@ -1,15 +0,0 @@
------BEGIN RSA PRIVATE KEY-----
-MIICXAIBAAKBgQDQio5zxVeoA7AsHwUFNhuQidtIss3o6gKV2DDDxj5qjBlwDKfL
-pgff7ELJ3BjP73PN0etRwL0OUWNvo84moALaMqNlNq1CAoWb354KUUGT+QL/8GO+
-OC652QfbPIEjTyoNJFBu4u9Z9JE6+/1VGUtJcQi9+S3qZIL2GspGYKze5QIDAQAB
-AoGAN5sqft45EFjjafBfg1M5KGJJ8WmUFC4JwHDkF9/NltWClukY+Oltohy6dl7U
-0uUziMcXqzXsc1vqWsNf3da+y3oApBa83lI0u02Quzfjc3Lod+Blg7F6RA2dujg+
-3r6Zsop82NWnsMVqxi6+ZjXymSndu8UoY2k/+0N4Ct3916UCQQD9tWlBrKwPhVI3
-tz1Ho0peEdHrn6FXg21rvZgy+RMuiJUummwZZVUDS8ag2OPymffpNCZjbLTDXlaS
-LGKwWt8vAkEA0my3N0557HO345VHlhFiOc1wKcAVN06PNzjU1FZ9PqQeOpoVj4E5
-LlZK625v8d6N8/W8EFbjxfsVll4/P2Q+KwJAS5noYJqctw9KXbHrv9In0fpLbIQn
-5tUSIR3hIadZEO/ATJ/VgIfSmmXVLY8T9fHtjv9sRQpanzEYaPxy+AxMHwJAb0q8
-pG3HIn4Zli7QC9jp4LR9TDehgPz11jkip6OO3mCi9E+mc53fBljxiw9/+abB4XPo
-oaOzGHUx97OlM/vqvQJBAKSUpOYm8HPvMiHUAZElqD+gCSPM1ocv5MpQjm6t7Bc+
-WTCWBulo/KPHIG0wI4Ug/PtA29DsdC0mqQVLZZ9r0IE=
------END RSA PRIVATE KEY-----
diff --git a/tests/cert-svc/data/TestData/ssl/ocsp_svr_with_response.crt b/tests/cert-svc/data/TestData/ssl/ocsp_svr_with_response.crt
deleted file mode 100644 (file)
index 0846e40..0000000
+++ /dev/null
@@ -1,80 +0,0 @@
-Certificate:
-    Data:
-        Version: 3 (0x2)
-        Serial Number: 14 (0xe)
-        Signature Algorithm: sha1WithRSAEncryption
-        Issuer: C=KR, ST=KyungGi-Do, L=Suwon-Si, O=Samsung Elec., CN=CA
-        Validity
-            Not Before: Mar 13 03:16:42 2009 GMT
-            Not After : Mar 11 03:16:42 2019 GMT
-        Subject: C=KR, ST=KyungGi-Do, O=Samsung Elec., CN=Second Responder Certificate
-        Subject Public Key Info:
-            Public Key Algorithm: rsaEncryption
-            RSA Public Key: (1024 bit)
-                Modulus (1024 bit):
-                    00:aa:01:31:49:34:0e:6c:b5:25:a0:da:35:71:cf:
-                    9d:a7:c4:ad:27:31:ee:c2:46:fe:03:8f:4f:ed:f7:
-                    75:d5:b9:01:c6:a9:8f:8d:17:ca:8c:82:82:63:ed:
-                    08:d4:05:9e:31:3c:c9:66:59:41:72:63:8e:01:3e:
-                    a2:39:d1:9c:51:9c:c5:9a:ad:72:0d:e6:2b:19:ba:
-                    45:a6:18:f6:e2:79:72:4b:5e:79:74:38:b5:86:9c:
-                    57:bb:2c:e8:f5:57:9b:32:34:86:2a:2f:40:2f:5d:
-                    dd:9c:f5:63:d4:2e:ad:b1:d3:25:22:7c:86:89:84:
-                    c9:26:70:3c:c8:11:64:ed:47
-                Exponent: 65537 (0x10001)
-        X509v3 extensions:
-            X509v3 Extended Key Usage: 
-                OCSP Signing
-    Signature Algorithm: sha1WithRSAEncryption
-        b8:56:6b:f9:21:8a:79:e8:53:38:c7:84:e0:c3:96:6c:f3:71:
-        95:dc:31:9a:ef:fc:fb:b5:18:c6:35:26:3d:ee:4d:00:9c:e4:
-        10:25:a9:2e:a0:41:8a:37:a9:91:02:9c:52:ec:0d:7a:bf:e9:
-        bb:54:6d:4a:92:5c:9d:c8:01:17:a3:8f:25:fd:32:a7:11:e4:
-        77:fd:ce:7c:4b:c9:ae:32:e6:d5:25:cc:a4:97:bb:07:f3:1d:
-        f0:11:8a:d8:f1:37:e6:4f:3c:99:30:44:20:04:3d:82:fc:87:
-        60:24:21:a9:46:e7:d8:41:2c:76:d8:a5:58:44:ca:85:71:31:
-        24:f2:45:7d:fb:70:db:1b:93:42:21:85:69:5d:19:13:85:7c:
-        85:6c:83:8f:bf:c1:a7:3d:49:b9:68:4e:a2:12:2e:9d:89:c3:
-        a7:1b:86:71:e4:cc:29:79:0e:b1:19:07:ca:2d:b8:95:87:f4:
-        8d:4a:be:06:0d:d0:e1:1a:ed:ea:a2:52:f3:f2:7b:1f:3c:10:
-        c6:67:be:00:3a:36:ca:ad:93:d4:ee:b3:9d:e8:47:6e:bb:6f:
-        12:6b:cf:3d:73:22:a3:15:e0:e1:51:88:86:e6:2a:23:ee:e1:
-        32:55:0c:b8:73:35:f7:42:9e:4c:c4:ea:f5:3c:d5:20:ef:32:
-        27:c2:b5:9b:ad:f0:a8:bf:72:5c:5b:fc:41:e4:a0:6d:b2:4d:
-        c0:69:a5:b2:dc:70:d6:90:ae:2e:81:41:f4:ec:33:c5:43:4e:
-        70:eb:1c:17:4c:d9:ed:8f:97:2e:20:17:9d:40:bc:d1:ae:74:
-        21:8b:ab:cc:b0:86:5a:cd:42:9c:df:13:16:59:56:27:be:26:
-        bb:92:5f:7a:86:9e:f5:19:45:1f:36:8a:e3:55:5d:89:3b:2f:
-        ed:13:9c:e7:ae:bd:eb:34:31:a2:02:70:0c:a7:32:d3:d1:be:
-        c0:2f:0e:10:b7:43:2d:ab:68:70:b4:a1:e1:25:c1:ae:1c:43:
-        32:c0:90:81:c1:39:0b:27:e7:14:c9:28:db:40:0f:1f:9c:ce:
-        1b:8b:26:ca:b8:41:01:e7:cb:92:b0:8a:14:00:f3:e0:3c:84:
-        d3:2c:45:19:15:01:02:ab:bd:e8:19:6b:d7:7e:c6:5a:a9:3a:
-        d5:00:23:15:2a:e9:93:7d:11:75:cc:c6:c3:8e:5f:3f:d3:3f:
-        05:9f:40:12:a9:a8:bc:50:dc:42:02:62:7d:00:6a:ef:08:e1:
-        69:87:4d:2a:9b:54:49:35:80:58:12:92:a1:33:65:20:5f:29:
-        cf:ab:03:8e:0b:91:08:9e:52:d6:b2:d7:ec:bb:38:9b:d5:5d:
-        f6:b2:89:f5:00:bb:0f:f2
------BEGIN CERTIFICATE-----
-MIIDyTCCAbGgAwIBAgIBDjANBgkqhkiG9w0BAQUFADBaMQswCQYDVQQGEwJLUjET
-MBEGA1UECBMKS3l1bmdHaS1EbzERMA8GA1UEBxMIU3V3b24tU2kxFjAUBgNVBAoT
-DVNhbXN1bmcgRWxlYy4xCzAJBgNVBAMTAkNBMB4XDTA5MDMxMzAzMTY0MloXDTE5
-MDMxMTAzMTY0MlowYTELMAkGA1UEBhMCS1IxEzARBgNVBAgTCkt5dW5nR2ktRG8x
-FjAUBgNVBAoTDVNhbXN1bmcgRWxlYy4xJTAjBgNVBAMTHFNlY29uZCBSZXNwb25k
-ZXIgQ2VydGlmaWNhdGUwgZ8wDQYJKoZIhvcNAQEBBQADgY0AMIGJAoGBAKoBMUk0
-Dmy1JaDaNXHPnafErScx7sJG/gOPT+33ddW5Acapj40XyoyCgmPtCNQFnjE8yWZZ
-QXJjjgE+ojnRnFGcxZqtcg3mKxm6RaYY9uJ5ckteeXQ4tYacV7ss6PVXmzI0hiov
-QC9d3Zz1Y9QurbHTJSJ8homEySZwPMgRZO1HAgMBAAGjFzAVMBMGA1UdJQQMMAoG
-CCsGAQUFBwMJMA0GCSqGSIb3DQEBBQUAA4ICAQC4Vmv5IYp56FM4x4Tgw5Zs83GV
-3DGa7/z7tRjGNSY97k0AnOQQJakuoEGKN6mRApxS7A16v+m7VG1KklydyAEXo48l
-/TKnEeR3/c58S8muMubVJcykl7sH8x3wEYrY8TfmTzyZMEQgBD2C/IdgJCGpRufY
-QSx22KVYRMqFcTEk8kV9+3DbG5NCIYVpXRkThXyFbIOPv8GnPUm5aE6iEi6dicOn
-G4Zx5MwpeQ6xGQfKLbiVh/SNSr4GDdDhGu3qolLz8nsfPBDGZ74AOjbKrZPU7rOd
-6Eduu28Sa889cyKjFeDhUYiG5ioj7uEyVQy4czX3Qp5MxOr1PNUg7zInwrWbrfCo
-v3JcW/xB5KBtsk3AaaWy3HDWkK4ugUH07DPFQ05w6xwXTNntj5cuIBedQLzRrnQh
-i6vMsIZazUKc3xMWWVYnvia7kl96hp71GUUfNorjVV2JOy/tE5znrr3rNDGiAnAM
-pzLT0b7ALw4Qt0Mtq2hwtKHhJcGuHEMywJCBwTkLJ+cUySjbQA8fnM4biybKuEEB
-58uSsIoUAPPgPITTLEUZFQECq73oGWvXfsZaqTrVACMVKumTfRF1zMbDjl8/0z8F
-n0ASqai8UNxCAmJ9AGrvCOFph00qm1RJNYBYEpKhM2UgXynPqwOOC5EInlLWstfs
-uzib1V32son1ALsP8g==
------END CERTIFICATE-----
diff --git a/tests/cert-svc/data/TestData/ssl/ocsp_svr_with_response.key b/tests/cert-svc/data/TestData/ssl/ocsp_svr_with_response.key
deleted file mode 100644 (file)
index f9b78cd..0000000
+++ /dev/null
@@ -1,15 +0,0 @@
------BEGIN RSA PRIVATE KEY-----
-MIICXAIBAAKBgQCqATFJNA5stSWg2jVxz52nxK0nMe7CRv4Dj0/t93XVuQHGqY+N
-F8qMgoJj7QjUBZ4xPMlmWUFyY44BPqI50ZxRnMWarXIN5isZukWmGPbieXJLXnl0
-OLWGnFe7LOj1V5syNIYqL0AvXd2c9WPULq2x0yUifIaJhMkmcDzIEWTtRwIDAQAB
-AoGANCB/e0Gx9pUov4SJBKezYKDGsxD1c66O7op/6KiLAghjSgXt1UZpPeI6luc0
-YMaENfa8jlxp2+g4v5rz5SSneEK4G/Qx5dNh+wMEr0iE7PWgkgmOgDj2beaqcFP1
-l1QG0pshiW4VuD+erfPuWMBzPPGC5rGlyFCDgvHelybbuNECQQDaPgCAmxk1CcVD
-hN6TIA9Q1kkzALKvFntrKGgSy/c/tY+FkYQbMl8EPqaiIs+sseXCtW1kLELQU5gY
-tZsF7wMpAkEAx2q9HZ4s+K141csh+7pLhum/xR2lYJ4Gu2qtj15Xq2fWdRDLvbdv
-lt+R0Mw9H+cDlgmPQHnYWglajRC2EKJq7wJAbydzFA1qukO+r9PllOOYSWDKqWpq
-l5iIxZwv3Zr60/0CG1JxCXUPRdcvAZdfVKLK1e+XxpRwdzCMX9FnIo+IeQJAfIPY
-a9rtJ6VhctTwdjafnDDuDg1xyr9BYtq8Xm3A/gTLMrN3FBGquqEEckRk0juz0IZN
-jSvHfIikorpRhFd1vwJBAMKpl679FQG6Bcl6TPXnFuiw3/g/4zFGBONQGhBwl6xb
-PwrJ4Iv1XzZ1VtVvp5c5sRkCf6F1Lv7pyZsCMLD8wrQ=
------END RSA PRIVATE KEY-----
diff --git a/tests/cert-svc/data/TestData/ssl/resp_ocsp1.der b/tests/cert-svc/data/TestData/ssl/resp_ocsp1.der
deleted file mode 100644 (file)
index 2bf5734..0000000
Binary files a/tests/cert-svc/data/TestData/ssl/resp_ocsp1.der and /dev/null differ
diff --git a/tests/cert-svc/data/TestData/ssl/sha256.crt b/tests/cert-svc/data/TestData/ssl/sha256.crt
deleted file mode 100644 (file)
index f3fd8ed..0000000
+++ /dev/null
@@ -1,92 +0,0 @@
-Certificate:
-    Data:
-        Version: 3 (0x2)
-        Serial Number: 42 (0x2a)
-        Signature Algorithm: sha256WithRSAEncryption
-        Issuer: C=KR, ST=KyungGi-Do, L=Suwon-Si, O=Samsung Elec., CN=CA
-        Validity
-            Not Before: Jun 20 08:21:47 2009 GMT
-            Not After : Jun 18 08:21:47 2019 GMT
-        Subject: C=KR, ST=KyungGi-Do, O=Samsung Elec., CN=First Test Certificate
-        Subject Public Key Info:
-            Public Key Algorithm: rsaEncryption
-            RSA Public Key: (1024 bit)
-                Modulus (1024 bit):
-                    00:cf:0f:cf:a5:08:18:bf:8b:6c:2c:3c:55:fe:02:
-                    43:b7:a8:af:45:a3:4a:28:63:d1:da:26:7a:c2:0d:
-                    f8:58:a5:73:c5:db:b8:fb:62:47:ea:17:7b:25:6b:
-                    d1:8c:e2:74:96:f4:6b:e5:49:3b:b3:e5:6a:63:36:
-                    19:f8:3c:d8:4b:9c:14:9d:2b:6a:71:cc:3a:9f:b9:
-                    d5:db:60:8e:44:40:d7:12:53:52:e5:71:41:c8:bf:
-                    ec:0d:9c:5b:7c:8e:ac:99:47:65:50:e5:f8:95:3e:
-                    8a:3c:99:d9:75:47:73:51:f4:fd:36:46:ed:1a:77:
-                    10:ce:1d:01:0c:86:6b:23:ff
-                Exponent: 65537 (0x10001)
-        X509v3 extensions:
-            X509v3 Basic Constraints: 
-                CA:FALSE
-            Netscape Comment: 
-                OpenSSL Generated Certificate
-            X509v3 Subject Key Identifier: 
-                25:0C:EC:1F:D6:1A:A2:95:AF:C1:A3:DA:EF:B1:F3:BE:62:F3:10:6C
-            X509v3 Authority Key Identifier: 
-                DirName:/C=KR/ST=KyungGi-Do/L=Suwon-Si/O=Samsung Elec./CN=CA
-                serial:F2:5B:40:5B:C2:B7:D0:64
-
-    Signature Algorithm: sha256WithRSAEncryption
-        b1:3e:50:ff:5f:32:b2:09:6b:52:98:07:5a:78:7f:fe:12:6f:
-        87:25:d4:bc:96:45:07:31:e0:ae:52:d1:9e:04:d8:05:84:cf:
-        e2:e5:82:01:b5:46:ce:4e:47:d6:ef:87:7c:37:d6:67:99:ab:
-        ad:4d:70:eb:98:fe:31:f1:f8:e9:a2:c5:40:4f:a6:c4:79:15:
-        64:d3:64:d2:3f:05:b5:08:16:88:46:22:72:86:a1:8e:ef:df:
-        67:25:d7:74:bd:01:04:b8:70:00:0d:9d:36:d0:9e:3a:4b:7e:
-        0d:3d:9e:3d:ce:fb:47:ee:7d:5b:b9:c1:65:2b:4c:ef:26:89:
-        ed:1b:bc:17:4a:63:41:b3:99:e7:c5:4d:d5:31:af:d7:4b:3b:
-        37:ce:99:da:8f:53:20:40:14:95:14:09:61:ba:9c:c0:1b:66:
-        7c:e7:e3:4c:28:c6:48:e8:6c:02:55:3c:44:18:d1:29:88:7b:
-        ff:30:e5:be:ee:8e:da:95:fe:04:c2:c8:a1:ce:81:46:b9:bb:
-        b2:3d:ad:af:a9:e3:a8:c1:8f:d8:51:48:d1:c6:e9:c8:c8:94:
-        6f:7c:b0:fc:92:04:d0:8f:30:30:f1:a3:d0:f8:dc:aa:52:2c:
-        1f:bd:f3:67:ac:97:6e:0d:1a:82:c1:a2:30:9e:d3:95:74:47:
-        b5:49:c8:73:7a:c6:73:20:18:7a:98:8f:c1:3e:5f:1a:04:33:
-        9b:ff:e0:ab:9e:f8:ca:92:bc:e8:94:b8:ce:87:89:75:e6:49:
-        bd:d5:7f:1f:44:b6:48:fc:02:4f:b5:25:f4:ff:53:98:5f:0f:
-        95:52:d2:00:2a:41:85:cb:8d:f4:a1:a6:ef:68:ac:b5:fa:a7:
-        94:91:cc:64:5c:30:43:01:90:84:eb:8f:66:3b:98:4c:42:43:
-        3d:31:47:28:da:49:eb:e9:14:67:c5:81:f6:13:a3:c3:a5:ee:
-        c4:28:0e:52:ee:c7:b2:e6:f8:c3:79:63:12:45:c1:06:5b:94:
-        48:f1:4c:32:c7:69:9d:6d:b3:0b:c5:98:93:f4:4b:c7:64:35:
-        23:22:56:c7:fa:e3:0c:3b:39:cf:b4:ca:cf:d2:10:97:b3:95:
-        e4:f7:53:d3:cb:5e:43:82:d4:7c:e5:83:a4:cf:4e:0b:c8:16:
-        35:5e:8a:2b:47:8a:6e:2f:98:02:d4:cc:9d:28:a9:95:ff:ab:
-        73:df:01:c6:ff:df:7b:33:21:e0:db:81:8d:59:11:f0:f3:92:
-        f7:c5:8c:83:2e:22:55:dd:1f:78:5c:f7:a3:fc:de:99:8f:46:
-        50:ff:75:db:bb:58:07:fa:01:c1:67:8c:18:c4:3f:2f:b7:41:
-        f7:ec:56:e7:1a:4b:e4:78
------BEGIN CERTIFICATE-----
-MIIEfjCCAmagAwIBAgIBKjANBgkqhkiG9w0BAQsFADBaMQswCQYDVQQGEwJLUjET
-MBEGA1UECBMKS3l1bmdHaS1EbzERMA8GA1UEBxMIU3V3b24tU2kxFjAUBgNVBAoT
-DVNhbXN1bmcgRWxlYy4xCzAJBgNVBAMTAkNBMB4XDTA5MDYyMDA4MjE0N1oXDTE5
-MDYxODA4MjE0N1owWzELMAkGA1UEBhMCS1IxEzARBgNVBAgTCkt5dW5nR2ktRG8x
-FjAUBgNVBAoTDVNhbXN1bmcgRWxlYy4xHzAdBgNVBAMTFkZpcnN0IFRlc3QgQ2Vy
-dGlmaWNhdGUwgZ8wDQYJKoZIhvcNAQEBBQADgY0AMIGJAoGBAM8Pz6UIGL+LbCw8
-Vf4CQ7eor0WjSihj0domesIN+Filc8XbuPtiR+oXeyVr0YzidJb0a+VJO7PlamM2
-Gfg82EucFJ0ranHMOp+51dtgjkRA1xJTUuVxQci/7A2cW3yOrJlHZVDl+JU+ijyZ
-2XVHc1H0/TZG7Rp3EM4dAQyGayP/AgMBAAGjgdEwgc4wCQYDVR0TBAIwADAsBglg
-hkgBhvhCAQ0EHxYdT3BlblNTTCBHZW5lcmF0ZWQgQ2VydGlmaWNhdGUwHQYDVR0O
-BBYEFCUM7B/WGqKVr8Gj2u+x875i8xBsMHQGA1UdIwRtMGuhXqRcMFoxCzAJBgNV
-BAYTAktSMRMwEQYDVQQIEwpLeXVuZ0dpLURvMREwDwYDVQQHEwhTdXdvbi1TaTEW
-MBQGA1UEChMNU2Ftc3VuZyBFbGVjLjELMAkGA1UEAxMCQ0GCCQDyW0BbwrfQZDAN
-BgkqhkiG9w0BAQsFAAOCAgEAsT5Q/18ysglrUpgHWnh//hJvhyXUvJZFBzHgrlLR
-ngTYBYTP4uWCAbVGzk5H1u+HfDfWZ5mrrU1w65j+MfH46aLFQE+mxHkVZNNk0j8F
-tQgWiEYicoahju/fZyXXdL0BBLhwAA2dNtCeOkt+DT2ePc77R+59W7nBZStM7yaJ
-7Ru8F0pjQbOZ58VN1TGv10s7N86Z2o9TIEAUlRQJYbqcwBtmfOfjTCjGSOhsAlU8
-RBjRKYh7/zDlvu6O2pX+BMLIoc6BRrm7sj2tr6njqMGP2FFI0cbpyMiUb3yw/JIE
-0I8wMPGj0PjcqlIsH73zZ6yXbg0agsGiMJ7TlXRHtUnIc3rGcyAYepiPwT5fGgQz
-m//gq574ypK86JS4zoeJdeZJvdV/H0S2SPwCT7Ul9P9TmF8PlVLSACpBhcuN9KGm
-72istfqnlJHMZFwwQwGQhOuPZjuYTEJDPTFHKNpJ6+kUZ8WB9hOjw6XuxCgOUu7H
-sub4w3ljEkXBBluUSPFMMsdpnW2zC8WYk/RLx2Q1IyJWx/rjDDs5z7TKz9IQl7OV
-5PdT08teQ4LUfOWDpM9OC8gWNV6KK0eKbi+YAtTMnSiplf+rc98Bxv/fezMh4NuB
-jVkR8POS98WMgy4iVd0feFz3o/zemY9GUP9127tYB/oBwWeMGMQ/L7dB9+xW5xpL
-5Hg=
------END CERTIFICATE-----
diff --git a/tests/cert-svc/data/caflag/aia_signer.der b/tests/cert-svc/data/caflag/aia_signer.der
deleted file mode 100644 (file)
index f4250e7..0000000
Binary files a/tests/cert-svc/data/caflag/aia_signer.der and /dev/null differ
diff --git a/tests/cert-svc/data/caflag/invalidCert.der b/tests/cert-svc/data/caflag/invalidCert.der
deleted file mode 100644 (file)
index fd08360..0000000
+++ /dev/null
@@ -1,17 +0,0 @@
------BEGIN CERTIFICATE-----
-MIICpzCCAhCgAwIBAgIBADANBgkqhkiG9w0BAQUFADBbMQswCQYDVQQGEwJDUjEM
-MAoGA1UECBMDU1RSMQswCQYDVQQKEwJPUjEMMAoGA1UECxMDT1VSMQwwCgYDVQQD
-EwNDTlIxFTATBgkqhkiG9w0BCQEWBkVtYWlsUjAeFw0wNzEyMTkwNTE5MjBaFw0x
-MDEyMTgwNTE5MjBaMFsxCzAJBgNVBAYTAkNSMQwwCgYDVQQIEwNTVFIxCzAJBgNV
-BAoTAk9SMQwwCgYDVQQLEwNPVVIxDDAKBgNVBAMTA0NOUjEVMBMGCSqGSIb3DQEJ
-ARYGRW1haWxSMIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQDG2dhVCOuBD2i4
-mjWLU8vkQpRVylojbSzxvO3uynaOZAnhqLxu2F2ugR1NLJOlrgbjq13xCO4FjKZj
-eb4kln5HJl7GLCNz8ns2+kAtwiVfpZnQ8U6Y/1BLiB7sLH+ONB4g6Rm9cgST1e6H
-e/EJMkzU75+wkj94ORZ4TINDU4kU4QIDAQABo3sweTAJBgNVHRMEAjAAMCwGCWCG
-SAGG+EIBDQQfFh1PcGVuU1NMIEdlbmVyYXRlZCBDZXJ0aWZpY2F0ZTAdBgNVHQ4E
-FgQUX0cbXBYMGt9k4/HRapEA9XUlKk4wHwYDVR0jBBgwFoAUX0cbXBYMGt9k4/HR
-apEA9XUlKk4wDQYJKoZIhvcNAQEFBQADgYEAXyKHjF6k0yNY/og30g1+SsNxYNqC
-yzGEbCywXELFakhQ1qmx12VY6qkeo+khyuiRfp9cDx8sSQ2asypIYeO9ctRNmp4D
-lC8YNI7BdY/g4Xq7uy4BKeng8Mv8VNAtdBaKreJqSk5RvQmepXRiTJgo2DzGlCU5
-3aU1rQ6vF96wFt4=
------END CERTIFICATE-----
diff --git a/tests/cert-svc/data/caflag/noaia_signer.der b/tests/cert-svc/data/caflag/noaia_signer.der
deleted file mode 100644 (file)
index 0f695e3..0000000
Binary files a/tests/cert-svc/data/caflag/noaia_signer.der and /dev/null differ
diff --git a/tests/cert-svc/data/caflag/ocsp_signer.crt b/tests/cert-svc/data/caflag/ocsp_signer.crt
deleted file mode 100644 (file)
index 23eb39e..0000000
+++ /dev/null
@@ -1,66 +0,0 @@
-Certificate:
-    Data:
-        Version: 3 (0x2)
-        Serial Number: 5 (0x5)
-    Signature Algorithm: sha1WithRSAEncryption
-        Issuer: C=KR, ST=Seoul, O=Samsung, OU=Tizen Test, CN=Test Second CA/emailAddress=tt@gmail.com
-        Validity
-            Not Before: Jun 18 08:11:46 2014 GMT
-            Not After : Jun 18 08:11:46 2015 GMT
-        Subject: C=KR, ST=Seoul, O=Samsung, OU=Tizen Test OCSP Response Signer, CN=OCSP Response Signer/emailAddress=tt@gmail.com
-        Subject Public Key Info:
-            Public Key Algorithm: rsaEncryption
-                Public-Key: (1024 bit)
-                Modulus:
-                    00:cb:b2:52:c6:6d:75:32:a3:41:e5:7a:3c:21:a0:
-                    fd:e5:9d:d5:42:fe:3b:7d:e7:7d:8f:6d:b6:75:22:
-                    39:51:9f:ba:2b:f2:ff:aa:9b:bc:4e:11:cc:42:1f:
-                    84:04:4d:8f:fa:a1:86:e0:80:54:8b:84:6e:58:b9:
-                    5c:f2:e2:99:3f:d4:e5:cd:d0:27:a3:f9:23:52:d1:
-                    d3:9d:59:ce:a3:db:2e:ce:6d:1d:6d:1b:a2:28:8c:
-                    52:c2:c1:57:30:41:0c:c1:b9:3a:66:75:e5:da:2a:
-                    41:cc:27:98:8b:03:f3:e6:a1:3e:ec:24:83:45:84:
-                    47:21:54:25:53:33:3b:6d:01
-                Exponent: 65537 (0x10001)
-        X509v3 extensions:
-            X509v3 Basic Constraints: 
-                CA:FALSE
-            X509v3 Key Usage: 
-                Digital Signature, Non Repudiation, Key Encipherment
-            X509v3 Extended Key Usage: 
-                OCSP Signing
-            Netscape Comment: 
-                OpenSSL Generated Certificate
-            X509v3 Subject Key Identifier: 
-                BD:88:26:A9:60:B7:BB:51:73:06:06:4B:72:52:F6:44:50:3B:EE:90
-            X509v3 Authority Key Identifier: 
-                keyid:A9:49:F3:5B:13:45:76:34:79:FF:57:97:FA:EB:4B:F6:71:6C:18:80
-
-    Signature Algorithm: sha1WithRSAEncryption
-         33:1f:11:ca:e8:01:2a:92:df:5c:07:98:f3:0c:5e:61:a8:6c:
-         58:47:6e:24:d1:01:da:ea:7c:40:2d:e8:89:38:e4:5a:12:cd:
-         3f:e0:24:bd:bb:79:f0:0f:8f:6f:72:21:d5:a2:18:89:24:f8:
-         61:98:ed:66:59:64:4d:da:9b:6f:20:0b:6e:a4:7f:b0:0b:f1:
-         ae:70:3a:54:0b:06:53:58:a0:28:22:67:78:4b:88:97:43:8d:
-         1c:58:d3:9b:77:49:6c:66:ed:46:01:e5:4f:6f:96:5a:e0:f8:
-         90:8c:6b:7d:cc:c6:45:6c:60:cf:2e:b0:c7:85:fe:21:41:67:
-         e5:48
------BEGIN CERTIFICATE-----
-MIIDJTCCAo6gAwIBAgIBBTANBgkqhkiG9w0BAQUFADB6MQswCQYDVQQGEwJLUjEO
-MAwGA1UECAwFU2VvdWwxEDAOBgNVBAoMB1NhbXN1bmcxEzARBgNVBAsMClRpemVu
-IFRlc3QxFzAVBgNVBAMMDlRlc3QgU2Vjb25kIENBMRswGQYJKoZIhvcNAQkBFgx0
-dEBnbWFpbC5jb20wHhcNMTQwNjE4MDgxMTQ2WhcNMTUwNjE4MDgxMTQ2WjCBlTEL
-MAkGA1UEBhMCS1IxDjAMBgNVBAgMBVNlb3VsMRAwDgYDVQQKDAdTYW1zdW5nMSgw
-JgYDVQQLDB9UaXplbiBUZXN0IE9DU1AgUmVzcG9uc2UgU2lnbmVyMR0wGwYDVQQD
-DBRPQ1NQIFJlc3BvbnNlIFNpZ25lcjEbMBkGCSqGSIb3DQEJARYMdHRAZ21haWwu
-Y29tMIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQDLslLGbXUyo0HlejwhoP3l
-ndVC/jt9532PbbZ1IjlRn7or8v+qm7xOEcxCH4QETY/6oYbggFSLhG5YuVzy4pk/
-1OXN0Cej+SNS0dOdWc6j2y7ObR1tG6IojFLCwVcwQQzBuTpmdeXaKkHMJ5iLA/Pm
-oT7sJINFhEchVCVTMzttAQIDAQABo4GeMIGbMAkGA1UdEwQCMAAwCwYDVR0PBAQD
-AgXgMBMGA1UdJQQMMAoGCCsGAQUFBwMJMCwGCWCGSAGG+EIBDQQfFh1PcGVuU1NM
-IEdlbmVyYXRlZCBDZXJ0aWZpY2F0ZTAdBgNVHQ4EFgQUvYgmqWC3u1FzBgZLclL2
-RFA77pAwHwYDVR0jBBgwFoAUqUnzWxNFdjR5/1eX+utL9nFsGIAwDQYJKoZIhvcN
-AQEFBQADgYEAMx8RyugBKpLfXAeY8wxeYahsWEduJNEB2up8QC3oiTjkWhLNP+Ak
-vbt58A+Pb3Ih1aIYiST4YZjtZllkTdqbbyALbqR/sAvxrnA6VAsGU1igKCJneEuI
-l0ONHFjTm3dJbGbtRgHlT2+WWuD4kIxrfczGRWxgzy6wx4X+IUFn5Ug=
------END CERTIFICATE-----
diff --git a/tests/cert-svc/data/caflag/out.pem b/tests/cert-svc/data/caflag/out.pem
deleted file mode 100644 (file)
index 42c6573..0000000
+++ /dev/null
@@ -1,21 +0,0 @@
------BEGIN CERTIFICATE-----
-MIIDXTCCAsagAwIBAgIBAjANBgkqhkiG9w0BAQUFADB6MQswCQYDVQQGEwJLUjEO
-MAwGA1UECAwFU2VvdWwxEDAOBgNVBAoMB1NhbXN1bmcxEzARBgNVBAsMClRpemVu
-IFRlc3QxFzAVBgNVBAMMDlRlc3QgU2Vjb25kIENBMRswGQYJKoZIhvcNAQkBFgx0
-dEBnbWFpbC5jb20wHhcNMTQwNjE4MDgxMTA0WhcNMTUwNjE4MDgxMTA0WjB7MQsw
-CQYDVQQGEwJLUjEOMAwGA1UECAwFU2VvdWwxEDAOBgNVBAoMB1NhbXN1bmcxFzAV
-BgNVBAsMDlRpemVuIFRlc3QgQUlBMRQwEgYDVQQDDAtUZXN0IFNpZ25lcjEbMBkG
-CSqGSIb3DQEJARYMdHRAZ21haWwuY29tMIGfMA0GCSqGSIb3DQEBAQUAA4GNADCB
-iQKBgQCwgKw+/71jWXnx4bLLZrTPmE+NrDfHSfZx8yTGYeewMzP6ZlXM8WduxNiq
-pqm7G2XN182GEXsdoxwa09HtMVGqSGA/BCamD1Z6liHOEb4UTB3ROJ1lZDDkyJ9a
-gZOfoZst/Aj8+bwV3x3ie+p4a2w/8eSsalrfef2gX6khaSsJOwIDAQABo4HxMIHu
-MAkGA1UdEwQCMAAwLAYJYIZIAYb4QgENBB8WHU9wZW5TU0wgR2VuZXJhdGVkIENl
-cnRpZmljYXRlMB0GA1UdDgQWBBRL0nKiNUjzh1/LPvZoqLvnVfOZqjAfBgNVHSME
-GDAWgBSpSfNbE0V2NHn/V5f660v2cWwYgDBzBggrBgEFBQcBAQRnMGUwIQYIKwYB
-BQUHMAGGFWh0dHA6Ly8xMjcuMC4wLjE6ODg4ODBABggrBgEFBQcwAoY0aHR0cDov
-L1NWUlNlY3VyZS1HMy1haWEudmVyaXNpZ24uY29tL1NWUlNlY3VyZUczLmNlcjAN
-BgkqhkiG9w0BAQUFAAOBgQABP+yru9/2auZ4ekjV03WRg5Vq/rqmOHDruMNVbZ4H
-4PBLRLSpC//OGahgEgUKe89BcB10lUi55D5YME3Do89I+hFugv0BPGaA201iLOhL
-/0u0aVm1yJxNt1YjW2fMKqnCHgjoHzh0wQC1pIb5vxJrYCn3Pbhml7W6JPDDJHfm
-XQ==
------END CERTIFICATE-----
diff --git a/tests/cert-svc/data/caflag/rev_signer.der b/tests/cert-svc/data/caflag/rev_signer.der
deleted file mode 100644 (file)
index 5b5a621..0000000
Binary files a/tests/cert-svc/data/caflag/rev_signer.der and /dev/null differ
diff --git a/tests/cert-svc/data/caflag/root_ca.der b/tests/cert-svc/data/caflag/root_ca.der
deleted file mode 100644 (file)
index 11a8fae..0000000
Binary files a/tests/cert-svc/data/caflag/root_ca.der and /dev/null differ
diff --git a/tests/cert-svc/data/caflag/root_ca_v1.der b/tests/cert-svc/data/caflag/root_ca_v1.der
deleted file mode 100644 (file)
index b9ee8f6..0000000
Binary files a/tests/cert-svc/data/caflag/root_ca_v1.der and /dev/null differ
diff --git a/tests/cert-svc/data/caflag/second_ca.der b/tests/cert-svc/data/caflag/second_ca.der
deleted file mode 100644 (file)
index 67f4456..0000000
Binary files a/tests/cert-svc/data/caflag/second_ca.der and /dev/null differ
diff --git a/tests/cert-svc/data/caflag/v1_signer.der b/tests/cert-svc/data/caflag/v1_signer.der
deleted file mode 100644 (file)
index 01c6548..0000000
Binary files a/tests/cert-svc/data/caflag/v1_signer.der and /dev/null differ
diff --git a/tests/cert-svc/data/cert0.pem b/tests/cert-svc/data/cert0.pem
deleted file mode 100644 (file)
index f062d94..0000000
+++ /dev/null
@@ -1,64 +0,0 @@
-Certificate:
-    Data:
-        Version: 3 (0x2)
-        Serial Number:
-            85:7d:e1:c5:d9:de:7a:20
-        Signature Algorithm: sha1WithRSAEncryption
-        Issuer: C=PL, ST=Mazowieckie, O=Samsung, OU=SPRC, CN=Operator Test Root Certificate/emailAddress=operator@samsung.com
-        Validity
-            Not Before: Jan  4 17:34:31 2011 GMT
-            Not After : Jan  4 17:34:31 2012 GMT
-        Subject: C=PL, ST=Malopolskie, L=Krakow, O=Samsung, OU=N/A, CN=Operator Test Second Level Certificate/emailAddress=second.operator@samsung.com
-        Subject Public Key Info:
-            Public Key Algorithm: rsaEncryption
-            RSA Public Key: (1024 bit)
-                Modulus (1024 bit):
-                    00:ba:3c:58:ca:87:1e:59:68:54:8a:54:34:43:61:
-                    f1:81:e6:35:c1:46:74:16:c7:ff:f9:15:9e:0c:5a:
-                    6a:89:c1:13:0c:61:2e:ba:00:e0:71:ea:7e:31:ae:
-                    4e:ef:93:58:51:98:97:f3:bf:8a:9b:b2:c1:b7:0c:
-                    5f:3f:56:b3:13:3b:d0:80:be:04:66:89:84:50:ca:
-                    fe:f6:f7:6b:05:3b:30:4e:96:9c:5b:c5:80:bc:d6:
-                    be:6e:69:f4:b9:9b:4c:06:7a:ed:37:67:b2:fe:45:
-                    69:57:62:54:cb:69:69:48:b9:7d:a0:42:f1:b6:dc:
-                    f2:7f:eb:75:2a:d4:83:69:b9
-                Exponent: 65537 (0x10001)
-        X509v3 extensions:
-            X509v3 Basic Constraints: 
-                CA:FALSE
-            Netscape Comment: 
-                OpenSSL Generated Certificate
-            X509v3 Subject Key Identifier: 
-                D9:F3:11:BF:98:5A:60:12:7A:85:B5:E7:A7:38:4F:CF:51:1D:C6:B2
-            X509v3 Authority Key Identifier: 
-                keyid:25:A5:90:9F:4D:3A:A4:19:0A:80:46:5E:F3:FB:20:CE:56:30:33:DA
-
-    Signature Algorithm: sha1WithRSAEncryption
-        69:6c:26:81:51:91:a6:e6:11:dc:81:35:03:73:85:4f:2f:29:
-        1f:20:f2:23:54:82:ca:8f:b8:a6:e3:3f:cd:72:5e:d7:e7:f5:
-        84:8a:33:e2:51:9f:36:4b:30:85:f4:4f:87:c7:9a:69:0b:15:
-        6e:92:c7:1f:2f:58:a4:57:f8:c2:cd:59:6c:d2:11:63:ae:bb:
-        b0:32:3f:09:e7:2e:ad:db:1b:fe:e7:a4:21:43:47:76:e1:de:
-        36:bb:26:3f:16:76:20:ed:a4:68:c1:48:ae:2b:95:fb:f6:d2:
-        f2:7f:74:f6:83:e2:89:06:b5:89:54:6e:7f:cf:88:94:66:e8:
-        da:32
------BEGIN CERTIFICATE-----
-MIIDPjCCAqegAwIBAgIJAIV94cXZ3nogMA0GCSqGSIb3DQEBBQUAMIGSMQswCQYD
-VQQGEwJQTDEUMBIGA1UECBMLTWF6b3dpZWNraWUxEDAOBgNVBAoTB1NhbXN1bmcx
-DTALBgNVBAsTBFNQUkMxJzAlBgNVBAMTHk9wZXJhdG9yIFRlc3QgUm9vdCBDZXJ0
-aWZpY2F0ZTEjMCEGCSqGSIb3DQEJARYUb3BlcmF0b3JAc2Ftc3VuZy5jb20wHhcN
-MTEwMTA0MTczNDMxWhcNMTIwMTA0MTczNDMxWjCBsTELMAkGA1UEBhMCUEwxFDAS
-BgNVBAgTC01hbG9wb2xza2llMQ8wDQYDVQQHEwZLcmFrb3cxEDAOBgNVBAoTB1Nh
-bXN1bmcxDDAKBgNVBAsTA04vQTEvMC0GA1UEAxMmT3BlcmF0b3IgVGVzdCBTZWNv
-bmQgTGV2ZWwgQ2VydGlmaWNhdGUxKjAoBgkqhkiG9w0BCQEWG3NlY29uZC5vcGVy
-YXRvckBzYW1zdW5nLmNvbTCBnzANBgkqhkiG9w0BAQEFAAOBjQAwgYkCgYEAujxY
-yoceWWhUilQ0Q2HxgeY1wUZ0Fsf/+RWeDFpqicETDGEuugDgcep+Ma5O75NYUZiX
-87+Km7LBtwxfP1azEzvQgL4EZomEUMr+9vdrBTswTpacW8WAvNa+bmn0uZtMBnrt
-N2ey/kVpV2JUy2lpSLl9oELxttzyf+t1KtSDabkCAwEAAaN7MHkwCQYDVR0TBAIw
-ADAsBglghkgBhvhCAQ0EHxYdT3BlblNTTCBHZW5lcmF0ZWQgQ2VydGlmaWNhdGUw
-HQYDVR0OBBYEFNnzEb+YWmASeoW156c4T89RHcayMB8GA1UdIwQYMBaAFCWlkJ9N
-OqQZCoBGXvP7IM5WMDPaMA0GCSqGSIb3DQEBBQUAA4GBAGlsJoFRkabmEdyBNQNz
-hU8vKR8g8iNUgsqPuKbjP81yXtfn9YSKM+JRnzZLMIX0T4fHmmkLFW6Sxx8vWKRX
-+MLNWWzSEWOuu7AyPwnnLq3bG/7npCFDR3bh3ja7Jj8WdiDtpGjBSK4rlfv20vJ/
-dPaD4okGtYlUbn/PiJRm6Noy
------END CERTIFICATE-----
diff --git a/tests/cert-svc/data/cert1.der b/tests/cert-svc/data/cert1.der
deleted file mode 100644 (file)
index 1365859..0000000
Binary files a/tests/cert-svc/data/cert1.der and /dev/null differ
diff --git a/tests/cert-svc/data/cert2fake.pem b/tests/cert-svc/data/cert2fake.pem
deleted file mode 100644 (file)
index 65ea138..0000000
+++ /dev/null
@@ -1,20 +0,0 @@
-----BEGIN CERTIFICATE----
-MIIDPjCCAqegAwIBAgIJAIV94cXZ3nogMA0GCSqGSIb3DQEBBQUAMIGSMQswCQYD
-VQQGEwJQTDEUMBIGA1UECBMLTWF6b3dpZWNraWUxEDAOBgNVBAoTB1NhbXN1bmcx
-DTALBgNVBAsTBFNQUkMxJzAlBgNVBAMTHk9wZXJhdG9yIFRlc3QgUm9vdCBDZXJ0
-aWZpY2F0ZTEjMCEGCSqGSIb3DQEJARYUb3BlcmF0b3JAc2Ftc3VuZy5jb20wHhcN
-MTEwMTA0MTczNDMxWhcNMTIwMTA0MTczNDMxWjCBsTELMAkGA1UEBhMCUEwxFDAS
-BgNVBAgTC01hbG9wb2xza2llMQ8wDQYDVQQHEwZLcmFrb3cxEDAOBgNVBAoTB1Nh
-bXN1bmcxDDAKBgNVBAsTA04vQTEvMC0GA1UEAxMmT3BlcmF0b3IgVGVzdCBTZWNv
-bmQgTGV2ZWwgQ2VydGlmaWNhdGUxKjAoBgkqhkiG9w0BCQEWG3NlY29uZC5vcGVy
-YXRvckBzYW1zdW5nLmNvbTCBnzANBgkqhkiG9w0BAQEFAAOBjQAwgYkCgYEAujxY
-yoceWWhUilQ0Q2HxgeY1wUZ0Fsf/+RWeDFpqicETDGEuugDgcep+Ma5O75NYUZiX
-87+Km7LBtwxfP1azEzvQgL4EZomEUMr+9vdrBTswTpacW8WAvNa+bmn0uZtMBnrt
-N2ey/kVpV2JUy2lpSLl9oELxttzyf+t1KtSDabkCAwEAAaN7MHkwCQYDVR0TBAIw
-ADAsBglghkgBhvhCAQ0EHxYdT3BlblNTTCBHZW5lcmF0ZWQgQ2VydGlmaWNhdGUw
-HQYDVR0OBBYEFNnzEb+YWmASeoW156c4T89RHcayMB8GA1UdIwQYMBaAFCWlkJ9N
-OqQZCoBGXvP7IM5WMDPaMA0GCSqGSIb3DQEBBQUAA4GBAGlsJoFRkabmEdyBNQNz
-hU8vKR8g8iNUgsqPuKbjP81yXtfn9YSKM+JRnzZLMIX0T4fHmmkLFW6Sxx8vWKRX
-+MLNWWzSEWOuu7AyPwnnLq3bG/7npCFDR3bh3ja7Jj8WdiDtpGjBSK4rlfv20vJ/
-dPaD4okGtYlUbn/PiJRm6Noy
------END CERTIFICATE-----
diff --git a/tests/cert-svc/data/cert3fake.der b/tests/cert-svc/data/cert3fake.der
deleted file mode 100644 (file)
index ba4bc6e..0000000
Binary files a/tests/cert-svc/data/cert3fake.der and /dev/null differ
diff --git a/tests/cert-svc/data/cert_chain/00.pem b/tests/cert-svc/data/cert_chain/00.pem
deleted file mode 100644 (file)
index a80bbbc..0000000
+++ /dev/null
@@ -1,52 +0,0 @@
-Certificate:
-    Data:
-        Version: 3 (0x2)
-        Serial Number: 0 (0x0)
-        Signature Algorithm: sha1WithRSAEncryption
-        Issuer: C=AU, ST=Some-State, L=root, O=Internet Widgits Pty Ltd, OU=root, CN=root/emailAddress=root
-        Validity
-            Not Before: May 13 01:21:41 2011 GMT
-            Not After : May 12 01:21:41 2012 GMT
-        Subject: C=AU, ST=Some-State, O=Internet Widgits Pty Ltd, OU=chain1, CN=chain1/emailAddress=chain1
-        Subject Public Key Info:
-            Public Key Algorithm: rsaEncryption
-            RSA Public Key: (1024 bit)
-                Modulus (1024 bit):
-                    00:ae:6d:d3:18:3f:b2:63:ab:fb:72:ce:ff:9a:8b:
-                    07:4a:52:c5:99:0e:9e:5c:68:ce:82:67:07:7a:27:
-                    11:98:a7:fe:3a:68:3f:4e:4b:74:d4:a5:77:15:87:
-                    7e:9c:9f:10:82:2f:1c:e3:c0:c7:1e:8b:35:ab:3a:
-                    f6:13:44:81:43:22:a7:fa:06:36:9c:55:53:7a:9d:
-                    18:9b:a0:f4:93:58:50:2c:cd:ab:ec:32:2f:fa:4f:
-                    ff:6e:6a:68:75:15:76:e1:b1:e1:67:f9:13:0a:d0:
-                    9b:db:12:b9:fd:dd:51:19:e4:63:d0:d0:56:b5:6a:
-                    00:a5:03:68:e7:77:21:b0:f9
-                Exponent: 65537 (0x10001)
-        X509v3 extensions:
-            X509v3 Basic Constraints: 
-                CA:TRUE
-    Signature Algorithm: sha1WithRSAEncryption
-        01:d3:3c:dc:a0:62:14:99:b8:b1:99:cf:0c:4a:50:2b:f7:1e:
-        56:f6:de:ce:80:b4:32:bb:0c:5c:45:b7:78:e5:27:ee:90:0c:
-        a0:db:ef:32:85:85:08:c6:4a:e6:22:7b:56:61:d5:b4:4e:a1:
-        7e:ed:60:c2:bf:bc:51:89:9a:b1:73:c2:e0:bb:3d:4e:fa:6f:
-        3e:32:b5:7f:b4:bc:0f:8a:ca:7d:f0:bf:da:b1:12:23:0e:cc:
-        57:e5:58:7c:23:38:b1:d8:b2:13:d8:6a:0d:20:bd:e9:66:51:
-        2d:e6:57:a1:33:17:69:6d:21:9f:18:37:23:6c:ca:0e:b0:c4:
-        47:86
------BEGIN CERTIFICATE-----
-MIICjDCCAfWgAwIBAgIBADANBgkqhkiG9w0BAQUFADCBhzELMAkGA1UEBhMCQVUx
-EzARBgNVBAgTClNvbWUtU3RhdGUxDTALBgNVBAcTBHJvb3QxITAfBgNVBAoTGElu
-dGVybmV0IFdpZGdpdHMgUHR5IEx0ZDENMAsGA1UECxMEcm9vdDENMAsGA1UEAxME
-cm9vdDETMBEGCSqGSIb3DQEJARYEcm9vdDAeFw0xMTA1MTMwMTIxNDFaFw0xMjA1
-MTIwMTIxNDFaMH4xCzAJBgNVBAYTAkFVMRMwEQYDVQQIEwpTb21lLVN0YXRlMSEw
-HwYDVQQKExhJbnRlcm5ldCBXaWRnaXRzIFB0eSBMdGQxDzANBgNVBAsTBmNoYWlu
-MTEPMA0GA1UEAxMGY2hhaW4xMRUwEwYJKoZIhvcNAQkBFgZjaGFpbjEwgZ8wDQYJ
-KoZIhvcNAQEBBQADgY0AMIGJAoGBAK5t0xg/smOr+3LO/5qLB0pSxZkOnlxozoJn
-B3onEZin/jpoP05LdNSldxWHfpyfEIIvHOPAxx6LNas69hNEgUMip/oGNpxVU3qd
-GJug9JNYUCzNq+wyL/pP/25qaHUVduGx4Wf5EwrQm9sSuf3dURnkY9DQVrVqAKUD
-aOd3IbD5AgMBAAGjEDAOMAwGA1UdEwQFMAMBAf8wDQYJKoZIhvcNAQEFBQADgYEA
-AdM83KBiFJm4sZnPDEpQK/ceVvbezoC0MrsMXEW3eOUn7pAMoNvvMoWFCMZK5iJ7
-VmHVtE6hfu1gwr+8UYmasXPC4Ls9TvpvPjK1f7S8D4rKffC/2rESIw7MV+VYfCM4
-sdiyE9hqDSC96WZRLeZXoTMXaW0hnxg3I2zKDrDER4Y=
------END CERTIFICATE-----
diff --git a/tests/cert-svc/data/cert_chain/01.pem b/tests/cert-svc/data/cert_chain/01.pem
deleted file mode 100644 (file)
index 7b475e5..0000000
+++ /dev/null
@@ -1,52 +0,0 @@
-Certificate:
-    Data:
-        Version: 3 (0x2)
-        Serial Number: 1 (0x1)
-        Signature Algorithm: sha1WithRSAEncryption
-        Issuer: C=AU, ST=Some-State, O=Internet Widgits Pty Ltd, OU=chain1, CN=chain1/emailAddress=chain1
-        Validity
-            Not Before: May 13 01:22:02 2011 GMT
-            Not After : May 12 01:22:02 2012 GMT
-        Subject: C=AU, ST=Some-State, O=Internet Widgits Pty Ltd, OU=chain2, CN=chain2/emailAddress=chain2
-        Subject Public Key Info:
-            Public Key Algorithm: rsaEncryption
-            RSA Public Key: (1024 bit)
-                Modulus (1024 bit):
-                    00:c4:20:c7:96:1e:c5:33:47:ac:e5:ad:2b:0b:63:
-                    ce:e4:44:33:e3:7f:16:ae:f0:d8:7c:b0:96:01:69:
-                    38:63:4f:62:7d:97:d6:31:c9:0d:10:24:f5:17:40:
-                    13:f0:1a:70:70:5e:3f:05:4d:d9:67:52:ed:41:83:
-                    b7:d2:bb:bf:3d:29:98:07:a3:64:1e:2f:1e:13:8c:
-                    7a:c1:62:33:66:33:3e:d4:26:5a:59:99:05:8e:67:
-                    c7:68:cd:f2:8d:6f:fb:8c:07:63:ab:50:68:03:88:
-                    ae:0a:5c:9b:b6:9b:c1:18:7b:ef:cd:c9:f0:5e:44:
-                    ab:56:d6:df:48:41:d3:21:51
-                Exponent: 65537 (0x10001)
-        X509v3 extensions:
-            X509v3 Basic Constraints: 
-                CA:TRUE
-    Signature Algorithm: sha1WithRSAEncryption
-        53:5a:c3:bb:48:87:d0:a2:7d:20:68:02:7c:be:18:93:b6:3d:
-        83:e4:10:1a:a7:4d:37:24:3e:6c:41:bd:8f:1d:3b:89:08:5a:
-        e3:ba:81:9b:e8:fc:0e:fc:3d:0a:70:f2:11:69:59:de:ba:45:
-        b4:97:b8:d2:e0:5a:d1:a4:75:bc:68:d5:5f:71:36:78:32:ae:
-        d3:31:26:80:f3:f3:a8:54:33:f7:be:a3:0c:2d:d9:9b:b8:33:
-        03:be:54:7b:f5:c4:cf:62:9b:25:0c:79:76:12:10:b6:84:1e:
-        f1:ff:7c:fe:0a:ac:46:85:26:52:d5:6f:cc:e5:89:e7:ca:8d:
-        71:69
------BEGIN CERTIFICATE-----
-MIICgjCCAeugAwIBAgIBATANBgkqhkiG9w0BAQUFADB+MQswCQYDVQQGEwJBVTET
-MBEGA1UECBMKU29tZS1TdGF0ZTEhMB8GA1UEChMYSW50ZXJuZXQgV2lkZ2l0cyBQ
-dHkgTHRkMQ8wDQYDVQQLEwZjaGFpbjExDzANBgNVBAMTBmNoYWluMTEVMBMGCSqG
-SIb3DQEJARYGY2hhaW4xMB4XDTExMDUxMzAxMjIwMloXDTEyMDUxMjAxMjIwMlow
-fjELMAkGA1UEBhMCQVUxEzARBgNVBAgTClNvbWUtU3RhdGUxITAfBgNVBAoTGElu
-dGVybmV0IFdpZGdpdHMgUHR5IEx0ZDEPMA0GA1UECxMGY2hhaW4yMQ8wDQYDVQQD
-EwZjaGFpbjIxFTATBgkqhkiG9w0BCQEWBmNoYWluMjCBnzANBgkqhkiG9w0BAQEF
-AAOBjQAwgYkCgYEAxCDHlh7FM0es5a0rC2PO5EQz438WrvDYfLCWAWk4Y09ifZfW
-MckNECT1F0AT8BpwcF4/BU3ZZ1LtQYO30ru/PSmYB6NkHi8eE4x6wWIzZjM+1CZa
-WZkFjmfHaM3yjW/7jAdjq1BoA4iuClybtpvBGHvvzcnwXkSrVtbfSEHTIVECAwEA
-AaMQMA4wDAYDVR0TBAUwAwEB/zANBgkqhkiG9w0BAQUFAAOBgQBTWsO7SIfQon0g
-aAJ8vhiTtj2D5BAap003JD5sQb2PHTuJCFrjuoGb6PwO/D0KcPIRaVneukW0l7jS
-4FrRpHW8aNVfcTZ4Mq7TMSaA8/OoVDP3vqMMLdmbuDMDvlR79cTPYpslDHl2EhC2
-hB7x/3z+CqxGhSZS1W/M5Ynnyo1xaQ==
------END CERTIFICATE-----
diff --git a/tests/cert-svc/data/cert_chain/02.pem b/tests/cert-svc/data/cert_chain/02.pem
deleted file mode 100644 (file)
index 0c15ecd..0000000
+++ /dev/null
@@ -1,52 +0,0 @@
-Certificate:
-    Data:
-        Version: 3 (0x2)
-        Serial Number: 2 (0x2)
-        Signature Algorithm: sha1WithRSAEncryption
-        Issuer: C=AU, ST=Some-State, O=Internet Widgits Pty Ltd, OU=chain2, CN=chain2/emailAddress=chain2
-        Validity
-            Not Before: May 13 01:22:13 2011 GMT
-            Not After : May 12 01:22:13 2012 GMT
-        Subject: C=AU, ST=Some-State, O=Internet Widgits Pty Ltd, OU=chain3, CN=chain3/emailAddress=chain3
-        Subject Public Key Info:
-            Public Key Algorithm: rsaEncryption
-            RSA Public Key: (1024 bit)
-                Modulus (1024 bit):
-                    00:a2:52:3c:b7:64:b4:05:92:cd:b2:58:0c:81:5c:
-                    b4:bd:a4:10:99:17:1a:35:f2:de:f8:86:db:e9:24:
-                    a3:01:b1:d6:03:a9:f8:2b:d1:cd:f7:7b:9a:c0:a0:
-                    a9:8d:6d:34:94:7c:2c:4c:5c:c0:26:db:46:13:a3:
-                    c2:c4:2d:eb:ac:cb:5b:64:09:2c:23:eb:b5:8c:80:
-                    12:d6:cd:7b:fa:5f:d9:7a:17:b6:fc:d5:65:fa:d4:
-                    94:d9:9a:cf:b5:9e:87:99:f7:3e:32:6c:0d:5c:1f:
-                    09:77:a1:4b:ae:c1:47:27:60:a2:7e:f5:94:66:5f:
-                    7b:ea:e1:a9:b1:24:5a:40:03
-                Exponent: 65537 (0x10001)
-        X509v3 extensions:
-            X509v3 Basic Constraints: 
-                CA:TRUE
-    Signature Algorithm: sha1WithRSAEncryption
-        80:03:04:99:b2:ea:8c:d8:0a:76:e5:08:fc:2d:72:f9:d5:90:
-        8e:ce:3b:c0:ac:d0:57:d1:44:d2:84:cf:83:82:05:70:46:d9:
-        e8:07:cf:90:e4:cb:4c:7a:a0:98:d9:e3:be:86:23:71:a2:64:
-        36:df:43:54:1d:03:cf:85:5f:e6:43:cc:d3:ca:da:a2:31:2b:
-        dd:5a:da:d9:26:38:29:9e:89:04:cc:f9:55:a5:35:77:77:57:
-        ab:58:aa:d2:19:39:ad:6b:d2:3f:d9:e0:d7:58:ea:41:79:2a:
-        f2:50:ec:3f:89:0a:aa:ec:d6:eb:20:af:5e:52:ff:4d:39:34:
-        9c:99
------BEGIN CERTIFICATE-----
-MIICgjCCAeugAwIBAgIBAjANBgkqhkiG9w0BAQUFADB+MQswCQYDVQQGEwJBVTET
-MBEGA1UECBMKU29tZS1TdGF0ZTEhMB8GA1UEChMYSW50ZXJuZXQgV2lkZ2l0cyBQ
-dHkgTHRkMQ8wDQYDVQQLEwZjaGFpbjIxDzANBgNVBAMTBmNoYWluMjEVMBMGCSqG
-SIb3DQEJARYGY2hhaW4yMB4XDTExMDUxMzAxMjIxM1oXDTEyMDUxMjAxMjIxM1ow
-fjELMAkGA1UEBhMCQVUxEzARBgNVBAgTClNvbWUtU3RhdGUxITAfBgNVBAoTGElu
-dGVybmV0IFdpZGdpdHMgUHR5IEx0ZDEPMA0GA1UECxMGY2hhaW4zMQ8wDQYDVQQD
-EwZjaGFpbjMxFTATBgkqhkiG9w0BCQEWBmNoYWluMzCBnzANBgkqhkiG9w0BAQEF
-AAOBjQAwgYkCgYEAolI8t2S0BZLNslgMgVy0vaQQmRcaNfLe+Ibb6SSjAbHWA6n4
-K9HN93uawKCpjW00lHwsTFzAJttGE6PCxC3rrMtbZAksI+u1jIAS1s17+l/Zehe2
-/NVl+tSU2ZrPtZ6Hmfc+MmwNXB8Jd6FLrsFHJ2CifvWUZl976uGpsSRaQAMCAwEA
-AaMQMA4wDAYDVR0TBAUwAwEB/zANBgkqhkiG9w0BAQUFAAOBgQCAAwSZsuqM2Ap2
-5Qj8LXL51ZCOzjvArNBX0UTShM+DggVwRtnoB8+Q5MtMeqCY2eO+hiNxomQ230NU
-HQPPhV/mQ8zTytqiMSvdWtrZJjgpnokEzPlVpTV3d1erWKrSGTmta9I/2eDXWOpB
-eSryUOw/iQqq7NbrIK9eUv9NOTScmQ==
------END CERTIFICATE-----
diff --git a/tests/cert-svc/data/cert_chain/03.pem b/tests/cert-svc/data/cert_chain/03.pem
deleted file mode 100644 (file)
index 66a0c30..0000000
+++ /dev/null
@@ -1,52 +0,0 @@
-Certificate:
-    Data:
-        Version: 3 (0x2)
-        Serial Number: 3 (0x3)
-        Signature Algorithm: sha1WithRSAEncryption
-        Issuer: C=AU, ST=Some-State, O=Internet Widgits Pty Ltd, OU=chain3, CN=chain3/emailAddress=chain3
-        Validity
-            Not Before: May 13 01:22:24 2011 GMT
-            Not After : May 12 01:22:24 2012 GMT
-        Subject: C=AU, ST=Some-State, O=Internet Widgits Pty Ltd, OU=chain4, CN=chain4/emailAddress=chain4
-        Subject Public Key Info:
-            Public Key Algorithm: rsaEncryption
-            RSA Public Key: (1024 bit)
-                Modulus (1024 bit):
-                    00:b5:4a:07:d9:39:8b:6d:46:b2:91:b7:d0:20:e5:
-                    5e:41:8e:59:9c:78:8e:b1:54:8a:2e:fb:6a:f1:51:
-                    1c:90:78:3a:b6:98:ae:eb:1b:86:94:36:1c:10:d1:
-                    ab:47:e2:87:96:cb:e9:70:db:5e:29:2f:24:e6:c4:
-                    a1:de:08:33:81:66:5b:53:8b:54:90:d8:75:7b:ec:
-                    c4:62:61:eb:06:5e:0f:e7:a4:8e:3b:53:50:8e:31:
-                    f2:42:df:4e:e3:38:8b:46:d5:47:ae:81:3e:31:9e:
-                    70:42:b6:08:b7:c0:ed:a7:3f:b9:72:5b:1b:21:4e:
-                    0c:77:21:46:92:a0:a5:4e:a5
-                Exponent: 65537 (0x10001)
-        X509v3 extensions:
-            X509v3 Basic Constraints: 
-                CA:TRUE
-    Signature Algorithm: sha1WithRSAEncryption
-        14:49:d0:40:34:42:87:e5:c3:13:4b:42:41:e7:7f:cf:85:66:
-        d8:80:62:4f:5a:d6:38:44:25:67:cb:14:bf:3c:6e:ab:97:9f:
-        e8:e7:2f:eb:79:ef:97:d2:81:57:e1:a0:e6:10:34:d1:98:4d:
-        78:45:9f:98:dd:80:33:b8:64:17:de:3b:f4:e8:99:01:d3:a1:
-        56:96:dc:79:5b:75:5a:d1:63:df:4e:9b:4d:6a:65:0d:f4:6d:
-        20:ca:51:c0:db:52:7f:4c:b9:32:d5:be:a9:05:ae:b3:19:23:
-        5d:38:33:3e:48:66:eb:fb:af:8c:8a:f1:11:61:9d:36:f3:06:
-        3e:95
------BEGIN CERTIFICATE-----
-MIICgjCCAeugAwIBAgIBAzANBgkqhkiG9w0BAQUFADB+MQswCQYDVQQGEwJBVTET
-MBEGA1UECBMKU29tZS1TdGF0ZTEhMB8GA1UEChMYSW50ZXJuZXQgV2lkZ2l0cyBQ
-dHkgTHRkMQ8wDQYDVQQLEwZjaGFpbjMxDzANBgNVBAMTBmNoYWluMzEVMBMGCSqG
-SIb3DQEJARYGY2hhaW4zMB4XDTExMDUxMzAxMjIyNFoXDTEyMDUxMjAxMjIyNFow
-fjELMAkGA1UEBhMCQVUxEzARBgNVBAgTClNvbWUtU3RhdGUxITAfBgNVBAoTGElu
-dGVybmV0IFdpZGdpdHMgUHR5IEx0ZDEPMA0GA1UECxMGY2hhaW40MQ8wDQYDVQQD
-EwZjaGFpbjQxFTATBgkqhkiG9w0BCQEWBmNoYWluNDCBnzANBgkqhkiG9w0BAQEF
-AAOBjQAwgYkCgYEAtUoH2TmLbUaykbfQIOVeQY5ZnHiOsVSKLvtq8VEckHg6tpiu
-6xuGlDYcENGrR+KHlsvpcNteKS8k5sSh3ggzgWZbU4tUkNh1e+zEYmHrBl4P56SO
-O1NQjjHyQt9O4ziLRtVHroE+MZ5wQrYIt8Dtpz+5clsbIU4MdyFGkqClTqUCAwEA
-AaMQMA4wDAYDVR0TBAUwAwEB/zANBgkqhkiG9w0BAQUFAAOBgQAUSdBANEKH5cMT
-S0JB53/PhWbYgGJPWtY4RCVnyxS/PG6rl5/o5y/ree+X0oFX4aDmEDTRmE14RZ+Y
-3YAzuGQX3jv06JkB06FWltx5W3Va0WPfTptNamUN9G0gylHA21J/TLky1b6pBa6z
-GSNdODM+SGbr+6+MivERYZ028wY+lQ==
------END CERTIFICATE-----
diff --git a/tests/cert-svc/data/cert_chain/04.pem b/tests/cert-svc/data/cert_chain/04.pem
deleted file mode 100644 (file)
index 88f48eb..0000000
+++ /dev/null
@@ -1,52 +0,0 @@
-Certificate:
-    Data:
-        Version: 3 (0x2)
-        Serial Number: 4 (0x4)
-        Signature Algorithm: sha1WithRSAEncryption
-        Issuer: C=AU, ST=Some-State, O=Internet Widgits Pty Ltd, OU=chain4, CN=chain4/emailAddress=chain4
-        Validity
-            Not Before: May 13 01:22:35 2011 GMT
-            Not After : May 12 01:22:35 2012 GMT
-        Subject: C=AU, ST=Some-State, O=Internet Widgits Pty Ltd, OU=chain5, CN=chain5/emailAddress=chain5
-        Subject Public Key Info:
-            Public Key Algorithm: rsaEncryption
-            RSA Public Key: (1024 bit)
-                Modulus (1024 bit):
-                    00:f1:32:40:b3:f9:95:60:3a:29:3c:1c:cc:a4:f5:
-                    e5:08:19:dd:32:95:a2:62:cf:35:74:c2:85:1b:99:
-                    c9:3e:3a:90:d2:b5:9a:be:9a:cf:e9:77:13:26:4c:
-                    d2:78:06:3d:19:9b:d7:38:05:66:ca:d2:36:e7:a2:
-                    ce:bc:81:aa:31:23:c8:5d:a7:7c:41:25:44:79:99:
-                    ac:10:34:16:10:b8:29:a1:5d:96:f8:47:7f:d1:5c:
-                    68:b2:85:8a:99:28:65:00:94:d9:e6:df:1c:37:59:
-                    db:88:87:5f:b3:e5:a9:88:86:86:30:71:f0:22:24:
-                    57:3a:5b:58:04:db:c3:94:0f
-                Exponent: 65537 (0x10001)
-        X509v3 extensions:
-            X509v3 Basic Constraints: 
-                CA:TRUE
-    Signature Algorithm: sha1WithRSAEncryption
-        26:7c:b5:24:c8:8b:49:4b:d1:d6:76:16:db:75:cb:c4:a8:34:
-        92:30:e6:e9:8b:7d:70:b7:24:d9:42:e2:b3:16:83:1e:48:1f:
-        a2:b5:02:e0:74:3c:f5:bd:b3:03:59:6a:3e:68:6b:bf:3d:38:
-        d6:86:fd:ef:ae:3d:2e:55:8a:67:42:02:fa:2c:ef:4e:81:aa:
-        06:0a:95:80:90:dc:39:af:7e:b1:0d:c8:78:b1:17:59:49:40:
-        5d:b0:d2:86:03:1c:3a:a4:f6:26:b1:23:b2:89:a7:22:f5:02:
-        c7:9e:61:82:ee:c0:3d:a6:cc:bf:de:eb:d3:6e:73:ed:a5:85:
-        a5:b6
------BEGIN CERTIFICATE-----
-MIICgjCCAeugAwIBAgIBBDANBgkqhkiG9w0BAQUFADB+MQswCQYDVQQGEwJBVTET
-MBEGA1UECBMKU29tZS1TdGF0ZTEhMB8GA1UEChMYSW50ZXJuZXQgV2lkZ2l0cyBQ
-dHkgTHRkMQ8wDQYDVQQLEwZjaGFpbjQxDzANBgNVBAMTBmNoYWluNDEVMBMGCSqG
-SIb3DQEJARYGY2hhaW40MB4XDTExMDUxMzAxMjIzNVoXDTEyMDUxMjAxMjIzNVow
-fjELMAkGA1UEBhMCQVUxEzARBgNVBAgTClNvbWUtU3RhdGUxITAfBgNVBAoTGElu
-dGVybmV0IFdpZGdpdHMgUHR5IEx0ZDEPMA0GA1UECxMGY2hhaW41MQ8wDQYDVQQD
-EwZjaGFpbjUxFTATBgkqhkiG9w0BCQEWBmNoYWluNTCBnzANBgkqhkiG9w0BAQEF
-AAOBjQAwgYkCgYEA8TJAs/mVYDopPBzMpPXlCBndMpWiYs81dMKFG5nJPjqQ0rWa
-vprP6XcTJkzSeAY9GZvXOAVmytI256LOvIGqMSPIXad8QSVEeZmsEDQWELgpoV2W
-+Ed/0VxosoWKmShlAJTZ5t8cN1nbiIdfs+WpiIaGMHHwIiRXOltYBNvDlA8CAwEA
-AaMQMA4wDAYDVR0TBAUwAwEB/zANBgkqhkiG9w0BAQUFAAOBgQAmfLUkyItJS9HW
-dhbbdcvEqDSSMObpi31wtyTZQuKzFoMeSB+itQLgdDz1vbMDWWo+aGu/PTjWhv3v
-rj0uVYpnQgL6LO9OgaoGCpWAkNw5r36xDch4sRdZSUBdsNKGAxw6pPYmsSOyiaci
-9QLHnmGC7sA9psy/3uvTbnPtpYWltg==
------END CERTIFICATE-----
diff --git a/tests/cert-svc/data/cert_chain/05.pem b/tests/cert-svc/data/cert_chain/05.pem
deleted file mode 100644 (file)
index 17d3a68..0000000
+++ /dev/null
@@ -1,65 +0,0 @@
-Certificate:
-    Data:
-        Version: 3 (0x2)
-        Serial Number: 5 (0x5)
-        Signature Algorithm: sha1WithRSAEncryption
-        Issuer: C=AU, ST=Some-State, O=Internet Widgits Pty Ltd, OU=chain5, CN=chain5/emailAddress=chain5
-        Validity
-            Not Before: May 13 01:23:13 2011 GMT
-            Not After : May 12 01:23:13 2012 GMT
-        Subject: C=AU, ST=Some-State, O=Internet Widgits Pty Ltd, OU=server, CN=server/emailAddress=server
-        Subject Public Key Info:
-            Public Key Algorithm: rsaEncryption
-            RSA Public Key: (1024 bit)
-                Modulus (1024 bit):
-                    00:d9:75:ea:49:42:39:98:26:0f:61:30:bd:f3:70:
-                    17:bd:ca:5b:1b:a1:31:68:9d:63:7e:a6:c5:1e:2e:
-                    1f:13:63:6b:ef:b0:23:b7:21:b6:1e:f7:65:f1:01:
-                    e7:1c:4a:c8:d1:15:20:e9:d4:cb:9d:b2:4c:57:b4:
-                    a8:4b:0e:e3:5b:54:16:10:51:3b:3f:af:51:e9:e3:
-                    d0:7d:1e:a3:30:59:dd:8e:8c:b5:69:02:5d:a3:5e:
-                    37:02:22:05:e2:6d:04:b8:fb:2b:33:d5:59:c9:e3:
-                    9e:74:59:65:b2:7f:03:e5:0c:dd:93:62:1a:55:94:
-                    4d:5c:e1:bd:cc:99:19:04:61
-                Exponent: 65537 (0x10001)
-        X509v3 extensions:
-            X509v3 Basic Constraints: 
-                CA:FALSE
-            Netscape Comment: 
-                OpenSSL Generated Certificate
-            X509v3 Subject Key Identifier: 
-                2E:EE:9A:24:CA:AA:22:7C:B3:7F:13:56:FC:A8:FC:06:0F:FB:63:7D
-            X509v3 Authority Key Identifier: 
-                DirName:/C=AU/ST=Some-State/O=Internet Widgits Pty Ltd/OU=chain4/CN=chain4/emailAddress=chain4
-                serial:04
-
-    Signature Algorithm: sha1WithRSAEncryption
-        d6:e7:97:51:80:37:cc:cf:b5:96:47:cc:4b:ca:62:f4:d1:43:
-        a1:d2:8b:9a:21:50:99:04:9f:c0:00:f1:0c:71:18:82:88:63:
-        9e:86:6c:a1:2c:25:0e:c1:30:32:db:02:5b:47:ae:8d:5e:ba:
-        0f:3d:16:84:39:c6:30:91:8d:b9:23:1b:a9:58:52:9c:49:81:
-        c9:87:e3:34:1d:dc:a0:dd:81:0b:1e:f6:d7:a7:2e:bd:dc:1c:
-        7b:d7:5c:0f:ec:da:09:81:45:36:63:76:e8:31:ba:cd:26:dc:
-        7a:80:18:c4:3e:be:14:14:07:dc:4b:1a:b5:c4:2c:38:10:f6:
-        13:84
------BEGIN CERTIFICATE-----
-MIIDZTCCAs6gAwIBAgIBBTANBgkqhkiG9w0BAQUFADB+MQswCQYDVQQGEwJBVTET
-MBEGA1UECBMKU29tZS1TdGF0ZTEhMB8GA1UEChMYSW50ZXJuZXQgV2lkZ2l0cyBQ
-dHkgTHRkMQ8wDQYDVQQLEwZjaGFpbjUxDzANBgNVBAMTBmNoYWluNTEVMBMGCSqG
-SIb3DQEJARYGY2hhaW41MB4XDTExMDUxMzAxMjMxM1oXDTEyMDUxMjAxMjMxM1ow
-fjELMAkGA1UEBhMCQVUxEzARBgNVBAgTClNvbWUtU3RhdGUxITAfBgNVBAoTGElu
-dGVybmV0IFdpZGdpdHMgUHR5IEx0ZDEPMA0GA1UECxMGc2VydmVyMQ8wDQYDVQQD
-EwZzZXJ2ZXIxFTATBgkqhkiG9w0BCQEWBnNlcnZlcjCBnzANBgkqhkiG9w0BAQEF
-AAOBjQAwgYkCgYEA2XXqSUI5mCYPYTC983AXvcpbG6ExaJ1jfqbFHi4fE2Nr77Aj
-tyG2Hvdl8QHnHErI0RUg6dTLnbJMV7SoSw7jW1QWEFE7P69R6ePQfR6jMFndjoy1
-aQJdo143AiIF4m0EuPsrM9VZyeOedFllsn8D5Qzdk2IaVZRNXOG9zJkZBGECAwEA
-AaOB8jCB7zAJBgNVHRMEAjAAMCwGCWCGSAGG+EIBDQQfFh1PcGVuU1NMIEdlbmVy
-YXRlZCBDZXJ0aWZpY2F0ZTAdBgNVHQ4EFgQULu6aJMqqInyzfxNW/Kj8Bg/7Y30w
-gZQGA1UdIwSBjDCBiaGBg6SBgDB+MQswCQYDVQQGEwJBVTETMBEGA1UECBMKU29t
-ZS1TdGF0ZTEhMB8GA1UEChMYSW50ZXJuZXQgV2lkZ2l0cyBQdHkgTHRkMQ8wDQYD
-VQQLEwZjaGFpbjQxDzANBgNVBAMTBmNoYWluNDEVMBMGCSqGSIb3DQEJARYGY2hh
-aW40ggEEMA0GCSqGSIb3DQEBBQUAA4GBANbnl1GAN8zPtZZHzEvKYvTRQ6HSi5oh
-UJkEn8AA8QxxGIKIY56GbKEsJQ7BMDLbAltHro1eug89FoQ5xjCRjbkjG6lYUpxJ
-gcmH4zQd3KDdgQse9tenLr3cHHvXXA/s2gmBRTZjdugxus0m3HqAGMQ+vhQUB9xL
-GrXELDgQ9hOE
------END CERTIFICATE-----
diff --git a/tests/cert-svc/data/cert_chain/ca.crt b/tests/cert-svc/data/cert_chain/ca.crt
deleted file mode 100644 (file)
index e5071c2..0000000
+++ /dev/null
@@ -1,21 +0,0 @@
------BEGIN CERTIFICATE-----
-MIIDfjCCAuegAwIBAgIJAJpBROaNArZVMA0GCSqGSIb3DQEBBQUAMIGHMQswCQYD
-VQQGEwJBVTETMBEGA1UECBMKU29tZS1TdGF0ZTENMAsGA1UEBxMEcm9vdDEhMB8G
-A1UEChMYSW50ZXJuZXQgV2lkZ2l0cyBQdHkgTHRkMQ0wCwYDVQQLEwRyb290MQ0w
-CwYDVQQDEwRyb290MRMwEQYJKoZIhvcNAQkBFgRyb290MB4XDTExMDUxMjA1NDE1
-NFoXDTEyMDUxMTA1NDE1NFowgYcxCzAJBgNVBAYTAkFVMRMwEQYDVQQIEwpTb21l
-LVN0YXRlMQ0wCwYDVQQHEwRyb290MSEwHwYDVQQKExhJbnRlcm5ldCBXaWRnaXRz
-IFB0eSBMdGQxDTALBgNVBAsTBHJvb3QxDTALBgNVBAMTBHJvb3QxEzARBgkqhkiG
-9w0BCQEWBHJvb3QwgZ8wDQYJKoZIhvcNAQEBBQADgY0AMIGJAoGBANDZOXVYvgdH
-kSZMQi259Uscs8ny6MkvH9VYoK7sKtTKnk0IDjge/srEfOs3mqtNDDL4SI3tS9wH
-6AsRn/ixuPF1tmFoFmnP66Mk0+XaB0DxppSmtUqYdKdXIplRTmOzS+pcMi9aL3G8
-uhb2mxZp9gOUt0WXToHpGWpVMg5/G6ptAgMBAAGjge8wgewwHQYDVR0OBBYEFJUV
-1626bZK5TUMrRw6PcabInryvMIG8BgNVHSMEgbQwgbGAFJUV1626bZK5TUMrRw6P
-cabInryvoYGNpIGKMIGHMQswCQYDVQQGEwJBVTETMBEGA1UECBMKU29tZS1TdGF0
-ZTENMAsGA1UEBxMEcm9vdDEhMB8GA1UEChMYSW50ZXJuZXQgV2lkZ2l0cyBQdHkg
-THRkMQ0wCwYDVQQLEwRyb290MQ0wCwYDVQQDEwRyb290MRMwEQYJKoZIhvcNAQkB
-FgRyb290ggkAmkFE5o0CtlUwDAYDVR0TBAUwAwEB/zANBgkqhkiG9w0BAQUFAAOB
-gQA/yOsY9OTiNklnJablnVur+G/BIqxdOryUojlxQw/yagS2pnvvC2nxPcPBdaao
-qvISRWhGIsuhKPUQg4J+OBk6KMHKB79aJljjvjty4ApN7xyFpJQljD+4UFW+U+Yf
-kD1tq5SG8hg00YyklFq8mzBiPV97gfseGm4KzwK6RK0EHQ==
------END CERTIFICATE-----
diff --git a/tests/cert-svc/data/cert_chain/chain1.crt b/tests/cert-svc/data/cert_chain/chain1.crt
deleted file mode 100644 (file)
index a80bbbc..0000000
+++ /dev/null
@@ -1,52 +0,0 @@
-Certificate:
-    Data:
-        Version: 3 (0x2)
-        Serial Number: 0 (0x0)
-        Signature Algorithm: sha1WithRSAEncryption
-        Issuer: C=AU, ST=Some-State, L=root, O=Internet Widgits Pty Ltd, OU=root, CN=root/emailAddress=root
-        Validity
-            Not Before: May 13 01:21:41 2011 GMT
-            Not After : May 12 01:21:41 2012 GMT
-        Subject: C=AU, ST=Some-State, O=Internet Widgits Pty Ltd, OU=chain1, CN=chain1/emailAddress=chain1
-        Subject Public Key Info:
-            Public Key Algorithm: rsaEncryption
-            RSA Public Key: (1024 bit)
-                Modulus (1024 bit):
-                    00:ae:6d:d3:18:3f:b2:63:ab:fb:72:ce:ff:9a:8b:
-                    07:4a:52:c5:99:0e:9e:5c:68:ce:82:67:07:7a:27:
-                    11:98:a7:fe:3a:68:3f:4e:4b:74:d4:a5:77:15:87:
-                    7e:9c:9f:10:82:2f:1c:e3:c0:c7:1e:8b:35:ab:3a:
-                    f6:13:44:81:43:22:a7:fa:06:36:9c:55:53:7a:9d:
-                    18:9b:a0:f4:93:58:50:2c:cd:ab:ec:32:2f:fa:4f:
-                    ff:6e:6a:68:75:15:76:e1:b1:e1:67:f9:13:0a:d0:
-                    9b:db:12:b9:fd:dd:51:19:e4:63:d0:d0:56:b5:6a:
-                    00:a5:03:68:e7:77:21:b0:f9
-                Exponent: 65537 (0x10001)
-        X509v3 extensions:
-            X509v3 Basic Constraints: 
-                CA:TRUE
-    Signature Algorithm: sha1WithRSAEncryption
-        01:d3:3c:dc:a0:62:14:99:b8:b1:99:cf:0c:4a:50:2b:f7:1e:
-        56:f6:de:ce:80:b4:32:bb:0c:5c:45:b7:78:e5:27:ee:90:0c:
-        a0:db:ef:32:85:85:08:c6:4a:e6:22:7b:56:61:d5:b4:4e:a1:
-        7e:ed:60:c2:bf:bc:51:89:9a:b1:73:c2:e0:bb:3d:4e:fa:6f:
-        3e:32:b5:7f:b4:bc:0f:8a:ca:7d:f0:bf:da:b1:12:23:0e:cc:
-        57:e5:58:7c:23:38:b1:d8:b2:13:d8:6a:0d:20:bd:e9:66:51:
-        2d:e6:57:a1:33:17:69:6d:21:9f:18:37:23:6c:ca:0e:b0:c4:
-        47:86
------BEGIN CERTIFICATE-----
-MIICjDCCAfWgAwIBAgIBADANBgkqhkiG9w0BAQUFADCBhzELMAkGA1UEBhMCQVUx
-EzARBgNVBAgTClNvbWUtU3RhdGUxDTALBgNVBAcTBHJvb3QxITAfBgNVBAoTGElu
-dGVybmV0IFdpZGdpdHMgUHR5IEx0ZDENMAsGA1UECxMEcm9vdDENMAsGA1UEAxME
-cm9vdDETMBEGCSqGSIb3DQEJARYEcm9vdDAeFw0xMTA1MTMwMTIxNDFaFw0xMjA1
-MTIwMTIxNDFaMH4xCzAJBgNVBAYTAkFVMRMwEQYDVQQIEwpTb21lLVN0YXRlMSEw
-HwYDVQQKExhJbnRlcm5ldCBXaWRnaXRzIFB0eSBMdGQxDzANBgNVBAsTBmNoYWlu
-MTEPMA0GA1UEAxMGY2hhaW4xMRUwEwYJKoZIhvcNAQkBFgZjaGFpbjEwgZ8wDQYJ
-KoZIhvcNAQEBBQADgY0AMIGJAoGBAK5t0xg/smOr+3LO/5qLB0pSxZkOnlxozoJn
-B3onEZin/jpoP05LdNSldxWHfpyfEIIvHOPAxx6LNas69hNEgUMip/oGNpxVU3qd
-GJug9JNYUCzNq+wyL/pP/25qaHUVduGx4Wf5EwrQm9sSuf3dURnkY9DQVrVqAKUD
-aOd3IbD5AgMBAAGjEDAOMAwGA1UdEwQFMAMBAf8wDQYJKoZIhvcNAQEFBQADgYEA
-AdM83KBiFJm4sZnPDEpQK/ceVvbezoC0MrsMXEW3eOUn7pAMoNvvMoWFCMZK5iJ7
-VmHVtE6hfu1gwr+8UYmasXPC4Ls9TvpvPjK1f7S8D4rKffC/2rESIw7MV+VYfCM4
-sdiyE9hqDSC96WZRLeZXoTMXaW0hnxg3I2zKDrDER4Y=
------END CERTIFICATE-----
diff --git a/tests/cert-svc/data/cert_chain/chain2.crt b/tests/cert-svc/data/cert_chain/chain2.crt
deleted file mode 100644 (file)
index 7b475e5..0000000
+++ /dev/null
@@ -1,52 +0,0 @@
-Certificate:
-    Data:
-        Version: 3 (0x2)
-        Serial Number: 1 (0x1)
-        Signature Algorithm: sha1WithRSAEncryption
-        Issuer: C=AU, ST=Some-State, O=Internet Widgits Pty Ltd, OU=chain1, CN=chain1/emailAddress=chain1
-        Validity
-            Not Before: May 13 01:22:02 2011 GMT
-            Not After : May 12 01:22:02 2012 GMT
-        Subject: C=AU, ST=Some-State, O=Internet Widgits Pty Ltd, OU=chain2, CN=chain2/emailAddress=chain2
-        Subject Public Key Info:
-            Public Key Algorithm: rsaEncryption
-            RSA Public Key: (1024 bit)
-                Modulus (1024 bit):
-                    00:c4:20:c7:96:1e:c5:33:47:ac:e5:ad:2b:0b:63:
-                    ce:e4:44:33:e3:7f:16:ae:f0:d8:7c:b0:96:01:69:
-                    38:63:4f:62:7d:97:d6:31:c9:0d:10:24:f5:17:40:
-                    13:f0:1a:70:70:5e:3f:05:4d:d9:67:52:ed:41:83:
-                    b7:d2:bb:bf:3d:29:98:07:a3:64:1e:2f:1e:13:8c:
-                    7a:c1:62:33:66:33:3e:d4:26:5a:59:99:05:8e:67:
-                    c7:68:cd:f2:8d:6f:fb:8c:07:63:ab:50:68:03:88:
-                    ae:0a:5c:9b:b6:9b:c1:18:7b:ef:cd:c9:f0:5e:44:
-                    ab:56:d6:df:48:41:d3:21:51
-                Exponent: 65537 (0x10001)
-        X509v3 extensions:
-            X509v3 Basic Constraints: 
-                CA:TRUE
-    Signature Algorithm: sha1WithRSAEncryption
-        53:5a:c3:bb:48:87:d0:a2:7d:20:68:02:7c:be:18:93:b6:3d:
-        83:e4:10:1a:a7:4d:37:24:3e:6c:41:bd:8f:1d:3b:89:08:5a:
-        e3:ba:81:9b:e8:fc:0e:fc:3d:0a:70:f2:11:69:59:de:ba:45:
-        b4:97:b8:d2:e0:5a:d1:a4:75:bc:68:d5:5f:71:36:78:32:ae:
-        d3:31:26:80:f3:f3:a8:54:33:f7:be:a3:0c:2d:d9:9b:b8:33:
-        03:be:54:7b:f5:c4:cf:62:9b:25:0c:79:76:12:10:b6:84:1e:
-        f1:ff:7c:fe:0a:ac:46:85:26:52:d5:6f:cc:e5:89:e7:ca:8d:
-        71:69
------BEGIN CERTIFICATE-----
-MIICgjCCAeugAwIBAgIBATANBgkqhkiG9w0BAQUFADB+MQswCQYDVQQGEwJBVTET
-MBEGA1UECBMKU29tZS1TdGF0ZTEhMB8GA1UEChMYSW50ZXJuZXQgV2lkZ2l0cyBQ
-dHkgTHRkMQ8wDQYDVQQLEwZjaGFpbjExDzANBgNVBAMTBmNoYWluMTEVMBMGCSqG
-SIb3DQEJARYGY2hhaW4xMB4XDTExMDUxMzAxMjIwMloXDTEyMDUxMjAxMjIwMlow
-fjELMAkGA1UEBhMCQVUxEzARBgNVBAgTClNvbWUtU3RhdGUxITAfBgNVBAoTGElu
-dGVybmV0IFdpZGdpdHMgUHR5IEx0ZDEPMA0GA1UECxMGY2hhaW4yMQ8wDQYDVQQD
-EwZjaGFpbjIxFTATBgkqhkiG9w0BCQEWBmNoYWluMjCBnzANBgkqhkiG9w0BAQEF
-AAOBjQAwgYkCgYEAxCDHlh7FM0es5a0rC2PO5EQz438WrvDYfLCWAWk4Y09ifZfW
-MckNECT1F0AT8BpwcF4/BU3ZZ1LtQYO30ru/PSmYB6NkHi8eE4x6wWIzZjM+1CZa
-WZkFjmfHaM3yjW/7jAdjq1BoA4iuClybtpvBGHvvzcnwXkSrVtbfSEHTIVECAwEA
-AaMQMA4wDAYDVR0TBAUwAwEB/zANBgkqhkiG9w0BAQUFAAOBgQBTWsO7SIfQon0g
-aAJ8vhiTtj2D5BAap003JD5sQb2PHTuJCFrjuoGb6PwO/D0KcPIRaVneukW0l7jS
-4FrRpHW8aNVfcTZ4Mq7TMSaA8/OoVDP3vqMMLdmbuDMDvlR79cTPYpslDHl2EhC2
-hB7x/3z+CqxGhSZS1W/M5Ynnyo1xaQ==
------END CERTIFICATE-----
diff --git a/tests/cert-svc/data/cert_chain/chain3.crt b/tests/cert-svc/data/cert_chain/chain3.crt
deleted file mode 100644 (file)
index 0c15ecd..0000000
+++ /dev/null
@@ -1,52 +0,0 @@
-Certificate:
-    Data:
-        Version: 3 (0x2)
-        Serial Number: 2 (0x2)
-        Signature Algorithm: sha1WithRSAEncryption
-        Issuer: C=AU, ST=Some-State, O=Internet Widgits Pty Ltd, OU=chain2, CN=chain2/emailAddress=chain2
-        Validity
-            Not Before: May 13 01:22:13 2011 GMT
-            Not After : May 12 01:22:13 2012 GMT
-        Subject: C=AU, ST=Some-State, O=Internet Widgits Pty Ltd, OU=chain3, CN=chain3/emailAddress=chain3
-        Subject Public Key Info:
-            Public Key Algorithm: rsaEncryption
-            RSA Public Key: (1024 bit)
-                Modulus (1024 bit):
-                    00:a2:52:3c:b7:64:b4:05:92:cd:b2:58:0c:81:5c:
-                    b4:bd:a4:10:99:17:1a:35:f2:de:f8:86:db:e9:24:
-                    a3:01:b1:d6:03:a9:f8:2b:d1:cd:f7:7b:9a:c0:a0:
-                    a9:8d:6d:34:94:7c:2c:4c:5c:c0:26:db:46:13:a3:
-                    c2:c4:2d:eb:ac:cb:5b:64:09:2c:23:eb:b5:8c:80:
-                    12:d6:cd:7b:fa:5f:d9:7a:17:b6:fc:d5:65:fa:d4:
-                    94:d9:9a:cf:b5:9e:87:99:f7:3e:32:6c:0d:5c:1f:
-                    09:77:a1:4b:ae:c1:47:27:60:a2:7e:f5:94:66:5f:
-                    7b:ea:e1:a9:b1:24:5a:40:03
-                Exponent: 65537 (0x10001)
-        X509v3 extensions:
-            X509v3 Basic Constraints: 
-                CA:TRUE
-    Signature Algorithm: sha1WithRSAEncryption
-        80:03:04:99:b2:ea:8c:d8:0a:76:e5:08:fc:2d:72:f9:d5:90:
-        8e:ce:3b:c0:ac:d0:57:d1:44:d2:84:cf:83:82:05:70:46:d9:
-        e8:07:cf:90:e4:cb:4c:7a:a0:98:d9:e3:be:86:23:71:a2:64:
-        36:df:43:54:1d:03:cf:85:5f:e6:43:cc:d3:ca:da:a2:31:2b:
-        dd:5a:da:d9:26:38:29:9e:89:04:cc:f9:55:a5:35:77:77:57:
-        ab:58:aa:d2:19:39:ad:6b:d2:3f:d9:e0:d7:58:ea:41:79:2a:
-        f2:50:ec:3f:89:0a:aa:ec:d6:eb:20:af:5e:52:ff:4d:39:34:
-        9c:99
------BEGIN CERTIFICATE-----
-MIICgjCCAeugAwIBAgIBAjANBgkqhkiG9w0BAQUFADB+MQswCQYDVQQGEwJBVTET
-MBEGA1UECBMKU29tZS1TdGF0ZTEhMB8GA1UEChMYSW50ZXJuZXQgV2lkZ2l0cyBQ
-dHkgTHRkMQ8wDQYDVQQLEwZjaGFpbjIxDzANBgNVBAMTBmNoYWluMjEVMBMGCSqG
-SIb3DQEJARYGY2hhaW4yMB4XDTExMDUxMzAxMjIxM1oXDTEyMDUxMjAxMjIxM1ow
-fjELMAkGA1UEBhMCQVUxEzARBgNVBAgTClNvbWUtU3RhdGUxITAfBgNVBAoTGElu
-dGVybmV0IFdpZGdpdHMgUHR5IEx0ZDEPMA0GA1UECxMGY2hhaW4zMQ8wDQYDVQQD
-EwZjaGFpbjMxFTATBgkqhkiG9w0BCQEWBmNoYWluMzCBnzANBgkqhkiG9w0BAQEF
-AAOBjQAwgYkCgYEAolI8t2S0BZLNslgMgVy0vaQQmRcaNfLe+Ibb6SSjAbHWA6n4
-K9HN93uawKCpjW00lHwsTFzAJttGE6PCxC3rrMtbZAksI+u1jIAS1s17+l/Zehe2
-/NVl+tSU2ZrPtZ6Hmfc+MmwNXB8Jd6FLrsFHJ2CifvWUZl976uGpsSRaQAMCAwEA
-AaMQMA4wDAYDVR0TBAUwAwEB/zANBgkqhkiG9w0BAQUFAAOBgQCAAwSZsuqM2Ap2
-5Qj8LXL51ZCOzjvArNBX0UTShM+DggVwRtnoB8+Q5MtMeqCY2eO+hiNxomQ230NU
-HQPPhV/mQ8zTytqiMSvdWtrZJjgpnokEzPlVpTV3d1erWKrSGTmta9I/2eDXWOpB
-eSryUOw/iQqq7NbrIK9eUv9NOTScmQ==
------END CERTIFICATE-----
diff --git a/tests/cert-svc/data/cert_chain/chain4.crt b/tests/cert-svc/data/cert_chain/chain4.crt
deleted file mode 100644 (file)
index 66a0c30..0000000
+++ /dev/null
@@ -1,52 +0,0 @@
-Certificate:
-    Data:
-        Version: 3 (0x2)
-        Serial Number: 3 (0x3)
-        Signature Algorithm: sha1WithRSAEncryption
-        Issuer: C=AU, ST=Some-State, O=Internet Widgits Pty Ltd, OU=chain3, CN=chain3/emailAddress=chain3
-        Validity
-            Not Before: May 13 01:22:24 2011 GMT
-            Not After : May 12 01:22:24 2012 GMT
-        Subject: C=AU, ST=Some-State, O=Internet Widgits Pty Ltd, OU=chain4, CN=chain4/emailAddress=chain4
-        Subject Public Key Info:
-            Public Key Algorithm: rsaEncryption
-            RSA Public Key: (1024 bit)
-                Modulus (1024 bit):
-                    00:b5:4a:07:d9:39:8b:6d:46:b2:91:b7:d0:20:e5:
-                    5e:41:8e:59:9c:78:8e:b1:54:8a:2e:fb:6a:f1:51:
-                    1c:90:78:3a:b6:98:ae:eb:1b:86:94:36:1c:10:d1:
-                    ab:47:e2:87:96:cb:e9:70:db:5e:29:2f:24:e6:c4:
-                    a1:de:08:33:81:66:5b:53:8b:54:90:d8:75:7b:ec:
-                    c4:62:61:eb:06:5e:0f:e7:a4:8e:3b:53:50:8e:31:
-                    f2:42:df:4e:e3:38:8b:46:d5:47:ae:81:3e:31:9e:
-                    70:42:b6:08:b7:c0:ed:a7:3f:b9:72:5b:1b:21:4e:
-                    0c:77:21:46:92:a0:a5:4e:a5
-                Exponent: 65537 (0x10001)
-        X509v3 extensions:
-            X509v3 Basic Constraints: 
-                CA:TRUE
-    Signature Algorithm: sha1WithRSAEncryption
-        14:49:d0:40:34:42:87:e5:c3:13:4b:42:41:e7:7f:cf:85:66:
-        d8:80:62:4f:5a:d6:38:44:25:67:cb:14:bf:3c:6e:ab:97:9f:
-        e8:e7:2f:eb:79:ef:97:d2:81:57:e1:a0:e6:10:34:d1:98:4d:
-        78:45:9f:98:dd:80:33:b8:64:17:de:3b:f4:e8:99:01:d3:a1:
-        56:96:dc:79:5b:75:5a:d1:63:df:4e:9b:4d:6a:65:0d:f4:6d:
-        20:ca:51:c0:db:52:7f:4c:b9:32:d5:be:a9:05:ae:b3:19:23:
-        5d:38:33:3e:48:66:eb:fb:af:8c:8a:f1:11:61:9d:36:f3:06:
-        3e:95
------BEGIN CERTIFICATE-----
-MIICgjCCAeugAwIBAgIBAzANBgkqhkiG9w0BAQUFADB+MQswCQYDVQQGEwJBVTET
-MBEGA1UECBMKU29tZS1TdGF0ZTEhMB8GA1UEChMYSW50ZXJuZXQgV2lkZ2l0cyBQ
-dHkgTHRkMQ8wDQYDVQQLEwZjaGFpbjMxDzANBgNVBAMTBmNoYWluMzEVMBMGCSqG
-SIb3DQEJARYGY2hhaW4zMB4XDTExMDUxMzAxMjIyNFoXDTEyMDUxMjAxMjIyNFow
-fjELMAkGA1UEBhMCQVUxEzARBgNVBAgTClNvbWUtU3RhdGUxITAfBgNVBAoTGElu
-dGVybmV0IFdpZGdpdHMgUHR5IEx0ZDEPMA0GA1UECxMGY2hhaW40MQ8wDQYDVQQD
-EwZjaGFpbjQxFTATBgkqhkiG9w0BCQEWBmNoYWluNDCBnzANBgkqhkiG9w0BAQEF
-AAOBjQAwgYkCgYEAtUoH2TmLbUaykbfQIOVeQY5ZnHiOsVSKLvtq8VEckHg6tpiu
-6xuGlDYcENGrR+KHlsvpcNteKS8k5sSh3ggzgWZbU4tUkNh1e+zEYmHrBl4P56SO
-O1NQjjHyQt9O4ziLRtVHroE+MZ5wQrYIt8Dtpz+5clsbIU4MdyFGkqClTqUCAwEA
-AaMQMA4wDAYDVR0TBAUwAwEB/zANBgkqhkiG9w0BAQUFAAOBgQAUSdBANEKH5cMT
-S0JB53/PhWbYgGJPWtY4RCVnyxS/PG6rl5/o5y/ree+X0oFX4aDmEDTRmE14RZ+Y
-3YAzuGQX3jv06JkB06FWltx5W3Va0WPfTptNamUN9G0gylHA21J/TLky1b6pBa6z
-GSNdODM+SGbr+6+MivERYZ028wY+lQ==
------END CERTIFICATE-----
diff --git a/tests/cert-svc/data/cert_chain/chain5.crt b/tests/cert-svc/data/cert_chain/chain5.crt
deleted file mode 100644 (file)
index 88f48eb..0000000
+++ /dev/null
@@ -1,52 +0,0 @@
-Certificate:
-    Data:
-        Version: 3 (0x2)
-        Serial Number: 4 (0x4)
-        Signature Algorithm: sha1WithRSAEncryption
-        Issuer: C=AU, ST=Some-State, O=Internet Widgits Pty Ltd, OU=chain4, CN=chain4/emailAddress=chain4
-        Validity
-            Not Before: May 13 01:22:35 2011 GMT
-            Not After : May 12 01:22:35 2012 GMT
-        Subject: C=AU, ST=Some-State, O=Internet Widgits Pty Ltd, OU=chain5, CN=chain5/emailAddress=chain5
-        Subject Public Key Info:
-            Public Key Algorithm: rsaEncryption
-            RSA Public Key: (1024 bit)
-                Modulus (1024 bit):
-                    00:f1:32:40:b3:f9:95:60:3a:29:3c:1c:cc:a4:f5:
-                    e5:08:19:dd:32:95:a2:62:cf:35:74:c2:85:1b:99:
-                    c9:3e:3a:90:d2:b5:9a:be:9a:cf:e9:77:13:26:4c:
-                    d2:78:06:3d:19:9b:d7:38:05:66:ca:d2:36:e7:a2:
-                    ce:bc:81:aa:31:23:c8:5d:a7:7c:41:25:44:79:99:
-                    ac:10:34:16:10:b8:29:a1:5d:96:f8:47:7f:d1:5c:
-                    68:b2:85:8a:99:28:65:00:94:d9:e6:df:1c:37:59:
-                    db:88:87:5f:b3:e5:a9:88:86:86:30:71:f0:22:24:
-                    57:3a:5b:58:04:db:c3:94:0f
-                Exponent: 65537 (0x10001)
-        X509v3 extensions:
-            X509v3 Basic Constraints: 
-                CA:TRUE
-    Signature Algorithm: sha1WithRSAEncryption
-        26:7c:b5:24:c8:8b:49:4b:d1:d6:76:16:db:75:cb:c4:a8:34:
-        92:30:e6:e9:8b:7d:70:b7:24:d9:42:e2:b3:16:83:1e:48:1f:
-        a2:b5:02:e0:74:3c:f5:bd:b3:03:59:6a:3e:68:6b:bf:3d:38:
-        d6:86:fd:ef:ae:3d:2e:55:8a:67:42:02:fa:2c:ef:4e:81:aa:
-        06:0a:95:80:90:dc:39:af:7e:b1:0d:c8:78:b1:17:59:49:40:
-        5d:b0:d2:86:03:1c:3a:a4:f6:26:b1:23:b2:89:a7:22:f5:02:
-        c7:9e:61:82:ee:c0:3d:a6:cc:bf:de:eb:d3:6e:73:ed:a5:85:
-        a5:b6
------BEGIN CERTIFICATE-----
-MIICgjCCAeugAwIBAgIBBDANBgkqhkiG9w0BAQUFADB+MQswCQYDVQQGEwJBVTET
-MBEGA1UECBMKU29tZS1TdGF0ZTEhMB8GA1UEChMYSW50ZXJuZXQgV2lkZ2l0cyBQ
-dHkgTHRkMQ8wDQYDVQQLEwZjaGFpbjQxDzANBgNVBAMTBmNoYWluNDEVMBMGCSqG
-SIb3DQEJARYGY2hhaW40MB4XDTExMDUxMzAxMjIzNVoXDTEyMDUxMjAxMjIzNVow
-fjELMAkGA1UEBhMCQVUxEzARBgNVBAgTClNvbWUtU3RhdGUxITAfBgNVBAoTGElu
-dGVybmV0IFdpZGdpdHMgUHR5IEx0ZDEPMA0GA1UECxMGY2hhaW41MQ8wDQYDVQQD
-EwZjaGFpbjUxFTATBgkqhkiG9w0BCQEWBmNoYWluNTCBnzANBgkqhkiG9w0BAQEF
-AAOBjQAwgYkCgYEA8TJAs/mVYDopPBzMpPXlCBndMpWiYs81dMKFG5nJPjqQ0rWa
-vprP6XcTJkzSeAY9GZvXOAVmytI256LOvIGqMSPIXad8QSVEeZmsEDQWELgpoV2W
-+Ed/0VxosoWKmShlAJTZ5t8cN1nbiIdfs+WpiIaGMHHwIiRXOltYBNvDlA8CAwEA
-AaMQMA4wDAYDVR0TBAUwAwEB/zANBgkqhkiG9w0BAQUFAAOBgQAmfLUkyItJS9HW
-dhbbdcvEqDSSMObpi31wtyTZQuKzFoMeSB+itQLgdDz1vbMDWWo+aGu/PTjWhv3v
-rj0uVYpnQgL6LO9OgaoGCpWAkNw5r36xDch4sRdZSUBdsNKGAxw6pPYmsSOyiaci
-9QLHnmGC7sA9psy/3uvTbnPtpYWltg==
------END CERTIFICATE-----
diff --git a/tests/cert-svc/data/cert_chain/chain_alt.txt b/tests/cert-svc/data/cert_chain/chain_alt.txt
deleted file mode 100644 (file)
index 498e125..0000000
+++ /dev/null
@@ -1 +0,0 @@
-basicConstraints=CA:TRUE
diff --git a/tests/cert-svc/data/cert_chain/csr/chain1.csr b/tests/cert-svc/data/cert_chain/csr/chain1.csr
deleted file mode 100644 (file)
index 1bb7205..0000000
+++ /dev/null
@@ -1,12 +0,0 @@
------BEGIN CERTIFICATE REQUEST-----
-MIIB0DCCATkCAQAwgY8xCzAJBgNVBAYTAkFVMRMwEQYDVQQIEwpTb21lLVN0YXRl
-MQ8wDQYDVQQHEwZjaGFpbjExITAfBgNVBAoTGEludGVybmV0IFdpZGdpdHMgUHR5
-IEx0ZDEPMA0GA1UECxMGY2hhaW4xMQ8wDQYDVQQDEwZjaGFpbjExFTATBgkqhkiG
-9w0BCQEWBmNoYWluMTCBnzANBgkqhkiG9w0BAQEFAAOBjQAwgYkCgYEArm3TGD+y
-Y6v7cs7/mosHSlLFmQ6eXGjOgmcHeicRmKf+Omg/Tkt01KV3FYd+nJ8Qgi8c48DH
-Hos1qzr2E0SBQyKn+gY2nFVTep0Ym6D0k1hQLM2r7DIv+k//bmpodRV24bHhZ/kT
-CtCb2xK5/d1RGeRj0NBWtWoApQNo53chsPkCAwEAAaAAMA0GCSqGSIb3DQEBBQUA
-A4GBAEZdP93VI8InLmmg/d8SigIev7EfkTxhw1kVmGAdfbEpBuBuKj2ls7FUx6Ee
-hz72r2SjFGDJmPeAJwpL+DNQXc+8SywMMwGCTxgz2bHgBGKPc780SlezixYkxxuS
-uhkDw9o+SP7v4SQXhlHI9lEccEk3T7HmQc7uDZN81cHT/jjU
------END CERTIFICATE REQUEST-----
diff --git a/tests/cert-svc/data/cert_chain/csr/chain2.csr b/tests/cert-svc/data/cert_chain/csr/chain2.csr
deleted file mode 100644 (file)
index c363bf4..0000000
+++ /dev/null
@@ -1,12 +0,0 @@
------BEGIN CERTIFICATE REQUEST-----
-MIIB0DCCATkCAQAwgY8xCzAJBgNVBAYTAkFVMRMwEQYDVQQIEwpTb21lLVN0YXRl
-MQ8wDQYDVQQHEwZjaGFpbjIxITAfBgNVBAoTGEludGVybmV0IFdpZGdpdHMgUHR5
-IEx0ZDEPMA0GA1UECxMGY2hhaW4yMQ8wDQYDVQQDEwZjaGFpbjIxFTATBgkqhkiG
-9w0BCQEWBmNoYWluMjCBnzANBgkqhkiG9w0BAQEFAAOBjQAwgYkCgYEAxCDHlh7F
-M0es5a0rC2PO5EQz438WrvDYfLCWAWk4Y09ifZfWMckNECT1F0AT8BpwcF4/BU3Z
-Z1LtQYO30ru/PSmYB6NkHi8eE4x6wWIzZjM+1CZaWZkFjmfHaM3yjW/7jAdjq1Bo
-A4iuClybtpvBGHvvzcnwXkSrVtbfSEHTIVECAwEAAaAAMA0GCSqGSIb3DQEBBQUA
-A4GBAJDdqMxSiUEjahKvVWsnaUOEqZADE9ncVH1Zp2oiIOTaGoj6TNR08BgAo1Rf
-OA5saruaJhak8gvZenvMjl48LoHq1rg5BxlumOqy87flCQO9YRP2+FTzcprCCMoK
-O8DuRov7j6+c30H2F3xaxABzlHlOniL659Q9gHm7tTg9dowK
------END CERTIFICATE REQUEST-----
diff --git a/tests/cert-svc/data/cert_chain/csr/chain3.csr b/tests/cert-svc/data/cert_chain/csr/chain3.csr
deleted file mode 100644 (file)
index 19feeb1..0000000
+++ /dev/null
@@ -1,12 +0,0 @@
------BEGIN CERTIFICATE REQUEST-----
-MIIB0DCCATkCAQAwgY8xCzAJBgNVBAYTAkFVMRMwEQYDVQQIEwpTb21lLVN0YXRl
-MQ8wDQYDVQQHEwZjaGFpbjMxITAfBgNVBAoTGEludGVybmV0IFdpZGdpdHMgUHR5
-IEx0ZDEPMA0GA1UECxMGY2hhaW4zMQ8wDQYDVQQDEwZjaGFpbjMxFTATBgkqhkiG
-9w0BCQEWBmNoYWluMzCBnzANBgkqhkiG9w0BAQEFAAOBjQAwgYkCgYEAolI8t2S0
-BZLNslgMgVy0vaQQmRcaNfLe+Ibb6SSjAbHWA6n4K9HN93uawKCpjW00lHwsTFzA
-JttGE6PCxC3rrMtbZAksI+u1jIAS1s17+l/Zehe2/NVl+tSU2ZrPtZ6Hmfc+MmwN
-XB8Jd6FLrsFHJ2CifvWUZl976uGpsSRaQAMCAwEAAaAAMA0GCSqGSIb3DQEBBQUA
-A4GBAJ0QAZHBPgrCTfpY3x+iz798F/HUaXLdZ1PpGWvNAXA5eEvD3gQUW2VTDmxS
-WhvIIRuI5KMKAW+tngo/Avfq2pGDSAnBxA+sSLXg/Hesgx2v9A2PsHDQ7rsAZvsz
-N+QgyHD2tI/aD1vLnHpFJWy9RFCaWU67q5m09ox0M0AcYYbT
------END CERTIFICATE REQUEST-----
diff --git a/tests/cert-svc/data/cert_chain/csr/chain4.csr b/tests/cert-svc/data/cert_chain/csr/chain4.csr
deleted file mode 100644 (file)
index fe55ceb..0000000
+++ /dev/null
@@ -1,12 +0,0 @@
------BEGIN CERTIFICATE REQUEST-----
-MIIB0DCCATkCAQAwgY8xCzAJBgNVBAYTAkFVMRMwEQYDVQQIEwpTb21lLVN0YXRl
-MQ8wDQYDVQQHEwZjaGFpbjQxITAfBgNVBAoTGEludGVybmV0IFdpZGdpdHMgUHR5
-IEx0ZDEPMA0GA1UECxMGY2hhaW40MQ8wDQYDVQQDEwZjaGFpbjQxFTATBgkqhkiG
-9w0BCQEWBmNoYWluNDCBnzANBgkqhkiG9w0BAQEFAAOBjQAwgYkCgYEAtUoH2TmL
-bUaykbfQIOVeQY5ZnHiOsVSKLvtq8VEckHg6tpiu6xuGlDYcENGrR+KHlsvpcNte
-KS8k5sSh3ggzgWZbU4tUkNh1e+zEYmHrBl4P56SOO1NQjjHyQt9O4ziLRtVHroE+
-MZ5wQrYIt8Dtpz+5clsbIU4MdyFGkqClTqUCAwEAAaAAMA0GCSqGSIb3DQEBBQUA
-A4GBAJPwc6IqD20GEyd+ridxaMu2ZxWOSwDs8SZ+Zl9ysbCYP3fClBpL8aCoqPOG
-Mgwsp7m4KrwReNYO2jF2TPmHqrpdoYsFLh4SrET4GkUpbdNaJMbzJLcAHYC45W7J
-2WnliPdMRG44LAUYA+p46do627qcAHwTdqr0ULg9MNYxHEc4
------END CERTIFICATE REQUEST-----
diff --git a/tests/cert-svc/data/cert_chain/csr/chain5.csr b/tests/cert-svc/data/cert_chain/csr/chain5.csr
deleted file mode 100644 (file)
index ef63918..0000000
+++ /dev/null
@@ -1,12 +0,0 @@
------BEGIN CERTIFICATE REQUEST-----
-MIIB0DCCATkCAQAwgY8xCzAJBgNVBAYTAkFVMRMwEQYDVQQIEwpTb21lLVN0YXRl
-MQ8wDQYDVQQHEwZjaGFpbjUxITAfBgNVBAoTGEludGVybmV0IFdpZGdpdHMgUHR5
-IEx0ZDEPMA0GA1UECxMGY2hhaW41MQ8wDQYDVQQDEwZjaGFpbjUxFTATBgkqhkiG
-9w0BCQEWBmNoYWluNTCBnzANBgkqhkiG9w0BAQEFAAOBjQAwgYkCgYEA8TJAs/mV
-YDopPBzMpPXlCBndMpWiYs81dMKFG5nJPjqQ0rWavprP6XcTJkzSeAY9GZvXOAVm
-ytI256LOvIGqMSPIXad8QSVEeZmsEDQWELgpoV2W+Ed/0VxosoWKmShlAJTZ5t8c
-N1nbiIdfs+WpiIaGMHHwIiRXOltYBNvDlA8CAwEAAaAAMA0GCSqGSIb3DQEBBQUA
-A4GBADmAeL4VKRFVGCVb4rH4HAtIb5Mzn5eqTmCPTqFHTCMfwuHLcvTiAtWZUnkY
-65AraaOnqxZHBeLDIYAX/4rTlg6kdCwnjcImYKuF7YP0aFAClon57cS0ZUKdxpO7
-1EVm2vFIpm0KI7tGHTFKU7FK3wu7GtXrdB4tVbW6i7skeWZD
------END CERTIFICATE REQUEST-----
diff --git a/tests/cert-svc/data/cert_chain/csr/server.csr b/tests/cert-svc/data/cert_chain/csr/server.csr
deleted file mode 100644 (file)
index 9f38620..0000000
+++ /dev/null
@@ -1,12 +0,0 @@
------BEGIN CERTIFICATE REQUEST-----
-MIIB0DCCATkCAQAwgY8xCzAJBgNVBAYTAkFVMRMwEQYDVQQIEwpTb21lLVN0YXRl
-MQ8wDQYDVQQHEwZzZXJ2ZXIxITAfBgNVBAoTGEludGVybmV0IFdpZGdpdHMgUHR5
-IEx0ZDEPMA0GA1UECxMGc2VydmVyMQ8wDQYDVQQDEwZzZXJ2ZXIxFTATBgkqhkiG
-9w0BCQEWBnNlcnZlcjCBnzANBgkqhkiG9w0BAQEFAAOBjQAwgYkCgYEA2XXqSUI5
-mCYPYTC983AXvcpbG6ExaJ1jfqbFHi4fE2Nr77AjtyG2Hvdl8QHnHErI0RUg6dTL
-nbJMV7SoSw7jW1QWEFE7P69R6ePQfR6jMFndjoy1aQJdo143AiIF4m0EuPsrM9VZ
-yeOedFllsn8D5Qzdk2IaVZRNXOG9zJkZBGECAwEAAaAAMA0GCSqGSIb3DQEBBQUA
-A4GBAIyuwA0UbZ3K93G8OmuSZ2Xiyt5nPvzRFIAZlK6TMGNYTmMWLEkNz/AL1qBX
-EByJmCuho83Ei4WRB4xaOfaL/Yq5cRR+Xadz8tjAwpzrT8JpxEUmj4MHABN0EcXr
-q3Gz0rvxnDiV6v+1TkbGAfdpzF+pZAh05DdtswLXJ2EoEn29
------END CERTIFICATE REQUEST-----
diff --git a/tests/cert-svc/data/cert_chain/demoCA/index.txt b/tests/cert-svc/data/cert_chain/demoCA/index.txt
deleted file mode 100644 (file)
index 97e8cfe..0000000
+++ /dev/null
@@ -1,6 +0,0 @@
-V      120512012141Z           00      unknown /C=AU/ST=Some-State/O=Internet Widgits Pty Ltd/OU=chain1/CN=chain1/emailAddress=chain1
-V      120512012202Z           01      unknown /C=AU/ST=Some-State/O=Internet Widgits Pty Ltd/OU=chain2/CN=chain2/emailAddress=chain2
-V      120512012213Z           02      unknown /C=AU/ST=Some-State/O=Internet Widgits Pty Ltd/OU=chain3/CN=chain3/emailAddress=chain3
-V      120512012224Z           03      unknown /C=AU/ST=Some-State/O=Internet Widgits Pty Ltd/OU=chain4/CN=chain4/emailAddress=chain4
-V      120512012235Z           04      unknown /C=AU/ST=Some-State/O=Internet Widgits Pty Ltd/OU=chain5/CN=chain5/emailAddress=chain5
-V      120512012313Z           05      unknown /C=AU/ST=Some-State/O=Internet Widgits Pty Ltd/OU=server/CN=server/emailAddress=server
diff --git a/tests/cert-svc/data/cert_chain/demoCA/index.txt.attr b/tests/cert-svc/data/cert_chain/demoCA/index.txt.attr
deleted file mode 100644 (file)
index 8f7e63a..0000000
+++ /dev/null
@@ -1 +0,0 @@
-unique_subject = yes
diff --git a/tests/cert-svc/data/cert_chain/demoCA/index.txt.attr.old b/tests/cert-svc/data/cert_chain/demoCA/index.txt.attr.old
deleted file mode 100644 (file)
index 8f7e63a..0000000
+++ /dev/null
@@ -1 +0,0 @@
-unique_subject = yes
diff --git a/tests/cert-svc/data/cert_chain/demoCA/index.txt.old b/tests/cert-svc/data/cert_chain/demoCA/index.txt.old
deleted file mode 100644 (file)
index 0d588d0..0000000
+++ /dev/null
@@ -1,5 +0,0 @@
-V      120512012141Z           00      unknown /C=AU/ST=Some-State/O=Internet Widgits Pty Ltd/OU=chain1/CN=chain1/emailAddress=chain1
-V      120512012202Z           01      unknown /C=AU/ST=Some-State/O=Internet Widgits Pty Ltd/OU=chain2/CN=chain2/emailAddress=chain2
-V      120512012213Z           02      unknown /C=AU/ST=Some-State/O=Internet Widgits Pty Ltd/OU=chain3/CN=chain3/emailAddress=chain3
-V      120512012224Z           03      unknown /C=AU/ST=Some-State/O=Internet Widgits Pty Ltd/OU=chain4/CN=chain4/emailAddress=chain4
-V      120512012235Z           04      unknown /C=AU/ST=Some-State/O=Internet Widgits Pty Ltd/OU=chain5/CN=chain5/emailAddress=chain5
diff --git a/tests/cert-svc/data/cert_chain/demoCA/serial b/tests/cert-svc/data/cert_chain/demoCA/serial
deleted file mode 100644 (file)
index cd672a5..0000000
+++ /dev/null
@@ -1 +0,0 @@
-06
diff --git a/tests/cert-svc/data/cert_chain/demoCA/serial.old b/tests/cert-svc/data/cert_chain/demoCA/serial.old
deleted file mode 100644 (file)
index eeee65e..0000000
+++ /dev/null
@@ -1 +0,0 @@
-05
diff --git a/tests/cert-svc/data/cert_chain/key/ca.key b/tests/cert-svc/data/cert_chain/key/ca.key
deleted file mode 100644 (file)
index eeefd8f..0000000
+++ /dev/null
@@ -1,15 +0,0 @@
------BEGIN RSA PRIVATE KEY-----
-MIICXQIBAAKBgQDQ2Tl1WL4HR5EmTEItufVLHLPJ8ujJLx/VWKCu7CrUyp5NCA44
-Hv7KxHzrN5qrTQwy+EiN7UvcB+gLEZ/4sbjxdbZhaBZpz+ujJNPl2gdA8aaUprVK
-mHSnVyKZUU5js0vqXDIvWi9xvLoW9psWafYDlLdFl06B6RlqVTIOfxuqbQIDAQAB
-AoGALIc0Bf3+viSXIPg/X+p3DyW2e4dL9KEUg3NbBxCZbTcqGzhtd6+8GVVdYPVB
-B+bsg+2F4qTGeMpCwiFm3ypdSNMqPCe+u8UF8Sw82th7m+Tkj5nM4svtkMT+CWZ2
-/SkJDWPplv0ipBPmYCrX7pMyTkBQxIOAoJh5P2Bb2m+u0y0CQQD6jp0W3tNCZ2m1
-yoIGRWLQDANqZdiOarL2vlu9ksKxySu5sA/COcOCKS4JaE56uebSKZEriLdKFCqd
-X/fxv81rAkEA1WKpxTphvNhVKyNsMZbhLoMEB1XUHX08dap1Oiwp5nu4S95RFXKE
-LAwngdqApRwrqXQO9WqDpMIDbkHnu2nFhwJBALCgDh8MLxK1gbB0NBqlmRWeEl5T
-s0gZ8VS9NkC6D2Nys88vTLyXKbo8u0ZIcGJVYGCwirSMqOCgvLW57DhQBEcCQQCg
-A4mdvcb3Lx7G55xFn4gjMdo+ie0zY+uHrRiVU/LjxJkSQ5d4RtS4lzC1Hp5jsjlH
-rCFfhc1MKrUZ5FAa6RlXAkBG+TojT8xAF+XzxPEG8ZIRpS75PDek+BTOJNpxbvvk
-LyEbsJ054HwYJbEenYrhJiAXGRxQS9wzTXm7vUO/NZlJ
------END RSA PRIVATE KEY-----
diff --git a/tests/cert-svc/data/cert_chain/key/chain1.key b/tests/cert-svc/data/cert_chain/key/chain1.key
deleted file mode 100644 (file)
index 8fe8106..0000000
+++ /dev/null
@@ -1,15 +0,0 @@
------BEGIN RSA PRIVATE KEY-----
-MIICXAIBAAKBgQCubdMYP7Jjq/tyzv+aiwdKUsWZDp5caM6CZwd6JxGYp/46aD9O
-S3TUpXcVh36cnxCCLxzjwMceizWrOvYTRIFDIqf6BjacVVN6nRiboPSTWFAszavs
-Mi/6T/9uamh1FXbhseFn+RMK0JvbErn93VEZ5GPQ0Fa1agClA2jndyGw+QIDAQAB
-AoGATPoWoKrrlOT/EMmdL5yPWRNyNHupE2sFR7MkL5oyP8ZTgX8kAO933agwB4ZG
-L+RaqrkT7MbUmPwicTCSDCq9SCLSL+fQS/hujdRbsBhnLTuAiaIblmpDYO5z6Rma
-tUXnImdvKROpYmBNNzFzDlj0686KahdYGXJOTFYSST3QHEkCQQDap3/5ursNj1NY
-dehaiUhYD3mOqgrj/MhN+JHNR6Eb3qQQ1Aa/rQmEkPnmopNy7qc/B+6Y4CMxNLkM
-bHSyre2/AkEAzDibGZCBct4slqyuPyZTfgh3UQSaCQ4CSF7HG/Pj/ZeHqDnKoxR7
-v//WZy5gxHZ7CrSWM/laNOd6svdtQs1/RwJBAJ1UMK1MQxN6sYnRLSMX7MoQOHMC
-v1tUo/wWgzKl+7LF/F9vcHuy0kpk1quxB0+HkSe1WWT+wdPCD/R0hXOb2pkCQFt0
-ehjfuujbEDLF0B6dpkRJvE0+91BYwrLwJtCgzxgQ1QKEJvgTQzv/cV+xyEoTGRT5
-PE64Oyp4A13EKl0BNB8CQF7C0zzEBE/MngPizBU6KEfo47c0hD57IUVGcIA3juwm
-AELZem13BOjaDk9CEZppfk1lpdU0ZKmkIodlDwLVgLE=
------END RSA PRIVATE KEY-----
diff --git a/tests/cert-svc/data/cert_chain/key/chain2.key b/tests/cert-svc/data/cert_chain/key/chain2.key
deleted file mode 100644 (file)
index 3be4035..0000000
+++ /dev/null
@@ -1,15 +0,0 @@
------BEGIN RSA PRIVATE KEY-----
-MIICXQIBAAKBgQDEIMeWHsUzR6zlrSsLY87kRDPjfxau8Nh8sJYBaThjT2J9l9Yx
-yQ0QJPUXQBPwGnBwXj8FTdlnUu1Bg7fSu789KZgHo2QeLx4TjHrBYjNmMz7UJlpZ
-mQWOZ8dozfKNb/uMB2OrUGgDiK4KXJu2m8EYe+/NyfBeRKtW1t9IQdMhUQIDAQAB
-AoGALCNoZ2uDW9gMnB/NqSGMJSkIOHGYjERdpColiCnC6+6orrUmGkwx6Wk300Sz
-d/yrQ06ihjIP9EXgaTcYfo+MKPW4pt5P980H8sZg8XKSwv94gigKoSLAT0jPmFr1
-Z9YXew3b3Js0sd0K/i79pTAC1uIzaHeBjgB+D/SVbVmiX+UCQQDl66n5k43+aidO
-TDVizP59SvUPulvEkiWyy59+pvIBkAVtpYFQkS8Ty50M3w+qk3wmjPUbl6NeqFbw
-Qb75rLZbAkEA2l/c5D3XdWOmSb8eA5jIa6fIytSHRjOaiYGOAhzH/umWgtmqwNPg
-xG9CNsw35bRj9PrL2wpw0UlFUWykdkXOwwJBANKBgP9bZH8R6+jZB2vtKffHADYl
-Ns3zzQY1PlM0QJDDruSjypDcTFEAdEsLk4lmPR4Cootfu5j34ZlZaKOpyM8CQHC/
-YAAkAdNlMN0QpQF8Z7ZVubEni/Rt/lMSpexnScdOeVxz39qRSpKBUzGRvSaHPbil
-qI0eVeNorjZ9HmjGYBsCQQDEMANkM1n9eYcOuDseJpxh2G43IUN2zJauOkChQ3QH
-Rd9aNw3GPBzKw2JbGuYQqdHPMdaoUcCcRAkQQbS2kEm7
------END RSA PRIVATE KEY-----
diff --git a/tests/cert-svc/data/cert_chain/key/chain3.key b/tests/cert-svc/data/cert_chain/key/chain3.key
deleted file mode 100644 (file)
index d27f36c..0000000
+++ /dev/null
@@ -1,15 +0,0 @@
------BEGIN RSA PRIVATE KEY-----
-MIICXQIBAAKBgQCiUjy3ZLQFks2yWAyBXLS9pBCZFxo18t74htvpJKMBsdYDqfgr
-0c33e5rAoKmNbTSUfCxMXMAm20YTo8LELeusy1tkCSwj67WMgBLWzXv6X9l6F7b8
-1WX61JTZms+1noeZ9z4ybA1cHwl3oUuuwUcnYKJ+9ZRmX3vq4amxJFpAAwIDAQAB
-AoGBAIRhv4TuS2eUP9AowSIrwng7uxGv5r+C8VgNXIK7T3oNWHaqg2zxciJZm29o
-WH+wRcanstUge9H02SUhVLH8pYx9fFj0swfRhul8ISYVTRowH8I3K5wXjmeBU+z3
-WWyJfFqbsvyTaxdfEfXIoWI/d4vHVz5DeTnWKtntr/Nls/whAkEA1Yw3m3RERisP
-Ck9/1C2pzOBtrtHKLVJzQDV/NZBo7+CIMxuOWnbDNnoi+IgacNYtCfxchbF7TtUk
-+Pm07HqV0wJBAMKXBdak9PtQjNHyGEyzpqlZpM0auukgXY/EgOcVC86vof2fR5f9
-vhvMLbsxkFWziH1rt67H/8YAhnGpTt/PXxECQBONyFW6urm2HaVzDCBwofi5oDF+
-0kV+JEF/5IsSExnL9IzBfDJ6Z3uoiWU6iTlF00/zxMEVNFZOnBkUPGXe/7MCQHfi
-xdUVcl23pdrfVftDn8Wsli1Lb6abqykdPvGf9NNVP+9bB6frzAmiRPaUtcEnSEtF
-ZziGvd2Gi05RqmeXgpECQQCTS/meiClVDAn0Wnc3WgShKSBQINIiWUWApsAOdVSJ
-32yo5yR9qScoaW9TDroHiEfshdnC7NNh1fBbLZna96if
------END RSA PRIVATE KEY-----
diff --git a/tests/cert-svc/data/cert_chain/key/chain4.key b/tests/cert-svc/data/cert_chain/key/chain4.key
deleted file mode 100644 (file)
index 03feb92..0000000
+++ /dev/null
@@ -1,15 +0,0 @@
------BEGIN RSA PRIVATE KEY-----
-MIICWwIBAAKBgQC1SgfZOYttRrKRt9Ag5V5BjlmceI6xVIou+2rxURyQeDq2mK7r
-G4aUNhwQ0atH4oeWy+lw214pLyTmxKHeCDOBZltTi1SQ2HV77MRiYesGXg/npI47
-U1COMfJC307jOItG1UeugT4xnnBCtgi3wO2nP7lyWxshTgx3IUaSoKVOpQIDAQAB
-AoGAC9E3kcFehVEGctk4h+xrqHpO/RQeuRB5sXZSEkjnQ8OSkDSDsm+o5iBg0/fW
-4mixzfKc1O53xNd94E0RABgowzpg3cuOkLWmBYyw//9av3EQUPH9ZKrr1cVgHUvN
-pTJckhiZTbMPCibdoeulorkjWJ2kgsz8d4NKpBz03VyUHkECQQDtbYze5rXNXtAc
-OyYJv33CyKf8D5e7A4Gv9KRAjQF/6dNniRxggzPB8uE30EeC/iJ2f/o8NcItSlxE
-y5PDxF8nAkEAw3hP/xqp5FVH78i3DL1X9WuQDy+eTXv9GCt7Y51jKLRcG5ArwQuy
-uIwx9Ki3REiVBsKNH+YPj9mhmNOLuFsDUwJAFr2IYY0NWqc7HYkYwpRBsldPp5fC
-u5nBYR34YWpf+2Vk5yS9wAyw92GQ6qybPNOkb18gk4W+nGHj5n7tHzH+vwJAMmoq
-f8pZvSl9t0uWYrPHJuZKLpCCjMuI2J4GYgfq1knGY9mIX27r9os6KzcEpZjuzuKI
-0YxdwSVJd4hARhk7PwJACI3n/qMb/AiYY9Kh2vUZFcV10BA4zN2bq69wmmSzsIqx
-wRBOALPPKRKDsS/aA7ZgPAAiHjXcyazXyWKeObeQ3w==
------END RSA PRIVATE KEY-----
diff --git a/tests/cert-svc/data/cert_chain/key/chain5.key b/tests/cert-svc/data/cert_chain/key/chain5.key
deleted file mode 100644 (file)
index e343753..0000000
+++ /dev/null
@@ -1,15 +0,0 @@
------BEGIN RSA PRIVATE KEY-----
-MIICXAIBAAKBgQDxMkCz+ZVgOik8HMyk9eUIGd0ylaJizzV0woUbmck+OpDStZq+
-ms/pdxMmTNJ4Bj0Zm9c4BWbK0jbnos68gaoxI8hdp3xBJUR5mawQNBYQuCmhXZb4
-R3/RXGiyhYqZKGUAlNnm3xw3WduIh1+z5amIhoYwcfAiJFc6W1gE28OUDwIDAQAB
-AoGAVG4P4jBCzs1tM8KtDC2bP6u2F4fzsPzxrG6PI6tAm8zqdyflBEWy8/mftW98
-2VDtwHIh81VIt0TAvXLrRWdqSF1KqaP1rGdfBBjy7VX/F/RM9BJkGyGGK4muFn5z
-ILkTyUokCIvCea59Nxjz8efk4UT8VKTrLUe/aW7AYtyFaRECQQD9hDdNGtkh2CiX
-BaMY8kbamWRNGO+hthD3bmtWaqBJBY2F/bgF0D1F71bMT2Po1JX01GLrPDX/WDIY
-JANfHYkHAkEA848js49pOq2Xeu7vQUbUGufjiAxq5WcMiM1qrNBIi8Nz7eSC20WO
-NB4f39UU7K0HndnpohEcCkBa+5j0efqCuQJBAPChlNQtDbhgMnbWtO6y2KoZOukr
-KBl4dTZGqr+FycpF6QUrxIZQGDjParXXDWAsmIGhLptVtXM/RZ1AYargn/UCQAb4
-zfjR3h1D4tYuCMNBl8i9YpH+aQDwFjfESY1w2OLHUYY5yFUmhI+RXTA3FUZBHbqz
-BjERdFAGz5PsKPNk7GECQGoi4PRFAA/VRgDQ5PVYqW86pfG0ULyneHBZIg57Urqg
-5Umq3ct6qZT+/H2pSonJYkNWKdMJiCK7jU6H5h7z47E=
------END RSA PRIVATE KEY-----
diff --git a/tests/cert-svc/data/cert_chain/key/server.key b/tests/cert-svc/data/cert_chain/key/server.key
deleted file mode 100644 (file)
index 5f76b2e..0000000
+++ /dev/null
@@ -1,15 +0,0 @@
------BEGIN RSA PRIVATE KEY-----
-MIICXQIBAAKBgQDZdepJQjmYJg9hML3zcBe9ylsboTFonWN+psUeLh8TY2vvsCO3
-IbYe92XxAeccSsjRFSDp1MudskxXtKhLDuNbVBYQUTs/r1Hp49B9HqMwWd2OjLVp
-Al2jXjcCIgXibQS4+ysz1VnJ4550WWWyfwPlDN2TYhpVlE1c4b3MmRkEYQIDAQAB
-AoGAGiCCr56XUOJxwpmamN8E2zauz5kEWK9gPt1GnaOo9Clj1H5zLBOO0BWlV9mE
-rO+HRSemtrFsbVv4tCjud2Yohp2yAAe8nnW33Xf4KDLZ62wtP5HCXaIoNZKmTnpC
-QHc2I/k674jUGE4tCvrYwg0CJQQrpTpXizA8YECudxZ48okCQQD9gKVPdlBeEsF2
-OVKHF//n1LI6+2cD9sWoPzdXayVcpemDyTl+GIQYhqZDVWsMj6DvfOHHlNZdYGr2
-XrmCbvCvAkEA25peZpnAnnwcqgKUrbaNKq5rmYPtbdu5I6rloMUs/OiO2lHkXs9Q
-QN904G1dTYOcaEOVH5nMuwD04Es/7Lj/7wJBALE9SddV9Hjhiivbhiz4Ba8UUgzV
-C0CFP8sTb+EKA9RUGAFRJoZYI7t2ITcAuNjObwoieUVudbZRnFdnATMF1/cCQQCF
-SEvDOc4OYoWDKc3TINjM7s+ffNK9un3DiBWWXhXP6dXJ66oPYQP0W6s0Cyx1v0tO
-fLYlV9NKLGpzNzi1FBNBAkAO4WRyZXBK9BVBLyfJq77uptlLZW71yl2X1oSklFyM
-MpLH4u1SJorRypt7MsxPgcF4pAZSs/TWaCmx8nmSBcEE
------END RSA PRIVATE KEY-----
diff --git a/tests/cert-svc/data/cert_chain/server.crt b/tests/cert-svc/data/cert_chain/server.crt
deleted file mode 100644 (file)
index 17d3a68..0000000
+++ /dev/null
@@ -1,65 +0,0 @@
-Certificate:
-    Data:
-        Version: 3 (0x2)
-        Serial Number: 5 (0x5)
-        Signature Algorithm: sha1WithRSAEncryption
-        Issuer: C=AU, ST=Some-State, O=Internet Widgits Pty Ltd, OU=chain5, CN=chain5/emailAddress=chain5
-        Validity
-            Not Before: May 13 01:23:13 2011 GMT
-            Not After : May 12 01:23:13 2012 GMT
-        Subject: C=AU, ST=Some-State, O=Internet Widgits Pty Ltd, OU=server, CN=server/emailAddress=server
-        Subject Public Key Info:
-            Public Key Algorithm: rsaEncryption
-            RSA Public Key: (1024 bit)
-                Modulus (1024 bit):
-                    00:d9:75:ea:49:42:39:98:26:0f:61:30:bd:f3:70:
-                    17:bd:ca:5b:1b:a1:31:68:9d:63:7e:a6:c5:1e:2e:
-                    1f:13:63:6b:ef:b0:23:b7:21:b6:1e:f7:65:f1:01:
-                    e7:1c:4a:c8:d1:15:20:e9:d4:cb:9d:b2:4c:57:b4:
-                    a8:4b:0e:e3:5b:54:16:10:51:3b:3f:af:51:e9:e3:
-                    d0:7d:1e:a3:30:59:dd:8e:8c:b5:69:02:5d:a3:5e:
-                    37:02:22:05:e2:6d:04:b8:fb:2b:33:d5:59:c9:e3:
-                    9e:74:59:65:b2:7f:03:e5:0c:dd:93:62:1a:55:94:
-                    4d:5c:e1:bd:cc:99:19:04:61
-                Exponent: 65537 (0x10001)
-        X509v3 extensions:
-            X509v3 Basic Constraints: 
-                CA:FALSE
-            Netscape Comment: 
-                OpenSSL Generated Certificate
-            X509v3 Subject Key Identifier: 
-                2E:EE:9A:24:CA:AA:22:7C:B3:7F:13:56:FC:A8:FC:06:0F:FB:63:7D
-            X509v3 Authority Key Identifier: 
-                DirName:/C=AU/ST=Some-State/O=Internet Widgits Pty Ltd/OU=chain4/CN=chain4/emailAddress=chain4
-                serial:04
-
-    Signature Algorithm: sha1WithRSAEncryption
-        d6:e7:97:51:80:37:cc:cf:b5:96:47:cc:4b:ca:62:f4:d1:43:
-        a1:d2:8b:9a:21:50:99:04:9f:c0:00:f1:0c:71:18:82:88:63:
-        9e:86:6c:a1:2c:25:0e:c1:30:32:db:02:5b:47:ae:8d:5e:ba:
-        0f:3d:16:84:39:c6:30:91:8d:b9:23:1b:a9:58:52:9c:49:81:
-        c9:87:e3:34:1d:dc:a0:dd:81:0b:1e:f6:d7:a7:2e:bd:dc:1c:
-        7b:d7:5c:0f:ec:da:09:81:45:36:63:76:e8:31:ba:cd:26:dc:
-        7a:80:18:c4:3e:be:14:14:07:dc:4b:1a:b5:c4:2c:38:10:f6:
-        13:84
------BEGIN CERTIFICATE-----
-MIIDZTCCAs6gAwIBAgIBBTANBgkqhkiG9w0BAQUFADB+MQswCQYDVQQGEwJBVTET
-MBEGA1UECBMKU29tZS1TdGF0ZTEhMB8GA1UEChMYSW50ZXJuZXQgV2lkZ2l0cyBQ
-dHkgTHRkMQ8wDQYDVQQLEwZjaGFpbjUxDzANBgNVBAMTBmNoYWluNTEVMBMGCSqG
-SIb3DQEJARYGY2hhaW41MB4XDTExMDUxMzAxMjMxM1oXDTEyMDUxMjAxMjMxM1ow
-fjELMAkGA1UEBhMCQVUxEzARBgNVBAgTClNvbWUtU3RhdGUxITAfBgNVBAoTGElu
-dGVybmV0IFdpZGdpdHMgUHR5IEx0ZDEPMA0GA1UECxMGc2VydmVyMQ8wDQYDVQQD
-EwZzZXJ2ZXIxFTATBgkqhkiG9w0BCQEWBnNlcnZlcjCBnzANBgkqhkiG9w0BAQEF
-AAOBjQAwgYkCgYEA2XXqSUI5mCYPYTC983AXvcpbG6ExaJ1jfqbFHi4fE2Nr77Aj
-tyG2Hvdl8QHnHErI0RUg6dTLnbJMV7SoSw7jW1QWEFE7P69R6ePQfR6jMFndjoy1
-aQJdo143AiIF4m0EuPsrM9VZyeOedFllsn8D5Qzdk2IaVZRNXOG9zJkZBGECAwEA
-AaOB8jCB7zAJBgNVHRMEAjAAMCwGCWCGSAGG+EIBDQQfFh1PcGVuU1NMIEdlbmVy
-YXRlZCBDZXJ0aWZpY2F0ZTAdBgNVHQ4EFgQULu6aJMqqInyzfxNW/Kj8Bg/7Y30w
-gZQGA1UdIwSBjDCBiaGBg6SBgDB+MQswCQYDVQQGEwJBVTETMBEGA1UECBMKU29t
-ZS1TdGF0ZTEhMB8GA1UEChMYSW50ZXJuZXQgV2lkZ2l0cyBQdHkgTHRkMQ8wDQYD
-VQQLEwZjaGFpbjQxDzANBgNVBAMTBmNoYWluNDEVMBMGCSqGSIb3DQEJARYGY2hh
-aW40ggEEMA0GCSqGSIb3DQEBBQUAA4GBANbnl1GAN8zPtZZHzEvKYvTRQ6HSi5oh
-UJkEn8AA8QxxGIKIY56GbKEsJQ7BMDLbAltHro1eug89FoQ5xjCRjbkjG6lYUpxJ
-gcmH4zQd3KDdgQse9tenLr3cHHvXXA/s2gmBRTZjdugxus0m3HqAGMQ+vhQUB9xL
-GrXELDgQ9hOE
------END CERTIFICATE-----
diff --git a/tests/cert-svc/data/invalidCert.der b/tests/cert-svc/data/invalidCert.der
deleted file mode 100644 (file)
index fd08360..0000000
+++ /dev/null
@@ -1,17 +0,0 @@
------BEGIN CERTIFICATE-----
-MIICpzCCAhCgAwIBAgIBADANBgkqhkiG9w0BAQUFADBbMQswCQYDVQQGEwJDUjEM
-MAoGA1UECBMDU1RSMQswCQYDVQQKEwJPUjEMMAoGA1UECxMDT1VSMQwwCgYDVQQD
-EwNDTlIxFTATBgkqhkiG9w0BCQEWBkVtYWlsUjAeFw0wNzEyMTkwNTE5MjBaFw0x
-MDEyMTgwNTE5MjBaMFsxCzAJBgNVBAYTAkNSMQwwCgYDVQQIEwNTVFIxCzAJBgNV
-BAoTAk9SMQwwCgYDVQQLEwNPVVIxDDAKBgNVBAMTA0NOUjEVMBMGCSqGSIb3DQEJ
-ARYGRW1haWxSMIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQDG2dhVCOuBD2i4
-mjWLU8vkQpRVylojbSzxvO3uynaOZAnhqLxu2F2ugR1NLJOlrgbjq13xCO4FjKZj
-eb4kln5HJl7GLCNz8ns2+kAtwiVfpZnQ8U6Y/1BLiB7sLH+ONB4g6Rm9cgST1e6H
-e/EJMkzU75+wkj94ORZ4TINDU4kU4QIDAQABo3sweTAJBgNVHRMEAjAAMCwGCWCG
-SAGG+EIBDQQfFh1PcGVuU1NMIEdlbmVyYXRlZCBDZXJ0aWZpY2F0ZTAdBgNVHQ4E
-FgQUX0cbXBYMGt9k4/HRapEA9XUlKk4wHwYDVR0jBBgwFoAUX0cbXBYMGt9k4/HR
-apEA9XUlKk4wDQYJKoZIhvcNAQEFBQADgYEAXyKHjF6k0yNY/og30g1+SsNxYNqC
-yzGEbCywXELFakhQ1qmx12VY6qkeo+khyuiRfp9cDx8sSQ2asypIYeO9ctRNmp4D
-lC8YNI7BdY/g4Xq7uy4BKeng8Mv8VNAtdBaKreJqSk5RvQmepXRiTJgo2DzGlCU5
-3aU1rQ6vF96wFt4=
------END CERTIFICATE-----
diff --git a/tests/cert-svc/data/newcert.pem b/tests/cert-svc/data/newcert.pem
deleted file mode 100644 (file)
index d960df3..0000000
+++ /dev/null
@@ -1,18 +0,0 @@
------BEGIN CERTIFICATE-----
-MIIC0DCCAjmgAwIBAgIBADANBgkqhkiG9w0BAQUFADCBiDELMAkGA1UEBhMCS1Ix
-FDASBgNVBAgTC0t5dW5nLWdpIGRvMRIwEAYDVQQHEwlTdS13b24gc2kxEDAOBgNV
-BAoTB1NhbXN1bmcxDDAKBgNVBAsTA0RNQzEQMA4GA1UEAxMHQ0EgY2VydDEdMBsG
-CSqGSIb3DQEJARYOY2FAc2Ftc3VuZy5jb20wHhcNMTEwNDAxMDgyNDAyWhcNMTIw
-MzMxMDgyNDAyWjBWMQswCQYDVQQGEwJLUjEUMBIGA1UECBMLS3l1bmctZ2kgZG8x
-EDAOBgNVBAoTB1NhbXN1bmcxDDAKBgNVBAsTA0RNQzERMA8GA1UEAxMIdGVzdHRl
-c3QwgZ8wDQYJKoZIhvcNAQEBBQADgY0AMIGJAoGBAOP+k1tVoVt6Sbvv/y41PP/2
-abO0S3EJW2p/twZ164Dzd7g21r63zUkBfD3pET0x2IL1N48QlTYwDj7bmzRH+i1v
-7Jxk4w6Op7Oho0mPjJ+Plvjfz5LCuwOOupw5V6TpZ2FtGaFcNWIK20BaLuZOyDAl
-m0HXGbfkuESZ9dayHvEtAgMBAAGjezB5MAkGA1UdEwQCMAAwLAYJYIZIAYb4QgEN
-BB8WHU9wZW5TU0wgR2VuZXJhdGVkIENlcnRpZmljYXRlMB0GA1UdDgQWBBQ6leM2
-NG1RdqMk7cmJ1IVi2Zjk+DAfBgNVHSMEGDAWgBTNauriVKaL7CMpmNmXIOmNU7GR
-hTANBgkqhkiG9w0BAQUFAAOBgQCU+c0daLk+AHvSOetVRVFkkY3VMnWw7RURD8CU
-FDkb+Kz6huYlvh9pfkGn7HmxjUARJ6UpxokZ69toOv1UB0Ix4kyT3CCvf0EcnrjG
-1fAYrROOhNYlntSTDcgwB2VzXSZ9WEAOBj/B+/nGb7gkkAmf++4FKTMQLZvg5gQr
-700V7Q==
------END CERTIFICATE-----
diff --git a/tests/cert-svc/data/notcert.der b/tests/cert-svc/data/notcert.der
deleted file mode 100644 (file)
index 408a3ee..0000000
+++ /dev/null
@@ -1,2 +0,0 @@
-afgnwthbgowjfkvbasdlkfgnaldfnglkwdafbkwjtghsghsfgusrfghadfht5ehadgfhsg
-hsfghsdrghsfh56h thdfghedrgrger[gfdghwdfhsadfhgsdfhasdfghasdfhsadfhgadfg
diff --git a/tests/cert-svc/data/pfx/pfxtest.crt b/tests/cert-svc/data/pfx/pfxtest.crt
deleted file mode 100644 (file)
index 70debc4..0000000
+++ /dev/null
@@ -1,17 +0,0 @@
------BEGIN CERTIFICATE-----
-MIICsDCCAhmgAwIBAgIJAN8GoBDEijurMA0GCSqGSIb3DQEBBQUAMEUxCzAJBgNV
-BAYTAkFVMRMwEQYDVQQIEwpTb21lLVN0YXRlMSEwHwYDVQQKExhJbnRlcm5ldCBX
-aWRnaXRzIFB0eSBMdGQwHhcNMTEwNTE5MDExMzEyWhcNMTIwNTE4MDExMzEyWjBF
-MQswCQYDVQQGEwJBVTETMBEGA1UECBMKU29tZS1TdGF0ZTEhMB8GA1UEChMYSW50
-ZXJuZXQgV2lkZ2l0cyBQdHkgTHRkMIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKB
-gQDQXOd31QayaocvkpRZgLPd0d+bUaoMWQE5t6NtgKmvC83o3qZFoigKjox2BeTx
-+ywyhAMiLpob2Hn3Rl4OuKFIUiEn6xdpW+29HeenxK2cZRVmfdsqylqpkdfi3fQY
-aIDp4Z+aHXaVAN/5hz5UtRHKlMaz+euTLd6BhQPQX0txFwIDAQABo4GnMIGkMB0G
-A1UdDgQWBBSsnqdXF5mOVx9EXUG/y7O7nRjIWTB1BgNVHSMEbjBsgBSsnqdXF5mO
-Vx9EXUG/y7O7nRjIWaFJpEcwRTELMAkGA1UEBhMCQVUxEzARBgNVBAgTClNvbWUt
-U3RhdGUxITAfBgNVBAoTGEludGVybmV0IFdpZGdpdHMgUHR5IEx0ZIIJAN8GoBDE
-ijurMAwGA1UdEwQFMAMBAf8wDQYJKoZIhvcNAQEFBQADgYEAzkDAU7L/iIuweO2n
-2AoFzTX9sIk+1vq5CC5jtgCOe9Sa92TJcKDOySxpZJz5gpW+bZi+BjNbYiSqMASg
-whlY63X+i0Ea5RKZTkoQZLfWw+dKKIlSqJfixkUPScOn7mmDM8sCMMXNJ/KaZqRK
-Ojl5x1BXedyIzOzk/7Dcz2jGQUs=
------END CERTIFICATE-----
diff --git a/tests/cert-svc/data/pfx/pfxtest.key b/tests/cert-svc/data/pfx/pfxtest.key
deleted file mode 100644 (file)
index 0b3afa9..0000000
+++ /dev/null
@@ -1,15 +0,0 @@
------BEGIN RSA PRIVATE KEY-----
-MIICXgIBAAKBgQDQXOd31QayaocvkpRZgLPd0d+bUaoMWQE5t6NtgKmvC83o3qZF
-oigKjox2BeTx+ywyhAMiLpob2Hn3Rl4OuKFIUiEn6xdpW+29HeenxK2cZRVmfdsq
-ylqpkdfi3fQYaIDp4Z+aHXaVAN/5hz5UtRHKlMaz+euTLd6BhQPQX0txFwIDAQAB
-AoGBAMJNAGSUuGwEPxAzxjc4d4Jwxe4W11YwYZ4rCzF/+7wKa/euOKtSrbg6ee1N
-TdQBf5OT20Ay6O7yjbnzWp6ruWkCbTtRSd2GY/hUP+o0XEEeyRAEvWD6UCeWlUy9
-Geu8ePe30O6tvdBdS33+Y1OLHbSyA6UobT040HwiLOeKX67BAkEA8AAKZvtiuJmm
-muMkja4arMs1iGEezvMqBLhcqmqB4IOMbOWGgXUpdz/RVU8bkv6aoz7MmcIAyr+h
-POLh84mXZwJBAN5A7UQmBGiPd3eMI3012wf2N6MGbRk/5ZkVOO5q/0kPq3Mqdmfi
-oZpqUOLvTqdeYPJCIPKN3SAMne9v4oCautECQQDYVgEKcUG8yuvuJB+4Ap+S8J3x
-sDH4NCLFHHaTOuyVt56mLoN/QGA/WOxWLLfbWduEmUAOvVy/ZdtuqckpIPazAkBE
-RQdczpy+DYux8h8YoAlm2a/faOLsRZ9eNZGmUsGWDLUqjBmQ8aGYUB4Gh2HOsYPw
-BnYea4tIA/gji2e0/1JxAkEAswhUY3QeaXIawxdnswmeHu5KUhiM2LZXSo+DoOf2
-vNDPZviZX2LaZ79i1na3JkFaYJvLSemBICbLwWC/3GgOAg==
------END RSA PRIVATE KEY-----
diff --git a/tests/cert-svc/data/pfx/pfxtest.pfx b/tests/cert-svc/data/pfx/pfxtest.pfx
deleted file mode 100644 (file)
index e1f7168..0000000
Binary files a/tests/cert-svc/data/pfx/pfxtest.pfx and /dev/null differ
diff --git a/tests/cert-svc/data/pfx/temp/server.crt b/tests/cert-svc/data/pfx/temp/server.crt
deleted file mode 100644 (file)
index 17d3a68..0000000
+++ /dev/null
@@ -1,65 +0,0 @@
-Certificate:
-    Data:
-        Version: 3 (0x2)
-        Serial Number: 5 (0x5)
-        Signature Algorithm: sha1WithRSAEncryption
-        Issuer: C=AU, ST=Some-State, O=Internet Widgits Pty Ltd, OU=chain5, CN=chain5/emailAddress=chain5
-        Validity
-            Not Before: May 13 01:23:13 2011 GMT
-            Not After : May 12 01:23:13 2012 GMT
-        Subject: C=AU, ST=Some-State, O=Internet Widgits Pty Ltd, OU=server, CN=server/emailAddress=server
-        Subject Public Key Info:
-            Public Key Algorithm: rsaEncryption
-            RSA Public Key: (1024 bit)
-                Modulus (1024 bit):
-                    00:d9:75:ea:49:42:39:98:26:0f:61:30:bd:f3:70:
-                    17:bd:ca:5b:1b:a1:31:68:9d:63:7e:a6:c5:1e:2e:
-                    1f:13:63:6b:ef:b0:23:b7:21:b6:1e:f7:65:f1:01:
-                    e7:1c:4a:c8:d1:15:20:e9:d4:cb:9d:b2:4c:57:b4:
-                    a8:4b:0e:e3:5b:54:16:10:51:3b:3f:af:51:e9:e3:
-                    d0:7d:1e:a3:30:59:dd:8e:8c:b5:69:02:5d:a3:5e:
-                    37:02:22:05:e2:6d:04:b8:fb:2b:33:d5:59:c9:e3:
-                    9e:74:59:65:b2:7f:03:e5:0c:dd:93:62:1a:55:94:
-                    4d:5c:e1:bd:cc:99:19:04:61
-                Exponent: 65537 (0x10001)
-        X509v3 extensions:
-            X509v3 Basic Constraints: 
-                CA:FALSE
-            Netscape Comment: 
-                OpenSSL Generated Certificate
-            X509v3 Subject Key Identifier: 
-                2E:EE:9A:24:CA:AA:22:7C:B3:7F:13:56:FC:A8:FC:06:0F:FB:63:7D
-            X509v3 Authority Key Identifier: 
-                DirName:/C=AU/ST=Some-State/O=Internet Widgits Pty Ltd/OU=chain4/CN=chain4/emailAddress=chain4
-                serial:04
-
-    Signature Algorithm: sha1WithRSAEncryption
-        d6:e7:97:51:80:37:cc:cf:b5:96:47:cc:4b:ca:62:f4:d1:43:
-        a1:d2:8b:9a:21:50:99:04:9f:c0:00:f1:0c:71:18:82:88:63:
-        9e:86:6c:a1:2c:25:0e:c1:30:32:db:02:5b:47:ae:8d:5e:ba:
-        0f:3d:16:84:39:c6:30:91:8d:b9:23:1b:a9:58:52:9c:49:81:
-        c9:87:e3:34:1d:dc:a0:dd:81:0b:1e:f6:d7:a7:2e:bd:dc:1c:
-        7b:d7:5c:0f:ec:da:09:81:45:36:63:76:e8:31:ba:cd:26:dc:
-        7a:80:18:c4:3e:be:14:14:07:dc:4b:1a:b5:c4:2c:38:10:f6:
-        13:84
------BEGIN CERTIFICATE-----
-MIIDZTCCAs6gAwIBAgIBBTANBgkqhkiG9w0BAQUFADB+MQswCQYDVQQGEwJBVTET
-MBEGA1UECBMKU29tZS1TdGF0ZTEhMB8GA1UEChMYSW50ZXJuZXQgV2lkZ2l0cyBQ
-dHkgTHRkMQ8wDQYDVQQLEwZjaGFpbjUxDzANBgNVBAMTBmNoYWluNTEVMBMGCSqG
-SIb3DQEJARYGY2hhaW41MB4XDTExMDUxMzAxMjMxM1oXDTEyMDUxMjAxMjMxM1ow
-fjELMAkGA1UEBhMCQVUxEzARBgNVBAgTClNvbWUtU3RhdGUxITAfBgNVBAoTGElu
-dGVybmV0IFdpZGdpdHMgUHR5IEx0ZDEPMA0GA1UECxMGc2VydmVyMQ8wDQYDVQQD
-EwZzZXJ2ZXIxFTATBgkqhkiG9w0BCQEWBnNlcnZlcjCBnzANBgkqhkiG9w0BAQEF
-AAOBjQAwgYkCgYEA2XXqSUI5mCYPYTC983AXvcpbG6ExaJ1jfqbFHi4fE2Nr77Aj
-tyG2Hvdl8QHnHErI0RUg6dTLnbJMV7SoSw7jW1QWEFE7P69R6ePQfR6jMFndjoy1
-aQJdo143AiIF4m0EuPsrM9VZyeOedFllsn8D5Qzdk2IaVZRNXOG9zJkZBGECAwEA
-AaOB8jCB7zAJBgNVHRMEAjAAMCwGCWCGSAGG+EIBDQQfFh1PcGVuU1NMIEdlbmVy
-YXRlZCBDZXJ0aWZpY2F0ZTAdBgNVHQ4EFgQULu6aJMqqInyzfxNW/Kj8Bg/7Y30w
-gZQGA1UdIwSBjDCBiaGBg6SBgDB+MQswCQYDVQQGEwJBVTETMBEGA1UECBMKU29t
-ZS1TdGF0ZTEhMB8GA1UEChMYSW50ZXJuZXQgV2lkZ2l0cyBQdHkgTHRkMQ8wDQYD
-VQQLEwZjaGFpbjQxDzANBgNVBAMTBmNoYWluNDEVMBMGCSqGSIb3DQEJARYGY2hh
-aW40ggEEMA0GCSqGSIb3DQEBBQUAA4GBANbnl1GAN8zPtZZHzEvKYvTRQ6HSi5oh
-UJkEn8AA8QxxGIKIY56GbKEsJQ7BMDLbAltHro1eug89FoQ5xjCRjbkjG6lYUpxJ
-gcmH4zQd3KDdgQse9tenLr3cHHvXXA/s2gmBRTZjdugxus0m3HqAGMQ+vhQUB9xL
-GrXELDgQ9hOE
------END CERTIFICATE-----
diff --git a/tests/cert-svc/data/pfx/temp/server.key b/tests/cert-svc/data/pfx/temp/server.key
deleted file mode 100644 (file)
index 5f76b2e..0000000
+++ /dev/null
@@ -1,15 +0,0 @@
------BEGIN RSA PRIVATE KEY-----
-MIICXQIBAAKBgQDZdepJQjmYJg9hML3zcBe9ylsboTFonWN+psUeLh8TY2vvsCO3
-IbYe92XxAeccSsjRFSDp1MudskxXtKhLDuNbVBYQUTs/r1Hp49B9HqMwWd2OjLVp
-Al2jXjcCIgXibQS4+ysz1VnJ4550WWWyfwPlDN2TYhpVlE1c4b3MmRkEYQIDAQAB
-AoGAGiCCr56XUOJxwpmamN8E2zauz5kEWK9gPt1GnaOo9Clj1H5zLBOO0BWlV9mE
-rO+HRSemtrFsbVv4tCjud2Yohp2yAAe8nnW33Xf4KDLZ62wtP5HCXaIoNZKmTnpC
-QHc2I/k674jUGE4tCvrYwg0CJQQrpTpXizA8YECudxZ48okCQQD9gKVPdlBeEsF2
-OVKHF//n1LI6+2cD9sWoPzdXayVcpemDyTl+GIQYhqZDVWsMj6DvfOHHlNZdYGr2
-XrmCbvCvAkEA25peZpnAnnwcqgKUrbaNKq5rmYPtbdu5I6rloMUs/OiO2lHkXs9Q
-QN904G1dTYOcaEOVH5nMuwD04Es/7Lj/7wJBALE9SddV9Hjhiivbhiz4Ba8UUgzV
-C0CFP8sTb+EKA9RUGAFRJoZYI7t2ITcAuNjObwoieUVudbZRnFdnATMF1/cCQQCF
-SEvDOc4OYoWDKc3TINjM7s+ffNK9un3DiBWWXhXP6dXJ66oPYQP0W6s0Cyx1v0tO
-fLYlV9NKLGpzNzi1FBNBAkAO4WRyZXBK9BVBLyfJq77uptlLZW71yl2X1oSklFyM
-MpLH4u1SJorRypt7MsxPgcF4pAZSs/TWaCmx8nmSBcEE
------END RSA PRIVATE KEY-----
diff --git a/tests/cert-svc/data/pfx/temp/server.pfx b/tests/cert-svc/data/pfx/temp/server.pfx
deleted file mode 100644 (file)
index b08b0b0..0000000
Binary files a/tests/cert-svc/data/pfx/temp/server.pfx and /dev/null differ
diff --git a/tests/cert-svc/data/pfx/temp/temp.crt b/tests/cert-svc/data/pfx/temp/temp.crt
deleted file mode 100644 (file)
index 9f5d2fe..0000000
+++ /dev/null
@@ -1,25 +0,0 @@
-Bag Attributes
-    localKeyID: 36 5A C4 1E 25 04 62 BD 9A E0 42 59 82 36 DD 24 FE AD 83 A0 
-subject=/C=AU/ST=Some-State/O=Internet Widgits Pty Ltd/OU=server/CN=server/emailAddress=server
-issuer=/C=AU/ST=Some-State/O=Internet Widgits Pty Ltd/OU=chain5/CN=chain5/emailAddress=chain5
------BEGIN CERTIFICATE-----
-MIIDZTCCAs6gAwIBAgIBBTANBgkqhkiG9w0BAQUFADB+MQswCQYDVQQGEwJBVTET
-MBEGA1UECBMKU29tZS1TdGF0ZTEhMB8GA1UEChMYSW50ZXJuZXQgV2lkZ2l0cyBQ
-dHkgTHRkMQ8wDQYDVQQLEwZjaGFpbjUxDzANBgNVBAMTBmNoYWluNTEVMBMGCSqG
-SIb3DQEJARYGY2hhaW41MB4XDTExMDUxMzAxMjMxM1oXDTEyMDUxMjAxMjMxM1ow
-fjELMAkGA1UEBhMCQVUxEzARBgNVBAgTClNvbWUtU3RhdGUxITAfBgNVBAoTGElu
-dGVybmV0IFdpZGdpdHMgUHR5IEx0ZDEPMA0GA1UECxMGc2VydmVyMQ8wDQYDVQQD
-EwZzZXJ2ZXIxFTATBgkqhkiG9w0BCQEWBnNlcnZlcjCBnzANBgkqhkiG9w0BAQEF
-AAOBjQAwgYkCgYEA2XXqSUI5mCYPYTC983AXvcpbG6ExaJ1jfqbFHi4fE2Nr77Aj
-tyG2Hvdl8QHnHErI0RUg6dTLnbJMV7SoSw7jW1QWEFE7P69R6ePQfR6jMFndjoy1
-aQJdo143AiIF4m0EuPsrM9VZyeOedFllsn8D5Qzdk2IaVZRNXOG9zJkZBGECAwEA
-AaOB8jCB7zAJBgNVHRMEAjAAMCwGCWCGSAGG+EIBDQQfFh1PcGVuU1NMIEdlbmVy
-YXRlZCBDZXJ0aWZpY2F0ZTAdBgNVHQ4EFgQULu6aJMqqInyzfxNW/Kj8Bg/7Y30w
-gZQGA1UdIwSBjDCBiaGBg6SBgDB+MQswCQYDVQQGEwJBVTETMBEGA1UECBMKU29t
-ZS1TdGF0ZTEhMB8GA1UEChMYSW50ZXJuZXQgV2lkZ2l0cyBQdHkgTHRkMQ8wDQYD
-VQQLEwZjaGFpbjQxDzANBgNVBAMTBmNoYWluNDEVMBMGCSqGSIb3DQEJARYGY2hh
-aW40ggEEMA0GCSqGSIb3DQEBBQUAA4GBANbnl1GAN8zPtZZHzEvKYvTRQ6HSi5oh
-UJkEn8AA8QxxGIKIY56GbKEsJQ7BMDLbAltHro1eug89FoQ5xjCRjbkjG6lYUpxJ
-gcmH4zQd3KDdgQse9tenLr3cHHvXXA/s2gmBRTZjdugxus0m3HqAGMQ+vhQUB9xL
-GrXELDgQ9hOE
------END CERTIFICATE-----
diff --git a/tests/cert-svc/data/pfx/temp/temp.key b/tests/cert-svc/data/pfx/temp/temp.key
deleted file mode 100644 (file)
index 2aa8089..0000000
+++ /dev/null
@@ -1,18 +0,0 @@
-Bag Attributes
-    localKeyID: 36 5A C4 1E 25 04 62 BD 9A E0 42 59 82 36 DD 24 FE AD 83 A0 
-Key Attributes: <No Attributes>
------BEGIN RSA PRIVATE KEY-----
-MIICXQIBAAKBgQDZdepJQjmYJg9hML3zcBe9ylsboTFonWN+psUeLh8TY2vvsCO3
-IbYe92XxAeccSsjRFSDp1MudskxXtKhLDuNbVBYQUTs/r1Hp49B9HqMwWd2OjLVp
-Al2jXjcCIgXibQS4+ysz1VnJ4550WWWyfwPlDN2TYhpVlE1c4b3MmRkEYQIDAQAB
-AoGAGiCCr56XUOJxwpmamN8E2zauz5kEWK9gPt1GnaOo9Clj1H5zLBOO0BWlV9mE
-rO+HRSemtrFsbVv4tCjud2Yohp2yAAe8nnW33Xf4KDLZ62wtP5HCXaIoNZKmTnpC
-QHc2I/k674jUGE4tCvrYwg0CJQQrpTpXizA8YECudxZ48okCQQD9gKVPdlBeEsF2
-OVKHF//n1LI6+2cD9sWoPzdXayVcpemDyTl+GIQYhqZDVWsMj6DvfOHHlNZdYGr2
-XrmCbvCvAkEA25peZpnAnnwcqgKUrbaNKq5rmYPtbdu5I6rloMUs/OiO2lHkXs9Q
-QN904G1dTYOcaEOVH5nMuwD04Es/7Lj/7wJBALE9SddV9Hjhiivbhiz4Ba8UUgzV
-C0CFP8sTb+EKA9RUGAFRJoZYI7t2ITcAuNjObwoieUVudbZRnFdnATMF1/cCQQCF
-SEvDOc4OYoWDKc3TINjM7s+ffNK9un3DiBWWXhXP6dXJ66oPYQP0W6s0Cyx1v0tO
-fLYlV9NKLGpzNzi1FBNBAkAO4WRyZXBK9BVBLyfJq77uptlLZW71yl2X1oSklFyM
-MpLH4u1SJorRypt7MsxPgcF4pAZSs/TWaCmx8nmSBcEE
------END RSA PRIVATE KEY-----
diff --git a/tests/cert-svc/data/rootcert.pem b/tests/cert-svc/data/rootcert.pem
deleted file mode 100644 (file)
index 5c3ef72..0000000
+++ /dev/null
@@ -1,21 +0,0 @@
------BEGIN CERTIFICATE-----
-MIIDgTCCAuqgAwIBAgIJAMU+zh6oJmrXMA0GCSqGSIb3DQEBBQUAMIGIMQswCQYD
-VQQGEwJLUjEUMBIGA1UECBMLS3l1bmctZ2kgZG8xEjAQBgNVBAcTCVN1LXdvbiBz
-aTEQMA4GA1UEChMHU2Ftc3VuZzEMMAoGA1UECxMDRE1DMRAwDgYDVQQDEwdDQSBj
-ZXJ0MR0wGwYJKoZIhvcNAQkBFg5jYUBzYW1zdW5nLmNvbTAeFw0xMTAzMjkwMjQ1
-MzhaFw0xMjAzMjgwMjQ1MzhaMIGIMQswCQYDVQQGEwJLUjEUMBIGA1UECBMLS3l1
-bmctZ2kgZG8xEjAQBgNVBAcTCVN1LXdvbiBzaTEQMA4GA1UEChMHU2Ftc3VuZzEM
-MAoGA1UECxMDRE1DMRAwDgYDVQQDEwdDQSBjZXJ0MR0wGwYJKoZIhvcNAQkBFg5j
-YUBzYW1zdW5nLmNvbTCBnzANBgkqhkiG9w0BAQEFAAOBjQAwgYkCgYEAwTDwxz9h
-2KaO4X29eKQxT3XCNRMnzSpx62rNLLGaXYrOMYHQcUDOkwEFRw4fV4yxqXgwk7Bv
-4C+anNX2jN6SkYGEj4mGDVrE0jaI60X04tf3fAb0Ltw2PEgKsB56X75PNAxGP8oh
-/y6fysoCAEyNhoYnwEsRrSfWY8iAm+hKAxUCAwEAAaOB8DCB7TAdBgNVHQ4EFgQU
-zWrq4lSmi+wjKZjZlyDpjVOxkYUwgb0GA1UdIwSBtTCBsoAUzWrq4lSmi+wjKZjZ
-lyDpjVOxkYWhgY6kgYswgYgxCzAJBgNVBAYTAktSMRQwEgYDVQQIEwtLeXVuZy1n
-aSBkbzESMBAGA1UEBxMJU3Utd29uIHNpMRAwDgYDVQQKEwdTYW1zdW5nMQwwCgYD
-VQQLEwNETUMxEDAOBgNVBAMTB0NBIGNlcnQxHTAbBgkqhkiG9w0BCQEWDmNhQHNh
-bXN1bmcuY29tggkAxT7OHqgmatcwDAYDVR0TBAUwAwEB/zANBgkqhkiG9w0BAQUF
-AAOBgQB6dqH4U00mnavG0bUVTjhEwYbdQtpSc+fKB3+O9QY4PlLttyd3GfeKmsxe
-Z2RwUtUd3vjEDNPROcDAow6bHdy4B++qoojKVj1INJI0iDG/i6NUnDofsH+NS7mW
-J6FKF6ukwnTfk2HjvIfrLO6S8nSVa1dSoB2GHzg2kWgm36a9pw==
------END CERTIFICATE-----
diff --git a/tests/cert-svc/data/signing/chain1.crt b/tests/cert-svc/data/signing/chain1.crt
deleted file mode 100644 (file)
index a80bbbc..0000000
+++ /dev/null
@@ -1,52 +0,0 @@
-Certificate:
-    Data:
-        Version: 3 (0x2)
-        Serial Number: 0 (0x0)
-        Signature Algorithm: sha1WithRSAEncryption
-        Issuer: C=AU, ST=Some-State, L=root, O=Internet Widgits Pty Ltd, OU=root, CN=root/emailAddress=root
-        Validity
-            Not Before: May 13 01:21:41 2011 GMT
-            Not After : May 12 01:21:41 2012 GMT
-        Subject: C=AU, ST=Some-State, O=Internet Widgits Pty Ltd, OU=chain1, CN=chain1/emailAddress=chain1
-        Subject Public Key Info:
-            Public Key Algorithm: rsaEncryption
-            RSA Public Key: (1024 bit)
-                Modulus (1024 bit):
-                    00:ae:6d:d3:18:3f:b2:63:ab:fb:72:ce:ff:9a:8b:
-                    07:4a:52:c5:99:0e:9e:5c:68:ce:82:67:07:7a:27:
-                    11:98:a7:fe:3a:68:3f:4e:4b:74:d4:a5:77:15:87:
-                    7e:9c:9f:10:82:2f:1c:e3:c0:c7:1e:8b:35:ab:3a:
-                    f6:13:44:81:43:22:a7:fa:06:36:9c:55:53:7a:9d:
-                    18:9b:a0:f4:93:58:50:2c:cd:ab:ec:32:2f:fa:4f:
-                    ff:6e:6a:68:75:15:76:e1:b1:e1:67:f9:13:0a:d0:
-                    9b:db:12:b9:fd:dd:51:19:e4:63:d0:d0:56:b5:6a:
-                    00:a5:03:68:e7:77:21:b0:f9
-                Exponent: 65537 (0x10001)
-        X509v3 extensions:
-            X509v3 Basic Constraints: 
-                CA:TRUE
-    Signature Algorithm: sha1WithRSAEncryption
-        01:d3:3c:dc:a0:62:14:99:b8:b1:99:cf:0c:4a:50:2b:f7:1e:
-        56:f6:de:ce:80:b4:32:bb:0c:5c:45:b7:78:e5:27:ee:90:0c:
-        a0:db:ef:32:85:85:08:c6:4a:e6:22:7b:56:61:d5:b4:4e:a1:
-        7e:ed:60:c2:bf:bc:51:89:9a:b1:73:c2:e0:bb:3d:4e:fa:6f:
-        3e:32:b5:7f:b4:bc:0f:8a:ca:7d:f0:bf:da:b1:12:23:0e:cc:
-        57:e5:58:7c:23:38:b1:d8:b2:13:d8:6a:0d:20:bd:e9:66:51:
-        2d:e6:57:a1:33:17:69:6d:21:9f:18:37:23:6c:ca:0e:b0:c4:
-        47:86
------BEGIN CERTIFICATE-----
-MIICjDCCAfWgAwIBAgIBADANBgkqhkiG9w0BAQUFADCBhzELMAkGA1UEBhMCQVUx
-EzARBgNVBAgTClNvbWUtU3RhdGUxDTALBgNVBAcTBHJvb3QxITAfBgNVBAoTGElu
-dGVybmV0IFdpZGdpdHMgUHR5IEx0ZDENMAsGA1UECxMEcm9vdDENMAsGA1UEAxME
-cm9vdDETMBEGCSqGSIb3DQEJARYEcm9vdDAeFw0xMTA1MTMwMTIxNDFaFw0xMjA1
-MTIwMTIxNDFaMH4xCzAJBgNVBAYTAkFVMRMwEQYDVQQIEwpTb21lLVN0YXRlMSEw
-HwYDVQQKExhJbnRlcm5ldCBXaWRnaXRzIFB0eSBMdGQxDzANBgNVBAsTBmNoYWlu
-MTEPMA0GA1UEAxMGY2hhaW4xMRUwEwYJKoZIhvcNAQkBFgZjaGFpbjEwgZ8wDQYJ
-KoZIhvcNAQEBBQADgY0AMIGJAoGBAK5t0xg/smOr+3LO/5qLB0pSxZkOnlxozoJn
-B3onEZin/jpoP05LdNSldxWHfpyfEIIvHOPAxx6LNas69hNEgUMip/oGNpxVU3qd
-GJug9JNYUCzNq+wyL/pP/25qaHUVduGx4Wf5EwrQm9sSuf3dURnkY9DQVrVqAKUD
-aOd3IbD5AgMBAAGjEDAOMAwGA1UdEwQFMAMBAf8wDQYJKoZIhvcNAQEFBQADgYEA
-AdM83KBiFJm4sZnPDEpQK/ceVvbezoC0MrsMXEW3eOUn7pAMoNvvMoWFCMZK5iJ7
-VmHVtE6hfu1gwr+8UYmasXPC4Ls9TvpvPjK1f7S8D4rKffC/2rESIw7MV+VYfCM4
-sdiyE9hqDSC96WZRLeZXoTMXaW0hnxg3I2zKDrDER4Y=
------END CERTIFICATE-----
diff --git a/tests/cert-svc/data/signing/chain1.key b/tests/cert-svc/data/signing/chain1.key
deleted file mode 100644 (file)
index 8fe8106..0000000
+++ /dev/null
@@ -1,15 +0,0 @@
------BEGIN RSA PRIVATE KEY-----
-MIICXAIBAAKBgQCubdMYP7Jjq/tyzv+aiwdKUsWZDp5caM6CZwd6JxGYp/46aD9O
-S3TUpXcVh36cnxCCLxzjwMceizWrOvYTRIFDIqf6BjacVVN6nRiboPSTWFAszavs
-Mi/6T/9uamh1FXbhseFn+RMK0JvbErn93VEZ5GPQ0Fa1agClA2jndyGw+QIDAQAB
-AoGATPoWoKrrlOT/EMmdL5yPWRNyNHupE2sFR7MkL5oyP8ZTgX8kAO933agwB4ZG
-L+RaqrkT7MbUmPwicTCSDCq9SCLSL+fQS/hujdRbsBhnLTuAiaIblmpDYO5z6Rma
-tUXnImdvKROpYmBNNzFzDlj0686KahdYGXJOTFYSST3QHEkCQQDap3/5ursNj1NY
-dehaiUhYD3mOqgrj/MhN+JHNR6Eb3qQQ1Aa/rQmEkPnmopNy7qc/B+6Y4CMxNLkM
-bHSyre2/AkEAzDibGZCBct4slqyuPyZTfgh3UQSaCQ4CSF7HG/Pj/ZeHqDnKoxR7
-v//WZy5gxHZ7CrSWM/laNOd6svdtQs1/RwJBAJ1UMK1MQxN6sYnRLSMX7MoQOHMC
-v1tUo/wWgzKl+7LF/F9vcHuy0kpk1quxB0+HkSe1WWT+wdPCD/R0hXOb2pkCQFt0
-ehjfuujbEDLF0B6dpkRJvE0+91BYwrLwJtCgzxgQ1QKEJvgTQzv/cV+xyEoTGRT5
-PE64Oyp4A13EKl0BNB8CQF7C0zzEBE/MngPizBU6KEfo47c0hD57IUVGcIA3juwm
-AELZem13BOjaDk9CEZppfk1lpdU0ZKmkIodlDwLVgLE=
------END RSA PRIVATE KEY-----
diff --git a/tests/cert-svc/data/signing/chain1pub.pem b/tests/cert-svc/data/signing/chain1pub.pem
deleted file mode 100644 (file)
index 80c3a5f..0000000
+++ /dev/null
@@ -1,6 +0,0 @@
------BEGIN PUBLIC KEY-----
-MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQCubdMYP7Jjq/tyzv+aiwdKUsWZ
-Dp5caM6CZwd6JxGYp/46aD9OS3TUpXcVh36cnxCCLxzjwMceizWrOvYTRIFDIqf6
-BjacVVN6nRiboPSTWFAszavsMi/6T/9uamh1FXbhseFn+RMK0JvbErn93VEZ5GPQ
-0Fa1agClA2jndyGw+QIDAQAB
------END PUBLIC KEY-----
diff --git a/tests/cert-svc/data/signing/msg b/tests/cert-svc/data/signing/msg
deleted file mode 100644 (file)
index 9d8a4e7..0000000
+++ /dev/null
@@ -1 +0,0 @@
-this is test file
diff --git a/tests/cert-svc/data/signing/msg.sig b/tests/cert-svc/data/signing/msg.sig
deleted file mode 100644 (file)
index 5139633..0000000
+++ /dev/null
@@ -1,3 +0,0 @@
-+Y\87K~\9f³bê\ 2\94\11PP\13[íÀ\13l\91È\9aÚâþ\97áyH`3Ã\\90U\8e\fA¬oJI\88QO-8\8f®Õ¹¸\f
-|1\11m\ 5\f\90Y·      \8a2U\98NJÒ\83ÂîvÍ\e&Ñïj\rA\1d\83\8f\9dìñz\13\15;î)z«qºÏÂ#<2ÀY\14\ 5\8c\7f4M\ 4\ 44îà
-!!(°:J\98
\ No newline at end of file
diff --git a/tests/cert-svc/data/signing/msg.sig.enc b/tests/cert-svc/data/signing/msg.sig.enc
deleted file mode 100644 (file)
index fb2c0b8..0000000
+++ /dev/null
@@ -1,3 +0,0 @@
-K1mHS36fs2LqApQRUFATW+3AE2yRyJra4v6X4XlIYDPDXJBVjgxBrG9KSYhRTy04
-j67VubgMCnwxEW0FDJBZtwmKMlWYTkrSg8Luds0bJtHvag1BHYOPVMOd7PF6ExU7
-7il6q3G6z8IjPDLAWRQFjH80TQQENO7gCiEhKLA6Spg=
diff --git a/tests/cert-svc/data/signing/msg2 b/tests/cert-svc/data/signing/msg2
deleted file mode 100644 (file)
index 1af9cc6..0000000
+++ /dev/null
@@ -1 +0,0 @@
-this is test2
diff --git a/tests/cert-svc/delete_test.c b/tests/cert-svc/delete_test.c
deleted file mode 100644 (file)
index 35e84f1..0000000
+++ /dev/null
@@ -1,102 +0,0 @@
-#include <stdio.h>
-#include <unistd.h>
-
-#include "cert-service.h"
-
-#define        RELATIVE_PATH   "./data/Broot.der"
-#define ABSOLUTE_PATH  "./data/Broot.der"      // for target
-
-int tcase_1_success()
-{
-       int ret = CERT_SVC_ERR_NO_ERROR;
-
-       // delete 'Broot.der' from '.../code-signing/java/operator'
-       ret = cert_svc_delete_certificate_from_store("Broot.der", "code-signing_java_operator");
-       if(ret == CERT_SVC_ERR_NO_ERROR) {
-               if((access("/usr/share/cert-svc/certs/code-signing/java/operator/Broot.der", F_OK)) != 0)
-                       return 0;
-               else
-                       return -1;
-       }
-       else
-               return -1;
-}
-
-int tcase_2_success()
-{
-       int ret = CERT_SVC_ERR_NO_ERROR;
-
-       // delete 'Broot.der' from '.../ssl'
-       ret = cert_svc_delete_certificate_from_store("Broot.der", NULL);
-       if(ret == CERT_SVC_ERR_NO_ERROR) {
-               if((access("/usr/share/cert-svc/certs/ssl/Broot.der", F_OK)) != 0)
-                       return 0;
-               else
-                       return -1;
-       }
-       else
-               return -1;
-}
-
-int tcase_3_fail()
-{
-       int ret = CERT_SVC_ERR_NO_ERROR;
-
-       // delete NULL 
-       ret = cert_svc_delete_certificate_from_store(NULL, "code-signing_java_operator");
-       if(ret == CERT_SVC_ERR_INVALID_PARAMETER)
-               return 0;
-       else
-               return -1;
-}
-
-int tcase_4_fail()
-{
-       int ret = CERT_SVC_ERR_NO_ERROR;
-
-       // delete 'Broot.der' from invalid directory
-       ret = cert_svc_delete_certificate_from_store("Broot.der", "code-signing_debian");
-       if(ret == CERT_SVC_ERR_FILE_IO)
-               return 0;
-       else
-               return -1;
-}
-
-int main(void)
-{
-       int ret = -1;
-
-       // store test files
-       cert_svc_add_certificate_to_store(RELATIVE_PATH, "code-signing_java_operator");
-       cert_svc_add_certificate_to_store(RELATIVE_PATH, NULL);
-
-       // test case 1 : success
-       ret = tcase_1_success();
-       if(ret == 0)
-               fprintf(stdout, "** Success to delete test 1 - testpath: code-signing **\n");
-       else
-               fprintf(stdout, "** Fail to delete test1 **\n");
-
-       // test case 2 : success - no location (ssl)
-       ret = tcase_2_success();
-       if(ret == 0)
-               fprintf(stdout, "** Success to delete test 2 - testpath: ssl **\n");
-       else
-               fprintf(stdout, "** Fail to delete test2 **\n");
-
-       // test case 3 : fail - no filename
-       ret = tcase_3_fail();
-       if(ret == 0)
-               fprintf(stdout, "** Success to delete test 3 - no filename **\n");
-       else
-               fprintf(stdout, "** Fail to delete test3 **\n");
-
-       // test case 4 : fail - invalid dir name
-       ret = tcase_4_fail();
-       if(ret == 0)
-               fprintf(stdout, "** Success to delete test 4 - invalid dir path  **\n");
-       else
-               fprintf(stdout, "** Fail to delete test4 **\n");
-
-       return 0;
-}
diff --git a/tests/cert-svc/extract_test.c b/tests/cert-svc/extract_test.c
deleted file mode 100644 (file)
index eb1f2a5..0000000
+++ /dev/null
@@ -1,175 +0,0 @@
-#include <stdio.h>
-#include <string.h>
-#include <stdlib.h>
-
-#include "cert-service.h"
-
-#define        DER_CERT        "./data/Broot.pem"
-#define PEM_CERT       "./data/Broot.der"
-#define PFX_CERT       "./data/pfx/temp/server.pfx"
-#define INVALID_CERT   "./data/invalidCert.der"
-
-int tcase_1_success()
-{
-       int ret = CERT_SVC_ERR_NO_ERROR;
-       CERT_CONTEXT* ctx = NULL;
-
-       // initialize cert context
-       ctx = cert_svc_cert_context_init();
-
-       // load certificate file to buffer
-       if((ret = cert_svc_load_file_to_context(ctx, DER_CERT)) != CERT_SVC_ERR_NO_ERROR)
-               goto err;
-
-       // extract certificate data
-       if((ret = cert_svc_extract_certificate_data(ctx)) != CERT_SVC_ERR_NO_ERROR)
-               goto err;
-
-err:
-       // finalize cert context
-       cert_svc_cert_context_final(ctx);
-       return ret;
-}
-
-int tcase_2_success()
-{
-       int ret = CERT_SVC_ERR_NO_ERROR;
-       CERT_CONTEXT* ctx = NULL;
-
-       // initialize cert context
-       ctx = cert_svc_cert_context_init();
-
-       // load certificate file to buffer
-       if((ret = cert_svc_load_file_to_context(ctx, PEM_CERT)) != CERT_SVC_ERR_NO_ERROR)
-               goto err;
-
-       // extract certificate data
-       if((ret = cert_svc_extract_certificate_data(ctx)) != CERT_SVC_ERR_NO_ERROR)
-               goto err;
-
-err:
-       // finalize cert context
-       cert_svc_cert_context_final(ctx);
-       return ret;
-}
-
-int tcase_3_success()
-{
-       int ret = CERT_SVC_ERR_NO_ERROR;
-       CERT_CONTEXT* ctx = NULL;
-       unsigned char* prikey = NULL;
-       char* pass = "test\0";
-
-       // initialize cert context
-       ctx = cert_svc_cert_context_init();
-
-       // load certificate file to buffer
-       if((ret = cert_svc_load_PFX_file_to_context(ctx, &prikey, PFX_CERT, pass)) != CERT_SVC_ERR_NO_ERROR)
-               goto err;
-       printf(" ****** prikey: [%s]\n", prikey);
-
-       // extract certificate data
-       if((ret = cert_svc_extract_certificate_data(ctx)) != CERT_SVC_ERR_NO_ERROR)
-               goto err;
-
-err:
-       // finalize cert context
-       cert_svc_cert_context_final(ctx);
-       if(prikey != NULL)
-               free(prikey);
-       return ret;
-}
-
-int tcase_4_fail()
-{
-       int ret = CERT_SVC_ERR_NO_ERROR;
-       CERT_CONTEXT* ctx = NULL;
-
-       // initialize cert context
-       ctx = cert_svc_cert_context_init();
-
-       // extract certificate data
-       if((ret = cert_svc_extract_certificate_data(ctx)) != CERT_SVC_ERR_INVALID_PARAMETER)
-               goto err;
-       ret = CERT_SVC_ERR_NO_ERROR;
-
-err:
-       // finalize cert context
-       cert_svc_cert_context_final(ctx);
-       return ret;
-}
-
-int tcase_5_fail()
-{
-       int ret = CERT_SVC_ERR_NO_ERROR;
-       CERT_CONTEXT* ctx = NULL;
-
-       // initialize cert context
-       ctx = cert_svc_cert_context_init();
-
-       // load certificate file to buffer
-       if((ret = cert_svc_load_file_to_context(ctx, INVALID_CERT)) != CERT_SVC_ERR_NO_ERROR)
-               goto err;
-
-       // extract certificate data
-       if((ret = cert_svc_extract_certificate_data(ctx)) != CERT_SVC_ERR_INVALID_CERTIFICATE)
-               goto err;
-       ret = CERT_SVC_ERR_NO_ERROR;
-
-err:
-       // finalize cert context
-       cert_svc_cert_context_final(ctx);
-       return ret;
-}
-
-int main(int argc, char* argv[])
-{
-       int ret = -1;
-
-       // store test certificate
-       cert_svc_add_certificate_to_store(DER_CERT, NULL);
-       cert_svc_add_certificate_to_store(PEM_CERT, NULL);
-       cert_svc_add_certificate_to_store(PFX_CERT, NULL);
-       
-       // extract test - success: PEM
-       ret = tcase_1_success();
-       if(ret == 0)
-               fprintf(stdout, "** Success to extract certificate: DER type **\n");
-       else
-               fprintf(stdout, "** Fail to extract certificate: DER type **\n");
-
-       // extract test - success: DER
-       ret = tcase_2_success();
-       if(ret == 0)
-               fprintf(stdout, "** Success to extract certificate: PEM type **\n");
-       else
-               fprintf(stdout, "** Fail to extract certificate: PEM type **\n");
-
-       // extract test - success: PFX
-       ret = tcase_3_success();
-       if(ret == 0)
-               fprintf(stdout, "** Success to extract certificate: PFX type **\n");
-       else
-               fprintf(stdout, "** Fail to extract certificate: PFX type **\n");
-
-       // extract test - fail: no file
-       ret = tcase_4_fail();
-       if(ret == 0)
-               fprintf(stdout, "** Success to extract certificate: no certificate **\n");
-       else
-               fprintf(stdout, "** Fail to extract certificate: no certificate **\n");
-
-       // extract test - fail: invalid certificate
-       ret = tcase_5_fail();
-       if(ret == 0)
-               fprintf(stdout, "** Success to extract certificate: invalid certificate **\n");
-       else
-               fprintf(stdout, "** Fail to extract certificate: invalid certificate **\n");
-
-       // delete test certificate
-       cert_svc_delete_certificate_from_store("Broot.pem", NULL);
-       cert_svc_delete_certificate_from_store("Broot.der", NULL);
-       cert_svc_delete_certificate_from_store("server.pfx", NULL);
-
-       return 0;
-}
diff --git a/tests/cert-svc/extract_test_pfx.c b/tests/cert-svc/extract_test_pfx.c
deleted file mode 100644 (file)
index 5869c1b..0000000
+++ /dev/null
@@ -1,111 +0,0 @@
-#include <stdio.h>
-#include <string.h>
-#include <stdlib.h>
-
-#include "cert-service.h"
-
-int main(int argc, char* argv[])
-{
-       int ret = CERT_SVC_ERR_NO_ERROR;
-       CERT_CONTEXT* ctx = NULL;
-       cert_svc_cert_descriptor* certDesc = NULL;
-       int i = 0, keyLen = 0;
-       int extNum = 0, j = 0;
-//     unsigned char* prikey = NULL;
-
-       ctx = cert_svc_cert_context_init();
-
-       if((ret = cert_svc_load_file_to_context(ctx, argv[1])) != CERT_SVC_ERR_NO_ERROR) {
-               printf("file: [%s]\n", argv[1]);
-               printf("*** Fail to load file, ret: [%d]\n", ret);
-       }
-//     if((ret = cert_svc_load_PFX_file_to_context(ctx, &prikey, argv[1], "test")) != CERT_SVC_ERR_NO_ERROR) {
-//             printf("file: [%s]\n", argv[1]);
-//             printf("*** Fail to load file, ret: [%d]\n", ret);
-//     }
-
-       if((ret = cert_svc_extract_certificate_data(ctx)) != CERT_SVC_ERR_NO_ERROR)
-               printf("*** Fail to extract certificate, ret: [%d]\n", ret);
-
-//     printf("private key: [%s]\n", prikey);
-
-       certDesc = ctx->certDesc;
-
-       printf("type: [%s]\n", certDesc->type);
-       printf("version: [%d]\n", certDesc->info.version);
-       printf("serial number: [%d]\n", certDesc->info.serialNumber);
-       printf("signature algorithm: [%s]\n", certDesc->info.sigAlgo);
-       printf("issuer: [%s]\n", certDesc->info.issuerStr);
-       printf("    country name: [%s]\n", certDesc->info.issuer.countryName);
-       printf("    state or province name: [%s]\n", certDesc->info.issuer.stateOrProvinceName);
-       printf("    locality name: [%s]\n", certDesc->info.issuer.localityName);
-       printf("    organization name: [%s]\n", certDesc->info.issuer.organizationName);
-       printf("    organization unit name: [%s]\n", certDesc->info.issuer.organizationUnitName);
-       printf("    common name: [%s]\n", certDesc->info.issuer.commonName);
-       printf("    email address: [%s]\n", certDesc->info.issuer.emailAddress);
-       printf("validity:\n");
-       printf("    not before: [%d].[%d].[%d]/[%d]:[%d]:[%d]\n", certDesc->info.validPeriod.firstYear,
-                       certDesc->info.validPeriod.firstMonth,
-                       certDesc->info.validPeriod.firstDay,
-                       certDesc->info.validPeriod.firstHour,
-                       certDesc->info.validPeriod.firstMinute,
-                       certDesc->info.validPeriod.firstSecond);
-       printf("    not after:  [%d].[%d].[%d]/[%d]:[%d]:[%d]\n", certDesc->info.validPeriod.secondYear,
-                       certDesc->info.validPeriod.secondMonth,
-                       certDesc->info.validPeriod.secondDay,
-                       certDesc->info.validPeriod.secondHour,
-                       certDesc->info.validPeriod.secondMinute,
-                       certDesc->info.validPeriod.secondSecond);
-       printf("subject: [%s]\n", certDesc->info.subjectStr);
-       printf("    country name: [%s]\n", certDesc->info.subject.countryName);
-       printf("    state or province name: [%s]\n", certDesc->info.subject.stateOrProvinceName);
-       printf("    locality name: [%s]\n", certDesc->info.subject.localityName);
-       printf("    organization name: [%s]\n", certDesc->info.subject.organizationName);
-       printf("    organization unit name: [%s]\n", certDesc->info.subject.organizationUnitName);
-       printf("    common name: [%s]\n", certDesc->info.subject.commonName);
-       printf("    email address: [%s]\n", certDesc->info.subject.emailAddress);
-//     printf("public key:\n");
-//     keyLen = certDesc->info.pubKeyLen;
-//     printf("    algorithm: [%s]\n", certDesc->info.pubKeyAlgo);
-//     printf("    key:\n");
-//     for(i = 0; i < keyLen; i++) {
-//             printf("%02X", certDesc->info.pubKey[i]);
-//             if(i < (keyLen - 1))
-//                     printf(":");
-//             if(((i+1) % 10) == 0)
-//                     printf("\n");
-//     }
-//     printf("\n");
-//     printf("issuer UID: [%s]\n", certDesc->info.issuerUID);
-//     printf("subject UID: [%s]\n", certDesc->info.subjectUID);
-//
-//     printf("extensions:\n");
-//     extNum = certDesc->ext.numOfFields;
-//     for(i = 0; i < extNum; i++) {
-//             printf("    field : [%s]\n", certDesc->ext.fields[i].name);
-//             printf("    data  : ");
-//             for(j = 0; j < certDesc->ext.fields[i].datasize; j++) {
-//                     printf("%02X", certDesc->ext.fields[i].data[j]);
-//                     if(j < (certDesc->ext.fields[i].datasize - 1))
-//                             printf(":");
-//             }
-//             printf("\n");
-//     }
-//
-//     printf("signature:\n");
-//     printf("    signature algorithm: [%s]\n", certDesc->signatureAlgo);
-//     printf("    signature data:\n");
-//     for(i = 0; i < certDesc->signatureLen; i++) {
-//             printf("%02X", certDesc->signatureData[i]);
-//             if(i < (certDesc->signatureLen - 1))
-//                     printf(":");
-//             if(((i+1) % 10) == 0)
-//                     printf("\n");
-//     }
-//     printf("\n");
-                       
-       if((ret = cert_svc_cert_context_final(ctx)) != CERT_SVC_ERR_NO_ERROR)
-               printf("*** Fail to finalize context, ret: [%d]\n", ret);
-       
-       return ret;
-}
diff --git a/tests/cert-svc/mem_test.c b/tests/cert-svc/mem_test.c
deleted file mode 100644 (file)
index 501d015..0000000
+++ /dev/null
@@ -1,39 +0,0 @@
-#include <stdio.h>
-#include <stdlib.h>
-#include <string.h>
-
-#include "cert-service.h"
-
-#define CERT_FILE      "./data/Broot.pem"
-#define PFX_FILE       "./data/pfx/pfxtest.pfx"
-
-int main()
-{
-       int ret = CERT_SVC_ERR_NO_ERROR;
-       CERT_CONTEXT* ctx = NULL;
-       unsigned char* prikey = NULL;
-       char* passp = NULL;
-
-       // initialize
-       ctx = cert_svc_cert_context_init();
-
-       // file load
-//     ret = cert_svc_load_file_to_context(ctx, CERT_FILE);
-       ret = cert_svc_load_PFX_file_to_context(ctx, &prikey, PFX_FILE, passp);
-       if(ret != CERT_SVC_ERR_NO_ERROR)
-               printf("\n!!!! FILE LOAD ERROR !!!!\n");
-
-       // extract
-//     ret = cert_svc_extract_certificate_data(ctx);
-//     if(ret != CERT_SVC_ERR_NO_ERROR)
-//             printf("\n!!!! EXTRACT CERT ERROR !!!!\n");
-       
-       // finalize
-       if(prikey != NULL)
-               free(prikey);
-       ret = cert_svc_cert_context_final(ctx);
-       if(ret != CERT_SVC_ERR_NO_ERROR)
-               printf("\n!!!! CONTEXT FINAL ERROR !!!!\n");
-
-       return 0;
-}
diff --git a/tests/cert-svc/search_test.c b/tests/cert-svc/search_test.c
deleted file mode 100644 (file)
index 4f20bde..0000000
+++ /dev/null
@@ -1,40 +0,0 @@
-#include <stdio.h>
-#include <string.h>
-#include <stdlib.h>
-
-#include "cert-service.h"
-
-int main(int argc, char* argv[])
-{
-       int ret = CERT_SVC_ERR_NO_ERROR;
-       search_field fldNo = ISSUER_EMAILADDRESS;
-       char* fldData = "EmailR";
-       cert_svc_filename_list* start = NULL;
-       CERT_CONTEXT* ctx = NULL;
-
-       ctx = cert_svc_cert_context_init();
-
-       ret = cert_svc_search_certificate(ctx, fldNo, fldData);
-       if(ret != CERT_SVC_ERR_NO_ERROR) {
-               printf("[ERROR] error no: [%d]\n", ret);
-               goto err;
-       }
-       else {
-               start = ctx->fileNames;
-               if(start == NULL) {
-                       printf("Cannot find any certificate.\n");
-                       goto err;
-               }
-
-               while(1) {
-                       printf("filename: [%s]\n", start->filename);
-                       if(start->next == NULL)
-                               break;
-                       start = start->next;
-               }
-       }
-
-err:
-       cert_svc_cert_context_final(ctx);
-       return 0;
-}
diff --git a/tests/cert-svc/store_test.c b/tests/cert-svc/store_test.c
deleted file mode 100644 (file)
index fde4596..0000000
+++ /dev/null
@@ -1,118 +0,0 @@
-#include <stdio.h>
-#include <unistd.h>
-
-#include "cert-service.h"
-
-#define RELATIVE_PATH  "./data/Broot.der"
-#define ABSOLUTE_PATH  "./data/Broot.der"
-
-int tcase_1_success()
-{
-       int ret = CERT_SVC_ERR_NO_ERROR;
-
-       // store relative path
-       ret = cert_svc_add_certificate_to_store(RELATIVE_PATH, "code-signing_java_thirdparty");
-       if(ret == CERT_SVC_ERR_NO_ERROR) {
-               if((access("/usr/share/cert-svc/certs/code-signing/java/thirdparty/Broot.der", F_OK)) != 0)     // fail
-                       return -1;
-               else
-                       return 0;
-       }
-       else
-               return -1;
-
-       // store absolute path - only be in target
-}
-
-int tcase_2_success()
-{
-       int ret = CERT_SVC_ERR_NO_ERROR;
-
-       // store into default path
-       ret = cert_svc_add_certificate_to_store(RELATIVE_PATH, NULL);
-       if(ret == CERT_SVC_ERR_NO_ERROR) {
-               if((access("/usr/share/cert-svc/certs/ssl/Broot.der", F_OK)) != 0)      // fail
-                       return -1;
-               else
-                       return 0;
-       }
-       else
-               return -1;
-}
-
-int tcase_3_fail()
-{
-       int ret = CERT_SVC_ERR_NO_ERROR;
-
-       // store NULL
-       ret = cert_svc_add_certificate_to_store(NULL, "code-signing_wac");
-       if(ret == CERT_SVC_ERR_INVALID_PARAMETER)
-               return 0;
-       else
-               return -1;
-}
-
-int tcase_4_fail()
-{
-       int ret = CERT_SVC_ERR_NO_ERROR;
-
-       // store into invalid directory
-       ret = cert_svc_add_certificate_to_store(RELATIVE_PATH, "code-signing_debian");
-       if(ret == CERT_SVC_ERR_FILE_IO)
-               return 0;
-       else
-               return -1;
-}
-
-int finalize_test()
-{
-       // delete files which be stored during testing
-       if((unlink("/usr/share/cert-svc/certs/code-signing/java/thirdparty/Broot.der")) != 0)   // fail
-               return -1;
-       if((unlink("/usr/share/cert-svc/certs/ssl/Broot.der")) != 0)    // fail
-               return -1;
-
-       return 0;
-}
-
-int main(void)
-{
-       int ret = -1;
-
-       // test case 1 : success
-       ret = tcase_1_success();
-       if(ret == 0)
-               fprintf(stdout, "** Success to store test 1 - testpath: code_signing **\n");
-       else
-               fprintf(stdout, "** Fail to store test 1 **\n");
-
-       // test case 2 : success - no location (ssl)
-       ret = tcase_2_success();
-       if(ret == 0)
-               fprintf(stdout, "** Success to store test 2 - testpath: ssl **\n");
-       else 
-               fprintf(stdout, "** Fail to store test 2 **\n");
-
-       // test case 3 : fail - no filename
-       ret = tcase_3_fail();
-       if(ret == 0)
-               fprintf(stdout, "** Success to store test 3 - no filename **\n");
-       else 
-               fprintf(stdout, "** Fail to store test 3 **\n");
-
-       // test case 4 : fail - invalid dir name
-       ret = tcase_4_fail();
-       if(ret == 0)
-               fprintf(stdout, "** Success to store test 4 - invalid dir path **\n");
-       else 
-               fprintf(stdout, "** Fail to store test 4 **\n");
-
-       // test finalize
-       ret = finalize_test();
-       if(ret == 0)
-               fprintf(stdout, "** Finalize store test **\n");
-       else 
-               fprintf(stdout, "** Fail to finalize store test, ret: [%d] **\n", ret);
-
-       return 0;
-}
diff --git a/tests/cert-svc/test-certificate-parsing.cpp b/tests/cert-svc/test-certificate-parsing.cpp
deleted file mode 100644 (file)
index b23cea5..0000000
+++ /dev/null
@@ -1,79 +0,0 @@
-/*
- * Copyright (c) 2011 Samsung Electronics Co., Ltd All Rights Reserved
- *
- *    Licensed under the Apache License, Version 2.0 (the "License");
- *    you may not use this file except in compliance with the License.
- *    You may obtain a copy of the License at
- *
- *        http://www.apache.org/licenses/LICENSE-2.0
- *
- *    Unless required by applicable law or agreed to in writing, software
- *    distributed under the License is distributed on an "AS IS" BASIS,
- *    WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
- *    See the License for the specific language governing permissions and
- *    limitations under the License.
- */
-
-#include <memory>
-#include <functional>
-
-#include <dpl/test/test_runner.h>
-
-#include <cert-service.h>
-
-RUNNER_TEST_GROUP_INIT(T0100_CERTIFICATE_PARSING)
-
-typedef std::unique_ptr<CERT_CONTEXT, std::function<int(CERT_CONTEXT*)>> ScopedCertCtx;
-
-/*
- * author:      ---
- * test:        PEM positive.
- * description: Loading *.pem file.
- * expect:      *.pem should load with no error.
- */
-RUNNER_TEST(T0101_pem_positive)
-{
-    ScopedCertCtx ctx(cert_svc_cert_context_init(), cert_svc_cert_context_final);
-    RUNNER_ASSERT(CERT_SVC_ERR_NO_ERROR ==
-        cert_svc_load_file_to_context(ctx.get(), "/usr/share/cert-svc/cert-type/cert0.pem"));
-}
-
-/*
- * author:      ---
- * test:        DER positive.
- * description: Loading *.der file.
- * expect:      *.der file should load with no error.
- */
-RUNNER_TEST(T0102_der_positive)
-{
-    ScopedCertCtx ctx(cert_svc_cert_context_init(), cert_svc_cert_context_final);
-    RUNNER_ASSERT(CERT_SVC_ERR_NO_ERROR ==
-        cert_svc_load_file_to_context(ctx.get(), "/usr/share/cert-svc/cert-type/cert1.der"));
-}
-
-/*
- * author:      ---
- * test:        PEM negative.
- * description: Loading *.pem file.
- * expect:      *.pom file should not load and return error.
- */
-RUNNER_TEST(T0103_pem_negative)
-{
-    ScopedCertCtx ctx(cert_svc_cert_context_init(), cert_svc_cert_context_final);
-    RUNNER_ASSERT(CERT_SVC_ERR_NO_ERROR !=
-        cert_svc_load_file_to_context(ctx.get(), "/usr/share/cert-svc/cert-type/cert2fake.pem"));
-}
-
-/*
- * author:      ---
- * test:        DER negative.
- * description: Loading *.der file.
- * expect:      *.der file should not load and return error.
- */
-RUNNER_TEST(T0104_der_negative)
-{
-    ScopedCertCtx ctx(cert_svc_cert_context_init(), cert_svc_cert_context_final);
-    RUNNER_ASSERT(CERT_SVC_ERR_NO_ERROR !=
-        cert_svc_load_file_to_context(ctx.get(), "/usr/share/cert-svc/cert-type/cert3fake.der"));
-}
-
diff --git a/tests/cert-svc/test_caflag.c b/tests/cert-svc/test_caflag.c
deleted file mode 100644 (file)
index c768970..0000000
+++ /dev/null
@@ -1,207 +0,0 @@
-/*
- * certification service
- *
- * Copyright (c) 2000 - 2014 Samsung Electronics Co., Ltd All Rights Reserved
- *
- * Contact: Dongsun Lee <ds73.lee@samsung.com>
- *
- * Licensed under the Apache License, Version 2.0 (the "License");
- * you may not use this file except in compliance with the License.
- * You may obtain a copy of the License at
- *
- * http://www.apache.org/licenses/LICENSE-2.0
- *
- * Unless required by applicable law or agreed to in writing, software
- * distributed under the License is distributed on an "AS IS" BASIS,
- * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
- * See the License for the specific language governing permissions and
- * limitations under the License.
- *
- */
-
-#include <test_suite.h>
-#include <stdio.h>
-#include <string.h>
-#include <stdlib.h>
-#include <cert-service.h>
-#include <cert-service-util.h>
-
-#define        CERT_FILE_ROOT_CA        "/usr/share/cert-svc/tests/orig_c/data/caflag/root_ca.der"
-#define        CERT_FILE_SECOND_CA      "/usr/share/cert-svc/tests/orig_c/data/caflag/second_ca.der"
-#define        CERT_FILE_SIGNER_AIA     "/usr/share/cert-svc/tests/orig_c/data/caflag/aia_signer.der"
-#define        CERT_FILE_SIGNER_REVOKED "/usr/share/cert-svc/tests/orig_c/data/caflag/rev_signer.der"
-#define        CERT_FILE_SIGNER_NOAIA   "/usr/share/cert-svc/tests/orig_c/data/caflag/noaia_signer.der"
-#define        CERT_FILE_ROOT_CA_V1     "/usr/share/cert-svc/tests/orig_c/data/caflag/root_ca_v1.der"
-#define        CERT_FILE_SIGNER_V1      "/usr/share/cert-svc/tests/orig_c/data/caflag/v1_signer.der"
-
-
-int test_verify_certificate_succ_caflag_cert() {
-       int validity;
-    int ret = CERT_SVC_ERR_NO_ERROR;
-       CERT_CONTEXT* ctx = cert_svc_cert_context_init();
-
-       // load certificate to context
-       ret = cert_svc_load_file_to_context(ctx, CERT_FILE_SIGNER_AIA);
-       if(ret != CERT_SVC_ERR_NO_ERROR) {
-               printf("....fail..cert_svc_load_file_to_context. ret=%d\n", ret); fflush(stderr);
-               goto err;
-       }
-
-       ret = cert_svc_push_file_into_context(ctx, CERT_FILE_SECOND_CA);
-       if(ret != CERT_SVC_ERR_NO_ERROR) {
-               printf("....fail..cert_svc_push_file_to_context. ret=%d\n", ret); fflush(stderr);
-               goto err;
-       }
-
-       ret = cert_svc_verify_certificate(ctx, &validity);
-       if(ret != CERT_SVC_ERR_NO_ERROR) {
-               printf("....fail..cert_svc_verify_certificate. ret=%d\n", ret); fflush(stderr);
-               goto err;
-       }
-
-       if(validity != 1) {
-               printf("....fail..cert_svc_verify_certificate. validity=%d\n", validity); fflush(stderr);
-               ret = -1;
-               goto err;
-       }
-
-err:
-    cert_svc_cert_context_final(ctx);
-       return ret;
-}
-
-int test_verify_certificate_succ_nocaflag_cert() {
-       int validity;
-    int ret = CERT_SVC_ERR_NO_ERROR;
-       CERT_CONTEXT* ctx = cert_svc_cert_context_init();
-
-       ret = cert_svc_load_file_to_context(ctx, CERT_FILE_SIGNER_V1);
-       if(ret != CERT_SVC_ERR_NO_ERROR) {
-               printf("....fail..cert_svc_load_file_to_context. ret=%d\n", ret); fflush(stderr);
-               goto err;
-       }
-
-       ret = cert_svc_verify_certificate(ctx, &validity);
-       if(ret != CERT_SVC_ERR_NO_ERROR) {
-               printf("....fail..cert_svc_verify_certificate. ret=%d\n", ret); fflush(stderr);
-               goto err;
-       }
-
-       if(validity != 1) {
-               printf("....fail..cert_svc_verify_certificate. validity=%d\n", validity); fflush(stderr);
-               ret = -1;
-               goto err;
-       }
-
-err:
-    cert_svc_cert_context_final(ctx);
-       return ret;
-}
-
-int test_verify_certificate_with_caflag_succ() {
-       int validity;
-    int ret = CERT_SVC_ERR_NO_ERROR;
-       CERT_CONTEXT* ctx = cert_svc_cert_context_init();
-
-       ret = cert_svc_load_file_to_context(ctx, CERT_FILE_SIGNER_AIA);
-       if(ret != CERT_SVC_ERR_NO_ERROR) {
-               printf("....fail..cert_svc_load_file_to_context. ret=%d\n", ret); fflush(stderr);
-               goto err;
-       }
-
-       ret = cert_svc_push_file_into_context(ctx, CERT_FILE_SECOND_CA);
-       if(ret != CERT_SVC_ERR_NO_ERROR) {
-               printf("....fail..cert_svc_push_file_to_context. ret=%d\n", ret); fflush(stderr);
-               goto err;
-       }
-
-       ret = cert_svc_verify_certificate_with_caflag(ctx, &validity);
-       if(ret != CERT_SVC_ERR_NO_ERROR) {
-               printf("....fail..cert_svc_verify_certificate. ret=%d\n", ret); fflush(stderr);
-               goto err;
-       }
-
-       if(validity != 1) {
-               printf("....fail..cert_svc_verify_certificate. validity=%d\n", validity); fflush(stderr);
-               ret = -1;
-               goto err;
-       }
-
-err:
-    cert_svc_cert_context_final(ctx);
-       return ret;
-}
-
-
-int test_verify_certificate_with_caflag_fail() {
-       int validity;
-    int ret = CERT_SVC_ERR_NO_ERROR;
-       CERT_CONTEXT* ctx = cert_svc_cert_context_init();
-
-       // load certificate to context
-       ret = cert_svc_load_file_to_context(ctx, CERT_FILE_SIGNER_V1);
-       if(ret != CERT_SVC_ERR_NO_ERROR) {
-               printf("....fail..cert_svc_load_file_to_context. ret=%d\n", ret); fflush(stderr);
-               goto err;
-       }
-
-       ret = cert_svc_verify_certificate_with_caflag(ctx, &validity);
-       if(ret != CERT_SVC_ERR_NO_ERROR) {
-               printf("....fail..cert_svc_verify_certificate. ret=%d\n", ret); fflush(stderr);
-               goto err;
-       }
-
-       if(validity == 1) {
-               printf("....fail..cert_svc_verify_certificate. validity=%d\n", validity); fflush(stderr);
-               ret = -1;
-               goto err;
-       }
-
-err:
-    cert_svc_cert_context_final(ctx);
-       return ret;
-}
-
-
-int test_caflag(){
-       int ret;
-       printf("\n[test_caflag started]\n");
-
-       printf("\n-- test_verify_certificate_succ_caflag_cert start\n");
-       ret = test_verify_certificate_succ_caflag_cert();
-       printf("---- result : ");
-       if(ret == 0) {
-               printf("success\n");
-       }else {
-               printf("fail\n");
-       }
-
-       printf("\n-- test_verify_certificate_succ_nocaflag_cert start\n");
-       ret = test_verify_certificate_succ_nocaflag_cert();
-       printf("---- result : ");
-       if(ret == 0) {
-               printf("success\n");
-       }else {
-               printf("fail\n");
-       }
-
-       printf("\n-- test_verify_certificate_with_caflag_succ start\n");
-       ret = test_verify_certificate_with_caflag_succ();
-       printf("---- result : ");
-       if(ret == 0) {
-               printf("success\n");
-       }else {
-               printf("fail\n");
-       }
-
-       printf("\n-- test_verify_certificate_with_caflag_fail start\n");
-       ret = test_verify_certificate_with_caflag_fail();
-       printf("---- result : ");
-       if(ret == 0) {
-               printf("success\n");
-       }else {
-               printf("fail\n");
-       }
-
-       return ret;
-}
diff --git a/tests/cert-svc/test_suite.h b/tests/cert-svc/test_suite.h
deleted file mode 100644 (file)
index 3184a1f..0000000
+++ /dev/null
@@ -1,27 +0,0 @@
-/*
- * certification service
- *
- * Copyright (c) 2000 - 2014 Samsung Electronics Co., Ltd All Rights Reserved
- *
- * Contact: Dongsun Lee <ds73.lee@samsung.com>
- *
- * Licensed under the Apache License, Version 2.0 (the "License");
- * you may not use this file except in compliance with the License.
- * You may obtain a copy of the License at
- *
- * http://www.apache.org/licenses/LICENSE-2.0
- *
- * Unless required by applicable law or agreed to in writing, software
- * distributed under the License is distributed on an "AS IS" BASIS,
- * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
- * See the License for the specific language governing permissions and
- * limitations under the License.
- *
- */
-
-#ifndef TEST_SUITE_H_
-#define TEST_SUITE_H_
-
-int test_caflag();
-
-#endif /* TEST_CAFLAG_H_ */
diff --git a/tests/cert-svc/test_suite_main.c b/tests/cert-svc/test_suite_main.c
deleted file mode 100644 (file)
index 7e34d2b..0000000
+++ /dev/null
@@ -1,31 +0,0 @@
-/*
- * certification service
- *
- * Copyright (c) 2000 - 2014 Samsung Electronics Co., Ltd All Rights Reserved
- *
- * Contact: Dongsun Lee <ds73.lee@samsung.com>
- *
- * Licensed under the Apache License, Version 2.0 (the "License");
- * you may not use this file except in compliance with the License.
- * You may obtain a copy of the License at
- *
- * http://www.apache.org/licenses/LICENSE-2.0
- *
- * Unless required by applicable law or agreed to in writing, software
- * distributed under the License is distributed on an "AS IS" BASIS,
- * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
- * See the License for the specific language governing permissions and
- * limitations under the License.
- *
- */
-
-#include <test_suite.h>
-#include <stdio.h>
-#include <string.h>
-#include <stdlib.h>
-
-int main() {
-       int ret;
-       ret = test_caflag();
-       return ret;
-}
diff --git a/tests/cert-svc/verify_sig.c b/tests/cert-svc/verify_sig.c
deleted file mode 100644 (file)
index 98a088d..0000000
+++ /dev/null
@@ -1,86 +0,0 @@
-#include <stdio.h>
-#include <stdlib.h>
-#include <string.h>
-
-#include "cert-service.h"
-
-#define CERT_PATH      "./data/signing/chain1.crt"
-#define MSG_PATH       "./data/signing/msg"
-//#define SIG_PATH     "./data/signing/msg.sig"
-#define SIG_PATH       "./data/signing/msg.sig.enc"
-
-int main(int argc, char* argv[])
-{
-       int ret = CERT_SVC_ERR_NO_ERROR;
-       int validity = 0;
-       CERT_CONTEXT* ctx = NULL;
-       unsigned char* msg = NULL;
-       int msgLen = 0;
-       unsigned char* sig = NULL;
-       unsigned char* tmpSig = NULL;
-       int sigLen = 0;
-       FILE* fp_msg = NULL;
-       FILE* fp_sig = NULL;
-       int i = 0, j = 0;
-
-       ctx = cert_svc_cert_context_init();
-
-       // load certificate
-       if((ret = cert_svc_load_file_to_context(ctx, CERT_PATH)) != CERT_SVC_ERR_NO_ERROR) {
-               printf("Fail to load file to buffer, [%s]\n", CERT_PATH);
-               goto err;
-       }
-
-       // load message
-       if(!(fp_msg = fopen(MSG_PATH, "rb"))) {
-               printf("Fail to open file, [%s]\n", MSG_PATH);
-               goto err;
-       }
-       fseek(fp_msg, 0L, SEEK_END);
-       msgLen = ftell(fp_msg);
-       fseek(fp_msg, 0L, SEEK_SET);
-
-       msg = (unsigned char*)malloc(sizeof(unsigned char) * (msgLen + 1));
-       memset(msg, 0x00, (msgLen + 1));
-       fread(msg, sizeof(unsigned char), msgLen, fp_msg);
-
-       // load signature
-       if(!(fp_sig = fopen(SIG_PATH, "rb"))) {
-               printf("Fail to open file, [%s]\n", SIG_PATH);
-               goto err;
-       }
-       fseek(fp_sig, 0L, SEEK_END);
-       sigLen = ftell(fp_sig);
-       fseek(fp_sig, 0L, SEEK_SET);
-
-       sig = (unsigned char*)malloc(sizeof(unsigned char) * (sigLen + 1));
-       tmpSig = (unsigned char*)malloc(sizeof(unsigned char) * (sigLen + 1));
-       memset(sig, 0x00, (sigLen + 1));
-       memset(tmpSig, 0x00, (sigLen + 1));
-
-       fread(sig, sizeof(unsigned char), sigLen, fp_sig);
-       for(i = 0; i < sigLen; i++) {
-               if(sig[i] != '\n') {
-                       tmpSig[j] = sig[i];
-                       j++;
-               }
-       }
-
-       // function call
-//     if((ret = cert_svc_verify_signature(ctx, msg, sig, sigLen, "SHA1", &validity)) != CERT_SVC_ERR_NO_ERROR) {
-       if((ret = cert_svc_verify_signature(ctx, msg, msgLen, tmpSig, NULL, &validity)) != CERT_SVC_ERR_NO_ERROR) {
-               printf("Fail to verify signature.\n");
-               goto err;
-       }
-       printf("[RESULT] ret: [%d]\n", validity);
-
-err:
-       if(fp_msg != NULL) fclose(fp_msg);
-       if(fp_sig != NULL) fclose(fp_sig);
-       if(msg != NULL) free(msg);
-       if(sig != NULL) free(sig);
-       if(tmpSig != NULL) free(tmpSig);
-       cert_svc_cert_context_final(ctx);
-
-       return 0;
-}
diff --git a/tests/cert-svc/verify_test.c b/tests/cert-svc/verify_test.c
deleted file mode 100644 (file)
index 4dbe9c6..0000000
+++ /dev/null
@@ -1,66 +0,0 @@
-#include <stdio.h>
-#include <string.h>
-#include <stdlib.h>
-
-#include "cert-service.h"
-
-#define TARGET_CERT    "./data/cert_chain/server.crt"
-#define CHAIN1_CERT    "./data/cert_chain/chain1.crt"
-#define CHAIN2_CERT    "./data/cert_chain/chain2.crt"
-#define CHAIN3_CERT    "./data/cert_chain/chain3.crt"
-#define CHAIN4_CERT    "./data/cert_chain/chain4.crt"
-#define CHAIN5_CERT    "./data/cert_chain/chain5.crt"
-
-int main()
-{
-       int ret = CERT_SVC_ERR_NO_ERROR;
-       int validity = 0;
-       CERT_CONTEXT* ctx = cert_svc_cert_context_init();
-
-       // load certificate to context
-//     if((ret = cert_svc_load_file_to_context(ctx, TARGET_CERT)) != CERT_SVC_ERR_NO_ERROR) {
-       if((ret = cert_svc_load_file_to_context(ctx, CHAIN1_CERT)) != CERT_SVC_ERR_NO_ERROR) {
-               printf("ERR!! ret: [%d]\n", ret);
-               goto err;
-       }
-
-       // push certificates to context
-//     if((ret = cert_svc_push_file_into_context(ctx, CHAIN1_CERT)) != CERT_SVC_ERR_NO_ERROR) {
-//             printf("ERR!! ret: [%d]\n", ret);
-//             goto err;
-//     }
-//     if((ret = cert_svc_push_file_into_context(ctx, CHAIN2_CERT)) != CERT_SVC_ERR_NO_ERROR) {
-//             printf("ERR!! ret: [%d]\n", ret);
-//             goto err;
-//     }
-//     if((ret = cert_svc_push_file_into_context(ctx, CHAIN5_CERT)) != CERT_SVC_ERR_NO_ERROR) {
-//             printf("ERR!! ret: [%d]\n", ret);
-//             goto err;
-//     }
-//     if((ret = cert_svc_push_file_into_context(ctx, CHAIN4_CERT)) != CERT_SVC_ERR_NO_ERROR) {
-//             printf("ERR!! ret: [%d]\n", ret);
-//             goto err;
-//     }
-//     if((ret = cert_svc_push_file_into_context(ctx, CHAIN3_CERT)) != CERT_SVC_ERR_NO_ERROR) {
-//             printf("ERR!! ret: [%d]\n", ret);
-//             goto err;
-//     }
-//
-//     // check linked list
-//     if(ctx->certLink == NULL) {
-//             printf("FAIL!!\n");
-//             goto err;
-//     }
-
-       // verify
-       ret = cert_svc_verify_certificate(ctx, &validity);
-       if(ret != CERT_SVC_ERR_NO_ERROR)
-               printf("ret: [%d]\n", ret);
-
-       printf("[RESULT] validity: [%d]\n", validity);
-       printf("[RESULT] root CA path: [%s]\n", ctx->fileNames->filename);
-
-err:
-       cert_svc_cert_context_final(ctx);
-       return 0;
-}
index e2bf091..1d34f6b 100644 (file)
@@ -1,8 +1,3 @@
-# compiler warning flags
-ADD_DEFINITIONS("-Wall")
-ADD_DEFINITIONS("-Wextra")
-ADD_DEFINITIONS("-Werror")
-
 PKG_CHECK_MODULES(VCORE_DEPS
     REQUIRED
     libxml-2.0
@@ -19,6 +14,10 @@ ADD_DEFINITIONS(${VCORE_DEPS_CFLAGS_OTHER})
 SET(VCORE_DIR ${CMAKE_CURRENT_SOURCE_DIR})
 
 SET(VCORE_SOURCES
+    ${VCORE_DIR}/orig/cert-service.c
+    ${VCORE_DIR}/orig/cert-service-util.c
+    ${VCORE_DIR}/orig/cert-service-process.c
+
     ${VCORE_DIR}/dpl/core/src/assert.cpp
     ${VCORE_DIR}/dpl/core/src/exception.cpp
     ${VCORE_DIR}/dpl/core/src/noncopyable.cpp
@@ -49,7 +48,6 @@ SET(VCORE_SOURCES
     ${VCORE_DIR}/vcore/XmlsecAdapter.cpp
     ${VCORE_DIR}/vcore/pkcs12.cpp
     ${VCORE_DIR}/vcore/exception.cpp
-    ${VCORE_DIR}/vcore/utils.c
     ${VCORE_DIR}/vcore/cert-svc-client.c
     ${VCORE_DIR}/vcore/Ocsp.cpp
     ${VCORE_DIR}/vcore/CryptoInit.cpp
@@ -66,7 +64,6 @@ SET(VCORE_INCLUDES
 INCLUDE_DIRECTORIES(
     SYSTEM
     ${VCORE_DEPS_INCLUDE_DIRS}
-    ${PROJECT_SOURCE_DIR}/include
     ${VCORE_INCLUDES}
     )
 
@@ -104,7 +101,6 @@ SET(CERT_SERVER_SRC
 INCLUDE_DIRECTORIES(
     SYSTEM
     ${CERT_SERVER_DEP_INCLUDE_DIRS}
-    ${PROJECT_SOURCE_DIR}/include
     ${VCORE_DIR}
     ${CERT_SERVER_DIR}/include
     )
index b850b3c..54c74f5 100644 (file)
@@ -42,6 +42,7 @@ extern "C" {
 #define CERTSVC_ALIAS_DOES_NOT_EXIST (-10)  /* Alias no exist in store. */
 #define CERTSVC_INVALID_STORE_TYPE   (-11)  /* User-provided invalid import type for storing in system/email/wifi/vpn store. */
 #define CERTSVC_INVALID_STATUS       (-12)  /* User-provided invalid status while stetting the status for the store system/email/wifi/vpn store. */
+#define CERTSVC_INVALID_CERTIFICATE  (-13)  /* Invalid certificate format or content */
 
 #ifdef __cplusplus
 }
similarity index 71%
rename from srcs/cert-service-process.c
rename to vcore/orig/cert-service-process.c
index c47df11..655e57c 100644 (file)
 #include <openssl/ssl.h>
 #include <openssl/x509v3.h>
 
-#include "cert-service.h"
-#include "cert-service-util.h"
-#include "cert-service-debug.h"
-#include "cert-service-process.h"
+#include "orig/cert-service.h"
+#include "orig/cert-service-util.h"
+#include "orig/cert-service-debug.h"
+#include "orig/cert-service-process.h"
 
 #define get_ASN1_INTEGER(x)    ASN1_INTEGER_get((x))
 #define get_ASN1_OBJECT(x)     OBJ_nid2ln(OBJ_obj2nid((x)))
@@ -157,404 +157,6 @@ err:
        return ret;
 }
 
-cert_svc_linked_list* find_issuer_from_list(cert_svc_linked_list* list, cert_svc_linked_list* p)
-{
-       /* find q and q has subject string which be same with issuer string of parameter p */
-       cert_svc_linked_list* q = NULL;
-       cert_svc_cert_descriptor* tmp1 = NULL;
-       cert_svc_cert_descriptor* tmp2 = NULL;
-
-       tmp1 = (cert_svc_cert_descriptor*)malloc(sizeof(cert_svc_cert_descriptor));
-       if (tmp1 == NULL) {
-               SLOGE("[ERR][%s] Fail to allocate certificate descriptor.", __func__);
-               return NULL;
-       }
-
-       memset(tmp1, 0x00, sizeof(cert_svc_cert_descriptor));
-
-       if(_extract_certificate_data(p->certificate, tmp1) != CERT_SVC_ERR_NO_ERROR) {
-               SLOGE("[ERR][%s] Fail to extract certificate data.", __func__);
-               goto err;
-       }
-
-       for(q = list; q != NULL; q = q->next) {
-               tmp2 = (cert_svc_cert_descriptor*)malloc(sizeof(cert_svc_cert_descriptor));
-               if (tmp2 == NULL) {
-                       SLOGE("[ERR][%s] Fail to allocate certificate descriptor.", __func__);
-                       goto err;
-               }
-
-               memset(tmp2, 0x00, sizeof(cert_svc_cert_descriptor));
-
-               _extract_certificate_data(q->certificate, tmp2);
-
-               if(!strncmp((const char*)(tmp2->info.subjectStr), (const char*)(tmp1->info.issuerStr), strlen((const char*)(tmp1->info.issuerStr)))) {  // success
-                       release_certificate_data(tmp1);
-                       release_certificate_data(tmp2);
-                       return q;
-               }
-               release_certificate_data(tmp2);
-               tmp2 = NULL;
-       }
-
-err:   // fail
-       release_certificate_data(tmp1);
-       release_certificate_data(tmp2);
-       return NULL;
-}
-
-int sort_cert_chain(cert_svc_linked_list** unsorted, cert_svc_linked_list** sorted)
-{
-       cert_svc_linked_list* p = NULL;
-       cert_svc_linked_list* q = NULL;
-       cert_svc_linked_list* r = NULL;
-
-       cert_svc_cert_descriptor* tmp1 = NULL;
-       cert_svc_cert_descriptor* tmp2 = NULL;
-
-       if((*unsorted) == NULL) {
-               for(p = (*sorted); p->next != NULL; p = p->next) {
-                       tmp1 = (cert_svc_cert_descriptor*)malloc(sizeof(cert_svc_cert_descriptor));
-                       if(tmp1 == NULL) {
-                               SLOGE("[ERR][%s] Fail to allocate certificate descriptor.", __func__);
-                               return CERT_SVC_ERR_MEMORY_ALLOCATION;
-                       }
-                       memset(tmp1, 0x00, sizeof(cert_svc_cert_descriptor));
-                       tmp2 = (cert_svc_cert_descriptor*)malloc(sizeof(cert_svc_cert_descriptor));
-                       if(tmp2 == NULL) {
-                               release_certificate_data(tmp1);
-                               SLOGE("[ERR][%s] Fail to allocate certificate descriptor.", __func__);
-                               return CERT_SVC_ERR_MEMORY_ALLOCATION;
-                       }
-                       memset(tmp2, 0x00, sizeof(cert_svc_cert_descriptor));
-
-                       _extract_certificate_data(p->certificate, tmp1);
-                       _extract_certificate_data(p->next->certificate, tmp2);
-
-                       if(strncmp((const char*)(tmp1->info.issuerStr), (const char*)(tmp2->info.subjectStr), strlen((const char*)(tmp2->info.subjectStr)))) {
-                               SLOGE("[ERR][%s] Certificate chain is broken.", __func__);
-                               release_certificate_data(tmp1);
-                               release_certificate_data(tmp2);
-                               return CERT_SVC_ERR_BROKEN_CHAIN;
-                       }
-                       else {
-                               release_certificate_data(tmp1);
-                               tmp1 = NULL;
-                               release_certificate_data(tmp2);
-                               tmp2 = NULL;
-                       }
-               }
-               release_certificate_data(tmp1);
-               release_certificate_data(tmp2);
-               return CERT_SVC_ERR_NO_ERROR;
-       }
-       else if((*unsorted)->next == NULL) {
-               (*unsorted)->next = *sorted;
-               *sorted = *unsorted;
-               *unsorted = NULL;
-       }
-       else {
-               r = (*unsorted);
-               for(p = (*unsorted); p != NULL; p = p->next) {
-                       if((q = find_issuer_from_list((*unsorted), p)) == NULL)
-                               break;
-
-                       r = p;
-               }
-
-               if(q != NULL) {
-                       SLOGE("[ERR][%s] Certificate chain is broken.", __func__);
-                       return CERT_SVC_ERR_BROKEN_CHAIN;
-               }
-
-               if(r == p) {
-                       q = (*unsorted)->next;
-                       (*unsorted)->next = (*sorted);
-                       (*sorted) = (*unsorted);
-                       (*unsorted) = q;
-               }
-               else if((*sorted) == NULL) {
-                       (*sorted) = p;
-                       r->next = p->next;
-                       (*sorted)->next = NULL;
-               }
-               else {
-                       r->next = p->next;
-                       p->next = (*sorted);
-                       (*sorted) = p;
-               }
-       }
-
-       return sort_cert_chain(unsorted, sorted);
-}
-
-int _remove_selfsigned_cert_in_chain(cert_svc_linked_list** certList)
-{
-       int ret = CERT_SVC_ERR_NO_ERROR;
-       cert_svc_linked_list* prev = NULL;
-       cert_svc_linked_list* current = NULL;
-       cert_svc_linked_list* start = NULL;
-       cert_svc_linked_list* deleted = NULL;
-       cert_svc_cert_descriptor* certdesc = NULL;
-       int first_tag = 0;
-
-       start = (*certList);
-       prev = start;
-
-       for(current = (*certList); current != NULL; current = current->next) {
-               deleted = current;
-
-               certdesc = (cert_svc_cert_descriptor*)malloc(sizeof(cert_svc_cert_descriptor));
-               if(certdesc == NULL) {
-                       SLOGE("[ERR][%s] Fail to allocate certificate descriptor.", __func__);
-                       return CERT_SVC_ERR_MEMORY_ALLOCATION;
-               }
-               memset(certdesc, 0x00, sizeof(cert_svc_cert_descriptor));
-
-               if((ret = _extract_certificate_data(current->certificate, certdesc)) != CERT_SVC_ERR_NO_ERROR) {
-                       SLOGE("[ERR][%s] Fail to extract certificate data.", __func__);
-                       goto err;
-               }
-
-               if(!strncmp((const char*)(certdesc->info.subjectStr), (const char*)(certdesc->info.issuerStr), strlen((const char*)(certdesc->info.issuerStr)))) { // self-signed
-                       if(first_tag == 0) { // first cert is self-signed
-                               start = start->next;
-                               prev = start;
-
-                               deleted->next = NULL;
-                               release_cert_list(deleted);
-
-                               release_certificate_data(certdesc);
-                               certdesc = NULL;
-                               continue;
-                       }
-                       else {
-                               prev->next = current->next;
-
-                               deleted->next = NULL;
-                               release_cert_list(deleted);
-                       }
-               }
-               else {
-                       prev = current;
-               }
-
-               release_certificate_data(certdesc);
-               certdesc = NULL;
-
-               first_tag = 1;
-       }
-
-       (*certList) = start;
-
-err:
-       if(certdesc != NULL)
-               release_certificate_data(certdesc);
-
-       return ret;
-}
-
-int _verify_certificate_with_caflag(
-       cert_svc_mem_buff *certBuf,
-       cert_svc_linked_list **certList,
-       int checkCaFlag,
-       cert_svc_filename_list *rootPath,
-       int *validity)
-{
-       int ret = CERT_SVC_ERR_NO_ERROR;
-       cert_svc_linked_list* sorted = NULL;
-       cert_svc_linked_list* tempNode = NULL;
-       cert_svc_cert_descriptor* findRoot = NULL;
-       cert_svc_filename_list* fileNames = NULL;
-       cert_svc_mem_buff* CACert = NULL;
-
-       int certNum = 0;
-       int certIndex = 0, i = 0;
-       X509_STORE_CTX* storeCtx = NULL;
-       X509* rootCert = NULL;
-       X509** interCert = NULL;
-       X509* targetCert = NULL;
-       STACK_OF(X509) *tchain, *uchain;
-       int caFlagValidity;
-
-       OpenSSL_add_all_algorithms();
-       tchain = sk_X509_new_null();
-       uchain = sk_X509_new_null();
-
-       findRoot = (cert_svc_cert_descriptor*)malloc(sizeof(cert_svc_cert_descriptor));
-       if (findRoot == NULL) {
-               ret = CERT_SVC_ERR_MEMORY_ALLOCATION;
-               goto err;
-       }
-
-       memset(findRoot, 0x00, sizeof(cert_svc_cert_descriptor));
-
-       if (*certList != NULL) {
-               /* remove self-signed certificate in certList */
-               ret = _remove_selfsigned_cert_in_chain(certList);
-               if (ret != CERT_SVC_ERR_NO_ERROR) {
-                       SLOGE("Fail to remove self-signed certificate in chain.");
-                       goto err;
-               }
-
-               /* sort certList */
-               ret = sort_cert_chain(certList, &sorted);
-               if (ret != CERT_SVC_ERR_NO_ERROR) {
-                       SLOGE("Fail to sort certificate chain.");
-                       goto err;
-               }
-
-               /*
-                *  find root cert from store, the SUBJECT field of root cert
-                *  is same with ISSUER field of certList[0]
-                */
-               tempNode = sorted;
-               while (tempNode->next != NULL) {
-                       certNum++;
-                       tempNode = tempNode->next;
-               }
-               certNum++;
-
-               ret = _extract_certificate_data(tempNode->certificate, findRoot);
-       } else {
-               ret = _extract_certificate_data(certBuf, findRoot);
-       }
-
-       if (ret != CERT_SVC_ERR_NO_ERROR) {
-               SLOGE("Fail to extract certificate data");
-               goto err;
-       }
-
-       ret = _search_certificate(&fileNames, SUBJECT_STR, (char*)findRoot->info.issuerStr);
-       if (ret != CERT_SVC_ERR_NO_ERROR) {
-               SLOGE("Fail to search root certificate");
-               goto err;
-       }
-
-       if (fileNames->filename == NULL) {
-               ret = CERT_SVC_ERR_NO_ROOT_CERT;
-               goto err;
-       }
-
-       CACert = (cert_svc_mem_buff*)malloc(sizeof(cert_svc_mem_buff));
-       if (CACert == NULL) {
-               ret = CERT_SVC_ERR_MEMORY_ALLOCATION;
-               goto err;
-       }
-
-       memset(CACert, 0x00, sizeof(cert_svc_mem_buff));
-
-       /* use the first found CA cert - ignore other certificate(s). */
-       ret = cert_svc_util_load_file_to_buffer(fileNames->filename, CACert);
-       if (ret != CERT_SVC_ERR_NO_ERROR) {
-               SLOGE("Fail to load CA cert to buffer.");
-               goto err;
-       }
-
-       /* store root certicate path into ctx */
-       strncpy(rootPath->filename, fileNames->filename, CERT_SVC_MAX_FILE_NAME_SIZE - 1);
-       rootPath->filename[CERT_SVC_MAX_FILE_NAME_SIZE - 1] = '\0';
-
-       /* insert root certificate into trusted chain */
-       _d2i_X509(CACert, &rootCert);
-       if (!sk_X509_push(tchain, rootCert)) {
-               SLOGE("Fail to push certificate into stack.");
-               ret = CERT_SVC_ERR_INVALID_OPERATION;
-               goto err;
-       }
-
-       _d2i_X509(certBuf, &targetCert);
-
-       if (sorted != NULL) {
-               interCert = (X509**)malloc(sizeof(X509*) * certNum);
-               if (interCert == NULL) {
-                       ret = CERT_SVC_ERR_MEMORY_ALLOCATION;
-                       goto err;
-               }
-
-               memset(interCert, 0x00, (sizeof(X509*) * certNum));
-               for (tempNode = sorted, certIndex = 0;
-                               tempNode != NULL;
-                               tempNode = tempNode->next, certIndex++) {
-
-                       _d2i_X509(tempNode->certificate, &interCert[certIndex]);
-                       if (interCert[certIndex] == NULL) {
-                               SLOGE("Invalid certificate. failed to parse certificate.");
-                               ret = CERT_SVC_ERR_INVALID_CERTIFICATE;
-                               goto err;
-                       }
-
-                       /* insert all certificate(s) into chain */
-                       if (!sk_X509_push(uchain, interCert[certIndex])) {
-                               SLOGE("Fail to push certificate into stack.");
-                               ret = CERT_SVC_ERR_INVALID_OPERATION;
-                               goto err;
-                       }
-               }
-       }
-
-       storeCtx = X509_STORE_CTX_new();
-
-       if (!X509_STORE_CTX_init(storeCtx, 0, targetCert, uchain)) {
-               SLOGE("Fail to initialize X509 store context.");
-               ret = CERT_SVC_ERR_INVALID_OPERATION;
-               goto err;
-       }
-
-       X509_STORE_CTX_trusted_stack(storeCtx, tchain);
-
-       *validity = X509_verify_cert(storeCtx);
-       if (*validity != 1) {
-               int error = X509_STORE_CTX_get_error(storeCtx);
-
-               SLOGE("err str: [%s]", X509_verify_cert_error_string(error));
-               ret = CERT_SVC_ERR_INVALID_CERTIFICATE;
-               goto err;
-       }
-
-       if (checkCaFlag) {
-               caFlagValidity = X509_check_ca(rootCert);
-               if (caFlagValidity != 1) {
-                       *validity = 0;
-                       SLOGE("Invalid CA Flag for CA Certificate, caFlagValidity: [%d]", caFlagValidity);
-               }
-       }
-
-err:
-       if (ret != CERT_SVC_ERR_NO_ERROR)
-               SLOGE("Error in cert-service-process. code[%d]", ret);
-
-       if (rootCert != NULL)
-               X509_free(rootCert);
-
-       if (targetCert != NULL)
-               X509_free(targetCert);
-
-       if (storeCtx != NULL)
-               X509_STORE_CTX_free(storeCtx);
-
-       if (tchain != NULL)
-               sk_X509_free(tchain);
-
-       if (uchain != NULL)
-               sk_X509_free(uchain);
-
-       if (interCert != NULL) {
-               for (i = 0; i < certNum; i++) {
-                       if (interCert[i] != NULL)
-                               X509_free(interCert[i]);
-               }
-               free(interCert);
-       }
-
-       release_certificate_buf(CACert);
-       release_certificate_data(findRoot);
-       release_filename_list(fileNames);
-       release_cert_list(sorted);
-
-       return ret;
-}
-
 int _extract_certificate_data(cert_svc_mem_buff* cert, cert_svc_cert_descriptor* certDesc)
 {
        int ret = CERT_SVC_ERR_NO_ERROR;
@@ -1210,62 +812,6 @@ err:
        return ret;
 }
 
-X509 *__loadCert(const char *file)
-{
-       FILE *fp = fopen(file, "r");
-       if(fp == NULL)
-               return NULL;
-       X509 *cert;
-       if(!(cert = d2i_X509_fp(fp, NULL))) {
-               fseek(fp, 0, SEEK_SET);
-               cert = PEM_read_X509(fp, NULL, NULL, NULL);
-       }
-       fclose(fp);
-       return cert;
-}
-
-int __loadSystemCerts(STACK_OF(X509) *systemCerts)
-{
-       int ret = CERT_SVC_ERR_NO_ERROR;
-       cert_svc_filename_list* allCerts = NULL;
-       cert_svc_filename_list* p = NULL;
-       struct stat file_info;
-       X509 *cert;
-
-       if((ret = get_all_certificates(&allCerts)) != CERT_SVC_ERR_NO_ERROR) {
-               SLOGE("[ERR][%s] Fail to get all certificate file list, ret: [%d]", __func__, ret);
-               goto err;
-       }
-
-       p = allCerts;
-       while(1) {
-               if((lstat(p->filename, &file_info)) < 0) {      // get file information
-                       SLOGE("[ERR][%s] Fail to get file(%s) information.", __func__, p->filename);
-                       ret = CERT_SVC_ERR_INVALID_OPERATION;
-                       goto err;
-               }
-               if((file_info.st_mode & S_IFLNK) == S_IFLNK) {  // if symbolic link, continue
-//                     SLOGD("[LOG][%s] %s is symbolic link, ignored.", __func__, p->filename);
-                       goto fail_to_load_file;
-               }
-
-               cert = __loadCert(p->filename);
-               if(cert != NULL) {
-                   sk_X509_push(systemCerts, cert);
-               }
-fail_to_load_file:
-               if(p->next == NULL)
-                       break;
-               p = p->next;
-       }
-
-       ret = CERT_SVC_ERR_NO_ERROR;
-err:
-       release_filename_list(allCerts);
-
-       return ret;
-}
-
 int release_certificate_buf(cert_svc_mem_buff* certBuf)
 {
        int ret = CERT_SVC_ERR_NO_ERROR;
similarity index 78%
rename from include/cert-service-process.h
rename to vcore/orig/cert-service-process.h
index 5b4aea9..0817a89 100644 (file)
 extern "C" {
 #endif
 
-int parse_name_fld_data(unsigned char* str, cert_svc_name_fld_data* fld);
-
-int _verify_certificate_with_caflag(cert_svc_mem_buff* certBuf, cert_svc_linked_list** certList, int checkCaFlag, cert_svc_filename_list* fileNames, int* validity);
-int _extract_certificate_data(cert_svc_mem_buff* cert, cert_svc_cert_descriptor* certDesc);
 int _search_certificate(cert_svc_filename_list** fileNames, search_field fldName, char* fldData);
 
 int release_certificate_buf(cert_svc_mem_buff* certBuf);
similarity index 58%
rename from srcs/cert-service-util.c
rename to vcore/orig/cert-service-util.c
index 944a84e..948fb7f 100644 (file)
  *
  */
 
-#include <stdio.h>
 #include <string.h>
 #include <stdlib.h>
 
 #include <openssl/pkcs12.h>
 #include <openssl/pem.h>
-
-#include "cert-service.h"
-#include "cert-service-util.h"
-#include "cert-service-debug.h"
-#include "cert-service-process.h"
-
 #include <libxml/parser.h>
 #include <libxml/tree.h>
 
-#ifndef CERT_SVC_API
-#define CERT_SVC_API   __attribute__((visibility("default")))
-#endif
+#include "orig/cert-service.h"
+#include "orig/cert-service-util.h"
+#include "orig/cert-service-debug.h"
+#include "orig/cert-service-process.h"
+
 
 #define CERT_BODY_PREFIX  "-----BEGIN CERTIFICATE-----"
 #define CERT_BODY_SUFIX   "-----END CERTIFICATE-----"
 #define ICERT_BODY_PREFIX "-----BEGIN TRUSTED CERTIFICATE-----"
 #define ICERT_BODY_SUFIX  "-----END TRUSTED CERTIFICATE-----"
 
-/* Tables for base64 operation */
-static const unsigned char base64Table[] = {
-       'A', 'B', 'C', 'D', 'E', 'F', 'G', 'H', 'I', 'J', 'K', 'L', 'M', 'N', 'O', 'P', //  0 ~ 15
-       'Q', 'R', 'S', 'T', 'U', 'V', 'W', 'X', 'Y', 'Z', 'a', 'b', 'c', 'd', 'e', 'f', // 16 ~ 31
-       'g', 'h', 'i', 'j', 'k', 'l', 'm', 'n', 'o', 'p', 'q', 'r', 's', 't', 'u', 'v', // 32 ~ 47
-       'w', 'x', 'y', 'z', '0', '1', '2', '3', '4', '5', '6', '7', '8', '9', '+', '/'  // 48 ~ 63
-};
 static int base64DecodeTable[256] = {
        -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, //   0 ~  15
        -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, //  16 ~  31
@@ -69,6 +57,73 @@ static int base64DecodeTable[256] = {
        -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1, -1  // 240 ~ 255
 };
 
+static int cert_svc_util_base64_decode(const unsigned char *in, int inLen, unsigned char *out, int* outLen)
+{
+       int ret = CERT_SVC_ERR_NO_ERROR;
+       int inputLen = 0, i = 0, j = 0, tail = 0;
+       const unsigned char *cur = NULL;
+       unsigned char tmpBuf[4];
+
+       if((in == NULL) || (inLen < 1)) {
+               SLOGE("[ERR][%s] Check your parameter.", __func__);
+               ret = CERT_SVC_ERR_INVALID_PARAMETER;
+               goto err;
+       }
+
+       cur = in;
+       inputLen = inLen;
+       memset(tmpBuf, 0x00, 4);
+
+       /* decode data */
+       while(inputLen > 1) {
+               for(j = 0; j < 4; j++) {
+                       if(cur[j] == '=') {
+                               tail++;
+                               tmpBuf[j] = 0x00;
+                       }
+                       else
+                               tmpBuf[j] = (unsigned char)base64DecodeTable[(int)cur[j]];
+               }
+
+               out[i++] = ((tmpBuf[0] & 0x3f) << 2) + ((tmpBuf[1] & 0x30) >> 4);
+               out[i++] = ((tmpBuf[1] & 0x0f) << 4) + ((tmpBuf[2] & 0x3c) >> 2);
+               out[i++] = ((tmpBuf[2] & 0x03) << 6) + (tmpBuf[3] & 0x3f);
+
+               cur += 4;
+               inputLen -= 4;
+
+               memset(tmpBuf, 0x00, 4);
+       }
+
+       i -= tail;
+       out[i] = '\0';
+       (*outLen) = i;
+
+err:
+       return ret;
+}
+
+static int cert_svc_util_get_file_size(const char* filepath, unsigned long int* length)
+{
+       int ret = CERT_SVC_ERR_NO_ERROR;
+       FILE* fp_in = NULL;
+
+       if(!(fp_in = fopen(filepath, "r"))) {
+               SLOGE("[ERR][%s] Fail to open file, [%s]", __func__, filepath);
+               ret = CERT_SVC_ERR_FILE_IO;
+               goto err;
+       }
+
+       fseek(fp_in, 0L, SEEK_END);
+       (*length) = ftell(fp_in);
+
+err:
+       if(fp_in != NULL)
+               fclose(fp_in);
+
+       return ret;
+}
+
 int get_content_into_buf_PEM(unsigned char* content, cert_svc_mem_buff* cert)
 {
        int ret = CERT_SVC_ERR_NO_ERROR;
@@ -157,26 +212,6 @@ err:
        return ret;
 }
 
-int cert_svc_util_get_file_size(const char* filepath, unsigned long int* length)
-{
-       int ret = CERT_SVC_ERR_NO_ERROR;
-       FILE* fp_in = NULL;
-
-       if(!(fp_in = fopen(filepath, "r"))) {
-               SLOGE("[ERR][%s] Fail to open file, [%s]", __func__, filepath);
-               ret = CERT_SVC_ERR_FILE_IO;
-               goto err;
-       }
-
-       fseek(fp_in, 0L, SEEK_END);
-       (*length) = ftell(fp_in);
-
-err:
-       if(fp_in != NULL)
-               fclose(fp_in);
-
-       return ret;
-}
 
 /* The dark side of cert-svc. */
 int cert_svc_util_get_extension(const char* filePath, cert_svc_mem_buff* certBuf) {
@@ -287,259 +322,3 @@ err:
 
        return ret;
 }
-
-int push_cert_into_linked_list(cert_svc_linked_list** certLink, X509* popedCert)
-{
-       int ret = CERT_SVC_ERR_NO_ERROR;
-       cert_svc_linked_list* cur = NULL;
-       cert_svc_linked_list* newNode = NULL;
-       unsigned char* pCert = NULL;
-       unsigned char* bufCert = NULL;
-       int certLen = 0;
-
-       if(!(newNode = (cert_svc_linked_list*)malloc(sizeof(cert_svc_linked_list)))) {
-               SLOGE("[ERR][%s] Fail to allocate memory.", __func__);
-               ret = CERT_SVC_ERR_MEMORY_ALLOCATION;
-               goto err;
-       }
-       if(!(newNode->certificate = (cert_svc_mem_buff*)malloc(sizeof(cert_svc_mem_buff)))) {
-               SLOGE("[ERR][%s] Fail to allocate memory.", __func__);
-               free(newNode);
-               ret = CERT_SVC_ERR_MEMORY_ALLOCATION;
-               goto err;
-       }
-
-       /* get certificate data and store in certLink */
-       if((certLen = i2d_X509(popedCert, NULL)) < 0) {
-               SLOGE("[ERR][%s] Fail to convert certificate.", __func__);
-               release_cert_list(newNode);
-               ret = CERT_SVC_ERR_INVALID_OPERATION;
-               goto err;
-       }
-       if(!(bufCert = (unsigned char*)malloc(sizeof(unsigned char) * certLen))) {
-               SLOGE("[ERR][%s] Fail to allocate memory.", __func__);
-               ret = CERT_SVC_ERR_MEMORY_ALLOCATION;
-               release_cert_list(newNode);
-               goto err;
-       }
-       pCert = bufCert;
-       i2d_X509(popedCert, &pCert);
-
-       newNode->certificate->data = bufCert;
-       newNode->certificate->size = certLen;
-       newNode->next = NULL;
-
-       if(NULL == *certLink) { // first item
-               *certLink = newNode;
-       }
-       else {
-           /* attach to linked list */
-           cur = *certLink;
-               while(cur->next)
-                       cur = cur->next;
-               cur->next = newNode;
-       }
-
-err:
-       return ret;
-}
-
-int cert_svc_util_load_PFX_file_to_buffer(const char* filePath, cert_svc_mem_buff* certBuf, cert_svc_linked_list** certLink, unsigned char** privateKey, int* priKeyLen, char* passPhrase)
-{
-       int ret = CERT_SVC_ERR_NO_ERROR;
-       // related pkcs12 and x509
-       EVP_PKEY* pkey = NULL;
-       X509* cert = NULL;
-       STACK_OF(X509)* ca = NULL;
-       X509* popedCert = NULL;
-       PKCS12* p12 = NULL;
-       // open file and get content
-       FILE* fp_in = NULL;
-       // put informations to context
-       unsigned char* pCert = NULL;
-       unsigned char* bufCert = NULL;
-       int certLen = 0;
-       unsigned char* pPrikey = NULL;
-       unsigned char* bufPrikey = NULL;
-       int prikeyLen = 0;
-
-       OpenSSL_add_all_algorithms();
-
-       /* open file and write to buffer */
-       if(!(fp_in = fopen(filePath, "rb"))) {
-               SLOGE("[ERR][%s] Fail to open file, [%s]", __func__, filePath);
-               ret = CERT_SVC_ERR_FILE_IO;
-               goto err;
-       }
-       if(!(p12 = d2i_PKCS12_fp(fp_in, NULL))) {
-               SLOGE("[ERR][%s] Fail to get certificate data.", __func__);
-               ret = CERT_SVC_ERR_INVALID_CERTIFICATE;
-               goto err;
-       }
-
-       /* parse PKCS#12 certificate */
-       if((ret = PKCS12_parse(p12, passPhrase, &pkey, &cert, &ca)) != 1) {
-               SLOGE("[ERR][%s] Fail to parse PKCS#12 certificate.", __func__);
-               ret = CERT_SVC_ERR_INVALID_OPERATION;
-               goto err;
-       }
-       ret = CERT_SVC_ERR_NO_ERROR;
-       /* find out certificate type */
-       memset(certBuf->type, 0x00, 4);
-       strncpy(certBuf->type, "PFX", sizeof(certBuf->type));
-
-       /* load certificate into buffer */
-       if((certLen = i2d_X509(cert, NULL)) < 0) {
-               SLOGE("[ERR][%s] Fail to convert certificate.", __func__);
-               ret = CERT_SVC_ERR_INVALID_OPERATION;
-               goto err;
-       }
-       if(!(bufCert = (unsigned char*)malloc(sizeof(unsigned char) * certLen))) {
-               SLOGE("[ERR][%s] Fail to allocate memory.", __func__);
-               ret = CERT_SVC_ERR_MEMORY_ALLOCATION;
-               goto err;
-       }
-       pCert = bufCert;
-       i2d_X509(cert, &pCert);
-
-       certBuf->data = bufCert;
-       certBuf->size = certLen;
-
-       /* load private key into buffer */
-       if((prikeyLen = i2d_PrivateKey(pkey, NULL)) < 0) {
-               SLOGE("[ERR][%s] Fail to convert private key.", __func__);
-               ret = CERT_SVC_ERR_INVALID_OPERATION;
-               goto err;
-       }
-       SLOGE("[LOG] private key length: [%d]", prikeyLen);
-       if(!(bufPrikey = (unsigned char*)malloc(sizeof(unsigned char) * prikeyLen))) {
-               SLOGE("[ERR][%s] Fail to allocate memory.", __func__);
-               ret = CERT_SVC_ERR_MEMORY_ALLOCATION;
-               goto err;
-       }
-       pPrikey = bufPrikey;
-       i2d_PrivateKey(pkey, &pPrikey);
-
-       (*privateKey) = bufPrikey;
-       (*priKeyLen) = prikeyLen;
-
-       /* load ca certificates(if exists) into buffer */
-       while((popedCert = sk_X509_pop(ca)) != NULL) {
-               if((ret = push_cert_into_linked_list(certLink, popedCert)) != CERT_SVC_ERR_NO_ERROR) {
-                       SLOGE("[ERR][%s] Fail to make linked list.", __func__);
-                       goto err;
-               }
-       }
-
-err:
-       if(fp_in != NULL)
-               fclose(fp_in);
-       if(p12 != NULL)
-               PKCS12_free(p12);
-       if(cert != NULL)
-               X509_free(cert);
-       if(pkey != NULL)
-               EVP_PKEY_free(pkey);
-       if(ca != NULL)
-               sk_X509_pop_free(ca, X509_free);
-       //EVP_cleanup();
-
-       return ret;
-}
-
-CERT_SVC_API
-int cert_svc_util_base64_encode(const unsigned char *in, int inLen, unsigned char *out, int *outLen)
-{
-       int ret = CERT_SVC_ERR_NO_ERROR;
-       int inputLen = 0, i = 0;
-       const unsigned char *cur = NULL;
-
-       if((in == NULL) || (inLen < 1)) {
-               SLOGE("[ERR][%s] Check your parameter.", __func__);
-               ret = CERT_SVC_ERR_INVALID_PARAMETER;
-               goto err;
-       }
-
-       cur = in;
-       inputLen = inLen;
-
-       /* encode data */
-       while(inputLen > 2) {
-               out[i++] = base64Table[cur[0] >> 2];
-               out[i++] = base64Table[((cur[0] & 0x03) << 4) + (cur[1] >> 4)];
-               out[i++] = base64Table[((cur[1] & 0x0f) << 2) + (cur[2] >> 6)];
-               out[i++] = base64Table[cur[2] & 0x3f];
-
-               cur += 3;
-               inputLen -= 3;
-       }
-
-       /* determine tail of output string */
-       if(inputLen != 0) {     // 1 or 2
-               out[i++] = base64Table[cur[0] >> 2];
-               if(inputLen > 1) {      // 2
-                       out[i++] = base64Table[((cur[0] & 0x03) << 4) + (cur[1] >> 4)];
-                       out[i++] = base64Table[(cur[1] & 0x0f) << 2];
-                       out[i++] = '=';
-               }
-               else {  // 1
-                       out[i++] = base64Table[(cur[0] & 0x03) << 4];
-                       out[i++] = '=';
-                       out[i++] = '=';
-               }
-       }
-
-       out[i] = '\0';
-       (*outLen) = i;
-
-err:
-       return ret;
-}
-
-CERT_SVC_API
-int cert_svc_util_base64_decode(const unsigned char *in, int inLen, unsigned char *out, int* outLen)
-{
-       int ret = CERT_SVC_ERR_NO_ERROR;
-       int inputLen = 0, i = 0, j = 0, tail = 0;
-       const unsigned char *cur = NULL;
-       unsigned char tmpBuf[4];
-
-       if((in == NULL) || (inLen < 1)) {
-               SLOGE("[ERR][%s] Check your parameter.", __func__);
-               ret = CERT_SVC_ERR_INVALID_PARAMETER;
-               goto err;
-       }
-
-       cur = in;
-       inputLen = inLen;
-       memset(tmpBuf, 0x00, 4);
-
-       /* decode data */
-       while(inputLen > 1) {
-               for(j = 0; j < 4; j++) {
-                       if(cur[j] == '=') {
-                               tail++;
-                               tmpBuf[j] = 0x00;
-                       }
-                       else
-                               tmpBuf[j] = (unsigned char)base64DecodeTable[(int)cur[j]];
-               }
-
-               out[i++] = ((tmpBuf[0] & 0x3f) << 2) + ((tmpBuf[1] & 0x30) >> 4);
-               out[i++] = ((tmpBuf[1] & 0x0f) << 4) + ((tmpBuf[2] & 0x3c) >> 2);
-               out[i++] = ((tmpBuf[2] & 0x03) << 6) + (tmpBuf[3] & 0x3f);
-
-               cur += 4;
-               inputLen -= 4;
-
-               memset(tmpBuf, 0x00, 4);
-       }
-
-       i -= tail;
-       out[i] = '\0';
-       (*outLen) = i;
-
-err:
-       return ret;
-}
-
old mode 100644 (file)
new mode 100755 (executable)
similarity index 76%
rename from include/cert-service-store.h
rename to vcore/orig/cert-service-util.h
index 857cdb3..10c3335
  *
  */
 
-#ifndef CERT_SERVICE_STORE_H
-#define CERT_SERVICE_STORE_H
+#ifndef CERT_SERVICE_UTIL_H
+#define CERT_SERVICE_UTIL_H
 
 #ifdef __cplusplus
 extern "C" {
 #endif
 
-int _add_certificate_to_store(const char* filePath, const char* location);
-int _delete_certificate_from_store(const char* filePath, const char* location);
+int cert_svc_util_load_file_to_buffer(const char* filePath, cert_svc_mem_buff* certBuf);
 
 #ifdef __cplusplus
 }
 #endif
 
-#endif // CERT_SERVICE_STORE_H
+#endif // CERT_SERVICE_UTIL_H
diff --git a/vcore/orig/cert-service.c b/vcore/orig/cert-service.c
new file mode 100644 (file)
index 0000000..6f9e5c3
--- /dev/null
@@ -0,0 +1,130 @@
+/*
+ * certification service
+ *
+ * Copyright (c) 2000 - 2011 Samsung Electronics Co., Ltd All Rights Reserved 
+ *
+ * Contact: Kidong Kim <kd0228.kim@samsung.com>
+ *
+ * Licensed under the Apache License, Version 2.0 (the "License");
+ * you may not use this file except in compliance with the License.
+ * You may obtain a copy of the License at
+ *
+ * http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS,
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ * See the License for the specific language governing permissions and
+ * limitations under the License.
+ *
+ */
+
+#include <string.h>
+#include <stdlib.h>
+#include <errno.h>
+#include <unistd.h>
+#include <dlfcn.h>
+#include <fcntl.h>
+
+#include "orig/cert-service.h"
+#include "orig/cert-service-util.h"
+#include "orig/cert-service-debug.h"
+#include "orig/cert-service-process.h"
+
+int cert_svc_search_certificate(CERT_CONTEXT* ctx, search_field fldName, char* fldData)
+{
+       int ret = CERT_SVC_ERR_NO_ERROR;
+
+       if (!ctx || fldName > SEARCH_FIELD_END || !fldData) {
+               SLOGE("[ERR][%s] Invalid parameter. Check your parameter", __func__);
+               return CERT_SVC_ERR_INVALID_PARAMETER;
+       }
+
+       if (ctx->fileNames != NULL) {
+               SLOGE("[ERR][%s] fileNames field already be used.", __func__);
+               return CERT_SVC_ERR_INVALID_OPERATION;
+       }
+
+       if ((ret = _search_certificate(&(ctx->fileNames), fldName, fldData)) != CERT_SVC_ERR_NO_ERROR) {
+               SLOGE("[ERR][%s] Fail to search certificate.", ctx->fileNames);
+               return ret;
+       }
+
+       SLOGD("[%s] Success to search certificate(s).", __func__);
+
+       return CERT_SVC_ERR_NO_ERROR;
+}
+
+CERT_CONTEXT* cert_svc_cert_context_init()
+{
+       CERT_CONTEXT* ctx = NULL;
+
+       if (!(ctx = (CERT_CONTEXT*)malloc(sizeof(CERT_CONTEXT)))) {
+               SLOGE("[ERR][%s] Fail to allocate memory.", __func__);
+               return NULL;
+       }
+
+       ctx->certBuf = NULL;
+       ctx->certDesc = NULL;
+       ctx->certLink = NULL;
+       ctx->fileNames = NULL;
+
+       SLOGD("[%s] Success to initialize context.", __func__);
+
+       return ctx;
+}
+
+int cert_svc_cert_context_final(CERT_CONTEXT* context)
+{
+       if (!context)
+               return CERT_SVC_ERR_NO_ERROR;
+
+       if (context->certBuf) {
+               free(context->certBuf->data);
+               free(context->certBuf);
+               context->certBuf = NULL;
+       }
+
+       release_certificate_data(context->certDesc);
+       release_cert_list(context->certLink);
+       release_filename_list(context->fileNames);
+
+       free(context);
+       context = NULL;
+
+       SLOGD("[%s] Success to finalize context.", __func__);
+
+       return CERT_SVC_ERR_NO_ERROR;
+}
+
+int cert_svc_load_file_to_context(CERT_CONTEXT* ctx, const char* filePath)
+{
+       int ret = CERT_SVC_ERR_NO_ERROR;
+
+       if (!ctx || !filePath) {
+               SLOGE("[ERR][%s] context or file path is NULL.", __func__);
+               return CERT_SVC_ERR_INVALID_PARAMETER;
+       }
+
+       if (ctx->certBuf) {
+               SLOGE("[ERR][%s] certBuf is already used. we cannot load file.", __func__);
+               return CERT_SVC_ERR_INVALID_OPERATION;
+       }
+
+       if (!(ctx->certBuf = (cert_svc_mem_buff*)malloc(sizeof(cert_svc_mem_buff)))) {
+               SLOGE("[ERR][%s] Fail to allocate memory.", __func__);
+               return CERT_SVC_ERR_MEMORY_ALLOCATION;
+       }
+       memset(ctx->certBuf, 0x00, sizeof(cert_svc_mem_buff));
+
+       if ((ret = cert_svc_util_load_file_to_buffer(filePath, ctx->certBuf)) != CERT_SVC_ERR_NO_ERROR) {
+               SLOGE("[ERR][%s] Fail to load file, filepath: [%s], ret: [%d]", __func__, filePath, ret);
+               free(ctx->certBuf);
+               ctx->certBuf = NULL;
+               return CERT_SVC_ERR_INVALID_OPERATION;
+       }
+       
+       SLOGD("[%s] Success to load certificate file content to context.", __func__);
+
+       return CERT_SVC_ERR_NO_ERROR;
+}
similarity index 84%
rename from include/cert-service.h
rename to vcore/orig/cert-service.h
index 5ab0d8d..3b7107f 100755 (executable)
@@ -167,22 +167,9 @@ typedef struct {
 CERT_CONTEXT* cert_svc_cert_context_init();
 int cert_svc_cert_context_final(CERT_CONTEXT* ctx);
 
-int cert_svc_load_buf_to_context(CERT_CONTEXT* ctx, unsigned char* buf);
 int cert_svc_load_file_to_context(CERT_CONTEXT* ctx, const char* filePath);
-int cert_svc_load_PFX_file_to_context(CERT_CONTEXT* ctx, unsigned char** privateKey, int* priKeyLen, const char* filePath, char* passPhrase);
-int cert_svc_push_buf_into_context(CERT_CONTEXT* ctx, unsigned char* buf);
-int cert_svc_push_file_into_context(CERT_CONTEXT* ctx, const char* filePath);
-
-int cert_svc_add_certificate_to_store(const char* filePath, const char* location);
-int cert_svc_delete_certificate_from_store(const char* fileName, const char* location);
-int cert_svc_verify_certificate(CERT_CONTEXT* ctx, int* validity);
-int cert_svc_verify_certificate_with_caflag(CERT_CONTEXT* ctx, int* validity);
-int cert_svc_extract_certificate_data(CERT_CONTEXT* ctx);
-int cert_svc_search_certificate(CERT_CONTEXT* ctx, search_field fldName, char* fldData);
-
-char *cert_svc_get_certificate_crt_file_path(void);
-int cert_svc_util_parse_name_fld_data(unsigned char* str, cert_svc_name_fld_data* fld);
 
+int cert_svc_search_certificate(CERT_CONTEXT* ctx, search_field fldName, char* fldData);
 
 #ifdef __cplusplus
 }
index a048acf..6e9c7e4 100644 (file)
@@ -33,8 +33,8 @@
 #include <ckmc/ckmc-manager.h>
 #include <ckmc/ckmc-error.h>
 
-#include <cert-service.h>
-#include <cert-service-debug.h>
+#include "orig/cert-service.h"
+#include "orig/cert-service-debug.h"
 #include <cert-svc/cerror.h>
 #include <cert-svc/ccert.h>
 #include <vcore/cert-svc-client.h>
@@ -107,10 +107,10 @@ char *get_complete_path(const char *str1, const char *str2)
        else
                as_result = asprintf(&result, "%s%s", str1, str2);
 
-       if (as_result >= CERTSVC_SUCCESS)
-               return result;
-       else
+       if (as_result < 0)
                return NULL;
+
+       return result;
 }
 
 /* TODO: root ssl file system refactor */
index 1a1109e..10e6c79 100644 (file)
@@ -32,7 +32,8 @@
 #include <sys/select.h>
 #include <systemd/sd-daemon.h>
 
-#include <cert-service-debug.h>
+#include "orig/cert-service-debug.h"
+
 #include <cert-svc/cerror.h>
 #include <cert-svc/ccert.h>
 #include <vcore/cert-svc-client.h>
index 052701c..0fccde9 100644 (file)
@@ -1,5 +1,5 @@
 /*
- * Copyright (c) 2011 Samsung Electronics Co., Ltd All Rights Reserved
+ * Copyright (c) 2015 Samsung Electronics Co., Ltd All Rights Reserved
  *
  *    Licensed under the Apache License, Version 2.0 (the "License");
  *    you may not use this file except in compliance with the License.
  *    WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  *    See the License for the specific language governing permissions and
  *    limitations under the License.
- */
-/*
+ *
+ *
  * @file        Certificate.cpp
  * @author      Bartlomiej Grzelewski (b.grzelewski@samsung.com)
  * @version     1.0
- * @brief
+ * @brief       Certificate class implementation
  */
-#include <vcore/Certificate.h>
 
+#include <cstdio>
 #include <memory>
 #include <sstream>
 #include <iomanip>
 #include <dpl/assert.h>
 #include <dpl/log/log.h>
 
-#include <vcore/Base64.h>
-#include <vcore/TimeConversion.h>
+#include "orig/cert-service.h"
+
+#include "vcore/Base64.h"
+#include "vcore/TimeConversion.h"
+
+#include "vcore/Certificate.h"
+
+namespace {
+
+typedef std::unique_ptr<CERT_CONTEXT, std::function<int(CERT_CONTEXT*)> > ScopedCertCtx;
+
+} // namespace anonymous
 
 namespace ValidationCore {
 
@@ -45,16 +55,6 @@ Certificate::Certificate(X509 *cert)
                       "Internal Openssl error in d2i_X509 function.");
 }
 
-Certificate::Certificate(cert_svc_mem_buff &buffer)
-{
-    Assert(buffer.data);
-    const unsigned char *ptr = buffer.data;
-    m_x509 = d2i_X509(NULL, &ptr, buffer.size);
-    if (!m_x509)
-        VcoreThrowMsg(Certificate::Exception::OpensslInternalError,
-                      "Internal Openssl error in d2i_X509 function.");
-}
-
 Certificate::Certificate(const std::string &data,
                          Certificate::FormType form)
 {
@@ -89,6 +89,24 @@ Certificate::Certificate(const std::string &data,
                       "Internal Openssl error in d2i_X509 function.");
 }
 
+CertificatePtr Certificate::createFromFile(const std::string &location)
+{
+    ScopedCertCtx ctx(cert_svc_cert_context_init(), cert_svc_cert_context_final);
+    if (ctx.get() == NULL)
+        VcoreThrowMsg(Certificate::Exception::InternalError, "Failed to context init");
+
+    if (CERT_SVC_ERR_NO_ERROR != cert_svc_load_file_to_context(ctx.get(), location.c_str()))
+        VcoreThrowMsg(Certificate::Exception::InternalError, "load_file_to_context err");
+
+    const unsigned char *ptr = ctx.get()->certBuf->data;
+    X509 *x509 = d2i_X509(NULL, &ptr, ctx.get()->certBuf->size);
+    if (!x509)
+        VcoreThrowMsg(Certificate::Exception::OpensslInternalError,
+                      "Internal Openssl error in d2i_X509 function.");
+
+    return CertificatePtr(new Certificate(x509));
+}
+
 Certificate::~Certificate()
 {
     X509_free(m_x509);
@@ -273,6 +291,23 @@ std::string Certificate::getEmailAddres(FieldType type) const
     return getField(type, NID_pkcs9_emailAddress);
 }
 
+std::string Certificate::getNameHash(FieldType type) const
+{
+    unsigned long ulNameHash;
+    char buf[9] = {0};
+
+    if (type == FIELD_SUBJECT)
+        ulNameHash = X509_subject_name_hash(m_x509);
+    else
+        ulNameHash = X509_issuer_name_hash(m_x509);
+
+    snprintf(buf, 9, "%08lx", ulNameHash);
+
+    LogDebug("str name hash [" << buf << "]");
+
+    return std::string(buf);
+}
+
 std::string Certificate::getUID(FieldType type) const
 {
     ASN1_BIT_STRING *uid = NULL;
index 9344440..265b044 100644 (file)
@@ -1,5 +1,5 @@
 /*
- * Copyright (c) 2011 Samsung Electronics Co., Ltd All Rights Reserved
+ * Copyright (c) 2015 Samsung Electronics Co., Ltd All Rights Reserved
  *
  *    Licensed under the Apache License, Version 2.0 (the "License");
  *    you may not use this file except in compliance with the License.
  *    WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  *    See the License for the specific language governing permissions and
  *    limitations under the License.
- */
-/*
+ *
+ *
  * @file        Certificate.h
  * @author      Bartlomiej Grzelewski (b.grzelewski@samsung.com)
  * @version     1.1
- * @brief
+ * @brief       Certificate class
  */
-#ifndef _VALIDATION_CORE_CERTIFICATE_H_
-#define _VALIDATION_CORE_CERTIFICATE_H_
+#pragma once
 
 #include <list>
 #include <set>
@@ -31,9 +30,7 @@
 
 #include <openssl/x509.h>
 
-#include <vcore/exception.h>
-
-#include <cert-service.h>
+#include "vcore/exception.h"
 
 extern "C" {
 struct x509_st;
@@ -57,6 +54,7 @@ public:
         VCORE_DECLARE_EXCEPTION_TYPE(Base, OpensslInternalError);
         VCORE_DECLARE_EXCEPTION_TYPE(Base, Base64Error);
         VCORE_DECLARE_EXCEPTION_TYPE(Base, WrongParamError);
+        VCORE_DECLARE_EXCEPTION_TYPE(Base, InternalError);
     };
 
     typedef std::vector<unsigned char> Fingerprint;
@@ -82,9 +80,9 @@ public:
         FORM_BASE64
     };
 
-    explicit Certificate(X509 *cert);
+    static CertificatePtr createFromFile(const std::string &location);
 
-    explicit Certificate(cert_svc_mem_buff &buffer);
+    explicit Certificate(X509 *cert);
 
     explicit Certificate(const std::string &data,
                          FormType form = FORM_DER);
@@ -117,11 +115,14 @@ public:
     std::string getOrganizationalUnitName(FieldType type = FIELD_SUBJECT) const;
     std::string getEmailAddres(FieldType type = FIELD_SUBJECT) const;
 
+    std::string getNameHash(FieldType type = FIELD_SUBJECT) const;
+
     // TODO: UID type is unsigned char. std::string should be changed to unsigned char container
     std::string getUID(FieldType type = FIELD_SUBJECT) const;
     std::string getOCSPURL() const;
 
 
+
     // Openssl supports 9 types of alternative name filed.
     // 4 of them are "string similar" types so it is possible
     // to create more generic function.
@@ -180,5 +181,3 @@ protected:
     X509 *m_x509;
 };
 } // namespace ValidationCore
-
-#endif // _VALIDATION_CORE_CERTIFICATE_H_
index 5f27f8a..89b190d 100644 (file)
@@ -1,5 +1,5 @@
 /*
- * Copyright (c) 2011 Samsung Electronics Co., Ltd All Rights Reserved
+ * Copyright (c) 2015 Samsung Electronics Co., Ltd All Rights Reserved
  *
  *    Licensed under the Apache License, Version 2.0 (the "License");
  *    you may not use this file except in compliance with the License.
  *    WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  *    See the License for the specific language governing permissions and
  *    limitations under the License.
- */
-/*
+ *
+ *
  * @file        CertificateCollection.cpp
  * @author      Bartlomiej Grzelewski (b.grzelewski@samsung.com)
- * @version     0.1
- * @brief
+ * @author      Kyungwook Tak (k.tak@samsung.com)
+ * @version     1.0
+ * @brief       Handles certificate chain, make it complete and sort
  */
 
+#include <stdlib.h>
+#include <string.h>
+#include <stddef.h>
+#include <unistd.h>
+#include <dirent.h>
+
+#include <memory>
+#include <functional>
+
 #include <openssl/pem.h>
 #include <openssl/x509.h>
 
-#include <algorithm>
-
 #include <cert-svc/cinstance.h>
 #include <cert-svc/ccert.h>
 #include <cert-svc/cprimitives.h>
 
 #include <dpl/log/log.h>
-#include <vcore/Base64.h>
 
-#include <vcore/CertificateCollection.h>
+#include "vcore/Base64.h"
+
+#include "vcore/CertificateCollection.h"
 
 namespace {
 
@@ -45,63 +54,73 @@ inline std::string toBinaryString(int data)
     return std::string(buffer, sizeof(int));
 }
 
-CertificatePtr getCertFromStore(X509_NAME *subject)
+CertificatePtr searchCertByHash(const std::string &dir, const CertificatePtr &certPtr)
 {
-    if (!subject) {
-        LogError("Invalid input!");
-        return CertificatePtr();
-    }
+       try {
+               const char *hash = certPtr->getNameHash(Certificate::FIELD_ISSUER).c_str();
 
-    CertSvcInstance instance;
-    if (certsvc_instance_new(&instance) != CERTSVC_SUCCESS) {
-        LogError("Failed to make instance");
-               return CertificatePtr();
-    }
+               std::unique_ptr<DIR, std::function<int(DIR*)>> dp(::opendir(dir.c_str()), ::closedir);
+               if (dp.get() == NULL) {
+                       LogError("Failed open dir[" << dir << "]");
+                       return CertificatePtr();
+               }
 
-    char buffer[1024];
-    X509_NAME_oneline(subject, buffer, 1024);
+               size_t len = offsetof(struct dirent, d_name) + pathconf(dir.c_str(), _PC_NAME_MAX) + 1;
+               std::unique_ptr<struct dirent, std::function<void(void*)>>
+                       pEntry(static_cast<struct dirent *>(::malloc(len)), ::free);
 
-    LogDebug("Search certificate with subject: " << buffer);
-       CertSvcCertificateList certList;
-       int result = certsvc_certificate_search(instance, CERTSVC_SUBJECT, buffer, &certList);
-    if (result != CERTSVC_SUCCESS) {
-        LogError("Error during certificate search. result : " << result);
-               certsvc_instance_free(instance);
-        return CertificatePtr();
-    }
+               struct dirent *dirp = NULL;
+               int ret = 0;
+               while ((ret = readdir_r(dp.get(), pEntry.get(), &dirp)) == 0 && dirp) {
+                       if (dirp->d_type == DT_DIR)
+                               continue;
 
-       size_t listSize = 0;
-       result = certsvc_certificate_list_get_length(certList, &listSize);
-       if (result != CERTSVC_SUCCESS || listSize <= 0) {
-               LogError("Error in certsvc_certificate_list_get_length. result : " << result);
-               certsvc_instance_free(instance);
-               return CertificatePtr();
-       }
+                       /* filename length should be 10. ex) 1a2b3c4d.1 */
+                       if (strlen(dirp->d_name) != 10)
+                               continue;
+
+                       if (strncmp(dirp->d_name, hash, 8) != 0)
+                               continue;
+
+                       LogDebug("Found hash matched file! : " << (dir + dirp->d_name));
+
+                       CertificatePtr candidate = Certificate::createFromFile(dir + dirp->d_name);
+                       if (candidate->getOneLine().compare(certPtr->getOneLine(Certificate::FIELD_ISSUER)) != 0)
+                               continue;
+
+                       return candidate;
+               }
+
+               if (ret != 0) {
+                       LogError("readdir_r error. ret[" << ret << "]");
+                       return CertificatePtr();
+               }
 
-       CertSvcCertificate cert;
-       result = certsvc_certificate_list_get_one(certList, 0, &cert);
-       if (result != CERTSVC_SUCCESS) {
-               LogError("Failed to get cert from cert list. result : " << result);
-               certsvc_certificate_list_all_free(certList);
-               certsvc_instance_free(instance);
+               LogWarning("cert not found by hash[" << hash << "]");
                return CertificatePtr();
-       }
 
-       X509 *pCertX509 = NULL;
-       result = certsvc_certificate_dup_x509(cert, &pCertX509);
-       certsvc_certificate_list_all_free(certList);
-       certsvc_instance_free(instance);
+       } catch (const Certificate::Exception::Base &e) {
+               VcoreThrowMsg(
+                       CertificateCollection::Exception::CertificateError,
+                       "Error in handling certificate : " << e.DumpToString());
+       } catch (const std::exception &e) {
+               VcoreThrowMsg(
+                       CertificateCollection::Exception::InternalError,
+                       "std::exception occured : " << e.what());
+       } catch (...) {
+               VcoreThrowMsg(
+                       CertificateCollection::Exception::InternalError,
+                       "Unknown exception in CertificateCollection.");
+       }
 
-    if (result != CERTSVC_SUCCESS || !pCertX509) {
-        LogError("Error during certificate dup x509. result : " << result);
-        return CertificatePtr();
-    }
 
-    CertificatePtr parentCert(new Certificate(pCertX509));
-    X509_free(pCertX509);
+}
 
-    return parentCert;
+CertificatePtr getIssuerCertFromStore(const CertificatePtr &certPtr)
+{
+       return searchCertByHash(SYSTEM_CERT_DIR, certPtr);
 }
+
 } // namespace
 
 namespace ValidationCore {
@@ -238,19 +257,18 @@ void CertificateCollection::sortCollection()
 bool CertificateCollection::completeCertificateChain()
 {
     CertificatePtr last = m_certList.back();
-    if (last->isSignedBy(last))
+    if (last->isRootCert())
         return true;
 
-    /* TODO Add getIssuerName function to Certificate.h */
-    CertificatePtr parent = getCertFromStore(X509_get_issuer_name(last->getX509()));
+    CertificatePtr rootCert = getIssuerCertFromStore(last);
 
-    if (!parent.get())
+    if (!rootCert.get())
         return false;
 
-    m_certList.push_back(parent);
-    if (!parent->isSignedBy(parent))
+    if (!rootCert->isRootCert())
         return false;
 
+    m_certList.push_back(rootCert);
     return true;
 }
 
index a923b4d..a7f83a1 100644 (file)
@@ -43,6 +43,8 @@ public:
     class Exception {
     public:
         VCORE_DECLARE_EXCEPTION_TYPE(ValidationCore::Exception, Base);
+        VCORE_DECLARE_EXCEPTION_TYPE(Base, InternalError);
+        VCORE_DECLARE_EXCEPTION_TYPE(Base, CertificateError);
         VCORE_DECLARE_EXCEPTION_TYPE(Base, WrongUsage);
     };
 
index 0d4fe04..36d2a9c 100644 (file)
@@ -22,7 +22,7 @@
 #include <dpl/noncopyable.h>
 #include <openssl/ssl.h>
 
-#include <cert-service.h>
+#include "orig/cert-service.h"
 
 #include <vcore/Certificate.h>
 
index efdc1b5..1db2eb1 100644 (file)
@@ -240,6 +240,9 @@ static int makeDataBySignature(
        } catch (const CertificateCollection::Exception::Base &e) {
                LogError("CertificateCollection exception : " << e.DumpToString());
                return -1;
+       } catch (const std::exception &e) {
+               LogError("std exception occured : " << e.what());
+               return -1;
        } catch (...) {
                LogError("Unknown exception in SignatureValidator::makeChainBySignature");
                return -1;
@@ -368,6 +371,9 @@ SignatureValidator::Result SignatureValidator::check(
                 *  just return signature disregard or verified
                 *  because exception case will be handled by cert-checker after app installed
                 */
+       } catch (const std::exception &e) {
+               LogError("std exception occured : " << e.what());
+               return SIGNATURE_INVALID;
        } catch (...) {
                LogError("Unknown exception in SignatureValidator::check");
                return SIGNATURE_INVALID;
index 1c9383c..d418a03 100644 (file)
@@ -45,7 +45,7 @@
 
 #include <dpl/log/log.h>
 
-#include <cert-service.h>
+#include "orig/cert-service.h"
 
 #include <cert-svc/cinstance.h>
 #include <cert-svc/ccert.h>
@@ -445,22 +445,7 @@ public:
 
         cert_svc_filename_list *fileList = ctx.get()->fileNames;
         while (fileList) {
-            ScopedCertCtx ctx2(cert_svc_cert_context_init(),
-                               cert_svc_cert_context_final);
-            if (ctx2.get() == NULL) {
-                LogWarning("Error in cert_svc_cert_context_init.");
-                return CERTSVC_FAIL;
-            }
-
-            // TODO add read_certifcate_from_file function to Certificate.h
-            if (CERT_SVC_ERR_NO_ERROR !=
-                cert_svc_load_file_to_context(ctx2.get(), fileList->filename))
-            {
-                LogWarning("Error in cert_svc_load_file_to_context");
-                return CERTSVC_FAIL;
-            }
-
-            list.push_back(addCert(CertificatePtr(new Certificate(*(ctx2.get()->certBuf)))));
+            list.push_back(addCert(Certificate::createFromFile(fileList->filename)));
 
             fileList = fileList->next;
         }
@@ -1134,19 +1119,7 @@ int certsvc_certificate_new_from_file(
         CertSvcCertificate *certificate)
 {
     try {
-        ScopedCertCtx context(cert_svc_cert_context_init(),
-                              cert_svc_cert_context_final);
-
-        int result = cert_svc_load_file_to_context(context.get(), location);
-
-        switch(result) {
-            case CERT_SVC_ERR_INVALID_PARAMETER: return CERTSVC_WRONG_ARGUMENT;
-            case CERT_SVC_ERR_INVALID_OPERATION: return CERTSVC_FAIL;
-            case CERT_SVC_ERR_MEMORY_ALLOCATION: return CERTSVC_BAD_ALLOC;
-            default:;
-        }
-
-        CertificatePtr cert(new Certificate(*(context->certBuf)));
+        CertificatePtr cert(Certificate::createFromFile(location));
 
         certificate->privateInstance = instance;
         certificate->privateHandler = impl(instance)->addCert(cert);
index 1da8b0d..670d94f 100644 (file)
@@ -30,7 +30,7 @@
 #include <stdlib.h>
 #include <unistd.h>
 
-#include <cert-service-debug.h>
+#include "orig/cert-service-debug.h"
 
 #include <vcore/cert-svc-client.h>
 
index 88b01fe..e79b15f 100644 (file)
 #include <string.h>
 #include <sys/types.h>
 #include <sys/stat.h>
+#include <string>
+
 #include <openssl/err.h>
 #include <openssl/pkcs12.h>
 #include <openssl/sha.h>
 #include <openssl/x509.h>
 #include <openssl/pem.h>
 
-#include <cert-service.h>
-#include <cert-service-debug.h>
-#include <cert-svc/cerror.h>
-
-#include <vcore/cert-svc-client.h>
-#include <vcore/utils.h>
+#include "dpl/log/log.h"
+#include "vcore/Certificate.h"
+#include "vcore/cert-svc-client.h"
+#include "cert-svc/cerror.h"
 
-#include <vcore/pkcs12.h>
+#include "vcore/pkcs12.h"
 
 #define SYSCALL(call) while(((call) == -1) && (errno == EINTR))
 
@@ -126,13 +126,13 @@ int read_from_file(const char *fileName, char **certBuffer, int *length)
     struct stat st;
 
     if (stat(fileName, &st) == -1) {
-        SLOGE("Certificate does not exist in disable folder.");
+        LogError("Certificate does not exist in disable folder.");
         result = CERTSVC_FAIL;
         goto err;
     }
 
     if (!(fp_out = fopen(fileName, "rb"))) {
-        SLOGE("Fail to open file for reading, [%s].", fileName);
+        LogError("Fail to open file for reading, [" << fileName << "].");
         result = CERTSVC_FAIL;
         goto err;
     }
@@ -140,14 +140,14 @@ int read_from_file(const char *fileName, char **certBuffer, int *length)
     fseek(fp_out, 0L, SEEK_END);
     certLength = ftell(fp_out);
     if (certLength < 1) {
-        SLOGE("Fail to get certificate length.");
-        result = CERT_SVC_ERR_FILE_IO;
+        LogError("Fail to get certificate length.");
+        result = CERTSVC_IO_ERROR;
         goto err;
     }
 
     *certBuffer = (char*)malloc(sizeof(char) * ((int)certLength + 1));
     if (*certBuffer == NULL) {
-        SLOGE("Fail to allocate memory");
+        LogError("Fail to allocate memory");
         result = CERTSVC_BAD_ALLOC;
         goto err;
     }
@@ -155,7 +155,7 @@ int read_from_file(const char *fileName, char **certBuffer, int *length)
     memset(*certBuffer, 0x00, certLength+1);
     rewind (fp_out);
     if (fread(*certBuffer, sizeof(char), (size_t)certLength, fp_out) != (size_t)certLength) {
-        SLOGE("Fail to read file, [%s]", fileName);
+        LogError("Fail to read file, [" << fileName << "]");
         result = CERTSVC_IO_ERROR;
         goto err;
     }
@@ -245,23 +245,19 @@ int install_pem_file_format_to_store(CertStoreType storeType, const char *certBu
                const char *alias, const char* path, char *private_key_gname, char *associated_gname, CertType decideCert)
 {
     int result = CERTSVC_SUCCESS;
-    int readCount = 0;
     char* fileName = NULL;
-    char* commonName = NULL;
     char *unique = NULL;
-    BIO* pBio = NULL;
-    X509* x509Struct = NULL;
     struct stat dirST;
 
     if (!certBuffer || !certLength) {
-        SLOGE("Invalid argument. certBuffer is input cert.");
+        LogError("Invalid argument. certBuffer is input cert.");
         return CERTSVC_WRONG_ARGUMENT;
     }
 
     if (decideCert == PEM_CRT) {
         result = unique_filename(&unique);
         if (result != CERTSVC_SUCCESS) {
-            SLOGE("Fail to generate unique filename.");
+            LogError("Fail to generate unique filename.");
             return result;
         }
     }
@@ -269,41 +265,19 @@ int install_pem_file_format_to_store(CertStoreType storeType, const char *certBu
         unique = (char*)path;
 
     if (unique == NULL)        {
-        SLOGE("Failed to get unique file name.");
+        LogError("Failed to get unique file name.");
         return result;
     }
 
-    /* Get common name from buffer or from file */
-    if (stat(path, &dirST) != -1) {
-        result = get_common_name(path, NULL, &commonName);
-        if (result != CERTSVC_SUCCESS) {
-            pBio = BIO_new(BIO_s_mem());
-            if (pBio == NULL) {
-                SLOGE("Failed to allocate memory.");
-                result = CERTSVC_BAD_ALLOC;
-                goto error;
-            }
-
-            readCount = BIO_write(pBio, (const void*) certBuffer, certLength);
-            if (readCount < 1) {
-                SLOGE("Failed to load cert into bio.");
-                result = CERTSVC_BAD_ALLOC;
-                goto error;
-            }
+    std::string commonName;
 
-            x509Struct = PEM_read_bio_X509(pBio, NULL, 0, NULL);
-            if (x509Struct == NULL) {
-                SLOGE("Failed to create x509 structure.");
-                result = CERTSVC_IO_ERROR;
-                goto error;
-            }
-
-            result = get_common_name(NULL, x509Struct, &commonName);
-            if (result != CERTSVC_SUCCESS) {
-                SLOGE("CommonName is NULL");
-                result = CERTSVC_FAIL;
-                goto error;
-            }
+    if (stat(path, &dirST) != -1) {
+        ValidationCore::CertificatePtr certPtr = ValidationCore::Certificate::createFromFile(std::string(path));
+        commonName = certPtr->getCommonName();
+        if (commonName.empty()) {
+            LogError("CommonName is NULL");
+            result = CERTSVC_FAIL;
+            goto error;
         }
     }
 
@@ -312,21 +286,20 @@ int install_pem_file_format_to_store(CertStoreType storeType, const char *certBu
     if ((decideCert == P12_END_USER) && (private_key_gname != NULL))
         result =  vcore_client_install_certificate_to_store(storeType, fileName, alias, private_key_gname, fileName, certBuffer, certLength, decideCert);
     else if ((decideCert == P12_TRUSTED) || (decideCert == P12_INTERMEDIATE))
-        result =  vcore_client_install_certificate_to_store(storeType, fileName, commonName, NULL, associated_gname, certBuffer, certLength, decideCert);
+        result =  vcore_client_install_certificate_to_store(storeType, fileName, commonName.c_str(), NULL, associated_gname, certBuffer, certLength, decideCert);
     else
-        result =  vcore_client_install_certificate_to_store(storeType, fileName, commonName, NULL, fileName, certBuffer, certLength, decideCert);
+        result =  vcore_client_install_certificate_to_store(storeType, fileName, commonName.c_str(), NULL, fileName, certBuffer, certLength, decideCert);
 
     if (result != CERTSVC_SUCCESS) {
-        SLOGE("Failed to intall certificate. result[%d]", result);
+        LogError("Failed to intall certificate. result[" << result << "]");
         result = CERTSVC_FAIL;
         goto error;
      }
 
-    SLOGD("Success to add certificate in store.");
+    LogDebug("Success to add certificate in store.");
 
 error:
-    if (commonName)
-        free(commonName);
+
     return result;
 }
 
@@ -348,9 +321,8 @@ int install_crt_file(
     char* certBuffer = NULL;
     const char* tailEnd = NULL;
 
-    if (read_from_file(path, &fileContent, &fileSize)!=CERTSVC_SUCCESS)
-    {
-       SLOGE("Failed to read the file. [%s]",path);
+    if (read_from_file(path, &fileContent, &fileSize)!=CERTSVC_SUCCESS) {
+        LogError("Failed to read the file. [" << path << "]");
         result = CERTSVC_IO_ERROR;
        goto error;
     }
@@ -363,7 +335,7 @@ int install_crt_file(
     else if ((decideCert == P12_TRUSTED)||(decideCert == P12_INTERMEDIATE))
         header = strstr(tmpBuffer, START_TRUSTED);
     else {
-        SLOGE("Invalid cert.");
+        LogError("Invalid cert.");
         result = CERTSVC_IO_ERROR;
         goto error;
     }
@@ -383,7 +355,7 @@ int install_crt_file(
             tailEnd = END_TRUSTED;
         }
         else {
-            SLOGE("Invalid certificate passed.");
+            LogError("Invalid certificate passed.");
             result = CERTSVC_IO_ERROR;
             goto error;
         }
@@ -394,7 +366,7 @@ int install_crt_file(
             certBuffer = (char*) malloc(sizeof(char) * (certLength+2));
             if (certBuffer == NULL) {
                 result = CERTSVC_BAD_ALLOC;
-                SLOGE("Fail to allocate memory.");
+                LogError("Fail to allocate memory.");
                 goto error;
             }
 
@@ -406,13 +378,13 @@ int install_crt_file(
                                                       path, private_key_gname, associated_gname, decideCert);
             if (result != CERTSVC_SUCCESS) {
                 result = CERTSVC_FAIL;
-                SLOGE("Fail to install certificate[%s]", path);
+                LogError("Fail to install certificate[" << path << "]");
             }
         }
     }
     else {
-        SLOGE("Invalid file type passed.");
-        result = CERT_SVC_ERR_INVALID_CERTIFICATE;
+        LogError("Invalid file type passed.");
+        result = CERTSVC_INVALID_CERTIFICATE;
     }
 
 error:
@@ -428,24 +400,24 @@ int handle_crt_pem_file_installation(CertStoreType storeType, const char *path,
     int result = CERTSVC_SUCCESS;
 
     if ((strstr(path, ".crt")) != NULL || (strstr(path, ".pem")) != NULL) {
-        SLOGD("certificate extention is .crt/.pem file");
+        LogDebug("certificate extention is .crt/.pem file");
 
         /* Installs CRT and PEM files. We will passing NULL for private_key_gname and associated_gname parameter in
          * install_crt_file(). Which means that there is no private key involved in the certificate which we are
          * installing and there are no other certificates related with the current certificate which is installed */
         result = install_crt_file(path, storeType, alias, NULL, NULL, PEM_CRT);
         if (result != CERTSVC_SUCCESS) {
-            SLOGE("Failed to install the certificate.");
+            LogError("Failed to install the certificate.");
             result = CERTSVC_FAIL;
             goto error;
         }
     }
     else {
-        SLOGE("Invalid certificate passed.");
+        LogError("Invalid certificate passed.");
         result = CERTSVC_FAIL;
         goto error;
     }
-    SLOGD("Success to install the certificate.");
+    LogDebug("Success to install the certificate.");
 
 error:
     return result;
@@ -464,14 +436,14 @@ int verify_cert_details(X509** cert, STACK_OF(X509) **certv)
     if (*certv == NULL) {
         pSubject = X509_NAME_oneline((*cert)->cert_info->subject, NULL, 0);
         if (!pSubject) {
-            SLOGE("Failed to get subject name");
+            LogError("Failed to get subject name");
             result = CERTSVC_FAIL;
             goto free_memory;
         }
 
         pIssuerName = X509_NAME_oneline((*cert)->cert_info->issuer, NULL, 0);
         if (!pIssuerName) {
-            SLOGE("Failed to get issuer name");
+            LogError("Failed to get issuer name");
             result = CERTSVC_FAIL;
             goto free_memory;
         }
@@ -481,31 +453,31 @@ int verify_cert_details(X509** cert, STACK_OF(X509) **certv)
             EVP_PKEY* pKey = NULL;
             pKey = X509_get_pubkey(*cert);
             if (!pKey) {
-                SLOGE("Failed to get public key");
+                LogError("Failed to get public key");
                 result = CERTSVC_FAIL;
                 goto free_memory;
             }
 
             if (X509_verify(*cert, pKey) <= 0) {
-                SLOGE("P12 verification failed");
+                LogError("P12 verification failed");
                 EVP_PKEY_free(pKey);
                 result = CERTSVC_FAIL;
                 goto free_memory;
             }
-            SLOGD("P12 verification Success");
+            LogDebug("P12 verification Success");
             EVP_PKEY_free(pKey);
         }
         else {
             cert_store = X509_STORE_new();
             if (!cert_store) {
-                SLOGE("Memory allocation failed");
+                LogError("Memory allocation failed");
                 result = CERTSVC_FAIL;
                 goto free_memory;
             }
 
             res = X509_STORE_load_locations(cert_store, NULL, "/opt/etc/ssl/certs/");
             if (res != 1) {
-                SLOGE("P12 load certificate store failed");
+                LogError("P12 load certificate store failed");
                 X509_STORE_free(cert_store);
                 result = CERTSVC_FAIL;
                 goto free_memory;
@@ -513,7 +485,7 @@ int verify_cert_details(X509** cert, STACK_OF(X509) **certv)
 
             res = X509_STORE_set_default_paths(cert_store);
             if (res != 1) {
-                SLOGE("P12 load certificate store path failed");
+                LogError("P12 load certificate store path failed");
                 X509_STORE_free(cert_store);
                 result = CERTSVC_FAIL;
                 goto free_memory;
@@ -522,14 +494,14 @@ int verify_cert_details(X509** cert, STACK_OF(X509) **certv)
             /* initialise store and store context */
             cert_ctx = X509_STORE_CTX_new();
             if (cert_ctx == NULL) {
-                SLOGE("Memory allocation failed");
+                LogError("Memory allocation failed");
                 result = CERTSVC_FAIL;
                 goto free_memory;
             }
 
             /* construct store context */
             if (!X509_STORE_CTX_init(cert_ctx, cert_store, *cert, NULL)) {
-                SLOGE("Memory allocation failed");
+                LogError("Memory allocation failed");
                 result = CERTSVC_FAIL;
                 goto free_memory;
             }
@@ -537,11 +509,11 @@ int verify_cert_details(X509** cert, STACK_OF(X509) **certv)
 #ifdef P12_VERIFICATION_NEEDED
             res = X509_verify_cert(cert_ctx);
             if (res != 1) {
-                SLOGE("P12 verification failed");
+                LogError("P12 verification failed");
                 result = CERTSVC_FAIL;
                 goto free_memory;
             }
-            SLOGD("P12 verification Success");
+            LogDebug("P12 verification Success");
 #endif
         }
     }
@@ -549,21 +521,21 @@ int verify_cert_details(X509** cert, STACK_OF(X509) **certv)
         /* Cert Chain */
         cert_store = X509_STORE_new();
         if (!cert_store) {
-            SLOGE("Memory allocation failed");
+            LogError("Memory allocation failed");
             result = CERTSVC_FAIL;
             goto free_memory;
         }
 
         res = X509_STORE_load_locations(cert_store, NULL, SYSTEM_CERT_DIR);
         if (res != 1) {
-            SLOGE("P12 load certificate store failed");
+            LogError("P12 load certificate store failed");
             result = CERTSVC_FAIL;
             goto free_memory;
         }
 
         res = X509_STORE_set_default_paths(cert_store);
         if (res != 1) {
-            SLOGE("P12 load certificate path failed");
+            LogError("P12 load certificate path failed");
             result = CERTSVC_FAIL;
             goto free_memory;
         }
@@ -571,14 +543,14 @@ int verify_cert_details(X509** cert, STACK_OF(X509) **certv)
         /* initialise store and store context */
         cert_ctx = X509_STORE_CTX_new();
         if (cert_ctx == NULL) {
-            SLOGE("Memory allocation failed");
+            LogError("Memory allocation failed");
             result = CERTSVC_FAIL;
             goto free_memory;
         }
 
         /* construct store context */
         if (!X509_STORE_CTX_init(cert_ctx, cert_store, *cert, NULL)) {
-            SLOGE("Memory allocation failed");
+            LogError("Memory allocation failed");
             result = CERTSVC_FAIL;
             goto free_memory;
         }
@@ -587,11 +559,11 @@ int verify_cert_details(X509** cert, STACK_OF(X509) **certv)
 #ifdef P12_VERIFICATION_NEEDED
         res = X509_verify_cert(cert_ctx);
         if (res != 1) {
-            SLOGE("P12 verification failed");
+            LogError("P12 verification failed");
             result = CERTSVC_FAIL;
             goto free_memory;
         }
-        SLOGD("P12 verification Success");
+        LogDebug("P12 verification Success");
 #endif
     }
 #endif //_CERT_SVC_VERIFY_PKCS12
@@ -629,8 +601,7 @@ int c_certsvc_pkcs12_import_from_file_to_store(CertStoreType storeTypes, const c
     int exists = 0;
 
     if ((!alias) || (strlen(alias) < 1) || (!path) || (strlen(path) < 1)) {
-        SLOGE("Invalid input parameter.");
-               SLOG(LOG_INFO, "MDM_LOG_USER", "Object=certificate, AccessType=Install, Result=Failed");
+        LogError("Invalid input parameter.");
         return CERTSVC_WRONG_ARGUMENT;
     }
 
@@ -640,8 +611,7 @@ int c_certsvc_pkcs12_import_from_file_to_store(CertStoreType storeTypes, const c
 
         /* User should not install any form of certificates inside SYSTEM_STORE */
         if (((1 << loopCount) & storeTypes) == SYSTEM_STORE) {
-            SLOGE("Not a valid store type installing certificate, store type passed [%d].", (1 << loopCount));
-                       SLOG(LOG_INFO, "MDM_LOG_USER", "Object=certificate, AccessType=Install, Result=Failed");
+            LogError("Not a valid store type installing certificate, store type passed [" << (1 << loopCount) << "]");
             return CERTSVC_INVALID_STORE_TYPE;
         }
 
@@ -649,18 +619,18 @@ int c_certsvc_pkcs12_import_from_file_to_store(CertStoreType storeTypes, const c
         if ((1 << loopCount) & storeTypes) {
             storeType = NONE_STORE;
             storeType = (CertStoreType) (1 << loopCount);
-            SLOGD("Processing store type : [%s]", (storeType == VPN_STORE)? "VPN" : (storeType == WIFI_STORE)? "WIFI" : "EMAIL");
+            LogDebug("Processing store type : [" << ((storeType == VPN_STORE)? "VPN" : (storeType == WIFI_STORE)? "WIFI" : "EMAIL") << "]");
 
             /* check if the alias exists before installing certificate */
             result = c_certsvc_pkcs12_alias_exists_in_store(storeType, alias, &exists);
             if (result != CERTSVC_SUCCESS) {
-                SLOGE("Failure to access database.");
+                LogError("Failure to access database.");
                 result = CERTSVC_FAIL;
                 goto error;
             }
 
             if (exists!=CERTSVC_TRUE) {
-                SLOGE("Alias exist in store [%s].", (storeType == VPN_STORE)? "VPN" : (storeType == WIFI_STORE)? "WIFI" : "EMAIL");
+                LogError("Alias exist in store [" << ((storeType == VPN_STORE)? "VPN" : (storeType == WIFI_STORE)? "WIFI" : "EMAIL") << "]");
                 result = CERTSVC_DUPLICATED_ALIAS;
                 goto error;
             }
@@ -670,7 +640,7 @@ int c_certsvc_pkcs12_import_from_file_to_store(CertStoreType storeTypes, const c
             if (password == NULL && ((strstr(path, ".pfx") == NULL) || (strstr(path, ".p12")))) {
                 result = handle_crt_pem_file_installation(storeType, path, alias);
                 if (result != CERTSVC_SUCCESS) {
-                    SLOGE("Failed to install PEM/CRT file to store.");
+                    LogError("Failed to install PEM/CRT file to store.");
                     result = CERTSVC_FAIL;
                 }
                 loopCount++;
@@ -679,7 +649,7 @@ int c_certsvc_pkcs12_import_from_file_to_store(CertStoreType storeTypes, const c
 
             /* Logic for handling .pfx/.p12 cert installation */
             if ((stream = fopen(path, "rb")) == NULL) {
-                SLOGE("Unable to open the file for reading [%s].", path);
+                LogError("Unable to open the file for reading [" << path << "]");
                 result = CERTSVC_IO_ERROR;
                 goto error;
             }
@@ -688,7 +658,7 @@ int c_certsvc_pkcs12_import_from_file_to_store(CertStoreType storeTypes, const c
                 container = d2i_PKCS12_fp(stream, NULL);
                 fclose(stream);
                 if (container == NULL) {
-                    SLOGE("Failed to parse the input file passed.");
+                    LogError("Failed to parse the input file passed.");
                     result = CERTSVC_FAIL;
                     goto error;
                 }
@@ -699,14 +669,14 @@ int c_certsvc_pkcs12_import_from_file_to_store(CertStoreType storeTypes, const c
                 result = PKCS12_parse(container, password, &key, &cert, &certv);
                 PKCS12_free(container);
                 if (result == CERTSVC_FAIL) {
-                    SLOGE("Failed to parse the file passed.");
+                    LogError("Failed to parse the file passed.");
                     result = CERTSVC_FAIL;
                     goto error;
                 }
 
                 result = verify_cert_details(&cert, &certv);
                 if (result == CERTSVC_FAIL) {
-                    SLOGE("Failed to verify p12 certificate.");
+                    LogError("Failed to verify p12 certificate.");
                     goto error;
                 }
             }
@@ -732,19 +702,19 @@ int c_certsvc_pkcs12_import_from_file_to_store(CertStoreType storeTypes, const c
             if (unique != NULL) { free(unique); unique = NULL; }
             result = unique_filename(&unique);
             if (result != CERTSVC_SUCCESS || !unique) {
-                SLOGE("Unique filename generation failed.");
+                LogError("Unique filename generation failed.");
                 goto error;
             }
 
             if ((stream = fopen(unique, "w+")) == NULL) {
-                SLOGE("Unable to open the file for writing [%s].",unique);
+                LogError("Unable to open the file for writing [" << unique << "]");
                 result = CERTSVC_IO_ERROR;
                 goto error;
             }
 
             result = PEM_write_PrivateKey(stream, key, NULL, NULL, 0, NULL, NULL);
             if (result == 0) {
-                SLOGE("Writing the private key contents failed.");
+                LogError("Writing the private key contents failed.");
                 result = CERTSVC_FAIL;
                 fclose(stream);
                 goto error;
@@ -756,7 +726,7 @@ int c_certsvc_pkcs12_import_from_file_to_store(CertStoreType storeTypes, const c
             readLen = fread(fileBuffer, sizeof(char), 4096, stream);
             fclose(stream);
             if (readLen <= 0){
-                               SLOGE("Failed to read key file");
+                               LogError("Failed to read key file");
                 result = CERTSVC_FAIL;
                 goto error;
             }
@@ -773,7 +743,7 @@ int c_certsvc_pkcs12_import_from_file_to_store(CertStoreType storeTypes, const c
             decideCert = P12_PKEY;
             result = vcore_client_install_certificate_to_store(storeType, tmpPkValue, NULL, NULL, NULL, fileBuffer, readLen, decideCert);
             if (result != CERTSVC_SUCCESS) {
-                SLOGD("Failed to store the private key contents.");
+                LogDebug("Failed to store the private key contents.");
                 result = CERTSVC_FAIL;
                 goto error;
             }
@@ -782,12 +752,12 @@ int c_certsvc_pkcs12_import_from_file_to_store(CertStoreType storeTypes, const c
             if (unique!=NULL) { free(unique); unique=NULL; }
             result = unique_filename(&unique);
             if (result != CERTSVC_SUCCESS || !unique) {
-                SLOGE("Unique filename generation failed.");
+                LogError("Unique filename generation failed.");
                 goto error;
             }
 
             if ((stream = fopen(unique, "w")) == NULL) {
-                SLOGE("Unable to open the file for writing [%s].", unique);
+                LogError("Unable to open the file for writing [" << unique << "]");
                 result = CERTSVC_IO_ERROR;
                 goto error;
             }
@@ -795,7 +765,7 @@ int c_certsvc_pkcs12_import_from_file_to_store(CertStoreType storeTypes, const c
             result = PEM_write_X509(stream, cert);
             fclose(stream);
             if (result == 0) {
-                SLOGE("Failed to write contents to file.");
+                LogError("Failed to write contents to file.");
                 result = CERTSVC_FAIL;
                 goto error;
             }
@@ -809,7 +779,7 @@ int c_certsvc_pkcs12_import_from_file_to_store(CertStoreType storeTypes, const c
             wr_res = install_crt_file(unique, storeType, alias, tmpPkValue, NULL, decideCert);
             if (wr_res != CERTSVC_SUCCESS) {
                 result = CERTSVC_FAIL;
-                SLOGE("Failed to install the end user certificate.");
+                LogError("Failed to install the end user certificate.");
                 goto error;
             }
 
@@ -817,13 +787,13 @@ int c_certsvc_pkcs12_import_from_file_to_store(CertStoreType storeTypes, const c
             for (i=nicerts; i>0; i--) {
                  result = unique_filename(&unique);
                  if (result != CERTSVC_SUCCESS || !unique) {
-                     SLOGE("Unique filename generation failed.");
+                     LogError("Unique filename generation failed.");
                      goto error;
                  }
 
                  if ((stream = fopen(unique, "w")) == NULL) {
                       result = CERTSVC_IO_ERROR;
-                      SLOGE("Unable to open the file for writing.");
+                      LogError("Unable to open the file for writing.");
                       goto error;
                  }
 
@@ -831,7 +801,7 @@ int c_certsvc_pkcs12_import_from_file_to_store(CertStoreType storeTypes, const c
                  fclose(stream);
                  if (result == 0) {
                      result = CERTSVC_FAIL;
-                     SLOGE("Unable to extract the certificates.");
+                     LogError("Unable to extract the certificates.");
                      goto error;
                  }
 
@@ -858,31 +828,28 @@ error:
     /* if any certificate parsing/installation fails in middle,
      * the below logic will delete the chain installed in DB */
     if (result != CERTSVC_SUCCESS) {
-               SLOG(LOG_INFO, "MDM_LOG_USER", "Object=certificate, AccessType=Install, Result=Failed");
         if (nicerts > 0) {
                nicerts = 0; i = 0;
                /* cvaluev[0] holds the end user certificate identifier which will be associated
                 * to chain certs. Pull the cert chain based on end user cert and delete one by one. */
             if (c_certsvc_pkcs12_load_certificates_from_store(storeType, cvaluev[0], &certs, &ncerts) != CERTSVC_SUCCESS) {
-                SLOGE("Unable to load certificates from store.");
+                LogError("Unable to load certificates from store.");
                 return result;
             }
 
             for (i=0; i<ncerts; i++) {
-                if (certs[i] != NULL) {
-                    SLOGD("file to delete : %s",certs[i]);
-                     c_certsvc_pkcs12_delete_certificate_from_store(storeType, (char *)certs[i]);
-                }
+                if (certs[i] != NULL) {
+                    LogDebug("file to delete : " << certs[i]);
+                    c_certsvc_pkcs12_delete_certificate_from_store(storeType, (char *)certs[i]);
+                }
             }
 
             if (certs[i] != NULL) {
                 for (i=0; i<ncerts; i++)
-                     free(certs[i]);
+                    free(certs[i]);
             }
         }
     }
-       else
-               SLOG(LOG_INFO, "MDM_LOG_USER", "Object=certificate, AccessType=Install, Result=Succeed");
 
     if (key != NULL) EVP_PKEY_free(key);
     if (cert != NULL) X509_free(cert);
diff --git a/vcore/vcore/utils.c b/vcore/vcore/utils.c
deleted file mode 100644 (file)
index db26653..0000000
+++ /dev/null
@@ -1,156 +0,0 @@
-#include <cert-service.h>
-#include <cert-service-debug.h>
-#include <cert-svc/cerror.h>
-
-#include <stdio.h>
-#include <stdlib.h>
-#include <string.h>
-
-#include "utils.h"
-
-void _copy_field(const unsigned char *in, unsigned char **out)
-{
-       size_t in_len = strlen((const char *)(in));
-
-       *out = (unsigned char *)malloc(sizeof(unsigned char) * (in_len + 1));
-       if (!(*out)) {
-               LOGE("Failed to allocate memory.");
-               return;
-       }
-       
-       memcpy(*out, in, in_len + 1);
-}
-
-char *get_complete_path(const char *str1, const char *str2)
-{
-       size_t str1_len = strlen(str1);
-       char *result = NULL;
-       int as_result;
-
-       if (str1[str1_len - 1] != '/')
-               as_result = asprintf(&result, "%s/%s", str1, str2);
-       else
-               as_result = asprintf(&result, "%s%s", str1, str2);
-
-       if (as_result < 0)
-               return NULL;
-
-       return result;
-}
-
-
-int get_common_name(const char *path, struct x509_st *x509Struct, char **commonName)
-{
-       int result = CERTSVC_SUCCESS;
-       const unsigned char* data = NULL;
-       CERT_CONTEXT* context = NULL;
-       unsigned char *_commonName = NULL;
-       unsigned char *tmpSubjectStr = NULL;
-       cert_svc_name_fld_data *certFieldData = NULL;
-
-       if (!path && !x509Struct) {
-               LOGE("Invalid input parameter.");
-               return  CERTSVC_WRONG_ARGUMENT;
-       }
-
-       /* If x509Struct is empty, we need to read the certificate and construct the x509 structure */
-       if (!x509Struct) {
-               context = cert_svc_cert_context_init();
-               if (!context) {
-                       LOGE("Failed to allocate memory.");
-                       return CERTSVC_BAD_ALLOC;
-               }
-
-               result = cert_svc_load_file_to_context(context, path);
-               if (result != CERT_SVC_ERR_NO_ERROR) {
-                       LOGE("Failed to load file into context.");
-                       result = CERTSVC_FAIL;
-                       goto err;
-               }
-
-               if (!context->certBuf || !context->certBuf->data) {
-                       LOGE("Empty certificate buffer.");
-                       result = CERTSVC_FAIL;
-                       goto err;
-               }
-
-               data = context->certBuf->data;
-               d2i_X509(&x509Struct, &data, context->certBuf->size);
-
-               if (!x509Struct) {
-                       LOGE("[ERR][%s] Fail to construct X509 structure.", __func__);
-                       result = CERT_SVC_ERR_INVALID_CERTIFICATE;
-                       goto err;
-               }
-       }
-
-       /* At this point we assume that we have the x509Struct filled with information */
-       tmpSubjectStr = (unsigned char *)X509_NAME_oneline((x509Struct->cert_info->subject), NULL, 0);
-       if (!tmpSubjectStr) {
-               LOGE("[ERR][%s] Fail to parse certificate.", __func__);
-               result = CERTSVC_FAIL;
-               goto err;
-       }
-
-       certFieldData = (cert_svc_name_fld_data *)malloc(sizeof(cert_svc_name_fld_data));
-       if (!certFieldData) {
-               LOGE("Failed to allocate memory.");
-               result = CERTSVC_BAD_ALLOC;
-               goto err;
-       }
-
-       certFieldData->commonName = NULL;
-       certFieldData->organizationName = NULL;
-       certFieldData->organizationUnitName = NULL;
-       certFieldData->emailAddress = NULL;
-
-       result = cert_svc_util_parse_name_fld_data(tmpSubjectStr, certFieldData);
-       if (result != CERT_SVC_ERR_NO_ERROR) {
-               LOGE("[ERR][%s] Fail to parse cert_svc_name_fld_data.", __func__);
-               result = CERTSVC_FAIL;
-               goto err;
-       }
-
-       result = CERTSVC_SUCCESS;
-
-       if (certFieldData->commonName)
-               _copy_field(certFieldData->commonName, &_commonName);
-       else if (certFieldData->organizationName)
-               _copy_field(certFieldData->organizationName, &_commonName);
-       else if (certFieldData->organizationUnitName)
-               _copy_field(certFieldData->organizationUnitName, &_commonName);
-       else if (certFieldData->emailAddress)
-               _copy_field(certFieldData->emailAddress, &_commonName);
-
-       if (!_commonName) {
-               LOGE("Failed to get common name");
-               result = CERTSVC_FAIL;
-               goto err;
-       }
-
-       *commonName = (char *)_commonName;
-       LOGD("Success to get common name for title. commonname[%s]", *commonName);
-
-err:
-       if (x509Struct)
-               X509_free(x509Struct);
-
-       if (context)
-               cert_svc_cert_context_final(context);
-
-       if (tmpSubjectStr)
-               OPENSSL_free(tmpSubjectStr);
-
-       if (certFieldData) {
-               free(certFieldData->countryName);
-               free(certFieldData->localityName);
-               free(certFieldData->stateOrProvinceName);
-               free(certFieldData->organizationName);
-               free(certFieldData->organizationUnitName);
-               free(certFieldData->commonName);
-               free(certFieldData->emailAddress);
-               free(certFieldData);
-       }
-
-       return result;
-}
diff --git a/vcore/vcore/utils.h b/vcore/vcore/utils.h
deleted file mode 100644 (file)
index 2752b51..0000000
+++ /dev/null
@@ -1,14 +0,0 @@
-#pragma once
-
-#include <openssl/x509.h>
-
-#ifdef __cplusplus
-extern "C" {
-#endif
-
-char *get_complete_path(const char *str1, const char *str2);
-int get_common_name(const char *path, struct x509_st *x509Struct, char **commonName);
-
-#ifdef __cplusplus
-}
-#endif